Asigra Dsuser Guide
Asigra Dsuser Guide
Asigra Dsuser Guide
Assumptions
The following assumptions are made about the audience for this document: Familiarity: User is familiar with the Operating System platform. User is familiar with basic Internet browsing. Correct Input: User enters the correct data (e.g. user names, passwords, etc.) when asked or required. If invalid data is entered, an error message will appear, and you will be forced to correct the error before you may proceed. Canceling activities: The option to cancel the current activity (in some cases the option is No) will exit the activity.
Disclaimer
Information in this document is subject to change without notice and does not represent a commitment on the part of ASIGRA Inc. ASIGRA Inc. makes no representation or warranty, express, implied, or statutory, with respect to, and assumes no responsibility for the accuracy, completeness, sufficiency or usefulness of the information contained herein. This document may contain sample screen shots, used to demonstrate Asigra Cloud Backup procedures. All information appearing in this document is used for illustration purposes only, and it should be considered fictitious.
Copyright
The software described in this document is furnished under a license agreement. It is against the law to copy the software on any medium except as specifically allowed in the license agreement. Asigra, the Asigra logo, DS-Client, DS-System, and Cloud Backup are trademarks of Asigra Inc. All other brand and product names are, or may be trademarks of their respective owners.
Export DS-Client configuration to XML. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 To export DS-Client configuration to XML . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 To update a DS-Client using config-update.xml . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Set a User/Group Maximum Online Storage Limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 Password Rotation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 Add or Edit a User for Password Rotation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 Add or Edit a Password Rotation Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 View Quotas. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Bandwidth Throttle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 Modify the DS-Client Setup (Windows DS-Clients) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 DS-User Initialization (Win32 Only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Language . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 DS-User Initialization (Optional - JAVA Only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Security Context (Win32 and Java GUI). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Auto-Connection (Win32 and Java GUI) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Regional Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Keep Alive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Plugins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Look & Feel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
63 63 65 65 66 67 68 68
Fonts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 Show Memory (of the GUI) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 Grid DS-Client (Windows DS-Clients) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Monitor Grid Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Stop a DS-Client Node . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Export the Grid DS-Client Addresses (to text file) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View DS-Client Grid Log. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 71 72 73 74
File System Backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Step 1. Choose the kind of backup set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Step 2. Select the Computer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Step 3. Specify the Backup Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 Step 4. Specify the Backup Item Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 Step 5. Specify Backup Set Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 Step 6. Specify Advanced Options (Windows DS-Client) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 Step 7. Specify Backup Set Performance Options (Windows DS-Client) . . . . . . . . . . . . . . . . . . 106 Step 8. Specify Notification Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 Step 9. Specify the Retention Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 Step 10. Specify the Schedule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 Step 11. Name the Backup Set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 NAS, UNIX-SSH, NFS, Local File System Backup (LINUX DS-Client) . . . . . . . . . . . . . . . . . . . . Step 1. Choose the kind of backup set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2. Select the source for this backup set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 3. Specify the Backup Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 4. Specify the Backup Item Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 5. Specify the Backup Set Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
Step 6. Specify the Notification Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 Novell NetWare Backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 MS SQL Server Database Backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 1. Choose the kind of backup set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2. Select the Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 3. Specify the Database Dump options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 4. Specify the Backup Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 5. Specify the Backup Item Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 6. Specify the Backup Set Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 7. Specify the Backup Set Performance Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . MS Exchange Server Backups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 1. Choose the kind of backup set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2. Select the Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 3. Specify the Database Dump options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 4. Specify the Backup Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 5. Specify the Backup Item Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 6. Specify Backup Set Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 7. Specify the MS Exchange Advanced Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 8. Specify the Backup Set Performance Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 116 116 117 118 119 120 120 121 121 121 122 123 124 124 125 125
Permissions Only Backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 Step 1. Choose the kind of backup set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 Step 2. Select the Computer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 Oracle Database Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 1. Choose the kind of backup set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2. Select the Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Specify the protocol for dumping the database (Linux DS-Client) . . . . . . . . . . . . . . . . . . . . . . . Step 3. Specify the Database Dump options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 4. Specify the Backup Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 5. Specify the Backup Item Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 6. Specify the Backup Set Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 7. Specify the Notification Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . MySQL Database Backup (Windows DS-Client) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 1. Choose the kind of backup set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2. Select the Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 3. Specify the Database Dump options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 4. Specify the Backup Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 5. Specify the Backup Item Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 6. Specify the Backup Set Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . MySQL Database Backup (LINUX DS-Client) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 1. Choose the kind of backup set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2. Select the Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 3. Specify the Backup Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 4. Specify the Backup Item Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 5. Specify the Backup Set Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 6. Specify the Notification Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127 127 127 127 128 129 130 130 130 131 131 131 131 131 131 132 133 133 133 133 133 133 134
DB2 Database Backup (LINUX DS-Client). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 Step 1. Choose the kind of backup set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
Step 2. Select the Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 3. Specify the protocol for dumping the database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 4. Specify the Database Dump options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 5. Specify the Backup Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 6. Specify the Backup Item Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 7. Specify Backup Set Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 8. DB2 userexit log path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 9. Specify Notification Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PostgreSQL Database Backup (LINUX DS-Client) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 1. Choose the kind of backup set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2. Select the Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 3. Specify the Backup Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 4. Specify the Backup Item Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 5. Specify the Backup Set Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 6. Specify the Notification Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E-Mail Messages (DS-Recovery Tools) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 1. Choose the kind of backup set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2. Select the E-Mail Server Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 3. Select the Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 4. Select Directories / E-Mails for Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 5. Specify the Backup Item Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 6. Specify the Backup Set Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 7. Specify the Notification Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . System i Server Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 1. Choose the kind of backup set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2. Select the Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 3. Specify the share & path for the data dump . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 4. Specify the Backup Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 5. Specify the Backup Item Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 6. Specify the Backup Set Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 7. Specify the Notification Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . MS SharePoint Server (DS-Recovery Tools) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 1. Choose the kind of backup set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2. Select the Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 3. Select Items for Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . VMware Backup (LINUX DS-Client) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 1. Choose the kind of backup set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2. Select the Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 3. Specify the Backup Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 4. Specify the Backup Item Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 5. Specify the Backup Set Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 6. Specify the Notification Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . XenServer Backup (LINUX DS-Client) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 1. Choose the kind of backup set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2. Select the Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 3. Specify the Backup Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 4. Specify the Backup Item Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 5. Specify the Backup Set Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
135 136 136 136 136 137 138 138 139 139 139 139 139 139 140 141 141 141 142 143 144 145 145 147 147 147 147 148 151 151 152 153 153 153 153 154 154 154 154 154 155 155 156 156 156 156 156 156
Step 6. Specify the Notification Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156 Lotus Domino Server Database Backup (Windows DS-Client). . . . . . . . . . . . . . . . . . . . . . . . . . Step 1. Choose the kind of backup set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2. Select the Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 3. Specify the Backup Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Sybase Database Backup (LINUX DS-Client) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 1. Choose the kind of backup set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2. Select the Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 3. Specify the Database Dump options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 4. Specify the Backup Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 5. Specify the Backup Item Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 6. Specify the Backup Set Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 7. Specify the Notification Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . VSS-aware backup sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 1. Choose the kind of backup set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2. Select the VSS-aware backup set type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 3. Select the Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 4. Select Items for Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Note about Retention Rules for VSS-aware backup sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Note about Database Backup Policy for VSS-aware backup sets . . . . . . . . . . . . . . . . . . . . . . . Oracle-SBT Backup (LINUX DS-Client) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 1. Choose the kind of backup set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2. Select the Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 3. Specify the Backup Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 4. Specify the Backup Item Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 5. Specify the Backup Set Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 6. Specify the Notification Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . VMware VADP Backup (LINUX DS-Client) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 1. Choose the kind of backup set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2. Select the Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 3. Specify the Backup Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Backup from the Cloud (Salesforce.com). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 1. Choose the kind of backup set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2. Select the Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 3. Specify the Backup Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 4. Specify the Backup Item Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 5. Specify the Backup Set Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 6. Select the Backup from the Cloud Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 7. Specify the Notification Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Local DS-VDR backup set (VMware VADP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 1. Choose the kind of backup set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2. Select the Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 3. Specify the Backup Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 4. Specify the Backup Item Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 5. Specify the Backup Set Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 6. Specify the Local DS-VDR Backup Set Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 7. Specify the Notification Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
158 158 158 158 159 159 159 159 159 160 160 160 161 161 161 162 162 162 163 164 164 164 164 164 164 164 166 166 166 166 167 167 167 167 168 168 168 168 169 169 169 170 170 170 171 171
Physical to Virtual backup set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 1. Choose the kind of backup set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2. Select the Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 3. Specify the Backup Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 4. Specify the Backup Item Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 5. Specify the Backup Set Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 6. Specify the Notification Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
215 217 219 221 222 223 225 225 225 227 228 229 230 232 233 234 234 234 235 235 236 237 237 237 238 238 238 239 239 239 239 239 241 241 241 241 241 241 242 242 242 242 242
Restore PostgreSQL Backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 1. Select the Backup Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2. Select the Database(s) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 3. Specify the Restore Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 4. Specify the Restore Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Restore E-Mail Backups (via DS-Recovery Tools) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 1. Select the Backup Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2. Select the Restore Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 3. Specify the Restore Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 4. Specify the Restore Performance Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 5. Specify the Restore Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Restore System i Server Backups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 1. Select the Backup Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2. Select the Restore Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 3. Specify the Restore Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 4. Specify the Restore Performance Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 5. Specify the Restore Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Restore MS SharePoint Backups (via DS-Recovery Tools) . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 1. Select the Backup Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2. Select the Restore Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 3. Specify the Restore Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 4. Specify the Restore Performance Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 5. Specify the Restore Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Restore Lotus Domino Server Database Backups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 1. Select the Backup Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2. Select the Restore Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 3. Specify the Restore Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 4. Specify the Restore Performance Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 5. Specify the Restore Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Restore Sybase Database Backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 1. Select the Backup Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2. Select the Restore Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 3. Specify the Restore Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 4. Specify the Restore Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Restore VSS-aware Backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 1. Select the Backup Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2. Select the VSS Restore Method. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 3. Select the Restore Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 4. Specify the Restore Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 5. Specify the Restore Performance Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 6. Specify the Restore Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Restore VMware VADP Backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 1. Select the Backup Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2. Select the VMware VADP Restore Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 3. Select the Restore Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 4. Specify the Restore Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 5. Specify the Restore Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
243 243 243 243 243 244 244 244 245 245 245 246 246 246 247 247 247 248 248 248 248 248 248 249 249 249 249 249 249 250 250 250 250 250 251 251 251 252 252 252 253 254 254 254 254 255 256
Restore a Backup from the Cloud (Salesforce.com) Backup Set. . . . . . . . . . . . . . . . . . . . . . . Step 1. Select the Backup Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2. Select the Restore Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 3. Select the Restore Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 4. Specify the Restore Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 5. Specify the Restore Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Restore to an Alternate Location. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 1. Select the backup set items for restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2. Choose the destination computer (optional). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 3. Select the destination share . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 4. Specify the path on the destination share . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . MS SQL Server Backup Sets (Alternate Location Restore) . . . . . . . . . . . . . . . . . . . . . . . . . . . . MS Exchange Server Backup Sets (Alternate Location Restore). . . . . . . . . . . . . . . . . . . . . . . . Oracle Database Backup Sets (Alternate Location Restore) . . . . . . . . . . . . . . . . . . . . . . . . . . . VSS-aware Backup Sets (Alternate Location Restore) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . VMware VADP Backup Sets (Alternate Location Restore). . . . . . . . . . . . . . . . . . . . . . . . . . . . .
257 257 257 257 257 257 261 261 262 263 264 266 268 270 271 273
Restore from Disc / Tape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275 Restore from BLM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275 Validation of Online Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276 Perform Validation on Demand. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276
Tape Conversion to BLM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294 Conversion Wizard - Tape to BLM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294 DS-Client Monitoring by the DS-NOC Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Configure DS-Client to connect to DS-NOC via a Proxy Server . . . . . . . . . . . . . . . . . . . . . . . . Auto-detect Proxy Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manual Proxy Server Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Automatic Proxy Server Configuration URL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299 300 301 301 302
Local Storage Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303 Set the Local Storage Path (Default) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
Apply the Local Storage Option (per Backup Set) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304 Restore from Local Storage Path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304 Local Storage Cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305 Multi-Tenant DS-Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1. Activate the Multi-Tenant feature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2. Create the Customers for this Multi-Tenant DS-Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3. Assign existing backup sets to a customer (Edit backup sets) . . . . . . . . . . . . . . . . . . . . . . . 4. New backup sets for Multi-Tenant DS-Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5. Reports from Multi-Tenant DS-Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Snapshot Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . NetApp License Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1. Configure the Storage that can be used for Snapshot Transfer . . . . . . . . . . . . . . . . . . . . . . . 2. Configure the Snapshot Retention Policies that can be used for Snapshot Transfer . . . . . . . 3. Configure the Snapshot Schedules that can be used for Snapshot Transfer . . . . . . . . . . . . . 4. Configure a Snapshot Transfer that will be managed by this DS-Client. . . . . . . . . . . . . . . . . What happens when Snapshot Transfer runs? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Managing Snapshot Transfers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306 307 308 309 310 311 312 312 313 314 315 316 321 321
DS-Client Load Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358 DS-Client Storage Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360 System Administration Tools. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Update DS-Client Statistics immediately . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Run a Daily Admin immediately . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Run a Weekly Admin immediately . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Monitor current connections and processes on the DS-Client . . . . . . . . . . . . . . . . . . . . . . . . . . Send messages to users connected to the DS-Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Disconnect Network Connections to the DS-Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Shutdown the DS-Client Computer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Repair the DS-Client Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361 362 362 362 363 363 364 364 364
Recover 'Orphaned' backup sets to the DS-Client. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 Recover a Specific Backup Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 Recover the DS-Client Database (Disaster Recovery of DS-Client Computer) . . . . . . . . . . . . . 367
12 - Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368
Print Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Backup Sets Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Restorable Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Backup Users Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Backup Trends Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Backup/Restore Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Backup Groups Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Statistical Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Backup Items Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369 370 372 374 375 377 379 381 383
Export. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384 Backup Sets Info . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384 Global Reports (Java DS-User) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Selecting DS-Client(s) for a Global Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Global Report - Export Backup Sets Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Global Report - Backup Sets Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Global Report - Restorable Volume Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Global Report - Backup Users Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Global Report - Backup / Restore Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Global Report - Backup Trends . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Global Report - Backup Groups Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Global Report - Backup Items Report. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Global Report - Statistical Summary Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Custom Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 1. Create Customized Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2. Create Customized Report (with Third-Party application) . . . . . . . . . . . . . . . . . . . . . . . Step 3. View Customized Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385 386 389 389 389 389 390 390 390 390 391 392 392 395 396
Administrative Processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491 Weekly Admin and Synchronization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 494 Admin Processes with Grid DS-Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 496 Backup Set Migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497 When to Migrate a Backup Set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 498 DS-Client Buffer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500 DS-Client performance considerations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502 LAN Storage Discovery Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503 LAN Storage Discovery considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508 Load and Storage Summaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 510 Retention Rules vs. Maximum # of Online Generations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 512 Retention Rule Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516 Retention Rule combinations (multiple rule types) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 518 Delete Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 522 Scheduled Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 524 Validation Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 526 Local Storage Cache Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 528
(and up) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 568 Backup / Restore using UNIX-SSH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 570 Backup / Restore of NFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 572 Backup / Restore of Oracle Database Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573 Choosing the User for Oracle Backup / Restore Operations via SSH Dump . . . . . . . . . . . . . . 581 Troubleshooting: Oracle Database Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583 Backup / Restore of MySQL Database Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 585 Backup / Restore of DB2 Database Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 587 Backup / Restore of PostgreSQL Database Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 590 Backup / Restore of Windows 2000. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 592 Backup / Restore of Windows 2008. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 596 Backup / Restore of E-Mails (using DS-MLR). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 599 Backup Comparison: Microsoft Exchange Server vs. Message Level Restore . . . . . . . . . . . . 609 Backup / Restore of System i Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 610 Backup / Restore of Virtual Machines using Windows DS-Client and VCB . . . . . . . . . . . . . . . 616 Backup / Restore of VMware (at Virtual Machine-level) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 620 VMware Backup / Restore Process Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 621 VMware Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 623 Backup / Restore of XenServer (at Virtual Machine-level) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 625 Backup / Restore of MS SharePoint 2007 Servers (DS-Recovery Tools). . . . . . . . . . . . . . . . . . 627 Backup / Restore of Lotus Domino Server Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 631 Backup / Restore of Sybase (Database-Level) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 633 Backup / Restore of Oracle-SBT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 634 Backup / Restore of VMware VADP backup sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 635 Backup / Restore of Microsoft SQL Server (VSS-aware backup sets) . . . . . . . . . . . . . . . . . . . . 638 Backup / Restore of Microsoft Exchange Server (VSS-aware backup sets) . . . . . . . . . . . . . . . 640 Backup / Restore of Hyper-V (VSS-aware backup sets) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 644 Backup / Restore of Microsoft SharePoint 2007 (VSS-aware backup sets). . . . . . . . . . . . . . . . 649 Backup / Restore of Microsoft SharePoint 2010 (VSS-aware backup sets). . . . . . . . . . . . . . . . 655 Backup / Restore of NAS (Linux DS-Client) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 666 Backup / Restore of NAS (Windows DS-Client) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 669 Backup from the Cloud (Salesforce.com) Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 671 Local DS-VDR backup set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 673 Physical-to-Virtual backup set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 675 Block-Level Resume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 676 Continuous Data Protection (Backup Set Option) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 677 Memory Requirements for DS-Client During Incremental Backup Using Delta Algorithm . . . 682 Stop Backup (DS-User Initiated) behavior . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 683
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
Troubleshooting: Tape Converter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 684 Troubleshooting: Failure to backup of files from Windows 2008 / Windows 7 / Windows 8 . . 685
1 - Introduction
1 - Introduction
This section provides an overview of Asigra Cloud Backup, and a general introduction to the DS-User interface.
1 - Introduction
1 - Introduction
Knowledge Base: SECURITY Knowledge Base: ADMINISTRATION DS-Client Advanced Configurations on page 458 Knowledge Base: BACKUP Backup / Restore of UNIX File Systems on page 539 Backup / Restore of Microsoft SQL Server (ALL VERSIONS) on page 560 Troubleshooting: Backup of Microsoft SQL Server 2005 (and up) and SQL Server 2005 Express (and up) on page 568 Backup / Restore of Oracle Database Servers on page 573 Backup / Restore of PostgreSQL Database Servers on page 590 Backup / Restore of Windows 2000 on page 592 Backup / Restore of Windows 2008 on page 596 Backup / Restore of E-Mails (using DS-MLR) on page 599 Backup / Restore of MS SharePoint 2007 Servers (DS-Recovery Tools) on page 627 Backup / Restore of Microsoft Exchange Server (VSS-aware backup sets) on page 640 Backup / Restore of Microsoft SharePoint 2010 (VSS-aware backup sets) on page 655 Backup / Restore of NAS (Linux DS-Client) on page 666 Backup / Restore of NAS (Windows DS-Client) on page 669 Backup from the Cloud (Salesforce.com) Limitations on page 671 Local DS-VDR backup set on page 673 Physical-to-Virtual backup set on page 675 Troubleshooting: Failure to backup of files from Windows 2008 / Windows 7 / Windows 8 on page 685 Knowledge Base: RESTORE Knowledge Base: RECOVERY Restoring the MS SQL Database Server MASTER Database on page 722
1 - Introduction
Overview
1 - Introduction
DS-User
Application dsuser.jar DSUser.exe (Win32 only) userhelp.jar (Java only) dsuser.chm (Win32 only) Description This is the user interface to the DS-Client service/daemon program referred to as DS-User. The JAVA version is dsuser.jar and the Win32 version is DSUser.exe. You must run DS-User, in order to configure DS-Client (e.g. create backup sets, perform backups or restores, view logs, etc.). Online help. Online help.
1 - Introduction
DS-Client
Application dsclient.exe DSConfig.exe dsstatus.exe Description (Windows) This is the service program. This program runs the portions of the installation that require you to specify the account number, DS-Client number, DS-System IP Address, the IP Address of the DS-Clients in a Grid, Encryption Keys or the DS-Client Service Account. The DS-Client Service Manager Program allows you to stop and start the DS-Client service (without having to open the Control Panel > Services folder).
In the DS-Client program files directory, there is a sub-folder called db, which includes the database patches that were applied during installation / upgrade of the DS-Client software. The DS-Client databases contain the backup set specifications, backup schedule settings, data usage statistics, logs, information about files and directories, generations that have dsclient databases been backed up, retention rules, data expiration rules, etc. They can be backed up during the daily or weekly admin processes to ensure quick recovery of the DS-Client computer, in case of disaster. MS SQL Server 2005 and up or MS SQL Server 2005/2008 Express: db folder contains the SQL scripts run by the DS-Client Setup application. Application unixdsclient dsclient.sh Description (Linux / Mac) This is the daemon program. This is the startup / shutdown script for the DS-Client daemon.
The DS-Client databases contain the backup set specifications, backup schedules settings, data usage statistics, logs, information about files and directories, generations that have been backed up, retention rules, data expiration rules, etc. They can be backed up during dsclient databases the daily or weekly admin processes to ensure quick recovery of the DS-Client computer, in case of disaster. DS-Client databases may reside on PostgreSQL database instances. dsclient DB scripts userhelp.jar In the DS-Client installation directory, there are *.sql files which represent the database patches that were applied during the installation / upgrade of the DS-Client software. Online help.
1 - Introduction
DS-User Screen
To access functions, you can select from the menu options found directly below the title bar, in the DS-User screen:
List of DS-Clients to which you can connect Backup Sets Tab Backup Schedules Tab
Menus
Connected DS-Client
DS-Client Connection List: Shows a list of the available DS-Clients you can connect with on the LAN. You can connect to more than one DS-Client, however you may view only one at a time (by highlighting it from this list). Title Bar: Shows the name of the DS-Client computer that you are using. You can connect to more than one DS-Client from the Connection List at left (if available on the network). Menu Bar Items: Items here allow you to perform the various tasks necessary to backup and restore files, as well as manage and administer the DS-Client. The menu bar consists of the Sets, Backup, Restore, Initial Backup, Schedule, Retention, Logs, Grid, Tools, Reports, Setup, and Help menus. Backup Set Tab: Shows a Windows Explorer-like tree structure, containing all of the backup sets that have been defined on the DS-Client. You can browse the tree to select the backup set that you want to work with, then Right-click to open the available options menu. Backup Schedules Tab: Shows a tree view of all the schedules defined on the DS-Client. You can browse the tree to select the schedule that you want to work with, then Right-click to open the available options menu. You can reassign backup sets to different schedules using the "drag-and-drop" functionality.
Generated on: 10/15/12 Page: 24
Confidential.
1 - Introduction
Retention Rules Tab: Shows a tree view of all the Retention Rules defined on the DS-Client. You can browse the tree to select the Retention Rule that you want to work with, then Right-click to open the available options menu. You can reassign backup sets to different Retention Rules using the "drag-and-drop" functionality. Status Bar: This section may display basic instructions about the highlighted/ active option. Monitor: Shows the current activities running on the DS-Client (backup, restore, admin, etc.). Tool Bar Icons: Icons allow quick access to the most commonly used features.
Icon Function Create new backup sets with the New Backup Set Wizard.
Help
1 - Introduction
If the DS-Client you want does not appear, you may have to add it to the initialization list. See: DS-User Initialization > Connection on page 63. Right-click in the list to switch between a list of computer names and a list of IP addresses. Color codes for DS-Clients that appear in this list:
Color BLUE BLACK GREEN LIGHT BLUE BROWN AQUA RED RGB values (0, 0, 255) (0, 0, 0) (0, 153, 0) Meaning DS-Client running on the local machine where this DS-User is installed. (Supersedes other colors. Only one can appear, which helps you to quickly locate it if the list is long.) FullFeatured DS-Client (Windows / Linux / Mac) Un-initialized DS-Client (Linux / Mac) See Initial DS-Client Configuration on page 28. Consumer DS-Client (Windows) Service is not running.
(40, 120, 220) Mobile DS-Client (Windows) (150, 90, 60) (255, 0, 0) (20, 170, 170) Notebook DS-Client (Mac)
If using a Win32 DS-User, you select from the Server List in the Connect to DSClient Service screen .
1 - Introduction
F1 Help: See Connect to DS-Client Service screen on page 757. 4. Select the Protocol and enter your Credentials Encrypted: All the data between the GUI and the Service will be encrypted with a random encryption key at every connection. Standard: This option is only offered for backwards compatibility with old service/daemon versions that do not have this feature. 5. Click Connect. A popup appears if the (Linux / Mac) DS-Client is unregistered. (See Initial DS-Client Configuration on page 28.) On successful connection, the DS-User screen appears (See DS-User Screen on page 24.).
1 - Introduction
F1 Help: See Initial DS-Client Configuration / Modify DS-Client Configuration on page 786. 3. In the Customer Registration Info section, enter the following:
Customer Name Account # DS-Client # Enter a descriptive name for this DS-Client. This name appears in brackets after the computer name in the Java DS-User GUIs list of available DS-Client computers (when sorted by Name). Enter your Account number. This number is provided to you by your Service Provider. Enter your DS-Client number. This number is provided to you by your Service Provider.
Browse: An alternative to manually entering the above information is to use a .CRI file supplied by your Service Provider. Click Browse to search for this file on your network. 4. In the DS-System Info section, specify the DS-System connection information. You received the IP address of the DS-System from your Service Provider. The DS-Client
1 - Introduction
requires this address in order for it to connect to the DS-System. In the Address field: Enter the IP address of the DS-System your DS-Client will be using and click Add. Your Service Provider may have more than one IP address for the DS-System, if this is the case you can specify any or all of them. 5. In the Encryption Keys section, you must set the encryption key(s) that the DS-Client will use.
Encryption Keys An encryption key is case sensitive. Its length (in characters) depends on the type and level of encryption selected. DES requires 8 characters, AES-128 requires 16 characters, AES-192 requires 24 characters, and AES-256 requires 32 characters. For better security, do not use dictionary words or proper names, and try to randomly mix numbers in with the letters. Auto-complete feature: If you do not specify the full amount of characters in the Key field, the GUI will fill in the remainder by repeating the string of characters you have entered. (e.g. entering 123 with AES-128 will generate an encryption key of 1231231231231231, or entering a for DES will generate the encryption key aaaaaaaa). Keep the key(s) in a secure location. Your ability to select the same encryption type and reenter the same key is necessary if you ever need to reinstall your DS-Client to a new computer (e.g. if the computer is destroyed in a disaster). You must set a private key for this DS-Client. Backup data from your DS-Client installation will be encrypted with this key. Type: Select from the available types. Stronger encryption requires longer keys. Key: Enter the key. Confirm: Re-enter the key to verify the string is correct. You cannot change this key once it is set. You must set an account key if more than one DS-Client belongs to your customer account. Common backup data from all your DS-Client installations will be encrypted with this key. Once the account key is set, all DS-Clients from this customer must be configured with that same account key. Type: Select from the available types. Stronger encryption requires longer keys. Key: Enter the key. Confirm: Re-enter the key to verify the string is correct. You cannot change this key once it is set.
Private Key
Account Key
Allow encryption key forwarding to DS-System Check to have DS-Client forward the encryption key(s) to the DS-System the first time it connects with DS-System. NOTE: If you forward the keys, they will remain encrypted on the DS-System. However, your Service Provider will be able to create a valid .CRI file containing the encrypted keys. This file will be able to recreate a working version of this DS-Client. Make sure this conforms to your security policies before enabling this option.
6. Once you have made all the initial DS-Client configurations, click OK to register with the DS-System. If registration is successful, you will be able to use DS-Client immediately.
This section provides information about setup and configuration of the DS-Client and DS-User software.
F1 Help: See DS-Client Configuration Setup Tab screen on page 769. 2. Options available from this tab: Modify DS-Client Configuration (Linux / Mac DS-Client): Same as Initial DS-Client Configuration on page 28 Re-register the DS-Client with the DS-System on page 33 Encryption Key Safeguarding at the DS-System on page 33
F1 Help: See DS-Client Configuration Defaults Tab screen on page 764. 3. In the Generations setup section, select the default number of generations for new backup sets. Optional: You can select a default Retention Rule for new backup sets (See About Retention Rules on page 85.) 4. In the Backup options section, select the default options for new backup sets. 5. In the Open files section, specify the options for how the backup set handles open files (in use by other applications) encountered during backup. Note: If the file(s) are locked by the other application, they will not be backed up (unless the backup is using VSS). An error will appear in the activity log if the files are not backed up. To backup locked files, you must enable the VSS option for the backup set (See: Backup of Open Files Knowledge Base article - Backup of Open Files on page 546).
6. In the Backup schedule section, select the default options for new backup sets.
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
7. In the Notification section, select the default notification options for new backup sets by clicking Add / Modify: In the Add / Edit Notification screen, you select the notification type, recipient, and event that triggers notification.
F1 Help: See Add Notification screen on page 742. Click OK to save the notification setting. Note: The E-Mail and Pager fields will be grayed out if the DS-Client has not been configured for E-Mail notification (For more information, see Configure the E-Mail Notification Setup on page 36). 8. In the Data Compression section, select the default compression type for new backup sets. 9. Click OK to save the changes.
F1 Help: See DS-Client Configuration Notification Tab screen on page 765. 3. In the Outgoing E-Mail settings section, select: - None
- SMTP: In the SMTP Server Settings section that appears, click [...] to open the SMTP Settings screen:
4.
5. 6. 7. 8.
F1 Help: See SMTP settings on page 879. Enter the DNS name or IP address of the SMTP Server the DS-Client will use. Select the Port Enter any authentication information (if required) Note: The DS-Client will use its existing network connection when sending SMTP notifications. Click OK to save the settings. The Notification Settings screen returns. Enter the E-Mail address you want to appear in the E-Mail headers From field. Enter the Display Name (if any) you want to appear in the E-Mail headers From field. - MAPI: In the DS-Client messaging profile section that appears, select the MAPI profile to use. In the E-Mail notification subject section, enter the information. You can enter your own text in combination with optional placeholder variables. Refer to the F1 Help for details about these placeholders (See DS-Client Configuration Notification Tab screen on page 765.). In the Administrator Notification Setup section, enter the information. In the Daily / Weekly Admin setup section, select the settings you want. Click OK to save the changes. (MAPI only) After you change the profile, you must stop and restart the DS-Client Service (Start > All Programs > Asigra DS-Client > DS-Client Service Manager) for the new setting to take effect.
1. Setup menu > Configuration. The DS-Client Configuration screen appears. 2. Click SNMP.
3. 4. 5. 6. 7. 8. 9.
F1 Help: See DS-Client Configuration SNMP Tab screen on page 769. In the Community field, enter a name and Click Add to list. Under the Destination host list, click Add. The Add host name or IP address screen appears. F1 Help: See Add / Modify address screen on page 739. Enter a host name or IP address from your network and click OK. Continue to add as many destination host / IP addresses as are in the community. Check the Send traps as heartbeats every [], to send traps as heartbeats. Select the frequency of heartbeats from the dropdown list. Click OK to save these settings.
Generated on: 10/15/12 Page: 38
Confidential.
F1 Help: See DS-Client Configuration Parameters Tab screen on page 767. 3. In the Admin Process section, you can specify when and how the daily and weekly administrative tasks are performed. 4. In the Database options section, you can specify the frequency of DS-Client database backups, how to handle the database dump file (if applicable), and how long to keep logs. 5. In the Backup options section, you may specify reconnection options. These are used if the DS-Client loses connection with the DS-System during a backup. Note: This applies to Scheduled and On-demand backups. By default, DS-Client is configured to skip running a pre-scan on scheduled backup sets (this makes the process faster). Disabling this option will force a pre-scan for all scheduled backup sets, which allows the Process Window to show an estimated completion time for each backup.
6. In the DS-Client Buffer field, specify the local disk location that DS-Client will use to save Use Buffer dumps and its own Database dumps (from Daily/Weekly Admin activities). The DS-Clients database server (e.g. MS SQL) must have rights to dump to this location. This is an important consideration if you are using a remote database. For more information, see the Knowledge Base Article: DS-Client Buffer on page 500. 7. In the Local Storage Path field, enter a path to enable the following features that send data to a local storage location (instead of, or in addition to backup to the DS-System). Self-Contained Backup Sets: If you enter a path, you will be able to select this type of backup set on the last screen of the New Backup Set Wizard. (See Self-Contained Backup Sets on page 178.) Local Only Backup Sets: Your Service Provider must enable the Local-Only Capacity tool and assign a maximum storage amount for this DS-Client. (See Local-Only Backup Sets on page 179.) Local Storage Backup Sets: Your Service Provider must enable the Local Storage tool for this DS-Client. (See Local Storage Tool on page 303.) IMPORTANT NOTE: Backup sets that use any local storage location require an extra table in the DS-Client database in order to manage the data stored on the DS-Client side. Make sure enough space is allocated for the DS-Client database when using any feature that requires a local storage path. 8. Click OK to save the changes to this tab.
F1 Help: See DS-Client Configuration Connections Tab screen on page 764. Note: There can only be one Primary Connection. All other entries in the DS-System connection setup list are alternate methods to connect in case the Primary Connection fails. DSClient will return to the Primary Connection based on the RetryPrimary parameter in the DS-Client Advanced Configurations (Setup Menu > Configuration > Advanced Tab).
F1 Help: See Add / Modify DS-System connection entry screen on page 741. 4. Click Add. A screen appears for you to enter an address (IP or DNS). 5. Repeat step 4 for as many addresses as you have been provided. Pre/Post: You can configure each DS-System connection entry to perform pre and post commands. This can help in some network situations, like dealing with firewalls. 6. Optionally (for Backup from the Cloud Salesforce.com backup sets only), you can configure the DS-Client to use a proxy server to access the Internet when connecting to the Salesforce.com site. Use a proxy server to access Internet: Select to enable this option. Address: Enter the address (DNS name or IP address) of the proxy server that the DS-Client will use. Port: You must specify the port that will be used to connect to the proxy server. (By default, this is port 80.) 7. When finished, Click OK to save the connection entry in the Connections Tab. 8. Click OK to save the DS-Client Configuration.
For Linux/Mac DS-Clients, this role includes the local root user (you cannot remove this user from the Administrator role). DS-Client Backup Operator: Users and groups assigned this Role will have Backup Operator rights (See Backup Operator Rights on page 44.). For Windows DS-Clients, the local Windows Backup Operators group is assigned to this role by default. DS-Client Regular User: Users and groups assigned this Role will have Regular User rights (See Regular User Rights on page 43.).
Each type of user has the right to perform the following tasks:
Regular users have the following rights on the DS-Client: Create File System backup sets Create special backup sets (MS SQL Server, MS Exchange, etc.) View the list of backup sets (to which they have permission) Modify backup sets (Items, Options, Advanced Options, Set Info, Schedule, Share, Retention, Connection, etc.) Backup a set on demand Restore backup sets Restore from a Disc/Tape Request BLM and Restore from a BLM Restorable Image Remove backup sets Selective Delete of backed up files from Online storage Enforce Retention on a backup set Suspend/Activate backup sets Synchronize backup sets Clone backup sets Migrate backup sets View and print reports (except for Backup Groups, Load Summary and Storage Summary)
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
View Quotas View the Activity Log View the Event Log (from Activity Log or Current Activity Monitor only) Convert Local-Only backup sets to regular backup sets View the DS-Client Info (Help Menu)
Administrator Rights
Administrators have all the functions and access of Backup Operators plus the following: Administrators have full access to all of the DS-User tools and features. Administrators can view all information on all activities recorded in the DS-Client logs. Full access (backup, restore, delete, migrate, permissions, etc.) to all backup sets Request a Disc/Tape Set and change user and group access rights to backup sets: Set Maximum Online Amount for Users and/or Groups View Users belonging to a Group and/or Groups to which a User belongs Change backup set owner Re-register the DS-Client with the DS-System (coordinated with your Asigra Cloud Backup Service Provider) Repair the DS-Client Database (disaster recovery) Shut Down the DS-Client computer Change DS-Client default configurations
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
Add / remove permissions for a backup set to other users and groups Perform Validation Migrate the backup share/path of your backup set to a different share/path LAN Discovery LAN Unprotected Resource Discovery DS-Client and Encryption Setup Notification Setup Connections (to DS-System) Roles Bandwidth Throttle System Activities Administration Export to XML Event Filter
To add a new Role Setting: 1. Setup menu > Configuration. The DS-Client Configuration screen appears. 2. Click Roles.
F1 Help: See DS-Client Configuration Roles Tab screen on page 768. 3. Click Add or highlight an entry and click Modify. The New / Edit User / Group Role screen appears. F1 Help: See New / Edit User / Group Role on page 792. 4. Specify User or Group 5. Edit the User or Group name. 6. Specify the computer or domain where the DS-Client will verify the User or Group credentials. 7. Select the DS-Client Role for the User or Group. 8. Click OK.
F1 Help: See DS-Client Configuration Advanced Tab screen on page 763. 3. Parameter names can be selected from the Name drop down list. The current parameter value (or the default) will appear in the Value field, along with a brief description underneath. The parameters that appear depend on if this is a Windows or Unix DS-Client. 4. Click OK to save the changes to this tab. Depending on the parameter, you may have to restart the DS-Client service before the changes take effect.
F1 Help: See Export DS-Client configuration to XML on page 780. 2. Select the options to export: DS-Client Configuration: exports all settings from the DS-Client Configuration screen tabs (Setup, Defaults, Notification, SNMP, Parameters, Connections, Roles). Backup Schedules: Exports all (or selective) Backup Schedules. Retention Rules: Exports all (or selective) Retention Rules. Backup Sets: Exports all (or selective) Backup Sets. Note: Recovered orphaned backup sets that have not been migrated (or had their backup information for connection, backup items, and schedule re-specified) cannot be exported. Meta Symbol (Windows DS-Client only): Check to use a Meta Symbol wherever necessary in the config-update.xml file. This will allow the XML file to be used for DS-Clients on different localized operating systems. Include Encryption Keys: Check to include the DS-Client and Account Keys in the XML file (they will be encrypted). 3. Click Save As to save the XML file.
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
1. For Windows DS-Clients, place the file config-update.xml in the program folder containing the DS-Client service. For Linux / Mac DS-Clients, place the file config-update.xml in the /etc sub-folder of the program folder containing the DS-Client service. DS-Client checks for an updated config-update.xml file every 10 seconds if the AllowAutoConfig parameter is set (Setup Menu > Configuration > Advanced Tab). If updated, DS-Client will read the XML file and apply its settings. After the XML file is applied, DS-Client renames the file to config-update-nnn.xml, where nnn is an incremental number. 2. This will overwrite configuration settings, backup schedules, retention rules, and backup sets (depending on the contents of the XML file). Note: The DS-Client Configuration elements <account-name>, <account-number>, <clientnumber>, and <encryption-keys> are only updated when DS-Client restarts.
F1 Help: See Users & Groups screen on page 893. 2. To set a maximum Online amount, highlight the user/group and click the Max Online button. The Maximum Online for ... screen appears. F1 Help: See Maximum Online for ... screen on page 790. 3. Uncheck the No Limit box. 4. Enter the maximum online amount (in MB) in the Online Storage Limit field. 5. Click OK. The Users & Groups screen reflects the change.
Password Rotation
[Windows DS-Client only] Password Rotation is a feature that allows you to randomize a specific users password at a frequency you select. Once a password is rotated, it becomes unknown to anyone (even to an Administrator). This feature can help to increase your network security. When Password Rotation is applied to a user account, the only way someone can use that account again (for login or as credentials on your network) is for an Administrator to manually reset the password from the Windows Computer Management console. This means you must use the Password Management screen to manage the backup sets. You cannot use the Backup Set Properties screen, since you will not know the password. Note: Password rotation involves the DS-Client service changing the Windows password of the specified network or computer user.
1. Setup menu > Password Rotation. The Password Management screen appears.
F1 Help: See Password Management screen on page 795. 2. To add or edit the list of managed users, see Add or Edit a User for Password Rotation on page 52. 3. To rotate a password immediately, highlight the user in the Managed Passwords list and click Rotate Now. The Last Updated time will refresh and the password will be changed. All password changes are logged in the DS-Client Audit Trail. (See Audit Trail on page 327.)
F1 Help: See Password Management - User Details Tab on page 796. 4. Enter this users logon information.
5. Click Next (or Apply if editing). The Create / Modify User screen appears on the Password Rotation tab.
F1 Help: See Password Management - Password Rotation Tab on page 796. Enable Automatic Password Rotation: Check to activate the Rotation Settings section. If you do not select this option, this users password will only be rotated manually (from the Password Management screen). Rotation Rule: Click [...] beside the Rotation Rule field. The Available Password Rotation Rules screen appears.
F1 Help: See Available Password Rotation Rules on page 746. Highlight the Rotation Rule you want to use. (To create a new Rotation Rule, see Add or Edit a Password Rotation Rule on page 56.)
- Click Select. Your selection appears in the Rotation Rule field. Rotation Frequency: Specify the rotation interval (in hours or days).
Generated on: 10/15/12 Page: 53
Confidential.
6. Click Next (or Apply if editing). The Create / Modify User screen appears on the Backup Sets tab.
F1 Help: See Password Management - Backup Sets Tab on page 796. This screen allows you to associate this user to any of the backup sets currently defined on the DS-Client. The Associated Backup Sets list displays all backup sets currently using this users credentials for connection.
Click Select to add or modify the list. The Select Backup Sets screen appears.
F1 Help: See Select Backup Sets (Password Management) on page 821. Check beside all backup sets you want and click OK. Note: Once you apply your selection, it will overwrite the Connect As setting (Backup Set Properties) for all selected backup sets. 8. Click Finish (or Apply if editing).
F1 Help: See New / Edit Password Rotation Rule on page 791. 2. Enter a name for the rule. 3. Enter the Length Constraints for the password. 4. Click Add or Edit to define the complexity constraints for the password. You can add multiple complexity rules. The Add / Edit Complexity Rule screen appears.
F1 Help: See Add / Edit Complexity Rule on page 738. Select Minimum Length. Select the corresponding character set from which to choose. 5. Click OK. The Available Password Rotation Rules screen returns.
View Quotas
1. Setup menu > View Quotas. The View Quotas screen appears.
F1 Help: See View Quotas on page 894. 2. These settings are established on the DS-System by your Service Provider. (They can only be viewed.)
Bandwidth Throttle
This feature allows the DS-Client Administrator to manage the amount of bandwidth used by the DS-Client at any time during the week. Separate throttles can be defined both to the DS-System (backups) and from the DS-System (restores). By default, if nothing is configured, the DS-Client will use as much bandwidth as it can to perform operations as fast as possible. Note: Your Service Providers may impose their own bandwidth restrictions from their respective sides (carrier, DS-System).
1. Setup menu > View Bandwidth Throttle. The Bandwidth Throttle screen appears.
F1 Help: See Bandwidth Throttle on page 751. 2. There are two tabs, which have identical configurations except for the data direction where the throttling is applied: To DS-System (e.g. backups) From DS-System (e.g. restores) 3. By default, if nothing is configured, the DS-Client will use as much bandwidth as it can to perform operations as fast as possible (Unlimited). You can switch to a limited amount (in KB/Sec). In addition, you can use the Exceptions List to create detailed time periods on different weekdays when throttling will occur. 4. To add a Throttle Schedule Detail, click Add. To edit a Throttle Schedule Detail, highlight one from the Exceptions List and click Edit.
F1 Help: See New / Edit Bandwidth Throttle Schedule Detail on page 791. 6. Configure the day(s) and time window at which to apply this detail. This detail will be an exception against the default (which is either Unlimited or Limited To). To create more specific exception periods, you may need to use multiple details. 7. Click OK to add / update the Throttle Schedule Detail. The Bandwidth Throttle screen appears with the changes to the Exception List. 8. Click OK / Apply to save the Bandwidth Throttle settings for this DS-Client.
- DS-Client # Grid DS-Client Information (if applicable) DS-System Address DS-Client service Logon Account Encryption Keys (Private Key, Account Key) Note: Once set, you may not change the Encryption Keys.
1. On the DS-Client computer: Start > All Programs > Asigra DS-Client > DS-Client Setup. 2. Most tabs in Setup are the same as those used in the DS-Client Installation program. 3. The Enter Registration Information screen appears. Edit if necessary and click Next. 4. The Configure Grid DS-Client Information screen appears. Select Configure Grid DSClient or Skip Configuring Grid DS-Client. 5. The Select DS-System Connection Type screen appears. Edit if necessary and click Next. 6. The Specify DS-System Address screen appears. Edit the DS-System IP Address(es) as required and click Next. 7. The DS-Client Service Logon Account screen appears. Edit if necessary and click Next. 8. The Encryption Keys Setup screen appears. Set key(s) if necessary and click Next. You may only set each Key once. You must set the Account Key if you upgrade your LAN to have more than one DS-Client. 9. Click Next to finish the setup. The changes take effect immediately once you restart the DS-Client. Note: For Linux DS-Clients, you can accomplish the above steps from the DS-Client Configuration Setup Tab screen (See View the DS-Client Setup Information on page 32.)
Language
(Win32 only) This screen controls the GUI language settings. 1. Setup menu > Initialization. F1 Help: See DS-User Initialization - Language on page 776. 2. Select the GUI language. You must restart DS-User before the new settings take effect.
Connection
(Win32 only) This screen allows you to configure the specific IP address(es) or subnet(s) where this DS-User will look for additional DS-Clients (for remote management). By default (if this screen is left empty), Win32 DS-User automatically detects the local DS-Client and all other DS-Clients on the same subnet as this Win32 DS-User installation.
Note:
This modifies the file DSUSER.INI located in the same folder as the DS-User executable (DSUser.exe).
2. DS-User can search for a specific DS-Client, or for all DS-Clients on a subnet. Click New or Modify in the corresponding section to add or edit entries. DS-Client level: Enter the specific IP Address or computer name. (It is easier to specify by IP address.) Note: Specifying a computer name requires a corresponding entry to exist in the local computer's %systemroot%\system32\drivers\etc\hosts file (typically found in C:\WINNT\system32\drivers\etc\). Each entry must be on a separate line, with the IP separated from the HOSTNAME by at least one space (e.g. 10.20.30.111 C_Name). Subnet: Enter the subnet, in the correct format (three sets of numbers separated by two periods). 3. The Connection Configuration screen appears.
F1 Help: See Connection Configuration on page 758. (If applicable) Select Single DS-Client or Grid DS-Client. -
Grid DS-Client expands the screen to allow you to specify the IP address or hostname of each node in the Grid. Enter the Host or Subnet. By default, the Port field is 4403, and should not be changed unless you have a specific requirement. Click OK. 4. At the bottom of the Connection tab, in the Logon using security context section, you have options for this GUI installations auto-connection behavior to DS-Client when it is launched. See Security Context (Win32 and Java GUI) on page 65. See Auto-Connection (Win32 and Java GUI) on page 65. 5. In the Connection Tab, click Apply.
Connection
(Optional - this screen can be left empty. If empty, the GUI will scan the local computer and the local computers subnet.) Use these settings to indicate a specific IP or DNS Address where the DS-User will look for a DSClient Service. This can speed up your login in larger network environments. You can also configure the GUI to scan entire subnets. 1. Setup menu > Initialization.
To add an entry in this screen, click New. To edit an entry in this screen, highlight it and click Modify. 2. To add a specific DS-Client, click New in the Additional DS-Clients section. The Add / Modify DS-Client screen appears.
F1 Help: See Add a DS-Client on page 741. 3. Specify the DS-Client IP or DNS Address (host name). For Grid DS-Client, the screen expands to allow you to specify the IP address or hostname of each node in the Grid. 4. Click OK. The entry appears in the Additional DS-Clients section. 5. To add an entire subnet, click New in the Additional Subnets section. The Add / Modify Subnet screen appears.
F1 Help: See Add / Modify Subnet (Java DS-User) on page 742. Specify the subnet and click OK. The entry appears in the Additional Subnets section. 6. Continue with steps 2-5 as required. 7. At the bottom of the Connection tab, in the Logon using security context section, you have options for this GUI installations auto-connection behavior to DS-Client when it is launched. See Security Context (Win32 and Java GUI) on page 65. See Auto-Connection (Win32 and Java GUI) on page 65. 8. Click OK to save any changes.
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
Note:
DS-User will scan the LAN for all active DS-Clients, whether or not any entries are in the Additional DS-Clients list. DS-Clients specified in the Additional DS-Clients list which are not detected, will appear in Red. A DS-Client on the local computer appears in Blue.
Regional Settings
(Java version only) This screen controls the GUI language settings and other regional formatting. 1. Setup menu > Initialization. 2. Click Regional.
F1 Help: See DS-User Initialization - Regional on page 776. 3. Click OK to save any changes.
Keep Alive
(Optional - this screen can be left empty) These settings limit the amount of idle time on DS-User, after which the connection with DS-Client will be terminated. 1. Setup menu > Initialization. 2. Click Keep Alive.
F1 Help: See DS-User Initialization - Keep Alive on page 776. 3. Specify the Keep Alive settings. 4. Click OK to save any changes.
Plugins
Some plugins are automatically applied, depending on the DS-Client's configuration. Others can be manually enabled / disabled, and configured. 1. Setup menu > Initialization. 2. Click Plugins. F1 Help: See DS-User Initialization - Plugins on page 776. 3. Highlight a plugin and configure any options. 4. Click OK to save any changes.
Fonts
(Optional - this screen can be left empty) DS-Users default fonts may not be enough to display some Unicode characters. In these cases, you can add specific fonts that the DS-User will attempt to use (in order) to display such characters. 1. Setup menu > Initialization. 2. Click Fonts. F1 Help: See DS-User Initialization - Fonts on page 775. 3. Click Add. F1 Help: See Select Font on page 829. 4. Select a font to add to the DS-User Initialization list. 5. Click OK. 6. The entry appears in the Additional Fonts list. 7. Continue with steps 3-6 as required. The order that appears in the Additional Fonts list is the order that DS-User will use if it attempts to display characters that its default font cannot. 8. Click OK to save any changes. 9. Exit the DS-User program and restart in order to for the changes to take effect.
Maximum Memory: The maximum amount of memory this GUI can consume from this computer. Total Memory: This amount has been consumed (allocated) from the computer to this GUI instance. Free Memory: Amount of the allocated memory that is still free for use. Used Memory: Amount of memory that is currently being used.
If you connect to a Grid DS-Client, a Grid Menu is activated. From this menu, you can access the following screens to manage the Grid: Grid Status: See Monitor Grid Status on page 71. Stop DS-Client Node: See Stop a DS-Client Node on page 72. Export Grid DS-Client Node Addresses: See Export the Grid DS-Client Addresses (to text file) on page 73. DS-Client Grid Log: See View DS-Client Grid Log on page 74. If you connect to a Grid DS-Client, the following screens will have an additional option to select by the Node ID: Activity Log viewer screen Load Summary screen (Reports menu > Load Summary) DS-Client System Status screen (Setup menu > System Activities > System) DS-Client Advanced Configurations screen (Setup menu > Configuration > Advanced Tab) For more information, see the following Knowledge Base Articles: Grid DS-Client on page 426 Admin Processes with Grid DS-Client on page 496
F1 Help: See Grid Status on page 784. The graph view gives a quick overview of the status of the Grid DS-Client. 2. Click List. The List Tab appears.
The list view shows details about each of the nodes of the Grid DS-Client, including which one is the Main Node. The list view also shows details about the Grid DS-Clients database node.
F1 Help: See Grid Status on page 784. 2. Click Stop Node. The Stop Node screen appears.
F1 Help: See Stop DS-Client Node on page 888. Wait for all running activities to complete: Stops the DS-Client on the selected node, after all the current activities have completed. No new activities will be allowed once you click OK. Stop when all activities complete or force stop after [...] minute(s): Stops the DS-Client on the selected node after all the current activities have completed, or forces a stop after the specified time has elapsed. No new activities will be allowed once you click OK. Stop Type: You must specify if you want to shut down or reboot the node, or to only stop the DS-Client service (keep the computer running).
F1 Help: See Export Grid DS-Client Address on page 781. 2. Select Internal or External Address and click OK. A Save As screen appears, allowing you to select the destination format and location. 3. The exported file can then be imported to any other DS-User installation using the Load button. Win32 DS-User: See DS-User Initialization (Win32 Only) on page 61. Java DS-User: See DS-User Initialization (Optional - JAVA Only) on page 63.
F1 Help: See DS-Client Grid Log on page 770. 2. You can narrow the display in the Select by section.
This section provides information about creating and working with Schedules (for unattended backups, etc.) and Retention Rules (for data that has been backed up).
About Schedules
The Schedules allow you to perform automatic, unattended activities on specified backup sets. This is done by creating a schedule, then assigning backup sets to that schedule. A Schedule is composed of Details. Each Detail refers to a specific backup circumstance (e.g. "Occurs every 2 week(s) on Friday, at 6:00 PM"). When combined, the details indicate all times when unattended backups will be performed.
The Schedule tab allows Administrators and Backup Operators to monitor and adjust the scheduled backup load on the DS-Client. (For example: if the backup load from a particular schedule becomes too heavy.)
F1 Help: See Schedule screen on page 816. 4. Enter a name for the schedule. 5. If this schedule is specifically for a Portable Computer, check the box and set a CPU Usage limit (%). This will limit the DS-Client Services CPU usage to that amount in order to permit continued use of the Portable by its user. 6. Add details to the schedule (See Add a Detail to a Schedule on page 78.). 7. Continue with step 6 until you are finished, then click Save.
4. Perform BLM: Request DS-System to copy a backup set snapshot to BLM. Click >> to edit the BLM Options. See Backup Lifecycle Management (BLM) on page 289 for more information. - Click >> to select the BLM Options.
Generations to include
Select to allow the Archive Package to contain references to older packages. This may save space by removing data redundancy. The default (if this option is not selected) is for each Archive Package to contain all of the required files. Latest generation - Creates a BLM Archive containing the latest generation of all items selected. All generations - Creates a BLM Archive containing all the (online) generations of all items selected.
5. Start LAN Scan of Shares: The schedule will start scanning the LAN Shares for statistical data. Since this may take a significant amount of time, this task is run last. 6. Clean Local-Only Trash: The schedule will start a Clean Local-Only Trash process on all Local-Only storage locations for this DS-Client. (For a description of this process, see Deleting Local-Only backup set data & Clean Local-Only Trash on page 181). 6. Click Save. The Detail is saved. Each new detail is automatically assigned a name, based on the frequency chosen and an automatic number (e.g. daily:1, weekly:2). 7. You may continue adding Details, as required by repeating steps 1-6 above. 8. When you are finished, click Close to exit.
To delete a Schedule: The schedule must be empty in order to be deleted. This means, no Backup Sets may be scheduled with it. 1. DS-User screen > Schedules tab. 2. In the Schedule Tree, highlight the Schedule you would like to delete. 3. Right-click. 4. Click Delete Schedule. A confirmation screen appears. 5. Click Yes to delete the Schedule.
1. DS-User screen > Schedules tab > Right-click > Schedule calendar. The Schedule Calendar Screen appears. F1 Help: See Schedule Calendar on page 815. 2. By default, the screen shows all schedules for the current week. 3. The display can be changed from the top left portion of the screen: 4. The table changes to reflect the selections. 5. Click any cell. The Schedules / Processes at that time are shown. 6. Enable the Performed radio button. The Schedule refreshes automatically. 7. The numbers that remain in the Calendar reflect the actual number of backups at that time. 8. Click a time cell with an actual backup number to show the sets that were backed up. 9. The Description section displays the details of the highlighted Schedule.
F1 Help: See Set Backup Set(s) Priority for Schedule ... screen on page 853. 4. The list displays the names of all backup sets that are specified using this particular schedule. 5. Highlight the Backup Set you want to prioritize. 6. In the Backup set priority field, click the arrows to change the priority of the highlighted backup set. The number in the # column changes with the number field. The set will sort automatically by priority (lower number = higher priority), so the highest priority items are first in the list. 7. Click Save to save the new settings.
3. The Retention Rule Wizard appears on the Choose Retention Settings screen.
F1 Help: See Retention Rule Wizard - Choose Retention Settings on page 812. For details on these options, see the online help for the screen. This screen prompts you to select what type(s) of retention settings you want to define for this Retention Rule. The number of screens that appear in this Wizard depends on the selections made in this screen. You must make at least one selection. In order to explain the different screens, the following instructions assume you select every available retention option in this screen.
Note:
4. Click Next. The Retention Rule Wizard appears on the Delete Options screen.
For details on these options, see the online help for the screen. 5. Click Next. The Retention Rule Wizard - Time Retention Rules screen appears.
F1 Help: See Retention Rule Wizard - Time Retention Options on page 814. To add a time-based rule, click Add. The New Time Retention Rule screen appears.
F1 Help: See New Time Retention Option on page 793. For details on these options, see the online help for the screen.
6. Click Next. The Retention Rule Wizard - Archive Old Data to BLM screen appears.
F1 Help: See Retention Rule Wizard - Archive Old Data to BLM Options on page 811. For details on these options, see the online help for the screen. To add an Archive rule, click Add. The New BLM Archive Rule screen appears.
F1 Help: See BLM Archive Rule on page 752. Select what files you want to push to BLM. Age: Online files older than the specified amount will be pushed to BLM. Filter options: All files (default), or files that conform to a specific filter pattern. You can select a different pattern from the drop-down list, or add a new one. For details on
F1 Help: See File Filtering Rule on page 782. F1 Help: See File Filtering Option on page 781. Tip: Try to keep any rules as simple as possible.
7. Click Next. The Retention Rule Wizard - Local Storage Retention Options screen appears.
F1 Help: See Retention Rule Wizard - Local Storage Retention Options on page 813. For details on these options, see the online help for the screen.
8. Click Next. The Retention Rule Wizard - Choose The Name screen appears.
F1 Help: See Retention Rule Wizard - Choose a name on page 812. For details on these options, see the online help for the screen. 9. Choose a name. Review the description (each option selected is listed). Once you are satisfied, click Finish.
F1 Help: See Assign to Retention on page 744. 4. Select the Retention Rule to use for this backup set, then click OK.
This section provides information about creating new backup sets and modifying backup sets.
Some options are common to most backup sets: Backup Set Options - Pre/Post on page 97 Backup Set Options - Exclude Old Files on page 98 Backup Set Options - Continuous Data Protection on page 98
Linux DS-Client
F1 Help: See Choose the kind of backup set screen on page 753. F1 Help: See Choose the kind of backup set screen (Linux DS-Client) on page 754. Note: This function is available only when you create a backup set. It cannot be modified. The screen looks different, depending on the type of DS-Client you are using (Windows, Linux, Mac), the tools that are enabled for the DS-Client, and if any pre-requisite software is installed on the DS-Client computer.
3. Click Next. The next screen that appears depends on the kind of backup set you are creating.
F1 Help: See Set Properties - Items tab on page 859. F1 Help: See Set Properties - Items tab (Linux DS-Client) on page 860. 4. Use the various tabs in the Properties screen to modify the backup set. For details on the options, see the online help for the screen.
Properties Tab Items Retention Options Notification Schedule Set Info Share Connection Database Advanced Options Function Use to change the selected set's backup items and backup item options. Use to change the backup sets retention rules. Use to change the backup set options. Use to change the set's notification options. Use to change the set's schedule. Shows information about the backup set. Use to change the set name. Use to view and edit information about the selected backup share(s). Use to view and edit credentials used for connection to the backup source or dump for certain kinds of backup sets (Appears instead of Share Tab). Use to view and edit credentials used for database backup sets (Appears instead of Share Tab). Use to change the backup sets Advanced Options (Windows DS-Client only).
F1 Help: See Pre & Post Execution screen on page 797. F1 Help: See Pre & Post Execution screen (Linux DS-Client) on page 799. 6. For details on these options, see the online help for the screen. 7. Click OK to save the Pre/Post settings. Special Case: Windows Services Using the Pre/Post features, you can backup Windows Services. Services normally lock associated files while the Windows computer is running (i.e. these files will not normally be backed up). Examples of Services include DHCP and WINS. Note: It can be problematic to back up services on the DS-Client computer itself, since shutting down some core services may cause problems for the backup process.
The steps that apply to Windows Service Backups are identical to File System backups. However, you must know the specific file path of the service files to be backed up.
Use this screen to exclude old files from backup. 1. Browse the Backup Set Tree and highlight the backup set you want. 2. Right-click. 3. Click Properties. The Backup Set Properties screen appears on the Items Tab. 4. Click Options. 5. Click Exclude Old Files. The Exclude Old Files screen appears. F1 Help: See Exclude Old Files screen on page 780. 6. Select the exclusion for this backup set: No exclusion Exclude files older than [...] days / weeks / months / years Exclude files older than [date] Note: The age of a file is determined by its Last Modified date. 7. Click OK to save the Exclude Old Files settings.
This section provides some background on the Continuous Data Protection option. It can be applied to File System backup sets (Windows / UNIX DS-Client), and E-Mail backup sets of MS Exchange E-Mails (Windows DS-Client with DS-MLR). For more information see the Knowledge Base article: Continuous Data Protection (Backup Set Option) on page 677. Knowing your data environment is important when using the continuous data protection option. Statistical Backups and LAN Storage Discovery help you to test your data environment. You should also take into consideration the number of generations that you want to maintain online (each change will normally count as a generation). See Statistical Backups on page 177. See LAN Storage Discovery Tool on page 329. The backup trigger for any continuous data protection set is the detection of a change to a file on the backup source. The File Change Detection method depends on the operating system and backup set type. Backup frequency depends on the interval for changes selected, which can be wide (up to many hours) or precise (down to the second-level). Note: Because this is a time-sensitive operation, make sure the DS-Client computer time and the backup source computer times are synchronized.
F1 Help: See Select the computer screen on page 850. 2. Browse through and highlight the computer that contains the files to be backed up. 3. Click Next >. Ask for Network Credentials: If Ask for Network Credentials is checked, Enter Network Credentials appears. F1 Help: See Specify Credentials (Windows DS-Client) on page 884. Enter the valid credentials to the computer. Note: DS-Client connections to NetWare servers - You should supply a 'context' in the From field of the Connect As box. Click OK. Use DS-Client Account: This option is only available for Windows DS-Clients. Allows you to use the DS-Client services account credentials to connect to the local (DS-Client) computer. You must be logged in through DS-User using an Administrator account (or equivalent). This option is only available when you select My Computer (i.e. the local DSClient computer).
F1 Help: See Select Items for Backup Set screen on page 831. 2. From this screen, you can do the following:
Add an entire directory To add an entire directory, browse through the Shares & Directories List until the directory you want appears and Click it.
Note:
You can select only one directory at a time. Subdirectories are automatically included, unless you clear the Include Subdirectories check box.
Add files that match a filter To add files that match a filter, in the Filter field, enter the file pattern that you would like to search for in the selected directory. (e.g. *.doc will search the directory for all files with the .doc file extension.)
Add specific files To add specific files, browse through the Shares & Directories List until the directory the files are stored in appears and Click it. A screen showing the list of files in that directory appears. Highlight the file(s) you wish to add to the backup set and click Add.
Exclude directories You can exclude a subdirectory if its parent directory is selected for backup. Exclude using Regular Expression Regular Expression provides more specific filtering than the Exclude function. For example, you can filter to exclude individual filenames or patterns. You should only use this option if you take the time to learn the Regular Expression syntax. Example: To exclude a specific filename from the backup, use \\filename\.ext$ (e.g. \\cache\.dsk$ will exclude the file cache.dsk). Source code and some documentation available from: http://www.boost.org (search the site for regex). Add special backup items Windows File Systems have additional special backup items that can be selected: - System State (including Registry) - Services Database For more information, see the following Knowledge Base articles: Backup of Windows System State on page 536 Backing up Windows for Bare Metal Restore (BMR) on page 534 Backup / Restore of Windows 2000 on page 592
3. The selected items appear in the Selected for Backup list. The icons indicate the type of item: directory with subdirectory directory without subdirectory file filter extension exclude 4. To add more items to the backup set, repeat steps 2-3. 5. Click Next >
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
F1 Help: See Set Properties - Items tab on page 859. 2. You should leave the default settings alone, unless there are specific backup set option requirements. For details on these options, see the online help for the screen. 3. Generation and options apply to each backup item (each line), and can be changed by highlighting the backup item and editing the settings. Permissions see Permissions Only Backups on page 126 4. Click Next >
F1 Help: See Set Properties - Options tab on page 862. F1 Help: See Set Properties - Options tab (Linux DS-Client) on page 866. 2. You should leave the default settings alone, unless there are specific backup set option requirements. For details on these options, see the online help for the screen. For more detailed instructions on Pre/Post, see Backup Set Options - Pre/ Post on page 97 For more detailed instructions on Excluding old files, see Backup Set Options - Exclude Old Files on page 98 For more detailed instructions on Continuous Data Protection, see Backup Set Options - Continuous Data Protection on page 98 3. Click Next >
F1 Help: See Set Properties - Advanced Options tab (Windows DS-Client) on page 854. 2. You should leave the default settings alone, unless there are specific backup set option requirements. For details on these options, see the online help for the screen. Windows options: Additional options specific to Windows file systems (2000 and up). Volume Shadow Copy: If the target backup computer supports this feature, this option appears. When selected, DS-Client will use Volume Shadow Copy Service (VSS) to copy the volume(s) selected for backup, then perform the backup of items from that VSS copy. If the VSS copy fails, DS-Client attempts to backup like a normal File System backup set. For more detailed instructions, see Backup using Microsoft VSS (Volume Shadow Copies) on page 550. Pure file data backup options: This option controls the automatic file filtering performed by the DS-Client during Windows file system backups. By default, the Windows DS-Client will exclude some files automatically out of the sharebased backup of files, even if such files would be readable (e.g. when using VSS). The excluded files my include: temporary files (e.g. pagefile.sys) files that are being backed up as part of System State backups (e.g. Operating System DLLs, executable) Registry hive files Other files that may interfere with a successful Agentless BMR
This option should usually remain unchecked, unless there are specific reasons why all such excluded data would need to be included in the share-based backup. Selecting this option will interfere with the ability to perform Agentless BMR without manual file filtering, however it may be used in conjunction with the VSS option in order to allow bootable-disk BMR (this requires 3rd-party BMR provisioning
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
integration). It is recommended that unless BMR provisioning is supported by your installed DS-Client, you should leave this option unchecked. Note: This option normally requires the Volume Shadow Copy option to be selected. Backup strategy for backed up files: By default, DS-Client skips files that have already been backed up. It uses each backed up files last modified time and size for comparison purposes, and if those on the source match those of the latest generation in the DS-Client database, the file will be skipped. Normally this is the required behavior for backup sets. However, in some specific situations, you may want to force the backup of those files by enabling this option. 3. Click Next >
Note 2: This option does not apply for database backups if the backup set is using DS-Client Pipe as a dump option. 1. The New Backup Set Wizard switches to the Performance screen.
F1 Help: See Set Properties - Performance tab (Windows DS-Client) on page 875. 2. In normal operating environments, you should leave the default settings alone (i.e. use the DS-Clients settings). These performance options are provided for customers with high performance backup environments, where the DS-Client might be able to take advantage of the speed of the storage where the target backup data resides. Maximum pending asynchronous I/O for a file: This is the maximum I/O operations the DS-Client will allow to queue for each file from this backup set. This is for storage devices that support better parallel disk I/O, such as NAS devices, RAID 5/10, etc. Increasing this value may significantly increase the backup speed. The best setting for this value mainly depends on the storage device and network speed. WARNING:If your storage device does not support better parallel disk I/O (e.g. single read head on a physical disk, etc.), use the default value, otherwise the performance may be significantly degraded. Read buffer size for backup: This option adjusts the internal buffer amount that the DS-Client allocates for reading individual files for backup.
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
To achieve optimum backup performance, the DS-Client read buffer size may need to be different, depending on the combination of target storage device, target operating system, as well as any mid-ware involved (between the storage and the Operating System). 3. Click Next >.
Note:
F1 Help: See Set Properties - Notification tab on page 861. 2. You should leave the default settings alone, unless there are specific notification requirements. 3. Click Add (or modify), to specify a notification option for the backup set. The Add Notification screen appears.
F1 Help: See Add Notification screen on page 742. 4. In the Notification section, you may select one of the notification options. Note: The E-Mail and Pager fields will be grayed out if the DS-Client has not been configured for E-Mail notification (DS-Client Configuration - Notification Tab).
5. The Recipient section options change, depending on the type of notification selected: 6. In the Completion list, select from one of the notification conditions. The specified notification will be sent, if a backup meets the selected condition. Detailed notification: An expanded list of the backup will be included. Attach detailed log: A file-level detailed backup log file will be attached to the E-Mail. Compress: Indicates if the file attachment (file-level detailed backup log) will be compressed or uncompressed. 7. Click OK to save the notification setting. The Notification screen returns with the new option displayed in the Notification list. 8. Continue performing steps 3-7 for as many notification options and recipients as required. Click OK to save any modifications. 9. In the Send SNMP Traps when section, check each box to notify about the event: Successful Completed with warnings Completed with errors Incomplete 10. Click OK to save any modifications. 11. Click Next >.
F1 Help: See Set Properties - Retention tab on page 875. 2. You should leave the default settings alone, unless there are specific backup set retention requirements. For details on these options, see the online help for the screen. For more information, see About Retention Rules on page 85. 3. Click Next >
F1 Help: See Schedule Tab screen on page 818. 2. You should leave the default settings alone, unless there are specific schedule requirements for this backup set. For details on these options, see the online help for the screen. 3. Click Next >.
2. 3.
4.
5.
F1 Help: See Choose the name for this backup set screen on page 755. F1 Help: See Choose the name for this backup set screen (Linux DS-Client) on page 756. The Wizard assigns a default name in the Set Name field. You may change this name. In the Set Type list, select what type of backup set you want: Regular: Creates a full featured backup set of any kind (File System, Database, etc.). Local-Only: See Local-Only Backup Sets on page 179 Self-Contained: See Self-Contained Backup Sets on page 178 Statistical: See Statistical Backups on page 177 Additional options appear if they are enabled for this DS-Client: BLM: See Backup Lifecycle Management (BLM) on page 289 Local Storage: See Local Storage Tool on page 303 Click Finish to create the backup set as specified.
NAS
NFS
UNIX-SSH
2. Browse through and select the server you want to backup. 3. By default, your current user login to the DS-Client will be used to connect to the selected computer.
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
F1 Help: See Specify Credentials (Linux DS-Client) on page 886. Ask for credentials: Click to specify alternate credentials. For UNIX-SSH backup sets, this user's default shell must be either the Bourne shell or the BASH shell. If this user's default shell is anything else (like csh, tcsh), the operation may fail with: "SSH connection failed! The host may not be accessible!". sudo as an alternate user (UNIX-SSH backup sets): For security reasons, you may not want to use a super user for remote login to a source machine. Linux DS-Client is able to login to a source machine as a regular user, and then use 'sudo' to execute a shell as an alternate user with higher access permissions. The regular user must have privileges to connect to the SSH server on the source machine. Both regular and alternate users must be listed in the sudoers file on the source machine. The sudoers file can be edited with visudo. (Please consult your 'sudo' documentation for further information.)
The regular user must have privileges to run the "/usr/bin/perl" or /usr/bin/python command on the source machine as the alternate user. If you have perl/python installed in a different path, each sudoers user must be able to run perl/python from that installed path. Advanced connection options (UNIX-SSH backup sets): By default (if no selection is made), DS-Client runs PERL from the default path (normally /usr/bin). If PERL is not located in that directory, you must specify the exact path in this screen. This screen allows you to specify the type of script to use for backup of files on the source machine (PERL or PYTHON).
The DIRECT option allows you to run the specific program from the path entered in this screen. (Only for use if you have a specific requirement.) 4. Click Next >.
2. You should leave the default settings alone, unless there are specific generation or option requirements for each backup item. 3. Click Next >.
For Linux DS-Clients, see: NAS, UNIX-SSH, NFS, Local File System Backup (LINUX DS-Client) on page 112
You can also type the server name in the Path box once you have clicked on the network: (ex:\\server_name) 3. Browse through and select the server you want to backup. 4. By default, your current user login to the DS-Client will be used to connect to the selected computer and database. There are two "ask for credentials" checkboxes available, in the event that you need to specify alternate credentials: 5. Click Next >.
Note:
F1 Help: See Select share & path for the database / data dump screen on page 849. 2. Select the dump location. Remote dump location: To specify a different computer for the database dump, you can type a valid UNC path into the Dump Path field. The MS SQL Server service account and the backup set user credentials must have rights to access this UNC path (read-write permissions). 2. Select the dump location. 3. Click Next >.
Multiple instances on the same server are displayed, however you can only add from one instance per backup set. 2. To Add a Database to the Backup Set: Browse through the Database List and highlight the database you wish to include. Highlight the entire instance to backup all databases. Click Add. The database is added to the Selected Items for Backup list. 3. Continue performing step 2 for as many items as are required. You can exclude individual databases if the entire (parent) instance has been selected for backup. 4. Click Next >.
Note:
2. You should leave the default settings alone, unless there are specific generation or option requirements for each backup item. For more details on these options, see the online help. 3. Click Next >.
F1 Help: See Set Properties - Options tab (Windows database backup sets) on page 872. For more information on Database Backup Policy options, see the Knowledge Base article: Backup / Restore of Microsoft SQL Server (ALL VERSIONS) on page 560. 2. Click Next >.
You can also type the server name in the Path box once you have clicked on the network (ex: \\server_name). You must supply the fully qualified domain name of the Exchange computer (i.e. Do not supply the server's IP address.) 2. Browse through and select the server you want to backup. For clustered Exchange servers, you must select the Exchange cluster name. If you choose an individual nodes name, you will get an error like 'Error returned from callback function call. 3. By default, your current user login to the DS-Client will be used to connect to the selected computer and database: The "ask for credentials" checkbox allows you to specify alternate credentials. 4. Click Next >.
Note:
F1 Help: See Select share & path for the database / data dump screen on page 849. 2. Select the dump option. 3. Click Next >.
2. To Add an MS Exchange Database to the Backup Set: Browse through the Database List and highlight an item to include. Click Add. 3. Continue performing step 2 for as many items as are required. You can exclude individual databases if the entire (parent) instance has been selected for backup. 4. Click Next >.
2. You should leave the default settings alone, unless there are specific generation or option requirements for each backup item. For more details on these options, see the online help. 3. Click Next >.
F1 Help: See Set Properties - Advanced Options tab (Windows DS-Client) on page 854. 2. Backup Passive Node: This option only applies to Microsoft Exchange 2007 Servers in CCR (Continuous Cluster Replication) configuration where there is a main node that handles transactions and a passive node that handles only replication. If selected, this will backup the passive node. If not selected, this will backup the main node of the Exchange Server. NOTE: Do not change this setting once you have performed a backup of this set. 3. Click Next >.
F1 Help: See Select the protocol for dumping database file (Linux DS-Client) on page 851. 2. Select the protocol: Local File System (for Oracle or DB2 servers on the DS-Client computer): dumps the database into the specified path on the local file system (on the DS-Client computer). NFS (for remote Oracle or DB2 servers): DS-Client will read the database dump files from the database server through the NFS transmission protocol. UNIX-SSH (for remote Oracle or DB2 servers): DS-Client will read the database dump files from the database server through the UNIX-SSH transmission protocol. DS-PIPE (for Oracle only): DS-PIPE is an alternative to the database dump for Oracle database server backups. This option does not consume any additional disk space. During backups, the DS-Client reads from the pipe on the source database. This method is useful if your database is too big to be dumped to a file on either the database server or the DS-Client buffer. 3. Click Next >.
2. To back up the full Oracle Database, select all items in the list or select the parent instance. Otherwise, browse through the Database List and click Add for as many items as are required. You can exclude individual databases if the entire (parent) instance has been selected for backup. 3. Click Next >.
2. You should leave the default settings alone, unless there are specific generation or option requirements for each backup item. For more details on these options, see the online help. 3. Click Next >.
The user who performs MySQL Backup / Restore should have knowledge about the MySQL database. DS-Client backs up MySQL Server using the MySQL utilities mysqldump and mysql. The DS-Clients mysqldump and mysql utilities must be compatible with the MySQL version running on the source machine (MySQL server).
For more information, refer to the following Knowledge Base article: Backup / Restore of MySQL Database Servers on page 585
Node Name: Enter the local alias of the target DB2 server node. This is the name on the DS-Client computer that is used to identify that node. Port Number: Enter the TCP/IP port number of the DB2 Server Database Manager instance. DB2 Client Instance: Enter the local DB2 instance name installed on the DSClient computer.
2. You should leave the default settings alone, unless there are specific backup set option requirements. For details on these options, see the online help for the screen.
Prune History / Delete entries from the history file or log files from the active log path. Logfile If unchecked, perform Offline DB2 backup. During an offline backup, applications cannot connect to the database. If checked, perform Online DB2 backup. An online backup allows Online Backup applications to connect to the database and read and write to tables during database backup. Log retain or userexit must be enabled for an online backup.
F1 Help: See New Backup Set Wizard - Input DB2 userexit log path on page 792. If User Exit is OFF on the DB2 database server, you can leave this field empty. If User Exit is ON on the DB2 database server, you must enter the path for the DB2 Archive Logs.
Archive Log backup path This is the path where the DB2 Archive Log files are written by the User Exit program. Click [...] to specify the path. This opens the Select Directory screen.
F1 Help: See Choose the E-Mail Server type on page 753. 2. Select the type of E-Mail Server you want: Microsoft Exchange Server Microsoft Outlook Lotus GroupWise 3. Click Next >.
2.
3. 4. 5.
To backup E-Mails of clustered MS Exchange Servers, you must select the virtual computer of the Exchange Cluster. To backup GroupWise E-Mails, you must select the server where the GroupWise Client (and DS-Recovery Tools) are installed. By default, your current user login to the DS-Client will be used to connect to the selected computer. The "ask for credentials" checkbox allows you to specify alternate credentials. Click Next >. If Ask for Network Credentials is checked, the Enter Network Credentials screen appears. Enter the credentials to the target computer. The amount of mailboxes that appear will depend on the credentials supplied.
2. This dialog is the same as the Select Items for Backup Screen (File System Backups), except two name differences: The Shares and Directories List is called the Mailboxes List; The Files button is called the E-Mails. 3. Select the mailboxes to backup. 4. Click Next >.
2. You should leave the default settings alone, unless there are specific generation or option requirements for each backup item. For more details on these options, see the online help. 3. To add a filter to a backup item, highlight the item and click Filter. The Select Filter screen appears.
4. Select from one of the available filters, or click Add to create one. If you click Add, the Add / Modify Filter Screen appears.
F1 Help: See Add / Modify Filter on page 740. 5. Create the filter by giving it a name in the Filter Name field. 6. Select the filter conditions (you can make complex filters with the AND, OR, and BRACKETS). When finished, click OK. Note: If you add a filter, the backup will search and backup only those E-Mails that match the filter description.
Follow from Step 8. Specify Notification Options on page 107 in the section for File System Backups.
Step 3. Specify the share & path for the data dump
This screen appears for Windows DS-Client only. Linux DS-Client skips to Step 4. Specify the Backup Items on page 148. 1. New Backup Set Wizard prompts you to specify the location of the data dump. 2. Select a folder in the ROOT file system: The System i Server ROOT file system must be shared (with read-write permissions) for this operation to work. 3. Click Next >.
2. Create a list of items that you are going to backup. Your items list can consist of:
Applications
An application is a specific list of libraries you create for backup. To create or modify an application, click "Applications". F1 Help: See Modify Applications (System i Server) on page 791. In the Modify Applications screen, highlight the libraries that belong to the application and click Modify.
In the Select Applications screen, enter or choose a name in the Application name field and click OK.
Generated on: 10/15/12 Page: 148
Confidential.
F1 Help: See Select Applications (System i Server) on page 821. In the Modify Applications screen, the application name appears to the left of the selected libraries. Click OK to return to the Items List screen. The application created will appear in the Applications folder. Note: The "Selected Items for Backup" list cannot contain applications and libraries at the same time.
Libraries
You can choose individual libraries for backup directly. The entire contents of the selected library (or libraries) will be backed up. If you wish to backup all libraries of your system, highlight the line "Libraries" and press "Add". Note: The "Selected Items for Backup" list cannot contain applications and libraries at the same time.
System info
You can backup the entire system info at once, or select either: A) User Profiles - the user profiles of your System i Server, or B) Configuration - the configuration, which consists of: Line descriptions Controller descriptions Device descriptions Mode descriptions Class of service descriptions Network interface descriptions Network server descriptions NetBIOS descriptions Connection lists Configuration lists Hardware resource data Tokenring adaptor data
3. Once you have finished selecting the backup items, click Next >.
2. You should leave the default settings alone, unless there are specific generation or option requirements for each backup item. 3. Click Next >.
(TGTRLS): Specifies the release of the operating system on which you intend to restore and use the object. *CURRENT: The object is to be restored to, and used on, the release of the operating system currently running on your system. The object can also be restored to a system with any subsequent release of the operating system installed. *PRV: The object is to be restored to the previous release with modification level 0 of the operating system. The object can also be restored to a system with any subsequent release of the operating system installed. Previous Target Release NOTES: For system Libraries, Q* Libraries and/or *IBM Libraries, only the current release can be the target release. Not all objects can be targeted to another release. To find out which objects are supported check your IBM System i documentation. If DS-Client cannot backup the object to a previous release, it will retry the command without the TGTRLS parameter; this operation will be show on the log with the message "System i returned previous release target error; trying to rerun the same command without TGTRLS(*PRV) flag." This parameter can only be specified when the backup set is created.
For more information, refer to the following Knowledge Base article: Backup / Restore of MS SharePoint 2007 Servers (DS-Recovery Tools) on page 627
By connecting to the VMware Virtual Center, you will be able to see (and backup) all the Virtual Machines from all the VMware ESX servers connected to this Virtual Center. 3. You must know the version of ESX that is running on the target Virtual Machine. The protocol used to connect to it will depend on the version. For ESX versions 3.5 and 3.5i, the HTTPS protocol is used. By default, your current user login to the DS-Client will be used to connect to the selected computer. To specify alternate credentials:
Ask for VMware logon credentials: ESX Connect: Ask for credentials: ESX Connect: sudo as an alternate user: Credentials to logon to the Virtual Center or ESX Server (the target computer specified at the IP address in step 2). Do not use this option for ESX version 3.5 or 3.5i. Do not use this option for ESX version 3.5 or 3.5i.
Note:
The user that is backing up ESX 3.5 or 3.5i must be added as a user with "Administrator" permissions (member of Administrators, on the Permissions tab) both on the Virtual Center and on the ESX server. This must be done using the Virtual Infrastructure Client. 4. Click Next >.
Note:
3. By default, your current user login to the DS-Client will be used to connect to the selected computer. To specify alternate credentials:
Ask for XenServer API Prompts you to enter a valid user name and password for the selected logon credentials: XenServer.
Follow from Step 8. Specify Notification Options on page 107 in the section for File System Backups.
For example:
Sybase\12.34.56.111:5000
The port number must always be placed after the IP address, separated by a colon. The default port for Sybase Adaptive Server is 5000. 3. By default, your current user login to the DS-Client will be used to connect to the Sybase database, and for the connection to the selected computer. You must supply database credentials with the sa_role. To specify alternate credentials, refer to the F1 Help. F1 Help: See Specify Credentials (Linux DS-Client) on page 886. 4. Click Next >.
Note:
F1 Help: See Select the VSS-aware backup set type on page 852. 2. Click Next >.
Follow from Step 8. Specify Notification Options on page 107 in the section for File System Backups. Do not assign this backup set to a Retention Rule or Backup Schedule. NOTE: This backup set type is controlled by Oracle RMAN (not from DS-User). On-Demand and Scheduled backups do not apply to it.
For example:
VMware VADP\12.34.56.111
3. By default, your current user login to the DS-Client will be used to connect to the VMware ESX server or VMware vCenter server. To specify VMware logon credentials, refer to the F1 Help. F1 Help: See Specify Credentials (Linux DS-Client) on page 886. 4. Click Next >.
The Local Storage Path must be set (see Local Storage Tool on page 303.) The user who performs Backup from the Cloud should have knowledge about the target Cloud server (Salesforce.com database). You must have a valid Salesforce.com account (username, password, and security token). Your Salesforce.com license must be an Enterprise, Unlimited version. The DS-Client computer must be able to connect to the Salesforce.com site (e.g. have an Internet connection). Optionally, you can configure the DSClient to connect to Salesforce.com via a proxy server (from Setup menu > Configuration > Connections tab). For more information, see the Knowledge Base article Backup from the Cloud (Salesforce.com) Limitations on page 671.
F1 Help: See Set Properties - Backup from the Cloud (Salesforce.com) Parameters on page 856. 2. Click Next >.
This type of backup set uses the Local DS-VDR Tool (separate installation) to interface with a VMware vCenter / Host. When you backup this set, the Local DS-VDR Tool will export the Virtual Machines (from the selected backup items) to another datastore on the vCenter / Host. This allows you to schedule backup of the latest generation of a Virtual Machine to a standby Virtual Machine that is always available (on the local vCenter / Host). For more information, refer to the following Knowledge Base article: Local DS-VDR backup set on page 673 There are some requirements that must be met in order to create a Local DS-VDR backup set: You must install the Local DS-VDR Tool on a network computer that can connect to both this DS-Client and the target VMware vCenter. This can be found on the installation DVD in the folder:
\Software\Tools\Local_DS-VDR\Windows_64_bit\setup.exe
The DS-Client must be configured to point to a Local DS-VDR Tool from Local DS-VDR menu > Configure Local DS-VDR Tool.
F1 Help: See Local DS-VDR Tool Setup on page 790. Each DS-Client must have its own, dedicated Local DS-VDR Tool. You cannot use the same Local DS-VDR Tool with multiple DS-Clients. The DS-Client must have at least one Local DS-VDR license count available. This is allocated by your Service Provider from DS-System.
You must manually enter the IP address of the VMware ESX server or VMware vCenter server. 3. By default, the credentials checkbox is selected and you must supply the credentials that the DS-Client will use to connect to the VMware ESX ser or VMware vCenter server. 4. Click Next >. To specify VMware logon credentials, refer to the F1 Help. F1 Help: See Specify Credentials (Windows DS-Client) on page 884. F1 Help: See Specify Credentials (Linux DS-Client) on page 886.
F1 Help: See Set Properties - Options tab (Local DS-VDR backup sets) on page 872. 2. You must configure the destination on the vCenter, where you want the selected backup items (Virtual Machines) to be exported.
Backup Virtual Machine Memory Backup Virtual Machines snapshots Export to host ON: Saves the VM state (running programs loaded in memory). OFF: Backs up the VM as if it were not running. ON: Backup will export the actual running VM and all its snapshots. OFF: Backup will export the actual running VM only (no snapshots).
This dropdown list contains the available ESX hosts where you can export the selected Virtual Machines. You must assign one as the target. Click [>>] to open the Specify Credentials screen. This is dropdown list of available Datastores on the destination host where you can export the Virtual Machine. You must assign one as the target.
Export to datastore
This component can be found on the vmware.com Web site. Run the installation and choose the Client-Server installation (advanced) Setup Type. (Optional) Since the Local DS-VDR Tool and VMware vCenter Converter component are on the same computer, the DS-VDR Tool should be able to access the component without additional credentials. If connection errors occur (when creating the P2V backup set), you can specify the (administrator level) credentials that will be used to access the VMware vCenter Converter from Local DS-VDR menu > Local DS-VDR Settings.
F1 Help: See Local DS-VDR Settings on page 790. 3. This feature currently supports conversion of Windows physical machines only. For more information, refer to the following Knowledge Base article: Physical-to-Virtual backup set on page 675
Physical to Virtual\IP_Address
For example:
Physical to Virtual\12.34.56.111
3. By default, your current user login to the DS-Client will be used to connect to the specified server. To specify different logon credentials select Ask for credentials. You are prompted to specify credentials. F1 Help: See Specify Credentials (Windows DS-Client) on page 884. F1 Help: See Specify Credentials (Linux DS-Client) on page 886. Note: These credentials are not immediately verified by the DS-Client. They will be used by the Local DS-VDR Tool when a Physical to Virtual backup is performed on this set.
F1 Help: See Set Properties - Options tab on page 862. F1 Help: See Set Properties - Options tab (Linux DS-Client) on page 866. 2. You should leave the default settings alone, unless there are specific requirements. 3. In the Additional Backup Set Options section, specify the vCenter that will host the virtualized machine that is backed up. Once selected, the normal backup (to DS-System) options are disabled. 4. Click Next >.
Note:
This section describes how to create and use the different backup set types (Statistical Backup Sets and Self-Contained Backup Sets).
Statistical Backups
Statistical backup data can be generated to determine the data backup usage and trends before performing actual backups. You do not need a customer account with a Service Provider, and no backup data is transmitted. Statistical data is gathered and stored in the DS-Client database. Statistical backup sets can help you to estimate the initial backup size, as well as the data change trends of your backup data. This allows you to determine how long the initial backup of baseline data will take. You can estimate the amount of changes your backup data will experience between backups (the greater the amount, the longer the backups time). To do so, simply let the backup(s) run on schedule for at least five or more full sessions. This will distinguish the backup data change trend from the initial baseline backup. Note: You cannot convert a Statistical Backup to a Regular Backup.
1. Configure the backup set in the New Backup Set Wizard. On the last tab (Choose the name for this backup set), you can select the backup set type. 2. In the Set Type list, select Statistical.
3.
4. 5. 6.
F1 Help: See Choose the name for this backup set screen on page 755. F1 Help: See Choose the name for this backup set screen (Linux DS-Client) on page 756. The Calculate Transmit Amount checkbox appears. Check this box to emulate an actual backup transfer process. During statistical backups, specified backup files will be read from their source and processed for compression/encryption. Click Finish. Allow the backup set to run on schedule (or demand). To generate accurate trends, you should let it run in your data environment for at least 1-2 weeks. Use the DS-Client Load Summary, Storage Summary and Report features to view the statistics generated. See the section: 11 - Logs and System Tools on page 322.
1. Configure the backup set in the New Backup Set Wizard. On the last tab (Choose the name for this backup set), you can select the backup set type. 2. In the Set Type list, select Self-Contained.
3. Click Finish.
3. Click Finish.
Note:
Conversion from Local-Only to Regular backup set type is one-way (you cannot revert once the data has been completely copied to the DS-System on-line storage).
1. 2. 3. 4.
Browse the Backup Set Tree and highlight the Local-Only backup set you want. Right-click. Click Convert. A confirmation screen appears. Click Yes to proceed. A Process Window opens to show the progress of the backup set conversion. If the conversion is interrupted before it has finished, the backup set will not be able to backup new data until the conversion process is either completed or cancelled. Those options (Convert / Cancel Convert) will appear in the right-click menu for this set.
F1 Help: See Clean Local-Only Trash on page 757. You must select how long (in days) that the data has been deleted in order to qualify for this Clean Trash process. By default, this will clean the trash from all local storage paths on the DSClient. You can also choose to clean the trash from a specific local storage path by selecting one from the drop down list. 3. Click OK. Note: This process can also be scheduled. See Add a Detail to a Schedule on page 78 for more information.
This section contains instructions for working with backup sets. You can also consult the PDF document DS-Client User Guide (filename: dsuser.pdf). The PDF sections are reproduced in this online help (without screenshots), and can be viewed by navigating the Contents Tab at left.
F1 Help: See Set Properties - Share tab on page 877. F1 Help: See Set Properties - Share tab (Linux DS-Client) on page 877. 5. Click >> beside the Connect As field. The Modify Network Credentials screen appears. See Ask for Network Credentials: on page 99. (Windows DS-Clients) If this is a share on the local (DS-Client) computer, and you are logged in to DS-User as an administrator, you have the option to use the DS-Client Account (the username and password used by the DS-Client service itself). 6. Type a new User Name and/or a new password to be associated with the backup set. 7. In the From list, select the machine where the DS-Client will verify the user information.
8. Click OK to save your changes and close the Modify Network Credentials screen. The Share Tab returns with the modified Connect As information.
F1 Help: See Failed Files During Backup on page 781. 6. The file list is a cumulative list of every file that ever failed to back up since this backup set was created. Use the CTRL and SHIFT keys to highlight some or all of the files from the list, or Select one of the failed files and check Custom Exclude. This will exclude all files in the same path with the same extension. 7. Click Exclude. The Edit Items screen returns with your exclusions in the list of backup items selected. 8. Click Close. The Items Tab returns. You must click Apply or OK to save your changes.
F1 Help: See Set Properties - Database tab on page 858. If "Access integrated with share" is checked, you can only edit the credentials from the "Dump location" section. Windows authentication will be performed when connecting to the database. Note: Access integrated with share will not work if your network is using Windows Integrated Security. (Even though you can check and uncheck the box, and enter any credentials, the Windows Integrated Security ignores any credentials from the Database Info section.) 5. Click OK to save any modifications.
F1 Help: See Set Properties - Connection tab on page 856. 5. Click OK to save any modifications.
F1 Help: See Set Properties - Connections tab (E-Mail backup sets) on page 858. Click [>>] to modify the credentials used by the backup set. 5. Click OK to save any modifications.
F1 Help: See Set Properties - Connection Options tab (Linux DS-Client) on page 857. The amount of options depends on the type of backup set and whether the data source is local or remote. For details on these options, see the online help for the screen. 5. Click OK to save any modifications.
6. Click OK to save the change. 7. The set reappears in the Backup Sets tree with the new name.
2. Right-click. 3. Click Suspend or Activate on the Backup Set desired. 4. The set's name changes color to reflect its new status: black = active gray = suspended
4. Click Next > If Ask for network credentials is checked, the Enter Network Credentials screen appears. Enter the User name, password, and source server (if applicable) from which to connect with the selected network / node, then click OK.
5. The Migrate Backup Set Wizard switches to match the source / destination shares screen.
F1 Help: See Migrate Shares screen on page 790. 6. Match each Source item with a Destination cell. 7. Click Next >. 8. The Select directories / files for backup screen appears.
9. The Selected Items for Backup remain, with their share path changed to the destination share selected in the previous tab. Make sure that the new path is correct for each backup item. You may add more files, or leave this screen unchanged. 10. Click Next >
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
12. Select the backup item options, as you would a normal backup set. Depending on which network you have migrated to, you may see more or less backup options than previously available for this backup set. 13. Click Finish to complete the migration. 14 The Backup Sets screen returns. If you check the properties for the migrated backup set (Sets menu > Backup Sets > Properties), you will see the changes to the provider, network and / or node. 15. Synchronize the migrated backup set. (See Synchronize a Backup Set's Backup Logs on page 193.) 16. You may now perform backups and restores with this backup set.
6. Select a set name, a set type, and click Finish. 7. The new backup set appears in the Backup Sets Tree.
F1 Help: See Change Backup Set(s) Owner screen on page 752. 4. Click >>. The Select Group / User screen appears.
F1 Help: See Select Group / User screen on page 829. 5. Highlight the User you want, and click Select. 6. The Change Backup Set(s) owner screen returns with selected username. 7. Click OK to proceed with the change.
F1 Help: See Permissions screen on page 797. 4. To add permissions to a user or group, click Add. The Add Permission for Users and Groups screen appears. Users and groups only appear once they have logged into the DS-Client.
F1 Help: See Add / Edit Permissions for a User or Group screen on page 741. 5. Highlight the user or group that is to receive permissions. 6. In the Permission type section, check all permissions you want to apply: Backup, Restore, Modify and Delete. 7. Click Add to add the permissions. The Backup Set Permissions screen returns with the new user or group and permissions listed. 8. Click Close to exit this screen.
This section describes how to delete backup sets, and permanently remove backed up files or file generations that are stored Online on the DS-System.
Description Allows you to choose items to delete from a single backup set. See: Selective Delete from Online Storage on page 202 Displays items to delete from all the DS-Clients backup sets. See: Assisted Delete from Online storage on page 206 Delete all of the backup sets files and remove the backup set from the DS-Client. See: Remove Backup Set from Online Storage on page 209
For more more detailed information about delete behavior in more advanced scenarios, see the Knowledge Base article Delete Considerations on page 522.
Delete Directories
1. Browse the Backup Set Tree for the backup set you want. 2. Right-click. 3. Click Delete. The Delete Wizard screen appears on the Select how you want to delete screen.
F1 Help: See Select how you want to delete screen on page 829. 4. For details on these options, see the online help for the screen. Selections in this screen help to narrow the display of files and directories for delete in the last Wizard Tab. In the Data selection for Delete section, select the method that this Wizard will use to select data. Time based data selection is the default, but Windows has additional options if the data source is using a recognized HSM system (i.e. if a placeholder/stub is detected on the source). Select the period of backups that you want to delete.
5. Click Next >. The Delete Wizard switches to allow you to select delete options. For details on these options, see the online help for the screen.
F1 Help: See Select how you want to delete (Delete Options) screen on page 830. Archived data placeholders: These options relate to displaying generations that have already been pushed to BLM from online storage (i.e. the actual file has been removed from online to BLM). Select what you want to display in the next screen of the Delete Wizard (Include archived files, exclude archived files, or show only archived files). Move to BLM: select if you want to send a copy of all the files that are deleted to BLM.
6. The Select directories/files to delete screen appears. The contents of the Tree depend on the options specified in the previous screen.
F1 Help: See Select directories / files (Restore / BLM / Delete / Validation) on page 826. 7. Browse through the Directory Tree and check the box beside each directory you want to delete. The number and total size of the files selected for delete appear at the bottom of the screen. 8. Click Finish. The Delete Process Screen appears.
4. The Files List section appears. 5. Browse through the Files List and check the box beside each file you want to delete. 6. The number and total size of the files selected for delete appear at the bottom of the screen. 7. You can view your delete selections by clicking the Selection button. The Delete Selection screen appears, showing the full path \ file name of each delete item.
F1 Help: See Selection screen on page 852. 8. Click Finish. The Delete Process Screen appears.
Note:
Items (directories / files) from the source are detected during the backup session. This means, if no backups have run recently, any items deleted since the last backup will not be included in the Assisted Delete Wizards selection.
2. The Assisted Delete Wizard appears on the Select how you want to delete tab.
F1 Help: See Assisted Delete - Select how you want to delete on page 745. 3. For details on these options, see the online help for the screen. Selections in this screen help to narrow the display of directories for delete in the next Wizard Tab. In the Delete Period section, select the range of backups to delete and the number of generations (if any) you want to leave online. In the Filter Section, enter the cut-off date and time that you want to apply against items that qualify for the Delete Period: For Windows DS-Client: The Assisted Delete Wizard will only display directories that were deleted from the source backup computer before this date & time. The Filter is applied against the directories that match the Delete Period.
For Linux/Mac DS-Client: The Assisted Delete Wizard will only display directories (or directories containing files) that were deleted from the source backup computer before this date & time. The Filter is applied against the directories/files that match the Delete Period. [Windows DS-Client only]: For file system backup sets, you have an additional option for deleting files if a placeholder/stub is detected on the source. Move to BLM: select if you want to send a copy of all the files that are deleted to BLM.
F1 Help: See Assisted Delete - Select Backup Set / Directory on page 745. 5. Directories that are grayed out do not match the Delete Period or Filter selections. You can deselect items in this screen, as required. Windows DS-Clients perform selection at the directory-level. The Assisted Delete Wizard automatically selects any directories that have been removed from the backup source. (It will not select individual files in a directory.) Linux / Mac DS-Clients perform selection at the file-level. The Assisted Delete Wizard automatically selects any directories that have been removed from the backup source, or that contain file(s) that have been removed from the backup source. 6. Click Finish to start the Delete Process.
1. Browse through and highlight the backup set you want to delete.
2. Sets Menu > Delete > Remove Backup Set. The Remove Backup Set screen appears.
F1 Help: See Remove Backup Set on page 809. For details on these options, see the online help for the screen. 3. Press the 'OK' button to continue. A confirmation screen appears. Click 'Y' to remove the set. Press any other key to abort.
8 - Demand Backups
8 - Demand Backups
Asigra Cloud Backup is designed to perform unattended backups at scheduled intervals. However, you may want to back up certain files at other times (on demand). This section provides information on how to perform such demand backups.
8 - Demand Backups
F1 Help: See Select items for demand backup screen on page 833. 4. A check mark appears beside each item to indicate it is selected for the demand backup. Uncheck any item(s) you do not want to backup. 5. You may change a backup item's options (for this session only) by highlighting it, then checking or un-checking the option boxes that appear at the bottom of the tab.
8 - Demand Backups
6. Click Next >. The Select options for demand backup screen appears.
7. 8.
9. 10.
F1 Help: See Select options for demand backup screen on page 836. F1 Help: See Select options for demand backup screen (Linux DS-Client) on page 837. In the Backup set options section, you may select options for this demand backup session. In the Open files section you can specify how the DS-Client will deal with any open files encountered during the backup. Note: This does not guarantee an open file will be backed up. An error will appear in the activity log if the files are not backed up. To backup locked files, you must use the VSS option or backup set type (See: Backup of Open Files Knowledge Base article - Backup of Open Files on page 546). Click Finish to start the backup procedure. The Backup Process screen appears, showing the progress of the backup session.
8 - Demand Backups
9 - Restoring Backups
9 - Restoring Backups
This section describes how to restore your backed up data. Various options are available to help you select the specific items to restore.
9 - Restoring Backups
See Step 1. Select the Backup Set on page 225. Description See Step 2. Select the Restore Items on page 225. See Advanced Restore Options on page 217. See Restore a Specific File or Files of a Specific Pattern on page 219. See Restore only files that differ from those on the backup source volume on page 221. See Restore an Older Generation of a File on page 222. See Step 3. Specify the Restore Location on page 227. See Restore to an Alternate Location on page 261. See Step 4. Specify the Restore Performance Options (Windows DS-Client) on page 228. See Step 5. Specify the Restore Options on page 229. See Pre/Post Restore Activity on page 223.
Step 3. Select restore location Step 4. Select performance options Step 5. Specify restore options
9 - Restoring Backups
Specific Backup Type restore descriptions can be found in the following sections:
Backup Type Restore File System Backups on page 225 Restore MS SQL Server Backups on page 234 Restore MS Exchange Server Backups on page 237 Restore Permissions Only Backups on page 239 Restore Oracle Server Backups on page 240 Restore MySQL Backups on page 241 Restore DB2 Backups on page 242 Restore PostgreSQL Backups on page 243 Restore E-Mail Backups (via DS-Recovery Tools) on page 244 Restore System i Server Backups on page 246 Restore MS SharePoint Backups (via DS-Recovery Tools) on page 248 Restore Lotus Domino Server Database Backups on page 249 Restore Sybase Database Backups on page 250 Restore VSS-aware Backups on page 251 Restore VMware VADP Backups on page 254 Restore a Backup from the Cloud (Salesforce.com) Backup Set on page 257
9 - Restoring Backups
F1 Help: See Select directories / files (Restore / BLM / Delete / Validation) on page 826.
9 - Restoring Backups
F1 Help: See Advanced Options screen on page 743. 6. Specify the Advanced Restore Options. Select from a single backup session Select from a period of backups Select the filter for deleted data. You can show all data (including deleted data) or you can hide / show only the deleted data from before a specific date and time (backup session). Note: During each backup session, the DS-Client scans the directories on the backup source. Over the course of time, some directories may have been deleted from the source. Using a filter avoids restoring directories that were intentionally deleted. Specify a file overwrite policy for the restore files 7. When you have finished your selections, click OK. The Select directories/files screen returns with the new restore selection availability. 8. In the Directories Tree, only those directories that match the specified restore options will appear. 9. When you are finished selecting making your selections, click Next >. Follow from Step 3. Specify the Restore Location on page 227 to complete the restore.
9 - Restoring Backups
9 - Restoring Backups
7. In the Search For section, enter the name/pattern of the file you would like to find. (ex: document.doc will search the entire backup set for that specific file; *.exe will search for all files with the .exe file extension). 8. Click Find. All files (including each generation of a file) that meet the search parameters are displayed (including their original directory path). 9. Highlight the file that you want to select to restore. 10. Click Select. The Select Files to Restore screen reappears with the selected file added to your restore list. The Files List appears and shows the contents of the directory that contains the specified file. 11. Repeat as necessary. When you are finished selecting files to restore, click Next >. 12. Follow from Step 3. Specify the Restore Location on page 227 to complete the restore.
9 - Restoring Backups
Restore only files that differ from those on the backup source volume
You may wish to restore only the files that are different (or do not exist) from those on the destination volume. In this case, you can use the Show/Add Modified function to search through the destination volume's directories, and select only those backed up files that are different from those scanned on the destination. 1. Browse the Backup Sets tree and highlight the one you want to restore. 2. Right-click, then select Restore Now from the menu. 3. The Restore Now Wizard opens. 4. Browse through the Directories Tree and highlight the directory containing the files you want to restore. 5. Click Show Files. The Files List section appears with the files in the selected directory.
6. Click Show Modified to show any modified files in the selected directory. The DSClient will scan the backup source, and compare the files with the backup log. Files in the list that do not exist on the source, or are different (changed), will be highlighted. 7. The Show Modified button changes to Add Modified. Click to add all of the modified files to the restore selection. 8. Repeat as necessary. When you are finished selecting files to restore, click Next >. 9. Follow from Step 3. Specify the Restore Location on page 227 to complete the restore.
9 - Restoring Backups
1. 2. 3. 4. 5.
Browse the Backup Sets tree and highlight the one you want to restore. Right-click, then select Restore Now from the menu. The Restore Now Wizard opens. Browse through and highlight the directory with the file you want to restore. Click Show Files. The Files List Appears.
6. Browse through and highlight the file whose previous generation you want to restore.
9 - Restoring Backups
8. 9. 10. 11.
F1 Help: See Backup Generations for ... screen on page 747. Highlight the desired generation of the file from the list and click Select. The Restore Now Wizard returns to the Select Files and Directories screen, with your selection highlighted with a red checkbox. The directory list refreshes automatically to reflect the time of the selected generation. Click Next >. Follow from Step 3. Specify the Restore Location on page 227 to complete the restore.
9 - Restoring Backups
6. Click Pre/Post. The Pre & Post Execution screen appears for this backup set. F1 Help: See Pre & Post Execution screen on page 797. F1 Help: See Pre & Post Execution screen (Linux DS-Client) on page 799. 7. Follow the steps specified in the section: Backup Set Options - Pre/Post on page 97) 8. Click OK when you are finished. The Select restore options screen returns. 9. Click Finish to start the Restore. The specified Pre/Post options will be saved, and reapplied during each subsequent restore of this backup set.
9 - Restoring Backups
2. In the Directory Tree, check the box beside each directory you wish to select for restore. You may choose multiple directories.
9 - Restoring Backups
3. For individual files, browse through the directories list tree and highlight the directory that contains the files you want to restore.
4. Click Show Files. The screen expands to display the File List section.
5. In the Files List section options: Selectively choose files for restore. View and select by File Info (See Restore an Older Generation of a File on page 222.) Show modified, and select modified files: See the Restore Options section Restore only files that differ from those on the backup source volume on page 221
9 - Restoring Backups
6. To review the selected restore items, click Selection. The Restore Selection screen shows the selected restore items.
F1 Help: See Selection screen on page 852. 7. When you have made all your restore selections, click Next >. Archived to BLM popup: If this backup set has been configured with a Retention Rule that includes the Archive old data to BLM option, you may encounter a popup indicating some files in your restore selection have been archived to BLM. If this occurs, it means some files have been moved to BLM and you can only restore those files by requesting a BLM image of that data.
F1 Help: See Select restore location screen on page 840. 3. Select the restore location:
9 - Restoring Backups
Original location - By default, the restore will be to the original backup location. This will overwrite any existing files of the same name. Alternate location - see Restore to an Alternate Location on page 261. 4. Click Next >.
F1 Help: See Select Restore Performance Options (Windows DS-Client) on page 847. 2. These options are intended for large backup sets in high performance environments. In general, you should use the defaults and skip to the next screen. For more information, see the F1 help for this screen. 3. Click Next >.
9 - Restoring Backups
F1 Help: See Select restore options screen on page 842. 2. Select all restore options you require. Restore Method Description
OPTION Save Fast All Files use indirect restore method. All Files use direct restore method.
Direct restore method: Files are restored on a "write-data-as-received" basis. Files are overwritten upon receipt of the first byte of data. Indirect restore method: Restores files to a temporary location first. If the file is restored successfully, then the original file is overwritten with the temporary file. This prevents partially restored files from overwriting an existing file. 3. Click Finish to restore as specified. 4. The Restore Process screen appears, showing the progress of each file as it is restored. Note: The amount of data received may be different from the transmitted amount (in the backup logs). This happens because the DS-Client sends some additional information during backup (file name, size, etc.), that is stored on the DS-System. This information is not sent on restore, and may cause a difference of about 50 bytes per file.
9 - Restoring Backups
1. 2. 3. 4.
Browse the Backup Sets tree and highlight the one you want to restore. Right-click, then select Restore Now from the menu. The Restore Now Wizard opens. Check the box beside the System State and/or Services Database icon in the Directory Tree.
5. The Restore Now Wizard switches to its Select restore performance options screen.
9 - Restoring Backups
7. The default settings will automatically restore the System State / Services Database to its original source location. Note: Disable the Use Buffer option for System State restores. This may cause restore problems. 8. Click Finish to start the restore. 9. Once the Restore is complete, you must re-boot the computer before the restored System State / Services Database takes effect. 10. If you are satisfied with the restored System State (Registry) after rebooting, you can manually delete all of your old Registry files. The old Windows Registry files will be located in the following directories: %SystemRoot%\HKEY_LOCAL_MACHINE\ %SystemRoot%\HKEY_USERS\ where %SystemRoot% points to C:\Windows by default on Windows 2003, XP and higher Operating Systems. Note: You will lose any registry changes that have occurred since the backup time of the System State / Services Database being restored.
For more information, refer to the following DS-Client Knowledge Base Articles: Backing up Windows for Bare Metal Restore (BMR) on page 534 Backup / Restore of Windows 2000 on page 592 Bare Metal Restore of Windows (ALL VERSIONS) on page 693
9 - Restoring Backups
4. Select the restore item(s) from the Directory Tree. 5. Click Next >. The Select Restore Location screen appears.
6. The Restore Now Wizard switches to its Select restore performance options screen.
9 - Restoring Backups
If restoring NDS
9. Click Finish to start the restore. Once the files are restored, it may take a few minutes to load the NDS (if it was restored).
9 - Restoring Backups
2. The total size of the file selection and the total number of files selected appear in the Selected for Restore section. 3. To view and/or select individual database tables, highlight a database and click Show Files. 4. Click Next >.
9 - Restoring Backups
F1 Help: See Select database restore location screen (MS SQL / PostgreSQL / MySQL) on page 824. 2. Select the restore location: Original location - By default, the restore will be to the original backup location. This will overwrite any existing files of the same name. Alternate location - see MS SQL Server Backup Sets (Alternate Location Restore) on page 266. 3. Select the Restore Options. 4. Click Next >.
9 - Restoring Backups
9 - Restoring Backups
3. The total size of the file selection, and the total number of files selected appear in the Selected for Restore section. 4. Repeat 1-2 for as many databases as required. 5. Click Next >. DS-Client will try to detect if a Recovery Storage Group (RSG) exists on selected Exchange server. An RSG is a specially defined location on an MS Exchange 2003 server where any recovered data is saved. Note: This process may take a while, depending on your network environment. If an RSG exists, the selected database will be restored to that location. A popup message will inform you of this. Note: The target Exchange servers RSG must use the exact name "Recovery Storage Group".
9 - Restoring Backups
F1 Help: See Select database restore location screen (Microsoft Exchange) on page 824. 2. Select the restore location: Original location - By default, the restore will be to the original backup location. This will overwrite any existing files of the same name. Alternate location - see MS Exchange Server Backup Sets (Alternate Location Restore) on page 268. 3. In the Restore Options section, check all options that you require. 4. Click Next >.
9 - Restoring Backups
9 - Restoring Backups
9 - Restoring Backups
9 - Restoring Backups
9 - Restoring Backups
9 - Restoring Backups
2. To filter for specific E-Mails, click Filter. F1 Help: See Select Filter on page 829. In the Select Filter screen, specify the filter conditions. You can make complex filters with the AND, OR, and BRACKETS. When finished, click OK. The Restore Wizard will only display those E-Mails that match the filter description. Select the item(s) you want. 3. Click Next >.
9 - Restoring Backups
2. Select the restore location: Original location Alternate location - You must select the alternate server and the dump location, then map the Source Mailbox to the Destination Mailbox. 3. Click Next >.
9 - Restoring Backups
F1 Help: See Backup Objects for ... (System i Server and Backup from the Cloud) on page 748. d)Use the "Select"/"Deselect" buttons to selectively restore only the objects you need. Unselecting objects has no influence on the restore speed if the objects were backed up without the "Individual obj." option. 2. Repeat 1 for as many items as required. 3. Click Next >.
9 - Restoring Backups
2. Select the restore location: Original location Alternate location - You must select the alternate server and the dump location, then map the Source Library to the Destination Library. 3. Click Next >.
9 - Restoring Backups
9 - Restoring Backups
9 - Restoring Backups
9 - Restoring Backups
F1 Help: See Select the VSS Restore Method on page 852. VSS Restore: Performs an online restore of the selected backup session to the original backup source (or alternate location) using the target computers Microsoft VSS tools. File Restore: Allows you to selectively restore individual files from a backup session. These are pure file restores, which can be useful with the corresponding Microsoft SQL Server, Exchange or SharePoint management tools. Granular Restore: This applies to SharePoint 2010 only. See Item-Level Restore of SharePoint 2010 in the Knowledge Base Article Backup / Restore of Microsoft SharePoint 2010 (VSS-aware backup sets) on page 655.
Generated on: 10/15/12 Page: 251
Confidential.
9 - Restoring Backups
VSS Restore: Performs an online restore of the selected backup session to the original backup source (or alternate location) using the target computers Microsoft VSS tools. File Restore: Allows you to selectively restore individual files from a backup session. These are pure file restores, which can be useful with the corresponding Microsoft SQL Server, Exchange or SharePoint management tools. 2. Browse through the tree and check the item(s) you want. 3. Click Next >.
9 - Restoring Backups
For more information, see the F1 help for this screen. 3. Click Next >.
9 - Restoring Backups
F1 Help: See Select restore level (VMware VADP) on page 840. 2. Select what type of VMware VADP restore you want to perform. VM-level Restore: Restore entire Virtual Machines. VM Disk-level Restore: Restore individual virtual disks from a backed up Virtual Machine. 3. Click Next >.
9 - Restoring Backups
F1 Help: See Select restore location screen on page 840. 2. Select the restore location: Original location Alternate location - For more information, see VMware VADP Backup Sets (Alternate Location Restore) on page 273. 3. Click Next >.
9 - Restoring Backups
F1 Help: See Select restore options screen on page 842. 2. VM-level Restore: Additional Restore Options are available when restoring an entire Virtual Machine. For each selected VM, you can specify the following options: Power on VM after restore: Starts the virtual machine if it is successfully restored. Unregister VM after restore: After successful restore, the virtual machine will be unregistered from the vCenter. Append timestamp to VM name: Appends the restore time to the end of the virtual machines name. For example: RestoreVM would be restored as RestoreVM_(yyyy-mm-dd-hh:mm:ss) when you view it from the vCenter. 3. Click Finish to begin the restore.
9 - Restoring Backups
9 - Restoring Backups
F1 Help: See Cloud database upload tool on page 757. 2. In the Select SalesForce DB File Location section: Click [>>] and select the Local Storage folder containing the specific SalesForce.com database dump file you want to use for the upload.
9 - Restoring Backups
3. Once a dump file has been selected, the Cloud database upload tool screen displays all the tables from the selected dump.
To select tables, highlight the item in the left column and click the [+] button. The table(s) will move to the right column, meaning they are selected for upload. 4. In the Connect to SalesForce with section, you must supply your SalesForce.com user credentials.
F1 Help: See Specify Credentials (Windows DS-Client) on page 884. Click [>>] to open the Enter / Modify Network Credentials screen. Enter the Salesforce.com username and password. Select the target database for backup (Production or Sandbox). Type or copy the security token that was E-Mailed to you by Salesforce.com. You can request the security token from the Salesforce.com website (Setup > My personal information > reset my security token). Click OK. DS-Client will immediately connect to verify the credentials.
9 - Restoring Backups
5. If the SalesForce.com credentials work, the Upload button activates on the Cloud database upload tool screen.
6. Click Upload. The upload process begins as DS-Client connects to your SalesForce.com account. Uploaded table data is appended to any existing tables.
9 - Restoring Backups
9 - Restoring Backups
2. Browse through and highlight the computer that you want. 3. Click Select. If you are using Domain Security, your current login credentials are used to access the destination computer. Otherwise: If the Ask for Network Credentials box is checked, you are prompted for credentials to the destination computer. The Enter Network Credentials screen appears. Enter the User Name and password and click OK. 4. The Restore Now Wizard reappears. The Location field contains the alternate computer information.
9 - Restoring Backups
2. Select one of the shares from the Destination List. Depending on your DS-Client computer, the Share Path cell may show the path of the destination directory on the selected computer.
9 - Restoring Backups
2. The Select Directory screen appears. Browse through and highlight the directory where you wish to restore the backup.
3. Click Select. The Restore Now Wizard reappears with the directory information in the Path cell.
9 - Restoring Backups
4. Truncate: If the selected restore item(s) contain a common restore path, you may shorten that portion of the restore path by increasing the truncate level in the number field. Truncated portions of the restore path will disappear. 5. Click in the number field beside the Truncate field. The number represents the number of subdirectories in the current restore path. 6. Click the upward arrow to increase the truncation, and to reduce the number of subdirectories from the rightmost directory. Note: When restoring to an alternate location, if the entire path is truncated, the alternate location directory will inherit the security of the truncated parent directory. 7. Click Next >. The Restore Now Wizard switches to its Select restore performance options screen. 8. Click Next > The Select restore options screen appears. 9. Click Finish to start the restore. The Restore Process screen appears, showing the progress of each file as it is restored.
9 - Restoring Backups
2. Check the Alternate Location radio button. This activates the >> buttons and alternate location section. To restore to a different directory on the same server, skip to step 6. To restore to a different server on the network, follow from step 3. 3. Click >> beside the Location field. The Alternate Database Server Wizard screen appears, allowing you to browse the available servers on the network. 4. Browse through and highlight the server where you want to restore the backed up database. 5. Click Select: If the Ask for Network Credentials box is checked, the Enter Network Credentials screen appears. See Ask for Network Credentials: on page 99 If the Ask for Database Credentials box is checked, the Enter Database Credentials screen appears. See Ask for database credentials on page 117 6. If all your credentials are valid, the Select Restore Location screen reappears with the Alternate Server in the Location field.
9 - Restoring Backups
7. Click >> beside the Dump field. This brings up the Select Share & Path for the Database Dump screen.
8. Browse through and choose the computer and path for the database dump. Click Select. Note: You may select the DS-Client Buffer as an option for the database dump, if none of your shares has sufficient capacity. This will save the dump to the local storage on the DSClient computer. Similarly, you may choose the DS-Client Pipe option to bypass a dump file altogether. 9. When restoring to a different location, you must re-specify the Destination Database for each item. Do so by double clicking on the Destination cell adjacent to the source name. The spreadsheet table will contain the list of databases (and/or tables) specified for restore. Each line has four columns, which initially contain default restore information:
Source Destination Database This cell shows the title of the database (or database\table name in the case of tables). This cell shows the destination database where the backup set will be restored.
11. Follow the same steps if you are restoring individual database tables. 12. In the Restore Option Section you may choose from the following:
Restore only the dump file(s) Restore Path Restores the dump files, but does not load them as databases (this option is not available for DS-Client Pipe). When restoring to an alternate location, you can specify the path for the log and data files separately. Opens the Select Restore Path screen.
This option only applies to restores to the original location. Off (default) - The restored files will be placed on the target instance's Preserve original default path(s). database file location On - The restore files must be placed in their original path(s). If the original path(s) do not exist, the restore will fail.
13. Click Next >. The Restore Now Wizard switches to its Select restore performance options screen. 14. Click Next >. The Select Restore Options screen appears. 15. Click Finish when you are ready to start the restore. The Restore Process screen appears, showing the progress of each file as it is restored.
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
9 - Restoring Backups
3. Click >> beside the Location field. The Alternate Exchange Server Wizard screen appears, allowing you to browse the available servers on the network.
9 - Restoring Backups
4. Browse through and highlight the server where you want to restore the database. Click Select. If the Ask for Network Credentials checkbox is marked, the Enter Network Credentials screen appears. Enter the user name and password to connect to the server and Click OK. 5. The Restore Now Wizard returns. Click Next and continue from Step 4. Specify the Restore Performance Options on page 238.
9 - Restoring Backups
9 - Restoring Backups
F1 Help: See Select restore location screen on page 840. 3. A Rename Component button appears for alternate location restores. Click to open the Rename Component screen, which allows you to rename individual components
9 - Restoring Backups
F1 Help: See Rename Component screen on page 810. To change a component name, click in the target cell and rename as required. Click OK to save the component name mapping. 4. The Restore Now Wizard returns. Click Next and continue from Step 5. Specify the Restore Performance Options on page 252.
9 - Restoring Backups
9 - Restoring Backups
In the Path field, manually enter the IP address of the VMware ESX server or VMware vCenter server in the following format:
VMware VADP\IP_Address
Click Select. A popup appears where you must supply the VMware logon credentials and click OK. 5. The Restore Now Wizard returns. Map the selected restore item(s) to the Destination server. VM-level alternate restores: If you are restoring a virtual machine and have connected to an alternate VMware vCenter Server you can select the Datacenter, folder path, virtual machine name, Host and Datastore to which you will restore the virtual machine.
If you are restoring a virtual machine and have connected to an alternate ESX host server you can select the virtual machine name and the Datastore to which you will restore the virtual machine. VM Disk-level alternate restores: If you are restoring a virtual disk and have connected to an alternate VMware vCenter Server you can only select the Datacenter, folder path, virtual machine and Datastore to which to attach the virtual disk.
If you are restoring a virtual disk and have connected to an alternate ESX host server you can only select the virtual machine and the Datastore to which to attach the virtual disk. 6. Click Next and continue from Step 5. Specify the Restore Options on page 256.
9 - Restoring Backups
9 - Restoring Backups
F1 Help: See Validation Wizard - Set Validation Settings on page 893. 4. Enter the DS-Client Encryption Key(s). 5. Select the type of Validation: All: All generations of all data in this backup set will be validated. Selective: Allows you to specify the file(s) to validate. 6. Click Next >.
9 - Restoring Backups
7. The Validation Wizard switches to the Select directories/files for validation screen. This screen is the same as the one used in the Restore Wizard.
8. Select the items you want to validate (everything will be selected if you specified All in the previous screen). 9. Click Finish to start the Validation.
This section provides information on the premium services that may be offered by your Asigra Cloud Backup Service Provider.
Initial Backup
The DS-Client service is designed to perform automated backups to an offsite location. This approach requires an adequate communication link between the DS-Client and the DS-System that allows backup of any changed data in the given time window. After the first (initial) backup, the DS-Client service backs up only the incremental changes. However, there may be a problem performing that first backup of a large baseline amount of data. If the communication link between the DS-Client and the DS-System cannot handle this baseline backup in a reasonable amount of time (e.g. a few days), then an Initial Backup can be performed. Use the LAN Storage Discovery Tool (See LAN Storage Discovery Tool on page 329.) to analyze your LAN. Use Statistical Backup Sets (See Statistical Backups on page 177.) to calculate the amount of data to transmit. Divide this number by your communications bandwidth to estimate how long this baseline backup will take. The Initial Backup feature allows you to backup to local buffer location(s) that are either directly connected to the DS-Client, or visible to it on the LAN. Then, you ship that media (e.g. disks) to your Service Provider. Your Service Provider will import the Initial Backup data from the media (either attached to the DS-System, or via a LAN connection). Once it is imported to the DSSystem, you can continue protecting your data with subsequent scheduled and on-demand backups. The following steps describe the Initial Backup Service: 1. Your DS-Client must be registered with the DS-System. 2. Configure the Initial Backup buffer path. See Configure Initial Backup Path (Buffer) on page 280. 3. Create the Initial Backup Set(s). See Create Initial Backup Set on page 281. 4. Perform a Backup of all Initial Backup Sets to the Initial Backup buffer. See Perform a Demand Backup on page 211. 5. Ship the Initial Backup buffer media to your Service Provider. 6. Monitor the status of Initial Backup Sets. Once your Service Provider has imported a backup set, it will disappear from the Initial Backup Status screens list of Initial Backup Sets. See Monitor Initial Backup Sets on page 282. More information can be found in the Knowledge Base article: Best Practices: Initial Backup on page 533.
F1 Help: See Set Initial Backup Path on page 854. 2. Click Add. The Select Initial Backup Path screen is slightly different, depending on if this DS-Client is running on Windows or Linux.
F1 Help: See Select Initial Backup Destination Path on page 831. Specify the Computer and Directory for the Initial Backup path. Use a descriptive name for paths (to make it easier for your Service Provider to identify the DS-Client associated with the data). If desired, select an Encryption Method for the meta-data (the descriptive files used by Asigra Cloud Backup to manage the Initial Backup). Click OK to save the path.
F1 Help: See Set Properties - Options tab on page 862. F1 Help: See Set Properties - Options tab (Linux DS-Client) on page 866. 2. The Initial Backup Settings screen appears.
F1 Help: See Initial Backup Settings on page 786. 3. Highlight the Initial Backup path you want to use for this backup set. Click OK. Assign an Initial Backup Path to backup sets from only one DS-Client. (Do not assign the same path to backup sets from two or more DS-Clients.) 4. Finish the New Backup Set Wizard, or click Apply if you are editing from the backup sets Properties Tab. 5. Perform a Demand Backup of all Initial Backup Sets to the Initial Backup buffer. See Perform a Demand Backup on page 211.
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
F1 Help: See Initial Backup Status on page 786. 2. Before sending an Initial Backup buffer (the physical media) to your Service Provider, make sure all the backup sets have Completed for their Set Status. 3. Once an Initial Backup Set has been imported to the DS-System, it will disappear from the Initial Backup Status screen.
Disc/Tape
Disc/Tape is a tool that allows you to copy backed up files from the DS-System to any media supported by your Service Provider (e.g. CD/DVD, Tape, Hard Disk Drive, or USB). This allows you to have a copy of backed up data on hand (at your location). Data on the Disc/Tape media must be restored through the DS-Client. The steps are as follows: Step 1. Request Disc/Tape on page 283 Step 2: View Orders for Disc/Tape on page 285 Step 3. Restore from Disc/Tape on page 286
F1 Help: See Select restore media & options screen on page 842. 3. Select the Media and Option for the Disc / Tape request.
If you chose the Snapshot option, the entire backup set will be selected and you will not be able to change any settings. If you chose the Selective option, you must choose the directories/files for restore. Do this in the same manner as for regular restores. 5. Once you are satisfied with the selection, click Finish. 6. The Disc/Tape Mailing Information screen appears.
F1 Help: See Disc / Tape Mailing Information screen on page 763. 7. Enter the pertinent mailing information and click OK to proceed. Note: This has the same effect as signing a Purchase Order Contract.
8. The DS-System will then mirror all of the selected files (from the Request Process) to a buffer directory at the DS-System (i.e. your Service Provider's site). Your service provider will then make the Disc/Tape order from this buffer. Note: This backup set will not be accessible (for backup) until your service provider makes the Disc/Tape.
F1 Help: See Orders for Disc / Tape screen on page 795. 2. The columns show details and the status of each order.
F1 Help: See Select Disc / Tape Restore Path screen on page 827. 2. Click >> to select the computer.
See Step 2. Select the Computer on page 99 3. The computer field is filled with your selection.
5. Your selection appears in the Directory field. A field appears if you need to enter an encryption key. 6. Click OK. The Restore from Disc/Tape Wizard Select directories/files to restore tab appears.
8. Click Next >. The Select restore options tab appears. Specify any restore options.
F1 Help: See Set Properties - Options tab on page 862. F1 Help: See Set Properties - Options tab (Linux DS-Client) on page 866. 3. Click OK.
3. 4. 5.
6. 7.
F1 Help: See Schedule screen on page 816. In the Details section, choose <new> to create a new detail. Check Perform BLM. Click [>>] beside Perform BLM. The Select BLM Options screen appears. F1 Help: See Select BLM Options on page 822. Use these settings to configure what will be archived, and how the BLM will handle the data when this schedule is run. Click OK. Click Save.
F1 Help: See Tape Converter - Select the backup set on page 891.
3. When this screen opens, the Tape Converter automatically counts how many physical tapes are in the drives. At first, all tapes appear under Unidentified Tapes. This is because identifying a tape requires more intense use of the tape drive (it must be loaded and read).
Refresh: Updates the screen with the latest information that DS-Client has from the Tape Librarys memory. Identify Tape: Scans the highlighted tape for information about the backup data on the tape. Note: If the DS-Client service is restarted, all tapes will be reset to Unidentified Tapes. 4. If you need to identify a tape, highlight it and click Identify Tape. A new activity will start (a separate Process Monitor will appear). When this activity has finished, you must click Refresh to update the list. IMPORTANT NOTE ABOUT CHANGING TAPES The DS-Client Tape Converter depends on Windows to interface with the Tape Drives. Therefore, you must change tapes in a way that Windows will always be aware of your changes. To change a tape: Open the Tape Drive door, and take a tape out from its slot. Close the Tape Drive door. Let Windows perform its inventory, and the removed tape will be marked as off-line. Open the Tape Drive door again, and put the new tape in the empty slot. Close the Tape Drive door. Windows will identify the new tape. After Windows finishes its identification of the Tape, you must click Refresh in the Tape Conversion Wizard to update the DS-Clients list from the Tape Librarys memory.
5. Once a Tape has been identified, all the backup set(s) on that tape appear in the list. .
Note: You can only convert from a tape that has been identified. 6. Highlight the level that you want to convert: Computer Name: converts all backup sets listed for that computer. Backup Set: converts the highlighted backup set. 7. Click Next. The Tape Conversion Wizard prompts you to select the backup data to convert.
Select the data to convert. By default, the entire backup set is selected. 8. Click Next. The Tape Conversion Wizard prompts you to specify the conversion options.
F1 Help: See Tape Converter - Options on page 891. Before Conversion: The current implementation does not require any input. If the tape is in MTF, DS-Client can convert the data without entering any password(s). After Conversion: You must specify the location where DS-Client will save the Archive Package. The BLM Session and Backup Set Name are labels that will help you find the Archive Package after it is imported to the BLM Archiver.
9. Click Next. The Tape Conversion Wizard displays a summary of the tape data you are about to convert.
F1 Help: See Tape Converter - Summary on page 891. 10. Click Finish. A Tape Conversion Process Window opens. When the conversion is finished, the data in the Target Path can be shipped to your Service Provider for import to the BLM Archiver. After the data has been imported to the BLM Archiver, you can request Restorable Images. (See Restore from BLM on page 293.)
F1 Help: See DS-NOC Settings on page 772. 2. The information displayed in this screen is read-only. It is obtained from the DSSystem. The buttons allow you to perform the following tasks: Configure a Proxy Server: See Configure DS-Client to connect to DS-NOC via a Proxy Server on page 300. Check New Settings: Connects immediately to the DS-System to obtain the latest settings. DS-Client automatically updates these settings on every connection with DS-System. Connect to DS-NOC: Immediately connects this DS-Client to the DS-NOC server to send its monitoring information.
To configure the DS-NOC Proxy Server: 1. Setup Menu > DS-NOC Settings. 2. In the DS-NOC Settings screen, click Proxy Server.
F1 Help: See DS-NOC Proxy Server Settings on page 773. 3. There are 4 options available in this screen: No proxy: This is the default setting. DS-Client connects directly to DS-NOC. The protocol (HTTP or HTTPS) will be automatically selected based on the DS-NOC address provided by the DS-System. Auto-detect proxy settings for this network: - See Auto-detect Proxy Server on page 301. Manual proxy configuration: - See Manual Proxy Server Configuration on page 301. Automatic proxy configuration URL: -
- See Automatic Proxy Server Configuration URL on page 302. 4. If the Proxy Server requires authentication, you can supply the User Name and Password at the bottom of the screen. 5. Click OK to save the configuration.
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
If DS-Client finds the WPAD URL (using either DHCP or DNS), it will load and analyze it. Then it will use the proxy server specified to connect to DS-NOC. If DS-Client fails to find the WPAD URL, it attempts the next method: 2. Internet Explorers configuration: This is the equivalent of opening Internet Explorer (if logged in to Windows as the DS-Client service account) and checking the Tools menu > Internet Options > Connections tab > LAN Settings: Proxy Server. Windows DS-Client will try to find the DS-Client Service Accounts Internet Explorer configuration to get the proxy server settings. If DS-Client fails to find a proxy server, it attempts the next method: 3. WinHTTP settings: This method checks the DS-Client computers registry for a default proxy server setting. The WinHTTP default setting is saved in the Windows Registry. It is defined by using the "proxycfg.exe" command (Windows 2003 & Windows XP) or the "netsh winhttp" command (Windows 2008, Windows Vista, and Windows 7).
Note:
For all options (except No proxy), if DS-Client fails to find a correct proxy server, it will try to connect to DS-NOC directly. The protocol (HTTP/HTTPS) will be automatically selected based on the address provided by the DS-System.
The Set Properties Options Tab will contain the following additional checkboxes: Save on Local Storage: Enables local storage for the backup set. Transmission cache on Local Storage: Local Storage Cache on page 305
3. In the Local Storage Path field, enter a path where snapshots of the latest backup of each selected Backup Set will be stored. When a path is entered, the Save on Local Storage checkbox appears in the Options Tab of the Backup Set Properties screen.
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
For new backup sets, this feature is activated on the last tab of the New Backup Set Wizard (Choose the name for this backup set). 4. After Use Local Storage select Save. By default, this backup set will use the same Local Storage Path set in Set the Local Storage Path (Default) on page 303. Click [>>] to specify a different Local Storage Path for this specific backup set. Local storage will be used for this backup set starting from the next backup session. 5. Click OK to save any modifications.
Note:
The Local Storage Cache feature extends the capability of the local storage to provide a cache if the connection from DS-Client to DS-System is interrupted during a backup session. This reduces the possibility of missed backup sessions in normal operating environments. 1. Browse the Backup Set Tree and highlight the backup set you want. 2. Right-click and select Properties. The Backup Set Properties screen appears on the Items Tab. 3. Click the Options Tab Note: For new backup sets, this feature is activated on the last tab of the New Backup Set Wizard (Choose the name for this backup set). 4. After Use Local Storage select Cache. By default, this backup set will use the same Local Storage Path set in Set the Local Storage Path (Default) on page 303. Click [>>] to specify a different Local Storage Path for this specific backup set. Any data that is cached by this feature will be saved in this Local Storage Path in a sub-folder called Cache. Data in the Local Storage Cache will be forwarded to the DS-System when the connection can be re-established. In the meantime, subsequent backups from this set will accumulate in the cache. 5. Click OK to save any modifications.
Multi-Tenant DS-Client
NOTE: This option adds a customer layer to the backup set data, which enables the DS-Client administrator to assign and sort backup sets by this customer tag.
This is a configuration of the DS-Client that allows the administrator to assign a customer to individual backup sets for sorting purposes. This allows reports to be generated and sorted by customer (in addition to all other current functionality). All other features of DS-Client remain the same whether or not the Multi-Tenant mode is enabled. To enable the Multi-Tenant DS-Client mode: 1. Activate the Multi-Tenant feature on page 307 2. Create the Customers for this Multi-Tenant DS-Client on page 308 3. Assign existing backup sets to a customer (Edit backup sets) on page 309 4. New backup sets for Multi-Tenant DS-Client on page 310 5. Reports from Multi-Tenant DS-Client on page 311
3. 4. 5. 6.
F1 Help: See DS-Client Configuration Advanced Tab screen on page 763. From the Category dropdown list, select Miscellaneous. From the Parameter dropdown list, select Multi-Tenant. From the Value dropdown list, select Yes. Click Apply. The DS-Client immediately enters Multi-Tenant mode:
Multi-Tenant OFF
Multi-Tenant ON
The Backup Sets Tree adds the customer level as the root branch (by default it will have <Customer Unspecified>). A Multi-Tenant item appears in the Setup menu.
F1 Help: See Customer Management on page 760. 2. To add a new customer, click Add. To edit a customer, highlight one and click Modify. The Customer Information screen appears.
F1 Help: See Customer Information on page 759. 3. To add a new customer, click Add.
2. Right-click on the backup set you want to assign and select Properties. The Set Properties - Items tab appears. 3. Click Set Info. In the Set Information section, assign a customer to this backup set.
5. When you are finished, the Backup Sets tree will be sorted by customer.
F1 Help: See Choose the name for this backup set screen on page 755. F1 Help: See Choose the name for this backup set screen (Linux DS-Client) on page 756. Once a backup set is created, you can adjust its customer assignment from the Set Properties - Set Info tab.
Generated on: 10/15/12 Page: 310
Confidential.
You can view <All> customers, or only data from a specific customer.
2. All other steps and instructions are the same as for regular reports. For instructions, see: Print Reports on page 369
Snapshot Manager
NOTE: This feature integrates the DS-User GUI with Storage volumes to manage their native SnapVault feature. DS-Client does not process any data from the storage. [Linux DS-Client only] This tool must be enabled by your Service Provider from the DS-System. This feature allows you to use the DS-User GUI as a tool to transfer volumes\qtrees to another volume without having to use the scripting required by the native Storage management software.
F1 Help: See Snapshot Transfer - Register Storage Management screen on page 880. 2. To add a new storage, click New. The New Storage screen appears. To edit an existing Registered Storage, highlight it and click Edit. The Modify Storage screen appears.
F1 Help: See Snapshot Transfer - New / Modify Storage screen on page 881. 3. Configure the Storage connection information. 4. Click OK to save the connection information for this Storage. DS-Client will immediately verify that it can communicate. If successful, the Storage is added to the list.
2. Configure the Snapshot Retention Policies that can be used for Snapshot Transfer
[Optional, but recommended] You should configure the list of Retention Policies this DS-Client can apply to the snapshots taken by the Snapshot Manager. Each Snapshot Transfer that is configured can be assigned to one Retention Policy. 1. Snapshot Manager Menu > Snapshot Retention. The Snapshot Retention Management screen appears.
F1 Help: See Snapshot Transfer - Snapshot Retention Management screen on page 880. 2. To add a new Retention Policy, click New.The New Snapshot Retention screen appears. To edit an existing Retention Policy, highlight it and click Edit. The Modify Snapshot Retention screen appears.
F1 Help: See Snapshot Transfer - New / Modify Snapshot Retention screen on page 881. 3. Configure the Retention Policy. 4. Click OK to save the Snapshot Retention Policy. A Retention Policy is applied at volume-level, meaning that all Snapshot Transfers for the same volume will have the same Retention Policy WARNING: Once retention is enforced, any deleted snapshots are gone forever.
3. Configure the Snapshot Schedules that can be used for Snapshot Transfer
[Optional, but recommended] You should configure the list of Schedules this DS-Client can use for Snapshot Transfer. Each Snapshot Transfer that is configured can be assigned to one Snapshot Schedule. 1. Snapshot Manager Menu > Snapshot Schedule. The Snapshot Schedule Management screen appears.
F1 Help: See Snapshot Transfer - Snapshot Schedule Management screen on page 881. 2. To add a new Snapshot Schedule, click New. The New Snapshot Schedule screen appears. To edit an existing Snapshot Schedule, highlight it and click Edit. The Modify Snapshot Schedule screen appears.
F1 Help: See Snapshot Transfer - New / Modify Snapshot Schedule screen on page 882. 3. Configure the Snapshot Schedule. 4. Click OK to save the Snapshot Schedule. A Schedule is applied at volume-level, meaning that all Snapshot Transfers for the same volume will have the same Schedule.
2. To add a new Snapshot Transfer configuration, click Snapshot Transfer Setup. The Snapshot Transfer Setup Wizard appears on its Select Source Storage screen.
F1 Help: See Snapshot Transfer Setup Wizard - Select Storage screen on page 882. Select the source Storage, from which the volume data will be read. 3. Click Next. The Snapshot Transfer Setup Wizard appears on its Select Volume screen.
F1 Help: See Snapshot Transfer Setup Wizard - Select Volume screen on page 883. Select the volume on the source Storage that will be protected.
4. Click Next. The Snapshot Transfer Setup Wizard appears on its Select Destination Storage screen.
F1 Help: See Snapshot Transfer Setup Wizard - Select Storage screen on page 882. Select the destination Storage, where the data will be copied. 5. Click Next. The Snapshot Transfer Setup Wizard appears on its Select Volume screen.
F1 Help: See Snapshot Transfer Setup Wizard - Select Volume screen on page 883. Select the volume on the destination Storage where the data will be copied.
6. Click Next. The Snapshot Transfer Setup Wizard appears on its Select Snapshot Retention screen.
F1 Help: See Snapshot Transfer Setup Wizard - Select Snapshot Retention screen on page 882. Note: This screen only appears for the first Snapshot Transfer created on a destination volume. If you create a new Snapshot Transfer on a destination volume where a Retention Policy is already defined, this step is skipped. (Optional) Select a Snapshot Retention Policy for the destination volume. 7. Click Next. The Snapshot Transfer Setup Wizard appears on its Select Snapshot Schedule screen.
F1 Help: See Snapshot Transfer Setup Wizard - Select Snapshot Schedule screen on page 882. (Optional) Select a Snapshot Schedule for the destination volume.
Generated on: 10/15/12 Page: 319
Confidential.
8. Click Next. The Snapshot Transfer Setup Wizard appears on its Specify Snapshot Transfer Name screen.
F1 Help: See Snapshot Transfer Setup Wizard - Specify Snapshot Transfer Name screen on page 883. Note: This screen only appears for the first Snapshot Transfer created on a destination volume. If you create a new Snapshot Transfer on a destination volume where a Schedule is already defined, this step is skipped. Assign this Snapshot Transfer configuration a name and (optionally) a Bandwidth Throttle and description. 9. Click Finish. The initial transfer from source to destination is triggered immediately after the Snapshot Transfer is created.
This section provides information on how to use the system logs and other system administration tools.
Activity Log
The Activity Log is a tool that is useful for tracking the activities on the DS-Client. You will only be able to view activities that you have permission to see. 1. Logs menu > Activity Log. The Activity Log Viewer screen appears.
2. 3. 4. 5.
6. 7.
F1 Help: See Activity Log viewer screen on page 737. Click Find. The activities that are displayed reflect the parameters in the Select By section. You can change the Select By parameters if you would like to search for activities from a specific time, a particular type of activity, a specific node/backup set or user, etc. Click Find to refresh the display with the activities that meet your Select By specifications. If an error occurred during the selected activity, a record of what happened is kept in the Event Log. Click Event Log to display specific event information on the highlighted activity. If detailed information exists for an activity, you can click Detailed Log. See Detailed Log on page 324. Click Close when you are finished.
Detailed Log
This feature is available if the selected activity contains Detailed Log information (refer to Step 5. Specify Backup Set Options on page 103). This means a log of all the files processed in the selected session was recorded. DS-Client dumps all detailed logs to a folder called asigra_archivlog. By default, this is located in the DS-Client installation directory, but can be configured from the DS-Client Configuration Advanced Parameter screen (Category:Miscellaneous ; Parameter: LogArchivePath). See DSClient Advanced Configurations on page 47. For Grid DS-Clients, the default (if LogArchivePath is not configured) is each node will write to the asigra_archivlog folder in its own (local) DS-Client installation directory for the activity sessions it performs. However, the DS-User can only access the Detailed Log on the Main Node. To ensure the Detailed Log for all sessions is accessible, configure LogArchivePath to a UNC path (which can be accessed by all nodes). 1. In the Activity Log, highlight the activity session you would like to view. 2. Click Detailed Log. The Detailed Log Viewer appears, which displays the processed files in list format.
F1 Help: See Detailed Log Viewer on page 762. 3. Select a filter (the default is *, meaning ALL) and click Find. 4. You can narrow the list by using the Path Filter. Note: When you search a Detailed Log, you are actually searching through the file stored in the asigra_archivlog folder. You (the end-user) must make decisions about the maintenance for this folder (e.g. delete / archiving). By default, the logs will constantly accumulate.
Event Log
The Event Log is a searchable log that records events that occur on the DS-Client. Events include errors, warnings, and information messages. 1. Logs menu > Event Log. The Event Log Viewer screen appears.
F1 Help: See Event Log Viewer screen on page 779. 2. You can change the Select By parameters to narrow your search. 3. Click Find to refresh the display based on the Select By settings.
Event Filter
Events come with a default severity. Over time, you may notice that some events should have either higher or lower severity than the default. The Event Filter allows you to alter the Event Log by over-ruling an events default severity with your custom setting. 1. Setup menu > Event Filter. The Event Filter screen appears.
F1 Help: See Event Filter on page 778. 2. To add a new filter, click New. To edit an existing filter, highlight it and click Edit.
F1 Help: See Add / Edit Event Filter on page 738. 4. Select the following:
Event # Category This must be the exact event number, as it appears in the Event Log Viewer. This must be the same category as the corresponding event number, as it appears in the Event Log Viewer. Select what Event Severity to apply. This over-rules the default for the corresponding event. Remember: this can affect the notifications that are sent. Information Warning Error Shows the corresponding description for this event. This field cannot be edited.
Type
Description
5. Click OK to save the Filter. The Event Filter screen returns with the updated information. 6. Click OK to save the settings and close the Event Filter screen. The next time the filtered event(s) appear in the Event Log Viewer, the Filter will apply the designated severity type (over-ruling the default setting). The filter only applies if both the Event # and Category match with a corresponding event.
Audit Trail
The audit trail is a log that records all of the changes made to the DS-Client database. You can see who has made changes to the database, when, and what the changes were. 1. Logs menu > Audit Trail. The Audit Trail screen appears.
2. 3. 4. 5.
F1 Help: See Audit Trail screen on page 746. Click Find. You can change the Select By parameters to narrow the display: Click Find to refresh the display based on the information you specified. Click Close when you are finished.
2. For more information, double-click a process. 3. The Process Window opens in the space to the right of the backup sets tree. From here you may monitor details, or stop the activity. F1 Help: See Process Window screen on page 807. Note: Since most processes are multi-threaded, they may finish faster than the GUI can refresh the screen. The Working on section displays a file currently being processed and last directory scanned, but these are independent of one another and might not correspond.
The following four steps are used with this tool: Step 1. Share Discovery: You select the networks \ computers to scan, and supply the list of credentials to use for connection. The first step depends on the type of DS-Client you are using: Step 1. Share Discovery (Windows DS-Client) on page 330 Step 1. Share Discovery (Linux DS-Client) on page 332 Step 2. Scan Shares on page 334: You can modify the discovered list of shares to scan. You can set the Scan to run with a Schedule. Step 3. Scan Monitor on page 336: Shows a real-time monitor of the Scan Process (at the share level). Step 4. File Summary on page 337: A list of the files scanned on the LAN. You can view additional details about particular files (file duplication, etc.). Additional LAN Storage Discovery Reports can be generated using the information from the File Summary: LAN Storage Discovery Reports on page 340
F1 Help: See Select items for network share discovery screen on page 834. 3. From the Network tree, specify each item you wish to scan and click Add. Clean Share List: removes any previously scanned shares with size of 0. 4. When you have added all the network items you wish to scan, click Next. The Wizard switches to the Network Credentials tab.
F1 Help: See Specify network credentials for LAN Share Discovery screen on page 888.
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
5. In the Additional credentials section, click Add. The Set Credentials screen appears.
F1 Help: See Set Credentials screen on page 853. 6. Enter the credentials, and click OK. 7. Continue steps 5-6 until you have input all the credentials you want to use for the Share Discovery. Once you are satisfied with the settings, click Finish. The LAN Share Discovery Process Window appears.
8. This process may take some time, especially on a large LAN. 9. When complete, a list of the discovered shares will appear in Tools Menu > LAN Storage Discovery > Scan Shares: Share List (See: Step 2. Scan Shares on page 334).
F1 Help: See Select items for network share discovery screen (Linux DS-Client) on page 835. 3. On the left side of this Wizard, browse to select a network \ item you wish to scan and click Add. If the Ask for credentials box is checked, that screen appears. Enter the credentials and click OK. (UNIX-SSH only) If the sudo as an alternate user box is checked, that screen appears. Enter the credentials and click OK. (UNIX-SSH only) If the Advanced connection options box is checked, that screen appears. Enter the connection options and click OK. 4. The item appears in the Selected Items for Discovery list on the right side of this Wizard Tab. 5. Continue adding items until the Discovery list contains all the locations you wish to scan (to discover shares).
6. Click Next. The Wizard switches to the Clean previous unscanned shares in list tab.
F1 Help: See Clean previous shares in list (Linux DS-Client) on page 757. This screen shows a summary of the previous (Scan Shares) scan. If you select Clean share list, any shares with a Scanned Size of 0 will be automatically removed from the current Scan Shares List. However, they will be added again, if the previous Wizard Tab (Selected Items for Discovery) still contains them. 7. Once you are satisfied with the settings, click Finish. The LAN Share Discovery Process Screen appears.
8. This process may take some time, especially on a large LAN. 9. When complete, a list of the discovered shares will appear in Tools Menu > LAN Storage Discovery > Scan Shares: Share List (See: Step 2. Scan Shares on page 334).
F1 Help: See Scan Shares screen on page 815. 3. Click Share List. 4. The Share List screen appears with the enabled/disabled shares on the LAN to scan.
F1 Help: See Share List screen on page 878. TIP: 1st time scan all. Subsequent scans you can disable / enable shares to your scan requirements. (e.g. if you wish to do a quick scan of only one share.)
5. You can automate the Scan with a Schedule (new or existing), or perform it on demand by clicking Scan. 6. To perform it on demand, click Scan. A monitor screen will start.
7. This will take some time, depending on your settings (# of threads), the number and size of the share(s). 8. You may monitor the Scan Process through the Step 3. Scan Monitor on page 336. 9. Once the scan is complete, you may view the Scan results in Step 4. File Summary on page 337.
F1 Help: See Scan Monitor screen on page 815. 2. Check the Show disabled shares box to display all shares found on the network(s) scanned.
F1 Help: See Online / LAN File Summary screen on page 793. 2. For more information, highlight a line and click Details. The Details screen appears.
F1 Help: See Details screen on page 762. 3. Options: This screen shows all of the files for the selected line from the File Summary (e.g. All Files, Changed Files, etc.).
The Duplication Level is important, since it indicates the level of redundancy of some LAN data. You should monitor Backup Sets to ensure this duplication is considered. The Details list is limited to a maximum of 50,000 files. If the scan returns more than this number (which is likely on a LAN), the results are sectioned. 4. Click Close to exit this screen.
F1 Help: See Online / LAN File Summary screen on page 793. 2. Highlight a line in the Global or Filtered views, and click to open the Details screen.
3. Each line shows a different file. 4. Highlight a file and click Show Duplicates.
Large Files
Tools Menu > LAN Storage Discovery > Large Files
Extensions
Tools Menu > LAN Storage Discovery > Extensions: This is a customized view of the File Summary information. It sorts the files by extensions specified. The report shows the results of the extension search (of files scanned by the LAN File Summary Tool).
F1 Help: See Extension Report screen on page 781. 1. To search for specific file extensions, click New Report. To search for the most frequent file extensions, click Top Report. The Select Extensions (Top Report) screen appears.
F1 Help: See Select Extensions (Top Report) screen on page 829. A.Fill in all the fields. B.Click OK to scan and return the results in the Extension Report screen.
To search for selective file extensions, click Customize Report. The Select Extensions screen appears.
F1 Help: See Select Extensions (Customize Report) screen on page 828. A.Click Add. A new extension line appears. B.Enter the extension (without a period "."). C.Continue for as many extensions you want. D.Click OK to scan and return the results in the Extension Report screen. 2. Fill in the required information and click OK. 3. The Extension Report screen returns with a graph and list of the results.
Access
Tools Menu > LAN Storage Discovery > Access: This is a customized view of the File Summary information. It sorts the files by the time the file(s) were last accessed.
F1 Help: See Access Report screen on page 736. 1. Click New Report to specify the report intervals. The Select Access Intervals screen appears.
F1 Help: See Select Access Intervals screen on page 821. Click Add. A new Access Time line appears. Select the time interval. Continue for all the Access Time intervals required. Click OK to scan and return the results in the Access Report screen. 2. The Access Report screen returns with a graph and list of the results.
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
Growth
Tools Menu > LAN Storage Discovery > Growth: This is a customized view of the File Summary information. It sorts the files by the growth (positive and negative) over time (days). This report shows the data patterns (if any) on the LAN (or a specific share).
F1 Help: See Growth Report screen on page 785. You may change the view to different charts (Bar, Line) from the View drop down list.
Share Usage
Tools Menu > LAN Storage Discovery > Share Usage: This is a customized view of the File Summary information, sorted by owner and share.
Note:
A scan can only detect unprotected resources for the current DS-Client.
The following section explain how to use this tool: Run the Unprotected LAN Resource Discovery (Windows DS-Client) on page 348 Unprotected LAN Resource - Node Summary on page 352 E-Mail the results of the last Unprotected LAN Resource scan on page 353 Unprotected LAN Resource - Share Summary on page 354 New Backup Sets Summary (Unprotected LAN Resource) on page 355
F1 Help: See Select items for scanning on page 835. 3. From the Network tree, specify each item you wish to scan or exclude. Add: Adds the highlighted item from the Network Tree to the Selected Items for Discovery list. Exclude: Excludes the highlighted item from the Network Tree from the scan. The items parent must already be in the Selected Items for Discovery list. Subnet: Allows you to add or exclude a specific subnet. The subnet is the third part of the IP address. (For example 12.34.56.0 will search the entire 56 subnet from 12.34.56.1 to 12.34.56.254.)
Select: Allows you to add or exclude scan items that were discovered by the previous scan of the Unprotected LAN Resource Discovery Tool.
F1 Help: See Add / Exclude item from scanning result on page 739. 4. When you have added all the network items you wish to scan, click Next. The Wizard switches to the Input Credentials tab.
F1 Help: See Input the credentials on page 787. 5. You must input at least one set of credentials. To add a new credential, click Add. To modify an existing credential, highlight it from the list and click Modify. The Set Credentials screen appears. F1 Help: See Set Credentials screen on page 853. 6. Enter the credentials, and click OK. 7. Continue steps 5-6 until you have input all the credentials you want to use for the Share Discovery. Once you are satisfied with the settings, click Next.
8. The Select a Schedule Tab appears. (This setting is optional. The default is Not scheduled, meaning the scan is only run on demand.)
F1 Help: See Select a schedule for scanning on page 820. 9. Click Next. The Select Scanning Options Tab appears. These are additional options that can apply once any unprotected network resource(s) have been discovered.
F1 Help: See Set the scanning parameters on page 878. 11. Click Finish. The scan settings are saved. If you selected Start Scan Now, a process monitor window appears. This process may take some time, especially on a large LAN. 12. When the scan is finished, the following options are available: View a list of the unprotected computers sorted by Node (See: Unprotected LAN Resource - Node Summary on page 352). View a list of the unprotected shares (See: Unprotected LAN Resource Share Summary on page 354). View a list of the new backup sets automatically created by the last scan process (See: New Backup Sets Summary (Unprotected LAN Resource) on page 355). E-Mail the results of the last scan process (See: E-Mail the results of the last Unprotected LAN Resource scan on page 353).
F1 Help: See Unprotected LAN Resource Node Summary on page 892. 2. The contents of this screen are the results from the last scan. From this screen, you can:
E-Mail Exclude Shares Backup Set See E-Mail the results of the last Unprotected LAN Resource scan on page 353. Exclude the highlighted computers (nodes) from the next scan. See Unprotected LAN Resource - Share Summary on page 354. See New Backup Sets Summary (Unprotected LAN Resource) on page 355.
F1 Help: See Send Unprotected LAN Resource Discovery E-Mail on page 852. 2. Enter the recipient E-Mail address(es). Separate multiple addresses with a semi-colon or a comma. 3. Click OK to send.
F1 Help: See Unprotected LAN Resource Share Summary on page 892. 2. The contents of this screen are the results from the last scan. From this screen, you can:
E-Mail Exclude See E-Mail the results of the last Unprotected LAN Resource scan on page 353. Exclude the highlighted computers (nodes) from the next scan.
F1 Help: See New Backup Sets Summary on page 792. 3. This screen shows the new backup sets that were automatically created by the last Scan process.
F1 Help: See Online / LAN File Summary screen on page 793. For each row, a file is only counted once (even if there are multiple generations of that file). 2. Click Find. The process scans all of the backup files (based on the Filter parameters) on the DS-System.
3. Highlight a line in the Summary and click Details. The Details screen appears.
F1 Help: See Details screen on page 762. Each line represents a unique file. If more than one copy exists, the duplication amount is indicated in that column. 4. Highlight a file from the list and click Show Duplicates. The location of each duplicate file is shown in this screen.
F1 Help: See Duplicates screen on page 777. 5. Click Close when you are finished.
Reports menu > Load Summary. The DS-Client Load Summary screen appears.
F1 Help: See Load Summary screen on page 789. 1. To change the Load Summary content, click Series. The Load Summary Series screen appears.
2. Add/change as many items as you wish. (It is recommended to view only 2-3 items at a time, to keep the display manageable). 3. Click OK. The Load Summary graph reappears with the updated information.
If you modify any Select By options, you must click Refresh if you wish to update the graph. To view more details about a particular period, hover the cursor over a point or bar. The details for that point / bar are displayed in a tooltip.
This chart will automatically open and refresh on the "best fit" for the screen. You may modify the type of chart or its appearance, depending on your particular requirements. Reports menu > Storage Summary. The DS-Client Storage Summary screen appears.
F1 Help: See Storage Summary screen on page 889. 1. To change the display, click Series. The Storage Summary Series screen appears.
F1 Help: See Storage Summary Series screen on page 890. 2. Add as many items as you wish. 3. Click OK when you are done selecting items. 4. The Storage Summary screen returns and is updated automatically.
F1 Help: See System Activities Administration screen on page 890. DS-Client Activities: Enable / Disable Scheduled activities Enable / Disable Demand activities DS-Client Operations: Shutdown the DS-Client Computer on page 364 Repair the DS-Client Database on page 364 Administrative Processes: Update DS-Client Statistics immediately on page 362 Run a Daily Admin immediately on page 362 Run a Weekly Admin immediately on page 362 System Status Operations: Monitor current connections and processes on the DS-Client on page 363 Send messages to users connected to the DS-Client on page 363 Disconnect Network Connections to the DS-Client on page 364
For details on these options, see the online help for the screen. F1 Help: See Weekly Admin Options screen on page 895. 3. Click OK to proceed.
Note:
For more information, see the Knowledge Base Article Weekly Admin and Synchronization on page 494.
F1 Help: See DS-Client System Status screen on page 770. 3. Click Refresh to update the screen as required. The information provided in the tables is current as of the moment you selected the System Status screen, or refreshed the screen.
5. Type the message in the Send Message Field. 6. Click Send to send the message.
Use the System Activities > Repair DS-Client Database > Orphaned backup sets to Repair to repair the missing database information. This does not restore backup data; it recreates any missing backup sets in the DS-Client database. Once the backup sets are recovered, you may perform restores immediately. However, in order to resume backups, you must re-specify all of the information (backup items, schedule, etc.) using one of the following two options: Option A. Migrate (See: Migrate a Backup Set from one computer to another on page 194) Option B. Re-specify the Backup Set's information individually. Step 1. Specify the Connection Information (Network Credentials) for a Recovered Backup Set Step 2. Re-Specify the Backup Set's Backup Items Step 3. Re-Specify the Backup Set's Backup Schedule Step 4. Activating the Recovered Backup Set
4. The Backup Set Recovery screen appears. Select the Backup Set you would like to recover.
F1 Help: See Backup Set Recovery screen on page 749. 5. In the Recovery Info screen, select the appropriate User Name and/or Network Provider for the Backup Set.
F1 Help: See Recovery Info screen on page 807. 6. Click Save to save the Recovery Info profile as specified. 7. In the Backup Set Recovery Screen, click Recover. The Backup Set will be recovered and Synchronized. 8. Open the Backup Sets screen and the recovered set(s) appear in suspended status (grayed out). 9. Once you have recovered the backup sets, you may restore files (to alternate location) at any time. 10. To perform backups you must ensure that the Computer Name, Connect As, Backup Items, and Backup Schedule information are complete. 11. For Backup Sets missing the Computer Name information, you must Migrate the backup set from <Unknown> to the actual provider name. 12. In the Backup Sets screen, Activate the Backup Set.
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
Note:
For more information, see the Knowledge Base Article Recovering the DS-Client Database on page 718.
12 - Reports
12 - Reports
This section provides information on the various reports that DS-User can produce, as well as the steps involved in generating these reports.
12 - Reports
Print Reports
The DS-User can print and export the following reports: Backup Sets Report on page 370 Restorable Report on page 372 Backup Users Report on page 374 Backup/Restore Report on page 377 Backup Trends Report on page 375 Backup Groups Report on page 379 Statistical Summary on page 381 Backup Items Report on page 383 You can only view reports that include all DS-Client users if you are logged into DS-Client as a member of the Administrators group.
12 - Reports
Backup Sets report selection DS-Client Report (Java DS-User displays the DS-Client computer name in parenthesis) Shows if this report covers any or all of the Regular (actual), Statistical, Self contained, Local-Only, or Local DS-VDR backup set types. Statistical backup sets allow you to estimate the potential storage those backup(s) would occupy. Self contained and Local-Only backup sets perform backup and restore using only the Local Storage (DS-User Setup Menu > Configuration > Parameters Tab > Local Storage Path) Local DS-VDR backup sets do not show any DS-System data storage or transmission amounts, since they do not apply. Day the report was printed. Description The Backup Set Column lists all of the Backup sets specified on the DS-Client. The Connect As column lists the User Name being used to connect to the share/application. The Files column lists the number of files in each backup set (including all file generations). This column displays the protected size of the backup set data. This is the original, uncompressed amount of all the backup generations stored. For Regular backup sets, this shows the amount protected in the DS-System Online storage. For Statistical backup sets, this shows the amount of data that would theoretically be protected (if they were Regular backup sets). For Self-Contained and Local-Only backup sets, this shows the amount of data protected in the corresponding Local Storage Path(s).
Printing date Report Table Columns Backup Set Column Connect As Files
Protected Size
12 - Reports
Stored Size
[This column only appears if it is enabled from the DS-System.] For Regular backup sets, this is the actual amount stored in the DS-System Online storage (after processing, compression, etc.). DS-Client retrieves the current Stored Size amount from DS-System at the end of any successful backup, retention or delete process, as well as during any Weekly Admin or Daily Admin process. For Statistical, Self-Contained and Local-Only backup sets, this column does not apply. The Last Backup column indicates the most recent date a scheduled backup was performed for that share. The Status column indicates whether the corresponding backup set is active or suspended.
12 - Reports
Restorable Report
This report shows information about restorable files. 1. Reports menu > Restorable. The Restorable screen appears. F1 Help: See Print Report on page 805. 2. Make your report selections. 3. Click OK (Java DS-User) or Print Preview (Win32 DS-User). A preview of the report appears. 4. Click the printer icon to print. To export the report to a file, you can click the Save (Java DS-User) or Export (Win32 DS-User) icon. Choose the export format (PDF, Word, Excel, etc.) and destination.
Restorable Volume report selection DS-Client Report (Java DS-User displays the DS-Client computer name in parenthesis) Shows if this report covers any or all of the Regular (actual), Statistical, Self contained, Local-Only, or Local DS-VDR backup set types. Statistical backup sets allow you to estimate the potential storage those backup(s) would occupy. Self contained and Local-Only backup sets perform backup and restore using only the Local Storage (DS-User Setup Menu > Configuration > Parameters Tab > Local Storage Path) Local DS-VDR backup sets do not show any DS-System data storage or transmission amounts, since they do not apply. Day the report was printed. Description The Backup Set Column lists all of the Backup sets specified on the DS-Client. Restorable amounts are calculated using the latest generation of files in the backup set. This column displays the restorable amount, which includes Deleted Data (Deleted data is backed up files that no longer exist on the source computer). Files: The number of files available for restore, including any files deleted from the backup source that are still backed up online. Restorable Size: The corresponding size of these files. This is the original (protected) size of the files as they were on the backup source. This column displays the restorable amount (latest generation of files in the backup set), but it excludes Deleted Data. Files: The number of files available for restore, excluding files deleted from the backup source that are still backed up online. Restorable Size: The corresponding size of these files. This is the original (protected) size of the files as they were on the backup source.
12 - Reports
Last Backup
The Last Backup column indicates the most recent date a scheduled backup was performed for that share.
12 - Reports
Backup Users report selection DS-Client Report (Java DS-User displays the DS-Client computer name in parenthesis) Shows if this report covers any or all of the Regular (actual), Statistical, Self contained, Local-Only, or Local DS-VDR backup set types. Statistical backup sets allow you to estimate the potential storage those backup(s) would occupy. Self contained and Local-Only backup sets perform backup and restore using only the Local Storage (DS-User Setup Menu > Configuration > Parameters Tab > Local Storage Path) Local DS-VDR backup sets do not show any DS-System data storage or transmission amounts, since they do not apply. Day the report was printed. Description The User Name column lists each user associated with at least one backup set. The Full Name column lists the corresponding full name of each user who created the backup set (if applicable). The Connect As column lists the credentials being used to access the backup set's share. The Backup Set column lists the share\set name of each backup set on the DS-Client. The Online Limit column lists the maximum limit that each user may store Online. The Online Amount column lists the amount that each user currently has Online.
Printing date Report Table Columns User Name Full Name Connect As Backup Set Online Limit Online Amount
12 - Reports
F1 Help: See Print Backup/Restore Summary & Backup Trends Report on page 800. 2. By default, you will see trends for all backup sets from the beginning of the month to the current day. Make your report selections. 3. Click OK (Java DS-User) or Print Preview (Win32 DS-User). A preview of the report appears. 4. Click the printer icon to print. To export the report to a file, you can click the Save (Java DS-User) or Export (Win32 DS-User) icon. Choose the export format (PDF, Word, Excel, etc.) and destination.
Backup Trends report selection DS-Client Report (Java DS-User displays the DS-Client computer name in parenthesis) Weekly / Monthly Summary Shows if this report covers any or all of the Regular (actual), Statistical, Deleted, Self contained, Local-Only, or Local DS-VDR backup set types. Statistical backup sets allow you to estimate the potential storage those backup(s) would occupy. Self contained and Local-Only backup sets perform backup and restore using only the Local Storage (DS-User Setup Menu > Configuration > Parameters Tab > Local Storage Path) Deleted backup sets are calculated using data from the Activity Log. Local DS-VDR backup sets do not show any DS-System data storage or transmission amounts, since they do not apply. Indicates the period covered by the report.
Period
12 - Reports
User Name Backup Set(s) Printing date Report Table Columns Week / Month Date Files Total Size Backup Time Total
Shows the user or <All> Shows the backup set, or <All> Day the report was printed. Description Lists the week or month number for each row of data. Lists the date each row of data covers. Shows the total number of files backed up in each period. Shows the total size of all the files backed up in each period. Shows the total time taken for backups in the corresponding period (in minutes). Shows a grand total of each of the last three columns.
12 - Reports
Backup/Restore Report
This report summarizes each user's backup and restore operations during the specified Report period. 1. Reports menu > Backup/Restore. The Backup/Restore Report screen appears.
F1 Help: See Print Backup/Restore Summary & Backup Trends Report on page 800. 2. By default, you will see summaries of daily user backup and restore sessions from the beginning of the month to the current day. Make your report selections. 3. Click OK (Java DS-User) or Print Preview (Win32 DS-User). A preview of the report appears. 4. Click the printer icon to print. To export the report to a file, you can click the Save (Java DS-User) or Export (Win32 DS-User) icon. Choose the export format (PDF, Word, Excel, etc.) and destination.
Backup / Restore report selection DS-Client Report (Java DS-User displays the DS-Client computer name in parenthesis) Shows if this report covers any or all of the Regular (actual), Statistical, Deleted, Self contained, Local-Only, or Local DS-VDR backup set types. Statistical backup sets allow you to estimate the potential storage those backup(s) would occupy. Self contained and Local-Only backup sets perform backup and restore using only the Local Storage (DS-User Setup Menu > Configuration > Parameters Tab > Local Storage Path) Deleted backup sets are calculated using data from the Activity Log. Local DS-VDR backup sets do not show any DS-System data storage or transmission amounts, since they do not apply. Indicates the period covered by the report. Shows the user or <All>
Generated on: 10/15/12 Page: 377
Confidential.
12 - Reports
Shows the backup set, or <All> Day the report was printed. Description The User Name column lists the user who performed the backup or restore, and the date of the operation. Each day listed beneath a user name represents a day within the report period when either backup or restore activities occurred for that user. The Activities columns list the total time taken for backup/restore activities and the total number of sessions for the listed user. Time (min): Total duration of all the sessions for the corresponding line of the report. (Note: CDP backups are counted when they are stopped, which means if a CDP backup that has been running for 5 days is stopped, it will report 7200 minutes on that day.) #: Total number of sessions (both backup and restore). These columns list the number of files backed up that day, the volume of data backed up, and the number of connections made on that day to perform a backup. # of Files: Total number of files backed up. Amount (MB): Total amount of data backed up (Protected Size). #: Total number of backup sessions. These columns list the number of files restored that day, the volume of data restored, and the number of connections made on that day to perform a restore. # of Files: Total number of files restored. Amount (MB): Total amount of data restored (Protected Size). #: Total number of restore sessions. The last row for each user listed in the report contains that users totals for the report period. The last row of the entire report contains the grand totals for all users listed in this report.
Activities
Backup Activities
Restore Activities
12 - Reports
3. 4. 5. 6.
F1 Help: See Select Group / User screen on page 829. Highlight the group you want and click Select. Select Regular [Default], Self Contained, and / or Statistical backup set type(s). Click OK (Java DS-User) or Print Preview (Win32 DS-User). A preview of the report appears. Click the printer icon to print. To export the report to a file, you can click the Save (Java DS-User) or Export (Win32 DS-User) icon. Choose the export format (PDF, Word, Excel, etc.) and destination.
12 - Reports
Backup Groups report selection DS-Client Report (Java DS-User displays the DS-Client computer name in parenthesis) Group Shows the backup group, or <All> Shows if this report covers any or all of the Regular (actual), Statistical, Self contained, Local-Only, or Local DS-VDR backup set types. Statistical backup sets allow you to estimate the potential storage those backup(s) would occupy. Self contained and Local-Only backup sets perform backup and restore using only the Local Storage (DS-User Setup Menu > Configuration > Parameters Tab > Local Storage Path) Local DS-VDR backup sets do not show any DS-System data storage or transmission amounts, since they do not apply. Day the report was printed. Description The first column lists the user group. Shows all users belonging to the Group. May contain the appropriate real name associated with the user in the User Name column (if applicable). Lists the number of files that the user currently has stored Online. Lists the total amount which the files occupy Online. At the bottom of the data for each group, there is a summary total in the Files and the Online Amount columns.
Printing date Report Table Columns Group User Name Full Name Files Online Amount Totals
12 - Reports
Statistical Summary
This report shows usage statistics. It is particularly useful in conjunction with the Statistical Backup Set feature (see Statistical Backups on page 177). 1. Reports menu > Statistical Summary. The Statistical Summary screen appears.
F1 Help: See Print Statistical Summary on page 806. 2. Make your report selections. For details on these options, see the online help for the screen (Press F1 in this screen). 3. Click OK (Java DS-User) or Print Preview (Win32 DS-User). A preview of the report appears. 4. Click the printer icon to print. To export the report to a file, you can click the Save (Java DS-User) or Export (Win32 DS-User) icon. Choose the export format (PDF, Word, Excel, etc.) and destination.
Statistical Summary report selection DS-Client Report (Java DS-User displays the DS-Client computer name in parenthesis) Shows if this report covers any or all of the Regular (actual), Statistical, Self contained, Local-Only, or Local DS-VDR backup set types. Statistical backup sets allow you to estimate the potential storage those backup(s) would occupy. Self contained and Local-Only backup sets perform backup and restore using only the Local Storage (DS-User Setup Menu > Configuration > Parameters Tab > Local Storage Path) Local DS-VDR backup sets do not show any DS-System data storage or transmission amounts, since they do not apply. Day the report was printed.
Generated on: 10/15/12 Page: 381
Confidential.
Printing date
12 - Reports
Period Statistics updated on User Name Backup Set(s) Report Table Columns Machine Name / Backup Set / User Date New Files
Indicates the period covered by the report. Date when the statistics used in this report were gathered. Shows the user, or <All> Shows the backup set, or <All> Description This column name shows if the report is sorted by computer, backup set, or user. Each line corresponds to a specific day. These columns display the total number of new files backed up on the corresponding day. #: Number of new files Amount (MB): Amount of data (MB) in the new files These columns display the all the files backed up on the corresponding day. This includes multiple generations of the same file (if applicable). At the bottom of each section (computer, backup set, or user), totals and averages for the period appear. #: Total number of files backed up Amount (MB): Amount of data in the backed up files Transmitted (MB): Total size of files transmitted (this only includes the successfully transmitted amount) Compression Ratio: Ratio achieved = Amount/Transmitted Total amount transmitted from DS-Client to DS-System. This number includes any amounts transmitted for incomplete or failed backups. These columns display a running total of all the files stored on DS-System for the corresponding computer / backup set / user. (Do not consider these columns in relation to the others.) #: Total number of backup files stored offsite Amount (MB): Total size of the backed up files This amount includes each generation of a file. For example three generations of a 10MB file would show 3 files and 30MB transmitted. Only generations that are still online are counted. This column refers to the amount of data before compression, encryption, common file elimination, master/delta processing. Total backup time (per day) for the corresponding computer / backup set / user.
Backed Up Files
12 - Reports
Backup Items report selection DS-Client Report (Java DS-User displays the DS-Client computer name in parenthesis) Shows if this report covers any or all of the Regular (actual), Statistical, Self contained, Local-Only, or Local DS-VDR backup set types. Statistical backup sets allow you to estimate the potential storage those backup(s) would occupy. Self contained and Local-Only backup sets perform backup and restore using only the Local Storage (DS-User Setup Menu > Configuration > Parameters Tab > Local Storage Path) Local DS-VDR backup sets do not show any DS-System data storage or transmission amounts, since they do not apply. Day the report was printed. Description The Backup Set Column lists the source server, backup set name, and backup set owner. Shows what type of backup set (Regular, Statistical, Self Contained). The Backup Items column lists the individual backup items specified in the backup set. A double-plus sign (++) indicates this backup item includes sub-directories. A single-plus sign (+) indicates this backup item does not include sub-directories. A minus-sign (-) indicates that this is an Exclude backup item.
Backup Items
12 - Reports
Export
An export function is included to allow you to save important backup set information in an electronic format.
Files that were not backed up by the last backup session. If the backup Files not picked up by Last Backup was not interrupted by the user ("User Stop"), this is the number (amount) of files that did not change. Amount not picked up by Last Backup Amount (in Bytes) of the above.
Note:
Some additional columns might be visible (depending on the DS-Client configuration set by your Service Provider).
1. Reports Menu > Export > Backup Sets Info. The Backup Sets Info screen appears. F1 Help: See Backup Sets Information on page 750. 2. In the File Format list, select a format to export the Backup Sets Info as. 3. In the Save As section, click the icon to open a standard Save As dialog.
12 - Reports
12 - Reports
F1 Help: See Print Global Report - Export Backup Sets Information on page 804. 2. Click [...]. The Select DS-Clients screen appears.
F1 Help: See Select DS-Client (Print Global Report) on page 828. From this screen, you create the list of DS-Clients whose reports you want to generate. You must specify at least one DS-Client (otherwise no report can be generated). 3. You can add DS-Clients to the list individually, or together as a group using the Autosearch feature. To add DS-Clients individually: Click Add / Modify. The New / Modify DS-Client Connection Entry screen appears. F1 Help: See Add / Modify DS-Client Connection Entry (Print Global Report) on page 739. When you enter the IP address of the target DS-Client computer, press TAB or highlight a different field. Java DS-User attempts to connect to the DSClient at that IP address. If successful, the drop-down list activates beside the From field (with the available servers where the credentials can be verified).
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
12 - Reports
You must supply valid credentials to this DS-Client. These must be administrator equivalent if you want to view Reports for all users and groups. To add using the Autosearch feature: Click Auto Search. Java DS-User scans the network, and the DS-Clients Auto Search screen appears with the visible DS-Clients in its list.
F1 Help: See DS-Clients Auto Search (Print Global Report) on page 772. To add multiple DS-Clients, hold down the CTRL key while clicking. When you have finished making your selections, click Add Selected. The DS-Client Connection Entry screen appears. You must enter a user name and password that is valid on all of the selected DS-Clients. If you do not have common credentials (with sufficient permissions), you must specify each DSClient individually. Click OK. The Select DS-Clients screen returns with the added connection entries. 4. You can save the connection entries you have listed, but they will only be retrievable from the current Java DS-User installation. (The computer / IP / credentials are saved to the local user.ini file in encrypted format.) To save or load credentials, click the corresponding button. Enter the key to lock or unlock the credentials and click OK. If loading, the Select DS-Clients screen returns with the saved connection entries.
F1 Help: See Enter Lock Key For Credentials (Print Global Report) on page 777.
12 - Reports
You can only save one set of DS-Client Connection Entries. If you click Save again, whatever is in the Select DS-Clients screen at that time will overwrite any saved credentials. 5. Once you have finished the list of DS-Clients, click OK. The Global Report Print screen returns with the selected DS-Clients in the corresponding field. Make any required report selections, then click OK to generate the reports.
Note:
12 - Reports
F1 Help: See Print Global Report - Export Backup Sets Information on page 804. 2. To select the DS-Client(s): See Selecting DS-Client(s) for a Global Report on page 386. 3. In the Export Options section, specify how you want to save the file. 4. Click OK. The report that is exported is essentially the same as the regular Backup Sets Info report. See Backup Sets Info on page 384.
12 - Reports
F1 Help: See Print Global Report - Backup Users Report on page 803. 2. To select the DS-Client(s): See Selecting DS-Client(s) for a Global Report on page 386. 3. In the Report Selection section, specify what you want to display. For details on the options, see the online help for the screen. 4. The report that appears is essentially the same as the regular Backup Users report. See Backup Users Report details on page 374.
12 - Reports
See Selecting DS-Client(s) for a Global Report on page 386. 3. In the Report Selection section, specify what you want to display. For details on the options, see the online help for the screen. 4. The report that appears is essentially the same as the regular Backup Items report. See Backup Items Report details on page 383.
12 - Reports
Custom Reports
The Custom Reports feature allows you to create your own reports, based on the data provided from the DS-Client database tables. This feature is meant for advanced users. This requires a third-party application (either JasperReports or Crystal Reports), which means you must have the development resources to create and compile the custom report templates. Step 1. Create Customized Data on page 392 Step 2. Create Customized Report (with Third-Party application) on page 395 Step 3. View Customized Report on page 396
F1 Help: See Customized Data Wizard - Select a Data Set on page 760. Choose an existing Data Set or select <new> to create a new one. Data Set selections are saved in the .ini file for the DS-User installation you are using (user.ini for Java DS-User or DSUSER.INI for Win32 DS-User). Choose a View. Data is grouped into different views. Each view can contain one or more tables from the DS-Client database. The same table can appear in different views.
12 - Reports
2. Click Next. The Customized Data Wizard - Select Display Columns screen appears.
F1 Help: See Customized Data Wizard - Select Display Columns on page 761. A list of all fields from all tables for the selected View appears in the left column. Click on a field to select it. At the bottom of the screen you will see an expanded description of what that field contains. Click Add to move the field to the selected column list on the right. (Multiple fields can be selected using the SHIFT or CTRL keys). You can order the selected fields with the Up and Down arrow buttons. This is the order in which the data fields will be written. Continue for as many fields as you require. 3. Click Next. The Customized Data Wizard - Select Order screen appears.
F1 Help: See Customized Data Wizard - Select Order on page 761. A list of all available sort fields appears in the left column. This is based on the fields you selected to display in the previous screen. Add as many sort fields as you require. You can order the selected fields with the Up and Down arrow buttons. This is the order in which the data set will be sorted. Continue for as many columns as you require.
Generated on: 10/15/12 Page: 393
Confidential.
12 - Reports
If you do not make a selection, data will be written as it is read from the database. (Note: This sort order is not used by JasperReport or Crystal Reports.) 4. Click Next. The Customized Data Wizard - Select Data Filters screen appears.
F1 Help: See Customized Data Wizard - Set Data Filters on page 761. The default (if you do not set any filters) is to search for all data. If you set a filter, only data that matches the filter will be exported. 5. Click Next. The Customized Data Wizard - Enter Data Set Name screen appears.
F1 Help: See Customized Data Wizard - Enter Data Set Name on page 760. You can save the Data Set settings for quicker access next time. These selections (with the exception of Data Filters) are saved in the .ini file for the current DS-User GUI installation you are running. Export data to file is selected by default. You must export the Data Set to a file in either XML or CSV format.
12 - Reports
6. Click Next. The Customized Data Wizard - Confirm Data Set Summary screen appears.
Note:
F1 Help: See Customized Data Wizard - Confirm Data Set Summary on page 760. Click Finish. If Export data to file was selected, a Save As dialog appears, allowing you to save the Data Set to a file in either XML or CSV format. Export as XML if you want to create a custom report template. The Data Set you export contains a snapshot of the data from the fields you queried from the DS-Client database at the moment you clicked Finish. This can be used to create a one-time custom report. However, it is the data structure (data fields) that is used to create a re-usable custom report template.
12 - Reports
F1 Help: See Customized Report Wizard - Select Report Template on page 761. In the Template name field, select the custom report you wish to view. The list shows the compiled report template files in the \report subdirectory of the folder where this installation of DS-User is running. 2. Click Next. The Customized Report Wizard - Select Data Filters screen appears.
F1 Help: See Customized Report Wizard - Set Data Filters on page 762. The default (if you do not set any filters) is to display all data in the report. If you set a filter, the custom report will display only data that matches the filter.
12 - Reports
3. Click Next. The Customized Report Wizard - Confirm Report Summary screen appears.
F1 Help: See Customized Report Wizard - Confirm Report Summary on page 761. 4. Click Finish. The Custom Report appears.
Glossary of Terms
Glossary of Terms
Administrator
A user with full access privileges to the DS-Client.
Audit Trail
A log that records changes made to the DS-Client database.
Backup Operator
A user with rights to backup sets that would not otherwise be accessible. Backup Operators possess the full backup authority, but not the permissions of Administrators (e.g. no unlimited restore permissions).
Backup Set
A list of the items (directories, files, and applications) you wish to back up from your computer (or network). A Backup Set includes information about how these items will be backed up (Backup Options), and when they will be backed up (Schedule). Backup sets are created through the DS-User program.
Backup/Restore (Report)
This summary provides a detailed breakdown of each Asigra Cloud Backup user's daily backup and restore activities. Then it breaks down usage by connection time, number of files, and data volume. A summary total is provided for the selected time period at the bottom of the user's section.
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
Glossary of Terms
Grand totals are provided for the entire period at the bottom of the report.
Backup Wizard
A DS-User utility to guide you through the creation of a backup set.
Daily Admin.
Performs a verification of backup sets, and (if configured) transfers a dump of the DS-Client database to the DSSystem.
Demand Backup
A DS-User utility that allows users to backup a set immediately (as opposed to waiting for it to run at a scheduled time).
Details (Schedule)
Each Detail is a description of a specific date/time pattern when to perform a backup. You may add as many details to a Schedule, as are required. Each Detail refers to a specific backup circumstance (e.g. "Occurs every 2 week(s) on Friday, at 6:00 PM"). For example: You may wish to back up weekly, and back up on a specific day (such as the last Friday of every month). To do so, simply create one detail for the weekly backup, and a second detail for the monthly backup.
Digital Signature
A standard feature applied to all backup files. Asigra Cloud Backup automatically creates, attaches and stores a unique digital signature for each backup file. During restore processes, the signature of the restored file is compared with the signature that was generated at backup time. If they match, this confirms a 'carbon-copy' restore of the file that was backed up.
Disaster Restore
A process to restore a large amount of backup data that is coordinated between the DS-Client LAN Administrator and the Service Provider. The restore is performed via direct (or LAN) connection to Disc/Tape media brought to the recovery site.
DS-Client
ASIGRA's proprietary software, designed to perform unattended and demand backups and selective restoration of a user's specified files. The DS-Client software runs as a service on Windows Platforms, and as a daemon on Linux Platforms. It serves as a gateway to the DS-System: User data tagged for backup (see Backup Set) flows through the DSClient, where it is compressed, encrypted and sent to the DS-System for storage.
DS-Client Buffer
DS-Client buffer is disk space on the DS-Client computer that is used as temporary storage during some types of backups (ex: MS Exchange Server, MS SQL Server dumps).
DS-Client Pipe
DS-Client Pipe is an alternative to the database dump for MS SQL and MS Exchange Server backups. This option does not consume any additional disk space. During backups, the DS-Client reads from the pipe on the source database. This method is useful if your database is too big to be dumped to a file on either the database server or the DS-Client buffer.
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
Glossary of Terms
DS-System
The DS-System stores the customer's Online data, and is located at a Asigra Cloud Backup Service Provider's secure, offsite, Vault location.
DS-User
DS-User is the end-user software that runs on your standalone PC or LAN workstation. This application is the interface that permits you to create a Backup Set to identify the files and directories you want the DS-Client to back up.
Event Log
A log that displays the error, warning, and information messages that occurred during DS-Client activities for the period selected.
Exclude
An option which is available in some screens. This allows you to exempt specific subdirectories, if the parent directory has been selected.
Filter
A pattern that can be specified to reduce a search of a large list (e.g.: *.exe will search for all files with an 'exe' extension).
Generation
Indicates the version of a file kept Online.
Incremental Files
A standard DS-Client feature, whereby only the changed files are backed up to the DS-System. This process eliminates the redundancy of backing up unchanged files.
Initial Backup
The Initial Backup feature allows you to backup to local buffer location(s) directly attached to the DS-Client (or on the LAN). Then, you can ship that media (e.g. disks) to the DS-System location. Your Service Provider will attach the media to the DS-System and import the Initial Backup data. Once it is imported to the DS-System, you can continue protecting your data with subsequent scheduled and on-demand backups.
Knowledge Base
The DS-Client Knowledge Base on page 403 contains additional information regarding DS-Client operations for more technical users.
Load Summary
The Load Summary is a tool that can help administrators analyze the load on the DS-Client computer for a selected period of time.
Migration
Asigra Cloud Backup allows you to change the provider/computer of a backup set with the Migration feature. This is useful if you rename your computer, change the operating system, or change the physical location of files.
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
Glossary of Terms
Registration
If hardware registration is required by your Service Provider, during the first activity between the DS-Client and DS-System, the DS-Client is registered with the DS-System. In this process, the DS-Client sends a unique key identifier (based on the operating system and hardware configuration of the DS-Client computer), which is used in the connection and verification process. This registration is an added security step, whereby the DS-System will only accept communication from the registered installation of the DS-Client. (i.e. You cannot copy the DS-Client software from one machine to another and immediately use it as if it were the same machine. If you change your DS-Client computers hardware or Operating System, this may also cause the registration verification to fail. Only your Service Provider can permit your DS-Client to re-register with the DS-System. Contact your Service Provider for more details.)
Regular User
The majority of Asigra Cloud Backup users in a LAN environment are Regular Users. Their main requirement is to be able to specify and backup data that they can access, and restore their backups, as required.
Reports
Reports are an important administrative and bookkeeping tool for administrators. These help to track usage and trends among Asigra Cloud Backup users. The DS-User software can create, print and export five different reports (Backup Sets, Backup Users, Backup/Restore Summary, Backup Trends, and Backup Groups). Each of these reports sorts the collected data in different ways.
Restore Wizard
The Restore Wizard is a graphical tool that will assist you to restore a backup set. It is divided into separate tabs that depend on the type of backup you are trying to restore. The information in these tabs change to reflect each successive choice you make in a previous tab. The Wizard is designed to guide you through the necessary selections to restore a backup set.
Schedule
A Schedule is a set of Details that indicate when unattended (automatic) tasks like backups are to be performed. Each Detail refers to a specific backup circumstance (e.g. "Occurs every 2 week(s) on Friday, at 6:00 PM").
Scheduled Backup
A backup that runs automatically, according to the Schedule used.
Statistical Backups
The only difference between Statistical Backups and Regular backups, is that backup data is not sent to the DSSystem for storage with a Statistical Backup. All other processes are performed, allowing you to analyze the data trends before committing to perform real backups.
Status
An item's status indicates whether activities are being performed with it. The corresponding status could be Active, Suspended, or Synchronize.
Storage Summary
The Storage Summary is a tool to help administrators analyze the trends for Online amount, number of files and backup time.
Glossary of Terms
Suspended
A Suspended status indicates that scheduled backups are not being performed on this item. Backup data will remain stored on the DS-System according to the backup sets' Generation settings.
Use Buffer
The Use Buffer option can be used for backups and restores. It is useful in cases where the LAN allows only a short screen for backup/restore. Since the data must be transferred and compressed/encrypted through the DSClient, it may take more time than the period available. If Use Buffer is selected, the backup/restore process will copy all of the specified backup files to the local storage on the DS-Client's hard disk first. This ensures that the backup/restore transfers files from/to the target servers at LAN speed (i.e. as fast as possible given your LAN infrastructure).
User Name
The name that you use on the machine or domain where the DS-Client will verify your credentials.
Weekly Admin.
Performs all Daily Admin. activities, and a low-level synchronization of backup sets. During this process, an indepth verification occurs between the DS-System's and the DS-Client log.
Summary
The following table shows the map of ports used by DS-Client in Asigra Cloud Backup applications:
New 80 443 4401 4403 4405 4407 4408 4410 4411 Description DS-Client -> DS-NOC (http) DS-Client -> DS-NOC (https) DS-Client -> DS-System DS-Mobile Client -> DS-System DS-User -> DS-Client DS-Client -> DS-MLR DS-Client -> Local DS-VDR DS-Client -> DS-Recovery Tools DS-Client -> DS-Client (Grid DS-Client) API Connections -> DS-Client service / daemon
Note:
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
In order to operate, the DS-Client needs to open the port 4403 (or 3002 for versions older than v.6.0) for the TCP/UDP protocols on the machine where it is installed. If this fails, the DS-Client service will stop and will record the following error in the Windows Application Log: "Failed to open ports (ds-user,TCP)." The DS-Client might fail to start on some Windows Operating Systems because of a port conflict between the DS-Client and some Microsoft services like WMI. A workaround from Microsoft to resolve the port conflicts is described below: 1. Run "RegEdit". 2. Browse to
"HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\TCPIP\Parameters"
3. Double click the key named "ReservedPorts", and add "4403-4403" (or "3002-3002" for DS-Clients before v.6.0). 4. Make sure that the key value ends with one empty line by hitting the "Enter" key. 5. Click the "OK" button to save the Registry changes. 6. Restart Windows and the port conflict should not occur.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Running DS-Client using PostgreSQL database on Mac OS X with Apple Remote Desktop (ARD)
Creation Date: March 02, 2006 Revision Date: March 02, 2006 Product: DS-Client (Macintosh)
Summary
This article deals with some potential problems when running DS-Client using PostgreSQL database on Mac OS X with Apple Remote Desktop (ARD) installed.
Problem
ARD uses a built-in PosgreSQL that listens to port 5432. If the DS-Client's own PostgreSQL is also configured to listen to port 5432, the database fails to start because of this conflict. DS-Client may not work well with this built-in database due to version problems. Workaround The port conflict can be avoided by changing either port number to another value (other than 5432): 1. Edit the file postgresql.conf The file is under the folder defined by $PGDATA (usually /Library/ PostgreSQL8/). For ARD, this file is normally located in /var/db/RemoteManagement/RMDB/ rmdb.data/. 2. Uncomment the line "port = xxxx" and change it to something else. 3. Restart the service. When installing DS-Client, make sure to set the port number in the Database Login Screen to the correct value. If the software is already installed, you can check / change the Database Port field value in the configuration file. Changes will take effect after the service restarts.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
In order to operate, the DS-Client needs to establish a session with the DS-System on port 4401. If you have a firewall installed, you need to allow access to port 4401. In a standard firewall configuration there is an inside network interface (i.e. your LAN with the DS-Client) and an outside network interface (i.e. the Internet or WAN). The inside network is considered to be 'trusted', while the outside network is 'not trusted'. Connections with the DS-System are always initiated by the DS-Client. (A DS-System never initiates a connection to the DS-Client.) Therefore, you must allow port 4401 for the TCP protocol for the inside network interface. If you do not use DHCP for the DS-Client computer, you have additional flexibility: You can specify in the firewall that only the DS-Client computer's IP address can use port 4401. Depending on your firewall's configuration, you may even be able to set up a range of IP addresses.
Setup
Transparency 1. Most default firewall configurations provide transparency for users inside your firewall, but not for the users outside the wall. A DS-Client needs transparency for the connection with the DS-System. Therefore, you must either set transparency ON for the internal network interface (if it is not ON yet), or allow the connection on port 4401 to be transparent. This will depend on the type of firewall you are using. 2. There is no need for transparency on the outside network interface. Ports 1. The basic configuration required to setup your firewall for DS-Client activities (backup/ restore) is to allow port 4401 for the TCP protocol. Monitoring the DS-Client with the DS-User (GUI) from an outside connection: 1. You must allow port 4403 (TCP and UDP) in addition to port 4401. 2. If the DS-Client computer has more than one network interface (assuming the DS-Client computer is running Windows) and has default gateways on each interface, then you must modify the routing table manually to include the network from which the DS-User machine is connecting.
Grid DS-Client
The nodes in a Grid DS-Client communicate with one another on port 4410. All nodes must be in the same domain, therefore an external firewall is unlikely to be an issue. However, if a firewall is configured on any of the DS-Client nodes, make sure it does not prevent the DS-Client service from using port 4410. See Grid DS-Client on page 426.
Conclusion
To summarize - if you want full control of the DS-Client from the GUI, enable port 4401 (TCP) with transparency, as well as enabling port 4403 (TCP and UDP).
See Also
Ports used in Asigra Cloud Backup applications on page 405 Grid DS-Client on page 426
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Windows XP Service Pack 2 changes that affect the Asigra Cloud Backup Product
Creation Date: September 16, 2004 Revision Date: August 29, 2011 Product: DS-Client
Summary
The following changes in Windows XP Service Pack 2 affect the Asigra Cloud Backup Product.
After applying Windows XP Service Pack 2, the Internet Connection Firewall service has been changed to Windows Firewall/Internet Connection Sharing (ICS) service and we did not encounter such conflicts anymore; therefore you can ignore the recommendation to disable the Internet Connection Firewall from README.TXT.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
The DS-Client configuration file is <DS-Client HOME>/etc/dsclient.cfg. This file is created during installation. Though it can be edited manually, almost all parameters can be changed through the DS-User GUI. Some advanced users may encounter situations where they need edit the configuration parameters manually. WARNING: If your dsclient.cfg file is improperly configured, damaged, or missing, the DS-Client may not start.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
The DS-Client database is created by the DS-Client Installation. Ideally, you should not have to perform any further configurations after installation. This article covers some of the possible maintenance issues that might arise: Increasing Disk Space for DS-Client Database on page 412 DS-Client Database Version (compatibility checking) on page 413 Backing up the DS-Client Database on page 413
Option 2:
Create additional data files for the DS-Client databases on other disks (please refer to the MS SQL Server documentation). Option 3: NOTE: If the additional data files are located on another drive and those paths (NOT Recommended) do not exist when recovering the DS-Client database to another machine, then DS-Client will report errors and the database recovery will fail. Linux / Mac DS-Client databases (PostgreSQL Server) Option 1: Free up disk space on the database drive. Move the DS-Client database to a bigger drive by using any method of backing up and restoring the DS-Client database. Make sure the PostgreSQL Server version on the target drive is compatible. The simplest way is to use the same version. You must re-configure the DS-Client to point to the new database location. Modify the Database Host value in the DS-Clients configuration file (dsclient.cfg). Set the value to the IP address or UNC path of the server where the new database instance is located. Since this is an PostgreSQL Server specific task, no instructions are provided on how to perform these steps.
Option 2:
See Also
DS-Client Database Installation Script on page 414 Recovering the DS-Client Database on page 718 Administrative Processes on page 491 Grid DS-Client (Windows DS-Clients) on page 70
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Introduction
The following options are available if you want to migrate a DS-Client database from MSDE to SQL Server 2005/2008 Express. MSDE is no longer supported as a database instance for DSClient installations. If you have an older version of DS-Client running with MSDE, you must migrate the database before you can upgrade the DS-Client. Note: SQL Server 2005/2008 Express has a 4GB database limit. Option 1 - Migrate by importing DB files to a new Instance on page 415 Option 2 - Migrate by upgrading the DB Instance on page 416
Note: -
To view the instance names that are running, type osql L from the Command Prompt. This will list all the running database instances.
Change the Dependency for DS-Client service by modifying the value DependOnService from MSSQL$MSDE_INSTANCE to MSSQL$SQLEXPRESS. 7. Start DS-Client Service. 8. Test the connection with the DS-System by running a Daily Admin. Verify there are no errors in the Activity Log.
5. After the upgrade is successful, start the SQL Server 2005/2008 Express instance. 6. Start the DS-Client service. 7. Test the connection with the DS-System by running a Daily Admin. Verify there are no errors in the Activity Log.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
DS-Client Database Migration (from SQL Server Express version to SQL Server FULL version)
Creation Date: November 28, 2007 Revision Date: September 20, 2012 Product: DS-Client (Windows)
Introduction
Note: This article uses Microsoft SQL Server 2005 as an example, however, this procedure is also applicable for higher versions (i.e. SQL Server 2008, 2008 R2, 2012, and up).
The following options are available if you want to migrate a DS-Client database from SQL Server 2005 Express to Microsoft SQL Server 2005. You need to migrate if you reach the 4GB limit of the SQL Server 2005 Express database, or if you plan a significant increase to the number of files protected with this DS-Client. Option 1 - Migrate by importing DB files to a new Instance on page 417 Option 2 - Migrate by upgrading the DB Instance on page 418
Change the Dependency for DS-Client service by modifying the value DependOnService from MSSQL$SQLEXPRESS to MSSQLServer. 7. Start DS-Client Service. 8. Test the connection with the DS-System by running a Daily Admin. Verify there are no errors in the Activity Log.
5. After the upgrade is successful, start the MS SQL Server 2005 instance. 6. Start DS-Client service. 7. Test the connection with the DS-System by running a Daily Admin. Verify there are no errors in the Activity Log.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
Some customers have run into problems where the DS-Client database (PostgreSQL 8.2.4 and below) grows to a significant size (40-100GB or more). This article describes why this can happen, and some workarounds. On Linux machines, the PostgreSQL DS-Client database can grow to a considerable size, despite the fact that DS-Client automatically vacuums its database during Daily Admin or Weekly Admin.
Details
During normal PostgreSQL operation, an UPDATE or DELETE of a row does not immediately remove the old version of the row, because those are still potentially visible to other transactions. Depending on the frequency of these transactions, a significant amount of free space can accumulate causing the database size to grow. PostgreSQL has a VACUUM feature that reclaims this free space for reuse by new rows. VACUUM is run during a DS-Client Daily Admin or Weekly Admin. However, it only marks those free space blocks for future reuse. Unused space is not reclaimed and the database file size remains the same. This means if the VACUUM is not run often, the database may grow significantly (especially if there is a large amount of UPDATE or DELETE activities). Recommendations: Perform regular, scheduled Daily Admin and Weekly Admin on DS-Client database. If you find there is unusual growth in the database size, try the procedures in the Workaround to reduce its size. See Workaround to reduce DB size on page 420.
Note:
It is very important that you use the same version of PostgreSQL, pg_dump (command) and pg_restore (command). For example, if the PostgreSQL version is 8.2.4, then the versions of pg_dump and pg_restore must be 8.2.4.
3. Make sure the command in step 2 is performed successfully. 4. Go to the PostgreSQL prompt: Drop the existing DS-Client database:
psql > DROP DATABASE dsclient;
5. Exit the PostgreSQL prompt. 6. Restore the dump (created in step 2) to the newly created DS-Client database:
pg_restore U username h hostname F c d dsclient <path to dsclient.dmp>
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Note:
This feature only works for Windows standalone DS-Clients. It does not work with Windows Grid DS-Client.
Summary
The free Microsoft SQL Server Express databases contain the following built-in limitations:
Microsoft SQL Server 2005 Express (For DS-Client database) Microsoft SQL Server 2008 Express (For DS-Client database) Microsoft SQL Server 2008 R2 Express (For DS-Client database) Microsoft SQL Server 2012 Express (For DS-Client database) SQL Server 2005 Express has a 4GB limit for the databases. SQL Server 2005 Express will use a maximum of 1 CPU, and can use up to 1GB of RAM (even if the computer has more). SQL Server 2008 Express has a 4GB limit for the databases. SQL Server 2008 Express will use a maximum of 1 CPU, and can use up to 1GB of RAM (even if the computer has more). SQL Server 2008 R2 Express has a 10GB limit for the databases. SQL Server 2008 R2 Express will use a maximum of 1 CPU, and can use up to 1GB of RAM (even if the computer has more). SQL Server 2012 Express has a 10GB limit for the databases. SQL Server 2012 Express will use a maximum of 1 CPU, and can use up to 1GB of RAM (even if the computer has more).
If you reach the GB size limit of either database type, you have two options: upgrade to the full MS SQL Server (which requires you to purchase the license), or enable the DS-Client database Automatic Expansion feature
There is no workaround to the CPU and RAM limitations. If you find you need more processing capability, you must purchase the full licensed MS SQL Server.
Details
The DS-Client database Automatic Expansion feature is a workaround to the maximum database size limitation in the free Microsoft SQL Server Express databases. If activated, when an Administrative Process (Local, Daily, Weekly) detects the DS-Client database is nearing the maximum capacity, it will automatically create a new database and move some of the backup set tables to that new location. Expansion can continue forever, meaning this solution removes the 4GB (or 10GB) limitation of Express. In practice, the performance will be affected as the database is expanded, given the CPU and RAM limitations. To activate the DS-Client database Automatic Expansion feature: 1. DS-User > Setup Menu > Configuration > Parameters Tab. 2. In the DS-Client Configuration Parameters Tab screen, check the Automatically Expand DS-Client Database box. 3. Click OK or Apply. To configure the parameters for the DS-Client database Automatic Expansion feature:
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
1. DS-User > Setup Menu > Configuration > Advanced Tab. 2. In the DS-Client Configuration Advance Tab screen, select the Miscellaneous category. 3. From the Parameter drop down list, you can make the following configurations:
This parameter (in percent) sets the level at which the Daily Admin or Weekly Admin will automatically expand the DS-Client database to create a new, sequentially named expand<nnnn> database. The percentage is calculated against the maximum allowed size for an individual database (4GB or 10GB). range 0 to 100, default is 70 (percent) If the current amount of space used in an expand<nnnn> database is less than this parameter (in percent), Daily Admin and Weekly Admin can move backup set tables into that database. range 0 to 100, default is 40
DBHighWaterMark
DBLowWaterMark
4. Click OK or Apply to save the changes. NOTES: 1. HighWaterMark is the trigger that the Administrative Process uses to determine if backup set(s) need to be moved out of a database. 2. LowWaterMark is used to balance the distribution of backup sets among the expanded databases. During an Administrative Process (Local / Daily / Weekly), if backup set(s) need to be moved and all databases are past the LowWaterMark, a new expanded database will be created. 3. What gets moved: The largest backup set is moved first (unless it would fill the new database higher than the DBHighWaterMark). Then the next largest backup set is moved and so forth, until the database fill level falls under the DBHighWaterMark (e.g. less than 70% for default settings). Note: If a single backup sets tables are larger than the 4GB (or 10GB) limit, it cannot be moved. In this case you will have to migrate to the full, licensed MS SQL Server version. Only an entire backup set can be moved (it must all reside within the same expand<nnnn> database). All tables for a single backup set from both the dsclient and dsdelta databases are moved. 4. When compared with using a single DS-Client database on a full (purchased) MS SQL Server, the performance will be slower. 5. How a DS-Client with expanded-databases would appear from SQL DB Manager:
DSCXXXX00002_dsclient DSCXXXX00002_dsdelta DSCXXXX00002_dslanfiles DSCXXXX00002_expand0001 DSCXXXX00002_expand0002
Example:This DS-Client (DS-Client #DSCXXXX00002) has two expanded databases. Expanded databases contain both dsclient and dsdelta tables.
See Also
Administrative Processes on page 491
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
The DS-Client software runs as a service on a Windows computer and requires a user account in order to logon (to allow access to network resources). This account must be provided during the DS-Client installation process (make sure that this user account exists on the target Windows machine). Before starting the DS-Client installation program, you must log on to the DS-Client computer as the administrator or other user with equivalent permissions.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
Error messages may occur on DS-Client in heavy processing load situations. If lots of activities (especially Backup activities) are running on a DS-Client at the same time, DSClient could report errors "Insufficient System Resources Exist to Complete the Requested Service" (Error code: 1450) even if the system has plenty of RAM and disk space available.
Details
For DS-Client, if the System Resources problems occur, you can try with less activities running at the same time or reduce the threads settings for DS-Client in the DS-Client Advanced Configurations (DS-User > Setup Menu > Configuration: Advanced Tab): "MaxThreads" parameter for Backup activities "MaxRestoreThreads" parameter for Restore activities.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Grid DS-Client
Creation Date: February 08, 2008 Revision Date: September 20, 2012 Product: DS-Client (Windows) This article provides an overview of the Grid DS-Client. 1. Introduction & Overview on page 426 2. Operating Systems Supported on page 427 3. Hardware and Software Setup on page 428 4. Connectivity on page 430 5. Grid DS-Client Setup on page 430 6. Specific GUIs for Grid DS-Client on page 431 7. Upgrading, Recovering DS-Client DB, and Version control on page 431 8. Configuring the Grid DS-Client Nodes (node level configuration) on page 432 9. Frequently Asked Questions (FAQ) on page 433
1. The Grid DS-Client is designed to deliver better performance scalability of the DS-Client and to increase the availability of the Backup Service. It is designed so that the DS-Client can survive failures of some of its nodes without interrupting the backup service. 2. Configuring the Grid DS-Client means that several DS-Clients will work together to provide backup and restore services as if they are a single DS-Client (from the DS-System perspective). Any of the nodes in the Grid DS-Client is able to provide the same service (backup, restore, delete, synchronization, admin, etc.) as long as the nodes are configured properly (see section 3. Hardware and Software Setup on page 428). 3. All nodes in a Grid DS-Client share the same DS-Client database. They also share the same Account Number, DS-Client number and private/account encryption keys. 4. Each node in the Grid DS-Client has a separate network connection to DS-System. 5. One of the nodes will be selected as the Main Node to perform common internal tasks and to synchronize and balance activities. It also interacts with DS-User GUI. Any other node is called a Leaf Node. Leaf nodes will perform tasks assigned by the Main node. 6. Activities are controlled by the Main Node and assigned to all nodes in a balanced way. The balance is measured by the load (determined by the activities assigned, compared to the MaxSession parameter configured for that node) and CPU usage. 7. If the Main Node goes down, the other (leaf) nodes will continue their current tasks. In the meantime, a new Main Node will be elected. 8. Even if only one node is alive and all other nodes are down because of failures or other reasons, the Grid DS-Client will still be available and will continue providing the same backup services.
Windows VISTA x86 (32-bit) or x64 (64-bit) Windows 2008 x86 (32-bit) Windows 2008 x64 (64-bit)
Windows SBS 2011 x64 (64-bit) Windows 7 x86 (32-bit) or x64 (64-bit) Windows 2012 x64 (64-bit) Windows 8 x86 (32-bit) or x64 (64-bit)
Standard Ultimate SP1, or Professional SP1, or Enterprise SP1 Essentials, or Standard, or Datacenter Pro, or Enterprise
On Windows VISTA: Go to the Windows Control Panel > Network and Internet > Network and Sharing Center: the option File Sharing should be set to ON. On Windows XP / VISTA, configure the firewall setting: For XP, make sure File and printer sharing is open. For VISTA, make sure File and printer sharing and Remote Administration are in the exception list. On Windows VISTA / 2008 / 7: Verify that UAC (User Account Control) is turned off. On all Windows platforms: Check if the firewall allows remote control of the DS-Client service between the nodes with the following commands:
sc \\[other-node] start|stop ds-client taskkill /S \\[other-node] /IM dsclient.exe
7.
8.
9.
10.
11.
Replace [other-node] with the IP address or machine name of the target node. If these commands fail, you have a network or configuration problem that you must resolve before you can continue. All nodes (including the DS-Client database machine) must be synchronized to the same time server and configured to the same time zone to ensure time-consistency. Otherwise, confusing (or even failure) scenarios may occur regarding logs and backups. To configure a Grid DS-Client, you must first install the DS-Client software on all nodes (pointing to the same database and using the same encryption keys, etc.) WITHOUT starting the DS-Client service. After completing all installations, run DS-Client setup (DSConfig.exe) on any node to configure the nodes that will join together as the Grid DS-Client. See 8. Configuring the Grid DS-Client Nodes (node level configuration) on page 432. The machine name (NetBIOS name) and internal/external IP are needed in the Grid DS-Client configuration for each node. The internal IP is used for communication between nodes in a Grid DS-Client. The external IP is used by the DS-System to identify if connection is allowed for that DS-Client. DS-User can use either internal or external IP, depending where the DS-User is located (LAN/WAN). If a stand-alone DS-Client is upgraded to a Grid DS-Client, the original DS-Client must be the first node in the Grid DS-Client to be configured using DS-Client setup (DSConfig.exe). To downgrade a Grid DS-Client to a stand-alone DS-Client, you can run DS-Client setup on the node that will become stand-alone, and remove all nodes from the Grid DS-Client configuration. Alternatively, you can start DS-Client setup on any of the other nodes. You must leave the node that will become the stand-alone DS-Client in the Grid DS-Client configuration, and all other nodes must be removed from the list. If you need to re-configure (add new nodes or remove existing nodes) a Grid DS-Client (including upgrade from stand-alone and downgrade to stand-alone): You must first stop the DS-Client service on all nodes. After that, start DS-Client setup to configure the Grid DS-Client. After the Grid DS-Client configuration is done, modify the connection on DS-System side accordingly for this (Grid) DS-Client. Un-register this (Grid) DS-Client on DS-System side. Start the DS-Client service on the desired nodes, and register to DS-System.
Note:
Any nodes that were not started at the time you re-registered to DS-System will send their hardware registration information to DS-System later, on their next connection to DS-System. 12. If any nodes hardware information is changed, or new nodes are added into the Grid DS-Client (including upgrading from stand-alone), you must re-register to DS-System. For more details, see: Re-register the DS-Client with the DS-System on page 33 13. Port 4410 is used for the communication between nodes in a Grid DS-Client. This port must be opened on all nodes of the Grid DS-Client. 14. Since the Grid DS-Client configurations are stored in the DS-Client database, whenever you change the Grid configuration, you should backup the DS-Client database with Daily Admin or Weekly Admin as soon as possible. Otherwise, if the database becomes corrupted or suffers some type of failure, you will have to reconfigure after recovering the DS-Client database.
4. Connectivity
1. The DS-User will only be able to connect to the Main Node. Since the Main Node is variable, the DS-User must be initialized with all the IP addresses of all the nodes of the Grid DS-Client. 2. Each node will connect to DS-System in a separate network connection, using its own external IP. 3. Each node must be able to connect to all source data to be protected. 4. A High-speed network connection (at least 1 Gigabit per second is recommended) is necessary between Grid DS-Client and the data source to improve the overall backup service performance.
Grid DS-Client.
You must configure at least two nodes to make a Grid DS-Client. If you configure only one node (or none), this DS-Client will be a standalone DSClient. User input and modification of nodes is controlled by the Add, Update and Delete buttons.
nodes restart, they will connect to DS-System and download the auto-upgrade package (this time auto-upgrade will only stop the DS-Client service on the local node). 2. Auto-upgrade will be triggered if: When starting DS-Client service, at least one other node is found to have a higher version (only the node performing upgrading will be stopped for upgrading and restarted automatically). When connecting to DS-System, a higher version DS-Client auto-upgrade package is available. Recover DS-Client Database 1. The Recover DS-Client database process can be performed on any node (DS-User > Setup Menu > System Activities: Repair). Since the DS-Client Database Recovery needs exclusive access to the database, all nodes are required to stop for recovery. After the node that performed recovery successfully downloads the database dump, it will notify all other nodes to stop. Once it detects all other nodes have stopped, it will notify the user to restart the DS-Client service on that node. Before that node has successfully recovered the DS-Client database (database load completed), other nodes will not be able to start. 2. If an old DS-Client database is recovered and is not compatible with the current DS-Client executable, you must run the latest DS-Client installation to upgrade the DS-Client database. Otherwise, the nodes will not be allowed to start. 3. For more information on this process, see the Knowledge Base article: Recovering the DS-Client Database on page 718. Version control If a nodes version is lower than the highest version in the Grid DS-Client, it will perform auto-upgrade right after starting the DS-Client service. If auto-upgrade is not allowed or fails to upgrade, a version compatibility check will be performed and nodes that are not compatible will not be allowed to start.
See Also
Grid DS-Client (Windows DS-Clients) on page 70
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
NOTE: The DS-MLR Service is bundled with the DS-Recovery Tools installation.
This article covers DS-MLR (Message Level Restore) installation and setup issues: DS-MLR Server Installation Support Matrix on page 434 : DS-MLR Service Account requirements on page 435
Outlook 2003
Windows 2003 Server (32-bit) Server in Single quorum device server clusters Active Support Windows Vista Outlook 2007 Windows 2008 (32-bit/64-bit) Windows 2008 R2 (64-bit) Windows 7 (32-bit/64-bit) Windows 8 (32-bit/64-bit) Windows Vista Windows 2008 (32-bit/64-bit) Outlook 2010 Windows 2008 R2 (64-bit) Windows 7 (32-bit/64-bit) Windows 8 (32-bit/64-bit) Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support
Matrix Legend: Active Support: DS-Client supports backup / restore on these target objects. Passive Support: Backup / restore tests have not been performed on these platforms, but there should not be any technical limitations. Not Supported: Backup / restore is not supported. No Vendor Support: Vendor does not support installation of target object on these platforms.
DS-MLR service account must be a member of Domain Admins and local/Builtin Administrators groups. This scenario is simple, but some network security policies may not allow use of the Domain Admins group. DS-MLR service account must be a member of local Administrators group. DS-MLR service account must be a member of Domain Builtin Backup Operator or Administrators group. DS-MLR service account must be delegated as Exchange Full Administrator. This scenario is a little complicated, but does not require use of the Domain Admins group. This option is more flexible from a network security standpoint. However, when starting up, DS-MLR may fail to grant the "Receive As" right for some or all mailboxes to the service account. Therefore, you must manually add the "Receive As" privilege to the Windows User account for the backup set (Backup Set Properties > Connection Tab).
Microsoft Exchange Contacts and Distribution Lists: Contacts and Distribution Lists may need to be handled with different APIs in order to successfully backup Microsoft Exchange Servers.
Backup using MAPI API Because the Distribution Lists and Contacts are Outlook-based attributes, the DS-MLR can use MAPI to perform backups. MAPI has the following limitations based on the DS-MLR service account: In order to logon to another users mailbox through MAPI, the service account needs the receive as right, and the right to create a temporary profile. DS-MLR can grant the receive as right if the DS-MLR service account is either a Domain Admin or an Exchange Full Admin. Backup using Exchange CDO API (up to Microsoft Exchange 2007) If DS-MLR uses Exchange CDO to backup all items, some Outlook attributes (like the members list of the Distribution List) cannot be read. With CDO, DS-MLR has the following limitations: The restored Distribution Lists are empty. The restored Contacts cannot be seen in Outlook Address Book.
1. Both CDO and MAPI APIs are kept in DS-MLR. The default is to try using MAPI API. 2. If DS-MLR fails to grant receive as right to its DS-MLR service account, then DSMLR will use the CDO API. 3. If DS-MLR fails to use MAPI, then DS-MLR will use the CDO API. 4. When using the CDO API, DS-MLR will not backup the Distribution List. Important notes about MAPI and CDO for newer Microsoft Exchange Server releases: From Microsoft Exchange 2007, the MAPI (Messaging Application Programming Interface) client was removed from the installation. From Microsoft Exchange 2010, the CDO client is no longer supported. Only the MAPI client will work, even though it is not included with the default Exchange 2010 installation. The MAPI client is still required by DS-MLR and must be downloaded and installed separately from Microsoft (free download). For Exchange 2007 / 2010, you must download it separately from Microsoft and install it on the DSMLR machine / Exchange server.
See Also
E-Mail Messages (DS-Recovery Tools) on page 141 Backup / Restore of E-Mails (using DS-MLR) on page 599
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
DS-Client can be configured to send E-Mail / pager notifications in the event of a critical backup failure, allowing an Administrator to react instantly to such failures. In addition, DS-Client can regularly mail out a summary of backup activities (during Admin processes). DS-Client notifications can be: SMTP MAPI
To use DS-Client with non-tightly coupled transports, such as Internet Mail, you can force DS-Client to use the MAPI Spooler by setting the Registry value [HKEY_LOCAL_MACHINE \ System \ CurrentControlSet \ Services \ DS-Client \ Parameters] MailUsingSpooler to a nonzero DWORD value. Keep in mind that such use is not supported by Windows architecture and errors are bound to ensue. Make sure no other MAPI client applications are executed on the DS-Client computer. How to Create a Mail Profile for DS-Client 1. Have a mail account created on the mail server for use by DS-Client. 2. Login to the DS-Client computer using the <<DS-Client service account>>. If the DS-Client computer is running Windows, it is the account found in the Services Control Panel for Asigra Cloud Backup service. Don't forget to select the correct domain when logging in. 3. While logged in with the DS-Client service account, install your mail client (if not already installed) and use it to create a new (or edit an existing) Mail Profile. a. Add to the Mail Profile a messaging service that includes a tightly coupled message store and transport, such as Microsoft Exchange Server, and configure this messaging service to use the mail account created in step 1; b. Specify a message store added in 3.a as the default message store; c. Move transports added in 3.a to the top of the transport order; d. Specify the default address book of your choice; e. Save the Mail Profile, start a mail application, configure it to use the Profile just created and proceed to send a test message. Once you have successfully tested your Mail Profile, you may configure DS-Client to use it. (See DS-User Guide: Notification Tab).
Notes
1. ASIGRA strongly recommends using SMTP notifications. 2. Certain mail clients (e.g. Eudora Mail) may replace the MAPI Stub Library (MAPI32.DLL) with a version that does not support the Extended MAPI interface. If this happens, reinstall Microsoft Outlook.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
SNMP Notification
Creation Date: May 27, 2002 Revision Date: August 29, 2011 Product: DS-Client
Traps
Asigra Cloud Backup software can send traps as notifications as follows: SNMP Traps from DS-Client SNMP traps that are configured per backup set (Set Properties - Notification tab) can be sent for any of the following backup results: Successful Completed with warnings Completed with errors Incomplete For per backup set DS-Client SNMP traps, a trap will be sent once, immediately after each backup activity finishes. In addition, DS-Client can be configured to send a special trap as a "heartbeat" signal (at a user-defined frequency configured in Setup > Configuration > SNMP tab). This signal can be used to determine if the monitored Asigra Cloud Backup service is running normally. SNMP Traps from DS-NOC DS-NOC tool can be configured to send traps after it receives (monitors) the following events from DS-Clients (these events are defined on the DS-NOC server): Backup finished successfully Backup finished with intermediate errors Backup finished with critical errors Scheduled backup was not triggered for [xx] hour(s) DS-Client does not connect to DS-NOC for [xx] day(s) Further information (backup set name and DS-Client name) about this backup activity is in the first VarBind parameter coming with the trap. For example, in HP OpenView, you can use "$1" parameter in event message setting to retrieve the first VarBind data. In addition, DS-NOC can be configured to send a special trap as a "heartbeat" signal (at a user-defined frequency). This signal can be used to determine if the monitored Asigra Cloud Backup service is running normally.
ASIGRA MIB
The MIB (Management Information Base) file for Asigra Cloud Backup can be found in the DS-Client installation directory (filename: asigra.mib). This file describes how the objects are organized. ASIGRAs IANA Private Enterprise Number is 15538. Check http://www.iana.org/assignments/ enterprise-numbers.
Configuration
DS-User From main menu, choose "Setup > Configuration > SNMP" to configure DS-Client SNMP settings (destinations). Notification events are configured per backup set ("Sets > Backup Sets > Properties > Notification"). For more details, use the online help for these dialogs. DS-NOC The DS-NOC server is configurable via a Web Browser. Once logged in to a DS-NOC, you can configure Notifications for DS-Clients. In one of the configuration pages, you can select the option "Send SNMP trap". For more details, refer to the DS-NOC User Guide. Configuration Sample (With HP OpenView) This sample provides a general example of how a third-party application can use the traps sent by DS-Client or DS-NOC. Load asigra.mib into HP Openview. 1. Options > load/unload mibs: snmp >load from disk 2. After that, two new categories (enterprises) can be found in event configuration dialog. Configure DS-Client Events 1. Options > event configuration 2. Choose DS-Client from enterprises portion. There are several options in the event list for enterprise DS-Client, including: Clientbackup completed Clientbackup completed with errors Clientbackup failed Client Heartbeat 3. You can modify these events by double-clicking these specific events, setting event message actions, severity level and event log messages.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
If you wish to backup and restore NetWare file systems (including NDS, Trustees, etc.) the DS-Client computer must have the Novell NetWare client loaded.
Windows
For DS-Clients running on Windows XP or Windows 2003, Novell's NetWare client v.4.9.1 SP2 or higher is required. For DS-Clients running on Windows VISTA or Windows 2008, Novell Client 2 for Windows Vista/ 2008 is required.
Conclusion
Once the appropriate Novell NetWare client is installed, the DS-Client will be ready to backup/ restore NetWare servers (with all features, including security).
See Also
Backup / Restore of Novell NetWare files from a Windows DS-Client on page 542 Backup / Restore of Novell NetWare files from a Linux DS-Client on page 544
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article contains additional information about Snapshot Transfer.
See Also
Snapshot Manager on page 312
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Troubleshooting: DS-Client Workaround for Mac OS X (10.6 Snow Leopard) Auto-Mount Configuration
Creation Date: March 25, 2010 Revision Date: May 12, 2010 Product: DS-Client (Macintosh)
Summary
This article only applies to DS-Clients running on Mac OS X 10.6 (Snow Leopard). With the release of Mac OS X 10.6, Apple removed the public API for listing exported volumes. As a result, although the ability to mount volumes and access data remains, the Mac DS-Client is unable to obtain the available volumes for backup. This limitation affects backup set creation, editing backup sets, and restoring data to alternate locations. This means a default DS-Client installation running on Mac OS X 10.6 cannot use auto-mount backup sets (agentless backup for Mac OS X using Mac-specific API). These are backup sets created by browsing for active Mac volumes on your network (New Backup Set Wizard > Select the computer screen: Local File System\Auto Mount). The rest of this article deals with a temporary workaround.
The mountpoint list is composed of double-quoted items with comma as a separator. Each item must specify the machine name (or IP) followed by a colon (':') and then the exact mountpoint name or wildcard ('*') to denote all mountpoints (e.g. MacMach.local:Macintosh HD). You can exclude an item by using the minus (-) sign before the machine name or IP address. The user permissions list is composed of keywords (cAsE-sEnSiTiVe) and usernames with comma and whitespace as separators. Any usernames after the keyword ALLOW will be allowed to authenticate with the corresponding mountpoint list. For rules that are intended to apply to all users, the keyword EVERYONE can be used. To exclude certain users from the permissions list, place the usernames after the keyword EXCEPT (note: EXCEPT EVERYONE will deny all users right to authenticate with the corresponding mountpoint list). These usernames must also be defined on each corresponding machine where they attempt to authenticate. The following is a sample mountpoints.permissions file (/Library/CloudBackup/DS-Client/ automount/mountpoints.permissions):
# format = <Mountpoint list> % <Users permissions list> # allow dave to authenticate with Dave's Public Folder on # any machine Dave's Public Folder % ALLOW dave # allow dave and alice to authenticate with Mac HDD on # MacMach.local MacMach.local:Mac HDD % ALLOW dave, alice # allow everyone except dave to authenticate with Macintosh # HD on MacMach.local MacMach.local:Macintosh HD % ALLOW EVERYONE EXCEPT dave # allow alice to authenticate with all mountpoints on # AppleMach.local except Mac HDD AppleMach.local:*, -AppleMach.local:Mac HDD % ALLOW alice # IP works too 192.168.100.101:Mac HD2 % ALLOW EVERYONE #in-line comment
Changes to these configuration files do not require a DS-Client restart. They will take effect upon the next activity.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
In order to ensure integrity of the data that the DS-Client backs up and restores on a customer network, a digital signature is created and attached to every file that the DS-Client transfers to the DS-System. A digital signature represents 128-bit code that identifies data within the file. Even a one-bit change to a file will produce a different digital signature. Digital Signatures are used for several processes: Digital Signature during Restore on page 447 Digital Signature during Validation on page 447 Verify Digital Signature (option on Demand Backup) on page 447
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
In order to secure customer information that is transferred to the DS-System, the DS-Client encrypts every file it sends to the DS-System with encryption keys provided by the customer. The files are stored and remain encrypted on DS-System storage at all times. The decryption process occurs during the restore operation on the DS-Client itself. This ensures that any information transferred and stored outside the customer location is always encrypted. Currently, the DS-Client uses either the DES encryption algorithm (56-bit encryption key), or AES encryption algorithm (128-bit, 192-bit, or 256-bit). Configuration and Location of Encryption Keys on page 448 DS-Client Encryption Key Types and Usage on page 448 Encryption Key Verification on page 448 Retrieving the DS-Client Encryption Keys on page 449 AES Disclaimer on page 449
Intentional or unintentional changes to the encryption keys will make data stored on the DS-System unusable. This verification process ensures integrity of both private and account keys (account key verification ensures that all DS-Clients for the same customer account are configured with the same account key).
AES Disclaimer
The DS-Client integrates Dr. Brian Gladmans implementation of the AES (Rijndael) algorithm designed by Joan Daemon and Vincent Rijmen. This implementation is referenced in the information on the AES development efforts on the Computer Security Resource Center website maintained by NIST (National Institute of Standards and Technology - USA). For more information please visit the following URLs:
http://csrc.nist.gov/CryptoToolkit/aes/rijndael http:/fp.gladman.plus.com/cryptography_technology
See Also
Encryption Key Safeguarding at the DS-System on page 33 DS-Client to DS-System Authentication on page 450
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
In order to prevent unauthorized access to the DS-System, several protection layers are implemented on the DS-System computer to ensure that only authorized computers are able to gain access to DS-System storage. Those protection layers can be divided into following categories: Network access layer 1. Outside connections can only be initiated on a separate network interface with the TCP/IP protocol. 2. The only TCP and UDP ports enabled are those used by the DS-System and DS-Client services. 3. The incoming DS-Client connection's IP address (or range) is validated against the DS-Client profile (optional). 4. User ID and password validation is performed for dialup connections (T1/ISDN access). 5. CLID (caller ID) validation is performed for T1/ISDN access (optional). Configuration layer 1. The DS-Client must pass valid Customer Account and DS-Client numbers to the DS-System. Registration layer 1. The DS-Client performs an automated, one-time registration with the DS-System (if "requires registration" is selected). The registration is performed automatically on the first DS-Client connection to the DS-System. If re-registration is required, a registration request must be explicitly enabled by the DS-System operator at the request of the DS-Client user. 2. The Registration process passes information constructed from the DS-Client computer's hardware and system on every connection request. Once a DS-Client is registered, the DS-System can optionally validate DS-Client registration information for every subsequent connection attempt. Registration validation provides a high level of confidence that the DS-Client computer attempting to connect is the same computer that performed the registration. 3. The DS-Client registration validation will fail in the following circumstances: if you reinstall the Operating System of the DS-Client computer install the DS-Client on a different computer boot a different Operating System on the DS-Client computer (e.g. if you have a dual-boot machine.) change hardware components like the system hard drive or network card Encryption authentication layer 1. Encryption Key Cookies: The Registration process also saves encryption key cookies (meaningless data encrypted with DS-Client keys, that are passed on every connection request) that the DS-System validates on each connection attempt. This
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
prevents a DS-Client from connecting to the DS-System with changed or corrupted encryption keys. Additional conditions for connection request failure 1. Customer Account or DS-Client does not have 'active' status. 2. DS-System shutdown is in progress. 3. DS-System activities are disabled. 4. DS-Client Service period violation (service period expired). 5. Account Key required and not configured for customers with multiple DS-Clients.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
When the DS-Client is installed and deployed on the Windows platform, it uses the Logon Impersonation feature. This feature allows the DS-Client to perform backup/restore activities under the security context of that particular user account. Several such activities can be performed simultaneously, each under a different (or the same) user account, connecting to a different (or the same) network resource. This feature is especially valuable (and sometimes even essential) when connecting to resources on a Microsoft Windows Network.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
When the DS-Client is installed and deployed on the Windows platform, it uses the User Privileges feature. The DS-Client attempts to activate specific user privileges when performing backups or restores of a Windows computer. Those privileges are applied for each activity (thread) under the supplied user's credentials. To successfully activate those privileges, the user account must have user rights enabled for that privilege (in 'User Manager'). Depending on the server configuration, failure to activate those privileges may not permit the backup/restore to be performed successfully.
See Also
Logon Impersonation and Integrated Security on page 452
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
If you want to distribute credentials without telling the recipient the actual password to a network resource, DS-Client can accept input from an encrypted file. All the recipient needs to know is the key (password) that unlocks the file. For example: If your Service Provider is managing the DS-Client, and you do not want them to know the credentials, you can create an encrypted file (default filename: backup.key). You can supply this file to your Service Provider and tell them the password to use the backup.key. The backup.key file can be used in the Enter / Modify Credentials screen. 1. Create an encrypted file. A software tool (filename: MakeKey.jar) is supplied for you to make the backup.key file. MakeKey.jar is located in the DS-User or DS-Client installation directory. The Java 2 Runtime Environment Version 1.4.2 or later must be installed on the local computer. Double click on the application icon and enter the information. 2. Give the file to your service provider and tell them where to use it. They need to know the key that unlocks the file. Multiple encrypted key files can be created. Using descriptive names can help recipients know the right key to use. If you want, you can use the same password (unlock key) for different backup key files, according to your requirements. 3. The encrypted file can be used when creating or editing backup sets.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This section describes the Logon using security context features in greater detail. Target Name (Logon using Security Context) on page 455 Auto-Connect (Logon using Security Context) on page 456
ComputerAccount must be used if registering DS-Client on the local computer. ServiceAccount must be used if registering on a Domain.
3. Once registered, this DS-User will supply the Target Name for DS-Client to verify using Kerberos authentication. This will establish the trust required for an authenticated user from this DS-User GUI to connect to a remote DS-Client on another network. Each DS-Client requires its own separate SPN for the same Target Name.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
WARNING:The default settings are sufficient to run any DS-Client. Do not attempt to change these settings, unless you have a specific requirement and have confirmed this with your Service Provider.
The Advanced Configuration option contains a list of parameters that can fine-tune how the DSClient behaves. To access the Advanced Configurations settings: 1. From DS-User Setup Menu > Configuration. 2. In the DS-Client Configuration screen, select the Advanced tab. 3. Parameter values can only be edited. The parameters screen is slightly different, depending on the type of DS-Client: Windows DS-Client parameters on page 458 Note: Windows DS-Clients have additional settings for Grid DS-Clients (Global parameters and Leaf-Node-Specific parameters). Some parameters can only be Global, while others can be both. These differences are noted in the table. Linux / Mac DS-Client parameters on page 468 WARNING:If you change any of these parameters, they will significantly change DS-Client behavior (performance). Changes to some parameters only take effect after the DS-Client restarts.
Category: ADMIN Parameter Global / LeafNode-Specific Description / Values (Weeks) - Interval for Weekly Admin to not synchronize backup sets that have only internal inconsistencies. Range: 0-12 Default Value: 0
AdminSkipSync
Global only
Skip synchronization of backup sets during Weekly Admin if no database inconsistencies are detected. No = OFF Yes = ON (default) Specifies the order in which backup sets will be synchronized during Weekly Admin. Possible values are: No specific order enforced Bigger sets first (ones that contain more backup items) (default) Smaller sets first This parameter configures maximum number of synchronization threads during weekly admin. Range: 1 to 8 Default Value: 1 This parameter configures the Dump path for DS-Client Database during admin activities. This path can be local or a UNC path. UNC is recommended for Grid DS-Clients. If not set, the default dump path will be the DS-Client Buffer.
AdminSyncOrder
Global only
AdminThreads
Global only
DSCDBDumpPath
Global only
Category: COMMUNICATION Parameter Global / LeafDescription / Values Node-Specific Low-level communication method between DS-Client and DS-System. 0 = Network packets are not encrypted. (Fastest) 1 = Same as method 0 with a different implementation. (For trouble-shooting purposes only.) 2 = (DEFAULT) Network packets are encrypted on top of existing data encryption. (Slowest) Low-level communication method between DS-Client and DS-MLR / DS-Recovery Tools. 0 = Network packets are not encrypted. (Fastest) 1 = Same as method 0 with a different implementation. (For trouble-shooting purposes only.) 2 = (DEFAULT) Network packets are encrypted. (Slowest) Default value of this parameter is 0. This parameter configures the Alternate port to connect to DS-System. If DS-Client fails to connect to DS-System on the default port (4401), it will try this port number (if configured). 0 means do not try to use an alternate port. IP Address to listen for Hessian API Connections. Use '0.0.0.0' to listen on all interfaces. Port on which to listen for Hessian API Connections Default is 4411 Log file to use for the Hessian API Server Valid Values: any valid file name Log level to record in the Hessian API Server logging file debug: info: warning: (default) error: fatal: SSL certificate/key file to use for the Hessian API Server (PEM format) Default Value: C:\Program Files\CloudBackup\DS-Client\api.pem
Generated on: 10/15/12 Page: 459
Confidential.
CommunicationMethodDSS
Global only
CommunicationMethodMLR
Global only
DSSystemAlternatePort
Global only
Global only
Global only
Global only
SSL certificate/key file passphrase Enter a valid password / passphrase for the SSL certificate/key file specified in the HessianApiSSLFile parameter. This parameter configures the interval after which the network connection with DS-System is checked regularly by the DS-Client having schedule(s) configured with the option of verify network connection. This is particularly useful for DS-Client installed on portable devices. The minimum timeout period for API messages. You can increase this parameter if you encounter a large amount of Timeout on receive message errors. range 10-14400, default is 10 (minutes) Defines how often to retry the primary DS-System connection after switching to a secondary connection (in hours). -1 never retries, 0 retries immediately. range -1 to 240, default is 24
LaptopCheckInterval
Global only
MinApiMsgTimeout
Global only
RetryPrimary
Global only
TcpSocketBuffer
The value of this parameter is in Bytes. This value is used if it is bigCan be either ger than the default TCPWindowSize. Default value of this parameter is 24*MSS=0x87C0 (34752) Bytes Global only (seconds) Timeout period for DS-Client to receive a response for a VSS (Volume Shadow Copy) operation. The VSS operation will fail after the timeout period. range 60 to 3600, default is 300
VSSKeepAliveTimeout
Category: INSTALLATION Parameter Global / LeafDescription / Values Node-Specific Determines what DS-User auto-upgrade packages this DS-Client will download from DS-System if they are available. Disabled: DS-User auto-upgrade packages will not be automatically downloaded from the DS-System. Cross-Platform DS-User Auto-Upgrade: DS-Client will download all DS-User auto-upgrade packages that exist on the DS-System to the DS-Client directory during Daily/Weekly Admin. Compatible-Platform DS-User Auto-Upgrade: DS-Client will only download the DS-User upgrade packages which are compatible with the OS of the DSClient. A list of file names that will be skipped by Windows DS-Client if encountered during backup. The list is an alphanumeric text string of file names. Each file name is separated by \; (a backslash followed by a semi-colon). The end of the string it signalled by a second \; as in the following example of the default list: system.da0\;user.da0\;pagefile.sys\;win386.swp\;backout.tts\;btrieve.trn\;net$obj.sys\;net$val.sys\;net$prop.sys\;\; Note: Each Windows computer can have additional files configured to be skipped in the local registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\BackupRestore\FilesNotToBackup. DS-Client will skip these files when encountered during backup of regular shares or drives (but not for System State or Services Database items).
DS-UserAutoUpgrade
Global only
SystemFiles
Global only
AllowAutoConfig
Global only
Allow DS-Client to apply Auto-configuration from the file configupdate.xml. No = OFF Yes = ON (default) Allow auto-upgrade of DS-Client from DS-System when their version does not match. No = OFF Yes = ON (default) If set to "YES", it allows the execution of local commands during Pre/ Post Activities. You must be an administrator and have this option enabled, in order to enable the Pre/Post Activities. If this parameter is changed, it takes effect next time the DS-User GUI connects to DS-Client Service. No = OFF (default) Yes = ON Configures scheduled backups to use the "verify signature for unchanged files" feature. By default scheduled backups do not verify the signatures of unchanged files on the backup source. If this parameter is set to "YES", then scheduled backups will verify the signatures of unchanged files on the backup source. Turning this option ON can have significant implications on the performance of the DS-Client. No = OFF (default) Yes = ON Detect MS SQL instances when browsing domains/workgroups No = OFF (default) Yes = ON [DS-Clients using SQL Server 2005/2008 Express] This parameter (in percent) sets the level at which the Daily Admin or Weekly Admin will automatically expand the DS-Client database to create a new, sequentially named expand<nnnn> database. The percentage is calculated against the maximum allowed size for an individual database (4GB). range 0 to 100, default is 70 (percent) For SQL Server 2005/2008 Express, the maximum size of an individual database is 4GB. [DS-Clients using SQL Server 2005/2008 Express] If the current amount of space used in an expand<nnnn> database is less than this parameter (in percent), Daily Admin and Weekly Admin can move backup set tables into that database. range 0 to 80, default is 40 This parameter value (in seconds) sets the default Database query timeout. Default: 500 0=Unlimited Timeout Range: 0 to 65535 This parameter only applies to time consuming Database queries known by the DS-Client. The value (in hours) sets the longest Database query timeout period. If a Database Query takes more time than this parameter value, it is aborted by the DS-Client. Default: 18 0=Unlimited Timeout Range: 0 to 19
AllowAutoUpgrade
Global only
AllowLocal
Global only
BrowseCheckSQLInstances
Global only
DBHighWaterMark
Global only
DBLowWaterMark
Global only
DBQueryTimeout
Global only
DebugMessage
This parameter sets the detail level of error messages reported in the DS-Client Event Log. 0 = (Default) Standard level of error-message reporting. 1 = Some additional detailed log information is reported. You will Can be either notice that database errors are appended with the SQL statement. 2 (or any higher number) = Same behavior as 1, with additional debug information reported in a DS-Client debug log file (dsclient.exe.dbg.log located in the DS-Client installation directory). This option is meant for debug situations only. Global only The default period to keep data in the Local-Only trash. This applies to all defined Local-Only paths for this DS-Client. Valid values: 1-999, default is 7 (days) (count) - Maximum number of attempts to read the first buffer from a file during Microsoft Exchange server backups. Default: 30 Range: 1-3600 If yes, force all applicable backup sets to check signature for unchanged files. The checking will be performed once during the next backup of each backup set. This setting applies only once. This means, as soon as you select "Yes" and apply, it will immediately take effect and the value is changed to "No" again. No = OFF (default) Yes = ON This parameter value will configure the Local Drive Filter Flag for Backup. By changing this parameter value you can control the Drives available for backup in the New Backup Set Wizard (applicable only to File System & Permissions Only backup sets). The default value for this parameter is -1, allowing all the available local drives. This value is converted from decimal to binary to determine if a drive is allowed (1 means allowed, 0 means disabled). For example: to allow only C and E drives, use the value 20 ... F E D C B A [drive letter map] ... . 1 0 1 0 0 [binary] ... . . . . 2 0 [decimal value] The binary representation of 20 matches bit0 for 'A:' disabled, bit1 for 'B:' disabled, bit2 on - 'C:' allowed, etc. Note for Grid DS-Client, this parameter has no effect.
DefaultLocalTrashKeepDays ExchangeMaxESERetries
Global only
ForceBackupCheckSignature
Global only
LocalDriveAllowed
Global only
LocalVDRToolHardwareCookie
Global only
Reset the Local DS-VDR Tools hardware cookie. If Yes, the hardware cookie will be reset on the next connection, then this value will automatically become No. No = OFF (default) Yes = ON Path where the Detailed Log for activities on the DS-Client are stored. Detailed Logs are located in this folder, under a sub-folder called asigra_archivlog where each backup set has its own numbered subfolder. Note for Grid DS-Clients: You should enter a UNC path that is accessible from all nodes of the Grid. This will ensure that all detailed logs are located in a common and accessible location. This parameter sets the default Stop on errors value that appears when creating new backup sets (in the New Backup Set Wizards Options Tab). range 0 to 9999, default is 0 (no limit)
LogArchivePath
Global only
MaxErrors
Global only
MaxNonFullDumps
Global only
Default maximum number of times a full dump of a Microsoft SQL Server database can be skipped in favor of a differential or incremental dump. After this number is reached, the next backup will force a full dump of the database. range 2 to 1000, default is 120 Configures the DS-Client for Multi-Tenant mode. No = OFF (default) Yes = ON If this DS-Client has started in Read-Only (Stand By) mode (no backup / restore allowed), this is the interval at which it will check for an upgrade package from DS-System. Valid values 1-60, default is 5 (minutes) (Minutes) - This parameter configures the default timeout period of DSClient for Remote Command Execution during Pre/Post Activities. range 1 to 1440, default is 60 Integration DLL for automatic restore target provisioning Any valid path to the corresponding DLL file that the DS-Client can access. Default is none. (Hours) - This is the period in which missed schedules will be triggered by the DS-Client, even after the actual scheduled time. range 1 to 16, default is 6 Path to a third party security DLL to secure the communication. By default, this path is empty. When this parameter is set to "YES", then in the New Backup Set Wizard (for File System & Permissions Only Backup Sets) you can see the "Backup as POSIX" checkbox. "Backup as POSIX" can only be selected when you create a new backup set. It cannot be configured from backup set properties. No = OFF (default) Yes = ON Indicates if Microsoft SQL Server backup set database dumps are kept in the dump location after the backup has been performed. This only applies to the classic MS SQL Server backup set type (not the VSSaware version). No = OFF (default) - Dump is deleted after backup has finished. Yes = ON - Dump is kept in the dump location. It will be overwritten during the next backup of that set. Note the storage implications, since this will affect all MS SQL Server backup sets created on this DS-Client. For VSS-aware Microsoft SQL Server backup sets. Stops a differential backup if it failed to retrieve the LSN (Log Sequence Number) information of the previous full backup. Yes = ON (default) No = OFF If Yes, the VSS-aware backup will continue even if there were writer errors, as long as the snapshot was created successfully. This will only occur after all configured retries have been attempted (VSSSnapshotRetries). Yes = ON (default) No = OFF
Multi-Tenant
Global only
ReadOnlyUpgradeInterval RemoteExecutionTimeout
Global only
Global only
RestoreTargetProvision Global only (RESTART REQUIRED) ScheduleMiss SecurityDll Global only Can be either
ShowPOSIX
Global only
SQLKeepDumpFile
Global only
StopOnRetrieveLSNFailed
Global only
VSSContinueIfSnapshotCreatedWithWriterErrors
Global only
VSSSnapshotRetries
Global only
If a VSS-aware backup creates a snapshot with writer errors, the DS-Client will retry creating the snapshot without any errors. This is the number of times DS-Client will retry creating an error-free snapshot. Default: 3 Range: 0-999, (0 means backup will fail if snapshot encounters VSS writer errors The retry interval for VSS snapshot retries (VSSSnapshotRetries). Default: 5 (minutes) Range: 1-99 Timeout while waiting for a VSS snapshot to be created. A longer period can prevent backup failures if different backup sets need to perform VSS backups of a common volume at nearly the same time. (Only one VSS snapshot can be performed on a volume at a time. Since snapshots are fairly fast, a timeout of 5-15 minutes should ensure two different backups of the same volume can be successfully completed, even if they overlap.) Default: 60 (seconds) Range: 1-3600 (Seconds) - This parameter value sets the time the DS-Client will wait for file confirmation from the DS-System if a backup activity is stopped. Default: 60 Range: 0 to 3600
VSSSnapshotRetryInterval
Global only
WaitConfirmation
Global only
Category: NOTIFICATION Parameter Global / LeafDescription / Values Node-Specific [Only works if DS-Client database is local. Ignored if using a remote DB.] (0.01%) - Emergency warning level for the available space on the disks where the DS-Client database resides. Default: 500 (5%) Range: 0-10000 [Only works if DS-Client database is local. Ignored if using a remote DB.] This parameter value (in MB) configures the Minimum amount of free space reserved in the DS-Client Database. Low space checking will not count this reserved space as free space. Default: 100 Range: 10 to 500 [Only works if DS-Client database is local. Ignored if using a remote DB.] (0.01%) - Stop service level for the available space on the disks where the DS-Client database resides. Default: 100 (1%) Range: 0-10000 [Only works if DS-Client database is local. Ignored if using a remote DB.] (0.01%) - Warning level for the available space on the disks where the DS-Client database resides. Default: 1000 (10%) Range: 0-10000 This parameter value (in hours) configures the intervals after which regular Low Local Storage Emergency Warning Notifications will be issued by DS-Client. Default: 1 Range: 1 to 6
DBEmergencyLevel
Global only
DBReserveSpace
Global only
DBStopServiceLevel
Global only
DBWarningLevel
Global only
MemEmergencyFreq
Global only
This parameter value (in hours) configures the interval at which regular Low Memory Emergency Warning Notifications will be issued by DS-Client. Default: 1 Range: 1 to 6 This parameter configures the Free Memory Emergency Level. If the DSClient free memory falls to equal or below this level DS-Client will start issuing Low Memory Emergency Warning notifications. Default: 20 (20%) Range: 5 to 100 This parameter value (in hours) configures the interval at which regular Low Memory Warning Notifications will be issued by DS-Client. Default: 4 Range: 1 to 24 This parameter configures the Free Memory Warning Level. If the DS-Client free memory falls to equal or below this level, DS-Client will start issuing Low Memory Warning Notifications. Default: 30 (30%) Range: 10 to 100 This parameter value (in %) sets the Emergency Warning level for DS-Client Local Storage root. If the DS-Client Local Storage free space falls to equal or below this level DS-Client will start issuing Emergency Warning notifications. Default: 30 (0.3%) Range: 1 to 10,000 This parameter value (in %) sets the Warning level for DS-Client Local Storage root. If the DS-Client Local Storage free space falls equal or below this level DS-Client will start issuing Warning Notifications. Default: 300 (3%) Range: 1 to 10,000 This parameter value (in hours) configures the interval at which regular Low Local Storage Warning Notifications will be issued by DS-Client. Default: 4 Range: 1 to 24
MemWarningFreq
Global only
MemWarningLevel
Global only
OLEmergencyLevel
Global only
OLWarningLevel
Global only
WarningFrequency
Global only
Category: PERFORMANCE Parameter Global / LeafNode-Specific Global only Description / Values Defines the number of records in one block for System i Server (formerly AS/400) backup sets. The bigger the block size, the more efficient the delta algorithm, but more memory will be required during restore. The default is 100000 (about 50 MB). (MB) - If the file size is bigger than this value, DS-Client maintains additional meta-data during backup until a new generation is confirmed to have been saved on DS-System. This overhead is balanced by the benefit of reducing the chance of sending the next generation as a master in case the backup experiences unexpected failures. range 1 to 102400, default is 100 MB If this parameter is set to "YES" then the SQLite Database File is cached to improve the speed. By default this parameter is set to "NO". No = OFF (default) Yes = ON
AS400BlockSize
BigMasterSize
Global only
CacheSQLiteFile
Global only
DBBulkOptions
Global only
This parameter can be set as follows (selection is effective immediately): Bulk inserts disabled Bulk inserts from files allowed Bulk inserts from memory allowed Bulk inserts from files and memory allowed (RECOMMENDED) (default) This parameter configures the number of DS-Client database connections to be created when DS-Client service is started. Changes to this parameter only take effect after the DS-Client service is restarted. Default: 3 Range: 1 to 16 For ZLIB Compression only: Enter 0-9, 0 = no compression (faster) and 9 = maximum compression (slower). Default value is 6. This parameter configures number of delta threads per backup thread. If set to 0, Delta backup is singled threaded. If set to 1, a single thread does compression/encryption but it is separated from I/O thread. If set to a value more than 1, then the Delta process is multithreaded. range 0 to 16, default is 1 This parameter configures number of delta threads for file system backups. If you only backup big files, this can improve speed. For backup of small files, the default DS-Client backup threads are usually sufficient. range 0 to 16, default is 1 Encrypt the data saved in the Local Storage Buffer for Local Storage and Local-Only backup sets. If enabled, the DS-Clients Private Encryption Key will be used. No = OFF (Default) Yes = ON The internal buffer size (in KB) allocated for reading a file during the backup process. range 16 to 16384, default is 64 Used with the SendFullMaster parameter to determine when to send (backup) a full master to DS-System. range 1 to 25, default is 10 Maximum concurrent activities supported by DS-Client. Increase if hardware can support additional processing. range 1 to 99, default is 8 (32-bit Operating Systems) and 12 (64bit Operating Systems) (GB) - Maximum file size for delta algorithm to apply. The bigger it is, the more memory is needed for delta processing. range 1 to 102400, default is 102400 (32-bit Operating System) range 1 to 1048576, default is 1048576 (64-bit Operating System) The allowed maximum pending I/O requests for a single file (backup or restore). Increasing this value may improve backup / restore speed if the target storage has very good parallelism (ability to perform simultaneous I/O requests). This option is provided for high performance environments where you can test the disk I/O. WARNING: Increasing this value too much can cause performance to slow. range 1 to 16, default is 2 Maximum number of read threads on DS-System side for a restore process. Valid values 1-16, default is 1
Generated on: 10/15/12 Page: 466
Confidential.
DefaultCompression
Global only
DeltaThreads
Can be either
DeltaThreadsFS
Can be either
EncryptedLocalData
Global only
FileReadBufferSize
Global only
MasterGenerations
Global only
MaxCacheCopySessions
Can be either
MaxDeltaSize
Global only
MaxRestoreReadThreads
Global only
MaxRestoreThreads
Can be either
This parameter configures the maximum number of threads for a restore process. range 1 to 16, default is 4 Determines when the MaxSessions parameter applies. Scheduled Activities Only = (default) Users can perform OnDemand activities that exceed the maximum concurrent activities. (Scheduled activities cannot exceed this limit.) Scheduled and On-Demand Activities = Scheduled and On-Demand activities cannot exceed the maximum concurrent activities limit. This parameter configures the maximum concurrent activities supported by DS-Client. Increase the value of this parameter only if your hardware can support additional processing. For Grid DS-Client this parameter also refers to the Task Limit as seen in DS-User: Grid Menu > Grid Status > List Tab for each Leaf/Node. range 1 to 99, default is 8 (32-bit Operating Systems) and 12 (64bit Operating Systems) This parameter configures the maximum number of threads for each backup activity. Increase the value of this parameter only if your hardware can support additional processing. range 1 to 16, default is 4 Maximum number of threads for each DS-MLR backup activity. Increase if hardware can support additional processing. range 1 to 16, default is 4 The minimum number of online generations required in order to process files as deltas. Enter 2 or 3. Default value is 3. (KB) - Minimum file size for delta algorithm to apply. range 8 to 1048576, default is 32. (MB) - This parameter sets the internal buffer size for caching restore data. Increasing this value may improve the restore performance. range 1 to 1024, default is 2 Sends a full master (instead of sending a delta and asking DS-System to reconstruct). No = OFF (default) Yes = ON If the value of this parameter is "YES", then DS-Client will skip compression on files identified as already being compressed. Files types identified as compressed are: pk, zip, gif, png, Microsoft Cabinet Files, gzip, win, jpeg & jfif. No = OFF Yes = ON (default) Sort algorithm used to sort internal list. Merge Sort Quick Sort (%) - Limits the DS-Client's consumption of the computer's CPU during statistical backups to this percentage. range 0 to 100, default is 70
MaxSessionCheck
Global only
MaxSessions
Can be either
MaxThreads
Can be either
SendFullMaster
Global Only
SortMethod
Global only
StatisticalCpuUsage
Global only
Grid DS-Client Only - Local Setting This parameter only appears for Grid DS-Clients, when you select Local Setting. Parameter Description / Values
DSCBuffer
DS-Client buffer path. This can only be a local path on the selected Leaf-Node of the Grid DS-Client. The DS-Client service account must have full privileges for this location. The Global Value for the DS-Client buffer can be set from DS-User > Setup > Configuration > Parameters Tab.
Category: Admin Parameter Description / Values Specifies the order in which backup sets will be synchronized during Weekly Admin based on the estimated synchronization time: small backup sets first synchronize according to backup set ID big backup sets first (DEFAULT) The maximum number of synchronization activities that can run at the same time during scheduled Weekly Admin. The default value is 1. range 1-8 Skip synchronizations during scheduled Weekly Admin if no database inconsistencies are detected: No = OFF Yes = ON (default) This parameter configures the TCP/IP port(s) DS-Client uses to connect to DS-System. (Normally you should not change this setting unless instructed to by your Service Provider.) range 1-65535, default is 4401 Multiple ports can be configured by separating entries with a space, comma, semi-colon or pipe (|). Invalid configuration causes DS-Client to use 4401.
AutoSync Order
System Port
Category: API Connectivity Parameter API IP API Key File API Key Password API Log File Description / Values IP Address to listen for API Connections. Use '0.0.0.0' to listen on all interfaces. SSL certificate/key file to use for the API Server (PEM format) Default Value: /opt/CloudBackup/DS-Client/etc/api.pem SSL certificate/key file passphrase Enter a valid password / passphrase for the SSL certificate/key file specified in the API Key File parameter. Log file to use for the API Server Valid Values: any valid file name Log level to record in the API Server logging file debug: info: warning: (default) error: fatal:
Generated on: 10/15/12 Page: 468
Confidential.
API Port
Category: Miscellaneous Parameter AllowAutoConfig Description / Values Allow DS-Client to apply Auto-Configuration from the file "config-update.xml". No = OFF Yes = ON (default) Allow auto-upgrade of DS-Client from DS-System when their version does not match. No = OFF Yes = ON (default) Number of days to retain old copies of the DS-Client configuration file. Valid values: 1-99, default is 30 (days)
Auto Upgrade
[Linux DS-Clients only] DB2 Client Library DirecSpecify the DB2 client library directory on the DS-Client machine. Please make sure tory the dynamic library <libdb2.so.1> resides in this directory. (RESTART REQUIRED) For example: /opt/ibm/db2/v9.7/lib64/ DefaultLocalTrashKeepDays The default period to keep data in the Local-Only trash. This applies to all defined Local-Only paths for this DS-Client. Valid values: 1-999, default is 7 (days) Determines what DS-User auto-upgrade packages this DS-Client will download from DS-System if they are available. Disabled: DS-User auto-upgrade packages will not be automatically downloaded from the DS-System. Cross-Platform DS-User Auto-Upgrade: DS-Client will download all DS-User autoupgrade packages that exist on the DS-System to the DS-Client directory during Daily/Weekly Admin. Compatible-Platform DS-User Auto-Upgrade: DS-Client will only download the DS-User upgrade packages which are compatible with the OS of the DS-Client.
DS-UserAutoUpgrade
Local DS-VDR Tool's Hard- Hardware cookie of the machine on which the local DS-VDR tool is running. ware Cookie Set by the DS-Client. Do not modify this value. Local DS-VDR Tool's IP Address Address of the machine on which the local DS-VDR tool is running. Valid values: Any valid IP address. The default value is an empty string (no address specified). Path where the Detailed Log for activities on the DS-Client are stored. Detailed Logs are located in this folder, where each backup set has its own numbered sub-folder. Linux default is /opt/CloudBackup/DS-Client/asigra_archivelog/ Mac default is /Library/CloudBackup/DS-Client/asigra_archivelog/ Valid values: Any valid path where the DS-Client can write data. Configures the DS-Client for Multi-Tenant mode. No = OFF (default) Yes = ON
LogArchivePath
Multi-Tenant
If this DS-Client has started in Read-Only (Stand By) mode (no backup / restore allowed), this is the interval at which it will check for an upgrade package from DSReadOnlyUpgradeInterval System. Valid values 1-32000, default is 5 (minutes) Skip Compress (RESTART REQUIRED) Skip compression on files identified as already being compressed. File types skipped are: lzop, zip, standard linux compression, gzip, bzip2, scocompress, bzip, jpeg, jfif, png, and gif. No = OFF Yes = ON (default)
[Linux DS-Clients only] Determines how DS-Client handles VMware data paths, since HTTP is used. URL paths may require path escaping for special characters (e.g. use %26 instead of &). auto (default) - DS-Client tries to determine what path format is required. yes - Always use escape characters in paths no - Never use escape characters in paths [Linux DS-Clients only] For debug purposes. Writes trace logs of any SOAP requests to /tmp on the DS-Client. No = OFF (default) Yes = ON [Linux DS-Clients only] For VMware-VIX backup set type only. Path to the VMware Virtual Disk Library configuration file. This setting is only required if you want to define your own configuration file and specify different settings. You must refer to the VMware documentation for the specific parameters and file format. Default is blank (The default VMware Virtual Disk Library settings will be used). Valid Values: any valid file name
Category: Notification Parameter Database Emergency Level Database Stop Level Description / Values Emergency warning level for the available space on the disks where the DS-Client database resides. range 0-10000, default 500 (5%) Stop service level for the available space on the disks where the DS-Client database resides. range 0-10000, default 100 (1%) Warning level for the available space on the disks where the DS-Client database resides. range 0-10000, default 1000 (10%)
Local Storage Emergency Available space emergency warning level for Storage root. Level range 1-10000, default 30 (0.3%) Local Storage Warning Level Memory Emergency Level Memory Warning Level Available space warning level for Local Storage root. range 1-10000, default 300 (3%) (in %) Free memory emergency warning level. range 5-100, default 20 (in %) Free memory warning level. range 10-100, default 30
(Hours) - Emergency warning notification interval when space is low (DS-Client DB / PM Emergency Frequency Local Storage / Use Buffer / Memory). range 1-10, default 1 PM Warning Frequency Use Buffer Emergency Level Use Buffer Warning Level (Hours) - Warning notification interval when space is low (DS-Client DB / Local Storage / Use Buffer / Memory). range 4-10, default 4 Available space emergency warning level for Use Buffer root. range 1-10000, default 30 (0.3%) Available space warning level for Use Buffer root. range 1-10000, default 300 (3%)
Category: Performance
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
Description / Values For ZLIB Compression only: Enter 0-9, 0 = no compression (faster) and 9 = maximum compression (slower). Default value is 6. Encrypt the data saved in the Local Storage Buffer for Local Storage and LocalOnly backup sets. If enabled, the DS-Clients Private Encryption Key will be used. No = OFF (Default) Yes = ON (GB) - Maximum file size for delta algorithm to apply. The bigger it is, the more memory is needed for delta processing. range 1 to 102400, default is 102400 (32-bit Operating System) range 1 to 1048576, default is 1048576 (64-bit Operating System) Determines when the MaxSession Number parameter applies. Default is Scheduled Activities Only (If this is selected, users can perform OnDemand activities that exceed the maximum concurrent activities.) Valid Values: Scheduled Activities Only or Scheduled and On-Demand Activities Maximum concurrent activities supported by DS-Client. Increase if hardware can support additional processing. range 1 to 99, default is 8 (32-bit Operating System) and 12 (64-bit Operating System) Maximum number of threads for each backup activity. Increase if hardware can support additional processing range 1 to 99, default is 2 (KB) - Minimum file size for delta algorithm to apply. range 8 to 1048576, default is 32. The minimum number of online generations required in order to process files as deltas. Enter 2 or 3. The default value is 3. range 2-3 Defines how often to retry the primary DS-System connection after switching to a secondary connection (in hours). -1 never retries, 0 retries immediately. range -1 to 24, default is 24
EncryptedLocalData
Max DeltaSize
MaxSession Check
MaxSession Number
MaxThread Number (RESTART REQUIRED) Min DeltaSize MinDeltaGen (RESTART REQUIRED) RetryPrimary
Interval (in minutes) that must elapse before the Scan Shares activity will perform a database vacuum on the dslanfiles database. This only removes unnecessary data Scan Shares Vacuum Freto make the database more compact. It does not affect the information gathered quency from the scan. range 1 to 240, default is 30 [Linux DS-Clients only] Interval (in minutes) that must elapse without response before DS-Client considers the connection to a System i server to have timed out. System i Connection Tim range 1 to 600, default is 60 eout Note: The timeout is subject to change (upwards) during backup and restore, based on the size of the data being processed, however it will not be reset lower than this value.
See Also
DS-Client Advanced Configurations on page 47
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
The DS-Client software runs on Windows, Linux, and MAC computers (refer to the corresponding installation guide for supported Operating System versions). All interactions with the DS-Client are performed via the DS-User software, which is a GUI interface for DS-Client administration. The DS-User software can run on any computer with the TCP/IP protocol installed. The DS-User software can administer a DS-Client running on a local or remote computer (thereby providing remote management over a TCP/IP connection, and even over the Internet). The DS-User (or user that uses it) is required to provide valid credentials to the DS-Client for authentication before it is able to perform any activity. The authentication method that the DS-Client uses for user access validation depends on the DS-Client platform. There are two different DS-User products that are included on the installation DVD: 1. Win32 DS-User: installed by default by the Windows DS-Client installation process. This only works with Windows DS-Clients. 2. Java DS-User: installed by default on Linux and Mac by DS-Client installation process. (It can also be installed on Windows computers using the separate DSUser-Java installation.)
Note
1. DS-Client uses the DS-User credentials as default credentials for network resources when creating new backup sets.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
The DS-Client software logs all information about the activities performed (scheduled and demanded) in the DS-Client database. This information is organized into four categories and can be used to troubleshoot, monitor and report DS-Client activities. The DS-Client keeps this information in its database for a period specified in the Keep DS-Client logs' parameter of the DS-Client configuration (DS-User > Setup Menu > Configuration: Parameters Tab).
Activity Log
The Activity Log contains a high-level summary of a particular DS-Client's activities (such as backup or restore). This information can be viewed using the Activity Log Viewer, which contains the following fields:
User Name Type Owner Description Errors Start End Duration Files Online Completion ID Shows the name of the user that performed the activity (empty if scheduled). Shows the type of activity (backup, restore, delete, ...). Shows the name of the Owner of the Backup Set Shows the node, and backup set name. Shows the number of errors that occurred during activity. Shows the date and time the activity started. Shows the time of day the activity ended. Length of time between the activity's start and end times. Shows the number of files that were affected by the activity. Shows the amount of data affected by the activity. Shows the completion status of the corresponding activity. An Activity would have an incomplete status, if it was stopped by an event that did not allow it to complete. Such events are: time limit, user stop, amount limit, too many errors, internal error, lost connection/didn't connect to the DS-System and failed to connect to network resource. Activity's unique identification number.
Event Log
The Event Log contains detailed information (events) which was recorded during a particular activity. It contains mostly error events that occurred during an activity. The Event Log also contains entries for all DS-User logon/logoff attempts and errors that occurred outside of any activity (like in schedule module). This information can be viewed with the Event Log Viewer or from the Activity Log Viewer and it contains the following fields:
Icon Time User Category Event # ID Text Description Shows the event type (Information, Warning or Error) Shows the date and time that the event occurred. Shows the User Name of the user (if any) associated with the event Shows the category of the event (database, socket, system, ...) Shows a numeric error ID code. Unique ID numbers used to distinguish one activity from another. May display additional information associated with the message (ex: the IP address of a connection). Shows a description of the event.
Generated on: 10/15/12 Page: 475
Confidential.
Detailed Log
The Detailed Log contains a log of all files that were affected by a specific backup or restore activity. Only those activities whose 'Detailed Log' flag is set, will have that information recorded. This is set as follows: Scheduled backups: Backup Set Properties > Options Tab On-Demand backups: Backup Wizard > Select options for demand backup screen Restores: Restore Wizard > Select Restore Options screen. Detailed Log information can be viewed from the Activity Log Viewer.
Audit Trail
The Audit Trail contains a log of all modifications (additions, deletions and updates) made to the DS-Client configuration information. This information includes DS-Client Setup, Backup Set, and Schedule information. The DS-Client administrator can use these logs for troubleshooting and auditing purposes. This information can be viewed with the Audit Trail and it contains the following fields:
Time User Operation Table Description Shows the time the modification occurred. Shows the name of the user who performed the modification. Shows the type of modification performed. Shows the table that was modified. Shows details of the modification that occurred.
Note
1. If a DS-Client fails to start due to a configuration, database or other error, it will record errors in the Operating System Event Log:
For Windows, they can be seen in the Event Viewer. For Linux, this is either /tmp/dsclient.err, or /tmp/dsclient.out, or /var/log/messages. For Mac, this is either /Library/Logs or /var/log.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Custom Reports
Creation Date: February 11, 2008 Revision Date: May 12, 2010 Product: Third-Party (For information only)
Summary
The Custom Reports feature allows you to create your own reports, based on the data provided from the DS-Client database tables. This feature is meant for advanced users. This requires a third-party application (either JasperReports or Crystal Reports), which means you must have the development resources to create and compile the custom report templates. The basic steps for this feature are as follows: Step 1. Create Customized Data on page 392 After this step is completed, you will have a Data Set file (XML) containing the structure and data you chose for export. You can actually use the Data Set file to generate a one-time report. If you want to regularly generate a custom report, you must use the structure of the data fields to create and compile a template file. Step 2. Create Customized Report (with Third-Party application) on page 395 This article gives general instructions on how to make the template. Refer to the corresponding third-party documentation for the most up-to-date information. Step 3. View Customized Report on page 396 Once you have created a custom report template, you place it in the \report subfolder of the GUI you are using. The GUI will then be able to generate the custom report. Creating the customized report template requires a third-party application. This depends on the type of GUI you plan to use to view the report: Java GUI (JasperReports) on page 477 Win32 GUI (Crystal Reports) on page 486
3. Start a new report (File > New). The New File Wizard appears.
4. Select the Blank Letter template and click the Open this Template button. The Name and Location screen appears.
Enter the Report name (e.g. backupset). Click Browse to select the location where the report will be created. When you have made your selections, click Next. A Finish summary page appears. Click Finish to create the report. 5. The new document (backupset.jrxml) appears in the designer.
6. Click the Report Datasources button. The Connections / Datasources dialog appears. This dialog allows you to configure the data source for the template.
8. Select XML file data source in the wizard, and click the Next button.
Input the data source name (i.e. backupset). Select the XML data file (the one that was exported in Step 1. Create Customized Data on page 392). Select the Use the report XPath expression when filling the report option. Click Save to close the dialog. 10. Select the Default checkbox for the backupset, then close the Connections / Datasources screen.
11. In the Jasper Report Designer, right-click on the report name (i.e. backupset), then select Edit Query.
13. Select the Report Query Tab. Set the query language to XPath. Input a query in the form /<root_element>/* in the text edit area. (In this example backupsets is the root element of the XML data file, thereby requiring the query /backupsets/*.)
14. On the right-side of the dialog, you will see the structure of the XML File.
Note: The root element name may change for different XML data files. 15. Under the backupsets (root element), expand the Item branch and you will see some sub-items in the tree. These are the available data fields that you can use in the custom report.
Right-mouse click on an item you want to add to the custom report, then click Add node as field. Continue adding items as required until you are finished. Click OK to close the dialog.
16. Now you can see those fields in the Report Inspector panel of the designer.
17. By default, all the fields are set to the java.lang.String type. For some fields this may not be a suitable format. It will be apparent when you generate a test report. If you need to modify the Field Class Type to the correct type, go to the field properties panel on the right side of the designer. You can set the correct field data type from the Expression Class list. 18. Start designing the custom report. 19. You can preview your design with the following commands: Preview menu > Select preview format, then click the Preview button. 20. When you are satisfied with the report design, click on the Compile Report button. The report will be compiled into a .jasper file that is generated in the report directory created in Step 1 (e.g. C:\Program Files\CloudBackup\DSClient\report\backupset.jasper).
21. Now you can generate the custom report from that DS-User installation. (To use another DS-User GUI from a different computer, you must copy the same .jasper file to the report directory in the corresponding DS-Users installation path.)
3. Click Database menu > Database Export. The Database Expert dialog appears.
4. Expand the Create New Connection item. Select Database Files. 5. Expand Database Files. An Open File dialog will appear if this is the first time you create a database file data source.
Otherwise, Double click Find Database File below the Database Files item.
6. Select the XML data file (the one that was exported in Step 1. Create Customized Data on page 392). Click Open to close the dialog.
7. In the Database Expert dialog, one new sub-item appears in the tree under the Database Files item. Select Item in the Available Data Sources list and click the >
button. The new database file appears in the Selected Tables list.
9. In the Field Explorer, you can find the database fields in the XML file. 10. Now you can start designing the custom report. Note: All the fields are string in the table. You may need to create some Formula fields for fields that are not string.
11. After you finish designing, you will get a .rpt file. Copy this file to report sub-directory in the DS-User installation path. 12. Now you can generate the custom report from that DS-User installation. See Step 3. View Customized Report on page 396.
See Also
Custom Reports on page 392
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Administrative Processes
Creation Date: April 29, 1997 Revision Date: October 04, 2011 Product: DS-Client
Summary
The DS-Client software has been designed for unattended operation, which is both self-tuning and self-maintaining. In order to accomplish these tasks, the DS-Client performs regular administrative processes. These processes clean, tune and backup the DS-Client database, create statistical data, and verify backup sets with the DS-System's actual online storage.
Daily
Weekly
Who should perform Administrative processes? It is recommended that you schedule the DS-Client to perform Daily and Weekly administrative processes wherever possible for all DS-Client configurations (i.e. Typical or Custom installation on LANs as well as on Standalone PCs). If it is not possible to schedule Admin processes, you should manually execute a Daily or Weekly Admin occasionally (Setup Menu > System Activities Administration dialog).
Detailed Activities Description 1. Prepare database dump. [MS SQL Server] This activity depends on the selection for Keep DS-Client database dump file (Setup Menu > Configuration > Parameters): a) [Do not delete] Save the previous dump, dump the DS-Client database and dsdelta database, run database consistency checks (DBCC). If a fatal error occurs, restore the previous dump, otherwise the previous dump will be deleted and only the current dump will remain in the DS-Client buffer. b) [Delete after successful backup] Save the previous dump (if it exists). Dump the DS-Client database and dsdelta database, run database consistency checks (DBCC). If no errors occur, remove the previous database dump (if it exists) from the DS-Client buffer before connecting to the DS-System. If step 6 (Transfer Database Dump) is successful, then remove the current DS-Client database dump from the DS-Client buffer. c) [Always delete] Dump the DS-Client database and dsdelta database, run database consistency checks (DBCC). After the Daily/Weekly Admin process is finished, delete the database dump. Note: For more details, see Database Dump method (MS SQL Server) on page 493. [PostgreSQL] This step is not performed. 2. Clean the databases. Delete old history logs (activities, events and statistics), drop unused tables and delete unused records. 3. Update statistical data Update statistical information for each backup set (number of files and online amount). Update statistical information used by the storage summary. 4. Expand database (if necessary).
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
[Only applies to the free Microsoft SQL Server Express versions (2005, 2008 and 2008 R2). This step is not performed for full (purchased) Microsoft SQL Servers.] If DS-Client database is above its DBHighWaterMark parameter (DS-User: Setup Menu > DS-Client Configuration > Advanced Tab), expand the database by creating a new, sequential expand<nnnn> database. Move backup set(s) from the database that is over its high water mark into the new expanded database. This is done sequentially, starting with the largest backup set, until the database falls below the high water mark. Note: For more details, see DS-Client Database (Automatic Expansion) on page 421. [PostgreSQL] This step is not performed. 5. Verify backup sets. Send a list of all backup sets to the DS-System. The DS-System will send back a list of backup sets that: a) Do not exist on the DS-System's disk or b) Exist on the DS-System's disk but were not included in the DS-Client's list Update the information needed to recover backup sets falling into category 'b'. 6. Transfer database dumps. [MS SQL Server] Transfer database dumps to DS-System if Activity 1 was performed successfully. [MS SQL Server] Delete database dumps if Activity 1 (b) or (c) was selected (from Setup Menu > Configuration > Parameters). [PostgreSQL] Instead of transferring a dump, the database is backed up via Pipe to DS-System. 7. Synchronization (Normal). Perform synchronization check for all backup sets that are not in category 'a' or 'b' of Activity 5. (Note this is the same as a 'Normal' synchronization. However, any synchronized files will retain an 'active' backup status.) 8. Send daily E-Mail notification. If the DS-Client is configured for E-Mail notifications with Daily Notification on, a summary of backup activities will be sent to the administrator, showing a summary of what occurred since the last admin process.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
Weekly Admin can be configured to run automatically, once a week, based on the specification in the DS-Client Configuration - Parameters Tab (See: Configure the DS-Client Parameters on page 39). The Weekly Admin performs all the tasks of a Daily Admin, and also performs a synchronization of backup sets. The type of synchronization depends on how the Weekly Admin is run: Synchronization during Scheduled Weekly Admin on page 494. Synchronization during On-Demand Weekly Admin on page 494.
Synchronization types
The following backup set synchronizations can be performed by the Weekly Admin process: Normal: Compare and update where necessary, the DS-Client backup log (database) with the DS-System's Online storage information. Check only (On-Demand only): Perform only a check of the synchronization between the DS-Client's backup log and the DS-System's Online storage. This will only identify whether inconsistencies exist (i.e. no corrective action will be taken.). DS-System based (On-Demand only): Update the entire DS-Client backup log with the DS-System's Online storage information.
In addition, Windows DS-Client will perform normal synchronization on a backup set if it detects any database inconsistencies that might cause it to be Out of Sync. Note: This does not apply to Linux DS-Clients.
Weekly Admin for DS-Client database backup / recovery If Weekly Admin was run specifically to provide you with a DS-Client database backup that you intend to recover immediately, and you notice that the Weekly Admin performed synchronization on any backup sets, you should run the Weekly Admin again to obtain the latest and most accurate backup of the DSClient databases. This will avoid your having to go through the synchronization process again after the database is recovered.
See Also
Run a Weekly Admin immediately on page 362 Administrative Processes on page 491 Recovering the DS-Client Database on page 718
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article explains the specific differences that occur when a Grid DS-Client run Daily Admin or Weekly Admin activities. For a more general description, refer to the Knowledge Base article Administrative Processes on page 491.
Description
For standalone DS-Clients, Daily / Weekly Admin activities instruct the MS SQL Server where the DS-Client databases reside to save a copy of the DS-Client databases in the DS-Client Buffer. By default, the DS-Client buffer is located in the folder configured as the default Operating System temporary folder (usually C:\Windows\Temp). For Grid DS-Clients, Daily / Weekly Admin activities instruct the MS SQL Server where the DSClient databases reside to save a copy of the DS-Client databases in the DS-Client Buffer of the node that performs the Daily / Weekly Admin activity. The Daily / Weekly Admin activity is allocated to a node with a lower load by the Main Node of the Grid DS-Client. By default, the DS-Client Buffer folder for a node in a Windows Grid DS-Client is the folder configured as the default Operating System temporary folder (usually C:\Windows\Temp). The DSClient Buffer can be configured for each node in the Grid DS-Client using the DS-Client Advanced Configuration options (See DS-Client Advanced Configurations on page 458.).
See Also
Grid DS-Client (Windows DS-Clients) on page 70 Grid DS-Client on page 426 DS-Client Advanced Configurations on page 458 Administrative Processes on page 491 DS-Client Buffer on page 500
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
The migration process for backup sets has two purposes: 1. It allows users to map an existing backup set to a different computer (other than the one the backup set is currently on). 2. It allows users to update crucial information (i.e. computer name, operating system) about a backup set, if such a change occurred to the backup source computer.
Details
When creating backup sets, the DS-Client service automatically collects information about the backup source computer (i.e. operating system, file system). Based on this information, the DS-Client presents the available backup options for the selected computer. Each time a backup is performed, the DS-Client service automatically updates part of the collected information (i.e. operating system version, file system type). However, you must migrate the backup set if you wish to keep your backed up data in any of the following situations: The backup source computer's name has been changed. The backup source computer's Operating System has been changed. The backup directories or files have been moved to another computer.
Restrictions
1. You cannot migrate a backup set containing the Registry, NDS or Bindery to a different Operating System. If you wish to migrate a backup set containing the Registry, NDS or Bindery to a different Operating System, you must first delete all generations of these special backup items from the backup set (with the Delete Wizard). Then, you must remove these items from the backup set's Selected Items for Backup ('Directories Tree' dialog). 2. For each share selected for backup (or backed up), you should select the destination share on the computer to which you are migrating. The DS-Client service restricts the migration to a one-to-one match (i.e. you cannot select the same destination share for two different source shares). 3. When migrating items from one file system to another, you should verify the backup set's Permissions and Streams options are consistent with the new file system (i.e. these options must be unchecked if you migrate from NTFS to FAT32).
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
Asigra Cloud Backup DS-Client stores information about the source machine that is being backed up with a specific backup set: machine name, machine IP address, Operating System version, etc. Because of these specifications, you may need to migrate a backup set to respecify those settings if they are changed on the source. The following scenarios require migration: Scenario # 1: Source computers Operating System has been upgraded on page 498 Scenario # 2: Source computers Machine name or IP address has changed on page 498 Scenario # 3: Source data has been moved to a different machine on page 499 Scenario # 4: Orphaned backup set was recovered by the DS-Client from the DS-System on page 499 Scenario # 1: Source computers Operating System has been upgraded If the Operating System of the source machine (for the backup data) has changed, DS-Client will fail to perform the backup activity with the following message:
Server changed from Windows 2000 to Windows 2003. Please create a new backup set for this version.
In order to continue to backup with the same backup set, you must migrate the backup set, and re-select the same computer (with the upgraded Operating System). Otherwise, you can create a new backup set and start backing up the data again. IMPORTANT NOTES: Not all Operating System upgrades will allow a backup set migration. For example: Upgrading from Windows NT to Windows 2003 will not allow you to migrate the registry to system state and services database. In these cases, you must create a new backup set. If you perform a Bare Metal Restore from a migrated backup set, you must make sure that you only restore Operating System files from the same backup session (if applicable). Otherwise, you may restore a combination of incompatible files from different versions of the Operating System. Scenario # 2: Source computers Machine name or IP address has changed If the source computers machine name or IP address has changed, the DS-Client will fail to backup with the message:
The network name was not found.
Any backup sets created with the previous machine name or IP address must be migrated. Otherwise, you can create new backup sets and start again.
Scenario # 3: Source data has been moved to a different machine If the actual data has been moved from one server to another server, you can migrate the backup set, specify the new machine information and continue backing up with the same backup set. However, you must pay attention to the following items: If you move data from one server to another and you keep the same path format for that data, then DS-Client will backup incremental data. For example: if data resides on e$\data and you moved it to e$\data or c$\data on the new server, then DS-Client will process incremental backups for those files. If you move data from one server to another and you do not keep the same path format for that data, then DS-Client must perform an initial backup (which will take longer). For example: if data resides in e$\data and you move it to e$\newlocation\data or c$\destination\newlocation\data on the new server, then DS-Client will process new masters for the files found in the new location. Scenario # 4: Orphaned backup set was recovered by the DS-Client from the DS-System See Knowledge Base Article: Recovering 'Orphaned' Backup Sets on page 720.
See Also
Migrate a Backup Set from one computer to another on page 194 Backup Set Migration on page 497
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
DS-Client Buffer
Creation Date: October 14, 1997 Revision Date: January 11, 2010 Product: DS-Client
Summary
The DS-Client buffer is a temporary storage location on the DS-Client computer. This directory can be seen or changed from the DS-User > Setup > Configuration > Parameters tab. For more information, see: Configure the DS-Client Parameters on page 39. When the Use Buffer option is employed: 1. Backup files are transferred to the buffer location first, then 2. The backup/restore operation is performed (data is processed through the DS-Client). This minimizes the time that the LAN must support the additional backup/restore traffic. It is particularly useful if the DS-Client's connection to the DS-System is much slower than its connection with the LAN. The DS-Client buffer can also provide temporary storage as the database dump location for MS SQL and MS Exchange database backups (this avoids the need for extra disk capacity on network servers). Adequate disk capacity for your backup needs is required on the drive containing the DS-Client computer's buffer directory. You must also make sure that the buffer storage location supports the same structure as the source. For example, if your DS-Client buffer is on a Linux File System, the maximum number of sub-directories allowed within a single directory is 32767. If you try to backup a path that holds more than this number of sub-directories using the DS-Client buffer, it will fail since it exceeds the maximum number of sub-directories allowed. Essentially, you must to ensure the DS-Client buffer has enough space to hold all the data AND can support the same tree structure as the source.
Use Buffer
MS Exchange Server
Notes
1. The DS-Client deletes all files from the DS-Client buffer after each activity, regardless whether or not the operation was performed successfully. 2. Do not select the Use Buffer option with backup sets that have data on the DS-Client computer. Use Buffer copies backup files to the DS-Client buffer. From there, they are processed for backup by the DS-Client. If the DS-Client buffer directory is part of a backup set, problems may occur since the Backup may catch a loop that reads the same directories being copied for backup. 3. DS-Client Buffer and Performance: The DS-Client Buffer is also used by activities that access DSClient Database to create temporary files for bulk insert (for optimization of processing). If a backup set is not assigned enough credentials to Create/Delete/Read/Write files in the DS-Client Buffer directory, bulk insert operations will fail and a regular insert is used instead. To maximize the speed, we recommend providing enough credentials for all backup sets to access the DS-Client Buffer directory. 4. Backup sets configured to use the DS-Client buffer automatically benefit from the Block-Level Resume feature (See Block-Level Resume on page 676.).
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
The DS-Client software is designed to perform unattended, scheduled backups of single PCs or an entire LAN. To maximize the DS-Client's performance, there are some issues that you should consider.
Considerations
In order to maximize backup speed, consider the following points:
Use the latest supported Windows Operating System Running the DS-Client software on the latest supported Windows Operating System will boost backup speed, since the DS-Client software is able to take advantage of features like asynchronous I/O processing and multi-processor support.
Since the DS-Client software performs compression and encryption during the Provide adequate CPU and backup, it is CPU-intensive. Use the DS-Client 'Load Summary' feature to determemory mine CPU and memory utilization during backups. If it is very high, you should consider a more powerful CPU and/or more memory for the DS-Client computer. Use multi-processor systems The DS-Client software is designed to scale on SMP systems, when installed on Windows. Running the DS-Client on such a system provides large performance boosts when compared with a single CPU configuration. The DS-Client uses a database to store backup logs (catalogs). When using the DS-Client in a LAN configuration that can exceed a few hundred thousand backup files, the database update/retrieve speed will affect backup performance significantly. Use MS SQL Server as the DS-Client database to provide faster update/ retrieve performance.
When running the DS-Client on a powerful system (e.g. dual CPU), LAN connecProvide 100 Base or higher tions of 10 mbps (Ethernet) or 16 mbps (Token Ring) become a bottleneck. Provide LAN connections. a faster LAN connection to significantly improve the backup speed. Schedule appropriate number of backups Scheduling too many backups at the same time will increase overall backup time due to CPU, memory and LAN connection over utilization. 'Load Summary' feature of DS-Client can be used to determine CPU and memory utilization during backups.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
For step-by-step instructions, see the section: LAN Storage Discovery Tool on page 329
It is very useful to analyze the LAN storage before using any backup application. The most important information is the redundancy (duplication) factor, and the frequency of data changes. The main purpose of the LAN Storage Discovery Tool is to provide customers with a clear view of information about their LAN by scanning and analyzing the LAN files. LAN Storage Discovery is a tool integrated in DS-Client, designed to analyze the LAN storage. To analyze the LAN, you must first discover the shares on the LAN (or a particular part of the LAN) using a list of credentials you provide. Then, the share list is arranged, defining which shares to scan and how they will be scanned. Finally, the scan process is started for the files on the LAN. Tools to manage and monitor the discovery and scan processes are also provided. The scan process runs on DS-Client and can be scheduled. Several reports are generated to analyze the scanned storage: Duplication, growth trends, access reports, file type distribution, etc. Summary and detailed reports are provided, as well as an export feature that you can customize.
Discovery
1. Configure the range (extent) of your LAN that will be analyzed. This range is a collection of items. Each item can be a network provider, a domain, or a computer. A list of credentials can be provided for the discovery / scanning process. For Unix DSClients, an additional level of authentication for credentials is available. 2. The discovery process will automatically analyze the overlapping of shares, if the shared path can be retrieved. The overlapped shares will be disabled for scanning by default to avoid false duplication counting. 3. LAN Storage Discovery (Windows DS-Client) supports the following network providers: Microsoft Windows Network NetWare Services Hummingbird NFS 4. LAN Storage Discovery (UNIX DS-Client) can discover shares on the network through: NFS SSH
Scan process
1. The scan process is applied to the list of shares found by the discovery process. 2. The discovery process automatically disables some shares: if the share is covered by other shares; if not enough credentials were provided to retrieve all necessary information from the share if the share is not supposed to be scanned (e.g. CD/DVD, etc.) Note: The status (disabled / enabled) can be manually changed from the GUI. 3. By default, the credentials used to discover the share are also set as the scan credentials for that share by the discovery process. However, the credentials used for scanning can be changed for particular shares from the GUI. 4. The scanning of a share to follow reparse point (Microsoft Windows only) is configurable from the GUI. 5. To speed up the scanning process and reporting, the scanning process can be configured from the GUI to skip files that are smaller than a specific size. 6. The number of scanning threads is also configurable from the GUI (to provide scalability). 7. The scan process can be scheduled, or started on demand. The best practice is to schedule it to run over a period (i.e. a few weeks) to get more accurate statistical information on data growth and changes. 8. A Scan Monitor is available to give a real-time overview of the scan process.
Reports
The reports can be divided into three categories: One-click generated reports on page 504 LAN File Summary on page 506 Other reports on page 506 One-click generated reports
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
The One-click generated reports are the most important ones. Windows DS-Clients have 12 reports and UNIX DS-Clients have 8 reports. The generated reports will be saved as files in HTML and Microsoft Excel format. Many of them can be customized. The reports included are:
Report Share usage Largest Files Largest Duplicates Ownership (Windows DS-Client only) File Type Distribution Partition Size (Windows DS-Client only) Description Reports the total files and size (all and duplicated) for each share. List top n (default is 100) largest files. Also report the percentage size compared to the entire LAN. List top n (default is 100) largest duplicate files. Also report the total duplicate file number and the percentage of this number as well as the total size of the top n files comparing to the entire LAN. Reports the total storage occupied by each owner for each share as well as the total. Select top n (default is 10) file types, sorted either by space or file number (default is by space). For each file type, select top m (default is 100) largest files from the entire LAN. For each partition, report the total, free, and used space.
For each share, and each interval (5 intervals are provided: <1 Day, >1 Day, >1 Week, >1 Month, >1 Year), report the top n (default is 100) largest files whose Access Report / Dormant Files last access time is within the specified interval. There is also a summary report of the total size and files for each interval of each share. Growth and Modified Files SQL Server Size (Windows DS-Client only) Exchange Server Size (Windows DS-Client only) Index of Generated Reports All Duplicate Files Reports how many files and size created/modified for each share, each day over the specified period (default is 14 days). For each computer, how much space (total, free, used) are for SQL Server. Report all .edb and .pst files. An index of all generated reports. A list of all duplicate files. By default this report will not be generated.
LAN File Summary This provides an overview, as well as detailed (up to file level) information of the scanned files on the LAN. Complicated filters are also available so that it is possible to analyze a particular group of files.
Report Description An overview of the total files and size for the following categories: All files Duplicate files Duplicate groups Changed and new files Unchanged files Not accessed files The changed / unchanged, new, not accessed are determined by the parameter last n days. The default is last 30 days. This is similar to the global view. However, it is for each share based on the specified condition. This condition is the combination of the following: Last n days: to determine changed/unchanged, new, not accessed. Filter: like *.c* on file name Duplication: Only the files with duplicates equal to or greater than the specified number will be counted. Share: Specify a group of shares to be considered. Show the detailed information of the files corresponding to the selected row from the global / filtered view. Show the pie charts for the selected row from the global / filtered view. The charts could be based on size or file numbers for all categories (Duplicated, Unchanged, etc.). Show all files that are duplicated with the selected file.
Global view
Filtered view
Other reports These reports are already included in the One-click generated reports. However, they can be customized in a more powerful way from DS-User > Reports Menu > LAN Storage Discovery: report_name.
Report Large Files report Description List top n (default is 100) large files whose duplicate count is at least equal to the given value (default is all files) for the specified share or all shares. There are two kinds of reports. The Top Report shows the top n extensions ordered either by size or by file numbers for the specified range (a share or all shares). The Customize Report asks for a list of specific extensions and the range (specific shares). The total size and file numbers are also reported. Reports the files and size for the given intervals, set within the given range (specific shares). An interval could be a number of days, weeks, months, or years. User provides the period for analysis: intervals (in days), range (specific shares), and type (total or new). Report shows the files and size for each interval that falls within the specified period. Reports the files and size grouped by owner for the specified shares.
Extension report
See Also
LAN Storage Discovery considerations on page 508
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
The LAN Storage Discovery process can be disruptive. The reason is because the DS-Client must connect to each target share, read the files in the share, and prepare a signature for each file in order to report on common files, largest file sizes, file types, etc.
See Also
LAN Storage Discovery Overview on page 503
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
The DS-Client accumulates statistical information that can help to analyze load, utilization and storage trends it experiences. For new target backup servers, the DS-Client can perform statistical backups for a few days or weeks to generate statistical information. Statistical backup sets are similar to regular backup sets (the data source is scanned, new files are compressed and encrypted) except no data is sent to DS-System. Statistical backups can help you analyze data amounts, trends and incremental amounts before performing actual backups. In production environments, all the statistical information gathered is displayed (for Regular backup sets, Statistical backup sets, Self-Contained backup sets, and Local-Only backup sets). The Load Summary and Storage Summary screens are accessible from the Reports menu. The Storage Summary allows you to filter for statistical information from specific backup set types.
Files statistics
Total Files Incremental Files New Files Backup Files The total number of files stored Online (including all generations) This is a derived figure, showing the increment to the Total files. The total number of new backed up files (i.e.: files backed up for the first time). The total number of files backed up for the selected period.
Incremental Backup Files This is a derived figure, showing the increment to the Backup Files.
Incremental Online Backup This is a derived figure showing the increment to Online Backup.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This information is only provided as a sample of different strategies. Each customer is ultimately responsible for the storage and deletion policies for their data. This article outlines the differences between setting up maximum generations on a backup set and using retention rules. It also describes how these two functions work together. The main point is that the customer must choose what mechanism will be in charge of deleting generations from online storage: Maximum Generations are passive - they allow generations to be overwritten whenever necessary (on the DS-System online storage). Retention Rules are active - they must be applied to a backup set, then enforced (either on schedule or on-demand) to physically delete generations from the DS-System online storage or move generations from DS-System online storage to BLM Archiver. The default setting from DS-Client installation is to use maximum generations, meaning the oldest version of a file will be overwritten if you have backed up the maximum allowed number of generations for a file. Generations are created on the online storage when the backup detects that a file has changed. Files that never change have only one generation on the DS-System online storage.
Maximum Generations
The maximum generations parameter is set up in the backup set properties, and it must be a number between 1-9999. This means that this backup set will save up to this maximum number of restorable generations on the DS-System online storage. It will not keep more than this number on the online storage (when it reaches the limit, the oldest generation is overwritten). Overwriting is done during the backup process and does not take into consideration any retention rules that might apply, since retention rules run separately from the backup. Best uses for maximum generations are: for CDP (continuous data protection) backup sets, where files are constantly changing and immediately being backed up, and the client would like to control the size of the online storage. when there are no retention rules applied, and online storage size is a concern. All cumulative backups (on-demand and scheduled) will keep up to the maximum generation number. In case a low number of maximum generations is set up for a backup intended to run on schedule, be aware that if you run an on-demand backup, what is kept online may not be what you expect. For example: You create a backup set with maximum generations set to 7, and schedule it to run daily (to keep the daily changes for a week). Assuming all backup files change daily, you would expect one generation for each day. If an on-demand backup is run on this set, it will disrupt the pattern, and you will have 2 generations from the same day (and restorable generations going back 6 days, instead of 7). [This assumes that the file was changed before the ondemand backup, and before the scheduled backup.]
Retention Rules
Retention rules apply to the online generations every time they are enforced on a backup set. This can happen in two ways: On-demand, separately from the backup process. Within a schedule, independently or right after a backup task for this backup set. When using retention rules, the enforce retention process works with what is saved in the online storage by the backup process. The following considerations should be made when applying Retention Rules to a backup set: 1. Retention Rule compatibility with Maximum number of generations You must make sure the Retention Rules work with the maximum number of generations for the backup set. If the maximum generations is set to a low number (e.g. 7), then the retention rules may not produce the intended result. (The oldest generations are likely to be overwritten by the backup process, before any of the generations qualify for deletion by the retention rules.) 2. Retention Rule compatibility with its own rules (Delete options, Time-based online Retention, and Moving old data to BLM Archiver) Retention Rules work best if the maximum generations parameter is set to the maximum (9999) or to a high number (e.g. 300). The retention rules help by deleting what you define to be unnecessary, and to retain online what you define to be critical. As a result, you will most likely never reach a high number of generations for the same file on the DS-System online storage. Note: Results depend on the Retention Rules and how often they are enforced. Delete options (Deletion of files removed from source / HSMed data): Once this retention rule is enforced on a backup set, it will check the options configured for the files that are removed from source, or for data that has been moved by a third-party HSM/ILM solution to a remote location. DS-Client can be instructed to keep [x] number of generations for each file in the backup set after a certain period of time, since the file has been removed from the source machine. Note: DS-Client detects that files have been removed from source when the backup activity is running. If a placeholder / stub is detected on the source machine, (Windows) DSClient can be instructed to delete all file generations backed up before the stub / placeholder was detected, or to delete all generations that are not stubs / placeholders and were backed up in an earlier backup session than the stub. By default, enforcing any Retention Rule will cause a deletion of all data that is defined as obsolete on from the DS-System online storage. However, a copy of this data can be sent to BLM Archiver before it is removed completely from the DS-System online storage. Time-based online retention (deletion of files from the DS-System online storage based on user-specified time-based rules): Keep most recent generations has a default value of 1. All generations of a file will be removed from the DS-System online storage, with the exception of the latest (most recent) generation. If this number is increased to a very high amount (e.g. 9999), all the other time-based rules specified in this Retention Rule configuration will not have any effect or the required effect (because they will be over-ruled by this particular rule). Keep all generations for [x] interval of time for [y] interval of time. Timebased rules should be as specific as possible. When a retention rule has more
details, it will work better and be much more precise than a general rule. For more details, see Retention Rule Examples on page 516. Archive old data to BLM Archiver: Specify the age of the files at which DS-Client will move that data to BLM Archiver. The algorithm will compare the last modification date with the backup session date, and will apply the oldest of the two for the archiving rules. For example: If all files older than one (1) month should be sent to BLM, DSClient will compare the last modification time and backup time of a file; it will take the oldest value to calculate the age of the file and will execute the corresponding action (archive / do not archive). Local Storage Retention: This only applies to the files saved in the DS-Client Local Storage Buffer(s). In order to have the DS-Client save multiple generations on the local storage, the backup set must be assigned to a retention rule that has the Local Storage Retention options enabled. Local Storage can only keep data on the local storage buffer if that same data (exact generation) exists on the DS-System online storage as well.
To Summarize
Customers have a choice between 2 methods of deleting online generations. Passive: Maximum generations: overwrites oldest generation whenever necessary (no user intervention required) If set to a low number, this will make the backup set's retention rule inefficient. It is best used with a CDP backup, because it is enforced every time a backup runs (once maximum generations have been reached).
Active Retention rules: to be used correctly, the following best practices apply: Maximum generations of the backup set should be set to the maximum, or another high number (several hundreds/thousands). Keep most recent generations should be set to a low number, such as 1, if timebased rules are also specified in the same Retention Rule.
Time-based rules should be as specific as possible (e.g. Keep one generation every week on or before Sunday at 11:59PM for 1 Month) instead of being generic (like Keep one generation every week for 1 Month). Manual Delete: (Sets Menu > Delete > Selective Delete) can be performed on-demand at any time to free up space on the DS-System online storage.
NOTE: Because of the many configurations that are possible, it must be emphasized that the customer is responsible for configuring the storage and retention policies. Treat retention as if you are performing a manual delete of data: once data is deleted from online, you can never get it back.
Your Service Provider might also offer the BLM Archiving to lower cost media. Every time you delete data, you have the option to send a copy of the generations that are about to be deleted to BLM.
When BLM selected for a backup set, you can effectively save a copy of every backup generations forever.
See Also
About Retention Rules on page 85 Retention Rule Examples on page 516
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article describes some common retention policies that have been implemented in production environments. NOTE: Because of the many configurations that are possible, it must be emphasized that the customer is responsible for configuring the storage and retention policies. Treat retention as if you are performing a manual delete of data: once data is deleted from online, you can never get it back.
Example 1
The most common requirement for companies to retain data on the DS-System online storage is the following: 1 generation every day for a week 1 generation every week for a month 1 generation every month for a year 1 generation every year for 7 years In order to implement this (or a similar) Retention Rule: 1. The backup set must be configured with a high number of generations for the backup items (e.g. 300). Know your backup data: Retention is designed for backup items that change regularly (e.g. daily). A backup item that does not change will have only one generation. 2. Follow the steps from Create or Edit a Retention Rule on page 85. 3. In the Retention Rule Wizard, make the following configurations. 4. In the Generic retention options screens Keep most recent generations field: Choose the number of most recent generations that you always want to be able to restore. Retention will not apply to these generations. Some examples of common choices: 1, for the most recent generation (e.g. for disaster recovery); 7, for the most recent 7 generations (assuming one daily backup for items that change, this keeps the last weeks worth of backups); 5, for most recent 5 generations (assuming daily backups during business days from Monday-Friday for items that change, this keeps the last business weeks worth of backups). 5. In the Time retention options screen, add each time-based rule individually to the list. Rules appear in the form Keep one generation every [x - time] for [y - time]. Choose the interval of time (x) over which you want to keep one generation online. All other generations in that interval will be deleted when retention is enforced. For the same rule, you must also choose the interval of time (y) that the rule applies to the entire online storage. This means one generation is retained for every x-interval that fits into y (e.g. every 1 month for last 1 year means 12 generations will be retained).
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
6. Add the four time-based retention options so the Time Retention Option List looks as follows:
Keep one generation every 1 day(s) for last 1 week(s) Keep one generation every 1 week(s) for last 1 month(s) Keep one generation every 1 month(s) for last 1 year(s) Keep one generation every 1 year(s) for last 7 year(s)
However, you may wish to be more specific with the data that you want to retain. For example:
Keep one generation every week on or before Friday at 23:59:59 for last 6 month(s)
7. Finish creating the Retention Rule. 8. Apply the Retention Rule to the backup set(s) you want. 9. Schedule the Enforce Retention process (or run it on-demand). This will delete all online generations, except those specified to be kept in the Retention Rule.
Example 2
More complex rules and regulations can be implemented with Asigra Cloud Backup software. For example, a company may have the following data retention requirements:
Any files deleted from source should be retained online on the DS-System online storage for a period of three (3) months, and afterwards this data must be moved to archive. All files must be moved from DS-System online storage to BLM Archiver if files are older than 6 months.
In order to do this, you would create the following Retention Rule: 1. Open the New Retention Rule Wizard. Select Deletion of files removed from source / HSMed data Select Archive old data to BLM 2. Click Next. In the Delete Options screen: Configure If files are removed from source after 3 months, Keep Generations: 0 3. Click Next. In the Archive Options screen: Add the Archive Rule Archive files older than 6 month(s) Make sure the rule applies to All files 4. Click Next. In the Choose a name screen: Select the option Move obsolete data to BLM 5. Click Finish.
See Also
About Retention Rules on page 85 Retention Rules vs. Maximum # of Online Generations on page 512
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
WARNING:Retention rules involve the removal of data from online storage. As such, they should be treated as 'delete data' operations. You will not be able to recover data that is deleted because of retention, therefore make sure the rules you create and apply are appropriate. This article describes some of the possible retention rule combinations. A retention rule can be created with one, or a combination of the following types of rules, whose effects can overlap: Deletion of files removed from source / HSMed data Time-based online retention Archive old data to BLM [Time Push] Local Storage retention Component data integration options for VSS-aware backup sets In general, if you create a retention rule with only one of the above types selected, the behavior will be as specified. If you combine two or more of the above types, then some overlapping of the rules may occur which will affect the behavior of the retention. REMEMBER: The Time-Push (Archive old data to BLM) option is applied last, after all other retention types have been applied. On the last tab of the Retention Rule Wizard, you have the "Move obsolete data to BLM" option. This option is a safer way to test retention, since it will 'push' all data deleted from DS-System online storage to the BLM Archiver. (The worst case is data is moved to the BLM.)
Details
The following types of rules can be defined from the Retention Rule Wizard: (1) Deletion of files removed from source / HSMed data The Delete Options (for files that have been removed from the backup source) will always apply. They are the first rules that are applied when a Retention Rule is enforced on a backup set. If the "Move obsolete data to BLM" option is not selected, data that is not retained online is deleted permanently. (2) Time-based online retention When a Retention Rule is enforced on a backup set, it will delete data from online, unless that data falls into one of the time-based retention categories. The time-based retention options in a Retention Rule can overlap, with the result being that the option that leaves the most generations for the longest time is applied. If the "Move obsolete data to BLM" option is not selected, data that is not retained online is deleted permanently. This approach prioritizes retention, and makes the BLM Archiving optional.
(3) Archive old data to BLM [Time Push] This option is applied last, to the files that remain online after the Delete Options and/or Time Retention Options have run (if defined). By design, this retention rule sends all data to BLM once that data qualifies as "old", based on the archive rules. This approach prioritizes archiving and is focused on a specific age for files to be archived. If "Archive old data to BLM" is used with other retention rule types, you must remember it is applied last, and only to the files that remain online (after the Delete Options and / or Time Retention Options have run). (4) Local Storage retention This is a special type of retention for use with the Local Storage feature. For the purposes of this article, this option is not described any further. (5) Component data integration options for VSS-aware backup sets This is a special type of retention for use with Windows VSS-aware backup sets. For the purposes of this article, this option is not described any further. In this article, the rule types (2 - time-based) and (3 - archive to BLM) are examined in greater detail.
(2) Define Time Retention Rules. (2) + (3) Define Time Retention Rules. Make an Archive Rule that is longer than the longest Time Retention Rule. (3) Define Archive Rules that use File Filtering rules.
Generated on: 10/15/12 Page: 519
Confidential.
See Also
About Retention Rules on page 85 Retention Rule Examples on page 516
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Delete Considerations
Creation Date: June 20, 2011 Revision Date: June 20, 2011 Product: DS-Client
Summary
This article describes some advanced considerations regarding delete activities. The basic form of delete simply removes a generation from online storage. However, when the delete is combined with some of the other features of Asigra Cloud Backup, there are some more considerations that need to be taken into account.
If your service provider has applied a Delete Lock to your customer account or to this specific DS-Client on the BLM Archiver, the following will occur: You can perform Destruction Requests, however you will not be able to Confirm Destruction of any Destruction Requests. You will see an error in the BLM Activity Log when a Data Destruction Confirmation activity is performed.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Scheduled Operations
Creation Date: February 10, 2006 Revision Date: October 03, 2012 Product: DS-Client
Summary
This article provides additional information about scheduled activities on DS-Client.
See Also
Configure the DS-Client Parameters on page 39 DS-Client Advanced Configurations on page 458
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Validation Overview
Creation Date: August 24, 2006 Revision Date: August 24, 2006 Product: DS-Client
Summary
The Validation process is designed to verify the restorability of online data. Without the customer / DS-Client encryption keys, DS-System is not able to create the digital signature to validate backed up data for some types of corruption. In order to avoid transmitting large amounts of data from DS-System to DS-Client for validation, DS-Client will send the encryption keys to DS-System based on your ACCEPTANCE / ACKNOWLEDGEMENT / AGREEMENT to this option. The decision to perform validation must be made from the DS-Client side. The customer knows better than anyone else what data is more important (i.e. data that needs to be validated more often). When a Validation process is triggered on DS-Client side, DS-Client sends a request to DS-System to perform the validation. For each file (generation), DS-System will first check the file header and delta linking/library linking, etc. If everything is fine, it will try to validate the data by performing a procedure like a virtual restore. The data will be decrypted and decompressed to generate the original signature. If it fails due to a decryption or decompression problem, the validation fails. Finally, it will compare the generated signature with the original one: if it does not match, the validation fails; otherwise the validation is successful. For any validation failure, the error will be reported on both DS-Client and DS-System. If the validation fails due to reading or network problems, it is unknown whether or not the file is valid. Validation will skip the file and report the corresponding errors on both DS-System and DS-Client event logs. For other failures where DS-System can confirm the file is corrupted, the file will be moved to the trash (\del directory). All dependant files will also be moved as well. Since the validation process will read all data to check the digital signature, the validation process is Disk I/O intensive on DS-System side. The whole process is almost the same as an actual restore, except that INSTEAD OF writing to a target location, the decrypted/decompressed data is not kept after generating the signature. A variety of options are provided to help validate online data in the most flexible and efficient way. These options include: validation of all data, selective validation, scheduled / on-demand validation, excluding data deleted from source, and resuming mechanism, etc.
4. 5.
6.
7.
8. 9.
10.
Validate all online data (all generations of all files). Selective pop up a selection tree similar to the restore tree to allow selection of directories/files as well as generations to validate. The execution sequence for a backup sets scheduled activities is: 1. Perform Backup, 2. Enforce Retention, 3. Perform Validation, 4. Perform BLM. When setting a schedule to perform Validation, the customer must input the encryption key(s) and DS-Client verifies them. The Validation activity can only be enabled in a schedule if the user provides the correct encryption key(s). The scheduled Validation has options to: Validate all online data (all generations of all files) or last generation only (snap shot) Include or exclude files already deleted from source. The scheduled Validation also has the option to resume from the point of interruption of the previous scheduled Validation process. If a scheduled Validation completely processes all selected files, the next scheduled Validation (for the same backup set) will process files from the beginning. To determine the interruption point, the files are processed in sequence based on the order of share ID, directory ID, file ID and generation. Note: On demand Validations do not have the resume mechanism. Validation is not available for statistical backup sets, since there is no data on DS-System to validate. If a file corruption is detected (including Digital Signature does not match errors), that file and all files that actually depend on it (occasionally, a delta may formally depend on a file, but does not actually depend on it) will be moved to the \del directory. The corresponding error will be reported on both DS-System and DS-Client sides. If a files restorability status cannot be determined temporarily (networking problems, etc.), DS-System will skip the validation for this file. The corresponding error will be reported on both DS-System and DS-Client sides. If a file originally did not have a signature that is needed for Validation, a warning will be reported. If any bad files are removed, DS-System will mark the backup set as out of sync at the end of the Validation process. Only users with the Administrator Role on DS-Client are allowed to start a Validation process.
See Also
Validation of Online Storage on page 276
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
The Local Storage Cache feature enables DS-Clients to perform backup on a local attached disk or UNC path accessible by the DS-Client software and send the data to the DS-System at a later time when the DS-System service becomes available. Backup sets must be configured to use this option. The Local Storage Cache option is available for backup sets if the DS-Client has the "Local Storage" tool enabled (from the DS-System). This article describes the following: Saving Data to Local Storage Cache on page 528 Data in Local Storage Buffer vs. Data in Local Storage Cache Buffer on page 529 Local Storage Number of Generations vs. Local Storage Cache Number of Generations on page 530 Restoring data from Local Storage Buffer vs. Local Storage Cache Buffer on page 530 Detecting File Corruptions in the Local Storage Cache Buffer on page 530
Data in Local Storage Buffer vs. Data in Local Storage Cache Buffer
Feature
Local Storage Cache Buffer Connection to the DS-System is NOT available Full File Content ("Master" generation format) + Meta Data ("Delta" generation pointers) Yes
Data is stored in "Buffer" Connection to the DS-System is when: available Types of Generations: Compression: Full File Content ("Regular" generation format) Yes No (by default) Can be configured using the EncryptedLocalData Parameter. See DS-Client Advanced Configurations on page 458. No
Encryption:
Yes
No
Data is sent to the Local Storage Buffer at the same time when the processing occurs to send data to the DS-System (connection from the DS-Client to the DS-System must be available). Data is sent to the Local Storage Cache Buffer ONLY when connection to the DS-System is NOT available. By default, data is saved in the Local Storage Buffer compressed, but not encrypted (configurable), and as "regular" generations of the files. Data is saved in the Local Storage Cache buffer compressed and encrypted as "master" generations of the files. Data is saved in the Local Storage Cache buffer as a master generation that includes additional information that determines which blocks of data from within that file are required for delta generations. When a connection between the DS-Client and the DS-System can be established, DS-Client will move the files required to reside in the Local Storage Buffer (based on backup set configuration) in the format they were stored in the Local Storage Cache Buffer (encrypted and compressed) and will send only "delta" generations to the DS-System (when applicable). As a result, DS-Client can still process Master/Delta (Incremental forever) when performing backup using the Local Storage Cache Option. Similarly, the Local Storage Buffer may include encrypted as well as unencrypted data, depending on when the files were processed during a particular backup activity. Files from the Local Storage Cache Buffer are only removed from the Local Storage Cache Buffer or moved to the Local Storage Buffer when they have been successfully transferred to the DSSystem. File are released from Local Storage Cache Buffer one-by-one as their successful transmission to the DS-System is confirmed between the DS-System and the DS-Client. An initial backup session does not process data for Local Storage Buffer or Local Storage Cache Buffer.
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
Local Storage Number of Generations vs. Local Storage Cache Number of Generations
The configured number of generations for a backup sets items does not take effect when data is sent to the Local Storage Cache Buffer. For example: a backup set configured to store up to three generations of data on the DS-System Online Storage may store more than three generations of data in the Local Storage Cache buffer if the DS-System does not become available while DSClient has backed up those generations and/or DS-Client did not have a sufficient backup window to finish the move of the data from the Local Storage Cache Buffer to the DS-System. All generations will be sent to DS-System whenever possible as "regular" generations or "Master/ Delta" generations and DS-System will process them as it would process any generations sent directly to it (e.g. it will mark generations as recycled when required, it will trigger reconstruction when required, etc.). By default, the Local Storage Buffer will store the latest generation of all the files processed for a backup set. However, if Local Storage Retention is enabled and assigned to a backup set with Local Storage Options enabled, the DS-Client will store all generations that meet the criteria specified in the Local Storage Retention rules in the Local Storage Buffer.
Restoring data from Local Storage Buffer vs. Local Storage Cache Buffer
DS-Client can restore data directly from the Local Storage Buffer and can connect to the DSSystem to retrieve only the data that does not exist in the Local Storage Buffer (this behavior is configurable from the Restore Wizard, before triggering the restore activity). Data from the Local Storage Cache Buffer cannot be restored until it has been transferred to the DS-System.
See Also
Local Storage Cache on page 305
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Backup Limitations
Creation Date: March 17, 2006 Revision Date: October 31, 2007 Product: DS-Client
Summary
This article describes some DS-Client backup limitations related to the length of the source file names and to the length of the path where the source files reside.
Details
The following directory path and file name limits exist, depending on the type of database used by the DS-Client: Windows DS-Client Directory Path Limit: 435 characters (the entire path up to the beginning of the file name). File Name Limit: 255 characters (file system limitation). Linux DS-Client Directory and File Path Limit: 1023 characters (the entire path including the file name). File Name Limit: 255 characters (file system limitation). In most cases, the file system will prevent users from creating directory paths longer than these limits. However, if your environment has paths that exceed a DS-Client Database limit, the DSClient will log an error (Directory path is too long.).
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article describes the Initial Backup Best Practices.
See Also
Initial Backup on page 279
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
A Bare Metal Restore is the restore of an entire machine (usually to replacement hardware and to a new Operating System installation). To be able to perform BMR, you must protect the target computer with a single backup set that contains: System State and Services Database Operating System Volume NOTE: Some applications can be installed and can store data across multiple volumes. You must include all of those volumes in this backup set if you want to be able to restore those applications. It is strongly recommended to configure the BMR backup set with the VSS option (select "backup through volume shadow copies" but leave the sub-options "do not involve writers" and "do not process components" unselected). If the VSS option is not selected, depending on the applications running on the target computer, you may need to stop them for the first backup session, in order to facilitate a smooth BMR. To protect those services after the first backup and when they are running (i.e. in 'hot' mode), you must create separate backups with the corresponding special backup sets (e.g. MS SQL Server Database Backups on page 116).
Details
The reason you must perform at least one backup of the target computer with the service applications stopped is to ensure that any locked files used by those applications are backed up at least once. Otherwise, those services will not start after you perform the BMR. In order to restore from the special backup sets (e.g. MS SQL Server), the DS-Client needs to connect to a running service. If the service cannot start, you must repair that service installation with the corresponding Installation Package. In general, the steps for BMR of a Windows computer running MS SQL Server are: 1. Assemble the replacement hardware for the target BMR computer. 2. Re-install the same Windows Operating System (you do not need to apply any Service Packs). 3. If the Hardware is different from the original computer, you must install the corresponding hardware drivers. 4. Restore from the target computers backup set (including Operating System Volume, System State and Services Database). The restore of System State, Services Database and Operating System files must be done in one step (at the same time). 5. Restart the MS SQL Server (if applicable). 6. Restore the latest version of MS SQL Server from the separate special backup set (if applicable).
See also
Bare Metal Restore of Windows (ALL VERSIONS) on page 693. Bare Metal Restore of Windows XP on page 701. Bare Metal Restore of SBS 2008 on page 702. Bare Metal Restore of Windows 2008 R2 on page 705. Important Notes for Bare Metal Restore on page 707.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
To back up a Windows computers System State, you must be an administrator or have administrator-level permissions. (Windows VISTA and Windows 7 have additional special requirements: see Special Requirements: Windows VISTA & Windows 7 on page 536.)
Details
System State data contains most elements of a Windows computers configuration, and it must be backed up along with the boot and system volume(s) of any target computer you want to recover from serious failure or disaster. Therefore, it is recommended that you create a Bare Metal Restore backup set to cover all restore possibilities for any important server. This means you create a single backup set to back up all boot and system volumes, including the System State and Services Database which appear as separate objects that can be selected from the Shares & Directories List (Set Properties Items Tab or New Backup Set Wizard). See: Backing up Windows for Bare Metal Restore (BMR) on page 534
See also
Backing up Windows for Bare Metal Restore (BMR) on page 534. Bare Metal Restore of Windows (ALL VERSIONS) on page 693. Bare Metal Restore of Windows XP on page 701. Bare Metal Restore of SBS 2008 on page 702. Important Notes for Bare Metal Restore on page 707.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
When a DS-Client encounters Windows encrypted files on a Windows source machine, the DSClient uses a different Microsoft API to back them up. Windows encrypted refers to files encrypted using the Windows File System encryption. The DS-Client will receive the data in its encrypted format, and it will encrypt it again and compress it, then send it to the DS-System. The master/delta algorithm is still invoked, however the delta file size will be close (in terms of size) to the master files size. During restores, the DS-Client will retrieve the data from the DS-System, decrypt the data from the DS-Client encryption, and then save it to the destination machine (in Windows Encrypted form). The restored files are still encrypted as they were when they were backed up. Windows has to manage and decrypt them at that point (i.e. you cannot restore them on FAT, etc.).
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
If you have UNIX servers on your network, install a Linux DS-Client to perform backup / restore. This article deals with issues for the backup set type NAS, UNIX-SSH, NFS, Local File System Backup from a Linux DS-Client.
Excluded Directories
When backing up any target UNIX machine (Local File System, via UNIX-SSH or NFS), the following directories are always excluded from backup (even if selected in a backup set):
/proc /sys /dev /devices /selinux
These directories constitute pseudo-file system(s), which do not contain physical files or do not contain persistent data. If excluded directories are skipped during a backup, a warning appears in the Event Log for that activity. Excluded Directories for SSH backups of SOLARIS machines In addition to the above general UNIX directory exclusions, the following directories are excluded from UNIX-SSH backup sets of SOLARIS machines:
/system/contract /system/object
and
<zone>/system/contract <zone>/system/object <zone>/proc
Note:
The zoneFS path can be shown with the zoneadm list function.
By default, the Backup hard links option is selected for any new backup sets. This means the backup will record file and hard link information at backup time in order for the hard links to be restored. If the Backup hard links option is not selected for a backup set, this means any backed up hard link will be backed up and restored as a separate (individual) file. In this case, the backup set will not contain any hard link information. Even with the Backup hard links option selected, you must create a backup set that includes all the hard linked files. Otherwise a warning will appear in the Event Log for the backup activity and if you restore from that backup, your existing hard links will be broken. The same applies if you perform a partial restore of hard linked files.
See Also
NAS, UNIX-SSH, NFS, Local File System Backup (LINUX DS-Client) on page 112
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article covers one of the methods you can use to backup the DOS Partition of a NetWare Server.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article deals with Backup and Restore of NetWare files from a Windows DS-Client.
NOTE: You must install the corresponding Novell NetWare Client on the target backup/restore computer. There are several other Knowledge Base articles that deal with specific situations. These are listed below, under See Also.
Backup
Once Novell NetWare is properly configured, the NetWare files can be backed up (and restored) through: a File System backup set (See File System Backups on page 99.). Backup file path limitation The NetWare client API used by the Windows DS-Client has a 255 character limit. This means the path of any NetWare file being backed up cannot be longer than 255 characters. This includes the NetWareServername, the NetwareVolumename, the folders and the filename itself. Any files longer than this 255 character limit will fail to be backed up with either of the following errors:
"The filename, directory name, or volume label syntax is incorrect." - OR "The request is not supported."
The only backup solution is to shorten the path on the (NetWare) backup source.
Restore
Since NetWare files are backed up as File System backup sets, see the following restore sections for instructions: Restore File System Backups on page 225 Restore NetWare Servers (Files and NDS) on page 232
See Also
Novell NetWare Backups on page 115 Restore NetWare Servers (Files and NDS) on page 232 Setting up the Novell NetWare Client on the DS-Client computer on page 442 Backup of NetWare Servers (DOS Partition) on page 541 Backup / Restore of Novell NetWare files from a Linux DS-Client on page 544
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article deals with setup of Novell NetWare for Backup and Restore of NetWare files from a Linux DS-Client. Once Novell NetWare is properly configured and its mount point is visible to Linux DS-Client, the NetWare files can be backed up (and restored) through: a Local File System backup set, if the file system is mounted on the DSClient computer; an SSH backup set, if the file system is mounted on a different network computer. Note: You cannot use the NFS protocol to browse to a mounted NetWare File System. Linux DS-Client can backup the following NetWare configurations: NetWare on Open Enterprise Server (with Novell Client for OES) NetWare on SuSE 9 (with Novell Client for SuSE 9) NetWare on SuSE 10 (with Novell Client for SuSE 10) NOTE: You must install the corresponding Novell NetWare Client on the target backup/restore computer.
See Also
Novell NetWare Backups on page 115 Restore NetWare Servers (Files and NDS) on page 232 Setting up the Novell NetWare Client on the DS-Client computer on page 442 Backup / Restore of Novell NetWare files from a Windows DS-Client on page 542 Backup of NetWare Servers (DOS Partition) on page 541
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
Since workstations and servers can have any number of open files during backups, those files might cause problems and/or backup errors. Open files can be backed up successfully, fail to be backed up, or be backed up with potential integrity problems. Depending on the type of open file and operating system of the server/workstation, steps can be taken to reduce or eliminate this Open Files Backup problem. Types of Open Files on page 547 Open File Backup Strategy Options on page 548 VSS (Volume Shadow Copy Service) on page 548 Conclusion on page 549
Special File Types e.g.: MS Exchange Oracle DB2 MS SQL Server MS Outlook System State / Registry etc.
Deny Write
Prevent Write
Allow Write
If the backup of an open file fails on the first attempt, the DS-Client can be instructed to retry up to ten times. Note: Even with the Open File Backup Strategy options, files that are completely locked will not be accessible (they will fail to be backed up with errors). However, these files can be accessed by using the VSS backup set option (See below: VSS (Volume Shadow Copy Service) on page 548). Once DS-Client can read the file, it can be backed up.
Conclusion
To reduce problems caused by backup of open files: 1. Perform scheduled backups during off-peak hours. 2. Perform special file backups for appropriate backup types. 3. Exclude system and useless files to eliminate unnecessary errors.
See Also
Backup Set Options - Pre/Post on page 97 Backup using Microsoft VSS (Volume Shadow Copies) on page 550
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article covers backup of Windows Servers (XP, 2003, and newer) using Microsoft VSS (Volume Shadow Copy Service). It explains how DS-Client works with VSS and when it is recommended to use VSS to perform backups.
Details
File System backup sets for Windows Servers (XP, 2003, and newer) may be configured to use VSS to perform the backup. This option must be specifically enabled for each backup set in the Set Properties Advanced Options Tab. During backup of sets configured to use VSS: 1. The DS-Client will connect to the source machine and will instruct the VSS service to take a snapshot of that machine. 2. After the snapshot is generated, DS-Client will continue its backup using the VSS snapshot. Note: In order to use the VSS backup method, sufficient storage must be available on the source machine in order to hold the snapshot. Note 2: Only one VSS snapshot of a volume can be taken at a time. This means that simultaneous snapshots of the same volume from different VSS-aware backup sets is not possible. If this is attempted, the error Another VSS backup already in progress. Failed to create new VSS Snapshots. will be reported. To work around these situations, you can either edit the backup schedules so that the backups run at different times, or adjust the VSSWaitSnapshotTimeout Advanced DS-Client Parameter (Setup menu > Configuration > Advanced Tab: Miscellaneous). 3. If any problems occur during the backup from the snapshot (or if the VSS snapshot fails), DS-Client will try to backup using the traditional Asigra Cloud Backup agentless backup (lock the files, open them, read the files, process the files for incremental forever, compression, encryption and send the files to the DS-System). 4. The "Do not involve writers" option is left unchecked by default (recommended). This means DS-Client will communicate with the applications that integrate with Microsoft VSS in order to produce the most consistent backup of data.
Backup of Windows VISTA and newer servers (File System backup sets)
For Windows VISTA and newer operating systems, VSS is always used to backup the System State and Services Database.
See Also
Backup of Open Files on page 546 Backing up Windows for Bare Metal Restore (BMR) on page 534.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article covers various backup/restore Windows XP issues.
Network Access: Sharing and security model for local accounts must be set to Classic - local users authenticate as themselves.
Start > Programs > Control Panel > Administrative Tools > Local Security Policy > Local Policies > Security Options > Network Access: Sharing and security model for local accounts > Classic - local users authenticate as themselves
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This articles refers to the classic MS Exchange backup set type that uses the native Microsoft Exchange backup API and Windows Networking to perform backup and restore of target Microsoft Exchange Servers. Note: An alternate method of backing up a Microsoft Exchange Server is to use the VSS-aware backup set type. For more information, see Backup / Restore of Microsoft Exchange Server (VSS-aware backup sets) on page 640.
The DS-Client service allows you to backup live Microsoft Exchange Server databases (i.e. while the databases are running). For more information, or to compare the benefits of online/live versus offline backups, see Microsoft Knowledge Base article - Q237767. The machine on which the MS Exchange Server is running must have all the default administrative shares (C$, D$, ADMIN$).
Support status
Active Support Active Support Active Support Passive Support
Matrix Legend: Active Support: DS-Client supports backup / restore of Exchange server. Passive Support: Backup / restore tests have not been performed on these platforms, but there should not be any technical limitations. Not Supported: Exchange server backup / restore is not supported. No Vendor Support: Vendor does not support installation of Exchange on these platforms.
Backup
The account that you are using either must be a member of the administrative group, or explicitly included in MS Exchange with administrator rights. If the DS-Client is not a member of the same domain as the MS Exchange server, you must enter the network credentials when creating the backup set (Select Server Wizard Tab). In the Enter
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
Network Credentials dialog, you must specify either a computer name or domain name for authentication. MS Exchange server will not accept <None>, as in this case DS-Client performs logon impersonation (and this is invalid, since the DS-Client is not a member of the same domain). You must also create an account on the DS-Client computer, which is exactly the same (name & password) as the MS Exchange server administrator account. This way, when the DS-Client computer performs the authentication, you can select DS-Client computer name in the "From" field. MS Exchange Backups are "packages" of files that are all interdependent. If one file is missing or corrupted, the entire backup session cannot be successfully restored. If for any reason, there is an error in the backup of the MS Exchange Server, DS-Client will delete all the files backed up during that session.
Restore
For restores of MS Exchange 2000: If, during restore, you receive the error "The server is not operational", make sure the DS-Client computer can resolve the fully qualified domain name of the Exchange computer through a proper DNS setting. In cases where you are performing disaster recovery drills, or an actual disaster recovery, several checks must be performed: 1. Assuming the machine that you backed up no longer exists (i.e. was destroyed), you must configure a new machine and install MS Exchange on it. If you had a backup set for the entire machine (including registry), you can restore immediately. Otherwise, follow the next step; 2. If you did not restore the registry, check the following: Make sure that the machine names are the same (the server that you are restoring to must have the same name as the server that you backed up). The same applies for the domain name and the administrator account. Make sure the location of the databases is the same (including the drive letters). Once you have all these checks performed, you can start the restore process. After the restore is complete, you should have no errors, and MS Exchange should be up and running. 3. For more information, see Microsoft Knowledge Base articles - Q175469, Q176239, and Q224977.
2. When you apply SP1 to an existing MS Exchange 2007 server, the Microsoft version number changes from 8.0 to 8.1. Any existing Microsoft Exchange Server backup sets will not work. You can migrate an existing backup set (See Backup Set Migration on page 497.) or create a new one for the SP1 version.
See Also
Backup Set Migration on page 497 Troubleshooting: Microsoft Exchange Server Backup on page 556 Backup / Restore of Microsoft Exchange Server 2010 in DAG (Database Availability Group) configuration on page 558 Backup / Restore of Microsoft Exchange Server (VSS-aware backup sets) on page 640 Alternate Location Restore of Microsoft Exchange Server 2000 / 2003 (mailbox recovery) on page 687 Alternate Location Restore of Microsoft Exchange Server 2007 (mailbox recovery) on page 689
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This Knowledge Base article contains a list of known errors, the reason(s), and suggested solutions.
Reason: One known reason for this problem is the firewall between DS-Client and Exchange server is enabled and blocks some ports. For example, after applying Windows XP SP2 to the DS-Client machine, the XP firewall will be enabled automatically and causes this error. These ports are not required directly by the DS-Client, but are required by the Exchange server functions that DS-Client invokes. Solutions: Disable the firewall; or If you must keep the firewall up and running, configure it to allow connections between the DS-Client machine and the Microsoft Exchange Server.
Solution:
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
Reason: You have tried to select the MS Exchange server by supplying its IP address. Solution: You must supply the fully qualified domain name of the Exchange computer. The DS-Client computer must be able to resolve the fully qualified domain name of the Exchange computer. This can be done through a proper DNS setting.
See Also
Backup / Restore of Microsoft Exchange Server on page 553 Alternate Location Restore of Microsoft Exchange Server 2000 / 2003 (mailbox recovery) on page 687 Alternate Location Restore of Microsoft Exchange Server 2007 (mailbox recovery) on page 689
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Backup / Restore of Microsoft Exchange Server 2010 in DAG (Database Availability Group) configuration
Creation Date: May 13, 2011 Revision Date: May 13, 2011 Product: DS-Client (Windows)
Summary
This article contains specific instructions related to Backup and Restore of Microsoft Exchange Server 2010 in DAG (Database Availability Group) configuration.
The healthy mailbox databases (replicas) may be restored to their original location using only File Restore option. The replica mailbox databases cannot be restored using the VSS Restore option because of a VSS Replica writer limitation.
See Also
Backup / Restore of Microsoft Exchange Server on page 553
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
The DS-Client software allows you to perform online backups of MS SQL Server databases. The DS-Client supports backup and restore of MS SQL Server versions 2000 and above. This article contains information in the following sections: Features Supported on page 560 Special requirement for support of MS SQL Server 2000 on page 560 Special requirement for support of Clustered MS SQL Server 2000 on page 560 Security and User Accounts on page 561 Backup Dump Devices on page 561 Using DBCC on page 561 Database Backup Policy on page 562 Advantages and Disadvantages of different DB backup policies on page 563 Restoring Databases on page 564
Features Supported
Features Skip Database Load Online Database Backup NT Integrated Security Database Server Browsing Alternate Server Restore Alternate Database Restore Backup Integrity Verification Truncate Transaction Log before Backup DB Consistency Check Dump to DS-Client Buffer/Pipe Multiple Instances on Same Computer Backup Transaction Log 2000 + + + + + + + + + + + + + + + + + + + + 2005 + + + + + + + 2008 + + + + + + + 2012 + + + + + + +
This is a database user account. If the MS SQL server is configured for integrated Database user account security access, this account is not required and the network user account will be used for both network and database access.
DS-Client Pipe
The database must be configured with FULL or BULK_LOGGED recovery mode, otherwise this option will have no effect. If selected, the DS-Client will dump the Transaction Log and send it to the DS-SysBackup Transaction Log tem in addition to the database(s). (MS SQL 2005 and up) To view the transaction logs from the Restore Wizard, you must select the Advanced Option Latest generation of all data and click the Show Files button to display the files. Backed up log files have a *.log extension.
Using DBCC
DS-Client service can run a Database Consistency Check (DBCC) after the database is dumped. The DBCC will check the database and the database allocation ('checkdb' / 'checktable' and 'checkalloc' options). If using the DS-Client Pipe option, the DBCC is performed before the dump. In either case, the DS-Client service can be instructed not to perform the backup if DBCC errors are found.
(*) A full dump is needed (other than first time) when: a database has been backed up by another backup set (or manually from the SQL tools); a database has been restored (either from another database or an earlier generation); the database properties have been modified (recovery model switched to simple); local cache is used for the backup set (This can occur for Regular backup sets with the option Transmission cache on local storage, but only when a generation must actually pass through the local cache. If the connection to DS-System is down, then a full dump occurs and is written to the local cache. After that dump, DS-Client continues with the selected database backup policy.) the DS-Client requires a Master generation (configured in the MasterGenerations value of the DS-Client Advanced Parameters - Setup Menu > Configuration > Advanced Tab).
Note:
The DS-Client can only take advantage of the differential or incremental backup policy if the backup set (of the SQL database) is the only process that backs up that target. If another backup set is used to backup the database (or the internal SQL commands are used to perform manual backups / dumps), then the backup policy requires the next backup to be a full dump.
Database Backup Policy Full Backup Schedule Over-ride Rules: These rules are optional. They allow greater control over when a Full Backup can occur (e.g. not during business hours).
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
Warning: Full dumps can be delayed, but a full database dump needs to be performed at some regular frequency to protect the integrity of the database backup. By default, DS-Client allows a full backup to be skipped a maximum of 120 consecutive times. This number is configurable in the DS-Client Advanced Configuration options MaxNonFullDumps parameter (see: DSClient Advanced Configurations on page 458). In general, if using any skip full backup rules, you should force a full backup before this maximum interval occurs. Use the Full every... option(s) to specify that time.
Only one backup set can backup the target MS SQL Server, since the backup set must maintain the record of differential backups. No manual backups from the SQL tools can be performed (otherwise a Full backup is required). Only available for Microsoft SQL Server 2005 / 2008 / 2012 databases.
Only one backup set can backup the target MS SQL Server, since the backup set must maintain the record of incremental backups. No manual backups from the SQL tools can be performed (otherwise a Full backup is required). Configuration requirements: Database Recovery Model must be full or bulk_logged, which means that more processing will occur on the MS SQL Server and more data and logs will be stored. Only available for Microsoft SQL Server 2005 / 2008 / 2012 databases. More data is transmitted between source MS SQL Server and DS-Client.
Restoring Databases
A database that was backed up using the dump to disk file option can only be restored using the same method. (i.e. you cannot restore such a backup using DS-Client Pipe.) The file name generated by the restore using the "dump to disk file" option will be in the form 'database.y', where 'y' is an internal number.
See also
MS SQL Server Database Backups on page 116 Restore MS SQL Server Backups on page 234 MS SQL Server Backup Sets (Alternate Location Restore) on page 266 Troubleshooting: Backup of Microsoft SQL Server 2000 Desktop Engine on page 567 Troubleshooting: Backup of Microsoft SQL Server 2005 (and up) and SQL Server 2005 Express (and up) on page 568 Restoring MS SQL Server Transaction Logs on page 709 Restoring the MS SQL Database Server MASTER Database on page 722
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article shows the configuration requirements that must be performed if you want to backup / restore a Microsoft SQL Server with less privileged users (i.e. non-system administrators / nondatabase administrators). This applies to both backup set types currently supported (classic MS SQL Server backup set and the VSS-aware type).
2. Minimum privilege requirements for user performing the backup: The user must be a member of SQL Server target computers local Power Users. This is in order to be able to translate from a shared path to a local path and to create the SQL statement pointing to the local path (if applicable). - AND The user must have privileges to access remote registry (besides the UAC requirement). The easiest way is to make it a member of the Backup Operators group on the SQL Server target computer.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article deals with backups of the Microsoft SQL Server 2000 Desktop Engine (MSDE).
Problem
Due to a Microsoft security fix in the MSDE, the databases backup through pipe does not work for instances build version >=818. Windows SharePoint Services 2003 is one example (there may be others) of an application that installs MSDE v.8.00.880 by default. When backing up databases from this instance using DSClient Pipe or DS-Client Buffer, DS-Client fails and records an error for each database backed up, like:
"Cannot open backup device \\.\pipe\model.1. Device error or device offline. See the SQL Server error log for more details. BACKUP DATABASE is terminating abnormally."
Workaround
There are three options when creating a SQL Server type set: 1. Backup through DS-Client Pipe. 2. Backup through DS-Client Buffer. 3. Backup through local buffer (it dumps the databases to a specified location on the same server as MSDE/SQL Server. Use the option 3. (above) in order to successfully backup MSDE instances build version >= 818.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Troubleshooting: Backup of Microsoft SQL Server 2005 (and up) and SQL Server 2005 Express (and up)
Creation Date: January 12, 2007 Revision Date: September 20, 2012 Product: DS-Client (Windows)
Summary
This article deals with backup of Microsoft SQL Server 2005 (and up), both the Full and Express versions.
Reason The remote SQL Server instance may not be configured for remote connections. By default, SQL Server Express is installed (configured) only for local connections. By default, MS SQL Server is installed (configured) for remote connections, but this might have been changed. Workaround Use the SQL "SQL Server Configuration Manager" tool: 1. Start > All Programs > Microsoft SQL Server > Configuration Tools > SQL Server Configuration Manager: Enable TCP/IP and Named Pipes for each of the instances you want to backup. 2. Start the SQL Browser service on the remote server. --Problem 64-bit Windows DS-Client fails to create a new MS SQL Server backup set (in New Backup Set Wizard) with the following popup error:
"Runtime Error! Program: c:\program files\CloudBackup\DS-Client\dsclient.exe R6034 An application has made an attempt to load the C runtime library incorrectly. Please contact the application's support team for more information."
The 64-bit MS SQL Server 2005 release (prior to Service Pack 1) has a problem with native 64-bit applications that use SQL-DMO (SQL Distributed Management Objects).
Solution The MS SQL Server 2005 minimum requirement for DS-Client is Service Pack 1. Use 64-bit MS SQL Server 2005 Service Pack 1 for the DS-Client database. --Problem DS-Client backing up a mirrored MS SQL Server 2005 database receives the following error:
"BACKUP LOG WITH TRUNCATE_ONLY cannot operate on database '<databasename>' because it is configured for database mirroring."
Reason This is a limitation with MS SQL Server 2005. Mirrored MS SQL Server 2005 databases do not support the Truncate Transaction Log backup option. Solution Truncate logs should not be used on backup sets connecting to a mirrored MS SQL Server 2005 database. (Do not select Truncate Transaction Log in the New Backup Set Wizard - Set Properties Items Tab screen.) You can turn this option off from Backup Set Properties > Items Tab: Truncate Transaction Log
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article covers various backup/restore issues for backup sets using the UNIX-SSH protocol. This is the type of connection DS-Client opens to the target computer. To backup or restore, the DS-Client must run the corresponding script on the source / target computer in either PERL or PYTHON languages. SSH Requirements on page 570 SSH Limitations on page 570 SUDO Errors on page 571
SSH Requirements
1. The backup source machine must be a Unix system (Linux, Solaris, HP-UX, or AIX). 2. The source machine must have an OpenSSH compatible server installed and started. 3. The source machine must have either Perl5 (core function, 5.6 or beyond) installed, or Python (2.4) installed. [Alternatively, you can use the DIRECT option to run a specific script/binary located on the source machine.] 4. The SSH approach cannot scan the LAN to get an initial machine list. You must enter the IP of the source machine in the Path field (e.g. UNIX-SSH\10.20.30.100). The user or administrator can also put the initial machine list into the file hostlist_ssh located in the installation path (usually /opt/CloudBackup/DS-Client/etc). The following is a sample:
#================= sample hostlist_ssh begin ================= # format: (comments must begin with '#') # name_or_IP_address[:port] 10.20.30.101 10.20.30.102 10.20.40.33 10.20.40.34:2233 [shortdescription] (less than 20 chars) [Computer 1] [Computer 2] [Server A] [Server B] # SSH server running on port 2233
5. If PERL or PYTHON is not installed in the default path (usually /bin, /usr/bin, ...) on the source machine, you must enter the exact path in the Advanced connection options screen.
SSH Limitations
Due to a PERL limitation, UNIX-SSH backup sets can not backup files with a <tab> symbol at the end of the file name. If a file with this type of name is encountered, backup of that file will fail. The following error message will appear in the Event Log:
Open for read failed (cannot open file <file_with_path> for reading: No such file or directory)
SUDO Errors
If either of the following errors occur, the backup source computer may require an update to its sudoers file. Trying to login via SSH using "sudo as an alternate user option" results in the following error:
User Change failed ()
Attempting to run "ssh <ip> sudo -u <user name> perl/python" from a terminal window results in the following error message:
sudo: sorry, you must have a tty to run sudo
Solution: 1. Login as root on the backup source machine. 2. Use the visudo command to edit the /etc/sudoers file. 3. Disable the following line:
Defaults requiretty
To disable this line, either delete the whole line or comment it out (put a # at the beginning of the line). 4. Save and then exit the editor. 5. SSH should now work properly with the sudo as an alternate user feature.
Note:
See also
NAS, UNIX-SSH, NFS, Local File System Backup (LINUX DS-Client) on page 112
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article covers various backup/restore issues for NFS backup sets using the NAS, UNIX-SSH, NFS, Local File System backup type.
Configuring a source machine for backup through NFS using Linux DS-Client
Note: The following are general suggestions that do not take into consideration network security requirements. Consult your network administrator and NFS documentation for full details.
1. In order to backup a source machine that supports NFS (version 3 or higher), the NFS source machine must be configured to export the NFS share (assuming the source machine is an NFS server). 2. To verify if the source server is exporting the NFS share, run the following command on the DS-Client:
Shell> rpcinfo p NFS_server_address
3. If it is working, nfs should be listed in the output, and you should be able to connect to the NFS share via Linux / Mac DS-Client. Otherwise continue with step 4. 4. Strictly speaking, you only need to edit /etc/exports to get NFS to work with DS-Client. This file is on the source machine, and contains a list of entries. Each entry indicates a volume that is shared and how it is shared. Check the man pages (man exports) for a complete description of all the setup options for the file, although the description here will probably satisfy most people's needs. An entry in /etc/exports will typically look like this:
directory machine1(option11,option12)
For example:
/ 192.168.1.250(rw,no_root_squash)
The above line allows the DS-Client machine whose IP is 192.168.1.250 to have read and write access to the / folder. If the option no_root_squash is selected, then root on the DS-Client machine will have the same level of access to the files on the NFS share as root on the NFS server. 5. Save the file and restart the NFS daemon with the following command:
Shell> /etc/init.d/nfs restart
6. Now, the DS-Client machine should be able to connect to the NFS share.
See also
NAS, UNIX-SSH, NFS, Local File System Backup (LINUX DS-Client) on page 112
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
DS-Client Linux
Red Hat Red Hat Red Hat SUSE ES / AS ES/ AS ES/ AS Linux Linux 4 Linux 5 Linux 6 Ent. 9 SUSE Linux Ent. 10 SUSE Linux Ent. 11
DS-Client Windows
Windows Windows Windows Windows Vista XP, 2003 2008 7 Ent., Ult. Supp. Supp. Supp. Supp. Supp. Supp. Supp. Supp. Supp. Supp. Supp. Supp. Supp. Supp. Supp. Supp. Supp. Supp. Supp. Supp.
Windows XP, 2003, 2003 R2 (x86/x64) Windows Vista Business, Ent., Ult. (x86/x64) Windows 2008 (x86/x64) Windows 2008 R2 (x64) Windows 7 Pro, Ent., Ult. (x86/x64) 11gR2 Solaris 10 (SPARC 64 bit) HPUX Itanium 11.3 Red Hat ES/AS Linux 5, 6 (x86/x64) Oracle Enterprise Server 5.4 (x86/x64) Oracle Linux 6 (x86/x64) SUSE Linux 11, 11.2 (x86/x64) Windows 2008 (x86) Windows 7 Pro, Ent., Ult. (x86) 11gR2 EXPRESS Red Hat ES/AS Linux 5, 6 (x86/x64) (see Note 1) Oracle Enterprise Server 5.4 (x86/x64) Oracle Linux 6 (x86/x64) SUSE Linux 11, 11.2 (x86/x64) Windows XP, 2003 (x86/x64) Windows VISTA Ultimate (x86/x64) Windows Vista Enterprise (x86/x64) Windows 2008 x64 Red Hat ES/AS Linux 4 (x86/x64) Red Hat ES/AS Linux 5 (x86/x64) 11gR1 SUSE Linux 10 (x86/x64) RS6000 AIX 5L (64 Bit) up to 5.2 Oracle Enterprise Server 5.4 (x86/x64) AIX on Power System 5.3/6.1 SUSE Linux 11 (x86/x64) Itanium Integrity, HPUXi 11.23/11.3 Solaris 9 (SPARC 64 bit) Solaris 10 (SPARC 64 bit) Windows 2008 x64 Windows XP, 2003 Solaris 10 (SPARC 64 bit) Solaris 9 (SPARC 64 bit) 10gR2 Red Hat ES/AS Linux 4 (x86/x64) Red Hat ES/AS Linux 5 (x86/x64) SUSE Linux 9 (x86/x64) SUSE Linux 10 (x86/x64) RS6000 AIX 5L (64 Bit) up to 5.2 Itanium Integrity, HPUXi 11.23 10gR2 EXPRESS Red Hat ES/AS Linux 3 (x86/x64) (see Red Hat ES/AS Linux 4 (x86/x64) Note 1) SUSE Linux 9 (x86) Windows 2003 / XP Pro (x86)
DS-Client Linux
Red Hat Red Hat Red Hat SUSE ES / AS ES/ AS ES/ AS Linux Linux 4 Linux 5 Linux 6 Ent. 9 N/S Supp. Supp. Supp. N/S Supp. Supp. Passive N/S Passive Passive Passive N/S Supp. Supp. Passive N/S Passive Passive Passive N/S Passive Passive Passive N/S Supp. Supp. Supp. N/S Supp. Supp. Passive No VS No VS No VS No VS SUSE Linux Ent. 10 SUSE Linux Ent. 11
DS-Client Windows
Windows Windows Windows Windows Vista XP, 2003 2008 7 Ent., Ult. Supp. Passive N/S N/S Supp. N/S N/S N/S N/S N/S N/S
Windows 2003 Windows XP 10gR1 Solaris 9 (SPARC 64 bit) Red Hat Enterprise Linux 3.4 SUSE Linux Enterprise Server 9 Windows XP, 2003 9iR2 Red Hat Enterprise Linux ES 3,4 SUSE Linux Enterprise Server 9 Red Hat Enterprise Linux AS 3
Supp. (Active Support): DS-Client supports backup / restore of Oracle server. Passive (Passive Support): Backup / restore tests have not been performed on these platforms, but there should not be any technical limitations. N/S (Not Supported): Oracle server backup / restore is not supported. No VS (No Vendor Support): Oracle client used by DS-Client to backup / restore Oracle server is not supported by vendor.
Note 1: You must install the full Oracle client (10gR2 or 11gR2) on the DS-Client that performs backup / restore of the target Oracle Express server. Do not install the Oracle Express client on the DS-Client.
Note 2: This matrix does not cover Oracle-SBT (System Backup to Tape), which is covered in separate documentation.
DS-Client Computer Requirements Windows XP / Windows 2003 / Windows VISTA / Windows 2008 / Windows 7. Oracle Client must be installed. It must be the same version as the Oracle Server you want to backup. If you want to backup different versions of Oracle servers, you must install each corresponding version of Oracle client on the DS-Client computer. (If you are using both 9i and 10g Oracle clients on the DS-Client computer, make sure 10g is not the first path in the PATH environment variable.) You must configure the Net service Name for this Oracle Client to connect to each Oracle Server you want to backup or restore. If the Oracle Instance is a shared server, set the Connection Type as "Dedicated Server". Recovery Manager (RMAN) utility must be installed. To backup / restore Oracle 9i and 10g, you must manually copy recover.bsq to %ORACLE_HOME%\RDBMS\ADMIN directory on DS-Client computer. Please see Oracle bug #2421470. You can find recover.bsq on the Oracle 9i Server in the %ORACLE_HOME%\RDBMS\ADMIN directory. Oracle Server Requirements [32-Bit Windows Platforms] orasbt.dll must be copied to the target Oracle Server's computer. Place it in the path \%SYSTEMROOT%\SYSTEM32 (System Root path). You can find this file in the DS-Client installation directory. [64-Bit Windows Platforms] orasbt_x64.dll must be copied to the target Oracle Server's computer. Rename it to orasbt.dll, then place it in the path \%SYSTEMROOT%\SYSTEM32 (System Root path). You can find this file in the DS-Client installation directory. Oracle Instance must be running in "ARCHIVELOG MODE" (this allows online backup of the database). Set the CONTROL_FILE_RECORD_KEEP_TIME initialization parameter to slightly longer than the period (in days) between backups of the whole Oracle database (all tablespaces, control files, and archive logs). RMAN has a limitation of how many archived logs can be backed up at one time. Increase the "redo log file" size to reduce the number of archived logs. If you are using DS-Client Buffer or DS-Client Pipe as the dump path for backup, make sure both the "OracleServiceXXXX" and "Oracle TNSListener" services use the "administrator" account. Backup Requirements The Oracle database should be in Open state when you perform the online backup. In order to perform full or alternate restore of an Oracle database, the backup must be a full Oracle database backup (all tablespaces, archived log files, and control file). In addition, you must have a backup of the password file and the init file. The password file (e.g.c:\oracle\ora92\database\pwd<instance>.ora) and the init file (e.g. c:\oracle\admin\<instance>\pfile\init.ora) should be backed up in a File System backup set. You do not need to place online tablespaces in backup mode when performing backups. Restore Requirements There are the following requirements and limitations: To restore the Control File, you must start the database in nomount (started) state. To restore Tablespaces without the Control File, you must start the database in mount state. Otherwise, you must change the tablespaces offline. Tablespaces can be restored, however the logs will be applied to the present (unless DBPITR is performed). This means they will not be "as when backed up". The control file should only be restored when performing DBPITR (Database Point In Time Recovery). After restoring, the database will be opened with the "RESETLOGS" option. By doing this, you will not be able to restore any tablespaces backed up after that point in time (unless you restore the control file). When performing a DBPITR, all the files backed up in that particular session must be restored. For full restore to the original location, the requirements are the same as for Alternate Location Restore, except the target computer is the original computer. [Oracle 10g only] Before performing a DBPITR, if the backup and flash_recovery_area have different reset log times, you must rename the flash_recovery_area directory. After performing the restore, you should shutdown and manually restart the Oracle database (see Oracle Note: 286964.1).
Alternate Location Restore Requirements The Oracle Server (target restore server) must satisfy the requirements listed in the sections above. In addition, the following apply for Alternate Restore: 1.The backup must be a full Oracle database backup. You must also have a backup of the password file and the init file (this will be in a File System backup set). 2.The target restore computer must have an Oracle database service Instance of the same name. 3.The target restore computer must have the same tablespace path as the original backup (this can be created when setting up the database). This is because of Oracle limitations and specifications. All information about file structure is recorded in the Control File and the Oracle Database as a whole. 4.Restore the (File System) backup of the password file and the init file to the alternate computer. This is a separate backup set of the password file and the init file from the original backup computer. 5.Restore the full Oracle database backup. 6.If you choose a different dump path, only dump files are restored to that path. You must use RMAN to restore your Oracle database manually.
Oracle Server Requirements Oracle Instance should be running in "ARCHIVELOG MODE" (this allows online backup of the database). Set the CONTROL_FILE_RECORD_KEEP_TIME initialization parameter to slightly longer than the period (in days) between backups of the whole Oracle database (all tablespaces, control files, and archive logs). RMAN has a limitation of how many archived logs can be backed up at one time. Increase the "redo log file" size to reduce the number of archived logs. Oracle Server should be a certified product. For example, Oracle 10.2 for Red Hat Enterprise Linux AS/ES 4, SuSE SLES 10, or Solaris 10 (64-bit). To use DS-PIPE for backup and restore, a library file must be copied to $ORACLE_HOME/lib on the Oracle server. This file must correspond to the Oracle servers platform. The files are found in the DS-Client installation directory in the sub-folder /Misc/Oracle_Classical_Library: libobk.so libobk-64.so [for Linux 32-bit Oracle database] Copy to $ORACLE_HOME/lib on 32-bit Linux Oracle Server. [for Linux 64-bit Oracle database] Copy to $ORACLE_HOME/lib on 64-bit Linux Oracle Server and make a soft link "ln -s libobk-64.so libobk.so". libobk.a [for AIX Oracle database] Copy to $ORACLE_HOME/lib on AIX Oracle server. libobk_ia64.sl [for HPUX Itanium oracle database] Copy to $ORACLE_HOME/lib on HPUX Itanium Oracle Server and make a soft link "ln -s libobk_ia64.sl libobk.so" libsbt64.so [for Solaris 64-bit Oracle database] Copy to $ORACLE_HOME/lib on Solaris 64-bit Oracle server and make a soft link "ln -s libsbt64.so libobk.so". libsbt32.so [for Solaris 32-bit Oracle database] Copy to $ORACLE_HOME/lib on Solaris 32-bit Oracle server and make a soft link "ln -s libsbt32.so libobk.so". Backup Requirements The Oracle database should be in Open state when you perform the online backup. In order to perform full or alternate restore of an Oracle database, the backup must be a full Oracle database backup (all tablespaces, archived log files, and control file). In addition, you must have a backup of the password file and the init file. The init file (e.g. admin/<instance>/pfile/init<instance>.ora) and password file (e.g. $ORACLE_HOME/dbs/ orapw<instance>) should be backed up in a File System backup set. A backup of the password file is necessary for any full or alternate restore of the Oracle database. You do not need to place online tablespaces in backup mode when performing backups. For Oracle backup using NFS protocol, you must supply the user account of root for the network credentials.
Restore Requirements There are the following requirements and limitations: To restore the Control File, you must start the database in nomount (started) state. To restore Tablespaces without the Control File, you must start the database in mount state. Otherwise, you must change the tablespaces offline. Tablespaces can be restored, however the logs will be applied to the present (unless DBPITR is performed). This means they will not be "as when backed up". The control file should only be restored when performing DBPITR (Database Point In Time Recovery). After restoring, the database will be opened with the "RESETLOGS" option. By doing this, you will not be able to restore any tablespaces backed up after that point in time (unless you restore the control file). When performing a DBPITR, all the files backed up in that particular session must be restored. For full restore to the original location, the requirements are the same as for Alternate Location Restore, except the target computer is the original computer. [Oracle 10g only] Before performing a DBPITR, if the backup and flash_recovery_area have different reset log times, you must rename the flash_recovery_area directory. After performing the restore, you must shutdown and manually restart the Oracle database (see Oracle Note: 286964.1). Alternate Location Restore Requirements The Oracle Server (target restore server) must satisfy the requirements listed in the sections above. In addition, the following apply for Alternate Restore: 1.The backup must be a full Oracle database backup. You must also have a backup of the password file and the init file (this will be in a File System backup set). 2.The target restore computer must have an Oracle database service Instance of the same name. This is to simplify the process of recovery. You must modify the initial file manually if you use a different Instance name. 3.The target restore computer must have the same tablespace path as the original backup (this can be created when setting up the database). This is because of Oracle limitations and specifications. All information about file structure is recorded in the Control File and the Oracle Database as a whole. 4.Restore the (File System) backup of the password file and the init file to the alternate computer. This is a separate backup set of the password file and the init file from the original backup computer. 5.Restore the full Oracle database backup. 6.If you choose a different dump path, only dump files are restored to that path. You must use RMAN to restore your Oracle database manually.
See Also
Troubleshooting: Oracle Database Servers on page 583 Oracle Database Point-In-Time Recovery (DBPITR) on page 724
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Choosing the User for Oracle Backup / Restore Operations via SSH Dump
Creation Date: November 09, 2009 Revision Date: February 01, 2010 Product: Linux DS-Client
Summary
For backups, DS-Client instructs RMAN to perform a database dump then sends the files to the DS-System. The dump files are set to 640 permission and are owned by the Oracle user that RMAN used to create them (which is usually "oracle"). For restores, DS-Client places the dump files to be restored in the dump path with 777 permission and instructs RMAN to perform restore with those files.
1. Make sure that the designated and RMAN users have browse access to the path. (-R makes the ACL settings apply recursively so ACL for oraDump is set as well):
setfacl -R -m user:dscuser:rx -m user:oracle:rx /some_path
2. Make sure that the designated and RMAN users have read/write permissions in the dump folder:
setfacl -m user:dscuser:rwx -m user:oracle:rwx /some_path/oraDump
3. Set default ACL for the dump folder so that files created in the folder will grant designated and RMAN users read/write permissions:
setfacl -m default:user:dscuser:rw -m default:user:oracle:rw /some_path/ oraDump
See Also
Backup / Restore of Oracle Database Servers on page 573
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article covers the following troubleshooting issues for Oracle database backup sets: RMAN reports file corruptions during backup on page 583 Oracle restore fails on page 583 Oracle backup reports error ORA-12154 on page 584
More information For more information, refer to the Oracle documentation: Metalink document #457422.1
More information For more information, refer to the Oracle documentation: Metalink document #243264.1 (Creating a Database From an Existing Database Fails with an ORA-01152 on Alter Database Open Resetlogs)
More information This occurs if the Oracle Database Service Name has changed since this backup set was created. When you define an Oracle backup set, each backup item contains the Service Name as part of the path (e.g. an Oracle DB with the Service Name orcl might have backup items orcl\SYSTEM or orcl\*). If the Service Name is changed, DS-Client will fail to connect to the Oracle database with the ORA-12154 error. Resolution This is not likely to occur often (or at all), but in the event such a change is made, you must migrate the backup set in order to change the <oracle_service_name>\item_name from the old Oracle Service Name to the new one. To migrate the backup set: 1. Right-click the Oracle backup set and select Migrate.... The Migrate Backup Set wizard appears. 2. Select the computer to backup. In this situation, this will be the same machine as the original backup set. 3. When you click Next >, you are prompted to supply the Oracle Database credentials.
Adjust the backup sets database credentials to use the new service name. 4. Follow the rest of the Wizard screens to re-specify the backup set items and complete the migration. Once migration is complete, try backing up again to verify you do not get the ORA-12154 error. Another alternative is you can create an entirely new backup set and stop using the old one.
See Also
Backup / Restore of Oracle Database Servers on page 573
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article covers various backup/restore issues for MySQL database backup sets. The following requirements must be met in order to perform backup / restore of MySQL Database Servers. General Requirements 1. The user who performs MySQL backup / restore should have knowledge about the MySQL database structure. DS-Client Computer Requirements 1. DS-Client backs up MySQL Server using the MySQL utilities mysqldump and mysql. The DS-Clients mysqldump and mysql utilities must be compatible with the MySQL version running on the source machine (MySQL server). 2. The following requirements depend on the type of DS-Client you are using: Windows DS-Client: The mysql utility must be listed in the PATH environment variable of the DS-Client computer. (If you must edit this variable, stop and restart the DS-Client service after making the change.) Linux DS-Client: The mysql utility must be listed in the PATH environment variable of user root on the DS-Client computer. Mac DS-Client: The path to the mysql utility must be added to the following file on the DS-Client computer:
/etc/rc.common
For example, if you want to connect to a MySQL instance at IP address 10.20.30.111 using the port number 3310, you would type the following line into the Path field:
\\10.20.30.111:3310
Note:
If you do not specify a port number, Windows DS-Client will use 3306 as a default.
For Linux / Mac DS-Clients: 1. You can specify the port numbers when creating the MySQL backup set: Sets Menu > New Backup Set. Select MySQL backup type and click Next.
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
In the Select the source for this backup set screen, select Ask for database credentials. When the credentials screen appears, you will be able to enter the port number that the MySQL Server is configured to use. 2. You can also change the port number by editing the backup set properties (Backup Set Properties > Connection Options > Ask for database credentials: Port Number).
How to display the MySQL backup set type in the New Backup Set Wizard
If you do not see the MySQL backup set type option when you open the New Backup Set Wizard (Sets Menu > New Backup Set), your DS-Client may not be configured to support it. Make sure the following requirements are met: For Windows DS-Client: MySQL client software is installed. The folder that contains the MySQL utilities (such as: mysqldump.exe and mysql.exe) is in the PATH environment variable of the DS-Client computer. To verify if the path is included, launch a command window on DS-Client computer, and in the command prompt, run the command path. For Linux DS-Client: MySQL client software is installed. The folder that contains the MySQL utilities (such as: mysqldump and mysql) is in the search PATH of the DS-Client. To verify, edit the /etc/init.d/dsclient and in the line PATH, make sure the folder is listed. For Mac DS-Client: MySQL client software is installed. The folder that contains the MySQL utilities (such as: mysqldump and mysql) is in the search PATH of the DS-Client. The path to the mysql utility should be added to the following file on the MAC DS-Client computer: /etc/rc.common.
See also
MySQL Database Backup (Windows DS-Client) on page 131 MySQL Database Backup (LINUX DS-Client) on page 133
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Linux DS-Client
Red Hat ES/AS Linux 4 No Vendor Support No Vendor Support No Vendor Support No Vendor Support No Vendor Support No Vendor Support No Vendor Support No Vendor Support No Vendor Support Passive Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support Red Hat ES/AS Linux 5 Active Support No Vendor Support Active Support No Vendor Support Active Support Active Support Active Support Active Support Active Support Passive Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support SUSE Linux Enterprise 9 No Vendor Support No Vendor Support No Vendor Support No Vendor Support No Vendor Support No Vendor Support No Vendor Support No Vendor Support No Vendor Support Passive Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support SUSE Linux Enterprise 10 Active Support No Vendor Support Active Support No Vendor Support Active Support Active Support Active Support Active Support Active Support Passive Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support SUSE Linux Enterprise 11 Active Support No Vendor Support Active Support No Vendor Support Active Support Active Support Active Support Active Support Active Support Passive Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support
Matrix Legend: Active Support: DS-Client supports backup / restore of DB2 server. Passive Support: Backup / restore tests have not been performed on these platforms, but there should not be any technical limitations. No Vendor Support: DB2 client used by DS-Client to backup / restore DB2 server is not supported by vendor.
Backup Requirements
The DB2 database must not be in use when you perform an offline backup. Otherwise an error will be reported. When you create a DB2 backup set, in the "Select the source for this backup set" screen, you must specify the DB2 server hostname or type its IP address in "Path" field. This must be the same as the one used in the catalog command. Linux DS-Client should have read and write privileges to access the transaction log directory on the DB2 database computer (for example ~db2inst1/db2inst1/NODE0000/SQL00005/SQLOGDIR/). Online backups are only available for databases configured with either logretain or userexit enabled. The backup set must specify that the backup is online or offline, as determined by the DB2 database configuration settings. (DO NOT CHANGE THIS PROPERTY. If you change this DB2 configuration, make a new backup set with the new option setting.) It is recommended that the online option setting not be changed for a demand backup. If it is changed, you must make a record of the change and the date
(manually on paper or other format), so that the information is available if a restore is performed.
Restore Requirements
The DB2 database must not be in use when you perform the restore. This requirement applies to all DB2 backup sets (whether configured for online or offline backup). The DB2 database must be configured for online or offline restore. This setting must match the Backup Set Properties > Options setting that was used for the backup.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article covers various backup/restore issues for PostgreSQL database backup sets. The following requirements must be met in order to perform backup / restore of PostgreSQL Database Servers. General Requirements 1. The user who performs PostgreSQL backup / restore should have knowledge about the PostgreSQL database structure. 2. Configure each PostgreSQL database to be able to connect to other PostgreSQL instances: For PostgreSQL 7.x: Enable TCP/IP connection. In <pg_data_path>/ postgresql.conf, uncomment the line tcpip_socket=false and set the option to true:
tcpip_socket = true
For PostgreSQL 8.x / 9.x: In <pg_data_path>/postgresql.conf, add the line listen_addresses='*' as follows:
# CONNECTIONS AND AUTHENTICATION listen_addresses='*'
where <pg_data_path> is the path to the configuration files (usually "/var/lib/pgsql/ data" for the free installation from www.postgresql.org, or "/usr/local/pgsql/data" for the commercial package from www.commandprompt.com. DS-Client Computer Requirements The psql and pg_dump utilities must be listed in the PATH environment variable of the user 'root' on the DS-Client computer. The DS-Client computer's psql and pg_dump utilities must be compatible with the PostgreSQL version running on the source machine (PostgreSQL server). Configure the PostgreSQL database on the DS-Client computer to be able to connect to other PostgreSQL instances as described in the General Requirements above. PostgreSQL Server Requirements PostgreSQL Server should be a certified product. Configure each target PostgreSQL database to be able to connect to other PostgreSQL instances (to perform backup and restore) as described in the General Requirements above.
Restore Requirements
The PostgreSQL database must not be in use when you perform the restore. This requirement applies to all restores (to original or to alternate location). The PostgreSQL Server where you are restoring must be compatible with the version of the PostgreSQL Server that was backed up. This is only an issue if the target restore server is different (Alternate Restore Location), or has been upgraded since the backup. In general, backups of databases residing on an older DB instance can be restored on a newer DB instance (but not the other way around).
Troubleshooting: Linux DS-Client with an Embedded database backing up PostgreSQL versions 9.2 (and up)
The v12 Linux DS-Client ships with an embedded PostgreSQL 9.1.1 database. If you want this DS-Client to backup a higher version of PostgreSQL (e.g. 9.2), you must install the compatible version on the DS-Client computer in order for it to use the compatible pg_dump tools. However, due to a startup timing issue (encountered if your Linux DS-Client is configured to automatically start after reboot), the DS-Client defaults to using the embedded (9.1.1) pg_dump tools. This issue will occur every time the machine is rebooted. Workaround 1: Each time after rebooting the machine, restart the DS-Client service. Workaround 2: Edit the /etc/init.d/dsclient file by adding /opt/PostgreSQL/9.2/bin or whatever the correct path is to the pg_dump tools (psql/pg_restore) to the PATH variable.
See also
PostgreSQL Database Backup (LINUX DS-Client) on page 139
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article covers various Windows 2000 issues. Note: As of v11.2, backup and restore of Windows 2000 is no longer supported. However, some information is relevant to higher versions that are still supported. In general, if no specific version is mentioned, these issues also apply to higher versions of Windows.
Encrypted Files
Encrypted files in Windows 2000 may experience Backup / Restore problems in versions prior to SP 3. To avoid these potential errors, upgrade your Windows 2000 computers to SP3. Windows 2000, SP1, and SP2 have the following known problems (from MSDN): Q307306: EFS Backup Functions May Not Work on Computers That Are Running Windows 2000. Q303873: File Creation on an NTFS Volume May Not Work Even If You Have the SeRestorePrivilege
System State
The System State can only be backed in its entirety. It contains the Registry, as well as other items that must be handled differently than normal files. The following are components of the System State (there may be less, depending on your version or if the component is not activated): Active Directory (You must have the same user account on both DS-Client computer and backup server.) Boot and System Protected Files Certificate Services Database Cluster Database COM+ Class Registration Database Registry SysVol In order to fully protect a Windows computer, make sure that the entire system drive is backed up in the same backup set as the System State.
Services Database
This contains databases that are not included in the System State, which still need to be treated in a similar manner to be successfully backed up. For a complete backup of a Windows computer, you should include the Services Database.
Junction points are file links to other directories. If enabled in the backup set options, DS-Client will backup directories (all data) represented by the junction point. If disFollow junction points abled, DS-Client will backup only the link (shortcut). Notes: Junction points that are mounted FAT or FAT32 volumes are not supported. Overwrite Junction Point Overwrites any junction point(s) of the same name when restoring. Option to enable or disable.
Error Messages
Some error messages might appear in the DS-Client computer's log(s), which occur as a normal result of backing up Windows 2000. " DCOM had error "Class not registered" from the computer <<COMPUTER_NAME>> when attempting to activate the server: {XnnXnXnn-XXnn-nnXX-Xnnn-nnXnXnnnnnXn} " This happens if you create a new backup set for Windows 2000, and try to list all items in the System State. The error is reported because the DS-Client is trying to locate installed services for backup, and Windows 2000 reports this error to DS-Client.
Restore Limitations
Restoring Encrypted Files with Streams to Alternate Location: You will get error messages if you restore to the local computer by browsing the network. Use "My Computer" as the restore destination instead.
In this scenario DS-Client will take care of the whole process. If you are restoring only one node or all of them, DS-Client will attempt to restore the cluster quorum if the "load cluster quorum" option is selected in the DS-User Restore Wizard. If you turn off this option, the data will be copied to \winnt\cluster\Asigra, and you have to manually load it by using the dsclusrs.exe tool. 1.2 The cluster nodes are domain controllers In this scenario you have to boot the target node(s) into "Directory Services Restore Mode". You are performing total disaster restore (including hardware changes). 2.1 The cluster nodes are not domain controllers If you are restoring both nodes, when installing the operating system, follow the same instructions as during the cluster installation (make sure that all nodes have seen the shared disks and have the same drive letters as before). Restore all nodes one by one, while keeping the others down. You can restore all nodes simultaneously, but make sure that they are not attached to the shared disks. At the end of a successful restore, shutdown all nodes and attach them to the shared disk(s). Power them up one by one. When you reboot the first node, the cluster service may fail to start due to the hardware changes (e.g. If you changed the quorum disk). This means you must manually load the quorum using the dsclusrs.exe tool. After you successfully load the quorum, the cluster service can be started. If you changed the resource disks, the resource disks will be offline in the cluster administrator view. In order to fix this problem you have to find out the new signature and edit the registry. Start "regedt32" and go to HKEY_LOCAL_MACHINE > Cluster > Resources and locate the resource disk. Under Parameters you will see the Signature. This is the signature the cluster service expects to see. To find out what is the current signature, go to HKEY_LOCAL_MACHINE > System > MountedDevices and locate the drive letter of the resource disk (e.g. If your resource disk is F, you should see something like "\DosDevices\F..." of type REG_BINARY). Please note that the signature here is stored in little endian format. If you have 78563412, the signature would be 12345678. You must enter this number for the Signature under the Cluster > Resources > GUID > Parameters. Once the correct signature is entered, you can restart the cluster service. If you have troubles with the service, please check the Microsoft Knowledge Base articles mentioned above. The correct quorum data would be located under \winnt\cluster\Asigra. This is the content of the quorum disk. 2.2 The cluster nodes are domain controllers Please read the DS-Client Knowledge Base article titled Bare Metal Restore of Windows (ALL VERSIONS) on page 693. It explains how to handle domain controller restores. We recommend you restore the primary domain controller first. This way, you will avoid problems with Active Directory (AD). If the target server does not have AD, make sure the "Load Cluster Quorum" option in the DS-User Restore Wizard is not selected, then start the restore. If the target server already has AD, you must boot in "Directory Services Restore Mode". After the reboot (in both cases), you must manually load the quorum data using the dsclusrs.exe tool from Asigra. You may also need to fix the cluster service as described in 2.1 above.
See also
Backup / Restore of Windows 2008 on page 596.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article contains the following sections with information specific to Windows 2008: Backup of a Windows 2008 (and up) Cluster on page 596 Restoring a Windows 2008 SP2 Cluster on page 596 DFS (Distributed File System) Namespaces on page 598
The restore will not keep the network settings, therefore the IP addresses need to be reset. Bring quorum disk online (from Server manager > Disk Management). After this is finished, shut down the Node1 machine. 3. Keep Node1 shut down, and power on the Node2 machine. Restore the backup set belonging to Node2. After the restore is finished, the Node2 machine must be rebooted to apply all changes. The restore will not keep the network settings, therefore the IP addresses need to be reset. Bring quorum disk online (from Server manager > Disk Management). 4. Power on the Node1 machine. 5. Connect to the active node and open the Failover Cluster Management console. Run Validate a Configuration to make sure that the environment is correctly configured. Even if the validation does not return any error, the cluster might not work properly because some resources could be offline. If the Cluster Disk1 is offline, select Repair and after that, bring this resource online. If the Cluster Name is offline, select Repair Active Directory Object and after that, bring this resource online. Case B. Cluster will be available after Node1 is restored and witness disk signature corrected. Restore Steps: 1. Have available 1 machine with two network adapter. Install the same operating system (Windows 2008) on that machine. Set up the IP addresses for both public and private cluster networks. 2. Restore the backup set of Node1 (the one with the clusters share). After the restore is finished, do not reboot the Node1 machine. 3. In the Windows Operating System Event Log > Windows Logs > System, there will be an error message like:
"Cluster physical disk resource 'Cluster Disk 1' cannot be brought online because the associated disk could not be found. The expected signature of the disk was 'B46F3BE8'. If the disk was replaced or restored, in the Failover Cluster Management snap-in, you can use the Repair function (in the properties sheet for the disk) to repair the new or restored disk. If the disk will not be replaced, delete the associated disk resource."
4. You will not be able to use the suggested functions because the Failover Cluster Management will not be able to connect to the cluster (because there are not yet the minimum of 2 resources communicating to each other). At this stage, the restored Node 1 cannot see the quorum disk because it is a new disk, and it has a different signature than the original one. If you want to have the cluster running with only one node and the quorum disk, the quorum disks signature must be modified to the expected (original) signature. 5. To modify a disk signature you can use the Diskpart tool on the Node1 machine. To access the utility type "diskpart" at a Windows command prompt. Use the command list disk to show the available disks. Use the command select disk # to select the disk whose signature you want to change. (Where # is replaced with the corresponding disk number.) Use the command "uniqueid disk" to see the present disk signature.
If the original disk id was abcd1234, you would type the following command to change it:
"uniqueid disk id=abcd1234"
Note:
If later on the second node will be restored, this can be done. However you must first shut down Node1, then continue with steps 3, 4, and 5 from Case A. (See Case A. Cluster will be available after both nodes are restored. on page 596.)
4. Open the Failover Cluster Management console and connect to the cluster. If the Cluster Disk1 is offline, select Repair and after that, bring this resource online. If the Cluster Name is offline, select Repair Active Directory Object and after that, bring this resource online.
See also
Backup / Restore of Windows 2000 on page 592. Backing up Windows for Bare Metal Restore (BMR) on page 534. Important Notes for Bare Metal Restore on page 707.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
NOTE: The DS-MLR Service is bundled with the DS-Recovery Tools installation. This article covers Backup and Restore issues for E-Mail message backup sets (using DS-MLR). DS-MLR Backup / Restore Support Matrix on page 600 Using DS-MLR with Microsoft Exchange Server E-Mails on page 602 Using DS-MLR with Microsoft Outlook E-Mails on page 603 Using DS-MLR with Lotus E-Mails on page 603 Using DS-MLR with GroupWise E-Mails on page 604 DS-MLR Computer Registry Keys on page 605 Selective Backup of E-Mails on page 606 Selective Restore of E-Mails on page 606 Troubleshooting / FAQ / Error Messages on page 607 DS-Message Level Restore (DS-MLR) is a solution to backup E-Mails from MS Exchange Server, MS Outlook, Lotus Notes / Domino Server and GroupWise at the individual message level. DS-MLR is part of the DS-Recovery Tools Module that must be enabled from the DS-System (by your Service Provider). DS-MLR is a Windows service. For a list of supported platforms, see DSMLR Installation & Setup on page 434. DS-MLR searches for E-Mails based on a user defined filter, then it transforms each E-Mail into a data stream and passes this stream to DSClient for processing (for backup to DS-System). During backup, DS-Client scans all items and only backs up the new or changed items. Changed items will be processed as delta and only the changes will be sent to DS-System. E-Mails are saved (along with any attachments) as individual objects on DSSystem. The DS-MLR service must be installed and running as follows:
MS Exchange MS Outlook Lotus Domino Lotus Notes GroupWise Install DS-MLR on the MS Exchange Server. (For Clustered MS Exchange Servers, DS-MLR must be installed and running on each node of the cluster.) Install DS-MLR on the computer with MS Outlook. Install DS-MLR on the Lotus Domino Server. Install DS-MLR on the computer with Lotus Notes. Install DS-MLR on the computer with GroupWise client.
The DS-MLR Service Account has some special requirements. See DS-MLR Installation & Setup on page 434.
MS Outlook Object Type Sub Type Appointment All day event Calendar Meeting request Recurring Appointment Recurring Event Recurring Meeting Contacts Deleted Items Drafts Incoming E-Mails with/without attachment. Inbox Journal Notes Outbox Sent Items
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
Backup / Restore of individual E-Mails Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support
Generated on: 10/15/12 Page: 600
Confidential.
Backup / Restore of individual E-Mails Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support
Calendar To Do Contacts Personal Journal (*3) Trash Views Archive Tools Rules Stationery [Lotus Notes only] [Lotus Notes only]
Active Support Active Support Not Supported Not Supported Not Supported Not Supported Not Supported
GroupWise Object Type Cabinet Calendar Checklist Contacts Documents Incoming E-Mails with/without E-Mail attachment Mailbox (*4) Work in progress FW E-Mails Reply E-Mails Sub Type Backup / Restore of individual E-Mails Active Support Active Support Not Supported Not Supported Not Supported Active Support Active Support Active Support Not Supported
Active Support: DS-MLR can backup / restore this type of E-Mail object. Not Supported: DS-MLR does not support this type of E-Mail object. (*1) If the service account is not a member of the Domain Admins group and is not an Exchange Full Administrator, DS-MLR can backup Contacts, but the restored Contacts cannot be seen in the Outlook Address Book. (*2) If the service account is not a member of the Domain Admins group and is not an Exchange Full Administrator, DS-MLR cannot backup Distribution Lists. (*3) Personal Journal may require some configuration (See Using DS-MLR with Lotus EMails on page 603.). (*4) GroupWise supports E-Mails if the body size is no more than 32K (kilobytes).
If this key is set to 0 any items with a duplicate Exchange ID are skipped and a warning is logged in the DS-Client event log. If this key is set to 1 any items with a duplicate Exchange ID are backed up (DS-MLR assigns a new Exchange ID for the items with identical ID). For more information, see: DS-MLR Computer Registry Keys on page 605. DS-MLR access depends on both its service account and the individual backup set credentials The DS-MLR service must be installed to run under an account that is a member of the Local Administrators group, or under the "Local System" account. When starting, it will attempt to grant itself Receive As privileges on the entire Exchange Server. If it is a Domain Admin account, this should succeed. The logic behind this is the following: A Domain Admin account has full privileges on that domain; any Domain Admin account should be able to grant itself the privileges necessary to back up all mailboxes under an Exchange Server. If a backup set uses Domain Admin credentials, it is expected that DS-MLR should be able to back up all mailboxes. The problem is that DS-MLR is able to back up those mailboxes only if it accesses the Exchange Server using a (service) account that has Receive As permissions. While it could make the necessary changes when running the backup, in a large organization that may take time to become effective; hence, DS-MLR attempts to grant itself Receive As permissions when starting the service and then, it will use its privileges whenever backing up a set configured with an account (backup set credentials) that is member of Domain Admins. Other sets will use whatever accounts they are configured with. Having said that, there are 3 distinct scenarios for exactly what credentials are used: 1. DS-MLR is installed under a non-domain user. In this case, DS-MLR will be able to back up one or more mailboxes, depending on the privileges of the user (which should be a domain user)
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
whose credentials are specified when creating the backup set. If the user is configured (on the Exchange Server) to have Receive As privileges on multiple or all mailboxes, DS-Client/DS-MLR will be able to back up those mailboxes. 2. DS-MLR is installed under a domain user, which is not Domain Admin. This is similar to the previous case: DS-Client/DS-MLR will be able to back up those mailboxes that the user (whose credentials are used for the set) has privileges to. 3. DS-MLR is installed under a Domain Admin user In this case, if the backup set is configured with a non Domain Admin user's credentials, DS-MLR will only allow access to those mailboxes that the user has rights to (as configured on the Exchange Server). If the set is configured with a Domain Admin users's credentials, DS-MLR will use its own service account privileges (which should have Receive As permissions on all mailboxes, that were configured at service start-up).
By default, the name of the Journal database is Notebook.nsf (in versions prior to Lotus 8.5 the name was journal.nsf). If the name is different from the default name (for example: Myjournal.nsf), then you must add the following line to the notes.ini, which is located under Lotus\Notes:
JOURNAL=Myjournal.nsf.
The following are known limitations of the Lotus API that directly affect the performance of the DS-MLR: E-Mails received in the Lotus Notes / Domino Server inbox that were created by other E-Mail applications (e.g. Microsoft Outlook, python script, etc.) are not stored in the native Lotus format. Since DS-MLR uses the Lotus API for backup / restore of the Lotus Notes / Domino Server, any backups of these types of E-Mails may lose significant amounts of content (like attachments) and / or formatting. (E-Mails created in Lotus are not affected.) Memory is not released by the dsmlr.exe application when backing up Lotus E-Mails. This is a direct result of the Lotus API, which does not release all the memory used and causes the dsmlr.exe memory usage to increase over time (especially in high data traffic environments). The only workaround is to monitor usage and periodically stop and restart the DS-MLR service.
IMPORTANT: These keys are set in the registry of the computer where the DS-MLR is installed. Some keys are not installed by default and can only be manually added. Since DS-MLR does not have a GUI interface, the following table lists the possible keys, values and effect.
Registry key Name LastRunningDSMLR LotusDomino NotesIniPath NovellUser NovellPsw GWIPAddress GWPort GWTAppKey LogConfiguration SkipUnread Type String Binary String String String String String String String Dword Backup Set All Lotus Lotus GroupWise GroupWise GroupWise GroupWise GroupWise All GroupWise Installed Default Description by default Value Yes Yes Yes Yes Yes Yes Yes Yes No No 0 1677 The version of the last dsmlr.exe that ran on the local computer. The password for Lotus Domino. The path of notes.ini file. The Novell user name. The Novell user password. The GroupWise server address. The port number of GroupWise POA. The Trusted Application Key of GroupWise Domain. The path to the logconf_mlr.cfg file. If this value is not 0, all unread message will be skipped during backup. In the event of a failure to save the attachment of an E-Mail, DS-MLR will continue backup of this E-Mail and report a warning. Otherwise, DS-MLR will not be able to backup this E-Mail. This value is the number of seconds before release of the main session. 0 means do not try to release the main session. If this value is 0, DS-MLR will not try to use MAPI. If this value is 0, DS-MLR will try to use CDO first. When using MAPI to save an E-Mail with thousands of recipients, MAPI may hang. If you add this value, it will avoid this situation. If the length of from / to address exceeds this limit, DS-MLR will not try to use MAPI. -1 means no limit. This is the wait time (in seconds) when trying to create a MAPI profile. This is the wait time (in seconds) before killing a non-responding thread. Maximum number of logs DS-MLR keeps for each thread. If this value is 1, DS-MLR will create a new EMail ID for duplicated items.
GWSkipAttachment
Dword
GroupWise
No
No No No
0 1 1
ExchangeMapiAddressMaxLength
Dword
Exchange
No
-1
No No No No
20 0 100 0
1.
MS Outlook
This is due to a Microsoft bug that only occurs for the following:
2. German Windows 2003, and Outlook 2003 with a .PST file configured on a remote mapped drive, and Backup of Outlook E-Mail messages using DS-MLR. Solution / Workaround Instead of using a mapped drive (e.g. F:) for the .pst file, use a UNC path (a path in the form \server\share\directories\filename.pst). The DS-MLR service logon account must have full rights to the UNC path. Question / Problem Can I backup an Outlook PST file that is open? Explanation Only if DS-MLR / Outlook are installed on Windows 2003 and if the current logged on user is the same user as the DS-MLR service account. If DS-MLR / Outlook are installed on Windows Vista (or newer Operating Systems) the backup is only successful if Outlook is closed. Solution / Workaround N/A Question / Problem Can I backup an Outlook profile that is connecting to an Exchange mailbox? Explanation There are two kinds of MS Outlook profiles: Exchange and Internet. Solution / Workaround For Internet Profiles, the E-Mails are downloaded from the E-Mail server (Exchange, etc.) and stored in the local PST file. DS-MLR can read those E-Mails. For Exchange profiles, the E-Mails are sitting on the Exchange server. To access those E-Mails, the DSMLR service account needs the Receive As privilege on that Exchange server. Otherwise, DS-MLR will return an access denied error. Question / Problem I have more than one Personal Folder (PST file) in my Outlook Mailbox, but only one of them gets backed up. Explanation MS Outlook allows its Mail users to add multiple Personal Folders to their account (pointing to different PST files). However, if the name of the folder is the same, this duplication is not recognized by the DS-MLR. In these cases, only the first folder that is backed up will continue to be backed up. Solution / Workaround This is only an issue if the mailbox user has two or more PST files with the same name (e.g. both are called Personal Folder). MS Outlook recognizes these as different folders even though they have a duplicate name because they point to different PST files. The workaround is to rename the duplicate folder(s), so each has a unique name (for example Personal Folder 2, Personal Folder 3, Personal Folder n).
3.
4.
5.
6.
Question / Problem An MS Outlook backup fails with the message: "The Microsoft Exchange Server computer is not available. Either there are network problems or the Microsoft Exchange Server computer is down for maintenance." Explanation If you confirm the Exchange Server is running properly, and that there are no network problems, this may be a problem with your MS Outlook profile configuration. There are two kinds of MS Outlook profiles: Exchange and Internet. For Exchange profiles, MS Outlook must supply the correct username and password for the desired mailbox. This problem may occur if the DS-MLR computer is not in the same domain as the Exchange server and/or the DS-MLR service account is not a Domain Admin for the Exchange servers domain. Solution / Workaround Save the username and password of the mailbox in Outlook with the option Remember my password. NOTE: Using DS-MLR to back up an MS Outlook Exchange profile is not recommended. In such a situation, it is better to install DS-MLR on the Exchange Server itself. Then, you can use DS-MLR to backup any of the Exchange mailboxes.
See Also
E-Mail Messages (DS-Recovery Tools) on page 141 DS-MLR Installation & Setup on page 434
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
NOTE: The DS-MLR Service is bundled with the DS-Recovery Tools installation. This article gives comparisons for when you might protect a Microsoft Exchange Server with an Exchange Server database backup set, with DS-MLR (message level restore), or with both.
MS Outlook
See Also
Backup / Restore of Microsoft Exchange Server on page 553 Backup / Restore of E-Mails (using DS-MLR) on page 599
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article covers the following System i Server issues: Unix DS-Client issues on page 610 DS-Client performance considerations on page 610 Backing Up and Restoring Private Authorities on page 610 Configuring the System i Server on page 611 Services Required on the System i Server on page 611 System i Server Backup Checklist on page 612 System i Server Disaster Recovery on page 612 Known System i Server backup issues: on page 613 Known System i Server restore issues: on page 614
2. In order to exchange data between a System i Server and the DS-Client, the folder DSBUFFER and one or more subfolders must be created in the "root" IFS system. To create these folders from the command prompt, type the following command(s):
===> MD DIR('/DSBUFFER') ===> MD DIR('/DSBUFFER/folder_name')
3. Create two libraries on the System i Server: LIBIN and LIBOUT. These are the locations where DS-Client creates the save files (the System i Server equivalent of a database dump file). To create these libraries you can use the following commands:
===> CRTLIB LIB(LIBIN) ===> CRTLIB LIB(LIBOUT)
The LIBIN and LIBOUT libraries are used as a buffer to transfer save files from or to the System i Server. In addition, these libraries could be used by the System i Server administrator to locate a save file for a manual restore (in case the "Restore only dump file" option is checked, or on unsuccessful completion of a restore process). 4. [Windows DS-Clients only] Install iSeries Access for Windows on the DS-Client computer using the following installation program:
\\<System i Server>\QIBM\ProdData\Access\Windows\Install\Image\Setup.exe
Refer to your iSeries Access for Windows documentation for further instructions. 5. DSBUFFER share: In order to create and execute backup sets, the DSBUFFER folder must be shared (with read/write permissions). You can manage the DSBUFFER share in the iSeries Navigator or System i Server Operations Navigator. 6. Firewall: If there is a firewall between the DS-Client computer and the System i Server to backup, the ports 139, 449 as well as the ports between 4400 and 4407 must be opened.
Restore the user profiles Restore the configuration 5. Once the System i Servers operating system and system info are restored, you may restore the user data using Asigra Cloud Backup. Once user data is restored, you must restore authority. (See Known System i Server restore issues: on page 614.)
2.
3.
4.
5.
6.
To restore all user profiles with USRPRF(*ALL), all other operations on the system must be stopped. Since DS-Client cannot connect when the system is in restricted state, the DS-Client cannot restore with the *ALL option, therefore the DS-Client restores all user profiles from online individually (one by one). If you need to restore using USRPRF(*ALL) or RSTAUT, you must restore the dump file first, and then restore the user profiles manually from the SAVF that was delivered by the dump file restore process. The RSTUSRPRF(*ALL) command is normally used after the restore of the operating system, but before the user libraries are restored. The user profiles must be restored before any libraries or objects belonging to them can be restored. After the libraries and their objects are restored, the authority for the objects is restored to the user profiles using the RSTAUT command. Refer to your System i documentation for more information on restoring the system. By default, a restore of a user profile will make the following changes to the user profiles attributes: - Group Profile (GRPPRF) value is set to *NONE - Owner of new object (OWNER) value is set to *USRPRF - Group authority (GRPAUT) value is set to *NONE - Password is set to *NONE
This means the message "CPF1118: No password associated with user ABC" is generated if the user attempts to sign without initializing the password. 2. The contents of the queues are empty (e.g. there are no spool files or jobs waiting for execution). 3. IBM Supplied Libraries: As a security measure, when restoring IBM User Libraries and/or IBM System Libraries, the DS-Client only restores the dump file *SAVF. Then, the System i Operator may put the server into Restricted State and can complete the restore process using normal System i OS restore commands (via the main console). You cannot restore IBM Supplied Libraries as a whole. However, you can restore individual objects through a Restricted State restore (as described above).
4. While restoring *DTAQ object(s) through DS-Client into System i servers, the operator must be aware that *DTAQ objects cannot be restored over an existing one (of the same name). If this occurs, DS-Client will encounter System i error CPF3756 and possibly CPD2415 and CPF3770. In order to continue restoring the *DTAQ objects, the existing *DTAQ(s) need to be manually deleted. The alternative is to restore the data queue object(s) to another library. 5. While restoring *PVTAUT the object must have being backed up with Private Authorities. If this is not the case, DS-Client will encounter System i error CPF3780 (file for library &1 not found) and CPD37BB (Objects from save file &1 in LIBOUT not restored). CPF3780 - The data in the save file or on the tape, diskette or optical volume did not match the specified parameters. CPD37BB - You specified *YES for the private authorities (PVTAUT) parameter. Objects in save file &1 in library &2 were saved without their private authorities.
See Also
System i Server Backup on page 147
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
Windows DS-Client can perform Virtual-Machine-level backup and restore of VMware servers. This only works for VMware ESX servers.
Prerequisites
DS-Client is using the VMware Consolidated Backup (VCB) to backup and restore virtual machines on VMware ESX servers with two custom-made applications (vcbBrowse.exe & VCBRun.exe). VCB can be downloaded from the VMware site. VCB needs the Microsoft .NET Framework 2.0 to be installed on the DS-Client machine. After installing VCB, create a directory on the local hard disk and copy the following files into that location: vcbBrowse.exe - This file is a program which helps you to select the virtual machines you would like to backup and will create the xml file needed by the VCBRun.exe program. VCBRun.exe - This file is an application that uses VCB to backup virtual machines. VimService.dll VimService.XmlSerializers.dll Note: These files can be found on the installation DVD or you can request them from your Service Provider.
2. Select the VCB destination directory where the virtual machines files will be exported along with some parameters: Monolithic file (which is off by default). If set, the disk will be exported into a single (monolithic) file. Flat disk (which is off by default). If set, the disk is exported as a "flat" disk with no optimizations. Transport: This is the method DS-Client connects to the storage where the Virtual Machines reside. By default, the selection is Network, which covers most scenarios. (If the VMs reside on a Storage Area Network, you can select SAN, which may improve access speed.) 3. Select the virtual machines which you wish to backup. 4. Press the Generate XML button to create the xml file and specify the name of the file. The file should be created into the same directory where the vcbrun.exe program exists. 5. Create a File System backup set for the VCB destination directory using the full UNC name (not My Computer).
6. In the New Backup Set Wizards Set Properties Options Tab, click Pre/Post and configure the following Pre/Post commands to run:
You can specify the following parameters for vcbrun.exe: -pre: use pre processing (mount vms) -post: use post processing (unmount vms) Note: One of -pre or -post is a mandatory parameter. -xml <name>: specify the name of the xml file. Default is "vcbrun.xml" if no <name> is typed. -log: enable a log for troubleshooting (named vcblog.txt). By default it will be put in C:\WINDOWS\system32.
Note:
5. To restore to an alternate location you must edit the catalog file for every virtual machine you want to restore. More details are specified in the "Virtual Machine Backup Guide" document from the VMware site.
See Also
VMware Backup (LINUX DS-Client) on page 154 Backup / Restore of VMware (at Virtual Machine-level) on page 620
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
Linux DS-Client can perform Virtual-Machine-level backup and restore from VMware ESX servers. This only works for VMware ESX servers.
General Requirements
The user who performs VMware ESX server backup / restore should have knowledge about the VMware ESX server infrastructure.
See Also
VMware Backup (LINUX DS-Client) on page 154 Backup / Restore of Virtual Machines using Windows DS-Client and VCB on page 616 VMware Considerations on page 623
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
Asigra Cloud Backup can backup and restore VMware Servers at file-level (inside Virtual Machine itself, like a regular file server backup) or at Virtual Machine-level (as a snapshot of the Virtual Machine as it is at the time of the backup). Both backup and restore are agentless, meaning one DS-Client installation can perform the tasks, as long as it can access the target backup item(s).
File-level backup
Backup of Virtual Machines at file-level is done by DS-Clients using 3rd party APIs by accessing the Virtual Machines file system using a valid IP address / computer name and valid network access credentials with sufficient permissions to perform the backup. Using this type of backup, DS-Client does not distinguish the machine as being a Virtual Machine or a physical machine.
See Also
VMware Backup (LINUX DS-Client) on page 154 Backup / Restore of Virtual Machines using Windows DS-Client and VCB on page 616 VMware Considerations on page 623
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
VMware Considerations
Creation Date: March 27, 2008 Revision Date: November 14, 2008 Product: DS-Client (Linux)
Summary
This article describes various VMware backup and restore considerations. It should be read before performing backups of VMware servers. Alternate Location Restore on page 623 Backup of Virtual Machines uses snapshots on page 623 Virtual Machines with the same name on page 624 Backup of Virtual Machines running on VMware Clusters on page 624
To summarize: When connecting to ESX through the Virtual Center, the alternate restore path must be:
data center\vm\folder-name
When connecting directly to the ESX Host, the alternate location restore path must be:
datacenter\vm\vm-name
Trying to restore into a path that is not valid will result in SOAP errors during the restore. When restoring to alternate locations, always make sure that the path in the "Truncate" area is a valid path for Virtual Machines. In addition, you should not change the Virtual Machine name when performing alternate restores. Attempting to change the name will restore all the files to the VMware server, however the registration of the virtual machine will fail (see Virtual Machines with the same name on page 624).
See Also
VMware Backup (LINUX DS-Client) on page 154 Backup / Restore of Virtual Machines using Windows DS-Client and VCB on page 616
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
Linux DS-Client can perform Virtual-Machine-level backup and restore from XenServers.
Backup
The following backup issues must be considered: Linux DS-Client supports backup of: shut down Virtual Machines (XenServer 5.0 and up) running Virtual Machines (for XenServer 5.5 and up if using the snapshot feature) snapshots
- Custom Templates Linux DS-Client does not support backup of: Default XenServer Templates - XenServer's "Domain 0" Note: Custom Templates and snapshots on the XenServer are directly backed up. Even if the "Use Snapshots" option is selected, the DS-Client does not attempt to create snapshots of these backup items. The backup wizard can only list Virtual Machines / Custom Templates with unique names. If you have Virtual Machines or Custom Templates with the same name, you must use XenCenter to make all names unique, before a XenServer backup can be performed. Templates are actual Virtual Machines that are pre-configured on the XenServer to allow users to quickly create new Virtual Machines. Default XenServer Templates are supplied with the XenServer. Custom Templates are created by XenServer users.
Note:
Restore
The following restore issues must be considered: Virtual Machines cannot be overwritten during a restore; a new Virtual Machine with the same name will be created Duplicate Virtual Machines can be destroyed through the XenCenter application or through the command-line interface. A Virtual Machine will be created if restoring from a generation of a Virtual Machine that was backed up without the Use Snapshot option. A Custom Template will be created if restoring: from a generation of a Virtual Machine that was backed up with the Use Snapshot option, or a Custom Template, or a snapshot.
See Also
XenServer Backup (LINUX DS-Client) on page 156
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article describes the Microsoft SharePoint 2007 items that can be backed up and restored. It also describes how to configure a DS-Recovery Tools installation to log events for a backup activity. SharePoint 2007 Server Support Matrix on page 628 Logging DS-Recovery Tools for SharePoint activities (troubleshooting) on page 630
Windows DS-Client
SharePoint Template
Collaboration Team Site Blank Site Document Workspace Wiki Site Blog Meetings Basic Meeting Workspace Blank Meeting Workspace
Windows DS-Client
Active Support Active Support Active Support Active Support Active Support Active Support Active Support
Windows DS-Client
Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support
Windows DS-Client
Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support Active Support
Matrix Legend:
Active Support: DS-Client supports backup / restore of this SharePoint item. Not Supported: DS-Client does not support backup / restore of this item.
Note:
This sample logconf.cfg will dump all the debug information from the DS-Recovery Tools service to the evlog.txt file.
If you configure the DS-Recovery Tools service to dump a debug log, this will create a very large text file. Note there will be a significant performance impact if you do this. This feature is available for troubleshooting purposes in order to assist your Service Providers Technical Support Team.
See Also
MS SharePoint Server (DS-Recovery Tools) on page 153
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article covers various backup/restore issues for the Lotus Domino Server backup sets. DS-Client Requirements The following requirements must be met in order to perform online backup / restore of a Lotus Domino Server Database. 1. Lotus Notes (client) must be installed on the DS-Client computer. It must be configured with Connect to Domino Server with Administrator privileges. This allows DS-Client to backup all the mailboxes from the Lotus Domino Server. 2. For each Lotus Domino Server Database you want to backup, you will need the following files:
A text file containing settings for the separate, corresponding user.id file. This file can be found in the Lotus Notes (client) installation location on the DS-Client computer. You must make sure this files KeyFileName parameter references the exact current location of the corresponding user.id file (as seen from the DSClient computer). This file is required for the Database Credentials when creating a Lotus Domino Server backup set. A binary file from the Lotus Domino Administrator (generated from the Lotus Domino Administrator machine). This user.id file must belong to a Lotus Domino Administrator or user with Administrators rights.
notes.ini
user.id
Restore
Restore to Alternate Location is not supported for Lotus Domino Server Database backup sets.
See Also
Lotus Domino Server Database Backup (Windows DS-Client) on page 158 Restore Lotus Domino Server Database Backups on page 249
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article covers various backup/restore issues for the Sybase backup sets.
Restore
You can restore any backed up Sybase database into any existing Sybase database. This will overwrite all data in the existing database.
Database size issues: When you create a new database specifically for restore purposes, you must allocate at least as much space as was allocated in the original (source) database. Database loading issues: You cannot load a dump that was made on a different platform or with a different version of Sybase server. If the database you are loading includes tables that contain the Primary Keys for tables in other databases, you must load the dump into a database with the same name as the source database. It is recommended that for the duration of the database load, you put the database into single_user mode to prevent other users from making changes to the database.
See Also
Sybase Database Backup (LINUX DS-Client) on page 159 Restore Sybase Database Backups on page 250
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article covers various backup/restore issues for the Oracle-SBT backup sets. SBT refers to the Oracle System Backup to Tape functionality. The Oracle-SBT backup set is a special configuration of DS-Client that allows a native Oracle-SBT process to be re-directed through DSClient to DS-System (instead of to tape). The main advantage of this backup set type is to combine the native backup process speed (Oracle RMAN) with the DS-Clients incremental forever technology. IMPORTANT: This backup set type requires manual command input from the Oracle Server itself. All backup and restore commands must be initiated from the Oracle Server side (either through RMAN command-line or through Oracle Enterprise Manager. Only Oracle Database Administrators should attempt to use this backup set type. Additional documentation is available from the DS-Client installation DVD in the folder:
\Tools\Oracle_SBT_Library
Troubleshooting
Error The following error message may appear in the DS-Client Event Log when you restore from an Oracle-SBT backup set:
SBT restore cancelled: Remote side stopped the restore of this file before all data was transmitted.
Reason This error is normal, the RMAN restore successfully completed and the restored file is good. This error may happen when you perform a tablespace restore. Because the restore is performed by RMAN, RMAN will read the backed up backupset and determine which tablespace needs to be restored. If the backupset contains the same named tablespace, you will not see this error. If the backupset contains any different tablespaces, you will see this error (i.e. if you are performing a selective restore of less than all the tablespaces in the backupset). Example: You restore a tablespace from a whole database backupset, RMAN will read the backupset and restore only the tablespace you need. After the tablespace is restored, the SBT channel is released and RMAN stops. However, DS-Client still expects RMAN to continue sending the whole database in the backupset. This causes the above error in the DS-Client Event Log.
See Also
Oracle-SBT Backup (LINUX DS-Client) on page 164
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article covers various backup and restore issues for the VMware VADP backup sets. DS-Client Requirements for VMware VADP backup / restore on page 635 Backup Limitations on page 635 Backup of VMware VADP backup sets using CBT (Changed Block Tracking) on page 635 Backup / Restore of VM in a cluster on page 636 Backup of Fault Tolerant Virtual Machines on page 636 Restore to Alternate Location (different VMware DataCenter connected to different vCenter server) on page 636 Best practice: Conflicting activities on Virtual Machines on page 636 TROUBLESHOOTING: Backup of a migrated VM using the CBT feature gets file fault error on page 637
Backup Limitations
You cannot backup virtual machines that have Fault Tolerance turned on. See Backup of Fault Tolerant Virtual Machines on page 636. You cannot backup Virtual Machines with physical or virtual Raw Disk Mapping (RDM) devices.
Backup of VMware VADP backup sets using CBT (Changed Block Tracking)
DS-Client can use CBT (Changed Block Tracking) for VMware VADP backup sets. If enabled, DSClient attempts to reconfigure the Virtual Machine to allow tracking of the blocks of data that have changed. This option can improve the speed of incremental backup activities, but may also slow down the VM since it consumes additional resources. When CBT is enabled, the first backup activity will scan the Virtual Machine. For thick disks, the scan will be of the entire VMs disks. For thin disks, the scan will only cover the space occupied by the disks. Subsequent backup activities will track the changes for the VM files and will only retrieve the blocks of data that have changes. These blocks will be processed for master/delta generations and sent and saved to DS-System and/or Local Storage. If CBT fails to be enabled (even if configured for use in the backup set), DS-Client will continue its incremental backup activities by reading the entire data of the VM disks, processing the data for master/delta generations and sending the backup data to DS-System. Note: As of the Revision Date of this article, the DS-Client cannot perform CBT if the backup set is configured with the Use Buffer option. By default, the New Backup Set Wizard selects the CBT option and disables the Use Buffer option.
Restore to Alternate Location (different VMware DataCenter connected to different vCenter server)
DS-Client must have network access to the vCenter and all involved ESX host(s).
TROUBLESHOOTING: Backup of a migrated VM using the CBT feature gets file fault error
Error A known issue for VMware VADP backup sets using the CBT feature occurs in a very specific scenario where an incorrectly configured VM is backed up. The following steps describe the situation when this error occurs: Migrate a VM using vCenter. Backup the migrated VM with a VMware VADP backup set using the CBT feature. When you backup, the following error appears:
"Error opening file disk2000.vmdk for reading QueryChangedDiskAreas: SOAP 1.1 fault: "":ServerFaultCode [no subcode] "Error caused by file /vmfs/ volumes/4ac65eb0-8b20da10-c550-0030483062fe/rhel61thin-test/rhel61thintest.vmdk" Detail: <FileFaultFault xmlns="urn:vim25" xsi:type="FileFault"><file>/vmfs/volumes/4ac65eb0-8b20da10-c5500030483062fe/rhel61thin-test/rhel61thin-test.vmdk</file></FileFaultFault> (rhel61thin-test) (VMware VADP\10.20.30.111\\DataCenter\Test\rhel61thintest\disk2000.vmdk)."
Reason This is because after migration, even though the VM has a property setting of CTKenabled=true, it has not been properly reconfigured by the vCenter. If this error occurs, it means the VM has a configuration problem and probably should not be used. If this error occurs you must fix the VM with the fix described below. Fix (after the file fault error is encountered) One possible fix is to make a modification that triggers vCenter to run a re-configuration cycle on the VM. This can be done by performing the following steps: 1. Power off the target VM. 2. Using vCenter, select the VM and choose Edit Settings. The Virtual Machine Properties screen appears. 3. Select the Virtual Disk. On the right side of the Virtual Disk Configuration panel, there is a Mode section with an Independent check box. Select the Independent checkbox and click OK. 4. Select the VM again and choose Edit Settings. The Virtual Machine Properties screen appears. In the Mode section, uncheck the Independent checkbox and click OK. 5. The vCenter should perform a re-configuration of this VM (this may take a few minutes). Once re-configuration is finished, power on the VM. You should now be able to backup the VM with the Use CBT feature. Suggested Best Practice (to prevent the file fault error) Whenever you migrate a VM using vCenter, always perform the steps in the Fix (above) that will trigger vCenter to run a re-configuration cycle on the VM.
See Also
VMware VADP Backup (LINUX DS-Client) on page 166
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article covers various backup / restore issues for Microsoft SQL Server backups (using the VSS-aware backup set type). MASTER database does not support Differential backup (VSS-aware sets) on page 638 Database Backup Policy (VSS-aware sets) on page 638 Data integration issues on page 639 Alternate Restore Location Issues for Pure Files on page 639
(*) A full dump is needed (other than first time) when: a database has been backed up by another backup set (or manually from the SQL tools); a database has been restored (either from another database or an earlier generation); the database properties have been modified (recovery model switched to simple); a set number of consecutive differential backups have been performed, unless over-ruled with the Do not start full dump option. This uses the same number set in the DS-Client Advanced Configurations MasterGenerations parameter (note: this parameter is also used for another purpose).
Note:
The DS-Client can only take advantage of the differential backup policy if the backup set (of the SQL database) is the only process that backs up that target. If another backup set is used to backup the database (or the internal SQL commands are used to perform manual backups / dumps), then the backup policy requires the next backup to be a full dump.
Database Backup Policy Full Backup Schedule Over-ride Rules: These rules are optional. They allow greater control over when a Full Backup can occur (e.g. not during business hours). Warning: Full dumps can be delayed, but a full database dump needs to be performed at some regular frequency to protect the integrity of the database backup. By default, DS-Client allows a full backup to be skipped a maximum of 120 consecutive times. This number is configurable in the DS-Client Advanced Configuration options MaxNonFullDumps parameter (see: DSClient Advanced Configurations on page 458). For more information about Database Backup Policy options, see Advantages and Disadvantages of different DB backup policies on page 563 in the Knowledge Base article Backup / Restore of Microsoft SQL Server (ALL VERSIONS) on page 560.
See Also
VSS-aware backup sets on page 161
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article covers various backup / restore issues for Microsoft Exchange Server backups (using the VSS-aware backup set type). Database Backup Policy (VSS-aware sets) on page 640 Data integration issues on page 641 Truncate Transaction Log behavior with VSS-aware backup sets on page 641 Restore Issues on page 642 Exchange 2007 VSS backup set: File Restore to Recovery Storage Group (RSG) on page 642 Exchange 2010 VSS backup set: File Restore to Recovery Database (RDB) on page 642
Full dump: Always Full dump: Plus Differential Full dump: Plus Incremental
(*) A full dump is needed (other than first time) when: a database has been backed up by another backup set (or manually from the Exchange tools); a database has been restored (either from another database or an earlier generation); the database properties have been modified (recovery model switched to simple); a set number of consecutive differential backups have been performed, unless over-ruled with the Do not start full dump option. This uses the same number set in the DS-Client Advanced Configurations MasterGenerations parameter (note: this parameter is also used for another purpose).
Note:
The DS-Client can only take advantage of the differential backup policy if the backup set (of the Exchange database) is the only process that backs up that target. If another backup set is used to backup the database (or the internal Exchange commands are used to perform manual backups / dumps), then the backup policy requires the next backup to be a full dump.
Generated on: 10/15/12 Page: 640
Confidential.
Database Backup Policy Full Backup Schedule Over-ride Rules: These rules are optional. They allow greater control over when a Full Backup can occur (e.g. not during business hours). Warning: Full dumps can be delayed, but a full database dump needs to be performed at some regular frequency to protect the integrity of the database backup. By default, DS-Client allows a full backup to be skipped a maximum of 120 consecutive times. This number is configurable in the DS-Client Advanced Configuration options MaxNonFullDumps parameter (see: DSClient Advanced Configurations on page 458). For more information about Database Backup Policy options, see Advantages and Disadvantages of different DB backup policies on page 563 in the Knowledge Base article Backup / Restore of Microsoft SQL Server (ALL VERSIONS) on page 560.
Restore Issues
The DS-Client can only restore an MS Exchange Mailbox Database if the destination database for the restore is in mounted state. DS-Client performs the following steps during a restore of a VSS-aware Microsoft Exchange Server: 1. Check if the destination DB for restore is in mounted state. 2. Retrieve information from the mounted DB, including physical path and DB GUID. 3. Dismounts the database. 4. If restoring to the original location: Replace the DB files in the physical location. If restoring to an alternate location: Restore logs to a "restoredlogs" folder, then restore the Exchange DB files to the physical location. VSS Writers will apply the logs from the restoredlogs folder and then the directory will be removed. 5. Mount the MS Exchange Database.
Exchange 2007 VSS backup set: File Restore to Recovery Storage Group (RSG)
A direct VSS restore to an Exchange 2007 RSG is not supported. However, you can use the File Restore method to restore the backup files, then manually load those files to the RSG. 1. You must restore the Exchange files before creating the RSG. DS-User > Restore Now: In the Restore Wizard click the File Restore button. For each database you want to restore, select the entire backup folder (including all log files). Restore to the original or alternate location, as required. 2. When you create the RSG, specify the location where you have restored the database and log files. 3. Before mounting the database, run the eseutil in the database directory, which will reset the database to a clean shutdown state. For example:
eseutil /r e00 /i /d
Exchange 2010 VSS backup set: File Restore to Recovery Database (RDB)
A direct VSS restore to an Exchange 2010 RDB is not supported. However, you can use the File Restore method to restore the backup files, then manually load those files to the RDB. 1. You must restore the Exchange files before creating the RDB. DS-User > Restore Now: In the Restore Wizard click the File Restore button. For each database you want to restore, select the entire backup folder (including all log files). Restore to the original or alternate location, as required. 2. When you create the RDB, specify the restored database name. 3. Before mounting the database, run the eseutil in the database directory, which will reset the database to a clean shutdown state. For example:
eseutil /r e00 /i /d
4. Now you can mount your RDB. Note: Only one RDB can be mounted at a time. If you try to mount more than one, you will get an error.
See Also
VSS-aware backup sets on page 161
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article covers various backup / restore issues for Microsoft Hyper-V backups (using the VSSaware backup set type). The DS-Client software allows you to perform on-line backups of Hyper-V Virtual Machines (VM). The DS-Client supports backup and restore of the following virtualized environments: Microsoft Hyper-V Server 2008 R2 Windows Server 2008 R2 with Hyper-V role. This article contains information in the following sections: Features Supported on page 644 Requirements for backup / restore support of Hyper-V VMs on page 644 Backup Policy on page 645 Restore policy on page 646 Data integration issues on page 647 Cluster Hyper-V backup requirements on page 648 Hyper-V Cluster issues on page 648
Features Supported
Features VSS-aware backup set (using Microsoft VSS writers) Microsoft Windows Server 2008 R2 with Hyper-V role + Operating System + + + + + + +
Online backup (of Hyper-V Server and at individual virtual + machine level) Hyper-V Server browsing Alternate Server restore (VSS Restore) Alternate Individual VM restore (VSS Restore) Alternate restore as pure files (File System restore) Visualize VSS Component details at virtual machine level during restore (VSS Component) + + + + +
Backup Policy
The Asigra Cloud Backup solution is based on Microsoft Hyper-V VSS Writer for both backup and restore. The backup unit is the Hyper-V VM (not individual files within the VM). A Hyper-V VM is a group of files governed with strong data integration. The backup mechanism is called the "Saved State" method, where the VM is put into a saved state during the snapshot process. Snapshots are taken of the appropriate volumes, and the VM is returned to the previous state after the snapshot process is done. The GUID of Hyper-V VM is the identifier for the Hyper-V VM. This means, the GUID of Hyper-V VM is considered as the file name of the VM. The name of the VM may be saved as a description of the VM (note that the VM name may not be unique for all VMs in a Host). Hyper-V WMI APIs are used to search for the VMs in a host server. This is needed when creating a Hyper-V backup set, allowing users to browse for VMs to back up. Users can also select all VMs to be backed up. VSS provides a consistent interface that allows online backup of a Microsoft Hyper-V VM. VSS-related metadata is saved with the backup data to provide the rules for data integration in each backed up component (VM). Master / Delta and library files are supported for this type of backup set.
Restore policy
For Restore, two models are supported by the Asigra Cloud Backup application: VM-level restore Restore as files VM-level restore VM-level restore uses the Hyper-V VSS Writer to restore the whole VM and maintain data integration. For VM-level restore, the restore unit is a VM. All files (a snapshot at a particular moment) involved in the VM are provided based on the saved Metadata. Exactly one generation (or session) can be selected for restore. Restore as files Restore as files does not guarantee data integration. This method restores the selected individual files the same way as for a File System backup set. End-users (customers) are responsible for the result of the restore. This option is suitable for scenarios where VM-level restore is not possible (e.g. alternate restore, if some files are corrupted so that VM-level restore is not possible, etc.) or not necessary (usually for advanced users that understand Hyper-V very well and can manually manage the restored files, or the files are restored for other purposes than as part of a VM). Before performing an alternate restore, make sure that on the target machine there is no virtual machine with the same GUID (see Backup Policy above). If this is the case, the existing VM will be overwritten. For alternate restores, if you would like to change the path for the VM files you must use the "Restore Option File" option and specify the vssrestore.xml file. You can rename the .xml file as you wish ("vssrestore" is a generic name). The .xml file should be created under the DS-Client installation path. Sample .xml file:
<?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE vss-restore SYSTEM "asigra_vss.dtd"> <vss-restore version="1.0"> <component logical-path="" component-name="D558DE24-956E-4E398C639F969FAB8097.VM (VmEx4)"> <file-restore-option original="d:\VMS\" target="d:\VMS_RESTORE\"/> </component> </vss-restore>
DS-Client and DS-System use the combination of File ID / Generation ID to identify the backed up component generation. BLM uses the full path and backup time to identify the backed up component generation. A component (VM) is represented by the component data integration metadata. Retention, delete, BLM request and Disc/Tape request work at the component-level. Validation works at the level of the individual backed up files.
Component Restore Restore works both at the component-level (VM) and individual file level. This is selectable from the DS-User GUI. A component generation is considered complete if all its referenced contents exist. Otherwise it is considered an incomplete component by the DS-Client. A file that is not referenced by a complete component generation is called an unreferenced file. Incomplete Components Incomplete component generations are allowed in order to permit individual file restore from incomplete components. Files that are backed up in an incomplete component generation could be referenced by later generations of the same component (thereby avoiding rebackup of the unchanged file again). In the DS-Clients Retention Rules, options are provided to Delete incomplete components and Delete unreferenced files. Incomplete component generations are not visible in the restore tree for VMlevel restore. The component data integration metadata are backed up as separate files with the Hyper-V backup, and will be backed up the same way as data file (except that it is not encrypted). This is because the metadata will be parsed by DS-System / BLM / etc., without knowing the encryption keys.
DS-Client will save the component data integration metadata in its database. Metadata is required by activities like restore / delete / retention, etc. Synchronization is responsible for synchronizing them with the corresponding on-line file. BLM and components When a component generation is moved to BLM, all its referenced files (if any exist) must be copied to BLM. When generating a BLM restorable image, if a component generation is included, that images must also include all its referenced files.
Create a VSS-aware backup set and select Microsoft Cluster Hyper-V. Specify the computer using the IP address of the cluster virtual node. (This is configured on the Hyper-V cluster itself.) If you can connect successfully to the specified computer, you will see an additional folder level named <HAVMs>. This contains the Clusters highly available Virtual Machines that can be selected for backup. All other steps are the same as for standalone Hyper-V backup sets.
See Also
VSS-aware backup sets on page 161
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article covers various backup / restore issues for Microsoft SharePoint 2007 backups (using the VSS-aware backup set type). The DS-Client supports backup and restore of the following products: Windows SharePoint Services 3.0 SP2 (Standalone or Farm structure) Microsoft Office SharePoint Server 2007 SP2 (Standalone or Farm structure) This article contains information in the following sections: Features Supported on page 649 Requirements for backup / restore support of SharePoint 2007 on page 650 Backup Policy on page 651 Restore Policy on page 651 Alternate Location Restores on page 651 Post-Restore steps (on the target SharePoint server): on page 653 Required Account Permissions for Running VSS on page 654 TROUBLESHOOTING on page 654
Features Supported
Functionality Server farm, except the configuration and Central Administration databases Configuration and Central Administration databases Web applications Site collections Content databases Databases for Shared Services Providers Search databases for Shared Services Providers Search databases Windows SharePoint Service Search Office SharePoint Server Search DS-Client (VSS-aware Backup / Restore) Yes No (Microsoft does not support this capability) Yes Yes Yes Yes Yes Yes Yes Yes
The Windows SharePoint Services VSS Writer service must be running on one of the SharePoint web servers. The SQL Server VSS Writer service must be running on every MS SQL Server machine in the SharePoint Farm. 5. You must manually document all the configuration settings in Office SharePoint Server in order to be able to correctly re-create the configuration database and the Central Administration content database of a SharePoint Farm. Microsoft (KB article #512815) recommends documenting the following settings:
Application pool settings, including service accounts (all accounts that run as Web applications, including the crawler account and the search account). Alternate access mapping settings. Farm-level search settings. External service connection settings. Workflow management settings. External service connection settings. Workflow management settings. E-mail settings. A-V settings. Usage analysis processing settings. Diagnostic logging settings. Content deployment settings. Timer job settings. HTML viewer settings. Recycle Bin settings and other Web application general settings. Administrator-deployed form templates. Default quota templates.
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
Database names and locations. Web application names and databases. Be sure to document the content database names associated with each Web application. Crawler impact rules. Activated features. Blocked file types.
Backup Policy
The backup set must be created on one of the Web Front End (WFE) servers. DS-Client must be able to resolve the computer name of the MS SQL server. DS-Client must be able to access all MS SQL server databases used by SharePoint. The MS SQL databases used by SharePoint can support differential backup (see the Knowledge Base Article for Microsoft SQL Server Database Backup Policy on page 562). During backup, OSearch and SPSearch will always be backed up using a Full dump.
Restore Policy
1. During a restore, there are two phases: The first phase restores the SharePoint servers MS SQL full dump. The second phase restores the SharePoint servers MS SQL differential backups (if applicable) as well as OSearch and SPSearch. 2. Before restoring a Web Application, any existing Web Application with the same name must be deleted from SharePoint Central Admin. 3. Before restoring OSearch, you must ensure the SharePoint Service provider (SSP), associated databases and index files do not exist in the original location. Do not remove the web application if the SSP is Administration site host for Shared Services. It is not possible to remove the last SSP by using Central Administration. You will need to use the stsadm command:
stsadm -o deletessp -title <SSP name> -deletedatabases -force
4. OSearch must be disabled on the target server. Run the following command to check the status:
stsadm -o osearch -action list
For example: If the original database name is abcd123, then the internal database and log files will likely be abcd123.mdf and abcd123.LDF. If you restore the SharePoint server to an alternate location and rename the database to xyz1234, the internal files will still be abcd123.mdf and abcd123.LDF. Whatever name you want to change the database to, it must already exist in the SharePoint server. This is because the VSS-writers need to be able to link the restored data to the new database name. (In the previous example, this would mean linking the abcd123.mdf and abcd123.LDF files to the xyz1234 database.) 2. Renaming components: Normally, you must restore a VSS-aware SharePoint backup as it was originally backed up (i.e. by allowing the VSS writers on the target machine to perform their restore operations). It is only useful to rename the SQL Server component of a SharePoint server in the following scenarios. Scenario 1: The source database name already exists in the target SharePoint Farm (i.e. it is being used by another database). Restore Steps: 1. Create a new database in the database server of SharePoint Farm. 2. Alternate restore the SharePoint server and rename the database component to the database created in step 1. 3. After the alternate restore is finished, in the SharePoint server application, create a new web application using the restored database. Scenario 2: The target database has a different database name from the source, however it does have the same databaseid and siteid as the source. Restore Steps: 1. Alternate restore the SharePoint server and rename the database to the same name as on the target location (i.e. the database that has the same databaseid and siteid but different database name).
Run "stsadm -o osearch -action list", make sure status is Online. Restore ssp using "stsadm -o restoressp" operation on a WFE and make sure to use the "KeepIndex" parameter. This "hooks up" the SharePoint Service provider (SSP) you restored to the SharePoint Farm". For example:
stsadm -o restoressp -title SharedServices1 -url "http://winsp2:3000" -ssplogin "asigravss\administrator" -ssppassword "P@ssw0rd" -mysiteurl "http://winsp2:3000/MySite" -indexserver winsp1 -indexlocation "C:\Program Files\Microsoft Office Servers\12.0\Data\Office Server\Applications" -keepindex -sspdatabaseserver "winsql2008" -sspdatabasename "SharedServices1_DB" -searchdatabaseserver "winsql2008" -searchdatabasename "SharedServices1_Search_DB"
Restart the SharePoint Service VSS Writer from Administrative Tools > Services. 3. After restoring SPsearch: Restart the Windows SharePoint Services Search service from Administrative Tools > Services.
TROUBLESHOOTING
Problem: After restoring from a SharePoint VSS-aware backup set, you try to create a new web application in the restored SharePoint server (for example, using WSS_Content_1080). When you do, SharePoint returns errors similar to the following:
The attach operation cannot continue because another object in this farm already contains the same ID. ... An object of the type Microsoft.SharePoint.Administration.SPApplicationPool named "SharePoint 1090" already exists under the parent Microsoft.SharePoint.Administration.SPWebService named "". Rename your object or delete the existing object. An update conflict has occurred, and you must re-try this action. The object SPWebApplication Name=Sharepoint -1080 Parent=SPWebService is being updated by <Domain>\<User>, in the OWSTimer process, on machine <Computer>. View the tracing log for more information about the conflict.
Reason: This is a known Microsoft issue. Before any SharePoint database is restored, you must ensure that there is no existing database ID (of the same number). If there is, it must be completely removed from SharePoint (including any shared applications). Solutions: 1. Refer to the Microsoft KB article 939308 (http://support/microsoft.com/kb/939308). This article explains how to clear the file system cache on all servers in the server farm on which the Windows SharePoint services timer service is running.
See Also
VSS-aware backup sets on page 161 Backup / Restore of Microsoft SharePoint 2010 (VSS-aware backup sets) on page 655
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article covers various backup / restore issues for Microsoft SharePoint 2010 backups (using the VSS-aware backup set type). The DS-Client supports backup and restore of the following products: Microsoft SharePoint Foundation 2010 (Standalone or Farm structure) Microsoft SharePoint Server 2010 (Standalone or Farm structure) This article contains information in the following sections: Features Supported on page 655 Requirements for backup / restore support of SharePoint 2010 on page 656 Backup Policy on page 656 Restore Policy on page 656 Alternate Location Restores on page 657 Post-Restore steps (on the target SharePoint server): on page 657 Required Account Permissions for Running VSS on page 658 Item-Level Restore of SharePoint 2010 (SP1 & up) on page 658
Features Supported
Functionality Server farm, except the configuration and Central Administration databases Configuration and Central Administration databases Web applications Site collections Content databases Databases of Search Service Application Search databases Windows SharePoint Service Search Office SharePoint Server Search DS-Client (VSS-aware Backup / Restore) Yes No (Microsoft does not support this capability) Yes No Yes No No No No
3.
The SharePoint 2010 VSS Writer service must be running on one of the SharePoint web servers. The SQL Server VSS Writer service must be running on every MS SQL Server machine in the SharePoint Farm. Microsoft KB article #645391 describes how to use Windows PowerShell 2.0 to document the configuration settings for your SharePoint Farm. Documenting configuration settings is important both so that you can create scripted deployments for your environment and so that you can quickly re-create a set of configurations in the event of a failure.
Backup Policy
The backup set must be created on one of the Web Front End (WFE) servers. DS-Client must be able to resolve the computer name of the MS SQL server. DS-Client must be able to access all MS SQL server databases used by SharePoint. The MS SQL databases used by SharePoint can support differential backup (see the Knowledge Base Article for Microsoft SQL Server Database Backup Policy on page 562).
Restore Policy
1. During a restore, there are two phases: The first phase restores the SharePoint server's MS SQL full dump. The second phase restores the SharePoint server's MS SQL differential backups (if applicable). 2. Before restoring a Web Application to its original location, any existing Web Application with the same name and related Shared Service Application must be deleted from SharePoint Central Admin.
3. In the Select the VSS Restore Method screen, select the Granular Restore option Step 1. Database Restore.
F1 Help: See Select the VSS Restore Method on page 852. Select the Granular Restore option, then choose Step 1. Database Restore. Note: If you are restoring from a BLM Restorable Image or Disc/Tape media, you can only perform Step 1 - the database restore from that media. Step 2 must always be peformed from the database restored in Step 1. 4. Click Next >. In the Select directories/files for restore screen, select the SharePoint database to restore.
F1 Help: See Select directories / files (Restore / BLM / Delete / Validation) on page 826.
5. Click Next >. In the Select database restore location screen, choose where you want to restore the SharePoint 2010 database. This must be to a MS SQL Server.
F1 Help: See Select database restore location screen (SharePoint) on page 826. You can restore to a different SQL instance or select a different SQL server (which does not have to be a SharePoint farm) but this SQL server must be in the same domain as (or a trusted domain of) the target SharePoint server you want to restore to (in Step 2 - Items-Restore). 6. Click Next >. The Restore Now Wizard switches to its Select restore performance options screen. F1 Help: See Select Restore Performance Options (Windows DS-Client) on page 847. These options are intended for large backup sets in high performance environments. In general, you should use the defaults and skip to the next screen. 7. Click Next >. In the Select restore options screen, select the SharePoint database restore options.
8. Click Finish. The restore process begins. Once the SharePoint 2010 database has been restored to a MS SQL server, you can proceed to step 2 (restoring at Item-Level). 9. Browse the Backup Sets tree and highlight the same backup set. Right-click Restore Now. 10. In the Select the VSS Restore Method screen, select the Granular Restore option Step 2. Items Restore.
F1 Help: See Select the VSS Restore Method on page 852. 11. Click Next >. The Select SQL Server screen appears. Select the MS SQL Server where you restored the SharePoint 2010 database.
12. Click Next >. The Select database for restore screen appears. Select the MS SQL database containing the SharePoint 2010 database.
F1 Help: See Select Items for Backup Set screen on page 831. 13. Click Next >. The Select restore location screen appears. You can restore to the original source location or choose an alternate SharePoint server.
F1 Help: See Select restore location screen on page 840. The restore destination you select must be running the DS-Recovery Tools (separate installation required). 14. Click Next >. The Select a Site Collection / Sub-Site screen appears. This selection determines the granularity of the restore. It can be broad (e.g. restore the entire Site or a specific sub-site) or it can be extremely precise (e.g. restoring an individual item
F1 Help: See Select a site collection / sub-site (SharePoint Item-Level) on page 820. In the Site Collection List, you can select the entire site (/), or a specific subsite by highlighting the folder and clicking Add. Your selection appears in the Restore Items section. You can hover the mouse pointer over a folder to see corresponding URLs and source database name. To restore a Full List, highlight the site folder (or sub-folder) containing the list you want and click Add Lists.
F1 Help: See Select a List / Customer List / Document Library (SharePoint Item-Level) on page 820. You can select one, several, or all of the items that appear. Each item is either a List, Customer List, or Document Library containing its own set of items from the SharePoint database.
Click Next >. If you are restoring at the List level, the Restore Wizard jumps to the Select restore options screen. Otherwise, click Finish. To restore a List-Item, highlight the site folder (or sub-folder) containing the list you want and click Add List Items. Select the List, Custom List, or Document Library Containing the item(s) you want and click Next.
F1 Help: See Select SharePoint List Item (SharePoint Item-Level) on page 849. Click on the list item(s) you want to restore (use CTRL + click for multiple items). - Click Finish. 15. When you have finished making your restore selections, click Next >. The Select restore options screen appears.
F1 Help: See Select restore options (SharePoint Item-Level) on page 847. You must supply the Web Application URL and Temporary Export Path. 16. Click Finish. The restore process begins.
See Also
VSS-aware backup sets on page 161 Backup / Restore of Microsoft SharePoint 2007 (VSS-aware backup sets) on page 649
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article describes the backup and restore process for NAS (Network Attached Storage) devices using the NAS, UNIX-SSH, NFS, Local File System backup set type. In order to backup/restore the NAS device, DS-Client utilizes a dedicated API from the NAS vendor. DS-Client uses the API for creating a volume based snapshot on the NAS device for the data selected in the backup set. After creating a snapshot, DS-Client temporarily mounts a NAS share and backs up the data from the snapshot. When the backup is finished, DS-Client unmounts the NAS share and deletes the snapshot. Note: CIFS shares or volumes with NTFS / Mixed security type are not supported.
Note:
3. If the "Ask for credentials" option was selected the "Ask for credentials" windows appears. Provide a valid user name and password and click "OK". 4. By default, the Ask for NAS API credentials box is selected, and you are prompted to supply the NAS API connection credentials.
F1 Help: See Specify Credentials (Linux DS-Client) on page 886. Select the NAS type and the API access protocol. Specify the port for the API connection, API user credentials and a mount point to be used for mounting the NAS share during the backup. You can use an existing mount point or create a new one for a backup purpose. Click "OK". Note: Make sure the specified User has rights to execute the API commands on the NAS device. This usually means the user is a member in the Administrators group. 5. Browse the NAS shares and add data into the "Selected Items for Backup list and then click Next. 6. Follow the next steps as you would for the regular backup set type until the "Specify backup set options" Wizard screen appears. Choose the desired behavior for the "Continue backup on snapshot failure" option: If this option is selected (default), in case of snapshot failure the DS-Client will try to access the data selected in the backup set directly by skipping the snapshot functionality. If this option is un-checked, in case of a snapshot failure DS-Client will stop the backup process. 7. Finish creating the backup set by specifying the rest of the options as you would with a regular file system backup set.
Snapdiff API
Linux DS-Client has the Use Snapdiff API option for (NetApp) NAS backup sets. This will appear if the DS-System is using NetApp storage, and is configured to support the NetApp Snapdiff. If selected, DS-Client will attempt to use the NetApp Snapdiff API to avoid re-scanning the whole NAS volume during an incremental backup. Snapdiff compares the current snapshot with the last snapshot of the target NAS volume and generates the list of new and changed files from that comparison. This can provide significant speed improvements to the backup process, especially on large volumes.
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
The following limitations exist. In all cases where the Snapdiff fails, DS-Client will attempt a full scan of the NAS volume. A previous snapshot must exist in order for the Snapdiff API to work. Snapdiff does not work on the first (baseline) backup. Snapdiff does not work if the current snapshot fails. Snapdiff does not work if any of the backup sets backup items have been changed (since the previous backup).
See also
NAS, UNIX-SSH, NFS, Local File System Backup (LINUX DS-Client) on page 112 Backup / Restore of NAS (Windows DS-Client) on page 669
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article describes the backup and restore process for NAS (Network Attached Storage) devices using the "File System" backup set type. In order to backup/restore the NAS device, DS-Client utilizes a dedicated API from the NAS vendor. DS-Client uses the API for creating a volume based snapshot on the NAS device for the data selected in the backup set. After creating a snapshot, DS-Client temporarily mounts a NAS share and backs up the data from the snapshot. When the backup is finished, DS-Client unmounts the NAS share and deletes the snapshot.
Note:
Currently only CIFS shares of volumes with NTFS security type are supported by Windows DS-Client.
3. The "Enter Network Credentials" windows appears. Provide a valid user name and password for data access on the NAS device and click "OK".
F1 Help: See Enter NAS API Parameters (Windows DS-Client) on page 777. Select the NAS type and the API access protocol. Specify the port for the API connection and API user credentials. Click "OK". Note: Make sure the specified User has rights to execute the API commands on the NAS device. This usually means the user is a member in the Administrators group. 5. Browse the NAS shares and add data into the "Selected Items for Backup list and then click Next. 6. Follow the next steps and finish creating the backup set by specifying the rest of the options as you would with a regular file system backup set.
See also
Backup / Restore of NAS (Linux DS-Client) on page 666
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article contains additional information about the Backup from the Cloud (Salesforce.com) backup set type.
Contact Salesforce about modifying the API limits associated with your account.
Restore Limitations
The DS-Client is using the Salesforce API for backup and restore. There is currently a limitation in the restore process: After backup, if you do restore two (2) times, you will have duplicate items because of the way the API compares the IDs of files to be restored.
See also
Backup from the Cloud (Salesforce.com) on page 167 Restore a Backup from the Cloud (Salesforce.com) Backup Set on page 257 Cloud database upload tool (Salesforce.com) on page 258
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article provides additional information about the Local DS-VDR Tool. When installed and configured with DS-Client, this tool allows creation of Local DS-VDR backup sets that protect a VMware virtual machine by exporting the VM. The latest VM is exported through the vCenter to another host / datastore, which provides a standby VM that is always available for failover (with the same vCenter). Note: A Local DS-VDR backup set does not backup data to DS-System.
You must install the Local DS-VDR Tool on a network computer that can connect to both this DS-Client and the target VMware vCenter. TCP Port 4407 must be open for the Local DS-VDR Tool to connect with the DS-Client.
Machine will be exported on the vCenter. Once this limit is reached, the oldest exported VM is overwritten at the next backup.
See also
Local DS-VDR backup set (VMware VADP) on page 169
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article provides additional information about the Physical-to-Virtual backup set type. This backup set type allows you to backup a physical machine to a VMware virtual machine. Note: A Physical-to-Virtual backup set does not backup data to DS-System.
Physical-to-Virtual Requirements
The following requirements must be met in order to create Physical to Virtual backup sets: 1. Your DS-Client must be configured with the Local DS-VDR Tool feature and be pointing to a running instance of the tool (Local DS-VDR menu > Configure Local DSVDR Tool). 2. You must install the following VMware Plug-in on the Local DS-VDR Tool computer:
VMware vCenter Converter Standalone
This plug-in can be found on the vmware.com Web site. Run the installation and choose the Client-Server installation (advanced) Setup Type. 3. Make sure to export the physical machine to a datastore that has enough space.
Other details
As of the revision date of this article, Physical-to-Virtual conversion is supported for Windows physical machines only. Each Physical machine that is protected will cost one Local DS-VDR license count. The exported vm will be named with a pre-fix 'Local DS-VDR' and the backup timestamp as suffix, in the following format:
Local DS-VDR_physical_machine's_IP_TimeStamp
See also
Physical to Virtual backup set on page 172
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Block-Level Resume
Creation Date: October 17, 2005 Revision Date: February 17, 2010 Product: DS-Client
Summary
If the backup is interrupted (e.g. the connection to DS-System is lost), DS-Client will attempt to reconnect for a specified number of times (DS-User Menu > Configuration > Parameters > Scheduled backups) in order to resume the backup. Block-Level Resume allows the scheduled backup to continue the backup from the last successful file block backed up in the session. The benefit increases with the size of the file being backed up. (For example: without this feature, backup of a large file that is interrupted because of a slow / poor connection would have to restart from the beginning of the file.) Block-Level Resume applies to: Big files (files larger than 100MB). Scheduled backups. For Windows DS-Client: This solution applies to File System backup sets, and to other backup sets that use the DS-Client Buffer (See DS-Client Buffer on page 500.): File System backup sets. Permissions backup sets. SQL backup sets using DS-Client buffer. Exchange backup sets using DS-Client buffer. Oracle backup sets using DS-Client buffer. E-Mail backup sets using DS-Client buffer. System i Server backup sets using DS-Client buffer. For Linux DS-Client: File System backup sets can resume at block-level for the following backup set types: Local File System UNIX-SSH NFS
Note:
When Block-Level Resume does not apply, the resume will occur at file-level.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
Users often want their data to be protected as soon as it is in its final state. This means that scheduling backups weekly (or even daily) may not be sufficient, because data may not be backed up before the machine has a problem. Although hourly backups can provide a more robust backup strategy, they may consume too much system resources because a complete file system scan is required. Word processing or spreadsheet files are some examples of when users would like to have their data protected as soon as it is possible (or after a very small interval of time): once the document is saved to disk, it will be backed up by DS-Client and sent offsite. Continuous Data Protection is a backup solution that continuously monitors the changes on the target server and backs up the changes as soon as they are detected. It differs from the normal point-in-time backup - it is continuous data protection. It also differs from replication or mirroring, which only keep a snapshot of the latest image. Instead, Continuous Data Protection will also keep intermediate changes and be able to recover images from a specific time.
Details
Once a Continuous Data Protection backup is started (on demand or scheduled), the DS-Client continuously monitors the changes happening on the target backup server. As soon as a change happens, DS-Client will immediately backup the changes to the DS-System. DS-Client can also be configured with Local Storage for fast recovery purposes. It is not mandatory to backup a whole server with Continuous Data Protection. Like normal file system backup sets, customers can select specific parts of a server (any combination of share level, directory level, and file level filters). Extended Regular Expressions can be used to define complicated selections. The Retention feature can help you to manage the amount of online generations stored on the DSSystem. For more information, see About Retention Rules on page 85. In case the continuous backup is interrupted for any reason (by demand, hardware / software failure, network problems, target server not available, etc.), in the next backup (including the very first backup), the process will re-initialize and a full scan will be performed from the beginning.
Generic Scanner (UNIX only): Loops the scanning function from regular backup sets. (This can be used if the File Alteration Monitor is not available. This permits CDP of any file data at the expense of a higher I/O load.) MLR E-Mail Monitoring (Windows only): Monitoring included with the DSMLR service installation. 7. Windows DS-Clients can only perform CDP if the target backup machine is supported (Windows NT 4.0 or later). It cannot support servers that are simulated as Windows machines (e.g. using SAMBA to backup a unix machine). 8. CDP with BLM (Infinite Generations) will start Archiving activities as needed. While an archiving activity is in progress, the BLM will deny access to the package that is currently open for activities like Browse, Create Restorable Image, Retention, etc. The DS-System will stop the current archiving activity after 5 minutes of inactivity, and restart a new one if needed. 9. The Process Window for CDP backup sets always shows the current data transfer rate. (For regular backup sets, this number is the average transfer rate achieved since the start of the backup.)
Reconnection:
Both demand and scheduled CDP backup sets will use the reconnection settings from DS-Client Configuration > Parameters Tab: Scheduled backup section.
Unix DS-Client with File Alteration Monitor If the DS-Client cannot access a backup items parent folder when the backup starts, DS-Client will re-check if it can be accessed every 5 minutes.
See Also
Backup Set Options - Continuous Data Protection on page 98 About Retention Rules on page 85.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Memory Requirements for DS-Client During Incremental Backup Using Delta Algorithm
Creation Date: August 17, 2004 Revision Date: May 26, 2009 Product: DS-Client
Summary
This article describes the memory requirements for DS-Client when performing incremental backup files using the Delta algorithm.
Details
Processing files with Delta algorithm is very resource intensive (CPU, memory) and DS-Client needs to have enough memory in order to successfully complete. The memory requirements are about 0.25% from the size of the files processed at a given time (please note that a backup activity could process more than one file at once). For example, if DS-Client is processing a 100GB file, it will require 3 unfragmented memory blocks totalling about 0.25GB or about 250MB of memory. Sometimes the memory may become fragmented and DS-Client may not be able to allocate the necessary amount; in such scenarios DS-Client will report "Out of memory" exceptions. Here are a few things you can do if you encounter this situation: Add more physical memory. On a DS-Client backing up a big amount of data (either big files, or a big number of files, or both), SQL Server and the DS-Client service use most of that computers memory. Restarting these services will release some memory otherwise cached and it will reduce the memory fragmentation. MS SQL Server uses as much memory as it is allowed, therefore limiting this amount may be helpful for the other processes on that computer.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article describes the behavior when a user manually stops a backup set (from the DS-User).
Description
When user stops a backup set, DS-Client is still waiting for the file confirmation. The WaitConfirmation parameter is set in the DS-Client Advanced Configurations (Setup Menu > Configuration > Advanced Tab: Miscellaneous). This is the time out value when waiting for file confirmation. The default value is 60 seconds. If DS-Client still did not receive all confirmations when the time out is reached, DS-Client will disconnect from DS-System and mark the backup set out of sync. In the above scenario for Exchange backup sets, DS-Client will not send the "retrieve deleted/overwritten generations" and the "Delete last session" request. The next synchronization will correct the problem caused by disconnection.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article provides some additional information about using the Tape to BLM Converter feature. It is assumed that the Tape Library is installed and properly configured. If the DS-Client does not recognize the Tape Library, it is most likely not properly configured.
Troubleshooting
If a tape library is not recognized: Try restarting the DS-Client computer. 1. If after installing the drivers for the Tape Library, the Library cannot be seen under "Computer Management / Storage / Removable Storage / Libraries", go to:
"My Computer / Properties / Hardware / Device Manager / Tape Drive"
2. Click on properties. If there is a message that you must restart the computer after installing the drivers, click OK and you will be prompted to restart the computer. 3. After you reboot, the Tape Library should be visible under Libraries in Computer Management. IMPORTANT NOTE ABOUT CHANGING TAPES The DS-Client Tape Converter depends on Windows to interface with the Tape Drives. Therefore, you must change tapes in a way that Windows will always be aware of your changes. To change a tape: Open the Tape Drive door, and take a tape out from its slot. Close the Tape Drive door. Let Windows perform its inventory, and the removed tape will be marked as off-line. Open the Tape Drive door again, and put the new tape in the empty slot. Close the Tape Drive door. Windows will identify the new tape. After Windows finishes its identification of the Tape, you must click Refresh in the Tape Conversion Wizard to update the DS-Clients list from the Tape Librarys memory.
See Also
Tape Conversion to BLM on page 294
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
This article describes failures that may occur when performing backup of remote Windows 2008, Windows 7, or Windows 8 computers from a Windows DS-Client running on VISTA or 2008.
Details
This article applies if your Windows DS-Client fails to back up files from Windows 2008, Windows 7, or Windows 8 computers with either of the following errors:
The request is not supported
or
operation not supported
Windows DS-Clients running on either Windows VISTA or Windows 2008 may encounter these errors when trying to back up files from remote Windows 2008, Windows 7, or Windows 8 computers. 1. This is a Microsoft bug (KB 973278), which can be fixed with their hot fix that is supplied at:
http://support.microsoft.com/kb/973278
2. Apply this hot fix to the DS-Client computer (that is running Windows VISTA or Windows 2008).
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Alternate Location Restore of Microsoft Exchange Server 2000 / 2003 (mailbox recovery)
Creation Date: November 11, 2002 Revision Date: February 26, 2008 Product: DS-Client (Windows)
Summary
Please read this whole article first before starting the recovery procedure (to an alternate Exchange Server).
Details
In order to perform a successful restore to an alternate location (different server) several conditions must be met: 1. The recovery server must be installed in a different Active Directory (AD) forest than the original server. The target Exchange server for the restore must be the same version and service pack as the Exchange server that was backed up. 2. The Organization name, the administrative group name, the Storage groups and their stores, and the file locations must be the same as on the original server. If the organization name and/or the administrative group name is not the same, you can use a tool called "legacydn". The tool can be found on the service pack CD in the directory \server\support\utils\i386\LegacyDn. Read the text file that comes with the tool for more information. If you use this tool to rename, you may have to restart "Exchange System Manager". By default, the installation of Exchange 2000 / 2003 server creates the mailbox and public folder stores. These are normally called "Mailbox store (SERVER_NAME)", "Public folder store (SERVER_NAME)". Make sure the recovery server has the same store names as the original server. You can rename the stores using "Exchange System Manager": Right-click on each store and select rename. If the location of the database directories and log file directories is not the same as on the original server, change it here at this stage. 3. The recovery server must have an account member of the administrative group that exists on the DS-Client computer. You can either create an account on the recovery server, or you can create an account on the DS-Client computer that matches the name and password of the administrator account. 4. The DS-Client computer must be able to resolve the fully qualified domain name of the recovery server. Since the recovery server will be on a different Domain (different AD), you can set the DS-Client NICs DNS settings to point to the recovery server. (Do not forget to change it back to the original settings once the restore is completed.) 5. Dismount all the stores. Right click on each store and locate the database and streaming database locations. Using Windows Explorer, delete all the files from these directories. In step 2, you made the location of the database and logs the same; if you have AD users with mailboxes, you may have to delete these mailboxes. Using "Active Directory users and computers" right click on the users, and select "Exchange tasks" > delete mailbox (remember all these actions are to be performed on a test/lab server). In "Exchange System Manager" click on the server and in the left pane right click on each storage group and select "Properties". This gives you the location for the logs. Delete them using Windows Explorer. Mount all the stores. Ignore the warning
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
for the missing database files and click "Yes" on it. If you get any errors mounting the stores, resolve them before going further. Usually if you had to rename stores or organizations, you have to restart all Exchange services. At this point you should be able to mount all stores without any problems. Right click on each store, select "Properties" and click on the "Database" tab. Select "This database can be overwritten by a restore" checkbox. 6. Once the above conditions are met, you can start the restore from DS-User. In the restore wizard, change the location from "Original location" to "Alternate location", and click on [>>]. Browse and select the recovery server. Check "Ask for network credentials". Once you have selected the server, double click on it or click on the "Select" button. You will be prompted to type a user name and a password. Use the same one from step 3 above. Keep all the rest of the settings unchanged and click "Finish". Note: If you get errors during the restore, it is likely that some of the conditions (1 to 5 above) were not met.
Once the restore is completed without errors you can perform a mailbox recovery if you want.
Mailbox Recovery
The mailbox recovery involves the following steps: 1. Create an Active Directory user account, but do not mailbox-enable the user account. None of the naming for the account needs to match the account that was previously linked to the mailbox. 2. In Exchange System Manager, locate the Mailboxes object under the database object, and then right-click the Mailboxes object to run the Mailbox Cleanup Agent. In the Mailboxes list, make sure that a red X is displayed next to the mailbox that you want to recover. This indicates the mailbox is not connected to an Active Directory user. 3. Right-click the mailbox that you want to recover, and then click Reconnect. A list of Active Directory accounts is displayed, and you can connect the mailbox to the account that you just created for the mailbox.
See Also
Backup / Restore of Microsoft Exchange Server on page 553 Alternate Location Restore of Microsoft Exchange Server 2007 (mailbox recovery) on page 689
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
Please read this whole article first before starting the recovery procedure (to an alternate Exchange Server).
Details
In order to perform a successful restore to an alternate location (different server) several conditions must be met: 1. You can perform recovery on individual databases and storage groups or on all databases on a particular server. The recovery server must be installed in a different Active Directory (AD) forest than the original server. The target Exchange server for the restore must be the same version and service pack as the Exchange server that was backed up. 2. The Organization Configuration, the Server Configuration, the Recipient Configuration, the Storage groups and their mailbox databases, and the file locations must be the same as on the original server. By default, the installation of Exchange 2007 server creates the mailbox and public folder stores. These are normally called "Mailbox Database", and "Public Folder Database". Make sure the recovery server has the same Mailbox Database names and Public Folder Database names as the original server. You can rename the stores using "Exchange Management Console": Right-click on each database and select Properties. If the location of the database directories and log file directories is not the same as on the original server, change it here at this stage. Right-click on each store and select "Move Storage Group Path". 3. The recovery server must have an account member of the administrative group that exists on the DS-Client computer. You can either create an account on the recovery server, or you can create an account on the DS-Client computer that matches the name and password of the administrator account. 4. The DS-Client computer must be able to resolve the fully qualified domain name of the recovery server. Since the recovery server will be on a different Domain (different AD), you can set the DS-Client NICs DNS settings to point to the recovery server. (Do not forget to change it back to the original settings once the restore is completed.) 5. Dismount all the stores. Right click on each store and locate the database locations. Using Windows Explorer, delete all the files from these directories. In step 2, you made the location of the database and logs the same; if you have AD users with mailboxes, you may have to delete these mailboxes. Using "Exchange Management Console" under Recipient Configuration right click on the users, and select Remove. Delete all logs using Windows Explorer. Mount all the stores. Ignore the warning for the missing database files and click "Yes" on it. If you get any errors mounting the databases, resolve them before going further. Right click on each mailbox database or public folder database, select "Properties" and click on the "General" tab. Select "This database can be overwritten by a restore" checkbox.
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
6. Once the above conditions are met, you can start the restore from DS-User. In the restore wizard, change the location from "Original location" to "Alternate location", and click on [>>]. Browse and select the recovery server. Check "Ask for network credentials". Once you have selected the server, double click on it or click on the "Select" button. You will be prompted to type a user name and a password. Use the same one from step 3 above. Keep all the rest of the settings unchanged and click "Finish". Note: If you get errors during the restore, it is likely that some of the conditions (1 to 5 above) were not met. Once the restore is completed without errors you can perform a mailbox recovery if you want.
Mailbox Recovery
The mailbox recovery involves the following steps: 1. Create an Active Directory user account, but do not mailbox-enable the user account. None of the naming for the account needs to match the account that was previously linked to the mailbox. 2. Using Exchange Management Shell, connect the mailbox database you want to recover to the user account that you just created in AD.
See Also
Backup / Restore of Microsoft Exchange Server on page 553 Alternate Location Restore of Microsoft Exchange Server 2000 / 2003 (mailbox recovery) on page 687
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
There are two restore scenarios: Restoring WITHOUT a Recovery Storage Group on page 691 Restoring WITH a Recovery Storage Group on page 691
This confirms the restore location. Note: If you do not get this message, verify if the Remote Registry Service is stopped. If it is, restart the Remote Registry Service and retry the restore at which time the pop-up message will appear. You must get this pop-up message before proceeding. Proceed with the restore. 4. Mount the restored database in the Recovery Storage Group. 5. From Exchange Management Console > Toolbox > Database Recovery Management: Use the merge option that is available.
See Also
Backup / Restore of Microsoft Exchange Server on page 553 Alternate Location Restore of Microsoft Exchange Server 2000 / 2003 (mailbox recovery) on page 687
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
Bare Metal Restore is a restore process when the whole machine is being restored. Usually this type of restore is performed after a complete hardware failure or hardware upgrade. You must have backed up the machines System State and Services Database. When you restore the System State, Services Database and Operating System files, everything must be selected and restored in one step (at the same time) because immediately afterwards a reboot is required. Microsoft recommends using the same hardware for the destination machine. You can restore Windows (2000 / 2003 / XP / 2008 / VISTA) machines to different hardware. Restoring a Windows NT4 machine to different hardware is not possible (unless some initial preparations are made). However, if the differences are minor (e.g. different SCSI controller, NIC) the restore may be successful. Switching between different computer types (ACPI to standard computer type and vice versa) is not allowed. For more information you can check Microsofts knowledge base article number 237556.
After the restore is finished, you are prompted to reboot the target computer. Do so. If your computer boots normally, no intervention is required. If your computer does not boot, or crashes, you have to follow the steps outlined below: Reboot the computer from the Windows installation CD, and start a repair process using the recovery console. Once you have the command prompt, change to the system32 directory (by typing cd system32), and type dir *.*.asigra* You should see the 7 saved files. Copy each one of them to their original name. For example if you have hal.dll.asigra-022403-0800, you should type copy hal.dll.asigra-022403-0800 hal.dll. Confirm the overwrite and continue with the rest of the files. Type cd dllcache. Type dir *.*.asigra*. You may see 2 more files. Copy them to their original names. Change to the root of C:\ drive by typing cd \ Type dir *.*.asigra*. You will see one file. Copy it to the original name (boot.ini). Change to C:\WINNT\repair by typing cd \winnt\repair. If your %SystemRoot% is located on a different drive or has a different name, change to the proper location. Type dir *.*.asigra*. You will see one file. Copy it to the original name (setup.log). You will need this file in case you need to perform repair. After successfully copying all the files type exit, which would reboot the machine. Boot normally, and your machine should be up and running.
There would be a rebuild of the plug and play database, and you may be prompted to provide drivers for the new hardware found. Follow the instructions on the screen. When prompted to reboot, select NO and finish installing all drivers. Set the TCP/IP details for your network adapter(s). Now you have to fix your computer type. If you did not check the computer type of the destination machine (the one that you are restoring to), you can find out the type by checking the properties of the hal.dll. Open your Windows explorer and go to %SystemRoot%\system32 (%SystemRoot% is usually located in C:\WINNT). Locate the file hal.dll with the extra asigra extension. It could be something like hal.dll.asigra-022403-0800. Right click on it and select properties. Click on the "Version" tab, and from "Item name" select "Internal name". In the "Value" field you would see the original file name. In step 1 above there is a description for each computer type and its corresponding hal.dll. Now you have to change your computer type to the right one (if it is not already so). Click Start, point to Settings, click Control Panel, and then double click System. Click the Hardware tab, and then click Device Manager to view what is listed under the computer branch. Right click on the computer type, select Properties, and select "Driver" tab. Click on "Update driver" button. Click on "Display a list of the known drivers for this device so that I can choose a specific driver" radio button and click "Next". Select the right model for your computer (the one that you discovered by checking the original hal.dll properties) and click "Next". Finish and when prompted to reboot do so.
would never get replicated. In fact the replication process would overwrite it. When is the normal (nonauthoritative) restore useful? It is good for single server trees, or when you want to restore the registry, but not to overwrite the Active Directory. Microsoft has a default tombstone lifetime (DTL) value in an Active Directory forest which defines the number of days that a domain controller preserves knowledge of deleted objects. This value also defines the useful life of a system state backup that is used for disaster recovery or installation from backup media. Active Directory protects itself from restoring data that is older than the tombstone lifetime by disallowing the restore. The tombstone lifetime is stored in the tombstoneLifetime attribute of the object CN=Directory Service, CN=Windows NT, CN=Services, CN-Configuration, DC=ForestRootDomain. In a forest that is created on a domain controller that is running Windows Server 2003 without Service Pack 1 (SP1), the default tombstone lifetime is 60 days. In a forest that is created on a domain controller that is running Windows Server 2003 with SP1, Windows Server 2003 with Service Pack 2 (SP2), or Windows Server 2003 R2 or Windows 2008, the default tombstone lifetime is 180 days. Because the tombstone lifetime can be changed administratively, do not assume the default value. Be sure that you are aware of the tombstone lifetime that is in effect in your forest. For more information on this topic, refer to the following Microsoft Knowledge Base articles: http://support.microsoft.com/kb/198793 http://support.microsoft.com/kb/216993 However in case you need to restore an older version of the Active Directory, you have to perform an authoritative restore. Below is a description of each restore type: Authoritative restore - Select "Authoritative restore" in the last screen of the Restore Wizard. This will perform authoritative restore of both AD and FRS. The following list of requirements must be met before you perform an authoritative FRS restore: a) The FRS service must be disabled on all downstream partners (direct and transitive). b) Events 13553 and 13516 have been logged in the FRS event log. c) The computer that is configured for the authoritative restore is configured to be authoritative for all the data. d) All other partners in the replica set must be reinitialized with a non-authoritative restore. To reinitialize the partners with a non-authoritative restore, stop the FRS service, configure the BurFlags registry key, and then restart the FRS service. To do so: Click Start, and then click Run. In the Open box, type cmd and then press ENTER. In the Command box, type net stop ntfrs. Click Start, and then click Run. In the Open box, type regedt32 and then press ENTER. Locate the following subkey in the registry: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NtFrs\Param eters\Backup/Restore\Process at Startup In the right pane, double click BurFlags. In the Edit DWORD Value dialog box, type D2 and then click OK. Quit Registry Editor. Perform this on every partner. After rebooting the machine you just restored, start the FRS service on all the partners by typing "net start ntfrs" in the command box. They will synchronize from the restored machine. Normal restore - default - "Authoritative restore" is NOT selected. This will perform nonauthoritative restore for both Active Directory and NTFRS.
You can still perform Non-authoritative restore with DS-Client and then manually run ntdsutil. However this would not work if you are performing bare metal restore where the destination for restore doesn't have AD. If this is the case, let DS-Client perform authoritative restore. DS-Client is running several activities that you can not perform when running manually ntdsutil. Note: After successful restore you should reboot the machine. Once the machine is restarted the plug and play database is reinitialized and most probably you will be prompted for a reboot. Please do not reboot immediately, wait and make sure the Active directory and FRS are synchronized.
Please note that replication may take some time before the restored data would be propagated. If you are testing authoritative restore please note that objects added to the AD after the backup, would not be removed from AD after the authoritative restore. For more information see Microsofts knowledge base article 216243.
4. Restoring Active Directory on a server that is not the PDC when the PDC is missing.
There are some scenarios when you have to restore AD on a domain controller when the PDC is missing. In this case there are several steps that should be performed in order to get the AD in 100% running condition. If the destination machine is a domain controller already, you have to boot into Directory Services Restore Mode. If the destination machine is a stand-alone Windows 2000/2003 computer you can start the restore immediately. Select "Authoritative restore" in the last screen of the Restore Wizard. This will perform authoritative restore of both AD and FRS. After successful restore of the System State reboot the computer when prompted. Please note that you may have to perform the steps outlined above in case you are restoring to different computer type. There are a few articles from Microsoft describing the whole process: 216498 - HOW TO: Remove Data in Active Directory After an Unsuccessful Domain Controller Demotion 248410 - Error Message: The Account-Identifier Allocator Failed to Initialize Properly 234790 - HOW TO: Find Servers That Hold Flexible Single Master Operations Roles 223787 - Flexible Single Master Operation Transfer and Seizure Process Outlined below is the whole process described step by step. 4.1. Login to the restored machine (after the normal reboot) and start a command prompt. Start ntdsutil: Type "domain management" Type "connections" Type "connect to server ServerName" (where ServerName is your current computer name) Type "quit" Type "select operation target" Type "list roles for connected server" You should get information about what roles where associated with the server. Type "list sites" and note the number for the site you are dealing with Type "select site #" (where # is your site number. e.g. 0, 1, ...) Type "list domains in site" and note the domain number
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
Type "select domain #" (where # is your domain number. e.g. 0, 1, ...) Type "list servers in site" and note the number for the missing PDC Type "select server #" (where # is your server number. e.g. 0, 1, ...) Type "list naming contexts" and note the number for the CN=Configuration Type "select naming context #" (where # is your naming context number. e.g. 0, 1, ...) Type "quit" Type "quit" Type "roles" and you will be at the "fsmo maintenance:" prompt.
Now you must "seize" all 5 rows. ntdsutil will attempt to "safe transfer" the roles, but the transfer will fail since the PDC is missing. Just ignore the errors, because seizure will succeed: Type "seize domain naming master" Click "Yes" at the pop up message Type "seize infrastructure master" Click "Yes" at the pop up message Type "seize PDC" Click "Yes" at the pop up message Type "seize RID master" Click "Yes" at message prompting you to synchronize and "Yes' to confirm the operation Type "seize schema master" Type "quit" Type "quit" to exit ntdsutil 4.2. Now you have to delete all references to the missing server. This could be accomplished using "ADSI edit". This utility is free and is located on the Windows 2000 Server installation CD. It is in \support\tools. Just install the tools. Start ADSI Edit. If you launch ADSI edit immediately after logon, you may receive an error that the domain does not exist. Wait a minute or so and try again. In "Domain NC..." folder, expand until you reach "OU=Domain Controllers". Locate the missing server and delete it. Redo the delete if you get an error or partial delete. In "Configuration Container...", expand until you reach CN=Sites, CN=SiteName - CN=Servers. Locate the missing server and delete it. The last step is to set the Global catalog. In "Active Directory Sites and Services" expand the site all the way down until you reached NTDS settings for the server that you restored. Right click on "NTDS Settings" select "Properties", check "Global Catalog", click "Apply", and close this dialog box. 4.3. Now you are ready to reboot. Reboot the server. 4.4. Examine all the logs for any errors. You should not have any errors. If this is not the case you may have incompatible hardware or device drivers. Usually the error would give you an indication what the problem is and you must be able to solve them. 4.5. Your server is now ready. Note: If there are no other domain controllers to synchronize with, you will have problems. For an explanation of how to fix this, refer to the next paragraph 5 (Restoring Active Directory from a multi server to a single server environment, or when the rest of the domain controllers are missing).
5. Restoring Active Directory from a multi server to a single server environment, or when the rest of the domain controllers are missing:
You will have SAM errors if other domain controllers are missing. If you do not plan to ever start the other controllers, then you should remove them from Active Directory. Use ADSI Edit as explained in step 4 above. From "Active Directory Sites and Services" delete "Connection" from NTDS Settings. After Service Pack 3, the FSMO role holder would not assume its FSMO role unless it had successfully completed at least one sync. Microsoft changed this in order to avoid multiple FSMO owners in a domain, and to prevent the Domain Controller from issuing duplicate RIDs. As described in the previous steps if you seize the RID Master role it will not become authoritative until it synchronizes with another DC. During disaster recovery where you restore only one domain controller from backup, or when you remove domain controllers from AD, you may get "The account-identifier allocator failed to initialize properly..." errors in the System log. The error would be from source SAM and Event ID 16650. Dcdiag may report problems with RID Manager or corrupted data. There are 2 solutions: a) You can restore another domain controller, or b) You can delete the replication links In case you want to keep only one domain controller, you have to delete the replication links, otherwise the domain controller is not fully operational. Here are the instructions for deleting the replication links: 1. You need to use the repadmin tool. It is part of the "Windows 2000 Support tools". The installation of the tools is located in \SUPPORT\TOOLS on the Windows 2000 CD. 2. Open a command prompt and type "repadmin /showreps /v" 3. You need to find out the "guid-based-dns-name of replica partner", which is displayed after "Address:" of the deleted partner. 4. Here is an extract from repadmin:
-----------------------------------C:\>repadmin /showreps /v Default-First-Site-Name\SPEEDYNT4 DSA Options : IS_GC objectGuid : a089478f-cffb-409f-b74b-addb83a6e93e invocationID: a089478f-cffb-409f-b74b-addb83a6e93e ==== INBOUND NEIGHBORS ====================================== CN=Schema,CN=Configuration,DC=spdnt4,DC=local Default-First-Site-Name\TR1 DEL:b91cd853-6af0-4c3a-9586-b5dcc8f489f7 (deleted DSA) via RPC objectGuid: a48650dc-8ed0-4363-8c25-b41553f9248d Address: a48650dc-8ed0-4363-8c25-b41553f9248d._msdcs.spdnt4.local ntdsDsa invocationId: 8994f8c1-f71e-454c-ad3a-17b119621381 WRITEABLE SYNC_ON_STARTUP DO_SCHEDULED_SYNCS USNs: 3518/OU, 3518/PU ------------------------------------
5. In the example above, the FQDN is spdnt4.local and the "guid-based-dns-name of replica partner" is "a48650dc-8ed0-4363-8c25-b41553f9248d._msdcs.spdnt4.local" 6. The restored server is called SPEEDYNT4 and the deleted partner - TR1.
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
8. <naming context> would be for the Schema, Configuration and Domain. 9. In our example to delete the links for the schema we would type:
repadmin /delete CN=Schema,CN=Configuration,DC=spdnt4,DC=local speedynt4.spdnt4.local a48650dc-8ed0-4363-8c25b41553f9248d._msdcs.spdnt4.local /localonly
12. You must reboot the server after deleting all the replication links. 13. Check the System Log after the reboot to make sure there are no errors from source SAM.
6. Common mistakes:
Slow clients logins Misconfigured DNS, DHCP If the missing server is your PDC, and also your main DNS and DHCP server, your client computers may experience slow logins or errors when trying to login to the domain. If you are using fixed IP addresses, make sure the clients DNS settings are correct. Check your DHCP server for proper settings.
7. Troubleshooting:
Problem: After performing BMR of a Windows machine, the computer fails to start with the following message:
"Windows could not start because of a computer disk hardware configuration problem. Could not read from the selected boot disk. Check boot path and disk hardware."
Reason:
The computer fails to boot because of a different system disk configuration between the original backed up computer and the target restore machine.
Solutions: 1. Perform an alternate restore of only the boot.ini from the Windows BMR backup set. Compare this file with the boot.ini of a freshly prepared target restore machine. If they are different, save a copy of the target restore machines boot.ini (e.g. boot.ini.original), perform the BMR, then before restarting replace the restored boot.ini with the (i.e. boot.ini.original). 2. Restart the computer. If it still fails to start, perform the file renaming steps of the 7 automatically saved files described in this Knowledge Base Articles section 2. Restoring from one computer type to another: on page 693.
See also
Backing up Windows for Bare Metal Restore (BMR) on page 534. Bare Metal Restore of Windows XP on page 701. Important Notes for Bare Metal Restore on page 707.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
Bare Metal Restore is a restore process when the whole machine is being restored. Usually this type of restore is performed after a complete hardware failure or hardware upgrade.
Details
The Windows XP Service Pack 2 disables some services, and removes or replaces some others. If performing a Bare Metal Restore on top of a basic Windows XP installation, those services disabled by XP Service Pack 2 may be enabled and the ones removed by the same Service Pack may still be found after the restore is completed. We have an open case with Microsoft to resolve this issue. Until we provide a fix, even though the conflicts described above can be manually resolved, we recommend applying the following workaround: When a Bare Metal Restore is needed, install first Windows XP on the destination machine, apply the Windows XP Service Pack 2 and then start the full restore.
See also
Backing up Windows for Bare Metal Restore (BMR) on page 534. Important Notes for Bare Metal Restore on page 707.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
Bare Metal Restore (BMR) is a restore process when the whole machine is being restored. Usually this type of restore is performed after a complete hardware failure or hardware upgrade.
Details
The Windows SBS 2008 has the following additional requirements in order to perform BMR: 1. You must have an existing, backed up File System Backup Set of the SBS machine you want to restore (including backup of C$, system state and services database). For more information, see the Knowledge Base Article Backing up Windows for Bare Metal Restore (BMR) on page 534. 2. Install Windows SBS 2008 on the target restore machine (where the BMR will be performed). 3. Restart the target machine with Directory Services Restore Mode (F8). 4. Login as a Local Administrator. 5. Uncheck User Account Control (UAC) from Control Panel > User Accounts. 6. Turn off the Firewall. 7. Go through the Windows services list and make sure only the following seventy-three (73) services are started (i.e. stop any other services that are running): Application Experience Application Host Helper Service Application Information Background Intelligent Transfer Service Base Filtering Engine Block Level Backup Engine Service Certificate Propagation COM+Event System Crytographic Services DCOM Server Process Launcher Desktop Window Manager Session Manager DFS Namespace DFS Replication DHCP Client Diagnostic Policy Service Diagnostic System Host Distributed Transaction Coordinator DNS Client File Server Resource Manager FSCController FSCMonitor FSCStatisticsService FSEMailPickup
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
Group Policy Client Human Interface Device Access IKE and AuthIP IPsec Keying Modules IP Helper IPsec Policy Agent KtmRm for Distributed Transaction Coordinator Microsoft Exchange Active Directory Topology Service Microsoft Exchange Transport Netlogon Network Connections Network List Service Network Location Awareness Network Policy Server Network Store Interface Service Plug and Play Print Spooler Remote Access Connection Manager Remote Procedure Call (RPC) Remote Registry RPC/HTTP Load Balancing Service Secondary logon Secure Socket Tunneling Protocol Service Security Accounts Manager Server Server Infrastructure License Service Shell Hardware Detection SQL Server VSS Writer SSDP Discovery System Event Notification Service Task scheduler TCP/IP NetBIOS Helper Telephony Terminal Services Terminal Service Configuration Terminal Service UserMode Port Redirector Update Services UPnP Device Host User Profile Service Virtual Disk Windows Error Reporting Service Windows Event Log Windows Management Instrumentation Windows Process Activation Service Windows Remote Management (WS-Management) Windows SBS manager Windows SharePoint Services VSS Writer Windows Time Windows Update WinHTTP Web Proxy Auto-Discovery Service Workstation
Generated on: 10/15/12 Page: 703
Confidential.
8. Perform the BMR to the target machine. 9. When the restore process has finished, restart the target machine.
See also
Backing up Windows for Bare Metal Restore (BMR) on page 534. Important Notes for Bare Metal Restore on page 707.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
Bare Metal Restore is a restore process when the whole machine is being restored. Usually this type of restore is performed after a complete hardware failure or hardware upgrade.
Details
Starting from Windows 2008, Microsofts Operating System installation includes a System Reserved Partition (usually 100MB): See System Reserved Partition (Windows 2008 & up) on page 535.
See also
Backing up Windows for Bare Metal Restore (BMR) on page 534. Important Notes for Bare Metal Restore on page 707.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
Bare Metal Restore (BMR) is a restore process when the whole machine is being restored. Usually this type of restore is performed after a complete hardware failure or hardware upgrade.
Details
The Windows SBS 2011 (Standard) has the following additional requirements in order to perform BMR: The target machine you are restoring to must be rebooted in Directory Services Restore Mode. This starts the Windows Domain Controller running Active Directory, which allows the Directory Services to be restored.
See also
Backing up Windows for Bare Metal Restore (BMR) on page 534. Important Notes for Bare Metal Restore on page 707.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
Bare Metal Restore is a restore process when the whole machine is being restored. Usually this type of restore is performed after a complete hardware failure or hardware upgrade. This article explains the following: No Bare Metal Restore of 32-bit Operating System to 64-bit is possible on page 707.
See also
Backing up Windows for Bare Metal Restore (BMR) on page 534. Bare Metal Restore of Windows (ALL VERSIONS) on page 693. Bare Metal Restore of Windows XP on page 701. Bare Metal Restore of SBS 2008 on page 702.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
In some cases, you may wish to restore an older version of a backed up file. (e.g. If you discover that files after a certain date are corrupted, or if you wish to restore a project that requires files from the same backup session. The number of generation online depends on the backup set option settings, as well as the number of backups performed and the frequency of changes to the backup file.)
Details
The following dialogs are accessible from the Restore Wizard. (The path to get to the dialog is shown in parentheses beneath the dialog title.) Select by Generation Restore menu > Restore Now > Show Files > File Info Highlight the desired generation of the file from the list and click on Select. The Restore Wizard returns to the Select Files and Directories Tab, with your selection market with a checkbox. The directory list refreshes automatically to show files backed up at the time of the selected generation.
Select by Backup Time Restore menu > Restore Now > Advanced
Note
1. When you select a specific file generation, the display is changed to reflect only the backed up data from that selected generation.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
Note: The only time when this method is better than restoring from a full DS-Client backup is if there is a very specific transaction point you want to restore to (between two full backup sessions).
Asigra Cloud Backup DS-Clients special Microsoft SQL Server backup set type always performs a full database dump of the SQL Server, triggered by the DS-Client. After the first backup of a SQL database, the subsequent backups send incremental forever. Currently, the DS-Client does not support a separate backup of a databases transaction log. If you want to back up the transaction log, you must backup the corresponding database with the Backup Transaction Log backup item option selected (MS SQL 2005 and higher). The value of separate transaction logs is that they can be restored as separate dump files (to alternate location). The Microsoft SQL Server Enterprise Manager / SQL Server Management Studio tools can use these transaction log dumps to roll forward a restored database to a specific point-in-time (covered by the transaction log dump). To select a backed up transaction log from the Restore Wizard: 1. Open the Advanced Option screen and select Latest generation of all data. 2. Click Show Files.
3. If a transaction log was backed up, it will appear with the *.log extension. Select it and continue with the Restore Wizard.
Details
The following general steps are required if you want to restore transaction logs (and roll-up a database). 1. Restore the database as a dump file with the Windows DS-Client. 2. Using the physical file restored in step 1, restore it in the SQL Server using third party tools SQL Server Enterprise Manager / SQL Server Management Studio: Leave the DB in a non-operational state so that transaction logs can be rolled forward. 3. Restore additional transaction logs (since the backup restored in step 1) with the DSClient as dump files. 4. Use SQL Server Enterprise Manager / SQL Server Management Studio to roll-up (in sequence) the required transaction logs up to the point in time you want. 5. Set database in operational mode. 6. You can now start using the DB. Repeat steps 1-5 for additional databases you require.
See also
MS SQL Server Database Backups on page 116 Backing up Windows for Bare Metal Restore (BMR) on page 534 Backup / Restore of Microsoft SQL Server (ALL VERSIONS) on page 560
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
The DS-Client software can be instructed to restore locked files when the destination server is a Windows computer. This feature is vital when restoring operating system files that are locked and cannot be restored in any other way (e.g. most of the operating system kernel files).
Rename
Dont Rename
Special Warning Regarding Restoring Locked Files with the Rename Option
When using the Rename Option, you must ensure a complete and successful restore session. 1. Open the Event Log for that restore session 2. If there is at least one Event # 32 "The process cannot access the file because it is being used by another process", then a successful restore MUST end with the message "N locked files were registered for restore". 3. If you do not see this message, do not reboot the computer. Re-run the restore until you see that message. 4. Once you have had a successful restore session, you must reboot your computer to complete the restore process.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
In order to perform a bare metal restore of a NetWare 5.x server (NDS 8), the following requirements must be met.
Details
If you did not use DOSFAT.NSS (or any other tools) to backup the DOS partition, the latest support pack must be installed prior to restore. To execute a full NetWare server restore after hardware failure you must: 1. Install the NetWare server. Install the NetWare licenses. In NetWare 5.1 the "admin" account does not have rights to backup the licenses. Unless you granted these rights manually, the backup of NDS will not contain the licenses. However Novell does this on purpose. 2. During the installation, you must provide the same NDS tree, and the same server context, otherwise the DS-Client will not be able to restore (DS-Client cannot perform an alternate restore of NDS). 3. Apply the latest NetWare support pack. This step is necessary because NDS will fail to load if it is not in synch with the rest of the modules in NetWare 5.x. If you backed up the DOS partition, you can restore it, and in this case there's no need to apply the support pack. There are two scenarios when you perform a full restore: Scenario A - NDS tree with a single server. 1. Restore only NDS in a single session. This step is necessary because the NDS object(s) must exist prior to applying trustee assignments. 2. Add Name Space (if any). 3. Restore the file system in the next session, and then reboot the server (see Note 3). Scenario B - NDS tree with multiple servers. 1. Restore only NDS on the master replica in a single session. 2. Add Name Space (if any). 3. Restore the file system on the master replica in the next session (see Note 3). 4. Install the rest of the servers. When asked for the NDS tree name - select the existing one and connect to the master replica. 5. Add Name Space (if any). 6. Restore the file system on the rest of the servers (see Note 3). Note: Novell claims that for multiple server environments, you do not need to restore the NDS. The restored server will be able to pull NDS updates from the rest of the servers. However, in mass disasters (or when emulating a mass disaster) you may need to perform a full NDS restore to all of the servers.
Certificate Server
At the end of NDS restore you must perform some extra steps because of the inability to restore the certificate server. According to Novell there is no way of backing up and restoring the certificate server. This is done on purpose. To get around this problem you have to remove the certificate server first and then to reinstall it: 1. After successful restore of NDS you must delete the following items using ConsoleOne: All certificates the SAS object everything in the Security container (You may want to check TID 10056795 from http://support.novell.com - especially if you have a Multi-Server environment). 2. Run "NREPAIR.NLM". This utility can be downloaded from http://support.novell.com. This utility is the only way to remove the certificate server and properly initialize NICI: Follow the prompts from the screen After successful removal, mount the Certificate Server Installation CD Install the certificate server through the GUI 3. After steps 1 & 2 are complete, your server will have the proper NDS. The only exception would be any previously used certificates that are no longer valid. As it was mentioned earlier this is done on purpose. You can test the functionality of the certificate server by trying to create a new server key. Note: From now on the version of NDS that you restored will no longer be good since the certificate server and all the certificates are different. (i.e. you should backup NDS immediately after completing the restore.) 4. After applying all the necessary steps you can start restoring the file systems. You MUST unselect from SYS volume \SYSTEM\NICI subdirectory because it contains information related to the previous version of the certificate server and NICI. If you fail to remove this directory from the restore process, you will have to clean the certificates again and run NREPAIR, and then reinstall the certificate server.
Notes
1. When doing a full file system restore you may encounter some errors. They will be recorded in the DS-Client Logs. Once the restore is completed, check the Activity and Event Logs. If there were any errors, perform a restore for each of the files that had errors. This is a known problem and ASIGRA is working with Novell to resolve it. 2. If you had more than one NDS partition, you must reconfigure it manually. 3. If you encounter "The network name cannot be found" when trying to restore, this means the NetWare SERVER has been rebooted too many times. This has caused the NetWare CLIENT on the DS-Client computer to cache too much data. This can be fixed by either performing a "login" to a NetWare server, or rebooting the DS-Client computer. 4. After restoring NDS, CIFS may not function. This limitation is not only exhibited by DS-Client, but also SMS Backup. In order to fix CIFS, follow the directions described in Novell Support Knowledge base - TID 10071043. Basically all you have to do is recreate the login sequence.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
Because of the way Microsoft (and most other software providers) install their programs, a problem may occur if a computer's file system and Registry are restored.
Details
When Microsoft (and most other software providers') software is installed on a computer, the Windows 8.3 filename is used in the Registry. Some programs make associations with the file extensions, thereby allowing the program to launch automatically when and associated file is double clicked. Windows 8.3 filenames appear with first few characters of the long filename, followed by the tilde (~) and a number (e.g. MICROS~4). This method allows long file names to be limited to eight characters, while remaining unique. The problem is that the Windows 8.3 name is assigned chronologically (i.e. based on the order in which program files were installed on the computer). However, when the DS-Client restores files, the Windows 8.3 name may be different because files can be restored in a different order than they were originally installed. For example, the folder 'Microsoft Image Composer' might have originally had the 8.3 name 'MICROS~2' (since there may be several folders with long folder names, beginning with Microsoft). Upon restoration of the file system, it is possible that the 8.3 name could be something else (e.g. MICROS~5), depending on the order that it was restored to the computer by the DS-Client. If such a problem exists on the restored computer, it will appear when you try to open a file by double clicking on it. You will get a "Program Not Found" error dialog, prompting you to specify the location of the program that will launch the selected file. (For more info see Microsoft Knowledge Base article 240240.)
Resolution
ASIGRA has a solution for this problem that is applied automatically for Windows 2000 and higher. In the "Program Not Found" dialog, simply click the Locate button, and respecify the source program. The exact program name will be listed in the dialog. You can perform a filename search in the event you cannot remember where the source program is located. If the work around does not help, you may have to reinstall the failed program.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Disaster Restores
Creation Date: November 4, 1997 Revision Date: December 6, 2005 Product: DS-Client See Recovering the DS-Client Database on page 718 See Disc/Tape on page 283
Summary
The DS-Client service is designed to perform automated backups to an offsite location. This approach requires an adequate communication link between the DS-Client and the DS-System. If a customer site needs to restore a large amount of data (due to a server crash or other disaster), the communication link between the DS-Client and the DS-System may not allow the restore process to be completed in a reasonable amount of time. In these cases, customers can use the Disc/Tape feature to have the required data written to media and shipped to their physical location. This can be done from the DS-Client, or by their Asigra Cloud Backup service provider.
Note
1. The data on Disc/Tape media is encrypted.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
The DS-Client database contains the settings for backup sets, logs, and schedules. Asigra Cloud Backup has incorporated a DS-Client database recovery feature to speed up recovery if the DS-Client computer is destroyed, or if its database is somehow otherwise destroyed. The Delta database contains delta information for all files. If this database is not recovered, the next backup will force DS-Client to send a new Master file (full file). This will add a considerable amount of backup time to the next backup. If you restore the Delta database as well as the DSClient database, this will add to the time required to Recover (especially if the databases are large). In order to use this feature, your DS-Client must have been configured to backup its own database (see: Setup > Configuration > Parameters Tab - Database Options > DS-Client database backup). In other words, there must be a backed up DS-Client database on the DS-System to recover (this is the default setting). The recovered database will show data up to the time it was last backed up. Note it is quite possible that the recovered database is slightly out of synch with the actual 'up-to-the-last-minute' backups, therefore you should immediately run a Weekly Admin. to synchronize the recovered database with the actual DS-System storage. If you do not have a DS-Client database backup, you will have to recover each backup set on the DS-System individually. However, you will be unable to recover the backup schedules or any of the logs. (See Recovering 'Orphaned' Backup Sets on page 720.)
Recovery Steps
If the DS-Client computer was destroyed, you must: Assemble the hardware required for the replacement DS-Client computer and install the Operating system. If you must replace the database software, make sure you install the same version. Note: It is possible to recover the database from an MS SQL Server 2000 instance to an MS SQL Server 2005 instance, but you cannot recover from 2005 to 2000. However, it is best to recover to the same exact instance version to minimize the chance of problems. You must also recreate the user accounts (including the DS-Client account), and then Reinstall the DS-Client software to the computer. Recover the DS-Client database(s). To recover the DS-Client database(s): 1. Start the DS-Client Service and run DS-User. 2. From the Setup Menu, select System Activities. The System Activities Administration dialog box appears. 3. Click Repair. The Repair DS-Client dialog box appears. 4. Select either "DS-Client database" or "DS-Client & delta database". 5. Click OK. A recovery message appears, instructing you to restart the DS-Client service.
6. Stop and Restart the DS-Client service. The recovered Database will become active upon restart. 7. Run a Weekly Admin. process to ensure that the recovered DS-Client database data is not missing any backup sets. If it is, perform a backup set recovery. (See: Recovering 'Orphaned' Backup Sets on page 720) 8. Follow the steps to Take Ownership of each backup set (see: Change Backup Set Ownership in the DS-User Guide).
Notes
1. If you have reinstalled the Windows operating system on the DS-Client computer being recovered: The Security IDs (SIDs) of the users you create will be different from those in the recovered DS-Client database (even if they are the same name, the SIDs are unique for each instance a user is created). You must change ownership of the backup sets to the new user: See Change Backup Set Ownership on page 198. In the Select User dialog, you will see two users of the same name (because the DS-Client searches by SID). Select the lower one - the current user is closest to the bottom of the list. 2. Do not create any new backup sets before you have recovered the DS-Client's database.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
If you encounter the following Event Log errors: "Backup Set not found in Backup Log", it means the Admin process encountered differences when it checked the DS-Client's database against the actual backup data on the DS-System. This means the backup data exists on the DS-System, but the backup set is missing from the DS-Client's database. These 'orphaned' backup sets can still be recovered by having the DS-Client reconstruct the backup set catalogs from the DS-System information. Orphaned backup sets must be recovered individually. However, recovering an orphaned backup set does not recover its configuration information (i.e. Computer Name, Connect As, Backup Schedule...). This information must be re-specified to the DS-Client database by performing the Migration process.
Recovery Steps
Follow these steps to recover a backup set (Perform these steps for each backup set individually): 1. From the Setup Menu, select System Activities > Repair. The Repair DS-Client dialog box appears. Select the Orphaned backup sets radio button. 2. Click OK. The Backup Set Recovery dialog box appears. 3. Select a backup set from the list. (When recovering a backup set, your current login credentials are used to assume ownership of the backup set. This means your current login ID will be the owner of all the recovered sets.) 4. Click OK to begin the process. The Synchronization Window appears as the backup set is synchronized with the DS-System's online storage. 5. Continue for as many backup sets there are to recover (i.e. until the list is empty). 6. Once the backup set is recovered, you may perform restores immediately. (To backup, see the following section on Migration.)
Migration
In order to resume backups, you must re-specify some of the backup set's configuration information (i.e. Network Provider, Computer Name, Connect As, Backup Items, and Backup Schedule information). Do this by Migrating or by manually changing the necessary settings. The easiest method is to migrate the backup set: 1. From the Backup Sets Tab, click on a set to highlight it. 2. Right-click to pop up the options menu. 3. Click on Migrate. The Migrate Backup Set Wizard appears, prompting you to select the new network/share path. 4. Browse through the network/node to specify the new path you want to migrate this backup set. 5. Check the Ask for Network Credentials box if you want to specify the credentials to the new network resource. 5a. If you use the Ask for Network Credentials checkbox, the Enter Network Credentials dialog box appears. Enter the User name, source server (if applicable), and password to connect with the selected network/node.
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
6. Once connected to the new network/node, the Migrate Backup Set Wizard switches to match the source/destination share. 7. Double Click on the corresponding Destination Cell to show all of the available shares on the selected node. 8. Select the share where the files have been moved and click Next >. 9. The specified backup items in the Selected Files for Backup Section will remain, however the share path will change according to the destination share selected in the previous tab. 10. Make sure that the path of the migrated files is correct. Otherwise, errors will occur. You may add more files, or leave this dialog unchanged. 11. Click Next >, when you are finished changing/specifying backup items. The Backup Item Options tab appears. 12. Select the options, as you would a normal backup set. Depending on which network you have migrated to, you may see more or less backup options than previously available for this backup set. 13. Click Finish to complete the migration. The Backup Sets dialog box returns. If you open to the migrated backup set, you will see any changes to the network, node, and/ or provider.
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
If you need to restore an MS SQL Server's MASTER database, you need to perform some additional steps in order to ensure a successful restore. See SQL Server 2000 on page 722. See SQL Server 2005 & up (Full & Express versions) on page 723. Note: This article describes restoring the MS SQL Server MASTER Database for any instance, except the DS-Clients MS SQL database.
where
You can find the <path_to_executable> by viewing the Properties for this MS SQL Server Instance in Windows Services Specifies the MS SQL Server Instance Name that you wish to start in single-user mode. When starting an instance of SQL Server, you must use the sqlservr application in the appropriate directory for that instance. For the default instance, run sqlservr from the \MSSQL\Binn directory. For a named instance, run sqlservr from the \MSSQL$instance_name\Binn directory. NOTE: If you are starting a default (un-named) instance, skip this switch (type <path_to_executable>\sqlservr -c -m). Starts MS SQL Server independent of the Windows NT Service Control Manager. Specifies the single-user mode.
-sinstance_name
-c -m
3. Use Asigra Cloud Backup DS-Client to restore the master database directly into the restored instance. Note: When the load of the master database is complete, the server automatically shuts itself down. You can restart the MS SQL Server normally (from Enterprise Manager or SQL Server Service Manager). The SQL Server instance will start in multi-user mode.
4. Restore the msdb database and the rest of the databases, if applicable.
You will find a list of all SQL instances installed on that machine. Locate the name of the Instance you want to start in single-user mode in the Name field. The Data field will contain a map of this Instance on the computer. Browse for the following path:
HKEY_LOCAL_MACHINE\Software\Microsoft\Microsoft SQL Server\<DATA VALUE>\MSSQLServer\Parameters
For 32-bit instances running on 64-bit Operating Systems: Browse for the following path:
HKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\Microsoft SQL Server\SQLServer\InstanceNames\SQL
You will find a list of all SQL instances installed on that machine. Locate the name of the Instance you want to start in single-user mode in the Name field. The Data field will contain a map of this Instance on the computer. Browse for the following path:
HKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\Microsoft SQL Server\<DATA VALUE>\MSSQLServer\Parameters
4. Add a new registry Value at the end of the list. Give it a Value Name of SQLArgn, where n in an incremental number of 1 over the current maximum. Make the Data Type REG_SZ, and for the string value enter -m. 5. Restart MS SQL Server in single-user mode using the Windows Services regular Start command. 6. Use Asigra Cloud Backup DS-Client to restore the master database directly into the restored instance. When the load of the master database is complete, the server automatically shuts itself down. 7. Delete the registry Value SQLArgn that you added in step 4. Now you can restart the MS SQL Server normally (from Enterprise Manager or SQL Server Service Manager). 8. Restore the msdb database and the rest of the databases, if applicable.
See also
MS SQL Server Database Backups on page 116 Restore MS SQL Server Backups on page 234 MS SQL Server Backup Sets (Alternate Location Restore) on page 266 Backup / Restore of Microsoft SQL Server (ALL VERSIONS) on page 560
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
Summary
Starting from version 9.2, Linux DS-Client can perform a Point-In-Time Recovery for an entire Oracle database. Tablespace Point-In-Time recovery (TSPITR) is not supported, however the DSClient can prepare all the datafiles and archived logs in order for users to perform a manual TSPITR, when required. This article describes the steps for Oracle DBPITR on Linux DS-Client: 1. Performing DBPITR within the current database incarnation on page 725 2. Performing DBPITR to a non-current database incarnation on page 731
This option will not issue the Oracle RECOVER command. You must use RMAN to perform the DBPITR manually. See DBPITR using the Do not execute RECOVER commands option on page 728. This option will automatically recover the database to the target time and opens the database with the Resetlogs option. See DBPITR using the RECOVER DATABASE at ... option on page 726.
NOTE: If you select both options, the option Do not execute RECOVER commands will override the other and no Recover Database command will be executed.
DBPITR using the RECOVER DATABASE at ... option This option will automatically recover the database to the target time and opens the database with the Resetlogs option. If you have all archived logs needed up to the target recovery time, you just need to restore the control file and all datafiles. 1. Because you are performing DBPITR with a backed up control file, you need to put the database in Nomount state with the following commands:
SQL>Shutdown immediate; SQL>Startup nomount;
2. From the DS-Users Restore Wizard, select the Oracle backup sets Control file and all datafiles.
Make sure that: You choose the correct backup set and generation which belong to the current incarnation. If you do not have all archived logs up to the target recovery time, you must also restore Archived Logfiles.
4. Select the target time: Choose the option RECOVER DATABASE at. Input the target recovery point-in-time at which you want to recover your database. 5. After you click Finish, DS-Client will automatically recover the Oracle database to the target time and then it will open the database with the Resetlogs option.
DBPITR using the Do not execute RECOVER commands option This option will not issue the Oracle RECOVER command. This means the DS-Client will only restore the datafiles and archived logs back to the Oracle server. You must use RMAN to perform the DBPITR manually. 1. Put the database in Nomount state with the following commands:
SQL>Shutdown immediate; SQL>Startup nomount;
2. Select the Control file and all datafiles. The restore selection is the same as DBPITR using the RECOVER DATABASE at ... option on page 726. 3. Continue to the Select Restore Options tab of the Restore Wizard.
4. Select the option Do not execute RECOVER commands. 5. Click Finish. DS-Client will: Replicate the control file Mount the database Restore the database 6. Now you must manually perform DBPITR with Oracles RMAN. Your database will be in Mount state. You must use RMAN to connect to the target database and perform the DBPITR. 7. Perform the following operations within a RUN block:
RMAN>Run{ Set Until Time=TO_DATE(2009-07-09 21:28:00, YYYY-MM-DD HH24:MI:SS); Recover database; }
If you know the specific logseq# or SCN where you want to recover the database, you can use with the RMAN Set Until clause as in the following samples:
RMAN>Run{ Set Until logseq=8; Recover Database; }
OR
RMAN>Run{ Set Until SCN 2325039; Recover database; }
8. Review the recovery results. Open the database in Read Only mode with the following command to check if you are satisfied with the results:
SQL>Alter database open Read Only;
9. If satisfied, you can open the database with the Resetlogs option:
SQL>Alter database open Resetlogs;
If not satisfied, you can repeat the DBPITR procedure to a new target time.
EXAMPLES The following screenshots are RMANs outputs based on Time, Log Sequence Number, and SCN with the Set Until clause:
In this example: The current incarnation is the incarnation with the Key 9, assuming that the current time July-14-2009. The target time will be July-09-2009 21:28:00. Based on the incarnation history, you see that the incarnation with the Key 5 was the current incarnation at the recovery target time. 2. Replicate the control file: Put database in Nomount state:
SQL>Shutdown immediate; SQL>Startup Nomount;
Make sure that you choose the correct backup set and generation which belongs to current incarnation at the recovery target time. If you do not have all archived logs needed up to the recovery target time, you must also restore those archived logs. 3. Reset the database incarnation to the current incarnation at the recovery target time: After Control file is successfully replicated, your database is already in Mount state In this example, you must reset the database incarnation to 5 with the following command:
RMAN>Reset database to incarnation 5;
After you click Finish, DS-Client will automatically recover database to the target time. However, the database is will remain in Mount state (it will not be opened). 6. Review the recovery results. Open the database in Read Only mode with the following command to check if you are satisfied with the results:
SQL>Alter database open Read Only;
If not satisfied, you can repeat the procedure of DBPITR to a new target time.
See also
Restore Oracle Server Backups on page 240
The information provided in this document is provided "AS IS", without warranty of any kind. ASIGRA Inc. (ASIGRA) disclaims all warranties, either express or implied. In no event shall ASIGRA or its business partners be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if ASIGRA or its business partners have been advised of the possibility of such damages. Asigra Inc. All Rights Reserved. Confidential.
F1 Help provides descriptions for the contents of the different GUI screens of the Asigra Cloud Backup DS-User. It differs from the User Guide sections, which provide step-by-step instructions.
F1 (Context-Sensitive) Help
F1 (Context-Sensitive) Help
This section contains the alphabetical list of F1 Help screens for the Asigra Cloud Backup DSUser.
3D View Setting
(Win32 Only) This screen controls all of the 3-dimensional view settings for the Load Summary chart.
X-Gap Elevation Depth to height ratio Z-Gap Rotation Width to height ratio Bar-Gap
About DS-User
This screen shows the current version of this installation of the DS-User program. Click Info to bring up the DS-Client Version Info.
DS-Client Info Ports JRE Properties (Java DS-User only) Brings up the DS-Client Version Info screen. Brings up the Listening Ports screen. Brings up the Java Runtime Environment Properties screen with information on the local computer where DS-User is running.
F1 (Context-Sensitive) Help
Online
Transmitted Amount
Completion
ID Note
Description section Displays details about the highlighted line in the Activities List. Select by section Filter options that can be used to limit what is displayed in the Activities List. From field To field Type the date and time of the earliest activity you want to see. No earlier data will be displayed. Type the date and time of the latest activity you want to see. No newer data will be displayed.
F1 (Context-Sensitive) Help
You may search for a specific activity. If this list box appears, it allows you to choose between Demand and Scheduled activities (or both). Allows you to search for a specific Activity ID number. Each activity on DS-Client has its own unique (chronological) ID number. You may search for a specific node/backup set. Click [>>] to bring up the Select from Backup Sets screen. If you select Scheduled backups, this list box appears, allowing you to select a specific schedule. Allows you to filter for only activities associated with the selected retention rule. The default is <Any>, which disables this filter. You may specify a particular user in this field. Owner: Searches for activities belonging to a particular user (the backup set owner). Performed by: Searches for activities performed by a particular user. To view the activities from a specific Node, choose one from the list. The default is <All>. Click to update the activity log display based on the parameters in the Select By section. For backup sets that have the Detailed Log option activated (Set Properties - Options tab). Click to bring up the Detailed Log Viewer, which shows all the files that were backed up in the highlighted session. You can view more details about each activity by accessing the Event Log. The Select By options in the Event Log will match those of the highlighted activity. Click to bring up the Event Log Viewer screen.
Detailed Log
Event Log
Choice
Characters
F1 (Context-Sensitive) Help
Type
Select what Event Severity to apply. This over-rules the default for the corresponding event. Remember: this can affect the notifications that are sent. Information Warning Error Click to save this filter in the Event Filter List.
Description Shows the corresponding description for this event. This field cannot be edited. OK
F1 (Context-Sensitive) Help
Enter the DS-Clients IP Address. Once you finish entering the IP Address, press TAB or highlight another field. Java DS-User will immediately verify if this DS-Client is running (the From list will activate). Type the user name of the account with access to the DS-Client. Type the corresponding account password. Select the domain or server on which the username and password will be verified. (i.e. DS-Client validates supplied credentials with this domain or server.).
Criteria
Grid DS-Client
F1 (Context-Sensitive) Help
The default setting is 4403. Normally you should not change this setting. The UDP protocol can display the list of DS-Clients faster, though with less certainty that a DS-Client is capable of accepting a connection.
Add a DS-Client
Add or modify a specific DS-Client entry (standalone or Grid).
Single DS-Client Enter the DS-Client IP address or DNS address. If you select Grid DS-Client, the field expands into a list and the following buttons appear. Add: Add a new entry to the Grid DS-Client address. Modify: Edits the highlighted entry in the Address list. Delete: Deletes the highlighted entry from the Address list. Load: This allows you to load a text file containing a list of hostnames and / or IP addresses representing the nodes of a single Grid DS-Client.
Grid DS-Client
F1 (Context-Sensitive) Help
Click this button to add, modify, or delete entries from the DS-System address list.
Pre/Post This option can be used to run commands on DS-Client when connection to DS-System is required. This can help in some network situations, like dealing with firewalls. Pre-Command Post-Command Enter a command to run on the DS-Client computer before it connects to the DSSystem. Click Test to run the command and view the exit code it returns. Enter a command to run on the DS-Client computer after it disconnects from the DSSystem. Click Test to run the command and view the exit code it returns.
Specify a number. If the Pre-Command returns an exit code that meets this condiConsider connection tion, the DS-Client will: failed if pre-exit Not attempt to connect to DS-System. code Log the error. Check to run the specified Pre/Post commands for each activity that requires a conConsider Pre/Post nection to DS-System (even if the activities overlap). Uncheck to run the Pre-Comindividually for each mand before the first activity, and to run the Post-Command after the last activity connection has finished (if the activities overlap). Delay after executing pre-command Delay after executing post-command Enter a time (in seconds) to wait after executing the Pre-Command, before DS-Client connects to DS-System. Enter a time (in seconds) to wait after executing the Post-Command. No activities will run on DS-Client.
Sends an E-Mail message to the specified recipient. Sends an E-Mail to the Pager E-Mail account (configured in the DS-Client Configuration). Sends a message to the messenger service on the specified recipient domain, workgroup or server. (Broadcasts to domains or workgroups are limited to 128 characters). Records the notification in the specified recipient server's Event Log.
F1 (Context-Sensitive) Help
Administrator (E-Mail) Other (E-Mail) Pager (Pager) Server(s) (Broadcast & Event) (Windows DS-Client)
Sends the E-Mail notification to the DS-Client Administrator (specified in the DS-Client Configuration - Notification Tab). Sends the E-Mail notification to the recipient identified in the field. Sends the notification to the Pager account (specified in the DS-Client Configuration - Notification Tab). Sends the notification to the selected Domain, Workgroup or Server. Use the [>>] button to browse and select the recipient. [Note: Feature is no longer supported on Windows DS-Clients running on Windows VISTA, Windows 7, Windows 2008 or higher.]
Completion All: Notification will be sent in any scenario: when Completed without errors, Completed with errors, and Incomplete. Successful: An activity that completed successfully (without errors or warnings). Completed with warnings: An activity that completed with at least one warning event. Completed with errors: An activity that completed with at least one error event. Incomplete: An activity that is not completed successfully. Detailed Notifications Attach detailed log Send E-Mail using HTML format (E-Mail only). Check this box to send more detailed backup set information. (E-Mail only). Check this box to include a file-level detailed backup log as an attachment. Compress: Select to compress the attached file. (E-Mail only). Check this box to send the E-Mail notification in HTML format. Otherwise, it will be sent in plain text format.
Show section Latest generation of all data Latest generation of all data (except deleted data)
F1 (Context-Sensitive) Help
Allows you to specify the period from which you would like to restore. (Note that this activates the Restore Period and Filter sections.)
Period section This section is only active if the Selective data (from a certain period) radio button is selected. This will narrow the display of files for restore to only those files/directories that were backed up within the specified period. From To Click [>>] to select the earliest time. This opens the Select a Backup Session screen. Click [>>] to select the earliest time. This opens the Select a Backup Session screen.
Filter section This section appears if the Restore Wizard or Request Wizard can use the DS-Client database to perform the filtering. It does not appear for BLM Image Restore or Disc/Tape Restore since they have been written to media and are no longer synchronized with the DS-Client database. Show all data Hide data (dirs / files) deleted from source on / before: Show only data (dirs / files) deleted from source on / before: No filter is applied. This filter allows you to hide backed up data (directories and files) that was intentionally deleted from the source computer. Select a date and time in this field to screen out backed up data that was not scanned by the DS-Client since the filter date. This prevents you from restoring directories / files that were intentionally deleted. The inverse of the previous hide data option (above). This allows you to view and restore only those directories / files that were intentionally deleted from the source computer.
File overwrite section [Restore Wizard only] This section allows you to control the types of files that are restored, in order to minimize restore times. Restore all Restore newer Restore older Restore different Skip existing Restores all selected files to the destination directory. Any files of the same name will be overwritten. Restores only with files that have newer dates than those in the destination directory. Restores only with files that have older dates than those in the destination directory. Restores only with files that have different dates/sizes than those in the destination directory. Does not restore any existing files of the same name in the destination directory.
Assign to Retention
Use this screen to select a Retention Rule.
Name Description No Retention Rule: Use a specific Retention Rule: select from the list of the Retention Rules defined on the DS-Client. Shows a description of the selected Retention Rule.
Backup set is not set for unattended backup. Backup set will run based on the selected schedule:
Generated on: 10/15/12 Page: 744
Confidential.
F1 (Context-Sensitive) Help
Available schedules
Finish
Deselect a box to keep the corresponding directory. All other backup sets\directories (that cannot be selected) do not fit the Assisted Delete selection parameters. Click to have DS-Client connect to DS-System and delete the selected items from online storage.
Allows you to specify the number of generations to keep online (i.e. not select for delete) from the Delete Period. If you specify a number, you will only be Leave last ... generations able to select directories that have more generations available for delete than this number. Filter Windows DS-Client will compare directories in its logs with the directories backed up at DS-System. Linux/Mac DS-Client will compare files in its logs with the files backed up at DS-System. The date and time entered in this field filters for directories (or files) currently on the DS-System but not on your backup computer at that time. This allows you to remove backed up directories (or files) that were intentionally deleted from your source.
Placeholder/stub selection [Windows DS-Clients only] This option can be used if you are using a third-party storage management solution that migrates infrequently used files from the source, and leaves a small (size) placeholder/stub in its place. This assumes that the third-party storage management solution is where you want to protect that data (and the DS-System storage is not necessary). If DS-Client detects a placeholder / stub is created on the source (by the Windows offline attribute), the corresponding file on DS-System will be deleted, based on the selected conditions (see below).
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
F1 (Context-Sensitive) Help
Keep the last placeholder / stub and subsequent generations The last placeholder or stub will be kept on DS-System, as well as any full file generations that appear after that latest placeholder/stub. Keep all placeholders / stubs All placeholders or stubs will be kept on DS-System, as well as any full file generations that appear after that latest placeholder/stub. Move to BLM A copy of all data deleted from DS-System during this Assisted Delete will be moved to BLM (Backup Lifecycle Management). This option only appears if the BLM Module is enabled by your Service Provider. Use new archive package: Select to use a new archive package. Otherwise, this Archive request will be added to the current archive package on the BLM Archiver. Archive packages are specific to a particular backup set. Each BLM Request will be added to an Archive Package until it reaches a specified limit (# of files, size, time). Session Label: Each Archive Package is automatically time-stamped, but you must add your own label (alphanumeric string) to demand BLM requests. This will make it easier to search an Archive Package.
F1 (Context-Sensitive) Help
Click to edit the highlighted Rotation Rule from the list. Opens the New / Edit Password Rotation Rule. Deletes the highlighted Rotation Rule from the list. Click to select the highlighted Rotation Rule.
Axis Setting
(Win32 Only) This screen controls the axis settings for the Load Summary chart.
Font Size Style Label Standing Word wrap Rows seen Logarithmic base
Compressed Size Disc/Tape restores can only have one generation of a file. (Disc/Tape only) This is the size of that file on the Disc/Tape media (as written by the DS-System). File Size Stream Size The protected size of each listed generation of the file. Shows the full transmission size of the file in Bytes (including file security, permissions, streams, etc.). Shows the corresponding backup options that have been applied to this particular generation of the file. These options correspond to the following key: E = Extended Attributes S = Backup Streams P = Permissions X = POSIX D = Daylight Savings Correction (some File Systems) D = DBCC (MS SQL Server backups) R = Reparse Point (Windows) C = Encrypted File (Windows) Z = Sparse File (Windows) O = Offline (Windows)
Options
F1 (Context-Sensitive) Help
Archive Time
Time when the corresponding generation was pushed to BLM from online (using the Archive Old Data to BLM feature from the Retention Rules). If this column appears, it means this generation has been Archived. You cannot restore the file from online (only from a BLM Image). An Archived Data Placeholder (a small archive stub containing only metadata) is left in place of the archived file to prevent DS-Client from backing up the file again (unless it is changed). Only the latest generation of an online file leaves an Archived Data Placeholder. All other archived generations are completely removed from DS-System and no reference is made to them by DS-Client. Corresponding Archive Package number for the generation.
Archive ID
Objects Opens the Backup Objects for ... (System i Server and Backup from the Cloud) (System i Server screen. backups) Select (Restore only) Click to select the highlighted generation for restore.
Backup Objects for ... (System i Server and Backup from the Cloud)
Use this screen to view objects available for restore. For System i Server backup sets: Use the "Select"/"Deselect" buttons to selectively restore only the objects you need. Unselecting objects has no influence on the restore speed if the objects were backed up without the "Individual obj." option. For Backup from the Cloud backup sets (Salesforce.com): This screen appears in a Restore Wizard tab. By default, all tables are selected.
F1 (Context-Sensitive) Help
Right-mouse click menu: Schedule Calendar New Schedule Edit Schedule Delete Schedule Activate Suspend Set Priority Expand Collapse Assign to Schedule (backup set level) Drag & Drop.
F1 (Context-Sensitive) Help
2 3
The Activity Log will be updated with Recovery information (if applicable) each time a Daily or Weekly Admin is run. A synchronization is run on each recovered Backup Set.
Color
Double click
Right-mouse click menu Backup Now... Restore Now... Delete... Enforce Retention Request Disc/Tape... BLM Request...
F1 (Context-Sensitive) Help
Allows you to perform a validation of the selected backup set/files on the DS-System online storage. Click to synchronize the backup log of the currently highlighted backup set with the DS-System online storage. This brings up the Synchronize Backup Set screen. Click to toggle the status of the currently highlighted backup set between Active and Suspended. Depending on the status, scheduled backups either will or will not be performed. Click to migrate a backup set from one computer to another. This brings up the Migrate Backup Set Wizard screen. Click to copy the highlighted backup set. This brings up the Clone Backup Set Wizard on the Schedule Tab. You must assign a new schedule and name for the backup set. (Local-Only sets) Click to convert the highlighted backup set from Local-Only to a Regular backup set that saves data to the DS-System. Cancel Convert only appears if conversion was interrupted for the highlighted backup set. Click to change the ownership of the selected backup set. The Change Backup Set(s) Owner screen appears. Click to change the permissions of the selected backup set. The Backup Set Permissions screen appears. Click to edit the backup properties (ex: name, backup options, schedule, etc.) for the highlighted backup set. The Backup Set Properties screen appears.
Bandwidth Throttle
Use this screen to apply a throttle to the outgoing and incoming bandwidth used by this DS-Client. There are two tabs, which have identical configurations except for the data direction where the throttling is applied: To DS-System (e.g. backups) From DS-System (e.g. restores)
Default Throttling Unlimited: (DEFAULT) No throttle is applied, unless listed in the Exceptions List. Limited to [...] KB/Sec: Throttle is applied at all times, except for periods defined in in the Exceptions List. Except (Exceptions List) Each line represents a different detail: a specific day and time window where the listed bandwidth throttle applies. This overrides the default throttling selection (above). Start Time End Time Bandwidth Throttle: Can be Unlimited or Limted to [...] KB/Sec. Add Modify Remove Select Group Click to add a new detail. Opens the New / Edit Bandwidth Throttle Schedule Detail screen. Click to edit the selected detail. Opens the New / Edit Bandwidth Throttle Schedule Detail screen. Removes the highlighted detail from the Exceptions List. You must highlight a Detail in the Exceptions List for this button to work. Click to highlight any other details (from other days) that share this Details Start Time, End Time and Bandwidth Throttle settings. This allows you to modify an entire group at the same time.
F1 (Context-Sensitive) Help
Archive Rule applies to All files Select a File Filtering Rule from the drop-down list. Specific files defined by the Add: adds a new rule to the list (Opens the File Filtering Rule screen) filtering rule: select from the Edit: edits the selected rule in the list (Opens the File Filtering Rule drop-down list screen) Remove: deletes the selected rule from the list Shows a list of each option in the selected File Filtering Rule. Description
General
3D View Setting
F1 (Context-Sensitive) Help
Title
Allows you to change the title settings for the chart. Text Font style Font size Word wrap X, Y, and Z correspond to Width, Height, and Depth. Standing Word wrap
Axis Labels
E-Mail Messages
System i Server MySQL Server Microsoft SharePoint Server Lotus Domino Server VSS-aware Backup Set Backup from the cloud
F1 (Context-Sensitive) Help
VMware VADP
Backs up a VMware vCenter Virtual Machine by exporting it on the vCenter. Requires a Local DS-VDR Tool. This type of backup set does not backup data to DS-System. Backs up a Physical computer to a VMware vCenter Virtual Machine. Requires a Local DS-VDR Tool. This type of backup set does not backup data to DS-System. This tab is skipped in the following circumstances: No other backup type (other than file system) is supported.
SSH Notes: 1. The backup source machine must be a Unix system (Linux, Solaris, HP-UX, or AIX). 2. The source machine must have an OpenSSH compatible server installed and started. 3. The source machine must have either Perl5 (core function, 5.6 or beyond) installed, or Python (2.4) installed. [Alternatively, you can use the DIRECT option to run a specific script/binary located on the source machine.] 4. The SSH approach cannot scan the LAN to get an initial machine list. You must enter the IP of the source machine in the Path field (e.g. UNIX-SSH\10.20.30.100). The user or administrator can also put the initial machine list into the file hostlist_ssh located in the installation path (usually /opt/ CloudBackup/DS-Client). 5. For more details, see the Knowledge Base article Backup / Restore using UNIX-SSH.
F1 (Context-Sensitive) Help
Local-only
Statistical
This box appears when a Statistical Backup Set Type is selected. Calculate transmit amount Check to emulate an actual backup transfer process. During statistical back(Statistical Backup Sets) ups, specified backup files will be read from their source and processed for compression/encryption. BLM (Infinite Generations) (Backup Lifecycle Management module must be enabled) Backup sets are configured to save a specific number of generations. Once a backup item reaches this number of generations, the oldest will be overwritten with each new generation backed up. Check to configure this backup set for BLM. When applicable, the DS-Client will instruct DS-System to send a copy of the oldest generation (that is about to be overwritten) to the BLM Archiver.
Use Local Storage These options appear if you have the Local Storage Tool Enabled from your Service Provider, and you have specified a Local Storage Path in the DS-Client Configuration Parameters Tab screen. Save on Local Storage Check this box to indicate this backup set will also be saved to a Local Storage location (at the DS-Client site). Backup data will be sent to the location specified in the Local Storage Path field. Check this box to indicate this backup set will use the Local Storage as a cache, in case a backup session loses connection with DS-System. Cached backup data will be sent to DS-System at the next connection opportunity (after synchronization). Backup data will be sent to the location specified in the Local Storage Path field. Click [>>] to choose a specific local storage path for this backup set. Opens the Enter Local Storage Path. If you do not make a selection, the path from the DS-Client Configuration Parameters Tab screen is used. (Multi-Tenant DS-Client only) Select from the list of available customers. This backup set will be grouped under the selected customer in the Backup Sets tree. If no customers have been defined (Setup Menu > Multi-Tenant: Customer Management), you will only have the <Unspecified Customer> selection.
Customer
F1 (Context-Sensitive) Help
Choose the name for this backup set screen (Linux DS-Client)
This tab allows you to specify a descriptive name for this backup set.
Set name Set type Regular Self-Contained Enter the name of the backup set Select the type Creates a full featured backup set of any kind (File System, Database, etc.). Creates a Self-Contained backup set that performs backup and restore using only local storage. The Local Storage Path must be set (Setup Menu > DS-Client Configuration > Parameters Tab) Creates a Local-Only backup set that performs backup and restore using only local storage. This is similar to Self-Contained, except there are no limits on the number of backup sets, and the total capacity stored is licensed from the DS-System. The Local-Only Tool must be enabled for this DS-Client (by your Service Provider from the DS-System). The Local Storage Path must be set (Setup Menu > DS-Client Configuration > Parameters Tab) Creates a "virtual backup set" one that collects backup statistics, but does not physically backup data.
Local-Only
Statistical
This box appears when a Statistical Backup Set Type is selected. Calculate transmit amount Check to emulate an actual backup transfer process. During statistical back(Statistical Backup Sets) ups, specified backup files will be read from their source and processed for compression/encryption. BLM (Infinite Generations) (Backup Lifecycle Management module must be enabled) Backup sets are configured to save a specific number of generations. Once a backup item reaches this number of generations, the oldest will be overwritten with each new generation backed up. Check to configure this backup set for BLM. When applicable, the DS-Client will instruct DS-System to send a copy of the oldest generation (that is about to be overwritten) to the BLM Archiver.
Use Local Storage These options appear if you have the Local Storage Tool Enabled from your Service Provider, and you have specified a Local Storage Path in the DS-Client Configuration Parameters Tab screen. Save on Local Storage Check this box to indicate this backup set will also be saved to a Local Storage location (at the DS-Client site). Backup data will be sent to the location specified in the Local Storage Path field. Check this box to indicate this backup set will use the Local Storage as a cache, in case a backup session loses connection with DS-System. Cached backup data will be sent to DS-System at the next connection opportunity (after synchronization). Backup data will be sent to the location specified in the Local Storage Path field. Click [>>] to choose a specific local storage path for this backup set. Opens the Enter Local Storage Path. If you do not make a selection, the path from the DS-Client Configuration Parameters Tab screen is used. (Multi-Tenant DS-Client only) Select from the list of available customers. This backup set will be grouped under the selected customer in the Backup Sets tree. If no customers have been defined (Setup Menu > Multi-Tenant: Customer Management), you will only have the <Unspecified Customer> selection.
Customer
F1 (Context-Sensitive) Help
Select tables to upload The left column contains a list of all the tables in the selected database dump file. Highlight the table(s) you want to add and click the [+] button. Selected tables appear in the right column Select credentials of SalesForce.com Connect to SalesForce with Upload Click to supply the connection credentials to the SalesForce.com account. This opens the Specify Credentials (Windows DS-Client) screen If DS-Client can connect to Saleforce.com with the supplied credentials, this button activates. Uploaded table data is appended to any existing table.
F1 (Context-Sensitive) Help
Server
Shows the selected DS-Client computer Java DS-User: This is a read-only field, showing the selection from the DSClient(s) list. Win32 DS-User: The default is a drop-down list of the local DS-Client and all other DS-Clients on the same subnet. This behavior can be altered from the DS-User Initialization - Connection (Win32) screen. Encrypted: All communications between the DS-User GUI and DS-Client service are encrypted using a random encryption key. Standard: This option is only offered for backwards compatibility with old service/daemon versions that do not have this feature. Type your User Name. This is a valid account established on the DS-Client computer. Type your password. Select the domain or server on which the username and password will be verified. (i.e. DS-Client validates supplied credentials with this domain or server.) Check to have the DS-User reuse the supplied credentials on each login during the current session. This is reset once the DS-User application is closed. Activates the auto-connect feature for this DS-User GUI installation. Select this option to use your current logged on Windows Username and Password to connect to the DS-Client. The DS-Client that the GUI connects with depends on the Auto-Connection setting in the DS-User Initialization - Connection (Java) or DSUser Initialization - Connection (Win32) screen. Access to the DS-Client is restricted to Administrators and Backup Operators. Regular users must be permitted access by Administrators (in the DS-Client Configuration - Roles tab). User Names are required to restrict network access based on the credentials provided.
Connection Configuration
(Optional - this screen can be left empty. If empty, the GUI will scan the local computer and the local computer's subnet for available DS-Clients. Applies to Win32 version only.) Use these settings to indicate a specific DS-Client or subnet to display in the Connect to DS-Client Service screen. This can speed up your login in larger network environments.
Allows you to select if this is a Single DS-Client or a Grid DS-Client. If you select Grid DS-Client, the Host field expands and the following buttons appear. Add: Opens the Host name or IP address (Win32 DS-User) screen Type Modify: Edits the highlighted entry in the Address list. (DS-Client only) Delete: Deletes the highlighted entry from the Address list. Load: This allows you to load a text file containing a list of hostnames and / or IP addresses representing the nodes of a single Grid DS-Client. Enter the IP address for the Host or Subnet. A Host can also be specified by its DNS host name. A Host can also be specified by HOSTNAME (computer name). This requires a corresponding entry to exist in the local computer's %systemroot%\system32\drivers\etc\hosts file (typically found in C:\WINNT\system32\drivers\etc\). Each entry must be on a separate line, with the IP separated from the HOSTNAME by at least one space (e.g. 10.20.30.111 C_Name). The default setting is 4403. Normally you should not change this setting.
Generated on: 10/15/12 Page: 758
Confidential.
Host / Subnet
Port
F1 (Context-Sensitive) Help
Specify the minimum interval that DS-Client must wait before backing up a changed file (that has been detected). This limit can be long if you do not want to backup file changes too Do not back up more often than frequently. [...] Seconds / Minutes / Hours This limit can be short (down to 1-second) if you want to provide precise backup granularity of changes. (The actual granularity achieved will depend on the speed of your network and hardware environment.) This option is for data that you know changes frequently. DS-Client will only backup a changed file after it detects it has not changed for the specified interval (i.e. the saved version is reasonBackup if file stops changing for ably stable.) [...] Seconds / Minutes / Hours Note: Because this is a time-sensitive operation, make sure the DSClient computer time and the backup source computer times are synchronized. Suspend Backup for Scheduled Select the scheduled activities that will suspend this CDP backup: Retention BLM Validation
Customer Information
[Multi-Tenant mode only] Use this screen to enter or update a customer for a Multi-Tenant DS-Client.
Name Contact Address Enter the customer name that you want to appear in the Backup Set tree Enter the name of the contact person for this customer. Enter the customer address.
F1 (Context-Sensitive) Help
Note
Customer Management
[Multi-Tenant mode only] Use this screen to manage the list of customers that can be assigned to this DS-Clients backup sets. Once this list is defined, you can assign a customer to a backup set in either the New Backup Set Wizard or the Backup Set Properties (Set Info Tab).
Customer List Name - This is the name that appears in the Backup Set tree. Contact Address Note Add Modify Delete Click to add a new customer. Opens the Customer Information screen. Click to edit the highlighted customer. Opens the Customer Information screen. Click to delete the highlighted customer from the Customer List. (A customer can only be deleted if it does not have any backup sets assigned to it.)
View
F1 (Context-Sensitive) Help
Selected Columns
Selected Columns
Filter Value
F1 (Context-Sensitive) Help
View
Shows the original View that the Data Set was based on.
Filter
Options
Find
Details screen
LAN STORAGE DISCOVERY TOOL / ONLINE FILE SUMMARY TOOL
File List Backup Set / Share Name Directory File Backup Time / Last Scan File Size Duplication Name of the backup set or share. Directory. Filename. Backup time (online files) or last scan time (LAN). Size in bytes. Level of duplication of the file (e.g. 10 means ten duplicates of the file exist Online or on the LAN).
F1 (Context-Sensitive) Help
Duplicate ID
Each file is scanned and an ID is generated for it. Any duplication (multiple instances of the same file elsewhere on the LAN or Online) will be identified by the same ID.
Last Modified (LAN File Summary Only) Time the file was last modified. Last Accessed (LAN File Summary Only) Time the file was last accessed. Description Show Duplicates Any additional details. Opens the Show Duplicates screen for the highlighted file. Allows you to view all the duplicates of a single file. Highlight a file in the list and click the Show Duplicates button.
Parameter Value Configured Value Effective Value Restart DS-Client Reset all parameters Description
F1 (Context-Sensitive) Help
Internet Connection Configuration (For Backup from the Cloud Salesforce.com backup sets only.) This section allows you to configure the DS-Client to use a proxy server to access the Internet when connecting to the Salesforce.com site. Use a proxy server to access Internet: Select to enable this option. Address: Enter the address (DNS name or IP address) of the proxy server that the DS-Client will use. Port: You must specify the port that will be used to connect to the proxy server. (By default, this is port 80.)
F1 (Context-Sensitive) Help
Default Operation
Select from the list of operations: Try deny write: Attempt to open backup file in 'Deny Write' mode. If this fails (because the file is already open), place the backup file in 'Allow Write' mode. Deny write: This mode prevents any other process from writing to the backup file, while the DS-Client has it open. DS-Client will not back up the file, if another process has already opened it for write. (However, you may instruct the DS-Client to retry backing up the open file.) Prevent write: Attempt to open backup file in 'Deny Write' mode. If this fails (because the file is already open), then open in Allow Write mode and lock the file, thereby preventing any process from writing to the file. This ensures that the most recent version of the file is backed up. Allow write: Allow another process to read/write to the backup file (no restrictions). Since other applications can write to the file while it is being backed up, this may affect file consistency. Specifies the number of times you want the DS-Client to attempt to backup the file. (Maximum of 10 retries). Specifies the interval between retries. (Maximum of 999 seconds). Select from the list of defined schedules. Click to create a new schedule. You can add a single default notification that will apply to new backup sets. Click to add a new notification, or edit the existing default notification. Opens the Add / Edit Notification screen (See: Add Notification screen) Click to delete the existing default notification. You can select the default compression type that will be assigned to new backup sets: LZOP: A faster compression than ZLIB, that comes at the expense of less compression. ZLIB: This compression method will normally produce better compression than LZOP, but will take more time to compress.
Retry times Retry interval (sec) Backup schedule List New Notification Notification Add / Modify Delete Data Compression
Compression Type
Choosing the best default compression: ZLIB is a good default compression for backup environments where the bottleneck (the slowest transmission point during the backup activity) is the network. LZOP is a good default compression when the network is not the bottleneck. For example, when you are using a LAN speed connection and want backups to finish as fast as possible.
F1 (Context-Sensitive) Help
From (E-Mail Address) (SMTP only) From (Display Name) (SMTP only)
Enter the E-Mail address from which you wish to send notifications. Recipients will see this address in the From field of their E-Mail notifications (their reply function will use this address). Enter the name (or other text) you would like to appear in the From field of the notification E-Mail. Recipients will see this text in the From field of their E-Mail notifications (before the E-Mail address). Select the Mail Profile for DS-Client to use. Mail Profiles are maintained by your mail client. DS-Client currently supports only one mail client: Microsoft Outlook. If no Profiles are listed, the mail client is not installed or no profiles were created under the DS-Client service account. To create a Mail Profile, see the Setting up DS-Client Notifications Knowledge Base article. Specify what appears in the subject line of notification E-Mails for backup activities. This field has a limit of 256 characters. You can enter any text and combine it with the Backup activity placeholders. When a notification is sent, any placeholder is replaced with the corresponding data from the DS-Client database. If you leave this field blank, a default subject line appears showing DS-Client ({DSC_NUMBER}): {BACKUP_RUN_RESULT} '\\{BACKUP_SOURCE}\{BACKUP_SET_NAME}({BACKUP_SET_OWNER})'. Placeholders are case-sensitive and must be entered between the { } brace characters. Backup activity placeholders: {DSC_NAME} // DS-Client computer name {DSC_NUMBER} // DS-Client Number {BACKUP_SET_NAME} {BACKUP_SET_OWNER} {BACKUP_SOURCE} // Backup source host name {BACKUP_RUN_RESULT} // Backup activity finished or not, with {N} errors. {USER_NAME} // user that initiated the activity {BACKUP_STATUS} // backup result will return one of the following: {ERROR}, {WARNING}, {SUCCESSFUL}, or {INCOMPLETE}. Specify what appears in the subject line of notification E-Mails for Admin activities (Daily and Weekly). This field has a limit of 256 characters. You can enter any text and combine it with the Admin activity placeholders. When a notification is sent, any placeholder is replaced with the corresponding data from the DS-Client database. If you leave this field blank, a default subject line appears showing DS-Client ({DSC_NUMBER}) {ADMIN_TYPE}. Placeholders are case-sensitive and must be entered between the { } brace characters. Admin activity placeholders: {DSC_NAME} // DS-Client computer name {DSC_NUMBER} // DS-Client Number {USER_NAME} // user that initiated the activity {ADMIN_TYPE} // admin activity type: Daily admin or Weekly admin
Backup activity
Admin activity
F1 (Context-Sensitive) Help
Admin E-Mail
Specify the Administrator's E-Mail address. DS-Client can send notifications to multiple E-Mail addresses if you separate them with a comma (,) or semicolon (;). Test: Click this button to test the notification configuration. DS-Client will send a notification to the destination E-Mail(s). Check the E-Mail account(s) to verify the configuration works. If the Administrator can be paged by E-Mail, specify the pager E-Mail address. The format of this field is the same as for Admin E-Mail. DS-Client can send notifications to multiple E-Mail addresses if you separate them with a comma (,) or semicolon (;). Test: Click this button to test the notification configuration. DS-Client will send a notification to the destination E-Mail(s). Check the pager(s) to verify the configuration works. This will send a summary E-Mail to the Admin E-Mail account. It will contain a summary of Admin process information and backups processes (since the last Daily / Weekly Admin process). Includes the backup details with the summary. (Send summary must be selected.)
Pager E-Mail
Daily / Weekly Admin Setup section Send summary Send backup details
Send E-Mail using HTML (E-Mail only). Check this box to send the summary in HTML format. Otherwise, it Format will be sent in plain text format.
CDP Strategy
F1 (Context-Sensitive) Help
Choose what to do with the DS-Client database dump file: Do not delete: The file remains in the DS-Client Buffer until it is overwritten. Delete after successful backup: The file is deleted after it has been successfully backed up to the DS-System. Always delete: The file is always deleted after a Daily Admin or Weekly Admin. For more information, see the Knowledge Base article: Administrative Processes on page 491. Choose the period that you would like to maintain System Logs on the DS-Client. You may select either six months, or from one to seven years. If the connection between the DS-Client and DS-System is lost during a backup, the DS-Client will automatically attempt to reconnect this number of times. (Note: A zero value means no reconnection will be attempted.) Note: This applies to Scheduled and On-demand backups. Shows the interval (in minutes) between reconnection attempts. On: (Default) If selected, DS-Client skips running a pre-scan on all scheduled backup sets (this makes the process faster). Off: Uncheck to force a pre-scan for all scheduled backup sets. Note the potential performance implications, however you will be able to view an estimated completion time for each scheduled backup set in the Process Window screen. Specify the local disk location that DS-Client will use to save Use Buffer dumps and its own Database dumps (from Daily/Weekly Admin activities). Grid DS-Clients: This is the Global Setting for all nodes of the Grid DS-Client. To change the buffer for each node individually, click on the Advanced Tab (DS-Client Configuration Advanced Tab screen). For more information see DS-Client Knowledge Base Article "DS-Client Buffer". Specify the default path that will be used for backup sets configured to use one of the features that require a local storage path (Self-Contained Backup Sets, Local-Only Backup Sets, Save on Local Storage, Use Local Storage Cache). This option is enabled per backup set (Set Properties - Options tab). IMPORTANT NOTE: Backup sets that use any local storage location require an extra table in the DS-Client database in order to manage the data stored on the DS-Client side. Make sure enough space is allocated for the DS-Client database when using any feature that requires a local storage path.
Keep DS-Client logs Backup Options Attempt to reconnect [...] times Intervals
DS-Client Buffer
F1 (Context-Sensitive) Help
Register Now
Encryption setup section This section shows whether the DS-Client's encryption keys are set. Once set, they cannot be changed. DS-Client private key set Account key Key used to encrypt files specific only to your DS-Client. Each DS-Client has a unique key, but DS-Clients from the same Customer share a common Account Key.
Encryption key safeguard section This section allows you to decide the Encryption Key safeguard policy. Enable encryption key forwarding to DS-System Forward Now Request Deletion Check to enable DS-Client to forward its encryption keys to the DSSystem. They will be stored in the DS-System database, in an encrypted format. DS-Client private key: indicates if this key has been forwarded. Account key: indicates if this key has been forwarded. Forward the key(s) immediately to the DS-System. Instruct DS-System to delete the forwarded encryption key(s) from its database.
Destination Host List Add Edit Remove Send Traps as heartbeats every ...
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
F1 (Context-Sensitive) Help
Notes 1) Load the asigra.mib file (found in the DS-Client installation directory) with your SNMP software to receive the traps sent by DS-Client. 2) Trap Contents (For OID description, refer to "asigra.mib" file.) Trap Contents for heartbeat timestamp sender's IP Address sender's OID Varbind OID Type Data OID for the heartbeat Integer 0 trap time DS-Client IP OID for "DS-System Traps"
Trap Contents for others timestamp sender's IP Address sender's OID Varbind OID Type Data is a flag OID for the specific event Integer 0: New event, 1: Repeat event. trap time DS-System IP OID for "DS-System Traps"
Event List
Select by
F1 (Context-Sensitive) Help
This screen also permits an administrator to send messages to users and disconnect users from the DS-Client System. It is important to note that this screen is a snapshot of the activities on the system at the current moment. This screen is useful as a troubleshooting tool.
Node ID (Grid DS-Client) Select which Node of the Grid DS-Client to view.
Cached Buffers Number of cached buffers. (Windows DS-Client) In KB/Sec Shows rate that data is being received to indicate the throughput on the DS-Client. (Windows DS-Client) Out KB/Sec Shows rate that data is being sent to indicate the throughput on the DS-Client. (Windows DS-Client) Refresh Click this button to update the display. This screen contains the following tabs: Network Connections Tab Database Connections Tab Message Queues Tab (Windows DS-Clients) Threads Tab (Windows DS-Clients) CORBA Connections Tab (Linux / Mac DS-Clients)
Tabs
Network Connections Tab Connection List Type: Type of connection that has been established (ex: Backup, Restore, User). Name: Name of the user associated with the network connection. In Queue: Position where the connection stands in the receive message queue (if applicable). Out Queue: Position where the connection stands in the send message queue (if applicable). Create Time: Time when the connection was established. Description: Shows more detailed information about the connection, such as backup destination (if applicable). ID: Connection ID number for the highlighted connection. Send Message Disconnect Cached Buffers (Linux DS-Client) In KB/Sec (Linux DS-Client) Out KB/Sec (Linux DS-Client) Click to bring up the Enter Message screen. A message will be sent to the highlighted user(s). Click to disconnect the highlighted user(s). Number of cached buffers. Shows rate that data is being received to indicate the throughput on the DS-Client. Shows rate that data is being sent to indicate the throughput on the DS-Client.
Database Connections Tab Connection List In Queue: Place where the process stands in the receive message queue (if applicable). Process Start: Time when the process began. Name: Name of the process in the message queue. Description: Contains details about the connection (if available). ID: Connection ID associated with the process. Message Queues Tab (Windows DS-Clients) Queue List In Queue: Place where the process stands in the receive message queue (if applicable). Process Start: Time when the process began. Name: Name of the process in the message queue. ID: Connection ID associated with the process.
F1 (Context-Sensitive) Help
Threads Tab (Windows DS-Clients) Thread List Thread ID: Unique thread ID. ID: Connection ID associated with the process. Description: Shows details of the process. CORBA Connections Tab (Linux / Mac DS-Clients) This tab is specific to SAP backup sets. CORBA Connection List User: User who is logged into DS-Client. Objects: Internal CORBA ID. IOR: Internal CORBA ID.
DS-NOC Settings
This screen only displays information if this DS-Client is being monitored by a DS-NOC server. These settings are configured on the DS-NOC and pushed to this DS-Client through the DS-System.
DS-NOC Settings This section is Read-Only. Monitored by DS-NOC DS-NOC Address DS-System Name Connection Frequency (to DS-NOC) Retry When Failure (to connect to DS-NOC) Last Connection (to DS-NOC) Last Successful (connection to DS-NOC) Proxy Server Check New Settings Connect to DS-NOC Configure this DS-Client to use a proxy server to connect to the DS-NOC. Connects immediately to the DS-System to obtain the latest settings. (DS-Client will check for updated settings on every connection to DS-System.) Connects this DS-Client to the DS-NOC server to update its monitoring information.
F1 (Context-Sensitive) Help
Auto-detect proxy If selected, DS-Client will try to find the Proxy Server automatically. settings for this network For more details, see: Auto-detect Proxy Server on page 301. Manual proxy configuration If selected, you must enter the address of the Proxy Server in the corresponding fields, including the port number to use. Use the same proxy server for all protocols: Select to use only one Proxy Server address and port number for both HTTP and HTTPS connections. For more details, see: Manual Proxy Server Configuration on page 301. If selected, you must enter a URL to a Proxy Auto Configure file accessible to the DS-Client. The DS-Client will obtain the proxy server address and port number to use from this file. Enter the full URL in this field, starting with http:// For more details, see: Automatic Proxy Server Configuration URL on page 302.
Server requires authentication If required, supply the credentials to the Proxy Server here. User Name Password Confirm
Logon using security context These options are for Windows DS-Client only. The network credentials used are only for logging into the DS-Client (local or remote). They are not used for creating backup sets. Creating backup sets always requires input of specific user credentials. For more information, refer to the Knowledge Base Article Logon using security context on page 455.
F1 (Context-Sensitive) Help
Target Name
(Optional - this field can be left blank, particularly if you are only connecting to the local DS-Client.) The name in this field is only used if this DS-User GUI is connecting to a DS-Client located in a Windows Domain. The default Target Name is CloudBakSvc. You must have your network administrator create and register this Target Name (or any other name you choose to use) with Active Directory using a tool like Microsoft setspn.exe provided with Windows Support Tools. This is an advanced configuration option that requires the assistance of a network administrator. For more information, refer to the Knowledge Base Article Logon using security context on page 455. This configures how this installation of the DS-User GUI will behave when it launches. Last DS-Client: This DS-User GUI will search for the last DS-Client it successfully connected with. If that DS-Client is not available, the DS-User will prompt the user to choose the desired DS-Client. Local DS-Client: This DS-User GUI will search for the local DS-Client. If the local DS-Client is not available, the DS-User will prompt the user to choose the desired DS-Client. Last or Local DS-Client: This DS-User GUI will search for the last connected DS-Client first. If the last connected DS-Client is found, DS-User will attempt to connect using the already logged on user credentials from the current Windows login session (provided that the same username and password is provided). If however, the last connected DS-Client is not available DS-User will connect to the local DS-Client using the current security context. Local or Last DS-Client: (Default) This DS-User GUI will search for the local DS-Client first and connect using the current security context. If the local DSClient is not found, DS-User will attempt to connect to the last connected DSClient using the current security context (provided that the same user network credentials are used, and that the local user exists on the remote DSClient, and appropriate user permissions are there in the remote DS-Client). Disabled: Users can select this option to turn off the auto-connect functionality. Users will see the Connect to DS-Client Service screen at GUI startup.
Auto-connect
F1 (Context-Sensitive) Help
Logon using security context These options are for Windows DS-Client only. The network credentials used are only for logging into the DS-Client (local or remote). They are not used for creating backup sets. Creating backup sets always requires input of specific user credentials. For more information, refer to the Knowledge Base Article Logon using security context on page 455. (Optional - this field can be left blank, particularly if you are only connecting to the local DS-Client.) The name in this field is only used if this DS-User GUI is connecting to a DS-Client located in a Windows Domain. The default Target Name is CloudBakSvc. You must have your network administrator create and register this Target Name (or any other name you choose to use) with Active Directory using a tool like Microsoft setspn.exe provided with Windows Support Tools. This is an advanced configuration option that requires the assistance of a network administrator. For more information, refer to the Knowledge Base Article Logon using security context on page 455. This configures how this installation of the DS-User GUI will behave when it launches. Last DS-Client: This DS-User GUI will search for the last DS-Client it successfully connected with. If that DS-Client is not available, the DS-User will prompt the user to choose the desired DS-Client. Local DS-Client: This DS-User GUI will search for the local DS-Client. If the local DS-Client is not available, the DS-User will prompt the user to choose the desired DS-Client. Last or Local DS-Client: This DS-User GUI will search for the last connected DS-Client first. If the last connected DS-Client is found, DS-User will attempt to connect using the already logged on user credentials from the current Windows login session (provided that the same username and password is provided). If however, the last connected DS-Client is not available DS-User will connect to the local DS-Client using the current security context. Local or Last DS-Client: (Default) This DS-User GUI will search for the local DS-Client first and connect using the current security context. If the local DS-Client is not found, DS-User will attempt to connect to the last connected DS-Client using the current security context (provided that the same user network credentials are used, and that the local user exists on the remote DS-Client, and appropriate user permissions are there in the remote DS-Client). Disabled: Users can select this option to turn off the auto-connect functionality. Users will see the Connect to DS-Client Service screen at GUI startup.
Target Name
Auto-connect
F1 (Context-Sensitive) Help
Terminate Connection after try- DS-User will terminate the connection with DS-Client after it has tried ing [...] times this number of "Keep Alive" probes without response.
F1 (Context-Sensitive) Help
Duplicates screen
LAN STORAGE DISCOVERY TOOL / ONLINE FILE SUMMARY TOOL Shows the duplicate instances of a particular file version (same size, date, etc.). Use this list to manage the redundant data you have. If it is online, you can delete some versions. If it is on the LAN, you may choose to rearrange the location(s) to save space.
Backup Set / Share Name Directory File Backup Time / Last Scan Description Shows the backup set (online) or share (LAN) containing the duplicate file instance. Shows the directory where the file is located. Shows the filename. Shows the backup time (online) or last scan time (LAN). Additional information (if any).
Specify the Service Name. You must know the name of the database you wish to Service (ORACLE) backup.
F1 (Context-Sensitive) Help
the file is valid, you must enter the correct key to unlock the file. Opens the Enter unlock key screen.
NAS NAS Type API Protocol Port Number User Name Password NAS API Parameters and Credentials Specifies the NAS device type, vendor or specific model. Currently supported types: NetApp FAS filers Specifies the protocol for accessing the API. Commonly used protocols are HTTP or HTTPS. The specific protocol must be enabled on the NAS device. Specifies the port number for accessing the API. The specific protocol must be open on the NAS device. Specifies the User Name for a user on the NAS device. This user requires permissions to execute the API commands on the NAS device and usually needs to be a member of the Administrators group. Specifies the corresponding password for the NAS user.
Event Filter
The Event Filter allows you to alter the Event Log by over-ruling an events default severity with your custom setting.
Event Filter List Icon Event # Category Description New Edit Remove OK Shows the severity of the event that occurred: Information message. Warning message. Error message. Contains an event ID code. Shows the category of the message. The category can be any of the categories listed in the event Category drop down list. Displays a description of the highlighted event. Click to add a new event filter. Opens the Add / Edit Event Filter screen. Click to edit the highlighted filter from the Event Filter List. Opens the Add / Edit Event Filter screen. Click to remove the highlighted filter from the Event Filter List. Click to save the settings as configured in the Event Filter List.
F1 (Context-Sensitive) Help
Exclude Event #
Use this screen to edit the list of events that will be excluded from Event Log searches. These exclusions only apply to the current Event Log that is open (it will be reset once you close that screen).
Event # Add Remove Clear You can manually enter an event number in this field. All events that you exclude appear in the exclude list underneath this field. Since event numbers tend to be long, you can use the Select button to choose from all events that occurred in the period covered by the Event Log. Click to add the number in the Enter # field to the exclude list. Click to remove the highlighted items from the exclude list. Click to clear the entire exclude list.
F1 (Context-Sensitive) Help
Select
Click to view all the events for the corresponding Select By period in the Event Log. Opens the Select Event # screen.
Export
(Win32 Only) Use this screen to select the file format, and destination where you would like to export the report data.
Format Destination Choose the format you want to save the report in from this drop down list. Choose where you want the report sent from this drop down list.
Use this screen to export the DS-Client configuration, Backup Schedules, Backup Retention Rules, and Backup Sets to an XML file named config-update.xml.
DS-Client Configuration: exports all settings from the DS-Client Configuration screen tabs (Setup, Defaults, Notification, SNMP, Parameters, Connections, Roles). Backup Schedules: Exports all (or selective) Backup Schedules from this DS-Client. Retention Rules: Exports all (or selective) Retention Rules from this DSClient. Backup Sets: Exports all (or selective) Backup Sets from this DS-Client. [Note: Recovered orphaned backup sets that have not been migrated (or had their backup information for connection, backup items, and schedule re-specified) cannot be exported.] Expands or collapses the list in the Options window. Check to use a Meta Symbol wherever necessary. This will allow the XML file to be used interchangeably in different localization environments. For example: An XML configuration file made from an English installation of DS-Client will also work for a German DS-Client installation. Current Meta Symbols: %ComputerName% - the DS-Client computer name. %MSNetProvider% - the string representing the Microsoft Network Provider that is different depending on the localization of the operating system.
Options
F1 (Context-Sensitive) Help
Check to include the DS-Client Encryption Key and Account Encryption Key in the XML file (they will be encrypted). Click to save the selected items to an XML file. To use this file, make sure it is named config-update.xml, and place it in the folder containing the DS-Client service.
You must select one of the following: Inclusion - to include the files covered by the filter in the time-push. Exclusion - to skip the files covered by the filter (do not push).
F1 (Context-Sensitive) Help
File Filter
You must select one of the following: Filter - specify the filter pattern to apply. Directory - specify the online backup directory where you want to apply the filter. You must enter the full \\share_name\directory_path where the filter will be applied. For example C:\temp\files\ will archive files fitting the filter pattern from that specific path. Each filter must be applied to a specific directory path (do not leave this field blank). Include sub-directories - check to include all the sub-folders in the specified directory. Regular Expression can provide more specific filtering at the filename or file pattern level. However, you must learn the Regular Expression software syntax. Click [>>] to open the Regular Expression screen.
Regular Expression
Rule Options List Each item in the list is a separate file filtering option for this rule. Add Edit Remove Adds a new option to the list for this File Filtering Rule. Edits the selected option in the list for this File Filtering Rule. Deletes the selected option from the list for this File Filtering Rule.
List
F1 (Context-Sensitive) Help
Object List (System i) E-Mail List (DS-MLR) Table List (Backup from the Cloud) Add / Select Exclude
Click to add the highlighted backup item(s) to the Selected Files for Backup List. If this button does not appear, it means this screen is read-only. Click to exclude the highlighted item(s) from the Selected Files for Backup List. (The parent directory must be selected for backup.)
File Info Click to view details about the highlighted file. (Show Archived Files only) Opens the Backup Generations for ... screen.
Directory ID
Search for File name File ID Name/ID From This Session Only Find
F1 (Context-Sensitive) Help
Getting Started
Once you have successfully completed a full installation, you will find all the necessary applications in the corresponding Start Menu or Application folder. The two major applications on your system are DS-Client and DS-User. DS-Client is a service program. It is intended to run in the background at all times (this allows it to perform unattended backups when you are not at the computer). You can start and stop the DSClient with the DS-Client Service Manager. DS-User is the user interface that allows you to create Backup Sets and perform backups and restores using the DS-Client. To use DS-User, you must connect to a DS-Client that is running. You are prompted for your user credentials when you attempt to log into the DS-Client. Use the same credentials as you use to log in to your computer. The first time you successfully connect to the DS-Client, the New Backup Set Wizard pops up automatically. For more information, see Running DS-User and Connecting to a DS-Client on page 26.
Grid Status
[Grid DS-Client] The Grid Status screen gives you a visual display of the nodes on a Grid DS-Client.
This screen can display the following views: Graph View List View Grid Formation Main Node The Main Node will usually be the DS-Client service that started first. Once other Nodes that are configured as part of the Grid DS-Client start, they will join as Leaf Nodes. The Main Node instructs all Leaf Nodes about what activities to perform. It is the only one that listens for incoming DS-User connections. The Main Node also perform backup and restore activities with DS-System. A Leaf Node performs backup and restore activities with DS-System as instructed by the Main Node. It does not listen for incoming DS-User connections. A Leaf Node always maintains an open connection to the Main Node (via TCP port 4410).
Leaf Node
F1 (Context-Sensitive) Help
Graph View
Graph view shows a visual representation of the Grid status. Graph Layout: Select the layout for the graph (Linear or Star). List view shows information from the common Grid DS-Client database, sorted by node. ID: ID of the corresponding DS-Client node. Name: Server name of the corresponding DS-Client node. Address: IP Address of the corresponding DS-Client node. Type: Shows if the node is the Main Node, a DS-Client node (Leaf), or if it is not connected. Status CPU Usage (%) Activities Task Limits Memory Load (%) Memory Commit (MB) Send (Kilobytes/second) Receive (Kilobytes/second) At the bottom of the list is the Grid DS-Client database node.
List View
Allows you to stop the highlighted node in the list. Opens the Stop DS-Client Node screen. Allows you to export the IP Addresses of the current Grid DS-Client. Opens the Export Grid DS-Client Address screen. Refresh every [...] seconds: The graph or list is automatically updated at this interval.
F1 (Context-Sensitive) Help
F1 (Context-Sensitive) Help
Remove
Encryption Keys An encryption key is case sensitive. Its length (in characters) depends on the type and level of encryption selected. DES requires 8 characters, AES-128 requires 16 characters, AES-192 requires 24 characters, and AES-256 requires 32 characters. For better security, do not use dictionary words or proper names, and try to randomly mix numbers in with the letters. Auto-complete feature: If you do not specify the full amount of characters in the Key field, the GUI will fill in the remainder by repeating the string of characters you have entered. (e.g. entering 123 with AES-128 will generate an encryption key of 1231231231231231, or entering a for DES will generate the encryption key aaaaaaaa). Keep the key(s) in a secure location. Your ability to select the same encryption type and re-enter the same key is necessary if you ever need to reinstall your DS-Client to a new computer (e.g. if the computer is destroyed in a disaster). You must set a private key for this DS-Client. Backup data from your DS-Client installation will be encrypted with this key. Type: Select from the available types. Stronger encryption requires longer keys. Key: Enter the key. Confirm: Re-enter the key to verify the string is correct. You cannot change this key once it is set. You must set an account key if more than one DS-Client belongs to your customer account. Common backup data from all your DS-Client installations will be encrypted with this key. Once the account key is set, all DS-Clients from this customer must be configured with that same account key. Type: Select from the available types. Stronger encryption requires longer keys. Key: Enter the key. Confirm: Re-enter the key to verify the string is correct. You cannot change this key once it is set.
Private Key
Account Key
Allow encryption key forwarding to DS-System Check to have DS-Client forward the encryption key(s) to the DS-System the first time it connects with DS-System. NOTE: If you forward the keys, they will remain encrypted on the DS-System. However, your Service Provider will be able to create a valid .CRI file containing the encrypted keys. This file will be able to recreate a working version of this DS-Client. Make sure this conforms to your security policies before enabling this option.
F1 (Context-Sensitive) Help
The Discovery Wizard helps you to identify all the unprotected resource (shares) on your LAN. This screen allows you to specify which credentials to use when connecting to the shares on the LAN.
Credentials List Lists the credentials to use for the Discovery Scan Process. It is highly recommended that you supply network administrator-level credentials in order to successfully scan the selected shares. Connect As: Shows the username. From: Shows the domain or computer name of the user credential. Leave blank to use the corresponding user account on the local computer (where the Discovery process is attempting to scan). Priority: Shows the order of credentials that the DS-Client will use to attempt to scan each share. If the highest priority credentials fail, the DS-Client tries the next in line until it succeeds (or runs out of additional credentials). Add Modify Delete Click to add a new credential entry. Opens the Set Credentials screen. Click to modify the highlighted credential entry. Opens the Set Credentials screen. Removes the highlighted credential from the list.
Listening Ports
This screen shows the default port used by the listed Asigra Cloud Backup component.
Port List Listening Server Client Port This component listens on the corresponding default port for connections from the client-component. This component initiates connections on the corresponding default port to the server-component. This shows the default setting. It does not change if you modify the port.
F1 (Context-Sensitive) Help
Shows the type of activity. Shows the User Name of the Owner of the Backup Set (i.e. an administrator might perform an action on a set owned by someone else). Shows the node, and backup set name. Shows the number of errors that occurred during the activity (if any) in red. Shows the date and time the activity started. Shows the time of day the activity ended. Shows the number of files that were affected by the activity. Shows the amount of data affected by the activity. (This may be slightly more than the actual file size, due to file security, permissions or other backup options applied to the backup file.) Shows the completion status of the corresponding activity: Blank column: activity successfully closed connection with DS-System. No Connect: activity failed to connect to the DS-System. With errors: activity contained errors (but completed successfully). Incomplete: activity did not finish completely and/or failed to close its connection with DS-System properly.
Completion
Node ID Select which Node of the Grid DS-Client to view. (Grid DS-Client) Series Allows you to add or remove information displayed in this screen. Opens the Load Summary Series screen.
F1 (Context-Sensitive) Help
DS-Client stores a hardware cookie of the Local DS-VDR Tool computer on the first connection from the tool. On each subsequent connection, DS-Client will verify the cookie to ensure connection from the same installation. Reset Hardware Cookie You only need to reset the cookie if you change the Local DS-VDR Tool (to another installation) or if you alter the hardware on the existing Local DS-VDR Tool machine. Test Connection Click to test the DS-Clients connection with the Local DS-VDR Tool at the IP address listed in the Local DS-VDR Tool IP field. The results of the test are displayed in a text message at the bottom of this screen. Click to update the Local DS-VDR Tools database with the DS-Clients current Local DS-VDR backup set configurations. This process is also run automatically with the DS-Clients Daily Admin or Weekly Admin.
Synchronize Database
You may specify a maximum online storage amount in this field. User limits apply to specific users, Group limits apply to each user who is a member of the specified Group (e.g. all Users in a Group with a 100MB limit would have a 100MB limit). To access this field, turn the No Limit check box off. Online storage limit Note: The online amount is tracked during backups, by taking the current online (MB) amount and adding the new backups. Once the online limit is reached, the backup will stop (even if it is not completed). However, if two backup sets of the same user are scheduled concurrently, the DS-Client will allow both backup sets to use up the full remaining online amount. This means it is possible for the online storage to exceed the maximum online limit.
F1 (Context-Sensitive) Help
The Migrate Backup Set Wizard uses the same dialogs as with creating a new backup set. You follow the same steps as creating a backup set, with the exception that you are in fact specifying a new path from which the DS-Client will look for the backup files. This screen is intended to match the share(s) on the source computer, with the share(s) on the destination computer. (In the case of databases, you must match each database instance from the source to the destination computer.)
Source Destination Shows the current source share of the selected backup set. Double click on this cell to bring up a drop down list, containing all of the shares on the selected destination node. Select the share where the source data has already been moved to.
F1 (Context-Sensitive) Help
Click to add a Complexity Constraint to the list. Opens the Add / Edit Complexity Rule. Click to edit the highlighted Complexity Constraint from the list. Opens the Add / Edit Complexity Rule. Deletes the highlighted Complexity Constraint from the list. Click to save or update this Password Rotation Rule.
DS-Client Role
F1 (Context-Sensitive) Help
Keep one generation every month When this rule is enforced, the most recent generation from each on or before the [x] day at [time] interval is kept. Keep one generation every year on When this rule is enforced, the most recent generation from each or before the [x] day of [month] at interval is kept. [time] Select the retention options length (the time span it covers). At least one generation interval must fit into this retention length. By default, this period is 1 week. If you select a time retention option that spans a longer period, you should extend this value to at least match that period.
Note: When selecting the option Keep one generation every <n> years, the generations will be considered for the interval between January 2nd 00:00 until January 1st 23:59:59 next year. This may not be what is expected by users (e.g. January 1st 00:00 to December 31 23:59:59 same year). Instead, users can implement retention with the rule keep one generation every year..., where users can specify the start date and time of the interval (e.g. Last day of December at 23:59:59 for an interval between January 1st 00:00 and December 31st 23:59:59). Note that if you can specify the start date for a retention option, it will count backwards from that date by the specified interval.
F1 (Context-Sensitive) Help
Category
Files Files (%) Size (MB) Size (%) Last ... days
All files Duplicate files - Total number of files that have more than one copy, minus one for each unique common file group. Duplicate groups (LAN File Summary only) - Number of unique common file groups. All identical files are members of a unique file group. Changed and new files - Files that are new or different from the start of the search period. Unchanged files - Files that have not changed since the start of the search period. Not accessed files - (LAN File Summary only) Files that have not been accessed since the start of the search period. Number of files. Percentage of the total number of files. Size of the files. Percentage of the total size. Displays results for the last number of days specified.
Filtered View The content of this section is based on the filters applied at the bottom of the screen (filter, category, duplication, totals, share/set). It is updated each time you click Find. Online File Summary: for each row, a file is only counted once (even if there are multiple generations of that file). All - Shows all the categories in the Filtered View list. All files - Shows the total number of files that fit the selected filter(s) in the corresponding backup set (Online File Summary) or share (LAN File Summary). Duplicate files - Total number of files that have more than one copy, minus one for each unique common file group. Duplicate groups (LAN File Summary only) - Number of unique common file groups for the corresponding scope. All identical files in the corresponding scope are members of a unique file group. The scope can be the sum of the whole Filtered View, or a more specific part, like an individual share. Changed and new files - Files that are new or different from the start of the search period. Unchanged files - Files that have not changed since the start of the search period. Not accessed files (LAN File Summary only) - Files that have not been accessed since the start of the search period. Number of files. Percentage of the total number of files. Percentage of the total number of files (from the Global View at the top of the screen). Size of the files. Percentage of the total size. Percentage of the total size (compared to the Global View at the top of the screen).
Category
Files Files (%) Files (% of Global) Size (MB) Size (%) Size (% of Global)
Backup Set / Share Shows the corresponding backup set or share name. Name Filter Category Duplication Totals only Share / Set Allows you to search exclusively for files matching the specified pattern (e.g. *.doc). Allows you to narrow your search by type of files (All, Duplicate, Changed & New, or Unchanged). Allows you to narrow your search by the duplication level (e.g. "2" means there must be at least two copies (duplicates) of the file on the selected share/set). Check this box to display only the totals (it will be faster). Allows you to search only a specific share/set (faster). Click the >> button to browse the network.
F1 (Context-Sensitive) Help
Allows you to add an additional filter based on backup set type. Opens the Backup set type screen.
Status (Online File Shows the status of the online search. Summary only) Find Details Chart Click to search (update the screen) based on your selections. Opens the Details screen for the highlighted item in the list. Click to see a chart based on your selections.
Status
F1 (Context-Sensitive) Help
Click to edit the highlighted user from the Managed Passwords List. Opens the Password Management - User Details Tab. Deletes the highlighted user from the Managed Passwords List. NOTE: You cannot remove a user if it is associated with any backup sets. Remove the backup set associations first. Click to rotate the highlighted users password immediately. The change is reflected in the Last Updated column.
Password
Note(s) This area allows you to enter text for any notes you wish to leave about this user account.
F1 (Context-Sensitive) Help
Permissions screen
Use this screen to view, add, or remove permissions for the selected backup set to other users / groups.
Permissions List Each entry in this list represents permissions for this backup set that are granted to that user or group. The backup set owner and users with the DS-Client Administrator role automatically have all permissions to any backup set even though they are not listed here. Users with the DS-Client Backup Operator role have backup permission to any backup set. Icon Name Description Domain Type Add Edit Remove Shows what the corresponding entry refers to: a specific user a group Shows the name of the user or group. Shows a description (if any) of the user's full name or the function of the group. [Windows only] Shows the domain or server where a user or group is defined. Shows the types of permissions allowed to the respective user or group. The codes represent (B)ackup, (R)estore, (M)odify, and (D)elete. Click to give a specific user or group permissions to this backup set. Opens the Add / Edit Permissions for a User or Group screen. Click to edit the user or group selected in the Permissions List. Click to remove the user or group selected in the Permissions List.
Run command
F1 (Context-Sensitive) Help
Stops the Service specified in the Command field. Starts the Service specified in the Command field. Runs the command batch file specified in the field on the remote NetWare server. All the rules for running NCF from the console are applied - if the NCF is not in the search path, you must provide the full path (sys:dir_name\name.ncf). The NCF file must be in 8.3 name format, since the console does not understand long file names. (Must have Console Operator Rights.) Unloads the NLM (NetWare Loadable Module) specified in the field. (Must have Console Operator Rights.) Loads the NLM (NetWare Loadable Module) specified in the field. (Must have Console Operator Rights.) Enter the command to perform. For Services, type the service name or use the >> button to select the service. Command Execution Results - You may specify conditions, based on the results of the command execution: On exit code (Local commands) - Specifies the condition to be = (equal) or <> (not equal) to the exit code in the field to the right. This is useful if you know that the command will produce a particular exit code when finished. On file existence - Specifies the condition to be whether a particular file exists or not. Enter the full path (include the drive on local machines; include the share but not the server on remote machines) in the field to the right. On output string (Local commands & UNIX only) - Specifies the conditions to be whether the command output contains a particular string or not. Enter the string (case sensitive) in the field to the right. (If the output is large, only the first 16K are checked for occurrences of the string.) On execution success - Specifies the condition applies if the command succeeds to execute. On execution failure - Specifies the condition applies if the command fails to execute. Or execution failure - Allows you to combine either the Exit Code, File Existence or Output String conditions with the Execution Failure condition. Will not perform the Post Activity on fulfillment of the Command Execution Results. Will not perform the backup/restore on fulfillment of the Command Execution Results.
Allows you to delay the backup/restore. This is useful in cases where the Delay Backup/Restore [...] command activates background processes responsible for creating data for Sec backup. Also allows time for the pre activity to terminate properly. Perform this activity after backup / restore Each of the following activities are the same as for Pre-Backup: Run command. Stop service. Perform this Activity After Start service. Backup. Run NCF (NetWare). Unload NLM (NetWare). Load NLM (NetWare). Command Field Enter the command to perform. For Services, type the service name or use the >> button to select the service.
F1 (Context-Sensitive) Help
Will not perform the Post Activity if the backup / restore: Always perform - Will always perform the Post Activity. Don't perform Post activity Successful - Will not perform if the backup/restore was successful. if With errors - Will not perform if the backup/restore had errors. Incomplete - Will not perform if the backup/restore was incomplete. Click to test the command in the Pre or Post section. A results screen appears, displaying whether the command executed, the exit code, and the Execution condition. NOTES: 1. Do not use Test Pre with the Delay option, since a delay of over 60 seconds will result in a Timeout message. 2. Using Test with some Pre/Post commands like Stop Service/Start Service, will only accomplish the first part (i.e. only the Pre command), effectively rendering a service 'stopped' until manually restarted.
Do not perform post activWill not perform the Post Activity on fulfillment of the exit code condition. ity After backup Execute Test Execute after data has been copied to DS-Client buffer (if applicable) Before restore Execute Test On exit code Do not perform restore Enter the command to perform. Click to test command You may specify conditions, based on the results of the command execution: On exit code (Local commands) - Specifies the condition to be = (equal) or <> (not equal) to the exit code in the field to the right. This is useful if you know that the command will produce a particular exit code when finished. Will not perform the restore on fulfillment of the exit code condition. Enter the command to perform. Click to test command (Only for backups sets with the Use buffer option selected.) Select to perform the Post command immediately after the data has been copied to the DS-Client buffer. The default setting (if not selected) is to perform the Post command after full backup completes.
Do not perform post activWill not perform the Post Activity on fulfillment of the exit code condition. ity After restore Execute Enter the command to perform.
F1 (Context-Sensitive) Help
Test
Leave all fields on the right blank. DS-Client will not Start a remote program. (Including programs that wait for the program to close. However, it will know require interaction.) DS-Client will not wait for the if the program has been submitted for execution. program to close: (This allows you to check for the exit code.) Start a remote program. (Including programs that Select "Don't perform Post" and/or "Don't perform require interaction.) DS-Client will wait for the pro- backup". If the program requires interaction, DS-Cligram to close: ent will wait until the program is closed. Leave all fields on the right blank. DS-Client will not Run a remote batch file. DS-Client will not wait for wait for the batch file to finish. However, it will the results: know if the batch file has been submitted for execution. Select either "Don't perform Post", or "Don't perform Run a remote batch file. DS-Client will wait for the backup", or both. DS-Client will wait until the batch results: file finishes the execution. Check for exit code, file existence, output string, etc. To apply an (unconditional) delay: To Start/Stop a service: Select from the appropriate radio button or checkbox. Select "On execution success" and check "Or execution failure", and select the delay in seconds. Enable the Stop / Start Service option. Select the Service using the >> button.
If you want to run a local program (on the DS-Client Call ASIGRA Inc. for assistance. machine):
Node/Set
F1 (Context-Sensitive) Help
Set Type
You can select any or all of the following type(s) of backup sets to include in this report: Regular: [Default is on.] Includes data from all regular backup sets. Statistical: Includes data from all statistical backup sets. Self Contained: Includes data from all current self contained backup sets. Local-Only: Includes data from all Local-Only backup sets. Deleted: Includes data from all deleted backup sets (regular, statistical, self contained, and Local-Only). This uses data from the Activity Log. Local DS-VDR: Includes data from all Local DS-VDR backup sets (DS-System data storage and transmission amounts do not apply). (Multi-Tenant DS-Client only) Select from the list of available customers. This report will show only data from the selected customers backup sets. If no customers have been defined (Setup Menu > Multi-Tenant: Customer Management), you will only have the <N/A> selection.
Customer
Set Type
Customer
F1 (Context-Sensitive) Help
Set Type
You can select any or all of the following type(s) of backup sets to include in this report: Regular: [Default is on.] Includes data from all regular backup sets. Statistical: Includes data from all statistical backup sets. Self Contained: Includes data from all current self contained backup sets. Local-Only: Includes data from all Local-Only backup sets. Deleted: Includes data from all deleted backup sets (regular, statistical, self contained, and Local-Only). This uses data from the Activity Log. Local DS-VDR: Includes data from all Local DS-VDR backup sets (DS-System data storage and transmission amounts do not apply). Opens a preview of the report. You can print from the preview.
OK
Set Type
OK
Set Type
OK
F1 (Context-Sensitive) Help
Set Type
OK
Set Type
OK
F1 (Context-Sensitive) Help
Note: You will only be able to print reports for backup sets to which you have sufficient rights.
DS-Client(s) Report Selection You can select any or all of the following type(s) of backup sets to include in this report: Regular: [Default is on.] Includes data from all regular backup sets. Statistical: Includes data from all statistical backup sets. Self Contained: Includes data from all current self contained backup sets. Local-Only: Includes data from all Local-Only backup sets. Local DS-VDR: Includes data from all Local DS-VDR backup sets (DS-System data storage and transmission amounts do not apply). Opens a preview of the report. You can print from the preview. Lists the DS-Clients you want to include in the Global Report. [...]: Opens the Select DS-Client (Print Global Report) screen.
Set Type
OK
Set Type
OK
F1 (Context-Sensitive) Help
Use this screen to print or view the Statistical Summary report. This shows useful statistics and compression ratios for backups performed by the DS-Client. Note: You will only be able to print reports for backup sets to which you have sufficient rights.
DS-Client(s) Report Selection User From Date To Date You can search for a specific user (backup set owner). Leave blank to show all users. Enter the earliest date you want to display in this field. No data older than this date will be displayed. Enter the latest date you want to display in this field. No records newer than this date will be displayed. By default, this is set to the current date. Lists the DS-Clients you want to include in the Global Report. [...]: Opens the Select DS-Client (Print Global Report) screen.
Backup set type to include: Regular: [Default is on.] Includes data from all regular backup sets. Statistical: Includes data from all statistical backup sets. Self Contained: Includes data from all current self contained backup sets. Local-Only: Includes data from all Local-Only backup sets. Local DS-VDR: Includes data from all Local DS-VDR backup sets (DS-System data storage and transmission amounts do not apply). Group report by: You must specify how the Statistical Summary will group the information: Machine Backup Set User Update Statistics: Gather new statistics before preview/print - Indicate if you want to update the statistics before you preview or print this report. If checked, each DS-Client will run an Update Statistics Process (part of the Daily/Weekly Admin). This may take some time, depending on the size of the database. OK Opens a preview of the report. You can print from the preview.
Print Report
This is a common print screen for the following reports: Backup Sets Backup Users Restorable Volume Backup Items Note: You will only be able to print reports for backup sets to which you have sufficient rights.
Report Selection You can select any or all of the following type(s) of backup sets to include in this report: Regular: Includes data from all regular backup sets. Statistical: Includes data from all statistical backup sets. Self Contained: Includes data from all current self contained backup sets. Local-Only: Includes data from all Local-Only backup sets. Local DS-VDR: Includes data from all Local DS-VDR backup sets (DS-System data storage and transmission amounts do not apply). (Multi-Tenant DS-Client only) Select from the list of available customers. This report will show only data from the selected customers backup sets. If no customers have been defined (Setup Menu > Multi-Tenant: Customer Management), you will only have the <N/A> selection.
Generated on: 10/15/12 Page: 805
Confidential.
Set Type
Customer
F1 (Context-Sensitive) Help
Print: Sends the report directly to the printer. Print Preview: Opens a preview of the report. Printer Setup: Opens the Windows Print Setup OK: Opens a preview of the report. You can print from the preview.
Print Spreadsheet
Use this screen to print the contents of a spreadsheet. You can print all the rows, or only a selected range of rows.
Header Print All Print Selection Print Row Nums Print Colors From Row To Row Type a title for the printout. Select to print all of the rows of the spreadsheet. Select to print only a range of rows, as defined in the From Row and To Row fields. Check to print row numbers on the printout. Check to print the spreadsheet in color or shades of gray, depending on your printer. If this box is unchecked, there is very little shading; most of printout is black and white. Enter the first row you want to print. Leave this field blank to print all the rows. Enter the last row you want to print. Leave this field blank to print all the rows.
Customer
Backup set type to include: Regular: [Default is on.] Includes data from all regular backup sets. Statistical: Includes data from all statistical backup sets. Self Contained: Includes data from all current self contained backup sets. Local-Only: Includes data from all Local-Only backup sets. Group report by: You must specify how the Statistical Summary will group the information: Machine Backup Set User Update Statistics: Statistics updated on - Shows the last time when the DS-Clients statistics were updated. Gather new statistics before preview/print - Indicate if you want to update the statistics before you preview or print this report. If checked, DS-Client will run an Update Statistics Process (part of the Daily/Weekly Admin). This may take some time, depending on the size of the database.
F1 (Context-Sensitive) Help
OK - Previews the report, as it will appear when printed. A print icon appears in the preview. Print - Prints the entire report. Print Preview - Allows you to preview the report, as it will appear when printed. Printer Setup - Opens the Windows Print Setup screen.
Working On Section Note: Since most processes are multi-threaded, they may finish faster than the GUI can refresh the screen. Shows the item currently being processed. Since only one item can appear in this field at a time, not all files processed can be displayed and only larger files have the probability of appearing. Percentage bar: Shows the progress of the current item being processed. This only appears if the files processing time is long enough to be visually represented. Shows the last directory scanned. Note: This is independent of the file that is displayed as being processed. Shows the backup set (including the network resource). Shows the total amount of data processed so far. Shows the total number of files processed so far. Shows the total amount of data left to process. Shows the total number of files left to process. Shows any relevant status comments about the activity If the percentage bar appears, it shows the progress for the overall process. Shows the number of warnings that occurred during the activity (if any). Shows the number of errors that occurred during the activity (if any). Click to view the event log, which shows any error information about the session. Shows the time that has elapsed since the beginning of the activity. If you chose to run PreScan in the Select Files for Demand Backup Dialog Box, a second time counter appears to display the estimated time remaining for the activity. Shows the data transfer rate between the DS-Client and the network resource. Note: For some processes (e.g. delete) this rate is measured in Files per second.
File
Dir Set Details Section Total Amount Total Files Amount Left Files Left Status Progress Warnings Errors Event Log Statistics Section Digital Time Counter(s) KB/sec
F1 (Context-Sensitive) Help
Shows the Backup Set's name. You can change this field, to change the name of the backup set. In some cases you may be forced to choose an Owner or Network Provider (ex: if there are more than one user/network provider computer available with the same name).
Match Options The default Match Options are to EXCLUDE the expression, with Case Sensitive filtering, against files and directories. Case Sensitive [Default is selected.] Indicates if the expression matching is CaSE sENsitIVe. Negates the expression. This means it will exclude any files not matching the Regular Expression. This has the effect of permitting the negated expression to be backed up. This option only works at the individual file level (not on directories). For example, negating the pre-defined .*\.tmp expression allows you to exclude any files that do not have the .tmp extension. Inverts the Regular Expression to filter for the specified pattern. If you add one Inclusion to a backup sets Selected Items for Backup List, only files matching the inclusion will be backed up. No other files will backed up, unless additional inclusion expressions are added. For example, selecting this option with the pre-defined .*\.tmp expression allows you to include all .tmp files from the shares and directories selected for backup. Add multiple Inclusion expressions to search for only the specified names or patterns. Select what this Regular Expression will filter: files and directories: Not available with the Negate option. files only Check the Regular Expression against a string you enter in this field. Click the check icon to verify if this string matches the Regular Expression.
Negate
Inclusion
Example: To exclude a specific filename from the backup, use \\filename\.ext$ (e.g. \\cache\.dsk$ will exclude the file cache.dsk). Source code and some documentation available from: http://www.boost.org (search the site for regex). Some of the syntax and semantics of the regular expressions supported by boost:regex are described below. Regular expressions are also described in the Perl documentation and in a number of other books, some of which have copious examples. Jeffrey Friedl's "Mastering Regular Expressions", published by O'Reilly, covers them in great detail. The description here is intended as reference documentation.
F1 (Context-Sensitive) Help
A regular expression is a pattern that is matched against a subject string from left to right. Most characters stand for themselves in a pattern, and match the corresponding characters in the subject. As a trivial example, the pattern The quick brown fox matches a portion of a subject string that is identical to itself. The power of regular expressions comes from the ability to include alternatives and repetitions in the pattern. These are encoded in the pattern by the use of meta-characters, which do not stand for themselves but instead are interpreted in some special way. There are two different sets of meta-characters: those that are recognized anywhere in the pattern except within square brackets, and those that are recognized in square brackets. Outside square brackets, the meta-characters are as follows:
\ ^ $ . [ | ( ) ? * + { general escape character with several uses assert start of string (or line, in multiline mode) assert end of string (or line, in multiline mode) match any character except newline (by default) start character class definition start of alternative branch start subpattern end subpattern extends the meaning of ( also 0 or 1 quantifier also quantifier minimizer 0 or more quantifier 1 or more quantifier also "possessive quantifier" start min/max quantifier
Part of a pattern that is in square brackets is called a "character class". In a character class the only meta-characters are:
\ ^ [ ] general escape character negate the class, but only if the first character indicates character range POSIX character class (only if followed by POSIX syntax) terminates the character class
F1 (Context-Sensitive) Help
Flags the DS-Client Database to be restored. (On Linux/Mac DS-Clients, there is no separate dsdelta database.) The last backed up version of the dsclient database DS-Client database will be restored. (Linux/Mac DS-Client) Refer to the User Guide instructions and related DS-Client Knowledge Base Articles before executing this option. Opens the Backup Set Recovery screen, which displays any backup sets found by Orphaned backup sets the last Weekly Admin process to exist on the DS-System, but not in the DS-Client database. (Orphaned sets are found by the Weekly Admin. process.) OK Click to recover to specified radio button item. WARNING: Once you click OK for database recovery, the process starts, and your existing database(s) will be replaced. This operation cannot be undone.
F1 (Context-Sensitive) Help
Right-mouse click menu: New Retention Edit Retention Delete Retention Expand All Collapse All Assign to Retention (backup set level)
[Default is selected.] Special files are the separate items that can be selected when backing up a file sysArchive special files tem (System State, Services Database, NDS, etc.). (Windows DS-Client) If selected, the special files in a backup set that qualify as old data are allowed to be archived.
F1 (Context-Sensitive) Help
[Archive special files must be selected. Default is selected.] Do not archive latIf selected, the latest generation of all special files (e.g. System State) is kept est generation of online. If not selected, any special files that qualify as old data will be archived. special files Select this option if this Retention Rule will be applied to any backup set that is (Windows DS-Client) used for Bare Metal Restore (BMR).
Local Storage retention This option is only available if the DS-Client has the Local Storage Tool enabled. Selections in this section affect the data that is stored in the local storage of the DS-Client. This option only applies to Regular Backup Sets configured with the Use Local Storage option. (It does not apply to Local-Only backup sets.) This option changes the behavior of the Local Storage Tool. Off: When this option is off, only the latest generation of a backup file is kept in the Local Storage directory. On: When you check this option, the DS-Client will store the same amount of generations in the Local Storage directory as are stored in the DS-Systems online storage. If selected, this wizard displays the Retention Rule Wizard - Local Storage Retention Options screen.
F1 (Context-Sensitive) Help
Component data integration options for VSS-aware backup sets [Windows DS-Clients only] These options only apply to VSS-aware backup sets. VSS-aware backup sets are "component" based. A component is: a database for Microsoft SQL Server a Storage Group, database, or other components for Microsoft Exchange Server a Virtual Machine for Hyper-V an OSearch, SPSearch or SQL database component for SharePoint Unreferenced file: A component consists of a group of files that are "integrated" together. If an individual file is not referenced by any component, it is "unreferenced" and is useless for component-level restore. However, it can be restored as a pure file (for troubleshooting purposes, etc.). Incomplete component: If any referenced file is missing from a component, that component is "incomplete" and cannot be restored (however the included individual files can still be restored as pure files). Unreferenced files and incomplete components are usually useless and should be removed. However, you may want to keep them for some reason (e.g. to restore as pure files to manually fix the component, or if the files might be referenced later). Delete unreferenced files: If selected, this retention rule will delete any unreferenced files (see above). Delete incomplete components: If selected, this retention rule will delete any incomplete components (see above).
F1 (Context-Sensitive) Help
NOTE THE STORAGE IMPLICATIONS: The local storage could grow substantially, therefore the Retention Rule should be enforced regularly.
Time-based local retention Generations of a file that fit these categories will be kept on Local Storage. Everything else will be deleted from the Local Storage. Keep all generations The latest generation is always kept. All older generations that fall within this time for [...] period will be kept (while those that do not will be deleted). Deletion of files Check to enable this option. These options only apply to backed up files that DS-Client detects were deleted from the backup source. A backed up file qualifies for delete if: After [...]: DS-Client detects this amount of time has passed since the file was removed from the backup source. Keep generations: Specify the number of generations of the file to keep. The generations that are kept will be counted starting from the latest one. If 0 (zero), the entire file is deleted (all generations).
Scales
(Win32 Only) Use this screen to adjust the scale for the associated Storage Summary information. This is useful if the difference in amounts between the scales are large, but you still want to have a meaningful graph.
Amount Files
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
F1 (Context-Sensitive) Help
Time
Schedule Calendar
Use this screen to view the backup sets scheduled to run on the DS-Client.
Schedule(s) Week Starting You may choose a specific Schedule to display, or select "All Schedules". Select the starting day of the week you would like to display. The default is the current week.
Generated on: 10/15/12 Page: 815
Confidential.
F1 (Context-Sensitive) Help
Display Interval
Select the interval of schedule cells to display. The default is per hour. The numbers that appear in each cell represent the number of backup activities scheduled / performed in that period. Numbers may appear different in the following cases: Bold (Scheduled only) - The number of activities in the period exceeds the Maximum Concurrent Activities (set in the Registry for Windows, set in the <DS-Client HOME>/ etc/dsclient.cfg file for Linux). The number in bold is the actual maximum concurrent amount allowed. Light Green (Scheduled / Performed) - A backup set in the period overlaps with an Admin process. Gray (Performed only) - A backup set in the period did not complete before the stop limit time. The calendar will change, depending on the selection in the Schedule(s) list. If you select All Schedules, the display will show every active schedule layered on top of each other. If you select an individual schedule, you will only see the time(s) when that schedule will run (and any Admin processes).
Cell Numbers
The color of a time cell represents the type of schedule that will run in that period: Admin (Dark Blue) - The schedule is a Daily or Weekly Admin. Regular (Yellow) - The schedule will run once during a fixed start and end period. Recurring (Dark Green) - The schedule is configured with a Detail Frequency that will run more than once during the scheduled period. No End (Light Blue) - The schedule is configured with no fixed Ending at time. Overlapped (Red) - More than one schedule will run in that period. Discontinued (White - Performed only) - The schedule no longer applies.
Schedule screen
This screen allows Administrators and Backup Operators to create or modify Schedules. A Schedule is composed of one or more Details. Each Detail represents one specific set of tasks that will run at the defined frequency for the schedule.
Schedule Name Enter or change the name of this Schedule. Administrator only Specifies that only Administrators can use this Schedule. (Windows DS-Client only) DS-Client on portable computer Indicates this schedule will be used by DS-Clients on laptops. The Schedule will check for a network connection to the DS-System. If it does not exist, the scheduled task(s) will not start. The DS-Client will launch a popup message if the portable schedule misses more than two scheduled backups. Allows you to set a CPU limit for the DS-Client service process. This is useful if the portable computer is in use for other processes. Use this list to select the detail you want to edit. New details will display <Detail_Type>:<new> until they are saved. An existing detail will have a unique number assigned to it (e.g. Daily:3). For Java DS-User, all details in the Detail List also appear in the tree on the left-hand panel of this screen. Check to create a "negative" detail this will specifically not run a backup (or any other tasks) at the time and date of the detail. It will override any other details that are scheduled to run at that time. Click to create a new detail.
Generated on: 10/15/12 Page: 816
Confidential.
Detail List
Excluded New
F1 (Context-Sensitive) Help
Deletes the selected detail from the Detail List Copies an existing detail (from any of the existing schedules). Opens the Select Schedule Detail screen. Enter the date and time to run the scheduled task(s) once. Displays the Daily tab. To specify a daily schedule, enter the frequency of the Detail in the number field. (For example: if you enter "3", it means the Schedule will run every third day. The intervals are based on the Start Date of this Detail.) [Default] Displays the Weekly tab. To specify a weekly schedule, enter the frequency of the Detail in the number field. (For example: if you enter "2", it means the schedule will run every second week. The intervals are based on the Start Date of this detail.) You may also select the day(s) during the week that this schedule will run, by checking and unchecking the appropriate days. Displays the Monthly tab. To specify a monthly schedule, select the frequency of the Detail from the two radio button options: Day - Specify a day (from 1-28) of each month (or interval of months) to perform a backup The - Specify the day (1st, 2nd, 3rd, 4th, or last) and associated weekday (Sunday-Saturday, day, weekday, or weekend day), of each month (or interval of months) to perform a backup (For example "the last Friday of every 3 months"). [Default] Specifies a backup (or any other tasks) will occur once, during the time specified. Specifies that backups (or any other tasks) occur every n number of hours, during the time window specified. If you select this frequency, you must specify an Ending at time. Indicates the start time for this Detail. You can specify an end time to create a time window. The drop-down list allows you to specify the number of days in the window (from Same day up to in 9 days). Any scheduled task(s) will terminate if the Ending at time is reached. You must specify a start date. For new Details, the default is the current date. The start date is important, since it will be used to determine interval times like "every 3rd month". (Optional) You may specify an end date for the schedule period. This Detail will cease to apply to the Schedule after the end date.
Weekly
Monthly
Detail Frequency Occurs once Occurs every [...] hours Starting at Ending at Detail Period Start date End date
Tasks Shows the tasks (in order) that this schedule detail will perform. 1. Perform Backup 2. Enforce Retention Check to include a backup task for this detail. Check to enforce the Retention Rules for each backup set. For a description of this process, see About Retention Rules on page 85. Check to include a Validation task for this detail. The Verify Encryption Key screen appears and you must enter them before you can proceed. Once you have entered the Encryption Keys, you can click >> to open the Scheduled Validation Options screen. For a description of this process, see Validation of Online Storage on page 276.
3. Perform Validation
F1 (Context-Sensitive) Help
4. Perform BLM
Check to include a BLM task for this detail. Click >> to open the Select BLM Options screen. For a description of this process, see Backup Lifecycle Management (BLM) on page 289. Check to start the Scan of LAN Shares task for this detail. Since Scanning the Shares may take quite some time, this option for scheduling the task is provided. See: Step 2. Scan Shares on page 334 in the section LAN Storage Discovery Tool on page 329.
Click to include a Clean Local-Only Trash task for this detail. 6. Clean Local-Only Trash For a description of this process, see Deleting Local-Only backup set data & Clean Local-Only Trash on page 181.
New Description
F1 (Context-Sensitive) Help
Known Backup Sessions List Click on a backup session to select it. Icon Start time End time Errors Files Online Amount Activity ID Note 1 You may see only Session Start information in a list. This can occur due to recovery of orphaned backup sets. This indicates the DS-Client does not have an Activity Log record for this session. Shows if the session was CDP. Shows the time that the backup session began. Shows the time that the backup session finished. Shows if any errors occurred during the backup session. Shows the number of files backed up during the session. Shows the size of online files. Shows the corresponding Session ID number.
F1 (Context-Sensitive) Help
Edit
New Description
F1 (Context-Sensitive) Help
Group by User Displays backup sets grouped in the order \User\Network\Node\Set. (only with Detailed View checked) Properties Note 1 You will only be able to view sets to which you have sufficient rights. When you have highlighted a backup set in the graphical display, you can click this button to bring up the Backup Set Properties screen.
F1 (Context-Sensitive) Help
Archive Options
Select to allow the Archive Package to contain references to older packages. This may Reference previsave space by removing data redundancy. ous archive pack The default (if this option is not selected) is for each Archive Package to contain all ages of the required files. Latest generation - Creates a BLM Archive containing the latest generation of all Generations to items selected. include All generations - Creates a BLM Archive containing all the (online) generations of all items selected.
Select to allow the Archive Package to contain references to older packages. This may Reference previsave space by removing data redundancy. ous archive pack The default (if this option is not selected) is for each Archive Package to contain all ages of the required files. Latest generation - Creates a BLM Archive containing the latest generation of all Generations to items selected. include All generations - Creates a BLM Archive containing all the (online) generations of all items selected.
F1 (Context-Sensitive) Help
Select Columns
Use this screen to specify the columns you want to appear in the Monitor screen. Settings are saved, and will be maintained for the next time you work with DS-User. Simply highlight an item name, then click the appropriate arrow to move between sections. Use the up/down arrows to change the order of items in the column.
Available Columns Lists the column items that have not been selected for display in the Monitor screen. Selected Columns Lists the column items that are selected for display in the Monitor screen.
Shows a list of the selected databases for restore, and their restore destination(s). Database Mapping List If you select the Restore as Pure Files option, you can change the restore destination by modifying the appropriate column. Icon - Shows an icon to indicate whether the restore item is a database. Source - Shows the source database's name. Destination - Shows the database where the backup will be restored. Double Click on this cell to open a drop down list of all the available databases on the specified restore database server. Destination (Restore as Pure Files) - Shows the available shares where the dump can be restored. Restore to (Restore as Pure Files) - Shows the path on the destination share where the dump will be restored. This option will only restore the dump file to the specified location. The dump Restore as Pure Files will not be loaded to the database. Notes 1 See the Knowledge Base article: Backup / Restore of DB2 Database Servers.
F1 (Context-Sensitive) Help
Delete all existing files Delete all of the existing files in the restore directory.
Restore Options Restore only the dump This option will only restore the dump file to the specified location. The dump file(s) will not be loaded to the database. (This option is not available if DS-Client (Windows DS-Client) Buffer or DS-Client Pipe is specified in the Dump To field.) Restore as Pure Files (Linux DS-Client) Restore Path This option is available if "Alternate Location" is selected. It will restore only the data. This option will only restore the dump file to the specified location. The dump will not be loaded to the database. When restoring to an alternate location, you can specify the path for the log and data files separately. Opens the Select Restore Path screen.
F1 (Context-Sensitive) Help
This option only applies to restores to the original location. Off (default) - The restored files will be placed on the target instance's Preserve original datadefault path(s). base file location On - The restore files must be placed in their original path(s). If the original path(s) do not exist, the restore will fail. Ask for Network Credentials Prompts you to enter a valid user name and password for the selected computer. This option is available for BLM and Disc/Tape restores, since the original backup set may no longer be on the DS-Client. If you do not select this option, DS-Client uses its own (service) credentials to access the network location. Prompts you to enter a valid user name and password for the database server. This option is available for BLM and Disc/Tape restores, since the original backup set may no longer be on the DS-Client. For MS SQL: If you do not select this option, DS-Client uses its own (service) credentials to access the database server. For MySQL and PostgreSQL: You must select this option and provide credentials to access the database server. If restoring to an alternate location, the database and table must exist on the database server where you are restoring. Table restores will not restore indexes.
Notes 1 2
Restore Options Restore only the dump This option will only restore the dump file to the specified location. The dump file(s) will not be loaded to the database. (This option is not available if DS-Client (Windows DS-Client) Buffer or DS-Client Pipe is specified in the Dump To field.) Restore as Pure Files (Linux DS-Client) This option will only restore the dump file to the specified location. The dump will not be loaded to the database. (This option is not available if DS-Client Buffer or DS-Client Pipe is specified in the Dump To field.) [Applies to restores of the Control File] After restoring the control file, all temporary tablespaces with local extent management will not have any "temp" file. You must still manually add the "temp" file(s) after restore in order for the Oracle database to operate correctly. Check to have DS-Client automatically add a temp file for each of the tablespaces (in the default location). See the Knowledge Base article: Backup / Restore of Oracle Database Servers.
Notes 1
F1 (Context-Sensitive) Help
Database mapping
Options
Calculate amount
Click to change the filter you wish to apply for restore. Opens the Add / Modify Filter Change Filter screen. This filter will allow only those E-Mails that match the pattern specified to be (E-Mail Backups) restored. Selection Shows the items you have selected so far. This opens the Selection screen. Click to bring up the Find Backed Up File screen. This will allow you to search through Find File (File the backup set for a specific file or file pattern. (Note: you must open the Files List by System Backups) clicking the Show Files button first.) Advanced [If this button is enabled, you can make further selections.] Click to bring up the Advanced Options screen.
Generated on: 10/15/12 Page: 826
Confidential.
F1 (Context-Sensitive) Help
Files List (Restore Wizard) This list appears for the Restore Wizard when Show Files is clicked: Box: Check to select the listed file Local Storage column: This column only appears if the backup set is configured to use Local Storage. If an L appears, it means that generation of the file is also in Local Storage. If a generation in Local Storage is selected, that copy will be restored (which offers the fastest restore speed). The Selected total of ... counter at the bottom of the screen will contain an additional set of numbers in parentheses (). These represent the totals for files in Local Storage. Name: File Name Size: The protected size of this generation of the file. Last Modified: Date and Time file was last modified File Info You may select a specific generation of the highlighted file for restore. Opens the Backup Generations for ... screen. Show Modified: Shows any modified files in the selected directory. The DS-Client will scan the backup source, and compare the files with the backup log. Files in the list Show Modified / that do not exist on the source, or are different (changed), will be highlighted. Add Modified Add Modified: If modified files exist, this button changes to Add Modified. Click to add all of the modified files to the restore selection. Shows a list of any archived generations for the folder that is highlighted in the DirectoShow Archived ries / Database Tree. Opens the Files in Directory ... (Select Items for Backup) screen. Vss Component (VSS-aware backup sets) This button appears if you are restoring (or deleting) a VSS-aware backup set with the (default) VSS Restore method. (It does not appear for the File Restore method.) Opens a read-only Vss Component details for [...] screen, which displays the components of the selected restore item. This screen is for information only.
Files List (BLM Wizard) This list appears when Show Files is clicked in the Request BLM Wizard or BLM Restore Wizard: The list and buttons that appear have the same meaning as the Files List (Restore Wizard). Files List (Delete Wizard) This list appears for the Delete Wizard when Show Files is clicked: Box: Check to select the listed file. #: Number of Generations available to delete (based on your specifications of how many generations to leave) Size: The combined total size of the selected generations of the file for delete. Name: File Name Remove Time: Date and Time file was detected by DS-Client to have been removed from the source. File Info You view the generation of the highlighted file that you are going to delete. Opens the Backup Generations for ... screen.
Select Directory
Use this screen to browse through the tree and select the share\directory path you want to use.
Shares and Directories Tree Select Shows the available shares and directories. Click to select the highlighted directory.
F1 (Context-Sensitive) Help
Encryption Key
This field activates if USER-DEFINED encryption has been applied to the data. Enter the key to proceed with decryption. Import: You can import from any valid file containing an exported key string. Export: You can use this GUI to export the text in this field (in encrypted format) to a text file for distribution, if necessary.
Save
Select Event #
This screen shows the events from the corresponding Select By period in the Event Log.
Event List Icon Event # Description First Time Count Ignore Select / Deselect Error, Warning or Information icon. Event number. Event description. Date and time of the first occurrence of this event in the corresponding period from the Event Log. Number of occurrences of this event in the corresponding period from the Event Log. Indicates if this event is part of the exclude list. Add or remove the highlighted event(s) from the exclude list.
F1 (Context-Sensitive) Help
Includes the total of all other files in the search share(s). Select <All> or a specific share.
Select Filter
FIlter Add Modify Delete OK Select from the list of available filters. Create a new filter. Brings up the Add / Modify Filter screen. Edit the selected filter. Brings up the Add / Modify Filter screen. Deletes the selected filter from the Filter list. Select this filter.
Select Font
Use this screen to select from the available fonts.
F1 (Context-Sensitive) Help
Allows you to specify the number of generation to leave (i.e. not select for delete) from the specified period. If you specify a number, you will only be able to select files and directories that have more generations, than the number specified in this field. By default, this field is blank. This filter allows you to remove backed up directories and files that were intentionally deleted from the source computer. Enter a number in this field to show only directories and files that were deleted from the source computer more than that number of days ago.
Placeholder / Stub selection [Windows DS-Client] This option can be used if you are using a third-party storage management solution that migrates infrequently used files from the source, and leaves a small (size) placeholder/stub in its place. If DS-Client detects a placeholder / stub is created on the source, the corresponding file on DS-System will be deleted, based on the specified conditions. Keep the last placeholder / stub and subsequent generations The last placeholder or stub will be kept on DS-System, as well as any full file generations that appear after that latest placeholder/stub. Keep all placeholders / stubs All placeholders or stubs will be kept on DS-System, as well as any full file generations that appear after that latest placeholder/stub.
Move to BLM
Session Label
F1 (Context-Sensitive) Help
Linux DS-Client Backup Path Select an encryption method. NONE: The meta-data (the descriptive files used to manage the Initial Backup) will not be encrypted. CLIENT: The meta-data (and Initial Backup data) will be encrypted with a key Metadata Encryption based on this DS-Clients signature. The data can only be imported to the same registered DS-Client account on the DS-System. USER-DEFINED: Enter (or import) your own alpha-numeric key of up to 32 characters for the encryption. You can export this key (in encrypted format) to a text file for distribution, if necessary. This field activates if USER-DEFINED encryption is selected. Enter your own alphanumeric key of up to 32 characters for the encryption. Import: You can import from any valid file containing an exported key string. Export: You can export this key (in encrypted format) to a text file for distribution, if necessary.
Encryption Key
Exclude
F1 (Context-Sensitive) Help
RegEx
Regular Expression is a more specific form of the Exclude function. It allows you to exclude at the filename or filepattern level. However, you must learn the Regular Expression software syntax. Opens the Regular Expression screen. To add specific files, browse through the Shares & Directories List until the directory the files are stored in appears. Click Files. A screen showing the list of files in that directory appears. Highlight the file(s) you wish to add to the backup set. Click to backup specific objects from a library (e.g. programs or data areas). Opens the Files in Directory ... (Select Items for Backup) screen. If you wish to be able to quickly restore individual objects, check this box before you press the "Add" button. (Note: this option will reduce the backup speed and increase the disk space required. The performance will also be affected if the libraries contain a large number of small objects.) The icon for "individual objects" contains an additional blue "+" sign. To add files that match a filter, in the Filter field, enter the file pattern that you would like to search for in the selected directory. (e.g. *.doc will search the directory for all files with the .doc file extension.) Subdirectories are automatically included, unless you clear this check box.
Backup Items Selected Shows the Items selected for backup. The icon describes the type of item and whether its subdirectories are included. The share and path is listed, and the extension indicates if a filter is used. Remove Removes the highlighted item from the Selected Items for Backup list. Note: Removing a selected item for backup will not remove previous backups of that item. (You must use the delete function.) [Windows DS-Client - File System Backup Set only] Click to view a list of files that failed to back up. This opens the Failed Files During Backup screen. This is a cumulative list of files that failed since the backup set was created. Allows you to modify an existing Regular Expression. Opens the Regular Expression screen for the highlighted item. Click to define System i applications from a list of all the libraries on the target System i server. Opens the Modify Applications (System i Server) screen.
F1 (Context-Sensitive) Help
Click this button to view information about the items highlighted in the Databases List. A read-only Files in Directory ... (Select Items for Backup) screen appears. Regular Expression is a more specific form of the Exclude function. It allows you to exclude at the filename or filepattern level. However, you must learn the Regular Expression software syntax. Opens the Regular Expression screen. To add files that match a filter, in the Filter field, enter the file pattern that you would like to search for in the selected directory. (e.g. *.doc will search the directory for all files with the .doc file extension.) Click to backup specific objects from a library (e.g. programs or data areas). Opens the Files in Directory ... (Select Items for Backup) screen. If you wish to be able to quickly restore individual objects, check this box before you press the "Add" button. (Note: this option will reduce the backup speed and increase the disk space required. The performance will also be affected if the libraries contain a large number of small objects.) The icon for "individual objects" contains an additional blue "+" sign. Subdirectories are automatically included, unless you clear this check box.
Include SubDirs
Selected Items for backup List Shows the Items selected for backup. The icon describes the type of item and whether its subdirectories are included. The share and path is listed, and the extension indicates if a filter is used. Remove Modify Removes the highlight the item from the Selected Items for Backup list. Note: Removing a selected item for backup will not remove previous backups of that item. (You must use the delete function.) Allows you to modify an existing Regular Expression. Opens the Regular Expression screen for the highlighted item.
Options
F1 (Context-Sensitive) Help
Shows the number of generations configured for the corresponding backup item.
Options Highlight an item from the Items & Options for backup list, then click the checkbox of the option(s) you want to add. Backup permissions / Backup ACL Backup POSIX ACL (Linux) Check this box to backup the file permissions. (ex: ACL on NTFS volumes, or Trustees on NetWare volumes.) This only applies to backups of the Local File System (Linux DS-Client only). Check this box to backup the Extended ACL (if configured). These are the permissions set using the setfacl command (and viewed using the getfacl command). NTFS volumes support multiple streams of data associated with a particular file. Select this option if you have files that contain alternate data streams. To change this option, you must use the Backup Set Properties screen, Backup Set Items Tab. These are the Extended File Attributes. (ex: Transactional and Compressed). The Database Consistency Check (DBCC) verifies database integrity to ensure backup of a valid database dump. If this box is checked, an additional option appears. Truncates the transaction log. MS SQL Server 2000 & MSDE: Transaction Logs are truncated before the database dump. MS Exchange Server: Transaction Logs are truncated after the backup. The database must be configured with FULL or BULK_LOGGED recovery mode, otherwise this option will have no effect. If selected, the DS-Client will dump the Transaction Log and send it to the DS-System in addition to the database(s). Backup Transaction Log (Microsoft SQL 2005 and higher) If selected, the Transaction Logs will also be truncated. The timing of the truncation depends on the Database Backup Policy (see: Set Properties - Options tab). Full - Transaction Logs are truncated before the database dump. Differential - Transaction Logs are truncated before the database dump. Incremental - Transaction Logs are first backed up, and then truncated. If DBCC errors are detected, this option will skip backing up the dump file.
Backup streams (Windows) Backup Eattributes (NetWare) Run DBCC before backup (MS SQL) Truncate transaction log (Microsoft SQL 2000 & MSDE, MS Exchange Server)
Logical Corruption Check (Default is on) Will perform a corruption check on the database prior to (Oracle) backup. Truncate Archived Logs (Oracle) Backup Only Current Archived Logs (Oracle) Backup Resource (Mac) Backup File Attributes (Mac) Clear the Oracle Database logs associated with this item after backup. Check to backup only those logs that are necessary for the Oracle database. This saves backup space, by avoiding backup of any older logs. Leave this box unchecked if you want to backup all log files. Check to backup the Macintosh Resource Fork information. Check to backup the File Attributes for files on the Mac platform.
F1 (Context-Sensitive) Help
The Share Discovery Wizard helps you to identify all the available backup shares on your LAN. This screen allows you to select which items on your network(s) you wish to scan.
Path Network Tree Add Selected items for Discovery Remove Clean share list Enter a specific IP address or computer name (e.g. 10.10.10.10 or COMPUTER1). Select from the available list of networks, domains/workgroups, and computers. Adds either the Path or the highlighted item from the Network Tree to the Selected items list. Shows the list of items you have selected to scan. Removes the highlighted item from the Selected items list. Check to remove any shares from the previous scan that returned a Scanned Size of 0.
UNIX Support Limitations (Windows DS-Client): 1. The LAN Storage Discovery Tool accesses UNIX via Hummingbird software or via SAMBA software. 2. Soft links and device files will be silently skipped. 3. Hard links are treated like regular files. If two hard links point to the same file, they will be considered as duplicates of each other. 4. "Owner" field will always be empty.
Shows the credentials that Linux DS-Client will use to access data on the network sudo' as an alternate resource. user After successful login to the remote source, "sudo" (switch user) will be per(UNIX-SSH only) formed for Linux DS-Client to use these credentials. Advanced Connection The default (if no selection is made) is for DS-Client to run a PERL script Option Click [...] to edit the settings. See Advanced Connection Options (Linux DS-Cli(UNIX-SSH only) ent) for more information. Add Adds either the Path or the highlighted item from the Network Tree to the Selected items list. Any errors will appear in the Message window.
Selection Panel (Right side) Selected items for Discovery Remove Message Window Shows the list of items you have selected to scan. Removes the highlighted item from the Selected items list. Shows any relevant messages.
F1 (Context-Sensitive) Help
The Discovery Wizard helps you to identify all the unprotected resource (shares) on your LAN. The scan will compare this DS-Clients backup set items with the network resources you choose in this screen.
Path Enter a specific IP address or computer name (e.g. 10.10.10.10 or COMPUTER1). Network Tree Select from the available list of networks, domains/workgroups, and computers. Ask for credentials Add Exclude Subnet Select Prompts you to enter a valid user name and password for the selected network resource. Adds either the Path or the highlighted item from the Network Tree to the Selected items list. Excludes the highlighted item from the Network tree. This only applies to subitems (i.e. the parent must already be selected for discovery in order for a subitem to be excluded). Opens the Add / Exclude Subnet screen. Opens the Add / Exclude item from scanning result screen.
Selected items for Discovery Shows the list of items you have selected to scan. Remove Removes the highlighted item from the Selected items list.
Open Files This information instructs the DS-Client about how to deal with Open (i.e. locked) files. (If the open file has been locked with Deny write by another process, the backup for this file will fail.) Try deny write Attempt to open backup file in 'Deny Write' mode. If this fails (because the file is already open), place the backup file in 'Allow Write' mode.
F1 (Context-Sensitive) Help
Deny write
This mode prevents any other process from writing to the backup file, while the DSClient has it open. DS-Client will not back up the file, if another process has already opened it for write. (You may, however, instruct the DS-Client to retry backing up the open file.) Attempt to open backup file in 'Deny Write' mode. If this fails (because the file is already open), then open in Allow Write mode and lock the file, thereby preventing any process from writing to the file. This ensures that the most recent version of the file is backed up. Allow another process to read/write to the backup file (no restrictions). Since other applications can write to the file while it is being backed up, this may affect file consistency. Specifies the number of times you want the DS-Client to attempt to backup the file. (Maximum of 10 retries). Specifies the interval between retries. (Maximum of 999 seconds).
Prevent write
Windows 2000 & up options These options appear if supported by the backup set source computers Windows Operating System version. However, all selections are grayed out and cannot be changed from this screen. To change any of these selections, you must edit this backup sets properties (Set Properties Advanced Options tab (Windows DS-Client)). Backup data in Remote Storage Backup all data on remote media. Some Windows Operating Systems have the functionality to migrate infrequently accessed data from the local hard drive to directly attached tape libraries. The local disk usage is reduced by replacing the file with a link (shortcut). If disabled, only the link (shortcut file) will be backed up. Backup each instance of a file separately. Some Windows Operating Systems have an optional service 'Single Instance Store' to handle multiple copies of the same file on the computer. Local disk usage is reduced by placing one copy of the file in the Single Instance Store, with links (shortcuts) in all associated directories. If disabled, only the link will be backed up. If you have activated the Single Instance Store Service, check this option. Backup directories (all data) represented by the junction point. Junction points are file links to other directories. If disabled, DS-Client will backup only the link (shortcut). Notes: Junction points that are mounted FAT or FAT32 volumes are not supported.
F1 (Context-Sensitive) Help
Start at PreScan
Leave this field blank to start the demand backup immediately. Enter a time, if you wish to delay starting the demand backup until the time specified. Performs a PreScan of all files in the backup set to estimate a time for completion of the backup. MySQL backup sets. Lock tables before inserting data on restore. (See the MySQL manual page for mysqldump for more information.) Prevent changes to data while backup is in progress. (See the MySQL manual page for mysqldump for more information.) Add MySQL specific extensions to the backed up database dump. (See the MySQL manual page for mysqldump for more information.) Specify the style of insert statement from the backed up database dump. (See the MySQL manual page for mysqldump for more information.) Extended - Fast insert. May not be useful for manual loading into non-MySQL databases. Delayed - Uses INSERT DELAYED when inserting rows. Normal - Standard insert. Slower, but may be more portable to other databases. PgSQL backup sets. Will backup only the data, not including the privileges of the database. Dumps data as INSERT commands (instead of COPY). This will make restores very slow, but it will make those backups more portable to other SQL database packages. Oracle backup sets. (Default is on) Will perform a corruption check on the database prior to backup. Check to backup only those logs that are necessary for the Oracle database. This saves backup space, by avoiding backup of any older logs. Leave this box unchecked if you want to backup all log files Clear the Oracle Database logs associated with this item after backup. DB2 Server backup sets. Delete entries from the history file or log files from the active log path. If unchecked, perform Offline DB2 backup. During an offline backup, applications cannot connect to the database. If checked, perform Online DB2 backup. An online backup allows applications to connect to the database and read and write to tables during database backup. Log retain or userexit must be enabled for an online backup. SSH backup sets. Check to backup only the Mount Point itself (not the data under any Mount Point).
Generated on: 10/15/12 Page: 838
Confidential.
Lock all tables for read Add MySQL specific table create options
Additional Backup Set Options Do not backup privileges (Grant / Revoke) Backup data as INSERT, rather than COPY Additional Backup Set Options Logical Corruption Check
Backup only the schema, not the data Dump only the schema (data definitions).
Truncate archived logs Additional Backup Set Options Prune History / Logfile
Online Backup
F1 (Context-Sensitive) Help
Select options for demand backup screen (Windows database backup sets)
Use this screen to specify options for the Demand Backup of the following Windows database backup sets: Microsoft SQL Server VSS-aware Microsoft SQL Server VSS-aware Microsoft Exchange Server VSS-aware Microsoft SharePoint Server These settings are applied for this backup only.
Backup Set Options Options that appear grayed out cannot be selected from a demand backup. Use Buffer [View only.] This takes the Use Buffer setting from the Set Properties - Options tab (Windows database backup sets).
[View only.] BLM (Infinite Gen This takes the BLM (Infinite Generations) setting from the Set Properties erations) Options tab (Windows database backup sets). Detailed log PreScan Stop on errors Start at Local Storage Records all files that are backed up. If checked, the backup set is flagged to scan all files in the backup set prior to backup, in order to display an estimated completion time for the backup. Sets an error limit, at which a backup will be stopped. Enter the maximum number of errors in the Stop on Errors field to the right. Leave this field blank to start the demand backup immediately. Enter a time, if you wish to delay starting the demand backup until the time specified. [View only.] This takes the Use Local Storage - Save setting from the Set Properties - Options tab (Windows database backup sets). [View only.] This takes the Use Local Storage - Cache setting from the Set Properties Options tab (Windows database backup sets).
Cache
Database backup policy (Windows database backup sets) The default selection depends on the Database Backup Policy selected for this backup set in the Set Properties - Options tab (Windows database backup sets). Some options may not appear, depending on the backup set type and configuration. Default Policy Enforce Perform Full backup Differential backup Incremental backup Shows the configured Windows database backup policy for this set. Select if you want to specify what type of dump will be performed. The options available depend on the settings for this backup set. This backup will perform a full dump of each database. Performs a differential backup unless another full backup is needed (*). The database can be selected with or without the backup transaction log option. Performs an incremental backup unless another full dump is needed (*). The database should be selected without the backup transaction log option. (Even if backup transaction log is selected, that option will be ignored if this backup policy is selected.) The databases Recovery Model must be: full or bulk_logged. [Incremental backup only] [Default is off.] Select if you do not want DS-Client to truncate the Windows database transaction log.
F1 (Context-Sensitive) Help
(*)
A full dump is needed (other than first time) when: a database has been backed up by another backup set (or manually from the SQL tools); a database has been restored (either from another database or an earlier generation); the database properties have been modified (recovery model switched to simple); local cache is used for the backup set (This can occur for Regular backup sets with the option Transmission cache on local storage, but only when a generation must actually pass through the local cache. If the connection to DS-System is down, then a full dump occurs and is written to the local cache. After that dump, DS-Client continues with the selected database backup policy.) the DS-Client requires a Master generation (configured in the MasterGenerations value of the DS-Client Advanced Parameters - Setup Menu > Configuration > Advanced Tab).
Select Path
Use this screen to select a path.
Computer Directory Path (Linux DS-Client) Click >> to open the Select the Computer screen. Click >> to open the Select Directory screen. Click >> to open the Select Directory screen.
VM Disk-level Restore
Restore To
F1 (Context-Sensitive) Help
Share Path
This column appears if you need to select an alternate server. If the share path cannot be obtained due to user privilege restrictions, you must type a path in manually. Notes: Restoring to Windows: Share Path information appears automatically if you are restoring the Services Database, System State (Registry) or locked files. If the selected restore items contain a common path, you may shorten the common portion of the restore path by increasing the truncate level in the number field. Truncated portions of the restore path will disappear. Note: Alternate location security: If the entire path is truncated, the alternate location directory will inherit the security of the truncated parent directory.
Truncate
[Alternate location restores] Restore as Pure Files This option is available for some backup set types. It allows you to restore only the (Linux DS-Client) data files to the alternate location. This means no database loading or other special backup set type handling will be performed. Restore Option File This option only applies for VSS-aware backup sets, when restoring to an alternate location. This option allows you to specify an XML file that contains specific VSS rules to apply for alternate location restore of a VSS-aware backup set.
[VSS-aware backup sets] Rename Component This option is only available for alternate location restores. It allows you to rename (Windows DS-Client) individual components being restored. Opens the Rename Component screen. Restore database file only (DS-Client Buffer) (Windows DS-Client) [Backup from the Cloud (Salesforce.com) backup sets] Restores the backed up data as a single, pure database file to the DS-Client Buffer, then copies the file to the final destination you specify. Click [...] to open the Select Directory screen.
Virtual Machine List (VMware VADP backup sets only) These columns will be pre-populated with default restore suggestions, based on the selected restore server. Icon Datacenter Folder Path VM Name Host This column displays different icons, depending on the item type. Shows the source VMware Datacenter from where the backup set files originated. Alternate Location: Allows you to select a new Datacenter on the target The target restore location (folder) that will contain the target VM. The target VM where to restore. The ESX host where to restore. Opens / Hides the Files List for the highlighted Virtual Machine. This option only appears if you are restoring a full Virtual Machine (VM-level Restore). Virtual Disk: Shows the name of the individual Virtual Disk (*.vmdk). Datastore: Shows the name of the Datastore. For alternate location restores, this field provides a dropdown list of available Datastores on the destination host where you can restore the individual disk.
F1 (Context-Sensitive) Help
This field shows the location for the data dump. Click >> to change the specified path. This brings up the Select share & path for the data dump screen. Shows a list of the selected libraries for restore, and their restore destination(s). You can change the restore destination by modifying the appropriate column. Shows the source library's name. Shows the library where the backup will be restored. Double Click on this cell to open a drop down list of all the available libraries on the specified restore server.
Skip
Only Method
F1 (Context-Sensitive) Help
Use buffer
Restores files to the DS-Client buffer first. Then, the files are transferred to the restore destination. This ensures that the files are restored as fast as possible, given the speed of your LAN. Notes:The DS-Client Buffer will inherit the permissions of its parent directory. For example, if you specify C:\TEMP as the buffer, then the C:\TEMP\buf directory will inherit the permissions of the \TEMP directory. All files copied to the \buf directory will be accessible by users with permissions to \TEMP. You must have sufficient disk space in the DS-Client buffer to accommodate the entire restore amount. Files are restored on a 'write-data-as-received' basis. Files are overwritten upon receipt of the first byte of data. For Linux DS-Client restores of Hard Links, choosing this method allows you to restore a single hard linked file while preserving the existing hard links on the restore target. For more information, see the Hard Links sections in the Knowledge Base article Backup / Restore of UNIX File Systems on page 539. A locked file will be renamed while still in use (intended for System files). The renamed file will be registered with the operating system for delete, on reboot. (This feature is necessary when restoring system files that are opened before the operating system has the chance to replace the locked file.) A locked file will be restored as a temporary file. This temporary file will be registered with the operating system to replace the locked file on reboot. For important information on this option refer to the DS-Client Knowledge Base article: Restoring Locked Files on Windows Skips restores of any files that are locked. An error will be reported in the Activity Log. Skips restores of any backed up stub files. Skips restore if the online file is a stub (a small placeholder/link file to the full file which was moved to other media). OFF (Drop database) - If a database selected for restore already exists on the restore server, DS-Client will drop the existing database before performing the restore. ON (Do not drop database) - If a database selected for restore already exists on the restore server, DS-Client will restore to that existing database. This option is useful if you want to keep any extra tables (and replace all existing tables) in the existing database.
Fast
Don't rename
Overwrite junction point Replaces any junction points of the same name. Junction points are special (Windows 2000 & up) directories (like shortcuts) that link to another location. Load Cluster Quorum (Windows 2000 & up) Detailed Log Skip Pre/Post (This check box only appears if you are restoring a System State with a Cluster Quorum.) Automatically loads the Cluster Quorum after restore. For more information, refer to the DS-Client Knowledge Base Article: Backup / Restore of Windows 2000 Records all files that are restored. Skips the Pre/Post restore process. Uncheck to display the Pre/Post button. This check box appears if you are restoring a Backup from the Cloud (Salesforce.com) backup sets database. Restore Schema is performed at Table-Level only (not at database level). This option is useful if you have made changes to a tables structure since the backup session you are restoring. If selected, the restore will wipe the entire table(s) selected for restore from the Salesforce.com database, then rebuild the table(s) with the backed up schema(s), then populate the table with the restore data.
F1 (Context-Sensitive) Help
This option forces authoritative restore for both Active Directory and NTFS. For more information, refer to the DS-Client Knowledge Base Article: Bare Metal Restore of Windows (ALL VERSIONS) This list only appears if the backup source and restore destination support file level compression (ex: NTFS, NetWare). Default Compression: Specifies that the restored files take on the compression attribute of the parent directory where they are restored. Preserve Compression: Specifies that the restored files retain their original compression setting (as when they were originally backed up). Force Compress: Specifies that the restored files are compressed using the destination file system's compression. Force Expand: Specifies that all restored files are to be expanded (no compression). (This check box only appears if the original volume does not support file level compression, but the restore destination does.) Compresses the restore files using the destination file system's compression. Specify the object (container or leaf) that you want to restore. The object name should be typeless and fully qualified from the Root (distinguished). (The default is to restore the whole NDS). Leave this field empty to restore all permissions backed up. Restores file and directory permissions for the specified path only. (e.g. \dir_path\(file_name) where file_name is optional). You must know the specific path name in order to use this option. Skips restore of subdirectory permissions from the directory listed in the Restore Permissions from field. This option is only applicable when restoring a Lotus Domino Server database in a clustered environment. Additional steps are required. Please refer to the Knowledge Base article Backup / Restore of Lotus Domino Server Databases on page 631.
Compression Options
Force Compress (Check Box) Restore NDS Object(s) from (NetWare NDS Restore) Restore Permissions from (Permissions Only Restore) Skip Subdirectories (Permissions Only Restore) Keep Replica ID (Lotus Domino Server Only)
Local Storage Restore Options This section only appears if this backup set has data stored in Local Storage and off-site on DS-System. DSClient always tries to restore from Local Storage first, but these options deal with the specific scenario where the DS-Client also needs to restore some data from DS-System. (Default) Stop, if connection to DS-System not available when needed. Continue, even if connection to DS-System not available. Try to connect to DS-System first. If connection fails, stop. Additional Restore Options (Linux - Permissions backup sets) Restore files that match Exclude files that match Allows you to specify a filename pattern whose permissions will be restored. Allows you to specify a filename pattern to exclude from the permissions restore.
Additional Restore Options (Linux - VMware VADP backup sets) The available restore options depend on the selected destination VMware server. For each Virtual Machine selected for restore, you can specify additional restore options to be performed. Power on VM after restore Unregister VM after restore Starts each virtual machine that is successfully restored. After successful restore, the virtual machine will be unregistered from the vCenter.
Appends the restore time to the end of the virtual machines name. For examAppend timestamp to VM ple: RestoreVM would be restored as RestoreVM_(yyyy-mm-dd-hh:mm:ss) name when you view it from the vCenter.
F1 (Context-Sensitive) Help
Leave Database(s) in RESTORING state (MS SQL Server backup sets only. Not valid for dump file only restores.) Off: (DEFAULT) The database will be brought online after the restore. On: DS-Client will not bring the database online after the restore has finished. Instead, it will leave the database in RESTORING mode to allow users to continue performing restore operations on the restored database. Do not drop existing DB before restore (MySQL backup sets only.) OFF (Drop database) - If a database selected for restore already exists on the restore server, DS-Client will drop the existing database before performing the restore. ON (Do not drop database) - If a database selected for restore already exists on the restore server, DSClient will restore to that existing database. This option is useful if you want to keep any extra tables (and replace all existing tables) in the existing database. Restore Private Authorities. (System i backup sets only.) Restores Private Authorities for objects (if they were backed up). This works for System i objects with the Private Authority (PVTAUT) parameter (This parameter was introduced since IBM i 6.1). When PVTAUT is set to *YES, you will be able to restore the private authorities attached to your saved objects. Restore Schemas (Salesforce.com databases) This check box appears if you are restoring a Backup from the Cloud (Salesforce.com) backup sets database. Restore Schema is performed at Table-Level only (not at database level). This option is useful if you have made changes to a tables structure since the backup session you are restoring. If selected, the restore will wipe the entire table(s) selected for restore from the Salesforce.com database, then rebuild the table(s) with the backed up schema(s), then populate the table with the restore data. Local Storage Restore Options This section only appears if this backup set has data stored in Local Storage and off-site on DS-System. DSClient always tries to restore from Local Storage first, but these options deal with the specific scenario where the DS-Client also needs to restore some data from DS-System. (Default) Stop, if connection to DS-System not available when needed. Continue, even if connection to DS-System not available. Try to connect to DS-System first. If connection fails, stop. Additional Restore Options (Linux)
F1 (Context-Sensitive) Help
If you are using DS-PIPE, this field appears. RMAN requires the Media Management Library libobk.so in order to backup / restore using a PIPE. The exact library name will be slightly different, depending on the platform. For more information, refer to the Oracle Server Requirements section of the Knowledge Base Article Backup / Restore of Oracle Database Servers. You can specify the exact path (including filename) to the corresponding libobk.so for the Oracle servers platform. These library files can be found in the DS-Client installation directory. If you do not specify a path, the default path will be used: $ORACLE_HOME/lib/libobk.so Make sure Oracle has full rights to read and execute in the library path. Note: DS-Client does not validate this path. It simply forwards it to RMAN. This option will not issue the RECOVER command. This means the DS-Client will only restore the control file, archive logs and tablespaces back to the Oracle server. This option will not open the database. You must use RMAN to perform the DBPITR manually. For more information, refer to the Knowledge Base Article Oracle Database Point-In-Time Recovery (DBPITR).
This option will automatically recover database to the target time specified RECOVER DATABASE at: and open the database with the Resetlogs option. (Oracle) For more information, refer to the Knowledge Base Article Oracle Database Point-In-Time Recovery (DBPITR).
Leave Database(s) in RESTORING state (MS SQL Server backup sets only. Not valid for dump file only restores.) Off: (DEFAULT) The database will be brought online after the restore. On: DS-Client will not bring the database online after the restore has finished. Instead, it will leave the database in RESTORING mode to allow users to continue performing restore operations on the restored database. Local Storage Restore Options This section only appears if this backup set has data stored in Local Storage and off-site on DS-System. DSClient always tries to restore from Local Storage first, but these options deal with the specific scenario where the DS-Client also needs to restore some data from DS-System. (Default) Stop, if connection to DS-System not available when needed. Continue, even if connection to DS-System not available. Try to connect to DS-System first. If connection fails, stop. Microsoft Exchange database restore options Mount database after restore Force allow overwrite database Check to automatically mount the database after restore. Check to automatically set the MS Exchange Servers allow restore to overwrite database parameter before restoring the database.
F1 (Context-Sensitive) Help
Delete (default): Delete all of the existing files in the restore directory. Keep: Keep all existing files in the restore directory. Rename: Renames the existing files, until all restore items are successfully restored. This takes more space, but avoids problems of failed restores (if a restore fails without this option, the MS Exchange Server will not function). In case of failure, original files will be renamed back and the Exchange database will be mounted.
Overwrite if exists
Remove database after restore is finished successfully Web Application URL Temporary Export Path You must supply the URL of the Web Application that you are restoring. This target URL must exist in the SharePoint Server Central Administration. You must supply a local path on the target SharePoint server where the restore will temporarily write files.
F1 (Context-Sensitive) Help
You can override the default and set a custom value that only applies for this backup set. This option is intended for high performance backup environments. You must be able to test the different settings to determine the optimal value. This is only useful if the target storage containing the backup data is fast and efficient enough to take advantage of the increased I/O. WARNING: Slower storage may suffer performance drops if this value is increased too much.
DS-System side read threads This setting affects the DS-System side of the process. It instructs the DS-System how many files to read simultaneously for this restore process. (Default) Uses the setting in the DS-Client Advanced Configurations > Category: Use DS-Clients settings Performance > Parameter: MaxRestoreReadThreads. Note: The actual value used maybe limited for some special backup sets. You can override the default and set a custom value that only applies for this backup set. You must be able to test the different settings to determine the optimal value. WARNING: Slower storage may suffer performance drops if this value is not properly set.
Select Service
Use this screen to specify the Windows Service to backup.
Services List Select Browse through the list of available services and highlight your selection. Click to select the highlighted item in the Services List.
F1 (Context-Sensitive) Help
Select share & path for the database / data dump screen
Use this screen to specify dump location.
Database Dump This field displays the selection for the database dump location. Remote dump location (MS SQL Server): You can type a valid UNC path into this field, if you want to specify a different computer for the database dump. The MS SQL Server service account and the backup set user credentials must have administrator rights to access this UNC path (read-write permissions). Browse the database computer and select a directory. There must be enough space on the database computer to accommodate the dump file. Save the dump file to the local storage on the DS-Client computer. There must be enough space on the DS-Client computer to accommodate the dump file. This option does not consume any additional disk space. During backups, the DS-Client reads from the pipe on the source database. This method is useful if your database is too big to be dumped to a file on either the database server or the DS-Client buffer. [Microsoft SQL Server 2005 & up] This option is only available for backup of remote MS SQL Servers (not the local database). It allows you to specify the location on the remote computer where DS-Client will place and run the VDI tool. If no specification is made, DS-Client will run the tool from a default directory on the target computers c:\ drive. VDI allows users to select the DS-Client Pipe option for SQL Server 2005 versions (and higher). Use this screen to specify the location of the data dump. Highlight a folder in the System i Server ROOT file system and press "Next". The System i Server ROOT file system must be shared (with read-write permissions) for this operation to work.
Dump Path
Directory
DS-Client buffer
DS-Client Pipe
Check only
F1 (Context-Sensitive) Help
DS-System based
Select to update the entire DS-Client backup log with the DS-System's Online storage information. (Caution: A directory's "last seen" information is not recreated, since that information is not stored on the DS-System. The only difference this has is you cannot use the "...deleted from source..." filter option in either Delete or Restore operations for this backup set.) [Local Storage Tool Only] Select to compare and update where necessary, the DS-Client backup log (database) with the files in Local Storage. Click to start the Synchronization using the method selected. Since the DS-System does not store "last seen" information about directories, the DSSystem based option will update the DS-Client backup log without a directory's "last seen" information. The only difference this has is you cannot use the "...deleted from source..." filter option in either Delete or Restore operations.
Ask for Network Credentials Ask for NAS API credentials (NAS only) Ask for Database Credentials (Databases only)
Path / IP Address
F1 (Context-Sensitive) Help
Ask for Credentials Ask for NAS API credentials (NAS only) sudo as an alternate user (UNIX-SSH only)
Prompts you to enter a valid user name and password for the selected source or database server. Prompts you to enter valid connection information for the selected NAS. Opens the Specify Credentials (Linux DS-Client) screen. Shows the credentials that Linux DS-Client will use to access data on the network resource. After successful login to the remote source, "sudo" (switch user) will be performed for Linux DS-Client to use these credentials. By default (if this is not selected), UNIX-SSH will run a PERL script on the target machine to perform backups. Click [...] to edit the settings. See Advanced Connection Options (Linux DS-Client) for more information. VMware backup sets have the following connection options: Ask for VMware logon credentials: Credentials to logon to the Virtual Center or ESX Server (whichever was specified in the Path/IP Address field). XenServer backup sets have the following connection option: Ask for XenServer API logon credentials: Prompts you to enter a valid user name and password for the selected XenServer.
VMware
XenServer
Select the path for the database dump file (Linux DS-Client)
This screen appears when you are required to select a path for the database dump. Use the tree to browse and make your selection.
F1 (Context-Sensitive) Help
Selection screen
This screen displays the selection that you have made so far. This is useful if you have selected several items from different directories, and you want to review your selection.
Icon Column This column displays different icons, depending on the item type. File/Directory Name This column shows the corresponding file name or directory path.
F1 (Context-Sensitive) Help
Format
Verify new Password Type your new password again in the Verify new Password field.
Priority (Share Dis- Enter the priority number - the lower the number, the higher the priority. The DS-Clicovery Wizard) ent will connect to the share(s) with the supplied credentials in this order.
F1 (Context-Sensitive) Help
Path List
Volume Shadow Copy Windows computers only (if supported by the Operating System version)
F1 (Context-Sensitive) Help
DS-Client will initiate a VSS (Volume Shadow Copy Service) snapshot for the specified computer (for any local volumes included in the backup) and perform the backup from the VSS snapshot. If the VSS snapshot fails, DS-Client tries to backup like a regular File System backup set. For more information about VSS, refer to the corresponding Windows Help. By default, the DS-Client will make each writer commit its data before doing the VSS snapshot (e.g. Registry, SQL Server and other applications are VSS Aware and can freeze their own I/O while the snapshot is performed). If you check "Do not involve writers", it means that the DS-Client will not notify the VSS Aware applications that a backup is performed and the resulting backup will be only crash-consistent (i.e. it will contain whatever was on the hard disk during the backup). For more information about VSS, refer to the corresponding Windows Help. By default, VSS backups are performed with the process components option. Processing components means verifying if their files or their dependent component files are all included in the volumes selected for snapshot. By default, this option is off. If selected, the VSS snapshot will be performed without processing components. This option is useful if you have selected only a portion of a component for backup and do not want to encounter errors (because the VSS verification would otherwise detect missing files or dependencies).
Pure file data backup options This section only applies to Windows File System Backup Sets. The default is OFF. This option controls the automatic file filtering performed by the DS-Client during Windows file system backups. By default, the Windows DS-Client will exclude some files automatically out of the share-based backup of files, even if such files would be readable (e.g. when using VSS). The excluded files may include: temporary files (e.g. pagefile.sys) files that are being backed up as part of System State backups (e.g. Operating System DLLs, executable) Registry hive files Other files that may interfere with a successful Agentless BMR This option should usually remain unchecked, unless there are specific reasons why all such excluded data would need to be included in the share-based backup. Selecting this option will interfere with the ability to perform Agentless BMR without manual file filtering, however it may be used in conjunction with the VSS option in order to allow bootable-disk BMR (this requires 3rd-party BMR provisioning integration). It is recommended that unless BMR provisioning is supported by your installed DS-Client, you should leave this option unchecked. Backup strategy for backed up files This covers how DS-Client handles files that are already backed up. Force backup even if the If selected, DS-Client will force a re-backup of a file, even if its last modimodified time and size fied time and size have not changed since the last backup. did not change Exchange Cluster Options Microsoft Exchange Server only This option only applies to Microsoft Exchange 2007 Servers in CCR (Continuous Cluster Replication) configuration where there is a main node that handles transactions and a passive node that handles only replication.
F1 (Context-Sensitive) Help
If selected, this will backup the passive node. If not selected, this will backup the main node of the Exchange Server. NOTE: Do not change this setting once you have performed a backup of this set.
Timeout
Buffer Size
Each time DS-Client needs to read from the Cloud Server, it queries the database to Query Batch Size return batches of this number of rows at a time (until the query is finished). Range 1-1000, default is 200 (rows) Destination Batch Size Each time DS-Client needs to write to the Cloud Server, it updates the database in batches of this number of rows at a time (until all data is written). Range 1-1000, default is 100 (rows)
Dump to
System i Server Backup Sets Enter Connect As information in this field. Connect as (to Click >> to open the Modify Network Credentials screen. System i server) See Specify Credentials (Windows DS-Client) for more information. Dump to This field shows the location of the data dump. Click >> to open the Select share & path for the database / data dump screen
F1 (Context-Sensitive) Help
sudo as an alternate user (UNIX-SSH only) Advanced Connection Option (UNIX-SSH only) Ask for VMware logon credentials (VMware only)
Prompts you to enter a valid user name and password for SSH connection to the ESX Connect: Ask for VMware ESX Server. credentials Click [...] to edit the credentials. See Specify Credentials (Linux DS-Client) for (VMware only) more information. Shows the credentials that Linux DS-Client will use to access data on the VMware ESX Connect: sudo ESX Servers resources. as an alternate user After successful login to the remote source, "sudo" (switch user) will be per(VMware only) formed for Linux DS-Client to use these credentials. Ask for XenServer Prompts you to enter a valid user name and password for the selected XenServer. API logon credentials Click [...] to edit the credentials. See Specify Credentials (Linux DS-Client) for (XenServer only) more information. Dump Options (Oracle / DB2 / Sybase) Dump to Media management library name (Oracle Only) Archive log path (DB2 only) Shows the location where the database will be dumped. Oracle: Cannot be changed (protocol is set when backup set is created). DB2: Click [...] to edit the dump location. Sybase: Click [...] to edit the dump location. This is the full path on the Oracle Server where the file libobk has been copied. You must specify this path for Oracle running on the AIX platform. This field only appears if the backup set was created with the DB2 Online Backup option selected (Set Properties - Options tab). This is the path where the DB2 Archive Log files are written by the User Exit program. Click [...] to specify the path. This opens the Select Directory screen. This field only appears if the backup set was created with the DB2 Online Backup option selected (Set Properties - Options tab). This path will appear by default in the ArchiveLog Path field of the Restore Wizard for this backup set. This is the path where the DB2 Archive Log files will be retrieved by the User Exit program. Click [...] to specify the path. This opens the Select Directory screen.
Prompts you to enter a valid user name and password for the dump location. Ask for network cre Click [...] to edit the credentials. See Specify Credentials (Linux DS-Client) for dentials more information.
F1 (Context-Sensitive) Help
sudo as an alternate user (DB2 only using UNIX-SSH protocol) Advanced Connection Option (DB2 only using UNIX-SSH protocol)
Shows the credentials that Linux DS-Client will use to access data on the network resource. After successful login to the remote source, "sudo" (switch user) will be performed for Linux DS-Client to use these credentials. The default (if no selection is made) is for DS-Client to run a PERL script. Click [...] to edit the settings. See Advanced Connection Options (Linux DS-Client) for more information.
Uses the share credentials for access to the database. When checked, this disables Access Inteselection of the Connect as (to Database). grated with Share Note: This option will not work if your network is using Windows Integrated Security. Dump Info This field shows the method and location for the database dump. Path: dump to the local database computer's disk storage. DS-Client Buffer: dump to the DS-Client computer's disk storage. DS-Client Pipe: opens a named pipe to send the backup directly through the DS-Client to the DS-System without a database dump. Click >> to open the Select share & path for the database / data dump screen Displays the user access credentials to the shared resource. Click >> to open the Modify Network Credentials screen.
Dump to
F1 (Context-Sensitive) Help
Options
Backup permissions (Windows, NetWare) Backup streams (Windows) Backup EAttributes (NetWare) Run DBCC before backup (Microsoft SQL) Truncate transaction log (Microsoft SQL 2000 & MSDE, MS Exchange Server)
If selected, this instructs DS-Client to backup the active databases Backup active database from the selected Microsoft Exchange item. (VSS-aware backup set; Microsoft This option is provided to allow you to make different selections if Exchange 2010) your backup set has multiple backup items.
DS-Client User Guide v12.0 [Revision Date: October 15, 2012]
Asigra Inc. All Rights Reserved.
F1 (Context-Sensitive) Help
If selected, this instructs DS-Client to backup the passive databases Backup passive database from the selected Microsoft Exchange item. (VSS-aware backup set; Microsoft This option is provided to allow you to make different selections if Exchange 2010) your backup set has multiple backup items. Logical Corruption Check (Oracle Server) Backup Only Current Archived Logs (Oracle Server) Truncate archived logs (Oracle Server) Filter (E-Mail level backup sets: MS Exchange, MS Outlook, Lotus Notes / Domino, GroupWise) Edit Verifies the database for corruptions. Check to backup only those logs that are necessary for the Oracle database. This saves backup space, by avoiding backup of any older logs. Leave this box unchecked if you want to backup all log files. Clear the Oracle Database logs associated with this item after backup. Click to add a filter to the E-Mail backup item. Opens the Select Filter screen. Click to add more backup items. Opens the Select items for backup set screen.
Options
F1 (Context-Sensitive) Help
Backs up the Security Enhanced Linux attribute of files or folders. Local File System and SSH backup sets only. For SSH backup sets with Perl (default), the target Linux machine must have the Linux-UserXAttr package installed in order for this option to appear. For SSH backup sets with Python, the target Linux machine must have the pyxattr package installed in order for this option to appear. Note: How to install xattr with python: Download python xattr from their website (http://pypi.python.org/pypi/ xattr). After extracting the downloaded package, open a terminal and run the command: python setup.py install After the installation finishes, you can use SSH to backup the selinux attribute with python. Backs up the Resource Fork of a file on the Mac platform. Backs up the File Attributes for files on the Mac platform. DS-Client will add the with verify option to the Sybase database dump command it sends when performing the backup. Truncates the database transaction logs before performing the backup. Opens the Directories or Database Tree, allowing you to add or remove backup items.
Backup Resource (Macintosh DS-Client) Backup File Attributes (Macintosh DS-Client) Verify during dump (Sybase) Truncate transaction log (Sybase) Edit (Properties Dialog only)
Send SNMP traps when Check all that apply. Traps are sent according to the configurations in Setup > Configuration > SNMP Successful Completed with errors Incomplete Monitors this set for successful backups (completed without errors or warnings). Monitors this set for backups that are completed with errors. Monitors this set for backup failures (where the backup was stopped, interrupted or could not otherwise finish normally). Completed with warnings Monitors this set for backups that are completed with warnings.
F1 (Context-Sensitive) Help
Use buffer
Detailed log
Stop on errors
Check to access the Continuous Data Protection Settings screen. From there, you can instruct DS-Client how to monitor this backup sets source to immeContinuous Data Protection diately detect and back up changes. Note: This option cannot be used if the Use buffer option is selected. Initial Backup If checked, the backup set is flagged for Initial Backup. Click the [>>] button to select the Initial Backup Path. This box appears if the feature is activated by your Service Provider. If checked, the backup sets files will be excluded from Common File storage reduction. This means duplicate files will be encrypted and backed up individually, thereby potentially increasing the stored size. You can only set this feature in the New Backup Set Wizard. It cannot be changed afterwards. Backup sets are configured to save a specific number of generations. Once a backup item reaches this number of generations, the oldest will be overwritten with each new generation backed up. Check to configure this backup set for BLM. When applicable, the DS-Client will instruct DS-System to send a copy of the oldest generation (that is about to be overwritten) to the BLM Archiver.
Use Local Storage These options appear if you have the Local Storage Tool Enabled from your Service Provider, and you have specified a Local Storage Path in the DS-Client Configuration Parameters Tab screen. Save Check this box to indicate this backup set will also be saved to a Local Storage location (at the DS-Client site). Backup data will be sent to the location specified in the Local Storage Path field. Check this box to indicate this backup set will use the Local Storage as a cache, in case a backup session loses connection with DS-System. Cached backup data will be sent to DS-System at the next connection opportunity (after synchronization). Backup data will be sent to the location specified in the Local Storage Path field.
Cache
F1 (Context-Sensitive) Help
Replicate (Lotus Domino backups only) This option is not supported if the DS-Clients Local Storage Path is configured using a UNC path.
Check this box to use the Lotus Domino replicate function when performing the database dump. This option can speed up the database dump. If selected, the Lotus Domino database dump file must be kept in the DSClient Local Storage location. (Make sure there is enough space to store it.) On each subsequent backup, the Lotus Domino database will only be required to dump the changes since the previous dump file. This can significantly improve the dump speed. After a successful dump, the backup will proceed normally (with master / delta processing, compression and encryption). Click [>>] to choose a specific local storage path for this backup set. Opens the Enter Local Storage Path. If you do not make a selection, the path from the DS-Client Configuration Parameters Tab screen is used. If checked, the backup set is flagged to scan all files in the backup set prior to backup, in order to display an estimated completion time for the backup. You can select the compression type: LZOP: A faster compression than ZLIB, that comes at the expense of less compression. ZLIB: This compression method will normally produce better compression than LZOP, but will take more time to compress. Four different ZLIB strengths are available (Global, High, Medium, and Low). ZLIB Global is the default value set in the DS-Client Advanced Configurations DefaultCompression parameter; ZLIB High corresponds to a value of 9; ZLIB Medium = 6; and ZLIB Low = 3. None: Disables compression for this backup set. (This will only apply to backups performed after this section is made. Any backups currently online will retain the compression type used at the time of backup.)
PreScan
Compression Type
Open Files (File System Backup sets) This information instructs the DS-Client about how to deal with Open (i.e. locked) files. (If the open file has been locked with Deny write by another process, the backup for this file will fail.) Try Deny Write Attempt to open backup file in 'Deny Write' mode. If this fails (because the file is already open), place the backup file in 'Allow Write' mode. This mode prevents any other process from writing to the backup file, while the DS-Client has it open. DS-Client will not back up the file, if another process has already opened it for write. (However, you may instruct the DS-Client to retry backing up the open file.) Attempt to open backup file in 'Deny Write' mode. If this fails (because the file is already open), then open in Allow Write mode and lock the file, thereby preventing any process from writing to the file. This ensures that the most recent version of the file is backed up. Allow another process to read/write to the backup file (no restrictions). Since other applications can write to the file while it is being backed up, this may affect file consistency. Specifies the number of times you want the DS-Client to attempt to backup the file. (Max. 10 retries). Specifies the interval between retries. (Maximum of 999 seconds). Click Pre/Post to access the Pre & Post Execution screen. For more information, see: Pre & Post Execution screen. Click to access the Exclude Old Files screen. For more information, see: Exclude Old Files screen. Note: This option is not available if the Windows System State or Services Database is selected for backup.
Deny Write
Prevent Write
Allow Write Retry times Retry intervals Pre/Post Exclude old files (File System Backup sets)
F1 (Context-Sensitive) Help
Additional Backup Set MySQL backup sets. Options Add locks around insert Lock tables before inserting data on restore. statements (See the MySQL manual page for mysqldump for more information.) Add MySQL specific table create options Add MySQL specific extensions to the backed up database dump. (See the MySQL manual page for mysqldump for more information.) Specify how table rows are inserted into the database dump (i.e. the style of the INSERT statement). (See the MySQL manual page for mysqldump for more information.) Extended - Fast insert. May not be useful for manual loading into non-MySQL databases. Delayed - Uses INSERT DELAYED when inserting rows. Normal - Standard insert. Slower, but may be more portable to other databases. Complete - Uses complete INSERT statements that include column names when inserting rows. Specify how tables are dumped. (See the MySQL manual page for mysqldump for more information.) Lock all tables - Prevent changes to data while backup is in progress (sets the tables to read-only mode for duration of backup). [This option is like using the --lock-tables dump option.] Single transaction - [only works with transactional tables] This dump approach also prevents changes to the backup data, but does not set tables to read-only mode. None - Dump will be performed using the mysqldump function with no special conditions. [This option is like using the --skip-lock-tables dump option.]
Additional Backup Set System i backup sets. Options Backup Private Authorities. Saves any private authorities for objects with the Private Authority (PVTAUT) parameter (This parameter was introduced since IBM i 6.1). When PVTAUT is set to *YES on the System i server, DS-Client is able to save the private authorities attached to any saved objects. This feature allows backup / restore of Public Authorities, Owner and object authorities, Primary group and primary group authorities, and the names of authorizations lists linked to the saved object. NOTE: IBM cautions against using this option for individual objects only because PVTAUT increases the amount of time needed to save an object. It is not recommended that you select this option for large scale backup and recovery of user data.
F1 (Context-Sensitive) Help
(TGTRLS): Specifies the release of the operating system on which you intend to restore and use the object. *CURRENT: The object is to be restored to, and used on, the release of the operating system currently running on your system. The object can also be restored to a system with any subsequent release of the operating system installed. *PRV: The object is to be restored to the previous release with modification level 0 of the operating system. The object can also be restored to a system with any subsequent release of the operating system installed. Previous Target Release NOTES: For system Libraries, Q* Libraries and/or *IBM Libraries, only the current release can be the target release. Not all objects can be targeted to another release. To find out which objects are supported check your IBM System i documentation. If DS-Client cannot backup the object to a previous release, it will retry the command without the TGTRLS parameter; this operation will be show on the log with the message "System i returned previous release target error; trying to rerun the same command without TGTRLS(*PRV) flag." This parameter can only be specified when the backup set is created.
Additional Backup Set Local DS-VDR (VMware VADP) backup sets. Options Backup Virtual Machine Memory Backup Virtual Machines snapshots Export to host ON: Saves the VM state (running programs loaded in memory). OFF: Backs up the VM as if it were not running. ON: Backup will export the actual running VM and all its snapshots. OFF: Backup will export the actual running VM only (no snapshots).
This dropdown list contains the available ESX hosts where you can export the selected Virtual Machines. You must assign one as the target. Click [>>] to open the Specify Credentials screen. This is dropdown list of available Datastores on the destination host where you can export the individual VM disk. You must assign one as the target.
Export to datastore
Pause the applications, in order to guarantee a consistent and usable backup. Attempt to quiesce I/O This option requires that the VMware tools are properly installed and configbefore taking snapshot ured on the Guest Operating System of the Virtual Machine. Attempt to use Change vCenter version 4.0 (or higher) with Virtual Machine version 7 (or above). Block Tracking for Attempts to reconfigure the Virtual Machine to use Changed Block Tracking backing up Virtual (CBT). This monitors if the disk was changed between backup sessions, which Machines improves backup performance if the disk was not changed. For Windows DS-Clients, this is selected by default (it cannot be turned off). If selected, the normal backup (to DS-System) options are disabled. This option is only available when creating the backup set. It cannot be changed once it is set. This type of backup set will export the selected backup items (Virtual Machines) on the corresponding vCenter.
Additional Backup Set Physical to Virtual backup sets. Options Enter vCenter IP Enter the IP address of the vCenter where you want to virtualize the selected physical computer. You must supply the credentials to the vCenter for a user with sufficient permissions to create a Virtual Machine. Click [>>] to open the Specify Credentials screen. Once DS-Client / Local DS-VDR Tool connects to the vCenter, this dropdown list displays the available datacenters. You can select a different one (if more than one are available).
Export to datacenter
F1 (Context-Sensitive) Help
Export to host
Once you select the datacenter, you will be able to select a specific hosts IP address where the virtualized machine will be created. You must supply the credentials to this host. Click [>>] to open the Specify Credentials screen. After selecting the destination host, you must select one of the defined vCenter datastores to which the new VM will belong. This option is selected by default when creating the backup set. It cannot be changed.
Use buffer
Use Local Storage These options appear if you have the Local Storage Tool Enabled from your Service Provider, and you have specified a Local Storage Path in the DS-Client Configuration Parameters Tab screen. Save Check this box to indicate this backup set will also be saved to a Local Storage location (at the DS-Client site). Backup data will be sent to the location specified in the Local Storage Path field. Check this box to indicate this backup set will use the Local Storage as a cache, in case a backup session loses connection with DS-System. Cached backup data will be sent to DS-System at the next connection opportunity (after synchronization). Backup data will be sent to the location specified in the Local Storage Path field.
Cache
F1 (Context-Sensitive) Help
Click [>>] to choose a specific local storage path for this backup set. Opens the Enter Local Storage Path. If you do not make a selection, the path from the DS-Client Configuration Parameters Tab screen is used. If checked, the backup set is flagged to scan all files in the backup set prior to backup, in order to display an estimated completion time for the backup. Backup sets are configured to save a specific number of generations. Once a backup item reaches this number of generations, the oldest will be overwritten with each new generation backed up. Check to configure this backup set for BLM. When applicable, the DS-Client will instruct DS-System to send a copy of the oldest generation (that is about to be overwritten) to the BLM Archiver. You can select the compression type: LZOP: A faster compression than ZLIB, that comes at the expense of less compression. ZLIB: This compression method will normally produce better compression than LZOP, but will take more time to compress. Four different ZLIB strengths are available (Global, High, Medium, and Low). ZLIB Global is the default value set in the DS-Client Advanced Configurations Compression Type parameter; ZLIB High corresponds to a value of 9; ZLIB Medium = 6; and ZLIB Low = 3. None: Disables compression for this backup set. (This will only apply to backups performed after this section is made. Any backups currently online will retain the compression type used at the time of backup.)
PreScan
Compression Type
Additional Backup Set Options The options that appear in this section are specific to the type of backup set: NAS, UNIX-SSH, NFS, Local File System backup sets. System i backup sets. MySQL backup sets. PgSQL backup sets. Oracle backup sets. DB2 Server backup sets. VMware backup sets. XenServer backup sets. Sybase backup sets. VMware VADP backup sets. Physical to Virtual backup sets. Pre/Post Exclude old files Click Pre/Post to access the Pre & Post Execution screen. For more information, see: Pre & Post Execution screen. Click to access the Exclude Old Files screen. For more information, see: Exclude Old Files screen.
Additional Backup Set Options NAS, UNIX-SSH, NFS, Local File System backup sets. Do not follow the Mount Point (UNIX-SSH only) Check to backup only the Mount Point itself (not the data under any Mount Point).
Force backup even if the modi- If selected, DS-Client will force a re-backup of a file, even if its last fied time or size did not change modified time and size have not changed since the last backup. NAS backup sets automatically try to backup using a snapshot of the NAS volume, using the NAS devices native snapshot feature. This option determines the DS-Clients behavior if the NAS snapshot fails (for any reason). ON: (Default) DS-Client will continue the backup by trying to backup the selected volumes data directly from the NAS storage. OFF: DS-Client will stop the backup and report errors.
Generated on: 10/15/12 Page: 867
Confidential.
F1 (Context-Sensitive) Help
NetApp has a Snapdiff API feature that can compare the current snapshot with the previous snapshot of a NAS volume in order to generate the list of new and changed files. If enabled, this can generate significant backup process speed improvements on large volumes with many files. If selected, DS-Client will attempt to use the Snapdiff API. A previous snapshot must also exist for comparison. If Snapdiff fails for any reason, DS-Client will proceed to scan the full NAS volume. Hard Links are created in Unix-based file systems with the ln function. By default, this option is selected for any new backup sets. This means the backup will handle backup of the file and hard link information in order for the hard links to be restored. If this option is not selected, this means any backed up hard link will be restored as a separate (individual) file. Even with this option selected, you must create a backup set that includes all the hard linked files. Otherwise a warning will appear in the Event Log for the backup activity and if you restore from that backup, your existing hard links will be broken. The same applies if you perform a partial restore of hard linked files. Saves any private authorities for objects with the Private Authority (PVTAUT) parameter (This parameter was introduced since IBM i 6.1). When PVTAUT is set to *YES on the System i server, DS-Client is able to save the private authorities attached to any saved objects. This feature allows backup / restore of Public Authorities, Owner and object authorities, Primary group and primary group authorities, and the names of authorizations lists linked to the saved object. NOTE: IBM cautions against using this option for individual objects only because PVTAUT increases the amount of time needed to save an object. It is not recommended that you select this option for large scale backup and recovery of user data. (TGTRLS): Specifies the release of the operating system on which you intend to restore and use the object. *CURRENT: The object is to be restored to, and used on, the release of the operating system currently running on your system. The object can also be restored to a system with any subsequent release of the operating system installed. *PRV: The object is to be restored to the previous release with modification level 0 of the operating system. The object can also be restored to a system with any subsequent release of the operating system installed. NOTES: For system Libraries, Q* Libraries and/or *IBM Libraries, only the current release can be the target release. Not all objects can be targeted to another release. To find out which objects are supported check your IBM System i documentation. If DS-Client cannot backup the object to a previous release, it will retry the command without the TGTRLS parameter; this operation will be show on the log with the message "System i returned previous release target error; trying to rerun the same command without TGTRLS(*PRV) flag." This parameter can only be specified when the backup set is created. Lock tables before inserting data on restore. (See the MySQL manual page for mysqldump for more information.)
Additional Backup Set Options MySQL backup sets. Add locks around insert statements
F1 (Context-Sensitive) Help
Add MySQL specific table create Add MySQL specific extensions to the backed up database dump. options (See the MySQL manual page for mysqldump for more information.) Specify how table rows are inserted into the database dump (i.e. the style of the INSERT statement). (See the MySQL manual page for mysqldump for more information.) Extended - Fast insert. May not be useful for manual loading into non-MySQL databases. Delayed - Uses INSERT DELAYED when inserting rows. Normal - Standard insert. Slower, but may be more portable to other databases. Complete - Uses complete INSERT statements that include column names when inserting rows. Specify how tables are dumped. (See the MySQL manual page for mysqldump for more information.) Lock all tables - Prevent changes to data while backup is in progress (sets the tables to read-only mode for duration of backup). [This option is like using the --lock-tables dump option.] Single transaction - [only works with transactional tables] This dump approach also prevents changes to the backup data, but does not set tables to read-only mode. None - Dump will be performed using the mysqldump function with no special conditions. [This option is like using the --skip-lock-tables dump option.]
Additional Backup Set Options PgSQL backup sets. Backup only the schema, not the data Dump only the schema (data definitions).
Do not backup privileges (Grant Will backup only the data, not including the privileges of the database. / Revoke) Backup data as INSERT, rather than COPY Vacuum database before Backup Dumps data as INSERT commands (instead of COPY). This will make restores very slow, but it will make those backups more portable to other SQL database packages. Optimizes the PostgreSQL database before performing the backup (analyzes the database and performs garbage collection). Check to backup ownership of any objects within the database (e.g. tables). Note: By default, this option is off. However, the ownership of the entire database is always backed up by DS-Client (independent of this option). (Default is on) Will perform a corruption check on the database prior to backup. Check to backup only those logs that are necessary for the Oracle database. This saves backup space, by avoiding backup of any older logs. Leave this box unchecked if you want to backup all log files Clear the Oracle Database logs associated with this item after backup.
Additional Backup Set Options Oracle backup sets. Logical Corruption Check Backup only current archived logs Truncate archived logs
F1 (Context-Sensitive) Help
DS-Client will backup the Oracle database using the RMAN compression option backup as compressed backupset. This requires more CPU during backup, but results in a smaller output file (i.e. it can reduce the size and time of the DB dump). Using this compression will limit the Master / Deltas block-level incremental reduction, since the DS-Client will not find any repeated blocks in subsequent Delta generations. None: No RMAN compression. Archive Logs: RMAN compression applied only to Archive Logs. Archive Logs and Tablespaces: RMAN compression applied to both Archive Logs and Tablespaces. If you are using DS-PIPE, this field appears. RMAN requires the Media Management Library libobk.so in order to backup / restore using a PIPE. The exact library name will be slightly different, depending on the platform. For more information, refer to the Oracle Server Requirements section of the Knowledge Base Article Backup / Restore of Oracle Database Servers. You can specify the exact path (including filename) to the corresponding libobk.so for the Oracle servers platform. These library files can be found in the DS-Client installation directory. If you do not specify a path, the default path will be used: $ORACLE_HOME/lib/libobk.so Make sure Oracle has full rights to read and execute in the library path. Note: DS-Client does not validate this path. It simply forwards it to RMAN. (Multi-channel backups are only used for Dump. It does not apply when backing up through DS-PIPE.) The maximum number of channels DS-Client will allocate when backing up the database. DS-Client can support up to 32 channels. The actual number that will be used depends on the datafile count for a tablespace. Delete entries from the history file or log files from the active log path. If unchecked, perform Offline DB2 backup. During an offline backup, applications cannot connect to the database. If checked, perform Online DB2 backup. An online backup allows applications to connect to the database and read and write to tables during database backup. Log retain or userexit must be enabled for an online backup. Pause the applications, in order to guarantee a consistent and usable backup. This option requires that the VMware tools are properly installed and configured on the Guest Operating System of the Virtual Machine.
Additional Backup Set Options DB2 Server backup sets. Prune History / Logfile
Online Backup
Additional Backup Set Options VMware backup sets. Attempt to quiesce I/O before taking snapshot
Include Virtual Machine memory Include the Virtual Machines memory to be able to restore the VM in a in the backup snapshot running state. Wait after snapshot Time (in seconds) DS-Client will wait after the snapshot is taken before starting the backup. Default is 0, range is 0-600 Applies to each file in the backup set. This is the maximum number of backup re-tries if libcurl transmission errors are encountered during a backup session. Default is 0, range is 0-100
Generated on: 10/15/12 Page: 870
Confidential.
F1 (Context-Sensitive) Help
Additional Backup Set Options XenServer backup sets. If a Virtual Machines status is not shutdown, then that VM is not able Skip Virtual Machines not ready to export as backup. Virtual Machines that are running or suspended for export will be skipped. This options appears if the XenServer supports a snapshot feature. If checked, the Virtual Machine will be backed up using XenServer's native Snapshot capability. This means the Virtual Machine can be backed up even if the Virtual Machine is running. If unchecked, the Virtual Machine must be stopped in order to perform a backup. Notes: 1) If editing an existing XenServer backup set, and DS-Client cannot connect to the XenServer, the message Unable to determine availability will appear. 2) If Use Snapshot is selected, any backed up generation can only be restored as a Template. If selected, instead of dump files, the DS-Client will create Pipes (FIFO files) in the dump directory and instruct Sybase to dump there. ON: Saves the VM state (running programs loaded in memory). OFF: Backs up the VM as if it were not running. ON: Backup will export the actual running VM and all its snapshots. OFF: Backup will export the actual running VM only (no snapshots).
Additional Backup Set Options Sybase backup sets. Use file-based pipes to backup the data
Additional Backup Set Options VMware VADP backup sets. Backup Virtual Machine Memory (Local DS-VDR backup set) Backup Virtual Machines snap- shots (Local DS-VDR backup set) Export to host (Local DS-VDR backup set) Export to datastore (Local DS-VDR backup set) Attempt to quiesce I/O before taking snapshot
This dropdown list contains the available ESX hosts where you can export the selected Virtual Machines. You must assign one as the target. Click [>>] to open the Specify Credentials screen. This is dropdown list of available Datastores on the destination host where you can export the individual VM disk. You must assign one as the target. Pause the applications, in order to guarantee a consistent and usable backup. This option requires that the VMware tools are properly installed and configured on the Guest Operating System of the Virtual Machine. vCenter version 4.0 (or higher) with Virtual Machine version 7 (or above). Attempts to reconfigure the Virtual Machine to use Changed Block Tracking (CBT). This monitors if the disk was changed between backup sessions, which improves backup performance if the disk was not changed. [Local DS-VDR Tool must be configured.] If selected, the normal backup (to DS-System) options are disabled. This option is only available when creating the backup set. It cannot be changed once it is set. This type of backup set will export the selected backup items (Virtual Machines) on the corresponding vCenter. Enter the IP address of the vCenter where you want to virtualize the selected physical computer. You must supply the credentials to the vCenter for a user with sufficient permissions to create a Virtual Machine. Click [>>] to open the Specify Credentials screen.
Enter vCenter IP
F1 (Context-Sensitive) Help
Export to datacenter
Once DS-Client / Local DS-VDR Tool connects to the vCenter, this dropdown list displays the available datacenters. You can select a different one (if more than one are available). Once you select the datacenter, you will be able to select a specific hosts IP address where the virtualized machine will be created. You must supply the credentials to this host. Click [>>] to open the Specify Credentials screen. After selecting the destination host, you must select one of the defined vCenter datastores to which the new VM will belong. This option is selected by default when creating the backup set. It cannot be changed.
Export to host
This dropdown list contains the available ESX hosts where you can export the selected Virtual Machines. You must assign one as the target. Click [>>] to open the Specify Credentials screen. This is dropdown list of available Datastores on the destination host where you can export the individual VM disk. You must assign one as the target.
Export to datastore
Additional Backup Set Options (Backup Set Properties dialog only) Attempt to quiesce I/O before taking snapshot Pause the applications, in order to guarantee a consistent and usable backup. This option requires that the VMware tools are properly installed and configured on the Guest Operating System of the Virtual Machine. vCenter version 4.0 (or higher) with Virtual Machine version 7 (or above). Attempts to reconfigure the Virtual Machine to use Changed Block Tracking (CBT). This monitors if the disk was changed between backup sessions, which improves backup performance if the disk was not changed. This option is selected by default when creating the backup set. It cannot be changed. This type of backup set will export the selected backup items (Virtual Machines) on the corresponding vCenter.
F1 (Context-Sensitive) Help
These settings are applied each time the set is backed up.
Backup set options Some options may not appear or may be grayed out, depending on your backup selection and DS-Client configuration. If checked, files will be copied to the DS-Client Buffer (i.e. as fast as possible for the given server and LAN speed). This will free up the backup source as fast as possible. Then the DS-Client will send the files from the DS-Client buffer to the DS-System. Note: This option cannot be used if Continuous Data Protection (CDP) is selected. Records all files that are backed up (you may view them in the Activity Log). Specifies that a backup stops if this number of errors are encountered. range 0-9999, 0 = no limit Note: The global default that appears in the New Backup Set Wizard can be configured using the Windows DS-Client MaxErrors Advanced Parameter. If checked, the backup set is flagged for Initial Backup. Click the [>>] button to select the Initial Backup Path. [Properties Tab only] Backup sets are configured to save a specific number of generations. Once a backup item reaches this number of generations, the oldest will be overwritten with each new generation backed up. Check to configure this backup set for BLM. When applicable, the DS-Client will instruct DS-System to send a copy of the oldest generation (that is about to be overwritten) to the BLM Archiver. If checked, the backup set is flagged to scan all files in the backup set prior to backup, in order to display an estimated completion time for the backup. You can select the compression type: LZOP: A faster compression than ZLIB, that comes at the expense of less compression. ZLIB: This compression method will normally produce better compression than LZOP, but will take more time to compress. Four different ZLIB strengths are available (Global, High, Medium, and Low). ZLIB Global is the default value set in the DS-Client Advanced Configurations Compression Type parameter; ZLIB High corresponds to a value of 9; ZLIB Medium = 6; and ZLIB Low = 3. None: Disables compression for this backup set. (This will only apply to backups performed after this section is made. Any backups currently online will retain the compression type used at the time of backup.)
Use buffer
Detailed log
Stop on errors
Initial Backup
PreScan
Compression Type
Use Local Storage [Properties Tab only] These options appear if you have the Local Storage Tool Enabled from your Service Provider, and you have specified a Local Storage Path in the DS-Client Configuration Parameters Tab screen. [Properties Tab only] Check this box to indicate this backup set will also be saved to a Local Storage location (at the DS-Client site). Backup data will be sent to the location specified in the Local Storage Path field.
Save
F1 (Context-Sensitive) Help
Cache
[Properties Tab only] Check this box to indicate this backup set will use the Local Storage as a cache, in case a backup session loses connection with DS-System. Cached backup data will be sent to DS-System at the next connection opportunity (after synchronization). Backup data will be sent to the location specified in the Local Storage Path field. [Properties Tab only] Click [>>] to choose a specific local storage path for this backup set. Opens the Enter Local Storage Path. If you do not make a selection, the path from the DS-Client Configuration Parameters Tab screen is used.
Database Backup Policy Some options may not appear, depending on your backup selection and DS-Client configuration. Full dump: Always [Default] This is the default behavior for all Windows database backups. Each backup of the target Server performs a full dump of each database. Performs a full dump of the database on first backup, followed by differential backups until another full backup is needed (*). [MS SQL Server backup sets] The database can be selected with or without the backup transaction log option. Performs a full dump of the database on first backup, followed by incremental backups until another full dump is needed (*). [MS SQL Server backup sets] The database should be selected without the backup transaction log option. (Even if backup transaction log is selected, that option will be ignored if this backup policy is selected.) [MS SQL Server backup sets] The databases Recovery Model must be: full or bulk_logged.
(*)
A full dump is needed (other than first time) when: a database has been backed up by another backup set (or manually from the SQL tools); a database has been restored (either from another database or an earlier generation); the database properties have been modified (recovery model switched to simple); local cache is used for the backup set (This can occur for Regular backup sets with the option Transmission cache on local storage, but only when a generation must actually pass through the local cache. If the connection to DS-System is down, then a full dump occurs and is written to the local cache. After that dump, DS-Client continues with the selected database backup policy.) the DS-Client requires a Master generation (configured in the MasterGenerations value of the DS-Client Advanced Parameters - Setup Menu > Configuration > Advanced Tab).
Database Backup Policy Schedule Over-ride Rules [OPTIONAL] This entire section is optional. It provides more precise control over the full dump for large Microsoft databases in high performance environments. These over-ride rules are applied in addition to the regular backup schedule for this backup set. This means the backup set must be scheduled to run on the first day of the month, if the over-ride rule Full every month on 1st day... will apply. Prevents a full dump from being performed during the time window on the selected day(s). This skips performing a full dump of the database, for up to the maximum number of consecutive times specified in the MaxNonFullDumps parameter of the DS-Client Advanced Parameters (Setup Menu > Configuration > Advanced Tab). For database integrity reasons, a full dump should be performed before that amount is reached. DS-Client will automatically try to run one full dump (once a day) if this option is set. Forces a full backup to be performed at the specified interval. hour(s), day(s), week(s), month(s), or year(s)
Full every
F1 (Context-Sensitive) Help
Forces a full backup to be performed on a specific day of the week. You must specify a time, after which the full backup can be performed. Forces a full backup to be performed on a specific day of the month. You must specify a time, after which the full backup can be performed.
Pre/Post Click to access the Pre & Post Execution screen. For more information, see: Pre & Post Execution screen.
Read buffer size for backup This option adjusts the internal buffer amount that the DS-Client allocates for reading individual files for backup. Use DS-Clients settings (Default) Uses the setting in the DS-Client Advanced Configurations > Category: Performance > Parameter: FileReadBufferSize. You can override the default and set a custom value that only applies for this backup set. You must be able to test the different settings to determine the optimal value. WARNING: Slower storage may suffer performance drops if this value is not properly set.
F1 (Context-Sensitive) Help
Set type
Set ID
Customer
Backup Information Last backup (Windows DS-Client) Last backup set update time (Linux DS-Client) Last successful
Online amount
Online files
F1 (Context-Sensitive) Help
Allows you to use the DS-Client services account credentials to connect to the local (DS-Client) computer. Use DS-Client Account You must be logged in through DS-User using an Administrator account (or (Windows DS-Client only) equivalent). This option is only available when you select My Computer (i.e. the local DS-Client computer). Ask for NAS API credenPrompts you to enter valid connection information for the selected NAS. tials Opens the Enter NAS API Parameters (Windows DS-Client) screen. (Windows DS-Client only) Disk share File system Maximum filename length Case preserved File compression Case sensitive Volume compressed Persistent ACL Shows the selected disk share on the provider\node, where the backup items are located. If there are more than one shares included in this backup set, then you may switch between them by selecting the share from the drop down list. Shows the file system name associated with the selected disk share. Shows the maximum number of characters in any filenames originating from the share. A check indicates the share's file system preserves the case of the filenames when it places a name on disk. A check indicates the share's file system supports file-based compression. A check indicates the share's file system supports case-sensitive filenames. A check indicates the share's volume is a compressed volume. A check indicates the file system preserves and enforces ACLs (Access Control List, file security).
F1 (Context-Sensitive) Help
The Discovery Wizard helps you to identify all the unprotected resource (shares) on your LAN. This screen allows you to select additional options that can apply once any unprotected network resource(s) have been discovered.
Create new backup sets for unprotected computers\shares If selected, a new backup set will be created for each unprotected computer the scan identifies. Owner Schedule Add System State Add Services DB Select the user that will become the owner of any backup set created by this process. This list comes from the Users & Groups screen on the DS-Client computer. Select the schedule (or None) to apply to any backup set created by this process. If a backup set is created for a new computer, this option includes the Windows System State backup item. If a backup set is created for a new computer, this option includes the Windows Services Database backup item.
Send notification If selected, a notification E-Mail is sent on completion of the scan. E-Mail Format Enter the E-Mail address of the recipient. Choose the E-Mail format: HTML Plain Text
F1 (Context-Sensitive) Help
Connect As (Windows DS-Client only) Description Scanned Size Options Enable Disable Set Credentials
Shows the username of the credentials used to connect to that share. Shows additional information about the share (if any). Shows the size of the share (in bytes). Allows the highlighted share(s) to be scanned. Removes the highlighted share(s) from the scan process. The Share Discovery Process automatically disables shares that it detects to be redundant or inaccessible. Highlight individual shares and click Enable/Disable to add/remove from the Scan. Opens the Set Credentials screen. Removes the highlighted share from the list (along with all associated scan settings for that share).
Remove
Opens the Set Follow Option screen (NTFS only) for the highlighted share(s): Follow - Will follow Reparse Points encountered in a scanned share. A Reparse Follow Reparse Point Point is a link to a different location (directory or device). This will result in a (Windows DS-Client larger amount scanned. only) Don't Follow - Will not follow Reparse Points encountered in a scanned share. Reverse follow setting - Inverts the highlighted share(s) setting.
SMTP settings
This screen allows you to configure the SMTP notification settings.
SMTP Server Settings SMTP Server Port Type the DNS name or IP address of the SMTP server to use. Enter the port number to use. (The default is 25.)
F1 (Context-Sensitive) Help
Check to configure authentication settings (if required): Account name: Username to connect to SMTP server. Password: Enter password. Confirm: Confirm password. Select if the SMTP server you are using requires the SSL (Secure Sockets Layer) protocol for communication. Public E-Mail servers that support SSL include: Gmail server Yahoo server Select if the SMTP server you are using requires the TLS (Transport Level Security) protocol for communication. Public E-Mail servers that support TLS include: Gmail server Yahoo server Hotmail server
F1 (Context-Sensitive) Help
F1 (Context-Sensitive) Help
Weekly Monthly
One snapshot per week is kept, going back this number of weekly copies. Week Start / Week End: same as above, except the interval is in weeks. One snapshot per month is kept, going back this number of monthly copies. Month Start / Month End: same as above, except the interval is in months. One snapshot per year is kept, going back this number of yearly copies. Year Start: The snapshot that is kept is the first one from the beginning of the calendar year. Year End: The snapshot that is kept is the last one from the end of the calendar year.
Yearly
F1 (Context-Sensitive) Help
To configure a new Snapshot Schedule, click [...] to open the Snapshot Transfer - Snapshot Schedule Management screen.
Volume level
qtree level
F1 (Context-Sensitive) Help
Bandwidth
Description
F1 (Context-Sensitive) Help
Network Credentials User Name Password Enter a valid User Name. Enter the corresponding password. Select the Server where the User Name is defined. This field appears if the sever you want to connect to can require additional information. This field can appear in two forms: An editable drop down list appears. You can type or select the server/ domain where the specified user account is defined. An edit field appears if the server you are connecting to can have "From" information (ex: context in NDS authentication). For NetWare servers, you should supply a context. If you provide From information, NDS authentication will be used as .username.from. Otherwise, bindery authentication will be performed.
From
Notes NetWare
Database Credential Information Enter a valid database User Name. Enter the corresponding password.
Database Credential Information Enter a valid database User Name. Enter the corresponding password.
Database Credential Information Enter a valid database User Name. Enter the corresponding password. Type the name of the Oracle service database you wish to backup. The DS-Client computer must be running the Oracle client with Recovery Manager. The target Oracle server must have the file ORASTBT.DLL in its System Root path.
Database Credential Information Enter a valid database User Name. Enter the corresponding password.
Database Credential Information You must search for the notes.ini file that specifies the user.id credentials for this specific Lotus Domino Server Database. The user.id file is provided by the Lotus Notes Administrator. (The password must also be supplied by the Lotus Notes Administrator.) The notes.ini file is generated by the Lotus Notes (client) installation on the DS-Client computer. If you move these files, make sure to edit the notes.ini file to reference the exact current path (as seen from the DS-Client computer) to the user.id file in its KeyFileName parameter. Enter the corresponding password.
Generated on: 10/15/12 Page: 885
Confidential.
Connect As
Password
F1 (Context-Sensitive) Help
Backup from the Database Credential Information Cloud Username Password Enter the Salesforce.com username and password. Enter the corresponding password. Note: If you ever need to change this password, you must also update your security token from Salesforce.com (by obtaining a new one from them). Select the target database for backup: Production (default): This the live, functioning version of the Salesforce.com database. Sandbox: This is the developer / testing version of the Salesforce.com database. The security token that was E-Mailed to you by Salesforce.com.
Target Token
Network Credential Information User Name Password / Passphrase Enter a valid User Name. Enter the corresponding password (or passphrase). Passphrase is for UNIX-SSH only, when you select or specify a Private Key File. The passphrase will be used for public key authentication. This feature allows you to backup/restore using SSH public-key authentication. 1. If no private key file is specified: If a default private key file is found on the DS-Client machine, try public-key authentication first. If that fails, try password authentication. If no default key file is found, try password authentication only. 2. If a private key file is specified for the backup set: The SSH connection will use public-key authentication only.
F1 (Context-Sensitive) Help
These credentials will be used to access the data. For security reasons, you may not want to use a super user for remote login to a source machine. Linux DS-Client will login to the source machine as a regular user, and then use sudo to execute a shell as an alternate user with higher access permissions. Linux DS-Client will login to the source machine with the supplied network credentials (or Java DS-User login user if none are supplied). When accessing data, Linux DS-Client will use sudo to execute a shell as this alternate user. Enter the User Name of the alternate user on the source machine This is the user that DS-Client will use to perform the command (e.g. root). For this to work, the user that connects to the source machine must be granted permission on that machine to perform sudo. Enter the password of the user that connects to the source machine.
Database Credential Information Enter a valid database User Name Enter the corresponding password Enter the port that will be used to connect to the database. Use the default, unless you know for certain the database is configured to allow backup / restore on a different port.
DB2 Server User Name Password Node Name Port Number DB2 Client Instance
Database Credential Information Enter a valid database User Name on the DB2 database server you want to back up. Enter the corresponding password Enter the local alias of the target DB2 server node. This is the name on the DS-Client computer that is used to identify that node. This is only required for remote DB2 server backup and restore (i.e. if the DB2 is not on the same machine as the DS-Client). Enter the TCP/IP port number of the DB2 Server Database Manager instance. Enter the local DB2 instance name installed on the DS-Client computer.
Database Credential Information Enter a valid database User Name. This user must have the SYSDBA privilege, otherwise you will get an ora-1031 error. Enter the corresponding password. Enter the Service Name of the Oracle database you wish to backup. The Service Name is the TNS alias that is specified in the tnsnames.ora file on your Oracle client.
Database Credential Information Enter a valid database User Name Enter the corresponding password
NAS API Credential Information Specifies the NAS device type, vendor or specific model. Currently supported types: NetApp FAS filers
F1 (Context-Sensitive) Help
Specifies the protocol for accessing the API. Commonly used protocols are HTTP or HTTPS. The specific protocol must be enabled on the NAS device. Specifies the port number for accessing the API. This port must be open on the NAS device. Specifies the User Name for a user on the NAS device. This user requires permissions to execute the API commands on the NAS device and usually needs to be a member of the Administrators group. Specifies the corresponding password for the NAS user. Specifies the mount point that DS-Client will use to mount the NAS share during the backup/restore.
F1 (Context-Sensitive) Help
Node / Set (Java DS-User) Select (Win32 DS-User) Refresh Chart options section Interval View (Java DS-User)
Series
F1 (Context-Sensitive) Help
F1 (Context-Sensitive) Help
Tape List
Description
F1 (Context-Sensitive) Help
Title Setting
(Win32 only) This screen controls the title settings for the Load Summary.
Text Font Size Style Word wrap
Node List Server Name - Network name of the computer. IP Address - Network IP address of the computer. Version - Operating System version running on the computer. Revision - Operating System service pack / update level. New - Indicates if the computer is new (was not backed up prior to the last scan). Note - Additonal notes, if available. E-Mail Exclude Shares Backup Set E-Mail the results of the last Unprotected LAN Resource scan. Opens the Send Unprotected LAN Resource Discovery E-Mail screen. Exclude the highlighted computers (nodes) from the next scan. View a list of the unprotected resources, sorted by share. Opens the Unprotected LAN Resource Share Summary screen. View a list of the new backup sets automatically created by the last scan process. Opens the New Backup Sets Summary screen.
Select By Server Type - Display the list of unprotected computers that fit the selected category. Refresh Update the list based on the Select by options.
Node List Server Name - Network name of the computer. Share Name - Share name on the computer. Share Path - Share path on the computer. Connect As - Credentials used to connect to the share. File System - File system running on the corresponding share. New - Indicates if the share is new (was not backed up prior to the last scan). E-Mail E-Mail the results of the last Unprotected LAN Resource scan. Opens the Send Unprotected LAN Resource Discovery E-Mail screen.
Generated on: 10/15/12 Page: 892
Confidential.
F1 (Context-Sensitive) Help
Exclude
Select By Server Name - Allows you to filter for a specific computer. Share Type - Allows you to filter for shares that are protected or unprotected. Refresh Update the list based on the Select by options.
Description/Full Name Shows the description of a group, or the full name of a user. From
F1 (Context-Sensitive) Help
View Quotas
This screen shows if, and what the storage quota(s) are for your Customer Account, and for this DSClient. This information is view-only (configured by your Service Provider from the DS-System side).
Customer Storage Quota Quota Shows the amount (number in MB or GB). This is the total storage quota for all DS-Clients (including this one) of this customer account. Based on Protected Size (Size of the files as they were backed up. This counts the original file size of each generation of a file backed up.) Based on Stored Size (Size on the DS-System) Based on Native Size ('Restorable' Size of the backed up data, including files deleted from source. This only counts the original size of the latest generation of all backed up files.) Storage amount at which the DS-System will stop all backups for this customer. E-Mail will be sent for each checked event, if it occurs. You must tell your Service Provider which E-Mail address in advance. Warning Level 1 Warning Level 2 Warning Level 3 Stop Backup level Quota used (number and percentage) Shows if there is a quota, and the amount (number in MB or GB). This is the total storage quota for all backup sets on this DS-Client. Based on Protected Size (Size of the files as they were backed up. This counts the original file size of each generation of a file backed up.) Based on Stored Size (Size on the DS-System) Based on Native Size ('Restorable' Size of the backed up data, including files deleted from source. This only counts the original size of the latest generation of all backed up files.) Storage amount at which the DS-System will stop all backups for this DS-Client. Warning Level 1 Warning Level 2 Warning Level 3 Stop Backup level Quota used (number and percentage) Shows if there is a quota, and the amount (number in GB). This is the total storage quota for all Local-Only backup sets on this DS-Client.
Calculation method
Used Quota
Calculation method
Stop Backup level Send E-Mail when the following are reached Used Quota
F1 (Context-Sensitive) Help
Calculation method
Used Quota
Based on Protected Size (Size of the files as they were backed up. This counts the original file size of each generation of a file backed up.) Based on Stored Size (Size in the Local-Only storage) Based on Native Size ('Restorable' Size of the backed up data, including files deleted from source. This only counts the original size of the latest generation of all backed up files.) Quota used (number and percentage) Shows how many licenses have been allocated to this DS-Client. If the used amount reaches or exceeds this number, you must ask your Service Provider to increase the pool for this DS-Client. Total number of Virtual Machines using Local DS-VDR. This is a counter that increases each time a Local DS-VDR backup set is used to export a Virtual Machine. (Each VM counts as one license, against the allocted pool for this DS-Client.)
Used