B DP Mail Exc Guide Win
B DP Mail Exc Guide Win
B DP Mail Exc Guide Win
Version 7.1
IBM Tivoli Storage Manager for Mail
Version 7.1
Note
Before you use this information and the product it supports, read the information in Notices on page 201.
iv IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Completing these tasks on the workstation that Privacy policy considerations . . . . . . . . 203
running the Exchange Server . . . . . . . 183
Glossary . . . . . . . . . . . . . 205
Appendix A. Frequently asked A . . . . . . . . . . . . . . . . . 205
questions . . . . . . . . . . . . . 187 B . . . . . . . . . . . . . . . . . 207
C . . . . . . . . . . . . . . . . . 208
Appendix B. Tivoli support D . . . . . . . . . . . . . . . . . 209
E . . . . . . . . . . . . . . . . . 211
information . . . . . . . . . . . . 193 F . . . . . . . . . . . . . . . . . 212
Communities and other learning resources . . . 193 G . . . . . . . . . . . . . . . . . 212
Searching knowledge bases . . . . . . . . . 195 H . . . . . . . . . . . . . . . . . 213
Searching the Internet . . . . . . . . . 195 I. . . . . . . . . . . . . . . . . . 214
Using IBM Support Assistant . . . . . . . 195 J. . . . . . . . . . . . . . . . . . 214
Finding product fixes. . . . . . . . . . 196 K . . . . . . . . . . . . . . . . . 214
Receiving notification of product fixes . . . . 196 L . . . . . . . . . . . . . . . . . 215
Contacting IBM Software Support . . . . . . 196 M . . . . . . . . . . . . . . . . . 216
Setting up and managing support contracts . . 197 N . . . . . . . . . . . . . . . . . 217
Determining the business impact . . . . . . 197 O . . . . . . . . . . . . . . . . . 218
Describing the problem and gathering P . . . . . . . . . . . . . . . . . 218
background information . . . . . . . . . 197 Q . . . . . . . . . . . . . . . . . 219
Submitting the problem to IBM Software R . . . . . . . . . . . . . . . . . 220
Support . . . . . . . . . . . . . . 198 S . . . . . . . . . . . . . . . . . 221
T . . . . . . . . . . . . . . . . . 224
Appendix C. Accessibility features for U . . . . . . . . . . . . . . . . . 224
the Tivoli Storage Manager product V . . . . . . . . . . . . . . . . . 225
family. . . . . . . . . . . . . . . 199 W . . . . . . . . . . . . . . . . . 226
Contents v
vi IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
About this publication
The subject of this publication is Data Protection for Microsoft Exchange Server, a
component of the IBM Tivoli Storage Manager for Mail product.
Data Protection for Microsoft Exchange Server is also known as Data Protection for
Microsoft Exchange. You can use the Data Protection for Microsoft Exchange
software to perform online backups of Microsoft Exchange Server databases to
Tivoli Storage Manager storage. This integration with the Microsoft Exchange
Server application program interface (API) maximizes the protection of data, thus
providing a comprehensive storage management solution.
The IBM Tivoli Storage Manager for Mail Data Protection for Microsoft Exchange Server
Installation and User's Guide 7.1 provides detailed information about how to install,
configure, and use Data Protection for Microsoft Exchange 7.1 in a Windows server
platform. This publication is provided online, in PDF and XHTML format, at the
Tivoli Information Center: http://pic.dhe.ibm.com/infocenter/tsminfo/v7r1/
index.jsp
GUI online help is provided for specific information that is related to tasks that are
performed in the Data Protection for Microsoft Exchange GUI. After you start the
GUI, click the Help menu item on the menu bar, and select Help Topics. The
online help opens in a separate window.
Command-line help
Command-line help is also provided for specific information that is related to tasks
that are performed on the Data Protection for Microsoft Exchange command line.
Enter tdpexcc help on the Data Protection for Microsoft Exchange command-line
interface for a list of available help topics. See Help command on page 128 for
more information.
Publications
Publications for the Tivoli Storage Manager family of products are available online.
The Tivoli Storage Manager product family includes IBM Tivoli Storage
FlashCopy Manager, IBM Tivoli Storage Manager for Space Management, IBM
Tivoli Storage Manager for Databases, and several other storage management
products from IBM Tivoli.
You also can find the Tivoli Storage Manager product family information centers
and other information centers that contain official product documentation for
current and previous versions of Tivoli products at Tivoli Documentation Central.
Tivoli Documentation Central is available at http://www.ibm.com/
developerworks/community/wikis/home/wiki/Tivoli Documentation Central.
viii IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Reading syntax diagrams
The section describes how to read the syntax diagrams that are used in this
publication. To read a syntax diagram, follow the path of the line. Read from left to
right, and top to bottom.
v The symbol indicates the beginning of a syntax diagram.
v The symbol at the end of a line indicates the syntax diagram continues on
the next line.
v The symbol at the beginning of a line indicates a syntax diagram continues
from the previous line.
v The symbol indicates the end of a syntax diagram.
Required Choices:
A
When two or more items are in a stack and B
one of them is on the line, specify one item. C
In this example, you must choose A, B, or C.
Optional Choice:
When an item is below the line, that item is A
optional. In the first example, you can choose
A or nothing at all.
A
When two or more items are in a stack below
B
the line, all of them are optional. In the
C
second example, you can choose A, B, C, or
nothing at all.
Defaults:
A
Defaults are above the line. The default is
selected unless you override it. You can B
override the default by including an option C
from the stack below the line.
x IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Syntax diagram description Example
Footnote:
,
A footnote in the diagram references specific (1)
details about the syntax that contains the repeat
footnote.
Notes:
In this example, the footnote by the arrow
1 Specify repeat as many as 5 times.
references the number of times you can
repeat the item.
Data Protection for Microsoft Exchange software can complete online backups and
restores of Microsoft Exchange Server databases to Tivoli Storage Manager storage
or local shadow volumes. You can run backups and restores by using a
command-line or graphical user interface (GUI). Refer to your Exchange Server
documentation for complete information about the back up and restore of
Microsoft Exchange Servers.
Beginning with Exchange Server 2010, Microsoft no longer supports the Microsoft
Legacy API (streaming) for backup and restore operations. It supports the use of
VSS for the backup and restore.
Data Protection for Microsoft Exchange operations use the Tivoli Storage Manager
application programming interface (API) to communicate with the Tivoli Storage
Manager server, and use the Exchange API to communicate with Exchange Server.
In addition to using these APIs, Data Protection for Microsoft Exchange VSS
operations use the Tivoli Storage Manager backup-archive client (VSS Requestor)
and Microsoft Volume Shadow Copy Service to produce an online snapshot
(point-in-time consistent copy) of Exchange data that can be stored on local
shadow volumes or on Tivoli Storage Manager server storage.
You must install Data Protection for Microsoft Exchange on the same system as the
Exchange Server. For the required level of Tivoli Storage Manager server, see
Software and operating system requirements on page 44. Data Protection for
Microsoft Exchange also supports operations in a Database Availability Group
(DAG) environment.
For Exchange 2013 users, you can back up and restore public folder mailboxes
located on mailbox databases in standalone and TSM configurations. Item-level
restore for public folders is not supported.
For Exchange 2010, public folder databases can be backed up and restored. For
both Exchange 2010 and Exchange 2013, item-level restore for public folders is not
supported.
The term local shadow volumes is used throughout this document to describe data
that is stored on shadow volumes that are localized to a disk storage subsystem.
2 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Backup methods
Data Protection for Exchange uses the VSS method for backing up data.
Data Protection for Exchange tracks and stores mailbox location history, which is
used to automate mailbox restore operations. This action causes a delay before
each backup. In small or centralized Active Directory environment, the delay might
be a few seconds or minutes. In large or geographically dispersed environments,
the delay might take more time.
If you do not plan to use mailbox restore, you can safely disable mailbox history.
VSS framework
VSS provides software and hardware vendors with a common interface model for
generating and managing snapshots.
The Microsoft VSS service manages and directs three VSS software components
that are used during VSS operations: the VSS requestor, the VSS writer, and the
VSS provider. The VSS requestor is the backup software. The VSS writer is the
application software. Examples of application software include Microsoft Exchange
Server and Microsoft SQL Server. The VSS provider is the specific combination of
hardware and software that generates the snapshot volume.
VSS writer
The VSS writer for the Microsoft Exchanger Server is the Microsoft
Exchange Writer. The Microsoft Exchange Writer is provided by the
Microsoft Exchange Information Store service or the Microsoft Exchange
Replication service.
VSS requestor
The Tivoli Storage Manager backup-archive client serves as the VSS
requestor component and communicates with Microsoft VSS services to
access data and create volume shadow copies. Because the Tivoli Storage
Manager backup-archive client acts as the VSS interface, features such as
LAN-free backup, client-side deduplication, data encryption, and data
compression, are available. These feature are enabled by setting certain
options defined in the backup-archive client options file.
This application initiates a snapshot operation. The application sends a
command to the VSS service to create a shadow copy of a specified
volume. The VSS requestor is the Tivoli Storage Manager backup-archive
client.
VSS provider
This application produces the shadow copy and also manages the volumes
where the Exchange data is located. A provider can be a system provider
(such as the one included with the Microsoft Windows operating system).
It can also be a software provider or a hardware provider (such as one that
is included with a storage system).
VSS hardware providers require installation and configuration, including
the installation of all required fix packages. For instructions, see the
documentation for the VSS hardware provider.
For more information about VSS technology, see the Microsoft Technical
Reference document How Volume Shadow Copy Service Works.
The VSS system provider refers to the default VSS provider that is available with
Windows Server. If you are using the Windows VSS system provider, no
configuration is required. However, you can make some configuration changes by
using the VSSADMIN commands. See Microsoft documentation on the VSSADMIN
commands for details.
VSS backup
A VSS backup uses Microsoft Volume Shadow Copy Service technology to produce
an online snapshot (point-in-time consistent copy) of Exchange data.
VSS backups eliminate the need for the server or file system to be in backup mode
for an extended period of time. The length of time to perform the snapshot is
usually measured in seconds, not hours. In addition, a VSS backup allows a
snapshot of large amounts of data at one time because the snapshot works at the
volume level.
VSS backups can be stored on local VSS shadow volumes, or, when integrated with
Tivoli Storage Manager, in Tivoli Storage Manager server storage. Both of these
storage destinations require that sufficient space be available for the snapshot.
When sufficient space is available for the snapshot, VSS backups stored locally on
VSS shadow volumes are directly accessible by the system.
Restoring locally managed VSS backups is fast because the Exchange data is not
transferred from Tivoli Storage Manager server storage over the network.
When you run VSS backups and store data on Tivoli Storage Manager server
storage, sufficient space is temporarily required on local snapshot volumes. This
space is used to hold the snapshot until transfer to the Tivoli Storage Manager
server is complete. After the data transfer to the server is complete, the snapshot
volume is released. The space can be reused.
4 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
If you also store VSS backup locally, in addition to Tivoli Storage Manager server
storage, and the maximum number of local backup versions to be maintained is
reached, the oldest local backup version expires to create the new snapshot for the
backup to Tivoli Storage Manager server storage. The maximum number of local
backup version to be maintained is set in the Tivoli Storage Manager policy.
For data backed up to local VSS shadow volumes, the snapshot backup is on the
shadow copy volume.
For data backed up to both VSS shadow volumes and Tivoli Storage Manager
server storage, a local snapshot backup is run and the data on the local snapshot
volume is sent to the Tivoli Storage Manager server. The local snapshot volume is
retained as a local backup after the transfer to the Tivoli Storage Manager server is
complete.
Data Protection for Exchange completes the following actions when a VSS backup
operation is initiated:
1. Data Protection for Exchange validates the state of Exchange server objects.
2. Data Protection for Exchange begins a session with a Tivoli Storage Manager
server.
3. Data Protection for Exchange verifies that the VSS service is running and that
the Exchange writer is available.
4. The Tivoli Storage Manager VSS requestor lists the backup components
through the VSS writer.
5. The Tivoli Storage Manager VSS requestor runs the VSS snapshot backup
preparation stage.
6. The Tivoli Storage Manager VSS requestor runs the actual VSS backup.
7. The Tivoli Storage Manager VSS requestor runs an integrity check on the VSS
backup.
8. Optionally, the integrity check can be offloaded to an alternative system that
has the Tivoli Storage Manager VSS requestor installed and configured.
9. The Tivoli Storage Manager VSS requestor backs up the data, including
metadata, to a Tivoli Storage Manager server. Optionally, the movement of
data to a Tivoli Storage Manager server can be offloaded to an alternate
system that has the Tivoli Storage Manager VSS requestor installed and
configured.
10. The Tivoli Storage Manager VSS requestor marks the backup as complete in
VSS.
11. Data Protection for Exchange ends the Tivoli Storage Manager server session.
Backups can be stored on local shadow volumes, Tivoli Storage Manager server
storage, or both locations. Backups to Tivoli Storage Manager server storage can be
offloaded to another system as resource relief for production servers. In addition,
backups can be restored to flat files without the involvement of the Exchange
Server.
Backups provide an Exchange Server database integrity check function, but do not
provide an Exchange Server database zeroing function. Full, copy, incremental, and
differential backup types are supported. Different policy settings can be defined for
each backup location and backup type (FULL or COPY).
Consider the following requirements when you plan for VSS backups:
v When you run VSS operations, ensure that you have at least 200 MB of free disk
space on your Windows System Drive. This space is used to hold the metadata
files for Data Protection for Exchange.
v Make sure to review optimal practice recommendations by Microsoft for your
level of Exchange Server.
v Ensure that you have a well-defined and tested recovery plan that meets your
service level objectives.
v Use single hardware LUNs for log and system files.
v Use single hardware LUNs for the database files.
v Use basic disks.
v If you plan to keep some VSS snapshot backups on local shadow volumes only,
make sure to consider the VSS provider-specific implementation and
configuration options when you set up your strategy. For example, if your VSS
hardware provider supports a full-copy snapshot versus a copy-on-write (COW)
snapshot mechanism, full-copy type implementations have greater disk storage
requirements. However, full-copy type implementations are less risky because
they do not rely on the original volume to restore the data. COW
implementations require much less disk storage but rely completely on the
original volume to process a restore. Since these implementations are entirely
controlled by the VSS provider and not Data Protection for Exchange, make sure
to consult your VSS provider documentation for a complete understanding of
your VSS implementation.
v If you run parallel VSS backups, stagger the start of the backups by at least ten
minutes. This interval ensures that the snapshot operations do not overlap. If
you do not stagger the snapshots, errors can occur. In addition, configure the
parallel instance backups so they do not take snapshots of the same volumes.
Ensure that parallel backups do not make a snapshot of the same LUN.
v Do not place multiple volumes on the same LUN. Microsoft advises that you
configure a single volume, single partition, and single LUN as 1 to 1 to 1.Do not
set the ASNODENAME option in the dsm.opt file when you use Data Protection for
Exchange. Setting ASNODENAME can cause VSS backups and VSS restores to fail.
6 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
IBM System Storage requirements
Specific database, log, file, and LUN settings are required for IBM System Storage.
The DS8000, SAN Volume Controller, Storwize V7000, and XIV storage
subsystems require these settings when you plan for VSS backups:
v Place database files on a separate and dedicated logical volume.
v Place logs on a separate logical volume.
v Do not place non-Exchange data on storage volumes that are dedicated to
Exchange.
v When you use hardware snapshot providers, make sure the database LUNs are
dedicated to only one database or application.
v If you delete a LOCAL snapshot that is stored on a SAN Volume Controller or
Storwize V7000 Space Efficient volume (SEV) that has multiple dependent
targets, you must delete them in the same order in which you created them. You
must delete the oldest one first, followed by the second oldest, and so on.
Failure to delete them in this order can cause removal of other snapshots of the
same source.
v (SAN Volume Controller and Storwize V7000 only) If you use multiple target
FlashCopy mappings, a mapping can stay in the copying state after all the
source data is copied to the target. This situation can occur if mappings that
were started earlier and use the same source disk are not yet fully copied.
Because of this situation, initiate local backups for SAN Volume Controller and
Storwize V7000 storage subsystems at intervals greater than the time required
for the background copy process to complete.
This type of backup shifts the backup load from the production system to another
system. An offloaded VSS backup requires a VSS hardware provider that supports
transportable shadow copy volumes is installed on the production and secondary
systems.
Offloaded VSS backups require a Tivoli Storage FlashCopy Manager license. Tivoli
Storage FlashCopy Manager is a separately purchasable program.
Data Protection for Exchange includes the following functions for Exchange Server
DAGs:
v Querying of DAG database copies and their status
When you use Data Protection for Exchange with Exchange Server DAGs, refer to
the following information:
v Use a DAG member to store DAG database backups.
v All DAG members are to use the same VSS policy.
v When migrating backups to DAG member backups, the first backup is to be a
FULL backup.
v When migrating backups to DAG member backups, the previous backups that
are stored under the Data Protection member name must be manually deleted
when they are no longer needed.
v Backups to LOCAL can be restored only to and expired from the Exchange server
on which the backup was made.
v Database restores must be run on the active database.
Review your Microsoft documentation for important details that regard this new
replication technology.
When you use Database Availability Group backup, use the following optimal
practices:
v To decrease the load on the production Exchange server, specify that the
backups are taken from a healthy passive database copy. If no passive copy is
available, the backup is made from the active copy of the database. To specify
that backups are taken from a healthy passive database copy, add
/PREFERDAGPASSIVE to a backup command.
v Use the command-line backup options /EXCLUDEDAGPASSIVE, /EXCLUDEDAGACTIVE,
or /EXCLUDENONDAGDBS to exclude certain databases from backup processing.
v For databases in a DAG that have two or more healthy copies, you can skip the
database integrity check by using the /SKIPINTEGRITYCHECK option.
v To maximize availability, schedule multiple servers to back up copies of each
database. Use the /MINIMUMBACKUPINTERVAL option to ensure that only one copy
is backed up for each backup cycle.
When you use Database Availability Group restore, use the following optimal
practices:
v Run restores to the active database copy.
v Backups to Tivoli Storage Manager can be restored to any Exchange server in the
domain. However, backups to LOCAL can be restored only on the server where
the backup was created.
8 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
v To restore to a server that is hosting a passive database copy, make the copy
active before you run the restore.
v When the restore is complete, you can move the active database copy back to
the passive state.
Backup types
Data Protection for Exchange supports different types of backups. The full backup,
copy backup, incremental backup, and differential backup types can be performed
with VSS operations.
Data Protection for Exchange backup types have the following characteristics:
Full backup (VSS)
A full backup backs up the specified database, and associated transaction
logs. The Exchange Server deletes the committed log files after the
database, and logs are successfully checked for integrity and backed up. If
the database is not mounted, the backup fails and the transaction logs are
not truncated.
Copy Backup (VSS)
A copy backup is similar to a full backup except that transaction log files
are not deleted after the backup. A copy backup is used to make a full
backup of the Exchange Server database without disrupting any backup
procedures that use an incremental or differential backup.
Incremental Backup (VSS)
An incremental backup backs up only transaction logs. The Exchange
Server deletes the committed log files after they are successfully backed
up. These log files are not deleted if the backup fails. Restoration of an
Exchange Server database from an incremental backup requires the
following tasks:
v Restore of the last full backup
v Restore of any other incremental backups that are performed between
the full backup and this incremental backup
v Restore of this incremental backup
The log files are not deleted if databases are not mounted.
Differential Backup (VSS)
A differential backup backs up transaction logs. The log files are not
deleted. When you run a full backup followed by only differential backups,
the last full backup and the latest differential backup contain all data that
is required to bring the database back to the most recent state. This type of
backup is also called a cumulative incremental backup.
Restoring an Exchange Server database from a differential backup requires
the following tasks:
v Restore of the last full backup
v Restore of this differential backup, but no other differential backups
To perform restore processing, Data Protection for Microsoft Exchange requires that
the Exchange Information Store service must be running. However, the databases
that are being restored must be dismounted.
You can use Data Protection for Microsoft Exchange to restore mailbox databases to
a recovery database. With Microsoft Exchange Server, you can also use the item
recovery feature of the Exchange Client to recover messages and folders that are
accidentally deleted. Exchange Server also provides a deleted mailbox feature to
recover deleted mailboxes. For more information, see your Microsoft Exchange
Server documentation. Data Protection for Microsoft Exchange also has a Mailbox
Restore feature that enables mailbox and item level restore operations by using a
batch or drag-and-drop selection method.
The restorefiles command restores the .edb and .log files from specified Data
Protection for Microsoft Exchange VSS backups into a specified directory. This
action enables individual mailbox recovery products from other vendors, including
mailbox recovery tools to be used. You can run the restorefiles command from a
system without an Exchange server that is installed to a specified directory on the
same system as the Exchange server. For more information about this command,
see Restorefiles command on page 153.
When a VSS restore operation is initiated, the Data Protection for Microsoft
Exchange software completes the following tasks:
1. Validates the state of Exchange server objects.
2. When you use the Data Protection for Microsoft Exchange graphical user
interface, you are prompted whether to dismount the databases you are
restoring into.
3. Begins a session with a Tivoli Storage Manager server.
4. Verifies that the VSS service is running and that the Exchange writer is
available.
5. The Tivoli Storage Manager VSS requestor performs the VSS snapshot restore
preparation stage.
6. The Tivoli Storage Manager VSS requestor restores the backup data.
7. The Tivoli Storage Manager VSS requestor marks the restore as complete in
VSS.
8. Optionally, mounts databases to run recovery.
When a mailbox restore operation is initiated, the Data Protection for Microsoft
Exchange software completes the following tasks:
1. Starts a session with the Tivoli Storage Manager server.
2. Queries the Tivoli Storage Manager server for a list of available backups.
3. Selects an appropriate backup that is based on user input.
4. Creates an Exchange recovery database on a specified directory.
5. Restores the selected backup into the Exchange recovery database.
10 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
6. Copies individual mailboxes or individual mailbox items from the Exchange
recovery database into the original mailbox or other location.
7. Removes the Exchange recovery database and all associated files.
When the Mailbox Restore Browser is started, the Data Protection for Microsoft
Exchange software completes the following tasks:
v Detects if there is an existing recovery database. If a recovery database is found,
the browser automatically connects to that database and displays the database
contents. If there is not an existing recovery database, start the mailbox selection
dialog. In this dialog, the user selects a mailbox or database to browse.
v Starts a session with the Tivoli Storage Manager server.
v Queries the Tivoli Storage Manager server for a list of available backups.
v Selects an appropriate backup that is based on user input.
v Creates a recovery database, and restores the selected backup into the recovery
database.
v Connects to the recovery database and displays the contents.
After you select the items and they are restored, you can, optionally, remove the
recovery database.
VSS restore
A VSS restore restores VSS backups (Exchange database files and log files) that are
on Tivoli Storage Manager server storage to their original location.
The key component of producing a VSS instant restore is the speed with which the
application can become operational with the data that is stored on local shadow
volumes. Even though the data is restored relatively quickly, the transaction logs
must be replayed after the restore. The time of recovery for the Exchange database
increases as the number of logs to be replayed increases.
A VSS instant restore is only possible when all of the data from the database that is
specified for restore is on storage subsystems that are supported by the VSS instant
restore. If part of the data that is restored, including the log files, is on a local disk,
a VSS fast restore is completed.
When you perform VSS instant restores, make sure that any previous background
copies that include a copy of a volume that is being restored are completed before
you initiate the VSS instant restore. However, this check is not necessary for XIV,
SAN Volume Controller, or Storwize V7000 with space-efficient target volumes.
You cannot complete a partial restore by using the /partial option when a VSS
instant restore is completed. Although Data Protection for Exchange allows this
operation to begin, it either fails or completes incorrectly. If you restore only one
database from a VSS backup that is stored on local VSS shadow volumes on
DS8000, SAN Volume Controller, Storwize V7000, or XIV, set the InstantRestore
option to False in the Restore Options pane in the Recover tab of the Data
Protection for Exchange GUI, or specify /instantrestore=no on the command-line
interface.
VSS instant restore is the default restore method when all data specified for a
restore is on storage subsystems that are supported by the VSS instant restore. A
failover to VSS fast restore can still occur when an error is detected early enough
in the VSS instant restore process to trigger the failover. In this situation, an error
is logged in the dsmerror.log file. The dsmerror.log file is used by the
DSMAGENT. However, a failover to VSS fast restore might not always be possible.
For example, if an error occurs later in the restore process, VSS instant restore
processing fails without a failover to VSS fast restore. An error can be a pending
background copy on the storage subsystem, a failure to start the FlashCopy
operation on the snapshot provider system, or other hardware error.
12 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
When you plan for VSS instant restore, backups can only be restored to the same
DS8000, SAN Volume Controller, XIV, or Storwize V7000 storage subsystem from
which they are backed up.
This restore capability is referred to as a restore into scenario and requires the
following actions:
v If you are operating a VSS restore of a relocated database, you must use the
restore into function. Also, specify the same database name as the one you are
restoring. The restore fails if you do not specify the same name.
v Running any type of restore into function automatically disables VSS Instant
Restore.
Backups to LOCAL can be restored only to the system where the backups were
created.
SAN Volume Controller and Storwize V7000 provide FlashCopy restore from SE
target volumes and from fully allocated target volumes for which the background
copy of the VSS backup is not yet completed. In addition, the hardware supports a
restore from fully allocated target volumes for which the backgroud copy of the
VSS backup has completed. You can retain multiple FlashCopy images of a source
volume as backup generations at a much reduced storage cost. You do not have to
allocate the full size of the source volume for each backup generation.
For SE target volumes, the SAN Volume Controller and Storwize V7000 hardware
architectures minimize the space that is required to maintain multiple snapshots of
the same source volume. Target volumes are placed into a cascade where each
target is dependent on changes that are recorded in target volumes of subsequent
snapshots. For example, assume that four VSS snapshots are created of a source
volume. S is the source and T1 through T4 are the targets. T1 is the first,
chronologically, and T4 is the last. The following cascade occurs:
S -> T4 -> T3 -> T2 -> T1
The Tivoli Storage Manager server that Data Protection for Exchange connects to
for backup services is called the primary server. If the primary server is set up for
node replication, the client node data on the primary server can be replicated to
another Tivoli Storage Manager server, which is the secondary server.
Each time the backup-archive client logs on to the server for backup services, it
attempts to contact the primary server. If the primary server is unavailable, the
backup-archive client automatically fails over to the secondary server. In failover
mode, you can restore data that was replicated to the secondary server. When the
primary server is online again, the backup-archive client automatically fails back to
the primary server the next time the backup-archive client connects to the server.
You can confirm that Data Protection for Exchange has failed over by looking for
entries about the secondary server in the following log files:
v Tivoli\tsm\TDPExchange\dsierror.log
v Tivoli\tsm\baclient\dsmerror.log
Requirements: To ensure that automated client failover can occur, Data Protection
for Exchange must meet the following requirements:
v Data Protection for Exchange must be at the V7.1 level.
v The primary server, secondary server, and backup-archive client must be at the
V7.1 level.
v The primary and secondary servers must be set up for node replication.
v The following nodes must be configured for replication with the
replstate=enabled option in each node definition on the server:
Data Protection node
Backup-archive client node
Remote DSM agent node for offloaded backups
DAG node, if applicable
v Before the connection information for the secondary server can be sent to Data
Protection for Exchange, the following processes must occur:
14 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
You must back up data at least one time to the primary server.
The following nodes must be replicated at least one time to the secondary
server:
- Data Protection node
- DAG node, if applicable
For more information about automated client failover with the Tivoli Storage
Manager backup-archive client, see Automated client failover configuration and use in
the Tivoli Storage Manager information center (http://pic.dhe.ibm.com/
infocenter/tsminfo/v7r1/topic/com.ibm.itsm.client.doc/
c_cfg_autoclientfailover.html).
Security requirements
Data Protection for Exchange must be registered to the Tivoli Storage Manager
server and use the appropriate node name and password when it connects to the
Tivoli Storage Manager server. Standard Tivoli Storage Manager security
requirements apply to Data Protection for Exchange.
To run backup and restore tasks on Exchange Server, Data Protection for Exchange
must be operating in an account with membership in the Organization
Management group.
To run mailbox restore tasks, Data Protection for Exchange must be operating in an
account with membership in the Organization Management group. The account
must have a live Exchange mailbox in the domain.
The account must have a live Exchange mailbox in the domain. By default,
Windows adds the Exchange Organization Administrators group to other security
groups, such as the local Administrators group and the Exchange Recipient
Administrators group. If these default settings change, the account must be
manually added to these other groups.
When you submit a restore or mount request, all of the volumes that are contained
in the original snapshot set are imported. If the number of volumes that are
imported exceeds the maximum number of allowable mapped volumes for the
environment, the restore or mount operation can fail.
Backup strategies
Depending on your specific requirements that regard network traffic, backup
window, and acceptable restore times, you might choose to follow different backup
strategies. It is important to understand all aspects of Exchange Server disaster
recovery, and backup considerations that are recommended by Microsoft. Refer to
your Exchange Server documentation for this information.
18 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Full backups only
Only full backups are done with this strategy.
This approach is best for Exchange Servers that are relatively small because each
backup contains enough data to restore the entire database. Each backup takes
longer to run. However, the restore process is the most efficient because only the
most recent (or other appropriate) full backup is restored.
If you use this backup strategy, modify the Tivoli Storage Manager storage
management policies to ensure that all incremental backups are stored together on
the Tivoli Storage Manager server (collocated). This action helps improve restore
performance by reducing the number of media mounts necessary for restoring a
series of incremental backups.
This approach might be useful if your backup window and network capacity can
process the backup of all transaction logs that accumulate between full backups.
This strategy requires the transfer of only one differential plus the last full backup
to accomplish a restore. However, the same amount of data must be transferred in
the differential image, as in the series of incremental backups.
Therefore, a full backup plus differential backup policy increases network traffic
and Tivoli Storage Manager storage usage. This policy assumes that the differential
backups are processed with the same frequency as the incremental backups.
Chapter 2. Planning 19
Back up to Tivoli Storage Manager storage versus back up to local
shadow volumes
When you create policy for your backups, consider these differences between
backing up data to Tivoli Storage Manager storage versus VSS disks.
A Tivoli Storage Manager backup operation stores the backed up data on Tivoli
Storage Manager server storage. Although this type of backup typically takes
longer to process than a backup to local shadow volumes, a Tivoli Storage
Manager backup is necessary when long-term storage is needed. Saving Exchange
data on tape for archival purposes is an example of needing long-term storage.
Tivoli Storage Manager backups are also necessary for disaster recovery situations
when the disks that are used for local backups are unavailable. By maintaining
multiple backup copies on Tivoli Storage Manager server storage, a point-in-time
copy is available if backups on the local shadow volumes become corrupted or
deleted.
Backups to Tivoli Storage Manager server storage are dictated by time, not by
versions.
Sufficient local storage space must be available on local shadow volumes for a VSS
backup strategy to be successful. Ensure that there is enough available storage
space that is assigned to the volumes to accommodate your Data Protection for
Exchange backup operations. Environment and storage resources also impact how
many backup versions are maintained on local shadow volumes (for VSS fast
restore and VSS instant restore) and how many backup versions are maintained on
Tivoli Storage Manager server (VSS restore and longer term storage). Create
different sets of policies for backups to both local shadow volumes and to Tivoli
Storage Manager server storage. If you are using a VSS provider other than the
Windows VSS System Provider, make sure to review the documentation for that
specific VSS provider.
Backups to local shadow volumes can be managed by both time and versions.
However, because of a higher frequency of local snapshot creation, and VSS
storage provisioning and space limitations, set up policy for local backups to be
based on version limits. In addition, in DAG environments, all of the DAG
members are to use the same local VSS policy.
Configuration of the VSS provider for SAN Volume Controller and Storwize V7000
controls what type of FlashCopy is run when a VSS snapshot is requested. It also
controls the behavior that results when you use VSS snapshots.
The VSS provider that supports SAN Volume Controller and Storwize V7000 has
the following characteristics:
20 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
v If the VSS provider is configured to use incremental FlashCopy, only one
backup version is allowed. Only one backup version is the limit because each
VSS snapshot request for a source volume causes an incremental refresh of the
same target volume.
In this scenario, deleting the VSS snapshot removes it from the VSS inventory,
but the FlashCopy relationship remains with the SAN Volume Controller and
Storwize V7000. A subsequent VSS snapshot of the same source volume results
in an incremental refresh of the target volume.
v When the VSS provider is configured to use space-efficient target volumes -
specifically, when the background copy rate is set to zero - the following is true:
The deletion of a VSS snapshot, that is represented by a target volume in a
cascade, also causes all target volumes that are dependent on the volume that
is being deleted (that is, the target volumes that were created earlier) to be
deleted. For example, the deletion of a snapshot that is represented by target
volume T2 in the sample cascade S -> T4 -> T3 -> T2 -> T1 causes T2 and T1
to be deleted. The cascade S -> T4 -> T3 remains after the deletion.
When you manually delete backups on the SAN Volume Controller and
Storwize V7000 space-efficient target volumes, and multiple backup versions
exist, the backup that is being deleted, and any older backups that contain the
same volumes are deleted. The deletion might not occur until the next
snapshot operation.
A FlashCopy restore of the source volume from a target volume in a cascade
of multiple target volumes is destructive to the target volume that is being
restored and to all newer targets in the cascade. For example, the restore of a
snapshot that is represented by target volume T3 in the sample cascade S ->
T4 -> T3 -> T2 -> T1 causes T4 and T3 to be deleted. The cascade S -> T2 ->
T1 remains after the restore.
One exception to this pattern is that a FlashCopy restore from an
space-efficient target that is the only target in the cascade is not destructive.
If an space-efficient target volume runs out of space to hold the data from
changed blocks on the source volume, that target volume and all target
volumes that are dependent on that target volume go offline and render those
backup versions unusable.
Given these characteristics, the following requirements apply to Data Protection for
Exchange support of SAN Volume Controller and Storwize V7000:
v Using a mix of space-efficient and fully allocated target volumes is not
supported. You must choose to use either space-efficient or fully allocated
volumes for FlashCopy targets, and set the VSS provider background copy rate
parameter.
A transition from fully allocated targets to space-efficient targets is
accommodated by treating fully allocated targets as if they were space-efficient
when the background copy rate is set to 0.
v To determine how much storage space is required for each local backup, the
backup LUNs require the same amount of storage space as the original LUNs.
For example, if you have a 100-GB database on a 200-GB LUN, you need a
Chapter 2. Planning 21
200-GB LUN for each backup version. In addition, if you use space-efficient
backup versions, refer to following item in this list.
v When you use space-efficient backup versions:
Do not mix persistent and nonpersistent VSS snapshots. Use of a
nonpersistent VSS snapshot that follows one or more persistent snapshots
causes the older persistent snapshots to be deleted when the nonpersistent
snapshot is deleted.
A VSS backup with backupdestination set to TSM creates a nonpersistent
VSS snapshot. Therefore, do not follow a series of backups to local with
backupdestination set to TSM. Instead, set backupdestination to both to send
data to Tivoli Storage Manager while it preserves local snapshot backup
versions. The settings backupdestination=LOCAL and backupdestination=TSM
are mutually exclusive. Do not use both in a backup strategy.
Enable autoexpand for the space-efficient target volumes to avoid out-of-space
conditions.
Allocate enough space for space-efficient target volumes to hold 120 percent
of the data that is expected to change on the source volume in the time
between snapshots. For example, if a database changes at a rate of 20 percent
per day, VSS backups are done every six hours, and a steady rate of change
throughout the day is assumed, the expected change rate between snapshots
is 5 percent of the source volume (20/4). Therefore, the allocated space for the
space-efficient target volumes is to be 1.2 times 5 percent equal to 6 percent of
the source volume size. If the rate of change is not consistent throughout the
day, allocate enough space to the target volumes to accommodate the highest
expected change rate for the period between snapshots.
Do not delete snapshots manually. Allow Data Protection for Exchange to
delete backup versions that are based on the defined policy to ensure that
deletion is done in the correct order. This process avoids deletion of more
backup versions than expected.
Instant restore
Data Protection for Exchange supports VSS instant restore operations when
multiple backup versions exist on SAN Volume Controller and Storwize V7000
space-efficient target volumes.
However, in this situation, VSS instant restore accesses snapshot volumes that
contain dependent FlashCopy relationships. The snapshot volumes that create the
dependency are typically backups that are created after the snapshot that is being
restored. These snapshot volumes are removed for the VSS instant restore
operation to complete successfully. The backups that included the deleted
snapshots are deleted from storage. This destructive restore operation occurs only
when VSS instant restore operations occur in an environment where Data
Protection for Exchange manages multiple backup versions on SAN Volume
Controller and Storwize V7000 space-efficient target volumes.
When multiple backup versions exist, all snapshots that are newer than the
snapshot that is being restored are deleted during the VSS instant restore
operation. The snapshot that is being restored is also deleted. When only one
snapshot backup version exists, the snapshot that is being restored is not deleted.
22 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
More guidelines for SAN Volume Controller and Storwize V7000
environments
There are additional guidelines you can use when protecting data in SAN Volume
Controller and Storwize V7000 environments. For example, you can change the
background copy rate to have the background copies complete more quickly.
The default background copy rate is 50. This value minimizes impact to response
time for host system I/O, but it might not complete background copies as quickly
as you want. Increasing the background copy rate that is used by the VSS provider
to a value greater than 50 causes the background copies to complete more quickly.
Do not set the background copy rate higher than 85 because this action can
significantly lengthen response times to I/O from host systems.
You can review the following guidelines before you attempt backup operations:
v Determine whether to use space-efficient or fully allocated backup targets before
you issue a backup operation. Provision enough target volumes in the SAN
Volume Controller VSS_FREE volume group for as many of the backup versions
you require. If you use fully allocated target volumes, their capacity size must
match the size of the source volumes.
v If space-efficient virtual disks (VDisks) are used for backup targets, set the IBM
VSS provider background copy value to zero by issuing the ibmvcfg set
backgroundCopy 0 command. To activate the changes, restart the IBM VSS system
service after you issue the command. For more details about configuring the
IBM VSS Hardware Provider for space-efficient target volumes, make sure to
read the appropriate VSS-related content in the SAN Volume Controller or
Storwize V7000 documentation.
v Do not mix COPY and NOCOPY FlashCopy relationships from the same source
volume or volumes.
v Do not mix fully allocated and space-efficient VDisks (used for backup targets)
in the VSS_FREE pool.
v If the protected data is on SAN Volume Controller or Storwize V7000 volumes,
and the VDisks in the VSS_FREE pool are space efficient, then VSS instant
restore from multiple backups is possible. However, the VSS instant restore
operation in this environment is destructive.
v Make sure that IBM VSS hardware provider is installed. This provider must be
configured to accommodate multiple backup versions on SAN Volume
Controller or Storwize V7000 space-efficient target volumes.
These guidelines apply specifically to NOCOPY FlashCopy backups on SAN
Volume Controller or Storwize V7000:
v While NOCOPY FlashCopy backups can be mounted remotely, you must use
either SAN Volume Controller or Storwize V7000 storage to restore a NOCOPY
FlashCopy backup.
v You can create a NOCOPY FlashCopy to a space-efficient target. However,
protection from physical failures to the source volume is not provided.
Make sure to review your IBM VSS hardware provider documentation for
important information about these two issues:
v IBM VSS hardware provider prerequisites (for example, Microsoft VSS hotfixes).
v Configuration instructions for creating FlashCopy mappings of NOCOPY
backups on SAN Volume Controller or Storwize V7000.
Chapter 2. Planning 23
FULL_COPY status) are lost. To avoid this situation, use the AUTOEXPAND option
when you create space-efficient targets. This option allocates more physical storage
to prevent space-efficient target volumes that are going offline.
Restriction: When you use VSS instant restore operations with multiple backup
versions that exist on SAN Volume Controller or Storwize V7000 space-efficient
target volumes, use only full or copy type backups when the backup destination
specifies local. A local backup (including any local backups that are created after
the one being restored) is deleted by SAN Volume Controller or Storwize V7000
because of the destructive restore behavior. As a result, any full, copy, incremental,
or differential local backup is removed and unavailable for restore operations. If
you want to use incremental or differential local backups with SAN Volume
Controller or Storwize V7000 space-efficient target volumes, disable VSS instant
restore during any restore operations to avoid this situation.
When you run two Data Protection for Exchange VSS backups and if the volumes
are large, or the background copy rate is set to a low number, or both conditions
occur, the second VSS backup might be presented to be in a hang state. In this
situation, the Exchange Server data is on SAN Volume Controller or Storwize
V7000 disks. However, the second backup is waiting for the SAN Volume
Controller or Storwize V7000 background copy of the first backup to complete
before proceeding. SAN Volume Controller or Storwize V7000 does not allow two
background copies of the same volume to occur at the same time. There is no
indication that the second backup is waiting for the first background copy to
complete.
You might also see timeout errors if the previous SAN Volume Controller or
Storwize V7000 background copy takes too long. To work around this issue,
schedule your VSS backups far enough apart to accommodate this situation. You
can also increase the copy rate of the SAN Volume Controller or Storwize V7000
background copy.
In environments that contain IBM N-series and NetApp systems, snapshots that
are created by using the IBM N-series and NetApp snapshot provider are stored
on the same volume where the LUN are located. Disk space that is used by a local
backup consists only of the blocks that changed since the last local backup was
created. The following formula can be used to help determine how much space is
required for each local backup:
Amount of data changed per hour * number of hours before a local backup expires
24 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
In addition, Write Anywhere File Layout (WAFL) reserves blocks equal to two
times the specified size of the LUN to be used. This space reservation ensures
writes for virtual disks. The following example demonstrates how to calculate the
size of these volumes:
Database size of an Exchange database: 100GB
Number of local backups to be kept: 3
Snapshot for TSM backup: 1
duration for TSM backup: 2hr
Backup frequency: 3hrs
The duration before a local backup is expired: 9 hrs
Amount of data changed/added/deleted per hr: 50MB
Space required for each local backup: 50*9= 450 MB
Space required for 3 local backups + 1 TSM backup: 450*3 + 50*2 = 1450 MB
The volume size required for the database: 100*2 (space reservation) + 1.5 = 201.5 GB
Because of the limitations in SnapDrive 4.2 and any supported prior versions, the
VSS Provider for NetApp FAS series and IBM N-series, VSS-based operations that
use Data Protection for Exchange with backup destination set to LOCAL, must be
done in specific ways. Failure to comply with the following configuration and
operational guidelines can lead to serious conditions such as premature deletion of
snapshots that represent VSS backups to LOCAL, backup failure, and out of space
conditions on the production volumes. When the limitations in the SnapDrive are
addressed by NetApp, Data Protection for Exchange VSS operations can be fully
used. However, this situation is not applicable when FlexVols are used.
If you plan to run VSS backups with backup destination set to LOCAL, check your
setup to ensure that following requirements are met.
v The NAS file server LUNs used by a database must be fully dedicated to the
database. The Exchange Server databases cannot share LUNs.
v A NAS filer LUN used by the Exchange Server databases must be the only LUN
on the filer volume. For example, if Exchange uses four LUNs, there must be
four corresponding filer volumes, each volume that contains one LUN.
Guidelines for VSS backup operations for NetApp FAS series or IBM
N-series
If you plan to run VSS backups with backup destination set to LOCAL, these
backups must adhere to the following guidelines.
v If the NetApp volume type is Traditional, VSS backups with backup destination
set to LOCAL must be bound to a management class that has verExists=1. This
setting is not required if flexible volumes are used.
v VSS backups with backup destination set to LOCAL can either be a full or copy
backup. You cannot mix local backups of type full and copy.
v VSS backups with backup destination set to TSM can be a full or copy backup.
There are no restrictions on Tivoli Storage Manager backups.
v When running VSS backups, you must ensure that previous backup finishes
completely before you start a new backup. Any overlap of backups can result in
undesirable side-effects on the Exchange Server, the VSS service, and, the NAS
filer.
Chapter 2. Planning 25
Sample VSS backup procedure for NetApp FAS series or IBM N-series
Taking the prior considerations into account, the following section describes a
sample backup procedure that can be used to run VSS backups by using both
Tivoli Storage Manager and local backup destinations in an optimal manner. The
following assumptions apply to this sample backup procedure:
v The configuration requirements that are stated are met.
v The VSS backup to Tivoli Storage Manager takes one hour to complete.
v The VSS backup to a local destination takes five minutes to complete.
Your backup procedure can consist of the following backups:
v Daily VSS full backups to a local destination at every four hours - 12 a.m., 4
a.m., 8 a.m., 12 p.m., 4 p.m., 8 p.m.
v Daily VSS full backups to Tivoli Storage Manager storage by one of the
following two methods:
Set backupdestination to BOTH at 12 a.m. This specification creates a 12 a.m.
backup to a local destination. Therefore, no separate 12 a.m. backup to local is
required.
Full offloaded-backup at 1 a.m. No VSS local backup is available to restore
from between 1 a.m. and 4 a.m. when next VSS backup to local takes place.
v run weekly VSS full backups to Tivoli Storage Manager (offloaded backup) 5
a.m.
When planning to protect Microsoft Exchange Server 2013 data, use the following
list to verify your environment is set up correctly:
v Use Exchange 2013 CU2 or later and the correct MAPI download. These
software requirements are documented in the Hardware and Software
Requirements technote. This technote is available in the TSM for Mail - All
Requirement Documents website at http://www.ibm.com/support/
docview.wss?uid=swg21219345. When you are at the website, follow the link to
the requirements technote for your specific release or update level.
v Verify that in the Exchange environment you can open the current
administrator's mailbox in Outlook or Outlook Web App.
v Verify that in the Exchange environment you can open the target mailbox in
Outlook or Outlook Web App.
v (Optional) Use MFCMapi to verify your MAPI configuration. To complete this
verification, a link to a Microsoft blog post is provided http://blogs.msdn.com/
b/dvespa/archive/2013/05/27/omniprof.aspx. If MFCMapi cannot connect to
Exchange, Data Protection for Microsoft Exchange cannot connect to Exchange
either.
26 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Preparing for VSS instant restore in DS8000, Storwize V7000, XIV, and
SAN Volume Controller environments
When you prepare for a restore, consider the type of data that you want to restore
and where the backups are located.
The information in the following list is specific to the DS8000, Storwize V7000, XIV,
and SAN Volume Controller environments. When planning for a VSS instant
restore, consider the following facts:
v Restore granularity is at the volume level.
v VSS requires that data must always be restored to the same drive letters and
paths as existed during the original backup.
v VSS requires IBM System Storage Support for Microsoft Volume Shadow Copy
Service software if you use a DS8000, Storwize V7000, or SAN Volume
Controller disk subsystem.
v VSS requires IBM XIV Provider for Microsoft Windows Volume Shadow Copy
Service if you are using an XIV disk subsystem.
v Backups must be located on the same XIV, DS8000, Storwize V7000, or SAN
Volume Controller storage subsystem to which they are restored.
v In a DAG environment, stop the Microsoft Exchange Replication Service on the
active node before you run the VSS instant restore operation.
v In an Exchange 2013 environment, stop the Exchange Search Host Controller
Service on the active node before you run the VSS instant restore operation.
Policy management
With Data Protection for Microsoft Exchange software you can manage and
configure storage management policy for backups.
Although Tivoli Storage Manager policy determines how Data Protection for
Microsoft Exchange backups are managed on Tivoli Storage Manager storage,
backup retention on local shadow volumes is determined by version and
time-based policies. Ensure that sufficient local storage space is available on local
shadow volumes for a VSS backup. In addition, verify that there is enough
available storage space assigned to the volumes to accommodate your backup
operations. The shadow copy volume that is the storage destination of a snapshot
must have sufficient space for the snapshot.
Environment and storage resources also affect how many backup versions are
maintained on local shadow volumes. The amount of space that is required is
dependent on the VSS provider that you use.
Chapter 2. Planning 27
How backups expire based on policy
Backups expire based on Data Protection for Exchange policy.
Expiration is the process by which Exchange Server backup objects are identified
for deletion. Their expiration date is past or the maximum number of backup
versions that are to be retained is reached.
The data value depends on the business needs that are identified by the recovery
point objective (RPO) and the recovery time objective (RTO) of your enterprise. For
example, legal, operational, and application requirements affect how data must be
protected to meet these RPO and RTO demands. With Data Protection for
Exchange you can specify the number of snapshot backups to retain and the length
of time to retain them.
Backups can expire during the query, backup, or restore operation of a Data
Protection for Exchange session.
For Exchange Database Availability Group backups that use the DAG node, only
the system on which the backup was created can cause a local backup to expire. If
a new backup is created on a different system, and it exceeds the number of
backups to be retained, the oldest backup expires from the Tivoli Storage Manager
server. It can no longer be restored. However, the physical storage for that backup
version is not released until the next time the original system runs a backup, query,
or delete operation.
A number of backup copies are retained. When the maximum number of backup
copies is reached, the oldest backup expires and is deleted. The maximum number
of backup copies is specified in the Data Protection for Exchange policy.
A backup copy is retained for a maximum number of days. The maximum number
of days that a backup can be retained is specified in the Data Protection for
Exchange policy.
The Tivoli Storage Manager server recognizes Data Protection for Exchange as a
node. Data that is backed up to Tivoli Storage Manager storage from this Data
Protection for Exchange node is stored and managed according to settings
specified for Tivoli Storage Manager server policy items.
Tivoli Storage Manager policy can manage the VSS backups that are placed in
Tivoli Storage Manager server storage pools. The Tivoli Storage Manager server is
responsible for managing VSS backups.
If you used IBM Tivoli Storage Manager for Copy Services and upgraded to Data
Protection for Exchange, with the license for Tivoli Storage Manager for Copy
Services, you can store VSS backups to local shadow volumes.
The number of local backup versions that are maintained by the Tivoli Storage
Manager server is determined by the value that is specified by the Tivoli Storage
Manager server verexists parameter that is defined in the copy group of the
28 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
management class to which the local backup belongs. Allocation of Target volume
sets is not necessary when you use the system provider. When you are not using
the system provider, the number of target volume sets allocated for local backups
is to be equal to the verexists parameter. Target volume sets are not applicable to
XIV.
When you use the configuration wizard, offered through the graphical user
interface, the VSSPOLICY parameter that is to be configured is set in the tdpexc.cfg
file.
Depending on the policy management settings, LUNs can also be reused for new
backups. When a new backup is requested and the maximum number of versions
is reached, the software deletes the oldest snapshot (backup) to make space for the
new snapshot. If the new request fails after the oldest snapshot is deleted, you
have one less backup version than expected.
The policy management of local backups is responsible for reconciling the local
backup repository with the information stored on the Tivoli Storage Manager
server. For example, if target volume LUNs that were used for a local backup are
removed from the storage subsystem, the information that represents the backup
on the Tivoli Storage Manager server must be reconciled. Likewise, if the Tivoli
Storage Manager server policy determines that a local backup copy is no longer
needed, the local backup manager must free the target volume LUNs to the storage
subsystem. This release is necessary so that these LUNs can be used for future
backup operations. Tivoli Storage Manager automatically detects these situations
and does the reconciliation.
Consider the scenario where you use a two-member DAG, named MEMBER1 and
MEMBER2. When you complete a backup to LOCAL on MEMBER1 and complete
more backups on MEMBER2, the backups to LOCAL on MEMBER1 are not expired
until the next time you do a backup, query, or deletion operation on MEMBER1.
This scenario can lead to using more storage than specified by verexists.
Because the value of the verexists parameter that is specified for your local
backup policy, determine the number of backup versions to retain on local shadow
volumes, a verexists=1 setting causes the deletion of an existing backup on local
shadow volumes (during a VSS backup to Tivoli Storage Manager server storage)
to create enough temporary space for the new snapshot. Therefore, if you want to
keep N backups on local shadow volumes and also do VSS backups to Tivoli
Storage Manager server storage, provision enough storage space on local shadow
volumes and specify verexists=N+1.
Chapter 2. Planning 29
If you keep only one backup, the same disk is reused. The process initially
removes the existing backup and attempts the new backup. If the new backup
fails, there are no backups.
If you keep multiple backups (snapshots), the oldest backup is removed before a
new backup is created. If the new backup fails, you might have one less backup
than specified by the policy. For example, if you specify that there are to be five
retained backups, but the latest backup fails, you might have only four backup
versions.
Make sure to specify a verexists value that accommodates your VSS backup
goals. If you have limited storage space for VSS operations and are restricted to a
verexists=1 setting, you can take advantage of the Backup DestinationBOTH
option. This stores the backup on local shadow volumes and sends a copy to Tivoli
Storage Manager server storage.
It is possible for VSS backups (that Data Protection for Exchange creates and stores
on local shadow volumes) to be changed and deleted from outside of Tivoli
Storage Manager control. For example, the Microsoft VSSADMIN DELETE
SHADOWS command can remove a VSS backup that are managed by Tivoli
Storage Manager without Tivoli Storage Manager being able to prevent such a
removal. In such a situation, Tivoli Storage Manager recognizes the backup
removal and reconciles its index of available backups with what is on local shadow
volumes. Because of this potential for removal, it is important to establish a
strategy that protects VSS backup data that is stored on local shadow volumes
from being compromised.
The following issues impact your Tivoli Storage Manager policy for managing VSS
backups:
v Overall backup strategy.
v Length of time that VSS backups are on Tivoli Storage Manager server storage.
v Number of VSS backup versions on Tivoli Storage Manager server storage.
v Types of VSS backups that are on Tivoli Storage Manager server storage.
v Number of VSS backup versions on local shadow volumes.
v Types of VSS backups on local shadow volumes.
v The amount of available target volume storage that is provisioned for VSS
operations.
Specify policy binding statements to use for binding snapshots to a policy. You can
specify policy binding statements by using the GUI or by manually adding binding
statements to the configuration file. A default policy binds any backups that are
not explicitly bound to a named policy. Policy binding is available in environments
with or without a Tivoli Storage Manager server.
For Exchange Database Availability Groups (DAG), all the DAG members that
share the DAG node must use the same VSS policy.
30 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
A policy statement is defined in the respective configuration file. For example:
Procedure
1. From the Management Console, select the Exchange Server instance from the
tree view.
2. In the Protect tab, click Properties in the Action pane.
3. Select VSS Policy Binding from the list of available property pages.
4. Add, update, delete, or change the processing order of existing binding
statements.
Tip: You can use a wildcard character (*) to mean "all". For example, specify a
wildcard character in the Server field to bind the policy to all Exchange servers.
5. Optional: Use Move Up and Move Down to modify the processing order.
Policies are processed from the bottom up and processing stops at the first
match. To ensure that more specific statements are processed, the more general
specification are to be listed before the more specific ones. This processes the
general ones after the more specific specifications. Otherwise, the more general
specifications match the target before the more specific specifications are seen.
6. Save any new or changed binding statement.
7. Optional: Verify new or updated policies and bindings.
a. Run one or more test backups.
b. In the Recover tab, verify the management classes that are bound to your
test backups.
For VSS backups, VSSPOLICY statements are used to associate VSS backups with
management classes. These VSSPOLICY statements are entered in the configuration
file (for example, tdpexc.cfg).
Chapter 2. Planning 31
the default management class might differ from the settings used for preexisting
legacy backups. For example, the backup expiration period might be set to 30 days.
This setting means that after 30 days, the backup is deleted. Check the parameters
to verify the backups expire according to the business needs of your environment.
Any policy changes entered in the tdpexc.cfg files require that you restart the
Tivoli Storage Manager Client Acceptor Daemon (CAD), Tivoli Storage Manager
Remote Client Agent (DSMAgent), and the Tivoli Storage Manager Scheduler
Service for Exchange. If the DSMAgent service state is set to Manual (Started), stop
the service. The DSMAgent service starts when a VSS backup is initiated, but if the
service is started and you change the policy settings, the policy settings do not
take effect until you restart the service.
The Exchange server name is defined by the srv name variable. You can enter the
wildcard character (*) to match all Microsoft Exchange servers.
The database name is defined by the "database-name" variable. You can enter the
wildcard character (*) to match all Microsoft Exchange databases. Because the
name can include a space, use the quotation marks to encapsulate the database
name.
The backup-type variable specifies the backup type. For example, FULL or COPY or
the wildcard character (*) to match all backup types.
The backup-dest variable specifies the backup destination. The options are TSM to
backup to Tivoli Storage Manager or LOCAL for a backup to a local disk or the
wildcard character (*) to match both backup types.
The mgmtclass variable specifies the Tivoli Storage Manager management class that
is used to bind the types of specified backups.
32 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
VSSPOLICY SERVER1 "ACT" * LOCAL MCLASS2
VSSPOLICY SERVER1 "DB 1" * TSM IUG1
**********************************************************************
Procedure
To manage DAG members by using a single policy, complete the following steps:
1. Use the Tivoli Storage Manager Configuration Wizard to configure the DAG
node.
v For VSS backups to Tivoli Storage Manager, ensure that you specify a node
name in the DAG Node field in the TSM Node Names page in the wizard.
This node is used to back up all the databases in a Database Availability
Group.
v For best results, ensure that all the DAG members are configured with the
same DAG node name.
Chapter 2. Planning 33
2. Ensure that the Tivoli Storage Manager administrator issues the grant
proxynode command for each member server in the DAG to grant permission
to the DAG member server to act as a proxy for the DAG node. If the
configuration wizard is not used to configure the Tivoli Storage Manager
server, the proxies are to be defined. In addition, the backup archive client node
and the Data Protection node need proxynode authority. The backup archive
client node also needs proxynode authority to act on behalf of the Data
Protection node. For example, the Tivoli Storage Manager administrator can
issue the following commands on the Tivoli Storage Manager server:
register node backup_archive_client_node password
register node data_protection_node password
grant proxynode target=data_protection_node agent=backup_archive_client_node
register node DAG_node password
grant proxynode target=DAG_node agent=backup_archive_client_node
grant proxynode target=DAG_node agent=data_protection_node
3. Ensure that the DAG node and the Data Protection for Exchange node are in
the same policy domain.
4. Create a backup schedule and specify the /MINIMUMBACKUPINTERVAL parameter in
a backup command. You must use the Tivoli Storage Manager scheduler to run
this schedule. For example, to use a single Tivoli Storage Manager schedule to
back up exactly one copy of a database that contains multiple copies, do the
following steps:
a. Create a command script named C:\BACKUP.CMD with the command:
TDPEXCC BACKUP DB1 FULL /MINIMUMBACKUPINTERVAL=60
b. Copy the BACKUP.CMD file to all the DAG members.
c. Create one schedule and associate all the nodes to this schedule.
When the backup schedule is run, the minimum backup interval is observed
and only one backup is created.
5. Optional: To decrease the load on the production Exchange server, you can
specify that the backups are taken from a healthy passive database copy. If a
healthy passive copy is not available, the backup is made from the active copy
of the database. To do this specification, add /PREFERDAGPASSIVE to a backup
command. For example:
TDPEXCC BACKUP DB1 FULL /MINIMUMBACKUPINTERVAL=60 /PREFERDAGPASSIVE
Related concepts:
Migrating backups to a DAG node on page 56
The system where Data Protection for Exchange is installed must be registered to
the Tivoli Storage Manager server with a DAG member name. This DAG member
name owns and manages all Data Protection for Exchange data that is backed up
to the Tivoli Storage Manager server. Specify this DAG member name with the
nodename option in the dsm.opt options file located (by default) in the Data
Protection for Exchange installation directory. To run VSS operations, you might be
required to register DAG member names for more systems.
Use the following Tivoli Storage Manager parameter conditions when you register
your Data Protection for Exchange DAG member name (system) to the Tivoli
Storage Manager server:
34 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
v MAXNUMMP This parameter determines the maximum number of mount points a
client node is allowed to use on the Tivoli Storage Manager server during a
backup operation.
v TXNGroupmax This parameter determines the number of files that are transferred
as a group between Data Protection for Exchange and the Tivoli Storage
Manager server between transaction commit points. This parameter must have a
value of 12 or greater.
v COMPRESSIon This parameter determines whether the backup-archive client node
compresses data before it sends the data to the Tivoli Storage Manager server
during a backup operation. For VSS operations, specify COMPression=Yes in the
backup-archive client options file (dsm.opt) in the backup-archive client
directory.
The Tivoli Storage Manager administrator is to provide you with the node name,
password, and the communications method with the appropriate parameters to
connect to the Tivoli Storage Manager server. These values, with other parameters,
are stored in an options file that are located (by default) in the Data Protection for
Exchange installation directory. If needed, edit the dsm.opt file by using a text
editor.
If you edit the dsm.opt file, make sure that the Data Protection for Exchange
options file and the backup-archive client options file specify the same Tivoli
Storage Manager server.
The options file includes the following parameters, which are required for initial
configuration:
COMMMethod
This option specifies the communication protocol to use between the Data
Protection for Exchange node with the Tivoli Storage Manager server. Data
Protection for Exchange supports the same set of communication protocols
that are supported by other Tivoli Storage Manager clients on Windows
systems. Depending on the chosen commmethod, the connectivity parameters
for that commmethod must be specified as well.
For all backups, specify the commmethod option in the Data Protection for
Exchange options file. In addition, specify the commmethod option in the
backup-archive client options file that is used as the Local DSMAGENT
Node. If the environment is configured for VSS offloaded backups, you
must also specify the commmethod option in the backup-archive client
options file that is used as the Remote DSMAGENT Node.
NODename
The Tivoli Storage Manager node name is the unique name by which Tivoli
Storage Manager recognizes the system that runs Data Protection for
Exchange.
The following options are not required for initial configuration. By default they are
not specified, but you can modify the default settings:
CLUSTERnode
Leave this option blank. When the option is blank, the default value is
used.
Chapter 2. Planning 35
COMPRESSIon
This option instructs the Tivoli Storage Manager API to compress data
before it is sent to the Tivoli Storage Manager server. This compression
reduces traffic and storage requirements. If you enable compression, it
affects performance in two ways:
v CPU usage increases on the system on which Data Protection for
Exchange is running.
v Network bandwidth use is lower because fewer bytes are sent.
v Storage usage on the Tivoli Storage Manager server is reduced.
You might want to specify compression yes if any of the following
conditions exist:
v The network adapter has a data overload.
v Communications between Data Protection for Exchange and Tivoli
Storage Manager server are over a low bandwidth connection.
v There is heavy network traffic.
v You can also use the compressalways yes option (with the compression
yes setting) to specify that file compression continues even if the file
grows as a result of compression.
It might be better to specify compression no in the following cases:
v The computer that runs Data Protection for Exchange has a CPU
overload; the added CPU usage can impact other applications that
include the Exchange Server. You can monitor CPU and network
resource usage with the Performance Monitor program included with
Windows.
v You are not constrained by network bandwidth; in this case, you can
achieve the best performance by leaving compression no and enabling
hardware compaction on the tape drive, which also reduces storage
requirements.
The Tivoli Storage Manager administrator can override the compression
option setting for the Data Protection for Exchange node when they
register or update the node by specifying, on the Tivoli Storage Manager
server side, that a particular node:
v Always uses compression.
v Never uses compression.
v Leaves the decision up to the client (default value).
For VSS backups, specify the compression option in the backup-archive
client options file that is used as the Local DSMAGENT Node. If the
environment is configured for VSS offloaded backups, you must also
specify the compression option in the backup-archive client options file that
is used as the Remote DSMAGENT Node. Review the compression
information available in the client documentation before you attempt to
compress your data.
DEDUPLication
Client-side data deduplication is used by the Tivoli Storage Manager API
to remove redundant data during backup and archive processing before
the data is transferred to the Tivoli Storage Manager server. Specify
whether the Tivoli Storage Manager API deduplicates data before it is sent
to the Tivoli Storage Manager server. You can specify Yes or No. The default
36 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
value is No. The value of the deduplication option for Data Protection for
Exchange applies only if the Tivoli Storage Manager administrator allows
client-side data deduplication.
The deduplication and enablelanfree options are mutually exclusive. You
can use either one option or the other, but not both options together.
You can turn on client-side data deduplication by adding DEDUPLICATION
YES to the dsm.opt file and by making sure that the deduplication
prerequisites are met.
ENABLECLIENTENCRYPTKEY
This option encrypts Exchange databases during backup and restore
processing. One random encryption key is generated per session and is
stored on the Tivoli Storage Manager server with the object in the server
database. Although Tivoli Storage Manager manages the key, a valid
database must be available to restore an encrypted object. Specify
enableclientencryptkey yesin the options file. In addition, assign the type
of encryption to use by specifying the encryptiontype option in this same
options file. You can specify DES56 (56 bit) or AES128 (128 bit). The default
is AES128. In this same file, you must also specify the databases that you
want encrypted by adding an include statement with the include.encrypt
option.
v For VSS backups, specify the encryption options in the backup-archive
client options file that is used as the Local DSMAGENT Node. If the
environment is configured for VSS offloaded backups, you must also
specify the encryption options in the backup-archive client options file
that is used as the Remote DSMAGENT Node. Review the encryption
information available in the client documentation before you attempt to
encrypt your databases.
For example, encrypt your Exchange database backups by adding the
following three options:
1. Add the enableclientencryptkey yes option.
2. Add the encryptiontype option with the type of encryption to use.
ENABLELANFree
This option allows Data Protection for Exchange to run in a LAN-free
environment (if you are equipped to do so). To run a LAN-free VSS
backup with Data Protection for Exchange, specify enablelanfree yes in
the DSMAGENT (VSS Requestor) options file. See Managed System for SAN
Storage Agent User's Guide for detailed information about LAN-free
environments.
INCLUDE and EXCLUDE
Use the VSSPOLICY statement in the Data Protection for Exchange
configuration file to set policy for VSS backups.
The general include and exclude syntax is displayed:
include "objectNameSpecification" [ManagementClassName]
exclude "objectNameSpecification"
Chapter 2. Planning 37
The Tivoli Storage Manager API does not allow sending any of the three
data types (meta, data, logs) that comprise an Exchange database backup
to different storage destinations on the Tivoli Storage Manager server.
This example excludes Database 1 from a backup:
EXCLUDE "SERVER1\Database 1\...\*"
This example binds all objects for database DB2 to management class
CLASS1:
INCLUDE "SERVER1\DB2\...\*" CLASS1
38 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
v Exchange database names must be of the correct case, as shown by the
displayed results from the query exchange or query tsm. Data Protection
for Exchange constants must be lower-case: meta, data, logs. However,
now the Windows Tivoli Storage Manager API assumes the
specifications are for a Windows file system and ignores case. Because
they might be accepted in the future, the correct case must always be
used.
PASSWORDAccess
This option instructs the Tivoli Storage Manager API to store the current
password (encrypted) in the Windows registry and automatically generates
a new one when the current one expires. This method of password
management is recommended when you run scheduled, unattended
backups since it ensures that the backup never fails because of an expired
password. The default is prompt.
You can manage the password as stored in the registry by using a utility
program named dsmcutil.exe. This utility program is distributed with the
Tivoli Storage Manager backup-archive client package. For more
information about using the dsmcutil program, see the dsmcutil.hlp file or
the dsmcutil.txt file that are distributed with the Tivoli Storage Manager
backup-archive client package.
You can create more Data Protection for Exchange options files to point to other
Tivoli Storage Manager servers. You might also want to create more than one
options file, each with different parameters to use with a single Tivoli Storage
Manager server.
You can set the values of the Data Protection for Exchange configuration
parameters. Use the Management Console (MMC) GUI or the command-line
interface:
v In the MMC GUI, set the value in Properties.
v Use the tdpexcc set command in the Data Protection for Exchange
command-line interface. See Set command on page 173.
Bind VSS backups to Tivoli Storage Manager policy by selecting Properties > VSS
Policy Binding in the MMC GUI, and then entering appropriate values in the
fields.
Chapter 2. Planning 39
As part of the configuration procedure, a proxy relationship is defined for these
various node names. By default, this proxy relationship is defined when you run
the configuration wizard. You can use this topic for information about manually
completing the configuration.
There are two types of node names that are defined in proxy node relationships:
v Target node: A node name that controls backup and restore operations and that
also owns the data on the Tivoli Storage Manager server. This node name is
specified in the Data Protection for Exchange dsm.opt file.
v Agent node: A node name that processes operations on behalf of a target node.
This node name is specified in the Backup-Archive Client dsm.opt file.
These nodes are defined by using the backup-archive client grant proxy command.
For example:
GRANT PROXY TARGET=dpexc_node_name AGENT=dsmagent_node_name
To process basic VSS operations, you must have one target node and one agent
node.
Table 2. Required node names for basic VSS operations
Proxy node type Node name Where to specify
Target node The Data Protection for Use the nodename option in the Data
Exchange node name. Protection for Exchange options file
(dsm.opt)
Agent node The Local DSMAGENT Node Use the localdsmagentnode
name. This name must match parameter in the Data Protection for
the backup-archive client node Exchange configuration file
name. (tdpexc.cfg)
Target node
This node name is where Data Protection for Exchange is installed. This
node name is specified with the nodename option in the dsm.opt file and is
referred to as the Data Protection for Exchange node name.
Agent node
This node name is where the backup-archive client and VSS provider are
installed. This node is responsible for processing the VSS operations as
Data Protection for Exchange does not process any direct VSS operations.
This node name is referred to as the Local DSMAGENT Node and is
specified with the localdsmagentnode parameter in the Data Protection for
Exchange configuration file (tdpexc.cfg by default). You can use the
Properties window of the Management Console (MMC) GUI by selecting
VSS backup. From here, you can update the Local DSMAGENT Node
name. Otherwise, use the tdpexcc set command to specify this parameter.
Note: The agent node and target node are on the same system for basic VSS
operations.
40 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Required node names for basic VSS offloaded backups
VSS offloaded backups require specific node name settings.
To do VSS offloaded backups, you must have one target node and two agent
nodes:
Table 3. Required node names for basic VSS offloaded backups
Proxy node type Node name Where to specify
Target node Data Protection for Exchange Use the nodename option in the Data
node name Protection for Exchange options file
(dsm.opt)
Agent node Local DSMAGENT Node Use the localdsmagentnode
parameter in the Data Protection for
Exchange configuration file
(tdpexc.cfg)
Agent node Remote DSMAGENT Node Use the remotedsmagentnode
parameter in the Data Protection for
Exchange configuration file
(tdpexc.cfg)
Target node
This node name is where Data Protection for Exchange is installed. This
node name (specified with the nodename option in the dsm.opt file) is
referred to as the Data Protection for Exchange node name.
Agent node
This node name is where the backup-archive client and VSS provider are
installed. This node is responsible for processing the VSS operations as
Data Protection for Exchange itself does not process any direct VSS
operations. This node name is referred to as the Local DSMAGENT Node
and is specified with the localdsmagentnode parameter in the Data
Protection for Exchange configuration file (tdpexc.cfg by default). You can
use the Properties window of the Management Console (MMC) GUI by
selecting VSS backup. From here, you can update the Local DSMAGENT
Node name. Otherwise, use the tdpexcc set command to specify this
parameter.
Agent node
This node name is a separate system that must also have the
backup-archive client, VSS provider, and the Exchange System
Management Tools installed (make sure you install the same level of the
Exchange System Management Tools that is installed on your Exchange
production server). This node is responsible for moving VSS snapshot data
from local shadow volumes to the Tivoli Storage Manager server. It is also
responsible for doing the Exchange Integrity Check. This node name is
referred to as the Remote DSMAGENT Node and is specified with the
remotedsmagentnode parameter in the Data Protection for Exchange
configuration file (tdpexc.cfg by default). You can use the Properties
window of the MMC GUI by selecting VSS backup. From here, you can
update the Remote DSMAGENT Node name. Otherwise, use the tdpexcc
set command to specify this parameter.
The choice of available systems depends on whether the systems have
access to the local shadow volumes that contain the VSS snapshot backups.
This node name is only valid for VSS environments that support
Chapter 2. Planning 41
transportable shadow copies. It is not supported if you are using the
default VSS system provider. Refer to your VSS provider documentation
for details.
42 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Chapter 3. Installing and upgrading
Before you start the installation process, review the appropriate prerequisite
information, including hardware and software requirements.
Installation prerequisites
Before you install the software, ensure that your system meets the minimum
hardware, software, and operating system requirements.
Details of the hardware and software requirements change over time due to
maintenance updates and the addition of operating system, application, and other
software currency support.
For the most current requirements, review the Hardware and Software
Requirements technote that is associated with the level of your Data Protection for
Exchange program. This technote is available in the TSM for Mail - All Requirement
Documents website at http://www.ibm.com/support/
docview.wss?uid=swg21219345. When you are at the website, follow the link to the
requirements technote for your specific release or update level.
Details of the hardware and software requirements change over time because of
maintenance updates and the addition of operating system, application, and other
software currency support.
For the most current requirements, see the Hardware and Software Requirements
technote that is associated with your level of software. This technote is available
from the following website: http://www.ibm.com/support/
docview.wss?uid=swg21219345
When you go to this website, follow the link to the requirements technote for your
specific release or update level.
For current requirements, see the TSM for Mail - All Requirements Documents
website, http://www.ibm.com/support/docview.wss?uid=swg21219345.
Virtualization environment
Information about virtualization environments that can be used with Data
Protection for Exchange is available.
For more information, see the IBM Tivoli Storage Manager (TSM) guest support for
Virtual Machines and Virtualization website at http://www.ibm.com/support/
docview.wss?uid=swg21239546.
Before you install and configure, verify that the hardware and software
requirements are met. Details of the hardware and software requirements change
over time because of maintenance updates and the addition of operating system,
application, and other software currency support.
For the most current requirements, see the Hardware and Software Requirements
technote that is associated with your level of software. This technote is available
from the following website: http://www.ibm.com/support/
docview.wss?uid=swg21219345
When you go to this website, follow the link to the requirements technote for your
specific release or update level.
Procedure
Follow these instructions to quickly install, configure, verify, and customize Data
Protection for Exchange:
1. Install Data Protection for Exchange.
a. Log on as an administrator.
a. Insert the Data Protection for Exchange product DVD into your DVD drive.
If autorun is enabled, the setup wizard starts automatically when the DVD
loads. Otherwise, click Start > Run, and at the prompt, specify:
x:\setupfcm.exe, where x: is your DVD drive. Click OK.
b. Follow the installation instructions that are displayed on the screen.
c. If prompted, restart your system before the installation completes.
d. Click Finish to complete the installation of Data Protection for Exchange.
e. If you plan to use VSS operations, you must install the most recent version
of the Tivoli Storage Manager backup-archive client. The backup-archive
client is also the VSS Requestor and is available separately.
2. Configure Data Protection for Exchange.
44 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
a. Start the Management Console (MMC GUI) by clicking Start > All
Programs > Tivoli Storage Manager > Data Protection for Microsoft
Exchange Server > DP for Exchange Management Console. If you did not
previously configure Data Protection for Exchange, the Tivoli Storage
Manager configuration wizard starts automatically.
b. If the Tivoli Storage Manager configuration wizard does not start
automatically, click Manage > Configuration > Wizards in the tree view,
select the wizard, and click Start in the Actions pane.
c. Complete the following pages of the wizard:
Data Protection Selection
Select Exchange Server as the application to protect.
Requirements Check
Click any Failed or Warnings links for help on resolving potential
issues.
TSM Node Names
Specify the Tivoli Storage Manager node names to use for the
applications that you want to protect.
v In the VSS Requestor field, enter the node name that
communicates with the VSS Service to access the Exchange data.
This node name is the Tivoli Storage Manager client node name,
also known as the DSM agent node name.
v In the Data Protection for Exchange field, enter the node name
where the Data Protection for Exchange application is installed.
This node stores the Data Protection for Exchange backups. If you
configure the DAG Node, the DAG database backups are not
stored under the Data Protection node. The backups are stored
under the DAG node. Regardless, the Data Protection node must
be defined.
v In the DAG Node field, enter the node name that you want to
use to back up databases in an Exchange Server Database
Availability Group. With this setting, all active and passive copies
of the databases are backed up to the same file space on the
Tivoli Storage Manager server. The database copies are managed
as a single entity, regardless of which Database Availability Group
member they were backed up from. This setting can prevent Data
Protection for Exchange from making too many backups of the
same database.
46 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
After Data Protection for Exchange is configured and verified successfully,
customize your settings by defining your policy settings and scheduled
operations. This action ensures that your business requirements are satisfied.
What to do next
Before you install and configure, verify that the hardware and software
requirements are met. Details of the hardware and software requirements change
over time because of maintenance updates and the addition of operating system,
application, and other software currency support.
For the most current requirements, see the Hardware and Software Requirements
technote that is associated with your level of software. This technote is available
from the following website: http://www.ibm.com/support/
docview.wss?uid=swg21219345
When you go to this website, follow the link to the requirements technote for your
specific release or update level.
Procedure
To install Data Protection for Exchange from a DVD, complete the following steps:
1. Install Data Protection for Exchange by using the setup wizard. The wizard
installs the product and any prerequisites such as the .NET Framework and
Report Viewer.
a. Log on as an administrator.
b. Insert the Data Protection for Exchange product DVD into your DVD drive.
Before you begin, ensure that the Data Protection for Exchange product is installed.
For information about how to install Tivoli Storage FlashCopy Manager, see
Installing Tivoli Storage FlashCopy Manager.
What to do next
After you install Data Protection for Exchange and Tivoli Storage FlashCopy
Manager, see Configuring Data Protection for Microsoft Exchange for TSM
Configuration on page 59 for important configuration information.
48 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Installing more language packs
To view the Management Console (MMC) GUI, command-line output, and
messages in a language other than English, install the language pack that you
want. The language packs are executable program files that are in their respective
language directory on the product DVD.
Make sure that Data Protection for Exchange is successfully installed before you
attempt to install the language packs.
The setupfcm.exe program automatically starts the setup program for the MMC
language pack if installation is done on a computer with a supported language
other than English.
Procedure
1. Insert the product DVD into the DVD drive and select Run from the Start
menu.
2. Run the following commands:
Data Protection for Exchange Management Console language packs
x:\fcm\aaa\mmc\4100\bbb\setup.exe
Data Protection for Exchange language packs
x:\fcm\aaa\languages\bbb\setup.exe
Where x: is your DVD drive, aaa is x64, and bbb is the three-letter country code
that is associated with that language.
3. Follow the installation instructions that are contained in the prompt windows.
4. Click Finish to complete the installation.
What to do next
After you install the language pack, you must activate it.
Procedure
Before you start, you must choose a location for the package. If you are burning a
DVD, it is convenient to use a staging directory. If you are placing the package on
a file server, you can use a staging directory or build the package directly on the
file server.
The following example uses c:\tdpdpkg as a staging directory. Issue the following
commands to create the package.
Table 4. Commands for creating a silent installation package
Command Description
mkdir c:\tdpdpkg Create a staging directory for the silent-install package
cd /d c:\tdpdpkg Go to the staging directory
xcopy g:\*.* . /s Copy the DVD distribution files to the staging
directory
copy c:\setup.bat Replace the existing setup.bat with the one created in
the previous step
When you create the installation package, test the silent installation. When you
complete the test, the package can be placed on a DVD or it can be made available
from a shared directory.
You must install two components: Data Protection for Exchange Management
Console and Data Protection for Exchange Server. The setup programs for these
components are on the installation media (where x: is your DVD drive):
Data Protection for Exchange Management Console setup program
(64-bit) x:\fcm\x64\mmc\4100\enu\setupfcm.exe
Data Protection for Exchange setup program
(64-bit) x:\fcm\x64\exc\7100\enu\setup.exe
50 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
The Data Protection for Exchange Management Console and Data Protection for
Exchange must be installed from an account that is a member of the local
Administrators group for the system on which the Exchange server is running.
Run the following commands to silently install both components to the default
installation directories:
x:\fcm\x64\mmc\4100\enu\setupfcm.exe /s /v/qn
x:\fcm\x64\exc\7100\enu\setup.exe /s /v/qn
You must substitute the appropriate feature when you install a language other than
English. For more information, see "Silent installation features (Language Packages
only)" in Installing Data Protection for Microsoft Exchange silently on page 50.
The following examples are commands that specify the target directory, the
features, language transform, start suppression, and logging. Specify each
command on a single line.
x:\fcm\x64\mmc\4100\enu\setupfcm.exe /s /vINSTALLDIR=\C:\Program Files\Tivoli\
ADDLOCAL=\Client\ TRANSFORM=1033.mst REBOOT=ReallySuppress /qn /l*v
\C:\Temp\DpExcMmcSetupLog.txt\
x:\fcm\x64\exc\7100\enu\setup.exe /s /vINSTALLDIR=\C:\Program Files\Tivoli\tsm\
ADDLOCAL=\Client\ TRANSFORM=1033.mst REBOOT=ReallySuppress /qn /l*v
\C:\Temp\DpExcSetupLog.txt\
The following list identifies a few additional facts to remember when completing
this installation process:
v You must place a backslash (\) before each quotation mark that is within an
outer set of quotation marks (").
v For a single-line command, press Enter only when all the parameters are
entered.
v You must place quotation marks (") around the following text:
A directory path that contains spaces.
An argument that specifies multiple features. Although you must use
quotation marks around the complete argument, you must still place a
backslash before each internal quotation mark.
v All features that are listed in a custom installation must be listed after the
addlocal option.
v Setting the rebootyesno option to No applies only to the installation of the Data
Protection for Exchange software. The installation package includes a number of
prerequisites that is installed by Data Protection for Exchange. Ensure that all
the prerequisites are installed before starting the silent installation, then set the
rebootyesno option to No so that no system restart is required after the silent
installation process finishes.
Data Protection for Exchange must be installed from an account that is a member
of the local Administrators group for the system on which the Exchange server is
running.
For the most current requirements, review the Hardware and Software Requirements
technote that is associated with the level of your Data Protection for Exchange
program. This technote is available in the TSM for Mail - All Requirements
Documents website at http://www.ibm.com/support/
docview.wss?uid=swg21219345. When you are at the website, follow the link to the
requirements technote for your specific release or update level.
Procedure
The following examples show how to use msiexec to install the Data Protection for
Exchange Management Console and Data Protection for Exchange. Enter each
msiexec command on a single line.
1. Install the Data Protection for Exchange Management Console.
msiexec /ix:\fcm\x64\mmc\3200\enu\IBM Tivoli Storage Manager for Mail
- MS Exchange - Management Console.msi RebootYesNo=No
Reboot=Suppress ALLUSERS=1 INSTALLDIR=c:\program files\tivoli
ADDLOCAL=Client TRANSFORM=1033.mst /qn /l*v c:\temp\DpExcMmcLog.txt
Where x: is your DVD drive.
2. Install Data Protection for Exchange:
52 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
msiexec /ix:\fcm\x64\exc\6400\enu\IBM Tivoli Storage Manager for Mail
- MS Exchange.msi RebootYesNo=No Reboot=Suppress ALLUSERS=1
INSTALLDIR=c:\program files\tivoli\tsm ADDLOCAL=Client
TRANSFORM=1033.mst /qn /l*v c:\temp\DpExcLog.txt
Where x: is your DVD drive.
What to do next
You can install language packs in a similar way. MSI files for the language packs
are in the language folders that are associated with each component. For language
packs, use ADDLOCAL=LanguageFiles instead of ADDLOCAL=Client.
Important:
v You must place quotation marks around the following items:
A directory path that contains spaces.
An argument that specifies multiple features. Although you must use
quotation marks around the complete argument, you must still place a
backslash before each internal quotation mark.
v All features that are listed in a custom installation must be specified after the
addlocal option.
Assuming that all looks correct, gather a detailed log of the failing installation in to
a file called setup.log. To generate a log file, ensure that /l*v \"filename\" is
used on the command-line interface.
For example, issue the following command on a single line to generate a log file
named C:\Temp\DpExcSetupLog.txt:
x:\fcm\x64\exc\6400\enu\setup.exe /s /v"INSTALLDIR=\"C:\Program
Files\Tivoli\tsm\" ADDLOCAL=\"Client\" TRANSFORM=1033.mst
REBOOT=ReallySuppress /qn /l*v \"C:\Temp\DpExcSetupLog.txt\""
The administrator has a choice of making the package available in different ways.
These ways include burning a DVD or placing the package in a shared directory
on a file server. Typically, the package contains the Data Protection for Exchange
code distribution files and a batch file for a silent installation.
Before you start, you must choose a location for the package. If you are burning a
DVD, it is convenient to use a staging directory. If you are placing the package on
a file server, you can use a staging directory or build the package directly on the
file server.
The following example uses c:\tdpdpkg as a staging directory. Issue the following
commands to create the package.
Table 5. Commands for creating a silent installation package
Command Description
mkdir c:\tdpdpkg Create a staging directory for the silent-install package
cd /d c:\tdpdpkg Go to the staging directory
xcopy g:\*.* . /s Copy the DVD distribution files to the staging
directory
copy c:\setup.bat Replace the existing setup.bat with the one created in
the previous step
When you create the installation package, test the silent installation. When you
complete the test, the package can be placed on a DVD or it can be made available
from a shared directory.
Allow enough time for the unattended setup to complete. No visual cues exist to
inform you when the installation is finished, although you can add visual cues to
the batch file.
From a silent installation package on DVD:
If autostart is enabled, the silent installation begins as soon as the DVD is
inserted into the drive. If autostart is not enabled, the silent installation can
be run by starting the setup.bat file from the root of the DVD.
cd /d g:\
setup.bat
From a distribution directory:
If the package was placed in a shared directory that is called tdpdpkg at
\\machine1\d$, another computer can run the command: net use x:
\\machine1\d$ to share the drive as drive x. You can issue the following
command:
54 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
cd /d x:\tdpdpkg
setup.bat
In most cases, administrators encounter these messages when a severe error occurs.
Users rarely see these messages. When you get an error message, it displays in a
message box. Every error message has a number. These messages are system error
messages and there is no way to suppress them in your script.
Upgrading
You can upgrade Data Protection for Microsoft Exchange Server from an earlier
version of the software.
Procedure
1. Download the updates.
2. To install the updates, run setupfcm.exe.
3. Start the Management Console by clicking Start > All Programs > Tivoli
Storage Manager > Data Protection for Microsoft Exchange Server > DP for
Exchange Management Console. When you start the Management Console
after you install the updates, the configuration wizard automatically starts. The
configuration wizard guides you through the process of provisioning and
installing the remaining files.
Depending on the software licenses found on the system, the configuration
process varies. The wizard provides instructions to guide you through the
process.
If the configuration wizard does not start automatically, click IBM Tivoli
Storage Manager in the tree view, and click Configuration. Then, double-click
Wizards.
Migration considerations
Migration from earlier versions of Data Protection for Exchange is supported.
After you upgrade and configure from the older version of Data Protection for
Exchange to the newer version, use VSS restore for local VSS backups that were
originally created with the older version of the software. .
Do not mix backups that were created with previous versions of Data Protection
for Exchange with new backups that are created by using the DAG node. To
separate the backups, keep the previous backups under the previous Data
Protection node name that is defined in the dsm.opt file in the C:\Program
Files\Tivoli\tsm\TDPExchange directory, and use a new DAG node name to store
the new backups. If you want to view or restore a backup that is stored under the
previous node name, change the Data Protection for Exchange configuration. Over
time, when the old backups are no longer useful, you must manually delete them.
To view and restore backups that are stored under the previous Data Protection
node name:
1. Remove the DAG Node by using the General properties page, configuration
wizard, or the set command on the command-line interface.
2. Restart or refresh the Management Console (MMC) GUI or command-line
interface.
3. Click the Recover tab in the MMC GUI, or run a tdpexcc query tsm *
command. Since the DAG Node parameter is not set, Data Protection for
Exchange lists the backups that are stored under the Data Protection for
Exchange node.
4. Proceed to restore one or more of the listed backups.
To manually delete old backups that are stored under the previous Data Protection
node name:
1. Remove the DAG Node by using the General properties page, configuration
wizard, or the set command on the command-line interface.
2. Restart or refresh the GUI or command-line interface.
3. Click the Recover tab in the MMC GUI, or run a tdpexcc query tsm *
command. Since the DAG Node parameter is not set, Data Protection for
Exchange lists the backups that are stored under the Data Protection for
Exchange node.
4. Delete the backups that are expired.
56 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Improving mailbox history handling
To improve performance, mailbox history includes only the mailboxes from
databases than are backed up.
If you back up mailbox history with a version of Data Protection for Exchange
earlier than version 7.1, you can manually delete the old mailbox history. Data
Protection for Exchange backs up a new set of mailbox history data.
With the new mailbox history data, you can experience better performance when
backing up mailbox history. It is also easier to find the mailbox when you restore a
mailbox. And, when you retrieve mailbox history, the mailbox names can be
displayed in multiple languages.
Deleting the old mailbox history is not required. If you delete the old mailbox
history data, you lose the location history information for the deleted and moved
mailboxes in the backup copies created by earlier versions of Data Protection for
Exchange. When you restore deleted or moved mailboxes from the old backup
copies, you have to specify the /MAILBOXORIGLOCATION parameter. After the old
backup copies expire, mailbox history works without needing to specify the
/MAILBOXORIGLOCATION parameter.
If you delete old mailbox history data, save a backup copy before completing the
deletion task. You can use the backup copy when you need location information
for the deleted and moved mailboxes.
If you delete the old mailbox history, the command you use is a delete filespace
command. If you do not enter the command correctly, all previous backups,
including backups of Exchange 2010 data, might be deleted.
Procedure
1. Enter the following command to save the mailbox history to a file:
tdpexcc q tsm /showmailboxinfo > E:\MyMailboxHistory.txt
Keep this file for reference. If you need to restore a mailbox from the old
backup copies, and the mailbox location changes before the time of deleting
mailbox history, use the /MAILBOXORIGLOCATION parameter to restore the
mailbox.
2. Complete the following steps to delete the old mailbox history information
from the Tivoli Storage Manager server.
a. Launch Tivoli Storage Manager command-line administrative interface,
dsmadmc.exe.
b. Log on to the Tivoli Storage Manager server.
c. Enter the following command to query the filespace name:
Query FIlespace node_name file_space_name
3. Enter the following command to delete the filespace for the old mailbox
history:
DELete FIlespace node_name file_space_name\MAILBOXINFO
For example, the following command deletes the filespace for the mailbox
history for the CXCLAB_EXC node:
tsm: FCM>DELETE FILESPACE CXCLAB_EXC cxcserver.com\MAILBOXINFO
58 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Chapter 4. Configuring
The following list identifies the ways to configure Data Protection for Microsoft
Exchange software using the configuration wizard.
To configure Data Protection for Exchange for TSM Configuration, complete the
following steps:
Procedure
1. Start the Management Console by clicking Start > All Programs > Tivoli
Storage Manager > Data Protection for Microsoft Exchange Server > DP for
Exchange Management Console.
2. From the start page, click Configuration. Alternatively, from the tree view,
navigate to the Configuration node. Then, double-click Wizards.
3. In the results pane, double-click TSM Configuration to open the Tivoli Storage
Manager Configuration Wizard.
4. Follow the instructions on the pages of the wizard and click Next to move to
the next page.
a. In the Data Protection Selection page, select Exchange Server. Click Next.
b. Review the results of the requirements check and ensure that you address
any errors or warnings.
Click Show Details to view a list of individual requirement results. If you
are configuring an application for which you do not have the necessary
Copyright IBM Corp. 1998, 2013 59
license, the license requirement check fails. You must either go back to the
Data Protection Selection page and clear the selected application to proceed
with the configuration, or obtain the necessary license.
c. In the TSM Node Names page, specify the Tivoli Storage Manager node
names that exist on the same system to use for the applications that you
want to protect.
v In the VSS Requestor field, enter the node name that communicates with
the VSS service to access the Exchange data.
v In the Data Protection for Exchange field, enter the node name where the
Data Protection application is installed. This is the node name that is used
to store the Data Protection for Exchange backups. If you configure the
DAG Node on this wizard page, Exchange Server DAG database backups
are not stored under the Data Protection for Exchange node. They are
stored under the DAG node.
v In the DAG Node field, enter the node name that you want to use to
back up databases in an Exchange Server DAG. With this setting, backups
from all DAG members that are configured to use the DAG node are
backed up to a common file space on the Tivoli Storage Manager server.
The database copies are managed as a single entity, regardless of which
DAG member they were backed up from. This setting can prevent Data
Protection for Exchange from making too many backups of the same
database.
Ensure that you configure all of your DAG members that have copies of
the same database to all use the same DAG node. On the Tivoli Storage
Manager server, ensure that you register the DAG node name. All of the
DAG member nodes (the Data Protection nodes) must be granted
proxynode authority to run backups on behalf of the DAG node. All of the
DSM Agent nodes (the backup-archive client nodes) must also be granted
proxynode authority. If you do not want to manually update these
properties, you can use the configuration wizard to set the properties on
the Tivoli Storage Manager server.
Create a node name that can help you distinguish the type of backup that is
run. For example, if your host name is MALTA, you can name the VSS
requestor node name MALTA, and you can create a Data Protection node
name that is called MALTA_EXC. For an Exchange configuration, the DAG
node name does not have to be related to the VSS Requestor or the Data
Protection for Exchange node name. For example, you can name it TSMDAG.
d. Enter information for the Tivoli Storage Manager server that you are
connecting to and click Next to continue.
v In the Tivoli Storage Manager Server Address field, enter the TCP/IP
domain name or a numeric IP address for the Tivoli Storage Manager
server that contains the backups. Obtain this information from your Tivoli
Storage Manager server administrator.
v In the Tivoli Storage Manager Server Port field, enter the port number
for the Tivoli Storage Manager server that contains the backups. Obtain
this information from yourTivoli Storage Manager administrator.
v Specify whether to have the wizard to configure the Tivoli Storage
Manager server for you by generating a configuration macro file.
If you click No, the macro file is available at the final page of the wizard
so that it can be provided to the Tivoli Storage Manager administrator as
an example of one way to configure the Tivoli Storage Manager server to
support application data protection.
60 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
If you click Yes, the wizard starts the macro during the Configuration
step in the wizard. Review the macro file and update it if needed.
After you click Yes, enter the following information in the appropriate
field:
The name of the Tivoli Storage Manager administrator account.
The password for the Tivoli Storage Manager administrator.
Click Test Communications if you want to test your connection with
the Tivoli Storage Manager server. This button is not available until the
VSS requestor is installed.
Click Review/Edit to review or update the Tivoli Storage Manager
macro file. Alternatively, you can review the macro file and directly
run the commands on the Tivoli Storage Manager server.
e. Select the Default configuration setting. When you select the Default
configuration setting, in addition to configuring the applications that you
selected, the VSS Requestor is configured. The client and agent services are
also registered and configured, and a schedule to support historical
managed capacity is defined.
f. Review the results of the configuration process. Click Show Details to view
a list of individual configuration results.
5. Click Finish in the Completion page to complete the wizard.
6. Optional: For a VSS configuration, verify that the Run VSS diagnostics when
this wizard exits option is selected. When this option is selected, after you
complete the wizard, a diagnostic process tests the VSS snapshots on your
system.
Attention: If the configuration is for space-efficient target volumes for SVC or
Storwize V7000, testing VSS snapshots deletes previous backups that are
created for the volumes that are selected in the test wizard.
What to do next
After you configure Data Protection for Exchange, complete the following steps to
verify the configuration:
1. In the Management Console, click the Automate tab to access the integrated
command-line interface.
2. On the lower half of the screen, click the Open folder icon, and select the
verify_exc.txt file.
3. Click Open. These commands are displayed in the command-line panel:
query tdp
query tsm
query exchange
4. Click Enter to run the commands to verify your configuration.
Chapter 4. Configuring 61
Manually configuring Data Protection for Microsoft Exchange for TSM
Configuration
If you manually configure Data Protection for Exchange, complete the following
steps.
Procedure
Perform these steps on the computer where the Exchange Server is installed and
running:
1. Specify your Data Protection for Exchange node name and communication
method in the dsm.opt file located (by default) in the Data Protection for
Exchange installation directory. More options are also available.
2. Using the set command, specify your Data Protection for Exchange
preferences (language, date format, log file) in the tdpexc.cfg file in the Data
Protection for Exchange installation directory.
3. (VSS only) If you are configuring Data Protection for Exchange in an
Exchange Server Database Availability Group (DAG) environment, use the set
command to create a common node name for backing up DAG servers. For
example:
tdpexcc set DAGNODe=TSMDAG1
Where TSMDAG1 is the DAG node name that is used to back up all databases in
a DAG, regardless of which DAG member the database is backed up from.
Important: On the Tivoli Storage Manager server, ensure that you register the
DAG node. All DAG members need proxy authority to run backups on behalf
of the DAG node.
4. If you schedule more than one DAG member to back up a database, to
prevent DAG databases from being backed up too frequently, set the
minimum amount of time, in minutes, that passes before a database can be
backed up again by using the /MINimumbackupinterval. This parameter must
be specified as part of a backup command script that is run by the Tivoli
Storage Manager scheduler.
For example, include the following statement in the C:\BACKUP.CMD script:
tdpexcc backup DB1 full /minimumbackupinterval=60
5. Optional: To reduce the load on a production Exchange Server in a DAG, you
can specify the /PREFERDAGPASsive parameter. If a healthy passive database
copy is not available, this parameter backs up a passive database copy. The
backup is made from the active database copy. This parameter must be
specified as part of a backup command script that is run by the Tivoli Storage
Manager scheduler.
For example, include the following statement in a C:\BACKUP.CMD script:
62 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
tdpexcc backup DB1 full /minimumbackupinterval=60 /preferdagpassive
6. (VSS only) Specify your VSSPOLICY statement in your Data Protection for
Exchange configuration file. Exchange servers that use the same DAG node
name are to share the VSS Policy.
7. (VSS only) Configure the Tivoli Storage Manager backup-archive client if it is
not already configured. If the backup-archive client is already configured, you
can use existing client services. The backup-archive client Setup Wizard can
guide you through the configuration process. In the backup-archive client GUI
menu, select Utilities > Setup Wizard > Help me configure the TSM Backup
Archive Client. The node name for this system is referred to as the Local
DSMAGENT Node and is specified with the localdsmagentnode parameter in
the Data Protection for Exchange configuration file (tdpexc.cfg).
For more information, see Tivoli Storage Manager for Windows Backup-Archive
Clients Installation and User's Guide and Proxy node definitions.
8. (VSS only) Install and configure the Tivoli Storage Manager Client Acceptor
Service (CAD) if it is not already installed and configured. In the
backup-archive client GUI menu, select Utilities > Setup Wizard > Help me
configure the TSM Web Client. Make sure that the CAD service is running
before you proceed to the next step.
9. (VSS only) Install and configure the Tivoli Storage Manager Remote Client
Agent Service (DSMAGENT) if it is not already installed and configured. In
the backup-archive client GUI menu, select Utilities > Setup Wizard > Help
me configure the TSM Web Client. If a DSMAGENT is already installed and
configured, you can use the existing one.
10. (VSS only) If you want to manage local persistent VSS snapshots, which are
created for VSS backups to LOCAL, VSS Instant Restores, and want to run
offloaded backups, you must install IBM Tivoli Storage FlashCopy Manager.
11. (VSS only) Add the Microsoft Exchange Server binary path to the PATH
statement in the system environment variables. For example:
"C:\Program files\Exchsrvr\bin"
Verify that ESEUTIL.EXE tool exists in this directory. This tool is used by Data
Protection for Exchange to run automatic integrity checks on the VSS backup.
12. (VSS only) Install and configure a VSS provider. Consult the VSS provider
documentation for information about configuration of that software. There is
no installation or configuration that is required if you are using the default
Windows VSS System Provider.
13. (VSS only) Define storage space to hold VSS backups that is on local shadow
volumes. Define enough space to hold all copies of the VSS backups as
designated by your policies. Provisioning storage space to manage VSS
snapshots is dependent on the VSS provider that you use. Consult the VSS
Provider documentation for more details.
Procedure
Chapter 4. Configuring 63
2. Register your Data Protection for Exchange node name and password with the
Tivoli Storage Manager register node command. For example, for VSS
operations, this node is the target node. When you register nodes to the Tivoli
Storage Manager server specifically for VSS operations, do not specify the
Tivoli Storage Manager USerid=NONE parameter. VSS operations fail when this
parameter is specified.
3. If not already defined, register your Tivoli Storage Manager backup-archive
client node name and password for the system where the Exchange Server is
installed. For example, this agent node is the Local DSMAGENT Node for VSS
operations.
4. (VSS only) If you plan to run offloaded backups from a particular system, first
register the Tivoli Storage Manager backup-archive client node name and
password for the system. For example, the agent node is the Remote
DSMAGENT Node. BAOFF is used here (and in Step 5) to differentiate between
this Remote DSMAGENT Node and the Local DSMAGENT Node (Step 3). You
can replace BAOFF with the node name of your backup-archive client, and
remove the BAOFF from the grant proxynode command.
5. (VSS only) Define the proxy node relationship (for the target node and agent
nodes) with the Tivoli Storage Manager grant proxynode command. For
example:
grant proxynode target=DAG node name agent=BAnodename
6. If you created a node name for backing up databases in an Exchange Server
Database Availability Group (DAG), ensure that the following tasks are
complete.
a. Register the Tivoli Storage Manager backup-archive client and DAG node
names and passwords with the Tivoli Storage Manager register node
command.
b. Ensure that the Tivoli Storage Manager administrator issues the grant
proxynode command for each member server in the DAG to grant
permission to the DAG member server to act as a proxy for the DAG node.
If the configuration wizard is not used to configure the Tivoli Storage
Manager server, the proxies are to be defined. In addition, the backup
archive client node and the Data Protection node need proxynode authority.
The backup archive client node also needs proxynode authority to act on
behalf of the Data Protection node. For example, the Tivoli Storage Manager
administrator can issue the following commands on the Tivoli Storage
Manager server:
register node backup_archive_client_node password
register node data_protection_node password
grant proxynode target=data_protection_node agent=backup_archive_client_node
register node DAG_node password
grant proxynode target=DAG_node agent=backup_archive_client_node
grant proxynode target=DAG_node agent=data_protection_node
What to do next
For any warning messages that are displayed during the configuration process,
resolve the issue noted in the warning. Some warnings include a link to a macro
that you can use to configure Tivoli Storage Manager. Other warnings have links to
web sites where you can download the packages that you are to successfully
complete the configuration process.
64 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Perform these tasks on the system that runs the offloaded
backups
This task is for VSS operations only.
Procedure
Perform the following steps on the computer that is running the offloaded
backups:
1. Configure the Tivoli Storage Manager backup-archive client if it is not already
configured. If the backup-archive client is already configured, you can use
existing client services. In the backup-archive client GUI menu, select Utilities
> Setup Wizard > Help me configure the TSM Backup Archive Client. The
node name for this system is called the Remote DSMAGENT Node and is
specified with the remotedsmagentnode parameter in the Data Protection for
Exchange configuration file (tdpexc.cfg) on the local, not offload, system.
2. Install and configure the Tivoli Storage Manager Client Acceptor (CAD) Service
and the Remote Client Agent Service (DSMAGENT) if they are not already
installed. If a client CAD Service is already installed and configured, you can
use an existing one. Use the backup-archive client Setup Wizard to guide you
through the CAD installation process by selecting Utilities > Setup Wizard >
Help me configure the TSM Web Client.
3. Install the Microsoft Exchange Server management tools from the Microsoft
Exchange Server installation media. Take note of the Microsoft Exchange Server
Management tools binary directory (for example: C:\Program
files\Exchsrvr\bin). Verify that the ESEUTIL.EXE tool is stored in this directory.
Data Protection for Exchange uses this tool to run automatic integrity checking
of the VSS backup. Also, the Exchange Server does not need to be installed or
running on this system. Only the Microsoft Exchange Server management tools
are required to be installed on this system. For more information about the
necessary license requirements, see the Microsoft Exchange Server
documentation.
4. Add the Microsoft Exchange Server binary path to the PATH statement in the
system environment variables. For example:
"C:\Program files\Exchsrvr\bin"
5. Install and configure a VSS provider if you are not using the default system
VSS provider. Consult the VSS provider documentation for information about
the configuration of that software.
Chapter 4. Configuring 65
The Client Access Server Role must also be configured to run Mailbox Restore
operations on Exchange Server 2010 and later. For more information about
specifying the Client Access Server with the set command, see Set syntax on
page 173.
The Microsoft Exchange Server MAPI Client and Collaboration Data Objects
download is required to process mailbox restore operations. Microsoft does not
support installing the Exchange MAPI and Outlook MAPI on the same system. For
more information, see the Microsoft documentation.
Complete the following tests to verify that your Exchange Server is ready to run
VSS operations. For best results, complete these tests before you install Tivoli
Storage Manager.
When these tests complete without errors, you can install Tivoli Storage Manager.
Use the DiskShadow tool for verification. The DiskShadow tool is preinstalled on
the Windows Server operating system.
Note: On the last step of the configuration wizard, a VSS diagnostic check is run
to verify the VSS setup. Any warnings are to be fixed before you finish the
configuration and start a Data Protection for Microsoft Exchange operation.
Using the DISKSHADOW command
Before you install Data Protection for Exchange, test the core VSS function
first. VSS function can be validated with the Windows Server-embedded
command DISKSHADOW. DISKSHADOW is available for Windows Server
2008, Windows Server 2008 R2, and later operating systems. The following
list identifies the DISKSHADOW tests to complete before any Tivoli
Storage Manager components are installed.
1. Test non-persistent shadow copy creation and deletion.
v Run DISKSHADOW in a command window
v DISKSHADOW>begin backup
v DISKSHADOW>add volume f: (Database volume)
66 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
v DISKSHADOW>add volume g: (Log volume)
v DISKSHADOW>create
v DISKSHADOW>end backup
v DISKSHADOW>list shadows all (this process might take a few
minutes)
v DISKSHADOW>delete shadows all
Chapter 4. Configuring 67
After the tests complete satisfactorily, you can install Tivoli Storage Manager
components.
The following two errors are commonly returned when a VSS operation is running.
Information is provided to help locate the cause of the error.
ANS1017E (RC-50) Session rejected: TCP/IP connection failure
This message is displayed when the Tivoli Storage Manager
backup-archive client CAD is either not running or is not configured
properly.
ANS1532E (RC5722) Proxy Rejected: Proxy authority is not granted to this node.
This message is displayed when the Tivoli Storage Manager server is not
configured correctly for the proxy nodes.
To configure Data Protection for Exchange for Mailbox Restore Only, complete the
following steps:
Procedure
1. Start the Management Console by clicking Start > All Programs > Tivoli
Storage Manager > Data Protection for Microsoft Exchange Server > DP for
Exchange Management Console.
2. From the start page, click Configuration. Alternatively, from the tree view,
navigate to the Configuration node. Then, double-click Wizards.
3. In the results pane, double-click Mailbox Restore Only to open the Mailbox
Restore Only Configuration Wizard.
4. Follow the instructions on the pages of the wizard and click Next to move to
the next page.
5. Click Finish in the Completion page to complete the wizard.
68 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
protected. Enable autoexpand for the SE target volumes. Add the
SE target volumes to the VSS free pool.
VSS Provider settings
Set background copy rate equal to 0.
Data Protection for Exchange settings
Set the policy to retain 14 local backup versions. Schedule snapshot
backups as required by using backup destination equal to local.
After 14 VSS backups are completed, the 15th VSS backup causes the
oldest backup to be deleted and reuses that target set.
Production application data are on standard volumes. Keep one snapshot backup
version. Use minimum storage space for snapshot backup versions. A full
physical copy is not required. Perform one VSS backup per day and also send
the backup to Tivoli Storage Manager.
SVC and Storwize V7000 settings
Create two SE target volumes for each source volume to be
protected. Enable autoexpand for the SE target volumes. Add the
SE target volumes to the VSS free pool.
VSS Provider settings
Set background copy rate equal to 0.
Data Protection for Exchange settings
Set the policy to retain two local backup versions. Schedule
snapshot backups as required by using backup destination equal to
both.
Set the policy for local snapshot backups to retain N+1 backup versions so
that N snapshot backups are available for restore. Otherwise, a local
backup version might not be available if a VSS backup fails after the prior
backup was deleted.
Production application data are on standard volumes. Keep one snapshot backup
version. A full physical copy is required. Minimize space usage of background
copies. Perform one VSS backup per day and send the backup to Tivoli Storage
Manager.
SVC and Storwize V7000 settings
Create one standard target volume for each source volume to be
protected. Add standard target volumes to the VSS free pool.
VSS Provider settings
Use the default background copy rate (50). Configure to use
incremental FlashCopy.
Data Protection for Exchange settings
Set the policy to retain one local backup version. Schedule
snapshot backups as required by using backup destination equal to
both.
When you use incremental FlashCopy, the VSS provider does not delete
the single snapshot target set even though FlashCopy Manager software
deletes the prior VSS snapshot before it creates a new one.
Production application data are on standard volumes. Keep two snapshot backup
versions. Full physical copies are required for local backup versions. Perform
VSS backups every 12 hours with one backup daily sent to Tivoli Storage
Chapter 4. Configuring 69
Manager.
SVC and Storwize V7000 settings
Create three standard target volumes for each source volume to be
protected. Add standard target volumes to the VSS free pool.
VSS Provider settings
Use default background copy rate (50).
Data Protection for Exchange settings
Set the policy to retain three local backup versions. Schedule VSS
backups as follows: backup destination equal to local at 11:00,
backup destination equal to both at 23:00.
Set the policy for local snapshot backups to retain N+1 backup versions so
that N snapshot backups are available for restore.
Production application data are on standard volumes. Keep four snapshot
backup versions. Use minimum storage space for snapshot backup versions. A
full physical copy is not required. Perform VSS backups every six hours with
one backup daily sent to Tivoli Storage Manager.
SVC and Storwize V7000 settings
Create five SE target volumes for each source volume to be
protected. Enable autoexpand for the SE target volumes. Add SE
target volumes to the VSS free pool.
VSS Provider settings
Set background copy rate equal to 0.
Data Protection for Exchange settings
Set the policy for local snapshot backups to retain five local backup
versions. Schedule VSS backups as follows: backup destination
equal to local at 06:00, 12:00, and 18:00, backup destination equal to
both at 00:00.
- Set policy to retain N+1 backup versions so that N snapshot backups are
available for restore
Production application data are on SE volumes. Keep two snapshot backup
versions. A full physical copy is required for local backup versions. Perform
VSS backups every six hours with one backup daily sent to Tivoli Storage
Manager.
SVC and Storwize V7000 settings
Create three SE target volumes for each source volume to be
protected. Allocate the same percentage of real storage as for
source volumes. Add SE target volumes to the VSS free pool.
VSS Provider settings
Use default background copy rate 50.
Data Protection for Exchange settings
Set the policy to retain three local backup versions. Schedule VSS
backups as follows: backup destination equal to local at 06:00,
12:00, and 18:00, backup destination equal to both at 00:00.
Set the policy for local snapshot backups to retain N+1 backup versions so
that N snapshot backups are available for restore. This setting allows thin
provisioning for both source and target volumes and allows them to grow
together.
70 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Chapter 5. Protecting data
After you complete the configuration process, start theManagement Console to
protect your Exchange Server data.
To start the Management Console, click Start > All Programs > Data Protection for
Microsoft Exchange Server > DP for Exchange Management Console. If you try
to use Data Protection for Microsoft Exchange Server before you complete the
configuration process, the software does not function correctly.
When you register a computer, information about this particular system is collected
and stored. Password information is encrypted and stored separately. The
computers that are registered are tracked with a globally unique identifier (GUID).
The GUID is assigned to each system and is used when backing up and restoring
data.
You can create groups of computers. These groups consolidate information when
you view the dashboard, prepare reports, and run group commands. By default,
the computers in a group are selected when you complete tasks for the group, but
you can select additional computers in the tree to include in an operation.
Managing remotely
From one Data Protection for Microsoft Exchange installation you can manage all
of the Data Protection for Microsoft Exchange installations in your enterprise.
Procedure
1. From the Management Console, in the Actions pane, click Manage Computers.
2. Navigate the interface to add, remove, or configure remote systems. For
systems that are not in the domain, provide the fully-qualified address.
Typically there is a difference between the capacity that is used by server data and
the capacity of the volume that contains that data. For example, a set of databases
might require a capacity of 1 GB and are on a 10 GB volume. When a snapshot of
the volume is performed, the Data Protection for Microsoft Exchange managed
capacity measurement is 10 GB.
Procedure
72 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Backing up Exchange data
You can back up Exchange Server data by using Microsoft Volume Shadow Copy
Service (VSS).
To create VSS backups, you must have a VSS provider that is configured for your
environment.
Procedure
Restore options
Descriptions of the options available in the Management Console Restore tab are
provided.
From the Recover tab, select Database Restore and click the Show Restore
Options to modify the default restore options.
AutoSelect
Set this option to True (default) to quickly select the backup objects to
restore. With auto-selection, when you select the most recent backup to
restore, all other necessary backups are automatically selected for you, up
to the previous full backup. AutoSelect provides these characteristics:
v Operates when you click a full, differential, or incremental backup.
v Ignores copy backups.
v When you click a full backup, the latest associated differential or all
associated incremental backups are selected.
74 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
v When you click a differential backup, the associated full backup is also
selected.
v When you click an incremental backup, the associated full backup and
all associated earlier incremental backups are also selected.
v For VSS backup, automatically selects all databases that were backed up
together to the local destination. This statement is not applicable when
you back up to Tivoli Storage Manager.
AutoSelect does not make more selections when a differential or
incremental backup is selected and no associated full backup can be found.
FromServer
Enter the name of the server where the original backup was done. The
default value is a wildcard character (*).
Instant Restore
Set this option to True to use volume level snapshot restore (instant
restore) for local VSS backups if the backup exists on SAN-attached
volumes. Set this option to False to disable instant restore, which bypasses
volume-level copy and uses file-level copy (fast restore) to restore the files
from a local VSS backup. The default value is True, which uses volume
level snapshot restore if it is supported.
This option is available for VSS operations only. When you use instant
restore for SAN Volume Controller earlier than version 5.1 or DS8000, a
best practice is to make sure that any previous background copies (that
involve the volumes that are being restored) are completed before you
initiate the instant restore.
This option is automatically set to False during restoreinto operations.
Instant restore overwrites all files on the destination file system. Also,
instant restore of incremental and differential backups are automatically
converted to file-level restores. Instant restore requires that the drive or
volume where the mailbox database is located must be available. There
must be no access to the drive or volume by any other process or
application.
Mount Databases After Restore
Select the MountDatabasesAfterRestore option to automatically mount
databases after the recovery completes.
Replay Restored and Current Logs
Use the ReplayRestoredANDCurrentLogs option to replay any transaction
log entries that display in the current active-transaction log. This log
includes both current and restored logs. This option is the default value.
This option is not supported for instant restore.
Replay Restored Logs Only
Use the ReplayRestoredLogsONLY option to replay any transactions that
display in the restored-transaction logs. After you run this type of restore,
do a new full backup.
RunRecovery
Select this option to specify whether to replay just the restored logs or to
replay both the restored and current logs. When recovery is not run, the
databases are not online.
Unless otherwise specified, a VSS restore refers to all restore types that use VSS,
including VSS restore, VSS fast restore, and VSS instant restore.
v Install any Microsoft VSS-related urgent fixes.
If you are performing a VSS restore of a database that was relocated (system file
path, log file path, or database file path), you must use the Instant Restore
function and specify the same database name as the one you are restoring. The
restore fails if you do not specify the same database name.
When a VSS restore from local shadow volumes is performed, the bytes transferred
displays 0. This display occurs because no data (0) is restored from the Tivoli
Storage Manager server.
This restore capability is referred to as a restore into scenario and requires the
following actions:
v If you are operating a VSS restore of a relocated database, you must use the
restore into function. Also, specify the same database name as the one you are
restoring. The restore fails if you do not specify the same name.
v Running any type of restore into function automatically disables VSS Instant
Restore.
Backups to LOCAL can be restored only to the system where the backups were
created.
76 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Preparing for VSS instant restore in DS8000, Storwize V7000,
XIV, and SAN Volume Controller environments
When you prepare for a restore, consider the type of data that you want to restore
and where the backups are located.
The information in the following list is specific to the DS8000, Storwize V7000, XIV,
and SAN Volume Controller environments. When planning for a VSS instant
restore, consider the following facts:
v Restore granularity is at the volume level.
v VSS requires that data must always be restored to the same drive letters and
paths as existed during the original backup.
v VSS requires IBM System Storage Support for Microsoft Volume Shadow Copy
Service software if you use a DS8000, Storwize V7000, or SAN Volume
Controller disk subsystem.
v VSS requires IBM XIV Provider for Microsoft Windows Volume Shadow Copy
Service if you are using an XIV disk subsystem.
v Backups must be located on the same XIV, DS8000, Storwize V7000, or SAN
Volume Controller storage subsystem to which they are restored.
v In a DAG environment, stop the Microsoft Exchange Replication Service on the
active node before you run the VSS instant restore operation.
v In an Exchange 2013 environment, stop the Exchange Search Host Controller
Service on the active node before you run the VSS instant restore operation.
For information about how to recover an Exchange Server 2010, see the article
Understanding Backup, Restore, and Disaster Recovery at the following URL:
http://support.microsoft.com/default.aspx?scid=kb;en-us;326052
Backing up Exchange servers at the item-level can cause the following issues:
v Insufficient scalability as item-level backups that are run hourly on each day of
the week still prove to be an inadequate solution.
v More resource strain is added to the production servers.
v Since database backups are still done, the Exchange data is duplicated as
item-level backups. The same data is backed up a second time.
To address these issues, Microsoft provides these features in Exchange:
v Deleted Item Restore can be configured to keep items within the Exchange
Server databases, even after they are deleted. This option enables the items to be
restored later.
v Deleted Mailbox Restore can be configured to keep mailboxes within the
Exchange Server databases, even after they are deleted. This option enables the
items to be restored or reconnected later.
With the Data Protection for Microsoft Exchange mailbox restore feature, you can
run individual mailbox and item-level recovery operations in Microsoft Exchange
Server 2007 or Microsoft Exchange Server 2010 environments that utilize Data
Protection for Microsoft Exchange backups. See Restoring individual mailbox and
mailbox item-level data and Restoring mailbox messages interactively with the
Mailbox Restore Browser on page 81.
Procedure
78 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
e. In you want to filter on more items, click Add Row.
5. Verify restore options. If the restore options are not currently displayed, click
Show Restore Options.
Mailbox
If the alias of the mailbox to restore is not displayed in the list of
mailboxes, specify the alias. This option overrides any selected
mailboxes.
Mark restored messages as unread
Use this option to automatically mark the mailbox messages as unread
after restore operation completes. The default value is True.
Mailbox Original Location
Use this option only if the mailbox is deleted or recreated since the
time of the selected backup, and mailbox history is disabled. Specify
the Exchange Server and the database where the mailbox is at the time
of the backup. Use the following format: server-name,db-name
6. Click one of the Restore actions in the Action pane to begin the restore
operation.
Restore Mail to Original Location
Select this action to restore the mail back to where the mail items
existed at the time of backup.
Restore Mail to Alternate Location
Select this action to restore the mail items to a different mailbox. A
dialog is displayed for you to specify the mailbox
Restore Mail to non-Unicode PST file
Select this action to restore the mail items to a non-Unicode personal
folders (.pst) file. When you restore to a .pst file with one selected
mailbox, you are prompted for a file name. When you restore to a .pst
file with more than one selected mailbox, you are prompted for a
directory location. Each mailbox is restored to a separate .pst file that
bears the name of the mailbox at the specified directory.
If the .pst file exists, the file is used. If it does not exist, the file is
created.
Restore Mail to Unicode PST file
Select this action to restore the mail items to a Unicode personal folders
(.pst) file. When you restore to a .pst file with one selected mailbox,
you are prompted for a file name. When you restore to a .pst file with
more than one selected mailbox, you are prompted for a directory
location.
You can enter a standard path name (for example, c:\PST\mailbox.pst)
or a UNC path (for example, \\server\c$\PST\mailbox.pst). When you
enter a standard path, the path is converted to a UNC path. If the UNC
is a non-default UNC path, enter the UNC path directly.
Each mailbox is restored to a separate .pst file that bears the name of
the mailbox at the specified directory. If the .pst file exists, the file is
used. If it does not exist, the file is created.
The amount of time that it takes to complete the restore process depends on the
size of the mailbox databases, the network speed, and the number of mailboxes
to process.
To restore a deleted mailbox or items from a deleted mailbox before you run the
mailbox restore operation, run a Data Protection for Microsoft Exchange mailbox
restore to restore the deleted mailbox.
With the mailbox restore operation there are three options for choosing where to
direct the restore of mailbox data from a deleted mailbox:
v Restore the deleted mailbox data to the original location of the original mailbox.
v Restore the deleted mailbox data into an active alternative mailbox in an online
Exchange Server.
v Restore the deleted mailbox data into an Exchange Server personal folders (.pst)
file.
If you are restoring the deleted mailbox data to the original location, before you
run the mailbox restore, recreate the mailbox using Exchange.
If the backup that contains the deleted mailbox was taken with a version of Data
Protection for Microsoft Exchange before version 6.1, or if the mailbox history is
disabled, and the mailbox was relocated since the time it was backed up, you must
specify the Exchange Server and the database where the mailbox was at the time of
backup. Use the Mailbox Original Location option in the GUI to specify this
information. You can also use the restoremailbox command parameter,
/MAILBOXORIGLOCATION, for this task.
See Restoremailbox command on page 158 for details about this command.
The Exchange Server and the database where the mailbox is located are to be
specified.
See Restoremailbox optional parameters on page 161 for details about the
/MAILBOXORIGLOCATION parameter.
80 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Restoring mailbox messages interactively with the Mailbox
Restore Browser
You can interactively restore a mailbox or items from a mailbox on Exchange
Server by using the Mailbox Restore Browser.
In addition, review the mailbox restore characteristics before you attempt a restore
operation:
v When the Management Console is started, it detects whether there exists a
recovery database that was previously created by Data Protection for Exchange.
If one exists, then the Management Console automatically connects to the
existing recovery database and displays its contents. Otherwise, you are
prompted for the mailbox or database to restore into the recovery database.
v The Management Console also detects a recovery database that was created
outside of Data Protection for Exchange and automatically connects to it. When
you complete your mailbox restore tasks, you must manually remove the
recovery database. You cannot use the Close Mailbox to Restore action item.
v When a mailbox is selected, it is first restored to the recovery database. It is from
this location that the mailbox becomes available for browsing. When the restore
operation to this location completes, the restored mailbox and folders are shown
in the results pane.
v If you plan to restore mail or folders by using a Simple Mail Transfer Protocol
(SMTP) Server, make sure to configure the SMTP Server before you attempt a
restore operation. Set the configuration in the Management Console by
right-clicking Dashboard in the tree view and selecting Properties. Then, go to
the E-mail property page. Enter the SMTP server and port in this property page.
v If you select a mailbox to restore, you can click Restore Mailbox to Original
Mailbox. If you select a folder, you can click Restore Folder to Original
Mailbox, or Restore Folder to SMTP Server. If messages are selected, you can
click Restore Messages to the Original Mailbox, Restore Messages to SMTP
Server or Save Mail Message Content.
v Data Protection for Exchange restores the mailbox backup to its original mailbox
location. However, you can also restore a mailbox to either of the following
locations:
To restore a mailbox item to a different mailbox, use the Open Exchange
Mailbox task in the Action pane. Enter the alias of the mailbox to identify it
as the restore destination. This mailbox restore destination is shown in the
lower results pane. Drag the source mailbox from the upper results pane to
the destination mailbox in the lower results pane.
To restore a mailbox to an Outlook personal folders (.pst) file, use the Open
PST File task in the Action pane. A Windows File dialog opens so that you
can select an existing .pst file or create a .pst file. This specified destination
.pst file is shown in the lower results pane. Drag the source mailbox from the
upper results pane to the destination .pst file in the lower results pane.
The mailbox restore browser only supports non-Unicode .pst files.
In either case, a merge operation is done during the restore. If the object exists,
Data Protection for Exchange does not create a duplicate. Data Protection for
Exchange restores only items that do not exist in the restore destination.
When a mailbox is restored to its original mailbox location, the items are
merged. When a mailbox is restored to a different mailbox or to a .pst file, the
items are restored to a folder that bears the original mailbox name.
Restriction: Only mailboxes within the same database can be restored in a single
mailbox restore action.
Procedure
To restore mailbox messages with the mailbox restore browser, complete the
following steps:
1. Start the Management Console.
2. Under the Protect and Recover Data node in the tree, select Exchange Server.
3. In the Recover panel, click View > Mailbox Restore Browser. The Select Source
Mailbox to Restore dialog opens.
4. Specify the mailbox to restore in the Select Source dialog:
a. To browse mailboxes, select Browse Mailboxes. You can also switch to the
databases view by selecting Browse Databases in the drop-down list.
Enter the name of the mailbox in the field in the Mailbox Name field, or
scroll down through the list and select a mailbox. The list is populated by
using mailbox history that is taken at the time of the backup. If mailbox
history is disabled, you can type a mailbox name. Otherwise, use the Search
field to filter the mailboxes. You can also sort the mailboxes by columns.
Click OK.
You can also specify a date and time in the Backup Date/Time field when
you want to restore a backup that was created at a specific point in time. To
filter by date and time, click the default date and time to edit the table cell.
To change the date, click the drop-down icon that is displayed at the end of
the cell. The calendar date selection tool is displayed. After you select a
date, to display the date in the field, press Enter. To edit the time, enter the
time using the 12-hour clock time convention.
b. To browse all mailboxes in a particular backup, specify Browse Databases.
A list of available backups is displayed. Scroll down the list and select a
database. Use the Search field to filter the databases. You can also sort the
databases by columns. Click OK.
c. To restore a mailbox that was deleted or recreated after the time of the
backup, go to the Properties > General tab. Enter the temporary mailbox
alias. If this alias is not entered, the mailbox restore operation uses the
current administrator user mailbox as a temporary storage location.
After the specified mailbox is restored to the recovery database, the restored
mailbox and folders are shown in the results pane.
5. Use the results pane to browse the folders and messages that are contained
within your mailbox. The following features are available:
v Preview: When a mailbox item is selected, its content is shown in the
preview panel. When an item contains an attachment, click the attachment
icon to preview its contents (click Open) or save it (click Save).
v Filter: Use the filter options to narrow the list of folders and messages in the
result pane.
a. Click Show Filter Options and Add Row.
b. Click the down arrow in the Column Name field and select an item to
filter. You can filter by Folder Name, Subject Text, Sender Name, Message
Body Text, All Content, Attachment Name, Size (in KB), Created Date,
Modified Date, Sent Date, and Received Date.
82 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
When you select All Content, the mailbox items are filtered by
attachment name, sender, subject, and message body.
c. Select an operator in the Operator field.
d. Specify a value to filter on in the Value field.
e. In you want to filter on more items, click Add Row.
f. Click Apply Filter to filter your messages and folders.
Select the mailbox, folder, or message to restore before proceeding.
6. Click the restore task in the Action pane. Depending on the item that you
selected, the following restore actions are available:
v Restore Folder to Original Mailbox
v Restore Messages to Original Mailbox
v Restore Folder to SMTP Server
v Restore Mail to SMTP Server
If the SMTP Server was not configured, you must configure it before you run
the restore action. Right-click the dashboard and select Properties, then click
E-mail to complete the configuration.
v Save Mail Message Content: A Windows Save File dialog is displayed.
Specify the location and message name and click Save. The Save Mail
Message Content action becomes available when a message is selected in the
preview pane.
When you restore an email with an attachment larger than 3 MB, a Microsoft
fix is required. The fix resolves the following issue: QFD: System.Net.Mail -
SmtpClient class throws exceptions if file attachment is over 3MB. The fix is
available online at https://connect.microsoft.com/VisualStudio/Downloads/
DownloadDetails.aspx?DownloadID=30226.
The Restore Progress dialog opens and shows operation details.
The Close Mailbox to Restore button is displayed after a recovery database is
created. When you click this button, Data Protection for Exchange removes the
recovery database that was created and cleans up the restored files. If you do
not select Close Mailbox to Restore, the recovery database is not removed even
if you exit the Management Console.
If you use Data Protection for Microsoft Exchange Server to back up the Exchange
server, the database files can be restore to a local disk with the following
command:
tdpexcc RESTOREFILES
If you are using Tivoli Storage Manager for Virtual Environments software, review
the following statements before restoring the mailbox:
v You can use Tivoli Storage Manager for Virtual Environments to back up an
Exchange server in a virtual machine. For more information see the Tivoli Storage
Manager for Virtual Environments User's Guide.
v To restore mailboxes from the backups created by Tivoli Storage Manager for
Virtual Environments, mount the virtual volumes that contain the EDB file and
Chapter 5. Protecting data 83
log files with read-write access. Read-write access can be gained by clearing the
Mount virtual volume as read only checkbox.
v If the log files reside on a different volume than the EDB file, mount the volume
containing the log files on an unused drive letter. With this action you can apply
the transaction logs to the EDB file.
To complete the restore from the graphical-user interface, complete the following
steps:
Procedure
1. From the Exchange server, launch Data Protection for Microsoft Exchange
Server.
2. After you log on to Data Protection for Microsoft Exchange Server, in the
navigation area, select the Exchange Server node and Recover tab. The Mailbox
Restore Browser view opens.
3. From the Actions pane, click Open EDB File on Disk.
4. In the dialog, enter or browse to the location of the backup database (EDB) file.
5. In the dialog, enter or browse to the location of the log file directory.
6. Click OK. The EDB file is opened and the mailboxes are displayed.
7. Select the mailbox that you want to restore and the type of restore that you
want to complete. For example, you can restore a mailbox to a PST file.
8. When the restore is complete, click Close Mailbox to Restore. During the
closure process, a message is displayed. The message asks you to decide if you
want to delete the recovery database folder.
To manually restore mailboxes using the recovery database, use VSS restore.
84 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Restoring data to a recovery database
Restore your data to a recovery database. You must already back up your database
before you attempt this task.
Note: When you restore to a recovery database, you must specify the option to
replay restored logs only, otherwise the restore can fail. Select Replay Restored
Logs ONLY in the GUI Restore tab or specify /recover=applyrestoredlogs on the
command line.
Procedure
Tip: From the Management Console, you can right-click the backup that you
want to restore, and click Restore Into, or select the backup and click Restore
Into in the Actions pane.
Only transaction logs that are contained in the backup are applied to the
mailbox database when a recovery database restore is processing.
You can do some of these steps by using either the Exchange Management Console
or the Exchange Management Shell commands, which are provided in parentheses.
Procedure
Mounting backups
From the Recover tab, you can mount a backup.
Procedure
1. Start the Management Console.
2. Click Recover Data in the welcome page of the Management Console.
3. In the Recover tab, go to the Action pane. Click Mount Backup.
4. Either type the path to the empty NTFS or ReFS folder where you want to
mount the backup or browse to find the path. Click OK.
Results
In the Recover tab, the backup that you mounted is displayed. You can use the
Explore and Unmount Backup options in the Action pane to complete tasks with
the backup that you mounted.
Attention: Do not use this procedure for typical delete tasks as backups are
deleted automatically, based on user-defined policy management settings. This
procedure is necessary for those deletions that are outside the scope of standard
policy management deletions. Perform this task with caution and only as a last
resort.
86 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Procedure
Note: When a delete backup is in progress, two tasks display in the task
window to show the deletion is in progress, and that the view is being
refreshed. The view content is updated when both tasks are finished.
What to do next
Procedure
1. Select Reporting in the tree view's Manage section. A list of available reports is
displayed. Each report has a description of what data the report contains.
2. Select a report from the list. The selected report displays.
3. To print or save the current report, click the appropriate icon at the top of the
report.
The software supports running tasks from both the command-line interface or
Microsoft Windows PowerShell command prompt (Version 3.0 and later). You can
also use the Automate tab in the Management Console.
Automating tasks
You can use the Automate view to work with commands. You can save a
command and run the command at a scheduled time.
You can use the Automate view to create, save, store, and schedule commands.
Open the Automate view by selecting a workload that you want to work with and
clicking Automate. An integrated command line is available in the task window.
You can use the interface to enter PowerShell cmdlets or command-line interface
commands. The output is displayed in the main window.
Procedure
1. Change PowerShell to Command Line.
2. Type a command in the details pane and click the Execute icon to run the
command. You can also run a saved task by clicking the Open icon, selecting
the command file, and clicking the Execute icon.
The commands can be entered with or without specifying tdpexcc. For
example, for each selected workload instance, you can enter a single command
or multiple commands, such as:
q tsm
q exc
3. Click the Save icon and follow the prompts to save a command for future use.
4. To schedule a command, click the Schedule this command icon to open the
scheduling wizard. Follow the prompts in the wizard to create a schedule for
the command.
5. The output of the command is displayed in the results pane. The output can be
saved or sent to an email address.
What to do next
You can automate commands from the Protect, Recover, Schedule, and Task List
views in the Management Console:
1. Start the Management Console and select the Exchange Server instance in the
tree view.
2. Click the tab for the task you want to do (Protect or Recover).
3. Automate the command by using one of the following methods:
Scheduling
Review these characteristics when you are defining a Tivoli Storage Manager
schedule.
v If you use the Tivoli Storage Manager server-prompted scheduling mode, ensure
that the Data Protection for Exchange option file has the tcpclientaddress and
tcpclientport options specified. If you want to run more than one scheduler
service, use the same tcpclientaddress. However, you must use different values
for tcpclientport (in addition to the different node names). An example of
running more than one scheduler service is when you schedule Data Protection
for Exchange and the regular Windows backup client.
Server-prompted scheduling is supported only when TCP/IP communication is
being used. By default, Data Protection for Exchange uses the client polling
schedule mode.
v If any changes that affect the scheduler are made to the Data Protection for
Exchange options file, restart the scheduler to activate the changes. Examples of
what can affect the scheduler are the Tivoli Storage Manager server address, the
schedule mode, or the client TCP address or port. To restart the scheduler, issue
the following commands:
net stop "Data Protection for Exchange Scheduler"
net start "Data Protection for Exchange Scheduler"
v The default Tivoli Storage Manager scheduler log file (dsmsched.log) contains
status information for the Tivoli Storage Manager scheduler. In this example, the
file is in this path:
d:\Program Files\Tivoli\TSM\TDPExchange\dsmsched.log
You can override this file name by specifying the schedlogname option in the
Data Protection for Exchange options file.
v Data Protection for Exchange creates a log file with statistics about the backed
up database objects when the /logfile parameter is specified during the
tdpexcc command. Outputs from the scheduled commands are sent to the
scheduler log file (dsmsched.log). After scheduled work is completed, check the
log to verify that the work is completed successfully.
When a scheduled command is processed, the scheduler log might contain the
following entry:
Scheduled event eventname completed successfully
This result is an indication that Tivoli Storage Manager successfully issued the
scheduled command that is associated with the eventname. No attempt is made
to determine the success or failure of the command. Assess the success or failure
90 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
of the command by evaluating the return code from the scheduled command in
the scheduler log. The scheduler log entry for the command's return code is
prefaced with the following text:
Finished command. Return code is:
If any scheduled backups fail, the scheduler script exits with the same error code
as the failed backup command. A non-zero error code means that the backup
failed.
v If passwordaccess generate is not specified in the dsm.opt file, then the Tivoli
Storage Manager password is to be specified on the tdpexcc command. To
specify the password, use the /tsmpassword parameter in the command file that
is being run by the scheduler (excfull.cmd). You can also specify the password
on the Data Protection for Exchange command line. For example:
tdpexcc query tsm /tsmnode=mars1 /tsmpassword=newpassword
Getting started
The cmdlets can be used in supported Windows environments.
Before you use the cmdlets provided with Data Protection for Exchange, complete
the following steps:
Procedure
1. Log on to the system as an administrator.
2. From a Windows PowerShell command prompt, enter the following command:
set-executionpolicy remotesigned
3. Import the Windows PowerShell modules from the TDPExchange folder:
v FmModuleExc.dll
v FmModuleMMC.dll
To import modules, with the administrator credentials, from a Windows
PowerShell command prompt, complete the following steps:
a. Navigate to the TDPExchange folder.
b. Enter the following commands:
import-module .\FmModuleExc.dll
import-module .\FmModuleMMC.dll
c. (Optional) To use the cmdlets in these modules any time you start Windows
PowerShell, add the following lines to your profile:
$path = (get-itemproperty -path "HKLM:\SOFTWARE\IBM\TDPExchange\
currentversion\mmc" -ea SilentlyContinue).path
if ($null -ne $path)
Chapter 6. Automating 91
{
dir "$path\fmmodule*.dll" | select -expand fullname | import-module
-force -Global
}
What to do next
92 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Table 6. Cmdlets to protect Microsoft Exchange Server data (continued). The following table identifies the cmdlets
that you can use to protect Microsoft Exchange server data.
Related command-line interface
Cmdlet name command Short description
Set-DpExcPolicy tdpexcc update policy Update a policy.
To view the details about a specific cmdlet, run the Get-Help cmdlet with the
cmdlet name. For example:
Get-Help Backup-DpExcComponent
To display the help in a separate window, include the -showwindow parameter with
the help command.
To view the details about a specific cmdlet, run the Get-Help cmdlet with the
cmdlet name. For example:
Get-Help New-FcmMmcSchedule
Chapter 6. Automating 93
To continue the example, to see examples for the cmdlet, enter:
get-help New-FcmMmcSchedule -examples
To display the help in a separate window, include the -showwindow parameter with
the help command.
94 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Chapter 7. Troubleshooting
Data Protection for Exchange provides support for protecting Microsoft Exchange
databases.
If you encounter a problem during Data Protection for Exchange processing when
using VSS for backup and restore, complete the following steps:
1. Retry the operation that failed.
2. Restart the Tivoli Storage Manager services, including the TSM Client Acceptor
and the TSM Remote Client Agent.
3. If the problem still exists, close other applications, especially those applications
that interact with Exchange (antivirus applications, for example). Retry the
operation that failed.
4. If the problem persists, look for information in the event logs: tdpexc.log and
dsmerror.log. You can also review the messages in the Windows event log.
There might be some log entries that help you identify a VSS event that
triggers the issue.
If you do not find a resolution to the problem in the log files, you can complete the
following procedure:
1. Shut down the Exchange server.
2. Restart the Exchange server.
3. Run the operation that failed.
Alternatively, you can also complete this procedure:
1. Shut down the entire computer.
2. Restart the computer.
3. Run the operation that failed.
Another troubleshooting procedure to consider: Determine if this problem is
reproducible on other Exchange servers.
When troubleshooting a mailbox restore error, you can use the TDPMAPI TESTMAPI
command. The command helps diagnose MAPI connection issues when connecting
to the mailbox. The following parameters can be used:
/MAILBOXALIAS
This parameter is the alias name for the mailbox that was specified when the
mailbox was originally created. The parameter refers to the email alias for the
user and is the portion of the email address on the left side of the @ symbol.
You should run this command against both the mailbox to be restored and the
mailbox of the administrator you are currently logged in as.
/EXCSERVER
(Exchange 2010 environments) This parameter is the name of the Exchange
Server that has the Client Access Server (CAS) role. The default is the local
server. The get-ExchangeServer | fl Exchange PowerShell command can be
used to determine which Exchange Server has the CAS role defined for the
mailbox database. It is mandatory to specify this parameter when there is a
CAS Load Balancer within the environment.
(Exchange 2013 environments) Depending on the information that you need,
use one of the following formats:
For example:
TDPMAPI TESTMAPI /MAILBOXALIAS=alias /EXCSERVER=cas /TRACEFILE=filename
Exchange 2013
The following list identifies troubleshooting information when protecting data for
an Exchange 2013 server:
v For the target mailbox, grant full access permission. When using the
Administrator mailbox, Exchange 2013 usually, by default, blocks full access
permission for this administrator.
v Log on as an Exchange administrator with a mailbox on an Exchange 2013
database.
v Make sure both the administrator mailbox and the target mailbox are accessible
in either Microsoft Outlook or Outlook Web Access.
v Use an Exchange 2013 CAS. Specifically, set the CLIENTACCESSServer parameter
to an Exchange 2013 CAS.
v If you are using a load balancer, for troubleshooting, set the CLIENTACCESSServer
parameter to an actual server instead of the load balancer.
v To open the administrator mailbox and the target mailbox, try using the Mailbox
Restore Browser with Open Exchange Mailbox.
v Check the MAPI registry key. The key is located at HKEY_CURRENT_USER\
Software\Microsoft\Windows NT\Current Version\Windows Messaging
Subsystem. The name of the key is RpcHttpProxyMap_TSM. Depending on your
environment, you might have to change the HTTP to HTTPS, or change the
authentication method, or change the domain name to *. The MAPI download
contains the Microsoft documentation for setting this registry key.
If the default registry key is something like the following example:
contoso.com=http://mail.contoso.com,ntlm,ntlm,false
For all of the information about registry keys, see the Microsoft documentation.
In addition, when completing a backup and restore tasks for an Exchange 2013
server, if a Client Access Server (CAS) is used and later removed as the CAS, or, if
the CAS is enabled for SSL authentication, an Enter Password window might be
96 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
displayed. This window prompts you to enter the domain, user name, and
password. To verify and workaround this problem is occurring, complete the
following steps:
1. From a command prompt, enter regedit.exe.
2. Use the Microsoft documentation to backup the registry.
3. Locate the following registry key: RpcHttpProxyMap_TSM. This key is located at
HKCU\Software\Microsoft\WindowsNT\CurrentVersion\Windows Messaging Subsystem
4. To go from HTTPS to HTTP, change the subdomain.domain.com=https://
server.subdomain.domain.com,ntlm,ntlm,false value to
subdomain.domain.com=http://server.subdomain.domain.com,ntlm,ntlm,false.
The installation wizard collects log files for the installation process. To view the log
files, on the navigation pane go to Manage > Diagnostics > Trace And Log Files.
The log files are listed in the upper window pane. When you select the log file, the
file is displayed in the lower window pane.
The following areas are where you can troubleshoot when you are having VSS and
SAN Volume Controller, Storwize V7000, or DS8000 problems:
v CIMOM (Common Information Model Object Manager) connectivity issues.
To verify connectivity to the CIMOM, complete the following steps:
Chapter 7. Troubleshooting 97
1. Refer to your SAN Volume Controller, Storwize V7000, or DS8000
documentation.
2. Run the IBMVCFG LIST command. The default location is %Program
Files%\IBM\Hardware Provider for VSS-VDS.
3. Issue the IBMVCFG SHOWCFG command to view the provider configuration
information.
v CIMOM operational issues.
If your backup or restore fails, check the IBMVSS.log file. If the failure is from a
CIMOM failure, the log displays output similar to the following example:
Wed Jan 13 17:34:34.793 - Calling AttachReplicas
Wed Jan 13 17:34:35.702 - AttachReplicas: 909ms
Wed Jan 131 17:34:35.702 - returnValue: 34561
Wed Jan 13 17:34:35.718 - AttachReplicas returned: 34561
...
...
Wed Jan 13 17:34:35.779 - IBMVSS: AbortSnapshots
98 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Determine the source of the problem
You can help determine whether a problem is a Data Protection for Microsoft
Exchange issue or an Exchange server issue.
For VSS operations, recreate the problem with the Microsoft diskshadow tool.
These applications can run backups that use the Microsoft Exchange VSS APIs. If
the problem is recreated with the diskshadow tool, the problem probably exists
within the VSS provider or the Exchange server.
Procedure
1. Test the connectivity between the Data Protection client and the Tivoli Storage
Manager dsmagent. Select the Exchange workload that you want to work with
and click the Automate tab to open the Automate view. Issue the Query
Exchange command in the lower details pane and click Execute (or Enter). The
results are displayed in the pane. As an alternative, issue the TDPEXCC QUERY
EXCHANGE command on the computer where the Exchange server is installed to
verify that your installation and configuration is correct. The TDPEXCC QUERY
EXCHANGE command returns information about the following items:
v Exchange server status
v Circular logging
v VSS components
The following example shows a sample of the output that is generated by the
TDPEXCC QUERY EXCHANGE command:
Volume Shadow Copy Service (VSS) Information
--------------------------------------------
Writer Name : Microsoft Exchange Writer
Local DSMAgent Node : SERVERA
Writer Status : Online
Selectable Components : 4
If the TDPEXCC QUERY EXCHANGE command does not return all of this information,
you might have a proxy configuration problem. Contact the Tivoli Storage
Manager server administrator to have the correct server GRANT PROXY
commands that are issued to enable proxy authority for nodes. If all of the
information returned to you seems correct, proceed to the next step.
2. To determine whether the problem is with the Microsoft VSS service, use the
vssadmin and diskshadow tools to re-create the VSS issue. On failure, use these
programs to re-create the error to determine whether it is a general VSS
problem or a problem within the Tivoli Storage Manager code.
vssadmin
A utility that is installed with your operating system. It can show
Chapter 7. Troubleshooting 99
current volume shadow copy backups and all installed shadow copy
writers and providers in the command window. The following
commands are examples of possible VSSADMIN commands:
VSSADMIN LIST WRITERS
VSSADMIN LIST PROVIDERS
VSSADMIN LIST SHADOWS
The VSSADMIN LIST SHADOWS command does not list shadow copies of
SAN-attached volumes.
The vssadmin tool uses Microsoft Software Shadow Copy provider to
list the shadow copies that are created.
diskshadow
The diskshadow tool is available on Windows 2008 server and 2008 R2.
Before you install Tivoli Storage Manager for Mail, test the core VSS
function. The following diskshadow testing can be done before any
Tivoli Storage Manager components are installed:
a. Test non-persistent shadow copy creation and deletion by running
the following DISKSHADOW commands:
diskshadow>set verbose on
diskshadow>begin backup
diskshadow>add volume f: (database volume)
diskshadow>add volume g: (log volume)
diskshadow>create
diskshadow>end backup
diskshadow>list shadows all
diskshadow>delete shadows all
diskshadow>list shadows all
Volumes f: and g: represent the Exchange database and log volumes.
Repeat theDISKSHADOW commands four times and verify that the
Windows event log file contains no errors.
b. Test persistent shadow copy creation and deletion by running the
following DISKSHADOW commands:
diskshadow>set context persistent
diskshadow>set verbose on
diskshadow>begin backup
diskshadow>add volume f: (database volume)
diskshadow>add volume g: (log volume)
diskshadow>create
diskshadow>end backup
diskshadow>list shadows all (this might take a few minutes)
diskshadow>delete shadows all
diskshadow>list shadows all
Volumes f: and g: represent the Exchange database and log volumes.
Repeat the diskshadow commands four times and verify that the
Windows event log file contains no errors.
c. Test persistent transportable shadow copy creation and deletion by
running the following DISKSHADOW commands:
diskshadow>set context persistent
diskshadow>set option transportable
diskshadow>add volume f: (database volume)
diskshadow>add volume g: (log volume)
diskshadow>set metadata c:\metadata\exchangemeta.cab
(the path where you want the metadata stored)
diskshadow>create
100 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
You must copy the exchangemeta.cab file from the source server to
the offload server. After you copy the file, issue the following
commands:
diskshadow>load metadata newpath/exchangemeta.cab
diskshadow>import
diskshadow>list shadows all (this might take a few minutes)
diskshadow>delete shadows all
Volumes f: and g: represent the Exchange database and log volumes.
Repeat the diskshadow commands four times and verify that the
Windows event log file contains no errors.
v The following items can be determined by using the vssadmin or
diskshadow tool:
Verify VSS provider configurations
Rule out any possible VSS problems before you run the Tivoli Storage
Manager VSS functions
That you might have a VSS configuration problem or a real hardware
problem if an operation does not work with diskshadow or vssadmin
That you might have a Tivoli Storage Manager problem if an operation
works with diskshadow or vssadmin but not with the Tivoli Storage
Manager
v Perform the following tests to ensure that VSS is working correctly:
Test nonpersistent shadow copy creation and deletion
a. Run DISKSHADOW k: l: where k: and l: are the Exchange Server
database and log volumes.
b. Repeat the previous step 4 times.
c. Inspect the Windows Event Log to ensure that things look appropriate.
Test persistent shadow copy creation and deletion
a. Run DISKSHADOW -p k: l: (where k: and l: are the Exchange Server
database and log volumes. Run DISKSHADOW -da if you do not have
enough space.
b. Repeat the previous step 4 times.
c. Inspect the Windows Event Log to ensure that things look appropriate.
Test nonpersistent transportable shadow copy creation and deletion (VSS
Hardware Provider environments only)
a. Run DISKSHADOW -p -t=export.xml k: l: where k: and l: are the
Exchange Server database and log volumes.
b. Copy the resultant export.xml file from computer 1 to computer 2
before you continue to the next step.
c. On the computer you have set aside for offload, run DISKSHADOW
-i=export.xml
d. Inspect the Windows Event Log to ensure that things look appropriate.
If any of these tests fail repeatedly, there is hardware configuration problem
or a real VSS Problem. Consult your hardware documentation for known
problems or search Microsoft Knowledge Database for any information.
If all tests pass, continue to Step 3.
3. Re-create your specific problem by using diskshadow. If you can re-create your
problem, only through a series of steps (for example: a backup fails only when
you perform two consecutive local backups), try to perform those same tests by
using diskshadow.
What to do next
For more information, see the Verifying VSS functionality for the Data Protection
Exchange backup Technote: Verifying VSS functionality for the Data Protection
Exchange backup.
Attention: Do not run these tests if you are already using SAN Volume Controller
or Storwize V7000 space-efficient snapshots on your computer. Doing so can result
in the removal of previously existing snapshots.
Procedure
102 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
What to do next
For more information about troubleshooting of VSS operations, refer to the Tivoli
Storage Manager Problem Determination Guide.
You can collect trace and log files in the Diagnostics property page for a workload.
When you encounter a problem in the Management Console, you can create trace
files by using the Diagnostics property page. Click Properties > Diagnostics, and
click Begin. Then, close the property page and reproduce the problem. Finally,
open the Diagnostics property page and click Stop. The log files are displayed in
the Trace and Log Files view, and you can click a file to view it.
Clicking the Diagnostics button is the preferred method for gathering information
to send to your service representative. This method gathers all the information that
is needed. Even if a problem occurs only on the command-line interface,
command, you can always gather information by using the Automate tab.
Data Protection for Exchange uses several components. Each component is in its
own directory along with its respective troubleshooting files. The Trace and Log
Files view brings these files into a central location for easy viewing. Examples
including default log and trace files are provided:
v Examples of Data Protection for Exchange default log and trace files:
Installation directory: C:\Program Files\Tivoli\TSM\TDPExchange
dsierror.log
tdpexc.log
TraceFileExc.trc
If the tdpexc.log is defined in a path other than the default C:\Program
Files\Tivoli\TSM\TDPExchange\tdpexc.log, the reports do not include the
following information for scheduled backup and restore operations:
Task completion
Type of data protection activity
Amount of data protection activity
The charts and reports display only information that is present in the default log
file tdpexc.log.
v Examples of VSS requestor default log and trace files:
Installation directory: C:\Program Files\Tivoli\TSM\baclient
dsmerror.log
v Examples of IBM VSS provider for SAN Volume Controller, Storwize V7000, and
DS8000 log files:
IBMVDS.log
IBMVss.log
The following traces are the different traces to gather when you diagnose Data
Protection for Exchange VSS operational problems:
Data Protection for Exchange trace
To create the trace flag, issue the /TRACEFILE and /TRACEFLAGS
command-line options with the following example command:
TDPEXCC BACKUP SG1 FULL /TRACEFILE=DPTRACE.TXT /TRACEFLAG=SERVICE
Enable tracing for FlashCopy Manager. See the IBM Tivoli Storage FlashCopy
Manager Installation and User's Guide for information about how to enable
tracing.
Tivoli Storage Manager API trace
Enable tracing with the DP/Exchange dsm.opt file and the TRACEFILE
and TRACEFLAGS keywords. The following text is an example of the entry
in the DP/Exchange dsm.opt file:
TRACEFILE APITRACE.TXT
TRACEFLAG SERVICE
DSMAGENT trace
Enable tracing with the dsmagent (baclient) dsm.opt file and the
TRACEFILE and TRACEFLAGS keywords. The following text is an example
of the entry in the dsmagent (baclient) dsm.opt file:
TRACEFILE AGTTRACE.TXT
TRACEFLAG SERVICE PID TID ENTER ALL_VSS SBRM RESTORE
The trace flag, in this instance, is ALL_VSS (you might need different
traceflags, depending on the circumstance).
Exchange VSS Writer tracing
Event logging is the only extra tracing that can be turned on. Complete
these steps to modify the level of event logging for the Exchange Store
Writer:
1. Open the Exchange Management Console.
2. Find the server object.
3. Right-click the server on which you want to increase the logging level
and click Properties or Manage Diagnostic Logging Properties,
depending on the Exchange version.
4. Click the Diagnostics Logging tab.
5. Expand the MSExchangeIS node in the Services pane and click
System.
6. Click Exchange writer in the Categories pane and select the logging
level.
7. Click Apply and then OK to close the Properties dialog box.
104 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Enable the Volume ShadowCopy service debug trace features in Windows
See the following websites for information about enabling debug tracing:
v http://support.microsoft.com/kb/887013
v http://msdn.microsoft.com/en-us/library/windows/desktop/dd765233
%28v=vs.85%29.aspx
Gather as much of the following information as possible before you contact IBM
Support:
v The exact level of the Windows operating system, including all service packs
and hotfixes that were applied.
v The exact level of the Exchange Server, including all service packs and hotfixes
that were applied.
v The exact level of Data Protection for Exchange with Volume Shadow Copy
Service (VSS) Backup/Restore support.
v The exact level of the Tivoli Storage Manager API.
v The exact level of the Tivoli Storage Manager server.
v The exact level of the Tivoli Storage Manager backup-archive client.
v The exact level of the Tivoli Storage Manager storage agent (if LAN-free
environment).
v The Tivoli Storage Manager server platform and operating system level.
v The output from the Tivoli Storage Manager server QUERY SYSTEM command.
v The output from the Data Protection for Exchange TDPEXCC QUERY EXCHANGE
command.
v The device type (and connectivity path) of the Exchange databases and logs.
v (SAN only) The specific hardware that is being used. For example: HBA, driver
levels, microcode levels, SAN Volume Controller or Storwize V7000 levels,
DS8000 hardware details.
v Permissions and the name of the user ID being used to run backup and restore
operations.
v The name and version of antivirus software.
v (SAN only) The VSS hardware provider level.
v The VSS hardware provider log files. See the documentation of the specific VSS
hardware provider on how to enable tracing and collect the trace log files.
v (SAN only) The IBM CIM agent level for DS8000, SAN Volume Controller, or
Storwize V7000.
v A list of vendor-acquired Exchange applications that are running on the system.
v A list of other applications that are running on the system.
v A list of the steps that are needed to re-create the problem (if the problem can be
re-created).
v If the problem cannot be re-created, list the steps that caused the problem.
v Does the problem occur on other Exchange servers?
Gather as many of the following files as possible before you contact IBM Support.
To collect information manually, refer to the following list. The MMC automatically
collects this information.
v The contents of the C:\adsm.sys\vss_staging directory and subdirectories. Or
gather the appropriate directories if you are using the VSSALTSTAGINGDIR option.
v The Data Protection for Microsoft Exchange configuration file. The default
configuration file is tdpexc.cfg.
v The Data Protection for Microsoft Exchange Tivoli Storage Manager API options
file. The default options file is dsm.opt.
v The Tivoli Storage Manager registry hive export.
v The Exchange Server registry hive export.
v The Tivoli Storage Manager Server activity log. The Data Protection client logs
information to the server activity log. A Tivoli Storage Manager administrator
can view this log for you if you do not have a Tivoli Storage Manager
administrator user ID and password.
v If the Data Protection client is configured for LAN-free data movement, also
collect the options file for the Tivoli Storage Manager storage agent. The default
name for this file is dsmsta.opt.
v Any screen captures or command-line output of failures or problems.
Log files can indicate the date and time of a backup, the data that is backed up,
and any error messages or completion codes that might help to determine your
problem. The following files are the Tivoli Storage Manager log files that you can
gather:
v The Data Protection for Microsoft Exchange log file. The default location of this
file is C:\Program Files\Tivoli\TSM\TDPExchange\tdpexc.log
v The Tivoli Storage Manager API Error log file. The default location of this file is
C:\Program Files\Tivoli\TSM\TDPExchange\dsierror.log
v The DSMAGENT error log file. The default location of this file is C:\Program
Files\Tivoli\TSM\baclient\dsmerror.log
v The dsmcrash.dmp and DSMAGENT crash log file, if requested. The default
location is C:\Program Files\Tivoli\TSM\baclient\dsmcrash.log.
Important: The Windows event log receives information from the Exchange Server
and many different components that are involved during a Volume Shadow Copy
Service (VSS) operation. Export the event log to a text file format.
You can use the Data Protection for Exchange console to list the events that
originate by Data Protection for Exchange. Select Dashboard - ServerName >
Diagnostics > System Information and double-click the dpevents.ps1 script in the
PowerShell section of the System Information page.
On Windows Server 2008 and later, You can use PowerShell scripting to list the
events information. You can also use the export function from within the Event
Viewer to do this function. The utility, by default, produces a tabular listing of all
event log records in three sections (one section per event log type). Specify the
type of event log you require by using one of the following /L parameters:
/L Application
106 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
/L Security
/L System
The following example generates output only for the application and system event
logs:
cscript c:\windows\system32\eventquery.vbs /L Application >eq_app.out
cscript c:\windows\system32\eventquery.vbs /L System >eq_sys.out
You can use the /FO parameter to specify tabular, list, or comma-separated (CSV)
output. The following are the different methods of specifying the output:
/FO TABLE
/FO LIST
/FO CSV
The default format is TABLE. The LIST output puts each column of the record on a
separate line. This technique is similar to how the Tivoli Storage Manager
administrator's command-line interface (CLI) displays output when it is too wide
for tabular display. The CSV output can be loaded into a spreadsheet or database
tool for easier viewing. The following example generates a detailed CSV file of the
application log:
cscript c:\windows\system32\eventquery.vbs /L Application /FO CSV /V >eq_app.out
You can get more help information for the tool by using the following example:
cscript c:\windows\system32\eventquery.vbs /?
To increase the number of events that are logged by the Microsoft Exchange Writer,
use the Set-EventLogLevel PowerShell cmdlet command. For more information
about the Set-EventLogLevel PowerShell cmdlet command, see the Microsoft
documentation.
The following VSS provider log files can also be helpful, if applicable:
v System Provider - (Windows Event Log)
v IBM System Storage SAN Volume Controller, IBM Storwize V7000, or DS8000 -
%Program Files%\IBM\Hardware Provider for VSS\IBMVss.log
v NetApp - %Program Files%\SnapDrive\*.log
v XIV - zip up all of the files in the C:\Windows\Temp\xProvDotNet directory
The Email Support files feature collects all detected configuration, option, system
information, trace, and log files. It also collects information about services,
operating systems, and application versions. These files are compressed and then
attached in an email.
Results
The following list identifies the various ways that you can find information online:
v Tivoli Storage Manager wiki at http://www.ibm.com/developerworks/
mydeveloperworks/wikis/home/wiki/Tivoli Storage Manager.
v Service Management Connect site at https://www.ibm.com/developerworks/
servicemanagement/sm/index.html.
v Data Protection for Microsoft Exchange Server product support at
http://www.ibm.com/software/tivoli/products/storage-mgr-mail/. Enter the
search term to narrow the search criteria for your support need. Examples of
search terms are an authorized program analysis report (APAR) number, release
level, or operating system
The System Information view is extensible. You can take advantage of this
flexibility to add and share customize scripts.
Procedure
Tip: The name of the script is displayed in the Actions pane. Click the
name of the script in the Actions pane to reveal or hide a list of actions to
process.
b. Click Command Editor in the Actions pane to open the script file for
viewing or editing.
c. View or edit the script. Click OK to save your changes, or click Cancel to
exit the System Information Command Editor without saving any
changes.
v To delete a script:
a. From the list of script files in the results pane, select the name of a script
that you want to delete.
Tip: The name of the script is displayed in the Actions pane. Click the
name of the script in the Actions pane to reveal or hide a list of actions to
process.
b. Click Delete in the Actions pane.
Some of these factors, such as hardware configuration, network type, and capacity,
are not within the scope of Data Protection for Microsoft Exchange. Some options
that are related to Data Protection for Microsoft Exchange can be tuned for
optimum performance. See Specifying Data Protection for Exchange options on
page 35 for details that regard these options. In addition, the following issues affect
performance:
v Backups to local shadow volumes eliminates the transfer of data to the Tivoli
Storage Manager server.
v During VSS backup processing, integrated Exchange integrity checking reads
every page in the files to be backed up. Backup processing time can be
significant. Performance can improve if you specify the /SKIPINTEGRITYCHECK
parameter to bypass integrity checking. There is a risk that is associated with
using this parameter. For information about skipping Exchange integrity
checking, refer to the Microsoft documentation.
v The time that is required to complete a snapshot, ranges from seconds to
minutes, depending on the type of VSS provider used. If an integrity check is
run, it can delay the completion of the backup depending on the size of the
database and log files.
v Backup-archive client settings can affect performance when you back up data to
the Tivoli Storage Manager server. Review the information that is provided in
the VSS backup on page 4 and How Tivoli Storage Manager server policy
affects Data Protection for Exchange on page 28 sections.
v Performing Data Protection for Microsoft Exchange VSS backups from an
Exchange Server DAG passive copy can offload I/O and possibly CPU resources
from the production server.
If you have not applied the update for Tivoli Storage Manager server APAR
IC86558, apply the update.
For VSS backups, the RESOURCEUTILIZATION client option is also important. This
option increases or decreases the ability of the client to create multiple sessions.
The higher the value, the more sessions the client can start. The range for the
option is from 1 to 10. For more information about RESOURCEUTILIZATION, see the
IBM Tivoli Storage Manager Performance Tuning Guide.
If you run multiple backups in parallel, stagger the backup times by several
minutes. The staggered backup times ensure that the snapshots are not created at
the same time. When you use VSS, only one snapshot set can be created at a time.
For more information about these options, see IBM Tivoli Storage Manager for
Windows Backup-Archive Clients Installation and User's Guide.
112 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Chapter 9. Reference information
Data Protection for Exchange reference information is provided.
Command overview
The name of the Data Protection for Microsoft Exchange command-line interface is
tdpexcc.exe. This program is in the directory where Data Protection for Microsoft
Exchange is installed.
You can start a Windows command prompt with administrative privileges. Or, you
can follow these steps to start the Data Protection for Microsoft Exchange
command-line interface:
1. Start the Management Console (MMC) GUI.
2. In the tree view, select the computer node where you want to run the
commands.
3. Expand the Protect and Recover Data node.
4. In the tree view, select an Exchange Server node.
5. Click the Automate tab. An integrated command line is available in the task
window. You can use the interface to enter PowerShell cmdlets or
command-line interface commands. The output is displayed in the main
window.
6. Change PowerShell to Command Line.
Issue the tdpexcc ? or tdpexcc help command to display help for the
command-line interface. You can see more specific help for commands by entering
a command like the following example: tdpexcc help backup, where backup is an
Backup command
Use the backup command to run Exchange Server database backups from the
Exchange Server to Tivoli Storage Manager server storage.
For SAN Volume Controller and Storwize V7000 storage subsystems, only one
backup is allowed to occur while the background copy process is pending. A new
backup is not started until the background copy process for the previous backup
completes. As a result, local backups for SAN Volume Controller and Storwize
V7000 storage subsystems are to be initiated at a frequency greater than the time
required for the background copy process to complete.
See Backup strategies on page 18 for more information that is related to the
backup command.
Data Protection for Microsoft Exchange supports the following types of backup:
Full Back up the entire database and transaction logs. If a successful integrity
check and backup are obtained, the Exchange Server truncates the
committed log files.
Incremental
Back up the transaction logs. If a successful integrity check and backup are
obtained, the Exchange Server deletes the committed log files.
Differential
Back up the transaction logs but do not delete them.
Copy Back up the entire database and transaction logs. Do not delete the
transaction logs.
114 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Backup syntax
To view available options and truncation requirements, use the backup command.
TDPEXCC command
TSM tdpexc.cfg
/BACKUPDESTination= /CONFIGfile=
LOCAL configfilename
BOTH
/DAGNODE= nodename /EXCLUDEDAGACTive /EXCLUDEDAGPASsive
/EXCLUDENONDAGDbs /EXCLUDEDB= DB1, DB2,...DBN
tdpexc.log 60
/LOGFile= /LOGPrune= numdays
logfilename No
0
/MINimumbackupinterval=
numberOfMinutes
Yes /OFFLOAD /PREFERDAGPASsive /Quiet
/MOUNTWait=
No
/SKIPINTEGRITYCHECK /TSMNODe= tsmnodename
dsm.opt /TSMPassword= tsmpassword
/TSMOPTFile=
tsmoptfilename
116 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
/EXCLUDEDAGACTive
Use the /EXCLUDEDAGACTive parameter to exclude databases from the
backup if they belong to a Database Availability Group and are an active
database copy.
/EXCLUDEDAGPASsive
Use the /EXCLUDEDAGPASsive parameter to exclude the databases from
backup if they belong to a Database Availability Group and are a passive
database copy.
/EXCLUDENONDAGDbs
Use the /EXCLUDENONDAGDbs parameter to exclude the databases from
backup if they do not belong to a Database Availability Group.
/EXCLUDEDB=db-name,...
Use the /EXCLUDEDB parameter to exclude the specified databases from the
backup operation.
/LOGFile=logfilename
Use the /LOGFile parameter to specify the name of the activity log file that
is generated by Data Protection for Microsoft Exchange.
The logfilename variable identifies the name of the activity log file.
If the specified log file does not exist, a new log file is created. If the
specified log file exists, new log entries are appended to the file. The
logfilename variable can include a fully qualified path. However, if no path
is specified, the log file is written to the Data Protection for Microsoft
Exchange installation directory.
If the logfilename variable includes spaces, enclose the entire /LOGFile
parameter entry in double quotation marks. For example:
/LOGFile="c:\Program Files\mytdpexchange.log"
If the /LOGFile parameter is not specified, log records are written to the
default log file, tdpexc.log.
The /LOGFile parameter cannot be turned off, logging always occurs.
When you use multiple simultaneous instances of Data Protection for
Microsoft Exchange to perform operations, use the /LOGFile parameter to
specify a different log file for each instance used. This function directs
logging for each instance to a different log file and prevents interspersed
log file records. Failure to specify a different log file for each instance can
result in unreadable log files.
/LOGPrune=numdays|No
The /LOGPrune parameter prunes the Data Protection for Microsoft
Exchange activity log and specifies how many days of entries are saved. By
default, log pruning is enabled and done once each day that Data
Protection for Microsoft Exchange is run; however, you can use this option
to disable log pruning or explicitly request a prune of the log for one
command run even if the log file is already pruned for the day. The
numdays variable represents the number of days to save log entries. By
default, 60 days of log entries are saved in the prune process.
v If you specify numdays, it can range from 0 to 9999. A value of 0 deletes
all entries in the Data Protection for Microsoft Exchange activity log file
except for the current command entries.
118 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
performed during a backup. During VSS backup processing, integrated
Exchange integrity checking reads every page in the files to be backed up.
Backup processing time can be significant. You can specify
the/SKIPINTEGRITYCHECK parameter to bypass integrity checking. This
parameter is valid for all VSS backups, only skip these checks in
accordance with recommendations from Microsoft.
When using this parameter, it is possible that the stored backup is not
valid because it is not being verified with the Exchange integrity check
utility. Make sure that you have a valid backup stored on Tivoli Storage
Manager server storage. If you are using a Database Availability Group
(DAG) configuration, and there are at least two viable copies of the
database, you can skip the integrity check in order to speed up the backup.
/TSMNODe=tsmnodename
Use the tsmnodename variable to refer to the Tivoli Storage Manager node
name that Data Protection for Microsoft Exchange uses to log on to the
Tivoli Storage Manager server. You can store the node name in the Tivoli
Storage Manager options file (dsm.opt). This parameter overrides the value
in the Tivoli Storage Manager options file if PASSWORDACCESS is set to
PROMPT. This parameter is not valid when PASSWORDACCESS is set to GENERATE
in the options file.
/TSMOPTFile=tsmoptfilename
Use the tsmoptfilename variable to identify the Data Protection for Microsoft
Exchange options file.
The file name can include a fully qualified path name. If no path is
specified, the directory where Data Protection for Microsoft Exchange is
installed is searched.
If the tsmoptfilename variable includes spaces, enclose the entire
/TSMOPTFile parameter entry in double quotation marks. For example:
/TSMOPTFile="c:\Program Files\file.opt"
The default is dsm.opt.
/TSMPassword=tsmpassword
Use the tsmpassword variable to refer to the Tivoli Storage Manager
password that Data Protection for Microsoft Exchange uses to log on to the
Tivoli Storage Manager server. If you specified PASSWORDACCESS GENERATE in
the Data Protection for Microsoft Exchange options file (dsm.opt), you do
not need to supply the password here because the one that is stored in the
registry is used. However, to store the password in the registry, you must
specify the Tivoli Storage Manager password the first time Data Protection
for Microsoft Exchange connects to the Tivoli Storage Manager server.
If you do specify a password with this parameter when PASSWORDACCESS
GENERATE is in effect, the command-line value is ignored unless the
password for this node has not yet been stored in the registry. In that case,
the specified password is stored in the registry and used when you run
this command.
If PASSWORDACCESS PROMPT is in effect, and you do not specify a password
value on the command line, then you are prompted for a password.
The Tivoli Storage Manager password that Data Protection for Microsoft
Exchange uses to log on to the Tivoli Storage Manager server can be up to
63 characters in length.
This example shows how to run a full VSS backup of exactly one copy of a
database that contains multiple copies in an Exchange Server Database Availability
Group (DAG). The command instructs Data Protection for Exchange to back up
only the database KEENVM1_M_DB1 if a minimum of 60 minutes passes since the
latest backup of the database, and if no other member in the FCMDAG2 Database
Availability Group is backing it up. Include this command in a command script
(for example, c:\backup.cmd). Then, define a Tivoli Storage Manager schedule that
starts this command script, and associate all DAG nodes to this schedule.
tdpexcc backup KEENVM1_M_DB1 full /minimumbackupinterval=60
This example shows how to run a full VSS backup of one healthy passive copy of
a database that contains multiple copies in an Exchange Server Database
Availability Group (DAG). If a healthy passive copy is not available, the active
database copy is backed up. The command instructs Data Protection for Exchange
to back up only the passive copy of database KEENVM1_M_DB1 if a minimum of 60
minutes passes since the latest backup of the database, and if no other member in
the FCMDAG2 Database Availability Group is backing it up. If no passive database
copy is available, back up the active database copy. Include this command in a
command script (for example, c:\backup.cmd). Define a Tivoli Storage Manager
schedule that starts this command script, and associate all DAG nodes to this
schedule.
tdpexcc backup KEENVM1_M_DB1 full /minimumbackupinterval=60 /preferdagpassive
Changetsmpassword command
To change the Tivoli Storage Manager password that is used by Data Protection for
Microsoft Exchange, use the changetsmpassword command. The password is used
to log on to the Tivoli Storage Manager server.
If you do not enter the old and new passwords, Data Protection for Microsoft
Exchange prompts you for the old and new passwords. Data Protection for
Microsoft Exchange does not display the password on the screen. The Tivoli
Storage Manager password Data Protection for Microsoft Exchange uses to log on
to the Tivoli Storage Manager server can be up to 63 characters in length.
Changetsmpassword syntax
Use the changetsmpassword command syntax diagrams as a reference to view
available options and truncation requirements.
TDPEXCC command
TDPEXCC
CHANGETSMPassword
oldpassword
newpassword
verifypassword
120 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
tdpexc.cfg tdpexc.log
/CONFIGfile= /LOGFile=
configfilename logfilename
60 /TSMNODe= tsmnodename
/LOGPrune= numdays
No
dsm.opt
/TSMOPTFile=
tsmoptfilename
Attention: Failure to specify a different log file for each instance can
result in unreadable log files.
/LOGPrune=numdays|No
Use the /logprune parameter to disable log pruning or to explicitly request
that the log be pruned for one command run. By default, log pruning is
enabled and done once per day. The numdays variable represents the
number of days to save log entries. By default, 60 days of log entries are
saved in the pruning process. You can use the Data Protection for
Microsoft Exchange GUI or the set command to change the defaults so
that log pruning is disabled, or so that more or less days of log entries are
saved. If you use the command line, you can use the /logprune parameter
to override these defaults. When the value of the /logprune variable
numdays is a number in the range 0 - 9999, the log is pruned even if log
pruning is already done for the day.
Changes to the value of the timeformat or dateformat parameter can result
in prunning the log file unintentionally. If the value of the timeformat or
dateformat parameter is changed, before issuing a Data Protection for
Microsoft Exchange command that might prune the log file, do one of the
following actions to prevent the log file from being pruned:
v Make a copy of the existing log file.
v Specify a new log file with the /logfile parameter or logfile setting.
/TSMNODe=tsmnodename
Use the tsmnodename variable to refer to the Tivoli Storage Manager node
name that Data Protection for Microsoft Exchange uses to log on to the
Tivoli Storage Manager server. You can store the node name in the Tivoli
Storage Manager options file (dsm.opt). This parameter overrides the value
in the Tivoli Storage Manager options file if PASSWORDACCESS is set to
PROMPT. This parameter is not valid when PASSWORDACCESS is set to GENERATE
in the options file.
/TSMOPTFile=tsmoptfilename
Use the tsmoptfilename variable to identify the Data Protection for Microsoft
Exchange options file.
The file name can include a fully qualified path name. If no path is
specified, the directory where Data Protection for Microsoft Exchange is
installed is searched.
122 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
If the tsmoptfilename variable includes spaces, enclose the entire
/tsmoptfile parameter entry in quotation marks. For example:
/TSMOPTFile="c:\Program Files\file.opt"
The default is dsm.opt.
You must have local registry rights for all versions of Exchange Server to complete
a Data Protection for Microsoft Exchange delete backup. When a full VSS snapshot
backup is completed, the backup remains active until the backup version is deleted
with the delete backup command, or expired by VSS according to the defined
policy. Two different active backups can exist at the same time:
v Full backup, along with any associated incremental backups and differential
backups.
v Copy backup, along with any associated incremental backups and differential
backups.
When you delete an active full or copy backup, the state of the previous active full
or copy backup changes from inactive to active. However, the current active
incremental or differential backup is not deleted. The backup erroneously seems to
be associated with the newly active full or copy backup. Also, the incremental or
differential backup (associated with the previous inactive full or copy backup that
changed to active) remains inactive. This inactive incremental or differential
backup might not display in the query output unless the /all parameter is
specified with the query fcm command.
TDPEXCC command
TDPEXCC
tdpexc.cfg /DAGNODE= nodename
/CONFIGfile=
configfilename
local Exchange server tdpexc.log [or cfg value]
/FROMEXCSERVer= /LOGFile=
server-name logfilename
/OLDerthan= days
60 [or cfg value] /OBJect= objectname
/LOGPrune=
numdays
No
/Quiet /TSMNODe= tsmnodename dsm.opt
/TSMOPTFile=
tsmoptfilename
/TSMPassword= tsmpassword
124 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Attention:
v Be careful to delete only the backups you want.
v Deleting incremental or differential backups can cause loss of recovery points.
v Deleting a full backup might cause incremental or differential backups to remain
in a suspended state and are considered useless without a corresponding full
backup.
The following positional parameters specify the type of delete backup to perform:
FULL|COPY|INCRemental|DIFFerential
FULL Delete full type backups.
COPY Delete copy type backups.
INCRemental
Delete incremental type backups.
DIFFerential
Delete differential type backups.
126 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
/OBJect=objectname
Use the /object parameter to specify the name of the backup object you
want to delete. The object name uniquely identifies each backup object and
is created by Data Protection for Microsoft Exchange.
Use the Data Protection for Microsoft Exchange query tsm * /all
command to view the names of all available backup objects.
The /object parameter is used to delete only one incremental backup at a
time. When multiple active incremental backups exist, the /object
parameter must be specified with the delete command. If it is not
specified, the delete command fails.
/OLDerthan=days
Use the /olderthan parameter to specify how old backup files can be
before they are deleted. The days variable can range from 0 - 9999. There is
no default value for/olderthan.
/Quiet This parameter prevents status information from being displayed. The level
of information that is written to the activity log is not affected.
/TSMNODe=tsmnodename
Use the tsmnodename variable to refer to the Tivoli Storage Manager node
name that Data Protection for Microsoft Exchange uses to log on to the
Tivoli Storage Manager server. You can store the node name in the Tivoli
Storage Manager options file (dsm.opt). This parameter overrides the value
in the Tivoli Storage Manager options file if PASSWORDACCESS is set to
PROMPT. This parameter is not valid when PASSWORDACCESS is set to GENERATE
in the options file.
/TSMOPTFile=tsmoptfilename
Use the tsmoptfilename variable to identify the Data Protection for Microsoft
Exchange options file.
The file name can include a fully qualified path name. If no path is
specified, the directory where Data Protection for Microsoft Exchange is
installed is searched.
If the tsmoptfilename variable includes spaces, enclose the entire
/tsmoptfile parameter entry in double quotation marks. For example:
/TSMOPTFile="c:\Program Files\file.opt"
The default is dsm.opt.
/TSMPassword=tsmpassword
Use the tsmpassword variable to refer to the Tivoli Storage Manager
password that Data Protection for Microsoft Exchange uses to log on to the
Tivoli Storage Manager server. If you specified PASSWORDACCESS GENERATE in
the Data Protection for Microsoft Exchange options file (dsm.opt), you do
not need to supply the password here because the one that is stored in the
registry is used. However, to store the password in the registry, you must
specify the Tivoli Storage Manager password the first time Data Protection
for Microsoft Exchange connects to the Tivoli Storage Manager server.
If you do specify a password with this parameter when PASSWORDACCESS
GENERATE is in effect, the command-line value is ignored unless the
password for this node has not yet been stored in the registry. In that case,
the specified password is stored in the registry and used when you run
this command.
If PASSWORDACCESS PROMPT is in effect, and you do not specify a password
value on the command line, then you are prompted for a password.
Help command
To display help for Data Protection for Microsoft Exchange commands, use the
tdpexcc help command.
This command lists one or more commands and their parameters. If you cannot
see all of the help on a screen, set the width of your screen display to a value
greater than 80 characters. For example, set the screen width to 100 characters.
Help syntax
Use the help command syntax diagrams as a reference to view available options
and truncation requirements.
TDPEXCC command
* *
TDPEXCC
? command subcommand
HELP
128 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Mount backup command
To mount backups, use the mount backup command.
TDPEXCC command
tdpexc.cfg tdpexc.log
/CONFIGfile= /LOGFile=
configfilename logfilename
60
/LOGPrune= numdays
No /REMOTECOMPUTER= computername
/REMOTECOMPUTERUser= user /REMOTECOMPUTERPassword= passwd
/TSMNODe= tsmnodename dsm.opt
/TSMOPTFile=
tsmoptfilename
/TSMPassword= tsmpassword
The list must contain all non-qualified objects or all qualified objects. The list
cannot contain a combination of non-qualified objects and qualified objects. Specify
the list by using the following syntax:
For example:
tdpexcc mount backup excdb:(20120815064316)=f:\emptyfolder
130 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
FlashCopy Manager for Exchange command that might prune the log file,
do one of the following actions to prevent the log file from being pruned:
v Make a copy of the existing log file.
v Specify a new log file with the /logfile parameter or logfile setting.
/REMOTECOMPUTER=computername
Enter the computer name or IP address of the remote system where the
backup was created.
/REMOTECOMPUTERUser=user
Enter the user name that is used to log on to the server specified with the
REMOTECOMPUTER parameter. If a domain is required to log on with the
domain account, enter Domain\User. To log on to the local account, the
domain is not required. There is no default value.
/REMOTECOMPUTERPassword=passwd
Enter the password for the user name that is specified with the
REMOTECOMPUTERUser parameter. There is no default value.
/TSMNODe=tsmnodename
Use the tsmnodename variable to refer to the Tivoli Storage Manager node
name that Tivoli Storage FlashCopy Manager uses to log on to the Tivoli
Storage Manager server. You can store the node name in the Tivoli Storage
Manager options file (dsm.opt). This parameter overrides the value in the
Tivoli Storage Manager options file if PASSWORDACCESS is set to PROMPT. This
parameter is not valid when PASSWORDACCESS is set to GENERATE in the
options file.
/TSMOPTFile=tsmoptfilename
Use the tsmoptfilename variable to identify the Tivoli Storage Manager
options file.
The file name can include a fully qualified path name. If no path is
specified, the directory where Tivoli Storage FlashCopy Manager is
installed is searched.
If the tsmoptfilename variable includes spaces, enclose the entire
/tsmoptfile parameter entry in double quotation marks. For example:
/TSMOPTFile="c:\Program Files\dsm.opt"
The default is dsm.opt.
/TSMPassword=tsmpassword
Use the tsmpassword variable to refer to the Tivoli Storage Manager
password that Tivoli Storage FlashCopy Manager uses to log on to the
Tivoli Storage Manager server. If you specified PASSWORDACCESS GENERATE in
the Tivoli Storage FlashCopy Manager options file (dsm.opt), supplying the
password is not necessary here because the one that is stored in the
registry is used. However, to store the password in the registry, you must
specify the Tivoli Storage Manager password the first time Tivoli Storage
FlashCopy Manager connects to the Tivoli Storage Manager server.
If you do specify a password with this parameter when PASSWORDACCESS
GENERATE is in effect, the command-line value is ignored unless the
password for this node is not yet stored in the registry. In that case, the
specified password is stored in the registry and used when you run this
command.
If PASSWORDACCESS PROMPT is in effect, and you do not specify a password
value on the command line, then you are prompted for a password.
TDPEXCC command
tdpexc.log 60
/LOGFile= /LOGPrune= numdays
logfilename No
132 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
If the filename variable includes spaces, enclose the entire /CONFIGfile
parameter entry in double quotation marks. For example:
/CONFIGfile="c:\Program Files\file.cfg"
/LOGFile=logfilename
Use the /LOGFile parameter to specify the name of the activity log file that
is generated by Data Protection for Microsoft Exchange. The logfilename
variable identifies the name of the activity log file. If the specified log file
does not exist, a new log file is created. If the specified log file exists, new
log entries are appended to the file. The logfilename variable can include a
fully qualified path. However, if no path is specified, the log file is written
to the Data Protection for Microsoft Exchange installation directory. If the
logfilename variable includes spaces, enclose the entire /LOGFile parameter
entry in double quotation marks. For example:
/LOGFile="c:\Program Files\mytdpexchange.log"
If the /LOGFile parameter is not specified, log records are written to the
default log file, tdpexc.log. The /LOGFile parameter cannot be turned off,
logging always occurs.
Purpose
Parameters
/Detailed
Results in a detailed listing of snapped volumes. If this option is not specified,
then only the total capacity is displayed.
In this example, the tdpexcc query managedcapacity command displays the total
amount of managed capacity in use in the local inventory. The following output is
displayed:
Total Managed Capacity : 100.01 GB (107,381,026,816 bytes)
Volume : D:
Managed Capacity : 100.01 GB (107,381,026,816 bytes)
Completed
Volume : I:
Managed Capacity : 1,019.72 MB (1,069,253,632 bytes)
TDPEXCC command
When you specify *, all policies are queried. The results of the query are
displayed:
134 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Connecting to Exchange Server, please wait...
EXCPOL 3 60
STANDARD 2 30
tdpexc.log 60
/LOGFile= /LOGPrune= numdays
logfilename No
136 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
IBM Tivoli Storage Manager for Mail:
Data Protection for Microsoft Exchange Server
Version 7, Release 1, Level 0.0
(C) Copyright IBM Corporation 1998, 2013. All rights reserved.
BACKUPDESTination................... LOCAL
CLIENTAccessserver..................
DAGNODe............................. DAG1
DATEformat ......................... 1
LANGuage ........................... ENU
LOCALDSMAgentnode................... TIVVM400
LOGFile ............................ tdpexc.log
LOGPrune ........................... 60
MOUNTWait .......................... Yes
NUMberformat ....................... 1
REMOTEDSMAgentnode..................
TEMPDBRestorepath...................
TEMPLOGRestorepath..................
TIMEformat ......................... 1
IMPORTVSSSNAPSHOTSONLYWhenneeded.... No
Completed
TDPEXCC command
/DAGNODE= nodename /DEtail
local Exchange server
/FROMEXCSERVer=
server-name
tdpexc.log 60
/LOGFile= /LOGPrune= numdays
logfilename No
/REMOTECOMPUTER= computername /REMOTECOMPUTERUser= user
/REMOTECOMPUTERPassword= passwd /SHOWMAILBOXINFO
/TSMNODe= nodename dsm.opt
/TSMOPTFile=
filename
/TSMPassword= password
The following positional parameters specify the object to query. If none of these
positional parameters are specified, only the Tivoli Storage Manager API and Tivoli
Storage Manager server information is displayed:
* |dbname
* Query all backup objects for all databases.
dbname
Query all backup objects for the specified database. Multiple
entries are separated by commas.
The following positional parameters specify the type of backup to query. If this
parameter is not specified, all backup types are displayed:
FULL | COPY | INCRemental | DIFFerential
FULL Query only full backup types
COPY Query copy backup types only
INCRemental
Query only incremental backup types
DIFFerential
Query only differential backup types
138 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Query TSM optional parameters
Optional parameters follow the query TSM command and positional parameters.
/ACtive
Use the /ACtive parameter to display active backup objects only. This
setting is the default setting.
/ALl Use the /ALl parameter to display both active and inactive backup objects.
If the /ALl parameter is not specified, only active backup objects are
displayed.
/CONFIGfile=filename
Use the /CONFIGfile parameter to specify the name of the Data Protection
for Microsoft Exchange configuration file that contains the values for the
Data Protection for Microsoft Exchange configuration options.
The filename variable can include a fully qualified path. If the filename
variable does not include a path, the Data Protection for Microsoft
Exchange installation directory is used. If the /CONFIGfile parameter is not
specified, or if the filename variable is not specified, the default value is
tdpexc.cfg.
If the filename variable includes spaces, enclose the entire
/CONFIGfileparameter entry in double quotation marks. For example:
/CONFIGfile="c:\Program Files\file.cfg"
/DAGNODe=nodename
Specify the node name that you want to use to back up and restore the
databases in an Exchange Server Database Availability Group (DAG). With
this setting, backups from all DAG members that are configured to use the
DAG node are backed up to a common file space on the Tivoli Storage
Manager server. The database copies are managed as a single entity,
regardless of which DAG member they were backed up from. This setting
can prevent Data Protection for Microsoft Exchange from making too many
backups of the same database.
/DEtail
Use the /DEtail parameter to display comprehensive information about the
status of the Tivoli Storage Manager server, including the following details:
v Backup compressed
Table 7. Backup compressed values
Value Status
Yes One or more objects are compressed.
No No objects are compressed.
Unknown It is not known if the backup is compressed.
This applies to backups before Data
Protection for Microsoft Exchange version
6.3.
v Backup client-deduplicated
Table 9. Backup client-deduplicated values
Value Status
Yes One or more objects are client-side
deduplicated.
No No objects are client-side deduplicated.
Unknown It is not known if the backup is client-side
deduplicated. This applies to backups before
Data Protection for Microsoft Exchange
version 6.3.
/FROMEXCSERVer=servername
Use the /fromexcserver parameter to specify the name of the Exchange
Server where the original backup was performed.
The default is the local Exchange Server. However, you must specify the
name if the Exchange Server is not the default.
If a DAG node is specified by using the dagnode parameter, Data Protection
for Microsoft Exchange uses this node name instead of the Data Protection
for Microsoft Exchange node to back up databases in an Exchange Server
Database Availability Group. Therefore, the query tsm command
automatically displays the backups that were created by the other DAG
members, without having to specify the /fromexcserver parameter.
/LOGFile=logfilename
Use the /LOGFile parameter to specify the name of the activity log file that
is generated by Data Protection for Microsoft Exchange.
The logfilename variable identifies the name of the activity log file.
If the specified log file does not exist, a new log file is created. If the
specified log file exists, new log entries are appended to the file. The
140 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
logfilename variable can include a fully qualified path. However, if no path
is specified, the log file is written to the Data Protection for Microsoft
Exchange installation directory.
If the logfilename variable includes spaces, enclose the entire /LOGFile
parameter entry in double quotation marks For example:
/LOGFile="c:\Program Files\mytdpexchange.log"
If the /LOGFile parameter is not specified, log records are written to the
default log file, tdpexc.log.
The /LOGFile parameter cannot be turned off; logging always occurs.
When you use multiple simultaneous instances of Data Protection for
Microsoft Exchange to perform operations, use the /LOGFile parameter to
specify a different log file for each instance used. This function directs
logging for each instance to a different log file and prevents interspersed
log file records. Failure to specify a different log file for each instance can
result in unreadable log files.
/LOGPrune=numdays|No
Use the /LOGPrune parameter to disable log pruning or to explicitly request
that the log be pruned for one command run. By default, log pruning is
enabled and done once per day. The numdays variable represents the
number of days to save log entries. By default, 60 days of log entries are
saved in the pruning process. You can use the Data Protection for
Microsoft Exchange GUI or the set command to change the defaults so
that log pruning is disabled, or so that more or less days of log entries are
saved. If you use the command-line interface, you can use the /logprune
parameter to override these defaults. When the value of the /LOGPrune
variable numdays is a number in the range 0 to 9999, the log is pruned
even if log pruning is already done for the day.
Changes to the value of the timeformat or dateformat parameter can result
in prunning the log file unintentionally. If the value of the timeformat or
dateformat parameter is changed before issuing a Data Protection for
Microsoft Exchange command that might prune the log file, do one of the
following actions to prevent the log file from being pruned:
v Make a copy of the existing log file.
v Specify a new log file with the /LOGFile parameter or logfile setting.
/REMOTECOMPUTER=computername
Enter the IP address or host name for the remote system where you want
to mount the data.
/REMOTECOMPUTERUser=user
Enter the user name that is used to log on to the server specified with the
REMOTECOMPUTER parameter. If a domain is required to log on with the
domain account, enter Domain\User. To log on to the local account, the
domain is not required. There is no default value.
/REMOTECOMPUTERPassword=passwd
Enter the password for the user name that is specified with the
REMOTECOMPUTERUser parameter. There is no default value.
/SHOWMAILBOXINFO
The mailbox history processing task gathers information from the Active
Directory service for all mail users within a Microsoft Exchange Server
environment. The information that is gathered includes references for the
location of the mailbox for each user. This information can be used to
142 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Examples: query tsm command
The query tsm command displays information about the Tivoli Storage Manager
API and Tivoli Storage Manager server.
The following example includes output from the tdpexcc query tsm command:
IBM Tivoli Storage Manager for Mail:
Data Protection for Microsoft Exchange Server
Version 7, Release 1, Level 0.0
(C) Copyright IBM Corporation 1998, 2013. All rights reserved.
Completed
For backups that are made from an Exchange Server Database Availability Group
(DAG) member, both the DAG node name and the name of the server on which
that backup was run are displayed with the query tsm command. The following
example queries the Tivoli Storage Manager server for the backup objects that were
backed up under the DAG node name DAG2 from DAG member server TIVVM483:
Command:
tdpexcc query tsm *
Output:
IBM Tivoli Storage Manager for Mail:
Data Protection for Microsoft Exchange Server
Version 7, Release 1, Level 0.0
(C) Copyright IBM Corporation 1998, 2013. All rights reserved.
Querying Tivoli Storage Manager server for a list of database backups, please wa
it...
DAG : DAG2
Database : RATTEST_DAGDB
13.01MB Logs
136.06MB File
03/27/2013 18:02:01 14.00MB A VSS incr Srv 20120327180201
14.00MB Logs
Querying Tivoli Storage Manager server for a list of database backups, please wa
it...
Restore command
To restore a backup from Tivoli Storage Manager storage to an Exchange server,
use the restore command.
When you use the restore command, remember the following facts:
v When you restore inactive backups or active incremental backups, use the
/object parameter to specify the name of the backup object to restore. This
object name uniquely identifies the backup instance in Tivoli Storage Manager
storage. You can issue a tdpexcc query tsm * command to obtain a list of the
object names.
If the tdpexcc restore sgname incr command is entered (without the /object
parameter) to restore multiple active incremental backups, all multiple active
incremental backups are restored sequentially. The /object parameter is used to
restore only one incremental backup at a time.
144 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
v To initiate recovery, you must use the /recover parameter when you restore the
last backup object. In addition, the value of /templogrestorepath is not the same
value as the current location. If the value is the same, the database can become
corrupted.
Specify /recover=applyalllogs to replay the restored-transaction log entries
and the current active-transaction log entries.
Specify /recover=applyrestoredlogs to replay only the restored-transaction
log entries. The current active-transaction log entries are replayed.
When you choose this option for a restore, your next backup must be a full or
copy backup.
Failure to use the /recover parameter when you restore the last backup set
leaves the databases unmountable.
v Specify /mountdatabases=yes if you are restoring the last backup set and you
want the database mounted automatically after the recovery completes.
Microsoft Exchange Server considers the wildcard character (*) to be an invalid
character when used in database names. Databases that contain the wildcard
character (*) in their name are not backed up.
The GUI provides an easy-to-use, flexible interface to help you complete a restore
operation. The interface presents information in a way that allows multiple
selection and, in some cases, automatic operation.
Important:
If the Windows event log, Data Protection for Microsoft Exchange log file, or a
command error indicates that a restore operation failed, this failure might be
caused by the restore.env file that remains behind. This file is created by the
Microsoft restore interface and is used for debugging the restore failure. This file is
named Ennrestore.env where Enn is the base name of the restored transaction log
files. After the restore error is resolved, remove any remaining restore.env files
before you attempt the next restore operation. See the following Microsoft
Exchange documentation for further details: http://msdn.microsoft.com/en-us/
library/bb204044.aspx
Data Protection for Microsoft Exchange supports the following types of restore:
Full Restore a full backup.
Copy Restore a copy backup.
Incremental
Restore an incremental backup.
Differential
Restore a differential backup.
Unless otherwise specified, VSS restores refers to all restore types that use VSS (VSS
restore, VSS fast restore, VSS instant restore):
v A VSS restore ignores the recovery database and is placed directly into the
production database unless the /intodb parameter is specified.
v A VSS instant restore overwrites the entire contents of the source volumes.
However, you can avoid overwriting the source volumes by specifying
/INSTANTRESTORE=NO. This parameter bypasses volume-level copy and uses
file-level copy instead to restore the files from a VSS backup that are on local
shadow volumes.
v A VSS restore requires the restored database to be dismounted.
v If a VSS hardware provider is used, the disks that contain Exchange data are
configured as basic disks.
v When a VSS restore from local shadow volumes is complete, the bytes
transferred display 0. This display occurs because no data (0) is restored from
the Tivoli Storage Manager server.
v Do not set the ASNODENAME option in the dsm.opt file when you use Data
Protection for Microsoft Exchange Server. Setting ASNODENAME can cause VSS
backups and VSS restores to fail.
Restore syntax
Use the restore command syntax diagrams as a reference to view available
options and truncation requirements.
TDPEXCC command
backupdestination or tdpexc.cfg
/BACKUPDESTination=
TSM
LOCAL
tdpexc.cfg /DAGNODE= nodename
/CONFIGfile=
configfilename
Yes
/ERASEexistinglogs= No
local Exchange server
/FROMEXCSERVer=
server-name
146 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Yes /INTODB= into-db-name
/INSTANTRESTORE= No
tdpexc.log 60
/LOGFile= /LOGPrune= numdays
logfilename No
No Yes
/MOUNTDAtabases= Yes /MOUNTWait=
No
current active backup object /Quiet
/OBJect=
object-name
APPLYALLlogs /TEMPLOGRESTorepath= path-name
/RECOVer= APPLYRESToredlogs
/TSMNODe= tsmnodename dsm.opt
/TSMOPTFile=
tsmoptfilename
/TSMPassword= tsmpassword
148 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Exchange Server Database Availability Group. Therefore, the restore
command automatically restores the backups that were created by the
other DAG members, without having to specify the /fromexcserver
parameter.
/INSTANTREStore=YES|NO
Use the /INSTANTREStore parameter to specify whether to use volume level
snapshot or file level copy to restore a VSS backup on local shadow
volumes. A SAN Volume Controller, Storwize V7000, or DS8000 storage
subsystem is required to perform VSS Instant Restores.
You can specify:
YES Use volume level snapshot restore for a VSS backup on local
shadow volumes if the backup exists on volumes that support it.
YES is the default.
NO Use file level copy to restore the files from a VSS backup on local
shadow volumes. Bypassing volume-level copy means that
Exchange database files, log files, and the checkpoint file are the
only data overwritten on the source volumes.
When you run VSS Instant Restores, you must make sure that any
previous background copies (that involve the volumes that are being
restored) are completed before initiating the VSS Instant Restore. The
/INSTANTREStore parameter is ignored and VSS Instant Restore capabilities
are automatically disabled when doing any type of VSS restore into
operation.
When you run a VSS Instant Restore in a Database Availability Group
(DAG) environment, do not choose the option that automatically mounts
the databases after the recovery is completed. As described in the Database
Availability Group considerations section, to run the VSS Instant Restore
for databases in a DAG environment, you must stop the Microsoft
Exchange Replication service before doing the VSS Instant Restore or the
restore fails. In this case, after the VSS Instant Restore is completed, start
the Microsoft Exchange Replication service and then finally mount the
database.
/INTODB=into-db-name
Use the /INTODB parameter to specify the name of the Exchange Server
database into which the VSS backup is restored. The database name must
be specified with the into-db-name variable. For example, if RDB is the name
of the database into which the VSS backup is restored, the command-line
entry would be as follows:
TDPEXCC RESTore Maildb1 FULL /INTODB=RDB
However, when you restore a database that is relocated (system file path,
log file path, or database file path), you must specify the same database
name as the one you are restoring. For example, if Maildb1 is the name of
the relocated database that is being restored, the command-line entry
would be as follows:
TDPEXCC RESTore Maildb1 FULL /INTODB=Maildb1
Considerations:
v There is no default value.
v To restore into a Recovery Database (RDB) or alternate database, an RDB
or alternate database must exist before you attempt the restore
operation.
150 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Microsoft Exchange is to wait for removable media to mount (such as tapes
or CDs) or to stop the current operation. This situation occurs when the
Tivoli Storage Manager server is configured to store backup data on
removable media and waits for a required storage volume to be mounted.
You can specify:
Yes Wait for tape mounts. This option is the default.
No Do not wait for tape mounts.
/OBJect=object-name
Use the /OBJect parameter to specify the name of the backup object you
want to restore. The object name uniquely identifies each backup object
and is created by Data Protection for Microsoft Exchange.
Use the Data Protection for Microsoft Exchange query tsm command to
view the names of the backup objects.
If the tdpexcc restore sgname incr command is entered (without the
/OBJect parameter) to restore multiple active incremental backups, all
multiple active incremental backups are restored sequentially. The /OBJect
parameter is used to restore only one incremental backup at a time.
/Quiet This parameter prevents status information from being displayed. The level
of information that is written to the activity log is not affected.
/RECOVER=APPLYRESToredlogs|APPLYALLlogs
Use this parameter to specify whether or not you want to run recovery
after you restore an object. This parameter is specified on the last backup
object restored. To initiate recovery, use the /RECOVER parameter when you
restore the last backup object. In addition, the value of
/TEMPLOGRESTorepath is not to be the same value as the current location. If
the value is the same, the database can become corrupted. Failure to use
the /RECOVER parameter when you restore the last backup set leaves the
databases unmountable. If this situation occurs, you can either restore the
last backup again and specify the /RECOVER=value option or you can use the
Microsoft ESEUTIL /cc command to run recovery manually.
Specify one of the following values when you use this parameter:
APPLYALLlogs
Specify /recover=applyalllogs to replay the restored-transaction
log entries AND the current active-transaction log entries. Any
transaction logs entries that are displayed in the current
active-transaction log are replayed. This option is the default.
APPLYRESToredlogs
Specify /recover=applyrestoredlogs to replay only the
restored-transaction log entries. The current active-transaction log
entries are not replayed.
When you choose this option for a restore, your next backup must
be a full or copy backup.
Considerations:
v When you restore multiple backup objects, the /RECOVER option is to be
used on the restore of the last object.
If you specify /RECOVER=APPLYRESToredlogs when doing a restore, the
next backup must be a full backup.
152 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
password for this node is not yet stored in the registry. In that case, the
specified password is stored in the registry and used when you run this
command.
If PASSWORDACCESS PROMPT is in effect, and you do not specify a password
value on the command line, then you are prompted for a password.
The Tivoli Storage Manager password that Data Protection for Microsoft
Exchange uses to log on to the Tivoli Storage Manager server can be up to
63 characters in length.
Restorefiles command
To restore the flat files from a specified Data Protection for Microsoft Exchange
backup into a specified directory, use the restorefiles command.
TDPEXCC command
tdpexc.cfg /DAGNODE= nodename
/CONFIGfile=
configfilename
local machine name current path
/FROMEXCSERVer= /INTO=
server-name path
tdpexc.log 60
/LOGFile= /LOGPrune= numdays
logfilename No
Yes current active backup object
/MOUNTWait= /OBJect=
No object-name
/Quiet /TSMNODe= tsmnodename
dsm.opt /TSMPassword= tsmpassword
/TSMOPTFile=
tsmoptfilename
The following positional parameters specify the type of backup from which the
files are restored:
FULL |COPY |INCRemental | DIFFerential
FULL Restore the files from a Full type backup for VSS.
154 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
COPY Restore the files from a Copy type backup for VSS.
INCRemental
Restore the files from an Incremental type backup for VSS.
DIFFerential
Restore the files from a Differential type backup for VSS.
156 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
/OBJect=object name
Use the /object parameter to specify the name of the backup object files
that you want to restore. The object name uniquely identifies each backup
object and is created by Data Protection for Microsoft Exchange.
Use the Data Protection for Microsoft Exchange query tsm * command to
view the names of the backup objects.
/Quiet This parameter prevents status information from being displayed. The level
of information that is written to the activity log is not affected.
/TSMNODe=tsmnodename
Use the tsmnodename variable to refer to the Tivoli Storage Manager node
name that Data Protection for Microsoft Exchange uses to log on to the
Tivoli Storage Manager server. You can store the node name in the Tivoli
Storage Manager options file (dsm.opt). This parameter overrides the value
in the Tivoli Storage Manager options file if PASSWORDACCESS is set to
PROMPT. This parameter is not valid when PASSWORDACCESS is set to GENERATE
in the options file.
/TSMOPTFile=tsmoptfilename
Use the tsmoptfilename variable to identify the Data Protection for Microsoft
Exchange options file.
The file name can include a fully qualified path name. If no path is
specified, the directory where Data Protection for Microsoft Exchange is
installed is searched.
If the tsmoptfilename variable includes spaces, enclose the entire
/tsmoptfile parameter entry in double quotation marks. For example:
/TSMOPTFile="c:\Program Files\file.opt"
The default is dsm.opt.
/TSMPassword=tsmpassword
Use the tsmpassword variable to refer to the Tivoli Storage Manager
password that Data Protection for Microsoft Exchange uses to log on to the
Tivoli Storage Manager server. If you specified PASSWORDACCESS GENERATE in
the Data Protection for Microsoft Exchange options file (dsm.opt),
supplying the password here is not necessary because the one that is
stored in the registry is used. However, to store the password in the
registry, you must specify the Tivoli Storage Manager password the first
time Data Protection for Microsoft Exchange connects to the Tivoli Storage
Manager server.
If you do specify a password with this parameter when PASSWORDACCESS
GENERATE is in effect, the command-line value is ignored unless the
password for this node is not yet stored in the registry. In that case, the
specified password is stored in the registry and used when you run this
command.
If PASSWORDACCESS PROMPT is in effect, and you do not specify a password
value on the command line, then you are prompted for a password.
The Tivoli Storage Manager password that Data Protection for Microsoft
Exchange uses to log on to the Tivoli Storage Manager server can be up to
63 characters in length.
158 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
When restoring to a Unicode .pst file, except for the Folder Name and All
Content filters, the filters are ignored.
The amount of time that is needed to complete the restore process depends on the
size of the mailbox databases, the network speed, and the number of mailboxes to
process.
Review these prerequisites before you run mailbox restore tasks on Exchange
Server 2010 and later:
v See Security requirements for Data Protection for Microsoft Exchange mailbox tasks in
Security requirements on page 17
v See Perform these tasks to configure your system for mailbox-level and
item-level restore operations on page 65
v Temporary space is needed to accommodate the mailbox database during
mailbox restore operations. Specify the location of this temporary space by
setting these two optional parameters in the Data Protection for Exchange
configuration file with the tdpexcc set command:
TEMPDBRESTorepath
If you choose to not enter a path, the default value of TEMPDBRESTorepath is
the value of the TEMP environment variable.
TEMPLOGRESTorepath
If you choose to not enter a path, the default value of TEMPLOGRESTorepath is
the value of the TEMP environment variable.
The temporary restore locations must have enough space to restore the entire
restored databases and log files.
v Ensure that correct version of Microsoft Exchange Server MAPI Client and
Collaboration Data Objects is installed on the Exchange server that you use to
run the mailbox restore operations. The correct version is identified in the
Hardware and Software Requirements technote that is associated with the level
of your Data Protection for Exchange program. This technote is available in the
TSM for Mail - All Requirement Documents website at http://www.ibm.com/
support/docview.wss?uid=swg21219345. When you are at the website, follow
the link to the requirements technote for your specific release or update level.
The amount of time that is needed to complete the restore process depends on the
size of the mailbox databases, the network speed, and the number of mailboxes to
process.
Restoremailbox syntax
Use the restoremailbox command syntax diagrams as a reference to view available
options and truncation requirements.
TDPEXCC command
60
/LOGPrune= numdays
tdpexc.log No
/LOGFile=
logfilename
(1)
/MAILBOXFILTER= ATTACHMENTNAME ,attachmentname-search-text
ENDDATETIME ,end-date
,end-time
FOLDER ,original-folder-name
MESSAGEBODY ,messagebody-search-text
SENDER ,sender-name
STARTDATETIME ,start-date
,start-time
SUBJECT ,subject-search-text
ALLCONTENT ,allcontent-search-text
(2)
/MAILBOXORIGLOCATION=
/MAILBOXRESTOREDESTination= /MAILBOXRESTOREDESTination options
Yes /TEMPDBRESTorepath= path-name
/MOUNTWait=
No
/TEMPLOGRESTorepath= path-name /TEMPMAILBOXAlias=
tempmailbox-alias
/TSMNODe= tsmnodename dsm.opt
/TSMOPTFile=
tsmoptfilename
/TSMPassword= tsmpassword
160 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
/MAILBOXRESTOREDESTination options:
EXCHANGE
,target-mailboxname
,target-foldername
PST ,non-Unicode-pst-filename-path
(3)
UNICODEPST ,Unicode-pst-filename-path
Notes:
1 You can specify the /MAILBOXFILTER parameter multiple times however, you
must specify each /MAILBOXFILTER subparameter only once.
2 server-name,db-name
3 If you restore personal storage folders (.pst files), there are two options:
Restore Mail to Unicode PST file and Restore Mail to non-Unicode PST
file. Unicode .pst files can store messages in multiple languages, and are not
limited to 2 GB of data. For non-Unicode .pst files, the file size must be less
than 2 GB.
Attention: Failure to specify a different log file for each instance can
result in unreadable log files.
/LOGPrune=numdays | No | 60
Use the /logprune parameter to disable log pruning or to explicitly request
that the log is pruned for one command run. By default, log pruning is
enabled and done once per day. The numdays variable represents the
number of days to save log entries. By default, 60 days of log entries are
saved in the pruning process. You can use the Data Protection for
Microsoft Exchange GUI or the set command to change the defaults so
that log pruning is disabled, or so that more or less days of log entries are
saved. If you use the command line, you can use the /logprune parameter
to override these defaults. When the value of the /logprune variable
numdays is a number in the range 0 - 9999, the log is pruned even if log
pruning is already done for the day.
Changes to the value of the timeformat or dateformat parameter can result
in pruning the log file unintentionally. If the value of the timeformat or
dateformat parameter changes before you issue a Data Protection for
Microsoft Exchange command that might prune the log file, select one of
the following actions to prevent the log file from being pruned:
v Make a copy of the existing log file.
v Specify a new log file with the /logfile parameter and logfilename
setting.
162 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
/MAILBOXFILTER=ATTACHMENTNAME|ENDDATETIME|FOLDER|
MESSAGEBODY| SENDER|STARTDATETIME|SUBJECT|ALLCONTENT
Use the /MAILBOXFILTER parameter to specify filters to restrict what
mailbox data is restored. When restoring to a Unicode .pst file, except for
the FOLDER and ALLCONTENT filters, the filters are ignored.
You can specify multiple filters; however, you must specify each filter one
time. For each filter that you specify, a separate /MAILBOXFILTER parameter
must be used. For example:
tdpexcc.exe restoremailbox dchang /MAILBOXFILTER=STARTDATETIME,07/01/2013
/MAILBOXFILTER=ENDDATETIME,07/31/2013
Mailbox data that matches a combination of all filters that are specified is
restored. If no filters are specified, by default, all data in the mailbox is
restored.
Specify one of the following filters when you use this parameter:
ATTACHMENTNAME,attachmentname-search-text
Use /MAILBOXFILTER=attachmentname attachmentname-search-text
to restore only the mailbox messages that contain a match of the
specified text within a message attachment name. The match is not
case-sensitive. For example, an attachmentname-search-text of Rob
matches the attachment name: Rob, robert.txt, PROBE, and
prObe.pdf.
Enclose the attachmentname-search-text variable in double quotation
marks.
164 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Attention: The ALLCONTENT filter does not match the message
body of encrypted mailbox messages. If a mailbox message is
encrypted, the ALLCONTENT filter matches only text that is contained
within the message sender or the subject line.
/MAILBOXORIGLOCATION=server-name,db-name
Use the /mailboxoriglocation parameter to specify the Exchange Server
and the database where the mailbox was at the time of backup.
If you do not specify the /mailboxoriglocation parameter, the default
value is the location (found in the mailbox location history) of the mailbox
to restore from, for the backup time specified. If no mailbox location
history is available, the default value is the current active location of the
mailbox.
server-name
The name of the Exchange Server where the mailbox was at the
time of backup.
db-name
The name of the database where the mailbox was at the time of
backup.
The /mailboxoriglocation parameter is only necessary if the mailbox to be
restored from is moved or deleted since the time of the backup, and no
mailbox location history is available. This parameter is case-sensitive. Data
Protection for Microsoft Exchange 6.1 (and later) maintains mailbox
location history.
A restoremailbox operation from a backup that is processed by Data
Protection for Microsoft Exchange before version 6.1 fails if the
/mailboxoriglocation parameter is not specified for mailboxes that meet
one or both of the following the conditions:
v The mailbox to be restored is moved. The mailbox is not in the same
server and the same database where the mailbox was at the time of the
backup.
v The mailbox to be restored was deleted and the restore destination is to
an alternate mailbox or to a .pst file.
For example:
TDPEXCC RESTOREMAILBOX annjones /MAILBOXORIGLOCATION=serv1,sg1,mbdb1
/MAILBOXRESTOREDAte=02/21/2013
/MAILBOXRESTOREDESTination=PST,c:\team99\rcvr.pst
TDPEXCC RESTOREMAILBOX johngrimshawe /MAILBOXORIGLOCATION=serv1,mbdb1
/MAILBOXRESTOREDAte=03/06/2013
/MAILBOXRESTOREDESTination=PST,c:\team54\rcvr.pst
166 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
v If you specify restore-time without restore-date, then restore-date defaults to
the current date. This selection establishes the restoration date and time
as the current date at the specified restore-time.
/MAILBOXRESTOREDESTination=EXCHANGE|PST|UNICODEPST
Use the /mailboxrestoredestination parameter to specify the destination
to restore the mailbox data to.
If you do not specify the /mailboxrestoredestination parameter, the
default is to restore mailbox data to the original location in the original
active mailbox. When you restore multiple mailboxes with the same
restoremailbox command, the default is to restore mailbox data into each
original active mailbox.
Mailbox items are merged into the mailbox destination. If a mailbox item
exists in the mailbox destination, that item is not restored.
You must specify one of the following values when you use this parameter:
EXCHANGE,[target-mailboxname,target-foldername]
Use the /mailboxrestoredestination EXCHANGE option to restore
mailbox messages into a live Exchange Server.
If you specify the /mailboxrestoredestination EXCHANGEoption
without specifying any variables,
/mailboxrestoredestination=EXCHANGE, the result is the same as
not specifying the /mailboxrestoredestination parameter. The
mailbox data is restored to the original location in the original
active mailbox.
Use /mailboxrestoredestination=EXCHANGE,target-
mailboxname,target-foldername to restore mailbox messages into a
destination other than the original location in the original active
mailbox. The mailbox messages are restored into a subfolder of the
specified folder within the target mailbox. The target mailbox can
be the original mailbox or an alternate mailbox. When you restore
multiple mailboxes with the same restoremailbox command, this
choice of options restores mailbox data into a subfolder (designated
by each original mailbox-alias) of the specified target folder in an
active mailbox. In each subfolder are the folders (from the
corresponding original mailbox) that contain the restored mailbox
messages.
Use /mailboxrestoredestination=EXCHANGE,target-
mailboxname,target-foldername to restore mailbox messages into a
destination other than the original location in the original active
mailbox. The target mailbox can be the original mailbox or an
alternate mailbox.
In the target mailbox, the specified folder (in the target mailbox)
contains a subfolder (designated by the original-mailbox alias
name). In the subfolder are sub-subfolders that contain the restored
mailbox messages. These sub-subfolders have the folder structure
of the original mailbox.
target-mailboxname
Specify the target mailbox-alias or the target
mailbox-display name. The target mailbox must be an
active mailbox.
168 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
mary brown (target mailbox)
>-previous_acctmngr (specified folder)
| >-abaker (original-mailbox1 alias)
| | >-Inbox (restored folder from mailbox1)
| | >-Outbox (restored folder from mailbox1)
| | >-My Accts (restored folder from mailbox1)
| >-swood (original-mailbox2 alias)
| | >-Inbox (restored folder from mailbox2)
| | >-Outbox (restored folder from mailbox2)
| | >-New Accnts (restored folder from mailbox2)
PST,non-Unicode-pst-filename-path
Use /mailboxrestoredestination=PST,non-Unicode-pst-filename-
path to restore mailbox data to an Exchange Server personal
folders (.pst) file. The mailbox data that is restored is in
non-Unicode format.
You can include the non-Unicode-pst-filename-path variable to specify
the destination where the restoremailbox operation writes the .pst
file. The non-Unicode-pst-filename-path can be either a fully qualified
path to a .pst file or a directory path. If you do not specify a path,
the .pst file is written to the current directory.
v You can specify non-Unicode-pst-filename-path as a fully qualified
path to a .pst file to restore all mail to that .pst file.
TDPEXCC RESTOREMAILBOX gclark
/mailboxrestoredestination=PST,c:\mb\dept54\vpo.pst
Important: The .pst directory must exist before you use the
restoremailbox command. The .pst file is created if it does not
exist.
If you are restoring more than one mailbox and you specify a
fully qualified path to a .pst file, all the mailbox data is restored
to the one .pst file specified. Inside the .pst file, the top-level
folder name is the mailbox-alias-name, with the rest of the
mailbox folders below it.
v You can specify non-Unicode-pst-filename-path as a directory path
to have Tivoli Storage FlashCopy Manager for Exchange create a
.pst file by using the mailbox-alias-name of the mailbox that is
being restored, and store the .pst file in the specified directory.
For example, the .pst file name of the restored mailbox "George
Clark"(gclark) is gclark.pst.
TDPEXCC RESTOREMAILBOX "george clark"
/mailboxrestoredestination=PST,c:\mb\dept54\
The .pst directory must exist before you use the restoremailbox
command. If the .pst file does not exist, the file is created.
If you restore multiple mailboxes with the same restoremailbox
command, and you specify a directory path, each mailbox is
restored into a separate .pst file. For example, if mailboxes John
(john1), John Oblong (oblong), and Barney Olef (barneyo)
are restored and the specified directory path is c:\finance, all
mailboxes are restored into the c:\finance directory as shown:
c:\finance\john1.pst
c:\finance\oblong.pst
c:\finance\barneyo.pst
Important: The .pst directory must exist before you use the
restoremailbox command. The .pst file is created if it does not
exist.
If you are restoring more than one mailbox and you specify a
fully qualified path to a .pst file, all the mailbox data is restored
to the one .pst file specified. Inside the .pst file, the top-level
folder name is the mailbox-alias-name, with the rest of the
mailbox folders below it.
v You can specify Unicode-pst-filename-path as a directory path to
have Tivoli Storage FlashCopy Manager for Exchange create a
.pst file by using the mailbox-alias-name of the mailbox that is
being restored, and store the .pst file in the specified directory.
For example, the .pst file name of the restored mailbox "George
Clark"(gclark) is gclark.pst.
TDPEXCC RESTOREMAILBOX "george clark"
/mailboxrestoredestination=PST,c:\mb\dept54\
The .pst directory must exist before you use the restoremailbox
command. If the .pst file does not exist, the file is created.
If you restore multiple mailboxes with the same restoremailbox
command, and you specify a directory path, each mailbox is
restored into a separate .pst file. For example, if mailboxes John
(john1), John Oblong (oblong), and Barney Olef (barneyo)
are restored and the specified directory path is c:\finance, all
mailboxes are restored into the c:\finance directory as shown:
170 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
c:\finance\john1.pst
c:\finance\oblong.pst
c:\finance\barneyo.pst
If the Unicode-pst-filename-path variable includes spaces, enclose the
entire Unicode-pst-filename-path variable entry in double quotation
marks. For example:
TDPEXCC RESTOREMAILBOX "george clark"
/mailboxrestoredestination=UNICODEPST,"c:\mb\dept54\access group\"
/MOUNTWait=Yes|No
Use the /mountwait parameter to specify whether Data Protection for
Microsoft Exchange waits for removable media to mount (such as tapes or
CDs) or to stop the current operation. This situation occurs when the Tivoli
Storage Manager server is configured to store backup data on removable
media and waits for a required storage volume to be mounted.
You can specify:
Yes Wait for tape mounts. This option is the default.
No Do not wait for tape mounts.
/TEMPDBRESTorepath=path-name
Use the /tempdbrestorepath parameter to specify the default temporary
path to use when you restore mailbox database files.
If you do not specify the /tempdbrestorepath parameter, the default value
is the value that is specified by the TEMPDBRESTOREPATH option in the Data
Protection for Exchange configuration file. The default Data Protection for
Microsoft Exchange configuration file is tdpexc.cfg. If the
TEMPDBRESTOREPATH value does not exist in the Data Protection for
Microsoft Exchange configuration file, the TEMP environment variable value
is used.
If the path-name variable includes spaces, enclose the entire
/tempdbrestorepath parameter entry in double quotation marks. For
example:
TDPEXCC RESTOREMAILBOX richgreene
/tempdbrestorepath="h:\Exchange Restore Directory"
Attention:
v Do not specify a value of /tempdbrestorepath that is the same value as
the location of the active database. If the value is the same, the database
might become corrupted.
v Choose a temporary database-restore location that has enough space to
hold the entire restore for the database.
Attention:
v Do not specify a value of /templogrestorepath that is the same value as
the current location for the database that is used for recovery. If the
value is the same, the database might become corrupted.
v Choose a temporary log-restore location that has enough space to hold
all the log and patch files.
172 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
registry, you must specify the Tivoli Storage Manager password the first
time Data Protection for Microsoft Exchange connects to the Tivoli Storage
Manager server.
If you do specify a password with this parameter when PASSWORDACCESS
GENERATE is in effect, the command-line value is ignored unless the
password for this node is not yet stored in the registry. In that case, the
specified password is stored in the registry and used when you run this
command.
If PASSWORDACCESS PROMPT is in effect, and you do not specify a password
value on the command line, then you are prompted for a password.
The Tivoli Storage Manager password that Data Protection for Microsoft
Exchange uses to log on to the Tivoli Storage Manager server can be up to
63 characters in length.
Set command
To set the Data Protection for Microsoft Exchange configuration parameters in a
configuration file, use the set command.
The values that you set are saved in a Data Protection for Microsoft Exchange
configuration file. The default file is tdpexc.cfg. Configuration values can also be
set in the Data Protection Properties window in the Management Console.
For command invocations other than this command, the value of a configuration
parameter that is specified in a command overrides the value of the configuration
parameter that is specified in the Data Protection for Microsoft Exchange
configuration file. When you use this command, if you do not override a value for
the configuration file parameter, the values in the default configuration file are
used.
Set syntax
Use the set command syntax diagrams as a reference to view available options
and truncation requirements.
LOCAL
TDPEXCC SET BACKUPDESTINATION= TSM
BOTH
No
DATEformat= MM/DD/YYYY IMPORTVSSSNAPSHOTSONLYWhenneeded= Yes
DD-MM-YYYY
YYYY-MM-DD
DD.MM.YYYY
YYYY.MM.DD
YYYY/MM/DD
DD/MM/YYYY
tdpexc.log 60 Yes
LOGFile= LOGPrune= 0..9999 MOUNTWait= No
logfilename No
Yes
STOREMAILBOXInfo= No TEMPDBRestorepath= pathname
tdpexc.cfg
/CONFIGfile=
configfilename
The following positional parameters specify the values in the Data Protection for
Microsoft Exchange configuration file. You can set one value for each tdpexcc set
command that you run:
BACKUPDESTination=TSM|LOCAL|BOTH
Use the BACKUPDESTINATION positional parameter to specify the storage
location for your backup. You can specify these options:
TSM The backup is stored on Tivoli Storage Manager server storage
only. This option is the default.
LOCAL
The backup is stored only on local shadow volumes.
BOTH The backup is stored on both Tivoli Storage Manager server
storage and local shadow volumes.
CLIENTACcessserver=servername
The servername variable refers to the name of the server you use to access
the client.
/DAGNODe=nodename
Specify the node name that you want to use to back up the databases in an
Exchange Server Database Availability Group. With this setting, backups
from all Database Availability Group members that are configured to use
the DAG node are backed up to a common file space on the Tivoli Storage
174 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Manager server. The database copies are managed as a single entity,
regardless of which Database Availability Group member they were backed
up from. This setting can prevent Data Protection for Exchange from
making too many backups of the same database.
DATEformat=dateformatnum
Use the DATEformat positional parameter to select the format that you want
to use to display dates.
The dateformatnum variable displays the date in one of the following
formats. Select the format number that corresponds to the format that you
want to use.
1 (Default) MM/DD/YYYY
2 DD-MM-YYYY
3 YYYY-MM-DD
4 DD.MM.YYYY
5 YYYY.MM.DD
6 YYYY/MM/DD
7 DD/MM/YYYY
Changes to the value of the dateformat parameter can result in an
undesired pruning of the Data Protection for Microsoft Exchange log file
(tdpexc.log by default). You can avoid losing existing log file data by
doing one of the following actions:
v After you change the value of the dateformat parameter, make a copy of
the existing log file before you run Data Protection for Microsoft
Exchange.
v Specify a new log file with the /logfile parameter.
IMPORTVSSSNAPSHOTSONLYWhenneeded=Yes|No
By default, the parameter is set to No. This default setting means that local
persistent VSS snapshots are automatically imported to the Windows
system where the snapshots are created. By importing the VSS snapshots
only when needed, the snapshots are imported to a host for FlashCopy
Manager operations. To automatically import local persistent snapshots to
the Windows system where the snapshots are created, set the parameter to
Yes.
LANGuage=language
Specify the three-character code of the language that you want to use to
display messages:
CHS Simplified Chinese
CHT Traditional Chinese
DEU Standard German
ENU (Default) American English
ESP Standard Spanish
FRA Standard French
ITA Standard Italian
JPN Japanese
KOR Korean
176 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
STOREMAILBOXInfo=Yes|No
The STOREMAILBOXInfo parameter is used to track mailbox history for
moved and deleted mailboxes. By default, this parameter is set to Yes. If
you do not plan to use mailbox restore, you can set this option to No.
When the option is set to No, Data Protection for Microsoft Exchange does
not back up the mailbox history.
In large or geographically dispersed domains, more time is required to
complete the backup mailbox history task. In this scenario, you can reduce
the amount of time that is required to complete the backup mailbox history
task by setting the option for STOREMAILBOXInfo to No. When you set the
option for STOREMAILBOXInfo to No, mailboxes that are not moved or are not
deleted can be restored normally. Moved and deleted mailbox restores can
use the /MAILBOXORIGLOCATION parameter (of the Restoremailbox command)
to specify the mailbox location at the time of the backup.
TEMPDBRESTorepath=pathname
To specify the default temporary path to use with mailbox database files,
use the TEMPDBRESTorepath positional parameter.
If you do not enter a path, the default value is the value of the TEMP
environment variable.
If the path name includes spaces, you must enclose the entire
TEMPDBRESTorepath positional parameter entry in double quotation marks.
For example:
TDPEXCC SET TEMPDBRESTorepath="h:\Exchange Restore Directory"
Choose a temporary log-restore location that has enough space to hold all
the log and patch files.
178 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Examples: set command
The following examples provide a sample of the text, messages, and process status
that displays when you use the set command.
The following example sets FCMDAG2 as the DAG node name in the configuration
file.
Command
tdpexcc set dagnode=FCMDAG2
Output
IBM Tivoli Storage Manager for Mail:
Data Protection for Microsoft Exchange Server
Version 7, Release 1, Level 0.0
(C) Copyright IBM Corporation 1998, 2013. All rights reserved.
TDPEXCC command
60
/LOGPrune= numdays
No /REMOTECOMPUTER= computername
/REMOTECOMPUTERUser= user /REMOTECOMPUTERPassword= passwd
/TSMNODe= tsmnodename dsm.opt
/TSMOPTFile=
tsmoptfilename
/TSMPassword= tsmpassword
180 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
logfilename variable can include a fully qualified path. However, if no path
is specified, the log file is written to the Tivoli Storage FlashCopy Manager
for Exchange installation directory.
If the logfilename variable includes spaces, enclose the entire /logfile
parameter entry in double quotation marks. For example:
/LOGFile="c:\Program Files\tdpexc.log"
If the /logfile parameter is not specified, log records are written to the
default log file, tdpexc.log.
The /logfile parameter cannot be turned off, logging always occurs.
/LOGPrune=numdays|No
Use the /logprune parameter to disable log pruning or to explicitly request
that the log is to be pruned for one command run. By default, log pruning
is enabled and done once per day. The numdays variable represents the
number of days to save log entries. By default, 60 days of log entries are
saved in the pruning process. You can use the GUI or the update config
command to change the defaults so that log pruning is disabled, or so that
more or less days of log entries are saved. If you use the command line,
you can use the /logprune parameter to override these defaults. When the
value of the /logprune variable numdays is a number in the range 0 - 9999,
the log is pruned even if log pruning is done for the day.
Changes to the value of the timeformat or dateformat parameter can result
in pruning the log file unintentionally. If the value of the timeformat or
dateformat parameter is changed, before you issue a Tivoli Storage
FlashCopy Manager for Exchange command that might prune the log file,
do one of the following actions to prevent the log file from being pruned:
v Make a copy of the existing log file.
v Specify a new log file with the /logfile parameter or logfile setting.
/REMOTECOMPUTER=computername
Enter the computer name or IP address of the remote system where the
backup was created.
/REMOTECOMPUTERUser=user
Enter the user name that is used to log on to the server specified with the
REMOTECOMPUTER parameter. If a domain is required to log on with the
domain account, enter Domain\User. To log on to the local account, the
domain is not required. There is no default value.
/REMOTECOMPUTERPassword=passwd
Enter the password for the user name that is specified with the
REMOTECOMPUTERUser parameter. There is no default value.
/TSMNODe=tsmnodename
Use the tsmnodename variable to refer to the Tivoli Storage Manager node
name that Tivoli Storage FlashCopy Manager uses to log on to the Tivoli
Storage Manager server. You can store the node name in the Tivoli Storage
Manager options file (dsm.opt). This parameter overrides the value in the
Tivoli Storage Manager options file if PASSWORDACCESS is set to PROMPT. This
parameter is not valid when PASSWORDACCESS is set to GENERATE in the
options file.
/TSMOPTFile=tsmoptfilename
Use the tsmoptfilename variable to identify the Tivoli Storage Manager
options file.
To configure the Tivoli Storage FlashCopy Manager, use the Standalone and Tivoli
Storage Manager server configuration wizards from the Tivoli Storage FlashCopy
Manager. To interact with a Tivoli Storage Manager server, run the TSM
configuration wizard. To interact with a Tivoli Storage FlashCopy Manager server,
run the Standalone configuration wizard. You can move from one type of server to
another by running the corresponding configuration wizard at any time.
Some command examples that are provided here are formatted on multiple lines.
Issue each command on a single line.
182 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Completing these tasks on the Tivoli Storage Manager server
About this task
Coordinate efforts with your Tivoli Storage Manager server administrator to get
these tasks completed:
Procedure
1. Select or create the policy definitions that are used for each type of backup you
plan to use. You can provide the administrator with the existing local-defined
policy settings in your Tivoli Storage FlashCopy Manager stand-alone
environment. Use the GUI or the command-line interface of Data Protection for
Microsoft Exchange to retrieve this information.
2. Register your Data Protection for Microsoft Exchange node name and password
with the Tivoli Storage Manager register node command. For example:
register node DPnodename DPpassword
3. If not already defined in the Tivoli Storage Manager server, register the Tivoli
Storage Manager backup-archive client node name and password for the
workstation where the Exchange server is installed. For example:
register node BAnodename BApassword
4. Define the proxy node relationship for the Target Node and agent nodes with
the Tivoli Storage Manager grant proxynode command. For example:
grant proxynode target=DP agent=BAnodename
Preserve the contents of the local configuration file under these conditions:
v You specified policy bindings during the use of Tivoli Storage FlashCopy
Manager.
v You are updating the policy bindings to reflect changes in your policy
specifications for your Tivoli Storage Manager server usage.
Create an alternative Windows service for the Tivoli Storage Manager Client
Acceptor service by using the dsmcutil command. For example:
dsmcutil install cad /name:tsmcad4local
/node:my_backup-archive_client_node
/password:my_TSM_server_password
/optfile:C:\Program Files\Tivoli\TSM\baclient\dsm_local.opt
/httpport:1583
For more information about using the dsmcutil command, refer to the
information about the client service configuration utility in the Tivoli Storage
Manager Windows Backup-Archive Clients Installation and User's Guide.
6. Create an alternate Windows service for the Tivoli Storage Manager remote
agent service. For example:
dsmcutil install cad /name:tsmcad4remote
/node:my_backup-archive_client_node
/password:my_TSM_server_password
/optfile:C:\Program Files\Tivoli\TSM\baclient\dsm_remote.opt
/httpport:1583
7. Edit the dsm_local.opt file in the Data Protection for Microsoft Exchange
installation directory. Add this line:
HTTPPORT 1583
8. Start the alternate Tivoli Storage Manager Client Acceptor service:
dsmcutil start /name:tsmcad4local
9. Stop and restart the original Tivoli Storage Manager Client Acceptor service so
that the new values in the dsm.opt file are activated. You can do this action
through the Windows Services GUI or by using the dsmcutil command:
dsmcutil stop /name:TSM Remote Client Agent
dsmcutil stop /name:TSM Client Acceptor
dsmcutil start /name:TSM Client Acceptor
10. As backups start occurring and are managed in the Tivoli Storage Manager
server environment, phase out the remaining backups that are created in the
Tivoli Storage FlashCopy Manager stand-alone environment. You can choose
between two ways of achieving the phase-out:
a. In the Tivoli Storage FlashCopy Manager stand-alone environment, define
a time-based policy that automatically causes the old backups to expire
and delete. For example, if you want to expire each backup after it is 30
days old, update the time-based policy by using the command:
184 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
tdpexcc update policy mypolicy /daysretain=30
/tsmoptfile=dsm_local.opt
/configfile=tdpexc_local.cfg
You can also change these parameters by using the Local Policy
Management dialog that is accessed from the Utilities menu of the Data
Protection for Microsoft Exchange Backup/Restore GUI. Information about
how to start the GUI is in the section that describes how to access the
Tivoli Storage FlashCopy Manager stand-alone environment.
The process of expiring backups when their age exceeds the daysretain
limit depends upon a basic function that is run in the stand-alone
environment. The function must include an operation that queries the
backups.If you do not regularly use the stand-alone environment client,
you can use a scheduler to periodically start a command such as:
tdpexcc query tsm * /all
/tsmoptfile=dsm_local.opt
/configfile=tdpexc_local.cfg
For example, if your backups are created each week, then you can
schedule the query command to run weekly to cause the expiration of
out-of-date backups.
The last backup that is created while you run the stand-alone environment,
is not automatically deleted by the process of expiring the backups. For
that result, use the explicit delete operation, as described next.
b. Alternatively, you can explicitly delete each backup when you determine
that it is no longer needed. Use the Data Protection for Microsoft Exchange
delete backup command, or the Delete Backup (right mouse-click menu
option) in the GUI Restore tab.
11. To access the Tivoli Storage FlashCopy Manager stand-alone environment:
a. Open the Automate tab to access the integrated command-line prompt.
b. Start Tivoli Storage FlashCopy Manager stand-alone commands by
appending the /tsmoptfile option, for example:
tdpexcc query tsm * /all
/tsmoptfile=dsm_local.opt
/configfile=tdpexc_local.cfg
c. Start the GUI (from the Command Line prompt) by issuing the GUI
invocation command, for example:
tdpexc /tsmoptfile=dsm_local.opt
/configfile=tdpexc_local.cfg
12. If necessary, start the Tivoli Storage FlashCopy Manager stand-alone
environment to restore from a backup that was created in that environment.
13. When the transition is complete and you no longer need access to the Tivoli
Storage FlashCopy Manager stand-alone environment, you can remove the
alternate services. To remove the services, use the Windows Services GUI or
the dsmcutil command:
dsmcutil remove /name:tsmagent4local
dsmcutil remove /name:tsmcad4local
188 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
How does VSS instant restore work?
VSS instant restore is a volume-level hardware-assisted copy where target
volumes (that contain the snapshot) are copied back to the original source
volumes. A SAN Volume Controller, Storwize V7000, XIV, or DS8000
storage subsystem is required to complete VSS instant restores. For more
information, see VSS instant restore on page 12.
Now that I am completing VSS operations, why are there so many active
backups?
Tivoli Storage Manager policy manages VSS backups on local shadow
volumes and on Tivoli Storage Manager server storage. This management
allows for different policies, which can lead to an increase in the number of
active backups. For more information, see How Tivoli Storage Manager
server policy affects Data Protection for Exchange on page 28 and Back
up to Tivoli Storage Manager storage versus back up to local shadow
volumes on page 20.
Can I use UNC drive letters with VSS offloaded backups?
No, Data Protection for Microsoft Exchange VSS offloaded backups do not
process correctly if the Exchange database or log location are specified with
UNC-based drive letters. For example, the following path uses UNC drive
letters and is not supported in a VSS offloaded backup:
\\host_srv1\c$\Program Files\Exchsrvr\First Database
Drive-based names are supported when you use a volume mount point.
For example:
X:\Exch_Mount_Point\Program Files\Exchsrvr\First Database
190 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
before it truncates the logs. A backup product, for example, Tivoli Storage
Manager, completes a full backup and reports the backup is successful to
Exchange. The Exchange server processes the actual log file truncation. You
see evidence of this notification to truncate logs in the Windows Event log.
What do I do when the following Tivoli Storage Manager server error message
is displayed: ANR9999D snmode.c(xxxx): Error validating inserts, and so on
You do not have to do anything as this message can be ignored. Installing
a later version of Tivoli Storage Manager server prevents this message
from being displayed.
What authority is needed to complete a Data Protection for Microsoft Exchange
backup and restore?
For more information about the required authority to complete Data
Protection for Microsoft Exchange backup and restore tasks, see Security
requirements on page 17.
Do I use the same nodename as used by my backup-archive client?
No, you must use different node names. For more information, see
Specifying Data Protection for Exchange options on page 35.
How do I set up LAN-free to back up Data Protection for Microsoft Exchange
over my SAN?
See LAN-free data movement on page 112.
Can I run Data Protection for Microsoft Exchange with multiple backup
sessions?
For more information, see Backup strategies on page 18.
You can use forums, wikis, and other social media tools to ask questions, talk to
experts, and learn from others.
User groups
Tivoli Global Storage Virtual User Group
Access this user group at http://www.tivoli-ug.org/storage.
This group makes it possible for individuals from many different industries
and types of organizations to share information and work directly with the
IBM product experts. Local chapters also exist where members meet in
person to share experiences and hear from guest speakers.
ADSM.ORG
Access this mailing list at http://adsm.org.
This independently managed Storage Management discussion forum
started when Tivoli Storage Manager was known as ADSTAR Distributed
Storage Manager (ADSM). The members of this forum have many years of
experience with Tivoli Storage Manager in almost every type of IT
environment.
To subscribe to the forum, send an email to [email protected]. The
body of the message must contain the following text: SUBSCRIBE ADSM-L
your_first_name your_family_name.
Find the latest best practices, white papers, and links to videos and other
resources. When you log on, you can comment on content, or contribute your own
content.
Learn from technical experts who share their knowledge and then answer your
questions. The sessions are designed to address specific technical issues and
provide in-depth but narrowly focused training.
Use these education resources to help you increase your Tivoli Storage Manager
skills:
Tivoli Education and Certification website
View available education at http://www.ibm.com/software/tivoli/
education.
Use the Search for Training link to find local and online offerings of
instructor-led courses for Tivoli Storage Manager.
Education Assistant
Access resources at http://publib.boulder.ibm.com/infocenter/ieduasst/
tivv1r0/index.jsp.
Scroll to view the list of available training videos. Recorded product
demonstrations are also available on a YouTube channel.
194 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Searching knowledge bases
If a problem occurs while you are using one of the Tivoli Storage Manager family
of products, you can search several knowledge bases.
Sign in using your IBM ID and password if you want to customize the site based
on your product usage and information needs. If you do not already have an IBM
ID and password, click Sign in at the top of the page and follow the instructions
to register.
IBM Support Assistant helps you gather support information when you must open
a problem management record (PMR), which you can then use to track the
problem. The product-specific plug-in modules provide you with the following
resources:
v Support links
v Education links
v Ability to submit problem management reports
You can find more information and download the IBM Support Assistant web page
at http://www.ibm.com/software/support/isa.
You can also install the stand-alone IBM Support Assistant application on any
workstation. You can then enhance the application by installing product-specific
plug-in modules for the IBM products that you use. Find add-ons for specific
products at http://www.ibm.com/support/docview.wss?uid=swg27012689.
Procedure
Determine what fixes are available by checking the IBM software support website
at http://www.ibm.com/support/entry/portal/.
If you previously customized the site based on your product usage:
1. Click the link for the product, or a component for which you want to
find a fix.
2. Click Downloads, and then click Search for recommended fixes.
If you have not previously customized the site:
Click Downloads and search for the product.
Procedure
1. From the support page at http://www.ibm.com/support/entry/portal/, click
Sign in and sign in using your IBM ID and password. If you do not have an
ID and password, click register now and complete the registration process.
2. Click Manage all my subscriptions in the Notifications pane.
3. Click the Subscribe tab, and then click Tivoli.
4. Select the products for which you want to receive notifications and click
Continue.
5. Specify your notification preferences and click Submit.
Procedure
1. Ensure that you have completed the following prerequisites:
a. Set up a subscription and support contract.
b. Determine the business impact of the problem.
c. Describe the problem and gather background information.
2. Follow the instructions in Submitting the problem to IBM Software Support
on page 198.
196 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Setting up and managing support contracts
You can set up and manage your Tivoli support contracts by enrolling in IBM
Passport Advantage. The type of support contract that you need depends on the
type of product you have.
Procedure
198 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Appendix C. Accessibility features for the Tivoli Storage
Manager product family
Accessibility features help users who have a disability, such as restricted mobility
or limited vision to use information technology products successfully.
Accessibility features
The IBM Tivoli Storage Manager family of products includes the following
accessibility features:
v Keyboard-only operation using standard operating-system conventions
v Interfaces that support assistive technology such as screen readers
The command-line interfaces of all products in the product family are accessible.
The Operations Center and the Tivoli Storage Manager Server can be installed in
console mode, which is accessible.
The Tivoli Storage Manager Information Center is enabled for accessibility. For
information center accessibility information, see Accessibility features in the
information center ( http://pic.dhe.ibm.com/infocenter/tsminfo/v7r1/topic/
com.ibm.help.ic.doc/iehs36_accessibility.html).
Vendor software
The Tivoli Storage Manager product family includes certain vendor software that is
not covered under the IBM license agreement. IBM makes no representation about
the accessibility features of these products. Contact the vendor for the accessibility
information about its products.
IBM may not offer the products, services, or features discussed in this document in
other countries. Consult your local IBM representative for information on the
products and services currently available in your area. Any reference to an IBM
product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product,
program, or service that does not infringe any IBM intellectual property right may
be used instead. However, it is the user's responsibility to evaluate and verify the
operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not grant you
any license to these patents. You can send license inquiries, in writing, to:
The following paragraph does not apply to the United Kingdom or any other
country where such provisions are inconsistent with local law:
INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS
PUBLICATION AS IS WITHOUT WARRANTY OF ANY KIND, EITHER
EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or
implied warranties in certain transactions, therefore, this statement may not apply
to you.
Licensees of this program who want to have information about it for the purpose
of enabling: (i) the exchange of information between independently created
programs and other programs (including this one) and (ii) the mutual use of the
information which has been exchanged, should contact:
IBM Corporation
2Z4A/101
11400 Burnet Road
Austin, TX 78758
U.S.A.
The licensed program described in this information and all licensed material
available for it are provided by IBM under terms of the IBM Customer Agreement,
IBM International Program License Agreement, or any equivalent agreement
between us.
This information is for planning purposes only. The information herein is subject to
change before the products described become available.
This information contains examples of data and reports used in daily business
operations. To illustrate them as completely as possible, the examples include the
names of individuals, companies, brands, and products. All of these names are
fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
COPYRIGHT LICENSE:
202 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
programs are provided "AS IS", without warranty of any kind. IBM shall not be
liable for any damages arising out of your use of the sample programs.
Each copy or any portion of these sample programs or any derivative work, must
include a copyright notice as follows: (your company name) (year). Portions of
this code are derived from IBM Corp. Sample Programs. Copyright IBM Corp.
_enter the year or years_.
If you are viewing this information in softcopy, the photographs and color
illustrations may not appear.
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of
International Business Machines Corp., registered in many jurisdictions worldwide.
Other product and service names might be trademarks of IBM or other companies.
A current list of IBM trademarks is available on the Web at Copyright and
trademark information at http://www.ibm.com/legal/copytrade.shtml.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of
Microsoft Corporation in the United States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
Java and all Java-based trademarks and logos are trademarks or registered
trademarks of Oracle and/or its affiliates.
This Software Offering does not use cookies or other technologies to collect
personally identifiable information.
If the configurations deployed for this Software Offering provide you as customer
the ability to collect personally identifiable information from end users via cookies
and other technologies, you should seek your own legal advice about any laws
applicable to such data collection, including any requirements for notice and
consent.
For more information about the use of various technologies, including cookies, for
these purposes, see IBMs Privacy Policy at http://www.ibm.com/privacy and
IBMs Online Privacy Statement at http://www.ibm.com/privacy/details the
section entitled Cookies, Web Beacons and Other Technologies and the IBM
Software Products and Software-as-a-Service Privacy Statement at
Notices 203
http://www.ibm.com/software/info/product-privacy.
204 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Glossary
This glossary provides terms and definitions for backup data. See also server storage,
Tivoli Storage Manager, Tivoli Storage FlashCopy storage pool, storage pool volume.
Manager, and associated products.
active file system
A file system to which space management
The following cross-references are used in this
has been added. With space management,
glossary:
tasks for an active file system include
v See refers you from a nonpreferred term to the automatic migration, reconciliation,
preferred term or from an abbreviation to the selective migration, and recall. See also
spelled-out form. inactive file system.
v See also refers you to a related or contrasting
active policy set
term.
The activated policy set that contains the
policy rules currently in use by all client
For other terms and definitions, see the IBM
nodes assigned to the policy domain. See
Terminology website at www.ibm.com/software/
also policy domain, policy set.
globalization/terminology.
active version
The most recent backup copy of a file
A stored. The active version of a file cannot
absolute mode be deleted until a backup process detects
In storage management, a backup that the user has either replaced the file
copy-group mode that specifies that a file with a newer version or has deleted the
is considered for incremental backup even file from the file server or workstation.
if the file has not changed since the last See also backup version, inactive version.
backup. See also mode, modified mode. activity log
access control list (ACL) A log that records normal activity
In computer security, a list associated messages that are generated by the server.
with an object that identifies all the These messages include information about
subjects that can access the object and server and client operations, such as the
their access rights. start time of sessions or device I/O errors.
206 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
automounter daemon. The automounter
daemon monitors a specified directory
path, and automatically mounts the file
system to access data.
B
backup-archive client
A program that runs on a workstation or
file server and provides a means for users
to back up, archive, restore, and retrieve
files. See also administrative client.
backup copy group
A policy object containing attributes that
control the generation, destination, and
expiration of backup versions of files. A
backup copy group belongs to a
management class. See also copy group.
backup retention grace period
The number of days the storage manager
retains a backup version after the server
is unable to rebind the file to an
appropriate management class.
backup set
A portable, consolidated group of active
versions of backup files that are generated
for a backup-archive client.
backup set collection
A group of backup sets that are created at
the same time and which have the same
backup set name, volume names,
description, and device classes. The server
identifies each backup set in the collection
by its node name, backup set name, and
file type.
backup version
A file or directory that a client node
backed up to storage. More than one
backup version can exist in storage, but
only one backup version is the active
version. See also active version, copy
group, inactive version.
bind To associate a file with a management
class name. See also archive-retention
grace period, management class, rebind.
Glossary 207
the server and used on client nodes in
C conjunction with client options files.
cache To place a duplicate copy of a file on client options file
random access media when the server An editable file that identifies the server
migrates a file to another storage pool in and communication method, and
the hierarchy. provides the configuration for backup,
cache file archive, hierarchical storage management,
A snapshot of a logical volume created by and scheduling.
Logical Volume Snapshot Agent. Blocks client-polling scheduling mode
are saved immediately before they are A method of operation in which the client
modified during the image backup and queries the server for work. See also
their logical extents are saved in the cache server-prompted scheduling mode.
files.
client schedule
CAD See client acceptor daemon. A database record that describes the
central scheduler planned processing of a client operation
A function that permits an administrator during a specific time period. The client
to schedule client operations and operation can be a backup, archive,
administrative commands. The operations restore, or retrieve operation, a client
can be scheduled to occur periodically or operating system command, or a macro.
on a specific date. See also administrative See also administrative command
command schedule, client schedule. schedule, central scheduler, schedule.
208 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
closed registration copy backup
A registration process in which only an A full backup in which the transaction log
administrator can register workstations as files are not deleted so that backup
client nodes with the server. See also open procedures that use incremental or
registration. differential backups are not disrupted.
collocation copy group
The process of keeping all data belonging A policy object containing attributes that
to a single-client file space, a single client control how backup versions or archive
node, or a group of client nodes on a copies are generated, where backup
minimal number of sequential-access versions or archive copies are initially
volumes within a storage pool. located, and when backup versions or
Collocation can reduce the number of archive copies expire. A copy group
volumes that must be accessed when a belongs to a management class. See also
large amount of data must be restored. archive copy group, backup copy group,
backup version,management class.
collocation group
A user-defined group of client nodes copy storage pool
whose data is stored on a minimal A named set of volumes that contain
number of volumes through the process copies of files that reside in primary
of collocation. storage pools. Copy storage pools are
used only to back up the data that is
commit point
stored in primary storage pools. A copy
A point in time when data is considered
storage pool cannot be a destination for a
to be consistent.
backup copy group, an archive copy
communication method group, or a management class (for
The method by which a client and server space-managed files). See also destination,
exchange information. See also primary storage pool, server storage,
Transmission Control Protocol/Internet storage pool, storage pool volume.
Protocol.
communication protocol D
A set of defined interfaces that permit
computers to communicate with each daemon
other. A program that runs unattended to
perform continuous or periodic functions,
compression such as network control.
A function that removes repetitive
characters, spaces, strings of characters, or damaged file
binary data from the data being processed A physical file in which read errors have
and replaces characters with control been detected.
characters. Compression reduces the database backup series
amount of storage space that is required One full backup of the database, plus up
for data. to 32 incremental backups made since
configuration manager that full backup. Each full backup that is
A server that distributes configuration run starts a new database backup series.
information, such as policies and A number identifies each backup series.
schedules, to managed servers according See also database snapshot, full backup.
to their profiles. Configuration database snapshot
information can include policy and A complete backup of the entire database
schedules. See also enterprise to media that can be taken off-site. When
configuration, managed server, profile. a database snapshot is created, the current
conversation database backup series is not interrupted.
A connection between two programs over A database snapshot cannot have
a session that allows them to incremental database backups associated
communicate with each other while with it. See also database backup series,
processing a transaction. See also session. full backup.
Glossary 209
data center out-of-space condition on a file system for
In a virtualized environment, a container which hierarchical storage management
that holds hosts, clusters, networks, and (HSM) is active. Files are migrated to
data stores. server storage until space usage drops to
the low threshold that was set for the file
data deduplication
system. If the high threshold and low
A method of reducing storage needs by
threshold are the same, one file is
eliminating redundant data. Only one
migrated. See also automatic migration,
instance of the data is retained on storage
selective migration, threshold migration.
media. Other instances of the same data
are replaced with a pointer to the retained desktop client
instance. The group of backup-archive clients that
includes clients on Microsoft Windows,
data manager server
Apple, and Novell NetWare operating
A server that collects metadata
systems.
information for client inventory and
manages transactions for the storage destination
agent over the local area network. The A copy group or management class
data manager server informs the storage attribute that specifies the primary storage
agent with applicable library attributes pool to which a client file will be backed
and the target volume identifier. up, archived, or migrated. See also copy
storage pool.
data mover
A device that moves data on behalf of the device class
server. A network-attached storage (NAS) A named set of characteristics that are
file server is a data mover. applied to a group of storage devices.
Each device class has a unique name and
data storage-management application-
represents a device type of disk, file,
programming interface (DSMAPI)
optical disk, or tape.
A set of functions and semantics that can
monitor events on files, and manage and device configuration file
maintain the data in a file. In an HSM 1. For a storage agent, a file that contains
environment, a DSMAPI uses events to the name and password of the storage
notify data management applications agent, and information about the
about operations on files, stores arbitrary server that is managing the
attribute information with a file, supports SAN-attached libraries and drives that
managed regions in a file, and uses the storage agent uses.
DSMAPI access rights to control access to
2. For a server, a file that contains
a file object.
information about defined device
data store classes, and, on some servers, defined
In a virtualized environment, the location libraries and drives. The information
where virtual machine data is stored. is a copy of the device configuration
information in the database.
deduplication
The process of creating representative disaster recovery manager (DRM)
records from a set of records that have A function that assists in preparing and
been identified as representing the same using a disaster recovery plan file for the
entities. server.
default management class disaster recovery plan
A management class that is assigned to a A file that is created by the disaster
policy set. This class is used to govern recover manager (DRM) that contains
backed up or archived files when a file is information about how to recover
not explicitly associated with a specific computer systems if a disaster occurs and
management class through the scripts that can be run to perform some
include-exclude list. recovery tasks. The file includes
information about the software and
demand migration
The process that is used to respond to an
210 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
hardware that is used by the server, and failure of an operation, a user action, or
the location of recovery media. the change in state of a process. See also
enterprise logging, receiver.
domain
A grouping of client nodes with one or event record
more policy sets, which manage data or A database record that describes actual
storage resources for the client nodes. See status and results for events.
also policy domain.
event server
DRM See disaster recovery manager. A server to which other servers can send
events for logging. The event server
DSMAPI
routes the events to any receivers that are
See data storage-management
enabled for the sending server's events.
application-programming interface.
exabyte (EB)
dynamic serialization
For processor, real and virtual storage
Copy serialization in which a file or
capacities and channel volume, 2 to the
folder is backed up or archived on the
power of 60 or 1 152 921 504 606 846 976
first attempt regardless of whether it
bytes. For disk storage capacity and
changes during a backup or archive. See
communications volume, 1 000 000 000
also shared dynamic serialization, shared
000 000 000 bytes.
static serialization, static serialization.
exclude
The process of identifying files in an
E include-exclude list. This process prevents
EA See extended attribute. the files from being backed up or
migrated whenever a user or schedule
EB See exabyte. enters an incremental or selective backup
EFS See Encrypted File System. operation. A file can be excluded from
backup, from space management, or from
Encrypted File System (EFS) both backup and space management.
A file system that uses file system-level
encryption. exclude-include list
See include-exclude list.
enterprise configuration
A method of setting up servers so that the expiration
administrator can distribute the The process by which files, data sets, or
configuration of one of the servers to the objects are identified for deletion because
other servers, using server-to-server their expiration date or retention period
communication. See also configuration has passed.
manager, managed server, profile, expiring file
subscription. A migrated or premigrated file that has
enterprise logging been marked for expiration and removal
The process of sending events from a from storage. If a stub file or an original
server to a designated event server. The copy of a premigrated file is deleted from
event server routes the events to a local file system, or if the original copy
designated receivers, such as to a user of a premigrated file is updated, the
exit. See also event. corresponding migrated or premigrated
file is marked for expiration the next time
error log reconciliation is run.
A data set or file that is used to record
error information about a product or extend
system. To increase the portion of available space
that can be used to store database or
estimated capacity recovery log information.
The available space, in megabytes, of a
storage pool. extended attribute (EA)
Names or value pairs that are associated
event An occurrence of significance to a task or with files or directories. There are three
system. Events can include completion or
Glossary 211
classes of extended attributes: user management support that is required. If
attributes, system attributes, and trusted no space management support is
attributes. required, the operation is passed to the
operating system, which performs its
external library
normal functions. The file system
A collection of drives that is managed by
migrator is mounted over a file system
the media-management system other than
when space management is added to the
the storage management server.
file system.
file system state
F The storage management mode of a file
file access time system that resides on a workstation on
On AIX, UNIX, or Linux systems, the which the hierarchical storage
time when the file was last accessed. management (HSM) client is installed. A
file system can be in one of these states:
file age native, active, inactive, or global inactive.
For migration prioritization purposes, the
number of days since a file was last frequency
accessed. A copy group attribute that specifies the
minimum interval, in days, between
file device type incremental backups.
A device type that specifies the use of
sequential access files on disk storage as FSID See file space ID.
volumes. FSM See file system migrator.
file server full backup
A dedicated computer and its peripheral The process of backing up the entire
storage devices that are connected to a server database. A full backup begins a
local area network that stores programs new database backup series. See also
and files that are shared by users on the database backup series, database
network. snapshot, incremental backup.
file space fuzzy backup
A logical space in server storage that A backup version of a file that might not
contains a group of files that have been accurately reflect what is currently in the
backed up or archived by a client node, file because the file was backed up at the
from a single logical partition, file system, same time as it was being modified.
or virtual mount point. Client nodes can
restore, retrieve, or delete their file spaces fuzzy copy
from server storage. In server storage, A backup version or archive copy of a file
files belonging to a single file space are that might not accurately reflect the
not necessarily stored together. original contents of the file because it was
backed up or archived the file while the
file space ID (FSID) file was being modified.
A unique numeric identifier that the
server assigns to a file space when it is
stored in server storage. G
file state GB See gigabyte.
The space management mode of a file
General Parallel File System (GPFS)
that resides in a file system to which
A high-performance shared-disk file
space management has been added. A file
system that can provide data access from
can be in one of three states: resident,
nodes in a clustered system environment.
premigrated, or migrated. See also
See also information lifecycle
migrated file, premigrated file, resident
management.
file.
gigabyte (GB)
file system migrator (FSM)
For processor storage, real and virtual
A kernel extension that intercepts all file
storage, and channel volume, 10 to the
system operations and provides any space
212 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
power of nine or 1,073,741,824 bytes. For
disk storage capacity and communications
volume, 1,000,000,000 bytes.
global inactive state
The state of all file systems to which
space management has been added when
space management is globally deactivated
for a client node.
Globally Unique Identifier (GUID)
An algorithmically determined number
that uniquely identifies an entity within a
system. See also Universally Unique
Identifier.
GPFS See General Parallel File System.
GPFS node set
A mounted, defined group of GPFS file
systems.
group backup
The backup of a group containing a list of
files from one or more file space origins.
GUID See Globally Unique Identifier.
H
hierarchical storage management (HSM)
A function that automatically distributes
and manages data on disk, tape, or both
by regarding devices of these types and
potentially others as levels in a storage
hierarchy that range from fast, expensive
devices to slower, cheaper, and possibly
removable devices. The objectives are to
minimize access time to data and
maximize available media capacity. See
also hierarchical storage management
client, recall, storage hierarchy.
hierarchical storage management client (HSM
client) A client program that works with the
server to provide hierarchical storage
management (HSM) for a system. See also
hierarchical storage management,
management class.
HSM See hierarchical storage management.
HSM client
See hierarchical storage management
client.
Glossary 213
systems. An inode contains the node,
I type, owner, and location of a file.
ILM See information lifecycle management. inode number
image A file system or raw logical volume that A number specifying a particular inode
is backed up as a single object. file in the file system.
image backup IP address
A backup of a full file system or raw A unique address for a device or logical
logical volume as a single object. unit on a network that uses the Internet
Protocol standard.
inactive file system
A file system for which space
management has been deactivated. See J
also active file system.
job file
inactive version A generated file that contains
A backup version of a file that is either configuration information for a migration
not the most recent backup version, or job. The file is XML format and can be
that is a backup version of a file that no created and edited in the hierarchical
longer exists on the client system. Inactive storage management (HSM) client for
backup versions are eligible for expiration Windows client graphical user interface.
processing according to the management See also migration job.
class assigned to the file. See also active
journal-based backup
version, backup version.
A method for backing up Windows clients
include-exclude file and AIX clients that exploits the change
A file containing statements to determine notification mechanism in a file to
the files to back up and the associated improve incremental backup performance
management classes to use for backup or by reducing the need to fully scan the file
archive. See also include-exclude list. system.
include-exclude list journal daemon
A list of options that include or exclude On AIX, UNIX, or Linux systems, a
selected files for backup. An exclude program that tracks change activity for
option identifies files that should not be files residing in file systems.
backed up. An include option identifies
journal service
files that are exempt from the exclusion
In Microsoft Windows, a program that
rules or assigns a management class to a
tracks change activity for files residing in
file or a group of files for backup or
file systems.
archive services. See also include-exclude
file.
incremental backup
K
The process of backing up files or KB See kilobyte.
directories, or copying pages in the
database, that are new or changed since kilobyte (KB)
the last full or incremental backup. See For processor storage, real and virtual
also selective backup. storage, and channel volume, 2 to the
power of 10 or 1,024 bytes. For disk
individual mailbox restore storage capacity and communications
See mailbox restore. volume, 1,000 bytes.
information lifecycle management (ILM)
A policy-based file-management system
for storage pools and file sets. See also
General Parallel File System.
inode The internal structure that describes the
individual files on AIX, UNIX, or Linux
214 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
local shadow volume
L Data that is stored on shadow volumes
LAN See local area network. localized to a disk storage subsystem.
LAN-free data movement LOFS See loopback virtual file system.
The movement of client data between a logical file
client system and a storage device on a A file that is stored in one or more server
storage area network (SAN), bypassing storage pools, either by itself or as part of
the local area network. an aggregate. See also aggregate, physical
LAN-free data transfer file, physical occupancy.
See LAN-free data movement. logical occupancy
leader data The space that is used by logical files in a
Bytes of data, from the beginning of a storage pool. This space does not include
migrated file, that are stored in the file's the unused space created when logical
corresponding stub file on the local file files are deleted from aggregate files, so it
system. The amount of leader data that is might be less than the physical
stored in a stub file depends on the stub occupancy. See also physical occupancy.
size that is specified. logical unit number (LUN)
library In the Small Computer System Interface
1. A repository for demountable (SCSI) standard, a unique identifier used
recorded media, such as magnetic to differentiate devices, each of which is a
disks and magnetic tapes. logical unit (LU).
2. A collection of one or more drives, logical volume
and possibly robotic devices A portion of a physical volume that
(depending on the library type), which contains a file system.
can be used to access storage volumes. logical volume backup
library client A back up of a file system or logical
A server that uses server-to-server volume as a single object.
communication to access a library that is Logical Volume Snapshot Agent (LVSA)
managed by another storage management Software that can act as the snapshot
server. See also library manager. provider for creating a snapshot of a
library manager logical volume during an online image
A server that controls device operations backup.
when multiple storage management loopback virtual file system (LOFS)
servers share a storage device. See also A file system that is created by mounting
library client. a directory over another local directory,
local also known as mount-over-mount. A
1. Pertaining to a device, file, or system LOFS can also be generated using an
that is accessed directly from a user automounter.
system, without the use of a LUN See logical unit number.
communication line. See also remote.
LVSA See Logical Volume Snapshot Agent.
2. For hierarchical storage management
products, pertaining to the destination
of migrated files that are being
moved. See also remote.
local area network (LAN)
A network that connects several devices
in a limited area (such as a single
building or campus) and that can be
connected to a larger network.
Glossary 215
storage for Tivoli Storage Manager servers
M that run on operating systems other than
macro file z/OS.
A file that contains one or more storage megabyte (MB)
manager administrative commands, For processor storage, real and virtual
which can be run only from an storage, and channel volume, 2 to the
administrative client using the MACRO 20th power or 1,048,576 bytes. For disk
command. See also Tivoli Storage storage capacity and communications
Manager command script. volume, 1,000,000 bytes.
mailbox restore metadata
A function that restores Microsoft Data that describes the characteristics of
Exchange Server data (from IBM Data data; descriptive data.
Protection for Microsoft Exchange
backups) at the mailbox level or migrate
mailbox-item level. To move data to another location, or an
application to another computer system.
managed object
A definition in the database of a managed migrated file
server that was distributed to the A file that has been copied from a local
managed server by a configuration file system to storage. For HSM clients on
manager. When a managed server UNIX or Linux systems, the file is
subscribes to a profile, all objects that are replaced with a stub file on the local file
associated with that profile become system. On Windows systems, creation of
managed objects in the database of the the stub file is optional. See also file state,
managed server. premigrated file, resident file, stub file.
216 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
is considered for incremental backup only storage (NAS) file server. Data for the
if it has changed since the last backup. A NAS node is transferred by a NAS file
file is considered a changed file if the server that is controlled by the network
date, size, owner, or permissions of the data management protocol (NDMP). A
file have changed. See also absolute NAS node is also called a NAS file server
mode, mode. node.
mount limit native file system
The maximum number of volumes that A file system that is locally added to the
can be simultaneously accessed from the file server and is not added for space
same device class. The mount limit management. The hierarchical storage
determines the maximum number of manager (HSM) client does not provide
mount points. See also mount point. space management services to the file
system.
mount point
A logical drive through which volumes native format
are accessed in a sequential access device A format of data that is written to a
class. For removable media device types, storage pool directly by the server. See
such as tape, a mount point is a logical also non-native data format.
drive associated with a physical drive. For
NDMP
the file device type, a mount point is a
See Network Data Management Protocol.
logical drive associated with an I/O
stream. See also mount limit. NetBIOS (Network Basic Input/Output System)
A standard interface to networks and
mount retention period
personal computers that is used on local
The maximum number of minutes that
area networks to provide message,
the server retains a mounted
print-server, and file-server functions.
sequential-access media volume that is
Application programs that use NetBIOS
not being used before it dismounts the
do not have to handle the details of LAN
sequential-access media volume.
data link control (DLC) protocols.
mount wait period
network-attached storage file server (NAS file
The maximum number of minutes that
server)
the server waits for a sequential-access
A dedicated storage device with an
volume mount request to be satisfied
operating system that is optimized for
before canceling the request.
file-serving functions. A NAS file server
MTU See maximum transmission unit. can have the characteristics of both a
node and a data mover.
N Network Basic Input/Output System
See NetBIOS.
Nagle algorithm
An algorithm that reduces congestion of Network Data Management Protocol (NDMP)
TCP/IP networks by combining smaller A protocol that allows a network
packets and sending them together. storage-management application to
control the backup and recovery of an
named pipe NDMP-compliant file server, without
A type of interprocess communication installing vendor-acquired software on
that permits message data streams to pass that file server.
between peer processes, such as between
a client and a server. network data-transfer rate
A rate that is calculated by dividing the
NAS file server total number of bytes that are transferred
See network-attached storage file server. by the data transfer time. For example,
NAS file server node this rate can be the time that is spent
See NAS node. transferring data over a network.
NAS node node A file server or workstation on which the
A client node that is a network-attached
Glossary 217
backup-archive client program has been contacting for space management services.
installed, and which has been registered For example, a stub file can be orphaned
to the server. when the client system-options file is
modified to contact a server that is
node name
different than the one to which the file
A unique name that is used to identify a
was migrated.
workstation, file server, or PC to the
server.
node privilege class
P
A privilege class that gives an packet In data communication, a sequence of
administrator the authority to remotely binary digits, including data and control
access backup-archive clients for a specific signals, that are transmitted and switched
client node or for all clients in a policy as a composite whole.
domain. See also privilege class.
page A defined unit of space on a storage
non-native data format medium or within a database volume.
A format of data that is written to a
storage pool that differs from the format partial-file recall mode
that the server uses for operations. See A recall mode that causes the hierarchical
also native format. storage management (HSM) function to
read just a portion of a migrated file from
storage, as requested by the application
O accessing the file.
offline volume backup password generation
A backup in which the volume is locked A process that creates and stores a new
so that no other system applications can password in an encrypted password file
access it during the backup operation. when the old password expires.
Automatic generation of a password
online volume backup
prevents password prompting.
A backup in which the volume is
available to other system applications path An object that defines a one-to-one
during the backup operation. relationship between a source and a
destination. Using the path, the source
open registration
accesses the destination. Data can flow
A registration process in which users can
from the source to the destination, and
register their workstations as client nodes
back. An example of a source is a data
with the server. See also closed
mover (such as a network-attached
registration.
storage [NAS] file server), and an
operator privilege class example of a destination is a tape drive.
A privilege class that gives an
pattern-matching character
administrator the authority to disable or
See wildcard character.
halt the server, enable the server, cancel
server processes, and manage removable physical file
media. See also privilege class. A file that is stored in one or more
storage pools, consisting of either a single
options file
logical file, or a group of logical files that
A file that contains processing options.
are packaged together as an aggregate.
See also client system-options file, client
See also aggregate, logical file, physical
user-options file.
occupancy.
originating file system
physical occupancy
The file system from which a file was
The amount of space that is used by
migrated. When a file is recalled, it is
physical files in a storage pool. This space
returned to its originating file system.
includes the unused space that is created
orphaned stub file when logical files are deleted from
A file for which no migrated file can be aggregates. See also logical file, logical
found on the server that the client node is occupancy, physical file.
218 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
plug-in primary storage pool
A separately installable software module A named set of volumes that the server
that adds function to an existing program, uses to store backup versions of files,
application, or interface. archive copies of files, and files migrated
from client nodes. See also copy storage
policy domain
pool, server storage, storage pool, storage
A grouping of policy users with one or
pool volume.
more policy sets, which manage data or
storage resources for the users. The users privilege class
are client nodes that are associated with A level of authority that is granted to an
the policy domain. See also active policy administrator. The privilege class
set, domain. determines which administrative tasks the
administrator can perform. See also
policy privilege class
authority, node privilege class, operator
A privilege class that gives an
privilege class, policy privilege class,
administrator the authority to manage
storage privilege class, system privilege
policy objects, register client nodes, and
class.
schedule client operations for client
nodes. Authority can be restricted to profile
certain policy domains. See also privilege A named group of configuration
class. information that can be distributed from a
configuration manager when a managed
policy set
server subscribes. Configuration
A group of rules in a policy domain. The
information can include registered
rules specify how data or storage
administrator IDs, policies, client
resources are automatically managed for
schedules, client option sets,
client nodes in the policy domain. Rules
administrative schedules, storage manager
can be contained in management classes.
command scripts, server definitions, and
See also active policy set, management
server group definitions. See also
class.
configuration manager, enterprise
premigrated file configuration, managed server.
A file that has been copied to server
profile association
storage, but has not been replaced with a
On a configuration manager, the defined
stub file on the local file system. An
relationship between a profile and an
identical copy of the file resides both on
object such as a policy domain. Profile
the local file system and in server storage.
associations define the configuration
Premigrated files occur on UNIX and
information that is distributed to a
Linux file systems to which space
managed server when it subscribes to the
management has been added. See also file
profile.
state, migrated file, resident file.
premigrated files database
A database that contains information
Q
about each file that has been premigrated quota
to server storage. 1. For HSM on AIX, UNIX, or Linux
premigration systems, the limit (in megabytes) on
The process of copying files that are the amount of data that can be
eligible for migration to server storage, migrated and premigrated from a file
but leaving the original file intact on the system to server storage.
local file system. 2. For HSM on Windows systems, a
premigration percentage user-defined limit to the space that is
A space management setting that controls occupied by recalled files.
whether the next eligible candidates in a
file system are premigrated following
threshold or demand migration.
Glossary 219
During the reconciliation process, data
R that is identified as no longer needed is
randomization removed.
The process of distributing schedule start recovery log
times for different clients within a A log of updates that are about to be
specified percentage of the schedule's written to the database. The log can be
startup window. used to recover from system and media
raw logical volume failures. The recovery log consists of the
A portion of a physical volume that is active log (including the log mirror) and
comprised of unallocated blocks and has archive logs.
no journaled file system (JFS) definition. register
A logical volume is read/write accessible To define a client node or administrator
only through low-level I/O functions. ID that can access the server.
rebind registry
To associate all backed-up versions of a A repository that contains access and
file with a new management class name. configuration information for users,
For example, a file that has an active systems, and software.
backup version is rebound when a later
version of the file is backed up with a remote
different management class association. For hierarchical storage management
See also bind, management class. products, pertaining to the origin of
migrated files that are being moved. See
recall To copy a migrated file from server also local.
storage back to its originating file system
using the hierarchical storage resident file
management client. See also selective On a Windows system, a complete file on
recall. a local file system that might also be a
migrated file because a migrated copy can
receiver exist in server storage. On a UNIX or
A server repository that contains a log of Linux system, a complete file on a local
server and client messages as events. For file system that has not been migrated or
example, a receiver can be a file exit, a premigrated, or that has been recalled
user exit, or the server console and from server storage and modified. See
activity log. See also event. also file state.
reclamation restore
The process of consolidating the To copy information from its backup
remaining data from many location to the active storage location for
sequential-access volumes onto fewer, use. For example, to copy information
new sequential-access volumes. from server storage to a client
reclamation threshold workstation.
The percentage of space that a retention
sequential-access media volume must The amount of time, in days, that inactive
have before the server can reclaim the backed-up or archived files are kept in the
volume. Space becomes reclaimable when storage pool before they are deleted.
files are expired or are deleted. Copy group attributes and default
reconciliation retention grace periods for the domain
The process of ensuring consistency define retention.
between the original data repository and retrieve
the larger system where the data is stored To copy archived information from the
for backup. Examples of larger systems storage pool to the workstation for use.
where the data is stored for backup are The retrieve operation does not affect the
storage servers or other storage systems. archive version in the storage pool. See
also archive.
220 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
root user selective recall
A system user who operates without The process of copying user-selected files
restrictions. A root user has the special from server storage to a local file system.
rights and privileges needed to perform See also recall, transparent recall.
administrative tasks.
serialization
The process of handling files that are
S modified during backup or archive
processing. See also shared dynamic
SAN See storage area network. serialization, shared static serialization,
schedule static serialization.
A database record that describes client server A software program or a computer that
operations or administrative commands to provides services to other software
be processed. See also administrative programs or other computers. See also
command schedule, client schedule. client.
scheduling mode server options file
The type of scheduling operation for the A file that contains settings that control
server and client node that supports two various server operations. These settings
scheduling modes: client-polling and affect such things as communications,
server-prompted. devices, and performance.
scratch volume server-prompted scheduling mode
A labeled volume that is either blank or A client/server communication technique
contains no valid data, that is not defined, where the server contacts the client node
and that is available for use. See also when tasks must be done. See also
volume. client-polling scheduling mode.
script A series of commands, combined in a file, server storage
that carry out a particular function when The primary, copy, and active-data storage
the file is run. Scripts are interpreted as pools that are used by the server to store
they are run. See also Tivoli Storage user files such as backup versions, archive
Manager command script. copies, and files migrated from
Secure Sockets Layer (SSL) hierarchical storage management client
A security protocol that provides nodes (space-managed files). See also
communication privacy. With SSL, active-data pool, copy storage pool,
client/server applications can primary storage pool, storage pool
communicate in a way that is designed to volume, volume.
prevent eavesdropping, tampering, and session
message forgery. A logical or virtual connection between
selective backup two stations, software programs, or
The process of backing up certain files or devices on a network that allows the two
directories from a client domain. The files elements to communicate and exchange
that are backed up are those that are not data for the duration of the session. See
excluded in the include-exclude list. The also administrative session.
files must meet the requirement for session resource usage
serialization in the backup copy group of The amount of wait time, processor time,
the management class that is assigned to and space that is used or retrieved during
each file. See also incremental backup. a client session.
selective migration shadow copy
The process of copying user-selected files A snapshot of a volume. The snapshot
from a local file system to server storage can be taken while applications on the
and replacing the files with stub files on system continue to write data to the
the local file system. See also demand volumes.
migration, threshold migration.
Glossary 221
shadow volume special file
The data stored from a snapshot of a On AIX, UNIX, or Linux systems, a file
volume. The snapshot can be taken while that defines devices for the system, or
applications on the system continue to temporary files that are created by
write data to the volumes. processes. There are three basic types of
special files: first-in, first-out (FIFO);
shared dynamic serialization
block; and character.
A value for serialization that specifies that
a file must not be backed up or archived SSL See Secure Sockets Layer.
if it is being modified during the
stabilized file space
operation. The backup-archive client
A file space that exists on the server but
retries the backup or archive operation a
not on the client.
number of times; if the file is being
modified during each attempt, the stanza A group of lines in a file that together
backup-archive client will back up or have a common function or define a part
archive the file on its last try. See also of the system. Stanzas are usually
dynamic serialization, serialization, shared separated by blank lines or colons, and
static serialization, static serialization. each stanza has a name.
shared library startup window
A library device that is used by multiple A time period during which a schedule
storage manager servers. See also library. must be initiated.
shared static serialization static serialization
A copy-group serialization value that A copy-group serialization value that
specifies that a file must not be modified specifies that a file must not be modified
during a backup or archive operation. The during a backup or archive operation. If
client attempts to retry the operation a the file is in use during the first attempt,
number of times. If the file is in use the backup-archive client cannot back up
during each attempt, the file is not backed or archive the file. See also dynamic
up or archived. See also dynamic serialization, serialization, shared dynamic
serialization, serialization, shared dynamic serialization, shared static serialization.
serialization, static serialization.
storage agent
snapshot A program that enables the backup and
An image backup type that consists of a restoration of client data directly to and
point-in-time view of a volume. from storage attached to a storage area
network (SAN).
space-managed file
A file that is migrated from a client node storage area network (SAN)
by the hierarchical storage management A dedicated storage network tailored to a
(HSM) client. The HSM client recalls the specific environment, combining servers,
file to the client node on demand. systems, storage products, networking
products, software, and services.
space management
See hierarchical storage management. storage hierarchy
A logical order of primary storage pools,
space monitor daemon
as defined by an administrator. The order
A daemon that checks space usage on all
is typically based on the speed and
file systems for which space management
capacity of the devices that the storage
is active, and automatically starts
pools use. The storage hierarchy is
threshold migration when space usage on
defined by identifying the next storage
a file system equals or exceeds its high
pool in a storage pool definition. See also
threshold.
storage pool.
sparse file
storage pool
A file that is created with a length greater
A named set of storage volumes that is
than the data it contains, leaving empty
the destination that is used to store client
spaces for the future addition of data.
222 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
data. See also active-data pool, copy
storage pool, primary storage pool,
storage hierarchy.
storage pool volume
A volume that has been assigned to a
storage pool. See also active-data pool,
copy storage pool, primary storage pool,
server storage, volume.
storage privilege class
A privilege class that gives an
administrator the authority to control how
storage resources for the server are
allocated and used, such as monitoring
the database, the recovery log, and server
storage. See also privilege class.
stub A shortcut on the Windows file system
that is generated by the hierarchical
storage management (HSM) client for a
migrated file that allows transparent user
access. A stub is the sparse file
representation of a migrated file, with a
reparse point attached.
stub file
A file that replaces the original file on a
local file system when the file is migrated
to storage. A stub file contains the
information that is necessary to recall a
migrated file from server storage. It also
contains additional information that can
be used to eliminate the need to recall a
migrated file. See also migrated file,
resident file.
stub file size
The size of a file that replaces the original
file on a local file system when the file is
migrated to server storage. The size that
is specified for stub files determines how
much leader data can be stored in the
stub file. The default for stub file size is
the block size defined for a file system
minus 1 byte.
subscription
In a storage environment, the process of
identifying the subscribers to which the
profiles are distributed. See also
enterprise configuration, managed server.
system privilege class
A privilege class that gives an
administrator the authority to issue all
server commands. See also privilege class.
Glossary 223
tombstone object
T A small subset of attributes of a deleted
tape library object. The tombstone object is retained
A set of equipment and facilities that for a specified period, and at the end of
support an installation's tape the specified period, the tombstone object
environment. The tape library can include is permanently deleted.
tape storage racks, mechanisms for Transmission Control Protocol/Internet Protocol
automatic tape mounting, a set of tape (TCP/IP)
drives, and a set of related tape volumes An industry-standard, nonproprietary set
mounted on those drives. of communication protocols that provides
tape volume prefix reliable end-to-end connections between
The high-level-qualifier of the file name applications over interconnected networks
or the data set name in the standard tape of different types. See also communication
label. method.
target node transparent recall
A client node for which other client nodes The process that is used to automatically
(called agent nodes) have been granted recall a migrated file to a workstation or
proxy authority. The proxy authority file server when the file is accessed. See
allows the agent nodes to perform also selective recall.
operations such as backup and restore on trusted communications agent (TCA)
behalf of the target node, which owns the A program that handles the sign-on
data. password protocol when clients use
TCA See trusted communications agent. password generation.
TCP/IP
See Transmission Control U
Protocol/Internet Protocol.
UCS-2 A 2-byte (16-bit) encoding scheme based
threshold migration on ISO/IEC specification 10646-1. UCS-2
The process of moving files from a local defines three levels of implementation:
file system to server storage based on the Level 1-No combining of encoded
high and low thresholds that are defined elements allowed; Level 2-Combining of
for the file system. See also automatic encoded elements is allowed only for
migration, demand migration, migration Thai, Indic, Hebrew, and Arabic; Level
job, selective migration. 3-Any combination of encoded elements
are allowed.
throughput
In storage management, the total bytes in UNC See Universal Naming Convention.
the workload, excluding overhead, that
Unicode
are backed up or restored, divided by
A character encoding standard that
elapsed time.
supports the interchange, processing, and
timeout display of text that is written in the
A time interval that is allotted for an common languages around the world,
event to occur or complete before plus many classical and historical texts.
operation is interrupted.
Unicode-enabled file space
Tivoli Storage Manager command script Unicode file space names provide support
A sequence of Tivoli Storage Manager for multilingual workstations without
administrative commands that are stored regard for the current locale.
in the database of the Tivoli Storage
Universally Unique Identifier (UUID)
Manager server. The script can run from
The 128-bit numeric identifier that is used
any interface to the server. The script can
to ensure that two components do not
include substitution for command
have the same identifier. See also Globally
parameters and conditional logic. See also
Unique Identifier.
macro file, script.
224 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Universal Naming Convention (UNC) volume history file
The server name and network name A file that contains information about
combined. These names together identify volumes that have been used by the
the resource on the domain. server for database backups and for
export of administrator, node, policy, or
UTF-8 Unicode Transformation Format, 8-bit
server data. The file also has information
encoding form, which is designed for ease
about sequential-access storage pool
of use with existing ASCII-based systems.
volumes that have been added, reused, or
The CCSID value for data in UTF-8
deleted. The information is a copy of
format is 1208. See also UCS-2.
volume information that is recorded in
UUID See Universally Unique Identifier. the server database.
Volume Shadow Copy Service (VSS)
V A set of Microsoft application-
programming interfaces (APIs) that are
validate used to create shadow copy backups of
To check a policy set for conditions that volumes, exact copies of files, including
can cause problems if that policy set all open files, and so on.
becomes the active policy set. For
example, the validation process checks VSS See Volume Shadow Copy Service.
whether the policy set contains a default VSS Backup
management class. A backup operation that uses Microsoft
version Volume Shadow Copy Service (VSS)
A backup copy of a file stored in server technology. The backup operation
storage. The most recent backup copy of a produces an online snapshot
file is the active version. Earlier copies of (point-in-time consistent copy) of
the same file are inactive versions. The Microsoft Exchange data. This copy can
number of versions retained by the server be stored on local shadow volumes or on
is determined by the copy group Tivoli Storage Manager server storage.
attributes in the management class. VSS Fast Restore
virtual file space An operation that restores data from a
A representation of a directory on a local snapshot. The snapshot is the VSS
network-attached storage (NAS) file backup that resides on a local shadow
system as a path to that directory. volume. The restore operation retrieves
the data by using a file-level copy
virtual mount point method.
A directory branch of a file system that is
defined as a virtual file system. The VSS Instant Restore
virtual file system is backed up to its own An operation that restores data from a
file space on the server. The server local snapshot. The snapshot is the VSS
processes the virtual mount point as a backup that resides on a local shadow
separate file system, but the client volume. The restore operation retrieves
operating system does not. the data by using a hardware assisted
restore method (for example, a FlashCopy
virtual volume operation).
An archive file on a target server that
represents a sequential media volume to a VSS offloaded backup
source server. A backup operation that uses a Microsoft
Volume Shadow Copy Service (VSS)
volume hardware provider (installed on an
A discrete unit of storage on disk, tape or alternate system) to move IBM Data
other data recording medium that Protection for Microsoft Exchange data to
supports some form of identifier and the Tivoli Storage Manager server. This
parameter list, such as a volume label or type of backup operation shifts the
input/output control. See also scratch backup load from the production system
volume, server storage, storage pool, to another system.
storage pool volume.
Glossary 225
VSS Restore
A function that uses a Microsoft Volume
Shadow Copy Service (VSS) software
provider to restore VSS Backups (IBM
Data Protection for Microsoft Exchange
database files and log files) that reside on
Tivoli Storage Manager server storage to
their original location.
W
wildcard character
A special character such as an asterisk (*)
or a question mark (?) that can be used to
represent one or more characters. Any
character or set of characters can replace
the wildcard character.
workload partition (WPAR)
A partition within a single operating
system instance.
workstation
A terminal or personal computer at which
a user can run applications and that is
usually connected to a mainframe or a
network.
worldwide name (WWN)
A 64-bit, unsigned name identifier that is
unique.
WPAR See workload partition.
WWN See worldwide name.
226 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Index
Special characters backup command
and /logfile parameter 117
/BACKUPDESTination parameter and /BACKUPDESTination parameter 116
and restore command 148 and /CONFIGfile parameter 116
/ERASEexistinglogs parameter and /EXCLUDEDAGPASsive parameter 117
and restore command 148 and /EXCLUDEDB parameter 117
/FROMEXCSERVer parameter and /EXCLUDENONDAGDbs parameter 117
and restore command 148 and /MOUNTWait parameter 118
/INSTANTREStore parameter and /OFFLOAD parameter 118
and restore command 149 and /Quiet parameter 118
/INTODB parameter and /SKIPINTEGRITYCHECK parameter 118
and restore command 149 and /TSMNODe parameter 119
/LOGFile parameter and /TSMOPTFile parameter 119
and restore command 150 and /TSMPassword parameter 119
/LOGPrune parameter and/EXCLUDEDAGACTive parameter 117
and restore command 150 offload parameter
/MOUNTDAtabases parameter and backup command 118
and restore command 150
/MOUNTWait parameter
and restore command 150
/OBJect parameter A
and restore command 151 accessibility features 199
/Quiet parameter APAR 108
and restore command 151 automated failover
/RECOVER parameter overview 14
and restore command 151
/TEMPLOGRESTorepath parameter
and restore command 152 B
/TSMNODe parameter backup
and restore command 152 command line 115
/TSMOPTFile parameter copy
and restore command 152 description 9
/TSMPassword parameter database copy
and restore command 152 description 9
/BACKUPDESTination parameter differential
and backup command 116 description 9
/CONFIGfile parameter full
and backup command 116 description 9
and restore command 148 strategy 19
/EXCLUDEDAGACTive parameter full plus differentials
and backup command 117 strategy 19
/EXCLUDEDAGPASsive parameter full plus incremental
and backup command 117 strategy 19
/EXCLUDEDB parameter incremental
and backup command 117 description 9
/EXCLUDENONDAGDbs parameter storage group
and backup command 117 command line 124
/LOGFile parameter backup command 115
and backup command 117 and /logfile parameter 126
/MOUNTWait parameter and /logprune parameter 126
and backup command 118 and /MINimumbackupinterval parameter 118
/OFFLOAD parameter and /preferdagpassive parameter 118
and backup command 118 and /quiet parameter 127
/Quiet parameter DAG backup
and backup command 118 and /MINimumbackupinterval parameter 118
/TSMNODe parameter and /preferdagpassive parameter 118
and backup command 119 example 120
/TSMOPTFile parameter overview 114
and backup command 119 scheduling backup command
/TSMPassword parameter and /MINimumbackupinterval parameter 118
and backup command 119 and /preferdagpassive parameter 118
228 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
command-line parameters (continued) command-line parameters (continued)
/OBJect /TSMPassword
and restore 151 and backup 119
/olderthan and local 155
and delete backup 127 and tsm 155
/preferdagpassive and vss 155
and backup 118 dagnode 116, 125, 148, 155, 161, 174
/quiet commands
and restorefiles 157 query exchange 132
/RECOVER query managedcapacity 134
and restore 151 query tdp 135
/TEMPLOGRESTorepath query tsm 137
and restore 152 set 173
/timeformat communication protocol option 35
and set 178 compressalways option 36
/tsmnode compression option 36
and changetsmpassword 122 configfile parameter
and mount backup 131 and changetsmpassword command 121
and restore 127 and delete backup command 125
and restorefiles 157 and mount backup command 130
and restoremailbox 172 and query exchange command 132
and unmount backup 181 and query tdp command 135
/TSMNODe and restorefiles command 155
and restore 152 and restoremailbox command 161
/tsmoptfile and set command 178
and changetsmpassword 122 and unmount backup command 180
and mount backup 131 configuration
and restore 127 manual procedure
and restorefiles 157 Exchange Server 62
and restoremailbox 172 Tivoli Storage Manager server 63
and unmount backup 181 options 35
/TSMOPTFile procedure
and restore 152 offloaded backups 65
/tsmpassword verify 66
and mount backup 131 configuring
and restore 127 binding
and restorefiles 157 policy 30
and restoremailbox 172 Data Protection for Microsoft Exchange 59
and unmount backup 182 policy 30
/TSMPassword quick instructions 44
and restore 152 copy backup
/BACKUPDESTination description 9
and backup 116 customer support
/CONFIGfile contacting 196
and backup 116
and restore 148
/EXCLUDEDAGACTive
and backup 117
D
DAG 1, 33
/EXCLUDEDAGPASsive
dagnode parameter 116, 125, 148, 155, 161, 174
and backup 117
data protection
/EXCLUDEDB
Exchange with VSS backup-restore support
and backup 117
gathering information before calling IBM 105
/EXCLUDENONDAGDbs
Exchange with VSS backup/restore support
and backup 117
determining the issue 99
/LOGFile
gathering files before calling IBM 106
and backup 117
general help 95
/MOUNTWait
tracing when using VSS 104
and backup 118
troubleshooting 97
/OFFLOAD
Data Protection for Exchange
and backup 118
configuration parameters 39
/SKIPINTEGRITYCHECK
configuring options 35
and backup 118
exclude processing 37
/TSMNODe
include processing 37
and backup 119
include/exclude processing 38
/TSMOPTFile
policy settings 28
and backup 119
registering 34
Index 229
Data Protection for Microsoft Exchange dsm.opt file (continued)
commands 113 enableclientencryptkey 37
configuring 59 enablelanfree 37
creating an installation package 54 encryptiontype 37
creating an installation package on a DVD 54 include.encrypt 37
features 1 nodename 35
installation passwordaccess 39
hardware requirements 43 dsmcutil.exe file 39
operating system requirements 44 dsmcutil.hlp file 39
software requirements 44 dsmcutil.txt file 39
installing on a local system 47
installing the language packs 48
LAN-free
description 112
E
email support files 107
online help viii
enableclientencryptkey option 37
operating environment 1
enablelanfree option 37
overview 1
encryption 37
performance 111
encryptiontype option 37
quick configuration 44
example
quick installation 44
backup command 120
restore types 10
changetsmpassword command 123
silent installation 50
include/exclude processing 38
silent installation with batch file 52
query tdp command 136
virtualization environment 44
query tsm command 143
Data Protection for Microsoft Exchange scripts
set command 179
adding 108
excfull.log 90
editing 108
Exchange backup
viewing 108
DAG environment 73
Data Protection for Microsoft Exchange Server GUI
VSS
starting 71
GUI 73
Data Protection for Microsoft Exchange silent installation
Exchange Database Availability Group
capturing a log 53
managing with single policy 33
playing back the installation 54
Exchange Server VSS backup
setup error messages 55
deleting 86
Data Protection for Microsoft Exchange tasks
exclude processing 37
automating 89
excsched.log 90
Data Protection for Microsoft Exchange tasks 89
expiring VSS Backup s
Data Protection for Microsoft Exchange trace and log files
policy 28
viewing 103
Data Protection for Microsoft Exchange VSS backup
policy binding 31
Database Availabilty Group 1 F
database copy backup failover
description 9 overview 14
dateformat parameter FAQ 187
and set command 175 features 1
delete backup command files
and /backupdestination parameter 125 Data Protection for Microsoft Exchange options 119, 127,
and /configfile parameter 125 152, 157, 172
and /fromexcserver parameter 126 dsm.opt 35
and /object parameter 127 dsmcutil.exe 39
and /olderthan parameter 127 dsmcutil.hlp 39
syntax diagram 123 dsmcutil.txt 39
deleting Exchange Server VSS backups 86 excfull.log 90
developerWorks wiki 108 excsched.log 90
diagnosing VSS issues for Data Protection for Microsoft tdpexc.cfg
Exchange 102 and backup command 116
differential backup and changetsmpassword command 121
description 9 and delete backup command 125
disability 199 and mount backup command 130
DS8000 and query exchange command 132
requirements 7 and query tdp command 135
dsm.opt file 35 and restore command 148, 152
clusternode 35 and restorefiles command 155
communication protocol 35 and restoremailbox command 161, 171, 172
compressalways 36 and set command 178
compression 36 and unmount backup command 180
230 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
files (continued) installation (continued)
tdpexc.cfg (continued) hardware requirements 43
setting 39 operating system requirements 44
tdpexc.log 190 prerequisites 43
and backup command 117 registering Data Protection for Exchange 34
and changetsmpassword command 121 software requirements 44
and delete backup command 126 installing
and mount backup command 130 creating an installation package 54
and query exchange command 133 creating an installation package on a DVD 54
and query tdp command 135 Data Protection for Microsoft Exchange language packs 48
and restore command 150 on a local system 47
and restorefiles command 156 quick instructions 44
and restoremailbox command 162 silently with batch file 52
and set command 176 Tivoli Storage FlashCopy Manager 48
and unmount backup command 180 installing Data Protection for Microsoft Exchange
tdpexcc.exe 113 on multiple servers (silent) 50
Tivoli Storage FlashCopy Manager options 131, 182 unattended (silent) 50
Tivoli Storage Manager options file 122 Internet, searching for problem resolution 195, 196
fixes, obtaining 196 into parameter
flat files 190 and restorefiles command 155
Frequently asked questions 187
fromexcserver parameter
and delete backup command 126
and restorefiles command 155
K
keyboard 199
full backup
knowledge bases, searching 195
description 9
strategy 19
full plus differential backup
strategy 19 L
full plus incremental backup LAN-free
strategy 19 description 112
language packs 48
language parameter
G and set command 175
local shadow volumes
glossary 205
storage space 29
graphical user interface (GUI)
localdsmagentnode parameter
restore options 74
and set command 176
GUI
logfile parameter
DAG Exchange backup 73
and changetsmpassword command 121
Exchange VSS backup 73
and delete backup command 126
individual mailbox restore 78
and mount backup command 130
restore options 75
and query exchange command 133
and query tdp command 135
and restorefiles command 156
H and restoremailbox command 162
hardware requirements 43 and set command 176
help and unmount backup command 180
online viii logging
help command circular 9
syntax diagram 128 logprune parameter
and changetsmpassword command 122
and delete backup command 126
I and mount backup command 130
and query exchange command 133
IBM Support Assistant 195
and query tdp command 136
include processing 37
and restorefiles command 156
include/exclude examples 38
and restoremailbox command 162
include.encrypt option 37
and set command 176
incremental backup
and unmount backup command 181
description 9
individual mailbox
restoremailbox
command line 161 M
individual mailbox restore mailbox
GUI 78 restoremailbox
installation command line 161
configuring options 35 mailbox history handling 57
Index 231
mailboxfilter parameter options
and restoremailbox command 163 GUI restore
mailboxoriglocation parameter instant restore 75
and restoremailbox command 165 mountdatabases 75
mailboxrestoredate parameter run recovery 75
and restoremailbox command 165 overview 1
mailboxrestoredestination parameter thin provisioning support 13
and restoremailbox command 167
mailboxrestoretime parameter
and restoremailbox command 166
managed storage
P
parameters
determining capacity 72
/backupdestination
managing with single policy
and delete backup command 125
Exchange Database Availability Group 33
and restorefiles command 155
messages
and set command 174
verification 68
/BACKUPDESTination
migration 55
and restore command 148
mailbox history handling 57
/configfile
migration considerations
and changetsmpassword command 121
backup to DAG node 56
and delete backup command 125
MINimumbackupinterval parameter
and mount backup command 130
and backup command 118
and query exchange command 132
MMC GUI
and query tdp command 135
starting 71
and restorefiles command 155
mount backup command
and restoremailbox command 161
and /configfile parameter 130
and set command 178
and /logfile parameter 130
and unmount backup command 180
and /logprune parameter 130
/dateformat
and /tsmnode parameter 131
and set command 175
and /tsmoptfile parameter 131
/ERASEexistinglogs
and /tsmpassword parameter 131
and restore command 148
syntax diagram 129
/fromexcserver
mountwait parameter
and delete backup command 126
and restorefiles command 156
and restorefiles command 155
and restoremailbox command 171
/FROMEXCSERVer
and set command 176
and restore command 148
msiexec.exe
/INSTANTREStore
used for silent installation 52
and restore command 149
/into
and restorefiles command 155
N /INTODB
node name and restore command 149
Data Protection for Exchange 34 /language
offloaded backup 41 and set command 175
proxy nodes 40 /localdsmagentnode
VSS 40 and set command 176
nodename option 35 /logfile
numberformat parameter and changetsmpassword command 121
and set command 176 and delete backup command 126
and mount backup command 130
and query exchange command 133
O and query tdp command 135
and restorefiles command 156
object parameter
and restoremailbox command 162
and delete backup command 127
and set command 176
and restorefiles command 157
and unmount backup command 180
offloaded backup
/LOGFile
configuration procedure 65
and restore command 150
hardware requirements 43
/logprune
node names 41
and changetsmpassword command 122
software requirements 44
and delete backup command 126
olderthan parameter
and mount backup command 130
and delete backup command 127
and query exchange command 133
online help viii
and query tdp command 136
operating environment 1
and restorefiles command 156
operating system requirements 44
and restoremailbox command 162
optional parameters 155
and set command 176
232 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
parameters (continued) parameters (continued)
/logprune (continued) /tsmoptfile (continued)
and unmount backup command 181 and restore command 127
/LOGPrune and restorefiles command 157
and restore command 150 and restoremailbox command 172
/mailboxfilter and unmount backup command 181
and restoremailbox command 163 /TSMOPTFile
/mailboxoriglocation and restore command 152
and restoremailbox command 165 /tsmpassword
/mailboxrestoredate and mount backup command 131
and restoremailbox command 165 and restore command 127
/mailboxrestoredestination and restorefiles command 157
and restoremailbox command 167 and restoremailbox command 172
/mailboxrestoretime and unmount backup command 182
and restoremailbox command 166 /TSMPassword
/MINimumbackupinterval and restore command 152
and backup command 118 /BACKUPDESTination
/MOUNTDAtabases and backup command 116
and restore command 150 /CONFIGfile
/mountwait and backup command 116
and restorefiles command 156 and restore command 148
and restoremailbox command 171 /EXCLUDEDAGACTive
and set command 176 and backup command 117
/MOUNTWait /EXCLUDEDAGPASsive
and restore command 150 and backup command 117
/numberformat /EXCLUDEDB
and set command 176 and backup command 117
/object /EXCLUDENONDAGDbs
and delete backup command 127 and backup command 117
and restorefiles command 157 /LOGFile
/OBJect and backup command 117
and restore command 151 /MOUNTWait
/olderthan and backup command 118
and delete backup command 127 /OFFLOAD
/preferdagpassive and backup command 118
and backup command 118 /Quiet
/quiet and backup command 118
and delete backup command 127 /SKIPINTEGRITYCHECK
and restorefiles command 157 and backup command 118
/Quiet /TSMNODe
and restore command 151 and backup command 119
/RECOVER /TSMOPTFile
and restore command 151 and backup command 119
/remotedsmagentnode /TSMPassword
and set command 176 and backup command 119
/tempdbrestorepath dagnode 116, 125, 148, 155, 161, 174
and restoremailbox command 171 parameters, described
and set command 177 optional
/templogrestorepath /LOGPrune 117
and restoremailbox command 172 Passport Advantage 197
and set command 177 passwordaccess option 39
/TEMPLOGRESTorepath performance 111
and restore parameter 152 policy
/timeformat binding 30
and set command 178 binding Data Protection for Microsoft Exchange VSS
/tsmnode backups 31
and changetsmpassword command 122 configuring 30
and mount backup command 131 expiring VSS Backup 28
and restore command 127 policy command
and restorefiles command 157 overview 134
and restoremailbox command 172 policy settings
and unmount backup command 181 Data Protection for Exchange and Tivoli Storage
/TSMNODe Manager 28
and restore command 152 Preface vii
/tsmoptfile preferdagpassive parameter
and changetsmpassword command 122 and backup command 118
and mount backup command 131 printing reports 87
Index 233
problem determination restore command (continued)
describing problem for IBM Software Support 197 and /Quiet parameter 151
determining business impact for IBM Software and /RECOVER parameter 151
Support 197 and /TEMPLOGRESTorepath parameter 152
submitting a problem to IBM Software 198 and /tsmnode parameter 127
product support 108 and /TSMNODe parameter 152
proxy nodes 40 and /tsmoptfile parameter 127
publications and /TSMOPTFile parameter 152
download viii and /tsmpassword parameter 127
and /TSMPassword parameter 152
and /CONFIGfile parameter 148
Q overview 144
syntax diagram 146
query exchange command
restore operations
and /configfile parameter 132
using the GUI
and /logfile parameter 133
restore options 74
and /logprune parameter 133
restore options
overview 132
GUI
syntax diagram 132
instant restore 75
query managedcapacity command
mountdatabases 75
overview 134
run recovery 75
query tdp command
restorefiles 155
and /configfile parameter 135
snapshot backup 190
and /logfile parameter 135
restorefiles command
and /logprune parameter 136
and /configfile parameter 155
example 136
and /fromexcserver parameter 155
overview 135
and /into parameter 155
syntax diagram 135
and /logfile parameter 156
query tsm 137
and /logprune parameter 156
query tsm command
and /mountwait parameter 156
example 143
and /object parameter 157
overview 137
and /quiet parameter 157
quiet parameter
and /tsmnode parameter 157
and delete backup command 127
and /tsmoptfile parameter 157
and restorefiles command 157
and /tsmpassword parameter 157
backups 153
syntax diagram 154
R restoremailbox
recovery database individual mailbox
procedure 85 command line 161
registration 34 mailbox
remotedsmagentnode parameter command line 161
and set command 176 restoremailbox command
reports and /configfile parameter 161
viewing, printing, and saving 87 and /logfile parameter 162
requirements 7 and /logprune parameter 162
DS8000 7 and /mailboxfilter parameter 163
SAN Volume Controller 7 and /mailboxoriglocation parameter 165
Storwize V7000 7 and /mailboxrestoredate parameter 165
XIV 7 and /mailboxrestoredestination parameter 167
restore 10 and /mailboxrestoretime parameter 166
command line 147 and /mountwait parameter 171
database 10 and /tempdbrestorepath parameter 171
restorefiles command 10 and /templogrestorepath parameter 172
transaction log 10 and /tsmnode parameter 172
types 10 and /tsmoptfile parameter 172
restore command and /tsmpassword parameter 172
and /BACKUPDESTination parameter 148 overview 158
and /ERASEexistinglogs parameter 148 syntax diagram 159
and /FROMEXCSERVer parameter 148 restoring data
and /INSTANTREStore parameter 149 Exchange Server 2007 81
and /INTODB parameter 149 Exchange Server 2010 81
and /LOGFile parameter 150 Mailbox Restore Browser 81
and /LOGPrune parameter 150
and /MOUNTDAtabases parameter 150
and /MOUNTWait parameter 150
and /OBJect parameter 151
234 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
S T
saving reports 87 tdpexc.cfg file
sending support files by using email 107 and backup command 116
server, Tivoli Storage Manager and changetsmpassword command 121
using multiple 39 and delete backup command 125
Service Management Console 108 and mount backup command 130
set command and query tdp command 135
and /backupdestination parameter 174 and restore command 148, 152
and /configfile parameter 178 and restorefiles command 155
and /dateformat parameter 175 and restoremailbox command 161, 171, 172
and /language parameter 175 and set command 178
and /localdsmagentnode parameter 176 and unmount backup command 180
and /logfile parameter 176 parameters
and /logprune parameter 176 setting 39
and /mountwait parameter 176 query exchange 132
and /numberformat parameter 176 tdpexc.log file
and /remotedsmagentnodee parameter 176 and backup command 117
and /tempdbrestorepath parameter 177 and changetsmpassword command 121
and /templogrestorepath parameter 177 and delete backup command 126
and /timeformat parameter 178 and mount backup command 130
example 179 and query exchange command 133
overview 173 and query tdp command 135
syntax diagram 173 and restore command 150
setup.exe and restorefiles command 156
used for silent installation 50 and restoremailbox command 162
silent installation of Data Protection for Microsoft and set command 176
Exchange 50 and unmount backup command 180
silent installtion tdpexcc.exe
with setup.exe 50 overview 113
software requirements 44 tempdbrestorepath parameter
software support and restoremailbox command 171
describing problem for IBM Software Support 197 and set command 177
determining business impact for IBM Software templogrestorepath parameter
Support 197 and restoremailbox command 172
submitting a problem 198 and set command 177
Software Support timeformat parameter
contacting 196 and set command 178
starting Tivoli Storage FlashCopy Manager
Data Protection for Microsoft Exchange Server GUI 71 transitioning backups 182
MMC GUI 71 Tivoli Storage Manager
storage policy settings 28
determining managed capacity 72 Tivoli Storage Manager options file 122
storage group transaction log
backup restore 10, 144
command line 124 tsmnode parameter
VSS backup and changetsmpassword command 122
GUI 73 and mount backup command 131
storage management, policy 27 and restore command 127
Storwize V7000 and restorefiles command 157
requirements 7 and restoremailbox command 172
support contract 197 and unmount backup command 181
support information 193 tsmoptfile parameter
support subscription 197 and changetsmpassword command 122
syntax diagrams and mount backup command 131
changetsmpassword command 120 and restore command 127
delete backup command 123 and restorefiles command 157
help command 128 and restoremailbox command 172
mount backup command 129 and unmount backup command 181
query exchange command 132 tsmpassword parameter
query tdp command 135 and mount backup command 131
restore command 146 and restore command 127
restorefiles command 154 and restorefiles command 157
restoremailbox command 159 and restoremailbox command 172
set command 173 and unmount backup command 182
unmount backup command 179
Index 235
U
unmount backup command
and /configfile parameter 180
and /logfile parameter 180
and /logprune parameter 181
and /tsmnode parameter 181
and /tsmoptfile parameter 181
and /tsmpassword parameter 182
syntax diagram 179
utilities
dsmcutil 39
V
viewing reports 87
viewing system information for Data Protection for Microsoft
Exchange 108
virtualization environmentData Protection for Microsoft
Exchange 44
VSS
N-series and NetApp
storage 24
node names 40
overview 3
proxy nodes 40
restore into alternate locations 13, 76
software requirements 44
VSS backup
planning requirements 6
VSS fast restore
method 11
VSS Instant Restore
hardware requirements 43
software requirements 44
VSS provider 3
VSS requestor 3
VSS system provider
overview 4
VSS writer 3
X
XIV
requirements 7
236 IBM Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server Installation and User's Guide
Printed in USA