Académique Documents
Professionnel Documents
Culture Documents
Administrators Guide
10759381
September 2006
Disclaimer The information contained in this publication is subject to change without notice. Symantec Corporation makes no warranty of any kind with regard to this manual, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Symantec Corporation shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual. Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Backup Exec are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED AS IS AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. Symantec Corporation 20330 Stevens Creek Blvd. Cupertino, CA 95014 http://www.symantec.com/ Third-Party Copyrights Certain third-party software may be distributed, embedded, or bundled with this Symantec product or recommended for use in conjunction with the installation and operation of this Symantec product. Such third-party software is separately licensed by its copyright holder. Please see copyrights.pdf for licenses that govern the use of the third-party software and for proprietary notices of the copyright holders.
ii
Contents
Chapter 1. Introducing Continuous Protection Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 About Backup Exec Continuous Protection Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 What are the features and benefits of CPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 What are the key components of CPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 How Continuous Protection Server works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 About backup strategies and planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Data protection considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 About backup job schedules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 How system information is protected . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 System State . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Shadow Copy Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Exchange Server protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 For additional information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Accessing the CPS documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Using online Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Accessing the Symantec Technical Support Web site . . . . . . . . . . . . . . . . . . . . . . . . 14 Accessing the Symantec Backup Exec Web site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Chapter 2. Installing Continuous Protection Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Before you install the CPS software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 The general installation procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Checking your environment before installing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Minimum system requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 System Requirements for Business Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 System Requirements for Continuous Management Service and Protection Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 System Requirements for Administration Console . . . . . . . . . . . . . . . . . . . . . . . 21 System Requirements for Web Restore Server Component . . . . . . . . . . . . . . . . 21
iii
System Requirements for Indexing Component . . . . . . . . . . . . . . . . . . . . . . . . . 22 System Requirements for Backup Exec Retrieve . . . . . . . . . . . . . . . . . . . . . . . . . 22 Encrypted files and reparse points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Firewall support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 What gets installed and where . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Files and folders that are installed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Drivers that are installed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 CPS Services that are installed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Registry entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Performing an initial installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Push-installing CPS Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Upgrading to CPS 11d . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Modifying CPS installations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Uninstalling the Continuous Management Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Uninstalling a Continuous Protection Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 Chapter 3. Using the Administration Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 About the CPS Administration Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Starting CPS and accessing the Administration Console . . . . . . . . . . . . . . . . . . . . . . . . 39 About the general Administration Console features . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 About the Administration Console views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 Overview view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 Setup view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 Setup View Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 Restore view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 Job Monitor view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 Alerts view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 Chapter 4. Configuring Continuous Protection Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Configuring Business Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Moving servers between Backup Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
iv Backup Exec Continuous Protection Server Administrators Guide
Managing the CPS Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Managing backup destinations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 Additional notes on backup destinations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 Adding a backup destination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 Configuring the backup destination for Shadow Storage . . . . . . . . . . . . . . . . . . . . . 55 Renaming backup destinations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Deleting backup destinations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Managing snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 Creating snapshots on demand . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Creating snapshots on schedules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Changing snapshot schedules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 Defining Retention Policies for snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Viewing snapshot history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 Snapshot indexing states . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 Deleting snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 Configuring registry entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 Accessing and viewing the Settings Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 About the Settings Utility tunable parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 Changing CPS tuning parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 Chapter 5. Backing Up Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 About CPS data backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Backing up System Information in CPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 Creating CPS backup jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 Modifying backup job configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 Moving a backup job to a different backup destination . . . . . . . . . . . . . . . . . . . . . . 83 Including and excluding information to back up . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 Changing backup schedules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 Limiting bandwidth that is dedicated to a backup job . . . . . . . . . . . . . . . . . . . . . . . . 88 Adding scripts that run before or after backup jobs . . . . . . . . . . . . . . . . . . . . . . . . . 89
Contents
Starting, stopping, and canceling jobs manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 Chapter 6. Restoring Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 Restoring files and directories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 Restoring System Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 Restoring System State to an Active Directory system . . . . . . . . . . . . . . . . . . . . . . 94 Restoring network shares . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Chapter 7. Using Backup Exec Retrieve . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 About Backup Exec Retrieve features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 Security and credentials for Backup Exec Retrieve . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 Internet Explorer security on Windows Server 2003 . . . . . . . . . . . . . . . . . . . . . . . . 98 Retrieving files using Backup Exec Retrieve . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Using CPS with Backup Exec Desktop and Laptop Option . . . . . . . . . . . . . . . . . . . . . . 101 Securing files that are not retrievable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 Chapter 8. Monitoring CPS Processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .103 Viewing the job status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 About job states . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 Viewing the status of a job or the job pairs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 CPS job and pair status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 Viewing a job report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 CPS job report details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 Job Report Topic Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 CPS Jobs Topic Boxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 Exception Topic Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 Error Topic Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 Managing CPS job alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 Viewing and filtering active alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 Viewing and filtering alert history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 Viewing alert properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
vi Backup Exec Continuous Protection Server Administrators Guide
Responding to active alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 Deleting alerts from alert history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 Chapter 9. Using CPS with Backup Exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 Protecting CPS with Backup Exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 Configuring CPS for Backup Exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 Backing up CPS with Backup Exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 Backing up CPS databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 Backing up the Continuous Management Service (CMS) . . . . . . . . . . . . . . . . . 118 Backing up a Protection Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 Backing up Business Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 Backing up snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 Restoring CPS with Backup Exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120 Restoring the Continuous Management Service . . . . . . . . . . . . . . . . . . . . . . . . 121 Restoring the CPS Protection Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 Restoring a CPS Business Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 Monitoring CPS Jobs in Backup Exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 Setting up a SmartLink connection between CPS and Backup Exec . . . . . . . . . . 122 Viewing alerts posted to Backup Exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124 About fatal alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 About pair alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127 Viewing job logs posted in Backup Exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128 About CPS backup job log details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 Job Operation - Continuous Protection Job Topic Box . . . . . . . . . . . . . . . . . . . . 130 Command Line Syntax Error Topic Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 Exceptions Topic Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 Backup Exec SmartLink Options Topic Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132 Backup Exec SmartLink Run Log Topic Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132 CPS Jobs Topic Boxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 Chapter 10. Troubleshooting Continuous Protection Server . . . . . . . . . . . . . . . . . . . . . 135
Contents vii
CPS compatibility issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 CPS installation and upgrade issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 CPS credentials and security issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140 CPS components issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 CPS configuration issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 CPS general issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147 CPS backup and restore job issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 CPS System State backup and restore issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151 CPS job monitor issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151 Backup Exec Retrieve issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152 CPS Tools and Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155 CPS Database Maintenance utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155 CPS Database Backup and Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155 CPS Database Validation and Repair . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155 Services Manager utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156 SetIntegratedLogin utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156 Issues with integrated login and database backups . . . . . . . . . . . . . . . . . . . . . 157 Restoring a combined CMS/CPA server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 Appendix A. Maintaining Accessibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .159 About accessibility in CPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 About general keyboard navigation in CPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160 About keyboard navigation in dialog boxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160 List Boxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161 Using keyboard shortcuts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161 Establishing accessibility settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .165
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .173
viii Backup Exec Continuous Protection Server Administrators Guide
Chapter
About Backup Exec Continuous Protection Server on page 1 How Continuous Protection Server works on page 6 About backup strategies and planning on page 9 For additional information on page 13
Byte-level protection
Simultaneous backups
Point-in-time snapshots
About Backup Exec Continuous Protection Server Features and Benefits of CPS (continued) Feature Flexible backup options Description Back up only the specific data you need. Save on system resources by backing up only the information that needs to be recovered in case of file corruption or a system failure, or for compliance purposes. Back up files on demand, or schedule periodic and continuous backups to run automatically. Administrators can set the maximum amount of bandwidth to be used for continuous data protection jobs. CPS protects open files during continuous protection. Retention properties define how long to keep daily, weekly, and monthly backups on disk. Automatically resumes a continuous protection job when lost connections are restored, without requiring intervention from an administrator. Continuous Protection Agents can be push installed to remote servers from a central console. IT resources do not need to be at that office or location where continuous protection is being installed or taking place. Intuitive search capabilities enable users to find files by file name, modification date, specific file type, or file size. Information can be backed up from sources in the current network, as well as from new servers as they are added to the Backup Group. CPS will capture system state information, reducing the time and effort associated with recovery of server configuration information. Uses Symantec LiveUpdate to provide periodic product updates. Supports 64-bit native processors for Business and Protection servers. Supports Internet Protocol version 6 (IPv6). Includes a Settings utility where user-configurable registry settings can be managed easily.
Push installation
Discovery
Scalable protection
About Backup Exec Continuous Protection Server Features and Benefits of CPS (continued) Feature DLO file recovery Description Backup Exec Retrieve now allows users of Backup Exec Desktop and Laptop Option (DLO) to restore DLO protected files directly back to their workstations using a Web interface. Supports continuous protection of Exchange servers using the Backup Exec Administration Console.
Business Servers
Protection Server
About Backup Exec Continuous Protection Server CPS Key Components (continued) Component Continuous Management Service Description The Continuous Management Service (CMS) provides primary control of the CPS processes, retains configuration settings from the Administration Console, and manages the CPS system. Only one CMS may be installed in a Backup Group, and it must be installed before any other CPS components. The CMS should be installed on a server that is appropriate for its use and has a fixed IP address. A Continuous Protection Agent must be installed on all Business Servers and Protection Servers within the Backup Group. The Continuous Protection Agents are responsible for managing the collection of data during CPS backup and restore jobs. The Administration Console controls all aspects of CPS, including defining data sources and destinations, creating backup and restore jobs, and defining backup and snapshot schedules. Additionally, the Administration Console is used to view and respond to alerts, monitor backup and restore jobs, and obtain product updates from Symantec. The Web Restore Server Component is a feature of the CMS that presents a Web view of protected data and search interface. This snapshoting is accomplished without administrator assistance on a Protection Server, although the administrator creates the schedule. Backup Exec Retrieve is the gateway by which users access the Web Restore Server Component to retrieve files. Backup Exec Retrieve uses Internet browsers (Internet Explorer 6.0 or later, and others). CPS software is not required on the user workstations. Users can search by full or partial file name, browse to the location where their files are stored, view all versions of a file that were backed up, and select a copy of the file they need. When files are selected, a copy can be downloaded without assistance from system administrators. Indexing Component The Indexing component maintains a directory of files that are available to user file retrieval using the Web Restore Server Component and Backup Exec Retrieve. The Indexing component is an optional feature that is installed on any Protection Server that users access for file retrieval using Backup Exec Retrieve. The Indexing component allows searches by file name, file versions, and recent activity.
Administration Console
How Continuous Protection Server works CPS Key Components (continued) Component Backup Exec SmartLink Description This component simplifies management by enabling users to view the combined status of CPS and Backup Exec jobs in the Backup Exec Administration Console. CPS uses the Symantec Backup Exec Remote Agent for Windows Systems (Remote Agent) to access System State information for backup and restore. Remote Agent also enables Backup Exec to efficiently back up Protection Servers and the CMS to tape. Remote Agent is an optional component and should be installed on any CPS Business Server that needs to have its System State protected. Remote Agent should also be installed on any Protection Server and the server hosting the CMS that will be protected by Symantec Backup Exec. Remote Agent is not required when CPS is installed on the Backup Exec Media Server because the Media Server already contains Remote Agent functionality. However, the Remote Agents used by CPS and the Backup Exec Media Server must be the same version (11d). Symantec LiveUpdate Symantec LiveUpdate is installed with the Administration Console. LiveUpdate notifies administrators when updates to installed Symantec products become available for download. LiveUpdate connects to the Symantec LiveUpdate server by the Internet.
3. CPS backup jobs are created to back up data from one or more Business Servers to a Protection Server using the Backup Job Wizard. When jobs are created, you select the data to be backed up and the schedule for the backup job. CPS backup jobs can be scheduled to run at specific times (periodically), as files incur any changes (continuously) or as needed (on demand). 4. As soon as the data has been backed up to the Protection Server, scheduled snapshots of the data can be made. The data is then indexed and made available to the Web Restore Server Component. 5. Users retrieve specific files and folders from the Web Restore Server Component directly back to their workstations using Backup Exec Retrieve and their Internet browsers. Since the data was backed up with specified snapshots, users can select specific versions of their data to be restored. 6. In the event of a system failure at one or more Business Servers, the backed up data can be quickly restored from the Protection Server back to the Business Server. 7. After the data is backed up to the Protection Server, you can back up the data to a Backup Exec media server to archive the data to tape or disk for long-term storage. 8. In the event of a system failure or data loss at a Protection Server, Backup Exec is able to quickly restore the data back to the Protection Server or directly back to a Business Server from the Backup Exec media server. 9. A CPS component, Backup Exec SmartLink, allows the status of CPS backup jobs to be viewed in the Backup Exec Job Logs and Alerts. This option allows administrators to determine the quality and completion of the CPS jobs before or during the Backup Exec backup job.
Related Topics: Performing an initial installation on page 27 Push-installing CPS Components on page 32 Configuring Business Servers on page 49 Managing backup destinations on page 54 Managing snapshots on page 58 Creating CPS backup jobs on page 80 Restoring Data on page 91 Using Backup Exec Retrieve on page 97 Backing up CPS with Backup Exec on page 117 Restoring CPS with Backup Exec on page 120 Monitoring CPS Jobs in Backup Exec on page 122
How many servers need to be backed up? How much information can you store and which servers will store it? How long should the data be retained and available for restore? Has the System Information for the server been modified such that it warrants backup protection? What information is business-critical and needs to be backed up continuously (every time the information changes)? What information should you back up hourly, daily, weekly, monthly, or at irregular intervals? What information should you back up on an as-needed (manual) basis only? Are shared folders being used, or do all users have unique folders in which their files are stored? Who should have access to the CPS Administration Console for the purpose of changing settings, scheduling backups, restoring information, and managing system alerts? Who should have access to various backup destinations for the purpose of restoring data? How should the backup destinations be organized for access? How often should data snapshots be captured and how many should be retained?
10
Regularly scheduled backups Regularly scheduled backups consist of files being copied on a regular basis. You select the days the backups are run and the time the backups begin. For example, you can back up your personnel data each day, Monday through Friday, at 5:00 P.M. Another example would be to back up all of the Business Servers every Saturday, beginning at 1:00 A.M. Periodically scheduled backups Periodically scheduled backups consist of files being copied on certain days of the week, and run periodically on timed intervals. For example, you can back up your sales proposals data every hour, your development data every three hours, your quality assurance data every four hours, and so on. Continuously scheduled backups Critical business information, such as your customer data, should be backed up continuously. Every time a file changes, the changes are copied to the Protection Server. There is no wait time or preset interval when the information is copied; the backup takes place immediately even while files are open. Related Topics: Changing backup schedules on page 87
System State
Windows 2000 Server and Windows Server 2003 systems include a set of data called System State. Depending on the installation options, System State data may consist of the registry, COM+ Class Registration database, system boot files, and the Certificate Services database (if the server is a certificate server). If the server is a domain controller, Active Directory and the SYSVOL directory are also contained in the System State data. If you are running the domain name service (DNS) on a domain controller, then the Active Directory portion of the System State data also contains all of the DNS zone information. Finally, if the server is running the Cluster service, then the System State data will also include any resource registry checkpoints and the quorum resource recovery log, which contains the most recent cluster database information.
11
12
Document Title
Description
Continuous Protection Server Continuous Protection Server documentation that is written for Administrators Guide system administrators and delivered in Adobe Acrobat (PDF) (CPSadmin_XX.pdf) format. Continuous Protection Server The Continuous Protection Server Quick Installation Guide is Quick Installation Guide intended to assist you while installing the product and (CPSquick_xx.pdf) components. It is delivered in Adobe Acrobat (PDF) format. Continuous Protection Server Installed and stored on the server, the Help file is accessible from Help files the Administration Console. (CPSconsole_XX.chm) Continuous Protection Server An HTML file containing any product changes and installation issues that should be reviewed before installing the CPS product. Readme files (Readme_XX.html)
Note The XX in the filename indicates the language of the file. The choices are EN for English, ES for Spanish, FR for French, IT for Italian, DE for German, JP for Japanese, KO for Korean, and ZH for Simplified Chinese.
To access the CPS documents from the CD: 1. Insert the CD into the CD-ROM drive. 2. Using Windows Explorer, navigate to and open the Docs directory. 3. Double-click the file to open it.
13
To access the online Help: 1. Install the CPS software. 2. Click Help or press [F1].
To access the Symantec Support Web site: 1. On the Internet, go to http://www.symantec.com/techsupp 2. Follow the links to the information you want.
To access the Symantec Backup Exec Web site: 1. On the Internet, go to http://backupexec.com 2. Follow the links to the information you want.
14
Chapter
Before you install the CPS software on page 15 What gets installed and where on page 24 Performing an initial installation on page 27 Push-installing CPS Components on page 32 Upgrading to CPS 11d on page 34 Modifying CPS installations on page 35 Uninstalling the Continuous Management Service on page 35 Uninstalling a Continuous Protection Agent on page 36
Install the Continuous Management Service (CMS) and an Administration Console, preferably on a dedicated server, before installing other CPS components. (See Performing an initial installation on page 27.) From the initially installed Administration Console, push-install additional Administration Consoles, Continuous Protection Agents (CPAs), or both, to other Business Servers or Protection Servers. (See Push-installing CPS Components on page 32.) As necessary, use the Administration Console to install additional components.
Note If you are upgrading over or plan to operate Continuous Protection Server with Veritas Storage Replicator or Veritas Replication Exec, refer to the CPS white paper, Upgrade, Migration and Concurrent Operation available at the following location: http://support.veritas.com/docs/277838.
If the computer meets the minimum requirements for installation, such as the operating system, disk and memory space, and sufficient logon account privileges. For more information, see Minimum system requirements on page 18. If third-party software that use CPS ports is configured correctly. If required components are installed, and if they are versions that are compatible with CPS. If previous versions of CPS are installed. If storage device hardware and associated drivers are properly installed and recognized by the Windows operating system.
16
The results that are reported for each item are flagged as:
Passed
There are no incompatibilities that will prevent the CPS installation. For hardware, this result indicates that the hardware configuration is recognized by CPS. An incompatibility with CPS exists, but can be resolved, or a condition of which you should be aware. An incompatibility with CPS exists, and it will cause the installation to fail. Some action is required before you can successfully install CPS.
Warning
Failed
Although the Environment Check runs automatically during installation, you may want to run it manually before installing CPS or before backing up data with CPS. To check your environment before installing: 1. From the CD browser, click Start the Backup Exec Continuous Protection Server Environment Check. 2. Click Next. 3. Do any of the following:
To check the configuration Check Local Environment Check. of the local computer To check the configuration Check Remote Environment Check. of a remote computer
4. Click Next. 5. If you checked Remote Environment Check in step 3, do one of the following:
Click Add Server From List. Select the computer from the list, and then click Next.
17
Click Add Server Manually. In the Domain field, type the name of the domain. In the Computer Name field, type the name of the computer. Click OK. Type the user name and password for this computer. Click OK. Select the computer from the list. Click Remove.
To remove the name of a computer from the list of computers on which the Environment Check will run
6. Review the results of the Environment Check, especially those items that were flagged as Failed or Warning. To save the results of the Environment Check, check Save Results To. 7. To change the location where the Environment Check results are saved, click Change Path to browse to a new location. 8. Click Finish.
System Requirements for Business Servers on page 19 System Requirements for Continuous Management Service and Protection Servers on page 20 System Requirements for Administration Console on page 21 System Requirements for Web Restore Server Component on page 21 System Requirements for Indexing Component on page 22 System Requirements for Backup Exec Retrieve on page 22
Note Actual production requirements may require greater resources than the noted minimum requirements. Additionally, where several components exist on the same server, the requirements are cumulative.
18
Microsoft Windows 2000 Server with Service Pack 4 Microsoft Windows 2000 Advanced Server with Service Pack 4 Microsoft Windows Server 2003 x64 Editions Microsoft Windows Server 2003 (including R2, but not Data Center) with Service Pack 1 Microsoft Windows Server 2003, Small Business Server with Service Pack 1 Microsoft Windows Storage Server 2003 with Service Pack 1
RAM Disk Space: CPS Software Disk Space: Journals Disk Space: Logs and Alerts Disk Space: Named Objects
512 MB, 1 GB recommended 25 MB 100 MB (10 GB or more recommended) 100 MB 100 MB or more depending on server configuration (minimum 1 GB recommended if backing up System State) Uninterruptible power supply (UPS) such as battery backup power, recommended Microsoft Data Access Components (MDAC) version 2.5 or later
UPS
Utilities
19
Microsoft Windows Server 2003 x64 Editions Microsoft Windows Server 2003 family (including R2, but not Data Center) with Service Pack 1 Microsoft Windows Server 2003, Small Business Server with Service Pack 1 Microsoft Windows Storage Server 2003 with Service Pack 1
RAM Disk Space: CPS Software Disk Space: Logs and Alerts Disk Space: Indexing Component Volumes
The Protection Server should have at least four separate volumes for ideal performance:
System volume Journals volume Backup destination volume Snapshot storage volume for backup destination
UPS
Uninterruptible power supply (UPS) such as battery backup power, recommended Microsoft Data Access Components (MDAC) version 2.5 or later
Utilities
20
Microsoft Windows 2000 Professional with Service Pack 4 Microsoft Windows 2000 Server with Service Pack 4 Microsoft Windows 2000 Advanced Server with Service Pack 4 Microsoft Windows Server 2003 family (including R2, but not Data Center) with Service Pack 1 Microsoft Windows XP Professional Microsoft Windows XP Professional x64 Edition
250 MB for 32-bit push-install files 275 MB for 64-bit push-install files 300 MB for .Net framework 2.0 (32-bit version) 600 MB for .Net framework 2.0 (64-bit version)
10MB for Settings Utility, plus add (if not already installed):
Utilities
Microsoft Data Access Components (MDAC) version 2.5 or later .Net Framework 2.0 will be installed for Settings Utility, if needed
21
Before you install the CPS software Web Restore Server Component requirements (continued) Item Utilities Description Microsoft Data Access Components (MDAC) version 2.5 or later
Microsoft Windows 2000 Professional with Service Pack 4 Microsoft Windows 2000 Server with Service Pack 4 Microsoft Windows 2000 Advanced Server with Service Pack 4 Microsoft Windows Server 2003 family (including R2, but not Data Center) with Service Pack 1 Microsoft Windows XP Professional Service Pack 1 or later
Supported Browsers
Internet Explorer (6.0 or later). Backup Exec Retrieve also works with other Internet browsers, although screen layouts and other functionality may vary Backup Exec Continuous Protection Server Administrators Guide
22
Firewall support
Firewalls must be configured to allow the following ports through to support CPS. To change the ports, see About the Settings Utility tunable parameters on page 66. Note If any of the default port settings are changed on one computer, they must be changed on all computers in the CPS Backup Group.
Continuous Protection Server default port settings Service Name Default Port Port Type Number 1804 UDP Editable Registry Key
HKLM\Software\Symantec\ENL\Network.TC PIP HKLM\Software\Symantec\Backup Exec CPS\Parameters\Communications\FFXport HKLM\Software\Symantec\Backup Exec CPS\Parameters\RPC Interface\RxRsaStaticPort HKLM\Software\Symantec\Backup Exec CPS\Parameters\RPC Interface\RxRmsStaticPort To change the Web Restore Server Component port numbers, see the following TechNote http://support.veritas.com/docs/278249.
20481
TCP
CPA RPC
20483
TCP
CMS RPC
20485
TCP
TCP
23
What gets installed and where Continuous Protection Server default port settings (continued) Service Name Default Port Port Type Number TCP Editable Registry Key
To change the Web Restore Server Component port numbers, see the following TechNote http://support.veritas.com/docs/278249
Additionally, the CPS Services Manager, push-install, and Settings Utility utilize Windows file sharing (NetBIOS or SMB) ports. In order for these services to function, the following ports must be configured. Caution Symantec recommends that you do not open these ports to the Internet.
Service Name
No
No
Note CPS also uses the following ports on the local server: 2638, 90009003, 10000, 13730, 14300 and 20487. Because these ports are only used on the local server, it is not necessary (or recommended) that they be opened through your firewall. Related Topics: Configuring registry entries on page 65
24
Folder Name
Description
ASA (Adaptive The ASA folder contains two folders: Win32 and Charsets. The Win32 folder Server Anywhere) contains the ASA database engine and its backup files, DBMS service, ASA support files, and ASA query tool. The database backup (cpsDBBackup.exe) and validation (cpsDBValidate.exe) utilities are also contained in this folder. The Charsets folder contains ASA Unicode support files. Autonomy CPS uses a third-party indexing service that is called Autonomy. The Autonomy folder contains all the files and services that are used by the indexing service. The Autonomy log files are also maintained in this folder. The Database folder contains the CMS (rms.db) and CPA (rsa.db) databases, their backup copies, and the related database files. The Drivers folder contains the CPS filter driver. The Install folder contains CPS, Remote Agent, and Symantec LiveUpdate installation files for push installs. The Services folder contains CPS service executable files and associated support files. The Logs folder contains the Network Helper (ENL) log and trace logs.
Database
Drivers Install
Services
Logs
25
Description This service is the CMS service and is present only on the server hosting the CMS. It manages the configuration for all Backup Exec Continuous Protection Agents in the Backup Group. This service is the CPA service and is present on all servers on which the CPA is installed. It enables CPS to back up data from the server or move the backed-up data on the server. This service allows communication between CPS and Backup Exec to facilitate continuous protection of Microsoft Exchange transaction logs. This service communicates with Volume Shadow Services to save and store the Continuous Protection Servers configuration information. This service controls the configuration database for all CPS information. This service captures system information and file share information.
RxRSA
RepBrokerSvc
Backup Exec Continuous rxWriterSvc Protection Configuration Writer Backup Exec Continuous Protection Database RxASA
Backup Exec Continuous RxNoService Protection System State Manager Backup Exec Continuous Protection Network Helper (ENL) Backup Exec Continuous Protection Indexing Service ENL
This service enables the CMS to group and discover CPAs and communicate with them.
SUIR
This service indexes files backed up using CPS and presents these files after a search operation from the Web Retrieval Interface or the Administration Console. This service controls the CPS Web Restore backend interface.
RxWRG
26
Service Name Backup Exec Continuous Protection Web Restore Frontend VERITAS Web Server
Description This service controls the CPS Web Restore frontend interface.
VRTSweb
Registry entries
CPS adds a number of keys to the registry. Some of the CPS registry locations are as follows:
HKLM\SOFTWARE\Symantec\Backup Exec CPS This location stores information about the journal directories, CPS installation path, CMS database installation directory, CPS parameters, and CPS build details.
HKLM\SYSTEM\CurrentControlSet\Services\ This location stores information about the CPS database technology (Adaptive Server Anywhere, version 9), file system filter driver, file system journal writer driver, and the file system recognizer driver configuration.
Registry entries can be changed using the Settings Utility (see Accessing and viewing the Settings Utility on page 65).
A server that has the Continuous Management Service (CMS), the Continuous Protection Agent (CPA), the Administration Console, the Web Restore Server Component, and Indexing Component installed. This server becomes the central management point in the Backup Group. A Continuous Protection Agent on each Business and Protection Server with the Indexing Component installed on each Protection Server. Any number of Administration Consoles.
27
Note The CMS components can be installed on a Backup Exec Media Server or on a stand-alone server. If CPS is installed on a Media Server, then that Backup Exec installation must be upgraded to Backup Exec version 11d. If CPS is installed on a stand-alone server, then the 11d version of Remote Agent is also installed. A Remote Agent is not installed on a Media Server. The first step in creating a fully functional environment is configuring the server that hosts the CMS. Establishing the CMS is usually accomplished by performing an initial installation from the CD. CPS application files that should be installed during the initial installation include the Continuous Management Service (CMS) and an Administration Console. If the server hosting the CMS will also be a Business or Protection Server, a Continuous Protection Agent (CPA) must also be installed. The Web Restore Server Component, Indexing Component, and the SmartLink application are also installed. The Remote Agent is installed optionally during the initial installation with a CPA. Symantec LiveUpdate is installed automatically with an Administration Console. Firewalls need to be manually reconfigured for CD installation and push installation. Alternatively, firewalls can be turned off during the installation process. For additional information on configuring firewalls for CPS installation, see Firewall support on page 23 and About the Settings Utility tunable parameters on page 66. To use the versioning capabilities of Backup Exec Retrieve, Protection Servers must be running Windows Server 2003. See System Requirements for Continuous Management Service and Protection Servers on page 20. Note After installing Continuous Protection Server on a computer running Windows Server 2003, you might receive an error message that the Network Load Balancing Service failed to start. Microsoft reports the cause as: Although network Load Balancing (NLB) is not currently installed, some NLB registry keys might be present in the registry. Although Microsoft Knowledge Base Article 268437 describes the problem as applying to Windows 2000 Advanced Server, the fix also works for Windows Server 2003. For additional information, go to the Microsoft Web site (http://www.microsoft.com), and search for the article Network Load Balancing, Windows 2000 Advanced Server.
To perform an initial installation: 1. Close all other programs that may be running. 2. If Autoplay is enabled, the Browser.exe should automatically launch when the CD-ROM is inserted in the drive. If Autoplay is not enabled, double-click the Browser.exe file from the CD-ROM or download directory.
28
3. Select the language, and then click OK. 4. The welcome screen for Backup Exec Continuous Protection Server CD provides links to access various areas of the installation CD. After reviewing the various product information, click Forward. 5. The Backup Exec Continuous Protection Server Environment Check will start. Do one of the following:
If the Environment Check does not reveal any issues that may prevent a successful installation of CPS, click Next. If the Environment Check reveals issues that may prevent a successful installation of CPS, click Cancel to exit the wizard. Correct the issues before attempting to install again.
Click Next. 6. Select Start theBackup Exec Continuous Protection Server Installation to install CPS. CPS will determine whether the computer is a 32-bit or 64-bit server and install the appropriate version of the software. Click Next to continue. 7. Review the CPS Installation Wizard welcome screen, and then click Next. 8. Read and accept the license agreement on the License Agreement screen, and then click Next. 9. Select one of the following methods to enter license keys:
Type a license key into the license key field. Click Add. Repeat for each license key for each option or agent you want to add. Click Import. Select the cpssernum.xml file. Leave the license key field blank. Proceed to step 12.
10. Click Next. The license keys you entered are saved to the cpssernum.xml file, located in the Windows or WINNT directory.
29
11. On the Local Features screen, select the CPS components to be installed as follows:
Administration Console
Check to install an Administration Console that allows for the management and monitoring of activities within the Backup Group. This option will also install Symantec LiveUpdate 3.0. Check to install the CPS Settings Utility, which allows changes to be made to various registry settings on this computer. If it is not already installed, this option will also install .net framework 2.0.
Settings Utility
Push install Support Check this option to install the files needed to push install other components. The options are:
x86 Support to install components needed to push-install to 32-bit computers. x64 Support to install components needed to push-install to 64-bit computers.
Continuous Check to install a CMS, which must be installed to create and manage Management Service the Backup Group. Note Only one CMS may be installed in each Backup Group, and it must be installed before other CPS components. Web Restore Server Check this component to allow end users to view and restore files via Components their Web browser. Continuous Protection Agent Check this option to install a CPA on the computer. Note A CPA must be installed on all computers that will act as Business Servers or Protection Servers.
Indexing Component Check this option to allow files stored on this server to be indexed and searchable. Backup Exec Remote Check this option to perform an install of the Remote Agent on the Agent for Windows local computer. Systems Exchange Protection Check this option to allow for continuous protection of Microsoft Agent Exchange Servers. Note An Exchange Protection Agent must be installed with the CMS, and a CPA must be installed on the Backup Exec Managed Media Server. Note An Exchange Protection Agent must be installed with the Remote Agent as well as a CPA on the Microsoft Exchange system.
30
12. Click Next. 13. On the Backup Group screen, enter a name of the Backup Group and the name of the Continuous Management Service. Click Next to continue. When you click Next, you may be prompted with a Windows Security Alert screen with options of Keep Blocking, Unblock, or Ask Me Later. This security screen is displayed due to the installer looking for an existing Continuous Management Service that already has the specified Backup Group name registered. Select Unblock to continue. 14. On the Services screen, enter the credentials for the Backup Exec CPS Service Account, including user name, password and domain. For additional information, see Understanding the CPS service account on page 140. 15. If a CMS was selected for this installation and the CMS server has multiple NIC cards, the Network Interface Selection screen is shown. Select the Network interface to use for the Backup Group management and verify the displayed settings. Click Next to continue. 16. On the Support Folder screen, accept the default directories or change the directories for the following:.
Select or browse to the directory where CPS can store System Information (System State and Shadow Copy Components) data to be backed up. The System Cache is a holding area for the system information and share information. At a minimum, System information requires at least 2 GB of disk space. If the server performs additional roles, such as also acting as a domain controller, more space is required.
Journal Directory
Select the default journal directory or browse to another directory to hold the backup journals. The Journal Folders contain the dynamic changes of the data that occur during continuous backups. Select the default directory or browse to another directory to hold the indexing database. The indexing component holds indexes of the snapshots that are captured on the Protection Server.
Indexing Directory
Symantec recommends that these directories be on separate volumes. 17. Click Next. 18. On the Ready to Install the Program screen, review the selections, and then click Install.
Chapter 2, Installing Continuous Protection Server 31
19. Following the CPS installation, you are prompted to restart the computer. Click Yes to complete the installation. Note If a CPA was installed, you must restart the server after the initial installation. The restart ensures that the filter driver is correctly installed and ensures proper detection of all open files. If you use the Microsoft Shutdown Event Tracker, you must restart the server manually after installation.
To push install a CPS component: 1. Start the CPS Administration Console using the shortcut in the Start menu: Start > Programs > Symantec > Backup Exec CPS > Backup Exec CPS Console. 2. On the navigation bar, click Setup. 3. From the Server Tasks pane, select Push install CPS components using wizard. 4. Review the introduction on the Welcome to the Push Install CPS Components Wizard screen, and then click Next to continue. 5. On the Select a Computer screen, type or browse to the name of the computer on which to install the components. Alternatively, type the IP address for the computer. Click Next to continue. If the computer to which the components are installed is located on a different subnet, naming services such as Dynamic Name Service (DNS) or Windows Internet Naming Service (WINS) must be established across the routes for proper product operation and communication to occur.
32
6. On the Select Components screen, use the check boxes to designate the components you want to install. The options are to install a Continuous Protection Agent (with or without a Remote Agent or Indexing Component) or Administration Console (with or without Symantec LiveUpdate or the Settings Utility), or both. By default, all options are pre-selected for installation. Click Next to continue. For optimal performance, some CPS components should be installed in separate volumes from one another. The Journal Folder, Indexing Component, Backup Destination, and System volume should all be in separate volumes. 7. Enter the Credentials for the Backup Exec CPS Service Account, including user name, password and domain. For additional information, see Understanding the CPS service account on page 140. 8. Enter the license keys provided, and click Next to continue. 9. On the Local System Object Cache Path screen, select or browse to the directory where CPS can store System Information (System State and Shadow Copy Components) data to be backed up. The Local System Object Cache is a holding area for the system information and share information. Click Next. At a minimum, System Information will require at least 2 GB of disk space. If the server performs additional roles, such as also acting as a domain controller, more space is required. 10. On the Select Journal Path screen, select the default journal directory or browse to another directory to hold the backup journals. The Journal Folders contain the dynamic changes that occur during continuous backups. Click Next. 11. On the Select Indexing Database Path screen, select the default directory or browse to another directory to hold the indexing database. The indexing component holds indexes of the snapshots that are captured on the Protection Server. Click Next. 12. Type or browse to the installation path on the remote computer where the services will be installed. Installation must occur on one of the drives that are shown in the drop-down list although the rest of the path may be modified. Click Next to continue. If a Protection Agent is being installed, the server must be restarted for the installation to complete. Select Restart the computer if required for this to occur automatically at the end of the installation. If not, the system must be manually restarted before this server is part of the Backup Group. 13. On the Push Install Summary screen, verify that the settings are satisfactory, and then click Next.
33
14. On the Completing the Push Install CPS Components Wizard screen, click Finish to begin the installation. A screen appears showing the installation progress. 15. Verify that the Protection Agent was properly installed by noting that the Business Server shows in the server list on the Servers tab. Please note that this step may take some time due to the configuration and system restart. The server you add to the CPS Backup Group must be restarted. If you use Microsofts Shutdown Event Tracker, you must restart the server manually after installation.
To upgrade to CPS 11d: 1. Before performing the upgrade, close all other programs that may be running. 2. Insert the CPS 11d CD into the CD-ROM drive. If AutoPlay is not enabled, navigate the installation CD and double-click browser.exe. This will open the welcome screen of the Continuous Protection Server installation wizard. If earlier versions of CPS or Replication Exec are detected, a prompt will appear noting that the earlier versions must be manually uninstalled before CPS 11d can be installed. 3. Click Update to continue. 4. If upgrading a CPA, when prompted, enter the license keys for the CPS 11d product, and click Next to continue. The installation wizard will detect which earlier components are already installed on that server, and update them to CPS 11d.
34
As soon as CPS 11d is installed on one server, the Console running on that server can be used to install or update CPA's and Consoles to other remote servers. Note When upgrading a CPS or Replication Exec database, all job schedules are disabled to allow CPAs to be upgraded before the CMS attempts to start the scheduled jobs. As soon as the CPAs are upgraded, the job schedules must be re-enabled from the Console.
To uninstall the Continuous Management Service: 1. From the Windows Start menu, click Control Panel. 2. Select Add or Remove Programs. 3. In the Currently Installed Programs list, select Continuous Protection Server. 4. Click Remove. 5. Click Yes to confirm that you want to remove the program. 6. A message prompts you to verify that you want to remove all data associated with Backup Exec Continuous Protection Server, which includes CMS or CPA databases, data stored within backup destinations, web restore indexing database, and the local data cache. Select Yes to all removal of all data, or select No to remove the data manually after uninstall has completed. 7. Restart the server to complete the software removal process.
35
Note A system restart is not required unless you are also uninstalling a CPA. If you are uninstalling all components and Symantec LiveUpdate is not required for any other installed applications, it will be uninstalled automatically. The Remote Agent and .net framework 2.0 will not be uninstalled. If they are not required for any other Symantec products they may be uninstalled manually.
Snapshots cannot be deleted after a Protection Server is uninstalled. Before uninstalling a Protection Server, you need to delete all snapshots. See Deleting snapshots on page 63. After the Protection Server is uninstalled, snapshots must be manually deleted. If a Business Server or Protection Server is being removed from a Backup Group, you must first uninstall the software from the server, and then the server can be removed from the Backup Group.
To uninstall Continuous Protection Agent: 1. From the Windows Start menu, click Control Panel. 2. On the Control Panel, select Add or Remove Programs. 3. In the Currently Installed Programs list, select Continuous Protection Server. 4. Click Remove. 5. Click Yes to confirm that you want to remove the program. 6. Click Yes to restart the server. 7. From an Administration Console, perform the following to delete the unavailable Business Server:
On the navigation bar, click Setup. In the selection pane, click Servers. In the results pane, right-click the unavailable source, and then click Delete Unavailable Server.
36
The data that is located on the backup destination and all the snapshots are not removed during the uninstall process. Snapshots should be deleted manually before uninstalling the CPA. If the CPA is uninstalled, the user will be prompted to reboot after the uninstall is completed.
37
38
Chapter
About the CPS Administration Console on page 39 Starting CPS and accessing the Administration Console on page 39 About the general Administration Console features on page 40 About the Administration Console views on page 42
Add servers to the Backup Group. Designate servers that will receive the backup data (Protection Servers). Create and schedule backup jobs. Create restore jobs. Monitor jobs. View alerts.
To start the CPS Administration Console: 1. From the Windows Start menu, select Programs (or All Programs), and then Symantec, Backup Exec CPS. 2. Click Backup Exec CPS Console. Note You can add the option to the Start menu and access it from there. To do so, right-click Backup Exec CPS Console, and then click Pin to Start menu.
General CPS Administration Console features Feature Menu bar Description You can access Continuous Protection Server features using the menu bar that appears across the top of the Administration Console window. All features, menu options, wizards, and online help can be accessed using navigation buttons and links in the Console. However, the menu bar offers a traditional approach to using the programs features. Some options are available only after an item is selected. The navigation bar groups together common tasks you can perform. It appears under the menu bar across the top of the Administration Console window. The navigation bar buttons always appear in the same place and in the same order. The contents of the task pane will change based on the view you select from the navigation bar. A list of tasks you can perform at any given time appears on the left side of the Administration Console window. Using the View menu, you can show or hide the task pane at any time. Using the arrow, you can show or hide task groupings within the task pane at any time as well. You can select the item you want to work with from the selection pane. After the item is selected, all associated features are enabled. The selection pane appears to the right of the task pane. However, if you hide the task pane, the selection pane appears on the left side of the Administration Console window.
Navigation bar
Task pane
Selection pane
40
About the general Administration Console features General CPS Administration Console features (continued) Feature Preview pane Description In the Preview pane in the bottom-right corner of the window, detailed information appears about the items that are selected in the results pane. You can show or hide the Preview pane using the View menu or by dragging the divider to a new position. The status bar provides computer processing information about the task being performed. It appears across the bottom of the Administration Console window. You can show or hide the status bar at any time using the View menu.
Status bar
41
About the Administration Console views Administration Console Features Main menu bar Navigation bar Results pane
Task pane
Selection pane
Preview pane
Status bar
Overview view
You can access the Getting Started, CPS Assistant, or System Summary views from the Overview view. Getting Started view This view provides information about the processes required to set up and use Continuous Protection Server. The Getting Started view also provides links to the Backup Exec Retrieve feature, alerts and notifications, and product updates and patches. CPS Assistant view This view provides links to information about the setup, use, and support of Continuous Protection Server. The information desk provides links to information about:
Documentation, getting started, configuration and CPS wizards. CPS Technical Support Web sites and Knowledge Base. Symantec learning tools and sites.
System Summary View This view displays information about backup jobs, CPS alerts, and backup servers. This view also enables you to get a comprehensive summary of your Backup Group and backup jobs.
Setup view
This view enables you to perform many of the functions of Continuous Protection Server, including setting up servers, backup destinations, and backup jobs. You can also create and view snapshots in this view. Common tasks that are shown in the task pane for the Setup view are as follows.
Task pane options of the Setup View Task Push install CPS components using wizard Description Allows you to push-install additional Continuous Protection Agents, CPS Administration Consoles, or both.
43
About the Administration Console views Task pane options of the Setup View Task New backup destination Description Allows you to configure servers within the Backup Group to be the Protection Servers of backup jobs. Allows you to use the Backup Destination Wizard to designate servers within the Backup Group as Protection Servers for backup jobs. Allows you to view the snapshot history for a given backup destination by launching the Backup Destination Properties window. This option is only available if a specific Backup Destination is selected in the results pane. Allows you to create snapshots for the selected backup destinations. This option is only available if a specific Backup Destination is selected in the results pane. Allows you to create a new backup job manually. Allows you to create a new backup job using the New Backup Job Wizard.
View snapshots
44
Feature Volumes
Description Provides specific information on the available volumes of the server, including volume name (drive), file system type, total capacity, and free space. Provides a check box to remove server logs after a designated number of days. Provides the license key information for the selected server, including the type, the actual license key, and the days remaining for evaluation and demonstration keys. A text box is included to enter a new license key.
Advanced
License keys
History Server Log Provides a log of activity for the specified server. The log can be filtered to show entries for the last 24 hours, last 7 days, or all entries. The server history log shows the date/time and description of each log entry.
45
Description
Provides information on the backup destination, including backup destination name, description, server name, and path.
Snapshot Schedule Provides the schedule when snapshots are taken. The schedule allows specific days of the week and snapshot frequency to be specified. Allows the retention of snapshots to be set. The retention policy defines how long snapshots are retained. For example, snapshots are retained for a given number of hours, and a specified number retained per day, per week, or per month.
Retention Policy
History Snapshots Provides a list of snapshots for the specified backup destination, including the date, age, and Indexing State of each snapshot. Buttons are also included to create a new snapshot or to delete one of the existing snapshots on the destination.
Description
Provides specific information on the backup job, including backup job name, description, and Protection Server details.
Backup Selections Allows you to select the specific backup server, volumes, and System Information to be backed up. Schedule Allows you to specify when the backup job will run. The options are to run the job whenever a file changes, according to a schedule, or manually.
46
Feature Bandwidth
Description Allows you to add or modify the bandwidth limitation for a specified job. This screen allows you to specify the Business Server, and the bandwidth usage for a selected network connection. Allows you to specify a command script to be run before or after the backup job. You may enter or browse to the script. A limiting feature allows the script to be cancelled if not completed after a specified amount of time (minutes). A check box allows you to enable the script asynchronously with the backup job.
Commands
Restore view
This view enables you to search for or select files to restore, and is the best way to restore large sets of files. You can filter the list of files by specific points in time or view all versions of backed up files. If a small number of files need to be restored, use Backup Exec Retrieve.
Alerts view
This view enables you to respond to notification about the status of the CPS jobs on all servers. In the event that a job does not run successfully, you can read a message that alerts you to the problem encountered. Various levels of errors, warnings, and information are built into Continuous Protection Server to enable you to manage your backup jobs successfully. Selecting Properties for the Alerts view provides detailed information on the selected alerts.
47
48
Chapter
Configuring Business Servers on page 49 Moving servers between Backup Groups on page 51 Managing the CPS Services on page 53 Managing backup destinations on page 54 Managing snapshots on page 58 Configuring registry entries on page 65
To configure Business Servers: 1. On the navigation bar, click Setup. 2. In the selection pane, click Servers. 3. In the results pane, right-click the server, and then click Properties.
49
Server
The servers name, which comes from the system information on the computer. The servers status (online, offline, or unavailable). The Internet Protocol (IP) address used by CPS when communicating with this computer. Directory location of the computers in this network. The operating system that is installed on this computer. The build number of the CPS software that is installed on this computer. Indicates whether a CMS, CPA, or both are installed on this computer. Indicates the international time zone where this computer is located. Indicates the ports that this server is currently using.
Status IP address
Installed Components
Time Zone
Ports in use
Name
The Name of the Windows NT volume on this server where backup files from a Business Server are stored. The file system that is used when formatting the volume (usually NTFS). The number of bytes of disk space that are associated with the server. The number of bytes of disk space that are currently available for use on the server.
File System
Total Capacity
Free Space
6. Under Settings, click Advanced. 7. To define the number of days to save the backup records, check Remove log records after (days). Then enter the number of days to keep the records.
50
8. Under Settings, click license keys, and then define the appropriate options as follows:
license key of installed Continuous Protection Server software, including demonstration licenses and permanent licenses. To delete a license key, such as an evaluation license key, select the license key, and then click Remove. New Continuous Protection Server software license number. To add a new license, such as when upgrading to a permanent license, type the new software license number, and then click Add.
9. Under History, click Server Log, and then define the appropriate options as follows:
Show entries
Time
Date and time the log record was written. The time is converted to your local time for display purposes. Information about the server log entry or a note for the administrator, such as the number of days remaining in a license period.
Description
51
Note When a new Backup Group is created, it must have a unique name and unique CMS. Each Backup Group can only have one CMS. As soon as a new Backup Group has been created, the Business Servers and Protection Servers can be migrated to the new group.
To move a server to a different Backup Group: 1. From an Administration Console installed in the original Backup Group, select the Server view. 2. Right-click a server, and then select Change Management Server. 3. On the Choose Change Management Server dialog box, type the name of the new CMS, and then click OK. The name cannot be the same as the existing CMS. Additionally, check the check box if you want to delete the job pairs and rules associated with the old CMS. 4. A warning is issued asking you to verify that you want to change the CMS and noting that the operation cannot be undone. Click Yes to proceed or No to cancel the operation. If you clicked Yes, the Administration Console that is still connected to the original CMS deletes all jobs that were involved with the server. If the job deletions were not successful, a message box is displayed noting the failure. Note As soon as a server has been moved to a different Backup group, all jobs involving that server must be recreated.
52
To stop or start CPS services: 1. On the Administration Console, on the Tools menu, click CPS Services. 2. Select the appropriate options as follows:
Server Type
Type the name of a server to add to the list, and then click Add. To import a list of servers, click Import List and select the file containing the server list. Click this option to start all CPS services for the selected server. Click this option to stop all CPS services for the selected server. Click this option to stop all CPS services and then restart the services for the selected server. Click this option to change Service Account information or to change the startup options. Click this option to refresh this dialog box. Click this option to remove a selected server or servers from the server list.
Services credentials
To change the services credentials: 1. Click Services credentials to display the Service Account Information screen. 2. In the Security Mode list box, select one of the following:
Domain
The user account that is entered must be a domain account that is recognized by every node that participates in backup. The account must be a member of the local administrator's group on the computer running the services. Symantec strongly recommends that customers use Domain mode, which is more secure than Workgroup mode. The user must have administrative credentials to run the CPS services. 53
Workgroup
A user account is not required to run in workgroup mode. Workgroup mode may be necessary for customers who are running outside of a Domain.
Note Every node in the Backup Group must be running in the same Mode. Related Topics:
CPS credentials and security issues on page 140 SetIntegratedLogin utility on page 156
Permissions for backup destination folders or permissions on objects within a backup destination should not be changed after backup jobs have been run. CPS cannot be used to back up a Protection Server's data to a backup destination on the same Protection Server. Backup destinations can only be created on a server that runs Windows 2003 Server operating system and has a Continuous Protection Agent (CPA) installed. In addition, only one backup destination is allowed for each logical volume or drive letter. Symantec recommends that CPS backup destinations be created on volumes separate from the Backup Exec backup-to-disk volumes to prevent redundant use of storage.
54
To add a backup destination: 1. On the navigation bar, click Setup. 2. In the task pane, under Backup Destination Tasks, click New backup destination. 3. Define the appropriate options as follows:
Backup destination name Abbreviated name of this backup destination. For example: SLOMKT1. Description Full name or brief description of this backup destination. For example: San Luis Obispo Marketing Presentations. Name of the server on which the backup destination resides. Leave the default server or select from a list of servers in the Backup Group. Note The server cannot be changed after the backup destination is saved. Path Location on the Protection Server where the backup files will be stored. Type or browse to the location of the backup destination in the Backup Group. Note The path cannot be changed after the backup destination is saved.
Server
4. Click OK.
55
To configure a backup destination for Shadow Storage: 1. Using Windows Explorer or My Computer, navigate to the drive containing the backup destination. For example, E:\. 2. Right-click the drive, and then select Properties. 3. Select the Shadow Copies tab. 4. Select the drive containing the backup destination. For example, E:\. 5. Click Settings. The Volume should indicate the drive E:\. 6. Under Storage Area, select the volume where Shadow Storage should be located. For example, select F:\. 7. Optionally, also modify the Maximum size of the storage area to accommodate its intended use. 8. Click Okay, and then click Okay again.
To rename a backup destination: 1. On the navigation bar, click Setup. 2. In the selection pane, click Backup Destinations. 3. In the results pane, right-click the backup destination, and then click Properties. 4. Edit the appropriate options as follows:
Backup destination name Abbreviated name of this backup destination. For example: SLOMKT1. Description Full name or brief description of this backup destination. For example: San Luis Obispo Marketing Presentations.
56
5. Click OK.
To delete a backup destination: 1. On the navigation bar, click Setup. 2. In the selection pane, click Backup Destinations. 3. In the results pane, right-click the backup destination, and then click Delete. 4. The Delete Backup Destination screen is displayed with the following options.
Delete all snapshots associated with Check this option to delete all snapshots automatically this Backup Destination when the backup destination is deleted. Open backup destination folder in explorer view Check this option to open Windows Explorer so that data may be deleted manually. Note In order to manually delete the data, you must have adequate permissions. Refer to Microsoft Windows security help.
57
Managing snapshots
Managing snapshots
A snapshot is a consistent, point-in-time image of the contents of the backup destination. Note Since snapshots are volume-based, any changes on the volume are captured in the snapshot, including the CPS data. Thus, to achieve maximum performance, you should create a volume that contains only a backup destination. Continuous backup jobs use a filter driver to capture changed bytes in the data files on the source and move the changed bytes to the backup destination whenever the information changes. CPS takes snapshots of the backup destination at scheduled intervals. Administrators schedule snapshots based on the importance of the data being backed up. End users can then select the specific versions of files to retrieve. The latest files on the backup destination can also be restored, although the latest version might not have been captured in a snapshot. Administrators define retention policies to save snapshots for specific periods of time. When the snapshot expires, it is removed automatically. If the destination reaches the limit of its disk space, the oldest snapshot is overwritten by new snapshots. However, when snapshots are deleted, the disk space may not be immediately freed. A history of the snapshots can be viewed and unnecessary snapshots can be manually deleted from within the CPS Administration Console. Additional notes on snapshots
Snapshots can be stored up to a limit that is determined by the underlying snapshot technology. This limit may vary considerably if alternative snapshot providers are installed. Snapshots that are scheduled to be taken over a period of time where the end time is earlier than the start time, may continue to be taken until the end time on the next day. For example, snapshots that are scheduled to run every 1 hour beginning at 8:00 A.M. and ending at 7:00 A.M. on Thursday, may result in snapshots being created until Friday at 7:00 A.M. When backing up data from a single Business Server to multiple backup destinations, the snapshot schedules should be consistent so that all files that are protected by CPS are included in the snapshots.
58
Managing snapshots
When scheduling snapshots, the minutes and seconds that are specified for the start and end times must be identical.
Related Topics: Web Restore Server Component on page 5 How Continuous Protection Server works on page 6 Indexing Component on page 5 Snapshot indexing states on page 63 Retrieving files using Backup Exec Retrieve on page 99
To create a snapshot on demand: 1. On the navigation bar, click Setup. 2. In the selection pane, click Backup Destinations. 3. In the results pane, select the backup destination. 4. In the task pane, under Backup Destination Tasks, click Create snapshot now. 5. Click Yes to confirm that you want to create the snapshot.
59
Managing snapshots
To schedule snapshots: 1. On the navigation bar, click Setup. 2. In the selection pane, click Backup Destinations. 3. In the results pane, right-click the backup destination, and then click Properties. 4. Under Snapshots, click Schedule. 5. Select one of the following snapshot schedule options. Snapshot schedules are always shown in the local time of the user who is creating the snapshot schedule. If snapshot schedules are created for servers that are located in other time zones, the specified time must be converted to your local time.
Select the check box next to each day you want the snapshot to be taken. Select and define a specific time for the snapshot to be taken. Select and define the intervals at which the snapshot is taken.
Run only at
Run
6. Click OK.
To change the snapshot schedule for a backup destination: 1. On the navigation bar, click Setup. 2. In the selection pane, click Backup destinations. 3. In the results pane, right-click the backup destination, and then click Properties. 4. Under Snapshot, click Schedule.
60
Managing snapshots
5. Select the appropriate options as follows. Snapshot schedules are always shown in the local time of the user creating the snapshot schedule. If snapshot schedules are created for servers that are located in other time zones, the specific time must be converted to your local time.
Days of the week on which snapshots are started. Select the check box next to each day you want snapshots to occur. Clear the check box next to the days you do not want snapshots to occur. For example: To take a snapshot daily, select all the days of the week. To take a snapshot at a specific time, select Run only at, and then indicate the time. For example: 1:00:00 A.M. To run the snapshot periodically, select Run, and then indicate the frequency, start time, and end time. For example: Run every 1 Hour from 8:00:00 A.M. to 5:00:00 P.M.
Frequency
6. Click OK.
To define a retention policy for a snapshot: 1. On the navigation bar, click Setup. 2. In the selection pane, click Backup Destinations. 3. In the results pane, right-click the backup destination, and then click Properties. 4. Under Snapshot, click Retention Policy. 5. Select the appropriate check boxes and options as follows.
The minimum duration that each snapshot is retained. Retain a daily snapshot for this period of time. The daily retained snapshot is the last snapshot of the day. 61
Managing snapshots
Retain a weekly snapshot for this period of time. The weekly retained snapshot is the last daily snapshot on the last day of the week. Retain a monthly snapshot for this period of time. The monthly retained snapshot is the last daily snapshot of the last day of the month.
If the volume becomes full, the operating system will delete snapshots. 6. Click OK.
To view snapshot history: 1. On the navigation bar, click Setup. 2. In the selection pane, click Backup Destinations. 3. In the results pane, right-click the backup destination, and then click Properties. 4. Under History, click Snapshots. If Show deleted snapshots is checked, two additional columns are added to the snapshot listings: the date deleted and the reason the snapshot was deleted. The possible reasons that a snapshot was deleted are as follows.
Policy
The snapshot retention policy expired and the snapshot was automatically deleted. The snapshot was manually deleted by a user. If the system is running out of disk space, the system might automatically delete snapshots to free up space.
Manual External
62
Managing snapshots
Not Indexed
Something went wrong during indexing and this snapshot has not been indexed This snapshot has been indexed. This snapshot is currently being indexed. This snapshot is queued to be indexed (only one snapshot is indexed at a time).
Deleting snapshots
Snapshots can be kept for a certain number of hours, days, weeks, or months before being automatically removed. Define the retention period to indicate the length of time snapshots are retained. If you need to free disk space on the destination, you can manually remove unnecessary snapshots. Note You can store snapshots up to a limit that is determined by your underlying snapshot technology. This limit may vary considerably if alternative snapshot providers are installed.
To manually delete snapshots: 1. On the navigation bar, click Setup. 2. In the selection pane, click Backup Destinations. 3. In the results pane, right-click the backup destination, and then click Properties. 4. Under History, click Snapshots.
63
Managing snapshots
5. In the Available snapshots for backup destination list, select the snapshot, and then click Delete. 6. Click Yes to confirm you want to delete the snapshot. 7. Click OK. Note Snapshots that are associated with a given backup destination can also be deleted when the backup destination itself is deleted. See Deleting backup destinations on page 57.
64
CPS trace and indexing logs Journal root directory Named Objects (System Cache) directory Job Retry Intervals Selected Network Interface TCP and UDP ports
Note The parameters that are included in the Settings Utility are often updated. For the most current list and description of configurable parameters, see the following TechNote: http://support.veritas.com/docs/283641.
Navigate to the CPS Services directory C:\Program Files\Symantec\Continuous Protection Server\Services, and double-click SettingsUtility.exe. From the Administration Console, select the Tools menu and then select Settings Utility.
Once accessed, the Symantec Continuous Protection Server 11d - Settings Utility screen displays the following.
Servers pane
The Servers selection pane shows all of the servers in the Backup Group. Select a server to view the existing parameters and values for that server.
65
Parameters pane
Location is the registry path for each parameter. Value Name is the specific name of the registry value. See About the Settings Utility tunable parameters on page 66. Current Value is the current value of the registry entry.
Refresh
Click Refresh button to update the values in the Parameter pane after making changes. Click Help button to learn more about the Settings Utility. Click Reset Defaults to restore all parameters to their original default values.
Help
Reset Defaults
66
Configuring registry entries Settings Utility Tunable Parameters (continued) Parameter Value Name BroadcastAddress Description Specifies the IPv6 Multicast address to which all discovery traffic is sent. The default value is ff02:0:0:0:0:0:0:1, which signifies all nodes on the local link. Caution Changes to this value will require the ENL and dependent services, such as the CMS, CPA, Broker Service, and Continuous Protection System State Manager Service, to be restarted. BroadcastHops Specifies the maximum number of router hops for IPv6 discovery broadcasts. The default value is 1. Caution Changes to this value will require the ENL and dependent services, such as the CMS, CPA, Broker Service, and Continuous Protection System State Manager Service, to be restarted. ConnectionPooling Enables ODBC connection pooling. The default value is 0. A 1 value enables connection pooling. Caution Changing this value requires that the CPS Database Service be restarted on the server. DaysToKeepAlertItems The number of days that alert items are kept on the server. The default value is 30. Note Changing this value will not require systems or services to be restarted. DaysToKeepDeletedSnapshots Specifies the number of days that deleted snapshot entries are kept on the server. The default value is 30 days. Note Changes to this value will not require systems or services to be restarted.
67
Configuring registry entries Settings Utility Tunable Parameters (continued) Parameter Value Name DelayDirChangeNotifications Description If set to 1, this parameter prevents the CPS filter driver from delaying the completion of Directory Change Notifications. The only time it is necessary is when the Windows Services for Macintosh (SFM) is running on the server where CPS is installed. Under conditions of heavy usage, SFM may fail if this setting is not made. However, there are no known issues with SFM after the setting is made. The default value is 1. Set a value of 0 only when the Microsoft Services for Macintosh is running on the system. Note Although making this setting will allow SFM to run, it will also create a problem for the Windows Simple Mail Transport Protocol (SMTP) service. It will prevent SMTP from picking up (i.e., noticing the appearance of) new mail items in its pickup folder. There is no way to get both SMTP and SFM working on the same system where CPS is installed. The user must make a choice as to which Windows service that will run. Caution Changing this value requires that the server be restarted. DoEventLog If this value is set to 1, certain internal errors in CPS components will write an entry in the Windows application event log. If it is set to 0, no event log entry will be written. The default value is 1. Note Changing this value will not require systems or services to be restarted. EnableDebugConsole For Symantec Technical Support use only. The default value is 0. Note Changing this value will not require systems or services to be restarted. EnableLogFile Enables trace logging. The default value is 1 to enable diagnostic trace logging, or 0 to disable. Note Changing this value will not require systems or services to be restarted. EnableTimestamp If this value is set to 1, a timestamp is printed on each line of diagnostic trace logs recorded by CPS components. The default value is 1. Note Changing this value will not require systems or services to be restarted.
68
Configuring registry entries Settings Utility Tunable Parameters (continued) Parameter Value Name FFXPort Description Continuous Protection Agent data port. The default value is 20481. Caution Changes to this value must be made on all computers in the Backup Group. In addition, the Continuous Protection Agent Service must be restarted on all computers. FilteredIDList Specifies a list of status or alert IDs that will be filtered from the Alert Database. The list should contain the IDs in either hexadecimal or decimal form separated by either commas or semicolons. Only new alerts will be filtered from the Alert Database after an addition to this list. No existing alerts will be removed from the database. The default value is an empty string. Caution Changing this value requires that the Continuous Protection Agent Service be restarted on the server. Gateway (ENL\Network.TCPIP) Either the host name, Fully Qualified Domain Name, or IP address of the ENL master. The default value is usually the CMS name. Caution Changes to this value will require the ENL and dependent services, such as the CMS, CPA, Broker Service, and Continuous Protection System State Manager Service, to be restarted. Gateway (ENL\Network.UDPv6) Either the host name, Fully Qualified Domain Name, or IP address of the ENL master. The default value is usually the CMS name. Caution Changes to this value will require the ENL and dependent services, such as the CMS, CPA, Broker Service, and Continuous Protection System State Manager Service, to be restarted. Gateway (ENL\System) Specifies whether or not this server will act as a router for ENL network traffic. The default value is Yes for a CMS computer and No for all non-CMS computers (except in special situations where a non-CMS may be used to route ENL traffic to a CMS on another subnet). Caution Changes to this value will require the ENL and dependent services, such as the CMS, CPA, Broker Service, and Continuous Protection System State Manager Service, to be restarted.
69
Configuring registry entries Settings Utility Tunable Parameters (continued) Parameter Value Name IndexingRoot Description Location of files that hold index information about the data that has been backed up by CPS. The location must have at least 120 MB of free space (1GB or more recommended). The default value is set by the CPS installer. Caution Changing this value will require that the Continuous Protection Indexing Service be restarted on the server. In addition, indexing files will be moved from their previous location to the newly specified path. JournalRoot Location of the dynamic changes of data during continuous backups. The location must have at least 120 MB of free space (10 GB or more recommended). The default value is set by the CPS installer. Caution Changing this value requires that the Continuous Protection Agent Service be restarted on the server. LogOpenFileTableOncePerSet Controls whether the filter driver writes a table of open file entries into the first outbound dynamic journal file only once (when a job starts), or writes this table at the start of every new outbound journal file. The default value is 0. Set to 1 if journal writing errors occur during continuous backup jobs owing to an Open File Table (OFT) overflow, as can happen on systems where a great many files are opened in rapid succession. Caution Changing this value requires that the system be restarted. LogPath Location of the CPS trace log files. The location must have at least 100 MB of free space. The location can be specified during installation, such as the following. C:\Program Files\Symantec\Continuous Protection Server\Logs Caution Changing this value requires that the Continuous Protection Agent Service be restarted on the server. LogPath (located in EFC) Specifies the directory where the ENL logs (efc.log) will be written to. The default value is set at install time. Caution Changes to this value will require the ENL and dependent services, such as the CMS, CPA, Broker Service, and Continuous Protection System State Manager Service, to be restarted.
70
Configuring registry entries Settings Utility Tunable Parameters (continued) Parameter Value Name LogText Description A complex hexadecimal mask used to specify the type of entries that will be written to the 'EFC.log' file. The default value is 0x00300100. A value of 0xFFFFFFFF signifies that All ENL logging information will be written to the log file. This optional setting can be useful in debugging situations, but will quickly create very large amounts of log data. Caution Changes to this value will require the ENL and dependent services, such as the CMS, CPA, Broker Service, and Continuous Protection System State Manager Service, to be restarted. Master (located in ENL\System) Specifies whether the ENL Service will start up in Master mode. The default value is Yes for a CMS computer and No otherwise. Caution Changes to this value will require the ENL and dependent services, such as the CMS, CPA, Broker Service, and Continuous Protection System State Manager Service, to be restarted. MaxDirSize The maximum number of files to show for a single directory in the Backup Exec Retrieve browse view. The default value is 10000. Note Changing this value will not require systems or services to be restarted. MaxLogSize The maximum size (in bytes) that the diagnostic trace log can grow before a new file is started. The default value is 10485760 (10 MB). Note Changing this value will not require systems or services to be restarted. MaxLogSize (ENL\System) The maximum size of the ENL log in bytes. Default is 1048576 bytes (1 MB). Caution Changing this value requires the ENL service and its dependent to be restarted.
71
Configuring registry entries Settings Utility Tunable Parameters (continued) Parameter Value Name MaxPacketSize (ENL\Network.TCPIP) Description Sets the maximum size for a UDP packet. Useful on networks that have a small MTU. The default value is 5924. Caution Changes to this value will require the ENL and dependent services, such as the CMS, CPA, Broker Service, and Continuous Protection System State Manager Service, to be restarted. MaxPacketSize (ENL\Network.UDPv6) Sets the maximum size for a UDP packet. Useful on networks that have a small MTU. The default value is 5924. Caution Changes to this value will require the ENL and dependent services, such as the CMS, CPA, Broker Service, and Continuous Protection System State Manager Service, to be restarted. MaxRAPerCentChange To change the maximum percentage difference in file size for region analysis (in percent). Larger values mean region analysis will still take place, even if file sizes differ by a larger percentage. The default value is 25. Caution Changing this value requires that the Continuous Protection Agent Service be restarted on the server. MinRASizeInKb To change the minimum file size for Region Analysis (in KB). The default value is 1024. Caution Changing this value requires that the Continuous Protection Agent Service be restarted on the server. MsBetweenRallyChecks This parameter specifies the time that a job will attempt to be restarted after it has failed. The default value is 120000 ms (2 minutes). Caution Changing this value requires that the Continuous Protection Agent Service be restarted on the server.
72
Configuring registry entries Settings Utility Tunable Parameters (continued) Parameter Value Name NamedObjectsRoot Description Holding location for the System State and share information. The location should have at least 100MB of free space (1GB or more recommended). The default value is set by the CPS installer. Caution Changing this value requires that the Continuous Protection Agent Service and Continuous Protection System State Manager Service must both be restarted on the server. In addition, named objects files will be moved from their previous location to the newly specified path. Netgroup (ENL\System) The name of the CPS Backup Group that this computer is associated. The default value (Backup Group) is set at install time. Caution Changes to this value will require the ENL and dependent services, such as the CMS, CPA, Broker Service, and Continuous Protection System State Manager Service, to be restarted. NeverDoRegionAnalysis To disable region analysis for all files, set this value to 1. When region analysis is disabled, files are synchronized by copying the entire source file to the target system. If both this value and AlwaysDoRegionAnalysis are set to 1, the AlwaysDoRegionAnalysis value takes precedence. The default value is 0. Caution Changing this value requires that the Continuous Protection Agent Service be restarted on the server. NumberOfLogs This parameter specifies the number of diagnostic trace log files to keep. When the number of trace log files exceeds this number, older log files are deleted. Set this value larger than the default value to preserve more logs, and contain more job history. The default value is 10. Note Changing this value will not require systems or services to be restarted. OutboundJournalCleanupSize Size of the journal at which a switchover to the next journal may begin. This value must be less than the journal size by at least 1MB. Note This value must be an exact multiple of 1 MB (1048576 bytes). The default value is 7340032 (7 MB). Caution Changing this value requires that the Continuous Protection Agent Service be restarted on the server.
73
Configuring registry entries Settings Utility Tunable Parameters (continued) Parameter Value Name OutboundJournalNominalSize Description This parameter is the default size in bytes of an outbound journal file when it is first created. The nominal size of journal files should be made larger than the default size only when necessary to avoid job cancellations owing to Open File Table (OFT) overflows. Note This value must be an exact multiple of 1 MB (1048576 bytes). The default value is 8388608 (8 MB). Caution Changing this value requires that the Continuous Protection Agent Service be restarted on the server. OutboundSyncJournalLimit If the number of outstanding sync journal files exceeds the OutboundSyncJournalLimit, the CPA service slows down the creation of sync journals during initial synchronization between two systems. The default value is 32. Caution Changing this value requires that the Continuous Protection Agent Service be restarted on the server. PreferredAddress (ENL\Network.TCPIP) Specifies the IP address that the node will use when registering with the name service. This value must be an IPv4 compatible IP address. The default value is an empty string. Caution Changes to this value will require the ENL and dependent services, such as the CMS, CPA, Broker Service, and Continuous Protection System State Manager Service, to be restarted. PreferredAddress (ENL\Network.UDPv6) Specifies the IP address that the node will use when registering with the name service. This value must be an IPv6 compatible IP address. The default value is an empty string. Caution Changes to this value will require the ENL and dependent services, such as the CMS, CPA, Broker Service, and Continuous Protection System State Manager Service, to be restarted. PreferredNIC (ENL\Network.TCPIP) Specifies the NIC that will be used to find the preferred IP address if it is not explicitly set through the PreferredAddress key. The preferred NIC is specified by the MAC address of the NIC. The default value is an empty string. Caution Changes to this value will require the ENL and dependent services, such as the CMS, CPA, Broker Service, and Continuous Protection System State Manager Service, to be restarted.
74
Configuring registry entries Settings Utility Tunable Parameters (continued) Parameter Value Name PreferredNIC (ENL\Network.UDPv6) Description Specifies the NIC that will be used to find the preferred IP address if it is not explicitly set through the PreferredAddress key. The preferred NIC is specified by the MAC address of the NIC. The default value is an empty string. Caution Changes to this value will require the ENL and dependent services, such as the CMS, CPA, Broker Service, and Continuous Protection System State Manager Service, to be restarted. ReservedFreeDiskSpace If the amount of free disk space on the volume containing CPS journals falls below this number of bytes, CPS jobs will be cancelled. The default value is 67108864 (64 MB). Caution Changing this value requires that the Continuous Protection Agent Service be restarted on the server. RxRmsStaticPort Continuous Management Service RPC port. The default value is 20485. Caution Changing this value must be made on all computers in the Backup Group. In addition, the Continuous Protection Agent Service must be restarted on all computers, and the Continuous Management Service must be restarted on the CMS server. RxRsaStaticPort Continuous Protection Agent RPC port. The default value is 20483. Caution Changing this value must be made on all computers in the Backup Group. In addition, the Continuous Protection Agent Service must be restarted on all computers. Schedule Specifies the frequency with which the System State Manager Service regenerates Named Object data. The default value is 0 3 5 4 0 1439. Note Changes to this value will not require systems or services to be restarted. SerializeIrpLogging Set this value to 1 to prevent the CPS filter driver from queueing too many i/o requests for journaling. The default value is 0. Set to 1 only on very slow, single-CPU systems if continuous backup jobs are failing owing to journal writing errors. Caution Changing this value will require that the system be restarted.
75
Configuring registry entries Settings Utility Tunable Parameters (continued) Parameter Value Name ShareInfoAsSingleComponent Description Groups all shares for a business server under a single entry for faster display and snapshot processing. The default value is 0 for multiple components. Set to 1 for single component. Note Changes to this value will not require systems or services to be restarted. Socket Specifies the UDP port used by ENL. Changing this value affects both the IPv4 and IPv6 functions of the ENL service. The default value is 1804. Caution Changes to this value must be made on all computers in the Backup Group. In addition, the ENL Service must be restarted on all computers. UsePrivateFindFileMethod Set this value to 0 to force CPS to use the standard Win32 methods of finding files. The default value is 1. Caution Changing this value requires that the Continuous Protection Agent Service be restarted on the server. Verbose (ENL\System) Changes the amount of data that will be sent to the ENL logs. Default value is No. A value of Yes will send much more detailed data to the ENL logs. Caution Changing this value requires the ENL service and its dependent to be restarted. VolumeLevel This parameter controls the level of detail shown in diagnostic trace log messages. A lower number means less detail. The default value is 1. Note Changing this value will not require systems or services to be restarted.
To change the tuning parameters: 1. Open the Settings Utility (see Accessing and viewing the Settings Utility on page 65). 2. In the Server pane, select the server for which you want to review or change a parameter value. 3. In the Parameters pane, double-click anywhere in the row of the parameter that you want to change, and then enter the new value. Click OK to continue. 4. Review the warning information, and then click OK to change the parameter value. 5. Restart the services or computers as noted in the warning prompt.
77
78
Chapter
Backing Up Data
About CPS data backups on page 79 Creating CPS backup jobs on page 80 Modifying backup job configurations on page 82 Starting, stopping, and canceling jobs manually on page 90
You can define exceptions to backup rules. For example, if you want to back up everything in the Marketing Proposals folder except temporary files, exceptions can be defined for the temporary files. Filter drivers capture changed bytes in files and copy the changed bytes to the destination. Snapshots of the destination are taken at regular intervals. Each snapshot is saved for 24 hours unless you specify otherwise. Scripts can be run before or after a backup job. Advanced settings are available for defining pre- and post-scripts to run before and after backup jobs. For example, you can close a database or run a virus scan on a folder before a backup job starts. Limiting bandwidth allows jobs to consume fewer resources. Advanced options are available for setting bandwidth restrictions.
79
Name and user description for the backup job. The backup destination. Location of the data to be backed up. Schedule for the backup to occur.
Before a backup job can be created, a backup destination must have already been defined (see Managing backup destinations on page 54).
80
To create a CPS backup job using the wizard: 1. From the navigation bar, click Setup. 2. In the task pane, under Backup Job Tasks, click New backup job using wizard. 3. Review the text on the Welcome to Backup Job Wizard screen, and then click Next. 4. On the Name the Backup Job screen, enter a name and optional description for the backup job. 5. On the Select a Backup Destination screen, select one of the defined backup destinations. This selection is the Protection Server where the data is backed up. (See Adding a backup destination on page 55.) 6. On the Select Data to Back Up screen, select the information you want to back up. Caution All regular shares are backed up automatically by the backup job. The share backup job backs up the information about the share, but not the underlying data for the share. If you want to back up the data that the share points to, you must select the folder containing that data when you configure the backup job. When you select the folder containing the data, the share and the data are both backed up. You can restore the data, the share information, or both. The data in the tree view is selected for inclusion or exclusion, and the status is reflected by the following icons.
Everything under this directory is selected for backup. Anything new added to this directory (or its subdirectories) is automatically selected for backup.
This directory is excluded from the backup. If this directory was previously backed up, it is removed from the backup destination. Some or all of the subdirectories of this node can be selected for backup. Anything new added to this directory may or may not automatically be backed up. For example, a folder may contain an exclude rule for *.exe. If the file word.exe is added to the folder, it is not backed up, but the file work.doc is backed up. This node has not been selected for backup, and neither have any of its subdirectories. Some subdirectories may have been excluded (see the red x), which causes them to be removed.
81
7. On the Select When to Backup screen, designate when the backup should occur. The options are:
Whenever a file changes This option initiates a continuous backup of the folder or file. That is, a file or folder is backed up whenever changes are made to it. This job starts as soon as the user clicks OK. According to a schedule This option enables you to set a regularly scheduled or periodic backup of the folder or file. If this option is selected, you need to define the backup schedule. This job starts if it is in the backup window and the user clicks OK. Note Backup job schedules are always shown in the local time of the user who is creating the backup job. If backup jobs are created for servers that are located in other time zones, you must convert that servers time to your local time. Initiate the backup job manually This option enables you to back up the contents of the folder or file on demand. This job will not start automatically.
The Completing the Backup Job Wizard screen indicates the completion of the backup job configuration. It also provides an option to create another backup job if wanted. 8. Verify that the backup job was created by observing that the Job shows on the list of jobs from the Job Monitor.
To access and modify the backup job configurations: 1. On the navigation bar, click Setup. 2. In the selection pane, click Backup Jobs. 3. In the results pane, right-click the backup job, and then click Properties.
82
To move a backup job to a different backup destination: 1. On the navigation bar, click Setup. 2. In the selection pane, click Backup Jobs. 3. In the results pane, right-click the backup job, and then click Properties. 4. In the Backup destination drop-down list, select the new backup destination for the job. 5. Click Ok to save the backup destination and run the job. Moving a job between backup destinations does not delete the data from the original backup destination. Instead, once the backup destination has been changed and the job run, a dialog is displayed informing the user of the change and allowing them to launch Windows Explorer to display the root folder of the original backup destination. From the Explorer window the user can delete the job data manually or leave it there. Also, when a backup destination resides on a remote computer, the admin share is used as a path to this folder.
83
You can add any combination of include and exclude filters to each backup selection. This enables you to select files to back up whose names match an arbitrary combination of patterns. For example, if you want to exclude all tmp files from the backup, except for those whose names contain the letter Q or the letter X, you can specify the following list of filters: Include *Q*.tmp Include *X*.tmp Exclude *.tmp Be sure to specify the parameters in the right order. Parameters are applied top-to-bottom as listed, and the first rule matching a file name is the one used to decide whether or not to back up a file. Note When initially adding a filter, you can enter a semi-colon delimited list to specify multiple filters to add. Each item on the list is added as a separate filter. If you later edit an existing filter, you are not able to add a semi-colon delimited list.
To include and exclude information from backup jobs: 1. On the navigation bar, click Setup. 2. In the selection pane, click Backup Jobs. 3. In the results pane, right-click the backup job, and then click Properties. 4. Under Settings, click Backup Selections. 5. Expand the tree to expose the files that are selected for the backup job. 6. Right-click the file or folder that is selected for the backup job, and then click Includes/Excludes. 7. Click Add.
84
Type
Include Exclude
Inclusive filters define the kinds of information to include. For example, if all temporary files are excluded from backups, you can include temporary files with the letter Q in the file name. Exclusive filters define the kinds of information to exclude. For example, if a marketing proposals folder is included in a backup, you can exclude the folders temporary files. The information you want to include or exclude is defined in the Filter field. Filter Criteria that specifies what information to include or exclude. For example, your backup selections include a marketing proposals folder, and you are excluding temporary files. The type of rule is Exclude and the filter is *.tmp. Use a semicolon-delimited list to add several items at once. Apply to Subdirectories Select the check box if the include or exclude filters apply to subdirectories of the backup selection.
9. Click OK. 10. If you want to change the priority of a filter, select the filter, and then click Move Up or Move Down. 11. Click OK. 12. On the Backup Job Properties dialog box, click OK.
To modify include and exclude filters: 1. On the navigation bar, click Setup. 2. In the selection pane, click Backup Jobs. 3. In the results pane, right-click the job, and then click Properties. 4. Under Settings, click Backup Selections.
85
5. Expand the tree to expose the files or folders that are selected for the backup job. 6. Right-click the file or folder that is selected for the backup job, and then click Includes/Excludes. 7. Select the filter, and then click Edit. 8. Select the appropriate options. 9. Click OK. 10. If you want to change the priority of a filter, select the filter, and then click Move Up or Move Down. 11. Click OK. 12. On the Backup Job Properties dialog box, click OK.
To delete included and excluded filters: 1. On the navigation bar, click Setup. 2. In the selection pane, click Backup Jobs. 3. In the results pane, right-click the job, and then click Properties. 4. Under Settings, click Backup Selections. 5. Expand the tree to expose the files or folders that are selected for the backup job. 6. Right-click the file or folder that is selected for the backup job, and then click Includes/Excludes. 7. Select the include or exclude filter, and then click Delete. 8. Confirm that you want to delete the selected include or exclude filter. 9. Click OK. 10. On the Backup Job Properties dialog box, click OK.
86
To change the schedule for a backup job: 1. On the navigation bar, click Setup. 2. In the selection pane, click Backup Jobs. 3. In the results pane, right-click the job, and then click Properties. 4. Under Settings, click Schedule. 5. Under Back up the selected files and folders, select the appropriate option as follows. For a description of the various backup job schedules, see About backup job schedules on page 10.
Whenever a file changes Initiates a continuous backup of the folder or file. According to a schedule Enables you to set a regularly scheduled or periodic backup of the folder or file. You need to define the backup schedule. Starts the backup job when manually stared from the CPS Console.
6. Click OK. 7. Under Back up the selected files and folders, select According to a schedule, and then click Edit Schedule. 8. Select the appropriate options as follows:
Select the days of the week you want to run the backup. Clear the check box next to the days you do not want the backup to run. For example: To back up daily, select all the days of the week. 87
Frequency
To run a scheduled backup at a specific time, select Run only at, and then indicate the time. To run the backup periodically, select Run, and then indicate the frequency, start time, and end time. For example: Run every 1 Hour from 8:00:00 A.M to 5:00:00 P.M.
9. Click OK, and then when the Backup Job Properties dialog box appears, click OK.
To limit bandwidth that is dedicated to a backup job: 1. On the navigation bar, click Setup. 2. In the selection pane, click Backup Jobs. 3. In the results pane, select the backup job. 4. In the task pane, under Backup Job Tasks, click Properties. 5. Under Settings, click Bandwidth. 6. Click Add. 7. Complete the appropriate options as follows:
Source server
Select the server from which the files are copied during the backup job.
Limit bandwidth usage to Select the bandwidth that is allocated to the backup job process. Network connection type Select the type of connection existing between the Business Server and Protection Server.
8. Click OK.
88 Backup Exec Continuous Protection Server Administrators Guide
To add a script that runs before or after backup jobs: 1. On the navigation bar, click Setup. 2. In the selection pane, click Backup Jobs. 3. In the results pane, select the backup job. 4. In the task pane, under Backup Job Tasks, click Properties. 5. Under Settings, click Commands. 6. To add a script that runs before or after the backup job, click Add, and then complete the appropriate options as follows:
Server Event
Select the server on which to run the script. Select when the script will run. Your choices are:
Pre-backup Post-backup
Script
Type the path to the script file that will run before or after this backup job. If necessary, you can browse to the file. Select the number of minutes before the backup job is canceled if not completed.
89
Run asynchronously
Check Run asynchronously to start a script and continue processing. To run the pre-command script to completion before starting the backup, or to run the backup to completion before starting the post-command script, clear the check box.
To start, stop, or cancel a job manually: 1. On the navigation bar, click Job Monitor. 2. In the Current Job Filter box, click one of the following:
90
Chapter
Restoring Data
Restoring files and directories on page 92. Restoring System Information on page 93. Restoring network shares on page 95.
Continuous Protection Server enables you to quickly restore information. Administrators can view all backups when selecting files to restore. Note Restore selections are used for the current session only. If you end a session without restoring selected files, the files must be selected again. Continuous Protection Server refreshes the selections at the end of a session to ensure that each user begins the restore job with a new record. If Business Servers in the Backup Group are running Microsoft Windows Server 2003, data can be restored back to the Business Servers directly from Backup Exec. If Business Servers are running under other operating systems, files from Backup Exec must be restored to a Protection Server, and then using CPS, the files may be restored to the Business Servers. For additional information on the interaction between CPS and Backup Exec, see Using CPS with Backup Exec on page 115. Related Topics: Retrieving files using Backup Exec Retrieve on page 99 Restoring CPS with Backup Exec on page 120
91
To restore files and directories: 1. On the navigation bar, click Restore. 2. In the selection pane, select the information to restore. 3. In the task pane, under Restore Tasks, click Restore files. 4. Define the appropriate options as follows:
Abbreviated name of this restore job. For example: SLOMKTProposals. Full name or brief description of the restore job. For example: San Luis Obispo Marketing Proposals Restore Job. Location where the selected files and folders will be copied. Your choices are:
Description
Restore to Options
Restore to original folder. Restores the selected files to the folder from which they originated. Redirect the restore to an alternate folder. Restores the selected files to the folder of your choice. Type the path to the folder in the text box.
Preserve folder structure Maintains the tree structure of the selected files and folders during the restore. This check box is enabled for redirected restore jobs. If this option is not selected, the contents of the restore directory are added to the alternate restore folder. Note When restoring directories containing reparse points, you must either select the Preserve folder structure option or restore the directory to an empty directory.
92
5. Click OK. 6. Click OK to clear the confirmation message. Related Topics: Restoring network shares on page 95
To restore System Information: 1. On the navigation bar, click Restore. 2. In the selection pane, select the System State or Shadow Copy Components. 3. In the task pane, under Restore Tasks, click Restore files. 4. Define the appropriate options as follows:
Abbreviated name of the restore job. For example: SLOSRCSystem. Full name or brief description of the restore job. For example: San Luis Obispo Source Server System State. System State will always be restored to its original location.
Description
Restore to
93
5. Click OK. 6. Click OK to clear the confirmation message. As soon as the System Information is restored, the server will automatically restart. Related Topics: How system information is protected on page 11 Backing up System Information in CPS on page 80
To restore System State to an Active Directory system: 1. On the navigation bar, click Restore. 2. In the selection pane, select System State. 3. In the task pane, under Restore Tasks, click Restore files. 4. Define the appropriate options as follows:
Restore job name
Abbreviated name of the restore job. For example: SLOSRCSystem. Full name or brief description of the restore job. For example: San Luis Obispo Source Server System State. System State will always be restored to its original location.
Description
Restore to
5. Click OK. 6. Click OK to clear the confirmation message. The computer will restart in DSRM mode.
94 Backup Exec Continuous Protection Server Administrators Guide
7. Log on using your DSRM password. 8. Double-click the symantec dsrm system state restore.bat file located on the Desktop. You can monitor the progress in the command window. As soon as the System State restore has completed, the server will automatically restart back in normal mode.
To restore network shares: 1. On the navigation bar, click Restore. 2. In the task pane, under Views, click Console restore. 3. In the results pane, select the restore job. 4. Do one of the following:
To restore the share only, in the selection tree pane, do not select any information to restore. To restore the data and the share, in the selection tree pane, select the files and folders to restore.
5. In the selection list pane, select the shared folder. Items in the list view belong to the share. Selecting items in the selection list pane restores the share. If any attribute in the share changes, the share must be disabled before restoring. Attributes appear in the Microsoft Windows Properties dialog box for the shared item and include the share name, comments, user limits, and permissions. 6. In the task pane, under Restore Tasks, click Restore files.
95
Abbreviated name of the restore job. For example: SLOMKTShare. Full name or brief description of the restore job. For example: San Luis Obispo Marketing Shared Folders. Location where the selected files and folders will be copied. Note Shares can only be restored to their original location, although the files in a share can be restored elsewhere.
Description
Restore to
Options
Restore to original folder. Restores the selected files to the folder from which they originated. Redirect the restore to an alternate folder. Restores the selected files to the folder of your choice. Type the path to the folder in the text box.
Preserve folder structure Maintains the tree structure of the selected files and folders during the restore. This check box is enabled for redirected restore jobs.
8. Click OK. 9. Click OK to clear the confirmation message. Related Topics: Restoring files and directories on page 92 Restoring System Information on page 93
96
Chapter
About Backup Exec Retrieve features on page 97 Security and credentials for Backup Exec Retrieve on page 98 Retrieving files using Backup Exec Retrieve on page 99 Using CPS with Backup Exec Desktop and Laptop Option on page 101
Continuous Protection Server allows users to restore files directly back to their workstation through Backup Exec Retrieve and a Web browser. Users can view and retrieve the contents of shared folders to which they have permission. Backup Exec Retrieve is optimized for Microsoft Internet Explorer (6.0 or later). Backup Exec Retrieve also works with other Internet browsers, although screen layouts may vary. Likewise, Backup Exec Retrieve uses Windows security and Internet Explorer download features. Thus, Backup Exec Retrieve is limited to Windows-based platforms. Note Backup Exec Retrieve is designed to enable users to restore their everyday office documents, PST files and the like. It is not designed to restore system databases or other system-level files. Likewise, users cannot delete files using Backup Exec Retrieve.
97
Browse
Recent Activity
security settings should be lowered at your own risk. By setting the Protection Server in IE as a trusted site, the higher level of security is maintained and the Backup Exec Retrieve appears correctly. Refer to the Microsoft Internet Explorer documentation for information about adding a trusted site to IE or changing the level of security. The site that should be added is: https://<CMSServerName>:8443.
To retrieve files using Backup Exec Retrieve: 1. In the Web browser address bar, type the URL of your Continuous Management Service. The default URL is https://<CMSServerName>:8443/BERetrieve. Where <CMSServerName> is the name of the server hosting the Continuous Management Service, and 8443 is the port number. The term BERetrieve at the end of the path is case sensitive. Contact your system administrator if you do not know the name of the CMS server. 2. If the standard Windows Security Alert screens are displayed, click Yes or OK to continue. 3. If a message appears with information about the security certificate, it is related to SSL Certificates. Click Yes to continue. 4. In the Backup Exec 11d Retrieve screen, enter the user name, password, and domain (or computer name if in a workgroup). Click Log on to continue. 5. In the Backup Exec Retrieve screen, select one of the following options to locate and specify the data to be retrieved:
The Search tab allows you to search for the data by file name. The Browse tab allows you to browse the backup data for the data.
99
The Recent Activity tab allows you to select data from the files that were recently modified or deleted.
6. Click Browse. 7. Click the computer name to display the folders that have been backed up. Subsequent clicks on the folder name allow you to navigate deeper into subdirectories. At any level, you can use the check box to select that folder and subordinate folders and files. The Versions field is added to the data listing whenever files are displayed. Click the versions icon to show all the versions of a particular file. 8. To view recently modified or deleted files, on the Recent Activity tab, do one of the following:
Click Recently Modified to view modified files. Click Recently Deleted to view deleted files.
9. Click Add to Download List to add the file to your list of data to be retrieved. Add more files to the download list using the Browse tab again. 10. As soon as all files are selected for retrieval, select the Download List tab to display a list of all files selected. 11. Click Download Selected Items. A download screen notes that the download will begin automatically. 12. Internet Explorer's standard File Download screen displays. Click Open (or Run) to download a small executable file (DownloadManager.exe) that restores the selected files. 13. The File Restore screen prompts for a directory where the files are restored. Select the default <user>\My Documents\Restored Files, or browse to a location. Click Next to begin the file retrieval. 14. Verify the files you selected were restored to the specified location.
100
101
102
Chapter
Viewing the job status on page 103 Viewing a job report on page 107 Managing CPS job alerts on page 109
You can monitor CPS jobs that are active, scheduled, or completed. The Job Monitor also allows you to manually start, stop, or cancel jobs. You can narrow the list of jobs by showing only jobs from the last seven days or the last 24 hours. The list of jobs that appears in the Job Monitor view can be filtered to include:
Likewise, each column in the Job Monitor view can be sorted and the columns can be rearranged by dragging a column heading to the left or right.
103
Business Server #3 to Protection Server #1 (i.e. 3:1) Business Server #4 to Protection Server #1 (i.e. 4:1) In CPS, the job represents the process that maintains the activity of each of the specific job pairs. You can view properties and change the status of an active job. The CPS job controls the job pairs and reflects what the job is supposed to be doing. The job pair states, however, reflect what is actually occurring.
Viewing the job status CPS job states (continued) Job State Canceled Description The job has canceled and all pairs have stopped running. Note A canceled job state does not affect the schedule of a job. That is, the job will run at the next scheduled time. Completed If the job is a scheduled, non-continuous job, all pairs have completed. Note If the job is continuous, the job never completes. A continuous job must be stopped or cancelled.
To view the status of a job and job pairs: 1. On the navigation bar, click Job Monitor. 2. To narrow or expand the job history, in the Job History Filter box, select one of the following:
105
Description
The name that was given for the job. The job type can be one of the following:
Status
For a description of the possible job statuses, see About job states on page 104. The instantaneous rate that the job is running. For example, 21 Kbytes/Second. The cumulative rate since the job (or pair) started. For example, 21.3 MB Indicates whether errors are associated with the job. Possible values are Yes or No. Indicates the number of errors or warnings to which no one responded. Indicates the type of schedule that was designated for the job. Indicates the time that the job was last started.
Transfer Rate
Transferred
Errors
Pairs in Job <JobName> status (indicated for the job that was selected in the upper results pane)
The name of the source computer. The name and path to the destination computer. For a description of the possible job statuses, see About job states on page 104. The instantaneous rate that the job is running. For example, 21 Kbytes/Second.
Transfer Rate
106
Description The cumulative rate since the job (or pair) started. For example, 21.3 MB Indicates the number of errors or warnings to which no one responded. Indicates the time that the job pair was started. Indicates the time when the job pair last stopped.
Transferred
To access and view the job report: 1. On the navigation bar, click Job Monitor. 2. In the results pane, select one or more jobs. 3. In the task pane, select View job report. A Job Report is generated and displayed in a separate window. 4. Expand the report headings by clicking the plus sign [+] to the left of the heading.
All CPS jobs are good One or more problems exist with the CPS jobs
107
Backup Job Selections Provides a list of the files and folders that are included and excluded Topic Box from the job. Backup Job Pre/Post Commands Topic Box Displays any pre- or post-commands that were assigned to the job. The information that is provided includes the server name, command, triggering event, whether the command is running asynchronously, and the timeout period. Contains CPS job log entries for the period since the job last ran. Note Job entries with warnings are displayed in orange text, and job entries with associated errors are shown in red text. Jobs with warnings or errors are also linked to the Symantec Support web site for possible solutions. One Backup Pair box exists for each pair of the associated CPS job. The title of the box is the name of the actual CPS pair. If there is an exception associated with the pair, the box title contains the state of the pair along with a description of the exception condition. Contains a summary of the pair at the time the job was run. It shows the source and destination server names, pair state, last started time, last stopped time, destination consistency, and destination latency. Note Destination latency can only be calculated when both servers in a pair are running Continuous Protection Server version 10d (or later).
Pair Header
108
Managing CPS job alerts Subordinate jobs topic boxes (continued) Topic Box Pair Log Topic Box Description Contains CPS pair log entries. Note Pair entries with warnings are displayed in orange text, and pair entries with associated errors are shown in red text. Pairs with warnings or errors are also linked to the Symantec Support Web site for possible solutions.
Alert history lists the alerts to which an administrator responded. Alerts remain in history for 30 days by default unless deleted manually. You can delete one alert, multiple alerts, or all alerts in history at once. When you view active alerts or alert history, you can change the order in which the information displays. The list can be sorted in ascending or descending order by any column. You can also change the order in which the columns display to view the information in order by:
To view and filter active alerts: 1. On the navigation bar, click Alerts. 2. Click Active Alerts. 3. To view details of a specific alert, in the selection pane, select the alert. The details appear in the preview pane. 4. In the Active Alerts Filter box, click one of the following:
5. To sort the list in ascending or descending order by any column, click the column heading. 6. To change the order in which columns display, click and drag a column to a new position in the list, and then drop it into place.
110
To view and filter alert history: 1. On the navigation bar, click Alerts. 2. Click Alert History. 3. In the Alert History Filter box, click one of the following:
4. To view details of a specific alert, in the selection pane, select the alert. The details appear in the preview pane. Alerts older than 30 days are removed by the system. 5. To sort the list in ascending or descending order of any column, click the column heading. 6. To change the order of the columns, click and drag a column to a new position in the list, and then drop it into place.
To view alert properties: 1. On the navigation bar, click Alerts. 2. Click one of the following:
3. In the selection pane, right-click the alert, and then click Properties. The Alert Properties dialog box provides the following options:
Business Server or Protection Server on which the alert occurred. Date and time the alert occurred. The time is the local time of the server. Name of the backup or restore job, if a job is associated with the alert. Alert text.
Job name
Message
To respond to an active alert: 1. On the navigation bar, click Alerts. 2. Click the Active Alerts tab. 3. In the selection pane, select the alerts that you wish to respond to. 4. Right-click the alerts, and then click Respond. 5. Click a response for the alert. To respond OK to all alerts selected, click Respond OK to All. If the alerts have an OK response available, they are cleared from the list and moved to alert history. If multiple alerts were selected, respond separately to each alert that displays.
112
To delete alerts from history: 1. On the navigation bar, click Alerts. 2. Click the Alert History tab. 3. In the selection pane, select the alerts you want to delete. 4. Right-click the alerts, and then click Delete. To delete all alerts from history, click Delete All. 5. Click Yes to confirm that you want to delete the selected alerts from the history.
113
114
Chapter
Protecting CPS with Backup Exec on page 116 Monitoring CPS Jobs in Backup Exec on page 122
Symantec Backup Exec for Windows Servers enables administrators to perform backup and restore operations between Continuous Protection Server (CPS) and Backup Exec. For example, CPS Protection Server data can be backed up to tape, which provides an additional layer of data protection as well as long-term storage of critical business data. Symantec provides full integration between Backup Exec and CPS, ensuring valid, reliable backup and recovery of the data, as well as a consistent user experience through both products. Using SmartLink technology, CPS jobs can be associated with existing Backup Exec jobs. Doing so enables you to view alerts and log entries for CPS jobs through the Backup Exec Administration Console. When jobs are created or modified, CPS data selections are made through a tree view in the Backup Exec Administration Console. Each server that is affiliated with CPS displays a Continuous Protection Server node from which CPS data can be selected. If a new Protection Server is added to the CPS Backup Group after backup jobs are created, you can add a new job or modify an existing job to capture CPS data from the new server. In the event of a system failure or data loss, Backup Exec enables you to restore data to the CPS Protection Server or a Business Server in the Backup Group. Additionally, SmartLink technology may be used to check the status of CPS backup jobs, and then view any alerts in Backup Exec. Otherwise, CPS jobs can be monitored independently through the CPS Administration Console.
115
CPS databases that contain information, such as CPS configuration settings, the CMS, and the indexing database. Protection Servers and Business Servers. File shares on Business Servers in the Backup Group. Data from specific volumes on Business Servers in the Backup Group. System-level files from Business Servers in the Backup Group.
Note Procedures for selecting data for backup or restore jobs in Backup Exec are detailed in the Symantec Backup Exec for Windows Servers Administrators Guide. Depending on the kind of data that is backed up, you can use Backup Exec to restore the data to the CPS Protection Server or the Business Server in the Backup Group from which it was backed up, or to redirect the data to an alternate destination. Related Topics: Backing up CPS with Backup Exec on page 117. Backing up the Continuous Management Service (CMS) on page 118. Backing up a Protection Server on page 118. Restoring the CPS Protection Server on page 121. Restoring a CPS Business Server on page 121.
116
CPS Databases
Protection Servers
Business Servers
Snapshots
Protecting CPS with Backup Exec Backup Job Properties selections screen
118
Backing up snapshots
Snapshots are created by CPS using Microsoft Volume Shadow Copy Service (VSS). They contain copies of the Backup Destination at various points in time. Depending on your configuration, a snapshot of the CPS Backup Destination may contain data from multiple Business Servers. It is not necessary to select the root of the Continuous Protection Server node or to back up snapshots regularly. Most of the data that is captured from snapshot to snapshot is redundant because the majority of the data on the server does not change between snapshots. Back up snapshots only as needed. For example, if a server is running out of disk space, it might be prudent to back up the oldest snapshot for archival. If you select to back up a snapshot and the snapshot is deleted before the job runs, the job fails with the message, Unable to attach. Edit the backup job to include a snapshot other than the one that was deleted, or remove the snapshot selection from the backup job.
119
Restoring the data to a Protection Server. Restoring the data directly back to the Business Server from which it was backed up.
Note When you restore CPS data, you must have rights to the selected servers. Create or modify restore jobs by selecting data on the Restore Job Properties Selections screen. The expanded Continuous Protection Server tree view includes the following elements.
Backup Destination
120
121
To set up a SmartLink connection between CPS and Backup Exec: 1. Create a backup job in CPS. 2. Create a backup job in Backup Exec that protects the backup destination of a CPS Protection Server. See Backing up CPS with Backup Exec on page 117. 3. On the CPS navigation bar, click Setup. 4. On the task pane, click Create SmartLink using wizard. 5. Review the information that displays, and then click Next. 6. When the Enter a Backup Exec Media Server screen opens, SmartLink checks the local server to determine if it is a Backup Exec media server. If it is, the local server name is posted in the text box. If the local server is not a Backup Exec media server (or the appropriate media server), enter the name of the server where the CPS backup job is located.
122
If a Backup Exec Central Administration Server (CAS) server is specified, SmartLink must be installed on all managed media servers that are selected for the job processing. Additionally, if SmartLink is run from a batch file, the batch file must exist on each managed media server where it might potentially be run. If the selected server is unavailable, a warning screen is posted. 7. Click Next to continue. 8. Enter the appropriate credentials for the selected server, and then click OK to continue. If the credentials are not valid for the specified server, a warning appears and the wizard does not proceed. For proper credentials, see CPS credentials and security issues on page 140. The credentials that are required to access the media server may not be valid to access the CPS Backup Group registry key on the Backup Exec media server. This registry key is required to verify that the media server is in the same Backup Group as the Continuous Management Server (CMS). If the credentials are not valid for the Backup Group registry key, a warning is presented that SmartLink is unable to determine the validity of the Group. If the credentials are valid, SmartLink determines the extent of the Backup Group. If the CMS and media server are in the same Backup Group, SmartLink proceeds. If the CMS and media server are not in the same Backup Group, SmartLink does not proceed. 9. Select the backup job to associate with the CPS job. Only the jobs that protect the backup destination appear in the Select a Backup Exec Job screen. 10. Select the CPS jobs to be monitored, and then click Next to continue. 11. To reduce the number of CPS job log entries, select Limit Log Entries and enter the maximum number of entries per individual CPS job and pair. Click Next. SmartLink determines the state of the CPS jobs and pairs, and enters the states into the Backup Exec Log entries. By default, the CPS Log entries are not limited between backups. This may result in a very large Backup Exec log file. 12. Click Finish to transfer the CPS job information to the Backup Exec pre-command. You can verify that the pre-command was successfully associated with the Backup Exec job by viewing the job properties in Backup Exec. If SmartLink is run with multiple media servers with a potential for fail over from one server to another, the batch file must be copied to each server from which it might be run. Additionally, it must exist in the same path.
Chapter 9, Using CPS with Backup Exec 123
Upon completing the SmartLink wizard, the status of the CPS job appears in the Backup Exec job log for the associated job. If errors are detected in the status of the CPS job then an alert is generated. To manually edit the command, see Using the SmartLink Command Line Syntax located at the following: http://support.veritas.com/docs/277859. Note The Pre/Post Commands dialog box contains a setting to cancel the command if it is not completed within a specified time. The specified run time is for all pre- or post-commands that have been defined for the backup job. Thus, if the SmartLink command is contained within a batch file with other commands, sufficient time must be allotted to run all commands. The most significant constraint on the time that is required to run SmartLink is the amount of logs that are needed for the backup job. After a backup job is run, the time that is required for the actual CPS data gathering is shown in the Continuous Protection section of the Backup Exec job log. Related Topics: Monitoring CPS Jobs in Backup Exec on page 122 Viewing alerts posted to Backup Exec on page 124 Viewing job logs posted in Backup Exec on page 128
To access and view Backup Exec Alerts: 1. On the Backup Exec navigation bar, click Alerts. 2. Select the alert from either the Active Alerts or Alert History pane. 3. Under General Tasks in the task pane, click Properties. 4. View the following properties.
All CPS-related alerts posted to Backup Exec are Warnings (yellow icon) and indicate a problem. A message or statement describing the condition that prompted the alert.
Message
124
Server name
The name of the Backup Exec server being backed up, which is also CPSs Protection Server. The name of the Backup Exec job.
Job name
The CPS-related alerts are organized into two categories: fatal events, and CPS job or pair problems. Note An alert is not warranted or posted if the CPS jobs are successfully backed up and all the specified CPS jobs are in a good (consistent) state. CPS alerts themselves are not posted to the Backup Exec alert system.
Situation: SmartLink cannot authenticate to the CMS. Solution: Verify credentials to CMS, per CPS credentials and security issues on page 140.
125
Monitoring CPS Jobs in Backup Exec Fatal alert messages (continued) Message SmartLink is unable to contact the Continuous Management Service (CMS) Description Situation: General failure CMS errors. This alert is a catch-all for non-network and non-credentials based errors. Solution: Attempt to restart the services, and if not successful, contact Symantec Technical Support. CPS Backup Job <Cpsjobname> Situation: SmartLink has failed to authenticate Failure to authenticate to a JCD indicates that to the JCD Server <JCDservername>. SmartLink is unable to acquire log entries. However, The Job and Pair Logs are Unavailable. an alert is generated because it is a correctable configuration error. Solution: Verify credentials to JCD server, per CPS credentials and security issues on page 140. CPS Backup Job <Cpsjobname> Situation: SmartLink is unable to contact the JCD JCD is unreachable, which has the same effect as the Server <JCDservername>. The server failure to authenticate. may be down or a network issue may Solution: be preventing SmartLink from Check network connectivity and that the JCD server contacting the JCD. The Job and Pair is running properly. Logs are Unavailable. Cpsjobname JCDservername Situation: General failure for non-network and non-credentials based JCD errors. Solution: Attempt to restart the JCD services, and if not successful, contact Symantec Technical Support. CPS Backup Job <invalidjobid> Invalid CPS Backup Job ID. Situation: A specified CPS Job ID is invalid. This condition is a correctable SmartLink configuration error and thus generates a top-level Alert. Solution: Verify that the correct job ID has been entered.
126
Monitoring CPS Jobs in Backup Exec Fatal alert messages (continued) Message CPS Backup Job <Invalidjobname> Invalid CPS Backup Job Name Description Situation: A specified Job name is invalid. This condition is a correctable SmartLink configuration error and thus generates a top-level Alert. Solution: Verify that the correct job name has been entered. CPS Backup Job <Cpsjobname> - The Situation: Continuous Management Service The CPS job is in an unknown state. In this case, the (CMS) and the CPS Backup JCD server CMS does not have the latest information regarding a do not have consistent Job State job's run state. information. The actual state of Job is Solution: unknown. Check the connectivity between the CMS and JCD, and verify that each is running. CPS Backup Job <Cpsjobname> Unable to get pair information. Situation: Unable to get Pair information. Solution: Check the connectivity between the CMS and JCD, and verify that each is running. CPS Backup Job <Cpsjobname> Unable to get JCD information. Situation: Unable to get JCD information. Solution: Check the connectivity between the CMS and JCD, and verify that each is running. CPS Backup Job <Cpsjobname> Unable to get job log details Information. Situation: Unable to get job log information. Solution: Check the connectivity between the CMS and JCD, and verify that each is running.
127
SmartLink generates an alert in Backup Exec for every job that has exceptions (errors). Only one alert per job is generated for the entire run of SmartLink. This is because there may be hundreds of pairs that are inconsistent and SmartLink could easily overwhelm the Backup Exec alerts. Additionally, the Alert message has limited space (400 characters) to report the error. Consequently, this alert is a general aggregation of the qualification of all pairs in all of the CPS jobs.
CPS Backup Pair Alerts Alert Field CPS Backup Job <cpsjobname> - Exception in One or More CPS Pairs. Description Situation: One or more pairs in one or more of the CPS jobs are inconsistent. Solution: Review the Exceptions Topic Box on page 131.
To access and view Backup Exec job logs: 1. On the Backup Exec navigation bar, click Job Monitor. 2. From the Job History pane, select the Backup Exec jobs that are associated with the CPS job. 3. Click the Job Log tab to view detailed information about the job. Under Job Information, details about the job server, job name, date and time that the job started, the job type, and the job log name appear. 4. Expand the Job Operation - Continuous Protection Job headings by clicking the plus sign [+] to the left of the heading.
128
For details about what displays in the various topic boxes on the job log, see the following:
Job Operation - Continuous Protection Job Topic Box on page 130 Command Line Syntax Error Topic Box on page 131 Exceptions Topic Box on page 131 Backup Exec SmartLink Options Topic Box on page 132 Backup Exec SmartLink Run Log Topic Box on page 132 CPS Jobs Topic Boxes on page 133
129
All CPS jobs are good One or more problems exist with the CPS jobs Fatal errors occurred that prevent SmartLink from running
Based on these quality states, one of the following messages appears in this topic box:
CPS Summary Log Messages Message All CPS Backup Jobs are Good: CPS Backup This message appears if all CPS jobs have completed or are running without errors. Description
There are One or More Problems: CPS Backup If there are any problems with the CPS jobs or pairs, this message appears in the CPS Log. Additionally, the Exceptions topic box appears later in the Job Log, which provides details on the specific problems that are encountered in the CPS jobs (see Exceptions Topic Box on page 131).
A Fatal Error has Occurred: This message appears when syntax errors are encountered in the SmartLink command line. Additionally, if this message is posted, the Command Line Syntax Error topic box appears later in the Job Log, which provides details on the nature of the error (see Command Line Syntax Error Topic Box on page 131). Backup Exec Errors
SmartLink may be invoked using invalid Backup Exec credentials, which prevents SmartLink from connecting to the Backup Exec server. For example, this message appears if all CPS Jobs are good, but invalid Backup Exec credentials were provided. SmartLink was not able to acquire the Backup Exec job information from the Backup Exec server.
130
Monitoring CPS Jobs in Backup Exec CPS Summary Log Messages (continued) Message Description
SmartLink is unable to contact the The server may be down or a network issue may prevent Management Server. The server SmartLink from contacting the CMS. No CPS Backup data may be down or a network issue validation is possible. may be preventing SmartLink from contacting the Management Server. No backup data validation on Protection Server is possible. SmartLink is unable to contact the The server may be down or a network issue may prevent Management Server. SmartLink from contacting the CMS. No CPS Backup data validation is possible.
Pair did not meet goodness criteria. Job name or ID was not found. Unknown Job State.
131
Failure to connect to the Job Control Delegate (JCD) to retrieve log details.
Exceptions Exception Goodness Criteria Description The criteria that are evaluated to determine the consistency of a job are:
Each pair must be in a consistent state, and Each pair must have been consistent since the last time the associated Backup Exec job was run.
This exception is given when one or more job names or IDs on the SmartLink command line cannot be found on the CMS. An invalid job that is specified on the SmartLink command line that does not exist in the CMS database. The JCD of a job and the CMS may be unsynchronized. Thus, there is no way for SmartLink to get an authoritative measure of the state of the job or any of the pairs in the job. Thus, the job in question has an entry in the Exceptions error box but does not have a Continuous Protection Job section.
Log Entry Limit Show Latest Log Entry First Issue Warning If Backup Data is Inconsistent Backup Exec Job Name Log File Name
132
This topic box provides detailed information on the CPS and backup jobs. This information is generally only required by Technical Support to aid in troubleshooting the job. The information that is displayed in this topic box includes the following.
Backup Exec Information Backup Exec Job Information Continuous Management Service Information CPS Job Information Continuous Protection Log Information
133
Monitoring CPS Jobs in Backup Exec Subordinate Jobs Topic Boxes (continued) Topic Box Job Log Topic Box Description Contains CPS job log entries for the period starting when the Backup Exec job last ran, and ending with the current run. Log entries are presented based on the following:
The log entries are sorted in the same order as the Backup Exec log entries. They are sorted in descending order with the latest entries at the bottom of the log. The date/time portions of CPS log entries are presented in the same format as the date/time fields in the rest of the Backup Exec log (12 vs. 24-hour clock, UTC vs. local time, international time format, etc.)
The number of entries is optionally configured with the logLimit command line parameter. Backup Pair Topic Box One Backup Pair box exists for each pair of the associated CPS job. The title of the box is the name of the actual CPS pair. If there is an exception associated with the pair, the box title contains the state of the pair along with a description of the exception condition. Contains a summary of the pair at the time SmartLink ran. It shows the source and destination server names, pair state, last started time, last stopped time, destination consistency, and destination latency. Note Destination latency can only be calculated when both servers in a pair are running Continuous Protection Server version 10 (or later). Pair Log Topic Box Contains CPS pair log entries for the time period starting from when the owning Backup Exec job ran, and ending with the current run. Log entries are presented based on the following:
Pair Header
The log entries are sorted in the same order as the Backup Exec log entries. They are sorted in descending order with the latest entries at the bottom of the log. The date/time portions of our log entries is presented in the same format as the date/time fields in the rest of the Backup Exec log (12 vs. 24 hour clock, UTC vs. local time, international time format, etc.) The number of entries is optionally configured with the logLimit command line parameter.
134
Chapter
10
CPS compatibility issues on page 136 CPS installation and upgrade issues on page 138 CPS credentials and security issues on page 140 CPS components issues on page 143 CPS configuration issues on page 145 CPS general issues on page 147 CPS backup and restore job issues on page 149 CPS System State backup and restore issues on page 151 CPS job monitor issues on page 151 Backup Exec Retrieve issues on page 152 CPS Tools and Utilities on page 155
135
CPS compatibility issues Issue CPS product compatibility Description The Symantec family of products is designed to protect all of your business information. Each product provides a different level of protection, and works together to ensure your data is available when you need it. Continuous Protection Server is compatible with the following Symantec products:
Backup Exec (10d or later) for Windows Servers backs up your application servers such as Exchange, SQL, and the Continuous Management Service. It also provides long-term storage to various media. Backup Exec (10d or later) Desktop and Laptop Option protects information that is created on remote and mobile personal computers. Storage Exec prevents unwanted files from being stored on the Business Server or Protection Server. Storage Foundation for Windows provides easy-to-use online disk storage management for mission-critical, enterprise Windows environments.
136
CPS compatibility issues CPS compatibility issues (continued) Issue CPS and Backup Exec compatibility Description CPS uses Backup Exec to access the System State and perform backups and restores of the CPS files. This functionality is contained in the Backup Exec Remote Agent for Windows Systems (Remote Agent) as well as the Backup Exec Media Server. A minimum Backup Exec version of 11d is required on any server running the Continuous Protection Agent. Caution Be careful when installing the CPS Protection Agent on the servers that have older versions of Remote Agent installed. The CPS installer can optionally upgrade the Remote Agent components to version 11d. However, this upgrade breaks existing backup functionality if the Backup Exec Media Sever is a 10.x or earlier version. The installer will always alert you before upgrading the Remote Agent. The same consideration should be given when upgrading the Media Server if that is where the Continuous Management Service will run. If a version 10.x Media Server is upgraded to 11d, then it is no longer able to back up any of its existing (10x) clients. File system filter driver compatibility Software that use file system filter drivers, such as disk defragmenter utilities, certain open file agents and some virus protection software, cannot be used with this product as there could be conflicts with the CPS file system filter driver. If an incompatible product is found on a CPS server, starting both CPS and the incompatible product could cause the system to become unstable or crash. Likewise, enabling both products at system start time could prevent the system from starting. System Restore allows the system to return to its previous configuration. If an incompatible product is installed on the system that is to run CPS, it is necessary to disable or remove the incompatible product before installing CPS. If CPS is already installed on the system, do not enable or start the other product while CPS is running. See the Readme file accompanying this release for the most current list of products with incompatible filter drivers.
137
CPS installation issues Issue Workgroups and domains Description Symantec does not recommend or support mixing the servers hosting the Continuous Management Service and Continuous Protection Agent between workgroups and domains. Any program that blocks executables, services, etc., should be disabled or if prompted for permission to install CPS, answer yes. This is particularly relevant for computers where the Continuous Protection Agent was push installed, and their users tend to select the Block option since they may not know what is being installed and may think it is spyware from the Internet. If the Web Restore Server Component is installed during the installation of the CMS, a modified version of Apache Tomcat Web Server 5.5.7 is also installed. All Web servers are common targets for malicious attacks. Thus, in the event that any future issues arise with this product, contact Symantec Technical Support for corrective information.
Anti-spyware software
Push installing over domain trust If a cross domain trust exists between the computers push installing from and to, the account that is running from the installing computer must be present in the local administrators group of the computer being push installed to. NIC failure after installing CPS If a NIC card fails after installing CPS, the registry key for the new NIC card must be updated for CPS to work properly. See the following TechNote: http://support. veritas.com/docs/277852. Some features of CPS require Internet Explorer 6.0 or later, such as Backup Exec Retrieve and Job Reports. Thus, earlier versions should be upgraded for proper functionality.
138
CPS installation and upgrade issues CPS installation issues (continued) Issue Description
Pathnames with Asian characters CPS fails to start if CPS has been installed in a directory whose pathname includes characters from Asian languages, including Japanese, Chinese, and Korean. To avoid this problem, either install CPS in the default installation directory or choose a directory whose pathname, netgroup name and master server name only includes English characters (a-z, A-Z, 0-9). Network load balancing service fails to start After installing Continuous Protection Server on a computer running Windows Server 2003, you might receive an error message that the Network Load Balancing Service failed to start. Microsoft reports the cause as: Although network Load Balancing (NLB) is not currently installed, some NLB registry keys might be present in the registry. Although Microsoft Knowledge Base Article 268437 describes the problem as applying to Windows 2000 Advanced Server, the fix also works for Windows Server 2003. See the following: http://www.microsoft.com/technet/prodtechnol/windows 2000serv/support/nlbcontb.mspx For installation troubleshooting purposes, you my view the installation logs in the following directory: %allusersprofile%\application data\symantec\Backup Exec CPS\logs
CPS uninstall issues Issue Uninstall and reinstall loses job history and pair logs Description If CPS is uninstalled and reinstalled, information in the job logs and pair logs are not saved. For additional information, see the following TechNote: http://support.veritas.com/docs/278649.
139
Log on as a service. Administrator rights (provides complete and unrestricted rights to the computer).
On a computer running Windows Server 2003, you cannot install CPS using a service account that has a blank password. If you attempt to do so, an error message is displayed. You can configure Windows to allow for blank passwords. See the Windows documentation. The account that used must be valid on each node in the Backup Group. This account may require establishing a Domain Trust relationship. If a cross domain trust exists between the computers push installing from and to, the account that is running from the installing computer must be present in the local administrators group of the computer being push installed to. When operating in a workgroup environment, all nodes in the backup group must run in non-secure mode.
Pre and post-job scripts run under the service account, although additional rights may be required.
140
CPS credentials and security issues CPS credentials and security issues (continued) Issue Installing CPS from the CD-ROM Description Administrator rights are required on the computer where the software is being installed when performing a CD installation.
Push installing CPS components Administrator rights are required when push installing components to remote computers, as well as backup rights to the computer hosting the Continuous Management Service (CMS). If a cross domain trust exist between the computers push installing from and to, the account that is running from the installing computer must be present in the local administrators group of the computer being push installed to. Using the Administration Console Creating CPS backup jobs Administrator rights are required on the system running the CPS Administration Console when using the Console. Backup rights are required to all referenced servers of a CPS backup job, including the server hosting the Continuous Management Service (CMS). Permissions of backup destination folders or permissions on objects within a backup destination should not be changed after backup jobs have been run. If you are unable to delete some files from a backup destination, the task should be performed by a user with Administrator rights. Additionally, Administrators may not be able to delete the directory tree when deleting backup destinations. In this case, local ownership must be assigned to the Domain Admin on the files and all related subdirectories if they originate from another local system.
141
CPS credentials and security issues CPS credentials and security issues (continued) Issue Using Backup Exec SmartLink Description The most important criteria in understanding security credentials is to determine the security context under which SmartLink operates. SmartLink runs as a pre-command of Backup Execs jobs. Backup Exec uses the resource-level credential of the media server to run the pre/post commands. If the computer level credential is not available, the default logon account of the media server is used to run the pre/post commands. The user can change the computer level credential through the Backup Exec Administration Console. If SmartLink cannot be authenticated by the servers containing the CMS or Job Control Delegate (JCD), the user must create the proper CPS credentials for SmartLink to access the remote CMS or JCD servers. At a minimum, backup rights are required, which may be created in one of the following ways.
Logon as the user that SmartLink will run under. Use the SmartLink command line to create the proper CPS credential. Type the following: srbeslnkhost.exe /createcredential /server "server-name" /domain "domain-name" /user "user-name" /password "password"
142
Administration Console may run The first time that you select a server to do a CPS restore, slowly when first run a wait cursor appears and it may take several minutes before anything is displayed. Nothing in the console indicates that anything is happening and a user might think that nothing can be restored. This delay is caused by the mounting of the snapshots as volumes. After the first hit to the backup destination, all subsequent access is much faster. The amount of time it takes to mount a snapshot is proportional to the size of the snapshot. Job name and description are in a Consoles running on computers without the different language than the corresponding language pack that is installed is not able Administration Console to properly interpret the job name or description. For example, when a job name is created with Japanese characters, these characters show as meaningless square boxes when the job is viewed on an English Console. Be sure that the language packs are installed for all languages of job names and descriptions that may be used in the Console.
143
Business Servers
Business server issues Issue Description
Recovering restore selections to If a Business Server is deleted from the Backup Group, all a restored or replaced Business restore selections also disappear. If the deleted Business Server Server is brought back into the Backup Group or another server is added with the same name as the deleted server, a new CPS backup job of at least one file can be created and run to resynchronize the restore selections. This situation requires reinstalling the Continuous Protection Agent and restarting the replaced/restored server.
Protection Servers
Protection server issues Issue Description
Protection Server for SmartLink When creating a SmartLink association with Backup Exec, must have actual server name the Protection Server must be specified by an actual server name and not an IP address. Protection Server volumes The Protection Server should have at least four separate volumes for ideal performance:
System volume Journals volume Backup destination volume Snapshot storage volume for backup destination
144
145
CPS configuration issues Snapshot and indexing issues (continued) Issue Snapshot schedules Description When you back up data from a single Business Server to multiple backup destinations, the snapshot schedules should be consistent so that all files that are protected by CPS are included in the scheduled snapshots. Additionally, related data sets, such as the data and log files of a given database, should always be backed up to the same backup destination.
146
Bandwidth throttling and Quality Bandwidth throttling can be implemented using Quality of Service (QOS) of Service (QOS) with network switches and routers. QOS should be implemented on TCP/IP port 20481. System may run out of memory during intensive input/output processing A chronic nearly out of memory condition may exist during periods of intensive i/o processing. This state can be determined in the following way: 1. Start the Windows Task Manager. 2. Select the Performance tab. 3. Look at the Physical Memory (K)control group. 4. Verify how much memory is currently Available, and if the amount drops to 4000 or less (i.e., 4MBytes) and tends to stay there. In this state, the system is largely unresponsive to user input and the following corrections should be made. To resolve this condition, see the following TechNote: http://support.veritas.com/docs/277876. File system input/output deadlocks may occur when continuously backing up large database files An input/output deadlock can occur when:
CPS is used to continuously back up large databases, and the i/o activity on these database files is high, and the host server has fewer than 4 logical CPUs (i.e., 4 physical CPUs without hyperthreading, or 2 CPUs with hyperthreading).
147
Miscellaneous issues
Miscellaneous issues Issue Utility partitions Disabling CPS SNMP support Description CPS does not recognize utility partitions. If the Windows SNMP service is installed on the computer when CPS was installed, CPS's SNMP support is automatically installed. To disable CPS's SNMP support, see the following TechNote: http://support.veritas.com/docs/277856. CPS throttles the data transmission for all pairs at the least-restrictive rate. For example, if a backup job is configured to run between two nodes with the bandwidth limited to 20% of a T1 line and another job is configured to run between the same two computers with bandwidth limited to 50% of a T1 line, the throughput of both jobs will be combined and run at a rate of 50% of the T1 line. That is, each job will not run at the 50% rate, but rather both jobs combined.
Multiple pairs are configured to run between the same two computers
The free space on a CPS database If the free space of a CPS database volume is exhausted, volume is exhausted the Sybase Adaptive Server Anywhere 9 server may assert and refuse all new connections until the CPS services on that computer are restarted. CPS database backup and restore Database backup and restore capabilities are based on Volume Shadow Copy Service (VSS) Writer Technology. The following utilities can be used in lieu of using Backup Exec with VSS capabilities for configuration database backups, or if the user wants to perform manual backups and verification. Use cpsDBBackup to create a validated backup image of the CMS or CPA database. Use cpsDBValidate to validate and repair the CMS or CPA database. Only corrupt indexes can be repaired. Restore is a manual procedure. For additional information on the database backup and restore utilities, see the following TechNote: http://support.veritas.com/docs/277860.
148
Exclude list
Connection outages
149
Restoring Continuous Protection SmartLink enables communication between Continuous Server from Backup Exec for Protection Server and Backup Exec for Windows Servers. Windows Servers That is, SmartLink enables backed up files that are stored on the CPS destination to be backed up using Backup Exec. Backup Exec users can restore those files from Backup Exec to a Continuous Protection Server destination through the Backup Exec Administration Console. Features in Microsoft Windows Server 2003, such as the VSS writer, are used to back up and restore the files. Restoring files from Backup Exec directly to a CPS source, bypassing the CPS destination, can be performed under certain circumstances. For example, you can restore files directly from Backup Exec to a CPS source running Windows Server 2003. When restoring CPS from Backup Exec, only the whole volume can be restored. To restore to a CPS source running Windows Server 2000, you must first restore the files from Backup Exec to the Continuous Protection Server destination. The files can then be restored from the destination to the source. The ability to restore from Backup Exec to a Continuous Protection Server source requires the features that are not available in Windows Server 2000. Alternate restore destination paths When an alternate restore destination path is chosen, be very careful not to select any path with data that needs to be saved. CPS overwrites the data in the selected directory.
150
System State backup and restore When System State is restored on Windows Server 2003 computers, the state of the restore job is reverted to Never Run. Additionally, all history that is associated with the restore job is lost. Restoring System State in CPS Symantec does not recommend restoring System State to servers other than the server from which the System State was originally backed up. Redirecting System State to other servers will have unpredictable results. For additional information on restoring System State in CPS, see the following TechNote: http://support.veritas.com/docs/278977.
151
Backup Exec Desktop and Laptop CPS does not need to store the credentials to connect to Option the Backup Exec Media Server. However, the CPA on the DLO file servers and the CMS must all run as an account that is a member of the Administrators group on the Backup Exec Media Server. No additional software is needed on the Backup Exec Media Server. Trusted domains Backup Exec Retrieve does not work if the Business Servers, Protection Servers, and CMS are not located in the same (or trusted) domain(s). However, the client (Web browser) computers do not need to be in the same (or any) domain. Set up accounts with the same user name and password on the source, destination, and the Web Restore Server Component. Log on to the Web retrieval site, and select the local computer as the domain. Files on the source that use customized permissions are not accessible through Backup Exec Retrieve. Users can view and download files accessible to everyone. Same-date searches When searching for files to restore, if the window of the search (From date to To date) are the same, no files are listed. The from and to dates in the search window should be different by at least one day. If you restore a file using Backup Exec Retrieve that has multi-byte characters, you may find that the filename of the downloaded file does not match the original file name. This occurs if the Web browser computer is not running in the same language as the file you are trying to download (i.e. downloading a file with Japanese characters to an English computer). This behavior is exhibited for both the single-file download using Internet Explorer and the multi-file download using the Download Manager.
Non-domain environments
Multi-byte filenames
152
Backup Exec Retrieve issues Backup Exec Retrieve issues (continued) Issue Folders without contents Description When browsing folders in Backup Exec Retrieve, you may encounter folders that have no contents. Folders may appear empty for the following reasons.
The user does not have access to this folder. The backup destination that protects this folder is offline. The folder is actually empty.
The source does not have any accessible shares. Start sharing the folder on the source, and then refresh Backup Exec Retrieve.
Protecting confidential files from Permissions should be configured on the share, and then being viewed or downloaded by each destination should be backed up. CPS applies the other users most recent permissions to shared folders. If confidential information is accidentally shared, correct the permissions on the share, and then back up the files again. Search results pane is blank The results pane displays shared folders to which users have Read permissions or higher, and which were backed up from the selected source. Administrator shares do not display in Backup Exec Retrieve, which is intended for user access. The files that appear in Backup Exec Retrieve results pane originate from snapshots of the backup destination. For example, if a file is saved three times in an hour, and snapshots are scheduled to take place every two hours, the saved files appear after the snapshot of the backup destination is taken.
153
Backup Exec Retrieve issues Backup Exec Retrieve issues (continued) Issue File Not Found Errors Description On some computers, opening a file directly from Backup Exec Retrieve results in a File Not Found error from the application that was launched to view the file. This condition results when the do not save encrypted pages to disk option is enabled in Internet Explorer. If this option is enabled, the file is never saved to the disk, so the application is unable to open it. To disable this option: 1. From the Internet Explorer Tools menu, select Internet Options. 2. Select the Advanced tab. 3. Under Security, verify that the Do not save encrypted pages to disk check box is not selected. Alternatively, when prompted by the browser to open or save the file, select Save, then open the file from the saved location. Modifying the Backup Exec Retrieve URL The default Backup Exec Retrieve URL (https://server:8443/BERetrieve) can be modified to a simpler form, such as http://server. To modify the default Backup Exec Retrieve address: 1. Make sure you are not running another Web server on port 80, such as IIS, Apache, etc. If you are, then you will need to disable that Web server. 2. Open a command prompt, and browse to the following directory C:\Program Files\Symantec\Continuous Protection Server\VRTSweb\bin. 3. Execute the following command: webgui addport 80 HTTP 4. Browse to the ROOT5 folder: C:\Program Files\Symantec\Continuous Protection Server\VRTSweb\admin\root5\ROOT5. 5. Open up index.html in a text editor such as Microsoft Notepad. 6. Change URL=Home.do to URL=/BERetrieve. 7. Save the file Now when open up your browser to http://server, you will automatically be redirected to the BE Retrieve login page.
154
CPS Database Backup and Restore CPS Database Validation and Repair
The procedures associated with the CPS database maintenance utilities may be superseded by the Backup Exec backup and restore jobs (see Protecting CPS with Backup Exec on page 116). However, if the Continuous Management Service (CMS) is operating on a server using Windows 2000 (without the Shadow Copy components), these procedures apply. The Database Maintenance utilities are run from the CPS Utilities command line prompt: Start > All Programs > Symantec > Backup Exec CPS > CPS Utilities
155
For current procedures related to database validation and repair, see the following TechNote: http://support.veritas.com/docs/277860.
SetIntegratedLogin utility
It is possible to convert the CMS or CPA servers in an existing CPS installation to use integrated logins. Following is a description of the advantages of integrated logins, their restrictions, and how to enable this mode of operation. When running in integrated login mode the CMS and CPA servers no longer provide database credentials when connecting to their respective databases since access has been granted to the account under whose context the services are running. This provides an added level of security to your installation. Integrated logins cannot be enabled on systems that were installed in non-secure mode. The CMS or CPA service's log on or run as account must be set to a domain account and not the local system or a local system account. All CMS and CPA servers may have integrated logins enabled by running the SetIntegratedLogin utility. This must be done for each server, and one server at a time. If integrated logins is enabled on a combined CMS/CPA server, it is enabled for both services at the same time. Enabling integrated logins requires restarting the affected CPS services. Once integrated logins have been enabled, it is possible to reset standard logins, again using the SetIntegratedLogin utility. This results in a server running in the same configuration as it was after installation. This is required if the log on account name is changed for any CMS or CPA service for whom integrated logins has been enabled. The SetIntegratedLogin utility is run from the CPS Utilities command line prompt: Start > All Programs > Symantec > Backup Exec CPS > CPS Utilities
To reset the standard login: 1. Run SetIntegratedLogin to reset the standard logins, 2. Change the services in question to the run-as account name. 3. Run SetIntegratedLogin to re-enable integrated logins.
156
Note It is necessary to run SetIntegratedLogin only if the services run as account name is changed, not the run as password.
To recover after restoring a pre-integrated login database: 1. Reconfigure the ODBC Data Sources for standard login a. Run the ODBC Administrator (odbcad32), click on the System DSN tab, select the CPA DSN and then click on the Configure... button. On the ODBC Configuration for Adaptive Server Anywhere... screen, click on the Login tab. Select Supply user ID and password, and then click on OK.
b. Repeat step 1a, but this time for the CMS DSN, if there is one. c. Close the ODBC Data Source Administrator. The CMS and/or CPS services can now run.
2. Reconfigure the services for integrated login. 3. Run the SetIntegratedLogin utility to re-enable integrated logins. For example, "SetIntegratedLogin Watchword." The service(s) will now run in integrated login mode.
157
To restore a CMS/CPA server: 1. Restore the CMS database from a pre-integrated login backup image. The CMS server does not start. 2. Modify the ODBC CMS DSN to use standard logins, see step 1 of To recover after restoring a pre-integrated login database: on page 157. Now the CMS service can start. 3. SetIntegratedLogin (step 2 of To recover after restoring a pre-integrated login database: on page 157) determines that the CMS and the CPA differ and returns an error! Currently the only way to overcome this issue is to restore both the CMS and CPA databases from the same backup image set. That is, both databases must be backed up at the same time, and the backup images should be kept and restored together as a set. 4. Restore the CMS and CPA databases from a pre integrated login backup image set. Neither service will start. 5. Modify the ODBC DSN for the CMS and the CPA to use standard logins, see step 1 of To recover after restoring a pre-integrated login database: on page 157. Now the services can start. 6. SetIntegratedLogin (step 2) succeeds and the CMS and the CPA services will now run in integrated login mode. Related Topics: CPS Database Maintenance utilities on page 155 Services Manager utility on page 156
158
Appendix
1 1
Maintaining Accessibility
Symantec products meet federal accessibility requirements for software as defined in Section 508 of the Rehabilitation Act: http://www.access-board.gov/508.htm Keyboard shortcuts are available for all graphical user interface (GUI) operations and menu items. Symantec products are compatible with operating system accessibility settings as well as a variety of assistive technologies. All manuals are provided as accessible PDF files, and the online help is HTML displayed in a help viewer window. The following topics detail accessibility features and compliance in CPS:
About general keyboard navigation in CPS on page 160 About keyboard navigation in dialog boxes on page 160 Using keyboard shortcuts on page 161 Establishing accessibility settings on page 162
http://www.microsoft.com/enable/products/keyboard.aspx
The TAB key moves the focus to the next active area, field, or control, following a preset sequence. SHIFT+TAB moves the focus in the reverse direction through the sequence. CTRL+TAB switches to the next Console view. CTRL+SHIFT+TAB switches to the previous Console view. UP and DOWN ARROW keys move focus up and down the items of a list. The ALT key in combination with the underlined mnemonic letter for a field or command button shifts the focus to that field or button. Either ENTER or the SPACEBAR activates your selection. For example, after pressing the TAB key to select Next in a wizard panel, press the SPACEBAR to display the next screen. SHIFT+F10 provides access to context menus.
The TAB key moves focus between controls within the dialog box along a preset sequence. Controls displaying a mnemonic (an underlined letter) can be selected regardless of focus by typing ALT and the underlined letter. A dark border indicates the default command button. Press ENTER at any time to choose the button with a dark border. ESC chooses the Cancel button if one exists. SPACEBAR chooses a control you select with the TAB key. SPACEBAR changes the state of a check box that has focus. Typing a mnemonic (if one is available) moves the focus to the check box and change its state.
Administrators Guide
160
Arrow keys move focus within radio buttons, list boxes, sliders, groups of option controls, or groups of page tabs. Items that cannot be changed are not visited by the TAB key sequence. Options that are unavailable are grayed-out and can neither be selected nor given focus.
While the controls described here are typically found in dialog boxes, they also can occur in other contexts. The same navigation standards apply.
List Boxes
List boxes display a column of available choices. Different kinds of list boxes exist with additional navigation conventions:
Drop-down list boxes by default show only the selected item. A small button to the right of the control will show a downward-pointing arrow. Select the arrow to display more items from the list box. If there are more choices than can fit in the preset list box area, a slider appears along the side of the list box. Show or hide the list using ALT+DOWN ARROW, ALT+UP ARROW, or F4. The TAB key selects an item. Extended selection list boxes support selecting single items, blocks of items, or combinations of the two. After an itemis selected, hold down CTRL+navigation keys to select or clear additional items or blocks of items.
Keyboard Shortcuts Unique to CPS CPS Accelerator CPS Mnemonic ALT F Result The File menu expands. From the File menu, you can create
new jobs, devices and media, print selected items, view properties, or exit CPS.
161
Keyboard Shortcuts Unique to CPS (continued) CPS Accelerator CPS Mnemonic ALT E Result The Edit menu expands. From the Edit menu, you can rename, delete, copy, and select items. In addition, you can work with selection lists and search catalogs. The View menu expands. From the View menu, you can change the information that displays on the screen. The options on the View menu change according to which
ALT
The Tools menu expands. The Tools menu provides many important options for working with CPS, including starting and stopping services, using device and media operations, using Wizards, and setting default options. The Window menu expands. Use the Window menu to move to a new window or view. The Help menu expands. Use the Help menu to access CPS documentation and various Symantec Web sites.
ALT
ALT
Select secondary menu items by opening the main menu and using the UP or DOWN ARROW key until the item you want to work with is highlighted. Press the RIGHT ARROW key to open a submenu, and ENTER to select your choice.
To set accessibility options: 1. From the Windows Start menu, click Control Panel. 2. Select Accessibility Options.
162
Administrators Guide
Note You can also set accessibility options through the Accessibility Wizard. From the Windows Start menu point to All Programs, point to Accessories, point to Accessibility, and click Accessibility Wizard. Note Though all graphics in Symantec documentation are readable- by screen readers, setting your screen reader to ignore graphics improves performance.
163
164
Administrators Guide
Glossary
Administration Console The interface that the administrator uses to manage operations in CPS, such as setting backup destinations, creating backup or restore jobs, and monitoring CPS processes and alerts. See also Using the Administration Console on page 39. administrator rights Credentials that enable a person to make systemwide changes to a domain or computer, install programs, and access all files. The administrator user account has full access to other user accounts. Administrator rights also enable the person to manage user and group accounts, assign passwords, and grant permissions. See also CPS credentials and security issues on page 140. alerts Events, such as a completed backup job, that usually require some form of user interaction or acknowledgment. See also Managing CPS job alerts on page 109. Backup Exec Retrieve Backup Exec Retrieve is the gateway by which users access the Web Restore Server Component to retrieve files. Backup Exec Retrieve uses Internet browsers (Internet Explorer 6.0 or newer, and others). CPS software is not required on the user workstations. See also Using Backup Exec Retrieve on page 97. backup destination The location on a Protection Server where the files that are backed up from a Business Server are stored. The destination is defined in the backup job properties. Only one backup destination is allowed per volume. See also Managing backup destinations on page 54. Backup Group A group of computers that are managed by a single Continuous Management Service. Files can be backed up only to a Protection Server that is in the same Backup Group as the Business Server.
165
backup jobs Operations that have been scheduled for processing by the Continuous Management Service. For example, if you make selections and submit a backup that is based on those selections, you have created a backup job. Jobs contain source and destination information, settings, and a schedule. Every type of backup job backs up the selected data and all regular shares. See also Backing Up Data on page 79. backup schedules Specific days and times when backup jobs are run. These can be one-time events, periodically run jobs, or continuous processes. Administrators can set or change backup schedules in the CPS Administration Console. See also About backup job schedules on page 10. backup schedule types Continuous Protection Server uses the following backup schedule types: On Demand (Manual) The backup job runs only when manually started. Regularly scheduled The backup job runs on schedule at a specific time, on specific days. Periodically scheduled The backup job runs on certain days at timed, hourly intervals. Continuous The backup job is always running. Files on the source are backed up to the destination whenever the file changes. backup strategies The procedures you implement for backing up your information on the network. A good backup strategy requires minimal time to get your information back in the event of a loss. See also About backup strategies and planning on page 9. Business Server A local or remote server where end users save files and folders as part of their daily work. A Business Server is the source of a backup job and must have a Continuous Protection Agent installed. continuous backups Backup jobs that run continuously, thereby allowing any changes to be backed up as they occur.
166 Backup Exec Continuous Protection Server Administrators Guide
Continuous Management Service (CMS) Provides primary control of the Continuous Protection Server processes. The CMS maintains a database with all command and control information, and configures the Protection Agents according to settings that are sent from the Administration Console. Continuous Protection Agent (CPA) The Continuous Protection Agent is a software collection that must be installed on each computer in a Backup Group. This agent uses a file system component and file replication technology to enable continuous data protection between computers in the Backup Group. CPS Network Helper Service CPS component that allows communications within Continuous Protection Server and with Backup Exec. The Network Helper Service was formerly known as the Enterprise Network Layer (ENL). destination server The server in the Continuous Protection Server network to which information is written during the job process. In a backup job, the information is copied from the Business Servers (sources) to a Protection Server (destination). Encrypting File System (EFS) Microsoft Windows technology that enables users to store information on disk in an encrypted format. The encryption is enabled through the advanced file attributes. CPS skips over files that are encrypted with EFS. Enterprise Network Layer (ENL) See CPS Network Helper Service. history file File on the Continuous Management Service where snapshots are stored. Continuous Protection Server stores each snapshot for 24 hours unless specified otherwise in the retention settings. Indexing Component The Indexing component maintains a directory for the files that are available to user file retrieval using the Web Restore Server Component and Backup Exec Retrieve. The Indexing component is an optional feature and should be installed on any server that will be accessed by users for file retrieval using Backup Exec Retrieve. The Indexing component supports searches by file, file versions and recent activity.
Glossary
167
infrastructure The underlying foundation or basic framework of the Backup Group. Continuous Protection Server runs on an infrastructure of Windows-based servers. jobs Jobs define what data is to be backed up, which server the data will be backed up from and to, when the data will be backed up, and other settings. Similar jobs are defined to restore the data. See also Backing Up Data on page 79 and Restoring Data on page 91. job logs Contain the results of a job and are created when a job runs. You can review job logs to find job errors and details. See also CPS job report details on page 107. periodic backups Backup jobs that run on timed intervals, such as Monday through Friday, every 12 hours. permissions Credentials that enable a particular user to access a particular resource in a shared network environment. For example, users are granted permissions to access files, directories, and printers. See also CPS credentials and security issues on page 140. Protection Server Protection Servers are the destinations of data that is backed up by CPS from Business Servers. regular backups Backup jobs that are run on a regular schedule, such as every Friday at 6:00 P.M. Remote Agent for Windows Systems (Remote Agent) CPS uses the Symantec Backup Exec Remote Agent for Windows Systems (Remote Agent) to access System State information for backup and restore. Remote Agent is an optional component and should be installed on any CPS Business Server that needs to have its System State protected. Remote Agent should also be installed on the Protection Server and Continuous Management Service if they will be protected by Symantec Backup Exec. restore job Jobs define what data is to be restored, from what computers the data will be restore from and back to, when the data will be restored, and other settings. See also Restoring Data on page 91.
168 Backup Exec Continuous Protection Server Administrators Guide
retention properties Length of time you want to save snapshots on the backup destination. You can store snapshots up to a limitthat is determined by your underlying snapshot technology. For most installations, this limit is approximately 64 snapshots per destination. This limit may vary considerably if alternative snapshot providers are installed. See also Defining Retention Policies for snapshots on page 61. scheduled backups Backup jobs that run on a set schedule. Three kinds of scheduled backup jobs are used in Continuous Protection Server: regularly scheduled, periodically scheduled, and continuous. Regularly scheduled backup jobs that are run on specific days at a specific time, every week. Periodically scheduled backup jobs that are run on specific days at timed intervals, such as every 12 hours. Continuously scheduled backup jobs are ongoing. service account The Windows user account under which the CPS services run. See also CPS credentials and security issues on page 140. Shadow Point-in-time, fixed respresentations, or copies of a specified volume. See also snapshots. Shadow Copy Components Windows Server 2003 systems include the Shadow Copy Components. Windows 2000 Server systems do not include the Shadow Copy Components. Depending on your OS installation options, the Shadow Copy Components may consist of the event logs, removable storage manager database, and the Windows Management Installation database. Additionally, if the Windows Server 2003 also acts as a SharePoint server, the Shadow Copy Components will include the SharePoint databases. See also How system information is protected on page 11. Shadow Storage A volume that is specified where snapshots are stored. SmartLink Technology that integrates Backup Exec with other Symantec products, such as Continuous Protection Server, Storage Exec, and Replication Exec. SmartLink enables the status of backup jobs that are created in Continuous Protection Server to display in the Backup Exec Administration Console. See also Monitoring CPS Jobs in Backup Exec on page 122.
Glossary 169
snapshots Point-in-time, fixed respresentations, or copies of a specified volume. See also Shadow. and Managing snapshots on page 58. source computer Any server in the Continuous Protection Server Backup Group that contains the files to be backed up. This computer must have a Continuous Protection Agent installed. storage space Disk drive space on the servers in the Continuous Protection Server Backup Group. Storage space generally refers to available disk space. strategic backup plan Philosophy of using multiple types of backup jobs to protect your organizations information. A strategic backup plan generally uses several layers of backups to protect different types of information. strategic naming conventions Philosophy of naming files and backup destinations in a meaningful way. Rather than naming backup destinations sequentially such as Backup01, Backup02, and Backup03, destination names are based on physical office locations, functional business units, or other meaningful criteria. Therefore, when viewing a list of backup destinations, the destinations are differentiated from each other and are easier to find information. system Information The Windows operating system includes data that requires special handling to protect and restore properly. This data, referred to as "system information" in CPS, contains different information depending on the specific version of Windows that is installed on the system. For Windows 2000 systems, this includes a set of data that is called System State and that includes various operating system files and registry information. For those systems that support Volume Shadow Copy Services (VSS), the system information consists of key elements of Shadow Copy Components including System State and Service State. See also How system information is protected on page 11 and Backing up CPS with Backup Exec on page 117. system resources Parts that make up or operate computer systems or networks such as client computers, servers, printers, cables, modems, bandwidth, memory, or mother boards. Resources are allocated to programs or processes while they are running.
170
System State Computer system information that varies between Windows 2000 and Windows 2003 operating systems. System State generally contains COM+ database, registry, and system files. See also system Information. System State backup A snapshot of system-specific data on the source that is comprised of the registry, the COM+ Class Registration database, and start and system files. If the source is a Certificate Services database, the Certificate Services database is also included. If the server is a domain controller, the data also includes the Active Directory services database and SYSVOL directory. The System State data is backed up and restored only as a collection, never individually. Web Restore Server Component The Web Restore Server Component is a feature of the CMS that makes available versioned copies (snapshots) of files for user retrieval to their workstations.
Glossary
171
172
Index
Numerics 64-bit support, 3 A accessibility dialog boxes, 160 keyboard shortcuts, 161 overview, 159 settings, 162 Active Directory, 94 Adaptive Server Anywhere, 25, 27 adding scripts, 89 Administration Console alerts view, 47 assistant view, 43 backup job properties, 46 credentials, 141 defined, 5, 165 general features, 40 information desk view, 43 job monitor view, 47 menu bar, 40 minimum requirements, 21 navigation bar, 40 overview view, 43 preview pane, 41 restore view, 47 selection pane, 40 server properties, 44 setup view, 43 setup view properties, 44 starting, 39 status bar, 41 system summary view, 43 task pane, 40 views, general, 42 Administration Service, 26 administrator rights, defined, 165 AlertGroomFrequency parameter, 66 alerts, 109 defined, 165 deleting, 112 deleting from history, 112 fatal, 125 messages, 124 properties, 124 responding to, 112 SmartLink, pairs, 127 viewing and filtering active, 110 viewing and filtering history, 110 viewing properties, 111 alerts view, 47 AlwaysDoRegionAnalysis parameter, 66 ASA directory, 25 assistant view, 43 autonomy directory, 25 B backing up changing schedules, 87 continuously, 80 overview, 49, 79 storing snapshots, 61 backup destinations adding, 54, 55 credentials, 141 defined, 165 deleting, 57 description, 54 managing, 54 permissions, 54 properties, 46 Backup Exec alerts, 124 Desktop and Laptop option, 4 job logs, accessing, 128 job selection for backup, 123 media server credentials, 123 protecting a Protection Server, 118 protecting Business Servers, 119 protecting Continuous Management Service, 118 protecting CPS, 116 protecting CPS databases, 117 protecting snapshots, 119 restoring a Business Server, 121 restoring a Protection Server, 121 restoring Continuous Management Service, 121 restoring CPS, 120 Retrieve security and credentials, 98 173
specifying a media server, 122 Backup Exec Environment Check, 16 Backup Exec Retrieve browse, 98 description, 5, 6, 97 download list, 98 features, 97 minimum requirements, 22 recent activity, 98 retrieving files, 99 search, 98 URL, 99 backup group defined, 4, 165 moving servers between, 51 backup jobs adding scripts, 89 alert history, 110 alert properties, 111 alerts posted to Backup Exec, 124 changing schedules, 87 creating, 79 creating continuous, 80 credentials, 141 defined, 165, 166 filtering alerts, 110 filters, 83 including and excluding information, 83 managing alerts, 109 managing statuses, 103 manual operation, 90 pairs, 103 properties, 46 schedules, 10 states, 104 storing snapshots, 61 viewing the status, 103 backup process encrypted files, 23 reparse points, 23 backup schedules continuous, description, 11 defined, 166 periodic, description, 11 scheduled, description, 11 backup strategies considerations, 9 defined, 166 174
periodic backups, 11 regular backups, 11 bandwidth limiting, 88 batch files, 124 besernum.xml file, importing license keys with, 29 BroadcastAddress parameter, 67 BroadcastHops parameter, 67 Broker Services, services, 26 Business Servers configuring, 49 defined, 170 description, 4, 166 installing, 32 managing, 49 minimum requirements, 19 uninstalling, 36 C Central Admin Server environments, 123 command line syntax, errors, 131 complete installation, 27 configuration troubleshooting, 145 Configuration Writer, services, 26 configuring Business Servers, 49 Continuous Protection Server, 115 registry entries, 65 snapshots, 58 ConnectionPooling parameter, 67 continuous backups defined, 166 description, 11 plans, 11 Continuous Management Service defined, 5, 167 system requirements, 20 uninstalling, 35 Continuous Protection Server configuring, 49 credentials, 140, 141 database backup and restore, 148 databases, 117 documentation, 13 drivers, 25 features and benefits, 2 firewall support, 23 installation modification, 35 installation upgrade, 34
installing, 15 integrating with Backup Exec, 115 introduction, 1 invalid jobs, 132 job report, 107 jobs topic box, 108, 133 key components, 4 monitoring jobs, 103 service account, 31, 140 Services, 26 Services Manager, 53 starting, 39 tools and utilities, 155 tunable parameters, 66 use model, 6 creating continuous backup jobs, 80 snapshots, 59 credentials, 140 Administration Console, 141 backup destinations, 141 Backup Exec DLO, 152 Backup Exec media server, 123 CPS service account, 140 creating backup jobs, 141 installing CPS, 141 Internet Explorer security, 98 push installing CPS, 141 SmartLink, 142 D data protection, 9 database backup and restore, 155 database directory, 25 database maintenance utilities, 155 database services, 26 database validation and repair, 155 DaysToKeepAlertItems parameter, 67 DaysToKeepDeletedSnapshots parameter, 67 DelayDirChangeNotifications parameter, 68 deleting alerts from history, 112 backup destinations, 57 snapshots, 63 Desktop and Laptop option, 4, 101 destinations defined, 167 Index
installing, 27 uninstalling, 35 Directory Services Restore Mode, 94 disk space, requirements, 151 DoEventLog parameter, 68 domain security mode, 53 domain trust, 140 drivers directory, 25 E EnableDebugConsole parameter, 68 EnableLogFile parameter, 68 EnableTimestamp parameter, 68 encrypted files, 23 Encrypting File System, defined, 23, 167 Enterprise Network Layer (ENL), 167 Environment Check, running for Backup Exec, 16 errors, command line syntax, 131 Evaluation version, installing CPS, 29 exceptions topic box, 131 Exchange protection, 4 excluding information, 83 F features and benefits, 2 FFXPort parameter, 69 files and directories, restoring, 92 FilteredIDList parameter, 69 filters deleting, 86 description, 83 include and exclude, 84 modifying, 85 firewall support, 23 free disk space, 151 G Gateway (ENLSystem) parameter, 69 Gateway (Network.TCPIP) parameter, 69 Gateway (Network.UDPv6) parameter, 69 getting started, 39 H hardware requirements, 20 Help, online, 14 Hierarchical Storage Management, 23 history file, defined, 167 history, alerts, 110
175
I including information, 83 indexing component description, 5 minimum requirements, 22 Indexing directory, 31 Indexing Root parameter, 70 indexing services, 26 indexing state, snapshots, 63 information desk view, 43 infrastructure, defined, 168 install directory, 25 installation complete, 27 general procedure, 16 modifying, 35 prepare to, 15 push install, 32 upgrading, 34 installing besernum.xml file, import license keys, 29 Environment Check, running pre-install, 16 Evaluation version, 29 import license keys, 29 installing CPS, 27 Internet Explorer, security, 98 J job details topic box, 133 job ID, not found, 132 job logs defined, 168 job header, 133 SmartLink, 129 topic box, 134 viewing, 128 job monitor view, 47 job name, not found, 132 job pairs alerts, 127 description, 103 exceptions, 131 job report, 107 job state, unknown, 132 job states, 104 job status, 106 jobs 176
defined, 168 monitoring, 103 troubleshooting, 151 Journal directory, 31 JournalRoot parameter, 70 K key components Backup Exec Retrieve, 6 CPS overview, 4 L latency, target, 108, 134 license keys Backup Exec, adding and removing, 29 See also names of individual agents and options limiting bandwidth, 88 LiveUpdate, 3 local system object cache, 33 log entries limiting, 123 parameter, 134 LogOpenFileTableOncePerSet parameter, 70 LogPath (EFC) parameter, 70 LogPath parameter, 70 Logs directory, 25 LogText parameter, 71 M managing backup destinations, 54 backup job status, 103 Business Servers, 49 snapshots, 58 source properties, 49 Master (ENLSystem) parameter, 71 MaxDirSize parameter, 71 MaxLogSize (ENL) parameter, 71 MaxLogSize parameter, 71 MaxPacketSize (Network.TCPIP) parameter, 72 MaxPacketSize (Network.UDPv6) parameter, 72 MaxRAPerCentChange parameter, 72 menu bar, 40 MinRASizeInKb parameter, 72 modifying filters, 85 monitoring jobs, 103
monitoring processes, 103 MsBetweenRallyChecks parameter, 72 N NamedObjectsRoot parameter, 73 navigation bar, 40 NetBios, 24 Network (ENLSystem) parameter, 73 Network Helper services, 23, 24, 26 network load balancing service, 28, 139 network shares, restoring, 95 NeverDoRegionAnalysis parameter, 73 NumberOfLogs parameter, 73 O OutboundJournalCleanupSize parameter, 73 OutboundJournalNominalSize parameter, 74 OutboundSyncJournalLimit parameter, 74 overview view, 43 P pair header topic box, 134 pair log topic box, 134 pair status, 106 pairs, job, 103 parameters, tunable, 65, 66 AlertGroomFrequency, 66 AlwaysDoRegionAnalysis, 66 BroadcastAddress, 67 BroadcastHops, 67 changing values, 76 ConnectionPooling, 67 DaysToKeepAlertItems, 67 DaysToKeepDeletedSnapshots, 67 DelayDirChangeNotifications, 68 DoEventLog, 68 EnableDebugConsole, 68 EnableLogFile, 68 EnableTimestamp, 68 FFXPort, 69 FilteredIDList, 69 Gateway (ENLSystem), 69 Gateway (Network.TCPIP), 69 Gateway (Network.UDPv6), 69 IndexingRoot, 70 JournalRoot, 70 LogOpenFileTableOncePerSet, 70 LogPath, 70
LogPath (EFC), 70 LogText, 71 Master (ENLSystem), 71 MaxDirSize, 71 MaxLogSize, 71 MaxLogSize (ENL), 71 MaxPacketSize (Network.TCPIP), 72 MaxPacketSize (Network.UDPv6), 72 MaxRAPerCentChange, 72 MinRASizeInKb, 72 MsBetweenRallyChecks, 72 NamedObjectsRoot, 73 Network (ENLSystem), 73 NeverDoRegionAnalysis, 73 NumberOfLogs, 73 OutboundJournalCleanupSize, 73 OutboundJournalNominalSize, 74 OutboundSyncJournalLimit, 74 PreferredAddress (Network.TCPIP), 74 PreferredAddress (Network.UDPv6), 74 PreferredNIC (Network.UDPv6), 75 PreferredNIC(Network.TCPIP), 74 ReservedFreeDiskSpace, 75 RxRmsStaticPort, 75 RxRsaStaticPort, 75 Schedule, 75 SerializeIrpLogging, 75 ShareInfoAsSingleComponent, 76 Socket, 76 UsePrivateFindFileMethod, 76 Verbose (ENL), 76 VolumeLevel, 76 periodic backup defined, 168 description, 11 permissions backup destinations, 54 defined, 168 media server, 123 planning, backup, 9 port settings Services Manager, 24 Settings Utility, 24 pre/post commands adding, 89 runtime settings, 124 PreferredAddress (Network.TCPIP) parameter, 74 PreferredAddress (Network.UDPv6) 177
Index
parameter, 74 PreferredNIC (Network.TCPIP) parameter, 74 PreferredNIC (Network.UDPv6) parameter, 75 preview pane, 41 properties alerts, 111 backup destination, 46 backup jobs, 46 server, 44, 49 Protection Agent defined, 5, 167 service, 26 Protection Server description, 4, 168 minimum requirements, 20 uninstalling, 35 push installation, 32 R registry entries, 65 regular backups, defined, 168 Remote Agent for Windows Systems, 6 renaming backup folders, 54 reparse points, 23 report, job, 107 requirements disk space, 151 hardware, 20 ReservedFreeDiskSpaceparameter, 75 responding to alerts, 112 restore jobs, defined, 168 restore view, 47 restoring as the administrator, 92 from the desktop, 99 network shares, 95 overview, 91, 97 retention policies, snapshots, 58, 61 retention properties, defined, 169 run log topic box, 132 RunLog parameter, 132 RxRmsStaticPort parameter, 75 RxRsaStaticPort parameter, 75 S Schedule parameter, 75 scheduled backups defined, 169 178
description, 11 schedules changing, 87 changing for snapshots, 60 continuous backups, 80 snapshots, 59 scripts, 89 security, 140 security modes domain, 53 workgroup, 54 security, Internet Explorer, 98 selection pane, 40 SerializeIrpLogging parameter, 75 server properties, 44 servers, managing properties, 49 servers, moving between backup groups, 51 service account, 140 Services Administration Service, 26 Broker Services, 26 Configuration Writer, 26 database, 26 indexing, 26 Network Helper, 26 Protection Agent, 26 System State Manager, 26 Web restore backend, 26 Web restore frontend, 27 Web server, 27 services manager, 53 Services Manager utility, 156 setintegratedlogin utility, 156 Settings Utility, 3, 65 setup view, 43 setup view properties, 44 Shadow Copy Components, 12, 169 Shadow Storage, changing location, 55 ShareInfoAsSingleComponent parameter, 76 Single Instance Storage, 23 SmartLink alerts, categories, 125 credentials, 142 defined, 169 description, 122 fatal alerts, 125 job log descriptions, 129 job logs, summary messages, 130
job topic box, 129 options topic box, 132 topic boxes command line syntax errors, 131 CPS jobs, 133 exceptions, 131 job details, 133 job log, 134 options, 132 pair header, 134 run log, 132 snapshots changing schedules, 60 creating on demand, 59 deleting, 63 indexing state, 63 managing, 58 reasons for deleting, 62 reindexing, 145 retention, 61 retention policies, 58 scheduling, 59 storing, 61 viewing history, 62 Socket parameter, 76 status bar, 41 status, job and pair, 106 storage space, 170 strategic backup plan, 170 strategic naming conventions, defined, 170 strategies, backup, 9 Symantec knowledge base, 14 LiveUpdate, 3 Technical Support, 13 System Cache directory, 31 System Information, 11, 93 system requirements disk space, 151 hardware, 20 minimum, 18 system resources, 170 System State, 11 backup schedule, 93 backup, defined, 171 Manager, 26 restore to an Active Directory, 94 restoring, 93 system summary view, 43 Index
T target latency, 108, 134 task pane, 40 Technical Support, 13 troubleshooting, 135 troubleshooting issues Administration Console, 143 anti-spyware software, 138 Apache Tomcat Web Server, 138 Backup Exec Retrieve, 152 browsers supported, 138 business servers, 144 configuration, 145 connection outages, 149 Continuous Management Service, 143 CPS and Backup Exec, 137 CPS backup jobs, 149 CPS compatibility, 136 CPS components, 143 CPS configurations, 145 CPS restore jobs, 150 CPS tools and utilities, 155 credentials and security, 140 database backup and restore, 148, 155 database maintenance, 155 database validationa nd repair, 155 disk space for indexing, 145 file system filter drivers, 137 installation, 138 job monitoring, 151 network load balance, 139 NIC failure, 138 pathnames with Asian characters, 139 processing efficiency, 147 protection servers, 144 push installing over domain trust, 138 services account, 140 Services Manager utility, 156 setintegratedlogin utility, 156 snapshot schedules, 146 SNMP support, 148 system state backup and restore, 150, 151 uninstalling CPS, 139 utility partitions, 148 workgroups and domains, 138 U uninstalling 179
Business Server, 36 Continuous Management Service, 35 destinations, 35 Protection Server, 35 sources, 36 use model, 6 UsePrivateFindFileMethod parameter, 76 user rights, 140 V Verbose (ENL) parameter, 76 Veritas Replication Exec, 16 Storage Replicator, 16 viewing
and filtering active alerts, 110 job statuses, 103 snapshot history, 62 VolumeLevel parameter, 76 W Web restore backend services, 26 frontend services, 27 server component, 5, 21 Web server service, 27 Windows File Sharing, 24 workgroup environment, 140 security mode, 53
180