Implementing Backup and Recovery: The Readiness Guide for the Enterprise [1st ed.] 0764571737

* Offers the first comprehensive reference on the topic of backup systems for both UNIX and Windows NT * Provides a comp

423 20 8MB

English Pages 356 Year 2003

Report DMCA / Copyright

DOWNLOAD PDF FILE

Recommend Papers

Implementing Backup and Recovery: The Readiness Guide for the Enterprise [1st ed.]
 0764571737

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Citation preview

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Ba ck Co ver Gu id e f or t h e Ent er pr ise Sy stem back up is essential any enter pr ise—pr otecting alent t o pr ot ecting th e com pany or ISBN:0471227145 by Davidin B. Little and David A. Chapa dat a is equiv agency . Whether you hav e the t ask of putt ing together a back up and r ecover y system for your or ganizat ion or John Wiley & Sons © 2003 (340 pages) your ar e think ing about how backup and recov er y fits w it hin t he scope of t otal data av ailability, I m plem en t in g guide tak es r eaders thr ough the necessar steps you of thr ough t he necessar y steps of Backu p an d RecoverThis y is an in valuable r esour ce. This detailed guidey takes deploy v ices tochitectur addr esse,the deploy ing ser v ices by showing ingser y ou howbytoshowing addr ess how the ar lim itat ions, and capabilities of the existing are. chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur net wor k infr astr uctur e. After an intr oduction t o backup and r ecovery in th e enter pr ise, Little and Chapa give a tutor ial on the com pon ents of backup. Then, using VERI TAS NetBack up as an example, they show y ou how to install and

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Implementing Backup and Recovery-The Readiness Gu id e f or t h e Ent er pr ise ISBN:0471227145 David B. Little and David A. Chapa Guide forby the Enterprise (VERITAS Series) John Wiley & Sons © 2003 (340 pages)

David B. Little This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the

David A. Chapa ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s

Wiley ent Publishing, Inc. I mplem ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) Executive Publisher:

I ntr oduction

Pa r t I Robert - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt Ipsen

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Executive Editor:Requirements of Back up Systems Chapter 2 - Business Chapter 3

- An I ntr odu ction to NetBackup

Carol Long

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4 - Evaluating Stor age Media Requir ements Developmental Editor: Chapter 5

- Gener al Discussion on Configur ation

Adaobi Tulton Chapter 6 - Obi Monitor in g the Backup Pr ocess Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Editorial Manager:

Chapter 9 - Malm The Expanding Back up System Kathryn Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Production Chapter 10 - The Editor: Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena

Angela Smith

Appendix A - Com m and-Line I nter face Gu ide Appendix - Glossar TextB Design & yComposition: Appendix C - Tuning Your Backup and Recov er y Application

Wiley Services Appendix D Composition - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

Copyright © 2003 David Little and David Chapa. All rights reserved.

Appendix F - Per for m ance Test Tech Note

Appendix G - Net Backu p Per form ance Tuning on Windows

Published by Wiley Publishing, Inc., Indianapolis, Indiana I ndex List of Figur es

Published simultaneously in Canada

List of Tables

List Sidebars Noofpart of this publication may be reproduced, stored in a retrieval system, or transmitted in any form

or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through < Day Day Up > payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8700. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4447, E-mail: . Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.

For general information on our other products andDay services < Day Up > please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002. Trademarks: Wiley, the Wiley logo and ver related are trademarks or registered I m plem en t ingPublishing Ba cku p an d Reco y: Thtrade e Readress din ess Gu idPublishing, e f or t h e Ent er in pr ise trademarks of Wiley Inc., the United States and other countries, and may not be used ISBN:0471227145 by David B.NetBackup Little and David A. Chapa DataCenter without written permission. and NetBackup are trademarks or registered John Wiley & Sons © (340trademarks pages) trademarks of VERITAS Software. All2003 other are the property of their respective owners. Wiley Publishing,This Inc.,guide is nottak associated any product or vendor in this book. es r eaderswith thr ough the necessar y stepsmentioned of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim capabilitiesformats. of t he exSome isting content that appears in print Wiley also publishes its books in itaations, varietyand of electronic net wor infr astr uctur e. may not be available in kelectronic books.

Library of Congress Cataloging-in-Publication Data:

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> ISBN: 0-471-22714-5 Ta ble o f Con t en t s

I mplem Recover y—The Readiness Guide for the Enter pr ise Printedentining theBackup Unitedand States of America ( VERI TAS Ser ies) I ntr 10oduction 9 8 7 6 5 4 32 1 Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained Dedication Chapter 2

- Business Requirements of Back up Systems Dedicated to Overlin L. ction Chapa, 1933-2001 Chapter 3 - An I ntr odu to NetBackup Pa r t I I - Back up P roduct Tutor ia l

'Chapa'

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5 -wish Gener al Discussion onaConfigur Dad, I only I could hand you copy ofation this. Chapter 6

- Monitor in g the Backup Pr ocess

About 7the -Authors Chapter Evaluating Ot her Back up- Related Featur es and Options Chapter 8

- Gener al Tr oubleshooting Tips

David B. Little joined VERITAS Software in April 1997. He was a support engineer and helped The Expanding Back up System develop the- multi-tiered support model that is a cornerstone of the world-class support organization. In Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s 1999, he joined the Sales department as a technical product specialist. In this capacity he has traveled Chapter The Fut ure of Backup around10 the-world promoting NetBackup and frequently speaking at user conferences. He also teaches Chapter 11 Maj or Players in the Backup Ar ena NetBackup to internal VERITAS engineers and consultants as well as partners, resellers, and Appendix A Com m and-Line I nter face Gu ide customers. Chapter 9

Appendix B - Glossar y

Prior to joining VERITAS, Dave worked at Control Data Corporation/ Control Data Systems Appendix C - Tuning Your Backup and Recov er y Application Incorporated for almost 30 years. He worked software support engineer for NetBackup and Appendix D - Disaster Recovery Planning Kit—Fras omaEnd to Beginning

various UNIX operating systems. He was also Kit—The the leading Appendix E - Business I mpact Analysis Planning Storsupport m Befor engineer e t he Calmfor the super computers including the Cyber 205 and the ETA10.

Appendix F - Per for m ance Test Tech Note

Appendix G in - Net Backu p Per form Dave lives Minnesota with hisance wifeTuning Nancy,oncatWindows Buster, and dog Astro. I ndex

David A. Chapa wears many hats at DataStaff (www.datastaff.com). In his official role he is the List of Figur es Consulting List of Tables Manager responsible for managing the vision and direction of the consulting practices. He is also co-founder of Gray House Solutions (www.GrayHouseSolutions.com), a software company List of Sidebars providing integrated disaster recovery solutions whose flagship product is Duplication Suite. Prior to joining DataStaff, he held several senior level technical positions with various software < Day Day Up > space. His experience spans 18 years in manufacturers in the Backup Storage Management market the computer industry with such companies as Cheyenne Software, Unisys, OpenVision, and NSI Software, with the last 10 years focused solely on data availability and storage. The first version of NetBackup he worked with goes all the way back to version 1.6 while he was employed with OpenVision. While at OpenVision he formally prepared and presented NetBackup Training for many large companies across the country and Canada. David is a Certified Veritas NetBackup Instructor for both NetBackup Fundamentals Class and the Advanced NetBackup class. David is an energetic and dynamic speaker who brings a great deal of experiential knowledge, humor, and keen insight to his presentations. He has been a speaker at VERITAS Vision, Chicago Software Association's discussion on Backup Storage Management principles, and a number of user groups in the past. His Web site, www.BackupScripts.com, has built a community where sharing of ideas, scripts, tips, and concepts has provided a great deal of value to its members and best of all, it is free. Today David remains a billable consultant. He enjoys the client contact and continues to find the work

challenging and stimulating as he helps his assets. Acknowledgments I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess

I want to first thank Nancy, Gumy id e wife, f or t h e Ent erfor pr all iseher support during this long and sometimes arduous process. Thanks by forDavid doingB.allLittle the driving so IA.could work on theISBN:0471227145 book. We can't accomplish much and David Chapa without a supportive and(340 I am no exception. My kids, Dan, Lisa, Jill, Jeff, and Amanda, Johnfamily Wiley behind & Sons us © 2003 pages) have always beenThis there as well as my parents, Ray David and Jeffie Little. Thanks to you all. guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the

I would also like to give a special my co-workers Coby ar chitectur e, lim itthanks ations, to and capabilities of tJim he ex istingand Mark Erickson who were there to help andnet also worprovided k infr astrcontent uctur e. when asked. I am sure my family and my co-workers were beginning to wonder if there really was a book. I guess this is the proof. < ?xm l version= " 1.0"also encoding= " I SO8859- 1" ?> who was willing to review the chapters as I completed A special thanks goes out to Dave High Tathem ble o fand Contook t en tthe s time from his own busy schedule to provide comments and feedback. This book I mplem ing Backup and happened Recover y—The Readiness Guideoffor the Enter ise Brad Hargett who afforded would ent never even have without the support Scott Tirrellprand ( VERI TAS Ser ies)

me the time as needed. I would also like to thank the following VERITAS people who were willing to

I ntr oduction review parts of the book and offer comments: Danny Dunn, Erik Moller, Bill Drazkowski, Shawn Pa r t I - I ntJohn r oduct ion t o Terry Ba ck up and Recove y in theand Ent Hector er pr i se Herrero. Env ir onm Charlie e nt Aquino, Moore, Noonan, Jim rOlson,

Van Meter and Bob

Chapter 1 skillfully - Backup and Recover y Sy st em Requir emthe ents Ex plained Santiago provided the figures, especially better ones. Chapter 2 - Business Requirements of Back up Systems

I would3like- toAnthank thection stafftoatNetBackup John Wiley & Sons for being patient with a beginning author and taking Chapter I ntr odu the to help through Pa r t Itime I - Back up Pme roduct Tutor some ia l

of the rough spots. The original drivers behind this entire project

were Paul andStor Richard Barker. They are to be either thanked or blamed. Chapter 4 Massiglia - Evaluating age Media Requir ements Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

-David B. Little

Chapter 7 - Evaluating Ot her Back upRelated Featur es and Options To my parents for always believing that I could do anything I put my mind to, thanks mom and dad. Chapter 8 - Gener al Tr oubleshooting Tips

Thanks9 to Kevin my Back friend boss, and to everyone at DataStaff for their constant Chapter - The Weiss, Expanding upand System encouragement. Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s Chapter 10 - The Fut ure of Backup

Thanks to Peter L. Buschman, friend and co-laborer in the field of backup storage management. Your keen insights continue to challenge me to think not only outside the box but to search for an entirely Appendix Com m and-Line I nter face Gu ide new boxAto -explore. Chapter 11 - Maj or Players in the Backup Ar ena Appendix B - Glossar y

Thanks to Massiglia at VERITAS for his advice as a seasoned author and to Dave Little for Appendix C Paul - Tuning Your Backup and Recov er ysage Application asking me jump onRecovery board with this project. great experience … so when's the next one Appendix D -toDisaster Planning Kit—FrIt's om been End toa Beginning Dave? E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix Appendix F - Per for m ance Test Tech Note

Thank you must go out to Charlie Van Meter, VERITAS, and his team for taking our diagrams, pictures, and drawings and making us look good!

Appendix G - Net Backu p Per form ance Tuning on Windows I ndex

List es folks at Wiley, thank you for allowing me this opportunity, especially to Adaobi Obi Tulton All oftheFigur great List TablesLong for challenging us to push forward! And Angela Smith for her diligence. andof Carol List of Sidebars

To the Starbucks in Lake Geneva, WI-many thanks! I did most of my writing after work in that little shop on a $1.83, venti coffee-no room, thank you very much. Thanks for putting up with me! < Day Dayfor Upthe > backup models and his all around To my brother Joe, for helping me with the equations support and prayer.

With great thanks to the many people at my church Redeemer PCA for their continued encouragement, support, and prayer through this project. And with eternal thanks to my lovely wife Jill (I love you) for giving up so many evenings and weekends together so I could work on this book; and to our children, Ashley and Tyler (I love you two so much), who caught the writing bug and started a few of their own books while daddy was working on his. There are many others who have helped me throughout my career, both personally and professionally, every one of them were instrumental in getting me to this point. Thanks to Kathy DeLeo, Jeff Gentges, Wendy Petty, Yuda Doron, Betty McGee, Craig Burdett, Bob Allums, Brian and Leslie Schwartz, Steve Alburty, and everyone else who has had an impact on my life.

Lastly, but certainly not least is my thanks to m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plemIs en tOrganized ing Ba cku p an d Reco ver y: Th e Rea din ess How This Book Gu id e f or t h e Ent er pr ise

by David B. Little and David table A. Chapa This book is oriented as most publications: of contents inISBN:0471227145 the beginning, index at the end, John & and Sonsa©glossary 2003 (340 pages) appendices before theWiley index, mixed in there as well. Why are we bothering to state the obvious? Well, we think thattak when you approach a technology or any book for that matter, it is This guide es r eaders thr ough the necessar y book, steps of ices by showing howare to first addrbefore ess theyou even read the first chapter. We important to notedeploy whereing allser of vthese components ar chitectur lim itpage ations, capabilities t he ex isting often begin reading a book e, from 1, and Chapter 1, but of rarely find ourselves picking out the gems of net wor k infr astr uctur e. wisdom left there by the author (yes, we think we have one or two for your reading pleasure).

Wel want to offer you a challenge: Do1"not < ?xm version= " 1.0"toencoding= " I SO- 8859?> start at page 1, Chapter 1 with our book; rather, after reading the introduction, read the back cover, scan intelligibly the index for terms that are of interest to Ta ble o f Con t en t s you, then read the glossary and y—The become familiar with the thatpr we I mplem ent ing Backup and Recover Readiness Guide forterms the Enter iseuse in this book. Next, intelligibly scan ( VERI TAS Ser ies) the table of contents looking for chapters that pique your interest before you read page 1 of Chapter 1. This gives you a much clearer picture of what is ahead as you begin to read and I ntr oduction hopefully much read ourirbook, but Pa r t I - I nt ra oduct ionmore t o Barich ck upexperience and Recoveas r y you in the Entnot er prjust i se Env onm e nt Chapter 1

any book.

- Backup and Recover y Sy st em Requir em ents Ex plained

Now on to the organization of our book. This work is separated into three parts. Part One is an - Business Requirements of Back up Systems introduction to backup and recovery in the enterprise. We felt it was important to lay down some Chapter 3 - An I ntr odu ction to NetBackup foundational facts and information in Chapters 1 and 2 regarding data protection and why we would Pa r t I I - Back up P roduct Tutor ia l even bother to protect this data. Chapter 2

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5 builds - Gener Discussion on Configur ation Part Two onalthis foundation. Here, we begin to look at the components of backup through a backup6tutorial. Afterinproviding youPr with the background and basics, we take a more practical view of Chapter - Monitor g the Backup ocess

how to 7apply the information in PartFeatur I by going Chapter - Evaluating Ot her gathered Back up- Related es andthrough Optionsthe steps of laying out, installing, and configuring backup application. Since Chapter 8 - aGener al Tr oubleshooting Tipscollectively we bring about 10 years' experience with VERITAS Software's product Chapter 9 -NetBackup The Expanding Backspecifically, up System we will be using NetBackup for the purposes of illustration throughout book. is theupmost installed Pa r t I I I - Thethe Ente r pri seNetBackup I m pa ct of Back Sy ste ms

backup and recovery solution in the UNIX space

and is gaining considerable ground in the Wintel space as well. Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena

Every site is different and unique, with different business needs and requirements. The business will drive much of the decisions for your backup plan, as you will see in our approach and some of the Appendix - Glossar y describe. While we won't be able to give you a step-by-step roadmap for real-life B scenarios we Appendix C Tuning Your Backup and Recov er y Application architecting your backup and recovery system, we will provide you a firm foundation on which to build, Appendix D Disaster Recovery Planning Kit—Fr om End to Beginning with additional resource help on some of the components you can add to your environment to address Appendix E - Business I mpact Analysisyour Planning Kit—The Stor m Befor e t he Calm your specific needs, thus reinforcing backup infrastructure. Appendix A - Com m and-Line I nter face Gu ide

Appendix F - Per for m ance Test Tech Note

Chapters 7 really outance our Tuning discovery of NetBackup as a product, including discussions on its Appendix G4 -toNet Backurounds p Per form on Windows

architecture, how to determine your media requirements, installation considerations, configuration, and I ndex monitoring. Chapters 8 to 9 really begin focusing more on taking NetBackup from its 'stock' configuration and enhancing it through options and advanced features. Here we also offer List of Tables troubleshooting tips. List of Figur es

List of Sidebars

In Part Three we explore the ever-explosive growth our backup enterprises face and provide suggestions for dealing with such growth. You might want to read this section before finishing your architecture because it is always a good idea < to Day plan Dayfor Upthe > future now rather than having to react to it later. We also take some liberties in discussing the future of backup. We take a peek into the backup and recovery crystal ball and share some of the things that are being considered for the future of backup and recovery, some that are in progress, and others yet to be explored. We have elicited input from some of the best minds in the field for this information. Lastly, we have added some very rich content in the appendices to help you in your labor. You will find a business impact analysis (BIA) planning kit, disaster recovery (DR) planning kit, NetBackup tuning guide, performance testing technical note, Command Line Interface (CLI) guide, and a glossary of terms. The planning kits, while not exhaustive, do provide you a very nice starting place if you have not performed BIAs or created DR plans at your company. The tuning guide will give you very practical methods for making sure your NetBackup environment is performing optimally. Throughout the book we will use our personal experiences with real-life client situations to explain

particular concepts or topics more clearly. < Day Day Up >

< Day Day Up > I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m Read plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Who Should This Book Gu id e f or t h e Ent er pr ise

David helpful B. Little information and David A.for Chapa This book shouldby provide anyone who isISBN:0471227145 involved in protecting the ever-growing John Wiley & depends Sons © 2003 (340 pages) volume of data that everyone on. This could be the person in the information technology (IT) or information services (IS) tak department, database administrator, This guide es r eaders the thr ough the necessar y steps or of the backup administrator. This deploy ing ser v ices by showing how who to addr ess the could also include the value-added reseller (VAR) is responsible for assisting his or her clients in ar chitectur e, lim system. it ations, and of t currently he ex istinguses VERITAS Software's setting up a backup and restore Also,capabilities anyone who net wor k infr astr uctur e. NetBackup will find this book invaluable, especially the detailed appendices. This book is also a necessity for anyone who wants to complete the ultimate computer library. There is a chapter that discusses the" 1.0" otherencoding= major applications < ?xm l version= " I SO- 8859-that 1" ?>are available, where we give equal billing to the 'major Taplayers.' ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction

< Day Day Up >

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Summary

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

ISBN:0471227145 David Little anduseful Davidas A. you Chapa We hope you willby find this B. work very plan, maintain, and administer your backup John Sonsthe © 2003 (340 pages) environments. It is ourWiley desire& that practices found in this work provide you a level of consistency in the planning, architecting, delivery ofthr your solutions. Oneything This guideand tak es r eaders ough the necessar stepswe of have learned while writing this ser v of ices by showing how to the addrsame ess thetask. What we have attempted to do book is that theredeploy are a ing variety ways to accomplish ar chitectur e, lim it ations, capabilities of complexity t he ex istingwithin your environment while here is to document those practices that and will minimize the net wor k infr astr uctur e. maintaining a highly efficient and effective solution.

In the beginning this introduction, we 1" welcomed you to the wonderful world of backup and recovery. < ?xm l version= " 1.0"ofencoding= " I SO- 8859?> However, when it comes to planning, we should really call it the wonderful world of 'recovery and Ta ble o f Con t en t s backup.' will see in the pages that follow, itGuide is thefor recovery requirement that defines our backup I mplem ent As ing you Backup and Recover y—The Readiness the Enter pr ise strategy, andies) it is our time to recovery that defines our success-not the speed of our backup. The role ( VERI TAS Ser of oduction the backup administrator is integral in any company; in fact, you can consider it the second most I ntr important job inion your When does it become first? When they Pa r t I - I nt r oduct t o company. Ba ck up and Recove r y in the Ent er the pr i se Env ir onm e nt Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems - An I ntr odu ction to NetBackup < Day Day Up >

Chapter 3

can't access their data!

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Part I: Introduction to Backup and Recovery in the Gu id e f or t h e Ent er pr ise ISBN:0471227145 by David B. Little and David A. Chapa Enterprise Environment John Wiley & Sons © 2003 (340 pages) This guide tak es r eaders thr ough the necessar y steps of

Chapter 1: Backup andser Recovery System Requirements deploy ing v ices by showing how to addr ess Explained the ar chitectur e, lim it ations, and capabilities of t he ex isting

Chapter 2: Business net wor k Requirements infr astr uctur e. of Backup Systems Chapter 3: An Introduction to NetBackup < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s

I mplem ent ing Backup and Recover y—The Readiness for>the Enter pr ise < Day Guide Day Up ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Chapter IGu 1: Backup and Recovery System id e f or t h e Ent er pr ise ISBN:0471227145 by David B. Little and David A. Chapa Requirements Explained John Wiley & Sons © 2003 (340 pages) This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting netofwor k infr astrset uctur Abackup is a copy a defined of e.data, ideally as it exists at a point in time. It is central to any data

Overview

protection architecture. In a well-run information services operation, backups are stored at a physical distance from" 1.0" operational data, usually on?>tape or other removable media, so that they can survive < ?xm l version= encoding= " I SO8859- 1" events that destroy or corrupt operational databases. Backups may be Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise KeptSer at ies) the data center, so that if a storage device, system, or application failure or operational ( VERI TAS

error destroys vital online data, the business can restore its operational records as of a relatively recent fixed point in time. From that point, database logs can restore (nearly) up-to-date business I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt data.

I ntr oduction Pa r t

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2 - toBusiness Requirements Backto up protect Systems Moved one or more alternateofsites, against environmental events that destroy an Chapter 3 data - An center. I ntr odu ction to NetBackup entire With recent backups of operational databases, a business can resume Pa r t I operation I - Back upquickly P roductwhen Tutoralternative ia l

Chapter 4

computing facilities are available.

- Evaluating Stor age Media Requir ements

Made (for example, copiedation onto CD-ROM) to provide durable business records for Chapter 5 unalterable - Gener al Discussion on Configur regulatory and business policyPr purposes when the data is no longer required online. Chapter 6 - Monitor in g the Backup ocess Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System < Day Day Up >

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plemSimple en t ing Ba cku Backup Seems … p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by Davidstrategy B. Littleisand DavidAA.system Chapa administrator Conceptually, a backup simple. decides what data is critical for John Wiley & Sons © 2003 (340 pages) that has a minimal effect on operations, and uses business operation, determines a backup schedule a backup utility program to make copies. Thethe backups arey stored This guide tak es rthe eaders thr ough necessar steps ofin a safe place so they can be deploy ser v ices by showing how to addr ess the used to recover from a ing failure.

ar chitectur e, lim it ations, and capabilities of t he ex isting wor k infr uctur e. Though a backupnet strategy is astr quite simple in concept, the difficulty comes in the details. Architecting a backup and recovery strategy is more involved than most people realize. One of the most frustrating andl version= discouraging is determining < ?xm " 1.0" tasks encoding= " I SO- 8859-where 1" ?> to start. What at first seems a simple task becomes daunting as you start digging deeper and realize how many elements of the backup strategy are Ta ble o f Con t en t s interconnected. For example, as a system administrator of the a large chances are you would I mplem ent ing Backup and Recover y—The Readiness Guide for Enterenterprise, pr ise not want theies) burden of deciding what data is backed up when, and for how long it is kept. In fact, you ( VERI TAS Ser may be presented with various analysis summaries of the business units or own the task of I ntr oduction interviewing the ion business managers to Env have them Pa r t I - I nt r oduct t o Ba ckunit up and Recove ryourself y in the in Entorder er pr i se ir onm e ntdetermine the data, the window in which backup may run, and the retention level of the data once it is stored on the backup media. Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained This is often called a business impact analysis (BIA) and should yield some results that will be useful Chapter 2 - Business Requirements of Back up Systems during the policy-making process. The results of these reports should also help define the recovery Chapter 3 - An I ntr odu ction to NetBackup window, should this particular business unit suffer a disaster where data cannot be accessed or Pa r t I I - Back up P roduct Tutor ia l updated. Knowledge of these requirements may, in fact, change the entire budget structure for your Chapter 4 - Evaluating Stor age Media Requir ements backup environment, so it is imperative during the design and architecture phase that you have some Chapter 5 - Gener al Discussion on Configur ation understanding of what the business goals are with regard to recovery. Chapter 6

- Monitor in g the Backup Pr ocess

Chapter Evaluating Ot her Back up-managers Related Featur Options You will7 find- that most business unit are es notand as concerned about backup as they are with Chapter 8 Gener al Tr oubleshooting Tips recovery. As you can see from the level of complexity of our example, too often the resulting frustration Chapter 9 to- inactivity The Expanding up System may lead whereBack nothing gets done-or at least not done in the most effective manner. The Pa r t I I I - The Ente se I m pa ct of Back up system Sy ste m sis obvious intent of rapri backup and recovery

to provide data protection. Since we are setting up a

system10 to protect theure data, the next step also seems obvious: Determine how much data is in the Chapter - The Fut of Backup enterprise it resides. is an important part of establishing the backup and recovery Chapter 11 and - Majwhere or Players in the This Backup Ar ena system, Abut- itCom does not provide enough to architect a strategy. In addition to knowing how Appendix m and-Line I nter face Guinformation ide much data havey and where it is, you must also have a good understanding of why the data is being Appendix B -you Glossar backed up whatYour the recovery requirements are. This is necessary so you can make the Appendix C -and Tuning Backup and Recov er y Application

appropriate about thePlanning overall Kit—Fr backup strategy. The more you understand the Appendix D - decisions Disaster Recovery omand Endrecovery to Beginning

nature of the data and the level of protection required, the better decisions you can make in setting up the entire backup and recovery environment.

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note

Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es

< Day Day Up >

List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess The Goals of Tape Backup Gu id e f or t h e Ent er pr ise

ISBN:0471227145 B. mind Little that and the David A. Chapa You always want by to David keep in overall goal of tape backup is to make copies of your data Wiley & Sons © 2003 that can be used John to recover from any kind(340 of pages) data loss. The primary goals of the tape backup portion of an overall data protection are to thr doough the following: This guidestrategy tak es r eaders the necessar y steps of

deploy ing ser v ices by showing how to addr ess the ar chitectur e, the lim itbusiness ations, and capabilities of t he isting configured backup Understand the goals of in order to deliver a ex properly environment.net wor k infr astr uctur e.

Enable information services to resume as quickly as is physically possible after any system

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> component failure or application error. Ta ble o f Con t en t s

I mplem ent ing data Backup andrelocated Recover y—The Readiness Guidewhen for the pr iseby the business. Enable to be to where it's needed, it'sEnter needed ( VERI TAS Ser ies) I ntr oduction Meet regulatory and business policy data retention requirements. Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Meet in the event disaster, return the business to a predetermined operating Chapter 1 recovery - Backupgoals; and Recover y Sy st of emaRequir em ents Ex plained level. Chapter 2 - Business Requirements of Back up Systems Chapter 3

- An I ntr odu ction to NetBackup

Each of these goals relates to a specific area of data protection and needs to be considered as we put together our overall backup strategy. Specifically, you should ask why data is being backed up. As you Chapter 4 - Evaluating Stor age Media Requir ements consider each system or group of systems, keep in mind whether the data is being backed up to Chapter 5 - Gener al Discussion ation protect against failure, disaster, on or Configur regulatory requirements, and if the goals of the business will be met Chapter 6 Monitor in g the Backup Pr ocess in the event of a failure or disaster. In reality, your success as a backup administrator will not be Chapter 7 - Evaluating Ot her up-toRelated Featur and but Options measured by how fast you areBack able back up youresdata how swiftly you are able to meet the Chapter 8 Gener al Tr oubleshooting Tips aforementioned goals. Stated simply, your success will be defined by the restorability of the data in the Chapter 9 - The Expanding Back up System environment. Pa r t I I - Back up P roduct Tutor ia l

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena < Day Day Up > Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

plem enBackup t ing Ba cku p an d Reco ver y: Th e Rea din ess The Role ofI mTape Gu id e f or t h e Ent er pr ise

by David user, B. Little and David A. Chapa For a personal computer backup typically means makingISBN:0471227145 a copy of the data on the computer's & Sons ©Personal 2003 (340 pages) hard drive onto aJohn tapeWiley or CD-ROM. backup media are often labeled by hand and are 'managed' by storing drawer orthr cabinet located in the roomofwith the computer. In the This them guide in takaes r eaders ough the necessar y steps deploy ing ser showing how to addr ess the enterprise, data protection is av ices littleby more complex. Enterprise backup must be able to do the following: ar chitectur e, lim it ations, and capabilities of t he ex isting infr astr uctur e. organized as files, databases, or the contents of logical Make copiesnet of wor yourk data, whether volumes or disks. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Manage the backup media that contain these copies so that any backup copy of any data can be Ta ble o f Con t en t s

quickly and reliably located when required, and so that the media can be tracked accurately,

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise regardless ( VERI TAS Ser ies) of the number. I ntr oduction

Provide mechanisms to duplicate sets of backed up data so that while a copy remains on-site for quick restores, another copy can be taken off-site for archival or disaster protection purposes.

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter Track 2 the - Business locationRequirements of all copies of Back all data up Systems accurately. Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4 Chapter 5

- Evaluating Stor age Media Requir < ements Day Day Up > - Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Why Is the IData Backed Up? Gu id e f or t h e Ent er pr ise

by David B. Little and like David A. Chapa Why you are backing up data seems a trivial question, but ISBN:0471227145 it really needs to be answered for all the John Wiley 2003 common (340 pages) answers to this question are as follows: data in the enterprise. Some&ofSons the ©most This guide tak es r eaders thr ough the necessar y steps of

Business requirement deploy ing ser v ices by showing how to addr ess the

ar chitectur e, lim it ations, and capabilities of t he ex isting

Hardware failure net wor protection k infr astr uctur e. Disaster recovery (DR) < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en tfrom s Protection application failure I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise Protection ( VERI TAS Ser ies)from user error I ntr oduction

Specific service-level agreements with the users/customers (SLA)

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1 requirements - Backup and Recover y Sy st em Requir em ents Ex plained Legal Chapter 2

- Business Requirements of Back up Systems You need what on what systems falls into each category. By interviewing the data Chapter 3 to - understand An I ntr odu ction todata NetBackup

owners, youup willP roduct be better equipped Pa r t I I - Back Tutor ia l

to categorize the data. In most cases, the administrators know

what it 4takes to recover Stor the age operating and, in some cases, the database engines and other Chapter - Evaluating Media system Requir ements applications. However, the onuson must be placed Chapter 5 - Gener al Discussion Configur ation upon the data owner (customer) for the administrators to fully impact to the business in the event there is a data loss (BIA). Chapter 6 - Monitor in gunderstand the Backup the Pr ocess Addressing expectations up front will save much time,Options money, and potential embarrassment. Chapter 7 - their Evaluating Ot her Back up- Related Featur es and

Several years ago, one of us was given the task of architecting a backup solution that would allow for - Gener al Tr oubleshooting Tips quick recovery. 'Quick' recovery is subjective, so the question asked was this: 'What is your expectation Chapter 9 - The Expanding Back up System of a ‘quick' recovery?' Based on the response of 30 minutes, a proposal was drafted for the type of Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s system that would need to be designed to meet this 30-minute recovery window. Soon after Chapter 10 - The Fut ure of Backup management reviewed the proposal, we agreed to a more realistic time frame. So you can see how Chapter 11 - Maj or Players in the Backup Ar ena this would give you an opportunity to show customers how much money their requirements will cost Appendix A - Com m and-Line I nter face Gu ide without you having to lose sleep in the process. Chapter 8

Appendix B - Glossar y

You will C usually find Your someBackup of the and systems fairly static data and would probably be backed up to Appendix - Tuning Recovhave er y Application protect against hardware failure or for DR. Other are very dynamic with a very active user Appendix D - Disaster Recovery Planning Kit—Fr om systems End to Beginning base. Backup of this data should be considered for protection against application failure or user error. Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm What is F generally onTest systems is a mixture of these data types. The core operating system (OS) Appendix - Per forseen m ance Tech Note and base static andoncan be rebuilt from release materials, while data used by Appendix G applications - Net Backu pare Perusually form ance Tuning Windows

the application can be very volatile. We will discuss each of these in more detail. Defining data types is I ndex vital, because understanding the data allows us to determine the recovery requirements. In most cases, the recovery requirements dictate the backup strategy.

List of Figur es List of Tables

List of Sidebars

Hardware Failure Some of the data in an enterprise is backed up specifically to protect against hardware failure. You < Day Day Up > want to be sure you can recover an entire volume or database in case a disk or server fails. (The probability of doing any restore of less than an entire volume is very small.) The backup protection will be geared to this recovery requirement.

The best pure hardware failure protection is disk mirroring-that is, making a complete second copy of the data on disk to another disk. However, this practice does not eliminate the need for backups. For the data that falls into this category, you might consider raw volume backups where all the data in a disk volume is backed up at disk read speed. A raw partition backup is a bit-by-bit backup of a partition of a disk drive on UNIX. On Windows NT/2000, this is called a disk-image backup. You do not read the data via the filesystem, so you avoid adding this process to the system overhead. A raw volume backup can give you much better backup performance; however, it has some restrictions. The primary restriction is that you back up the entire volume. For example, if a 50-GB volume is only 50 percent full, a filesystem backup would result in 25 GB being backed up. However, a raw volume backup would result in 50 GB being backed up, and, accordingly, more tape being used. Then, on the restore,

the entire volume is restored regardless of how much data actually resides in it. You need to take this < Day Day Up > into account when determining whether to do raw backups. The backup strategy for this protection could be configured around the hardware layout of each system. If you know that aensystem backed upver solely hardware I m plem t ing Bawill ckube p an d Reco y: Thfor e Rea din essprotection, you can lay out the Guthe id e backup f or t h e and Ent er pr ise performance. A lot of the data that could fall into this system to optimize recovery ISBN:0471227145 David B. Little David up A. less Chapa category is more by static; it would beand backed frequently and would usually involve full backups. & Sons © 2003 (340enterprise pages) This data can be John entireWiley systems within your or some of the static data that is found on more dynamic systems,This such as the OS-related data thenecessar actual applications that are loaded on a system. guide tak es r eaders thr oughorthe y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

Disaster Recovery

For systems that are a part of your DR strategy, you need to ensure you have all the data required to < ?xm l version= " 1.0"inencoding= I SO- 8859-group. 1" ?> You must also ensure you have all the supporting data rebuild a system an easily "identified Tanecessary ble o f Conto t en ts recover these systems. This can include the supporting OS data as well as everything I mplem ent for ing the Backup and application Recover y—The Readiness for therestores. Enter pr ise required backup in order to do Guide full system Using a vault-type solution ( VERI TAS Ser ies)

where backups are sent off-site to be stored until needed in conjunction with the backup application

I ntr oduction greatly helps this task. Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

The biggest is identifying and applications are critical and determining Chapter 1 - challenge Backup andhere Recover y Sy st em which Requirsystems em ents Ex plained how fast have to Requirements be back online. part the DR strategy should include the priority of recovering Chapter 2 they - Business of A Back upofSystems these systems. speed can dictate some of the backup decisions. It is very likely that Chapter 3 - An The I ntr odu ctionoftorecovery NetBackup systems thatup are a part Tutor of your Pa r t I I - Back P roduct ia l DR

strategy might also require protection within one of the other

strategies. would actually your backup and recovery system to provide the necessary Chapter 4 -You Evaluating Stor ageconfigure Media Requir ements DR protection in addition to any on other requirements. Keep in mind that when you declare a disaster it Chapter 5 - Gener al Discussion Configur ation may mean no longer access to your primary site. So any reports, documentation, call lists, Chapter 6 -you Monitor in g thehave Backup Pr ocess

operations -guides, and so on that you may require should be in an off-site location along with your DR Evaluating Ot her Back up- Related Featur es and Options backup media. Many DR test plans fail because of one document or component that was overlooked.

Chapter 7 Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Application Failure

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup

The data that needs protection against application corruption usually requires more frequent backups. In these instances, the use of both incremental and full backups is very important. The highest risk of Appendix A - Com m and-Line I nter face Gu ide application data corruption is database applications, so you should develop a specific backup strategy Appendix B - Glossar y for these applications. Most of the backup applications can interface with the database applications to Appendix C - Tuning Your Backup and Recov er y Application allow both full and incremental backups that can be done either hot (with the database still active) or Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning cold (with the database shut down). The systems that require this type of data protection might also be Appendix E - DR Business I mpact Analysis Planning Storstrategies. m Befor e t he Calm part of your strategy, so they would be partKit—The of multiple Chapter 11 - Maj or Players in the Backup Ar ena

Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows

User Error

I ndex

List Figur es that is directly user-generated or -accessed, you might want to consider a backup strategy Forofthe data List of Tables for user error protection. This might also include mailboxes, but in these instances, the backup and List of Sidebars recovery strategy is dictated by the mail application. The very nature of providing user error protection

implies that there are many more instances of single file or directory restores, so the backup strategy needs to support this. This strategy would generally involve more frequent incremental backups. The frequency of backups is an important consideration if itUp involves data that users are deleting and < Day Day > restoring on a regular basis. You would also want to ensure the backups are configured to facilitate faster browsing and recovery.

Service Level Agreements You might find some of the data is being backed up to meet a specific service level agreement (SLA). The backup strategy will depend on the exact agreement. It is very possible that the SLA will actually be for a recovery requirement. If that is the case, the backup strategy will be governed by these requirements. This is often the situation where there is a dedicated backup and recovery administration staff that provides this service for a particular company or agency. The other groups or business units become the customers of the backup group and could have specific SLAs. These will usually dictate the backup strategy. This is also the case in hosting centers. It is very important to determine exactly what the exact requirements are. These can involve any of the backup types mentioned, with the

additional requirement to have systems or applications back online within a specific time frame. It is < Day Day Up > common to have an agreement that any request for the recovery of any file or directory must be accomplished within a given time. All of this information is required to allow you to actually put together a backup strategy. I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

Legal Requirements by David B. Little and David A. Chapa

ISBN:0471227145

John Wiley & Sons © 2003 (340 pages)

Your company may be required by law to keep certain data for a particular time period, without This guide tak es r eaders thr ough the necessar y steps of exception. Then there's always the possibility that legal will be very strict in noting that certain data deploy ing ser v ices by showing how to addr ess the types are not to be kept more than a particular time period. These factors will further shape the way ar chitectur e, lim it ations, and capabilities of t he ex isting you architect the net collective backup solution; for example, one server may be a member of multiple wor k infr astr uctur e. policies in order to achieve the legal requirement of its data. It is good practice to always include the legal department when determining the data retention requirements whenever possible. This is < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> essentially a component of a business impact analysis. Ta ble o f Con t en t s

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) < Day Day Up > I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

en t ing Ba cku p an d Reco ver y: Th e Rea din ess ComplexityI minplem Enterprise Backup Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by David B.tape Littlebackup and David Chapastraightforward. The functions of enterprise mayA.seem But implementing a truly functional Johnthat Wiley & Sons © 2003 (340 pages) backup environment meets enterprise data protection requirements can be a complex undertaking. When you design orr update a backup This guide tak es eaders thr ough thestrategy, necessarcomplexity y steps of can arise for several reasons:

deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting Ability to back up all of the data. For the backup strategy to be useful, it must ensure that all net wor k infr astr uctur e.

data that can be lost is backed up. In an enterprise with large numbers of information servers, some of which may share data with others, identifying the sets of data objects to be backed up can < ?xm l version= " 1.0" encoding= be a significant effort. " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise Frequency. ( VERI TAS Ser ies) Backup frequency is essentially a trade-off between resources (network and I/O

bandwidth, processor capacity, tape and library hardware, and application access) and the need I ntr oduction

for the most current data possible. Again, with many information services needing data protection, finding-the right balance between backup frequency and resource consumption is a challenge. Chapter 1 Backup and Recover y Sy st em Requir em ents Ex plained Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 2

- Business Requirements of Back up Systems

Integration Enterprises with many information services are likely to use Chapter 3 - An I of ntrall odudata ction managers. to NetBackup data management Pa r t I multiple I - Back up P roduct Tutor ia l

systems (filesystems and database management systems), each with

its 4own- mechanisms forage backing dataements objects that it recognizes. Your task is integrating these Chapter Evaluating Stor Media up Requir mechanisms a schedule provides Chapter 5 - Generinto al Discussion onthat Configur ation a consistent backup of all required data for a service and them the service changes. Chapter 6 keeping - Monitor in g up-to-date the Backup as Pr ocess Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8 - Generavailability. al Tr oubleshooting Tips application availability is increasingly required in the today's Continuous Continuous Chapter 9 The Expanding Back up System enterprise. A variety of mechanisms enable consistent backups with minimal application Pa r t I downtime. I I - The Ente r pri se I mamong pa ct of Back Sy ste ms Choosing theseupand implementing the

choice can be a complex task.

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena

Media management. Business or regulatory requirements can result in multiyear data retention requirements. Enterprises can find themselves responsible for maintaining backups and archives Appendix B - Glossar y on tens or even hundreds of thousands of media (tape cartridges, optical disk platters, etc.). The Appendix C - Tuning Your Backup and numbers Recov er y of Application procedures for managing large media can also be complex. Appendix A - Com m and-Line I nter face Gu ide

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

Management of multiple locations. Business considerations may require that servers and data be located in multiple locations. Maintaining a consistent set of backup procedures across multiple Appendix G - Net Backu p Per form ance Tuning on Windows data centers can require extensive design or management talent. Appendix F - Per for m ance Test Tech Note I ndex

List of backup Figur es component of an enterprise data protection strategy has to accommodate all of these The List of Tables factors. List of Sidebars < Day Day Up > < Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Where Do We Start? Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by David Little and A. Chapa As you start planning yourB.backup andDavid recovery system, you need to start gathering detailed John Wiley & Sons 2003 (340 pages) the network layout for all systems. If your enterprise information on your enterprise. You©need to know is made up of multiple networks, need know muchy data on it and the speed of each This guide tak es ryou eaders thrto ough thehow necessar stepsresides of deploy ing ser vitices by showing to addr essacross the network or subnet. Obviously, is much faster how to move data a 100-Mb/sec (100Base-T) ar chitectur(10Base-T) e, lim it ations, and capabilities of to t heunderstand ex isting network than a 10-Mb/sec network. You need the network layout and the net wor k infr astr uctur e. corresponding data to help identify potential bottlenecks and take them into consideration as you architect your backup and recovery system. (This information is also necessary in determining where to put media "servers and tape devices, < ?xm l version= 1.0" encoding= " I SO8859- but 1" ?>we will get to that in a later chapter.)

Ta ble o f Con t en t s

As youent look the network that makes your enterprise, needprtoise understand the network speed I mplem ing at Backup and Recover y—The up Readiness Guide for you the Enter and TAS topology. ( VERI Ser ies)You also need to understand the disk layout, especially for the larger file servers and database I ntr oductionservers, or identify who has this knowledge. You should watch for bottlenecks involving the disks, asion thet onetworks, SCSI connections, and any Pa r t I - as I nt rwell oduct Ba ck up and Recove r y in the Ent er pr i seother Env irappropriate onm e nt

I/O paths. When considering the decisions that need to be made when architecting backup strategy, the two things you Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained must always keep in mind are the effect on normal production and effects on restore speed and Chapter 2 - Business Requirements of Back up Systems performance. This usually involves making the necessary cost trade-offs to achieve the best of all Chapter 3 - An I ntr odu ction to NetBackup worlds. Pa r t I I - Back up P roduct Tutor ia l Chapter 4

- Evaluating Stor age Media Requir ements Here are some of the steps necessary for you to gather the information needed before establishing the

Chapter - Gener al Discussion on Configur ation backup5strategy: Chapter 6

- Monitor in g the Backup Pr ocess

1. Identify all the systems, noting the order in which they would need to be recovered following a - Evaluating Ot her Back up- Related Featur es and Options disaster.

Chapter 7 Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9 - The Back up System 2. Identify allExpanding networks involved, including speed of network and existing load at various times Pa r t I I I -throughout The Ente r pri se24-hour I m pa ct of Back Sy ste m s the day andupnight.

Chapter 10 - The Fut ure of Backup

3. Locate allorexisting such as tape drives and libraries. Chapter 11 - Maj Playersbackup-related in the Backup Arhardware, ena Appendix A - Com m and-Line I nter face Gu ide

4. Identify recovery requirements.

Appendix B - Glossar y

Appendix C - Tuning Your application Backup andavailability Recov er y Application 5. Identify data and requirements during backup. Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

6. Determine the Ibest way to move the data. Appendix E - Business mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note

We discuss each of these points in a little more detail in the sections that follow.

Appendix G - Net Backu p Per form ance Tuning on Windows I ndex

Identify All Systems

List of Figur es List of Tables

You need to identify all systems that need to be backed up. Generally this will be most if not all of the

List of Sidebars systems in the enterprise, with the exception of user workstations. There may be some systems that

are basically replicated systems and can be easily re-created. In general, it is only necessary to back up one of these systems. The following information should be gathered for all the systems: < Day Day Up >

Amount of data Speed of system Number and type of networks Type of data-database or filesystem? Priority of recovery in DR Tape drive or library installed?

Identify All Networks Involved

The network layout is an important part of the information required. Identifying the layout can be very < Day Day Up > critical to establishing the backup and recovery strategy. This step addresses the potential performance bottlenecks, because slow networks are often some of the primary bottlenecks. If there is a significant amount of data on a slow network, a media server may need to be located on the I m plem t ing large Ba ckuamounts p an d Reco ver y: Th e Rea din ess network. Any systems thatenhave of backup data, such as a system with more than 100 Gu id e f or as t h emedia Ent erservers pr ise and have direct connections to a tape drive or drives. GB, should be considered ISBN:0471227145 by David B. needed Little andfor David A. Chapa Following is the information the networks: John Wiley & Sons © 2003 (340 pages)

Speed of network This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the

Amount of data ar chitectur residinge,on limthe it ations, systems and capabilities of t he ex isting net wor k infr astr uctur e.

Location of any backup hardware < ?xm l version= " 1.0"proposed encoding=production " I SO- 8859-traffic 1" ?> Current and Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

Locate Backup Hardware

I ntr oduction

Identifying all the systems and mapping the network topology should provide an idea of the total backup requirements. Part of this information is the location of the potential backup devices. The next Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained step is to make sure the hardware is correctly located within the enterprise. Any enterprise backup and Chapter 2 - Business Requirements of Back up Systems recovery strategy should be based on an application that supports library and drive sharing to ensure Chapter 3 - An I ntr odu ction to NetBackup the tape drives and libraries are connected throughout the enterprise in such a way as to minimize Pa r t I I - Back up P roduct Tutor ia l bottlenecks, as well as to gain the most use from these very expensive tape drive resources. In a pure Chapter 4 network - Evaluating Stor age Media Requir ements local area (LAN) environment, it might be advisable to physically locate the tape library or Chapter 5 Gener al Discussion on Configur ation libraries close enough to the systems that have the largest amounts of data so they can be directly Chapter 6 -toMonitor in gdrives the Backup Pr ocess perform backups and restores without data being moved connected the tape and therefore Chapter 7 Evaluating Ot her Back upRelated Featur and Options across the network. These systems become mediaesservers and control access to their drives. To Chapter 8 Gener al Tr oubleshooting Tips handle data from other LAN-based systems, you either need to add more drives and give these systems their ownBack drives or use the media servers to handle the backups for the systems Chapter 9 access - The to Expanding up System that drives. Also,upthe systems must be physically located close enough to the Pa r t I do I I - not Thehave Ente rtheir pri seown I m pa ct of Back Sy ste ms tape devices to be connected via SCSI cables. Chapter 10 - The Futdirectly ure of Backup Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 11 - Maj or Players in the Backup Ar ena

LEARN FROM Appendix A - Com m and-Line I nter face Gu ide THE ERRORS OF THEIR WAYS Appendix B - Glossar y

Backup is a part of any data protection strategy, but there are other technologies, such as replication, that are part of it as well. The key to a sound strategy is to incorporate all the Appendix D - Disaster RecoveryI have Planning Kit—Fr om Endintotoo Beginning different technologies. been involved many discussions with people who were Appendix E Business I mpact Analysis Planning Kit—The Stor m Befor e t not he Calm trying to recover from an outage only to discover they were as protected as they Appendix F Per for m ance Test Tech Note thought. One particular case involved a company that had lost their primary server that ran Appendix - Netcritical Backu p Per form ance Tuning on Windows theirG most application. They spent several hours trying to recover from mirrored I ndex disks, when the actual failure was filesystem corruption. Mirrors did not help in this case. outage was extended, but they were able to recover, since they had backups. My List ofTheir Figur es List ofworst Tablescall while working in support was from a system administrator who had done a mass from the wrong window and had removed enough of the operating system that he List ofdelete Sidebars could not reboot. When he asked what he had to do to recover, I told him part of the process would be to restore from his latest backup. To this, he answered that configuring for backups was on his 'list of things

List of Sidebars

Off-host backups. This is a mechanism where data is moved from disk to tape without the application host being directly involved in the disk reads or tape writes. This type of backup is discussed in more detail in Chapter 7.

< Day Day Up >

< Day Day Up >

Summary

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

ISBN:0471227145 byabout David the B. Little andofDavid A. Chapa As you learn more nature the data and the reasons for backing it up, you will probably find John Wiley &that Sons 2003need (340 pages) some data or some systems do© not to be backed up on a regular basis at all. Many people have decided thatThis theguide statictak OSesfiles generally dothe not necessar change yexcept when OS patches are applied or r eaders thr ough steps of deploy ing ser v ices showing how to addr ess the backups of this data and only the system is reconfigured. They dobynot have regularly scheduled ar chitectur e, patches lim it ations, and capabilities of t he ex isting perform them when applying or making configuration changes. Also, some systems can be net wor k infr astr uctur e. easily rebuilt online from other systems, which is usually faster than a total recovery. In this case, you might only need a single backup to protect all of these systems in your enterprise. In addition, there is a cost incentive to encoding= fully understanding the data. The cost of tape media is one of the driving forces < ?xm l version= " 1.0" " I SO- 88591" ?> Tabehind ble o f not Conbacking t en t s up too much data, as well as the fact that backing up data that does not require it I mplem ing drives Backupthat andcould Recover y—The Readiness Guide forimportant the Enter pr ise ties upent tape otherwise be used for more data.

( VERI TAS Ser ies)

The real key to this entire discussion on determining why the data is being backed up is to truly I ntr oduction understand the ion nature ofckthe In a large is Env unlikely Pa r t I - I nt r oduct t o Ba up data. and Recove r y in enterprise, the Ent er priti se ir onmthe e nt backup administrator

will have this knowledge. You will have to get this information from the people who control the data throughout Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained the enterprise. The best way to do this is toup develop a questionnaire that you can distribute. This will Chapter 2 - Business Requirements of Back Systems help you gather the information you need to correctly architect the backup and recovery system. It is Chapter 3 - An I ntr odu ction to NetBackup common to use this kind of tool to determine when to back up, what to back up, how long to keep the Pa r t I I - Back up P roduct Tutor ia l backups, and where the backups should be kept. However, as we have seen, you also need to know Chapter 4 - Evaluating Stor age Media Requir ements why certain backups must be performed. In the following chapters, we discuss the other parts of the Chapter 5 - Gener al Discussion on Configur ation backup equation. Chapter 6

- Monitor in g the Backup Pr ocess

Chapter - Evaluating Ot her Back upFeatur Options Keep in7 mind that just because you sitRelated down and doesalland of this work now, you are not 'done.' Things Chapter 8 Gener al Tr oubleshooting Tips change, and you need to develop an ongoing dynamic process that lends itself to constant growth. Chapter 9 the - The Expandingthat Back up be System Gathering information will needed from others in the company may be time-consuming, Pa r t I IitI may - Thenot Ente se I mavailable. pa ct of Back up Sy ste m sa and ber pri readily Formulating

backup and recovery strategy may take a while, but

Chapter the first10 step - The starts Futwith, ure of well, Backup a first step. Chapter 11 - Maj or Players in the Backup Ar ena

In the next chapter, we look at how your specific business requirements affect your backup and recovery strategy.

Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y

Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning < Day Day Up > Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Chapter IGu 2: Business Requirements of Backup Systems id e f or t h e Ent er pr ise by David B. Little and David A. Chapa

ISBN:0471227145

After determining why the data needs to be backed up and the recovery requirements, you are ready to look John Wiley & Sons © 2003 (340 pages) particular business requirements come into play. You need to determine how often each type of data or eac tak es r eaders thr ough the necessar y steps of to be backed up, This whatguide the restore requirements are, what the data retention policy needs to be, any security deploy ing ser v ices by showing how to addr ess the off-site storage requirements, and uniqueand business unit requirements. ar chitectur e, lim it ations, capabilities of t he ex isting All of these items must be addressed. net wor k infr astr uctur e.

Developing a Backup Strategy < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> thist en phase TaTo blestart o f Con t s of architecting your backup and recovery strategy, you need to look at the frequency of b

required retention of the data. This is usually controlled by the business, legal, and recovery requirements. T

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise requirements that generally affect the backup strategy are those that define how long specific types of data m ( VERI TAS Ser ies)

available I ntr oductioneither locally or in a storage facility. These requirements could also specify the number of copies o must cases, there are specific requirements Pa r t I -be I ntretained. r oduct ionInt osome Ba ck up and Recove r y in the Entbusiness er pr i se Env ir onm e nt

regarding how often specific data Legal requirements must also be considered, although they are usually the basis of the specific business re Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained When you are dealing with data that might fall under control of any of the many governmental regulatory age Chapter 2 - Business Requirements of Back up Systems must make sure your strategy complies with all their requirements. Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Business Requirements - Evaluating Stor age Media Requir ements

Chapter 4 Chapter 5

- Gener al Discussion on Configur ation

The specific- business requirements that you need to consider include the following (see Figure 2.1): Monitor in g the Backup Pr ocess

Chapter 6 Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Service-level agreements to business units. What backup and recovery guarantees do you have?

requirements specific For Pa r t I Unique I I - The Ente r pri se I m pafor ct of Back up data. Sy ste m s

example, all original circuit design must be kept for seven

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena

Recovery time objectives. How fast will specific systems/applications be recovered?

Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y

Recovery pointYour objectives. How far back in time are you willing to go to recover? Appendix C - Tuning Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Legal Requirements

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note

The legal youform need to Tuning consider generally those imposed by governmental regulatory agen Appendix G requirements - Net Backu p Per ance on are Windows

typically involve specific data retention requirements for specific kinds of data. What makes this even more c that these requirements can change because of changes in administrations or new laws. These can also dic List of Figur es copies of the data must be kept and where it must be kept. I ndex

List of Tables

List of Sidebars

< Day Day Up >

Figure 2.1: Recovery point and recovery time.

Recovery Requirements As you build your strategy, you should make a special note of systems or applications that have special reco

requirements. These are usually covered by much better to always look first at the recovery requirements when building a backup strategy, since that is p reason you are doing backups. With these absolutes in mind, theBa next take in the first chapter and start yo I m plem en t ing ckustep p anis d to Reco verthe y: information Th e Rea din gathered ess id etogether, f or t h e Ent pr ise also consider the type of backup you need. Following are the dif matrix. As you putGu this youershould ISBN:0471227145 options: by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

Full backup.This Thisguide backup copies all thr theough files the andnecessar directories thatofare below a specified directory or filesy tak es r eaders y steps storage unit. deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

Cumulative incremental backup. Scheduled by the administrator on the master server, this option bac have changed since the last successful full backup. All files are backed up if no prior backup has been d < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> very similar to a differential incremental backup, which is covered later, with one very major difference. I Ta ble o f Con t en t s full system recovery, a cumulative incremental backup would require only two images: the last full backu I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise mostSer recent ( VERI TAS ies) cumulative incremental. While this speeds the recovery process, this type of backup does r tapes than the differential incremental and may potentially take more time, because you are backing up I ntr oduction have changed since the last full backup. Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Differential incremental backup. Scheduled by the administrator on the master server, this option bac Chapter 2 - Business Requirements of Back up Systems have the to last successful incremental or full backup. All files are backed up if no prior bac Chapter 3 changed - An I ntrsince odu ction NetBackup This what most people Pa r t I done. I - Back up Pisroduct Tutor ia l

traditionally refer to by incremental backup. During a full recovery, using

backup require more tapes.Requir However, do not base your architecture decisions just on these two d Chapter 4 - could Evaluating Stor age Media ements rather on the information during Chapter 5 - Gener al Discussiongathered on Configur ationyour initial discovery phase. Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7 image - Evaluating Ot her upes and True restore. ThisBack type ofRelated backupFeatur restores theOptions contents of a directory to what it was at the time o Chapter 8 Gener al Tr oubleshooting Tips scheduled full or incremental backup. Previously deleted files are ignored. You can also select Move De Chapter 9 - The Back up System backups include files that were moved, renamed, or newly installe specifies thatExpanding true image incremental Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup

EXAMPLE OF CUMULATIVE INCREMENTAL:

Chapter 11 - Maj or Players in the Backup Ar ena

The example inFigure 2.2shows the data that is included in a series of backups between January January 4. The January 1 full backup includes all files and directories in the policy file list. Each Appendix B - Glossar y cumulative incremental backups include the data changed since the last full backup. If the disk f Appendix C - Tuning Your Backup and Recov er y Application on January 4 (after the backup), the full and the last cumulative incremental are required for the Appendix A - Com m and-Line I nter face Gu ide

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Appendix - Business Analysis Planning Kit—The Stor m Befor e t he Calm For Ethis example:I mpact Recovery = Jan 1 (full) + Jan 4 (incr) Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

Figure 2.2: Cumulative incremental backup. - Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting TipsEXAMPLE OF DIFFERENTIAL INCREMENTAL - The Expanding Back up System

Chapter 9

example inse Figure shows the Pa r t I The I I - The Ente r pri I m pa2.3 ct of Back up Sydata ste m sthat

is included in a series of backups between January January 4. The January 1 backup is a full backup and includes all files and directories in the poli Chapter 10 - The Fut ure of Backup subsequent backups are differential incrementals and include only the data that changed since t Chapter 11 - Maj or Players in the Backup Ar ena differential incremental backup. If the disk fails sometime on January 4 (after the backup), the fu Appendix A - Com m and-Line I nter face Gu ide of the incrementals are required for the recovery. Appendix B - Glossar y

Appendix - Tuning Your Backup and Recov er y Application For Cthis example: Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Recovery = Jan 1I mpact (full) +Analysis Jan 2 (incr) + Jan 3 (incr) 4 e(incr) Appendix E - Business Planning Kit—The Stor+mJan Befor t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

Figure 2.3: Differential incremental. - Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips OF TRUE IMAGE RESTORE WITH MOVE DETECTION EXAMPLE - The Expanding Back up System

Chapter 9

following where using Pa r t I The I I - The Ente r priare se Iexamples m pa ct of Back up Sy ste m smove

detection backs up files that otherwise would not

up:10 - The Fut ure of Backup Chapter Chapter 11 - Maj or Players in the Backup Ar ena

A file named /home/pub/doc is moved to /home/spec/doc. Here, the modification time is unch

Appendix A/home/spec/doc - Com m and-LineisI nter Gu ide newface in the /home/spec/ directory and is backed up. Appendix B - Glossar y

A directory named /etc/security/dev is renamed as/etc/security/devices. Here, the modificatio Appendix C - Tuning Your Backup and Recov er y Application unchanged, but/etc/security/devices a new directory and is backed up. Appendix D - Disaster Recovery Planning Kit—Fr omisEnd to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

A file named /home/pub/doc is installed by extracting it from a UNIX TAR file. Here, the modif before the time of the last backup, but the doc is new in the /home/pub/ directory and is back

Appendix F - Per for m ance Test Tech Note

Appendix G - Net Backu p Per form ance Tuning on Windows I ndex

A file named docA is removed and then a file named docB is renamed as docA. Here, the new

List of Figur es name, but its inode number changed, so it is backed up. same List of Tables

starts collecting information required for move detection beginning with the next full List ofNetBackup Sidebars incremental backup for the policy. This first backup after setting the attribute always backs up a it is an incremental.

< Dayand Daycan Up >fail if there is not enough disk space available. Move detection takes space on the client

EXAMPLE OF WHAT HAPPENS DURING TRUE IMAGE RESTORES The following table shows the files backed up in the /home/abc/doc/ directory during a series of between 12/01/2001 and 12/04/2001. Assume that True Image Restore Information was selected f that did the backups. FILES BACKED UP IN THE HOME/ABC/DOC/ DIRECTORY[*]

DAY

Day Day Up > FILES Ta ble o Dashes f Con t en t s I mplemindicate ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

that the file was Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt deleted Chapterprior 1 to - Backup and Recover y Sy st em Requir em ents Ex plained this Chapterbackup 2 - Business Requirements of Back up Systems I ntr oduction

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I Also, I - Back up P roduct l assume thatTutor you ia are

Chapter 4

going to restore the 12/04/2001 version of the /home/abc/doc/ director

- Evaluating Stor age Media Requir ements

do a restore, the restored directory has all files and directories that ever existe Chapter 5 If you - Gener al regular Discussion on Configur ation 12/01/2001 Chapter 6 /home/abc/doc/ - Monitor in g thefrom Backup Pr ocess (last full backup) through 12/04/2001: Chapter 7 Chapter 8

- Evaluating Ot her Back up- Related Featur es and Options file1 - Gener al Tr oubleshooting Tips

Chapter 9 file2 - The Expanding Back up System Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10dirA/fileA - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena

dirB/fileB

Appendix A - Com m and-Line I nter face Gu ide Appendix Bfile3 - Glossar y Appendix C - Tuning Your Backup and Recov er y Application

dirC/fileC

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix Efile4 - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G If you - Netdo Backu a true p Per image form ance restore Tuning of on theWindows 12/04/2001 backup, the restored directory has only the fi

directories that existed at the time of the incremental backup on 12/04/2001:

I ndex

List of Figur es

file1

List of Tables

List of Sidebars file2

file4 < Day Day Up >

NetBackup does not restore any of the files deleted prior to the 12/04/2001 incremental backup. The restored directory does not include the dirA and dirC subdirectories, even though they were 12/04/2001 with a user backup. NetBackup did not restore these directories because they did not time of the incremental backup, which was the reference for the true image restore. [*]From

the NetBackup 4.5 DataCenter System Administrator's Guide, VERITAS

< Day Day Up >

< Day Day Up >

m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Frequency Iof Backups Gu id e f or t h e Ent er pr ise

by David Little and Davidrequirements A. Chapa Once you understand the B. general backup for all ISBN:0471227145 of the data and the business and legal John Wileyhave & Sons © 2003good (340 pages) requirements, you should a pretty idea of how much data needs to be backed up and at least a minimum This requirement frequency. trick in establishing guide takfor es rthe eaders thr ough The the necessar y steps of the ideal frequency policy is to deploy ingthat ser vgives ices by showing howprotection to addr esswith the minimal media usage. You don't want come up with a schedule you adequate ar chitectur e, lim it ations, and capabilities of t he ex isting to back up any more often than needed to get the necessary level of protection, since 'more often' net wor k infr astr uctur e. means more tapes, more data being moved, and more administration. When in doubt, however, go with more media. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> the TaEstablishing ble o f Con t en t sbest frequency and retention policy for data that is not covered by business and legal

requirements also involves knowing why the data Guide is being upprand I mplem ent ing Backup and Recover y—The Readiness forbacked the Enter ise what recovery requirements are. TAS In general, ( VERI Ser ies) truly static data or static systems should not need very frequent backups. They might beoduction backed up as infrequently as once a week or even once a month. As far as the number of copies I ntr required, normal to keep between two copies ofe the Pa r t I - I nt raoduct ion tpractice o Ba ck upis and Recove r y in the Entand er prfour i se Env ir onm nt Chapter 1

backups.

- Backup and Recover y Sy st em Requir em ents Ex plained

Data that is more dynamic requires more frequent backups and probably needs one of the - Business Requirements of Back up Systems incremental types. The decision between differential incremental and cumulative incremental is based Chapter 3 - An I ntr odu ction to NetBackup on recovery requirements versus media usage. Weekly full backups and daily differential incremental Pa r t I I - Back up P roduct Tutor ia l backups could require up to six tapes to restore a directory, filesystem, or database in a worst-case Chapter 4 - Evaluating Stor age Media Requir ements scenario. Each of the incremental backup images might be small, but each day's changes could be on Chapter 5 Gener on Configur ation a separate -tape, oralatDiscussion least different images on the same tape. If you did the same backup sequence Chapter 6 Monitor in g the Backup Pr ocess with cumulative incremental backups, no recovery would take more than two images that could reside Chapter - Evaluating her Back up-enough Related Featur es and Options on two 7tapes; however, Ot if there were changes to the data, the cumulative incremental backups Chapter 8 Gener al Tr oubleshooting Tips could approach a full backup in size. You must decide whether it is better to use fewer tapes with Chapter 9 -backups The Expanding up System differential but run Back the risk of having to mount more tapes on a restore or potentially use more Pa r t I I I on - The r pri sebut I m pa ct of Back Sy ste m s images to restore an entire backup. tapes theEnte backups only have toup restore two Chapter 2

Chapter 10 - The Fut ure of Backup

Obviously, piece ofin this the anticipated type of recovery activity. If the data is being Chapter 11 -another Maj or Players the equation Backup Arisena

backed up for DR protection or to protect against hardware failures, the question of differential versus cumulative is important. If the data is being backed up to protect against user deletion or error, you Appendix B - Glossar y should stay with differential backups. The recovery requirement also comes into play. By using the Appendix C - Tuning Your Backup and Recov er y Application information you gathered during the interview process with the data owners, you can realistically plan Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning based on the expectations you set during your discovery. If the absolute speed of recovery is important, Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm the use of cumulative incremental backups is desired. The incremental type generally comes into play Appendix F are - Per for m ance Tech Note when you working withTest filesystem backups. With databases, you generally work with the Appendix G Net Backu p Per form ance with Tuning Windows application tools that are integrated theon backup application, and this will dictate much of what you I ndex do. Appendix A - Com m and-Line I nter face Gu ide

List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Retention of Backups Gu id e f or t h e Ent er pr ise

by Davidpeople B. Littlemake and David A. Chapa A very common mistake is to retain their backupsISBN:0471227145 for too long. This increases the cost of John Sons © 2003 (340 pages) backups, since you willWiley need& more media. You need to make sure you understand all the legal and business requirements for keeping copiesthrofough the backups andy ensure This guide tak es r eaders the necessar steps ofyou meet them. For normal deploy ser vsure ices by to addr ess that the at least exceeds the frequency. If operations, you want toing make youshowing have a how retention level ar chitectur lim it ations, and capabilities of t he you do a particular backup e, weekly, the retention level must be ex atisting least one week or you will be net wor k infr astr uctur e. unprotected. A general practice is to keep at least two cycles of each type of backup. This way you will always have two copies of the data on tape when doing the next backup. This method allows you to recover from"a1.0" crash that might occur < ?xm l version= encoding= " I SO8859-on 1" the ?> day/time for the next backup, plus it provides an extra Tacopy ble oin f Con t en t s is a problem with one of the tapes. Another common practice is to assign off-site case there tapes ent a different retention level than tapes kept on-site. Thethe reasons do this vary, but in most I mplem ing Backup and Recover y—The Readiness Guide for Enter prpeople ise ( VERI TASit Ser ies) by the business. For instance, perhaps the business requires that the backup images cases, is driven I ntr beoduction kept on-site for 30 days for recovery purposes, while off-site images must be kept for 180 days. Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Give this issueand some careful thought, and em don't say you are going to keep everything forever. Chapter 1 entire - Backup Recover y Sy st em Requir entsjust Ex plained If this describes your particular situation, you have an uphill battle ahead of you, but it's not the end Chapter 2 - Business Requirements of Back up do Systems

of the world. TheI ntr best from this point on is to make sure you can classify your data properly, Chapter 3 - An oduthing ction to to do NetBackup then redesign your backup policies so you are only backing up and keeping the data you need for the periods of time you require. - Evaluating Stor age Media Requir ements

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4 Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

< Day Day Up > - Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Security of I Backups Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by Davidis B. Little and else Davidthat A. must Chapabe taken into Security of the backups something consideration. Your business might Wiley so & Sons © 2003 (340on pages) require encryptedJohn backups that the data the tapes cannot be recovered without the proper key or password. Many backup and applications this kind of backup, but there is a This guide takrecovery es r eaders thr ough theoffer necessar y steps of deploy ing ser v ices by encrypted showing how to addr The ess the performance penalty associated with backups. data will be encrypted on the client ar chitectur e, lim itthe ations, and capabilities t he ex isting system before being sent across network, so this willofrequire CPU cycles on the client and will also net wor k infr astr uctur e. slow down the rate of data being presented to the network for backup. The data is very secure, since it is encrypted before it is sent across the network and is still encrypted when written to tape. This also requires the key known in" Iorder to do1"a?>restore. Most people rely on keeping the media secure < ?xm l version= " 1.0"beencoding= SO- 8859Tarather ble o f than Con timplementing en t s data security by using encryption.

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction

< Day Day Up >

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Off-Site Storage Requirements Gu id e f or t h e Ent er pr ise

ISBN:0471227145 byrealize David B. and A. Chapa Most people today theLittle need to David implement a true data protection strategy of which backup is an Wiley & Sons © 2003 (340strategy pages) integral part. OneJohn of the components of this is management of off-site media. You should always select a backup product as VERITAS NetBackup an automated vaulting or offThis guide tak essuch r eaders thr ough the necessar y that stepsoffers of deploy v ices bymanagement showing how to addr esstracking the site storage solution so ing youser have the tools for the media that is off-site. The ar are chitectur e, lim it ations, capabilities t he ex isting questions that you addressing for an and off-site or vault of solution are as follows:

net wor k infr astr uctur e.

What images need to be sent off-site? < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> How many copies of the images need to be kept off-site? Ta ble o f Con t en t s I mplem ent ing Backup Recover y—The Readiness Guide for the Enter pr ise How long shouldand each image or type of image be kept off-site? ( VERI TAS Ser ies) I ntr oduction Do we have enough tape media on hand to allow for two or more copies? Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

You must which systems to have Chapter 1 determine - Backup and Recover y Sy need st em Requir emoff-site ents Excopies plainedof their data and if all or only part of that system to be sent off-site. a backup tape of the operating system off-site is Chapter 2 - needs Business Requirements of Sending Back up Systems

typically3 not- necessary and not cost-effective. You will need to know if incremental backup images as Chapter An I ntr odu ction to NetBackup

well as full backups are required for off-site. This requirement can be different for each type or class of system. It also depends on the existence of a DR site and legal requirements. - Evaluating Stor age Media Requir ements

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4 Chapter 5

- Gener al Discussion on Configur ation

How Many Copies? - Monitor in g the Backup Pr ocess

Chapter 6 Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

The next question is how many copies of each backup image should be kept off-site. This usually - Gener al Tr oubleshooting Tips depends on why the data is being stored off-site. If there are legal requirements, then these Chapter 9 - The Expanding Back up System requirements usually stipulate how many copies. If it is being done for pure DR, one or two copies Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s might be adequate. This decision is usually based on either specific legal and business requirements Chapter 10 - The Fut ure of Backup or on your overall DR strategy. In cases where an off-site storage facility is used, you might only need Chapter 11 - Maj or Players in the Backup Ar ena one copy. If there are multiple sites, it is common to send copies to a sister site that can act as a DR Appendix A - Com m and-Line I nter face Gu ide site. In these cases, you might want two off-site copies so one can be kept locally and the other at the Appendix B - What Glossar y really need to do is keep an open mind and take a look at all the possibilities remote site. you Appendix C Tuning and requirements. Your Backup and Recov er y Application Chapter 8

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

How Long Should They Be Kept Off-Site?

Appendix F - Per for m ance Test Tech Note

Appendix G -legal Net Backu p Per form ance Tuning on Windows If there are or business requirements, these must be met. A common legal requirement is that all I ndex data related to any financial trades must be retained for seven years. The other considerations are List of many Figur es how potentially different copies of an image do you want to store off-site and how many tape List of Tablesare you willing to maintain out of production? Again, it may be up to the business unit cartridges

managers as to how long they want their data stored off-site. In most companies, the IT department List of Sidebars views the business units as their customers; as such, there are costs involved in the services you are providing to your customers. Similarly, when the business unit manager requests that his or her data remain off-site for two years, you must present theDay costs with the management of this data. < Day Upassociated > There will be the cartridge cost, pickup/delivery costs, and storage costs. Even if you are not charging this back to the managers, it is a good idea to document this for your management. Once you are able to present people with the facts, reality sets in and you are able to help them reasonably determine the proper length of time for off-site storage given their business requirements.

< Day Day Up >

< Day Day Up >

plem en t ing Business Ba cku p an d Reco ver y: Th e Rea din ess DifferencesI mbetween Units Gu id e f or t h e Ent er pr ise

David B. Little and between David A. Chapa Sometimes data by must be segregated business units. ISBN:0471227145 There are several ways to do this. The & Sons © tape 2003 (340 pages)and do the different business unit backups to most secure wayJohn is to Wiley have multiple libraries different physicalThis libraries. this not possible or practical. guide Sometimes tak es r eaders thrisough the necessar y steps ofIf this is the case, there are other deploy ser vaices showing how to addr ess the NetBackup, you can establish ways to accomplish this.ingWith toolbysuch as VERITAS Software's ar chitectur e, lim itmedia ations,to and capabilities of t he ex isting unique volume pools and assign a specific volume pool. You then assign specific backups to net wor k infr astr uctur e. specific volume pools. This allows you to logically segregate the data within a single tape library. We discuss this in more detail later when we look at installing and configuring a backup product. One word of caution: Just because your" I software supports it doesn't mean you have to implement it. In < ?xm l version= " 1.0" encoding= SO- 8859-solution 1" ?> Taother ble o fwords, Con t en s do not have a compelling reason to implement multiple volume pools, then by all if tyou meansent doingnotBackup add a and levelRecover of complexity to your environment simply you can. Backup products I mplem y—The Readiness Guide for the Enter because pr ise ( VERI TAS Ser ies)NetBackup are quite scalable and easily modified should that be a requirement down like VERITAS I ntr theoduction road. Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Other differences between business units may potentially Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex affect plainedhow you architect your backup strategy. these will result in unique backup and recovery requirements for some systems. With Chapter 2 Often - Business Requirements of Back up Systems

most backup products, you can set up backup policies for similar clients with similar requirements and Chapter 3 - An I ntr odu ction to NetBackup separate the clients that have unique needs. You must always be aware of any of these unique requirements before putting your strategy together. - Evaluating Stor age Media Requir ements

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4 Chapter 5

- Gener al Discussion on Configur ation

REAL-WORLD CUSTOMER CASE STUDY: PROBLEMS AND SOLUTIONS FOR ENTERPRISE - Monitor in g the Backup Pr ocess BACKUP AT GLOBAL COMPANIES

Chapter 6 Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8 far, - Gener al Tr oubleshooting Tips Thus we have discussed architecting a backup and recovery system. Most of the points I have are based my experiences helping enterprise users put together their Chapter 9 -addressed The Expanding Back up on System

I would Pa r t I systems. I I - The Ente r pri se like I m pato ct share of Backmy up experiences Sy ste m s

with one such organization that I visited.

This at Fut theure height of the e-business explosion. The company was just getting started Chapter 10 was - The of Backup and planning to in gothe global. They were starting with a data center on the East Coast, Chapter 11was - Maj or Players Backup Ar ena thenA another the West Appendix - Com mon and-Line I nterCoast, face Gu to idebe followed closely by one in England. I went to their main with Appendix B office - Glossar y the local sales team to help evaluate their recovery needs and to see if we would able to help themand achieve their objectives. Appendix C -be Tuning Your Backup Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

When we arrived for the first meeting, it was obvious they were very concerned. After brief

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm with interjected introductions, they launched into a description of their environment Appendix F Per for m ance Test Tech Note comments about their situation being just about hopeless. One of the first statements was Appendix - Netno Backu p Per form ance data Tuning Windows 'YouG have idea how much weonalready have, and we are just getting started. With I ndex our projected growth, I don't see how we can possibly back up all our data.' They went on List ofto Figur listes all of the existing servers with the amount of storage on each and a grand total. They

summarized their network configuration, the backup-related hardware they had List ofalso Tables List ofalready Sidebarspurchased, and last but not least, their growth projections. The amount of data was

impressive. After looking over all this information, my first question caught everyone by surprise: 'Why are you backing up this data?' < Day Day Up >

'Why? Why, we have to. One of our competitors just experienced some type of outage and did not have proper backups. It was a total disaster for them. What do you mean, why?' I had to rephrase my question so they could understand what I actually was looking for: 'How many of your systems have active users with volatile data that might result in files being regularly restored because someone deleted a file or wanted to revert to an older version?' After a few minutes of discussion, they decided this would probably only involve a small number of their totalsystems. 'How many of your systems are you backing up just to protect against hardware failure or some type of system crash? How many of your systems are pretty static as far as the data? How many of your systems are running a critical application that you want to ensure are protected from system crashes, hardware failures, and application errors?' We discussed all the different things they wanted to protect the different systems from, and they started to build a different list. By using common sense and actually looking at each system, they were able to determine that their

backup challenge was not as bad as lot of their interface systems were really just replicated systems, so they only needed one copy of the data, not 50. In subsequent meetings weBastarted tod look in more detail and I m plem en t ing cku p an Recoat vertheir y: Thplanned e Rea dinenvironment ess id e fsuggestions or t h e Ent er prinise were able toGu make all areas of their backup and recovery strategy. What we ISBN:0471227145 by David B. getting Little andthem DavidtoA.look Chapa were really doing was at the backup strategy from the other end, the John Wiley & You Sons will © 2003 (340 pages) recovery requirements. always be more successful if you approach it this way. This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e. < Day Day Up > < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Summary

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by some David of B. the Little and business David A. Chapa We have looked at ways requirements can affect the way you architect your John strategy. Wiley & Sons © 2003 (340 pages) backup and recovery As mentioned, there are pitfalls along the way as well, such as the business unit manager whotak wants to keep or her off-site for a year even though there This guide es r eaders thrhis ough the backup necessardata y steps of deploy ingcase ser v ices showingcan how to addr ess the isn't a real solid business for it.byBackup become a dumping ground, and if we do not present chitectur lim it ations, and capabilities of t he ex isting the business witharthe costs e, involved in managing and maintaining this data, it will continue to grow. Just net wor k infr astr uctur e. like a laptop with a 30-GB hard drive that only has 4 GB left. Is there really a good reason to keep all that data? No, not really, but I have the space and it's paid for by someone else. Now if this had to come out of my own pocket,"or budget, perhaps I would think differently about it. It is always a good < ?xm l version= " 1.0" encoding= I SO8859- 1" ?> Taidea ble oto f Con s lookt en at tthese requirements and help the business units stay focused on the ultimate goal at each step during thisand process. Following are the different have discussed: I mplem ent ing Backup Recover y—The Readiness Guide forelements the Enterwe pr ise

( VERI TAS Ser ies)

Types of backups I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Frequency of backups

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2 - Business Requirements of Back up Systems Security of backups Chapter 3

- An I ntr odu ction to NetBackup

storage requirements Pa r t I Off-site I - Back up P roduct Tutor ia l Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Differences between business units

Chapter 6 - Monitor in g requirements the Backup Pr ocess By evaluating all these and being aware of how they affect you, you will be able to better Chapter 7 Evaluating Ot her Back up- Related andbusiness Options needs. Business prioritization sets develop a backup and recovery strategy that Featur meetsesyour Chapter 8 -for Gener al Tr oubleshooting Tips the criteria success. Chapter 9

- The Expanding Back up System

Inr tthe looking atup actually Pa I I I next - Thechapter, Ente r priwe se Istart m pa ct of Back Sy ste mdoing s

something with the information laid out in the first

two chapters. WeFut will use NetBackup DataCenter as the backup application. We first give Chapter 10 - The ure of VERITAS Backup you an 11 introduction to this application and Chapter - Maj or Players in the Backup Ar then ena get into the details of deploying it in an enterprise. Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Day Up > Appendix C - Tuning Your Backup and Recov er

< Day Day Up >

m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Chapter IGu 3: An Introduction to NetBackup id e f or t h e Ent er pr ise by David B. Little and David A. Chapa

ISBN:0471227145

Many commercial backup products are available on the market today. The leader amongst them on John Wiley & Sons © 2003 (340 pages) UNIX platforms is VERITAS Software's NetBackup DataCenter. We will use this product, which we This guide tak es r eaders thr ough the necessar y steps of refer to as just NetBackup, in our explanations and examples of setting up a backup domain. We start deploy ing ser v ices by showing how to addr ess the with an introduction to NetBackup, including explanation of ex theisting unique architecture of the product, ar chitectur e, lim it ations, and an capabilities of t he and then we define that it uses. Most of the examples use the latest release, 4.5, but we will netthe wor terms k infr astr uctur e. mention when there is a significant difference with older releases. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s

NetBackup Tiered Architecture

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise NetBackup ( VERI TAS Ser uses ies) a four-tiered architecture for backup domains, as shown in Figure 3.1. I ntr oduction

The tiers are as follows:

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Client. Any system that contains data that needs to be backed up.

AnyTutor system Pa r t I Media I - Backserver. up P roduct ia l

that has physically connected storage devices to be used for backups.

These be robotic devices, standalone tape drives, or optical storage devices. Chapter 4 -can Evaluating Stor age Media Requir ements Chapter 5

- Gener al Discussion on Configur ation

Chapter 6 - Monitor in g the Backup ocess Master. The NetBackup serverPrthat provides administration and control for backups and restores Chapter 7 Evaluating Ot her Back upRelated Featur es Optionsall the catalog information for the for all clients and servers. It is also the system thatand contains Chapter 8 - domain. Gener al Tr oubleshooting Tips backup Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Global Data Manager. A master of masters that can monitor and facilitate management of multiple master servers and multiple backup domains.

Chapter 10 - The Fut ure of Backup

Chapter 11 - Maj or Players in the Backup Ar ena

Appendix A - within Com maand-Line I nterdomain face Gu ide All systems NetBackup fall within at least one of these tiers and can actually fit into Appendix B one. - Glossar more than Theyfirst three tiers are always found, even if on the same system. The fourth tier, the

Global Data tier,Backup is usually when there are multiple NetBackup domains that are Appendix C - Manager Tuning Your and found Recov er y Application monitored administered a single location. This tiered architecture is one of the things that Appendix D and - Disaster Recoveryfrom Planning Kit—Fr om End to Beginning make NetBackup so scalable and flexible. As you start Stor out,myou can a single master server that Appendix E - Business I mpact Analysis Planning Kit—The Befor e thave he Calm gives you administration, Appendix F a- single Per for point m anceofTest Tech Note and at the same time, you can have as many media servers as are needed support you grow, you can add more tape devices and just Appendix G - NettoBacku p Peryour formconfiguration. ance Tuning onAs Windows

add more media servers without having a great impact on your overall configuration. If your enterprise continues to grow, you can simply add another master server with media servers as needed. At this List of Figur es point, you might add the fourth tier. The first tier, clients, can be added or deleted easily, since the List of Tables configuration is kept on the master server. I ndex

List of Sidebars

< Day Day Up >

Figure 3.1: NetBackup tiered architecture. < Day Day Up >

I m plem en t ing Ba cku p an e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess ExplanationI mof Specific NetBackup Concepts Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by Davidcan B. Little and David A. being Chapamade up of The NetBackup product be thought of as two major components: netbackup John The Wileynetbackup & Sons © 2003 (340 pages)is responsible for the who, what, when, where, and and media manager. component how aspects of the backup jobs: This guide tak es r eaders thr ough the necessar y steps of

deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting Who needs to be backed up? The client. net wor k infr astr uctur e.

What needs to be backed up? The file or file list. < ?xm l version= encoding= " I SO88591" ?> When do" 1.0" the backups run? The schedule. Ta ble o f Con t en t s I mplem Where ent ingshould Backupthey and be Recover stored? y—The TheReadiness logical storage Guide unit. for the Enter pr ise ( VERI TAS Ser ies)

How should this policy be handled? Specific attributes of the backup policy. I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

It also tracks and manages all the backups and all of the backup images.

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2 -manager Business component Requirements of Back up Systems The media is responsible for managing all the physical media and all the Chapter 3 In -general, An I ntr odu to NetBackup devices. thection netbackup component deals with logical devices, and the media manager Pa r t I I -with Back up P roduct Tutor ia l deals physical devices.

Chapter 4

- Evaluating Stor age Media Requir ements The netbackup component tracks manages Chapter 5 - Gener al Discussion on and Configur ation all the data that is backed up by using the unique

backup6identifier assigned each backup Chapter - Monitor in g the to Backup Pr ocess image when it is created. It also manages the overall catalog7and- the scheduling newuptasks. It selects theand appropriate Chapter Evaluating Ot herofBack Related Featur es Options media server to match each backup job.- Gener al Tr oubleshooting Tips

Chapter 8

Chapter 9 -manager The Expanding Back up System all the physical storage devices and the physical media. It is The media component manages Pa r t I I I - The Ente r pri se I m pa ct of the Backphysical up Sy stetape ms through the media manager that

libraries and drives are configured, and the volume

Chapter 10 is- populated. The Fut ure The of Backup database media manager controls the tape libraries and maintains the inventory of Chapter 11 Maj or Players in the Backup Ar ena all the volumes. Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Layout NetBackup Domain Gu id e f or t h e Ent er pr ise

by David B. Little and David Now the fun begins. You have gathered tonsA.ofChapa data and knowISBN:0471227145 more about your enterprise than you Wiley It&isSons 2003 ever thought wasJohn possible. time©to put(340 allpages) of this knowledge to use. If this is the first time an actual backup and recovery strategy been implemented, you willy be able This guide tak has es r eaders thr ough the necessar steps of to tailor the backup domain. If ing ser v ices by showing how to addr ess theto work within the confines of the this is an upgradedeploy or application change, you will probably have ar chitectur e, lim itas ations, and capabilities of t he ex isting existing layout, making changes required. net wor k infr astr uctur e.

Using NetBackup as the application in this domain, you first want to list all the systems that will be backed up as" 1.0" clients. This will give8859you an idea of the number of systems that need to be backed up < ?xm l version= encoding= " I SO1" ?> and the distribution of data. Any systems that have a large amount of data, over 100 GB for example, Ta ble o f Con t en t s shouldent being noted, as and you Recover might want to make themGuide media The other important thing to track I mplem Backup y—The Readiness forservers. the Enter pr ise with TAS the clients ( VERI Ser ies) is their network connectivity. If it looks like there are a lot of network-based clients on slow networks, you should consider installing a high-speed backup network. This gives you increased I ntr oduction backup and recovery as well asthe keeping backup recovery Pa r t I - I nt r oduct ion t o performance, Ba ck up and Recove r y in Ent er pr i se Envand ir onm e nt

traffic off the production network. It is now common to install a 100Base-T or Gigabit Ethernet network just as a backup and Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained recovery network. Chapter 2 - Business Requirements of Back up Systems Chapter 3

- An I ntr odu ction to NetBackup

A NetBackup domain requires at least one master server. In most situations, there will be only one; however, in a later chapter we discuss some reasons to have more than one master. The system that Chapter 4 Evaluating Stor age Media Requir ements you choose- for the master will depend on the size of your enterprise-the number of clients, the total Chapter 5 Gener al Discussion onand Configur ation number of files being backed up, the number of storage units you will need. In a smaller Chapter 6 Monitor in g the Backup Pr ocess environment, the master server can be a system that is already being used for other work or could be Chapter 7 - master Evaluating her Back up- Related Featur es to and Options device. Figure 3.2 shows an example a combined andOtmedia server if it is attached a backup Chapter 8 Gener al Tr oubleshooting Tips of a configuration where the master server is also a media server and all the client backups are Chapter 9 LAN-based - The Expanding Back up System basically backups. Pa r t I I - Back up P roduct Tutor ia l

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

In larger master server is usually a dedicated NetBackup server, although it could Chapter 10environments, - The Fut ure the of Backup

still be 11 a media This mustAr have Chapter - Majserver. or Players in server the Backup ena enough disk capacity to handle the NetBackup catalogs and, potentially, the debug logs. Most of the debug logs are located in /usr/openv/ netbackup/logs. If this directory is not located in a separate partition, you must make sure you do not allow the logs to Appendix B - Glossar y grow and fill the disk. The largest part of the catalog is the image database, which is located in /usr/ Appendix C - Tuning Your Backup and Recov er y Application openv/netbackup/db/images. It is not uncommon for this directory to be a separate partition. All of the Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning meta data for all the backups are sent to the master and stored in this image database portion of the Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm catalog. The maximum amount of disk space that NetBackup requires at any given time varies Appendix F to - Per m ance Test Tech Note according thefor following factors: Appendix A - Com m and-Line I nter face Gu ide

Appendix G - Net Backu p Per form ance Tuning on Windows I ndex Number of files that you are backing up List of Figur es

Frequency of full and incremental backups

List of Tables

List ofNumber Sidebarsof user backups and archives

Retention period of backups < Day Day Up >

Average length of full pathname of files

File information (such as owner permissions) Average amount of error log information existing at any given time Whether you have enabled the master catalog compression option

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Figure LAN-based backup.of Back up Systems Chapter 2 - 3.2: Business Requirements Chapter 3

- An I ntr odu ction to NetBackup

To estimate the disk space required for the image database portion of the NetBackup catalog:

Pa r t I I - Back up P roduct Tutor ia l

the maximum of files that each schedule for each policy backs up during a 1. Estimate Chapter 4 - Evaluating Stor agenumber Media Requir ements backup of all its clients. Chapter single 5 - Gener al Discussion on Configur ation Chapter 6

- Monitor in g the Backup Pr ocess 2. Determine the frequency and retention period of the full and incremental backups for each

Chapter policy. 7 - Evaluating Ot her Back up- Related Featur es and Options Chapter 8

- Gener al Tr oubleshooting Tips 3. Use Steps 1 and 2 to calculate the maximum number of files that exist at Chapter 9 -the Theinformation Expanding from Back up System Pa r t I I I -any Thegiven Ente rtime. pri se I m pa ct of Back up Sy ste m s

Chapter 10 - Assume The Fut ure Backup full backups every seven days with a retention period of four weeks youofschedule Chapter 11 - and Maj or Players inincremental the Backup Ar ena differential backups daily with a retention period of one week. The Appendix A - number Com m and-Line I nter face Gu ide allow space for is four times the number of files in a full of file paths you must Appendix B - backup Glossar yplus one week's worth of incrementals. Appendix C - Tuning Your Backup and Recov er y Application

The following formula expresses the maximum number of files that can exist at any given time for each type of backup (daily, weekly, etc.):

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

Appendix F - Files Per forper m ance Test ×Tech Note per Retention Period = Maximum Number of Files Backup Backups Appendix G - Net Backu p Per form ance Tuning on Windows I ndex

If a daily differential incremental schedule backs up 1200 files for all its clients and the

List of Figur es retention period is seven days, the maximum number of files resulting from these List of Tables incrementals that can exist at one time are as follows: List of Sidebars

1200 × 7 days = 8400 If a weekly full backup schedule backs up 3000 files for all its clients and the retention period is four weeks, the maximum number < Day Day Upof>files due to weekly full backups that can exist at one time are as follows: 3000 × 4 weeks = 12,000 Obtain the total for a server by adding the maximum files for all the schedules together. The maximum number of files that can exist at one time due to the preceding two schedules is the sum of the two totals, which is 20,400. Note For policies that collect true image restore information, an incremental backup collects catalog information on all files (as if it were a full backup). This changes the preceding calculation for the incremental from 1200 × 7 = 8400 to 3000 × 7 = 21,000. After adding 12,000 for the fulls, the total for the two schedules is 33,000, rather than 20,400.

4.

4. Obtain the number of bytes by multiplying the number of files by the average length of the file's < Day Day Up > full pathnames and file information. a. Determining the space required for binary catalogs: If you are unsure of the average length of a file's full pathname, use 100. Using the results from the examples in Step 3 I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess yields the following: Gu id e f or t h e Ent er pr ise by David and × David (8400 × 100)B.+Little (12,000 100)A.= Chapa 1992 KB (1024 ISBN:0471227145 bytes in a kilobyte) John Wiley & Sons © 2003 (340 pages)

b. Determining space required for the ASCII catalogs: If you This guide the tak es r eaders thr ough necessar y steps of are unsure of the average deploy ingfile's ser vfull icespathname, by showinguse how150. to addr ess the from 100 to 150 are common.) Using length of a (Averages chitectur e, lim and in capabilities of t he isting thearresults from theit ations, examples Step 3 yields theexfollowing: net wor k infr astr uctur e.

(8400 × 150) + (12,000 × 150) = 2988 KB (1024 bytes in a kilobyte) < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Note If you have ASCII catalogs and use catalog indexing, multiply the number in Ta ble o f Con t en t s

Step 4 by 1.5 percent.

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

5. If you are running with debug logging, add 10 to 15 MB to the total calculated in Step 4. This is the average space for the error logs. Increase the value if you anticipate problems.

I ntr oduction

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1 - Backup and Sy stremains em Requir ents Expartition. plained 6. Allocate space soRecover all this ydata inem a single Chapter 2 - Business Requirements of Back up Systems

You must factors into account when determining what kind of system to use for the master Chapter 3 take - Anmany I ntr odu ction to NetBackup

server. It can be any type of system, any UNIX system or Windows system from the supported systems list. If the master is a dedicated system, you will need enough computing power to support the network - Evaluating Stor age Media Requir ements adapters plus the NetBackup processes, as well as enough memory to support each. If the system is Chapter 5 - Gener al Discussion on Configur ation also a media server, the system resource requirements are higher. With NetBackup, it is not Chapter 6 - Monitor in g the Backup Pr ocess uncommon to share a tape library among multiple media servers. In many of these cases, the robotic Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options control is handled by the master, while media servers share the tape drives, either directly connected Chapter 8 - Gener al Tr oubleshooting Tips or truly shared in a storage area network (SAN). (We look at using the Shared Storage Option in a Chapter 9 - The Expanding up System SAN in a later chapter.) TheBack following tables provide information about the number of CPUs and the Pa r t I I I The Ente r pri se I m pa ct of Back up Sy ste m s amount of memory needed to support several hardware and software components, as well as the I/O Chapter 10 The Fut ure of Backup adapter performance numbers. You should use the numbers listed in Tables 3.1 through 3.3 to design Chapter 11 - and Maj ormedia Players in the Backup Ar ena your master servers. Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

Appendix A - Com m and-Line I nter face Gu ide Appendix B -CPUs Glossar y Table 3.1: Needed per Backup Server Component Appendix C - Tuning Your Backup and Recov er y Application

COMPONENT

NUMBER OF CPUS PER COMPONENT

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E cards - Business I mpact Planning cards Kit—The Stor m Befor e t he Calm Network 1 perAnalysis 2-3 100Base-T Appendix F - Per for m ance Test Tech Note

1 per 5-7 10Base-T cards

Appendix G - Net Backu p Per form ance Tuning on Windows I ndex

1 per 2-3 FDDI cards

List of Figur es

1 per ATM card

List of Tables

1 per 1-2 Gb Ethernet card

List of Sidebars

(preferably 1)

Tape drives

1 per 2-3 DLT 8000 drives 1 per 2-3 DLT 7000 1 per 3-4 DLT 4000 drives 1 per 2-4 8mm and 4mm drives

OS + NetBackup

1

Table 3.2: Memory Needed per Backup Server Component

COMPONENT

< Day Day Up PER > MEMORY NEEDED COMPONENT

Network cards

16 MB per network card

Tape drives

128 DLT I m plem en t ing Ba cku p MB an dper Reco ver8000 y: Th drives e Rea din ess Gu id e f or t h e Ent er pr ise 128 MB per DLT 7000 drives

ISBN:0471227145 by David B. Little and David A. Chapa DLT 4000 drives John Wiley & Sons © 64 2003MB (340per pages)

32 MB per 8mm and 4mm drivesof This guide tak es r eaders thr ough the necessar y steps deploy ing ser v ices by showing how to addr ess the OS + NetBackup 256 and MB capabilities of t he ex isting ar chitectur e, lim it ations, net wor k infr astr uctur e. OS + NetBackup + GDM

512 MB

NetBackup multiplexing

2 MB × no. of streams × no. of drives

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s

Figureent 3.3ingshows anand example ofy—The a typical shared library configuration there is a single master I mplem Backup Recover Readiness Guide for the Enter pr where ise server and ( VERI TAS Sertwo ies) media servers, each with two drives from a shared four-drive library. This would be a good option if the media servers either had a large amount of data or if you wanted to share the I ntr oduction workload backing Pa r t I - I nt rof oduct ion t oup Banetwork ck up andclients. Recove r y in the Ent er pr i se Env ir onm e nt Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

If the amount of data is small enough, the drives could be directly connected to the master, making it - Business Requirements of Back up Systems the master and media server. When determining if you need a media server or multiple media servers, Chapter 3 An I ntr odu ction to NetBackup you should-consider the following: Chapter 2

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4 - of Evaluating Stor age Media Requir ements Amount data Chapter 5

- Gener al Discussion on Configur ation

Location of datain g the Backup Pr ocess Chapter 6 - Monitor Chapter 7

Speed-ofEvaluating networks Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter Backup 9 - window The Expanding Back up System Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Let's look more detail. Chapter 10 at - these The Futinure of Backup

Chapter 11 - Maj or Players in the Backup Ar ena

Table 3.3: Drive Controller Data Transfer Rates

Appendix A - Com m and-Line I nter face Gu ide Appendix - Glossar y DRIVEBCONTROLLER

THEORETICAL MB/SEC

THEORETICAL GB/HR

Appendix C - Tuning Your Backup and Recov er y Application

SCSI D - Disaster Recovery Planning 5 Appendix Kit—Fr om End to Beginning 18 Appendix - Business I mpact Analysis t he Calm NarrowESCSI-2 10 Planning Kit—The Stor m Befor e36 Appendix F - Per for m ance Test Tech Note

Wide SCSI-2

20

72

33

118.8

Ultra SCSI-3

40

144

ListUltra of Sidebars ATA 66

66

237.6

Ultra2 SCSI-3

80

288

Fibre Channel

100

Appendix G - Net Backu p Per form ance Tuning on Windows I ndex Ultra ATA List of Figur es List of Tables

< Day Day Up >

360

Amount of Data The total amount of data that must be backed up when full backups are done is a good estimate for the maximum data that would be required to be managed. It is also very important to determine how much data is to be backed up on a daily basis. This is usually an estimation based on the amount of user or application data and the daily rate of change. If a filesystem contains 100 GB of data but only has a rate of change of 2 percent, you only have to worry about 2 GB of data for your daily backups. These two numbers, total data and changed data, are also used to determine how many tape drives are needed and are part of the media requirements formula.

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Figure Library sharing.on Configur ation Chapter 5 - 3.3: Gener al Discussion Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Location - Gener of alData Tr oubleshooting Tips

Chapter 8 Chapter 9

- The Expanding Back up System

Ifrall dataEnte is located actcouple ofup large file Pa t I Ithe I - The r pri se I on m pa of Back Sy ste m sservers,

you should make them media servers by physically connecting them to tape drives and maybe have one more to handle all the network-based Chapter 10 - The Fut ure of Backup clients. If the data is spread throughout your enterprise, you must decide how you want to configure the Chapter 11 - Maj or Players in the Backup Ar ena backup domain. You can configure a dedicated media server or servers and back up all the data over Appendix A - Com m and-Line I nter face Gu ide the LAN, or you can distribute media servers closer to the clients. The restriction here will be the SCSI Appendix B - Glossar y cable length restrictions from the media servers to the libraries. Appendix C - Tuning Your Backup and Recov er y Application

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Speed of Networks

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note

If a significant amount of data resides on clients on a slow network, you should consider either installing a high-speed backup network or, if there is enough data, making one of these clients a media I ndex server. The other consideration is the amount of traffic the backup and recovery requirements will add List of Figur es networks. If possible, you should put the backup and recovery traffic on a dedicated to the existing List of Tables network. If this is not possible, you might have to throttle large backup clients on slow networks or they List Sidebars the network. Table 3.4 will help you determine how different networks will affect the willofdominate overall backup performance. Appendix G - Net Backu p Per form ance Tuning on Windows

Backup Window

< Day Day Up >

The backup window can also come into play when you are determining media server requirements. Some straightforward formulas are used to calculate how many tape drives are required to back up a known amount of data in a fixed amount of time, assuming no other bottlenecks. We discuss these in the next chapter. If the amount of data to be backed up and the amount of time available result in too many drives required for a single media server, this would indicate another media server is needed. You must always stay within the system constraints when configuring media servers. It does no good to put more tape devices on a server than it has the I/O bandwidth to handle. You do not want to create any unnecessary bottlenecks. Table 3.4: Network Data Transfer Rates

< Day Day Up >

NETWORK TECHNOLOGY 10Base-T 100Base-T FDDI Gigabit GbE

THEORETICAL GB/HR 3.6

I m plem en t ing Ba cku p an d Reco ver y: Th e 36 Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

36 ISBN:0471227145 360

This guide tak es r eaders thr ough the necessar y steps of Quad FastEthernet QFE deploy ing Trunked ser v ices by showing how to addr ess 144 the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

EXAMPLE OF SIZING METHODOLOGY

1. Determine how much data needs to be backed up on a full schedule. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con 2. tDetermine en t s the Window for the backups. How much time are you willing to allow for

backups to complete, instance, 1 hour, hours, 12 hours, and so on-'a I mplem ent ingthe Backup and Recover y—The for Readiness Guide for the6Enter pr ise ( VERI TAS Serweekend' ies) is too nebulous. This needs to be a concrete number from start to finish to I ntr oduction make this work out. Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

youand have determined amount ofEx data and the window, you can easily Chapter 13. -Once Backup Recover y Sy st emthe Requir em ents plained Chapter 2

how many drives required to physically meet this challenge. This is all -determine Business Requirements of Backare up Systems

Chapter 3

- An I ntr odu ction to NetBackup

about simple numbers. A DLT 7000 drive can write about 8 MB/sec of data on average, so four DLT 7000 drives can write about 32 MB/sec. Therefore, 2 TB of data in a six-hour window will require 11.5 drives - (8 MB/sec × 60 seconds = 480 MB per - Evaluating Stor age Media Requir ements minute × 60 = 28.8 GB per hour × 6 hours = 172.8 GB per drive per 6 hours. 2 TB / - Gener al Discussion on Configur ation 172.8 GB per hour per drive = 11.57 drives to back up 2 TB in six hours to DLT 7000 - Monitor in g the Backup Pr ocess tape drives). Drive selection is discussed more in the next chapter.

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4 Chapter 5 Chapter 6 Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 84. -Now Gener al time Tr oubleshooting Tips it's to figure out how to provide enough bandwidth to the drives from the server; aBack single F/W Diff SCSI card can write only 20 MB/sec, so each port on a Chapter 9 -media The Expanding up System

handle the up bandwidth Pa r t I I I - Thecard Entecan r pri se I m pa ctonly of Back Sy ste m s

for two drives.

Chapter 10 - The Fut ure of Backup

5. After you have determined the media server physical bandwidth, you need to determine LAN bandwidth to that media server, depending on how many drives it will Appendix A - Com m and-Line I nter face Gu ide be attached to. At 32 MB/sec, at least a Trunked QFE at 50 MB/sec or a GbE at 125 Appendix B - Glossar y MB/sec will be needed. A media server backing up LAN traffic must be configured Appendix C - Tuning Your Backup and Recov er y Application with something other than a 100-Mb network interface card (NIC). Chapter 11 - Maj or Players in the Backup Ar ena

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Appendix 6. E -So Business I mpact Planning Kit—The Stor m Befor t hechoose Calm a media server that now that you Analysis have determined 4 and 5, you neede to Appendix F -has Perthe for mrobustness ance Test Tech Note to handle 4 and 5. A Sun Ultra 10 cannot have Quad FastEthernet

cards and won't a GbE; it is all about the numbers and is pure physics. Appendix G -(QFE) Net Backu p Per form ance handle Tuning on Windows I ndex

Find out what you need to move across the copper/glass, and then build a system to

accommodate this. List of Figur es List of Tables List of Sidebars

< Day Day Up > < Day Day Up >

< Day Day Up >

Summary

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

ISBN:0471227145 bylooked David B. andsteps DavidofA.setting Chapa up a backup In this chapter, we at Little the first and recovery strategy using a Johnselected Wiley & Sons © 2003 (340 pages) backup product. We NetBackup from VERITAS Software. We first looked at the specific architecture usedThis by NetBackup: guide tak es r eaders thr ough the necessar y steps of

deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

Client

Media server < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Master server Ta ble o f Con t en t s I mplem Global ent ingData Backup Manager and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

With this background, we could look at some of the specific system requirements for backup servers. I ntr oduction This looking Pa r t I involved - I nt r oduct ion t o at Ba the ck upfollowing: and Recove r y in the Ent er pr i se Env ir onm e nt Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

CPU requirement guidelines

Chapter 3 - An I ntr odu ction to NetBackup Memory requirement guidelines Pa r t I I - Back up P roduct Tutor ia l

I/O4adapter specifications Chapter - Evaluating Stor age Media Requir ements Chapter 5

- Gener al Discussion on Configur ation

This information coupled with the following considerations gave us enough information to move to the - Monitor in g the Backup Pr ocess next phase of design-determining media requirements:

Chapter 6 Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8 - of Gener al Tr oubleshooting Tips Amount data Chapter 9

- The Expanding Back up System

of data Pa r t I Location I I - The Ente r pri se I m pa ct of Back up Sy ste m s Chapter 10 - The Fut ure of Backup

Speed of networks

Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - window Com m and-Line I nter face Gu ide Backup Appendix B - Glossar y

In the next at how evaluate storage requirements, including tape drives and Appendix C -chapter, Tuning we Yourlook Backup andwe Recov er y Application libraries.D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note < Day Day Up > Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Part II: Backup Product Tutorial Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa

ISBN:0471227145

Chapter 4: Evaluating Media Requirements John WileyStorage & Sons © 2003 (340 pages) This guide tak es r eaders thr ough the necessar y steps of

Chapter 5: General Discussion on Configuration deploy ing ser v ices by showing how to addr ess the

ar chitectur e, lim it ations, and capabilities of t he ex isting

Chapter 6: Monitoring theastr Backup net wor k infr uctur e.Process

Chapter 7: Evaluating Other Backup-Related Features and Options < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> 8:t General Troubleshooting Tips Ta ble Chapter o f Con t en s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise 9: The Expanding Backup System ( VERI Chapter TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

< Day - Backup and Recover y Sy st em Requir emDay entsUp Ex > plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Chapter IGu 4: Evaluating Storage Media Requirements id e f or t h e Ent er pr ise

Overview

ISBN:0471227145

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

This guide tak es r eaders thr ough the necessar y steps of

The next step in developing deploy ing ser a vbackup ices by showing and recovery how to strategy addr essisthe to determine the storage media ar chitectur lim it ations, you and have capabilities of gathered, t he ex istingyou should have a pretty good requirements. Based on thee,information already wor k infr astr uctur e. idea of how muchnet data is going to be backed up, how many copies you will need to keep, and how long you will keep them. All of this information figures into the total storage media requirements. If this is al new backup you" Ican use this information to determine what type of tape drives and media < ?xm version= " 1.0"domain, encoding= SO- 88591" ?> best. Tawill ble work o f Con t en tIfsthis is an existing domain, you can determine if you have enough drive and library capacity. I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

Asoduction you no doubt have already figured out, this is not an exact science. Every piece is interrelated. The I ntr size servers the number drives. The number of Pa r t I of - I the nt r oduct ion is t o dependent Ba ck up andon Recove r y in theofEnt er pr i se Env ir onm e nt

drives is dependent on the amount of data being backed up and the backup window. The backup window is related to the number Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained of drives and the speed of the drives. The ability to use the bandwidth of the drives is related to the Chapter 2 - Business Requirements of Back up Systems network speed and layout. That is why we picked a starting point of analyzing the data and moved Chapter 3 - An I ntr odu ction to NetBackup forward from there. You will need all the data gathered using the guidelines in the first three chapters Pa r t I I - Back up P roduct Tutor ia l before proceeding. Chapter 4

- Evaluating Stor age Media Requir ements

Chapter - Gener al Discussion on Configur ation As you 5move forward with evaluating storage media, you need to consider the selection of a suitable Chapter 6 Monitor in g the Backup Pr ocess drive technology. The number of different drive types and the number of different libraries that support Chapter 7 - drives Evaluating Ot her Back Related You Featur es andgather Options the different complicate thisupdecision. should enough information to make an informed One place that can provide a comparison of all the different types is Chapter 8 decision. - Gener al Tr oubleshooting Tips

www.storagemountain.com/hardware-drives.html. This Web site shows all the different technologies Chapter 9 - The Expanding Back up System and speeds, capacities, load/unload Pa r t I Igives I - The Ente r pri se I m pa ct and of Back up Sy ste mtimes, s

as well as access times. All these figure into the

final decision. If backup speed is the primary concern, a fast drive with a high-density cartridge might Chapter 10 - The Fut ure of Backup be the best If recovery more Chapter 11 - solution. Maj or Players in the speed BackupisAr ena important, you might want to look at a fast drive with fast access, Abut- high-density may notface suit Gu your Appendix Com m and-Line I nter iderequirements. If you want to recover a single file from the end of aBtape, it would Appendix - Glossar y be faster to find it on a 20-GB tape than a 120-GB tape. Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning < Day Day Up Appendix E - Business I mpact Analysis Planning Kit—The Stor> m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Backup Window and Amount of Data Gu id e f or t h e Ent er pr ise

ISBN:0471227145is determining the actual by David B. Little and Davidthe A. Chapa One of the most critical steps in evaluating storage media requirements John must Wiley be & Sons © 2003 amount (340 pages)of time you are allowed to have backups running, backup window. This the actual while at the sameThis time, controlling the backup hardware, using a major guide tak es r eaders thr ough the necessar y steps of part of the network, and using ing ser vbeing ices bybacked showing addrof ess the backup window is becoming a much the resources ondeploy the systems up.how Thetosize your ar chitectur e, limYou it ations, of t he exthe isting harder measurement to define. mustand be capabilities able to determine number of hours in a day and in a net wor k infr astr uctur e. week that can be dedicated to backups, as this is an integral part of the equation to determine media requirements.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> on the TaBased ble o f Con t endata t s we collected in the earlier chapters, you should now have a very good idea of how

much ent data to and be backed eachReadiness day and each need I mplem ingneeds Backup Recoverup y—The Guide week. for theYou Enter pr iseto know how much data needs to beTAS backed up during each window. Generally, the largest backups will be the full backups. In the ( VERI Ser ies) past, most administrators performed daily incremental backups and did all their full backups over the I ntr oduction weekend most not working. This is changing. Pa r t I - I nt rwhen oduct ion t o people Ba ck up were and Recove r y in the Entconcept er pr i se Env ir onm e nt

It is very common now for a percentage of the systems, say, one-fifth, to have full backups done each day and the remaining Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained systems to have incremental backups each day. The weekends are saved to do maintenance or to Chapter 2 - Business Requirements of Back up Systems catch up. If this is closer to your model, then your window would be the time each day when backups Chapter 3 - An I ntr odu ction to NetBackup are performed, and the amount of data would be the average sum of the total data that would be Pa r t I I - Back up P roduct Tutor ia l backed up,- roughly a fifth of your total data. If you do not have specific operational information on the Chapter 4 Evaluating Stor age Media Requir ements amount of data that will make up your incremental backups, you can estimate using a percentage of Chapter 5 - Gener al Discussion on Configur ation change to calculate the amount of data. It is common to use 20 percent, unless you have a more Chapter 6 - Monitor in g the Backup Pr ocess accurate measurement. The goal here is to try to get as close as possible to your actual environment. Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

< Day Day Up >

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Drives

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

David B. Little and David A. number Chapa of hoursISBN:0471227145 Now that we havebythe amount of data and the needed to store that data, all we have & Sons © 2003the (340 pages) left to do is someJohn basicWiley math. Just take total amount of data that has to be backed up daily and divide by the duration of thetak daily window: This guide es rbackup eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar rate chitectur e, lim it ations, capabilities of t he ex isting Ideal data transfer = Amount of dataand to back up ÷ Backup window net wor k infr astr uctur e.

If you have 100 GB of data and an 8-hour window, your ideal data transfer rate would be 12.5 GB/hr. < ?xm l version= " 1.0" SO- 8859?> After you have an encoding= idea of the" Iideal data 1" transfer rate, you can then look at the different drive types to Tasee ble which o f Conmight t en t s offer the best fit for your needs. Not surprisingly, this is a little more complicated than I mplem ent ing at Backup and numbers, Recover y—The Readiness Guide for the technology, Enter pr ise you must consider both just looking the base though. With potential drive ( VERI TAS Ser ies)

performance and capacity. In larger enterprise environments, one size usually does not fit all. As mentioned several times, you need to look at the recovery requirements first and work back. This Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt might mean you will need two different types of drives, some that are very high performance but with Chapter 1 - Backup and that Recover Sy st em capacity Requir emwith entslower Ex plained less capacity and some offery higher performance. Data that is being kept for Chapter 2 - Business Back up Systems long retention periods,Requirements especially to offulfill legal requirements, might be better suited for the lowerChapter 3 - An odu ction to NetBackup performance butI ntr higher-capacity media. Data that might be required for immediate restores where Pa r t I Iis- money Back up might P roduct ia lsuited for the high-performance media. It is not uncommon to have time beTutor better Chapter 4 done - Evaluating Stor age Mediadrives Requirand ements backups to high-performance media and then the images vaulted to high-capacity Chapter 5 Gener al Discussion on Configur ation drives and media for off-site storage. I ntr oduction

Chapter 6

- Monitor in g the Backup Pr ocess A sample drive transfer rates, capacities, and times is given in Table 4.1. This Chapter 7 of - tape Evaluating Ot her Back up- Related Featur es access and Options

information- can be very helpful in determining which drive technology you need, but never forget these Gener al Tr oubleshooting Tips are all theoretical numbers and are given without taking into account the internal drive compression. Chapter 9 - The Expanding Back up System Drive manufacturers advertise compression rates for the different drive technologies. These vary Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s depending on the drive but are also theoretical numbers. These specifications can change with new Chapter 10 - The Fut ure of Backup firmware levels or versions of the drives. To get the most accurate numbers, contact the drive vendor Chapter 11 - Maj or Players in the Backup Ar ena or go to their Web site, where you'll find up-to-date specification sheets. Chapter 8

Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y

Table 4.1: Tape Drive Data Transfer Rates and Capacities

Appendix C - Tuning Your Backup and Recov er y Application

DRIVED - Disaster THEORETICAL ACCESS Appendix Recovery Planning THEORETICAL Kit—Fr om End to Beginning

COMPRESSION

TRANSFER CAPACITIES GB Appendix E - Business I mpact Analysis Planning Kit—The Stor m TIME Befor e t he Calm RATE GB/HR Appendix F - Per for m ance Test Tech Note(NO (NO p Per form ance Tuning COMPRESSION) Appendix G - Net Backu on Windows COMPRESSION) I ndex List4mm of Figur es (HP

1.8

4

4mm (HP DDS-3)

3.6

12

Mammoth

11

20

Mammoth2

42.4

DLT 4000

EXCLUDING LOAD TIME

ListDDS-2) of Tables List of Sidebars

60 sec

2:1

60

60 sec

2:1

5.4

20

68 sec

2:1

DLT 7000

18

35

60 sec

2:1

DLT 8000

21.5

40

60 sec

2:1

SDLT

39.6

110

70 sec

2:1

9840

36

20

11 sec

2.5:1

9940

36

60

41 sec

3.5:1

< Day Day Up >

LTO

52.7

100 < Day Day Up > 25 sec

2:1

AIT-2

21.1

50

2.6:1

AIT-3

42 sec I m plem en t ing Ba cku100 p an d Reco ver y: Th e 27 Rea din ess

27 sec

2.6:1

Gu id e f or t h e Ent er pr ise

When you start actually you will need, we recommend using ISBN:0471227145 by Davidfiguring B. Littlehow andmany David of A.which Chapakind of drive the native transferJohn rates and&capacities without compression. It is very difficult to estimate what kind of Wiley Sons © 2003 (340 pages) compression rateThis youguide will experience, as thr it isough totally on theofmakeup of your data. Some tak es r eaders thedependent necessar y steps data is very compressible, other data willhow yieldtovery If you do your architecture deploy ing while ser v ices by showing addrlittle ess compression. the ar chitectur e, it ations, and capabilities t he ex istingshould be good ones; you will based on no compression, thelimonly surprises you shouldofexperience net wor with k infrroom astr uctur have plenty of capacity for e. growth. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s < Day Day Up > I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Capacity

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

ISBN:0471227145 byappropriate David B. Little andtechnology David A. Chapa After selecting the drive that provides the performance and cartridge capacity John Wiley & Sons © 2003 (340 pages) you need, you next want to look at how many cartridges you will need to have available. This involves all the elements we looked so far.thrThe number of cartridges required depends on the amount Thishave guide tak es at r eaders ough the necessar y steps of deploy ing serup, v ices showing how to addr ess theyour retention periods, and the of data that you are backing thebyfrequency of your backups, ar chitectur it ations, and capabilities of t he ex isting capacity of the media used e, to lim store your backups. A simple formula that can be used is as follows:

net wor k infr astr uctur e.

Number of tapes = (Total data to back up × Frequency of backups × Retention period)/Tape

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o fcapacity Con t en t s

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise Following is an example: ( VERI TAS Ser ies) I ntr oductionTotal amount of data = 100 GB Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1 Chapter 2 Chapter 3

Full backups month = st4em Requir em ents Ex plained - Backup and per Recover y Sy - Business Requirements of Back up Systems

Retention period for full backups = 6 months - An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct backups Tutor ia l Incremental

per month = 30

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

Retention for incremental backups = 1 month - Gener al period Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Size of full backups = 100 Tips GB × 4 per month × 6 months = 2.4 TB

Chapter 9

- The Expanding Back up System

Preliminary calculations:

Size ofr pri incremental (20 Pa r t I I I - The Ente se I m pa ct backups of Back up=Sy stepercent ms

of 100 GB) × 30 × 1 month = 600 GB

Chapter 10 - The Fut ure of Backup

Total data stored = 2.4 TB + 600 GB = 3 TB

Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Solution: Appendix B - Glossar y

driveYour = DLT 7000and Recov er y Application Appendix C Tape - Tuning Backup Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Tape capacity without compression = 31.5 GB

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F Total - Per for m ance Test Tech Note tapes needed for full backups = 2.4 TB / 31.5 GB = 76.2 = 77 Appendix G - Net Backu p Per form ance Tuning on Windows I ndex

Total tapes needed for incremental backups = 600 GB / 31.5 GB = 19.1 = 20

List of Figur es

Total tapes needed = 77 + 20 = 97

List of Tables

List Sidebars By of looking at this example, you would expect to have a minimum of 97 active cartridges at any given

time. This also assumes that all the cartridges will be filled to capacity and there will be no unused tape. These calculations are based on no compression. This does give you an idea of the steps necessary to plan for an appropriately sized would never recommend implementing an enterprise backup strategy that does not include a robotic tape library with a barcode reader. Without these, the management can become overwhelming and very susceptible to human error. It is much better to turn over media management to an enterprise backup application. When figuring out how many slots are required to support your environment, do not forget to include some slots for cleaning tapes and at least two for the catalog backups. Actually, you will want to reserve twice as many slots for catalog backups as are needed so you can keep a copy of the catalog. If you are including an off-site storage solution of some type (vaulting) as part of your backup strategy, you need to include this in your total capacity calculations, since creating duplicate copies requires additional tapes.

< Day Day Up >

< Day Day Up >

Library?

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by Davidsection, B. Little most and David A. Chapa As stated in the previous enterprise backup strategies will include some type of robotic John & Sons © 2003 (340 pages) tape library. There areWiley several library manufacturers, each with an entire line of libraries from small to very large. Part ofThis thisguide decision will be based on the technology you select, as some libraries tak es r eaders thr ough thedrive necessar y steps of deploy ing ser v ices by showing how to addr essa the support only certain drives. The considerations for selecting library are as follows:

ar chitectur e, lim it ations, and capabilities of t he ex isting netthe wordesired k infr astrdrive ucturtype? e. Does it handle

Will it handle the required number of drives?

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Conitt en ts Does support the needed number of slots? I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS DoesSer it ies) have expansion capability? I ntr oduction

type of SCSI or Fiber? Pa r t I What - I nt r oduct ionconnection, t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Does it support barcode labels?

Chapter Anthe I ntrdifferent odu ctionlibraries to NetBackup As you 3look- at available, you should also consider if your strategy is best served Pa r t one I I - Back P roduct ia l by largeup library thatTutor contains

all the drives and media or by smaller libraries that are distributed

Chapter 4 -your Evaluating Stor age Requir ements throughout enterprise. We Media will discuss some of the reasons for picking one or the other in a later Chapter 5 Gener al Discussion on Configur chapter, but part of this decision is whetheration you plan to implement a SAN or distributed media servers (or both). cheaper one large library than two smaller libraries that equal the Chapter 6 Generally, - Monitor initgisthe BackuptoPrbuy ocess

same capacity in drivesOt and Chapter 7 - Evaluating herslots. Back up- Related Featur es and Options Chapter 8

- Gener al Tr oubleshooting Tips

A sample of the library vendors are ADIC, ATL, Compaq, Exabyte, Fujitsu, HP, IBM, NEC, Sony, - The Expanding Back up System Spectra Logic, and StorageTek. Each of these companies has a Web site that contains all the Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s information for their entire line of libraries. This would be an excellent place to go for information. Chapter 9

Chapter 10 - The Fut ure of Backup

Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y

< Day Day Up >

Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Summary

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

ISBN:0471227145 bystarted David B. Little and David A. Chapa In this chapter, we looking at the actual storage requirements for the backup. First, we John Wiley & Sons © 2003 and (340 pages) determined the required backup window calculated the amount of data we need to store each day. With this information, at some of the drive technologies and how to determine how This guidewe taklooked es r eaders thr ough the tape necessar y steps of deploy ing ser vto ices by showing how tobandwidth. addr ess theThis led to a discussion on calculating many drives might be needed support the backup chitectur e, lim ityou ations, andneed capabilities of t heWe ex isting how many active ar tape cartridges would to support. recommend selecting an appropriate net wor k infr astr uctur e. robotic library that will support the required number of drives and cartridges.

Next, we will "look actually "putting this1" all?>together in a configuration. < ?xm l version= 1.0" at encoding= I SO- 8859Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) < Day Day Up > I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Chapter IGu 5: General Discussion on Configuration id e f or t h e Ent er pr ise by David B. Little and David A. Chapa

ISBN:0471227145

Our next step in our discussion of backup and recovery in the enterprise is to take all the data collected John Wiley & Sons © 2003 (340 pages) and manipulated in the previous chapters and actually configure a backup domain. We will use This guide tak es r eaders thr ough the necessar y steps of VERITAS Software's NetBackup application for this discussion. In this chapter, we go through the deploy ing ser v ices by showing how to addr ess the unique terms andarconcepts to and NetBackup so you can chitectur e,that lim apply it ations, capabilities of t he exfollow isting the examples more easily. We look at the elements that go into the selection of a master server, to determine if separate media net wor k infr astr uctur e. servers are required, and at the actual steps involved in configuring the storage devices for use by NetBackup, as well as configuring a policy to back up clients. We also examine the internal catalog < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> used by NetBackup and configure the automated backup of this catalog. As part of the configuration Ta ble o f Con t en t s discussion, we look at the different methods that you can use to perform the configuration. I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

Specific NetBackup Configuration Elements

I ntr oduction

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Each backup application uses itsy own terminology Chapter 1 - Backup and Recover Sy st em Requir em and ents NetBackup Ex plained is no different. We have provided a

glossary of-the specific terms that are used when configuring NetBackup. To configure a NetBackup Business Requirements of Back up Systems domain, you start with the selection of a master server. This server contains all the information about Chapter 3 - An I ntr odu ction to NetBackup the policies that are configured for NetBackup. A policy contains the list of clients to be backed up, the Pa r t I I - Back up P roduct Tutor ia l file list, the attributes controlling the backup and all of the schedules. It also contains the information Chapter 4 - Evaluating Stor age Media Requir ements used to determine where the data will be sent for storage. This configuration information is called Chapter 5 - Gener al Discussion on Configur ation storage units and gives NetBackup a logical representation of the physical storage devices. Each Chapter 6 - Monitor in g the Backup Pr ocess media server contains the actual device configuration information. The master server also maintains Chapter 7 - Evaluating Ot herofBack up- Related Featur es and Options and manages the database all the media that is known to the NetBackup domain. This information Chapter 8 Gener al Tr oubleshooting Tips is kept in the volume database (volDB). In addition to the actual volume information, the master has a Chapter 9 for - The Back up System (poolDB). database the Expanding volume pool information Chapter 2

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup

Master Server

Chapter 11 - Maj or Players in the Backup Ar ena Appendix A -a Com and-Line I nteris face Gu ide a system to be the master server. When using an Obviously, goodmplace to start selecting Appendix B Glossar y application such as VERITAS Software's NetBackup, your choice is not restricted by the application. Appendix - Tuning Yourany Backup Recov er y Application You canCuse just about UNIXand or Windows system that has enough resources. Many people select Appendix Disaster Recovery Planning Kit—Fr omis End to Beginning the type Dof -system that their administrative staff already familiar with to eliminate the need to learn

another Eoperating system. It isAnalysis very common an enterprise the Appendix - Business I mpact PlanninginKit—The Stor m for Befor e tbackup he Calmmaster server to be a standalone up allNote the system resources to the backup and recovery requirements of Appendix F - system. Per for mThis ance frees Test Tech the enterprise and makes serveronindependent Appendix G - Net Backu p Perthe formmaster ance Tuning Windows of other applications. The master server can also be the robotic control host for the tape libraries, especially if it is a dedicated backup server. It is I ndex also List of common Figur es to make the master highly available. In some cases, depending on the overall backup workload, List of Tablesthe master can also serve as a media server. In Chapter 3 we talked about some of the issues involved in selecting a server.

List of Sidebars

Here are several considerations when determining the master server: < Day Day Up > of clients to be backed up by a master is Number of clients to be backed up. The total number important primarily for two reasons. First, this has a direct relationship to the total number of jobs. Second, the number of clients affects the overall size of the catalog and the number of directories within the catalog.

Total number of backup jobs. The total number of backup jobs scheduled daily and weekly is related to the number of clients and the number of schedules that are run for each client. Database agent backups also affect this number, since it is common for a single database backup to generate multiple jobs. Number and type of networks. Network interfaces require system resources-especially highspeed networks like GbE networks.

Total number of media expected to be The < tracked. Day Day Up > management of the volDB requires system resources. As the expected size of the volDB grows, the system resources must be available to manage it. I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu idbe e fa ormedia t h e Ent er pr iseIf the master server will also function as a media server, you Will the master server? ISBN:0471227145 must select abysystem David B. that Little hasand adequate David A.I/O Chapa capabilities. You must also ensure there is enough memory to accommodate both©functions. John Wiley & Sons 2003 (340 pages) This guide tak es r eaders thr ough the necessar y steps of

There might be more considerations, this list gives youess an the idea of what you need to be thinking deploy ing ser v ices by but showing how to addr about when selecting a master Remember, this server will be doing all the scheduling for the ar chitectur e, limserver. it ations, and capabilities of t he ex isting net wor infr astr uctur e. the backups, keeping track of the status and use of the tape backups, managing thekcatalogs for all devices, tracking all the active and available media that is known to the system, as well as handling all restores. You" 1.0" should make sure system < ?xm l version= encoding= " I SO-the 88591" ?> you select has enough memory and processor capacity to handle all these functions, as well as enough disk space to hold the catalogs, databases, and logs. Ta ble o f Con t en t s Also remember to figure in growth in both disk and memory requirements. I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

Media Server

I ntr oduction

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter Every backup 1 - Backup domain and must Recover havey aSymedia st em Requir server. emThis entscan Ex plained be the following: Chapter 2

- Business Requirements of Back up Systems Master as media As discussed in the previous section, a master server can also Chapter 3 - server An I ntr odu ction toserver. NetBackup

asParoduct mediaTutor server. Pa r t I function I - Back up ia l Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5 - Gener al Discussion Configur Application server that is on also used ation as a media server. If an application server has enough Chapter 6 Monitor in g the Backup Pr ocess data to make LAN backups undesirable, it can have tape drives attached, making it a media Chapter 7 - ItEvaluating her Back up- Related Featur es to and Options server. can eitherOtback just itself up or be used back up other LAN clients. Chapter 8 - Gener al Tr oubleshooting Tips Chapter 9

- The Expanding Back up System

Dedicated media server. A system or systems can be dedicated as media servers used just to move data from clients to tape or to read data back in the case of a restore.

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup

Chapter 11 - Maj or Players in the Backup Ar ena

Special server. TheGu SAN Appendix A - SAN Com mmedia and-Line I nter face ide media server is special in that it can only be used to back itselfB up cannot be used to back up other LAN clients. Appendix - and Glossar y Appendix C - Tuning Your Backup and Recov er y Application

We discussed some of the factors that affect the decision on media servers in Chapter 3. In a larger enterprise, it is common to have dedicated media servers to handle the LAN clients and have the Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm larger application servers also be media servers, used primarily to do LAN-free backups of their data. Appendix F a- SAN, Per forthese m ance Test Tech Note If there is will probably be SAN media servers. Since the task of a media server is to Appendix G Net Backu p Per form ance Tuning onhave Windows move the data from a client to tape, it should good I/O capabilities and adequate memory. The I ndex media server can be either a UNIX or Windows system. The most important considerations on List of Figursystems es selecting to be media servers are as follows: Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

List of Tables

capability List ofI/O Sidebars Memory Network connectivity

< Day Day Up >

Clients As discussed, any system that has data that will be backed up is a NetBackup client. This includes the master server, all the media servers, all the application servers, and any other systems that need to have their data protected. As you make your list of clients to be backed up, you should group them by common attributes. This can either be by function, business unit, architecture, or configuration. When you configure your backup policies, you should group clients with similar backup characteristics.

Devices and Storage Units When you configure any backup and recovery application, you need to configure the specific hardware

devices that will be used by the application. devices on the media servers. These devices are first configured with the operating system and then with NetBackup. This allows NetBackup Media Manager to access the devices. NetBackup actually allocates and accesses the physical devices via the storage unit definitions on the master server. This I m plem en t ing Baorder cku p for an dconfiguring Reco ver y:devices Th e Rea configuration is also required. The is din as ess follows: Gu id e f or t h e Ent er pr ise

1. Configure the operating system to see and have accessISBN:0471227145 to all physical devices. This includes by David B. Little and David A. Chapa ensuring the proper device files are created. John Wiley & Sons © 2003 (340 pages)

guide takMedia es r eaders thr ough the media necessar y stepstoofhave access to all the system 2. Configure This NetBackup Manager on the servers deploy ing ser v ices by showing how to addr ess the devices. ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

3. Configure storage units on the master server to allow access to the physical devices. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s < Day Day Up > I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

InstallationI m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

by David B. Little andup David A. Chapa The normal procedure when setting a backup domain is to ISBN:0471227145 install NetBackup on the master server John Wiley & Sons © 2003 (340 pages) The clients are usually pushed from the master, first and then install the media servers if applicable. as long as they are similar can thr push UNIX clients from a UNIX master server and Windows This guide in takthat es rwe eaders ough the necessar y steps of deploy ing ser v ices by showing how installation to addr ess the clients from a Windows master server. The actual steps are different for UNIX and Windows servers.ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

UNIX Master Server

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> TaNetBackup ble o f Con t supports en t s many different UNIX platforms. To simplify the installation procedure, an I mplem ent ingscript Backup and Recover Readiness Guide for the Enter pr ise installation is provided thaty—The interfaces with the specific operating system. This script will work with ( VERI TAS Ser ies)

all the supported UNIX servers for both the master server and media server installation. The easiest way to install the software on a master server is to load the CD-ROM containing the NetBackup Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt release software for the appropriate operating system in the local CD-ROM drive. You then change Chapter 1 - Backup and y Sy st em Requir em ents your working directory to Recover the CD-ROM. A list of the files Ex onplained the CD-ROM will look like the following for Chapter Business Requirements of Back up Systems a Sun ,2HP,- or Linux system: I ntr oduction

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

# ls Doc

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

NB-Java

NBClients

hp-ux

install

linux

solaris

Chapter - Monitor g the Backup Pr ocess It is not6necessary toinchange directory to the different subdirectories at this point, since the install script Chapter that is provided 7 - Evaluating will control Ot her allBack this.upIf you Related are installing Featur es and fromOptions the other UNIX CD-ROM, the list will look

like the8following: Chapter - Gener al Tr oubleshooting Tips Chapter 9

- The Expanding Back up System

Pa I I I - The Ente r pri se I m pa ct of Back up Sy ste m s #r t ls

Chapter Fut ure of Backup Doc 10 - TheNB-Java NBClients

alpha

install

ncr rs6000

Chapter sequent 11 -sgi Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide

The installation CD-ROM contains the client software for all the UNIX clients, as well as all the Appendix B - Glossar y

released documentation. The install script determines the type of platform on which you are installing and selects the appropriate binaries to support that operating system.

Appendix C - Tuning Your Backup and Recov er y Application

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Appendix E - Business I mpact Analysis Stor m Beforthe e t he CalmThe following is the menu After locating the proper install script, Planning your nextKit—The step is to execute script. Appendix F Per for m ance Test Tech Note that results from executing the script on a Sun system: Appendix G - Net Backu p Per form ance Tuning on Windows

UNIX Install Script I ndex List of Figur es

# of cdTables /cdrom/cdrom0 List # of ./install List Sidebars

VERITAS Installation Script < Day Day Up > Copyright 1993 - 2002 VERITAS Software Corporation, All Rights Reserved. Installation Options 1 NetBackup 2 NetBackup Client Software 3 NetBackup Client Java Software q To quit from this script Choose an option [default: q]: To install the master server software, you select 1. The script then checks to see if this is a new installation or an upgrade. If it is a new installation, you are prompted to provide the location where you want the software to be installed. NetBackup must always have an origin from the /usr directory, so if

you elect to have the software loaded to another location, a symbolic link will be created in /usr for a < Day Day Up > directory, openv, that will point to the location you selected. On Sun systems, applications are not normally allowed to be loaded in the /usr directory. Therefore, you will be prompted to install the package in /opt/openv, but a link will still be created as /usr/ openv that points to /opt/openv. If it is an I m plem en t ing Ba cku p are an dmoved Reco ver y:the Th enew Reaversion din ess replaces them in the same upgrade, the binaries for the old version and Gu idofe an f orupgrade, t h e Ent er pr ise location. In the case the install script also checks for processes that are running that David for B. Little and upgrade David A. process. Chapa must be stopped by to allow a clean If thereISBN:0471227145 are NetBackup processes running, the John Wiley & Sons © 2003 (340 pages) script terminates them. You will also be prompted to provide a list of other UNIX platform types besides takclients. es r eaders ough the y steps of client binaries to be loaded onto the master serverThis thatguide will be Thisthr allows all ofnecessar the appropriate deployising serthat v icesscript by showing the master. Following how looks: how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

Note It is a good practice when installing any new software application to read the release notes. Here you may find information that may not have made it to the documentation, special considerations, and" I so < ?xm l version= " 1.0" encoding= SO-on. 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise The Solaris clients will be loaded. ( VERI TAS Ser ies) I ntr Dooduction you want to load any other NetBackup Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

clients onto the server? (y) [y,n,?] y

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3 the - An Platform I ntr odu ction Client to NetBackup Choose types you wish to install Pa r t I selecting I - Back up P roduct ia l by the Tutor platform

type one at a time

Chapter 4 - Evaluating Stor age Media Requir ements or select ALL client platforms. Chapter 5

- Gener al Discussion on Configur ation Platform Chapter 6 - Client Monitor in gOptions the Backup Pr ocess

----------------------Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options 1. Alpha Chapter 8 - Gener al Tr oubleshooting Tips 2. DataGeneral Chapter 9 - The Expanding Back up System Pa r3. t I I IHP9000 - The Ente r pri se I m pa ct of Back up Sy ste m s

4. INTEL (FreeBSD) Chapter 10 - The Fut ure of Backup 5. Linux (RedHat) 6. MACINTOSH (MacOSX and MacOSXS1.2) Appendix A - Com m and-Line I nter face Gu ide 7. NCR Appendix B - Glossar y 8. IBM RS6000 Appendix C - Tuning Your Backup and Recov er y Application 9. SCO Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning 10. SGI Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm 11. Sequent Appendix F - Per for m ance Test Tech Note 12. Solaris Appendix G Net Backuplatforms p Per form ance Tuning on Windows 13. ALL -client I ndex q Quit client selection Chapter 11 - Maj or Players in the Backup Ar ena

List of Figur es List of Tables

Enter Choice (Default is 13) List of Sidebars

[1-13,?,q]

After you have provided the needed information, the requested client binaries are loaded in a client directory on the master server to be used when you install NetBackup on the clients within this < Day Day Up > NetBackup domain. The binaries are pushed from the master to the clients. The install script eventually prompts you to enter a license key. You must have either a permanent license key for all the options and features you have purchased or an evaluation key that will turn on all the features for an evaluation period. This prompt looks like this: Installation of was successful. Running /usr/openv/netbackup/bin/install_bp

A NetBackup BusinesServer or DataCenter license key is needed for installation to continue. Enter license key: xxxx-xxxx-xxxx-xxxx-xxxx-xxxx-xxxx-xx

NetBackup DataCenter Base product with the following features < Day Day Up >

enabled:

Open Transaction Manager Intelligent Disaster Recovery I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess has been registered. Gu id e f or t h e Ent er pr ise ISBN:0471227145 by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages) All additional keys should be added at this time. Thisadd guideadditional tak es r eaders thr ough the keys necessar y steps of Do you want to license now? (y/n) [y] deploy ing ser v ices by showing how to addr ess the chitectur e,license lim it ations, capabilitiesfeatures, of t he ex isting If you want to addaradditional keysand for additional you would answer yes. The following net wor k infr astr uctur e.

prompt appears:

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> License Key Utility Ta ble o f Con ------------------t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

A) Add a License Key

I ntr oduction D) Delete a License Key Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

F) List Active License Keys

Chapter 1

-L) Backup Recover y Sy stLicense em Requir em ents Ex plained Listand Registered Keys

Chapter 2

-H) Business Help Requirements of Back up Systems

Chapter 3

-q) An Quit I ntr oduLicense ction to NetBackup Key Utility

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter Enter5 a -letter: Gener al Discussion on Configur ation Chapter 6

- Monitor in g the Backup Pr ocess When you are finished entering license keys,Featur this question appears: Chapter 7 - Evaluating Ot her Back up- Related es and Options Chapter 8

- Gener al Tr oubleshooting Tips Installing NetBackup DataCenter Chapter 9 - The Expanding Back up System version: 4.5GA Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Is t-sparc1 server? (y/n) [y] Chapter 10 - The the Fut uremaster of Backup Chapter 11 - Maj or Players in the Backup Ar ena

This is where you decide if you are installing a master server or a media server. Since this is a master server installation, you would answer yes, which allows the script to continue. This allows the script to Appendix B - Glossar y set up the system configuration files to support a master server installation. The script also extracts Appendix C - the Tuning Your Backup Recovto er yallow Application and installs NetBackup Java and software use of the Java interfaces. You are then prompted Appendix D Disaster Recovery Planning Kit—Fr om End todevice Beginning to supply a host name to store and manage the global database: Appendix A - Com m and-Line I nter face Gu ide

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note

In order for device discovery and auto-configuration to work properly in

Appendix G - Net Backu p Per form ance particularly Tuning on Windowswhere peripherals are connected a DataCenter environment, I ndex to multiple servers, one host must serve as the repository for global List of Figurconfiguration es device information. List of Tables List of Sidebars Enter which host will store global device information.

(default: t-sparc1): In almost all cases, this will also be the master server, and that is the default supplied by NetBackup. < Day Day Up > As the script finishes the installation procedure, you are asked if you want to create example templates and if you want to start the NetBackup processes so you can continue with the installation and configuration. If this is your first experience with the product, having the templates to use as examples is worthwhile. If you are a seasoned user, you might want to save a little time and space and skip these. This basically finishes the software installation for the master server. After you have installed any media servers, you are ready to go to the configuration step.

UNIX Media Server Installation on a media server is very similar to installation on a master server. The primary difference is in the answer to the prompt, 'Is this server the master?' By answering no, you are prompted to supply the master server name and any other media server names. This results in the correct server software being installed, as well as the configuration file being updated to reflect the other known servers in

your backup domain. Following is the prompt difference for a media server: < Day Day Up > Installing NetBackup DataCenter version: 4.5GA I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Is t-sparc1 the master server? (y/n) [y] n Gu id e f or t h e Ent er pr ise

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

What is the fully qualified name of the master server? This guide tak es r eaders thr ough the necessar y steps of

UNIX Clientdeploy ing ser v ices by showing how to addr ess the

ar chitectur e, lim it ations, and capabilities of t he ex isting

net wor infr astr uctur e. Two basic methods arekused to push the initial client software out to UNIX clients from a UNIX master server. You can either use the remote shell method, which requires a .rhost file on each client, or you canl use the File Protocol (FTP) which uses FTP to move the client software out to < ?xm version= " 1.0"Transfer encoding= " I SO- 88591"method, ?> each configured client. Once the client software has been installed, the .rhost files can be removed, as Ta ble o f Con t en t s the NetBackup processes will handle any future updates. I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

Windows Master Server

I ntr oduction

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1 - Backup Recover y server Sy st em software Requir emon ents Ex plained server is a simple process. You load The installation of theand NetBackup a Windows Chapter 2 - Business Requirements Back up Systems the Windows server CD-ROM in theofCD-ROM drive, and an install shield should start. Figure 5.1

shows the Chapter 3 initial - An Iwindow. ntr odu ction to NetBackup Pa r t I I - Back up P roduct Tutor ia l

By selecting NetBackup Installation, you are presented with three options: Check VERITAS Web Site - Evaluating Stor age Media Requir ements for Product Alerts, Start NetBackup Server Installation, and Start NetBackup Client Installation. For a Chapter 5 - Gener al Discussion on Configur ation master server installation, you select Start NetBackup Server Installation. After you have been Chapter 6 - Monitor in g the Backup Pr ocess prompted through a few steps of preinstallation checks, the screen shown in Figure 5.2 appears. Chapter 4

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

Figure 5.1: NetBackup Windows install shield. < Day key, Day which Up > allows you to continue with the master At this point, you must either enter a valid license server or media server installation, or you can install another option, the NetBackup Remote Administration Console. This tool allows you to administer the servers within your NetBackup domain from a Windows system.

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

Figure 5.2: NetBackup License Key screen. I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Windows Media Server of Back up Systems - Business Requirements

Chapter 2 Chapter 3

- An I ntr odu ction to NetBackup

As seen in the last section, the media server installation is very similar to the master server installation. During the -media server installation, you provide the name of the master server and any other media Chapter 4 Evaluating Stor age Media Requir ements servers. This allows NetBackup to set up all the configuration files to properly reflect your backup Chapter 5 - Gener al Discussion on Configur ation domain. Pa r t I I - Back up P roduct Tutor ia l

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Windows Clients - Gener al Tr oubleshooting Tips

Chapter 8 Chapter 9

- The Expanding Back up System

Windows client software can be pushed from a Windows master server or can be locally installed using the NetBackup release CD-ROM.

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup

Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y

< Day Day Up >

Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess ConfiguringI mNetBackup Gu id e f or t h e Ent er pr ise

ISBN:0471227145 B. Little and David A. Chapa In this section, webygoDavid through the steps for the configuring NetBackup. The steps include configuring John Wiley Sons © 2003 (340as pages) the physical devices-tape or&optical-as well configuring the storage units, which may again be tape, optical, or even disk, then finishing configuring a policy. Remember, the policy is the who, This and guide tak es r eadersup thrby ough the necessar y steps of deploy serof v ices showing how to addr ess It the what, when, where, anding how theby NetBackup configuration. is best to truly think about the chitectur e, lim it ations, and capabilities of t he ex implementation ofarthe policies-how the backup policies should beisting configured, how schedules should net wor k infr astr uctur e. be executed, and so on. Too often, when we are asked to perform NetBackup site assessments, it's the policy structure that people want us to spend most of our time focusing on. Unfortunately very little time is given "to theencoding= overall structure and1"task < ?xm l version= 1.0" " I SO- 8859?> of creating the backup policies, and it's the one that can Tacause ble o f the Conmost t en t spain later on down the road.

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

Devices

I ntr oduction

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

After the server software is installed on the master and any media servers, the next step is to configure

Chapter 1 - devices. Backup and Recover y Sy st em Requir em ents have Ex plained the backup During the installation, you should supplied the name of the master server Chapter - Business Requirements up Systems and any2 media servers. This allows of theBack install process to build the basic server configuration file. All of Chapter 3 - devices An I ntr odu ction NetBackup the physical must betovisible to the operating system on the media server, and the appropriate Pa r t I I - files Backmust up P roduct Tutor ia l device exist. VERITAS

Software supplies a document titled VERITAS NetBackup

Chapter 4 - 4.5 Evaluating Stor age Media Requir ements DataCenter Media Manager Device Configuration Guide to assist in the process. This document Chapter 5 Gener al Discussion on Configur ation guides you in configuring the operating system-specific device files needed to access the physical Chapter devices. 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

After ensuring the operating system has access to the physical storage devices, you can now configure - Gener al Tr oubleshooting Tips the backup application to use these devices. With most server platforms and with most robotic Chapter 9 - The Expanding Back up System libraries, the device configuration can be completed using the Device Discovery and Configuration Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s Wizard. At the end of the installation process, you were prompted to start all the daemon processes. If Chapter 10 - The Fut ure of Backup you selected not to start the processes, you will need to start them before continuing with the Chapter 11 - Maj or Players in the Backup Ar ena configuration process. There are a couple of ways to start all the processes. If you are on a UNIX Appendix A - Com m and-Line I nter face Gu ide master, you can execute the rc script, S77netbackup. You can also accomplish this by executing Appendix B - Glossar y /usr/openv/netbackup/bin/initbprd and /usr/openv/ volmgr/bin/ltid. This should Appendix C - necessary Tuning Your Backup and er y Application start all the daemons. On Recov a Windows master, you can use Start, Control Panel, Appendix D - Disaster Kit—Fr om End to Beginning Administrative Tools, Recovery Services Planning to start the NetBackup processes. Chapter 8

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

With theFdaemon you can start the administrative interface by issuing the following Appendix - Per forprocesses m ance Testrunning, Tech Note

command a UNIX openv/netbackup/bin/jnbSA. This starts the Java GUI. The Appendix G on - Net Backu system: p Per form/usr/ ance Tuning on Windows first thing you need to do is to log in as either root or a designated non-root administrator on the login I ndex screen.

List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter Figure 1 - 5.3: Backup Initialand screen. Recover y Sy st em Requir em ents Ex plained Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note

Figure Getting Started Wizard welcome screen. Appendix G - 5.4: Net Backu p Per form ance Tuning on Windows I ndex

After you log in, the initial Administration Console window, shown in Figure 5.3, appears. Figures 5.4 and5.5 show the Getting Started Wizard. You just follow the logical prompts until you reach the first List of Tables window of the Device Configuration Wizard, shown in Figure 5.6. List of Figur es

List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

Figure 5.5: Getting Started Wizard: Step 1.

I ntr oduction

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - 5.6: Net Backu p Per form ance Tuning on welcome Windows screen. Figure Device Configuration Wizard I ndex

Clicking Next List of Figur es on the opening screen for the Device Configuration Wizard takes you to the screen shown in Figure 5.7, where you define your media server environment. Here, you can enter the names List of Tables of all the device hosts, which will generally be all the media servers, in this NetBackup domain. List of Sidebars The master server name will already be present on this screen. If the master is not a device host-that is, not a media server-you can uncheck it and then click on the Add button. This allows you to enter the < Day Day Up names of all the media servers. After you have entered all>the server names, you click on Next, which will start the actual device detection on each of the servers listed. The results of the auto-discovery process are shown in the Device Configuration Wizard window. When the process is complete, the window shown in Figure 5.8 appears.

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Figure 5.7: Device Configuration Wizard: Device Hosts.

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List ofFigure Figur es5.8: Device Configuration Wizard: Scanning Hosts. List of Tables List of Sidebars

You can view all the discovered devices by clicking on Next. Doing so shows the details of the device discovery on each of the device hosts, as you can see in Figure 5.9. You can compare this with the hardware configuration as you know it. Hopefully, they will agree, and you can continue. If there is a < Day Day Up > problem with discovery on a particular host, you will probably want to go to that host and see if there is a problem with the operating system accessing the devices. One of the most critical fields on this screen is the field labeled Serialized. If any of the tape drives or libraries have a No in this field, the Device Configuration Wizard cannot successfully complete the configuration. When this occurs, you need to contact your hardware provider and determine if the devices you are using support device serialization. If they do not, you can still use the devices and configure them with NetBackup; you just cannot rely on the auto-discovery feature of the Device Configuration Wizard. In some cases, the drives support serialization and the library does not. If the drives are dedicated to a single host, you can manually finish the configuration started by the Device Configuration Wizard. Select Next on the detailed screen, and the screen in Figure 5.10 appears, indicating there is a library with no drives and there are two drives that are not in a library.

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Figure 5.9: Device Configuration Wizard: Backup Devices.

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List ofFigure Tables 5.10: Device Configuration Wizard: Drag and Drop Configuration #1. List of Sidebars

This is because the drives reported their own serial numbers, but the library did not report the drives' serial numbers. In this case, if you know the physical configuration of the drives within the library, you can drag and drop the drives to the library. If all the devices support serialization, the screen in Figure < Day Day Up > 5.11 appears. If this is the case, you will not need to do the drag-and-drop configuration and the screen in Figure 5.12 appears.

You first select the drive and then drag it to the Drive 1 location in the library. Then you repeat the step for the second drive. If you are unsure which drive is which, you can select Properties. Doing so gives all the detailed information for the selected device. After ensuring all the devices appear to be correctly configured, select Next to commit the changes. The resulting dialog box gives you one last opportunity to either cancel the changes or continue. Select continue to actually commit the changes and update the configuration database. In our single device host, single library example, this would result in the screen shown in Figure 5.13.

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Figure 5.11: Device Configuration Wizard with full serialization Drag and Drop Configuration.

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List ofFigure Figur es5.12: Device Configuration Wizard. List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Figure 5.13: Device Configuration Wizard: Updating Device Configuration.

Pa r t I I - Back up P roduct Tutor ia l

Storage- Evaluating Units Stor age Media Requir ements

Chapter 4 Chapter 5

- Gener al Discussion on Configur ation You have now completed the configuration of the physical devices within NetBackup. This makes the

Chapter - Monitor in g the Backup ocess devices6 accessible. The wizard nowPrprompts you to continue with the logical configuration of Chapter 7 Evaluating Ot her Back upRelated Featuruses es and Options NetBackup. As stated earlier, NetBackup actually storage units to access the physical devices. Chapter - Generrepresentation al Tr oubleshooting Tips This is 8the logical of the physical devices that NetBackup uses when assigning devices Chapter 9 The Expanding Back up System to jobs. The next wizard screen is the storage unit screen, shown in Figure 5.14. Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

This screen Chapter 10 - lists The all Futthe ure configured of Backup libraries and prompts you to make a storage unit for each one. As you create sure youBackup give each one appropriate attributes. The first characteristic you need Chapter 11 -them, Maj ormake Players in the Ar ena to selectAis -the storage unit type-whether it is a media manager storage unit, removable media, or a Appendix Com m and-Line I nter face Gu ide disk storage unit. This is done from the screen shown in Figure 5.15.

Appendix B - Glossar y

Appendix C - Disk, Tuning Your Backup and Recov er the y Application If you select the default behavior is for storage unit to be on demand only. That means the Appendix D Disaster Recovery Planning Kit—Fr End to Beginning storage unit cannot be used by NetBackup asom a destination for backups unless specifically named by Appendix E - Business I mpact Analysis Befor Media e t he Calm the job. This is not a requirement. On Planning the otherKit—The hand, if Stor youmselect Manager, on demand only Appendix Perthe for m ance Test Note select it if desired. behaviorFis -not default, butTech you may Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

Figure 5.14: Device Configuration Wizard: Configure Storage Units. < Day Day Up > The Storage Unit Type Properties are specific to the type of storage unit you select. If you select Media Manager, the properties screen that appears will be specific to that type, as shown in Figure 5.16. I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Figure SelectOtstorage unit Chapter 7 - 5.15: Evaluating her Back up-type. Related Featur es and Options Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

Figure 5.16: Storage unit configuration: Media Manager. As you can see, you need to supply the media server name, the robot type, and the robot number from the pull-down lists. You also must make sure the density selected in the storage unit matches the density of the robot you created. There are other properties associated with the Storage Units which further control their behavior:

Maximum concurrent drives. This is a a library with 10 drives, but you want a particular family of jobs to only use a maximum of six, you could create a special storage unit with a maximum concurrent drives parameter set to six. This would ensure this family of jobs could never take all 10 drives for backups. I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

Maximum fragment This is used to control how much data NetBackup will write ISBN:0471227145 by David size. B. Little andparameter David A. Chapa as a single image without a break. With fragment size of 0, a backup is written as a John Wiley & Sons © 2003 (340maximum pages) single imageThis unless end of tape is encountered. If a maximum fragment size of 2000 is used, a guide tak es r eaders thr ough the necessar y steps of backup image is broken 2-GB fragments, with own header. deploy ing serinto v ices by showing how each to addr essits the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

Maximum multiplexing per drive. This allows you to configure how many different streams of data can be multiplexed together on a single drive within this storage unit. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application

Figure 5.17: Storage unit configuration: Disk.

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E type - Business Analysis Planning Kit—The Stor m Befor 5.17.e t he Calm For a disk storageI mpact unit, you will see the screen in Figure Appendix F - Per for m ance Test Tech Note

As you see, are pnot many to configure, Appendix G - there Net Backu Peras form ancefields Tuning on Windowsjust the hostname, the absolute pathname to the directory that will hold the backup images, maximum concurrent jobs, which allows you to limit how I ndex many jobsescan write to this disk at the same time, and the maximum fragment size. This has the same List of Figur useofas on the Media Manager storage unit but defaults to 2000 MB, since some operating systems will List Tables notofallow a single file larger than this. List Sidebars

With the latest version of NetBackup 4.5, there is a slightly different screen for adding storage units. All of the information remains the same; just the screen layout is different. The newest screen is shown in < Day Day Up > Figure 5.18.

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems Figure Newest storage unit configuration screen for NetBackup 4.5 FP3. Chapter 3 - 5.18: An I ntr odu ction to NetBackup Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Volumes - Gener al Discussion on Configur ation

Chapter 5 Chapter 6

- Monitor in g the Backup Pr ocess

Now that we have configured the physical devices, we need to define some storage media to be used - Evaluating Ot her Back up- Related Featur es and Options for the backups. The physical cartridges are called tapes, media, or volumes. When we discuss them Chapter 8 - Gener al Tr oubleshooting Tips within NetBackup Media Manager, they are referred to as volumes. These are the actual tapes that will Chapter 9 The Expanding Back up System be used to -hold the data that is being backed up. Once you have configured one or more robotic Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s devices, you can use the Volume Configuration Wizard. An easy way to proceed, at least for the first Chapter - The ureand of Backup time, is10 to use thisFut tool to inventory the robotic libraries. If you are not using a library or have media Chapter 11 Maj or Players thethe Backup Ar ena without barcodes, you can inuse Volume Configuration Wizard, but you would use the 'Create new Appendix A Com m and-Line I nter face Gu ide volumes for use in standalone drives' option. Chapter 7

Appendix B - Glossar y

As shown any robots have defined will show up in the screen, and you can select Appendix C in - Figure Tuning 5.19, Your Backup and you Recov er y Application the one D you- want to inventory. Appendix Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

Once you have made your selection, the wizard returns the list of actions that are required. This can include new volumes that were found in the library and need to be added to the database, volumes Appendix - Net Backu p Per ance on Windows that the G database shows asform being in Tuning the library but that the robot indicates are not present, and I ndex volumes that are in different slots. When you select Next, the volume database is updated to match List Figurinventory. es theofrobot This is shown in Figure 5.20. Appendix F - Per for m ance Test Tech Note

List of Tables List of Sidebars

< Day Day Up >

Figure 5.19: Volume Configuration Wizard.

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s

Figure 5.20: Volume Configuration Wizard: Updated volume database.

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

You are even given the opportunity to identify cleaning volumes that might be in the library, as shown in

I ntr oduction Figure 5.21. Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Figure 5.21: Volume Configuration Wizard: Identify Cleaning Media.

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note

As you add manually or via on theWindows wizard, you should ensure that the media type for the Appendix G - volumes, Net Backu either p Per form ance Tuning volumes matches the media type for the drives. Note that there are three different DLT designations, I ndex

since a single library could contain a mix of DLT 4000, DLT 7000, and DLT 8000 drives. The different specifications for each of the DLT drive types are listed in Chapter 4. You must be able to differentiate List of Tables between the volumes for each of these drives. This is done by using DLT, DLT 2, and DLT 3 List of Sidebars designations for the drive and media types. The other method used to differentiate between volumes is volume pools. List of Figur es

Volume Pools

< Day Day Up >

As you build your backup environment, you will find that you need to be able to control the flow or keep backup data separate. One mechanism to do this is to use volume pools. A volume pool identifies a logical set of volumes by usage. You can create pools that span libraries. It is common practice to have long-retention full backups, such as the monthly full backups, to have a unique pool. If you are duplicating volumes, you should always have the duplicate copies in a different pool than the original copy. It is best if you configure your volume pools before you start adding volumes, since you cannot put volumes in a pool that does not already exist. You can also use the concept of a scratch pool whereby you can define all your pools but you put all the volumes in a scratch pool. NetBackup would then automatically move a volume from the scratch pool to a designated pool as required.

Policy

After configuring physical devices and creating storage units to use these devices, you need to create < Day Day Up > policies to actually back up data from clients and write it to the appropriate storage devices. There is a wizard that can walk you through the creation of a policy, and it might be helpful to use this initially. After a few policies, however, you will probably go straight to the Policy tab and create your own. One en t ing Ba p anInd previous Reco ver releases y: Th e Rea din esscalled class. note here: policy Iismaplem NetBackup 4.5cku term. this was Gu id e f or t h e Ent er pr ise by David B. Little Chapa If you decide to use the wizard, theand firstDavid thingA.you will be askedISBN:0471227145 is to provide a name and policy type. Wiley & Sons © 2003 (340 pages) to you. The type is dependent on the type of client The policy name John should be something meaningful you are backing up and thetak type backups you are onythe client. This guide es of r eaders thr ough the doing necessar steps of All of the clients within a single deploy ing policy ser v ices by showing howspecial to addrpolicy ess thetypes, such as the different database policy must use the same type. Most of the ar chitectur e, lim it ations, Protocol and capabilities of backups, t he ex isting backups or Network Data Management (NDMP) are separately priced options and net wor k infr astr uctur e. willnot show up as possible types without the appropriate license key. After selecting the appropriate policy type you add the specific clients that will be backed up by this policy. The wizard brings up the Backup Policy Configuration On1"a?>Windows master, the screen looks like Figure 5.22. < ?xm l version= " 1.0" encoding= "Wizard. I SO- 8859Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena

Figure Backup Policy Wizard-Windows. Appendix A - 5.22: Com m and-Line I nterConfiguration face Gu ide Appendix B - Glossar y

Figure 5.23 shows a similar screen on a UNIX master.

Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

Figure 5.23: Policy Configuration Wizard-UNIX. After entering all the clients that you want backed up by the policy, you are next prompted to enter a file list or set of directives to select what data to back up. At this point, you can select specific files, directories, filesystems, or raw devices, or you can give directives such as All Local Drives, which tells NetBackup that you want to back up everything. To further control how the backup is performed, you can use this directive with another attribute, Allow multiple data streams. We will go into all these directives when we get to the policy attributes screen.

Following the file screen in the policy wizard you can select what kind of backup you will be performing. (We discussed the different backup types in Chapter 2.) As shown, you can full, incremental incremental cumulative, or user backup. I mselect plem en t ing Ba cku p andifferential, d Reco ver y: Th e Rea din ess id e you f or would t h e Entonly er prselect ise Generally, at thisGu point one type, since the next screen, entitled Rotation and ISBN:0471227145 shown in Figure 5.25, by David is used B. Little to set and upDavid the backup A. Chapa schedule for the backup type you have selected. John Wiley & Sons © 2003 (340 pages) This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6 - 5.24: Monitor in g thePolicy Backup Pr ocess Figure Backup Configuration Wizard: Backup Type. Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

Figure 5.25: Backup Policy Configuration Wizard: Rotation. < Day Day Up >

If you selected both the full and incremental backup types, you could indicate different frequencies for the full and the incremental, but the retention would be the same for both; this is not the normal practice. Generally, you will keep full backups longer than incremental backups and perform the backup less often. The final screen in the policy wizard is where you set the actual time of day for the backups to start and the length of time the backup window will be open. The Windows version of this screen, shown in Figure 5.26, is different than the UNIX Java version, shown Figure 5.27, but the end results are the same.

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Figure 5.26: Backup Policy Configuration Wizard-Windows. Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y

Figure Backup Policy Configuration Wizard-UNIX. Appendix C - 5.27: Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

At this point, the wizard is finished. You are given the option of saving, canceling, or going back. If you save the policy, you will see it in the policies section of the administration console. You can now take a Appendix F - Per for m ance Test Tech Note closer look at the actual attributes of the policy and see if this matches your requirements or if it needs Appendix G - Net Backu p Per form ance Tuning on Windows to be modified. The policy attributes screen is shown in Figure 5.28. Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

I ndex List As ofyou Figur canessee from the policy attributes screen, there are several potential selections that you were

notofprompted about during the wizard setup of the policy. In the following list, we highlight them and List Tables give brief description for each. The items that are grayed out in the figure are not selectable either List of aSidebars because of the policy type, because it is part of a feature that requires a license, or because it depends on another selection. The product documentation goes into every one of these items in detail, so if you have further questions, the appropriate system administrator's guide would be an excellent place to < Day Day Up > look. Offhost backup method. This option defines what will be moving the data for this policy. For normal backups, this will always be Local Host. Limit jobs per policy. This defaults to 999 and is a method to throttle a single policy to ensure it does not use all the resources. Active. Go into effect at. For a policy to be used, it must be active. You can preconfigure a policy and then give a time for it to become active.

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back Figure up P5.28: roductBackup Tutor ia Policy l

Configuration Wizard: Attributes.

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6 -frozen Monitor in g the BackupThis Pr ocess Allow image clients. field defines if any client in this policy will be using frozen Chapter 7 Evaluating Ot her Back upFeatur es and7.Options Chapter images. This is discussed in moreRelated detail in Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Follow NFS. If selected, this option causes NetBackup to back up data from any NFS-mounted filesystems that are found in the file list.

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup

Chapter 11 - Maj or Players in the Backup Ar ena

Cross whether NetBackup will cross filesystem boundaries Appendix A -mount Com m points. and-LineThis I nteroption face Gucontrols ide during backupy or archive on UNIX clients or whether NetBackup enters volume mount points Appendix B -a Glossar during a backup or archive on Windows clients.

Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Collect image restore information move Appendix E - true Business I mpact Analysis Planning (with Kit—The Stordetection). m Befor e t heIfCalm this option is selected, NetBackup willmcollect theTech information to allow a directory to be restored to the exact image that Appendix F - Per for ance Test Note existed a Backu specific backup. Deleted files directories are not restored. If move detection is Appendix G - at Net p Per form ance Tuning on and Windows I ndex also selected, files or directories that are renamed or moved will be backed up and therefore List ofrestored Figur es to the correct location. List of Tables List ofCompression. Sidebars This enables software compression on the client. This selection can reduce the

amount of actual data moved across the network on a backup; however, it does increase the computing overhead on the client. < Day Day Up >

Allow multiple data streams. This option specifies that, depending on directives in the file list, NetBackup can divide automatic backups for each client into multiple jobs, with each job backing up only a part of the file list. The jobs are in separate data streams and can occur concurrently. After selecting the specific attributes need for a specific policy, you can also further refine the scheduling. If you select the Schedules tab from the Change Policy screen, you will see the schedules that you have already created. This window is slightly different for the Windows GUI, shown in Figure 5.29, and the UNIX Java GUI, shown in Figure 5.30. To add a new schedule using the UNIX Java GUI, you click on New. The screen shown in Figure 5.31 appears.

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5 - 5.29: GenerWindows al Discussion on Configuration Configur ation Wizard: Schedules. Figure Policy Chapter 6 - Monitor in g the Backup Pr ocess Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

Figure 5.30: UNIX Policy Configuration Wizard: Schedules.

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise Figure 5.31: UNIX Policy Configuration Wizard: Adding a schedule. ( VERI TAS Ser ies) I ntr oduction

This screen shows additional configuration points to consider:

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter Schedule 2 - Business type. Calendar-based Requirements of scheduling Back up Systems or frequency-based scheduling. Chapter 3

- An I ntr odu ction to NetBackup

Destination:

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5 Multiple - Gener copies. al Discussion Configur ation If theonvault option is installed, you can select up to four different destinations Chapter 6 for - the Monitor backup. in g the Backup Pr ocess Chapter 7 Chapter 8

- Evaluating Ot her Back up- Related Featur es and Options - Gener al Tr oubleshooting Tips Override policy storage unit. When the policy is created, you specify that the backups will

Chapter 9 either - Thego Expanding Backstorage up System to a specific unit, a group of storage units, or to any available storage unit. Pa r t I I I - The Ente r pri se I m to pa change ct of Back up selection Sy ste m s This allows you that

on a per schedule basis.

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena

Override policy volume pool . This is similar to the storage unit selection but for volume pools.

Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y

Appendix C - Tuning Your Backup and Recov er y Application

Retention. Here you specify how long you want to keep the backups created by this schedule.

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

Media ThisTech allows you to send data from multiple data sources to a single tape. Appendix F -multiplexing. Per for m ance Test Note Appendix G - Net Backu p Per form ance Tuning on Windows

After getting all the schedules configured, click on OK if you are finished making changes to the policy; if you want to add more clients or change the file list, select Add, and then the Clients tab or the Files List of Figur es tab, as appropriate. On the Files tab, you can select to add directives. These work together with the List of Tables attribute of 'Allow multiple data streams' to control how many jobs are actually started when a policy List of Sidebars begins and how many data streams are sent from a specific client. On a Windows policy type and standard policy type, the directives are the same, with the exception of System_State, which is only applicable for Windows. In the list that follows, we provide brief explanations of the common directives, < Day Day Updirectives > but we strongly suggest reading the entire section on file in the system administrator's guide. I ndex

ALL_LOCAL_DRIVES. If the file list contains the ALL_LOCAL_DRIVES directive, NetBackup backs up the entire client but splits each drive volume (Windows NT) or filesystem (UNIX) into its own backup stream. NEW_STREAM. If this directive is the first entry in the file list, each occurrence of this directive results in a new backup job being initiated to back up the files following the directive in a separate stream. SYSTEM_STATE. This is used to back up registry information.

UNSET and UNSET_ALL. These directives are used to control policy-specific directives such as < Day Day Up > set. An example would be if you had a policy type that supported the set command and you wanted the set command passed to the first two streams but not the last, an UNSET or UNSET_ALL can be used at the beginning of the third stream to prevent it from being passed to I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess the last stream. Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa

ISBN:0471227145

NEW_STREAM John Wiley & Sons © 2003 (340 pages) set destpath=/etc/home This guide tak es r eaders thr ough the necessar y steps of /tmp deploy ing ser v ices by showing how to addr ess the /use ar chitectur e, lim it ations, and capabilities of t he ex isting NEW_STREAM net wor k infr astr uctur e. /export NEW_STREAM < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> UNSET_ALL Ta ble o f Con t en t s /var

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

Auto-discovery streaming mode is enabled if 'Allow multiple data streams' is selected and ALL_LOCAL_DRIVES is in the file list and NEW_STREAM is not the first line in the file list. If this is the Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt case, the file list is sent to the client, which preprocesses the list and splits the backup into streams. I ntr oduction Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

< Day Day Up >

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Catalog Backup Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by David B. Little and David complete. A. Chapa All that really The installation and configuration is almost remains is to configure the John & Sons © 2003 The (340 pages) application to back upWiley its own database. Getting Started Wizard walks you through the process, or you can do it directly Console. It is important This from guidethe takAdministrative es r eaders thr ough the necessar y steps to of complete this step so you can deploy ing ser v icesThe by showing how to addr protect your backup environment. wizard prompts youess forthe the information needed to set up this ar chitectur lim it ations, and capabilities of t hethe ex isting protection. You are asked toe,provide the media server where catalog backup will be performed, the net wor k infr astr uctur e. paths to all the critical data on the master, the names of all the media servers, and the paths to their data.Figure 5.32 shows the NetBackup Catalog Backup Wizard.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> TaThe ble ocritical f Con tdata en t s paths that should always be included for the master server are as follows: I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise /usr/openv/netbackup/db. Automatically created for master during installation ( VERI TAS Ser ies) I ntr oduction

/usr/openv/volmgr/database. Automatically created for master during installation

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1 - Backup Automatically and Recover y created Sy st em Requir em ents Ex plained /usr/openv/var. for master during installation Chapter 2

- Business Requirements of Back up Systems

/usr/openv/db. be manually added Chapter 3 - An I ntrMust odu ction to NetBackup Pa r t I I - Back up P roduct Tutor ia l

You will also want to include the catalog paths for all media servers. These must be added manually.

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5 - Gener al Discussion on Configur ation media_server_name:/usr/openv/netbackup/db/media Chapter 6

- Monitor in g the Backup Pr ocess

media_server_name:/usr/openv/volmgr/database Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options Chapter 8

- Gener al Tr oubleshooting Tips media_server_name:/usr/openv/var

Chapter 9

- The Expanding Back up System

Pa r t I I Isetting - The Ente r prifile se Ipaths m pa cttoofensure Back upall Sythe ste data ms After up the

will be backed up, you need to configure the

destination these backups. You can either have the catalog backups sent to tape or disk or both. Chapter 10 -for The Fut ure of Backup NetBackup two different destinations Chapter 11 - can Maj use or Players in the Backup Ar ena and will rotate between the two on each backup. If you select Disk, to identify absolute Appendix A - you Comneed m and-Line I nteran face Gu ide path to be used to store the backup of the catalog. If you select Tape, you must Appendix B - Glossar y select one or two specific volumes. Once a catalog backup has been sent to tape, that cannot beBackup used for normal without being manually relabeled. You can Appendix C tape - Tuning Your and Recovbackups er y Application

configure to use a tape for one destination a disk path for the other. In this situation, Appendix D NetBackup - Disaster Recovery Planning Kit—Fr om End toand Beginning

every other backup would go to tape and every other would go to disk. The catalog backups do not append to tape. The tape is rewound, and the previous image is overwritten. The last decision for the Appendix F - Per for m ance Test Tech Note catalog backup is the schedule. Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

Figure 5.32: NetBackup Catalog Backup Wizard. The choices are to back up the catalog After each session of scheduled, user, or manual backups. Backs up the catalogs after any session that results in the creation of at least one successful backup or archive. This includes automatic, manual, and user backups.

< Day Day Up >

After each session of scheduled backups. Backs up the catalogs after any automatic backup session that results in at least one successful backup of a client. A backup does not occur after a manual backup or a user backup or archive. I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by David B.initiated. Little andDoes Davidnot A. automatically Chapa Only when manually back up the catalogs. If you elect to back up catalogs manually, Server, Catalog, right-click on Catalog, and select Back Up John Wiley select & SonsMaster © 2003 (340 pages) NetBackup Catalog. This guide tak es r eaders thr ough the necessar y steps of

deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

What User Interface to Use?

There are a couple of different ways to configure any application, and NetBackup is no different. A lot < ?xm l version= 1.0" making encoding= SO- 88591" ?> of work goes"into the" Igraphic interfaces easier to use. A growing emphasis has been placed Taon blewizards o f Con tto enmake ts the initial configuration much easier and more intuitive. Does that mean you must I mplem ing Backup and to Recover Readiness for theAnd Enter pr iseif you happen to be remote have aent graphic console instally—The and configure theGuide software? what ( VERI TAS Ser ies)

and want to tweak the configuration? You could encounter a problem trying to display back a GUI via

I ntr oduction dial-up. Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter Well, there 1 -are Backup otherand options, Recover and y Sy they st em also Requir workem quite ents well, Ex plained although we would recommend them for

the more user. Just about everything that can be done from the UNIX Java GUI can also Chapter 2 experienced - Business Requirements of Back up Systems be done command-line interface (CLI). Many of the CLIs are documented in the manual, as Chapter 3 from - Anthe I ntr odu ction to NetBackup well in theuprelease Pa r t I Ias - Back P roductdocumentation. Tutor ia l

With many of the commands, you can also get usage

-help. The CLIs can be very useful when you are working information executingStor theage command with ements Chapter 4 - by Evaluating Media Requir remotely aalnongraphic or workstation. There are also the following character-based, Chapter 5 or- from Gener Discussion terminal on Configur ation menu-driven interfaces: Chapter 6 - Monitor in g the Backup Pr ocess Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

bp. A backup, archive, and restore utility for users on NetBackup UNIX clients. It has a character- Gener al Tr oubleshooting Tips based menu interface.

Chapter 8 Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter bpadm. 10 - The An administrator Fut ure of Backup utility that runs on NetBackup UNIX servers. It has a character-based

menu Chapter 11 interface. - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Manager administrator utility for managing volumes. It runs on UNIX and has a vmadm. A Media Appendix C Tuning Backup and Recov er y Application character-basedYour menu interface. Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

These interfaces are easier use than the CLIKit—The but canStor stillmbeBefor used a dial-up or from a terminal Appendix E - Business I mpacttoAnalysis Planning e tover he Calm without XF graphic Here Note are some examples of bpadm: Appendix - Per forcapabilities. m ance Test Tech Appendix G - Net Backu p Per form ance Tuning on Windows

NetBackup Server: I ndex

wormwood.min.veritas.com

NetBackup List of Figur es Administration -----------------------List of Tables s)of Sidebars Storage Unit Management... List t) p) g) r) m) x) u) e) h) q)

Storage Unit Group Management... Policy Management... Global Configuration... < Day Day Up > Reports... Manual Backups... Special Actions... User Backup/Restore... Media Management... Help Quit

ENTER CHOICE: p Policy: Clients: Schedules: Output Destination:



SCREEN

Policy Management < Day Day Up > ----------------a) Add Policy... m) Modify Policy Attributes... I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess d) Delete Policy id e f or t h e Ent er pr ise s) Schedule Gu Management... ISBN:0471227145 by B. Little and David A. Chapa c) Client ListDavid Management... John Wiley & Sons © 2003 (340 pages) f) File List Management... This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the Browse Policies Forward ar chitectur e, lim it ations, and capabilities of t he ex isting Browse Policies net wor k infrReverse astr uctur e.

b) r) e) Enter Policy l) List/Display Policies < ?xm encoding= " I SO-(SCREEN 8859- 1" ?> or FILE) o) l version= Output" 1.0" Destination Tah) ble oHelp f Con t en t s I mplem ent ing Menu Backup and Recover y—The Readiness Guide for the Enter pr ise q) Quit ( VERI TAS Ser ies) I ntr oduction

ENTER CHOICE: b Policy: test Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained Clients: wormwood Chapter 2 - Schedules: Business Requirements FULL of Back up Systems Chapter 3 Destination: - An I ntr odu ction to NetBackup Output SCREEN

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4 Management - Evaluating Stor age Media Requir ements Policy Chapter 5 - Gener al Discussion on Configur ation ----------------Chapter a) Add 6 -Policy... Monitor in g the Backup Pr ocess

m) Modify PolicyOtAttributes... Chapter 7 - Evaluating her Back up- Related Featur es and Options d) Delete Policy Chapter 8 - Gener al Tr oubleshooting Tips s) Schedule Management... Chapter 9 - The Expanding Back up System c) List Pa r t I I IClient - The Ente r pri seManagement... I m pa ct of Back up Sy ste m s f) File Chapter 10 - List The FutManagement... ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena

b) Browse Policies Forward r) Browse Policies Reverse Appendix B - Glossar y e) Enter Policy Appendix C - Tuning Your Backup and Recov er y Application l) List/Display Policies Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning o) Output Destination (SCREEN or FILE) Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm h) Help Appendix F - Menu Per for m ance Test Tech Note q) Quit Appendix A - Com m and-Line I nter face Gu ide

Appendix G - Net Backu p Per form ance Tuning on Windows I ndex ENTER CHOICE: List of Figur es

As ofyou can see, this interface allows you to manage the configuration without using a GUI. On List Tables Windows systems, this is not as much a concern, since you should always be able to use the Windows List of Sidebars GUI. There is no character-based interface for the Windows systems, but many of the CLIs are still supported. < Day Day Up > < Day Day Up >

< Day Day Up >

Summary

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

ISBN:0471227145 bylooked David B. David A. In this chapter, we at Little what and is needed to Chapa actually start the installation and configuration of a John Wiley Sons through © 2003 (340 pages) backup application. We then& went the individual installation and configuration steps required to complete a basicThis installation ofesVERITAS Software's NetBackup. Weoftouched on all the steps and also guide tak r eaders thr ough the necessar y steps deployinterfaces. ing ser v icesThis by showing how you to addr ess the looked at the different should give an idea of what is involved in setting up your ar chitectur limnext it ations, and capabilities t heto exmonitor isting basic backup application. Ine,the chapter, we look atofhow your backups.

net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?>< Day Day Up > Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Chapter IGu 6: Monitoring the Backup Process id e f or t h e Ent er pr ise by David B. Little and David A. Chapa

ISBN:0471227145

Now that you have successfully installed and configured your backup domain, you are ready to sit John Wiley & Sons © 2003 (340 pages) back and take it easy. But wait, someone knocking on your door wants to know the status of their This guide tak es r eaders thr ough the necessar y steps of backup or restore. I guess you will have to start monitoring the backup and restore processes. While deploy ing ser v ices by showing how to addr ess the we are at it, we might as well at monitoring some ofofthe elements in the backup domain that ar chitectur e, look lim it ations, and capabilities t heother ex isting might need our attention. In this net wor k infr astr chapter, uctur e. we go through some of the tools available to monitor the activities of our example backup and restore application, VERITAS NetBackup. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s

Using the Activity Monitor

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise The TAS mostSer common tool for monitoring the backup and restore activity is the Activity Monitor. This is ( VERI ies)

available I ntr oductionon both the UNIX Java GUI and the Windows GUI. Selecting the Activity Monitor on the Administration asupshown in Figure screen Pa r t I - I nt r oductConsole, ion t o Ba ck and Recove r y in6.1, the results Ent er prin i sethe Env ir onm eshown nt Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

in Figure 6.2.

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application

Figure 6.1: Administration Console.

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

Figure 6.2: Activity Monitor. This screen lists all the jobs that are currently being tracked by NetBackup, including jobs that are queued, active, and finished. You can also see the summary information that includes all the jobs in each of these categories, plus the sum total of all jobs and the master server name. From the Activity Monitor, you can cancel individual jobs or cancel all running jobs. This is done from the Actions menu at the top of the screen.

Fields in Activity Monitor

< Day Day Up >

The following list details the information contained within the Activity Monitor window: I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

Job ID. This field displays the identifier that is assigned by NetBackup to each job. by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

Type. This shows the type job activity, which include any of This guide tak esofr eaders thr ough thecan necessar y steps of the following job types: deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting Backup. backup jobs, noe.matter how they are initiated. netAll wor k infr astr uctur

Restore. All restore jobs, no matter < ?xm l version= " 1.0" encoding= " I SO88591" ?> how they are initiated. Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise Archive. User-directed archive. ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt rCatalog oduct ion Backup. t o Ba ck upAll and catalog Recove backup r y in the jobs, Ent er noprmatter i se Envhow ir onm they e nt are

Chapter 1 Chapter 2 Chapter 3

initiated.

- Backup and Recover y Sy st em Requir em ents Ex plained - Business Requirements of Back up Systems Duplication. Image duplication jobs used to create a copy of an existing image. - An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

ImageStor import jobs used toements build a catalog entry to allow restore from an image that is Chapter 4 Import. - Evaluating age Media Requir the master. Chapter 5 unknown - Gener altoDiscussion on Configur ation Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7 Verify. - Evaluating her Back Related Featur andthe Options ImageOt verify jobsupthat are used to es verify contents of a tape. Chapter 8 - Gener al Tr oubleshooting Tips Chapter 9

- The Expanding Back up System

Vault. Jobs that are running as part of the vault process.

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup

State. The Activity Monitor also gives the current state of all the jobs. Following are the states:

Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide

in the NetBackup scheduler queue waiting to run. A queued restore job is one Appendix B Queued. - GlossarJobs y still Recov determining which files are needed. Appendix Cfor - which TuningNetBackup Your Backupisand er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E Active. - Business I mpactactive Analysis Planning Kit—The Stor m Befor e t he Calm Currently jobs. Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex

Re-Queued. Jobs that are placed back in the scheduler queue as retries because the previous attempt was unsuccessful.

List of Figur es List of Tables

Done. Completed jobs. List of Sidebars Status. This field shows the status of each job. The status is shown when the job completes. A status of 0 indicates that the job completed successfully. Any other status indicates that there was < Day Day Up > some problem with the job. Note: NOTE A backup job that completes with a status of 1 is considered partially successful but the image is written to tape and the image header file is updated in the catalog and marked as a complete backup. This indicates that the image will be kept for the normal retention period. There are additional fields that give information about each job, including the actual policy name and schedule for backups, start time, elapsed time, media server name, client name, end time, number of this attempt, and others. These are all detailed in both the UNIX and NT versions of the System Administrator's Guide.

Detailed View

< Day Day Up >

You can also highlight a job and select a detailed view that provides more information about the selected job. Figures 6.3 and 6.4 show what the job's detailed view looks like. I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Figure 6.3: Job Details: Overview tab.

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List ofFigure Figur es6.4: Job Details: Details Status tab. List of Tables

Following are the fields in the screen shown in Figure 6.3:

List of Sidebars

1. Unique Job ID for the job in the queue. 2. The current State of the job. < Day Day Up >

3. Navigation buttons to scroll through the Activity Monitor. 4. Job Details Tabs. 5. Job Type, whether Archive, Backup, Restore, Catalog, or Duplication. 6. A description of how the job was submitted, either Immediate, or manually submitted, or Scheduled. 7. The client this job is currently working with. 8. The master server. 9. Backup policy information. 10.

10. Specific attributes associated with the< backup policy. Day Day Up > 11. Completion status. 12. Job submission information, such as time it was submitted to the queue, the time that has I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess elapse since the became active, and the time when the job ended. Gu id e fbackup or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

13. Retention level for this particular job.

ISBN:0471227145

This guide tak es r eaders the necessar 14. Files and directories configured in thr theough backup policy. y steps of deploy ing ser v ices by showing how to addr ess the

15. Status bar.ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

Following are the fields in the screen shown in Figure 6.4: < ?xm16. l version= Job process " 1.0" encoding= ID assigned " I SOby8859the operating 1" ?> system that corresponds to the NetBackup scheduler Ta ble o f process Con t en t s(bpsched). I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise 17.TASStorage ( VERI Ser ies) unit, the logical storage device. I ntr oduction

18. Media server.

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained 19. Detailed job status information. Chapter 2

- Business Requirements of Back up Systems 20. Kilobytes number files written. Chapter 3 - An I and ntr odu ction toofNetBackup Pa r t I I - Back up P roduct Tutor ia l

21. Job -times. Evaluating Stor age Media Requir ements

Chapter 4

Chapter 5 - Gener al data. Discussion on Configur ation 22. Performance Chapter 6

- Monitor in g the Backup Pr ocess 23. Troubleshooter identify problems andespossible resolutions if the job completes with Chapter 7 - Evaluating to Ot help her Back up- Related Featur and Options

butalaTrstatus of 0. Chapter anything 8 - Gener oubleshooting Tips Chapter 9

- The Expanding Back up System

You can get to the Job Details screen by selecting a job from the Activity Monitor and double-clicking on it, by highlighting a job, right-clicking, and selecting Details from the menu, or by highlighting a job Chapter 10 - The Fut ure of Backup and then clicking on Actions at the top of the window. Doing so results in a pull-down menu with Chapter 11 - Maj or Players in the Backup Ar ena Details as a selection. The Jobs Details screen contains two tabs: Job Overview and Detailed Status. Appendix A - Com m and-Line I nter face Gu ide These screens can give you a very good idea of what is going on with a specific job. Also, if a job has a Appendix - Glossar nonzeroBstatus, you ycan select the Troubleshooter button. This wizard provides an explanation of the Appendix C Tuning Backup and Recov er yinApplication specific status code Your and can be very helpful discovering what might have caused a job to end with a Appendix D Disaster Recovery Planning Kit—Fr om End to Beginning nonzero status code. Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

Figures 6.5, example Appendix F -6.6, Per and for m 6.7 anceshow Test an Tech Note of a nonzero backup job that has completed, as well as how to enter theBacku Troubleshooter. Appendix G - Net p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

Figure 6.5: Job Details: Non-zero job details.

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

Figure 6.6: Troubleshooter: Problem description. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Figure 6.8 shows the equivalent to the GUI but this time from the command line. Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Guide the in Enter pr ise of scripts for reporting on Thebperror command is a very usefulReadiness tool that can beforused a variety ( VERI TASstatus, Ser ies) throughput statistics, and so on. You will see its value as we look into the reporting later backup I ntr oduction in this chapter. For reference, the bperror command may be found in the following directories per Pa r t I -installed I nt r oduct ion t o for Ba ck up and Recove r y in respectively. the Ent er pr i se Env ir onm e nt your system NT/2000 and UNIX,

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems \Veritas\NetBackup\bin\bperror.exe

Chapter 3 - An I ntr odu ction to NetBackup /usr/openv/netbackup/bin/bperror Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - 6.7: Tuning Your Backup and Recov er y Application Figure Troubleshooter: Recommended actions. Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

Figure 6.8: Troubleshooter from the command line.

Daemons/Services The Activity Monitor window also has two other tabs on the UNIX Java monitor and three other tabs on the Windows Activity Monitor. There is a Daemons tab on the Java GUI, a Services tab on Windows, a Processes tab on both system types, and a Drives tab on Windows. The Daemons/ Services tab allows you to see all the NetBackup and Media Manager daemons or services that are running on the system.

It also gives you the ability to stop and start them. The Services tab is shown in Figure 6.9. The UNIX < Day Day Up > Daemons tab is shown in Figure 6.10. The Processes tab on both GUIs displays all the NetBackup and Media Manager related processes that are running. IThe Windows haspaan third tab ver for drives another view of the physical m plem en t ingGUI Ba cku d Reco y: Th e that Reagives din ess Gu idGUI e f oralso t h e has Ent er pr ise drives. The Windows a topology view that is currently not available as part of the Activity ISBN:0471227145 Monitor with the Java by David GUI.B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages) This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5 - 6.9: Gener al Discussion Configur ation Figure Activity Monitor:on Services. Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List ofFigure Tables 6.10: Activity Monitor: Daemons. List of Sidebars

< < Day Day Day Day Up Up > >

< Day Day Up >

m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess MonitoringI without the GUI Gu id e f or t h e Ent er pr ise

ISBN:0471227145 David Littlethe and DavidofA.the Chapa At times, you maybywant to B. know status backups or other jobs and you don't have access to a John & Sons © 2003 (340 graphic terminal or areWiley working remotely. Youpages) can still get information and monitor both the jobs activity and the device status. can monitor thethe jobs by using the command-line interface (CLI) This guide takYou es r eaders thr ough necessar y steps of deploy ing ser v ices by showing how to addr ess /usr/openv/netbackup/bin/admincmd/bpdbjobs on the a UNIX system or C:\Program ar chitectur e, lim it ations, and capabilities of ex isting system. This command allows Files\VERITAS\NetBackup\bin\admincmd\bpdbjobs.exe ont he a Windows net wor k infr astr uctur e. you to see what is going on in the job queue. You can either issue the CLI without options, or you can add options to further refine the output. The output on a Windows system is shown in Figure 6.11.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> also TaYou ble ocan f Con t enfind t s out what daemons are running on your UNIX master by issuing this command:

/usr/openv/netbackup/bin/bpps -a. This Guide returns list Enter of allpr the I mplem ent ing Backup and Recover y—The Readiness forathe iseNetBackup and Media Manager daemons and processes that are running on the system. A typical output is shown in Figure ( VERI TAS Ser ies) 6.12. I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

If you want to know the status of the physical devices without using a GUI, you could use the following - Backup and Recover y Sy st em Requir em ents Ex plained for UNIX and NT/2000, respectively:

Chapter 1 Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

/usr/openv/volmgr/bin/vmoprcmd -d C:\Program Files\VERITAS\Volmgr\bin\vmoprcmd Chapter 4 - Evaluating Stor age Media Requir ements Pa r t I I - Back up P roduct Tutor ia l

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Figure 6.11: Monitoring jobs from the command-line interface on a Windows system.

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

Figure 6.12: Display UNIX daemons from command-line interface. This will give you an output similar to that shown in Figure 6.13.

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

Figure 6.13: Drive status output from the command-line interface.

I ntr oduction

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up < Systems Day Day Up > - An I ntr odu ction to NetBackup

Chapter 3

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t Available ing Ba cku p anand d RecoWhat ver y: ThDo e ReaThey din ess Tell? What Reports Are Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by your Davidbackup B. Littleapplication, and David A. Chapa As you start to use you will want to create reports that help you know how Johnthat Wiley & Sons © 2003 (340topages) things are going and better enable you update the status of the backup domain to others. Reports are an important backup application. NetBackup has reports that are available This guidepart tak of es any r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how addr ess the from the GUI. Most of these are actually created bytoexecuting a CLI with specific options. Many of chitectur e, lim it ations, and capabilities ex isting these commandsarare documented, so you can use themoftot he create custom reports if you do not find net wor k infr astr uctur e. exactly what you want. Figure 6.14 shows the list of reports available from the Windows Administration Console.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> a list TaFollowing ble o f Conist en t s of the 'canned' reports, but keep in mind there are literally endless possibilities for

reporting if you care and to dive into the CLIReadiness and create a custom script. Several of these scripts I mplem ent ing Backup Recover y—The Guide for thereporting Enter pr ise mayTAS be found ( VERI Ser ies)at www.BackupScripts.com, a Web community devoted to the sharing of scripts, tips, and traps associated with NetBackup. I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - 6.14: Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Figure Reports from Windows Administration Console. Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex

Status of Backups

List ofClient Figur es Backups List of Tables List ofProblems Sidebars

All Log Entries Media Lists

< Day Day Up >

Media Contents (Caution: This will mount a tape and read its contents. This could potentially take a considerable amount of time depending on the size of the backup image you are reading.) Images on Media Media Logs Media Summary Media Written If you are using a UNIX master and want to see the reports without using the CLI or GUI, you can use the character-based menu interface bpadm. This also gives you access to all the reports. Figure 6.15

lists the available backup reports and the media report category available to run. This interface may be < Day Day Up > a bit difficult at first to navigate, especially if you are used to using only a GUI, but after a few times, it should become quite easy and much faster for remote management requirements. The two interfaces very that they bothver allow you to run I mare plem en similar t ing Bain cku p an d Reco y: Th e Rea dinthe essexact same reports, but the id e f orpresents t h e Ent er pr ise character-based Gu interface their selections a bit differently from the GUI. As you can see in ISBN:0471227145 Figure 6.15, the following by David backup B. Little and reports David areA.listed: Chapa John Wiley & Sons © 2003 (340 pages)

Backup Status This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the

List Client Backups ar chitectur e, lim it ations, and capabilities of t he ex isting Problems

net wor k infr astr uctur e.

All Log Entries < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s

While ent thising interface not be your firstReadiness choice, itGuide is an for excellent tool I mplem Backup may and Recover y—The the Enter pr to isehelp you understand the NetBackup The reports in the preceding list are purely NetBackup reports, relying ( VERI TAS Ser architecture. ies) completely I ntr oduction on the NetBackup logs, /usr/openv/netbackup/db/error on UNIX or c:\Program Files\Veritas\NetBackup\db\error Windows NT/2000. Pa r t I - I nt r oduct ion t o Ba ck up and on Recove r y in the Ent er pr i se Env ir onm e nt Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

Figure 6.15: Character-based interface bpadm.

There are two general types of reports: backup reports and media reports. Backup reports report on < Day DaytoUplook > at the catalog information from the the jobs and errors. Media reports give you the ability perspective of the media and from the perspective of the image. As mentioned earlier, these are the canned reports that are available to run the following (see Figure 6.16): Media summary report. Images on media. Media log entries. Media written report. Media contents report. We mentioned this before, but it is worth repeating. When this report is run, it will actually mount the requested tape, read the contents of the tape, and compare the headers on the tape against the information stored in the NetBackup catalog.

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Figure Media Manager Chapter 6 - 6.16: Monitor in g the Backupreports. Pr ocess Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

To provide you with a greater understanding of what NetBackup and Media Manager are doing, we - Gener al Tr oubleshooting Tips have included the command-line equivalents for each of the reports below and a brief description of Chapter 9 - The Expanding Back up System what processes are used and databases that are touched. Chapter 8

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter The Fut of Backup To run 10 the -media listure report through the command line, you may issue the following command from Chapter 11 -NT/2000 Maj or Players in the Backup Ar ena either your or UNIX server: Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y /usr/openv/netbackup/bin/admincmd/bpmedialist -U -h Appendix C - Tuning Your Backup and Recov er y Application c:\Program Files\Veritas\NetBackup\bin\admincmd\bpmedialist.exe -U -h Appendix - Disaster Recovery Planning Kit—Fr om End to Beginning

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

If you run command Appendix F this - Per for m ance from Test the Techmaster Note server without specifying a media server, the master will report onG all servers in youronreport. These CLIs will always report to STDOUT, so if Appendix - available Net Backu pmedia Per form ance Tuning Windows you would want to keep this report, you should redirect STDOUT somewhere else, such as a file, I ndex

printer, or mail recipient. Typically, a UNIX term, STDOUT, or standard output, refers to the screen or monitor. Similarly, STDIN, or standard input, refers to the keyboard. When we talk about redirecting List of Tables STDOUT, it means that you will change the typical output device using the redirect symbol on the List of Sidebars command line. Following is an example of STDOUT being redirected to a file: List of Figur es

/usr/openv/netbackup/bin/admincmd/bin/bpmedialist -U -h SRVR > report.txt < Day Day Up > c:\Program Files\Veritas\NetBackup\bin\admincmd\bpmedialist.exe -U -h SRVR > report.txt We expand on the use of STDOUT and STDIN in Appendix A, 'Command-Line Interface Guide.' Some important information to note in this report are the images and vimages columns. These indicate the total number of images, as shown in Figure 6.17.

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise ISBN:0471227145

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Figure- 6.17: Media list report. Gener al Discussion on Configur ation

Chapter 5 Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7 -isEvaluating Ot her Back Related andand Options This report useful to identify the upnumber of Featur tapes es used their particular states. A tape can be in Chapter one of five 8 -states, Generas al Tr shown oubleshooting in the figure: Tips Chapter 9

- The Expanding Back up System

Pa r t I ACTIVE. I I - The Ente An rassigned pri se I m pa piece ct of of Back media up Sywith ste mactive s

backups, available for use until the End of Tape

(EOT) reached. Chapter 10 -marker The Futisure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A -ACom and-Line I nter faceits GuEOT ide and is marked FULL; it is no longer available to be written FULL. tapemthat has reached Appendix B Glossar y to but will be available for reads until the last image on the tape has expired. Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

SUSPENDED. A tape that has been suspended is no longer available to be written to but will be available for reads until the last image on the tape has expired. When all the images on a Appendix F - Per for m ance Test Tech Note suspended tape expire, the tape will be made available again. Tapes can be suspended tapes as Appendix G - Net Backu p Per form ance Tuning on Windows a result of media errors or operation intervention. Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

I ndex

List of Figur es

A tape that has been frozen due to hard errors during a backup will no longer be List ofFROZEN. Tables

List ofavailable Sidebars to be written to until the tape has been manually unfrozen by an administrator. The tape

will, however, be available for reads until the last image has expired.

IMPORTED. A tape that has been expired previously < Day Day Up or > brought into this NetBackup domain from another one and has now been imported in order to facilitate recovery of some files. An imported tape will never be available for writes, but it will naturally be available for reads.

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

Figure 6.18: Media summary report.

I ntr oduction

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1 for- running Backup this and report Recover Syfollows st em Requir em ents ExNT/2000, plained The CLI isyas for UNIX and respectively: Chapter 2 - Business Requirements of Back up Systems Chapter 3 - An I ntr odu ction to NetBackup /usr/openv/netbackup/bin/admincmd/bpmedialist -summary Pa r t I I - Back up P roduct Tutor ia l C:\Program Files\Veritas\NetBackup\bin\admincmd\bpmedialist.exe

Chapter 4

-summary

- Evaluating Stor age Media Requir ements

While the shown in Figure may not be the most attractive from the command line, or for Chapter 5 report, - Gener al Discussion on 6.18, Configur ation that matter, GUI,initgisthe rich with information about your images written to the media managed by your Chapter 6 - the Monitor Backup Pr ocess NetBackup As Ot one our upclients found out,esthis helped to track down a questionable Chapter 7 - servers. Evaluating herofBack Related Featur andreport Options tape drive their environment that was Chapter 8 in - Gener al Tr oubleshooting Tipscausing extended restore times because of this hardware

failure. In the figure, DWO stands for Drive Written On; this column indicates the drive index number of - The Expanding Back up System the physical drive used to write the image fragment you are looking at in this report on the host listed in Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s the report. So, in Figure 6.19, the DWO was 0 for the first image and the host that wrote it was Chapter 10 - The Fut ure of Backup 'susoe09.' This particular client found that one of the drives had a calibration problem when writing its Chapter 11 - Maj or Players in the Backup Ar ena tracks to the tape. This problem would not manifest itself during backup, but rather during the restore Appendix A - Com m and-Line I nter face Gu ide when the original DWO was not used for this read process. When mounted in a properly calibrated Appendix B - Glossar y drive, the tracks written by this original DWO were just far enough off to cause soft errors that are Appendix C - through Tuning Your Backup andcorrection Recov er y Application recoverable the drive error algorithms; however, when you are error correcting the Appendix D Disaster Recovery Planning Kit—Fr om End to and Beginning entire length of the tape, it adds considerable overhead extends the normal duration of a restore Appendix E Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm the root cause. exponentially. The information from this report was very helpful in identifying Chapter 9

Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

Figure 6.19: Images on the media report. The commands are listed for UNIX and NT/2000, respectively. /usr/openv/netbackup/bin/admincmd/bpimmedia -U C:\Program Files\Veritas\NetBackup\bin\admincmd\bpimmedia.exe -U When you are interested in the activity that has been logged regarding the media, the Media log entries

report, shown in Figure 6.20, is the report to suspended, or even removed. The commands are listed for UNIX and NT/2000, respectively. I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise /usr/openv/netbackup/bin/admincmd/bperror -U -media -d -e ISBN:0471227145 -server SRVR by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages) This guide tak es r eaders thr ough the necessar y steps of C:\Program Files\Veritas\NetBackup\bin\admincmd\bperror -U -media -d deploy ing ser v ices by showing how to addr ess the -e -server ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

Some customers use the media written report, shown in Figure 6.21, to identify the tapes that were used for backup during the previous night's backup so they may send off these originals to their off-site < ?xm l version= " I SO1" ?> data recovery" 1.0" site.encoding= While it isn't our8859recommendation to send off original single copies, it does offer that Taas blean o foption Con t en ts through this report. I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise The TAS commands ( VERI Ser ies) are listed for UNIX and NT/2000, respectively. I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt /usr/openv/netbackup/bin/admincmd/bpimagelist -A -media

Chapter 1

-d -e

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems C:\Program -A -media -d Chapter 3 - An Files\Veritas\NetBackup\bin\admincmd\bpimagelist I ntr odu ction to NetBackup

-eup Pa r t I I - Back P roduct Tutor ia l Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup

Figure 6.20: Media log entries report.

Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

Figure 6.21: Media written report. If you need detailed information about the contents of a specific piece of media, the media contents report shown in Figure 6.22 gives you this capability. The commands are listed for UNIX and NT/2000, respectively. /usr/openv/netbackup/bin/admincmd/bpmedialist -U -mcontents -ev



-h

< Day Day Up >

C:\Program Files\Veritas\NetBackup\bin\admincmd\bpmedialist -U -mcontents -ev -h I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa < Day Day Up > John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Advanced Reporting Gu id e f or t h e Ent er pr ise

ISBN:0471227145 Davidare B. reports Little and Chapaand images. As we have seen,bythere forDavid jobs, A. media, These reports can provide you with Wiley & Sons © 2003 (340 most, if not all, ofJohn the information you need topages) manage your backup domain. Unfortunately, there are other reporting needs. Sometimes it is nice be the ablenecessar to produce graphical reports and to have reports This guide tak es r eaders thrto ough y steps of ing ser v ices bydomain. showingThese how toadvanced addr ess the on other parts of deploy the overall backup reports may be produced in various ar chitecturoffers e, lim itan ations, capabilities of t he ex isting ways. VERITAS Software optionand product, NetBackup Advanced Reporter (NBAR), with over net wor k infr astr uctur e. 30 different reports. You can also write your own custom Perl scripts that can interface with the program interface in NBAR to produce your own reports. This is a Web-based tool. The available reports help you your NetBackup environment by presenting NetBackup data from four broad < ?xm l version= " 1.0"analyze encoding= " I SO8859- 1" ?> Taviewpoints: ble o f Con t en t s

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Figure 6.22: Media contents report.

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Persummaries, for m ance Test Techallow Note you to drill down to the specific trouble spots High-level which Appendix G - Net Backu p Per form ance Tuning on Windows I ndex Detailed operational views, including a consolidated error log List of Figur es

Historical perspective for trend analysis and event/time correlation

List of Tables

List ofPerformance Sidebars indicators, such as data throughput

Many of these reports can be tailored to provide exactly the information you need. NBAR also includes an online version of the NetBackup Troubleshooting < Day DayGuide Up > . NBAR gives you a tool that allows you to use the information provided in the NetBackup debug logs without having to manually analyze the text log files. NBAR passively scans the VERITAS NetBackup logs for specific information about each client and copies that information to its own database. It then uses that data to generate reports on NetBackup backup and restore activities, catalog operations, and media usage. Maintaining a separate database allows Advanced Reporter to retain a record of NetBackup activities long after the NetBackup administrator has purged expired backup information from the NetBackup logs. NBAR consists of the following components: A client delivery system that distributes the Java applet GUI to individual browsers The Java applet GUI that is started from a browser A database server for the NBAR database

A data collection service

< Day Day Up >

A configuration utility NBAR is installedI on a NetBackup master The NBAR m plem en t ing BaData cku pCenter an d Reco ver y:server. Th e Rea din ess database server resides on this master server, thet hconfiguration Guas id edof or e Ent er pr ise utility and the client delivery component. NBAR gathers information aboutbythe NetBackup by running NetBackup commands. NBAR then loads ISBN:0471227145 David B. Little environment and David A. Chapa the information gathered into& its database. NBAR John Wiley Sons © 2003 (340 pages)can be installed and configured on Sun, HP, and Windows master This servers. is also fully integrated with the NetBackup guideIt tak es r eaders thr ough the necessar y steps ofGlobal Data Manager (GDM), which we discussdeploy in a later chapter. Byshowing using NBAR you can actually roll up reports from ing ser v ices by how towith addrGDM, ess the lim it ations, and capabilities of t he ex isting multiple masters ar tochitectur a singlee,global master. net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?>< Day Day Up > Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Summary

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

ISBN:0471227145 David B.that Little and you David Chapa your backup Several tools areby available allow to A. monitor domain. You can monitor many John Wiley & Sons © 2003 (340 pages) different elements of the total domain:

This guide tak es r eaders thr ough the necessar y steps of

Job activity deploy ing ser v ices by showing how to addr ess the

ar chitectur e, lim it ations, and capabilities of t he ex isting

Media usagenet wor k infr astr uctur e. Image status < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t status en t s and configuration Device I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise Errors ( VERI TAS Ser ies) I ntr oduction

Daemon and process status

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1 the - Backup Recover y Sy st em Requir emtoents By using differentand reports, you should be able getEx a plained good idea of the status of the status of your Chapter - Business Requirements of Back up Systems backup2domain, including the jobs and devices. Chapter 3

- An I ntr odu ction to NetBackup

Now will up look at some of ia the Pa r t I I we - Back P roduct Tutor l

other backup features and options that you might be interested in

using. These can give you toements handle the backup and recovery requirements that go Chapter 4 - Evaluating Storthe agecapabilities Media Requir beyond5the- standard filesystems. Chapter Gener al Discussion on Configur ation Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7 Chapter 8

- Evaluating Ot her Back up- Related Featur es and Options < Day Day Up > - Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Chapter IGu 7: Evaluating Other Backup-Related id e f or t h e Ent er pr ise ISBN:0471227145 David B. Little and David A. Chapa Featuresby and Options John Wiley & Sons © 2003 (340 pages) Thisarchitecting guide tak esar eaders ough the necessar y steps of traditional backup methods. We We have discussed backupthr and recovery solution using deploy ing ser v ices by showing how to addr ess the have looked at some of the things that must be considered in selecting the systems that will function ar chitectur e, lim it ations, and capabilities of t he ex isting as the master and netpossibly wor k infrthe astrmedia uctur e.servers within the backup domain. In many cases, this will allow you to successfully perform necessary backups and restores, but in some situations, you need to look at other features and options. In this chapter, we discuss several of those features and options, some < ?xm l version= " 1.0"additional encoding= " I SO- 8859?> license, and we provide guidance as to the situations of which require software or a1"new Ta ble o f Con t en t s where you might want to use them. I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

Backing Up and Restoring in a SAN Environment

I ntr oduction

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

It is becoming more common to find storage in the enterprise located on a storage area network. This - Backup and Recover y Sy st em Requir em ents Ex plained allows more servers to have better access to more disks and makes it possible to have better overall Chapter 2 - Business Requirements of Back up Systems utilization of the disk resources. It is also possible, and in some cases very desirable, to use the SAN Chapter 3 - An I ntr odu ction to NetBackup for backup and recovery. There are a couple of reasons why we should do this. The most obvious is to Pa r t I I - Back up P roduct Tutor ia l have the ability to move the backup data from the client disk to the tape drive without going over the Chapter 4 - Evaluating Stor age Media Requir ements local area network. There are other ways to do LAN-free backup without implementing a SAN backup Chapter 5 - Gener al Discussion on Configur ation solution. The primary way is to use library sharing as discussed in Chapter 3. In this case, multiple Chapter 6 Monitor in g the Backup Pr ocess media servers are directly connected to tape drives in a library via SCSI cables, with one of the media Chapter - Evaluating Ot her Back up- Related Featur es and servers7having robotic control. A specific media server nowOptions owns one or more of the drives through this Chapter 8 Gener al Tr oubleshooting Tips direct connection and is able to do LAN-free backups. The downside of this solution is that the drives Chapter 9 accessible - The Expanding Back upserver System are only by the media directly connected to it. When that media server is finished Pa r t I Iits I -own The backup, Ente r pri se pa ct or of drives Back upeither Sy stesit m sidle or that media server must start doing backups of with theI mdrive Chapter clients 10 on the - The LAN. FutThis ure of is Backup shown in Figure 7.1. Chapter 1

Chapter 11 - Maj or Players in the Backup Ar ena

Another option for LAN-free backups is to use a SAN solution. Servers that have too much data to be effectively backed up over the LAN can be connected to a fiber switch or director that also has tape Appendix B - Glossar y drives connected to it. Now instead of each media server being directly connected to a drive or drives, Appendix C - Tuning Your Backup and Recov er y Application all the media servers in the SAN can access all the drives connected to the SAN. This allows each Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning media server to use as many drives as needed to finish its backup. When it is finished, the drives are Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm reassigned to another media server. As long as there is data to be backed up, the drives will remain Appendix F allows - Per foryou m ance Test Tech better Note utilization of your tape drive resources. The drives can either busy. This to get much Appendix G Net Backu p Per form ance Tuning on Windows be located in a robotic library or standalone drives, as long as they are connected to the SAN. This I ndex gives you a way to share standalone drives that is not possible in a standard backup environment. The List of Figur es of the drive resources is arbitrated by the backup application. assignment Appendix A - Com m and-Line I nter face Gu ide

List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Figure 7.1: Library sharing.

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation BACKUP AND THE SAN - Monitor in g the Backup Pr ocess

Chapter 6

One of SAN backups a customer who had been doing standard backups Chapter 7 example - Evaluating Ot her Back up-involved Related Featur es and Options with a couple ofTips years. Their environment had grown to the point that, even Chapter 8 NetBackup - Gener al Trfor oubleshooting after media servers, libraries, and drives, backups were just about exceeding Chapter 9 adding - The Expanding Back uptape System window, 18ct to hours Pa r t I their I I - The Ente r pritaking se I m pa of 19 Back up Syto stefinish ms

each day. They finally decided that more hardware just wasn't the answer and implemented a backup SAN. This more effective use Chapter 10 - The Fut ure of Backup of their existing hardware enabled their backups to finish in eight hours. Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C Software - Tuning offers Your Backup and Recov y Application VERITAS this feature with er NetBackup Shared Storage Option (SSO), shown in Figure Appendix - Disaster Planning Kit—Fr om Endmoves to Beginning 7.2. WithDthis feature,Recovery the backup and recovery data across the SAN, not the LAN. It also Appendix E -drives Business I mpact Analysis Planning Kit—The m Befor e t he instead Calm of SCSI Channel. This means the are connected to the media server viaStor Fibre Channel

eliminates SCSI cableTest restrictions for connecting the drives. Appendix F the - Per for m ance Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

Figure 7.2: NetBackup Shared Storage Option (SSO).

< < Day Day Day Day Up Up > >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Database Agents Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by a David B. Little and David Chapa up the databases, Many vendors offer variety of methods for A. backing most with 'agents' that talk John Wiley & Sons © 2003it(340 directly to the database in order to back up pages) 'hot'-that is, without shutting down the database. VERITAS NetBackup, for instance, supports the hot Oracle, This guide tak es r eaders thr ough the backup necessarof y steps of Informix, MS Exchange, MS ing They ser v ices showing how to highly addr ess the SQL Server, and deploy Sybase. areby very efficient and reliable once they are configured and put into production. ar chitectur e, lim it ations, and capabilities of t he ex isting

net wor k infr astr uctur e.

One 'nonbackup' software company called FalconStor offers the administrator the ability to back up databases using TimeMark technology to back up data independent of the database agents offered < ?xm l version= " 1.0"its encoding= " I SO8859- 1" ?> by most of the backup vendors today. TimeMark enables FalconStor's IPStor (a storage virtualization Ta ble o f Con t en t s tool) toent create periodic, point-in-time of data volumes. I mplem ing Backup and scheduled, Recover y—The Readinesscopies Guide for the Enter pr ise A tool such as this provides nearTAS instantaneous recovery of single files or an entire volume back to a known-good-point in time. ( VERI Ser ies) Coupled with their Zero-Impact Backup Enabler, which allows third-party backup software from I ntr oduction BakBone VERITAS toup perform full, incremental, and differential Pa r t I - I nt rand oduct ion t o Ba ck and Recove r y in the Ent er pr i se Env ir onmbackup/restore e nt

at the block level, it allows online, incremental backups of databases to be performed with transactional integrity when Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained used with IPStor's database-aware Snapshot Agents. Chapter 2 - Business Requirements of Back up Systems Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

Day Day Up > - Evaluating Stor age Media Requir < ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

plem en t ing BaBackups cku p an d Reco ver y: ThDatabase e Rea din ess Editions Block LevelI mDatabase Using Gu id e f or t h e Ent er pr ise

by David Littlehelpful and David A. backup Chapa process,ISBN:0471227145 While database agents areB.very in the sometimes they are just not enough. John Wileydatabase, & Sons © 2003 (340 pages) For backups of an Oracle VERITAS Software offers an alternative. By combining the VERITAS Database foresOracle with for Oracle Advanced BLI Agent, you can do ThisEdition guide tak r eaders thrNetBackup ough the necessar y steps of deploy ing serbackups v ices by of showing how todatabase. addr ess the true block-level incremental your Oracle The VxFS Storage Checkpoint facility ar chitectur e, lim it ations, and capabilities of tthe he ex isting keeps track of data blocks modified by the database since last backup. This is a copy-on-write net wor k infr astr uctur e. snapshot facility, which we discuss in detail later in the chapter. NetBackup with BLI Backup leverages this facility to back up only changed blocks, not the entire database, for an incremental backup. A database BLI" 1.0" Backup is done" I at the filesystem block level, which means only changed blocks, not the < ?xm l version= encoding= SO88591" ?> Tachanged ble o f Con t en tare s backed up. Because the VxFS Storage Checkpoint facility identifies changed blocks files, I mplem ing BLI Backup and Recover for the Enter pr for ise the modified blocks. BLI in realent time, Backup does noty—The need Readiness to search Guide the entire database ( VERI TAS saves Ser ies)time, decreases the amount of backup media required, and significantly reduces CPU Backup I ntr oduction and network overhead during backups. In addition, this allows more frequent backups, making backup Pa r t I - I nt r oduct ion t o Ba ckBLI up Backup and Recove r y in the Ent er well pr i seas Env ir onm e nt incremental backups of images more up-to-date. supports full, as block-level, Chapter - BackupWhen and Recover y Sy st em Requir em ents Ex NetBackup plained Oracle 1databases. restoring Oracle database files, restores an appropriate full backup2and- then applies the changed blocks from the incremental backups. This restore process is Chapter Business Requirements of Back up Systems performed by NetBackup and is completely transparent. In addition, BLI Backup Chapter 3 -automatically An I ntr odu ction to NetBackup supports both (offline) and hot (online) backup to meet database availability and Pa r t I I - Back upcold P roduct Tutorbackup ia l performance needs. Stor age Media Requir ements Chapter 4 - Evaluating Chapter 5

- Gener al Discussion on Configur ation

The Advanced BLI Agent interfaces with RMAN (Recovery Manager) via the Proxy copy feature. Proxy - Monitor in g the Backup Pr ocess copy requires System Backup to Tape (SBT) API 2.0, which was introduced with Oracle 8.1.5. There Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options are two types of Storage Checkpoints: Nodata and Fulldata. The Advanced BLI Agent uses Nodata Chapter 8 - Gener al Tr oubleshooting Tips Storage Checkpoints for Proxy copy BLI backups. Nodata Storage Checkpoints will track changed Chapter 9 - The blocks Expanding up System VxFS filesystem withBack a bitmap. With Nodata Storage Checkpoints, the tablespaces are kept in Pa r t I I I The Ente r pri se I m pa ct of up backup. Sy ste m s An added benefit of using the RMAN Proxy copy hot backup mode for the durationBack of the Chapter 10 The Fut ure of Backup feature is that backup and restore operations are managed and controlled via RMAN, thus reducing Chapter 11 - Maj or Players in the Backup Ar ena administration complexity. Chapter 6

Appendix A - Com m and-Line I nter face Gu ide

If you choose not to yuse RMAN, the NetBackup for Oracle Advanced BLI Agent offers a script-based Appendix B - Glossar alternative. script method uses the Storage Checkpoint (described previously), as Appendix C -The Tuning Your Backup andboth Recov er yNodata Application

well as the Checkpoint. The om Fulldata Checkpoint differs from the Nodata in Appendix D -Fulldata DisasterStorage Recovery Planning Kit—Fr End toStorage Beginning two ways. First, a copy of the changed filesystem block will be copied into the Storage Checkpoint before the first write change is made to the block. Second, the tablespaces are left in hot backup Appendix F - Per for m ance Test Tech Note mode only for the amount of time it takes to create the Storage Checkpoint. Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables

< Day Day Up >

List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Frozen Image Backups Gu id e f or t h e Ent er pr ise

Davidmany B. Little and David A. Chapa The administratorbyfaces challenges today with backups, ISBN:0471227145 but one of the largest is determining John Wiley & Sons © 2003 (340 pages) window. One of the constraints on the backup how to finish the backup within the allotted backup window is the requirement the database available as much as possible. As This guide to takkeep es r eaders thr ough or thefilesystem necessar yfully steps of deploy ing ser v ices by showing to addrto ess we have just seen, the database agents make how it possible dothe hot database backups, but there is still ar chitectur e, limway it ations, and capabilities of t he ex to isting a performance impact. Another to address the requirement backup data, especially data that net wor k infr astr uctur e. resides in active volumes or databases with a minimal impact on the application, is to use some type of frozen image backup. A frozen image can best be defined as a stable disk copy of the client's data < ?xm l version= encoding= 88591" ?> made prior to" 1.0" backup. Such "aI SOcopy is important on active filesystems and databases, where updates to Tafiles ble oorf Con t encan t s occur at any time. In such cases, making a stable, consistent copy (frozen image) is tables I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter prvery ise rapidly, causing minimal a prerequisite to making a correct backup. A frozen image is created ( VERI TASon Ser ies) applications. There are two basic types: copy-on-write snapshot and mirror. impact other I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Copy-on-Write Snapshot - Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 1

Chapter 2 - Business Requirements of Back up Systems Acopy-on-write snapshot is a detailed account of data as it existed at a certain moment. Unlike a Chapter - An odu ction to itNetBackup mirror, 3which weI ntr discuss next, is not really a copy of the data, but a particular 'record' of it. The copyPa r t I I - Back up P roduct Tutor ia l on-write snapshot process works

Chapter 4

as follows:

- Evaluating Stor age Media Requir ements

1. When a frozen image is required, any unfinished transactions or changes to the source data are - Gener al Discussion on Configur ation allowed to complete, but new changes are temporarily stalled.

Chapter 5 Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 2. The 7 -source Evaluating is momentarily Ot her Back upidled Related (made Featur quiescent), es and Options and a snapshot driver is injected into the Chapter host 8 - operating Gener al Trsystem. oubleshooting Tips Chapter 9

- The Expanding Back up System

3. Once the snapshot driver is activated, new transactions or changes (writes) to the source data are allowed to take place. However, the snapshot driver briefly intercepts or holds the write Chapter 10 - The Fut ure of Backup requests. While holding those requests, it copies to cache any blocks that will be affected by Chapter 11 - Maj or Players in the Backup Ar ena those writes and keeps a record of the cached blocks. Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Appendix A - Com m and-Line I nter face Gu ide

Appendix - Glossar y In other Bwords, the snapshot driver reads each source block that is about to change, copies the block's Appendix C - to Tuning Your Backup andthe Recov er y Application current data cache, and records location and identity of the cached blocks. Then the intercepted Appendix D allowed - Disaster Kit—Fr om End The to Beginning writes are to Recovery take placePlanning in the source blocks. immediate results of the snapshot are as

follows: E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix Appendix F - Per for m ance Test Tech Note

A cached copy of those portions of the source that were about to change at a certain moment

Appendix G - Net Backu p Per form ance Tuning on Windows

I ndex A record of where those cached portions (blocks) are stored List of Figur es

The snapshot does not produce a copy of the source; it creates cached copies of the List of copy-on-write Tables blocks that have changed and a record of their location. The backup process refers to the source data List of Sidebars or cached copy of the data as directed by the snapshot driver. An accurate backup image is obtained by combining the unchanged portions of the data with the snapshot cache. When a backup of the snapshot frozen image begins, the backup application copies the source data until it comes to a block < Day Day Up > thatchanged after the snapshot driver was activated. The snapshot driver tells the backup process to skip that changed block and read in its place the cached (original) copy. The backup application continues copying source data until it comes to another changed block. Cache is read again as the snapshot driver dictates. The backup, when finished, is an exact copy of the source as it existed the moment the snapshot driver was activated. Different kinds of snapshot backups are available. VERITAS Software's NetBackup offers a copy-onwrite snapshot using a proprietary snapshot driver called nbu_snap that works with either Sun Solaris UFS filesystem or VERITAS Software's VxFS filesystem. It also supports filesystem clones, which is a feature of VxFS. Another backup challenge that can be helped with snapshot backups is the backup of a filesystem that contains hundreds of thousands or millions of small files. Doing a standard backup of such a filesystem using the standard operating system commands is very time-consuming. Just to traverse

the filesystem building a list of all the files takes a lot of time. The best way to back it up without using < Day Day Up > snapshot technology is to do the following: 1. Unmount the filesystem. m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess 2. Perform aI raw backup of the filesystem. Gu id e f or t h e Ent er pr ise

by David B. Little and David A. Chapa 3. Remount the filesystem.

ISBN:0471227145

John Wiley & Sons © 2003 (340 pages)

There are some disadvantages doing this kind the of backup: This guide tak estor eaders thr ough necessar y steps of deploy ing ser v ices by showing how to addr ess the

The filesystem is not available duringand thecapabilities entire timeofoft he theexbackup. ar chitectur e, lim it ations, isting net wor k infr astr uctur e.

All backups are full backups.

< ?xm l version= All restores " 1.0" are encoding= full filesystem " I SO- 8859restores. 1" ?> Single file restores are not possible. Ta ble o f Con t en t s

The better forand backing upy—The this kind of data is to use snapshot backup. An example is the I mplem ent ingoption Backup Recover Readiness Guide forathe Enter pr ise NetBackup option. With this technology, you have the advantages of the raw backup ( VERI TAS Ser FlashBackup ies) without the penalties. This is a copy-on-write snapshot technology using a proprietary snapshot driver. I ntr oduction This is available forupthe following UFS, Pa r t I feature - I nt r oduct ion t o Ba ck and Recove rfilesystem y in the Enttypes: er pr i seSun EnvSolaris ir onm e nt

VERITAS Software's VxFS on Solaris or HP-UX, and Online JFS on HP-UX. For backups, FlashBackup creates consistent, pointChapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained in-time backups at the file level. In the event of a restore, it uses file mapping created during the Chapter 2 - Business Requirements of Back up Systems snapshot to restore single files or directories. It also enables administrators with millions of files to Chapter 3 - An I ntr odu ction to NetBackup conduct backup and restore operations by using a combination of file mapping and snapshot Pa r t I I - Back up P roduct Tutor ia l technologies. Chapter 4 - Evaluating Stor age Media Requir ements Chapter 5 - Gener Discussion on Configur The advantages ofalusing a technology suchation as FlashBackup over standard filesystem or raw backups Chapter 6 Monitor in g the Backup Pr ocess are as follows: Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options It provides increased performance, Chapter 8 - Gener al Tr oubleshooting Tipsespecially if the filesystem contains a very large number of

files most of the filesystem blocks are allocated. Chapter 9 and - The Expanding Back up System Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

It allows individual file restores.

Chapter 10 - The Fut ure of Backup

Chapter 11volume - Maj or in the Backupmounted. Ar ena The orPlayers filesystem remains Appendix A - Com m and-Line I nter face Gu ide

It supports multiple data streams. Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application

It supports full and incremental backups.

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

Mirror

Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows

Amirror is a complete data copy on a separate disk, physically independent of the source. Every change or write to the source data on the primary disk is also made to the copy on the secondary disk. List of Figur es This creates a mirror image of the source data. As with a copy-on-write snapshot, when a frozen List of Tables image is required, transactions are allowed to finish and new I/O on the primary disk is briefly halted. List of WhenSidebars the mirror image is brought up-to-date with the source (made identical to it), the mirror is split from the primary, meaning that new changes can be made to the primary but not to the mirror. At this point, the mirror can be backed up. I ndex

< Day Day Up >

Since mirroring requires an exact, complete copy of the primary image, it consumes more disk space than a copy-on-write snapshot. The data can exist in a disk management software mirror, such as VERITAS Software's VxVM mirrors, or it can exist on a disk array controlled by the array-specific mirroring software, such as EMC TimeFinder, Hitachi Data Systems ShadowImage, HP-UX BusinessCopy, IBM FlashCopy, and others. At the end of the backup, the split mirror is rejoined with the primary mirror and the mirrors are resynchronized. Some backup applications, such as NetBackup, allow you to run with the mirrors split and resynchronize the mirrors just prior to backing up the data. This is a plus for those people who like to synchronize the mirrors once a day and then run with the mirrors split. BACKING UP THE MAIL No doubt there are many examples of customers using frozen image backups to handle applications such as mail. We know of one in particular that was using a UNIX system and

had the challenge of backing up 4.2 TB of data that was across several filesystems and < Day Day Up > contained 82 million files. A standard filesystem backup of this data was taking 27 hours. After implementing NetBackup FlashBackup, they could finish their backups in 8 hours. In another case where the backup was for Netscape mail, the standard backups were taking I m plem en backups, t ing Ba ckuand p anincremental d Reco ver y:backups Th e Rea din esstaking 24 to 36 hours. After 48 to 60 hours for full were Guwas id e fimplemented, or t h e Ent er prthe ise full backups were completed in 15 to 20 hours, and the FlashBackup David B.were Little in and David Chapa range. ISBN:0471227145 incremental by backups the 9- toA.12-hour John Wiley & Sons © 2003 (340 pages) This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e. < Day Day Up > < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Offhost Backups Gu id e f or t h e Ent er pr ise

ISBN:0471227145 B. Little and David A. Chapa As the challengesbyofDavid backup continue to grow, everyone is looking for new ways to meet these Sons © methods 2003 (340 pages) challenges. One John of theWiley new &backup is sometimes referred to as serverless or server-free offhost . This backup method backup. The more correct This guide name tak es riseaders thrbackup ough the necessar y steps of uses a separate backup ser v ices by showing how to addr ess(3PC) the device to actually move the data agent located on deploy either ing a media server or a third-party copy ar chitectur e, lim it ations, and capabilities of t he ex isting from the client disk to storage.

net wor k infr astr uctur e.

Figure 7.3 shows an example of an implementation of offhost backup using NetBackup. The backup agent in this case be either media server or a third-party copy (3PC) device that implements < ?xm l version= " 1.0" could encoding= " I SO- a 88591" ?> SCSI Extended Copy commands. Many types of 3PC devices can act as backup agents, such as Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise Bridge ( VERI TAS Ser ies) I ntr oduction

Router

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1 - library Backup and Recover y Sy st em Requir em ents Ex plained Robotic Chapter 2 - Business Requirements of Back up Systems

Disk Chapter 3 array - An I ntr odu ction to NetBackup Pa r t I I - Back up P roduct Tutor ia l

One of the key elements for offhost backups is that the backup must be done from a frozen image. - Evaluating Stor age Media Requir ements Any of the frozen image types listed in the section can be used. Sometimes this feature is confused Chapter 5 - Generbackup al Discussion on such Configur ation with the LAN-free feature as the NetBackup SSO feature. If the requirement is to keep Chapter 6 Monitor in g the Backup Pr ocess the backup data off the LAN or to do a frozen image backup so that the application can continue to be Chapter 7 either - Evaluating her Back up- Related Featur andthe Options available, SSO orOtfrozen image backups will es fulfill need. If the problem is that the backup Chapter 8 Gener al Tr oubleshooting Tips overhead is too much for the application server to handle, offhost backup is the solution. By using Chapter - Theyou Expanding Back up offhost 9backup, are moving theSystem disk reads and the tape writes to a separate backup agent who will Pa r t I I I - The Ente rthis pri se I m pa ct of Back up Sy ste m s actually perform work. Chapter 4

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

Figure 7.3: Offhost backup.

< Day Day Up >

< Day Day Up >

plem en tEnvironment ing Ba cku p an d Reco ver y: ThGlobal e Rea din ess Managing aI mLarge Using Data Manager (GDM) Gu id e f or t h e Ent er pr ise

ISBN:0471227145 Davidthat B. Little and backup David A.domain Chapa is no longer Many people are by finding a single an option. This can be due to Wiley in & different Sons © 2003 (340 pages) locations), business reasons (different domains for physical reasons John (domains geographic business units), or size (tootak bigesfor a single This guide r eaders thrdomain). ough the Finding necessaryourself y steps ofwith multiple backup domains deploy ing sermuch v ices by showing how to addr ess the like this it is nice to find a feature can make the administration more complicated. In situations ar chitectur e, lim it ations, andVERITAS capabilities of t he exThis istingfeature is a fourth tier in the such as Global Data Manager (GDM) from Software. net wor k infr astr uctur e. NetBackup architecture. It is a master of masters that provides a single console that allows you to see and manage all of your backup domains. This type of feature makes it much easier to administer distributed backup domains by using a dashboard that gives you, at a glance, the real-time status and < ?xm l version= " 1.0" encoding= " I SO88591" ?> Tahealth ble o f of Con t s domains. allt en your

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise Figure ( VERI TAS7.4 Sershows ies) a typical GDM layout. As you can see, each of the master servers gathers data about

its oduction own domain and either rolls the data up to the master of masters or stores it in a local database I ntr where available the master of masters it pr bei se needed. Figure Pa r t I - Iitntisr oduct ion t otoBa ck up and Recove r y in should the Ent er Env ir onm e nt

7.5 is a sample of the

dashboard by GDM. Chapter 1 -used Backup and Recover y Sy st em Requir em ents Ex plained Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex Figure 7.4: Global Data Manager. List of Figur es List of Tables List of Sidebars < Day Day Up >

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Vault Solutions Gu id e f or t h e Ent er pr ise

ISBN:0471227145 David B. Little part and of David Chapa While backup is abyvery important anyA.enterprise data protection strategy, it alone does not John Wiley & SonsAny © 2003 (340 pages)DR strategy should include an off-site backup provide for true disaster recovery. enterprise management system such as Vaultofor Gray House Solutions' This guide tak VERITAS es r eaders Software's thr ough theNetBackup necessar y steps ingproduct ser v icesisby showing how to you addrto essmake the multiple copies of your backup Duplication Suite.deploy A vault one that enables chitectur it ations, and capabilities of t the he ex isting library, and provides the reports images, gives youarthe tools e, tolim eject the desired tapes from robotic net wor k infr astr uctur e. to track the movement of the tapes while outside the library. The tapes that are outside the library are generally stored at an off-site location. The vault product provides tracking of the tapes in the off-site location, and"it1.0" notifies you when images < ?xm l version= encoding= " I SO-the 88591" ?> on the off-site tapes have expired and the tapes should be Tareturned ble o f Con en t library s to tthe for reuse. This is done so if there is a disaster at the primary site, the data will still beent available fromand theRecover off-sitey—The tapes.Readiness Guide for the Enter pr ise I mplem ing Backup

( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Figure GDM Idashboard. Appendix E - 7.5: Business mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note

The requirements for an off-site backup management system are as follows:

Appendix G - Net Backu p Per form ance Tuning on Windows I ndex A schedule for sending media off-site List of Figur es

method to determine what data to send off-site List ofATables List of Sidebars

A mechanism to automate the creation of duplicate media (images) A mechanism to duplicate the catalog < Day Day Up >

A way to determine which media to retrieve from off-site storage for reuse A system for tracking both the data and the media while stored at the off-site location A method for reporting on media shipments Efficient use of resources Since this is the cornerstone in any enterprise DR strategy, the selection of the product to fulfill these requirements is very important. Make sure you select a product that gives you all the functionality you need, along with flexibility and ease of use. Vault is generally considered a three-step process: 1. Duplication of backups. 2. Backup of the catalog.

3. Ejecting of media and reporting.

< Day Day Up >

Depending on your individual requirements, you can perform any or all of these steps. With some of the vault products like NetBackup Vault, you can configure the backup session to write to multiple I m plemcopies en t ingofBa cku p an d Reco ver having y: Th e Rea din ess them. This would fulfill the tapes, creating multiple the backups without to duplicate e f or t h e At Ent er end pr iseof the backup session, and the duplication session if requirements for Gu theidfirst step. the ISBN:0471227145 by David B. Little and copy David of A. the Chapa required, Vault needs to make a tape catalog to accompany the media as it goes off-site. Wiley the & Sons © 2003 (340off-site pages) location, Vault should eject the appropriate media When it is time toJohn transport media to an guide tak es r eaders thr ough the necessar steps and generate theThis necessary reports to track the media. A party of the of reporting is the recall of expired deploy ing ser v ices by showing how to addr ess the media to be reused. ar chitectur e, lim it ations, and capabilities of t he ex isting

net wor k infr astr uctur Vault e. Another option within the NetBackup feature is disk staging, which is discussed in the next section on disk-based storage units. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness < Day Guide Day Up for>the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

plem en t ingUnits Ba cku p an d Reco ver y: Th e Rea din ess Disk-BasedI mStorage Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by David B. Littleperformance and David A. of Chapa What's the best way to increase your tape backup solution? Take the tape out of your Johnit Wiley & Sons © 2003 (340backup pages) methods are becoming quite popular, with the cost backup and replace with disk. Disk-based of disks droppingThis dramatically in recent Before we get yinto theofimplementations of the diskguide tak es r eadersyears. thr ough the necessar steps deploy ing at sersome v ices by showing how addr ess the First are disk-based solutions like based methods, let's look of what is on thetomarket today. chitectur e, lim it ations, and capabilities of t he exVirtual isting Tape Library Appliance that Quantum DX-30 ar and Alacritus Software's Securitus Disk-Based net wor k infr astr uctur e. frontend the disk to the backup software with what looks like a tape library. Then there are the filerbased solutions like Maxtor's MaxAttach, Network Appliance's NearStore, and even LeftHand Network's solution. Large independent vendors (ISVs) like Legato and VERITAS offer < ?xm l version= " 1.0" encoding= " I SO- 8859-software 1" ?> Tadiskbased ble o f Conbackup t en t s solutions within their applications, as does one of the smaller ISVs, BakBone Software's LikeRecover IBM's Tivoli Management (TSM), they I mplem ent ingNetVault. Backup and y—TheStorage Readiness Guide for the Enter pr ise can use disks as a cache ( VERI Ser ies) areaTAS during backup to stream the tape drives on the back end. At this point, you might be saying, 'But I ntr oduction disks are a finite storage device.' That is true, so in order to implement a solution like this, you need to Pa r t some I - I nt rplanning oduct ion and t o Ba ck up and Recove r yscripting, in the Entdepending er pr i se Envon ir onm nt do maybe even some thee backup tool you have selected. Chapter Backup and Recover y Sy em Requir emexamples, ents Ex plained We will1use- VERITAS NetBackup forstany specific but we believe the concepts can carry over to 2any- other solution that supports disk-based backup. Chapter Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Implementing Disk-Based Storage

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5 - Generstorage al Discussion on you Configur ation Since disk-based is finite, really need to take into consideration how you will manage it once your on this device. More importantly, you need to determine which clients you want Chapter 6 backups - Monitorare in g the Backup Pr ocess

to back7up -toEvaluating it. You surely cannot select all ofFeatur the clients. That would require an equal amount of diskChapter Ot her Back upRelated es and Options based backup storage as online storage. Chapter 8 - Gener al Tr oubleshooting Tips So, practically speaking, it is best to determine ahead of time which clients youExpanding will be backing upSystem to the device. Chapter 9 - The Back up Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Once you have decided which clients will be backed up to the disk-based storage device, you need to do some math to figure out how long you can keep the backup images stored there. It is best to keep Chapter 11 - Maj or Players in the Backup Ar ena the backup there as long as you possibly can to facilitate faster restores should the need arise. For Appendix A - Com m and-Line I nter face Gu ide illustration purposes, let's say that you only have enough space for 72 hours before you will effectively Appendix B space. - Glossar y what? Well, you can migrate them manually by doing a copy, or duplication to a run out of Now Appendix C Tuning and Recov er y Application tape device. You canYour alsoBackup implement a hierarchical storage management (HSM) solution, like Appendix D Disaster Recovery Planning Kit—Fr om filesystem End to Beginning VERITAS Storage Migrator, that will manage the for you automatically by migrating the Appendix - Business or I mpact Analysis Planning Stor m use Befor e t plug-in he Calmmodule Watermark for 'data' to Ea secondary tertiary storage device.Kit—The Or you could the Appendix F - Suite Per forby m ance Tech Note Duplication Gray Test House Solutions, which will monitor the filesystem of the disk storage unit for growth and a duplicate ofance the stored on tape when the user-definable watermark is met, Appendix G - make Net Backu p Per form Tuning images on Windows or it will expire backup images that already have more than one copy, freeing up valuable disk space. I ndex Another solution is to use NetBackup Vault to duplicate stored images through disk staging. Disk List of Figur es staging allows you to back up to disk and then schedule a duplication of the disk-based image to one List of Tables or more tapes. The tape or tapes can have different retention periods both from the disk-based image List of Sidebars and each other. You can also configure Vault to delete the disk image as soon as the duplication process successfully finishes. Chapter 10 - The Fut ure of Backup

< Day Day > The bottom line is that disk-based storage devices are Up inexpensive, fast, and typically highly reliable. The first rule of thumb when performance tuning is to address all of your bottlenecks-and tape may be one of those in your environment.

< Day Day Up >

< Day Day Up >

I m plem en tProducts ing Ba cku p anand d RecoBackup ver y: Th e Rea din ess Storage Migration Gu id e f or t h e Ent er pr ise

ISBN:0471227145 byby David B. Little andup David A. Chapa Full backups must definition back all the files within a filesystem. By adding an HSM software Wiley & Sons © Migrator 2003 (340 pages) package such asJohn VERITAS Storage to your NetBackup environment, you can drastically reduce the amount ofguide data that to thr be ough backed while still protecting all your data. This tak esneeds r eaders the up necessar y steps of

deploy ing ser v ices by showing how to addr ess the ar chitectur e, it ations, and capabilities of reducing t he ex isting HSM manages filesystems forlim both optimizing space and the management time. Optimizing net wor kinactive infr astrfiles ucturfrom e. space involves copying the primary storage medium (hard drive) to another medium, like tape, optical, or a less expensive disk drive. Once the inactive data is secured within another medium, the "data on "the primary < ?xm l version= 1.0" blocks encoding= I SO8859- 1"don't ?> need to be backed up anymore to safeguard the data. Ta ble o f Con t en t s

An intelligent backup product like NetBackup recognizes that the HSM has safeguarded at least one

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise copyTAS of the ( VERI Ser data ies) to another medium, so NetBackup only needs to back up the meta data (inode or

placeholder information) for that file. So instead of backing up all the data blocks for all the static files in a filesystem during a full backup, it only needs to back up the active (nonmigrated) data and the Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt placeholders for the migrated data. Real-world testing has shown that a backup of 3.5 hours can be Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained reduced to about an hour by simply adding an HSM to your environment. I ntr oduction

Chapter 2

- Business Requirements of Back up Systems

Chapter 3 - reason An I ntr odu to NetBackup The primary thatction backups are ever done is for insurance; you need to be able to recover your Pa r t I I - Backdata up P roduct Tutor reason, ia l company's if, for some

it's gone. For the most part, you generally do backups in a

Chapter 4 manner - Evaluating Stor age Media Requir ements leisurely (relatively speaking), but you almost always restore in a panic. Since using HSM Chapter 5 Gener al Discussion on Configur ation technology can help speed up your backups by reducing the amount of data backed up, it can also

increase speedinwhen filesystem. By doing your backups more intelligently by Chapter 6 your - Monitor g the restoring Backup Praocess incorporating an HSM, you can notuponly decrease backup window, but also your recovery window. Chapter 7 - Evaluating Ot her Back Related Featuryour es and Options With NetBackup and Storage Migrator, a full restore of a filesystem works exactly the same as a Chapter 8 - Gener al Tr oubleshooting Tips 'normal'9 restore, thatBack youup only physically restore the 'active' nonmigrated files and all the Chapter - The except Expanding System placeholders for rmigrated files. of the migrated Pa r t I I I - The Ente pri se I m pa ct ofAll Back up Sy ste m s

files are readily available; just access the

placeholders likeFut any normal file, and Storage Migrator will cache the data blocks back to the Chapter 10 - The ure of Backup

filesystem, automatically. Meanwhile, you're Chapter 11 -allMaj or Players in the Backup Ar ena back in business, since your active data is back. You

can start processing data faster than if you had to wait for all the active and inactive files to be restored. For safeguarding your data, it's highly recommended that you let the HSM make two copies of all your Appendix B - Glossar y migrated data and that your second copy be taken off-site, along with your full and incremental tapes. Appendix C - Tuning Your Backup and Recov er y Application This provides a disaster recovery set of tapes should you ever need them. Appendix A - Com m and-Line I nter face Gu ide

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Appendix - Business I mpact Analysis Stor m t he CalmAnalyzer that analyzes a Starting Ewith NetBackup 3.4 for UNIX,Planning there is Kit—The a tool called theBefor FileeSystem Appendix F and - Perreports for m ance Testthe Tech Notepatterns, size, and number of files within a filesystem. It filesystem back usage

providesGa -what-if scenario thatance you can change to see how many files you back up on every full Appendix Net Backu p Per form Tuning on Windows backup that haven't changed in a long time. Most customers are very surprised at how much of their I ndex data very often. The analyzer can be very helpful in determining if a particular system or List of isn't Figurused es particular filesystem/volume within a system is a good candidate for an HSM product. List of Tables List of Sidebars

Another way you can utilize Storage Migrator with NetBackup is as a repository for backup images. It is not uncommon to have slow clients, and even with multiplexing, you can't always keep a tape drive streaming. Once a tape drive can't be kept streaming, the tape drive's performance is greatly reduced. Daystorage Up > unit. Storage Migrator can then manage A way to address this problem is to back up < Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Summary

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

ISBN:0471227145 Davidfeatures B. Little and and options David A.are Chapa As we have seen,bymany available to help you enhance a standard backup John WileySome & Sons 2003 (340 pages) and recovery architecture. of©these may be necessary from the beginning, while others might be added as your enterprise grows changes. Tothe highlight, the features This guide tak esand r eaders thr ough necessar y steps of and options are as follows:

deploy ing ser v ices by showing how to addr ess the chitectur e, lim it ations, and capabilities of t he ex isting SAN backuparand recovery net wor k infr astr uctur e.

Database agents < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Database editions Ta ble o f Con t en t s I mplem Frozen ent ing image Backupbackups and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

Offhost backups I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Managing a diverse environment with GDM

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2 solutions - Business Requirements of Back up Systems Vault Chapter 3 - An I ntr odu ction to NetBackup

unitsia l Pa r t I Disk-based I - Back up Pstorage roduct Tutor Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Storage Migrator and Backup

Chapter 6 to- always Monitor keep in g theup-to-date Backup Pron ocess You want the additional features and options available. This should allow Chapter 7 Evaluating Ot her Back upRelated Featur andenterprise Options changes. In the next chapter, we you to address your backup and recovery needs asesyour Chapter - Gener Tr oubleshooting Tips look at 8some hints al and tips on troubleshooting your backup and recovery environment. Chapter 9 - The Expanding Back up System Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup

< Day Day Up > Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Chapter IGu 8: General Troubleshooting Tips id e f or t h e Ent er pr ise ISBN:0471227145

by David B. Little and David A. Chapa

Highlights John Wiley & Sons © 2003 (340 pages) This guide tak es r eaders thr ough the necessar y steps of

After all the workdeploy and planning ing ser v ices for your by showing new backup how toand addrrecovery ess the system, you finally get it installed ar chitectur e, lim it ations, andLife capabilities t hewait, ex isting and configured. You start running backups. is good.ofBut someone just called and said there net wor k infr astr uctur e. was a problem. How could there be a problem? You have been so careful and thorough. This can't be happening! Well, it really does happen. In fact, if you look at your backup and recovery architecture, youl will notice thatencoding= a simple NetBackup backup of a client touches a significant amount of your < ?xm version= " 1.0" " I SO- 8859- 1" ?> Taenterprise. ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ThisTAS backup starts by having a process run on the master server that determines if it is the proper time ( VERI Ser ies)

to oduction do a backup. Then there are communications between the master server and the media server, I ntr followed communications ther ymedia theirclient. The Pa r t I - I ntby r oduct ion t o Ba ck up between and Recove in the server Ent er prand i se Env onm e nt

media server communicates with a robotic library and requests a specific tape be loaded into a specific drive. The Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained client starts a process to read the data from its disk and starts sending the data across the network to Chapter 2 - Business Requirements of Back up Systems the media server. The media server receives this data and passes it through shared memory to a tape Chapter 3 - An I ntr odu ction to NetBackup drive while passing the meta data back to the master server, where it is stored in a catalog on a disk on Pa r t I I - Back up P roduct Tutor ia l the master server. When the backup is finished, the media server closes the tape and asks the library Chapter 4 - Evaluating Stor age Media Requir ements to take the tape from the drive and put it back in a specific slot. Chapter 5

- Gener al Discussion on Configur ation

Chapter 6 exercised - Monitordisks in g the Pr ocess We have onBackup a couple of different systems, exercised the network, used a robotic Chapter 7 Evaluating Ot her Back upRelated Featur es and Options library, written to a drive-we've really exercised a good portion of the total enterprise. This makes

backup8and- recovery one of the bestTips enterprise-wide diagnostic tools. It also makes troubleshooting Chapter Gener al Tr oubleshooting backup9and- recovery problems more important and difficult, since you could be troubleshooting Chapter The Expanding Backall up that System network issues, Pa r t I I I - The Enteclient r pri sesystem I m pa ct issues, of Backhardware up Sy ste missues s

at several different places, and overall operating

system10 issues, just mention a few. In this chapter, we give you a basic idea of how to approach Chapter - The Futto ure of Backup these problems identify of theArtools Chapter 11 - Maj and or Players in some the Backup ena you will need. Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Day Up > Appendix C - Tuning Your Backup and Recov er

< Day Day Up >

m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Functional IOverview Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by David Little and David is A.to Chapa The most important part ofB.troubleshooting understand how your particular application works. John Wiley &daemons, Sons © 2003 pages) are started as a result of a backup job being Functionally, what services, or (340 processes executed? Backup applications like avalanches; theybackup This guide tak esare r eaders thr ough the once necessar steps ofjob starts, it tends to spawn deploy ing ser v ices by how the to addr ess the several other supporting processes to showing accomplish task. Therefore, being able to track the ar chitectur e, lim it ations, and he ex isting relationship of these services, processes, andcapabilities daemons of is tthe first step in your journey to net wor k infr astr uctur e. troubleshooting your environment. If you don't have a good solid understanding of the backup architecture and functional overview, your troubleshooting will be hit-or-miss. We have seen many backup administrators troubleshoot a problem from the entirely wrong direction, thus losing valuable < ?xm l version= " 1.0" encoding= " I SO- 88591" ?> Tatime. ble o If f Con ts yourt en software vendor hasn't published such an overview, contact them and request it. Ask as many ent people as youand canRecover to get this information, it, you I mplem ing Backup y—The Readinessbecause Guide forwithout the Enter pr isewon't have all the right tools ( VERI TAS Sertoies) necessary maintain your environment properly.

I ntr oduction

Whatever the case, you should document yourself Pa r t I - I nt r oduct ion t o Ba ck up and Recove r yfor in the Ent er how pr i se the Envsoftware ir onm e nt is

deployed on your environment. If this is an inherited environment, you should have either an outside consultant or Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained internal IT staff perform a site assessment to document your current state. It's always better to do this Chapter 2 - Business Requirements of Back up Systems assessment before you have the trouble looming over your head so you can be prepared and Chapter 3 - An I ntr odu ction to NetBackup proactive. Pa r t I I - Back up P roduct Tutor ia l Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5 Chapter 6

- Gener al Discussion on Configur ation - Monitor in g the Backup Pr ocess < Day Day Up >

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

m plem en t ing Ba ckuWhat p an d Reco ver y: Th e Are Rea din ess Troubleshooting? First Order I of Business: Problem You Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by David Little andto David A. Chapa How do you First things first: We need B. a problem troubleshoot. determine what the problem is? You Wiley & Sons 2003 (340 pages) the root problem is key to troubleshooting. may see a varietyJohn of symptoms, but©understanding Symptoms include theguide following: This tak es r eaders thr ough the necessar y steps of

deploy ing ser v ices by showing how to addr ess the

Performancearischitectur slow. e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

Backups fail. < ?xm l version= Restores" 1.0" fail. encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem You ent cannot ing Backup startand a backup Recoveron y—The clientReadiness A. Guide for the Enter pr ise ( VERI TAS Ser ies)

Backups start out fast, but decline. I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

And a favorite of every technical support person:

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2 - has Business Requirements up Systems Nothing changed, and all ofofaBack sudden, all of your backup jobs won't start. Chapter 3 - An I ntr odu ction to NetBackup

So symptoms or the Pa r t are I I - these Back up P roduct Tutor ia l actual

problem? The way to determine that is to drill down further and

further 4into -the issue with reasonable If it is a performance problem, is it tape drive Chapter Evaluating Stor age Media depth. Requir ements performance, clientalperformance, performance, or disk performance? How do we determine Chapter 5 - Gener Discussion on network Configur ation where the What about failed backups? Could that be bad media or a bad tape drive? In Chapter 6 problem - Monitorlies? in g the Backup Pr ocess this chapter, we presentOtan forRelated troubleshooting thatOptions we have found to be very helpful in our Chapter 7 - Evaluating heroutline Back upFeatur es and years of experience assisting clients with their troubleshooting. - Gener al Tr oubleshooting Tips

Chapter 8

Chapter 9 - The Expanding up System As mentioned, the key is to Back determine what exactly is the problem. Here is an example from an actual Pa r t I I I that - The Ente r pri se I m ct of Back upthe Sy ste ms client had a couple ofpa issues: First, client

saw that their tape usage had increased

Chapter 10 - The of Backup considerably, butFut theure amount of data they were backing up had not changed, nor had the backup Chapter 11 Maj or Players in the Backup Ar ena policies changed. The assumption was that the tape drives were having problems and either were not Appendix - Com facefirmware Gu ide writing toA the endmofand-Line the tapeI nter or had problems that would cause the data to be written Appendix B - Unfortunately, Glossar y improperly. to add fuel to the fire, one of the tape manufacturers whose tape they were using announced that some of their flawed because of a servo problem at their plant. The Appendix C - Tuning Your Backup and tapes Recovwere er y Application

servo problem wouldRecovery either failPlanning the backup jobom with bad or write the job successfully until the Appendix D - Disaster Kit—Fr End to media Beginning tape wasE full or failed Iwith media errors. This led the client the quick that it was in fact the Appendix - Business mpact Analysis Planning Kit—The Stor to m Befor e t heconclusion Calm tape cartridges Appendix F - Perthemselves, for m ance Testalong Tech with Notepossibly the drives, that were causing the problems they had detected. Appendix G - Net Backu p Per form ance Tuning on Windows I ndex

Upon arriving on-site to have a look at the problem, we asked the administrators several questions, such as 'What has changed in the last three months on the system?' Naturally, the answer was, List of Tables 'Nothing has changed. It has been fairly static.' The key words are 'fairly static,' which means that List of Sidebars something had changed. Because we didn't know exactly what, we began assessing the problem. List of Figur es

< < Day Day Day Day Up Up > >

< Day Day Up >

plem en t ing Ba ckuof p anTroubleshooting d Reco ver y: Th e Rea din ess The NaturalI mProgression Gu id e f or t h e Ent er pr ise

by David B. Little and David Chapa When troubleshooting, always start with the A. most obvious first,ISBN:0471227145 such as network cable, daemons, or John(unless, Wiley & of Sons © 2003you (340have pages)ruled out the obvious through your identification filesystem problems course, process). Usually,This theguide mosttak obvious placethrtoough startthe is also the least time-consuming. This is important to es r eaders necessar y steps of deploy ing ser vhave ices by showing how to addr ess the keep in mind, especially if you certain service level agreements with your customers. You should chitectur e, lim it ations, andwork capabilities of tto hefruition. ex isting plan your strategyarfor troubleshooting, then that plan net wor k infr astr uctur e.

Because it seemed appropriate, we started looking at the error logs to determine what was happening internally to the backup application. This1"is?>an important exercise. If you do not understand how to read < ?xm l version= " 1.0" encoding= " I SO- 8859the error logs pertaining to the backup application, it is strongly suggested that you either take the time Ta ble o f Con t en t s for some self-education enrolly—The yourself in the next available class and be sure to inform the I mplem ent ing Backup and or Recover Readiness Guide for the training Enter pr ise instructor that ( VERI TAS Ser ies)deciphering the error logs is one of your objectives. I ntr oduction

Since our expertise comes from VERITAS NetBackup, we will continue to use it as our method of example when necessary. As we look through the logs, we need to have an idea what we are looking Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained for. Remember, this is a cursory review of the most obvious place to start; therefore, we look for Chapter 2 - Business Requirements of Back up Systems obvious errors, such as media errors from the bperror log or any physical errors that have been logged Chapter 3 - An I ntr odu ction to NetBackup regarding the drives themselves in /var/ adm/messages. Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Pa r t I I - Back up P roduct Tutor ia l

Chapter - Evaluating Stor age Media ements so we completed this cursory review of the logs Nothing4 glaring was uncovered duringRequir this discovery, Chapter 5 Gener al Discussion on Configur ation and began confirming the configuration. Since the problem the client described was not necessarily

one pertaining to theinconfiguration the backup policies, we knew we could avoid that and focus Chapter 6 - Monitor g the Backup of Pr ocess squarely physicalOtaspects the configuration. NetBackup Chapter 7 on- the Evaluating her Backof upRelated Featur es and Options is actually composed of two components: NetBackup and Media Manager. The Media Manager component deals with physical Chapter 8 - Gener al Tr oubleshooting Tips devices9 and- media, so this is a natural place to begin after reviewing the logs. The best way to display Chapter The Expanding Back up System the command with Pa r t Iconfiguration I I - The Ente rfrom pri se the I m pa ct of Backline up Sy ste NetBackup ms

is to use the following:

Chapter 10 - The Fut ure of Backup

/usr/openv/volmgr/bin/tpconfig -d Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide

or

Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application

/usr/openv/volmgr/bin/tpconfig -data Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

This displays how the physical drives and robots are configured and is a good first step for your troubleshooting. Since this problem hinged on data storage to tape, it was reasonable to ensure that Appendix G - Net Backu p Per form ance Tuning on Windows the correct device files were being used, and since it was a UNIX installation, we wanted to make sure I ndex that the compression device file was being used. Once we confirmed that, in fact, it was configured List of Figurthe es next step, since this was a Sun server, was to check the st.conf file. The st.conf file, found properly, List of Tables in /kernel/drv, is the configuration file for all SCSI tape devices that allows you to configure how the List of Sidebars device file will interact with the physical device, including how it will handle compression. Appendix F - Per for m ance Test Tech Note

When we reviewed the entries for the client's tape devices, we found that the compression settings were at default: no compression. The entire were present. At that point, we asked about that 'fairly static' state that the server had been in the past several months. We found that they had installed a Sun jumbo patch to this server about 45 days prior. What the client didn't realize is that the jumbo patch will overwrite the st.conf file during its patching process. The solution was to restore a copy of the st.conf file before the patch and reboot the server. After a few weeks, it was apparent to the client that this was the problem after all. When you are troubleshooting, you really take on the role of investigator, especially if you are not the primary administrator on the server. When you are asked to help out, you really need to be prepared to ask questions to help you determine the root cause. We recommend starting as though you know nothing of the application, within reason, and begin asking questions. Here's a sample of the questions that were asked in order to begin work troubleshooting the previous example: 1. What exactly is (are) the problem(s) you are seeing? 2. When did you notice the change or the errors?

2. Day Day Up > 3. Have there been any changes to the because of personnel resource limitations. Upon the consultant's return to complete the project, he found that the problem still existed and the client accustomed toy:the I mhad plemsimply en t inggrown Ba cku p an d Reco ver Th eperformance Rea din ess and just figured that's the Guto id ebe. f orWell, t h e Ent pr ise way it's going noterfor our consultant; he insisted that the network group turn a by David B. Littleon and A. Chapa sniffer (network analyzer) toDavid see exactly what was ISBN:0471227145 happening between the main backup John Wiley & Sons © 2003 (340 pages) server, the switch, router, and backup client. So, at 10:00 P.M. the network administrator found the problem. Everything wasthrconnecting perfectly at the This guide tak es r eaders ough the necessar y steps of primary site, 100 FULL deploy v ices by showing how to addr essnoted the that it was dropping down to 10 DUPLEX, until we ing gotser across the T3. The consultant chitectur e, lim it ations, andexplain capabilities t he ex isting numbers. Mb/sec afterarthe router, which would theofperformance net wor k infr astr uctur e.

With hard information in our hands, we approached the remote site again and asked them walk the because somewhere < ?xm l to version= " 1.0"wire, encoding= " I SO8859- 1" ?> on their end, it was dropping down to 10 Mbps. Fortunately, we found an administrator in the remote site who was more than willing to Ta ble o f Con t en t s work with us. He tracked down the problem to the I mplem ent ing Backup and Recover y—The Readiness Guide for switch. the EnterThere pr ise he found the switch was for 100 FULL, but AUTO-NEGOTIATE. Once that was changed, we saw our backup ( VERI not TAS set Ser ies) speeds increase from 19 GB in 10 to 11 hours to 19 GB in just a little over 90 minutes. I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Sometimes it is not the software configuration, hardware configuration, or the backup - Backup and Recover y Sy st em Requir em ents Ex plained administration; it is just an oversight in the network architecture somewhere. This problem Chapter 2 - Business Requirements of Back up Systems was different from the previous one in that the consultant was the de facto backup Chapter 3 - An I ntr odu ction to NetBackup administrator for the group, so he didn't necessarily have to ask any questions, but he did Pa r t I I - Back up P roduct Tutor ia l have to understand where the breakdown was occurring. Having an intimate understanding Chapter 4 - the Evaluating age Media Requir ements of how backupStor product works is a considerable help when trying to troubleshoot these Chapter 5 Gener al Discussion on Configur ation problems. Chapter 1

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s Day Up > < Day

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba ckuand p an dHome Reco ver y: Th e Rea din ess NT/2000, 300GB, RAID5, Directories Gu id e f or t h e Ent er pr ise

David B.involves Little and A. Chapa The next real-lifeby example anDavid NT/2000 server backupISBN:0471227145 client and a UNIX backup server. The John Wiley Sons © 2003 pages) was having problems completing its backup job. customer indicated that this &particular NT(340 machine The backup job was withesar Network They information our consultant received was This failing guide tak eaders thrTimeout ough theerror. necessar steps of deploy machine ing ser v ices by showing how to serving addr essas thea home directory server, it used RAID that it was an NT/2000 whose purpose was chitectur e, of limwhich it ations, capabilities t heThe ex isting 5, and it had 300 ar GB of disk, 80 and percent was in of use. backup infrastructure for this net wor k infr astr uctur e. customer is quite impressive: large STK9310, 9840A, 9840B, and 9940A drives; ACS/LS library software; Sun servers for the backup servers; and GB Ethernet server network-a very nice < ?xm environment l version= "to 1.0" work encoding= in. However, " I SO- 8859this NT 1" ?> client had a return performance number of ~3 MB/second. TaNow ble obefore f Con t en t sjump to conclusions, this NT server was no slouch; it was nicely configured as well: you I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise Windows ( VERI TAS Ser ies)2000 SP2 I ntr oduction

2-GB RAM

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1 10/100 - Backup and Recover y Sy st em Requir em ents Ex plained Two Compaq NC3131 Chapter 2

- Business Requirements of Back up Systems

One Ethernet Compaq NC6134 Chapter 3 Gigabit - An I ntr odu ction to NetBackup Pa r t I I - Back up P roduct Tutor ia l

One Compaq Smart Array 431 Controller - Evaluating Stor age Media Requir ements

Chapter 4

Chapter 5 Compaq - Gener al Discussion onHBA Configur ation Two StorageWorks Chapter 6

- Monitor in g the Backup Pr ocess

Three Intel P3 550 Ot MHz Chapter 7 - Evaluating her Back up- Related Featur es and Options Chapter 8

- Gener al Tr oubleshooting Tips

As mentioned earlier, the storage on this server had a volume of 300 GB with 80 percent utilized, or - The Expanding Back up System approximately 240 GB of home directory data.

Chapter 9

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter - The Futthe uretroubleshooting, of Backup Before 10 we get into let's talk about what we should expect to see out of this client. Chapter 11 Maj or Players in the Ar ena Gigabit Ethernet theoretically canBackup give you nearly 100 MB/second transfer speeds. The 9840A, the Appendix - Com m and-Line face Gu ide slowest A of the three, is ratedI nter at 10 MB/second native and 35 MB/second compressed. So as you can Appendix B can - Glossar see, if we push ydata even at 40 percent of the Ethernet rate, we still should be able to keep that Appendix drive streaming-the C - Tuning Your operative Backup word andbeing Recovshould. er y Application However, we were only seeing 3 to 5 MB/second to

the tapeDdrive for this Recovery particularPlanning client. Now, there are several components that we can review here: Appendix - Disaster Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

Network

Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows Client I ndex List ofBackup Figur es server List of Tables

Tape hardware

List of Sidebars

Tape hardware connectivity to backup server Any one of these items could be the culprit at < our Day customer Day Up > site. As troubleshooter, it is your job to narrow your scope in order to bring closure to this issue quickly. One of the ways we do that is by logical deduction. Here's what we know about the problem: 1. It is not pervasive; in other words, it is not affecting all clients across the board. 2. Other clients are completing successfully to the same tape hardware as the failed client with relatively good performance numbers. 3. Our cursory review did not conclusively pinpoint a particular tape drive as the potential culprit. 4. It appears only to fail on full backup jobs; incremental jobs seem to finish, although they are beginning to fail as well. 5.

5. The NT/2000 servers are on a separate network from the UNIX servers, and while other < Day Day Up > NT/2000 servers are completing successfully, their performance could be better than what was observed. So we can eliminate some theBa items listver initially I m plem enof t ing cku pfrom an dthe Reco y: Thwhile e Reawe dinplan ess our strategic troubleshooting id what e f or we t h eknow, Ent er the pr ise procedure. BasedGuon backup server seems to be the least likely candidate causing the problem because by David other B. client Little backup and David jobs A. are Chapa completing ISBN:0471227145 successfully and with relatively good performance numbers. The &tape hardware the connectivity seem to be eliminated based on the John Wiley Sons © 2003 (340and pages) success rate of the majority of es ther eaders backupthrjobs fact that thereofwas inconclusive evidence to This guide tak oughand thethe necessar y steps deploy ing ser v ices by showing how to addrproblems-not ess the prove that there was a particular drive having detrimental to mention the fact that the ar chitectur it ations, and capabilities t he ex isting This leads us to focus our failing backup client has yete,tolim complete a FULL backupofsuccessfully. net wor k infr astr uctur e. troubleshooting efforts on the network and the NT/2000 client machine. Since the NT/2000 servers are on a separate network from the UNIX servers, which are not having this type of problem, it was reasonable weencoding= would include that in1"our < ?xm l version=that " 1.0" " I SO- 8859?> troubleshooting test plan. And, naturally, since we are at network Talooking ble o f Con t en t s timeout issues, the NT/2000 client machine is a candidate. So, of those two categories, components will we begin troubleshooting? I mplem ent ingwhat Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

Network I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

Speed from backup server to NT/2000 client machine

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2 Speed - Business Back up Systems from Requirements NT/2000 clientof machine to backup server Chapter 3 - An I ntr odu ction to NetBackup Pa r t I Client I - Back up P roduct Tutor ia l

Chapter 4 Chapter 5

- Evaluating Stor age Media Requir ements

NIC configuration-GIG/FULL DUPLEX - Gener al Discussion on Configur ation

Chapter 6 Disk - Monitor speedin g the Backup Pr ocess Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options Chapter 8

Copy - Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Use component of backup software to read disk ( i.e., bpbkar with NetBackup)

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 Disk - The Fut ure of Backup fragmentation Chapter 11 - Maj or Players in the Backup Ar ena

ScanDisk Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y

Number of directories

Appendix C - Tuning Your Backup and Recov er y Application Appendix DNumber - Disaster Recovery Planning Kit—Fr om End to Beginning of files Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

As we review this we first prioritize what we want to accomplish and make sure that as we Appendix F - Per forlist, m ance Test need Tech to Note move through the troubleshooting process, theWindows previous task leads to the next, when possible. So as Appendix G - Net Backu p Per form ance Tuning on

we begin, let's prioritize and document what our tasks will involve. Remember, a lot of troubleshooting is based on gut feel, so as you apply this in your environment, keep this in mind: There is no perfect List of Figur es method for troubleshooting, simply various styles. Choose your style and run with it. I ndex

List of Tables

List Sidebars Ourof plan was to focus on the client first and not the network, especially since we knew RAID5 was

involved. For those of you who don't know, RAID5 is great for writes but terrible for reads. With backup, we do lots of reads and very few writes. Knowing this made our troubleshooting job much easier. Picture, for example, a pebble in a pond. The initialDay break < Day Up >in the water by the pebble is our NT/2000 client, and each subsequent ripple is another one of our tests, ultimately leading us out to our backup server. A natural progression is a good practice to adhere to when possible. From the client, our test plan looked something like this: 1. Run ScanDisk, if we can get approval from the admin team for this box. 2. Copy data from disk in question to a separate disk, note time started and time finished, size (minimum 1 GB of data). 3. Use utility from backup software if available to read data from the disk in question. Note time started and time finished. Size should be a minimum of 1 GB of data. 4. Investigate number of files/directories. 5.

5. View properties of several directories,< note time. Day Day Up > We weren't able to run ScanDisk on the drive because the administration team thought it would take too long and didn't think that was going to be the problem anyway. We skipped to Step 2. Copying data from the command anBa entirely I m prompt plem ento t ing cku p separate an d Recodisk ver y:didn't Th e reveal Rea dinany essserious determent; of course, Gu idonly e f or1 tGB h e Ent er pr ise we were transferring of data. Next (Step 3) we used one of the programs that come with the ISBN:0471227145 backup software,by in David this case B. Little NetBackup, and David which A. Chapa actually is responsible for the file collection process to test the speed of John the disk. program called WileyThis & Sons © 2003is (340 pages)bpbkar.exe. We started a process that would copy the files to an infinitely fast device, the 'bitthr bucket,' eliminating network and isolating it at the This guide tak es r eaders ough the necessar ythe steps of deploy ing ser v ices by showing how to addr ess the NT/2000 client machine: ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

c:\Veritas\Netbackup\bin\bpbkar32 -nocont c:\ > NUL 2> e:\temp.f < ?xm temp.f l version= will contain " 1.0" encoding= all of the files " I SO-that 8859bpbkar 1" ?> has collected. This will grow considerably if there is a Talarge ble o ffilesystem Con t en t sor directory structure you are testing. I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise The text file collecting all of the files is going to a separate disk. Do not send it to the ( VERI Warning TAS Ser ies)

same disk you are testing with; otherwise, your testing numbers may be skewed. Be sure

I ntr oduction

toion time Pa r t I - I nt r oduct t o this Ba ckas upwell. and Recove r y in the Ent er pr i se Env ir onm e nt Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

When this was done at the customer site, the results were staggering. It took literally hours for it to - Business Requirements of Back up Systems simply read the files/directories off of this server. We finally canceled the process and delivered the Chapter 3 - An I ntr odu ction to NetBackup news to the administration team. However, this didn't mean our work was finished. We still had two Pa r t I I - Back up P roduct Tutor ia l other steps in our client plan, as well as our network plan, which we haven't even outlined for you yet. Chapter 4 - Evaluating Stor age Media Requir ements When the administration team saw the results, they reluctantly ran ScanDisk on the drive to see the Chapter 5 - Gener al Discussion on Configur ation with all red? We did. Defragmentation ran over the results. Have you ever seen a ScanDisk report Chapter 6 Monitor in g the Backup Pr ocess weekend and finished Monday morning. We all breathed a sigh of relief when that happened. But our Chapter 7 - Evaluating Ot heryet. Back up- Related es andimprovement Options troubleshooting wasn't over While we didFeatur see some in the performance, it didn't Chapter 8 Gener al Tr oubleshooting Tips meet our expectations, so we then followed our network test plan: Chapter 2

Chapter 9

The Expanding Back up System 1. NIC -configuration

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - speed The Fut ure of Backup 2. FTP from backup server to backup client Chapter 11 - Maj or Players in the Backup Ar ena

3. FTP backup toide backup server Appendix A - speed Com mfrom and-Line I nterclient face Gu Appendix B - Glossar y

4. Backup speeds from the backup client to backup server to bit bucket

Appendix C - Tuning Your Backup and Recov er y Application Appendix During our D -review Disaster of the Recovery NIC configuration, Planning Kit—Fr weom found End that to Beginning the NIC was set to AUTO-NEGOTIATE.

Apparently, the Iadmin applied a Compaq it ereset all of their NICs to AUTOAppendix E - when Business mpact team Analysis Planning Kit—TheNIC Storpatch, m Befor t he Calm NEGOTIATE. So onlyTest did this Appendix F - Per fornot m ance Techserver Note suffer because of it, but several others did as well. After we changedGthe NICBacku backp to DUPLEX, our backup speeds. As we anticipated, the backup Appendix - Net PerFULL form ance Tuningwe on tested Windows speeds were meeting and in some cases exceeding our expectations. I ndex List of Figur es

Now that the problem had been fixed, we really didn't need to complete our network test plan, but in order to maintain consistency, we did so. We performed FTP tests between the servers and found the List of Sidebars speeds to be quite acceptable. We even set up a NULL device on the backup server to test the network speed from client to server, isolating it from the tape devices and server back plane. Our goals were met, and these test plans were successful in helping us not only fix the problem but also in Day run Dayinto Up > documenting it for future administrators who

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Support Things to Check before Calling Your Dedicated Gu id e f or t h e Ent er pr ise Professional ISBN:0471227145 by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

Usually, we think about troubleshooting problems after things have failed. A little planning in the This guide tak es r eaders thr ough the necessar y steps of beginning really helps. Most backup applications have the ability to create their own specific logs. You deploy ing ser v ices by showing how to addr ess the need to know how logging and to enable logging. The ar chitecturworks e, lim itwithin ations,your and application capabilities of t hebeexprepared isting authors usually enable logging during net worall k infr astr uctur e. the initial installation so we have the appropriate logs if our initial attempts at backups and restores are not successful. After things are looking good, you should reduce or shut down logging. In some instances there can be a performance impact from logging, and < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> in all instances the logs will consume disk space. Ta ble o f Con t en t s

I mplem ent ing Backup andhow Recover y—The Readiness Guide for the Enter pr ise handles warning, error, and You also need to know each operating system in your environment ( VERI TAS Ser ies)

normal messages. You will discover that just about every operating system will handle these a little

I ntr oductionby default. On most UNIX systems you can see how the system will handle logging by differently Pa r t I - I nt ion t o Ba ck up and the Ent of er pr i sefile Envfrom ir onm nt looking atr oduct the /etc/syslog.conf file.Recove Here isr yainsample this aeSolaris system:

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

#ident "@(#)syslog.conf 1.5 99/02/03 SMI" /* SunOS 5.0 */ - An I ntr odu ction to NetBackup # Pa r t I I - Back up P roduct Tutor ia l # Copyright (c) 1991-1999 by Sun Microsystems, Inc. Chapter 4 - Evaluating Stor age Media Requir ements # Chapter 5 Gener al Discussion on Configur ation # syslog- configuration file. Chapter 6 Monitor in g the Backup Pr ocess # Chapter 7 Evaluating Ot her Back upand Options # This file is processed byRelated m4 soFeatur be es careful to quote (`') names Chapter 8 Gener al Tr oubleshooting Tips # that match m4 reserved words. Also, within ifdef's, arguments Chapter # containing 9 - The Expanding commas Back must up be System quoted. Pa #r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s *.err;kern.notice;auth.notice /dev/sysmsg Chapter 10 - The Fut ure of Backup *.err;kern.debug;daemon.notice;mail.crit /var/adm/messages Chapter 11 - Maj or Players in the Backup Ar ena Chapter 3

Appendix A - Com m and-Line I nter face Gu ide

*.alert;kern.err;daemon.err Appendix B - Glossar y *.alert Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

*.emerg

operator root *

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note

# if a non-loghost machine chooses to have authentication messages # sent to the loghost machine, un-comment out the following line: I ndex #auth.notice ifdef(`LOGHOST', /var/log/authlog, List of Figur es @loghost) Appendix G - Net Backu p Per form ance Tuning on Windows

List of Tables List of Sidebars mail.debug

ifdef(`LOGHOST', /var/log/syslog,

@loghost) # < Day Day Up > # non-loghost machines will use the following lines to cause "user" # log messages to be logged locally. # ifdef(`LOGHOST', , user.err /dev/sysmsg user.err /var/adm/messages user.alert `root, operator' user.emerg * ) As you can see, most of the messages you are interested in are logged to /var/adm/messages. On an HP-UX system you will see something completely different. Here is a sample /etc/syslog.conf file from an HP system:

< Day Day Up > # @(#) $Revision: 74.1 $ # # syslogd configuration file. # I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess # See syslogd(1M) for about the format of this file. Gu id e f or t h einformation Ent er pr ise # ISBN:0471227145 by David B. Little and David A. Chapa mail.debug John Wiley & Sons /var/adm/syslog/mail.log © 2003 (340 pages) *.info;mail.none This guide tak es r/var/adm/syslog/syslog.log eaders thr ough the necessar y steps of *.alert /dev/console deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim itroot ations, and capabilities of t he ex isting *.alert net wor k infr astr uctur *.emerg * e.

You are really looking for two things: the location of the log file and making sure it is not disabled. If

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> there is a hash (#) in the first column, then that line is commented out. By default, some systems have Ta ble o f Con t en t s

all the logging lines in the /etc/syslog.conf file commented out. You should enable the appropriate lines

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise to ensure logging ( VERI TAS Ser ies) is turned on. This log is where you would see if the system is reporting problems,

along with some of the processes that are running as part of the backup application as they also log to I ntr oduction

the system log. On Windows systems, the application will usually have its own logs. In addition, you will need to use- the event viewer to access the system logs and the application logs. You should also be Chapter 1 Backup and Recover y Sy st em Requir em ents Ex plained familiar with network error logging, since the network can play a very large role in backing and Chapter 2 - Business Requirements of Back up Systems recovering systems. The netstat command is commonly used to get a basic idea of the condition of Chapter 3 - An I ntr odu ction to NetBackup your network. Here is a sample netstat command output on a Solaris system: Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

# netstat -i - Gener al Discussion on Configur ation Name Mtu Net/Dest Address Ipkts Ierrs Chapter 6 - Monitor in g the Backup Pr ocess Collis Queue Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options lo0 8232 loopback localhost 434768 0 Chapter 8 - Gener al Tr oubleshooting Tips 0 0 Chapter 9 - The Expanding Back up System hme0 1500 burreed burreed 280473 0 Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s 546 0 Chapter 5

Opkts

Oerrs

434768 254050

0 0

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Playersshould in the also Backup Ar enaa troubleshooting manual that will provide helpful Your backup application include Appendix A - including Com m and-Line I nter face Gu ideand recommended actions. If you have a backup or restore information, a list of error codes

failure, you looky up the specific error code and get an idea of where the problem might lie. If it Appendix B - can Glossar appearsCto -beTuning network related, make sure you have good network connectivity between the Appendix Your Backupyou andshould Recov er y Application systemsDinvolved. YouRecovery could goPlanning to eachKit—Fr system what the network logs show. The Appendix - Disaster omand Endsee to Beginning troubleshooting manual mightAnalysis also suggest some commands to try. Appendix E - Business I mpact Planning Kit—The Stor m Befor e tAs he you Calminvestigate, be sure to

gather all logging information well as configuration information, so when you call the support Appendix F the - Per for m ance Test TechasNote hotline, you will already have the information that the support person needs to assist you.

Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables

< Day Day Up >

List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess How to Gather Information Gu id e f or t h e Ent er pr ise

by David B. Little and Chapa The different backup applications haveDavid their A. own mechanismsISBN:0471227145 or methods to gather data. With John NetBackup, Wiley & Sonsa©script 2003 (340 pages)'support' is provided with the system in VERITAS Software's named /usr/openv/netbackup/bin/ On a thr Windows the script of is in \Program Files\VERITAS\ This guidegoodies. tak es r eaders ough thesystem, necessar y steps deploy ing serscript v ices by showing how to addr ess the patch, version, and configuration NetBackup\bin\goodies. This can be used to gather system, chitectur e, limto it ations, capabilities of tthe he ex isting information. It canaralso be used gatherand information from application logs. The output of the script net wor k infr astr uctur e. is placed in a file that can be sent to the support folks to investigate any problems.

In addition, utility, NCVU, can be used to verify your configuration. For more information about < ?xm l version=a"newer 1.0" encoding= " I SO- 88591" ?> this utility, go to http://seer.support.veritas.com/docs/247698.htm . Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction

< Day Day Up >

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an Reco ver y:in Th eSelf-Diagnosis Rea din ess Where to Find Information tod Assist Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by David B. Little andinformation David A. Chapa The best source for troubleshooting is located in the application troubleshooting guide. John Wileyonline & Sonswith © 2003 (340 of pages) This information is located many the applications today and is accessible via hot keys. The operating system also contains valuable information to help in diagnosing problems, including the This guide tak es r eaders thr ough the necessar y steps of deployonline ing serdocumentation. v ices by showingAs how addr esssome the of the more complex configurations, man pages and other youtoget into ar chitectur e, more lim it ations, and capabilities of t heaex istingthere are actual diagnostic tools the troubleshooting also gets complex. If you are using SAN, net wor k infr astr uctur e. for the different elements in the SAN, such as the switch, the router, and even the host bus adapter (HBA). Each of these devices has its own set of error codes, logging facility, and monitoring tool. VERITAS also hasencoding= a log analysis < ?xm l version= " 1.0" " I SO-utility 8859- that 1" ?>you can download from their support FTP site. This utility is Tadesigned ble o f Con t s analyze the debug logs on either backups or restores. You can enter a job ID, and tot en help the utility will Backup extract and information for all the logs related job. This utility is available at I mplem ent ing Recover y—The Readiness Guide to forthe theselected Enter pr ise ( VERI TAS Ser ies) http://seer.support.veritas.com/docs/248369.htm .

I ntr oduction

As consider troubleshooting backup, remember, an application Pa r t you I - I nt r oduct ion t o Ba ck up andyour Recove r y in the Ent er pr i seit is Env ir onm e nt

that touches many parts of the system. With this in mind, you should become familiar with some of the assistance commands Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained and support tools available at the operating system level. Your backup application, such as Chapter 2 - Business Requirements of Back up Systems NetBackup, is an application, and as such, it relies on the operating system and its infrastructure to Chapter 3 - An I ntr odu ction to NetBackup accomplish its mission. Pa r t I I - Back up P roduct Tutor ia l Chapter 4

- Evaluating Stor age Media Requir ements Tools are available with most operating systems that will assist you in gathering additional information

Chapter 5 by - Gener al Discussion on Configur ation produced the operating system during its normal operation. The first place to look is usually the Chapter 6 Monitor in g the Backup Pr ocess system's own logs. Many times, errors that seem to occur in the backup application are actually Chapter 7 by - aEvaluating Ot her Backthat up- Related and Options triggered lower-level failure is seen Featur by thees operating system. Often, these types of failures are Chapter 8 Gener al Tr oubleshooting Tips reported to the application and in turn reported as an error code by the application. A case in point is a Chapter - The Expanding Back up NetBackup System Status 923 reported by NetBackup. describes this as a 'Cannot Connect on Socket' error. Pa r t I I I this - The r pri se I true, m pa ctthe of underlying Back up Sy ste ms While is Ente technically cause

is usually found to be a failure in the system

Chapter networking 10 - structure. The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena

Although this section cannot delve into all types of errors and their analysis, we hope that an explanation of how you may go about resolving issues will help you understand the interaction and Appendix B - Glossar y usage of the operating system tools as a means of troubleshooting and solving problems. We hope Appendix C - Tuning Your Backup and Recov er y Application that after finishing this chapter, you will begin to automatically think of the interaction of the application, Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning operating systems, mechanical infrastructure, and mechanical infrastructure software found in the Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm switches, routers, and drives that make up an enterprise. Appendix A - Com m and-Line I nter face Gu ide

Appendix F - Per for m ance Test Tech Note

In the next wephelp youance include the on infrastructure Appendix G -section, Net Backu Per form Tuning Windows used by the application itself as part of your troubleshooting technique. This will help you to become more efficient in your daily activities. I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

< Day Day Up >

plem en t ing Ba cku p an d RecoWith ver y: Th e Rea din ess Some ToolsI mto Become Familiar Gu id e f or t h e Ent er pr ise

ISBN:0471227145 David B.have Littlesome and David A. commands Chapa Most systems andbydevices form of or interfaces that can be used in Johnwill Wiley © 2003 pages) troubleshooting. We take& aSons quick look(340 at a few of them to help you better understand how the use of these additional tools cantak help problems rapidly. Many This guide es rresolve eaders thr ough themore necessar y steps of of these commands have deployon ingother ser v ices by showing how to addr ess the equivalent commands operating systems.

ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e. Following are some of the basic operating system commands: < ?xm l version= " 1.0" encoding= " I SO88591"signals ?> truss(1) - Trace system calls and on Sun Solaris Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise tusc( VERI TAS SerTrace ies) system calls and signals on HP systems I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

par- Trace system calls and signals on Silicon Graphics systems

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter These commands 2 - Business canRequirements be used to determine of Back up what Systems is happening within a given process. They can be

used when appears backup application is hung. By using truss or one of its equivalents, you can Chapter 3 -it An I ntr oduthe ction to NetBackup determine whether a particular Pa r t I I - Back up P roduct Tutor ia l

file residing on a filesystem, when accessed by the operating system,

could cause same type of hang occur.ements You can then confirm this by reading the file manually Chapter 4 - the Evaluating Stor age MediatoRequir using some of operating systemation command. In this case, the use of the system command od Chapter 5 - other Genertype al Discussion on Configur could be to enable youBackup to determine Chapter 6 used - Monitor in g the Pr ocess that a file had an incorrect symbolic link to it. Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options Another situation where the od command is used is to show that accessing a file on a drive would - Gener al Tr oubleshooting Tips cause the drive not to respond. This type of troubleshooting made clear that the problem was not with Chapter 9 - The Expanding Back up for System the application since it was waiting the operating system to return the requested data. Therefore, Pa r t I I I The Ente r pri se I m pa ct of Back up Sy ste m s the operating system. the corrective action must be accomplished within Chapter 8

Chapter 10 - The Fut ure of Backup

In the second example, theinsystem logs Ar should Chapter 11 - Maj or Players the Backup ena show a failure as a timeout posted by the drive. However, of the Iincorrect symbolic link in the first example, there were no errors and the Appendix A in- the Comcase m and-Line nter face Gu ide system was Appendix B - happily Glossar yspending its time trying to determine the endpoint of a circular link, resulting in the application to be hungand when trying back up a particular file. The od command can also Appendix C -appearing Tuning Your Backup Recov er y to Application be used Dto -manually the data on aKit—Fr tape to if the backup utility is writing the Appendix Disaster read Recovery Planning omhelp Enddetermine to Beginning expected headers and data on the tape.

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - it Per for m ancethat Testthe Tech Note application can either directly or indirectly cause a system to While rare, is possible backup Appendix G Net Backu p Per form ance Tuning on caused Windowsby interoperability between the different vendors' panic or crash. In some instances, this can be I ndex hardware or firmware versions. In these cases, analysis by all the vendors involved is required for the List of Figurtoesbe determined. By using commands such as crash, you can sometimes determine if the problem List of Tables problem is repetitive, which may signify a coding problem, or if it is random, which might point to some type hardware problem. It is not our intention to teach you system dump analysis; however, we want List of of Sidebars

to make you aware of some of the tools that are available. Other areas that you need to become familiar with are the utilities that are incorporated in some < Day Day Up > peripheral devices, including those that are part of the SAN, such as switches, bridges, and routers. Although the terms bridge and router are sometimes used interchangeably, in the networking world, a fine distinction may be made. A bridge allows the change of medium between devices. For example, the Chaparral FS1310 allows connections between SCSI devices and fiber networks. It is a bridge between the two technologies. With a router, there may not be a transformation of medium. No matter what you call the devices involved, failures at this level may result in the backup application reporting backup errors. Keep in mind that the backup application will probably be the first place that there is an opportunity for the error to become visible to the user. Within most devices that are on the SAN or network, there is also what one could consider a small operating system that is responsible for a particular type of activity. In these devices, there is usually a small command set that you can use to help determine the cause of a failure. These command sets can be used to show connections, errors, firmware levels, and so on. In addition, you can sometimes use these command sets to determine status of connections, health of the physical medium, and so on, as well as to determine where a

failure may be happening.

< Day Day Up >

< Day Day Up > I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Summary

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

bylooked David B. David Chapa when youISBN:0471227145 In this chapter, we at Little someand things to A. consider run into problems and have to Wileyand & Sons © 2003system. (340 pages) troubleshoot yourJohn backup recovery We looked at some of the tools and also provided some real-world examples you a better idea how toyapproach This guide to takgive es r eaders thr ough theofnecessar steps of problems or performance deploy ing ser v ices by showing how to addr ess the issues. ar chitectur e, lim it ations, and capabilities of t he ex isting net we worlook k infrat astr ucturtoe.handle growth in your enterprise and the accompanying growth In the next chapter, ways in your backup and recovery requirements. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s < Day Guide Day Up I mplem ent ing Backup and Recover y—The Readiness for>the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Chapter IGu 9: The Expanding Backup System id e f or t h e Ent er pr ise by David B. Little and David A. Chapa

ISBN:0471227145

Once you have designed (or inherited) your backup architecture, experienced a successful rollout, and John Wiley & Sons © 2003 (340 pages) had an opportunity to monitor the activity, performance, and usage, eventually it will be time to address This guide tak es r eaders thr ough the necessar y steps of growth and expansion. Naturally, the best way to address growth is to anticipate through capacity deploy ing ser v ices by showing how to addr ess the planning; however, most find in the middle ofofexpansion ar chitectur e, themselves lim it ations, and capabilities t he ex istingwithout the lifeboat of preplanning at their disposal. As a result, many of e.the decisions being made are reactive, based on the person or net wor k infr astr uctur groups that happen to be, figuratively speaking, threatening the most bodily harm. < ?xm l version= " 1.0" " I SO8859- 1" ?>you need about expanding your backup environment to In this chapter, we encoding= give you the information Tamake ble o fyour Con tlife en tas s a storage administrator as easy as possible. The backup tool you selected for your I mplem ent ing Backup and the Recover y—The Readinessof Guide pr ise environment will dictate practical application whatfor wethe willEnter be discussing in this chapter. For ( VERI TAS Ser ies)

purposes of illustration, VERITAS NetBackup is used in most of the examples, but when possible, a

I ntr oduction more generic approach for capacity planning is used. Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

React versus Respond - Business Requirements of Back up Systems

Chapter 2

Chapter - An Iaway. ntr oduYes, ction intomost NetBackup Time is3slipping environments the amount of time we are given for backup is Pa r t I I - Back up P roduct ia l shrinking. Neither of us Tutor has ever

been at a client site where we were told that we have been given

Chapter - Evaluating Media Requir ements another4 three hours for Stor the age backup window; that just doesn't happen-at least in our experience. Not Chapter 5 Gener al Discussion on Configur ation continues to grow, sometimes at an alarming rate. only is time slipping away from us, but the data Chapter - Monitor in g the Backup Pr ocess Once, a6 pristine backup environment would successfully complete every job before the window Chapter 7 Evaluating Ot her up- Related es andthe Options closed. Now we are strugglingBack to get all jobs Featur done within window. For the unprepared storage Chapter administrator, 8 - Gener this happens al Tr oubleshooting very slowly, Tipsalmost unnoticed, until one day you are faced with a report full

of failures begin to reactBack as up opposed Chapter 9 and - The Expanding Systemto respond to managers, administrators, and users who are atr tyour looking forI m their to be Pa I I I -desk The Ente r pri se pa ctdata of Back uprestored. Sy ste m s

We will try to illustrate this contrast in the next

paragraph, to Backup say that we are less likely to be productive when we react as opposed to Chapter 10 - but Thesuffice Fut ureit of wantArto move away from a reactive posture to a responsive being able properly respond. Chapter 11 -toMaj or Players in the We Backup ena posture A as -storage administrators. When Appendix Com m and-Line I nter face Gu idewe react we tend to occasionally lose our temper and make

irrationalBdecisions. Appendix - Glossar yConversely, with a responsive posture, we tend to start with a goal in mind, and our moves are planned and intentional. This means we need to plan for the eventual growth of our environment, again putting the onus on the people who control the budgets so they too may take a Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning responsive posture within their own job responsibilities. Appendix C - Tuning Your Backup and Recov er y Application

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

Appendix F -nature Per forto m ance Tech It's human reactTest when youNote feel you are being attacked. Within that context we do one of two Appendix G - or Net Backu p Per form ance on Windows things: fight flee. This concept hasTuning been around for a long time. In disaster recovery (DR) I ndex presentations, the presenter will normally ask how many in the audience actually have a DR plan. List of Figur es Inevitably someone speaks up and says, 'Yeah, it's my updated résumé'- in other words, a flee

response. List of TablesThen there are the shouting matches surely you have witnessed between a storage administrator List of Sidebars and a business unit manager when data was lost and couldn't be restored. What started out calm turned into a tsunami right before your eyes-a classic fight response. Both of those examples aren't healthy for our professional careers or our physical stature, so instead of the fight or flee reaction, let's be prepared with responsive solutions. You may never be able to avoid some battles, but < Day Day Up > if you have the right information to back your position up, then you as storage administrator can at least stay calm during the process and still be productive at the end of the day. When you can achieve this kind of harmony within your organization, you will find growing your backup environment to match the expansion of your enterprise is not as daunting as you might have otherwise believed.

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Capacity Planning Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by David B. Little and David A. Chapa In a previous chapter we discussed how to plan for your initial backup architecture, including the John Wiley & Sons © 2003 (340 pages) following considerations:

This guide tak es r eaders thr ough the necessar y steps of

What data todeploy back ing up ser v ices by showing how to addr ess the

ar chitectur e, lim it ations, and capabilities of t he ex isting

How much data net wor to back k infr astr up uctur e. The rate of change for that data < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> TaCapacity ble o f Con t en t s is a very similar but easier exercise, since we have most of the information already planning I mplem ing Backup and information Recover y—The Readiness Guide forinterview the Enterofprthe ise data owners, you should be in our ent hands. Using the gathered during your ( VERI Ser ies) ableTAS to extrapolate an estimation of how fast the data will grow. Most database administrators that we I ntr oduction have talked to have a very good idea of the percentage of growth within their databases. Make sure Pa r t I ask - I ntthese r oductquestions ion t o Ba ck up and Recove r yinterview in the Entphase er pr i sewith Envthem ir onmto e ntmake you during your initial

this part of your capacity

Chapter 1 go- as Backup andas Recover y SyHere st em Requir em ents Ex plained planning smooth possible. are a few sample questions to ask data owners: Chapter 2 - Business Requirements of Back up Systems

How your Chapter 3 large - An isI ntr odudata/database? ction to NetBackup Pa r t I I - Back up P roduct Tutor ia l

What percentage of change happens to your data daily?

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5 - aGener al Discussion on Configur ation Is there particular point when the data changes more than usual? Chapter 6 - Monitor in g the Backup Pr ocess

How of that change is actual data growth? Chapter 7 much - Evaluating Ot her Back up- Related Featur es and Options Chapter 8

- Gener al Tr oubleshooting Tips Can you anticipate an annual percentage of growth?

Chapter 9

- The Expanding Back up System

Pa r t I What I I - The r pri se I m pa ct of Back up Sy ste m s areEnte your recovery expectations?

Chapter 10 - The Fut ure of Backup

The most part ofincapacity planning Chapter 11 important - Maj or Players the Backup Ar ena is determining where your data plateaus during the

backup schedules and retentions you have subscribed. It is the plateau that will allow you to properly size your environment. The charts and tables to follow graphically represent the equations we have Appendix B - Glossar y used to arrive at the results found in our examples. Even though these equations look daunting, trust Appendix C - Tuning Your Backup and Recov er y Application us, it is only math and we will explain in detail how we are achieving these numbers. Appendix A - Com m and-Line I nter face Gu ide

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Appendix E shows - Business I mpact m Beforat e taheclient Calmsite with regard to growth Table 9.1 a sample of Analysis some ofPlanning the dataKit—The we haveStor collected Appendix F - Per for m ance Tech Noteeasy, we converted frequency and retention levels to days. and capacity planning. ToTest make things Appendix G - Net Backu p Per form ance Tuning on Windows

Table 9.1: Capacity Planning Chart I ndex ListSERVER of Figur es

AMOUNT OF DATA

FULL FREQUENCY (DAYS)

RETENTION (DAYS)

~100 GB

7

28

List of Tables ListMammoth of Sidebars

INCREMENTAL FREQUENCY (DAYS)

RETENTION (DAYS)

PERCENTAGE OF CHANGE

REQUIRED STORAGE

1

14

10%

520 GB

< Day Day Up >

Here we will present to you the formulae used to calculate the required backup storage media need for the server, Mammoth, based on the maximum retention level, or 28 days. The percentage of change comes from our initial interview of the data owners, who may know the estimated percentage of change, or by simply taking a rough estimate, for the sake of example we are going to use 10 percent as our rate of change. While this rate of change may seem high or low, it makes the examples much easier to visualize. If you are using VERITAS NetBackup, you may use their File System Analyzer tool, which may give you a more accurate view. The chart in Figure 9.1 visually represents the equation used to define the total capacity required for the full backups. While you may not need a chart to understand how much data a full backup will take, this graphic and these equations are a consistent method for which to use in modeling your backups.

Let's take some time to understand the Backup Models. < Day Day UpThe > top portion of the figure is a graph that represents the days along the x-axis (1-33), with the data (D-Amount of data backed up) backed up running along the pos-y-axis and the data changed (pD) along the neg-y-axis. Whenever we use an arrow in the positive direction on the y-axis, it represents a backup that has been run, while an arrow in I m plem en t ing Barepresents cku p an d Reco ver y:data Th e (pD, Rea din ess p is the rate of change and D the negative direction on the y-axis changed where Gu id e f or t h e Ent er pr ise is the amount of data). Notice the Ff (Full-frequency) between #1 and #2, this represents the number ISBN:0471227145 by David B. Little and David A. Chapa of days between scheduled full backup jobs. Also note none of the changed data (pD) is being backed John Wiley & Sons © 2003 (340 pages) up. Since this is a Full Backup Model no distinction is made between changed data and unchanged This guide tak es r eaders thr oughlater. the necessar y steps of data as with the Incremental Models discussed deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting The Total Backupnetgraph shown directly below it presents a graphical view of how we reach our data wor k infr astr uctur e.

plateaus and when. As you can see from the chart, Full Backups performed every 7 days and retained for 28 days means that we will need 4D or 4 times the total amount of data backed up with each Full. < ?xm l version= " 1.0" SO-is 8859?> A much easier wayencoding= to look at" Ithis the 1" formula. If we keep the fulls for twenty-eight days, then we will Tahave ble o a f Con t en t s of four full backups stacked at any one time. Using our example, 4D or 400GB will maximum I mplem ent ingfor Backup andclient Recover y—The Guide for the Enter pr ise to. The incremental be required this one based on Readiness the policy requirements subscribed ( VERI TAS Ser ies) a bit more interesting as you will see in the following charts and graphs. backups become I ntr oduction

Now in Figure Pa r t I -again I nt r oduct ion t o9.2, Ba ck we uphave and Recove the familiar r y in the 33-day Ent ergraph, pr i se Env withir onm Datae nt (D)

backed up traveling on the

positive1 y-axis and the changed traveling on the negative y-axis. Notice once again, Ff is the Chapter - Backup and Recoverdata y Sy st(pD) em Requir em ents Ex plained number2 of -days between scheduledoffull backup jobs and now we have introduced If or the number of Chapter Business Requirements Back up Systems days between incremental backup jobs. This time we do show changed data ( pD) being Chapter 3 - Anscheduled I ntr odu ction to NetBackup backed up because thisTutor is a ia Differential Pa r t I I - Back up P roduct l Chapter 4

Incremental Backup Model.

- Evaluating Stor age Media Requir ements

For the next example we retain the differential incremental backups for 14 days. These numbers are - Gener al Discussion on Configur ation typical of most customer sites we have visited, so it's interesting to view these backup models because Chapter 6 - Monitor in g the Backup Pr ocess it paints a very clear picture of how much tape you actually require for your backup jobs. Day one we Chapter 7 Evaluating Ot her Back up- Related Featur es and Options have a full,-so the bottom graph does not show an incremental backup; however, on day two we Chapter 8 Gener al Tr oubleshooting Tips backuppD, which again is the rate of change × Total Data being backed up. This continues for as long Chapter 9 - The Expanding Back up System as the Incremental frequency defines itself or until a Full backup is required to run, which you can see Pa r t I I I The Ente r pri se I m pa ct of Back up Sy ste m happens on day 8 of the bottom graph shown bys a dotted line box. Notice our plateau is roughly 3× the Chapter 10 The Fut ure of Backup amount of data we are backing up. Chapter 5

Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

Figure 9.1: Full Backup Model.

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI Figure TAS Ser 9.2: ies) Differential Incremental Backup Model. I ntr oduction Pa rt I - Ia ntcumulative r oduct ion t oincremental Ba ck up and will Recove r y in data the Ent er pr i se since Env ir onm e nt Finally backup changed the last

full backup. In our example

here we1 are- retaining ourRecover cumulative for only seven days, not the 14 days as Chapter Backup and y Sy stincremental em Requir embackups ents Ex plained previously by theRequirements differential example. reason we decided on 7 is due to the sheer volume of Chapter 2 used - Business of Back upThe Systems data a cumulative retain. You will quickly appreciate our decision as you look at the graph. Chapter 3 - An I ntrwould odu ction to NetBackup Remember, theP roduct key here is where Pa r t I I - Back up Tutor ia l

does our data plateau. Day one, as shown in the top graph, is our

full backup, 2 is pDStor or rate change*Data, day 3 is 2pD, day 4, 3pD and so on. Since a Chapter 4 - day Evaluating age of Media Requir ements cumulative adds data changedation from the last full, the amount of data required becomes Chapter 5 -incremental Gener al Discussion on Configur significant. looking for the total data required for a cumulative incremental to be Chapter 6 -Essentially Monitor in gwe theare Backup Pr ocess

(p*D)+(2p*D)+ (3p*D)+(4p*D)+(5p*D)+(6p*D). So you can see from our bottom graph that by the - Evaluating Ot her Back up- Related Featur es and Options seventh day we are past 2x the total Data being backed up by the full, unlike the Differential Chapter 8 - Gener al Tr oubleshooting Tips Incremental where it took us approximately two weeks to reach that point. With that being said, it may Chapter 9 - The Expanding Back up System be prudent to perform full backup jobs more often if cumulative incremental is your preferred method, Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s this should greatly reduce the amount of tapes required for your backups. Now if you retain your Chapter 10 - The Fut ure of Backup cumulative backups for 14 days, you simply would IR/Ff*Cinc (cumulative incremental). Chapter 7

Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y

Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

Figure 9.3: Cumulative Incremental Backup Model. As a matter of practice we have included a proof for the differential incremental equation in Figure 9.4.

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

Figure 9.4: Proof of Differential Archive Size. I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained Grab a piece of paper and your number 2 pencil and follow along with the proof. Math is a wonderful

Chapter thing. 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa So r t as I I -you Back can up see, P roduct capacity Tutor ia planning l

is made much easier by employing these charts, graphs, and

equations. you setStor up your favorite spreadsheet Chapter 4 -After Evaluating age Media Requir ements application with these formulae you can begin to model your based on onConfigur estimated growth and proactively plan accordingly. Incidentally, Chapter 5 - environment Gener al Discussion ation since other allow you Pr toocess do similar types of backups, you should be able to use these Chapter 6 - backup Monitortools in g the Backup formulae to those environments as well. Chapter 7 to- apply Evaluating Ot her Back up- Related Featur es and Options Chapter 8

- Gener al Tr oubleshooting Tips

Note As a reminder, a cumulative incremental backs up all changed files since the last full - The Expanding Back up System backup. Differential incremental backs up all changed files since the last backup.

Chapter 9

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 Using - Thethe Fut ure of Backup Note information gathered during the interview process of the data owners should allow to or extrapolate of how fast the data will grow. Chapter 11 you - Maj Players in an theestimation Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide

Using the plateaus as your guide, this client will require approximately 520 GB of storage to sustain the full and differential incremental retentions subscribed to in the policy and 610 GB for the full plus a Appendix C - Tuning Your Backup and Recov er y Application cumulative incremental. Now if you have schedules that run once a month or once a year, these Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning calculations should work as well, but the real girth of your required storage will be in your weekly full Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm and daily incremental backups. If you are using a solution that employs the incremental-forever Appendix F - Per for m ance Test Tech Note paradigm, you should still be able to apply these formulae to help you size your environment. Appendix B - Glossar y

Appendix G - Net Backu p Per form ance Tuning on Windows I ndex By taking all of the numbers for all of your clients, which you so masterfully calculated using your

favorite spreadsheet, and multiplying them by the percentage of growth that you were able to ascertain List of Figur es from the data owners, you can plan for expansion by extrapolating them out by one year, two years, List of Tables three years, and so on. Ideally, the data owners have some idea of the percentage of growth; if not, List of Sidebars you can track that with a variety of tools-even a rudimentary UNIX shell script for NetBackup will help you track the data growth for a particular client, or some of the more expensive storage resource management (SRM) tools will provide that data to you as well. It seems everyone has an SRM tool < Day Day Up > today, so you shouldn't be too hard-pressed to find some to evaluate (in fact, you may even find some deployed somewhere in your environment already). Take the information on the data growth and present that to your management for future budgetary purposes. That way, they will not be shocked when the time comes to either update your tape library, add more disks, or hire additional team members to support the storage infrastructure. Understanding the dynamics of the environment will help during this phase of your approach. With this in hand, we will be able to better address the next few points in this chapter. When do I need to divide into multiple backup server domains? Do I need more backup servers in the domain or tape capacity or both? Given my data, what does that mean for my network requirements?

< Day Day Up > < Day Day Up > I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess The Great Divide Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by backup David B.products Little andon David A. Chapayou can add As with most of the the market, additional backup servers to offset John Wiley & Sons ©server. 2003 (340The pages) the workload of an overly burdened question is, when and what advantage or disadvantage is there whentak implementing a ough solution this?yInsteps this section, we will be using VERITAS This guide es r eaders thr the like necessar of ing tool ser v ices by showing how but to addr ess the speaking, the concepts you discover NetBackup as thedeploy backup for the illustrations, practically chitectur e, lim it ations, capabilities t hethe ex market isting as well. A word of advice within this chapterarcan be applied to mostand other solutionsofon net wor k infr astr uctur e. before we jump into this section of the chapter: Unless there is a compelling reason for additional server resources, maintain the existing environment for as long as you can to minimize its complexity.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> TaFor ble example, o f Con t enone t s of our clients who was using VERITAS NetBackup had a decision to make with

regardent to ing their expanding environment. They had Guide two buildings-for sake of this illustration, let's call I mplem Backup and Recover y—The Readiness for the Enterthe pr ise themTAS building A and building B-6 miles apart, with a fairly equal amount of data in each data center. ( VERI Ser ies) Both buildings had a large-capacity tape silo and dark fibre between the buildings-although the dark I ntr oduction fibre to ion be implemented-as well as a 2-GB network Pa r t I -was I nt ryet oduct t o Ba ck up and Recove r y in the Ent er pr i se pipe Env ir currently onm e nt

in use for connectivity. They knew they wanted to expand into building B; the decision before them was whether to add another Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained primary backup server or a secondary server within the current primary domain. The other challenge Chapter 2 - Business Requirements of Back up Systems presenting itself was a request from the business to readdress the architecture to meet their new data Chapter 3 - An I ntr odu ction to NetBackup requirements. Pa r t I I - Back up P roduct Tutor ia l Chapter 4

- Evaluating Stor age Media Requir ements The business unit managers made it known that they wanted their data secured off-site as close to the

Chapter 5 - ofGener al Discussion on possible. Configur ation completion the backup jobs as This seemed like an unrealistic expectation given that most Chapter 6 Monitor in g the Backup Pr ocess off-site vendors typically operate during normal business hours for pickup and delivery, unless you pay Chapter 7 - We Evaluating Ot her Back upRelated Featur andan Options a premium. did some personal research to seees what off-site vendor would charge for that type Chapter 8 Gener al Tr oubleshooting Tips of service, just in case the client asked for any input on the matter. If memory serves correctly, the Chapter 9 outweighed - The Expanding Back up System expense the benefit. They decided to look at other options, such as using the two buildings Pa t I I I - apart The Ente r pri se data I m paduring ct of Back up Syto ste m s'off-site' 6rmiles to move backup an

staging facility.

Chapter 10 - The Fut ure of Backup

One of 11 the -options would consist of placing a media server in building B within the domain of the Chapter Maj or Players in the Backup Ar ena

NetBackup master server in building A. The media server in building B would back up the data in the same building, then a copy would be created to be taken off-site.

Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y

Appendix Tuning Yourmaster Backupserver and Recov er y Application NoteC A- NetBackup manages the who, what, where, when, and why of the backup Appendix D polices. - Disaster Recovery Planning Kit—Fr om End of to aBeginning A backup server under the control NetBackup master server is called a media Appendix E server, - Business I mpact Planning Kit—The m Befor e t he Calm over physical storage which is anyAnalysis NetBackup server havingStor management control Appendix F devices, - Per for m anceas Test Techtape Notedrives, optical drives, robotic control, and robotic management. such tapes,

media willance respond to requests from the NetBackup master server for tape Appendix G The - Net Backuserver p Per form Tuning on Windows I ndex

mounts and optical mounts, and it tracks the physical condition and location of all the media.

List of Figur es

The architecture of this expansion takes on a new perspective, since this client was using VERITAS NetBackup Version 3.4, which does not support the pooling of the logical storage or storage units List of Sidebars (called storage unit groups in Version 4.5). List of Tables

Note Had the client deployed NetBackup Version 4.5, they could have used storage unit groups to contain the data to a geographic location. ForUpexample, if all the data in building B had to be < Day Day > backed up to building A, a storage unit group could have been created containing all of building A's storage units. Then all they would have had to do is modify the backup policies to use the storage unit group versus the single storage unit. If you find yourself running into this situation, you should consider an upgrade to Version 4.5. So this would mean that all backup policies for building B would have to specifically request the storage unit in building B. If building B never grows beyond its current size, this would work out beautifully, but as we know, data grows, so eventually they would have had to expand with yet another media server in building B. Then the complexity of this solution under NetBackup Version 3.4 increases and becomes much more difficult to manage. In this scenario, the administrator would basically be required to 'balance' the backup policies between the storage units. However, this didn't meet the original expectations of the business unit managers,

who wanted to have their data off-site as soon after the backup as possible. The idea of a cross< Day Day Up > building backup was introduced; again, this would have worked well with NetBackup Version 4.5, using the storage unit groups. Now we were starting to see the complexity ofReco having more backup policies and I m plem en t ing Ba cku p an d verto y:manage Th e Rea40 dinor ess Gu id e among f or t h e the Entstorage er pr ise units between buildings, as a result of the limited balance them properly ISBN:0471227145 by David B. Little and Davidthere A. Chapa functionality of pre-4.5 NetBackup. If ever were a compelling reason to upgrade to the latest John Wiley & Sons © 2003If (340 version of software, this is one of them. youpages) choose 'Any Available Storage Unit' in your backup policy, NetBackup will,guide in a round-robin any available unit not defined as This tak es r eadersfashion, thr oughselect the necessar y steps storage of deploy ing serbackup v ices bypolicies showingthat how to addr essdemand the demand only (meaning only specifically this storage unit may use it). If all ar chitectur e, lim itfor ations, capabilities of t he Storage ex isting Unit attribute, it very well means of the storage units are available use and by the Any Available net wor k infr astr uctur e. that data we want backed up to the other building might end up locally backed up. Youl version= can start" 1.0" to see more complexity building < ?xm encoding= " I SO- 88591" ?> up now. This is all a part of being a storage architect: planning based on customer expectations and working through all of the possible scenarios to come to Ta ble o f Con t en t s a reasonable solution. particular proved bethe theEnter wrong solution for this environment, I mplem ent ing Backup andThis Recover y—Thescenario Readiness Guidetofor pr ise givenTAS theSer customer's desire to remain at the current version. ( VERI ies) I ntr oduction

The second option explored was creating a completely separate NetBackup master server domain in building B. This would allow cross-building backup and effectively meet the expectations of the Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained business unit managers. The storage units could be created to be used by any backup policy, so no Chapter 2 - Business Requirements of Back up Systems 'over-administration' would be required for the backup policies; the backup from building A to building Chapter 3 - An I ntr odu ction to NetBackup B could happen without issue. Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4 issues - Evaluating Storuncovered age Media when Requir reviewing ements All of the that were the additional Media Server would have been addressed either Version 4.5 or by continuing with NetBackup 3.4 and Chapter 5 -byGener al upgrading Discussion to onNetBackup Configur ation

deploying second server. A higher priority was given to bringing building B online without an Chapter 6 the - Monitor in gmaster the Backup Pr ocess upgrade, an upgrade planned for some time year during phase III of the architecture Chapter 7 but - Evaluating Ot was her Back up- Related Featur es next and Options plan. 8 Chapter

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

If you go this route, you have two catalogs to back up and ensure are working properly, two separate client configuration files to maintain, two separate global configuration policies to maintain, two Chapter 10 - The Fut ure of Backup separate backup policies, media databases, and the list goes on. However, this was the best solution Chapter 11 - Maj or Players in the Backup Ar ena given what the customer was interested in doing. Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Appendix A - Com m and-Line I nter face Gu ide

The question of when Appendix B - Glossar y to divide into multiple backup servers is clearly answered by two words: It depends. on what your environment, the customers, and your business are willing to Appendix C It- depends Tuning Your Backup and Recov er y Application tolerate.DRemember, change for the sake of change adds potentially unnecessary complexity to Appendix - Disaster Recovery Planning Kit—Fr om Endonly to Beginning our already schedules storage administrators. Appendix E - busy Business I mpactas Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note

Tip Identify those compelling reasons for change, decide if the benefit outweighs the pains of change, then plan your work and work your plan.

Appendix G - Net Backu p Per form ance Tuning on Windows I ndex

List of Figur es

Advantages and Disadvantages of the Great Divide

List of Tables

List of Sidebars

There are advantages and disadvantages in any choices we make. For instance, consider the purchase of a new vehicle. You want more seating capacity-the advantage-but find that a larger vehicle requires more fuel to operate-the disadvantage. Further, the advantage may even become a < Day Dayseating Up > capacity, you find that you have become disadvantage. For instance, now that you have more the de facto chauffeur whenever you have those large group lunch outings. You can come up with many reasons why or why not to divide your configuration into multiple server domains. In the following, we outline some advantages and disadvantages of using a single backup server or master and multiple backup servers or masters:

Lone-Server Advantages The benefits of keeping a single master include having a single point of control, configuration, and backup image catalog repository. This doesn't sound like much when you are only talking about two servers, one master and one media. However, if you have one master and 22 media servers, it clearly minimizes the complexity of the environment. Single Point of Administration

< Day Day Up > There is one location to manage all of the servers within the domain. This includes all of the policy control, job control, device control, and media control. While additional server resources will add some complexity to your environment, having a single point of administrative control will minimize the management effort. I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

Central Catalog by Repository David B. Little and David A. Chapa

ISBN:0471227145

John Wiley & Sons © 2003 (340 pages)

The image catalog for VERITAS NetBackup typically will be the largest of all the catalogs that it This guide tak es r eaders thr ough the necessar y steps of manages, and it is a very critical piece of the puzzle when recovering client data. Having only one deploy ing ser v ices by showing how to addr ess the master means there is onlye,one for the image catalog which ar chitectur lim location it ations, and capabilities of t he ex istingmeans there is only one catalog to back up. net wor k infr astr uctur e. Central Configuration Control < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> TaBackup ble o f Con policy t en tchanges s or global configuration changes are made at one server for all of the backup

servers the domain. Again, if we are speaking of two or three servers, this might not sound that I mplem entwithin ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS but Ser ies) terrible, when the number reaches 22, you then start to see the benefit of a single primary or I ntr oduction master server. Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Storage Chapter 1 Access - Backup and Recover y Sy st em Requir em ents Ex plained Chapter 2

- Business Requirements of Back up Systems

With the additional device servers or media servers, there exist more storage devices to be used - An I ntr odu ction to NetBackup during the backup process and a sharing of the backup workload across all backup servers. If the Pa r t I I - Back up P roduct Tutor ia l reason for the expansion was performance related, this might help to increase the aggregate Chapter 4 -ofEvaluating Stor age Media Requir ements throughput the backup jobs. Chapter 3

Chapter 5

- Gener al Discussion on Configur ation Minimize Chapter 6 Complexity - Monitor in g the Backup Pr ocess Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Simpler is better. You are less likely to have a misunderstanding with some of the more junior - Gener al Tr oubleshooting Tips members of the administration staff, or even the more senior members. A single-master approach Chapter 9 - The Expanding Back up System also minimizes the site documentation that needs to be developed and maintained, which we know Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s can be tedious work. Chapter 8

Chapter 10 - The Fut ure of Backup

Chapter 11 - Maj or Players in the Backup Ar ena Scalability Appendix A - Com m and-Line I nter face Gu ide

At least B with- NetBackup, its strength is in its scalability; it can transition from a small to medium-size Appendix Glossar y site with Cone server Your actingBackup as both master media server to an environment with multiple media Appendix - Tuning and Recov and er y Application servers protecting the enterprise and all being controlled by one master server.

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

Lone-Server Disadvantages

Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning Windows The disadvantage of having a single masteronserver is also one of the advantages we listed previously: I ndex central repository of the image catalog and central configuration control. Some people find this to be a List of Figur es because it means a single point of failure. If you are running 22 servers and lose the disadvantage List of Tables master server, you have lost the control center for all scheduling of backups, whether or not you are

using NetBackup's scheduler. Plus you have lost all possibility of restoring any data until you recover List of Sidebars this failed resource. Yes, you do have the option of recovering data from the NetBackup tapes independent of having a NetBackup server, since NetBackup writes in a TAR-compatible format, but in reality, we know of very few people who choose this method < Day Day Up > of recovery. Therefore, if this backup server is considered critical and must be highly available, perhaps installing clustering software like VERITAS Cluster Server, IBM HACMP, or similar tools would be a benefit. Single Point of Failure Once we lose the master server, all backup, restore, and duplication possibilities are lost until this server is recovered and returned to an online status. This adds cost to the total cost of ownership, since we would have to purchase some clustering software to eliminate this disadvantage. Note that if you do elect to use VERITAS Cluster Server (VCS) or some other High Availability (HA) tool, you must not only failover the application if it is a master server, but you must failover the device control if it is also a media server. Figure 9.5 depicts a master server only, with no robotic or physical device control whatsoever, with VCS configured in an active-passive role. This, in our opinion, is the best approach when attempting to make NetBackup a highly available service, but also adds a higher cost of ownership.

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble Figure o f Con t 9.5: en t sActive-passive master server solution. I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

Central Catalog Repository

I ntr oduction

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Depending on the environment, this may look like a disadvantage. If the intention of the architecture

Chapter - Backup and Recover y Sy st em Requirthis em ents Ex plained was to 1protect against facility loss, then having centrally located for all client backups may be a Chapter 2 - Business Back up Systems disadvantage if you doRequirements not have the ofadditional software necessary to protect you from this facility loss. Chapter 3 if- you An Iare ntr odu ction to However, backing upNetBackup data from building A to building B and lose building A, you still have a Pa r t I I - Back up in P roduct Tutor l master server building B. Ifiayou further

set up building A to write its catalog backup to building B, you

Chapter 4 - Evaluating Stor ageAMedia Requir could restore data for building clients withements some minor configuration changes. It is a bit confusing, Chapter but on a 5 white - Gener board, al Discussion it becomes onvery Configur impressive ation and shows the power and flexibility of the solution.

Figure 69.6 illustrates architecture. Each building is performing its own local catalog backup to disk; Chapter - Monitor inthe g the Backup Pr ocess then by7design, each server backing up theFeatur opposite building's, Chapter - Evaluating Ot herisBack up- Related es and Options A to B and B to A. Therefore, when the backup master is done to building Chapter 8 - ofGener al TrAoubleshooting Tips B, master A's local catalog backup is protected in the process. Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Complexity

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena to your environment: The following may add much more complexity Appendix A - Com m and-Line I nter face Gu ide

Multiple Appendix B - catalog Glossar ybackups Appendix C - Tuning Your Backup and Recov er y Application

Client configuration files

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - policies BusinesstoI mpact Planning Kit—The Stor m Befor e t he Calm Backup createAnalysis and maintain Appendix F - Per for m ance Test Tech Note

Multiple of monitoring, reporting, troubleshooting, and so on Appendix G - points Net Backu p Per form ance Tuning on Windows I ndex

Necessity to create and maintain a balance in the distribution of data because of the limitations of

List ofthe Figur es existing product (i.e., NetBackup Version 3.4) List of Tables List of Sidebars Multiple-Server

Advantages

No doubt the format for the information in the next two sections is becoming very evident. Once again, where there are disadvantages in one environment, there < Day Day Up >are advantages to another. So let's take some time to briefly outline the advantages of having multiple master servers.

Figure 9.6: Two-master server configuration. < Day Day Up > Multiple Points of Recovery I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess

As in the exampleGu given, if the master domains are backing up one another's data, as well as backing id e f or t h e Ent er pr ise up the NetBackup Catalog information across buildings, then you potentially have built a much more ISBN:0471227145 by David B. Little and David A. Chapa resilient backup architecture, because you now have multiple points of recovery within your enterprise. John Wiley & Sons © 2003 (340 pages) If you are in a similar situation as described in this chapter-two buildings roughly 6 miles apart on This guide tak es r eaders thr ough the necessar y steps of separate power grids, with one of the buildings being used for an off-site staging area-in the event of a deploy ing ser v ices by showing how to addr ess the full facility disaster, either ofe,the could be usedof fort he a recovery ar chitectur limbuildings it ations, and capabilities ex isting site. For instance, if you lose building A for a considerable amount of time, but building B is still online, what you have lost in the net wor k infr astr uctur e. midst of this disaster is the backup service for building B; however, you have all of building A's data at the ready to be restored to any server the administration team requires in order to restore the business. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> If building B has the necessary hardware, a quick configuration change could be made to the client Ta ble o f Con t en t s files in order to successfully back up and protect its own data. I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

Independent Scalability

I ntr oduction

Pa r t in I -the I nt rprevious oduct ionexamples, t o Ba ck up and Recove rcan y in scale the Entas er pr i se Envwith ir onm e nt As NetBackup needed additional

device servers or media

Chapter 1 Having - Backup and Recover y Sythat st emtoRequir em ents Ex plained servers. two masters allows happen based on the environments independent of one another. could be made saying if you had one master, you would still be able to Chapter 2 An- argument Business Requirements of Back up that Systems

scale the independent of one another. That is true, but independent scaling goes Chapter 3 environments - An I ntr odu ction to NetBackup beyond just up adding more device Pa r t I I - Back P roduct Tutor ia l servers;

it also speaks to the ability to globally configure each of the

buildings as itStor is required an SLA or other service-level mechanism that your company Chapter 4 differently - Evaluating age MediabyRequir ements may have Chapter 5 enacted. - Gener al Discussion on Configur ation Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Secured Segregation

Chapter 8 -secured Gener al segregation Tr oubleshooting TipsWell, simply put, the two buildings are completely and totally What does mean? Chapter 9 The Expanding Back up System separated, each having its own set of security rights managed by perhaps two completely different Pa r t I I I - The Ente r pri seIn I mthe pa ct of Back up Sy ste m sbeen management groups. examples that have

given thus far, it would not make sense to

segregate rights of the administrators between buildings, but there might be a compelling reason Chapter 10 the - The Fut ure of Backup to do so. instance, youinmight have two administration teams within your company, a corporate Chapter 11For - Maj or Players the Backup Ar ena team and team. InI nter some that we have consulted with, this definite division exists, Appendix A a- regional Com m and-Line facecompanies Gu ide so having master servers fulfills the requirement nicely here, since the two groups have Appendix B multiple - Glossar y completely dataBackup protection security policies, schedules, and so on. Appendix C -different Tuning Your and strategies, Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Multiple-Master Disadvantages

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F this - Per for m ance Tech Finally, in section, we Test cover the Note last point of when to divide backup servers. We have read about Appendix G Net Backu p Per form ance Tuning Windows the advantages and disadvantages of singleonbackup servers and the advantage of multiple backup I ndex servers. We have simply listed bullets of the disadvantages of having multiple backup servers here, List of Figur since mostesof the advantages and disadvantages are similar whether you are using multiple or single List of Tables backup servers. List of Sidebars

Twice as much administration

Multiple points of administration < Day Day Up >

Configuration management Catalog management Much more complexity Most people design their backup environment with one goal in mind: to back up the data as efficiently and quickly as possible. Others, however, design their backup environments to include the newest technology toys. We're not against the fancy toys, but we are against unnecessary complexity and wasteful resources that eventually lead to an environment that is struggling to meet the service level agreements that your group has made with the business. Backup is a critical service, probably the most important role in the company next to that of the visionaries who create the future for the company. After all, backup protects these visionaries' intellectual property, and without it, we risk losing all of that precious data. Minimize your exposure by architecting a solid backup solution, but do it in a

way that makes the management of that environment feasible for everyone who will have any < Day Day Up > responsibility within the environment. Note Service-level agreements are typically used to define performance expectations for a given serviceIbetween customer provider. Some use this for internal m plem enthe t ing Ba cku p and an dthe Reco ver y: Th e Reacompanies din ess Gu to id etrack f or tperformance h e Ent er pr iseof the various computing solutions offered to the business purposes David B. Little David A. be Chapa units. Inbythis respect, theand SLA would between the ISBN:0471227145 IT group or the provider and the John & Sons © 2003 business unitWiley or customers. For(340 thispages) reason, it is very important that you properly manage the expectations for backup and recovery the veryybeginning. This guide tak es r eaders thr oughfrom the necessar steps of deploy ing ser v ices by showing how to addr ess the

The bottom line for ar chitectur the customer e, lim it in ations, the two andbuilding capabilities illustration: of t he exitisting was best to deploy two masters net wor infrmiddle. astr uctur e. because of the WAN in kthe When the WAN goes down, you essentially have lost all communication to the other facility, so if all you had was a media server in building B, you would be effectively down the WAN was fixed. They too would be in dire straits if the WAN went down, < ?xm l version= " 1.0"until encoding= " I SO88591" ?> based on their desire to back up between facilities, but it was a risk they were willing to take since they Ta ble o f Con t en t s had redundant network links by different providers between buildings. I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in < the DayEnt Day er pr Upi se > Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m Your plem en tNeed ing Ba cku p an d Reco ver y: ThResources e Rea din ess Determining for Additional Gu id e f or t h e Ent er pr ise

ISBN:0471227145 David B. Little andofDavid A. Chapa Now that we havebydetermined some the advantages and disadvantages of dividing our backup Wiley & Sons © 2003to(340 pages) domains, we will John look at when we need add more device hosts or media servers, tape capacity, or perhaps even both. This guide tak es r eaders thr ough the necessar y steps of

deploy ing ser v ices by showing how to addr ess the ar chitectur e, terms lim it ations, and capabilities of t server he ex isting Note VERITAS uses the device host and media interchangeably to indicate a server wor k control infr astr uctur e. that hasnet some of physical devices for the purposes of backup and restore with regard to VERITAS NetBackup. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s

When to Add More Device Hosts

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) Again using the NetBackup illustration, the good news is that adding device hosts or media servers is I ntr notoduction as daunting a task as determining whether or not to divide your backup domain. Typically when you Pa r t I that - I ntyou r oduct ion meeting t o Ba ck upyour and backup Recove rwindow, y in the Ent pr i se Envplenty ir onm eof nt capacity in find aren't buteryou have

your tape library,

Chapter 1 sign - Backup andneed Recover y Syast media em Requir em ents Ex plained some very basic mathematical it's a sure that you to add server. By performing Chapter formulas, 2 you - Business can determine Requirements the approximate of Back up Systems amount of data your current environment can actually

handle.3 First, identify any bottlenecks in your backup environment before you decide that you need to Chapter - An I ntr odu ction to NetBackup invest more anything. Pa r t I I -inBack up of P roduct Tutor ia l Chapter 4

- Evaluating Stor age Media Requir ements

As an example, let's look at a master server with one network interface and a 100-Mbps Ethernet on a - Gener al Discussion on Configur ation switched backup network, illustrated in Figure 9.7.

Chapter 5 Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Figure 9.7: 100-Mbps network bottleneck.

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix - Net Backu p Per form ance Tuning on Windows A single G100-Mbps interface is capable of handling approximately 12.5 MB/second, or roughly two

DLT8000 drives at native speeds of 6 MB/ second. This definitely looks like a potential bottleneck, and I ndex oneof would more than likely benefit by having an additional media server in place to share the burden. List Figur es List of Tables

With a GbE between the backup server and the switch, as illustrated in Figure 9.8, you can drive 125 MB/sec into the backup server, or approximately 20 DLT 8000 tape drives. Naturally, all of this would be dependent on the I/O interface to the tape drives, but assuming you had multiple SCSI interfaces or were using Fiber-connected drives, the numbers would hold fairly true. Would you really want to drive < Day not. Day At Up that > point you would want to expand to 20 DLT drives from one backup server? Probably another media server or another tape drive type. Table 9.2 shows tape drive statistics that you can use to help decide which drive type might be best.

List of Sidebars

Either by inheritance, slow growth, or, quite frankly, a very tight budget year, we will one day be faced with a backup environment that hops across networks. When the time comes, and budgets are loosening up, you definitely want to consider introducing a media server into this type of environment. Not only are you backing up another network, but also you are pulling all of that data across the network back to the media server to be written to tape. Wouldn't it be better to have that data remain within the network of its origin and only have to send the meta data back to the master server? We hope you answered yes. If you didn't, you are probably still under very tight budgetary constraints.

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise ISBN:0471227145

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

This guide tak es r eaders thr ough the necessar y steps of

Figure 9.8: GbE network deploy ing ser venhancement. ices by showing how to addr ess the

ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

Table 9.2: Drive Types and Speeds < ?xm l version= " 1.0" encoding= " I SO8859- 1" ?> NAME NATIVE SPEED CAPACITY Ta ble o f Con t en t s

COMPRESSION

DLT8000 6 MB/sec 40 GB Guide for2:1 I mplem ent ing Backup and Recover y—The Readiness the Enter pr ise ( VERI TAS Ser ies) SDLT220

I ntr oduction

11MB/sec

110 GB

2:1

Pa rSDLT320 t I - I nt r oduct ion t o Ba ck up and Recove r y 160 in the 16MB/sec GBEnt er pr i se 2:1Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

IBM LTO -Ultrium 15 MB/sec 10 GB Business Requirements of Back up Systems Chapter 3 - An I ntr odu19 ction to NetBackup 20 GB STK T9840B MB/sec Chapter 2

Pa r t I I - Back up P roduct Tutor ia l

STK T9940A 10 MB/sec 60 GB - Evaluating Stor age Media Requir ements

Chapter 4 Chapter 5

CAPACITY MAX 80 GB 220 GB 320 GB

2:1

200 GB

2:1

40 GB

2:1

120 GB

- Gener al Discussion on Configur ation

Let's look at an illustration to clarify this. In Figure 9.9, there is 1 TB of data located on clients D, E, and - Monitor in g the Backup Pr ocess F. If that is true, there would be a significant impact on performance when backing up between Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options networks. Adding a media server would streamline this solution by increasing the aggregate Chapter 8 - Gener al Tr oubleshooting Tips throughput through this division of labor. Chapter 6

Chapter 9

- The Expanding Back up System

Pa r t you I I I -can The see Entefrom r pri se I m pa ct of Back up Syinto ste m s Figure 9.10, we took consideration As

that we had more than enough tape

Chapter 10 our - The Futrequirements, ure of Backup but not enough horsepower. So instead of purchasing more tape drives for data drives and tape library, wereArable Chapter 11 -another Maj or Players in thewe Backup ena to connect two of the drives to the new media server and

keep twoA of- the on theI nter master Appendix Comdrives m and-Line face server. Gu ide This may not be possible in the event that distance plays a role, in which case ity would be prudent to then size the appropriate tape library for the second location Appendix B - Glossar and deploy media serverand along with Appendix C - another Tuning Your Backup Recov er yit.Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

Figure 9.9: Multiple network bottleneck.

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

Figure 9.10: Network enhancement. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> reason TaAnother ble o f Con t en t sto add a media server may be that the amount of data on a particular server has so

grosslyentoutgrown even abilityy—The of the Readiness network toGuide handle that it makes good business I mplem ing Backup andthe Recover for the the transfer Enter pr ise ( VERI TAS ies) sense to Ser upgrade that machine to become a media server. For example, let's say that under the best circumstances, it takes a GbE network 23 hours to do a full backup of a server with 1 TB of data that I ntr oduction needs backed That is rto say, is what Pa r t I - Ito nt rbe oduct ion t oup Baregularly. ck up and Recove y in the43 EntGB/hour er pr i se Env ir onmour e ntnetwork

can handle based on

the numbers we charted earlier. yWe need to carry TB,Exorplained 1000 GB, of data to the media server with a Chapter 1 - Backup and Recover Sy st em Requir em 1 ents full backup, dividingRequirements 1000 GB by of 43Back GB/hour gives us 22.72 hours. This probably doesn't meet the Chapter 2 - so Business up Systems acceptance for data at your facility, so the options are to either break down that Chapter 3 - criteria An I ntr odu ction protection to NetBackup server's storage or perform Pa r t I I - Back up P roduct Tutorlocal ia l

backups by making this server a media server. Using what you

learned4 in the Laying Out Your Backup Domain section in Chapter 3 to determine the memory, I/O, Chapter - Evaluating Stor age Media Requir ements

and processor requirements, make sure this new media server will be adequately outfitted with enough Chapter 5 - Gener al Discussion on Configur ation power to produce the results you expect. - Monitor in g the Backup Pr ocess

Chapter 6 Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

More Tapes Tape Drives, - Gener alor Tr oubleshooting Tips or Both?

Chapter 8 Chapter 9

- The Expanding Back up System

Again, we cannot stress enough that, in order to get the most out of your current and future investments, you need to find the bottlenecks in your environment before you start spending money. Chapter 10 - The Fut ure of Backup After you have done your due diligence, adding more tape is reasonably simple, especially if you went Chapter 11 - Maj or Players in the Backup Ar ena through the capacity planning section at the beginning of this chapter. If you find that you are getting Appendix A - Com m and-Line I nter face Gu ide errors in your backup reports saying backups are incomplete because of unavailable media, you have Appendix B - Glossar y an issue you need to address. This is done by understanding what is happening to your media. For Appendix C - Tuning Your Backup and Recov er y Application example, has it had multiple media errors during a previous backup session? If this is the case, has Appendix D - Disaster Recovery Kit—Fr om marked End to Beginning your backup application, in thisPlanning case NetBackup, this media unusable by freezing it? In this Appendix E Business I mpact Analysis Planning Kit—The m Befor t he media, Calm situation, you should create media reports and view theStor status of alle the identify those that have Appendix F Per for m ance Test Tech Note been marked unusable or frozen, and then investigate why this is happening. Alternatively, if your Appendix G - Netto Backu p Perfine form ance Tuning Windows media appears be just except for theon fact that most of it is in a full condition, you may have to I ndex remove some of the full media and replace with scratch media. If that is not an option, consider a List of Figur larger tapeeslibrary or an additional tape library. Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

List of Tables

When should physical tape drives be added? Well, again, it all comes down to math. If you have gathered all of the information related to your clients-tape drives, network speeds, SCSI speeds, fiber speeds-and so on, you are well armed to report whether your current environment will tolerate the amount of data you are looking to protect. See Table 9.3. You want to avoid 'shoe-shining' the drives Day Day Up > as much as possible. Shoe-shining is a term< used to describe a situation where a drive is not receiving data fast enough to keep writing and must wait to receive data; therefore, it rewinds a bit to reposition, then begins writing when the data finally arrives.

List of Sidebars

Now we will lay out some basic planning formulas that may be used in your quest for backup utopia. (By the way, if you ever find backup utopia, please let us know.) First, gather the information needed to perform the math: Network speed (10 Mbps, 100 Mbps, 1000 Gbps, etc.) I/O speeds to the storage device (SCSI, Fibre, Disk Channel, etc.) Output device speeds (we use the native speeds) Table 9.3: Example of Network Bottleneck and Proposed Resolution

TYPE OF SERVER

NETWORK FEEDS

Up > I/O < Day Day NATIVE SPEEDS DRIVE SPEEDS

OBSERVATIONS

plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Master server I m100 MB/sec 40 MB/sec 11MB/sec × 6 Find lowest common Gu id e f or t h e Ent er pr ise × 2 (2(6 SDLT denominator ISBN:0471227145 by David B. Little and David A. Chapa SCSI) 220s) John Wiley & Sons © 2003 (340 pages)

Real numbers Proposed

12.5 MB/sec 80thr MB/sec 66 MB/sec This guide tak es r eaders ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infrto astr uctur e.3 -drives / Upgrade Maximum GbE

Reached

SCSI

< ?xm l version= " 1.0" encoding= 1" ?> 1000Mbps" I SO- 8859-40 MB/sec Ta ble o f Con t en t s ×2

11 MB/sec × 3 on SCSI A

Network is a bottleneck To achieve maximum throughput 33 MB/sec

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise 11 MB/sec × 3 33 MB/sec ( VERI TAS Ser ies)

on SCSI B

I ntr oduction

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

125 MB/sec

80 MB/sec

Total

Chapter 1

- Backup and Recover y Sy st em Requir em entsaggregate Ex plained 66

Chapter 2

- Business Requirements of Back up Systems MB/sec

Chapter 3

- An I ntr odu ction to NetBackup

1GbE Pa rBest t I I -practice Back up P roduct Tutor ia l

40 MB/sec

to avoid × 3 ements Chapter 4 - Evaluating Stor age Media Requir

11 MB/sec × 2 on SCSI (22 MB/sec)

shoe-shining - Gener al Discussion on Configur ation Chapter 6 - Monitor in g the Backup Pr ocess (125 MB/sec) (120 11 MB/sec × 2 Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options MB/sec) on SCSI B (22 Chapter 8 - Gener al Tr oubleshooting Tips MB/sec) Chapter 5

Chapter 9

Headroom for burst speeds on the drives, which may reach 22 MB/sec

- The Expanding Back up System

11 MB/sec × 2 on SCSI B (22 Chapter 10 - The Fut ure of Backup MB/sec)

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Now, assuming of course that you used the recommendations in Chapter 4 for your server component selection, as memory, processors, and on, you will be on your way to that utopian land we all Appendix C such - Tuning Your Backup and Recov er yso Application

strive for. of the 'busy' work Planning may seem a bitom mundane, but it is a very worthwhile exercise, especially Appendix D All - Disaster Recovery Kit—Fr End to Beginning during budget time. See Table 9.4. Planning Kit—The Stor m Befor e t he Calm Appendix E - Business I mpact Analysis Appendix F - Per for m ance Test Tech Note

It's very helpful to create charts and spreadsheets like this for each of the servers you plan on using. Not only does it help you with these architectural decisions, but it may be the basis for your own site I ndex documentation, a task we all love to do. Furthermore, this exercise applies whether or not you are List of Figur es using NetBackup. Appendix G - Net Backu p Per form ance Tuning on Windows

List of Tables List of Sidebars Table 9.4: Example of a Server that Can Support More Tape Drives

TYPE OF SERVER

NETWORK FEEDS

I/O SPEEDS

NATIVE DRIVE SPEEDS < Day Day Up >

OBSERVATIONS

Master server

1GbE

Fibre Channel (100 MB/sec)

15 MB/sec × 4 (4 LTO Ultrium)

Find lowest common denominator

Real numbers

125 MB/sec

100 MB/sec

60 MB/sec

Room for ~2 - 3 more LTO drives

Best practice

125 MB/sec

Fibre Channel

Add two more LTO drives, bringing aggregate total to ~90 MB/sec

To achieve maximum throughput

< Day Day Up > What about Tape Technologies?

Many tape technologies are on the market; some were listed earlier in this chapter. How do we answer that question for you in these pages? We really cannot. You will know if you need new tape technology I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess based on your due diligence. Nothing we can write here will tell you definitively that you should change Gu id e f or t h e Ent er pr ise your tape technology (unless, of course, you are using a QIC drive for your backup; in this case, we ISBN:0471227145 by David B. Little and David A. Chapa would feel safe recommending that you at least give it some thought). But even after you have done John Wiley & Sons © 2003 (340 pages) your due diligence, what if you have a system that cannot push the data any faster than the QIC drive This guide tak es r eaders thr ough the necessar y steps of can read? What ifdeploy we said you should move off of those DLT 8000 drives and get into something faster ing ser v ices by showing how to addr ess the without first looking at your server, NIC, orand I/Ocapabilities to the drives? This would, of course, be ridiculous, and ar chitectur e, lim it ations, of t he ex isting anyone that claims tell uctur you different may also have a bridge in backup utopia to sell you too. netthey wor kcan infr astr e. Do some investigating. Interview the vendors, asking them for real benchmark test results, for the native speeds of their drives, not the theoretical numbers. Always look for the disclaimer, 'your mileage < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> may vary'-another way of saying results are not typical. Take the time to perform the math calculations Ta ble o f Con t en t s and see exactly what you are getting yourself into before you put your name on a proposal that carries I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise a price $1.2 million. Otherwise, you might find yourself surprised. ( VERI TAStag Serof ies) I ntr oduction

Alternative Network Solutions

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained How to2continue to meet the expectations business and finish your backups within the allotted Chapter - Business Requirements of Backof upthe Systems

time continues stand before There are some very good alternatives to the traditional approach; Chapter 3 - An to I ntr odu ction to us. NetBackup

most of what will be covered in this section has become more of the norm rather than the exception. In this section- we briefly cover the other network solutions you might want to look into as your backup Evaluating Stor age Media Requir ements system needs to expand and keep up with the expectations of the business.

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4 Chapter 5

- Gener al Discussion on Configur ation

Chapter - Monitor in g the Backup Pr ocess 10 6Mbps, 100 Mbps, 1 GbE Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Dedicated backup network Chapter 8 - Gener al Tr oubleshooting Tips Chapter 9

- The Expanding Back up System

Storage area network (SAN)

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup

10 Mbps, 100 Mbps, 1 GbE

Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - evaluating Com m and-Line I nter facelooking Gu ide for bottlenecks, we touched on the subject of moving up As we were our network Appendix - Glossar from 10 BMbps to 100y Mbps, or even 1GbE (1000 Mbps). The benefit as you slide up the scale is more Appendix and more C data - Tuning beingYour moved Backup along andthe Recov network er y Application pipe, and today most people have a switch in their

environment for their Recovery large servers. If you don't, be the first thing you place on the budget Appendix D - Disaster Planning Kit—Fr omthat Endmight to Beginning proposalEfor next fiscal year. Appendix - the Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note

There are several camps on this subject, but the rule of thumb we have always used has been the effective throughput of an Ethernet network is 1.25 MB/second for 10 Mbps, 12.5 MB/second for 100 I ndex Mbps, and 125 MB/sec for 1000 Mbps (1GbE), and even then, we tend to round those numbers down. List of Figur es SeeTable 9.5. Appendix G - Net Backu p Per form ance Tuning on Windows

List of Tables List Weofknow Sidebars some people, ourselves included, who use these numbers and apply an overhead reduction

to them of approximately 30 percent. It is a good baseline to start with while you are looking into the possibilities of uplifting your network to a higher-speed technology. With the knowledge of the previous sections in this chapter, you should be much< better equipped Day Day Up > to size or plan the deployment of your backup solution. Table 9.5: Ethernet Speeds 10 BT

10 Mbps

1.25 MB/second

100 BT

100 Mbps

12.5 MB/second

Gig Ethernet (1000 Mbps)

1000 Mbps

125 MB/second

Dedicated Backup Network You may find that even by upgrading your network bandwidth to 100 Mbps or even 1 GbE your primary network is so busy during the evening hours when backup runs that it would still hinder performance.

That's when you want to consider implementing a dedicated backup network. These are great if you < Day Day Up > can afford to put one in. All of the backup data travels across this dedicated backup network and nothing travels across your public network. Many customer sites that we have visited have dedicated backup networks, and the performance benefits are tremendous. A dedicated backup network I m plem en t inginBa cku p an d to Reco y: Thon e Rea ess requires an additional interface the servers be ver hosted this din new network. This also may require Gu modifications id e f or t h e Ent pr ise some configuration toeryour backup software in order to ensure you are using the ISBN:0471227145 byversus David B. andnetwork. David A. One Chapa dedicated network theLittle public of our customers has two dedicated networks, as John Wiley & Sons © 2003 (340 pages) shown in Figure 9.11. This guide tak es r eaders thr ough the necessar y steps of deploy ser v ices how tothat addr essdeploy the Normally, this would being a good timebytoshowing recommend you another device host, or media chitectur e, lim it ations, and capabilities of t he ex isting server. However,arwhile on site, we discovered that they had plenty of horsepower in the master server net wor k infr astr uctur e. to drive the tapes and receive the data, so it wasn't necessary to install another server in the domain. Instead we opted for another NIC to allow this server to method and saved the client's budget for other things in the enterprise. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter Figure 7 - 9.11: Evaluating Dual networked Ot her Back master. up- Related Featur es and Options Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Another method similar in look and feel is a SAN.

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10Area - The Fut ure of Backup Storage Network (SAN) Chapter 11 - Maj or Players in the Backup Ar ena

Sometimes TAN, for tape area network (if that's all being hosted on the switches), a SAN Appendix A - called Com maand-Line I nter face Gu ide

usually consists of some kind of fiber or fabric switch, host bus adapters (HBAs) in the servers, and a Appendix B - Glossar y

zoning configuration on the switches to ensure proper routing of devices and information. A SAN is very similar to what you are used to with traditional networking. A LAN, for instance, consists of a Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning switch or even a hub that has servers and other computing devices attached to it for the purposes of Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm sharing resources. Similarly the main purpose of a SAN is to share resources, but instead of a 100Appendix F - Per for m ance Test Tech Note Mbps switch, it is a fiber switch. Not only can servers attach to it but also storage devices, such as disk Appendix G - Net Backu p Per form ance Tuning on Windows and tape. A SAN is not as complex as you might think. Really, if you think about it, networking is just I ndex plumbing. You have a variety of pipes that connect together in order to deliver something. In a home, List Figur es it's ofwater; in a data center, it's data. So we have this elaborate piece of plumbing that allows the List of Tables sharing of resources in a very efficient and surprisingly fast manner. Appendix C - Tuning Your Backup and Recov er y Application

List of Sidebars

Figure 9.12 is a basic design of a SAN, two SAN routers for redundancy, a SCSI-to-Fibre bridge in order to bring the tape drives into the SAN, dual HBAs in the servers, and a master server, all connected to the SAN switches. This type of< configuration would enable the data to be read from the Day Day Up > SAN-attached clients and written to the SAN attached tapes, without having to traverse the public network with large amounts of data.

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

Figure 9.12: SAN attached master server. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s

There are many more possibilities with SANs in a NetBackup environment, which we discussed in the

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise Backing Up and Restoring in a SAN Environment section of Chapter 7. ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

< Day - Backup and Recover y Sy st em Requir emDay entsUp Ex > plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Summary

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

David B.quite Littlea and David A. Chapa In this chapter webycovered bit of ground, from capacity ISBN:0471227145 planning techniques and dividing our Wiley & Sons © 2003 (340 pages) backup domains,John to exploring the different types of networks that may be used to increase the performance of our environment. Here highlights of what we covered: Thisbackup guide tak es r eaders thr oughare thethe necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting Advantages and disadvantages of multipleand lone-master backup servers net wor k infr astr uctur e.

How to determine additional resource needs < ?xm l version= 1.0" more encoding= " I SO8859- 1" ?> When to"add device hosts Ta ble o f Con t en t s I mplem ent ing Backup and y—The Readiness Guide for the Enter pr ise Evaluating yourRecover network for bottlenecks ( VERI TAS Ser ies) I ntr oductionAdding more backup hardware Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

When to add more tape drives

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2 technologies - Business Requirements of Back up Systems Tape Chapter 3 - An I ntr odu ction to NetBackup

solutions Pa r t I Alternative I - Back up Pnetwork roduct Tutor ia l Chapter 4

- Evaluating Stor age Media Requir ements

We could probably dedicate an entire book to the topics in this chapter, and if the demand is there, we - Gener al Discussion on Configur ation just might do that. Until then, this should give you a good solid foundation on which to build your Chapter 6 - Monitor in g the Backup Pr ocess backup architecture decisions. Chapter 5 Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

< Day Day Up >

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Part III: The Enterprise Impact of Backup Systems Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa

ISBN:0471227145

Chapter 10: The Backup JohnFuture Wiley &ofSons © 2003 (340 pages) This guide tak es r eaders thr ough the necessar y steps of

Chapter 11: Major Players in the Backup Arena deploy ing ser v ices by showing how to addr ess the

ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e. < Day Day Up > < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Chapter IGu 10: The Future of Backup id e f or t h e Ent er pr ise

Overview

ISBN:0471227145

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

This guide tak es r eaders thr ough the necessar y steps of

The future of backup deploy sounds ing ser like v icesan byoxymoron: showing how Thetofuture addr ess involves the forward thinking, and backup ar chitectur e, lim it ations, itand capabilities of t he ex isting involves an archive or history. However, is critical to consider that sometime in the future, we will net wor k infr astr uctur e. need to recover what was done in the past to protect the present. This consideration is as critical as architecting, planning, installing, configuring, and even updating the backup and recovery solution for your enterprise. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s

So far, everything we have talked about has been based on the current technologies and techniques

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise available to ies) perform backup storage management for the enterprise. Throughout this book, we have ( VERI TAS Ser

made every effort to ensure that our content is not speculative and that the solutions and methods I ntr oduction mentioned are real solutions today. In this however, Pa r t I - I nt r oduct ion tand o Ba available ck up and Recove r y in the Ent er pr chapter, i se Env ir onm e nt

we take a peek into the crystal ball and see how possible changes in technology and business requirements will affect the way Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained you do backup and recovery. While this chapter contains some ideas and methods that are underway, Chapter 2 - Business Requirements of Back up Systems it also contains some speculation and conjecture, in hopes that the visionaries and innovators of this Chapter 3 - An I ntr odu ction to NetBackup space might take note or at the very least become inspired to develop our thoughts further. Having Pa r t I I - Back up P roduct Tutor ia l said that, we make no claims to having a better crystal ball than anyone else as we have tried to gather Chapter 4 - Evaluating Stor age Media Requir ements information from some of these very same visionaries and innovators. We are not saying this is the way Chapter 5 - Gener al Discussion on Configur ation it will be-just that these are some of the things that could happen. Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7 -inEvaluating Ot are her responsible Back up- Related Options We are seeing storage capacity The trends technology for Featur some es of and the changes. doubling year, resulting in our having more and more data to protect. Network bandwidth is Chapter 8 every - Gener al Tr oubleshooting Tips

doubling nine months.Back Network backups will remain plausible in some environments, but the Chapter 9 every - The Expanding up System overall data will Pa r t I I I -amount The Enteofr pri se Ito m be pa ctprotected of Back up Synecessitate ste m s

changes. Networked storage is becoming more

common, more intelligence being distributed throughout the SAN. These are seen as Chapter 10 along - The with Fut ure of Backup enablers the new backup technologies. Will we begin to see these hardware solutions and Chapter 11 to- some Maj or of Players in the Backup Ar ena softwareAsolutions closely Appendix - Com mintegrate and-Line Imore nter face Gu idefrom the backup perspective? Appendix B - Glossar y

Still, the greatest visionaries and innovators have not been able to expand the day beyond 24 hours to provide us the ability to back up this ever-growing critical data in light of the most prevalent problem, Appendix - 24 Disaster Recovery Planning Kit—Fr omservers End to cannot Beginning the needDfor × 7 backup operations. Backup be taken down for maintenance, as Appendix E Business I mpact Analysis Planning Kit—The Stor Befor e tThe he Calm they are expected to be running even during the productionmwindow. backup windows are Appendix F Per for m ance Test Tech Note disappearing, or rather, merging with the traditional production window, but at the same time, the Appendix - Net Backu p are Per form ance Tuning onisWindows recoveryGrequirements increasing. There a need for almost instant recovery options. In fact, I ndex backup and recovery is now being seen as an integral part of data availability, instead of just data insurance. Everyone wants to make the storage available on demand so that it can be logically moved List of Figur es around the enterprise and be used where it is most needed, but it still must be backed up. When you List of Tables couple this with the requirement to cluster everything, including the applications, the data, and the data List of Sidebars protection services, it makes backup and recovery even more challenging. This is leading to the idea of hot backup systems or even hot backup sites. Will we see more intelligent backup server software? Will backup become an appliance much like< we have seen happen with Network File System (NFS) Day Day Up > and electronic mail? Appendix C - Tuning Your Backup and Recov er y Application

As the futurists look at these trends and requirements, one important hardware trend stands out. The cost of disk versus the cost of tape hardware, along with relative performance, is changing very quickly. Tape drives are getting faster and media has more capacity, but the costs of both are going up. Disks are getting cheaper per bit every day, and now we are seeing inexpensive high-density disks with good performance and reliability. This trend makes disk attractive as a backup device or at least suitable for use in the backup formula. The high-speed access makes it very attractive as a recovery device. Will disk be the new backup medium, as we have seen in some cases today? What will happen to tape? Will solid-state solutions prevail? What will the longevity of these solid-state devices mean, if anything, for off-site storage capabilities? Another area being explored is the potential of merging or integrating different software products to provide an overall data protection strategy. The focus is not just on traditional backup anymore. This

integration is already happening with the introduction of some of the frozen image backup products < Day Day Up > available today. It looks like this trend is going to continue and include several different technologies. Some of the ideas and thoughts we explore in this chapter then are as follows: I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess

Virtual backup Gu id e f or t h e Ent er pr ise

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

Real-time backup

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of Synthetic backups deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities Hardware/software integration (embedded agents) of t he ex isting net wor k infr astr uctur e.

Intelligent backup server software < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Backup appliances Ta ble o f Con t en t s I mplem ent ing Backup and y—The Readiness Guide for the Enter pr ise Disk, solid-state diskRecover as backup storage ( VERI TAS Ser ies) I ntr Asoduction we found out when researching this chapter, many companies, unless they were ready to release Pa r t Igenerally - I nt r oduct ion t o Ba(GA) ck up version and Recove r y inproducts, the Ent erwere pr i se reluctant Env ir onm to e nttalk the available of their

about their futures, and

Chapter rightly so. 1 Therefore, - Backup and we Recover have used y Syour st emown Requir industry em ents experience Ex plained and customer interactions to develop

this chapter. This is our attempt at backup Even though it may never come to fruition, it's good Chapter 2 - Business Requirements of Back utopia. up Systems to dream. Chapter 3 - An I ntr odu ction to NetBackup Pa r t I I - Back up P roduct Tutor ia l

Chapter 4 Chapter 5

- Evaluating Stor age Media Requir ements < Day Day Up > - Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Virtual Backup Gu id e f or t h e Ent er pr ise

ISBN:0471227145 B. Little and of David A. we Chapa The future is now,byorDavid at least portions it, for are seeing some of the virtual backup technologies John Wiley Sons ©technologies. 2003 (340 pages)However, it hasn't made the main stage yet. This today with the integration of ¤t virtual backup feature involves making persistent frozen images of the This guide tak es r eaders thr ough the necessar y steps of data being protected and deploy ingThe ser vfrozen ices byimage showing how addra ess the or a snapshot. This offers a way for managing these images. can be to either mirror ar chitectur e, lim it ations, and capabilities of protection, t he ex istingand it allows you to encompass you to use disk storage to provide high-performance data net wor k infr astr uctur e. several technologies capable of providing versioned frozen images of filesystems or volumes. These local versions can then be accessed during restoration, instead of the data being accessed on tape or remote storage, you" Ito protect your < ?xm l version= " 1.0"allowing encoding= SO8859- 1" ?> data 'instantaneously' via an automated and manual Tafacility. ble o f Con t enway, t s the restoration of user data can be just as instantaneous as backups. The hope is In this I mplem to keep entmost ing Backup differences and Recover in the underlying y—The Readiness technologies Guide for away the from Enteryou, pr isethe end user. If data was ( VERI TAS Ser protected toies) tape or locally via a virtual backup, the user should be comfortable in locating and I ntr oduction either version of a file. This technology was actually introduced with VERITAS Software's recovering Pa r t I - I nt r oduct NetBackup 4.5.ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained The implementation this feature involves the integration of the frozen image technology with the Chapter 2 - BusinessofRequirements of Back up Systems

backup3technology. Thection realtoinnovation Chapter - An I ntr odu NetBackupis that the backup product controls the creation of the frozen

images, catalogs the data in the frozen image, tracks the versions of the frozen images, and facilitates restores from the frozen image. You can configure the number of frozen images to be kept (versions) - Evaluating Stor age Media Requir ements and how often they will be made. Since no data is actually transferred during the backup, this offers a Chapter 5 - Gener al Discussion on Configur ation very low impact backup option. The only real constraint is available disk space. The frozen images are Chapter 6 - Monitor in g the Backup Pr ocess disk images of the data, so the restore performance should also be almost instantaneous. Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter Gener al oubleshooting Tipsvirtual backups using VERITAS Software's VxVM mirrors. In Figure 810.1- shows anTrexample of doing Chapter 9 The Expanding Back up System this example, NetBackup is managing three mirrors plus the live volume. This gives the appearance of Pa r t I I I - mirrors. The EnteThe r pri se I m pa ct isofvery Backsimilar up Sy ste m sstorage rotating concept with

checkpoints. The biggest difference is that

with the10mirror model, must allocate all the disk space for all the mirrors before initiating virtual Chapter - The Fut ureyou of Backup backup.11With storage checkpoints, the disk space is allocated as needed, and the disk space is Chapter - Maj or Players in the Backup Ar ena deallocated am checkpoint The mirrors potentially have less system overhead but Appendix A - as Com and-Line I becomes nter face Guobsolete. ide will use more disk space. Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

Figure 10.1: Virtual backups.

< Day Day Up >

Other software solutions perform similarly by making periodic, scheduled point-in-time copies of the data. These solutions contain the changes only and not the entire file; therefore, they do not take up a significant amount of storage. The solutions typically will integrate with most backup solutions via some type of pre- and post-processing scripts. The future of virtual backups will be led by the backup software vendors and most certainly validated by the emerging technology companies that will provide this in a cross-backup-platform solution.

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Real-Time Backup Gu id e f or t h e Ent er pr ise

ISBN:0471227145 B. Little andthat David A. Chapadifferent technologies. Real-time backupbyisDavid another feature combines Here the data is backed up Wiley & resulting Sons © 2003 (340 pages) backups. The data is replicated to a second host (or replicated) asJohn it changes, in continuous and then backed This up from (target) hostthe to necessar tape. This moves guidethe taksecond es r eaders thr ough y steps of the backup burden to the target deploy ser v ices by showing to addr ess the system in exchange foring a steady impact on thehow source system and the network. Real-time backup also ar chitecturtoe,create lim it ations, and based capabilities of t he ex isting offers you the opportunity versions on more system-based events. Markers would be net wor k infr astr uctur e. used in the log stream to synchronize the source and target checkpoints with application quiescence. Some solutions today actually sit at the application layer, above the cache, and will replicate changes incrementally, rather than the" I entire filesystem. These software solutions may provide a higher level of < ?xm l version= " 1.0" encoding= SO- 88591" ?> Taprotection ble o f Conin t en t s event of a failure, since the replication may be committed before the actual source the information committed. I mplem ent ing isBackup and Recover y—The Readiness Guide for the Enter pr ise

( VERI TAS Ser ies) I ntr oduction

Backup and Replication

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter Backup andisRecover y Sy st em Requir em Ex plained Backup1 of a- filesystem typically accomplished byents copying files from the source hard disk across the Chapter Requirements Back up Systems network2 to -a Business network server hostingoftape drives. The backup system would need to 'walk' the Chapter 3 in - An I ntrto odu ction to NetBackup filesystem order accomplish its task. The frequency of the backups is governed by practical Pa r t I I - Back up P roduct ia l considerations such as Tutor network

impact, system impact, and available media. On the other hand,

Chapter - Evaluating Stor age Media Requir ements remote4filesystem replication products monitor changes to file objects and copy these changes to a Chapter 5 Gener al Discussion on Configur ation remote disk location for safekeeping. Some solutions choose to do a full file copy, block-level

changes, or delta changes of a file when they sense a file change. The remote Chapter 6 or- simply Monitorincremental in g the Backup Pr ocess replica 7can- be utilized for disaster recovery the case of major physical damage to the primary Chapter Evaluating Ot her Back upRelatedinFeatur es and Options filesystem. protection in this scenario Chapter 8 -Data Gener al Tr oubleshooting Tips occurs in real time as objects change. Its use is usually governed network impact, available replica storage, and overhead on the server. Figure 10.2 is an Chapter 9 by - The Expanding Back up System example of aEnte real-time configuration. Pa r t I I I - The r pri se Ibackup m pa ct of Back up Sy ste m s Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

Figure 10.2: Real-time backup-High level. What if we replicate only the block changes? Well, that's being done today, with VERITAS Volume Replicator, FalconStor's IPStor, EMC, Hitachi, and other solutions. What if we were able to back up only those changes for an infinite recovery level based on the retention of those blocks written to tape, as shown in Figure 10.3? Taking the block-level replication to the next level may include an option to integrate with the backup software that allows only those incremental changes to be written to tape, either continuously or scheduled. In the future, we may have the ability to recover a particular file from a particular point in time from blocks that are backed up or archived to tape after being migrated from the disk-based solution, providing an infinite level of recovery. The challenges that we will continue to face will be the backup of these very large databases and filesystems, and how to best protect this

critical data while ensuring we have a more loss. The trade-off with this type of solution is the dependence on the potentially proprietary nature of the data written to tape depending on the backup software with which this solution was integrated. However, in this solution, disk would be the primary backup medium and the tape backup would only plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess be for the backupI m server's purposes. Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements Figure real-time replication. Chapter 5 - 10.3: GenerFuture al Discussion on backup-Block-level Configur ation Chapter 6

- Monitor in g the Backup Pr ocess

Replication will play a major role in the future of backup, especially as we continue to see the data - Evaluating Ot her Back up- Related Featur es and Options growth scale higher and higher. Many of these replication solutions have been around for quite some Chapter 8 - Gener of al Tr oubleshooting Tips requirements, we either didn't require that level of time, but because our general business Chapter 9 The Expanding Back up System availability, found it to be cost-prohibitive, or simply didn't know it existed and worked as well as some Pa I I I proprietary - The Ente r pri se I m pasolutions. ct of Back up Syof stethe m s products that has found success in the mid-tier level ofr tthe hardware One Chapter 10 The Fut ure of Backup is NSI Software's Double-Take, shown in Figure 10.4. It will replicate a set of data at the application Chapter 11 - Maj or Players the Backup ena around for quite some time, but has not gotten proper level, before it reaches theincache. It hasAr been Appendix - Com mgeneral and-Linebusiness I nter facerequirements Gu ide attentionAbecause have not been sufficiently compelling to evaluate Appendix - Glossar y we are facing new challenges and new requirements that ask us to stage data this as aBsolution. Now in two orCthree different source, vault, and perhaps a third location for sanity Appendix - Tuning Yourlocations: Backup and Recovelectronic er y Application purposes. Double-Take you stage the data in such a manner, allowing for more Appendix D Solutions - Disasterlike Recovery Planningallow Kit—Fr omto End to Beginning granularity the replicated sets.Planning For instance, theStor firstmset of data the staging server might only Appendix E -inBusiness I mpactdata Analysis Kit—The Befor e t heto Calm replicateFa -subset that data to theNote next stage, and so on. Appendix Per forof m ance Test Tech Chapter 7

Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

Figure 10.4: Double-Take replication.

It is assumed that clients will target a remote< protection server that will host replicas of their data. Day Day Up > These replicas will be backed up to tape via normal scheduled backups. In this scenario, the protection server acts as a disk consolidation server and then performs optimized backups from this consolidated storage. This type of backup does not require a SAN, but the protection server storage I m plem t ing Ba cku pThe an dreplica Reco ver y: on Th ethe Rea din ess server can be backed up certainly could justify SANenconnectivity. data protection Gu id e fmethods or t h e Entorerany pr ise using traditional backup of the supported frozen image backups. by David B. Little and David A. Chapa

ISBN:0471227145

John Wiley & leverage Sons © 2003 (340 pages) and get even more benefits from real-time backup An anticipated way to further technologies is to use injected This markers the notify the remote guideintak es replication r eaders thrstream ough thetonecessar y steps of target or protection server that deploy ingquiesced ser v ices and by showing ess the application has been that it ishow safetotoaddr take a the snapshot. This allows the creation of ar chitectur e, lim it ations, andpotentially capabilities t he ex isting consistent point-in-time snapshots that can beofused for rollback and can be written to tape. net wor k infr astr uctur e. Figure 10.5 shows an example of this. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Figure- 10.5: Consistent snapshots. Monitor in g the Backup Pr ocess

Chapter 6 Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options Many different scenarios based on the combination of these technologies are being investigated, and

Chapter Gener Tr oubleshooting we are 8sure- we willalsee many of themTips come to market in the not too distant future. The ability to create Chapter 9 The Expanding Back up System consistent versions of data to protect against corruption while allowing for disk-based rollback to a Pa r t I I Iin- time The Ente r priattractive. se I m pa ct Coupled of Back up Sy ste m is s point is very with this

the ability to move data to tape for true data

Chapter 10 with - The Fut ure impact of Backup protection minimal on production systems and applications-a very attractive feature. Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y

< Day Day Up > Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Synthetic Backups Gu id e f or t h e Ent er pr ise

ISBN:0471227145 bywill David B. the Little and David to A. allow Chapaless frequent Synthetic backups offer technology full and cumulative incremental John Wiley acceptable & Sons © 2003 (340 pages) backups while still allowing restore performance. Generally speaking, you establish the frequency for fullThis backups recovery requirements and volatility guide based tak es ron eaders thr ough the necessar y steps of of data. The less frequently deploy ser vimages ices by showing how to addr essa the you do full backups, theing more will be required to do full filesystem or volume recovery. ar will chitectur e, lim it ations, and capabilities of from t he exaisting Synthetic backups create new (synthetic) full backups series of incremental backups and net wor k infr astr uctur e. new (synthetic) cumulative incremental backups from a series of differential incremental backups. The intent is that you will be able to schedule synthetic backups just like normal ones.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> synthetic backups is to manufacture a compact set of data from a disparate set TaThe ble obasic f Conidea t en t behind s

of dataent spread among pieces of removable media. is essentially I mplem ing Backup andmany Recover y—The Readiness Guide forItthe Enter pr ise a restore operation used to manufacture a new full backup. The first task in creating a synthetic backup is to determine the data ( VERI TAS Ser ies) that needs to be collected to manufacture your new image. For a synthetic full backup, the last full I ntr oduction backup isr oduct used ion as at oreference point for collecting thiserdata. aonm synthetic Pa r t I - I nt Ba ck up and Recove r y in the Ent pr i se For Env ir e nt

cumulative backup, the backup sets or images are peers of each other and can span any time period between the last full Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained backup and the current date. Chapter 2 - Business Requirements of Back up Systems Chapter 3

- An I ntr odu ction to NetBackup

The next task is to look into the catalog entries for the constituent backup sets or images and determine which files are necessary for the final new synthetic image. Basically, the most recent Chapter 4 Evaluating Stor age Media Requir ements unique sets- of objects are the ones desired for the synthetic backup. The time of the backup is used to Chapter 5 Genercorrectly. al Discussion on on Configur ation order the objects Based this information, the selected data is routed to a destination Chapter 6 Monitor in g the Backup Pr ocess media that will constitute a synthetic backup. At the conclusion of the operation, the files now need to Chapter 7 - Evaluating Ot her up-aRelated Featur es and Options be appropriately cataloged asBack either new full or cumulative incremental backup. You would now Chapter 8 Gener al Tr oubleshooting Tips have a viable new compact set of media that represents a point in time of your data as recent as your Chapter 9 - copy. The Expanding Back up System latest offline Pa r t I I - Back up P roduct Tutor ia l

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Once again, backup Chapter 10 - disk-based The Fut ure of Backupsolutions will add tremendous value when creating these synthetic full backups random serves quite well in this scenario. Chapter 11to-tape; Maj oritsPlayers in access the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Day Up > Appendix C - Tuning Your Backup and Recov er

< Day Day Up >

m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Embedded IAgents Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by David B.between Little andhardware David A. Chapa There is a lot of discussion vendors and software vendors about actually & software Sons © 2003 (340 pages) in the hardware. This could include backup software embedding someJohn levelWiley of the application as well as storage management SANthrmanagement software. It could also involve shipping the This guide tak es and r eaders ough the necessar y steps of deploy ser v icesor byactually showinghaving how tosome addr ess theof the software embedded in a storage backup agent within an ing appliance level chitectur e, limthe it ations, and capabilities of thave he exon isting library. One also ar must consider implications this would the manufacturer of the hardware. net wor k infr astr uctur e. This whole concept may birth an ever-needed standard for backup agent technology. Without this, the costs of this type of equipment may skyrocket because of the complexity found in the manufacturing of such a solution. The end user may8859have1"an < ?xm l version= " 1.0" encoding= " I SO?> option to install or upload an enhanced agent for the Tabackup ble o f Con t en t s you are using or decide to stay with the generic agent stub for cross-product backup software support. a generic stub embedded in the hardware, one pr ofise the benefits to the end user I mplem entWith ing Backup and agent Recover y—The Readiness Guide for the Enter ( VERI TAS would beSer theies) ability to use the 'best of breed' products to back up your devices. Your decision would no I ntr oduction longer be tied to the proprietary agent structure, if you didn't want it to be. Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Embedded upy the for true backups as well. The device will Chapter 1 - technology Backup andopens Recover Sy stdoor em Requir emserver-independent ents Ex plained no longer to be mediated by aofserver; embedded Chapter 2 need - Business Requirements Back up Systems technology would allow it to go directly to the

backup3storage eliminating the middleman and increasing the effective backup speeds of the Chapter - An Idevice, ntr odu ction to NetBackup environment.

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

Evaluating Stor age Media Requir ements Or perhaps- this agent stub wouldn't get updated at all by the reigning backup tool of choice. Perhaps it

Chapter 5 - Gener al Discussionenough on Configur ation on a particular socket to communicate with the would simply be configurable to connect Chapter 6 Monitor in g the Backup Pr ocess reigning backup tool of choice to receive all of its instructions for the particular process it is about to Chapter 7 It -becomes Evaluating Ot her Back up- Related es and Options perform. limitless in what it wouldFeatur be able to accomplish. Chapter 8

- Gener al Tr oubleshooting Tips It is much early to know Back exactly where this will finally lead, but it will be interesting to watch-and it's Chapter 9 too - The Expanding up System

even Pa r t I I Imore - Theinteresting Ente r pri se to I mspeculate. pa ct of Back up Sy ste m s Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide < Day Day Up > Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Intelligent Backup Software Gu id e f or t h e Ent er pr ise

ISBN:0471227145 David Little and David A. Chapa How intelligent dobywe wantB.the backup software to be? Well, let's speculate. First of all, let's all agree John Wileyisn't & Sons © 2003appreciated (340 pages) position in the company. In fact, the only time we that backup administrator the most seem to hear anyThis kindguide of comment is when therethe is anecessar problem. In most tak es r eaders thr ough y steps of cases, we find ourselves deploy ing ser v ices showing how tointroduced addr ess the having to track down problems thatby may have been by an undocumented system change chitectur e, lim it ations,who andwanted capabilities of his t heweekend ex isting started a little bit early on a thanks to a hastyarsystem administrator to get net wor k infr astr uctur e. Friday afternoon. We don't find out that the problem exists until backup starts at 10:00 P.M. or even later. Wouldn't it be great if the backup software could have some level of intelligence built in, to the point that it may beencoding= capable of re-installing < ?xm l version= " 1.0" " I SO8859- 1" ?>backup client software, discovering additional filesystems, Taperforming ble o f Con tsome en t s self-tuning, and handling other tasks that we usually have to perform?

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise In today's production environments, we rarely seem to optimize the server performance for fear that ( VERI TAS Ser ies)

weoduction may stop something from working. The basic rule of thumb is, 'if it ain't broke, don't fix it,' and if we I ntr decide hire consultants aneraudit, isn't a Pa r t I - I to nt roptimize, oduct ion twe o Ba ck up and Recoveto r yperform in the Ent pr i se which Env ir onm e nt

bad idea. But wouldn't you like to have a self-tuning backup server, or at least one that would email you an update of its findings Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained so you might proactively make adjustments and changes based on the recommendations of the Chapter 2 - Business Requirements of Back up Systems intelligent backup server? What about one that would periodically query clients to ensure that the client Chapter 3 - An I ntr odu ction to NetBackup software is installed and that the backup server can properly authenticate to the client? As Pa r t I I - Back up P roduct Tutor ia l administrators, we would rather find out about the problems at lunchtime than dinner or bedtime. Chapter 4 - Evaluating Stor age Media Requir ements Chapter 5 - true Gener al Discussion onPerhaps Configur the ationbackup servers in the future will dynamically load What about load balancing? Chapter 6 Monitor in g the Backup Pr ocess balance their ever-increasing data loads to the backup storage devices. Optionally, they would make Chapter 7 - Evaluating Ot her the Back up- Related Featur es and Options some logical choices before backup window opens and further refine those choices during the Chapter 8 Gener al Tr oubleshooting Tips backup process. Or even, as previously stated, this intelligent server could email us with Chapter 9 - The Expanding Back up System recommendations for load balancing before we allow it to make those changes. Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena < Day Day Up > Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Backup Appliances Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by David B.with Little and mail Davidservers, A. Chapa Why not? It has happened NFS, Web servers, Web caching, firewalls, and routers. John Wileyfor & just Sonsabout © 2003anything (340 pages)today. So why wouldn't it work with backup? The You can get an appliance model seems to be of solution; some companies Thisfitting guidefor takthis es rtype eaders thr ough the necessar y stepsare of trying to present turnkey ing ser v ices by showing how addrisess backup solutionsdeploy with industry-leading products, buttothat notthe a true appliance. That is a very nicely ar chitectur e, library, lim it ations, and capabilities t he ex isting integrated package of a tape SCSI/fiber bridges, of headless server, network connectivity with a net wor k infr astr uctur e. software solution-all nicely installed in the 19-inch rack or even in the tape library itself. That looks like an appliance, but it isn't there just yet. Perhaps the intelligent backup server and the appliance server would come "together at some point in the future, then tape libraries or large disk subsystems or server < ?xm l version= 1.0" encoding= " I SO88591" ?> Taarrays ble o f would Con t enbecome ts the appliances of the future for backup.

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise By definition, an appliance would have to contain some of the intelligence we talked about previously, ( VERI TAS Ser ies)

with much of the self-discovery built in for scalability as well. When you plug in an appliance at home, I ntr oduction shouldn't just theRecove switchron getEnt the Pa r t I - I nt ryou oduct ionhave t o Bato ckturn up and y intothe er benefit? pr i se EnvPerhaps ir onm e nt the backup

appliance model will follow this in the future-a self-discovering, self-configuring, self-tuning, highly available Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained decentralized backup Requirements database withofworkload sharing. An additional backup appliance will first Chapter 2 - Business Back up Systems configure itself on the network, look for a previously installed appliance, and either place itself subject Chapter 3 - An I ntr odu ction to NetBackup to this primary server or promote itself to the primary position. Pa r t I I - Back up P roduct Tutor ia l Chapter 4

- Evaluating Stor age Media Requir ements Having highly available backup servers with no dependency on a particular server that holds the 'keys'

Chapter 5 - would Gener albeDiscussion onof Configur ation for recovery a future all us would like to see. However, this is a very new concept. There Chapter 6 Monitor in g the Backup Pr ocess aren't many people out there working backup into an appliance model, at least not yet. Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System < Day Day Up >

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Devices Ba cku p an d Reco ver y: Th e Rea din ess Disk and Solid-State Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by David David A. Chapa Well, this isn't a future perB.se,Little but and it isn't something we would call an available commodity either. The John Wileyand & Sons © 2003 (340 pages) will hinge upon the backup storage companies, both proliferation of disk-based solid-state devices software and hardware, having abilitythr to ough adequately integrate hierarchical storage management This guide tak esthe r eaders the necessar y steps of deploy ices bydevices. showingPerhaps, how to addr the software will rely on a finely tuned (HSM) features into theing useser ofv these theess backup chitectur e, lim itthe ations, and capabilities of to t hetape ex isting hardware solutionarthat manages migration of the data for you without having to worry about net wor k infr astr uctur e. the backup application integrating with an HSM tool. This would help to untie the vendor-specific solutions and allow you to choose based on best of breed.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> recovery TaTime ble o ftoCon t en t s will continue to be the biggest hurdle for us in the future; therefore, disk or solid-state

devices be the answer. As we all know, theseGuide are not we must have the tools to I mplem entmay ing Backup and Recover y—The Readiness for limitless the Enterdevices; pr ise manage them ( VERI TAS Ser ies)effectively and with limited administration intervention. This again speaks to the intelligent I ntr oductionsoftware we hope to see in the future-built-in management of the storage from a much higher When solid-state devices are Ent integrated withir onm a backup Pa r t I - I level. nt r oduct ion tdisk o Ba or ck up and Recove r y in the er pr i se Env e nt

solution that provides some of the HSM technology, it becomes that proverbial bottomless cup of coffee that we long to have Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained available to us for backup and, more importantly, recovery. High-speed recovery won't come from Chapter 2 - Business Requirements of Back up Systems tape. As much as we love tape devices, we do not foresee a tape device that will be able to match the Chapter 3 - An I ntr odu ction to NetBackup speed of disk or solid-state disks. However, since we are in the chapter about the future, perhaps we Pa r t I I - Back up P roduct Tutor ia l will see a nice implementation of a 'RAID' tape solution that would provide those kinds of speeds. Chapter 4 - Evaluating Stor age Media Requir ements Unfortunately, you will still be required to mount those tapes, and since it is a sequential media, you will Chapter 5 - Gener al Discussion on Configur ation be able to perform only one restore at a time. That's the beauty of the disk-based solutions for Chapter 6 - Monitor in g the Backup Pr ocess recovery: It is a random access device capable of serving many, many requests at once; the only Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options limitations would be I/O and other factors. Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup

< Day Day Up >

Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Summary

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by David B. Littleof and A. Chapaand conjecture Well, this was a fun chapter…all theDavid speculation one can muster without having to John Wiley & Sons © 2003the (340future pages) is uncertain; however, the forecast becomes a bit apologize. Just as in any other industry, easier when we talk near future. have to give you of some of that in this chapter, and Thisabout guide the tak es r eaders thrWe ough the tried necessar y steps deploy ing ser v ices by how addr ess the that would be nice to have in place to we have also taken creative license toshowing speculate ontotechnologies ar chitectur lim it ations, and capabilities t he ex isting improve the climate for the e, backup administrator. While of our crystal ball may have some flaws, we think net wor k infr astr uctur e. the future should at least include some of what we discussed here. We will definitely see more integration of software technologies in the backup arena, and we will see disks being utilized more as their costs keep coming down. < ?xm l version= " 1.0" encoding= " I SOIt will 8859make 1" ?>the future very interesting. Perhaps in the next edition of this Tabook, ble o f'The Con tFuture en t s of Backup' chapter will be titled 'New Technologies.'

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise In the next, ( VERI TAS Serand ies) final, chapter, we look at several of the primary backup and recovery application

providers. I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1 Chapter 2

- Backup and Recover y Sy st em Requir em ents Ex plained < Systems Day Day Up > - Business Requirements of Back up

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Chapter IGu 11: Major Players in the Backup Arena id e f or t h e Ent er pr ise

Overview

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of

Someone once said, deploy 'Backup ing ser visices justbya showing tool. It doesn't how tomatter addr esswhich the one you have; it's just a matter of e, limdisagreed it ations, and of tback he exthen: isting 'Backup isn't just a tool; it is an how you utilize it.'arI chitectur vehemently withcapabilities that person net wor k infr astr uctur e. integral part of your organization's business functions. Being a very critical tool, it does make a difference which tool you eventually decide to use. Your data and sometimes your job or reputation depend on it.'" 1.0" It's interesting read those words now and have discussions with colleagues throughout < ?xm l version= encoding= to " I SO88591" ?> about Tathe ble years o f Con t en t sbackup storage management. We use the word 'tool' quite a bit in reference to backup, didn't even y—The realizeReadiness until the first draft thisEnter chapter I mplem entsomething ing Backup Iand Recover Guide forofthe pr ise had been written. ( VERI TAS Ser ies)

Backup is a tool, like a hammer-it serves a unique purpose with an anticipated outcome. When you hit I ntr oduction ar16-penny nail ion on tthe head hammer, causes the naile nt to Pa t I - I nt r oduct o Ba ck up with and a Recove r y in the the force Ent er pr i se Env ir onm

drive down into the wood until, eventually, the nail is firmly implanted into the piece of wood. Given the same scenario but with a slab Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained of concrete instead of the wood, the outcome would be different. The anticipated outcome now is quite Chapter 2 - Business Requirements of Back up Systems variable, because we are not using the right set of tools for the job. Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back P roduct Tutor the ia l Backup, as auptool, is exactly

same. Very simplistically, backup is designed to carry data from the

Chapter - Evaluating Stor age in Media ements clients 4to some end repository, mostRequir cases tape, to provide protection from loss by having the ability Chapter 5 Gener al Discussion on Configur ation to recover this data at some future point in time. If your environment's characteristics or requirements Chapter 6 - the Monitor g the Backup Pr ocess are unique, very insimplistic 'hammer and nail' approach to backup may need to be reviewed to Chapter 7 Evaluating Ot her Back upRelated Featurof es vendors and Options properly select the right tool for the job. A number in the market offer backup solutions; all store the on some end repository and all provide a means to recover that data in the event of a Chapter 8 data - Gener al Tr oubleshooting Tips

loss. However, methodsBack by which they accomplish these things play a role in the selection process. Chapter 9 - Thethe Expanding up System Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

In this chapter, we present an overview of the major players, the features, and the functions of the various products to help you identify the best tool for your environment. The selection was quite Chapter 11 - Maj or Players in the Backup Ar ena scientific; we actually used what the technology research bodies listed as the market leaders, then Appendix A - Com m and-Line I nter face Gu ide selected the top four: Hewlett-Packard (HP), IBM, Legato, and VERITAS Software. We discuss them in Appendix B - Glossar y alphabetical order by company name. When we did the research for this chapter, we asked the Appendix C - Tuning Your Backup and Recov er y Application individual vendors to provide their responses to the chapter outline. The outline was very simple: Chapter 10 - The Fut ure of Backup

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact AnalysisAPlanning Kit—The m Befor eand t hehow Calmthe product was developed Company/Product Overview. brief history of theStor company Appendix F Per for m ance Test Tech Note over the years into the current product available to the consumer market. Appendix G - Net Backu p Per form ance Tuning on Windows I ndex

Backup Methodology. The company's approach to backup, such as full plus incremental, progressive incremental, and synthetic full.

List of Figur es List of Tables

List of Sidebars

Principles of Recovery. A philosophical view of recovery based on the specific vendor product, such as tape cloning, duplication, or copy, depending on terms used by the vendor for the purposes of recovery of an entire system, server, < Day Day data Up > center, or even critical files or directories. Storage Support. What if any unique devices or number of devices are supported? If there were none that fit this criteria, this heading was not included in the Vendors section. Suffice it to say that each of these four vendors supports a wide range of backup storage devices. None of them seem to be lacking support for any of the most popular media types. High Availability. HA-aware products are more and more important to the 7x24x365 data centers, so we want to know who integrates with what product. Key Differentiators. How the vendors would position themselves up against the major players if you had them in a room together. This is the chance you have been waiting for. Here we document what each company views as their key differentiators-what makes them better, faster,

easier than the rest.

< Day Day Up >

As far as agent support or backup options, such as database agents, Microsoft product support, and Network-Attached Storage (NAS) support, we found that for the most part all of the vendors had agent support for Oracle, MS SQL Server, Exchange, SAP, Lotus Notes, and NDMP, I mInformix, plem en t Sybase, ing Ba cku p an d Reco ver MS y: Th e Rea din ess GuAnd id e fgiving or t h e them Ent erthe pr ise just to name a few. benefit of the doubt when there seemed to be some ISBN:0471227145 by David Little and David Chapa confusion, we added to theB.outline based onA.information publicly available on their Web sites. John Wiley & Sons © 2003 (340 pages)

Finally, in order toThis make this as even a playing field as possible, we took some editorial license with guide tak es r eaders thr ough the necessar y steps of some of the vendor responses, such removing deploy ing ser v ices byas showing howblatant to addrslams ess theagainst the competition and selfar chitectur e, lim it ations, and of t he ex isting promotional marketing speak. We believe thecapabilities following accurately and equally represents all of these major players. net wor k infr astr uctur e. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> < Day Day Up > Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an dOmniback Reco ver y: Th e Rea HP Data Protector (Formerly II) din ess Gu id e f or t h e Ent er pr ise

ISBN:0471227145 David B.inLittle David A. Chapa Hewlett-Packard,byfounded 1939and by Bill Hewlett and Dave Packard, has evolved over the last several Wileyone & Sons © 2003 (340 pages) decades into the John new HP, of the leading technology solution providers in the storage industry. HP recently launchedThis a new data product family, HPofOpenView Storage Data guide tak protection es r eaders software thr ough the necessar y steps ing ser v ices by showing how to addr the Protector, or Datadeploy Protector for short, that builds upon andess enhances their previous generation of data ar chitectur e, lim it ations, and capabilities of t he exadds istingnew levels of disk-based protection software, HP OpenView Omniback II. Data Protector net wor k infr astr uctur e. recovery and additional features for service-level management as part of the newest release of the software.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> OpenView Storage Data Protector software builds on a foundation of backup and recovery TaThe ble oHP f Con t en t s

software using distributed agent y—The technology first acquired HP withprtheir I mplem ent ing Backup and Recover Readiness Guide forby the Enter ise purchase of Apollo Computers the late 1980s. The second generation of this technology, HP OpenView Omniback II, ( VERI TAS Ser in ies) was first launched by HP in September 1994, and had been continually enhanced and improved since I ntr oduction then. current of HP's data software, OpenView Pa r t I - The I nt r oduct ionincarnation t o Ba ck up and Recove r y protection in the Ent er pr i se EnvHP ir onm e nt

Storage Data Protector,

was launched in June of Recover 2002. y Sy st em Requir em ents Ex plained Chapter 1 - Backup and Chapter 2

- Business Requirements of Back up Systems

- An I ntr odu to NetBackup Methodology ofction Backup

Chapter 3

Pa r t I I - Back up P roduct Tutor ia l

Data Protector incorporates a flexible architecture Chapter 4 - Evaluating Stor age Media Requir ementsthat enables any combination of full and incremental that can span up to nine Chapter 5 - backups Gener al Discussion on Configur ationgenerations, Incremental-1 through Incremental-9. This is a variation on the in traditional grandfather-father-son approach for backups. Typically, users will Chapter 6 - Monitor g the Backup Pr ocess

concentrate combinations of full a small number incremental backups to accommodate Chapter 7 - on Evaluating Ot her Back up-and Related Featur es andofOptions

their specific protection and recovery needs. Even though the power of up to nine levels of incremental - Gener al Tr oubleshooting Tips backup is available, recovering a lost directory from that deep a level would require copies of all nine Chapter 9 - The Expanding Back up System levels of incremental backups and the most-recent full backup, potentially a large number of tapes, Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s and it would take a bit of time to recover. Chapter 8

Chapter 10 - The Fut ure of Backup

Chapter 11 - Maj or Players in the Backup Ar ena

Principles of Recovery

Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y

Data Protector can support a variety of disaster recovery options. These options consist of the following:

Appendix C - Tuning Your Backup and Recov er y Application

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

Traditional manual disaster recovery. Reinstallation of the operating system, reinstallation of the Data Protector agent, and then recovery of the applications and data from a previous backup.

Appendix F - Per for m ance Test Tech Note

Appendix G - Net Backu p Per form ance Tuning on Windows I ndex

List ofAssisted Figur es manual disaster recovery. After a staff person manually reinstalls the operating

system on the downed server, the staff person uses the Data Protector's restore command from the management station to automatically restore the Data Protector agent to the downed server List of Sidebars and automatically initiate the restoration of the applications and data to the server from tape. List of Tables

Enhanced automatic disaster recovery. This approach uses recovery diskettes, or a recovery < Day Day Up > CD, that are prepared ahead of time using Data Protector to facilitate the unattended reinstallation of the operating system and Data Protector agent. The recovery of the applications and data can then be initiated in the usual fashion using Data Protector. One-button disaster recovery (OBDR). For Windows NT or 2000 servers having directly connected tape drives compatible with OBDR, Data Protector enables the creation of disaster recovery tapes supporting this approach. With One-Button Disaster Recovery, a recovery staff person can simply reboot the downed server while holding the reset button on the tape drive, with the OBDR tape loaded in that drive, and the server automatically identifies the tape drive as a bootable device and begins to load from that drive. When the process completes, the server has reloaded the operating system, applications, and data from the tape and copied them to its disk, and it is running in a fully operational state.

Disk-image delivery. In a SAN environment, < Day Day recovery Up > staff can connect a recovery server running Data Protector to the boot volume of the downed server over the SAN; restore the operating system, applications, and data of the downed server to that boot volume from tape; and then simply reboot the downed server, which comes up in a fully operational state. In a standalone disk I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess environment,Gu when corrupted and that server goes down, the recovery id e faorserver's t h e Entdisk er prbecomes ise staff can useby a recovery server that accommodates physical disk mechanisms compatible with the ISBN:0471227145 David B. Little and David A. Chapa original downed server to restore the operating system, applications, and data of the downed John Wiley & Sons © 2003 (340 pages) server from tape to the disk. Then the recovery staff can physically remove the disk from the This guide tak es r eaders thr ough the necessar y steps of recovery server, replace corrupted diskhow on the downed server with the new physical disk, and deploy ing serthe v ices by showing to addr ess the reboot the downed server toitcome in capabilities a fully operational ar chitectur e, lim ations,up and of t he exstate. isting net wor k infr astr uctur e.

Data Protector also supports copying backup tapes, for the purposes of providing added redundancy or sending a copy of backup tapes off-site for disaster recovery purposes. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s

High Availability

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

Data Protector is fully cluster-aware; the management station, disk agents, and media agents are all I ntr oduction cluster-aware components, asrvirtual cluster, Pa r t I - I nt r oduct ion t o Ba ck upoperating and Recove y in theresources Ent er pr i sewithin Env ira onm e nt

and they fully take advantage of the automatic failover capabilities within the clustering software. HP MC/ServiceGuard, Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained Microsoft Cluster Server, and VERITAS Cluster Server (with only disk agent support) have been Chapter 2 - Business Requirements of Back up Systems tested. Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I Protector - Back up P roduct Tutor ia l Data supports additional

capabilities within selected disk array architectures, including zero-

Chapter 4 backup. - Evaluating ageability MediatoRequir ements downtime This Stor is the eliminate backup windows by automatically invoking an Chapter 5 Gener al Discussion on Configur ation application-server-less, split-mirror, or snapshot backup, enabling 24 × 7 continuous operation without Chapter 6 - Monitor g the Pr ocess performance impactinon the Backup application server. It also provides instant recovery, which is the restoration of selected from split-mirror or snapshot recovery image on disk, rather than from a Chapter 7 - information Evaluating Ot her aBack up- Related Featur es and Options

recovery onaltape. This instant Tips recovery capability occurs much more rapidly than restoring Chapter 8 image - Gener Tr oubleshooting information disk, and inBack some cases, it can occur with no bulk movement of data within the disk Chapter 9 - from The Expanding up System array all. Both and Pa r t I I Iat- The Ente rzero-downtime pri se I m pa ct of backup Back up Sy steinstant ms

recovery facilitate 24 × 7 continuous operations,

and are10available outure -ofof-the box, integrated with Oracle, SAP, Exchange 2000, and MS-SQL, across Chapter - The Fut Backup Windows and Solaris environments. Chapter 11 2000, - Maj HP-UX, or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide

Key Differentiators

Appendix B - Glossar y

Appendix C - Tuning Your Backup and Recov er y Application

Data Protector's key differentiators versus other approaches are its tight integration Appendix D - Disaster Recovery Planning Kit—Fr omdata End protection to Beginning

with applications and storage arrays toPlanning enable Kit—The capabilities as einstant recovery and zero-downtime Appendix E - Business I mpact Analysis Storsuch m Befor t he Calm

backup. HP Data Protector provides a healthy breadth of capabilities, across the range of operating systems, applications, and storage arrays, as does HP itself. In particular, since Data Protector can Appendix G - Net Backu p Per form ance Tuning on Windows work with a combination of both local and remote mirroring software (in the case of the HP XP array as I ndex well as EMC Symmetrix), Data Protector can very easily form a part of a disaster-tolerant highList of Figur es availability configuration, where two separate sites, each with clustered servers and remotely-mirrored List of Tables data on external disk arrays, can operate in a 24 × 7 disaster-tolerant configuration while still enabling List of Sidebars routine protection operations utilizing split-mirror backups. Data Protector's tight integration with the applications in such environments, such as Oracle, SAP, and MS-SQL, enables automatic and dynamic selection of the data to be protected to ensure that each backup produces a fully recoverable < Day Day Up > image. Appendix F - Per for m ance Test Tech Note

As part of HP's industry-leading OpenView management environment, Data Protector has built-in integrations with many of the other components within OpenView, enabling the data protection functions to be managed using sophisticated service-level management techniques, and reporting on service-level compliance without extensive scripting or any manual analysis. These integrations with HP OpenView Operations, OpenView Performance, OpenView Service Desk, OpenView Service Navigator, OpenView Service Reporter, and OpenView Service Information Portal enable tremendous flexibility in managing an organization's data protection environment as a protection service, not just as a combination of tasks and technologies. It also enables protection service to be managed in the same way other IT services, such as servers, networks, and applications, are using the industry's most popular enterprise management environment.

< < Day Day Day Day Up Up > >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess IBM Tivoli Storage Manager Gu id e f or t h e Ent er pr ise

David B. Little and was David A. Chapa in the lateISBN:0471227145 IBM's WorkstationbyDataSave product developed 1980s at the Almaden Research John Wiley & Sons © 2003for (340 pages) Center to meet customer requirements distributed network backup. The product underwent significant redevelopment become thethr ADSTAR This guidetotak es r eaders ough thedistributed necessar y storage steps of Manager (ADSM) in 1993 and deploy ser vStorage ices by showing to addr essneed the for network backup emerged from was later renamed IBMing Tivoli Managerhow (TSM). The ar chitectur e, lim it ations, capabilities of t heofexpersonal isting distributed client/server computing drivenand by the proliferation computers and workstations. net wor k infr astr uctur e. The goal was to centralize the protection of distributed data in an environment where information assets were no longer restricted to controlled mainframe environments. Backing up individual computers to" 1.0" locally attached devices < ?xm l version= encoding= " I SO8859-was, 1" ?>and still is, costly and error-prone, and often does not meet Tarequirements ble o f Con t enfor t s disaster recovery. With IBM TSM, clients can back up their data to central servers, which ent store data and on aRecover varietyy—The of media and track its location for later I mplem ing the Backup Readiness Guide for the Enter pr iseretrieval. TSM protects data ( VERI Ser ies) failures and other errors by storing backup and archive copies of data on offline fromTAS hardware I ntr oduction storage. Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Scaling1 to protect hundreds of computers running dozen operating systems ranging from laptops to Chapter - Backup and Recover y Sy st em Requir emaents Ex plained mainframes connected togetherofvia the Chapter 2 - and Business Requirements Back upInternet, SystemsWANs, or LANs, TSM's centralized Web-based

management, move and store techniques, and comprehensive policy-based automation all Chapter 3 - Ansmart-data I ntr odu ction to NetBackup work together to minimize data protection administration costs and the impact to both computers and networks. Optional modules allow business-critical applications that must run 24 × 365 to utilize TSM's - Evaluating Stor age Media Requir ements centralized data protection with no interruption to their service.

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4 Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Methodology ofOtBackup - Evaluating her Back up- Related Featur es and Options

Chapter 7 Chapter 8

- Gener al Tr oubleshooting Tips

IBM TSM uses progressive incremental backup rather than the full-plus-incremental/differential - The Expanding Back up System methodology of some of the other backup solutions. Its sophisticated architecture allows it to just back Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s up new or changed files. Likewise, when you are doing a restore, only the version of the files requested Chapter 10 - The Fut ure of Backup is restored, so there is no need to restore a full and then incremental or differential backups on top of Chapter 11 - Maj or Players in the Backup Ar ena that. Chapter 9

Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y

Principles of Recovery

Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

TSM has the ability to automatically create as many copies of the backed-up data onto whatever type of media you specify. This capability can be scheduled for administrator ease. TSM only creates Appendix - Per forthat m ance Test Note backed up. TSM can also reclaim space on off-site copies. copies ofF the files were notTech previously Appendix G Net Backu p Per form ance TSM also can simultaneously createTuning copieson of Windows data at the time of initial backup. This is done with a I ndex simultaneous write to primary and copy storage pools. TSM has an open API that allows for integration List Figur es by of any interested third party or any company who wants to further integrate with TSM. The Kernel List of Tables Group (acquired by VERITAS Software) has integrated their Bare Metal Restore product with TSM, providing true bare metal recovery of a failed system. List of Sidebars Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

High Availability < Day Day Up >

IBM TSM supports integration with Windows clustering and AIX HACMP from a hardware integration perspective, and works well with IBM ESS (Shark) FlashCopy and EMC Symmetrix TimeFinder.

Key Differentiators One of the things that differentiates IBM TSM's product from the field is its relational database architecture and transaction logging. This enables a host of unique capabilities including: Backing up just files that have changed or are new Migrating data from one type of media to another Performing advanced tape management capabilities that allow for the reclamation of dead space

on tapes caused by expiring files

< Day Day Up >

Managing archives of data for a specified amount of time Performing accurate restores of files so that only the requested version of the files is restored I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

Allowing highly flexible policies that can be easily changed and made retroactive by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of < Day Up >ess the deploy ing ser v ices by showing howDay to addr ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Legato NetWorker Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by David B. Little and David A. engineers Chapa Legato Systems was founded in 1988 by four from Sun Microsystems (Jon Kepecs, Bob & Sons © 2003 (340 pages) an integrated set of storage management Lyon, Joe Moran,John and Wiley Russell Sandberg) to provide solutions and services that simplify the administration of client/server computing. Legato has a long This guide tak es r eaders thr ough the necessar y steps of deploy ser v ices by showing how to addr ess the was the first in the market to tradition of adopting andingdriving storage-specific standards. Legato ar chitectur e, lim it (OpenTape) ations, and capabilities of t he ex istingmanagement interface introduce a common tape format and a common media net wor k infr astr uctur e. (SmartMedia), and it codeveloped the NetWork Data Management Protocol (NDMP). In the increasingly important SAN market, Legato is both a founding member and a member of the Board of Directors of the Storage Network Association (SNIA) in the United States and Europe. < ?xm l version= " 1.0" encoding= " I SO-Industry 8859- 1" ?>

Ta ble o f Con t en t s

Legatoent NetWorker the critical byfor simplifying, centralizing, and automating I mplem ing Backupprotects and Recover y—The business Readinessdata Guide the Enter pr ise backup recovery operations across UNIX, Windows, Linux, and NetWare platforms in DAS, NAS, ( VERI TASand Ser ies) and SAN storage environments. Built upon open, highly scalable client/server architecture, the I ntr oduction NetWorker product reduces management providing Pa r t I - I nt r oduct ion t family o Ba ck up and Recove r y in the overhead Ent er pr i se by Env ir onm e nt'lights

out' protection of storage assets in the largest corporate data centers and the smallest satellite branch offices. Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained Advanced indexing and media management, cluster support, high-speed parallelism, cross-platform Chapter 2 - Business Requirements of Back up Systems tape interoperability, comprehensive NDMP support, backup to disk, tape cloning, archive, serverless Chapter 3 - An I ntr odu ction to NetBackup backup, and dynamic drive sharing are among the key components that enable IT organizations to Pa r t I I - Back up P roduct Tutor ia l protect storage assets and minimize downtime. Database, messaging, and ERP modules deliver Chapter 4 - Evaluating Stor age Media Requir ements online protection and granular recovery. Autochanger/silo modules enable hands-free protection using Chapter 5 - Gener al Discussion on Configur ation a wide variety of robotic devices. Storage nodes enable load sharing and distribution of backup traffic, Chapter 6 - Monitor in g the Backup Pr ocess and LAN-free protection of servers with large data volumes. NetWorker is also tightly integrated with Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options complementary Legato applications, such as hierarchical storage management (HSM), systems Chapter 8 - Gener al Tr oubleshooting Tips management frameworks, simplified operator administration, and Web-enabled management of Chapter 9 - The Expanding multiple NetWorker servers.Back up System Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup

Methodology of Backup

Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide

A NetWorker's scheduled backup may perform a full, incremental, consolidated, and/or level backup.

Appendix B - Glossar y A full backup (considered a level 0) consists of all files whether or not they have changed. An Appendix C Tuning Backup andthat Recov er ychanged Application incremental backupYour backs up files have since the last backup regardless of the level. Appendix D the - Disaster Recovery Kit—Fr om End to are Beginning However, incremental levelPlanning backups, of which there nine, allow you to creatively architect the Appendix - Business I mpact Analysisyour Planning Stor m Befor e t heback Calmup files that have changed manner Ein which you wish to protect data.Kit—The The incremental levels Appendix - Per for m ance Test Tech Note For example, a level 1 backup backs up all the files that since theF last lowered numbered backup. have changed last fullance backup (considered a level 0). A level 3 backup backs up all the files Appendix G - Netsince Backuthe p Per form Tuning on Windows

that have changed since the last level 2 backup, level 1 backup, or full backup. A level 9 backs up all I ndex theoffiles that List Figur es have changed since the last level 8,7,6,5,4,3,2,1,or full (0) backup. A consolidated backup backs up all data that has changed since the last full backup and subsequently merges these List of Tables changes with the last full backup, effectively building a synthetic full backup. NetWorker also has what List of Sidebars

is called 'skip' backup type, which skips a scheduled backup that may, for example, fall on a holiday or may be skipped if no one will be available to perform tasks such as change or add media volumes.

Principles of Recovery

< Day Day Up >

NetWorker Data Recovery takes full advantage of the information stored in its client file index and media database to quickly locate files and recover them to their original location or an alternate location if desired. The two methods employed by NetWorker for recovery are as follows: Client File Index-Based Recovery. An end user or administrator browses the client file index using graphical tools or command-line interface (CLI) and selects individual files or directories to recover. Save Set Recovery. An administrator or end user recovers an entire save set to the originating client from the NetWorker GUI or CLI.

In addition to these methods, NetWorker maintains the ability to recover data that has been expired by < Day Day Up > using a utility called scanner. Scanner reads a NetWorker volume independent of the NetWorker server, making it possible to rebuild the media database and client indices in the unusual event that the NetWorker database was inaccessible. I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e with f or t disaster h e Ent errecovery pr ise NetWorker is designed as a primary focus. If a disaster occurs-whether it is by system, David B.strikes Little and A. Chapa isolated to a single theDavid NetWorker server itself,ISBN:0471227145 or affects an entire site-NetWorker is John Wiley & Sons 2003 be (340restored pages) able to respond quickly so that data© can and operations can resume in minimal time. NetWorker protects databases by the creation of bootstraps. A bootstrap contains the site-specific Thisits guide tak es r eaders thr ough the necessar y steps of ing ser vserver ices byrequires showingtohow to addr information that adeploy NetWorker recover iness thethe case of a disaster. ar chitectur e, lim it ations, and capabilities of t he ex isting netproduct wor k infrprovides astr ucturdrive e. Legato's AlphaStor sharing and advanced media management for the NetWorker servers. As with other products, Legato customers often implement multiple NetWorker servers to maximize backup "performance, < ?xm l version= " 1.0" encoding= I SO- 8859- 1" ?>which naturally equates to increased complexity with multiple media databases and client file indexes having multiple points of administration. AlphaStor Ta ble o f Con t en t s helps to reduce this complexity providing a single andforconsolidated view of all NetWorker media, as I mplem ent ing Backup and Recoverby y—The Readiness Guide the Enter pr ise well TAS as other storage media. ( VERI Ser ies) I ntr oduction

AlphaStor's advanced media management includes the following:

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1 - Backup and Recover y Sy stinterface em Requir emdata ents center Ex plained A simple-to-use, browser-based for operation personnel Chapter 2 - Business Requirements of Back up Systems

On-site tapetorotation management and tracking Chapter 3 - and An I off-site ntr odu ction NetBackup Pa r t I I - Back up P roduct Tutor ia l

The ability to schedule, track, and automate movement of all media, regardless of location, based - Evaluating Stor age Media Requir ements on defined policies and utilizing tape retention policies defined within NetWorker

Chapter 4 Chapter 5

- Gener al Discussion on Configur ation

Chapter 6 to - Monitor in g the Backup Pr ocess Ability share tape devices and libraries across multiple NetWorker servers and storage nodes Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options

A consolidated of all media Tips and drive usage Chapter 8 - Gener alview Tr oubleshooting Chapter 9

- The Expanding Back up System

Consolidated reporting of tape pools and media by location

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Support for SAN environments Chapter 11 - Maj or Players in the Backup Ar ena

Much ofAthe- disaster recovery principles are contained within the functionality of AlphaStor. This is an Appendix Com m and-Line I nter face Gu ide add-on product and ynot included in the base product. Appendix B - Glossar Appendix C - Tuning Your Backup and Recov er y Application

High Availability

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

There isFextensive support for Tech clustered Appendix - Per for m ance Test Note environments, including Sun Cluster, Hewlett-Packard MCSG, IBM HACMP, Compaq Services, and Legato Availability Manager. It also Appendix G - Net Backu p TruCluster, Per form anceMicrosoft Tuning onCluster Windows has the ability to cluster NetWorker Servers.

I ndex

List of Figur es

Key Differentiators

List of Tables

List of Sidebars

The following are the key differentiators for NetWorker: The core product is engineered for performance, resiliency, and scalability. < Day Day Up >

13,000 enterprise customers utilize NetWorker worldwide; SAP standardizes on NetWorker (12+ TB daily), Sun protects six global data centers with NetWorker, 28 separate NetWorker OEM agreements (most in industry; example: Sun Solstice Backup is NetWorker OEM). It is the only data protection software shipping with every IBM LTO library, and the only data protection software shipping with every Oracle 8i and 9i database. It enables standardization on one application to protect information in the largest data centers, the smallest branch offices, and throughout a heterogeneous global enterprise. Open Tape Format provides tape interoperability between UNIX, Windows, Linux, and NetWare backup platforms, increasing disaster recovery and platform migration capabilities. Advanced indexing architecture eliminates risk of corruption and speeds file recovery.

Single location for index data simplifies and increases resiliency in the event of a storage node failure. It provides support for over 200 tape drives, 450 library models, and a variety of tape silos. I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e protection Ent er pr isefor NDMP-based Network-Attached Storage devices using It provides comprehensive ISBN:0471227145 by David B. Little and platforms. David A. Chapa UNIX, Windows, or Linux backup John Wiley & Sons © 2003 (340 pages)

It features theThis ability to back up locally, via third-party copy, or , remote to UNIX-attached library, to guide tak es r eaders thr ough the necessar y steps of ATL networkdeploy attached library, SAN.how to addr ess the ing ser v icesor byover showing ar chitectur e, lim it ations, and capabilities of t he ex isting

Through Direct it pinpoints file location for faster file recovery of NDMPnet Access wor k infrRestore astr uctur(DAR), e. based backups. Also featured are separate browse and retention policies and the ability to recover data without administrator assistance.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o Con t en tnative s It ffeatures library sharing plus an option to dynamically share drives between storage nodes I mplem entNDMP ing Backup Recover y—The Readiness Guide for the Enter pr ise and NASand in SAN. ( VERI TAS Ser ies) I ntr oduction It allows backup server, storage node, client, and application support for Linux. Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

The serverless frees applications network from the impact of backup Chapter 1 live, - Backup and backup Recover yoption Sy st em Requir em ents Exand plained operations. Chapter 2 - Business Requirements of Back up Systems Chapter 3

- An I ntr odu ction to NetBackup You can automatically back up to disk (JBOD and RAID), clone backups on disk to tape, or stage backups to disk before moving to tape-all with one-step recovery.

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter New 5 hardware - Gener alsnapshot Discussion modules on Configur enable ationinstant 'backup' and near line recovery. Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

< Day Day Up >

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess VERITAS NetBackup Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by Corporation David B. Littleisand A. Chapa leading provider VERITAS Software the David acknowledged of storage management Sons © 2003 to (340 pages) access, and manage data. No other company can software solutionsJohn thatWiley allow&enterprises protect, claim the depth and ofesheterogeneous solutions, fromy high to backup and recovery Thisbreadth guide tak r eaders thr ough the necessar stepsavailability of deployBy ingchoosing ser v ices by showing enterprises how to addr are ess not the tied to any proprietary platformto data management. VERITAS, ar chitectur e, lim it ations, and capabilities of t he ex isting implementation of best-of-breed hardware or software. Rather, VERITAS solutions facilitate choice-the net wor k infr astr uctur e. technologies for data protection, access, and management. Of Fortune 500 companies, 86 percent rely on VERITAS solutions.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> 1997, VERITAS TaIn ble o f Con t en t s acquired OpenVision Technologies and in doing so added VERITAS NetBackup to

its product developed over 10 years to provide scalable backup and recovery I mplem ent ingarsenal. Backup Originally and Recover y—The Readiness Guide ago for the Enter pr ise services at Chrysler Motor Corporation, NetBackup today remains VERITAS' flagship backup and ( VERI TAS Ser ies) recovery solution. NetBackup commands the coveted number 1 market share position, based on new I ntr oduction license revenue, and for delivering that Pa r t I - I nt r oduct ion to a Bareputation ck up and Recove r y in theinnovative, Ent er pr i sevisionary Env ir onmfunctionality e nt

provide real business value today. NetBackup's list of industry firsts and accomplishments includes the following: Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained Chapter 2

- Business Requirements of Back up Systems

First backup and recovery software solution based on a core three-tier architecture designed for - An I ntr odu ction to NetBackup performance and scalability

Chapter 3

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4 backup - Evaluating Stor age software Media Requir ements First and recovery solution to support multihost tape library sharing between Chapter 5 Gener al Discussion on Configur ation heterogeneous systems Chapter 6

- Monitor in g the Backup Pr ocess First and recovery software solution to es break 1 TB/hour backup barrier (July 1997) Chapter 7 backup - Evaluating Ot her Back up- Related Featur and the Options Chapter 8

- Gener al Tr oubleshooting Tips First backup and recovery software solution to offer dynamic tape drive sharing between UNIX and

Chapter 9 - The Expanding Back up System Windows systems (June 1999) Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter One 10of- only The three Fut uresolutions of Backup to back up 1 TB of data in under an hour and restore the same 1 TB of

data hour in at the a Storage Industry Association (SNIA) benchmarking event Chapter 11 in- under Maj or an Players Backup Networking Ar ena (March Appendix A - 2002) Com m and-Line I nter face Gu ide Appendix B - Glossar y

First backup and recovery software solution to break the 2 TB/hour backup barrier (April 2002)

Appendix C - Tuning Your Backup and Recov er y Application

Appendix D offers - Disaster RecoveryofPlanning Kit—Fr End tothe Beginning VERITAS two versions NetBackup toom address needs of the varied customer data centers: Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

VERITAS NetBackup DataCenter Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex

VERITAS NetBackup BusinesServer

List of Figur esDataCenter's core three-tier architecture-master server, media server, and client-offers NetBackup List of flexible Tables deployment options. Companies can create consistent policies across the business, truly List whether of Sidebars data is local, distributed, or remote. Leveraging the intuitive graphical user interfaces to

perform all backup and recovery operations centrally, customers can manage more data per administrator. < Day Day Up >

Based entirely on the code for NetBackup DataCenter, VERITAS NetBackup BusinesServer offers an alternative for companies who require the same enterprise-class backup and restore performance but for smaller, less complex environments. Targeted at heterogeneous (UNIX and Windows) workgroups, departments, and remote offices, NetBackup BusinesServer combines the concept of a master server and media server into a single BusinesServer Server. Mixed NetBackup BusinesServer and NetBackup DataCenter environments can be administered centrally via VERITAS Global Data Manager. In addition to managing all facets of backup and recovery through the launch of the NetBackup Administration Console, Global Data Manager also provides enhanced monitoring capabilities. Thresholds may be set to alert the administrator to abnormal situations, such as an unusual amount of down tape drives for a given server.

Methodology of Backup

VERITAS NetBackup utilizes the very traditional, method of backup, full and < Daytried-and-true Day Up > incremental. Incremental backups copy files that have changed since the last backup; this type of NetBackup backup is called a differential incremental. However, in Version 2.0 of NetBackup, engineering introduced True Image Recovery (TIR) that allowed the backup storage administrator to I m plem en t ing Ba cku p anord directories Reco ver y: to Thae specific Rea din point ess in time. One of the recover a failed disk or a deleted directory Gu id e f or t h e Ent er pr ise dilemmas of the old method was the fact that you may recover more data than you have disk space ISBN:0471227145 by David B. Little A. Chapa being there and potentially more files than theand userDavid remembered when the loss occurred. TIR John Wiley & Sons © 2003 (340 pages) addresses that problem by maintaining a 'rest-in-peace' database of all the deleted files. This requires This typically guide takno es more r eaders thr ough the necessar steps of very little disk space, than 2 percent of your ytotal image database. When a TIR deploy ing ser v ices by showing how to addr ess the restore is invoked, the software determines which tapes are required and which files need to be ar chitectur e, lim it ations, and capabilities of t he ex isting recovered basednet onwor thekrestore infr astr criteria. uctur e. The ending result is a disk or directory or directories with exactly what the user had anticipated from the last backup, a true image restore. While this is a" 1.0" significant improvement < ?xm l version= encoding= " I SO- 8859-over 1" ?> the traditional method, it still requires all of those Tadifferential ble o f Con incremental t en t s backup tapes, which may delay your restore slightly. This is why VERITAS introduced incremental backup, cumulative incremental, I mplem ent inganother Backup type and of Recover y—The Readiness Guide for the Enter pr ise a backup that copies all files ( VERI TAS Ser ies) the last full backup. The benefit of implementing cumulative incremental backup jobs is changed since I ntr oduction reducing the number of tapes required for a full recovery. Many customers have blended both Pa r t I - I nt r oduct ion t o Ba ck up and Recovebackups r y in the to Ent er pr se Env ir onmtheir e nt differential and cumulative incremental aid ini shortening

Chapter 1

recovery times from tape.

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems Principles of Recovery

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P recovery roduct Tutor ia l VERITAS views in terms

of information availability. How much do down systems cost your

Chapter 4 VERITAS - Evaluating Stor integrated age Media Requir ements business? offers solutions that can deliver as much as 95 percent uptime to Chapter 5 Gener al Discussion on Configur ation 99.9999 percent uptime or more. Via backup, Replication, Clustering, and global clustering, the

VERITAS suite supports of comprehensive disaster recovery plans based on the Chapter 6 product - Monitor in g the Backupthe Pr creation ocess required of information Chapter 7 level - Evaluating Ot her availability. Back up- Related Featur es and Options Chapter 8

- Gener al Tr oubleshooting Tips

Through VERITAS Software's recent acquisition of The Kernel Group, it now has added Bare Metal - The Expanding Back up System Restore (BMR) to their product offerings. BMR utilizes the TIR function of NetBackup to completely Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s recover systems to full operation without administrator intervention beyond a few clicks of the mouse Chapter 10 - The Fut ure of Backup via the browser-based interface. During a BMR installation, OS images are installed to the BMR server Chapter 11 - Maj or Players in the Backup Ar ena for the clients that are being protected by the NetBackup servers. Next, disk partition information is Appendix A - Com m and-Line I nter face Gu ide saved to the BMR server for the clients that will have BMR protection to facilitate the complete and Appendix B - Glossar y total recovery. Chapter 9

Appendix C - Tuning Your Backup and Recov er y Application

Bare Metal HP-UX, IBM AIX, Sun Solaris, and Microsoft Windows Appendix D -Restore Disasterprotects Recoverysystems Planningrunning Kit—Fr om End to Beginning NT 4.0/2000, with additional support planned releases. Appendix E - Business I mpact platform Analysis Planning Kit—The for Storfuture m Befor e t he Calm Appendix F - Per for m ance Test Tech Note

At the base level of any disaster recovery plan, however, is backup and recovery with off-site tape vaulting. The essence of vaulting is the process of creating duplicate backup tapes, which are brought I ndex from the primary site to an off-site location (vault). If the primary site is rendered inaccessible and data List of Figur es and applications are no longer available, the duplicate tapes at the remote location may be used with List of Tables backup hardware to recover data and restore information availability. Appendix G - Net Backu p Per form ance Tuning on Windows

List of Sidebars

NetBackup Vault is now tightly integrated within NetBackup 4.5. Vault automates the duplication, tracking, and reporting for the purposes of offsite storage as a disaster recovery component. In the event of a complete facility loss or on-site media < Dayfailure, Day Upa>Vault-protected environment has the option of retrieving duplicated media for recovery. NetBackup 4.5 now supports up to 10 copies of a backup image versus the previous version two-copy limitation.

High Availability Keeping with VERITAS' end-to-end solutions of data and storage management, VERITAS Cluster Server provides you proactive management of service groups (application services) and protection against hardware failures, power outages, and other disasters. A Java-based management GUI provides a single point of administration for multiple VERITAS Cluster Server clusters. VERITAS Cluster Server provides a comprehensive availability management solution designed to minimize both planned and unplanned downtime. VERITAS NetBackup has also been tested with Microsoft Cluster Server, and support for additional

clustering technologies is planned for future

Key Differentiators I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess VERITAS' key differentiators obviously rest in their ability to say they are an end-to-end solution Gu id e f or t h e Ent er pr ise provider, from the operating system to the application. It can also be integrated with other VERITAS ISBN:0471227145 by David B. Little and David A. Chapa products such as the VERITAS File System, VERITAS Volume Manager, VERITAS Cluster Server, John Wiley & Sons © 2003 (340 pages) and VERITAS Bare Metal Restore. The key differentiators are as follows: This guide tak es r eaders thr ough the necessar y steps of

deploy ing serand v ices by showing how to addr essworldwide. the Is the number 1 backup recovery software solution ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

Offers unparalleled performance and scalability. < ?xm l Ta ble

Offers a "core that version= 1.0" three-tier encoding=architecture " I SO- 8859- 1" ?> provides the foundation for unparalleled backup and restore performance. o f Con t en t s

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise Supports heterogeneous environments. ( VERI TAS Ser ies) I ntr oduction Offers comprehensive data protection across operating systems, databases and applications, Pa r t I storage - I nt r oduct ion t o and Ba cknetwork up and Recove r y in the Ent er pr i se Env ir onm e nt devices, topologies.

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Offers backup andup recovery. Chapter 2 -application-specific Business Requirements of Back Systems Chapter 3

- An I ntr odu ction to NetBackup

Supports the broadest range of database/application/platform combinations and leverages native (nonproprietary) utilities and APIs on all accounts.

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5 - Gener Discussion Configur ation Features toolsalthat allow foronease-of-use and ease-of-administration. Chapter 6 - Monitor in g the Backup Pr ocess

For7 an-enterprise-class providesFeatur an unmatched suite of wizard-driven interfaces that Chapter Evaluating Ot hersolution, Back up- Related es and Options simplify configuration, and administration. A plethora of standard reports deliver critical Chapter 8 - installation, Gener al Tr oubleshooting Tips information, as theBack status of backup jobs, without the administrator having to parse Chapter 9 - The such Expanding up System Pa r t I transaction I I - The Entelogs, r pri seand I m an pa ctintegrated of Back uptroubleshooting Sy ste m s

wizard offers online access to remedies for

various Chapter 10 - errors. The Fut ure of Backup

Chapter 11 - Maj or Players in the Backup Ar ena

Features industry-known, 'bulletproof' catalog scales to address the largest environments while

Appendix A - Com mcomparatively and-Line I nter face Gu ide commanding the smallest amount of reserved space among leading competing Appendix B Glossar y solutions. Appendix C - Tuning Your Backup and Recov er y Application

Relies the establishment of key Kit—Fr partnerships drive integration and success among Appendix D -onDisaster Recovery Planning om Endtotohelp Beginning hardware and software Where applicable, VERITAS Appendix E - Business I mpactsolutions. Analysis Planning Kit—The Stor m Befor e NetBackup t he Calm is a recognized solution in partner programs, as Sun Microsystems SunTone Certification program, IBM Appendix F - Per for m ance such Test Tech Note ServerProven, and more. Appendix G - Net Backu p Per form ance Tuning on Windows I ndex

Through acquisition, innovation, and partnerships, VERITAS has been able to set themselves clearly

List of Figur apart fromesthe list of industry leaders. List of Tables List of Sidebars < Day Day Up > < Day Day Up >

< Day Day Up >

Summary

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by David Little and David A. Chapa As you can see, there are B. different ways to accomplish the same task. This chapter provided you a & Sons © 2003in (340 good introductionJohn into Wiley the major players thepages) marketplace. This is by no means the 'short list'; there are others out there aretakinnovating havethe a distinct vision for of the future of backup and Thiswho guide es r eadersand thr ough necessar y steps deploy ingnext ser vedition ices by of showing how the to addr ess grow the and even change. So when you are recovery. Perhaps by the this book, list will e, or limait ations, capabilities t he to ex protect isting your data, this chapter should considering eitherarachitectur new tool changeand to your existingoftool net wor k infr astr uctur e. help you determine what methods, principles, and philosophical approaches best fit your organization's specific requirements.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness for>the Enter pr ise < Day Guide Day Up ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

en t ing Ba cku p an d Reco ver y: Th e Rea din ess AppendixIGum idplem A: Command-Line Interface Guide e f or t h e Ent er pr ise by David B. Little and David A. Chapa

ISBN:0471227145

Just about any backup and recovery application you use will offer a graphical user interface (GUI). John Wiley & Sons © 2003 (340 pages) These are very helpful in the normal day-to-day operations, but there are times when they just aren't This guide tak es r eaders thr ough the necessar y steps of what you are looking for. If you want to access, control, or configure your backup application using a deploy ing ser v ices by showing how to addr ess the slow-speed dial-up line, for e, example, a GUI be painful use-if it will work at all. There are ar chitectur lim it ations, andcan capabilities of tto hetry ex to isting also situations where you might to schedule your backups with a third-party scheduler. In these net wor k infr astrwant uctur e. cases, what you need is access to a good command-line interface (CLI). A good understanding of the CLI for your backup and recovery application gives you the ability to access, configure, control, and < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> monitor both backups and restores from a nongraphic terminal or over a slow line. It also offers a Ta ble o f Con t en t s method to interface the backup application with a third-party scheduler. I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

In this appendix, we list the most commonly used commands for VERITAS NetBackup. We also define

I ntr theoduction command. A complete listing of the supported commands, along with their options and switches, Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

can be found in the man pages for NetBackup and in the System Administrator's Guide. There is a

Chapter 1 Windows - Backup NetBackup and RecoverSystem y Sy st emAdministrator's Requir em ents Ex plained UNIX and Guide and a UNIX and Windows Media Chapter 2 System - Business Requirements of Back up Systems Manager Administrator's Guide. Maybe at some point, if demand is high enough, we will write Chapter 3 - An I ntron oduthe ction to and NetBackup a companion book CLI greatly expand on their uses. For sample UNIX and Windows NT Pa r t I I2000 - Back up P roduct ia l and scripts, checkTutor out www.NetBackupCentral.com.

Chapter 4

- Evaluating Stor age Media Requir ements

- Gener al Discussion on Configur ation NetBackup Commands for UNIX

Chapter 5 Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options bp Starts the NetBackup menu interface that lets users archive, back up, and restore files,

Chapter 8 - Gener Tr oubleshooting directories, or al raw partitions fromTips their client workstations. Chapter 9 - The Expanding Back up System Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

bpadm Chapter 10 - Starts The Futthe ureNetBackup of Backup menu interface for administrators, which an administrator can use to configure NetBackup and monitor its operations. bpadm requires root privileges.

Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide

Appendix bparchive B - Glossar Archives y files to the NetBackup server by processing files that you list on the command

line Cor -inTuning the fileYour you specify with Recov the -f er listfile option. Any file path entered can be a file or directory Appendix Backup and y Application name. the list ofRecovery files includes a directory, archives all files and subdirectories of that Appendix D -If Disaster Planning Kit—Fr ombparchive End to Beginning directory starting at the directory Appendix E - Business I mpact Analysis itself. Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form Tuning on bpauthorize Manages the ance authorize.txt fileWindows on remote servers. This command is available only on I ndex NetBackup master servers and sets up authentication files on NetBackup servers and clients List ofaccording Figur es to the options that are specified with the command. List of Tables List of Sidebars

bpauthsync Synchronizes authentication files on NetBackup servers and clients. This command is available only on NetBackup master servers and sets up authentication files on NetBackup servers and clients according to the options that are specified with the command. < Day Day Up >

bpbackup Backs up files to the NetBackup server. If issued on a client, bpbackup starts a user backup that is the equivalent to what is performed by using the interface on the client. This type of backup can be started from any NetBackup client in order to back up files from that client. The bpbackup command processes the files that you list on the command line or in the file that you specify with the -f listfile option. A file path can be a file or directory name. If the named files include a directory, bpbackup backs up all files and subdirectories of that directory starting at the directory itself. If issued on the master server, bpbackup starts an immediate-manual backup of a client. This variation requires the -i option on the bpbackup command and is available only to the administrator on the master server. It is the equivalent of starting a manual backup from the NetBackup administrator's interface. Use the -h option to specify the host.

< Day Day Up > bpbackupdb Initiates a backup of one or more NetBackup image catalogs specified on the command line. It also backs up the default set of NetBackup catalogs, unless the command line contains -nodbpaths. If the command line specifies a destination, the backup is stored there. Otherwise, the backup is stored at the default location for backups of the NetBackup internal I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess databases, which catalogs. Gu id eare f orcalled t h e Ent er pr ise ISBN:0471227145 by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages) bpchangeprimary Promotes a copy of a backup to be the primary copy. This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, entries lim it ations, capabilities bpclient Manages client on aand master server.of t he ex isting net wor k infr astr uctur e.

bpconfig Modifies or displays the global configuration attributes for NetBackup. These attributes < ?xm l version= " 1.0" encoding= " I SO- 8859?> affect operations for all policies and1"clients. Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise bpdbjobs ( VERI TAS Ser ies) Interacts with the NetBackup jobs database and is useful in scripts or as a command-

line administration tool. Use bpdbjobs to print the entire jobs database, print a summary, delete I ntr oduction uncompleted jobs,r yand clean old Pa r t I done - I nt rjobs, oduct cancel ion t o Ba ck up and Recove in the Ent er prjobs. i se Env ir onm e nt Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2 - NetBackup Business Requirements of Back updaemon Systemsthat responds to queries related to the NetBackup bpdbm database manager Chapter 3 - databases, An I ntr odu ction to are NetBackup internal which called catalogs. bpdbm must be running in order for NetBackup Pa r t I commands I - Back up Pand roduct Tutorto ia lwork utilities

properly. This daemon runs only on the master server and can be

Chapter 4 - only Evaluating Stor age Media Requir ements started by the administrator. Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

bpduplicate Creates a copy of backups created by NetBackup; can also change the primary copy Evaluating Ot her Back up- Related Featur es and Options in order- to enable restoring from a duplicated backup. The primary copy is used to satisfy restore Chapter 8 Tr oubleshooting Tips requestsGener and isal initially the original copy. Chapter 7 Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

bperror Displays Chapter 10 - The Fut ureNetBackup of Backup status and troubleshooting information or entries from the

NetBackup error catalog. It displays information from either the same source as the online troubleshooter (in the Activity Monitor or Reports applications) or from the NetBackup error Appendix A - Com m and-Line I nter face Gu ide catalog. Chapter 11 - Maj or Players in the Backup Ar ena Appendix B - Glossar y

Appendix C - Tuning Your Backup and Recov er y Application

bpexpdate Changes the expiration date of in the image catalog and media in the media Appendix D - Disaster Recovery Planning Kit—Fr ombackups End to Beginning catalog. It is also used toAnalysis change Planning the expiration of removable in the NetBackup media Appendix E - Business I mpact Kit—The Stor m Beformedia e t he Calm catalog. Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex bpimagelist Queries the NetBackup catalog and produces a report on the status of the List ofNetBackup Figur es images. It will produce one of two types of reports: List of Tables

Report images satisfying a set of criteria (if -media is absent) List of Sidebars Report on removable media satisfying a set of criteria (if -media is present) < Day Day Up > reports on the NetBackup images. It can bpimmedia Queries the NetBackup image catalog and produce two reports:

An Images-on-Media report A Spangroups report bpimport Imports NetBackup and Backup Exec backups that are expired or are from another NetBackup or Backup Exec server. bplabel Writes a NetBackup label on tape media. Labeling is required only for media that was last used for NetBackup catalog backups or by a non-NetBackup application. You can also use it to assign specific media IDs.

bplist Lists backed-up and archived files < on Daythe Day NetBackup Up > server according to the options that you specify. bppldelete Deletes I m plempolicies en t ing Ba from ckuthe p an NetBackup d Reco verdatabase. y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa

ISBN:0471227145

bppllist ListsJohn policies and policy information within the NetBackup database. Wiley & Sons © 2003 (340 pages) This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing or how to addr ess an theindividual NetBackup media ID, bpmedia Freezes, unfreezes, suspends, unsuspends ar chitectur e, lim it ations, and capabilities of t he ex isting allowing or disallowing future backups or archives to be directed to the media. Note that this net wor k infr astr uctur e. command applies only to media managed by Media Manager. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> bpmedialist Displays NetBackup media status by making queries of one or more NetBackup Ta ble o f Con t en t s

media catalogs and produces a report on the status of the NetBackup media.

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction bpminlicense Manages NetBackup license file. Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

bpplclients, bpclclients Administers the clients within NetBackup policies.

Pa r t I bpplinfo, I - Back up bpclinfo P roduct Tutor Initializes, ia l

Chapter 4

modifies, or displays policy attributes for a NetBackup policy.

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation bpplinclude, bpclinclude Maintains the policy file list for a NetBackup policy. This is the list of

Chapter 6 backed - Monitor g theNetBackup Backup Pr ocess files up in when runs an automatic backup for the policy. Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options Chapter 8

- Gener al Tr oubleshooting Tips

bpplsched, bpclsched Adds, deletes, or lists NetBackup schedules to/from a policy. - The Expanding Back up System

Chapter 9

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup bpplschedrep, bpclschedrep Modifies the attributes of a NetBackup schedule. The schedule Chapter and 11policy - Majnamed or Players by the in the command Backup Ar should ena already exist when it is run. Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y

bppolicynew, bpclassnew Creates, copies, or renames a NetBackup policy.

Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

bprd the INetBackup request daemon, which for starting automatic client Appendix E Initiates - Business mpact Analysis Planning Kit—The Storismresponsible Befor e t he Calm backups and responding to client requests for file restores and user backups and archives.

Appendix F - Per for m ance Test Tech Note

Appendix G - Net Backu p Per form ance Tuning on Windows I ndex bprecover Initiates the NetBackup utility for restoring the NetBackup internal databases called List ofcatalogs Figur es and recovers catalogs that were backed up by using the procedures described in the

system administrator's guide. The command has two main modes: list and recover. List ofNetBackup Tables List of Sidebars

bprestore Restores files or directories from the NetBackup server. < Day Day Up >

bpstuadd Creates a NetBackup storage unit group or a storage unit. bpstudel Deletes a NetBackup storage unit or storage unit group. bpstulist Displays the attributes for one or all of the NetBackup storage units or storage unit groups. bpsturep Modifies an existing NetBackup storage unit by replacing selected storage-unit or storage-unit-group attributes in the NetBackup catalog. bpverify Verifies the backups created by NetBackup.

< Day Day between Up > cat_convert Converts NetBackup catalog .f files Versions 3.4 and 4.0, or between 4.5 ASCII format and 4.5 binary format. m plem en t ing Ba cku and p anRestore d Reco ver y: Th e Rea din jbpSA StartsI the Backup, Archive, client interface oness Java-capable UNIX machines. Gu id e f or t h e Ent er pr ise

by David B. Little and David A. Chapa

ISBN:0471227145

jnbSA StartsJohn the NetBackup Administration Console on Java-capable UNIX machines. Wiley & Sons © 2003 (340 pages) This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the nbdbsetportarSets TCP/IP port used by the nbdbd database service. chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

nbdbsetpw Modifies passwords used by the nbdbd database service. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s

vopied Daemon to provide VERITAS one-time password user authentication.

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

vopie_util Manages local vopie authentication files. I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained xbp Starts the X Windows-based interface for NetBackup users.

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

< Day Day Up > - Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess NetBackupI m Commands for Windows Gu id e f or t h e Ent er pr ise

ISBN:0471227145

by David B. Little and David A. Chapa beconv Converts Backup Exec on-disk catalogs to NetBackup on-disk catalogs. John Wiley & Sons © 2003 (340 pages)

This guide tak es r eaders thr ough the necessar y steps of

bephyinv Updates theser Media database, NetBackup deploy ing v ices Manager by showing how to addr ess the media database, and Backup Exec e, lim it ations, and capabilities of t he ex isting database forarachitectur set of Backup Exec media. net wor k infr astr uctur e.

bparchive Archives files to the NetBackup server by processing files that you list on the command < ?xm l version= 1.0"file encoding= " I SO8859line or in"the you specify with the1"-f?>listfile option. Any file path entered can be a file or directory Ta ble o f Con t en t s

name. If the list of files includes a directory, bparchive archives all files and subdirectories of that

I mplem ent ing Backup Recover y—The Readiness Guide for the Enter pr ise directory startingand at the directory itself. ( VERI TAS Ser ies) I ntr oduction

authorize.txt remote This Pa r t I bpauthorize - I nt r oduct ionManages t o Ba ck upthe and Recove r y infile theon Ent er pr i seservers. Env ir onm e nt command

is available only on

NetBackup master authentication files on NetBackup servers and clients Chapter 1 - Backup andservers Recoverand y Sysets st em up Requir em ents Ex plained according to the options that areofspecified with the command. Chapter 2 - Business Requirements Back up Systems Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I bpauthsync I - Back up P roduct Tutor ia l authentication Synchronizes

files on NetBackup servers and clients. This command

Chapter 4 - Evaluating age Mediamaster Requirservers ements and sets up authentication files on NetBackup is available only onStor NetBackup Chapter 5 Gener al Discussion on Configur ation servers and clients according to the options that are specified with the command. Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

bpbackup Backs up files to the NetBackup server. If issued on a client, bpbackup starts a user - Gener al Tr oubleshooting Tips backup that is the equivalent to what is performed by using the interface on the client. This type of Chapter 9 The Expanding Back up System backup- can be started from any NetBackup client in order to back up files from that client. The Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s bpbackup command processes the files that you list on the command line or in the file that you Chapter 10 - with The the Fut ure of Backup specify -f listfile option. A file path can be a file or directory name. If the named files Chapter 11 Maj or Players in the Backup ena include a directory, bpbackup backsArup all files and subdirectories of that directory starting at the Appendix A Com m and-Line I nter face Gu ide directory itself. Chapter 8

Appendix B - Glossar y

If issued on the Your master server, an immediate-manual backup of a client. This Appendix C - Tuning Backup andbpbackup Recov er y starts Application variation requiresRecovery the -i option on the bpbackup and is available only to the Appendix D - Disaster Planning Kit—Fr om Endcommand to Beginning

administrator on the master server. It is theKit—The equivalent a manual backup from the Appendix E - Business I mpact Analysis Planning Stor of m starting Befor e t he Calm NetBackup administrator's interface. Use the -h option to specify the host.

Appendix F - Per for m ance Test Tech Note

Appendix G - Net Backu p Per form ance Tuning on Windows I ndex bpbackupdb Initiates a backup of one or more NetBackup image catalogs specified on the

line. It also backs up the default set of NetBackup catalogs, unless the command line List ofcommand Figur es List ofcontains Tables -nodbpaths. If the command line specifies a destination, the backup is stored there. List ofOtherwise, Sidebars the backup is stored at the default location for backups of the NetBackup internal

databases, which are called catalogs. Day to Upbe > the primary copy. The bpchangeprimary bpchangeprimary Promotes a copy of copy in order to enable restoring from a duplicated backup. The primary copy is used to satisfy restore requests and is initially the original copy. I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess

bperror Displays and troubleshooting information or entries from the Gu id eNetBackup f or t h e Entstatus er pr ise NetBackup error catalog. It displays information the same source as the online ISBN:0471227145 by David B. Little and David A. Chapa from either troubleshooter (inWiley the Activity or Reports applications) or from the NetBackup error John & SonsMonitor © 2003 (340 pages) catalog. This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting bpexpdate Changes theastr expiration net wor k infr uctur e. date of backups in the image catalog and media in the media

catalog. It is also used to change the expiration of removable media in the NetBackup media catalog. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s

bpimagelist Queries the NetBackup catalog Guide and produces a report I mplem ent ing Backup and Recover y—The Readiness for the Enter pr ise on the status of the NetBackup ( VERI TAS Ser ies) images. It will produce one of two types of reports: I ntr oduction

Report images satisfying a set of criteria (if -media is absent)

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1 Report - Backup and Recovermedia y Sy st em Requir em ents plained(if -media is present) on removable satisfying a set ofEx criteria Chapter 2 - Business Requirements of Back up Systems Chapter 3 - An I ntr odu ction NetBackup image catalog and reports on the NetBackup images. It can bpimmedia Queries thetoNetBackup Pa r t I produce I - Back up P roduct Tutor ia l two reports:

Chapter 4

- Evaluating Stor age Media Requir ements Images-on-Media Chapter 5 An - Gener al Discussion report on Configur ation Chapter 6 Chapter 7 Chapter 8

- Monitor in g the Backup Pr ocess

A Spangroups report

- Evaluating Ot her Back up- Related Featur es and Options - Gener al Tr oubleshooting Tips

bpimport Imports NetBackup and Backup Exec backups that are expired or are from another - The Expanding Back up System NetBackup or Backup Exec server.

Chapter 9

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup

bplabel Writes a NetBackup label on tape media. Labeling is required only for media that were Chapter 11 - Maj or Players in the Backup Ar ena

last Aused for m NetBackup catalog backups or by a non-NetBackup application. You can also use it Appendix - Com and-Line I nter face Gu ide to assign specific media IDs.

Appendix B - Glossar y

Appendix C - Tuning Your Backup and Recov er y Application Appendix bplist D -Lists Disaster backed Recovery up andPlanning archivedKit—Fr files on om the EndNetBackup to Beginning server according to the options that

you Especify. Appendix - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows bppldelete Deletes policies from the NetBackup database. I ndex List of Figur es

bppllist Lists policies and policy information within the NetBackup database.

List of Tables

List of Sidebars

bpmedia Freezes, unfreezes, suspends, or unsuspends an individual NetBackup media ID, allowing or disallowing future backups or archives to be directed to the media. Note that this command applies only to media managed by Day Media < Day UpManager. > bpmedialist Displays NetBackup media status by making queries of one or more NetBackup media catalogs and produces a report on the status of the NetBackup media. bpminlicense Manages NetBackup license file. bpplclients, bpclclients Administers the clients within NetBackup policies. bpplinfo, bpclinfo Initializes, modifies, or displays policy attributes for a NetBackup policy. bpplinclude, bpclinclude Maintains the policy file list for a NetBackup policy. This is the list of

files backed up when NetBackup runs an automatic backup for the policy. < Day Day Up > bpplsched, bpclsched Adds, deletes, or lists NetBackup schedules to/from a policy. I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent erModifies pr ise the attributes of a NetBackup schedule. The schedule bpplschedrep, bpclschedrep ISBN:0471227145 by David B. Little and David A. Chapa and policy named by bpplschedrep should already exist when this command is run. John Wiley & Sons © 2003 (340 pages) This guide tak es r eaders thr ough the necessar y steps of

bppolicynew, bpclassnew Creates copies, NetBackup policy. deploy ing ser v ices by showing howortorenames addr ess a the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

bprecover Initiates the NetBackup utility for restoring the NetBackup internal databases called catalogs and recovers catalogs that were backed up by using the procedures described in the < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> NetBackup System Administrator's Guide. The command has two main modes: list and recover. Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise bprestore ( VERI TAS Ser ies) Restores files or directories from the NetBackup server. I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

bpstuadd Creates a NetBackup storage unit group or a storage unit.

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

bpstudel Deletes a NetBackup storage unit or storage unit group. - An I ntr odu ction to NetBackup

Chapter 3

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4 - Evaluating Media for Requir bpstulist Displays Stor the age attributes oneements or all of the NetBackup storage units or storage unit Chapter groups. 5 - Gener al Discussion on Configur ation Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options bpsturep Modifies an existing NetBackup storage unit by replacing selected storage-unit or

Chapter 8 - Gener al Tr oubleshooting Tips storage-unit-group attributes in the NetBackup catalog. Chapter 9 - The Expanding Back up System Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

bpverify Verifies theof backups Chapter 10 - The Fut ure Backup created by NetBackup. Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com mConverts and-Line NetBackup I nter face Gucatalog ide cat_convert .f files between Versions 3.4 and 4.0 or between 4.5 Appendix B format - Glossar y 4.5 binary format. ASCII and Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

nbdbsetport Sets TCP/IP port used by the nbdbd database service.

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note

nbdbsetpw Modifies used by nbdbd database service. Appendix G - Net Backu p Perpasswords form ance Tuning on the Windows I ndex List ofvopied Figur es Daemon to provide VERITAS one-time password user authentication. List of Tables List of Sidebars

vopie_util Manages local vopie authentication files.

< Day Day Up > < Day Day Up >

< Day Day Up >

I m plemCommands en t ing Ba cku p anfor d Reco ver y: Th e Rea din ess Media Manager UNIX and Windows Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by David B. and David A. Chapa Most of these commands areLittle common between UNIX and Windows. The exceptions are noted.

John Wiley & Sons © 2003 (340 pages)

acsd Automated This guide Cartridge tak esSystem r eaders(ACS) thr ough daemon the necessar that interfaces y steps of with Media Manager to ingand ser vunmount ices by showing howare to addr essAutomated the automaticallydeploy mount tapes that under Cartridge System (ACS) ar chitectur e, lim it ations, and capabilities of t he ex isting control. net wor k infr astr uctur e.

lmfd, lmfcd Library Management Facility (LMF) daemon and control daemon to interface with

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Media Manager to mount and unmount tape volumes in an LMF robot. Ta ble o f Con t en t s

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)the Media Manager device daemon. The ltid command starts the Media Manager ltid Starts I ntr oduction device daemon (ltid) and Automatic Volume Recognition daemon (avrd). These daemons Pa r t I manage - I nt r oduct ion t o Ba ck up and Recove r y ltid in the Ent er pr i se Env ir onmthe e ntappropriate Media Manager devices. The command also starts

robotic daemons,

Chapter 1 - Backup Recover y SyinstMedia em Requir em entsas Exwell plained if robotic devicesand were defined Manager, as the Media Manager volume daemon, Chapter 2 - Business Requirements of Back up Systems vmd. Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

odld Optical Disk Library (ODL) daemon interfaces with Media Manager to mount and unmount - Evaluating Stor age Media Requir ements optical platters in an optical disk library.

Chapter 4 Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess rsmd Manager (RSM) process Chapter 7 Removable - Evaluating Storage Ot her Back up- Related Featur es andinterfaces Options with Media Manager to

automatically and unmount tapes that are under Microsoft Windows 2000 Removable Chapter 8 - Genermount al Tr oubleshooting Tips Storage Manager (RSM) control. - The Expanding Back up System

Chapter 9

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Futthe ure Media of Backup stopltid Stops Manager device daemon, avrd, and the robotic daemons. Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide

tl4d Tape Library 4MM (TL4) daemon interfaces with Media Manager to mount and unmount tapes in a Tape Library 4MM (TL4) robot.

Appendix B - Glossar y

Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

tl8d,E tl8cd Tape Library (TL8) daemon and control daemon with Media Manager to Appendix - Business I mpact 8MM Analysis Planning Kit—The Stor m Befor e t heinterface Calm mount and unmount volumes in a Tape Library 8MM robot.

Appendix F - Per for m ance Test Tech Note

Appendix G - Net Backu p Per form ance Tuning on Windows I ndex tldd, tldcd Tape Library DLT (TLD) daemon and control daemon interface with Media Manager to List ofmount Figur esand unmount volumes in a Tape Library DLT (TLD) robot. List of Tables List oftlhd, Sidebars tlhcd Tape Library Half-inch (TLH) daemon and control daemon interface with Media

Manager to mount and unmount tape volumes in a Tape Library Half-inch (TLH) robot. < Day Day Up >

tlmd Tape Library Multimedia (TLM) daemon interfaces with Media Manager to mount and unmount tapes in a Tape Library Multimedia (TLM) robot. tpautoconf Manages the global device database host and is normally used by the Device Configuration Wizard to automatically discover and configure devices. tpclean Manages tape drive cleaning by allowing you to monitor Media Manager tape drive usage and optionally configure tape drives to be automatically cleaned (except drives in ACS, LMF, ODL, RSM, or TLH robots; or shared (SSO) drives). tpconfig Tape configuration utility. tpconfig can be used as a command-line interface or menu interface (only on UNIX) to configure robots and drives for use with NetBackup or to display the

current configuration.

< Day Day Up >

tpformat Formats optical disks for use by Media Manager. I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu idaetape f or tvolume h e Ent er prmounting ise tpreq Requests for and associates a filename with the assigned drive. by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

tpunmount Removes a tape volume from a drive and the associated tape file name from the This guide tak es r eaders thr ough the necessar y steps of directory. deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

ts8d Tape Stacker 8MM (TS8) daemon interfaces with Media Manager to mount and unmount tapes in Tape Stacker 8MM robots. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s

tsdd Tape Stacker (TSD) daemon interfaces Media to mount and unmount I mplem ent ing Backup and DLT Recover y—The Readiness Guide with for the EnterManager pr ise tapes inies) Tape Stacker DLT (TSD) robots. ( VERI TAS Ser I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

tshd Tape Stacker Half-inch (TSH) daemon interfaces with Media Manager to mount and

Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained unmount tapes in Tape Stacker Half-inch (TSH) robots. Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

vmadd Adds volumes to the volume database.

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter vmadm 5 - Gener Character-based al Discussionmedia on Configur management ation utility used to manage volumes and volume pools,

manage barcode and inventory Chapter 6 - Monitor in grules, the Backup Pr ocess robots controlled by the Media Manager volume daemon (vmd). Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9 - TheChanges Expandingmedia Back up System vmchange information in the Media Manager volume database. Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup

vmcheckxxx Reports the media contents of a robotic library and optionally compares its contents with the volume configuration.

Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y

vmdC Media Manager volumeand daemon that manages the volume database, responding to requests Appendix - Tuning Your Backup Recov er y Application to add, or delete volumes. Appendix D - change, Disaster list, Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - PerDeletes for m ance Test Tech Note vmdelete volumes from the volume database. Appendix G - Net Backu p Per form ance Tuning on Windows I ndex

vmoprcmd Performs operator functions on drives.

List of Figur es List of Tables

List ofvmpool SidebarsManages volume pools, allowing you to add, change, delete, or list volume pools.

vmquery Queries the volume database, or assigns and unassigns volumes. < Day Day Up >

vmrule Manages barcode rules. vmupdate Inventories the media contents of a robotic library and updates the volume database.

< Day Day Up >

< Day Day Up >

en t ing Ba cku p an d Reco ver y: Th e Rea din ess AppendixIGum idplem B: Glossary e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

A

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting k infrNetBackup astr uctur e. is currently processing backup or restore data. A jobnet forwor which

active job

activity logs < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Logs that may be optionally enabled for specific NetBackup programs and processes and Ta ble o f Con t en t s

then used to further investigate problems.

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

Activity Monitor

I ntr oduction

A NetBackup that displays Pa r t I - I nt r oduct ion t o Ba ck administration up and Recove rutility y in the Ent er pr i se information Env ir onm e ntabout Chapter 1

andRecover processes, provides limited control over them. - services, Backup and y Sy st and em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

< Day Day Up >

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

NetBackup jobs,

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

B

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

backup identifier (backupid)

ISBN:0471227145

The unique identifier assigned to each backup image. This is the identifier that is stored This guide tak es r eaders thr ough the necessar y steps of with deploy the backup in the how NetBackup image ing serinformation v ices by showing to addr ess the catalog and used to track all backup images. ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

backup window or window opportunity given to the backup process in which to execute either < ?xm l version= The " 1.0"time encoding= " I SO-of88591" ?> scheduled or user-directed backups. Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise barcode ( VERI TAS Ser ies)

A label that is affixed to a cartridge and read by a barcode reader to allow the storage

I ntr oduction

library the media. Pa r t I - I nt r oduct ion tto o identify Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

used to duplicate NetBackup backup images. Also used by - Command-line An I ntr odu ction interface to NetBackup

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

bpduplicate

bpVault if configured Pa r t I I - Back up P roduct Tutor ia l bpVault

to automate the duplication processes.

A utility used to automate the off-site vaulting process of tape media, whether duplicated media or original media. Replaced by NetBackup 4.5 Vault.

Chapter 8 Reports - Gener al Tr oubleshooting Tips bpVault Chapter 9 - The Expanding Back up System

bpVault generates several reports; the most common ones are the Picking List for Library, Distribution List for Vault, Picking List for Vault, and Distribution List for Library and Chapter 10 - The Fut ure of Backup Volume Inventory. Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y

< Day Day Up > Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

C

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

catalogs

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

The internal NetBackup and Media Manager databases; these catalogs contain This guide tak es r eaders thr ough the necessar y steps of information about errors, and the files and deploy ing ser vconfiguration, ices by showingmedia, how todevices, addr ess status, the directories in the backup ar chitectur e, stored lim it ations, and images. capabilities of t he ex isting net wor k infr astr uctur e.

class policy. This was NetBackup term before the current 4.5 release. < ?xm l version= See " 1.0" encoding= " I SO-the 88591" ?> Ta ble o f Con t en t s command-line interface (CLI)

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise Commands that users can execute either from the system prompt or in scripts. ( VERI TAS Ser ies) I ntr oduction

cron

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

cronand command a process that - The Backup Recover ystarts Sy st em Requir em entsexecutes Ex plainedcommands at specified dates and

Chapter 2

Regularly scheduled commands can be specified according to instructions found in - times. Business Requirements of Back up Systems

Chapter 3

files in the directory /var/spool/cron/crontabs. Users can submit their own crontab - crontab An I ntr odu ction to NetBackup

Chapter 4

theMedia at command. - submitted Evaluating using Stor age Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

filePusing crontab(1) Pa r t I I - Back up roductthe Tutor ia l

command. Commands that are to be executed only once may be

cumulative-incremental backup

Chapter 8 Chapter 9

An attribute of a class schedule, this type of backup collects all files that have changed since the last successful full backup. All files are backed up if no prior backup has been - Gener al Tr oubleshooting Tips done.See alsodifferential-incremental backup. - The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup

< Day Day Up > Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

D

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

database-agent clients

ISBN:0471227145

NetBackup clients with additional software designed to allow backup of certain relational This guide tak es r eaders thr ough the necessar y steps of databases. deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting

database-extension clients net wor k infr astr uctur e. Seedatabase-agent clients. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> device host Ta ble o f Con t en t s

Mediaand Manager host withReadiness either a physical I mplem ent ing A Backup Recover y—The Guide forattachment the Enter pror isea definition of a drive or robotic control. ( VERI TAS Ser ies) I ntr oduction

Device Monitor

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

Mediaand Manager administration utility that Ex allows monitoring and manual control of Media - A Backup Recover y Sy st em Requir em ents plained

Chapter 2

storage devices. For up example, - Manager Business Requirements of Back Systemsan administrator or computer room operator can

Chapter 3

utility to to manually reset devices or set them to the UP or DOWN state. - use An I this ntr odu ction NetBackup

Pa r t I I - Back up P roduct Tutor ia l

DHCP

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

Host Configuration Protocol. This TCP/IP protocol automatically assigns - Dynamic Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

temporary IP addresses to hosts when they connect to the network.

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options differential-incremental backup

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The

Scheduled by the administrator on the master server, this backup type backs up files that have changed since the last successful incremental or full backup. All files are backed up Ente r pri se I m pa ct of Back up Sy ste m s if no prior backup has been done. See alsocumulative-incremental backup.

Chapter 10 - The Fut ure of Backup

Chapter 11 depth - Maj or Players in the Backup Ar ena directory Appendix A - Com m and-Line I nter face Gu ide

The number of levels below the current directory level that the NetBackup interfaces show

Appendix B - in Glossar y their directory and file list displays. Appendix C - Tuning Your Backup and Recov er y Application Appendix directory D tree - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - The Business I mpact Stor t he Calm hierarchy of Analysis how thePlanning files are Kit—The organized onmaBefor disk.e Each directory lists the files and Appendix F - directories Per for m ance Test Notebelow it in the tree. On UNIX, the topmost directory is called that areTech directly Appendix G - the Net Backu p Per form ance Tuning on Windows root directory. I ndex

disaster (DR) List of Figurrecovery es List of Tables The act or process of recovering data from backups after a disk crash or other List of Sidebarscatastrophe.

disk-image backup A bit-by-bit rather than a filesystem backup of>a disk drive on Windows NT/2000. < Day Day Up Distribution List for Library Part of bpVault. Lists all of the VOLSERs or media IDs that are due to be returned from the Offsite Vendor. This report may be blank if none of the VOLSERs have met their expiration date. The report contents are the same as the Picking List for Vault report with the VOLSERs listed by slot number instead of VOLSER number. Distribution List for Vault Part of bpVault. Lists all of the VOLSERs or media IDs that have been sent off-site to the Vaulting Vendor. This report is listed in numerical order by slot number and should be used by the Offsite Vendor to ensure all of the tapes sent are accounted for based on the report. The report contents are the same as the Picking List for Library.

duplicate image

< Day Day Up >

A duplicate copy of a particular backup image. I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise < Day Day Up > by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

E

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

EVSN

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

External volume serial number. An identifier written on a media cartridge or canister so the This guide tak es r eaders thr ough the necessar y steps of operator can into a drive or robot. For labeled media, deploy ingidentify ser v icesthe by volume showingbefore how toinserting addr ess itthe the EVSN muste,be sameand as the RVSN (identifier recorded on the media). For all ar chitectur limthe it ations, capabilities of t he ex isting net the wor kEVSN infr astr e. media, is uctur the same as the media ID. exclude list

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Files Ta ble o f Con t en t s or directories to exclude from automatic backups are contained within this list. I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise expiration ( VERI TAS Ser(image) ies)

The date and time when NetBackup stops tracking a backup image.

I ntr oduction

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

expiration-(volume) Backup and Recover y Sy st em Requir em ents Ex plained expiration date of aofvolume the date and time when the physical media (tape) is Chapter 2 - The Business Requirements Back upisSystems considered to be no longer usable. Chapter 3 - An I ntr odu ction to NetBackup Chapter 1

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4 Chapter 5

- Evaluating Stor age Media Requir ements < Day Day Up > - Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

F

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

Fibre Channel

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

The collection of physical interconnect hardware and the Fibre Channel protocol.

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the frequency (backup) ar chitectur e, lim it ations, and capabilities of t he ex isting wor k infr astr uctur e. NetBackup performs automatic scheduled backups within a This net determines how often

particular policy (class). For example, if the frequency is seven days, then backups occur week. " I SO- 8859- 1" ?> < ?xm l version= once " 1.0" aencoding= Ta ble o f Con t en t s

FROZEN media state

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise If a volume is FROZEN, NetBackup keeps it indefinitely and can restore from it but not use ( VERI TAS Ser ies)

it for further backups or archives.

I ntr oduction

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

full backup- Backup and Recover y Sy st em Requir em ents Ex plained backupRequirements that copies toofa Back storage unit all files and directories that are beneath a specified Chapter 2 - A Business up Systems directory. Chapter 3 - An I ntr odu ction to NetBackup Chapter 1

Pa r t I I - Back up P roduct Tutor ia l

FULL media state

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

this appears in a report or listing, - IfGener al Discussion on Configur ation it indicates the volume is full and cannot hold more

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

data or be used for further backups.

< Day Day Up >

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

G

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

global attributes

ISBN:0471227145

These are configuration attributes that affect the entire NetBackup master domain.

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the Global Data Manager (GDM) ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e. An optionally purchased utility that provides a tree view and administration of multiple

master servers within the enterprise. The server where the option is installed is called a of masters. < ?xm l version= master " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s

GNU TAR

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise A public domain version of the UNIX TAR program. ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir < Day emDay entsUp Ex > plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

image

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

The collection of data that NetBackup saves for an individual client during each backup or This guide tak es r eaders thr ough the necessar y steps of archive. The contains all the files, deploy ingimage ser v ices by showing how to directories, addr ess the and catalog information associated with ar the backupe,or chitectur limarchive. it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

import of re-creating NetBackup records of images that have previously expired or < ?xm l version= The " 1.0"process encoding= " I SO- 8859- 1" ?> are not included in an active environment so the images can be restored. Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise include ( VERI TAS list Ser ies)

This list designates files or directories to add back in from the exclude list.

I ntr oduction

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

incremental backup - Backup and Recover y Sy st em Requir em ents Ex plained See cumulative-incremental backup, differential-incremental backup. Chapter 2 - Business Requirements of Back up Systems Chapter 1 Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

Day Day Up > - Evaluating Stor age Media Requir < ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

L

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

library

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

Refers to a robot and its accompanying software. A library includes a collection of tapes or This guide tak es r eaders thr ough the necessar y steps of optical platters used forbydata storage retrieval. For example, a Tape Library DLT deploy ing ser v ices showing howand to addr ess the (TLD) refers toe,a lim robot that has roboticofcontrol. ar chitectur it ations, and TLD capabilities t he ex isting net wor k infr astr uctur e. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?>< Day Day Up > Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

M

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

Mail CAP

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

A tape library term. A place where tapes may be transferred in and out of the tape library This guide tak es r eaders thr ough the necessar y steps of without compromising theshowing integrityhow of the library's deploy ing ser v ices by to tape addr ess the inventory. CAP stands for Cartridge Access Port. e, lim it ations, and capabilities of t he ex isting ar chitectur net wor k infr astr uctur e.

master and media server cluster defined as the8859NetBackup < ?xm l version= This " 1.0"isencoding= " I SO1" ?> master server and the remote media servers in an enterprise configuration. It is possible to configure clusters only with NetBackup Ta ble o f Con t en t s servers.y—The Readiness Guide for the Enter pr ise I mplem ent ing DataCenter Backup and Recover ( VERI TAS Ser ies) master of masters

I ntr oduction

Theion master ofup masters is a NetBackup Global Data Pa r t I - I nt r oduct t o Ba ck and Recove r y in the Enthost er pr iwhere se Env ir onm e nt Chapter 2

Manager software is installed. When logging into this host, the interface has a tree view where the administrator - Backup and Recover y Sy st em Requir em ents Ex plained can view and administer multiple master servers. - Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Chapter 1

master server

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

NetBackup server that provides administration and control for backups and restores - The Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

media

for all clients and servers in a master and media server cluster.

The physical magnetic tapes, optical disks, or magnetic disks where data is stored.

Chapter media 9host- The Expanding Back up System Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

The NetBackup host writing the data to the attached storage device that is received from the client.

Chapter 10 - The Fut ure of Backup

Chapter 11 - Maj or Players in the Backup Ar ena Appendix media IDA - Com m and-Line I nter face Gu ide

Appendix B - An Glossar y identifier that is written on a volume as part of the recorded label. Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Media Manager Appendix E - Software Business Ithat mpact Analysis Planning Kit—The Stor m Befor e t he Calm is part of NetBackup and manages the storage devices and removable Appendix F - media. Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows

Media Manager host I ndex List of Figur es Simply put, a host where Media Manager software is installed. List of Tables

media server List of Sidebars A NetBackup server that provides storage within a master and media server cluster. The master can also be a media server. A media server that is not the master is called a remote media server (or slave server). < Day Day Up > Multi-Hosted Drives Also known as SSO (Shared Storage Option), an additional piece of software that allows tape drives (standalone or in a robotic library) to be dynamically shared between multiple NetBackup and Storage Migrator servers. This option is supported only on NetBackup DataCenter servers. See alsoSSO. Multiple Data Streams (MDS) Policy (class) attribute that allows more than one data stream from a client to be simultaneously backed up. Note: This implies that the global attribute Max Jobs Per Client has been modified to greater than one or a client database has been created using the bpclient command.

multiplexing

< Day Day Up >

The process of sending data from multiple sources (clients) to a single destination (single storage device), interleaving those streams onto one piece of media. I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise Day Up > ISBN:0471227145 by David B. Little and David Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

N

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

NetBackup Client Service

ISBN:0471227145

NetBackup Windows NT/2000 service that runs on clients and servers and listens for This guide tak es r eaders thr ough the necessar y steps of connections servers clients in the network. When a connection is deploy ingfrom ser vNetBackup ices by showing how and to addr ess the made, this service starts the and necessary programs. ar chitectur e, lim it ations, capabilities of t he ex isting net wor k infr astr uctur e.

NetBackup configuration options UNIX servers" I SOand8859on UNIX < ?xm l version= On " 1.0" encoding= 1" ?>and Macintosh, clients, these settings are made in the bp.conf file. On NetWare target and OS/2 clients, they are in the bp.ini file. On Windows Ta ble o f Con t en t s

servers and Microsoft Windows settings are called properties and I mplem ent ing NT/2000 Backup and Recover y—The Readiness Guideclients, for thethese Enter pr ise are made through the Backup, Archive, and Restore interface or the Configure( VERI TAS Ser ies) NetBackup window in the administration interface. With NetBackup 4.5 these can be set from GUI through settings. I nt r oduct ionthe t o Java Ba ck up and Recoveproperties r y in the Ent er pr i se Env ir onm e nt

I ntr oduction Pa r t I -

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

NetBackup Database Manager Service

Chapter 3

Windows NT/2000 service that runs on the master server and manages the - NetBackup An I ntr odu ction to NetBackup NetBackup internal databases (called catalogs). This service must be running on the master server during all NetBackup administrative operations.

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

Gener al Discussion on Configur ation NetBackup- databases

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Seecatalogs.

Chapter 8 - Device Gener al Manager Tr oubleshooting Tips NetBackup Service Chapter 9

- The Expanding Back up System

The NetBackup Windows NT/2000 service that runs on a NetBackup server and starts the robotic control processes and controls the reservation and assignment of volumes. This Chapter 10 - The Fut ure of Backup service runs only if the server has devices under Media Manager control. The process is Chapter 11 - ltid, Maj or Players in interface the Backup Ar ena logical tape daemon. Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Appendix A - Com m and-Line I nter face Gu ide Appendix NetBackup B - properties Glossar y Appendix C - Same Tuningas Your Backup and Recov er y Application NetBackup configuration options. Called NetBackup properties on Microsoft Appendix D - Windows Disaster Recovery Kit—Fr om End with to Beginning platformsPlanning and UNIX platforms NetBackup 4.5. Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

NetBackup Manager Service Appendix F - Request Per for m ance Test Tech Note Appendix G - The Net Backu p Per form ance Tuning on Windows NetBackup Windows NT/ 2000 service that runs on the master server and starts the I ndex

scheduler and receives requests from clients.

List of Figur es

NetBackup Volume Manager Service

List of Tables

List of SidebarsA NetBackup Windows NT/ 2000 service that runs on a NetBackup server, allows remote

administration of Media Manager, and manages volume information. The process is vmd. nonrobotic Seestandalone.

< Day Day Up >

< Day Day Up >

< Day Day Up >

P

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

parameter file

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This is a bpVault term. The basic bpVault configuration requires setting up a parameter This guide tak es r eaders thr ough the necessar y steps of file todeploy showing which to use, how pairs per server, which classes to ser v servers ices by showing how many to addrdrive ess the duplicate (or eject), name of capabilities the duplicate name of the vault, and the location ar chitectur e, lim the it ations, and of tpool, he ex the isting net worworking k infr astrsubdirectories. uctur e. for vault's Bpvault can have several vaults running on the same server simultaneously as long as they have different vault names and different pools. If you have multiple vaults, you may wish to append the vault name to the end of the < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> parameter file , for instance, dup_param_V1, dup_param_V2, and so on. Ta ble o f Con t en ts I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise patch ( VERI TAS Ser ies) I ntr oduction

A program that corrects a problem or adds a feature to an existing release of software.

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

pending request

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

a request is made a up volume that is not either in the robot or a standalone drive, - When Business Requirements of for Back Systems

Chapter 3

displays a pending request in the Device Monitor interface. - Media An I ntrManager odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Picking List for Library

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6 Chapter 7 Chapter 8

Part of bpVault. Lists all of the VOLSERs or media IDs to be sent off-site to the Vaulting Vendor. This report is listed in numerical order by VOLSER number and should be used - Monitor in g the Backup Pr ocess by operations to ensure all of the tapes retrieved from the Mail CAP are accounted for - Evaluating Ot her Back up- Related Featur es and Options based on the report. The report contents are the same as the Distribution List for Vault. - Gener al Tr oubleshooting Tips

Chapter - The Expanding Back up System Picking9 List for Vault Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Part of bpVault. Lists all of the VOLSERs or media IDs that are due to be returned from the Offsite Vendor, sorted numerically by slot number. This report is to be used by the Chapter 11 - Offsite Maj or Players Backupthe Ar ena Vendorintothe facilitate retrieval of the tapes. This report may be blank if none of Appendix A - the ComVOLSERs m and-Line have I nter face Gu ide met their expiration date. The report contents are the same as the Appendix B - Distribution Glossar y List for Library report with the VOLSERs listed numerically. Chapter 10 - The Fut ure of Backup

Appendix C - Tuning Your Backup and Recov er y Application

policy D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix Appendix E - In Business I mpact Analysis Kit—The Stor m Beforfor e t he Calm of one or more clients NetBackup 4.5, definesPlanning the backup characteristics a group Appendix F - that Per for m ance Test backup Tech Note have similar requirements. Appendix G - Net Backu p Per form ance Tuning on Windows

primary copy I ndex List of Figur es The copy of an image that NetBackup uses to satisfy restores. When NetBackup List of Tables duplicates an image, the original is designated as the primary copy. List of Sidebars < Day Day Up > < Day Day Up >

< Day Day Up >

Q

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

queued job

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

A job that has been added to the list of jobs to be performed. This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e. < Day Day Up >

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

R

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

Registry

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

The Microsoft Windows 2000, NT, 98, or 95 databases that has configuration information This guide tak es r eaders thr ough the necessar y steps of about hardware user accounts. deploy ing serand v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting

remote media server net wor k infr astr uctur e. A media server that is not the master. Note that only NetBackup DataCenter supports media servers. < ?xm l version= remote " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s

residence

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise In Media Manager, information about the location of each volume is stored in a volume ( VERI TAS Ser ies)

database. This residence entry contains information such as robot number, robot host,

I ntr oduction

robot type. r y in the Ent er pr i se Env ir onm e nt Pa r t I - I nt r oduct iontype, t o Baand ck upmedia and Recove Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

number corresponds to a user-defined retention period; there are 10 levels - An An index I ntr odu ction tothat NetBackup

Chapter 4

associated withements each level is configurable. See also retention period. - retention Evaluatingperiod Stor age Media Requir

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

retention level

from whichTutor to choose Pa r t I I - Back up P roduct ia l

(0 through 9) prior to NetBackup 4.5 and 25 levels at 4.5. The

retention period

The length of time that NetBackup keeps backup and archive images. The retention period is specified on the schedule.

Chapter 9 - The Expanding Back upNumber) System RVSN (Recorded Volume Serial Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

This is an identifier recorded as part of the label on a volume and used by Media Manager to ensure that the correct volume is mounted. The RVSN is the same as the media ID.

Chapter 10 - The Fut ure of Backup

Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y

< Day Day Up > Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

S

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

schedules

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

Controls when backups can occur in addition to other aspects of the backup, such as the This guide tak es r eaders thr ough the necessar y steps of type deploy of backup (full, incremental) long retains the image. ing ser v ices by showing and how how to addr essNetBackup the ar chitectur e, lim it ations, and capabilities of t he ex isting

Server-directed net restores wor k infr astr uctur e. Using the client interface on the master server to restore files to any client. Only the can perform < ?xm l version= administrator " 1.0" encoding= " I SO8859-this 1" ?>operation. Ta ble o f Con t en t s

Server-independent restore

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise Restoring files by using a NetBackup server other than the one that was used to write the ( VERI TAS Ser ies)

backup; this feature is available only with NetBackup DataCenter.

I ntr oduction

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

server list - Backup and Recover y Sy st em Requir em ents Ex plained list ofRequirements servers that aofNetBackup client or server refers to when establishing or verifying Chapter 2 - The Business Back up Systems connections to NetBackup servers. On a Windows NT/2000 server and Microsoft Chapter 3 - An I ntr odu ction to NetBackup Windows update the list through a dialog box in the interface. On a UNIX Pa r t I I - Back up P roductclients, Tutor iayou l and Stor UNIX Macintosh clients, the list is in the bp.conf file. In NetBackup 4.5, this Chapter 4 - server Evaluating ageand Media Requir ements list can be configured and maintained from the Java GUI. On NetWare target and OS/2 Chapter 5 - Gener al Discussion on Configur ation clients, the list is in the bp.ini file. Chapter 1

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter service7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The

Programs on a Windows NT/2000 system that runs in the background and performs some task (for example, starting other programs when they are needed). Services are generally Ente r pri se I m pa ct of Back up Sy ste m s referred to as daemons on UNIX systems.

Chapter 10 - The Fut ure of Backup

Chapter 11 - Maj or Players in the Backup Ar ena session Appendix A - An Cominstance m and-Line I nter face Guchecking ide of NetBackup its schedules for backups that are due, adding them Appendix B - to Glossar y its work list, and attempting to complete all jobs in the work list. For user backups and Appendix C - archives, Tuning Your Backup usually and Recov er y Application a session consists of a single backup or archive. Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

SSO (Shared StorageI mpact Option) Appendix E - Business Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - SSO Per forallows m ancefor Test Tech Note individual tape drives to be shared dynamically among multiple NetBackup Appendix G - media Net Backu p Per form Seeance alsoTuning Multi-Hosted on Windows Drives. servers. I ndex

standalone List of Figur es List of Tables A qualifier used with drives and media to indicate they are not associated with a robot. For List of Sidebarsexample, a standalone tape drive is one where you must manually find and insert tapes

before using them. A standalone volume is one that is located in a standalone drive or is stored outside of a drive and designated as standalone in the volume configuration. status code

< Day Day Up >

IA numerical code usually accompanied by a message that indicates the outcome of a particular operation. storage area network (SAN) A network used to connect hosts and storage devices. Typically these networks are built using Fibre Channel equipment. storage unit Logical representation of the physical storage devices that is used by NetBackup to identify storage resources and manage backups. It can be a set of drives in a robot or consist of one or more single tape drives that connect to the same host.

SUSPENDED media state

< Day Day Up >

If a volume is suspended, NetBackup can restore from it but cannot use it for backups. NetBackup retains a record of the media ID until the last backup image on the volume expires. After the last image expires, the media is made available for backups. I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa Day Day Up > John Wiley & Sons © 2003 (340< pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

T

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

TLD (Tape Library DLT)

ISBN:0471227145

Designates the type of tape library being controlled by the media server.

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the true image restore ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur Restores the contents of e.a directory to what it was at the time of any scheduled full or

incremental backup. Previously deleted files are not restored. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s < Day Guide Day Up I mplem ent ing Backup and Recover y—The Readiness for>the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

U

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

user operation

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

A backup, archive, or restore that is started by a person on a client system. This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e. < Day Day Up >

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

V

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

Vault

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

NetBackup 4.5 feature that replaces bpVault, is integrated with NetBackup, and is This guide tak es r eaders thr ough the necessar y steps of configured withserGUIs. deploy ing v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

VOLSER

Volume serial number, otherwise known as the media ID, barcode label, or tape ID. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> volume Ta ble o f Con t en t s

volumes logical units data or cleaning capability on media I mplem ent ing Media BackupManager and Recover y—Theare Readiness Guideoffor the storage Enter pr ise that have been assigned media IDs and other attributes, which are recorded in the Media ( VERI TAS Ser ies) Manager volume database.

I ntr oduction

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

volume configuration - Backup and Recover y Sy st em Requir em ents Ex plained to Requirements configuration of information that is stored in the Media Manager volume database. Chapter 2 - Refers Business Back up Systems Chapter 1 Chapter 3

- An I ntr odu ction to NetBackup

volume database

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

internalStor database where Media Manager keeps information about volumes, such as - An Evaluating age Media Requir ements

Chapter 5

of mounts on andConfigur density. All Media Manager hosts have a volume database. - number Gener al Discussion ation

Chapter 6

- Monitor in g the Backup Pr ocess

However, the database is empty unless the host is designated as a volume database host.

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options volume database host

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

The Media Manager (usually the NetBackup master) host that contains information about the volumes that Media Manager uses in a device.

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter - The Futhost ure of Backupallocation host) volume10database (device Chapter 11 - Maj or Players in the Backup Ar ena

The host that is defined as the volume database who is also the device allocation host in an SSO environment.

Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y

Appendix - Tuning Your Backup and Recov er y Application volume Cgroup Appendix D - A Disaster Planning ompieces End toofBeginning logicalRecovery representation of Kit—Fr physical media that share a common residence Appendix E - (standalone Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm or robotic). Appendix F - Per for m ance Test Tech Note

volume Gpool Appendix - Net Backu p Per form ance Tuning on Windows I ndex

A set of volumes that are configured within Media Manager to be used by a single

List of Figur es application and are protected from access by other applications and users. List of Tables List of Sidebars < Day Day Up > < Day Day Up >

< Day Day Up >

en t ing Ba cku p an d Reco ver y: Th e Rea din ess AppendixIGum idplem C: Tuning Your Backup and Recovery e f or t h e Ent er pr ise ISBN:0471227145 by David B. Little and David A. Chapa Application John Wiley & Sons © 2003 (340 pages) This just guide tak eseveryone r eaders thr oughto the necessar steps of your backup and recovery Tuning is a topic that about wants talk about,yand tuning deploy ing ser v ices by showing how to addr ess the application is no exception. Because backup and recovery touch so many areas of the system, and in ar chitectur e, lim it ations, and capabilities of t he ex isting fact, the enterprise, becomes difficult to define clearly. The backup servers need to be net tuning wor k infr astr ucturmore e. tuned for optimum I/O performance, as well as shared memory, message queues, and network performance. The clients need to be tuned to their network performance, plus they need to have good < ?xm " 1.0" encoding= " I SO8859- 1" ?> must be considered, tuning becomes a large task that diskl version= performance. With all the variables that Ta ble o f Con t en t s sometimes appears to be more an art than a science. I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Serwe ies)leave the majority of the operating system tuning to the appropriate system Generally, I ntr oduction administrators and the different operating system specialists. In this appendix, we discuss some of the Pa r t I - Ithat nt r oduct ion done t o Ba ck up and Recove r y application, in the Ent er pr i se Env ir onm e nt tuning can be specifically for the using NetBackup,

and some OS tuning that

Chapter - Backup and Recover y Sy st emlist Requir ents Ex plained directly1affects the application. We also someemtuning references that you can use. If you go to the Chapter 2 Software's - Business support Requirements of Back up Systems VERITAS Web site, http://support.veritas.com, and select Knowledge Base Search, Chapter - An for I ntra odu ction tophrase NetBackup you can3 search specific and limit it to a specific product. We searched for 'tuning' and the Pa specific r t I I - Back product up P roduct 'NetBackup Tutor ia DataCenter.' l

We found several documents, but the two you really should

concentrate are 'NetBackup Performance Tuning Guide for UNIX Platforms' (http://seer.support Chapter 4 - on Evaluating Stor age Media Requir ements .veritas.com/docs/240733.htm) andConfigur 'Tuningation NetBackup on NT Systems for Optimal Performance' Chapter 5 - Gener al Discussion on (http://seer.support.veritas.com/docs/248373.htm ). These two documents contain a lot of the specific Chapter 6 - Monitor in g the Backup Pr ocess tuning steps UNIX and Windows Chapter 7 - for Evaluating Ot her Back up-servers. Related Featur es and Options Chapter 8

- Gener al Tr oubleshooting Tips

The key to tuning any of your backup servers is to understand what resources are being used and how - The Expanding Back up System they are being used. With a NetBackup media server, the primary function is to receive data from a Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s client and move that data to tape. One of the first areas to tune is the size of the data buffers the Chapter 10 -will The ure of application beFut using asBackup it moves the data to tape. You will generally get better performance if the Chapter 11 Maj or Players in the closely Backup match Ar ena the drive cache or are a function of the cache. After application's write buffers more Appendix A Com m and-Line I nter face Gu ide many tests, we have found that in most cases the best buffer size to use with NetBackup is 256 KB, or Appendix - Glossar y 262144.BThis value usually gives the best tape write performance. Chapter 9

Appendix C - Tuning Your Backup and Recov er y Application

There isDanother buffering parameter controls how of these write buffers the application is Appendix - Disaster Recovery Planningthat Kit—Fr om End to many Beginning

allowed Eto use. This isI mpact a little Analysis harder toPlanning quantify, but 8 orStor 16mseems beCalm a good starting number. If you Appendix - Business Kit—The Befor etot he do not manually set up these configuration files, the application uses default values. These values can change with the version of the application and also depend on the platform type (UNIX or Windows) Appendix G - Net Backu p Per form ance Tuning on Windows and whether you are using multiplexing. Appendix F - Per for m ance Test Tech Note I ndex

List Figur es As ofmentioned, tuning is more art than science. The art portion of the equation comes when you want List of Tables the exact values for each of these configuration files. The values we mentioned are to establish List of Sidebars generally good, but depending on the configuration and type of data, you might want slightly different

ones. The only way to determine the best settings is to test and measure, and then test and measure again. Tables C.1 and C.2 list the default values for the common tuning parameters at NetBackup 4.5. < Day Day Up >

Table C.1: Default Values -SIZE_DATA_BUFFERS MULTIPLEXED

NONMULTIPLEXED

UNIX

64K

32K

Windows

64K

64K

Table C.2: Default Values-NUMBER_DATA_BUFFERS

UNIX Windows

< Day Day Up > MULTIPLEXED

NON-MULTIPLEXED

4

8

8 Ba cku p an d Reco ver y: Th e Rea16 I m plem en t ing din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa

ISBN:0471227145

The NetBackup master server is mostly John Wiley & Sons © 2003dependent (340 pages) on system resources, so tuning is not as much an issue as just making resources are configured. resources that can give a master This sure guideenough tak es r eaders thr ough the necessarThe y steps of server problems are message semaphores, deploy ing ser v queues, ices by showing how to and addr shared ess the memory. The NetBackup Release ar chitectur limthese it ations, and capabilities of t hedocuments ex isting Notes give minimum valuese,for resources. In addition, on the support Web site are net wor k infr astrsettings uctur e. for all the most commonly configured operating system available that discuss minimum resource parameters. Table C.3 shows an example of the minimum values for Solaris. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Kernel Settings on Solaris System TaTable ble o f C.3: Con tMinimum en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise * ( VERI TAS Ser ies) I ntrset oduction maxusers=32 Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

*

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2 - Business Requirements of Back up Systems set shmsys:shminfo_shmmin=1 Chapter 3

- An I ntr odu ction to NetBackup

set shmsys:shminfo_shmmni=220

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4 - Evaluating Stor age Media Requir ements set shmsys:shminfo_shmseg=100 Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7 *

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

set shmsys:shminfo_shmmax=8388608

set semsys:seminfo_semume=64

Pa rset t I I semsys:seminfo_semmap=64 I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup

set semsys:seminfo_semopm=32

Chapter 11 - Maj or Players in the Backup Ar ena Appendix set semsys:seminfo_semmni=1024 A - Com m and-Line I nter face Gu ide Appendix B - Glossar y

set semsys:seminfo_semmns=1024

Appendix C - Tuning Your Backup and Recov er y Application

set semsys:seminfo_semmnu=1024 Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

set semsys:seminfo_semmsl=60

Appendix F - Per for m ance Test Tech Note

* Appendix G - Net Backu p Per form ance Tuning on Windows I ndex

set msgsys:msginfo_msgmap=512

List of Figur es Listset of msgsys:msginfo_msgmax=8192 Tables Listset of msgsys:msginfo_msgmnb=65536 Sidebars

set msgsys:msginfo_msgmni=256 set msgsys:msginfo_msgssz=8

< Day Day Up >

set msgsys:msginfo_msgtql=512 set msgsys:msginfo_msgseg=8192 The tuning that we do for a client usually involves dealing with the way the client uses the network. There are settings on the client that will affect the buffer size used for network communications during backup. These are different for UNIX and Windows clients but are mentioned in the tuning documents cited earlier. In addition, some operating system network parameters then sometimes are tuned. These are also mentioned in detail in the tuning documents. One of the most common things that can cause performance issues with network client backups is the duplex setting. To get the best performance, all

networks should be set to FULL DUPLEX. Sometimes we see a mismatch where some settings are < Day Day Up > FULL DUPLEX and some are HALF DUPLEX, but the most common mistake is to set the duplex to AUTOMATIC. This very often results in a mismatch. Each OS has its own way to check the duplex setting. For example, on HP UNIX systems, you check this with the lanadmin command, whereas on I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Solaris, you use ndd. Gu id e f or t h e Ent er pr ise ISBN:0471227145 by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages) < Day Day Up > This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

en t ing Ba cku p an d Reco ver y: Th e Rea din ess AppendixIGum idplem D: Disaster Recovery Planning Kit-From e f or t h e Ent er pr ise ISBN:0471227145 by David B. Little and David A. Chapa End to Beginning John Wiley & Sons © 2003 (340 pages) This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr uctur e. twist on a common term we have heard for years, backup and Recovery and backup-it's an astr interesting

Overview

recovery. When was the last time you heard someone lead with recovery? So much emphasis is placed on backup-high speed, highly compressed data, and backing up very large amounts of data. < ?xm l version= " 1.0" encoding= " I SO88591" ?> Backup is important; however, restorability defines our success. We want very fast backups of very Ta ble o f Con t en t s large amounts of data a minimum impact on Guide our networks-at least I mplem ent ing Backup andwith Recover y—The Readiness for the Enter pr isethat's what our management teamTAS hasSer been ( VERI ies) telling us (and they want it done by 4:00 P.M. Friday afternoon). Unless we have done ouroduction due diligence, we will be poorly prepared to rebut their expectations. Simple responses such as I ntr 'that's not possible' theRecove facts to uperwill on irdeaf ears. Pa r t I - Ijust nt r oduct ion t o Bawithout ck up and r y back in theitEnt pr i fall se Env onm e nt Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Well, now that you are here, hopefully this appendix will help you better prepare your answers to - Business Requirements of Back up Systems management when certain expectations are placed on you for backup and recovery-or recovery and Chapter 3 - An I ntr odu ction to NetBackup backup. Often, when we plan, we should consider starting with the end result and work backward. Just Pa r t I I - Back up P roduct Tutor ia l like the mazes that we used to do as children, it always seems to be easier when we start from the end Chapter 4 - Evaluating Stor age Media Requir ements and work our way back. Why? Well, we don't know of any specific scientific proof, but it probably has Chapter 5 - Gener al Discussion on Configur ation to do with the change in our perspective. Our perspective changes when we start to plan our data Chapter 6 Monitor in g the Backup Pr ocess management policies backward: disaster recovery, recovery, and backup. When we plan backward, Chapter - Evaluating her Back up- Related es and Options we can7define our goalsOtmore clearly, identifyFeatur management expectations, and present a concise Chapter 8 Gener al Tr oubleshooting Tips message of the financial impact the expectations have on our overall plan. Chapter 2

Chapter 9

- The Expanding Back up System

Pa r t I I I - The BACKUP Ente r pri se IS IIMPORTANT; m pa ct of Back up HOWEVER, Sy ste m s

RESTORABILITY DEFINES OUR SUCCESS

Chapter 10 - The Fut ure of Backup

Before we discuss the disaster recovery plan, let's talk about recovery plans in general. A recovery plan can be divided up into four parts. The first part of the document contains Appendix A - Com m and-Line I nter face Gu ide every step system administrators, database administrators, or applications developers take Appendix B - Glossar y for granted when, during the normal course of the day, they are called upon to 'fix' or Appendix C - Tuning Your Backup and Recov er y Application maintain the server or application for which they are responsible. The second part contains Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning the information documented as though these administrator and developers are not readily Appendix E - Business Planningand Kit—The Stor Befor e t he available. This isI mpact much Analysis more detailed written tomthe level ofCalm the personnel most likely to Appendix F Per for m ance Test Tech Note be executing the plan. This means if the likelihood of a junior system administrator Appendix G - Netthe Backu p Per ance onshould Windows executing plan is form high, theTuning person be able to read and understand the recovery I ndex steps without question. The third part now includes a call tree to be used in the event any List ofof Figur thees critical components (administrators) need to be contacted in their absence. Finally, fourth part contains information as it pertains to differing levels of interruptions. These List ofthe Tables range from severe weather to complete facility access having been cut off. List ofcan Sidebars Chapter 11 - Maj or Players in the Backup Ar ena

What rounds out the recovery plan and makes it a disaster recovery plan are the business impact analyses that tell you how much money it will cost the company if a particular < Day Day Up > application or server is unavailable for a period of time. A very strong element of your disaster recovery plan is the business impact analyses and assessments. These are prerequisites to beginning your DR plan. So if you haven't already done so, please begin with the business impact analysis planning kit that we prepared for this appendix or one that your organization has standardized on before you launch out into creating your DR plan. Without the valuable information that will be generated from these reports, your DR plan will be very weak.

< Day Day Up >

< Day Day Up >

plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess How to UseI mThis Kit Gu id e f or t h e Ent er pr ise

ISBN:0471227145 David resources B. Little andand David Chapa We used severalby Internet pastA.experiences for our research in developing this planning Wiley &toSons © 2003 pages)DR professionals from various companies who had kit. We have beenJohn privileged work with (340 several created excellentThis DR guide plans,tak and havethr used aid in es we r eaders oughtheir the expertise necessar yto steps of putting this small planning kit ing ser v ices by showing addr ess the touch on most of the high points of together. It is not deploy an exhaustive planning kit, buthow we to believe it does ar chitectur e, lim it ations, and capabilities of t he ex isting DR.

net wor k infr astr uctur e.

The purpose of this document is to assist in the planning and creation of a DR plan for your organization. we have "not absolutely everything an administrator would want to cover in < ?xm l version= "While 1.0" encoding= I SO-included 8859- 1" ?> his or her DR plan, this is rather extensive and should provide you a good base on which to build your Ta ble o f Con t en t s plan. One of Backup the primary reasonsy—The for having a DRGuide plan is limit thepr decisions that must be made I mplem ent ing and Recover Readiness fortothe Enter ise following a disaster. When disaster strikes, the decision-making process is tainted because of the ( VERI TAS Ser ies) events surrounding the disaster, as well as the physical demands a disaster has on the team without I ntr oduction the ofraoduct planion such asckthis. It also removes anyEnt dependencies may Pa r t Iaid - I nt t o Ba up and Recove r y in the er pr i se Env ir the onmcompany e nt

have upon certain people or groups that would be required for the recovery process, such as consulting partners, Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained hardware or software vendors, and so on. Chapter 2 - Business Requirements of Back up Systems Chapter 3

- An I ntr odu ction to NetBackup

Note: NOTE When responding to a disaster, it is imperative that you follow your company's policies Chapter 4 - Evaluating Stor age Media Requir ements with regard to media communication, especially if your organization is a well-known Chapter 5 target - Gener Discussion on Configur ation for al media coverage. Pa r t I I - Back up P roduct Tutor ia l

Chapter 6

- Monitor in g the Backup Pr ocess You should whatOtsteps to take during Featur the development of your DR plan. Many companies have Chapter 7 - decide Evaluating her Back up- Related es and Options

been very the model illustrated in Figure D.1, but it may be modified to suit your Chapter 8 successful - Gener al Trusing oubleshooting Tips needs. 9It is -a The seven-layer model that covers most bases. Chapter Expanding Back up System Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

Figure D.1: Disaster recovery plan model. < Day Day Up > < Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Getting Started Gu id e f or t h e Ent er pr ise

ISBN:0471227145 David B. Little and David A. Chapa Always include anbyobjective, site-specific details, and a list of terms to be used throughout your Wiley Sons © 2003 (340 pages)that you want to reader to understand; it should also document. This isJohn all of your&up-front information give those who are not necessarily the ones executing the plan the ability to comprehend just what the This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how addr ess the accomplishes a couple of things: plan will accomplish if done successfully. Doing it intothis manner

ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e. Eliminates confusion

Sets expectations for the use of this plan at the outset

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> TaLet's ble olook f Conat t en t sfollowing example of a DR plan. the

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

SAMPLE DR PLAN

I ntr oduction Pa r t I OBJECTIVE - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained Maintain the 's ability to continue to service customers, complete sales, Chapter 2 - Business Requirements of Back up Systems

and deliver their online services in a global market place. This ability hinges on four - An I ntr odu ction to NetBackup primary data centers located across the United States and Canada.

Chapter 3

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4 -data Evaluating Stor age Media Requir ements These centers consist of mainly decentralized servers that once were singularly Chapter 5 Gener al Discussion on Configur ation Therefore, the protection of the data of these located on legacy mainframe hardware. Chapter 6 - Monitor in g the duplications Backup Pr ocessand off-site storage with enough detail to facilitate systems with regular Chapter 7 Evaluating Ot her Back up- Related Featur es and Options recovery is critical to the success of this plan. As part of this plan, regular testing will be Chapter 8 Gener al Tr oubleshooting Tips scheduled to ensure the company's ability to survive a disaster. Chapter 9

- The Expanding Back up System

TERMS Pa r t I DEFINITION I I - The Ente rOF pri se I m pa ct of Back up Sy ste m s Chapter 10 - The Fut ure of Backup Chapter 11 Assessment - Maj or Players in the Backup Ar ena team. This person or group of persons will be responsible for assessing Appendix A the - Com m and-Line I nter face Gu ide level of damage the disaster caused to the organization's facilities, IT Appendix B infrastructure, - Glossar y intellectual property (data), and so on. This team may consist of a Appendix C number - Tuningof Your Backupbusiness and Recovunits er y Application different depending on the depth and breadth of the DR Appendix D plan. - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

Business-critical.Defined as any resource, be it data, applications, personnel, and so on, that would be second (to mission-critical; see below) in priority in the plan of Appendix G - Net Backu p Per form ance Tuning on Windows recovery in the event of disaster, loss, or interruption. An example of a businessI ndex critical application may be payroll and accounting. Appendix F - Per for m ance Test Tech Note

List of Figur es

List of Tables Business interruption.Any event whether planned or unplanned that disrupts the List of Sidebars normal course of business operations at one of your locations, which if not

addressed within a predetermined amount of time may turn into a disaster. Disaster. A disaster is declared when an event or chain of events results in the < Day Day Up > inability of an organization to provide critical business functions for a period of time and/or causes the company to move from using standard operating procedures to employing its disaster recovery plan after a predetermined period of time, potentially at another facility. Emergency on-call. This is the front line in the event of a disaster. This person or group of persons will be contacted in the event of a disaster, and they, as part of the response team, will execute this plan and begin the process of recovery. Functional critical. Noncritical back-office functions such as file and print. Management team.The person or group of persons managing the entire execution of the DR plan. This team will ultimately have full responsibility for the success or failure of the DR plan.

Mission-critical. Defined as any it data, applications, personnel, and so Day Day Up on, that would be of the highest priority in the plan of recovery in the event of disaster, loss, or interruption. An example might be online ordering or reservations systems. I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu idteam. e f or The t h e Ent er pr ise Recovery person or group of persons that will take on the responsibility of ISBN:0471227145 by David B. Little and David A. Chapa the actual recovery process. This may involve restoration of the data from backup Sons © 2003 (340 pages) media John or, inWiley fact,&the management of the restoration of physical infrastructure, facilities, sotak on. team a number Thisand guide es This r eaders thr may ough include the necessar y steps of of different people representing deploy ser v icesbusiness by showing how to addr ess the a number of ing different units. ar chitectur e, lim it ations, and capabilities of t he ex isting

net wor k infrThe astr uctur e. or group of persons responsible for carrying out the Response team. person declaration of and recovery from a disaster. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction < the DayEnt Day Upi se > Env ir onm e nt Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in er pr Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Scope

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by the David B. Little and David Chapa The scope defines boundaries of this DRA.plan, such as when this plan will be invoked and how this Wiley It&also Sonsgives © 2003 (340 pages) plan will be most John effective. the response teams and management teams a clear, concise image of the expectations thisthe DRnecessar plan. An example This guidefor takthe es rexecution eaders thr of ough y steps of wording of a scope follows:

deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting nethas wor kbeen infr astr uctur e. for use in the event that access to the mission-critical data The DR plan developed

has been rendered unavailable. Recovery may be achieved from total disaster to component disaster by using all or part of this plan. Component disaster describes anything that is not < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o fconsidered Con t en t s total destruction, such as server failure, hard drive failure, and so on. This plan will not cover recovery of client workstation data, which was considered nonessential at the point I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise thisSer DR plan was developed. ( VERI TAS ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Assumptions - Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 1 Chapter 2

- Business Requirements of Back up Systems It is important toI disclose thetoassumptions Chapter 3 - An ntr odu ction NetBackup made during the development of this plan. This has gotten

more attention since September 11, 2001. When the DR plans were developed, companies assumed that they would be able to get across town to their data; they never assumed that the roads would be - Evaluating Stor age Media Requir ements completely shut down as they were in New York for a period of time. Disclosing these assumptions at Chapter 5 - Gener al Discussion on Configur ation the beginning of the plan will give the response teams the ability to make decisions that fall outside this Chapter 6 - Monitor in g the Backup Pr ocess plan should they find themselves in one of those situations. Here are some sample assumptions you Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options might make at your company: Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I Certain I I - The Ente assumptions r pri se I m pahave ct of been Back up made Sy steduring ms

the development of this plan. The following

lists assumptions: Chapter 10 the - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena

Recovery site of choice is ready and available at the time of the declaration.

Appendix A - Com m and-Line I nter face Gu ide

Appendix BPaging - Glossar andy telecommunication systems for public access are available. Appendix C - Tuning Your Backup and Recov er y Application

IT -staff responsible backup andom recovery are on call and available. Appendix D Disaster Recovery for Planning Kit—Fr End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

Access to public/private transportation will be available.

Appendix F - Per for m ance Test Tech Note

Appendix G - Net Backu p Per ance Tuning onat Windows Hardware will be form available for use the hot site. I ndex

Software will be available from the off-site media storage facility. List of Figur es List of Tables

Air travel will not be interrupted.

List of Sidebars

< Day Day Up > < Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Off-Site Location Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by David B. Little andas David List the off-site location here, as well a listA.ofChapa all authorized parties and their various capacities, such Johnand Wiley & Sons ©of2003 (340 pages) The following procedure is used by the authorized as retrieval of media changing permissions. personnel to contact off-site storage vendor and arrange forofthe media to be transported to This the guide tak esdata r eaders thr ough the necessar y steps deploy inglocation(s). ser v ices by showing how to addr ess the the appropriate recovery

ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

Define 'off-site' for your organization. Off-site can mean several things to different organizations. Some are completely secure with the data being 6 miles away in another data < ?xm l version= " 1.0" " I SO- 88591" ?> power grid, while others consider off-site to be more than center that sitsencoding= on a completely separate Ta ble o t enaway t s from the primary location. Still others will not consider media to be off-site unless it 50f Con miles I mplem Backup and Recoverlocation y—The Readiness for thefrom Enter pr ise is ent in aingcompletely secured sufficientlyGuide distanced railways, large cities, or power ( VERI TAS Ser ies) facilities. Once again, 'sufficiently distanced' should be defined here. An off-site vendor must I ntr oduction restrict access to their facilities to only authorized personnel, yet make the data available anytime, Pa r t I day - I ntor r oduct ion t o Ba ck up and Recove r y in the er pr i se Env ir onm e nt location: night. The following is an example of aEnt definition for an off-site Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained An2off-site locationRequirements is any location sufficiently distanced from any railways, large cities, or power Chapter - Business of Back up Systems

facilities thatI ntr offers a secure building and storage area that is restricted to authorized personnel Chapter 3 - An odu ction to NetBackup butupwill allow immediate Pa r t I only, I - Back P roduct Tutor ia l

access to data anytime day or night in the event of a disaster. The

off-site will provide contact list ements of individuals to be contacted in the event we declare a Chapter 4 - vendor Evaluating Stor age aMedia Requir

disaster. This off-site facility must be, at minimum, 45 miles from the primary data location(s). - Gener al Discussion on Configur ation There are four data locations: Redmond, Washington; Chicago, Illinois; Minneapolis, Minnesota; Chapter 6 - Monitor in g the Backup Pr ocess and Rochester, New York. The locations of the off-site vendor's data vaults should be nonChapter 7 - Evaluating Ot her Back up- Related Featur es and Options descript, low-key buildings, as should the transportation vehicles, in order to maintain security of Chapter 8 - Gener al Tr oubleshooting Tips the data during transport and storage. Chapter 5

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

A documented procedure Chapter 10 - The Fut ure of Backupmust be in place that outlines the off-site rotation process. At a minimum, this must include a list of Ar who Chapter 11 - Maj or Players in the Backup enais authorized to send data off-site, who is authorized to

recall who is authorized make changes in access levels of the company employees. Appendix A data, - Comand m and-Line I nter face Gutoide Appendix B - Glossar y Appendix C - Tuning Your er y Application A process must be Backup in placeand forRecov reviewing who has access to off-site processes. This review Appendix must D be - Disaster done at Recovery a minimum Planning annually, Kit—Fr or whenever om End to there Beginning is a change in responsibilities that

warrants it. Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows < Day Day Up > I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem enAnalysis t ing Ba cku p an d Reco ver y: Th e Rea din ess Business Impact Gu id e f or t h e Ent er pr ise

ISBN:0471227145 byanalysis David B.(BIA) Little is and A. Chapaof your company's A business impact anDavid assessment strengths and weaknesses as Wiley & Sons 2003 (340 pages) they pertain to theJohn company's ability© to recover from a severe business interruption or a complete disaster. You should able define of youry business This also guidebe tak es r to eaders thrwhat ough areas the necessar steps of are mission-critical, businessdeploy ing serThe v ices by showing howwill to addr ess the your actions in the face of disaster. critical, or functional-critical. level of criticality determine ar chitectur e, lim it ations, capabilities of t henot ex isting Typically, companies conduct BIAs for alland areas of business, just for IT. If your company is currently net wor k infr astr uctur e. not conducting formal studies such as this, now is a great time to start as you begin the creation of your disaster recovery plan. No company is too small to conduct a BIA, because every company has something to" lose in a disaster. < ?xm l version= 1.0" encoding= " I SO- 8859- 1" ?>

Ta ble o f Con t en t s

After the assessment hasRecover been done, summaryGuide of thefor report should be included at the very least to I mplem ent ing Backup and y—TheaReadiness the Enter pr ise inform DR ( VERI TASthe Ser ies)team of the expectations of the business units. The report should include items such as application/server, recovery location, recovery time, date BIA was done, and the parties that approved I ntr oduction this an and example ofr a BIA report youe do Pa r t I BIA. - I ntTable r oductD.1 ion tshows o Ba ck up Recove y in the Ent ertemplate. pr i se Env irIfonm nt

not have a template for a business impact analysis, you may use the business impact analysis planning kit to develop one. Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained Chapter 2

- Business Requirements of Back up Systems

You may also want to include where these BIAs are being stored, including both electronic storage and - An I ntr odu ction to NetBackup physical storage, such as is discussed in the next section.

Chapter 3

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5 Chapter 6

- Gener al Discussion on Configur ation < Day Day Up > - Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

plem t ing Ba cku p an d Reco ver y: Th e Rea din ess DeclarationI mof a en Disaster Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by David B. Little and DavidClearly A. Chapa What does your company call a disaster? define the levels of disasters and what warrants the John Wiley & Sons 2003 (340 pages) declaration of a disaster. Also take ©into consideration a definition of business interruptions and steps to take in the event This the business changes a disaster. We guide tak interruption es r eaders thr ough theinto necessar y steps of consider a business interruption deployplanned ing ser v ices by showing that how disrupts to addr ess as any event, whether or unplanned, thethe normal course of business operations at ar chitectur and capabilities of t he ex istingamount of time may turn into a one of your locations, whiche,if lim notit ations, addressed within a predetermined net wor k infr astr uctur e. disaster.

< ?xm l version= " 1.0" encoding= " I SO- 88591" ?>Template Table D.1: Sample BIA Summary Report Ta ble o f Con t en t s

APPLICATION RECOVERY RECOVERY BIAEnter pr ise I mplem ent ing Backup and Recover y—The Readiness Guide for the LOCATION TIME COMPLETION ( VERI TAS Ser ies)

APPROVED BY

DATE

I ntr oduction

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

WHAT TO ASK BEFORE DECLARING A DISASTER

Chapter 7 - Evaluating Ot her Back upFeatur esdeclare and Options Operations, IT management, orRelated facilities may a disaster and invoke the recovery Chapter 8 Gener al Tr oubleshooting Tips process, depending on the answers to the following questions: Chapter 9

- The Expanding Back up System

Are Ente yourexperiencing floods Pa r t I I I - The pri se I m pa ct offlash Back up Sy stein m syour

area?

Chapter 10 - The Fut ure of Backup

Has this affected any of the critical data centers?

Chapter 11 - Maj or Players in the Backup Ar ena

Appendix AAre - Com and-Line Iexperiencing nter face Gu ide water problems, such as flood, broken pipe, and so on? yourmfacilities Appendix B - Glossar y

As- aTuning result,Your are Backup any of and the critical centers at risk? Facility at risk? Appendix C Recov er ydata Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Has a fire broken out in the building?

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix FHave - Per for mexperienced ance Test Tech Note failure? you a power Appendix G - Net Backu p Per form ance Tuning on Windows I ndex

Do you see or smell smoke in the server room?

List of Figur es

Has natural disaster damage to the building limited normal access?

List of Tables List ofIfSidebars you answered yes to any of these questions, immediately contact the primary on the call

tree. If contact fails, contact the secondary and page the primary. Continue this process with the tertiary contact until you have reached someone on the < Day Day Up > declaration call tree.

Disaster Declaration Process Define your organization's process for declaring a disaster, such as responsible parties, levels of criticality, and so forth. What would warrant a disaster? What would you consider a business interruption? When does a business interruption shift into a disaster? Following are some sample questions you might want to consider as a guide to help you determine if a declaration is necessary and what level of severity it would be.

< < Day Day Day Day Up Up > >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Response Teams Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by David Little and David A. we Chapa DR plans are executed byB.a group of persons call the response team. The team consists of all Johnresponsible Wiley & Sons 2003 (340 pages) subgroups of teams for©executing this DR plan in a successful manner, including the emergency on-call, recovery teams. Certainy members Thisassessment, guide tak es rand eaders thr ough the necessar steps of of the response team should deploy ing ser vof ices showing how to addrin ess the to remain focused, they should have manage the overall execution thebyDR plan; preferably, order ar chitectur e, lim it ations, and capabilities of t he ex isting no other subgroup responsibilities.

net wor k infr astr uctur e.

Emergency On-Call

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> TaThe ble oemergency f Con t en t s on-call team is the first line of support when the declaration is made. The primary I mplem ent ing Backup y—The Guide for the Enter pr ise An example of some key team lead will initiateand theRecover plan once theyReadiness have confirmed the declaration. ( VERI TAS Ser ies)

positions and their responsibilities are listed in Table D.2.

I ntr oduction

Pa r t Iout - I completely nt r oduct ion the t o Ba ck up and Recove y in the Entincluding er pr i se Env onm e nt Fill call tree shown in rTable D.3, asir many alternates

Chapter 1

as possible.

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2 - Key Business Requirements of Back up Systems Table D.2: Positions on the Emergency On-Call Team Chapter 3 - An I ntr odu ction to NetBackup

KEY POSITION

RESPONSIBILITY

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4 contact - EvaluatingLeader Stor ageofMedia Requir ements Primary the recovery teams, assignment of tasks, and management of Chapter 5 - Gener al Discussion on Configur ation the DR plan. Chapter 6

- Monitor in g the Backup Pr ocess

Secondary Second in command to the Primary and would assume all responsibilities - Evaluating Ot her Back up- Related Featur es and Options of the primary in the event the primary is not available. contact

Chapter 7 Chapter 8

- Gener al Tr oubleshooting Tips

Chapter Tertiary 9 contact - The Expanding Assumes Back up primary System role in the event both primary and secondary leaders Pa r t I I I - The Ente r pri seare I m pa notct available. of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup

Management representative

Business unit representative who's responsible to act as a liaison between the recovery team and corporate management. This individual Appendix A - Com m and-Line I nter face Gu ide should be instrumental in acquiring any additional resources necessary to Appendix B - Glossar y make the recovery successful. Chapter 11 - Maj or Players in the Backup Ar ena

Appendix C - Tuning Your Backup and Recov er y Application

Networking Primary contact group managing wide-area and local-area network Appendix D - Disaster Recovery Planningwith Kit—Fr om End to Beginning Appendix E - Business Iinfrastructure. mpact Analysis Planning Kit—The Stor m Befor e t he Calm

Appendix F - Per for m ance Tech Note Finance ThisTest individual has appropriate authority to authorize purchases of assets Appendix G - Net Backu porPer form ance Tuningtoon Windows recover from the declared disaster. services in order successfully I ndex List of Figur es List of Tables List of Sidebars

This person should have limits on his or her authority, and beyond that, a senior finance representative should be available for additional authorization.

Facilities

Physical building, environmental controls, and so on.

P.R.

This group will be responsible for all media communication when necessary. < Day Day Up >

Table D.3: Emergency On-Call Team

KEY POSITION

NAME

PHONE #

< Day Day Up > CELL PHONE/PAGER NUMBER

HOME PHONE #/ALT. PHONE# I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

Primary contact

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

Secondary contact Tertiary contact

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Management Ta ble o f Con t en t s

representative I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) Networking

I ntr oduction

Pa rFinance t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

P.R. 3 Chapter

- An I ntr odu ction to NetBackup

Facilities

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5 Chapter 6

- Gener al Discussion on Configur ation - Monitor in g the Backup Pr ocess < Day Day Up >

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

ADDRESS

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Assessment Team Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by David B. Little and David the A. Chapa This team evaluates the situation, identifies severity of the damage, and reports back to the John Wiley & Sons © 2003 (340should pages) include estimates and rough time lines for emergency on-call team leader. The report recovery. Once again, theretak should be a list of people involved in thisofteam. A sample of this team is This guide es r eaders thr ough the necessar y steps deploy ing ser v ices by showing how to addr ess the listed in Table D.4.

ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

Table D.4: Key Positions on the Assessment Team KEY POSITION < ?xm l version= " 1.0" encoding=DESCRIPTION " I SO- 8859- 1" ?> Ta ble o f Con t en t s Primary contact

Organizes and mobilizes the team.

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) Secondary leader Assists primary, assumes role in the event the primary leader is not I ntr oduction available. Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Tertiary leader

Chapter 1

Assumes primary role in the event both primary and secondary leaders are unavailable.

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems Networking damage to wide-area and local-area network Chapter 3 - An I ntr odu ctionAssesses to NetBackup

infrastructure. Pa r t I I - Back up P roduct Tutor ia l Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Sys administrators

Assesses their appropriate areas.

Application their appropriate areas. Chapter 6 - Monitor in g the Assesses Backup Pr ocess developers Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options Chapter 8 - Gener al Tr oubleshooting Database Assesses Tips their appropriate areas. Chapter 9 The Expanding Back up System administrators Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Vendors Provides information regarding repair, replacement, pricing, and Chapter 10 - The Fut ure of Backup resource availability. Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y

You should list the members of the damage assessment team using the example shown in Table D.5.

Appendix C - Tuning Your Backup and Recov er y Application Appendix D Note: - Disaster NOTERecovery Planning Kit—Fr om End to Beginning

Please list alternate members wherever possible. Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows < Day Day Up > I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Recovery Team Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by manages David B. Little and David A. Chapa The recovery team the overall recovery of the data, systems, and hardware. There may be John the Wiley & Sons © 2003 pages) this team will be composed of system some crossover from other teams, but(340 primarily Table D.6 shows the of key positions on the recovery administrators, DBAs, and application support. This guide tak es r eaders thr ough the necessar y steps deploy ing ser v ices by showing how to addr ess the team.

ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

Table D.5: Assessment Team

KEY POSITION NAME PHONE < ?xm l version= " 1.0" encoding= " I SO- 88591" ?> # Ta ble o f Con t en t s

CELL HOME PHONE/ PHONE PAGER I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter#/ALT. pr ise NUMBER PHONE# ( VERI TAS Ser ies)

ADDRESS

I ntr oduction

Primary

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Secondary Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Tertiary

Pa rNetworking t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

System - Gener al Discussion on Configur ation administrators

Chapter 5 Chapter 6

- Monitor in g the Backup Pr ocess

Application Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options administrators/ Chapter 8 - Gener al Tr oubleshooting Tips

developers Chapter 9 - The Expanding Back up System Pa rDatabase t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup administrators Chapter 11 - Maj or Players in the Backup Ar ena

Facilities manager

Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Vendors Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Key Business I mpact Planning Team Kit—The Stor m Befor e t he Calm Table D.6: Positions onAnalysis the Recovery Appendix F - Per for m ance Test Tech Note

POSITION

DESCRIPTION

Appendix G - Net Backu p Per form ance Tuning on Windows I ndex Primary List of Figur es List of Tables

Responsible for management of the team, assignments, and reports.

Secondary leader

Assists primary leader, assumes role in the event the primary leader is not available.

Tertiary leader

Assumes primary leader role in the event both primary and secondary leaders are < Day Day Up > unavailable.

System administrators

Coordinates restoration of hardware, OS, and data from backup media

Network

Coordinates restoration of network services to the local and/or wide-area network(s).

Application administrators/developers

Coordinates the recovery of key applications. Works very closely with the system administration members.

Database administrators

Recovers, restores, and tests the database applications and data to the servers.

List of Sidebars

Table D.7 is a contact list or call tree for the recovery team.

Table D.7: Recovery Team KEY POSITION

NAME

< Day Day Up >

PHONE #

CELL PHONE/ HOME PAGER PHONE #/ NUMBER ALT. I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess PHONE# Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

Primary Secondary Tertiary System administrator

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Network Ta ble o f Con t en t s I mplem ent ing systems Backup and Recover y—The Readiness Guide for the Enter pr ise Hardware ( VERI TAS Ser ies)

specialist

I ntr oduction

Pa rApplication t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

administrator/ Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained developers Chapter 2 - Business Requirements of Back up Systems Chapter 3 - An I ntr odu ction to NetBackup Database Pa radministrators t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7 Chapter 8

- Evaluating Ot her Back up- Related< Featur es and Day Day Up >Options - Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

ADDRESS

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Infrastructure Inventory Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by Davidinventories B. Little and Chapa to any DR Hardware and software areDavid very A. important plan. Without this information, you Johnyour Wiley & Sons ©to2003 (340 pages) expose yourself and company potential failure during the execution of the plan. While this may seem like a greatThis dealguide of work, outcome far outweighs they grief tak esthe r eaders thr ough the necessar stepsyou of are putting yourself through deploy ing plan ser v ices how addr ess the today. The success of the will by be showing measured bytothe thoroughness of your work during the ar chitectur development of your plan. e, lim it ations, and capabilities of t he ex isting

net wor k infr astr uctur e.

Hardware Inventory

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> TaInclude ble o f Con t en t s detail as possible about the hardware that will be protected by this DR plan. The as much I mplem ent ing the Backup andAlso Recover y—The Readiness Guide for the Enter pr ise more detail better. include as much information about the maintenance contract as possible ( VERI TAS Ser ies)

for the hardware as well. Here's a brief sample list of what you may want to include in your hardware inventory:

I ntr oduction

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1 - name Backup and Recover y Sy st em Requir em ents Ex plained Server Chapter 2

- Business Requirements of Back up Systems

Make/model Chapter 3 - An I ntr odu ction to NetBackup Pa r t I I - Back up P roduct Tutor ia l

Serial number

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter OS5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess level Ot her Back up- Related Featur es and Options Chapter 7 Patch - Evaluating Chapter 8

- Gener al Tr oubleshooting Tips Memory

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s Amount

Chapter 10 - The Fut ure of Backup

Chapter 11 Type - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide

Disk controllers

Appendix B - Glossar y Appendix DiskCdrives - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Partitions

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Network interface card Appendix G - Net Backu p Per form ance Tuning on Windows I ndex IP address List of Figur es

For your UNIX servers, try to script as much of this as possible; if you are using VERITAS NetBackup, use the NetBackup Configuration Verification Utility (NCVU) found on VERITAS' support Web site. It List of Sidebars will make running this inventory much easier. For Windows NT and 2000 servers, formal software packages are available that will help you create this type of information. How it is gathered is not the issue; the fact that you gather it for all machines deemed critical is what is important. List of Tables

< Day Day Up >

Architecture Inventory The reason we included this heading under Hardware Inventory is that we feel the two go hand in hand. We want to stress the importance of diagrams that illustrate your network configuration, server configuration, drive partitioning, and so on. Include any and all diagrams necessary for this DR plan here. We're sure many of you have spent hours creating your Visio diagrams; now is the time to display them. Any paper or electronic diagrams should be recorded in your DR plan. If your company has an information librarian, then have him or her mark and track these documents; if not, include a table similar to the one in Table D.8.

Software Inventory Equally as important as the hardware inventory, the software inventory will play a critical role in a

successful recovery. Following is another sample list of the information you may want to include in < Day Day Up > your software inventory list: Application name I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess

Functional name for er example) Gu id (Finance, e f or t h e Ent pr ise

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

Default installation path

ISBN:0471227145

This path guidedifferent tak es r eaders thr ough (Y/N) the necessar y steps of Installation from default? deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting If yes, explain net wor k infr astr uctur e.

Software version < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Maintenance contract information Ta ble o f Con t en t s I mplem ent ing Backup Software licenseand Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Hosting server Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1 - Example Backup and Recover y Sy st em Inventory Requir em ents Ex plained Table D.8: of an Architecture Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

PURPOSE

Pa r t I I - Back up

Chapter 4

DOCUMENT NAME (P)APER/ P roduct Tutor ia l (E)LECTRONIC

LOCATION(S)

LAST UPDATED

OWNER

04-30-02

O. L. Mysu

01-08-02

C. S. Psyrvivour

- Evaluating Stor age Media Requir ements

Chapter 5 for - Gener alP-Network Discussion Map on Configur Network 500 ationP-Off-site Chapter building 6 500 - MonitorE-NetMap_500.doc in g the Backup Pr ocess

Vendor

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options E-Server/Path/

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Document

Finance P-Finance Server application Chapter 10 - The FutE-FINSERV.doc ure of Backup server

P-Corporate Library

Appendix A - Com m and-Line I nter face Gu ide

Document

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 11 - Maj or Players in the Backup Ar ena E-Server/Path/ Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning < Day Day Up Appendix E - Business I mpact Analysis Planning Kit—The Stor> m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Call Tree

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

by David and David A. Chapa Call trees, or contact lists,B.anLittle example of which is illustrated inISBN:0471227145 Table D.9, must be kept up-to-date and John Wiley & Sons © 2003 (340decide pages) to put this at the beginning of their DR plans, while should be included in every DR plan. Some others create listsThis for guide each member to carry on their calloftree will be used by anyone who tak es r eaders thr ough the person. necessarThis y steps deploy ing ser v ices by showing howintothis addr ess the is facing a potential disaster as defined previously document. Primary contacts from your ar chitectur e, lim itand ations, and capabilities of t hebe ex included isting emergency on-call, assessment, recovery teams should in this list. net wor k infr astr uctur e.

High-Profile Users

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> TaThese ble o f are Conusers t en t s of critical systems and should be notified in the event that their particular area has I mplem ent ing Backup y—The Readiness Guide for the Enter pr iseinformed of the progress your been affected. They and will Recover be instrumental in keeping the user population ( VERI TAS Ser ies)

DR team is making. Table D.10 shows a sample call tree for these high-profile users.

I ntr oduction

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Table D.9: Example of a Call Tree

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

CONTACT ADDRESS PHONE PHONE/ Chapter 2 - Business Requirements of Back upCELL Systems Chapter 3

#/ - An I ntr odu ction to NetBackup

HOME PHONE #/ ALT. PHONE #

PAGER NUMBER

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

TEAM

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Table D.10: Example of a Call Tree for High-Profile Users

Chapter 10 - The Fut ure of Backup

Chapter 11 - Maj or Players in thePHONE Backup Ar ena CONTACT ADDRESS CELL Appendix A - Com m and-Line I nter#/face Gu ide PHONE/ Appendix B - Glossar y PAGER Appendix C - Tuning Your Backup and Recov er NUMBER y Application

HOME PHONE #/ ALT. PHONE #

APPLICATION

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables

Local Authorities

List of Sidebars

It may seem far-fetched to include a call tree for local authorities, but you never know until you are faced with a disaster. Having these numbers< at your fingertips will once again give you the ability to Day Day Up > make proactive decisions and not reactive ones. Table D.11 shows an example of a call tree for local authorities. You may want to include local and state police, hospitals and emergency rooms, even Federal Emergency Management Agency (FEMA) numbers.

Contractor Contacts Key lists of contractors or consultants who may have first-hand knowledge of the environment, applications, or other critical information necessary to the success of the recovery should be included in this plan. Again, the inclusion may be as simple as the example shown in Table D.12. Table D.11: Example of a Call Tree for Local Authorities

CONTACT

Hospitals/ emergency rooms

ADDRESS

Day Up > PHONE< Day CELL PHONE/ #/ PAGER NUMBER

HOME PHONE #/ ALT. PHONE #

TEAM

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

Poison control This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the centers City police

ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

County/ state < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> police Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

Table D.12: Example of a List of Contractors

I ntr oduction

Pa rCONTACT t I - I nt r oduct ion ADDRESS t o Ba ck up and PHONE Recove r y inCELL the Ent PHONE/ er pr i se Env HOME ir onm e nt

Chapter 1

PAGER PHONE #/ - Backup and Recover#/ y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back upNUMBER Systems

Chapter 3

- An I ntr odu ction to NetBackup

AREA OF EXPERTISE

ALT. PHONE #

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Vendor Contacts

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup

Any vendor youPlayers may deem a disaster should be listed here. This could include Chapter 11 - that Maj or in the important Backup Ar during ena

hotels, office supply stores, airlines, and local carryout restaurants. This may require a bit of thinking outside the box, because you need to take into consideration that your response teams may be 'living' Appendix B - Glossar y at the recovery site until the disaster has been rectified. If you use one of the recovery services, they Appendix C - Tuning Your Backup and Recov er y Application may have a list of this information depending the location of their recovery facilities. Talk with your Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning recovery vendor and get that list to be included in your DR plan for each potential city that you would Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm find yourself in performing your recovery. Table D.13 shows an example that you can use for your list Appendix F contacts. - Per for m ance Test Tech Note of vendor Appendix A - Com m and-Line I nter face Gu ide

Appendix G - Net Backu p Per form ance Tuning on Windows I ndex Table D.13: Example of a List of Vendor Contacts List of Figur es List of Tables List of Sidebars

< Day Day Up >

CONTACT

ADDRESS

< Day DayCELL Up > PHONE #/ PHONE/PAGER NUMBER

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

Hardware/software

by David B. Little and David A. Chapa

HOME PHONE #/ALT. PHONE #

TEAM

ISBN:0471227145

Auto/truck rentalJohn Wiley & Sons © 2003 (340 pages) This guide tak es r eaders thr ough the necessar y steps of

Catering services deploy ing ser v ices by showing how to addr ess the

ar chitectur e, lim it ations, and capabilities of t he ex isting

Charter air services net wor k infr astr uctur e. Courier services

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Delivery services Ta ble o f Con t en t s

Electrical I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI contractors TAS Ser ies) I ntr oduction

Forms suppliers

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter Hotel/motel 1 - Backup and Recover y Sy st em Requir em ents Ex plained

accommodations Chapter 2 - Business Requirements of Back up Systems Chapter 3

- An I ntr odu ction to NetBackup

Office equipment/furniture Chapter 4 - Evaluating Stor age Media Requir ements and supply Pa r t I I - Back up P roduct Tutor ia l

Chapter 5

- Gener al Discussion on Configur ation

Plumbing Chapter 6 - Monitor in g the Backup Pr ocess contractors Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options Chapter 8 guard - Gener al Tr oubleshooting Tips Security Chapter 9 - The Expanding Back up System services Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Temporary office Chapter 10 - The Fut ure of Backup services

Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Transportation: Appendix - Glossar y Airline Bstrains-buses Appendix C - Tuning Your Backup and Recov er y Application

Travel agencies

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix Utilities:E Electric - Business gas-I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

water F - Per for m ance Test Tech Note Appendix Appendix G - Net Backu p Per form ance Tuning on Windows I ndex

Team Meetings

List of Figur es List of Tables

Where would this plan be without team meetings to explore the status of the declaration? Plan an List of Sidebars initial meeting to outline your particular plan of attack. Be thorough but concise, have prepared agendas, and include them in this plan. Remember, the primary reason for a DR plan is to limit the number of decisions that must be made during such If you have included a sample agenda, < Day DayanUpevent. > or at least a boilerplate agenda, then you can begin your war-room meetings as soon as the teams are gathered. You should include predetermined time lines in the DR plan, as well as how often team meetings should be taking place. With each subsequent meeting, a progressive agenda should be included to aid in the flow of these meetings. To be as prepared for the meetings as possible, you should: Create boilerplate agendas to streamline the meetings during a disaster. Have predetermined time lines for status reports. Include as much information in this plan as possible.

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Update Procedures Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by Davidview B. Little andplan, Davidyou A. should Chapa list the responsible To maintain a consistent of this plan's authors and editors, John Wiley & Sons 2003author/editor, (340 pages) along with the location of each plan©per as shown in Table D.14.

This guide tak es r eaders thr ough the necessar y steps of

The location of the electronic of ahow DR to plan should also be recorded, as shown in Table deploy ing ser vcomponents ices by showing addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting D.15. net wor k infr astr uctur e.

Table D.14: Example of a List of Plan Authors and Editors < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> PLAN AUTHOR/EDITOR/DATE DOCUMENT NAME/ Ta ble o f Con t en t s

LAST EDITED

PURPOSE

LOCATION: (P)APER/(E)LECTRONIC

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) D.C. / D.L./12-09-02 DR Plan P-Off-site I ntr oduction

E-SERV/PATH/DOCNAME

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter D.C./K.W./01-01-03 1 - Backup and Recover y Sy st Backup em Requir Plan/Backup em ents Ex plained P-On-site/Off-site Chapter 2

- Business Requirements of and Back Recovery up Systems

Chapter 3

Strategies - An I ntr odu ction to NetBackup

E-SERV/PATH/DOCNAME

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements Table D.15: Example of a Location List for Electronic Components of a DR Plan Chapter 5 - Gener al Discussion on Configur ation Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

PURPOSE

DOCUMENT NAME (P)APER/(E)LECTRONIC

Disaster Plan Back up System Chapter 9 - The P-DR Expanding

LOCATION(S)

LAST UPDATED

OWNER

P-Room 1202

08-19-02

J. Dekrator

08-30-02

D. Alvish

Pa rRecovery t I I I - The EnteE-DR_120502.doc r pri se I m pa ct of Back up Sy ste m E-s

Server/Path/Document

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena

Oracle

P-Oracle

Appendix A - Com m and-Line I nter face Gu ide

Recovery Recovery Guide Appendix B - Glossar y

P-DBA Filing Cabinet and Off-site

Vendor Appendix C - Tuning Your Backup and Recov er y Application E-ORA_RG.doc Appendix D - Disaster Recovery Planning Kit—Fr om E- End to Beginning

Server/Path/Document Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note

Ops Guide

P-NBU Operations

P-NONE

E-NBUOPS.doc

EServer/Path/Document

P-BIA Assessment for Sales Division EBIA_SALES.doc

P-USA Bank Safe Deposit Box EServer/Path/Document

Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es ListBIA of Tables for ListSales of Sidebars

11-20-02

T. Traansman

3-19-02

A. Prenzes

< Day Day Up >

Determine your company's policy for updates and list them here. Perhaps your company will choose to update every six months or annually at the very minimum. The wording need not be exhaustive; be simple and concise to reduce complexity. The following is an example of a brief statement you might include in your company's DR testing policy plan: The DR plan must be reviewed and updated annually at the very minimum. All members of the DR team should participate in the review and update of the plan. The next planned meeting is December 14, 2003. The Management Team will be responsible for sending out a reminder email as the date approaches. Note that the paragraph indicates the next scheduled meeting. This is very important to maintain a consistency in your testing, review, and maintenance of your DR plan.

< Day Day Up > < Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

en t ing Ba cku p an d Reco ver y: Th e Rea din ess DevelopingI maplem Test Plan Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by plan Davidif B. David A. very Chapa What good is a DR it isLittle not and tested? Not good-especially since the whole purpose for putting John Wiley & Sons © 2003 (340 pages)you suffer any measured loss of data, equipment or together a DR plan is to be prepared in the event services. This plan is supposed give usthr anough edge onnecessar such events, This guide tak estor eaders the y stepsbut of if we do not test it, our planned ingdifferent. ser v ices Therefore, by showing take how this to addr ess the methodology to heart as you begin outcome may bedeploy entirely very simple chitectur lim ittest ations, capabilities ofsimple t he ex isting this process: Planaryour test,e,then yourand plan. This very statement means that you must net wor k infr astr uctur e. define a scope for your test because it is within this scope that you will find success or failure of your DR plan. If you fail to do this, you lose consistency and repeatability of your DR plan. Remember, we arel testing the DR encoding= plan so we are 8859prepared; < ?xm version= " 1.0" " I SO1" ?> failure during a test that is documented and addressed is Taactually ble o f Con t en t s a success. However, failures that are ignored remain failures.

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

Planning the Test

I ntr oduction

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

When you begin the process of planning your test, start at the result and work backward, much like we

Chapter 1 at - Backup and Recover Sy st em Requir emcan entsdefine Ex plained described the beginning of thisy appendix. If you your results as goals, you should be able Chapter Business Requirements of Back up goal. Systems to build2the- steps necessary to achieve each For example, the end result of your DR plan is that Chapter 3 have - An Iyour ntr odu ction to NetBackup System (ORS) up and available within 14 hours. To you would Online Reservations Pa r t I I - Back up Tutorof ia a l accomplish thatP roduct in the face

Chapter 4

declared disaster, you need to take the following steps:

- Evaluating Stor age Media Requir ements

1. Disaster is declared: Assumption-Facility inaccessible. To successfully test, you must make - Gener al Discussion on Configur ation assumptions in order to test each level of the response teams. Other examples are as follows:

Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9

- Monitor in g the Backup Pr ocess

a. System failure

- Evaluating Ot her Back up- Related Featur es and Options

- Gener al Tr oubleshooting b. Application corruption Tips - The Expanding Back up System

c. Ente Advancing conditions Pa r t I I I - The r pri se I mweather pa ct of Back up Sy ste m s Chapter 10 - The Fut ure of Backup

2. Contact response teams, including

Chapter 11 - Maj or Players in the Backup Ar ena

Management leadGu ide Appendix A a. - Com m and-Line team I nter face Appendix B - Glossar y

b. Emergency on-call team lead

Appendix C - Tuning Your Backup and Recov er y Application Appendix D c. - Disaster Recovery Planning Assessment team lead Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

Recovery Appendix F d. - Per for m anceteam Test lead Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows

3. Hot-site facility must be notified if this is required.

I ndex

List of es vendor must be notified and most recent tapes need to be delivered to hot-site facility. 4. Figur Off-site List of Tables

5.Sidebars Install/configure backup server. List of

6. Recover backup server's database. 7. ORS recovery machine is installed/configured < Day Daywith Up >an OS and backup client software. 8. Import/inventory off-site tapes. 9. Begin recovery of data. In this example, each step may have substantially more detail that can be expanded upon, but it gives you a good idea of where you need to go with planning your test. Again, the more detailed your test plan, the greater the probability is that you will find success during its execution. Do not let verbosity be the guiding light for whether or not a test plan is adequate; begin where you are with what you have and use the results of the tests, including both failures and successes, to build a stronger, more resilient plan. You may want to test only certain components of your disaster recovery plan, such as the restore component. In that case, make your test plan modular; in other words, create it in such a way that you can pull out certain components without compromising consistency. We strongly recommend that you perform these tests on your off-site media at least every six months- preferably

quarterly, if you are allowed. Just remember< toDay stay within the scope of your test plan as you are Day Up > executing the test plan, so you can see the holes. Do not stop, rather, continue until you can go no further. Then document everything so you can plan your test better the next time. I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise < Day Day Up > ISBN:0471227145 by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages) This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Summary

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by David B.your LittleDR andplan, David A. Chapa When you have completed test, test, test. This should be done as often as your Wiley Sons © 2003it (340 pages) company requiresJohn it, but at a&minimum, should be done annually. Some companies perform these tests every six months; some of the the necessar plan more often. This guide taktest es r components eaders thr ough y steps of Keep in mind that this is not a ing ser v ices by showing to how to addr static document. deploy Your data storage continues grow andess newthe challenges present themselves in ar chitectur lim it ations, and an capabilities of your t he ex isting managing this growth. This e, growth will have impact on DR plan; therefore, the plan needs to net wor k infr astr uctur e. be dynamic and should be reviewed and updated regularly. Be as thorough as you possibly can. As mentioned in the beginning of this appendix, this is not an exhaustive planning kit. Rather, it is a < ?xm beginning. l version= Take " 1.0"asencoding= much into " I SOconsideration 8859- 1" ?> as you possibly can, talk with as many people as possible, Taand ble o f Con t en t s counsel involved to help create this plan. Then continue to work the plan get your legal consistently. Hopefully, will never to useGuide it, butfor if you it pr will I mplem ent ing Backup and you Recover y—Thehave Readiness the do, Enter isebe nice to know that the teams ( VERI TAS Ser all know andies) understand their roles and will be able to carry out their tasks with some level of I ntr oduction because of the extensive testing you have regularly performed. confidence Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

One of 1the -items we and haveRecover not covered in this appendix backup operations guide. You must Chapter Backup y Sy st em Requir em entsisExyour plained ensure2this-process documented with theupsame discipline as your DR plan, and you must make sure Chapter Businessis Requirements of Back Systems it is updated you to doNetBackup not have an operations guide, I have developed one specifically for Chapter 3 - regularly. An I ntr oduIfction NetBackup that you may obtain by contacting DataStaff, Inc. (www.datastaff.com).

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5 Chapter 6

- Gener al Discussion on Configur ation - Monitor in g the Backup Pr ocess < Day Day Up >

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

en t ing Ba cku p an d Reco ver y: Th e Rea din ess AppendixIGum idplem E: Business Impact Analysis Planning e f or t h e Ent er pr ise by David B. Little and David A. Chapa Kit-The Storm Before the Calm ISBN:0471227145 John Wiley & Sons © 2003 (340 pages) r eaders thr ough necessar y steps The storm beforeThis the guide calm?tak It es makes sense whenthe you think about it. of When you start addressing the deploy ing ser v ices by showing how to addr ess the business at a business level, you may stir up a few things. For example, a client retains their data ar chitectur e, lim it ations, and capabilities of t he ex isting 'forever' off-site. Why, you ask? question. First, it is a legal powder keg: Should anyone file net wor k infr astrVery uctur good e. suit, they would be able to subpoena all of those records. Second, it costs a lot of money for those tape cartridges. The answer I received was innocent enough: We don't know how to categorize our < ?xm l version= encoding= " I SO8859- 1" ?> The more I probed, the more uncomfortable things data properly" 1.0" and differentiate its importance. Ta ble o f Con t en t s became at the business level, because we uncovered an area that the business really needed to I mplem entbut ing had Backup andleft Recover y—The Readiness address been undone for many years.Guide for the Enter pr ise ( VERI TAS Ser ies)

I ntr oduction This planning kit provides the initial information necessary to create a compelling business impact Pa r t I - I nt(BIA) r oduct ion will t o Ba ck up and Recovethe r y in the Ent er pr i se Env of ir onm e nt analysis that help you identify critical components your environment

and the cost

Chapter 1 -with Backup Recover y Sy st em Requir em this ents planning Ex plainedkit helps you achieve a sense of calm associated their and unavailability. We hope using Chapter 2 that - Business Requirements of Back up event Systems knowing you will be well prepared in the your company experiences a disaster. Chapter 3

- An I ntr odu ction to NetBackup

An Introduction to BIA

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5 - on Gener al Discussion onD. Configur We touched BIAs in Appendix In this ation appendix, we go into greater detail. Let's begin with defining Chapter exactly6what - Monitor a business in g the impact Backup analysis Pr ocess is. As mentioned in the previous appendix, a BIA is an

evaluation of your company's strengths and weaknesses respect to its ability to recover from a Chapter 7 - Evaluating Ot her Back up- Related Featur es and with Options severe 8business interruption to a complete Chapter - Gener al Tr oubleshooting Tips disaster. While the BIA can stand on its own, it should also be included a Expanding componentBack of the DR plan. Here's what you should look at as you conduct this type Chapter 9 - as The up System ofr tanalysis: Pa I I I - The Ente r pri se I m pa ct of Back up Sy ste m s Chapter 10 - The Fut ure of Backup

Intellectual property, critical hardware, software, and any custom applications

Chapter 11 - Maj or Players in the Backup Ar ena

Appendix - Com m and-Linebased I nter face Gu ide YourA time to recovery, on the amount of money your company will stand to lose, plus the Appendix Glossar y levelB of- importance for this particular application, server, or service Appendix C - Tuning Your Backup and Recov er y Application

TheDconditions data should beKit—Fr in at the in order to recover successfully, including Appendix - Disasteryour Recovery Planning om very End least to Beginning how old the data is

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for for mDR, ance Test Tech take Note into consideration the entire process of determining, When planning you should Appendix G Net Backu p Per form ance Tuning on Windows implementing, and documenting everything that must be done in order to return some critical I ndex component of your business to its normal working order following a disaster. There is a common List of Figur es used by a number of clients for DR planning that involves seven steps. If you have the methodology List Tables kit, you will be familiar with these steps, listed here: DRofplanning List of Sidebars 1. Perform BIA.

2. Perform risk assessment. 3. Determine recovery strategies.

< Day Day Up >

4. Update/develop backup plan and operations guide. 5. Update/develop a recovery plan. 6. Test. 7. Update and maintain the DR plan. We will be concerned with only Step 1 in this planning kit. The use of BIAs in a DR plan will help address the needs of the business and the business units with respect to data protection and availability by providing a means to define the importance of each component of the business unit and how each will have an impact should it become unavailable for a period of time. What you should find as a result of conducting BIAs is that you now have the basis for all the other steps in your DR planning

process.

< Day Day Up >

As you begin the process of interviewing the business unit managers, data owners, and administrators, you will begin to identify certain areas and associated costs that may not line up with the financial expectations for this business unit's recovery. Therefore, interview with the business unit I m plem en t ing Ba cku p an d Reco ver y: a Thsecond e Rea din ess e f or t h to e Ent er pr ise managers would Gu beidrequired resolve or reprioritize their goals so that they fall in line with the ISBN:0471227145 by David B.you Little andfind David Chapa financial picture. However, may thatA.recovering this business unit's applications would require Wiley &financially Sons © 2003 (340 pages)Based on which direction this goes, it may in fact more money thanJohn otherwise allocated. force changes to This be made plan, DR plan, or even the budgets. guide to takthe es rbackup eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitecturthat e, lim it ations, and capabilities of of t helosing ex isting The BIA is a methodology helps to identify the impact access to a particular system or netorganization. wor k infr astr uctur e. process is primarily an information-gathering process. In the application to your The BIA end you will take away several key components for each of the business units you have worked with, some of which we encoding= have listed" I here: < ?xm l version= " 1.0" SO- 8859- 1" ?> Ta ble1.o f The Con tcriticality en t s a particular system or application has to the organization I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise How quickly it must be recovered in order to minimize the company's risk of exposure ( VERI2.TAS Ser ies) I ntr oduction

3. How current the data must be at the time of recovery

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1 - Backup and Recover y SyDR st emand Requir em ents Ex plained This information is essential to your backup plans, as it describes the business requirements Chapter 2 -and Business Requirements of Back up Systems for backup recovery. Chapter 3

- An I ntr odu ction to NetBackup

Inr tthe organizations Pa I I -past, Backmost up P roduct Tutor ia l

viewed the IT staff as the bits-and-bytes types who didn't interface well

with others. is starting to change, and performing things like a DR plan and a BIA help a great Chapter 4 - That Evaluating Stor age Media Requir ements deal in 5our -marketing effort andon in Configur fosteringation relationships with the various business areas. The Chapter Gener al Discussion business managers willBackup be attracted to the relationship by the information you provide to them, Chapter 6 unit - Monitor in g the Pr ocess such as7 the- impact to the business a Related disasterFeatur couldes bring this particular unit. Chapter Evaluating Ot her Back upand to Options Chapter 8

- Gener al Tr oubleshooting Tips The information that is collected during the interview process will be the basis for the analysis, which in

Chapter The within Expanding Backplan. up System turn will9 be -used the DR We have included sample lists and forms to use during your Pa r t I I I - The Ente r pri se Imay m pa choose ct of Back Sythese ste m s or interview process. You toup use

create your own. Whatever you decide, we strongly

Chapter 10 - The of something Backup recommend that Fut youure use and maintain a level of consistency throughout your analysis. Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y

< Day Day Up > Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Scope

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

ISBN:0471227145 byBIAis Davidreally B. Little andlogical, David but A. Chapa The scope of your quite it does take time to consider all areas. To facilitate your Wiley a& phased Sons © 2003 (340 pages) analysis, we haveJohn included approach that you may want to consider taking during this process while youThis build the tak information particular application/service you have guide es r eadersportfolio thr ough for thethe necessar y steps of deploy ing ser v ices by showing how to addr ess the selected.

ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

Phase I- Identify which server, system, service, or application you want to analyze. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con tIIenFind t s out which data owners, application administrators, system administrators, database Phase I mplem ent ing Backup(DBAs), and Recover Readiness Guide for thewould Enter like pr iseto interview. Hint: During the administrators and y—The business unit managers you ( VERI TAS Ser ies) interview process, ask the interviewees whom else you should be speaking to regarding this I ntr oduction particular system. Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Phase III- Meet with these individuals or groups to start building your information portfolio on this - Business Requirements of Back up Systems business unit.

Chapter 2 Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Phase GenerateStor a report fromRequir the information portfolio. Chapter 4 -IVEvaluating age Media ements Chapter 5

- Gener al Discussion on Configur ation

Phase I-

Chapter 6 Chapter 7

Monitor in g the Backup Pr ocess

- Evaluating Ot her Back up- Related Featur es and Options

What is8 it that you will analyzing? Remember that as you begin this process, it will begin to waterfall Chapter - Gener al Trbe oubleshooting Tips into other is whatBack we up mean: Chapter 9 BIAs. - TheHere Expanding System Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Identify the name of the system or service.

Chapter 10 - The Fut ure of Backup

Chapter 11 a-new Maj or Players in portfolio the Backup ena Start information for Ar this service, application, or system. Appendix A - Com m and-Line I nter face Gu ide

Identify components required for this service, application, or system to be recovered. This Appendix B - the Glossar y includes hardware software components as well. Appendix C - Tuning Yourand Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Start where you are familiar and move on from there. For example, you know that accounts receivable (AR) is fairly important; begin analyzing that and soon you may find that there is a much larger Appendix - Per for m ance Note packageFthat contains ARTest you Tech should be analyzing. Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix G - Net Backu p Per form ance Tuning on Windows

Since this has been written for the purposes of analyzing IT functions, you may want to create a form I ndex thatofisFigur fairly List esgeneric as it pertains to systems, services, or applications. You will bring into your organization List of Tables a much higher level of consistency, which is key when it comes to delegating the task of conducting BIAs to other team members. List of Sidebars

Phase II < Day Day Up >

Now that you have the name of the system or service that you want to analyze, you should have enough information to begin building your contact list for interviews. When you choose whom to talk to, start at the highest level and work your way down. This accomplishes two things: 1. If you get the audience with the first person you talk to, you know you are getting someone who will understand the impact to the business. 2. If this person asks you to speak with someone who reports to him or her, you know that you will get his or her full cooperation having been told by a superior to work with you. We have found that some people do not like talking about the likelihood of a disaster and subsequent impact to their business units, mainly because a process such as this exposes more than just the systems; it may also expose policies and procedures that need to be changed within the business unit. Unfortunately, those of us who conduct BIAs are often viewed in the same light as an auditor. Yet

although the process may be painful, the end result makes for a much stronger company and < Day Day Up > organization. Moving on, continue to build your information portfolio and schedule your appointments Here are some points you may want to follow during this I m plem en t ing Ba cku p process: an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

Identify the parties withB.an interest in theA.components you ISBN:0471227145 have identified in Phase I. by David Little and David Chapa John Wiley & Sons © 2003 (340 pages)

Make sure you have listed the data owners, application administrators, system administrators, DBAs, and soThis on.guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting Make contacts interview netand wor kset infrup astr uctur e. appointments.

Play detective-assume nothing and ask everything. Let the interviewees give you the information and avoid the tendency to 'help' with the answers. < ?xm l version= " 1.0" encoding= " I SO88591" ?> It is even a good idea if you have a junior staff member Taor blethe o f IT Con staff t enadministrator ts assist in the interview process so as not to taint the answers with your own. You will get a better image y—The of whatReadiness the business unit is. I mplem entthen ing Backup and Recover Guide forperspective the Enter pr ise ( VERI TAS Ser ies) Some of the areas to cover in this interview process are as follows: I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

What are the areas of impact to the business should this system or service become unavailable? - Backup and Recover y Sy st em Requir em ents Ex plained Remember, different levels of individuals will have different perspectives on the impact, so Chapter 2 - Business Requirements of Back up Systems interview as many people as possible. Chapter 1 Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I What I - Back up Pbusiness roduct Tutor ia l rely on this other units

Chapter 4

component of the organization?

- Evaluating Stor age Media Requir ements

Is this or activity? Chapter 5 a- revenue-generating Gener al Discussion onapplication Configur ation Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

What financial impact would it have if it were down?

Chapter 8 - any, Generservice al Tr oubleshooting Tips (SLAs) are in place with either internal or external What, if level agreements Chapter customers? 9 - The Expanding Back up System Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

What impact does that SLA have with either internal or external customers? Chapter 10 monetary - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena

If you are a publicly held company, how much exposure could you stand before you begin to lose

Appendix A - Com confidence? m and-Line I nter face Gu idea loss affect your reputation on Wall Street? shareholder How would Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application

Phase III

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix - Business I mpact Analysis Planning Kit—The Stor m to Befor e t he 60 Calm Now thatE you have a list of people to talk to, kindly ask them allocate to 90 minutes of their time Appendix F Per for m ance Test Tech Note in the next couple of weeks in order to complete this analysis. Always work with an agenda, especially Appendix Net upper Backu pmanagement Per form ance Tuning on Windows if you areG at- the level. Their time is limited, and without an agenda prepared at I ndex least 48 hours prior to the interview, you may find yourself having to reschedule and thus lose some List of Figur es level of credibility. Remember, this is as much a marketing campaign for the IT team as it is an investigation List of Tables of the particular systems or services that need to be protected. Be sure to send out

reminder emails. You should send at least three: List of Sidebars One after you first schedule the appointment Day48 Day Up >prior to the meeting Another when you send the agenda, at all about IT marketing. tell l you during this encoding= meeting. Remember, Ta ble o f Con t en t s

Following areBackup some and items to keep in perspective I mplem ent ing Recover y—The Readiness when Guide talking for the about Enter prrecovery: ise ( VERI TAS Ser ies) Legal requirements, such as in an SLA, if any. I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Corporate image. If you are a leader in data widgets and lose a critical data center that tracks the - Backup and Recover y Sy st em Requir em ents Ex plained production of your data widgets, what kind of consumer confidence will that build or destroy? What Chapter 2 - Business Requirements of Back up Systems about Wall Street if you are a publicly traded company? Chapter 1 Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I How I - Back up Pmoney roduct will Tutor ia l much you

Chapter 4

be losing if you can't access this system?

- Evaluating Stor age Media Requir ements

You can your own forms on or Configur use the ation templates we have here, but basically you should identify Chapter 5 create - Gener al Discussion the costs particular system or service unavailability. As you do this, remember to Chapter 6 associated - Monitor inwith g thea Backup Pr ocess

factor in the- other components that are dependent on this system as well. You will have to work with Evaluating Ot her Back up- Related Featur es and Options your finance team or an outside risk assessment team to come up with some average figures for your Chapter 8 - Gener al Tr oubleshooting Tips industry to qualify how heavy the financial impact would be on your organization. Many of the industry Chapter 9 - The Expanding Back up System research firms will have this type of information, so if your company subscribes to their service, Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s perhaps you should query their database of information to add into your BIA forms. Suffice it to say that Chapter 10 - The Fut ure of Backup the levels of severity will be driven by the financial impact to be felt. It may be a good idea to frame it in Chapter 11 - Maj or Players in the Backup Ar ena such as way that the financial impacts are in ranges of your selection from 1 to 10 and to associate Appendix A with - Com and-Linewindow, I nter face Gu ide each level am recovery with 10 having the most financial impact and probably requiring the Appendix B Glossar y shortest time of recovery. You will have to determine what these ranges are for your organization. Chapter 7

Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Phase IV

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per m ance Test TechYou Noteneed to begin summarizing the information gathered from all of This is where theforreal work starts. Appendix G Net Backu p Per form ance on include Windows the interviews you conducted. Make Tuning sure you in this report any red flags you have noted, along I ndex with risks, business impact, length of time this service or system could be down- including the amount List of Figur lost es per day, per hour, or per minute depending on the type of service it is-and the recovery of money List steps. of Tables The recovery steps are based on assumptions you have made in the scope of your DR plan; so

if you haven't planned to recover from a complete facility loss, do not attempt to build the recovery List of Sidebars steps to do so here. Having said that, what you can do is create a list of what is required in order to recover this system, including the following: Hardware.

< Day Day Up >

Software, including OS, applications, and so on. Data, include how current the data must be. Recovery time, which is dictated by the business unit manager. This is not something we contradict during the initial meeting. At most companies, if the business unit managers believe the recovery of their service must happen in a particular time frame, the cost of building the resiliency they require would come out of their budgets. If that's not the case at your company, we recommend that you still hold back until you deliver your report. We still think that it has a much bigger impact. An impact report, listing the financial impact, consumer confidence impact, and so on. This report is at the heart of the BIA and is of critical importance to the business unit and upper management.

< Day Day Up > < Day Day Up > I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Email Examples Gu id e f or t h e Ent er pr ise

by David B. Little and David A. you Chapa Here we have included some email examples can use as ISBN:0471227145 is or modify to make this process a little Wiley & Sons © 2003 pages) easier. Figure E.1John briefly outlines what we(340 plan to accomplish and requests the presence of this individual at the discovery This guidemeeting. tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - E.1: Per for m ance Test Tech Note Figure Discovery meeting invitation. Appendix G - Net Backu p Per form ance Tuning on Windows I ndex Figure E.2 shows an example of an email that should be sent out within 24 hours of receiving a

confirmation List of Figur es from the interviewee that he or she will be attending the meeting. List of Tables

Figure E.3 is the agenda email that should be sent at least 48 hours prior to the actual meeting.

List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

Figure E.2: Appointment confirmation email. I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

Figure Agenda Appendix F - E.3: Per for m ance email. Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

Figure E.4: Review email.

Figure E.4 shows the email that should be sent < Day outDay after Upthe > meeting. In it, you should summarize the discussion and review any remaining issues that will need to be followed up on. I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise < Day Day Up > by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Forms and IResources Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by David portfolio B. Little and David A. aChapa Building your information begins with formal process. Therefore, it is important to have John Wileywhen & Sons 2003 (340 pages) some level of consistency you© begin. We have included some sample forms and reports that you might find useful yourtak organization. If ough you choose not toy use these This in guide es r eaders thr the necessar steps of forms, at least use something deploy ing ser v ices by showing how toInconsistent addr ess the information portfolios are basically that can be reused by other members of your team. ar chitectur e, lim ations, anddisaster capabilities of t he plans. ex istingTo begin the information portfolio, worthless when you are trying to itcoordinate recovery net wor k infr astr uctur e. use this first worksheet shown in Table E.1, Preliminary List, as a brainstorming tool to identify as many systems or applications you are aware of. Once you decide what application or service you want to < ?xm assess, l version= you should " 1.0" encoding= next use "the I SOBIA 8859Assessment 1" ?> Sheet to begin your investigative work and gather the Taother ble o finformation Con t en t s listed.

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI Table TAS E.1: SerPreliminary ies) List I ntr oduction

DATE: APP/SERVER/SERVICE

SYS. ADMIN/DATA OWNER

BUSINESS UNIT

PHONE #

BIA (Y/N)

DATE: SYS. ADMIN/DATA BUSINESS - Evaluating Ot her Back up- Related Featur es and Options APP/SERVER/SERVICE OWNER UNIT

PHONE #

BIA (Y/N)

PHONE #

BIA (Y/N)

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2 - Business Requirements of Back up Systems Dependencies, Chapter 3 - An I ntr odu ction to NetBackup additional Pa r t I I - Back up P roduct Tutor ia l

contacts, misc.

Chapter 4

- Evaluating Stor age Media Requir ements

information: Chapter 5 - Gener al Discussion on Configur ation Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7 Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9 - The Expanding Back up System Dependencies, Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

additional

Chapter 10 - The Fut ure of Backup

contacts, misc.

Chapter 11 - Maj or Players in the Backup Ar ena

information: Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y

DATE: APP/SERVER/SERVICE

SYS. ADMIN/DATA OWNER

Appendix C - Tuning Your Backup and Recov er y Application

BUSINESS UNIT

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Dependencies, Appendix F - Per for m ance Test Tech Note additional Appendix G - Net Backu p Per form ance Tuning on Windows

contacts, misc.

I ndex

Listinformation: of Figur es List of Tables List of Sidebars

BIA Assessment Sheet The BIA Assessment Sheet is the beginning as you are thorough; therefore, never think it unprofessional to ask additional questions and for additional information. Remind the individuals that you are gathering this information only to ensure that this report is sufficiently complete to make a recovery as smooth as possible. Your assessment sheet should include the following: Date the report is created Application/system being used System administration support person's name and phone number Business unit manager's name and phone number Be as thorough as you can in your report, but remember that some of this information will come out in

the interviews you conduct. For the application/system, list all other applications or services it depends < Day Day Up > on. If this is a server, then list all of the applications that it supports and that must be recovered in the event of a disaster. Also make note of what areas of the company would be affected if any of those applications or servers listed were lost. I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess id e f or t list. h e Ent er pr ise to start at the top and work your way down. For example, Start building yourGuinterview Remember ISBN:0471227145 by David of B. the Littlebusiness and David A. and Chapa start with a vice president unit explain the situation to him or her, then continue John Wiley & Sons © 2003 (340 from there. You should definitely interview thepages) system administrator for the server that is being assessed. This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the

Lastly, always leave ar chitectur yourself e, some lim it ations, room and for issues capabilities that of arise t heeither ex isting during the initial conversations net wor korinfr astr ucturyou e. have an idea. This will eliminate many loose pieces of paper regarding the meetings just when and the potential for loss or misplacement of them. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s

Overall Impact Assessment Sheet

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI Ser ies) The TAS overall impact assessment sheet will help you define during your meetings the financial impact a I ntr oduction failure would have on the particular business area you are assessing, corporate image, customer Pa r t I - I nt r oduct t olegal Ba ck up and Recoveto r ybe in concerned the Ent er pr iwith se Env e nt confidence, andion any ramifications asiraonm result

of losing this particular

business functions for a period The information should be included in your Chapter 1 area's - Backup and Recover y Sy st of emtime. Requir em following ents Ex plained report: 2 Chapter

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Date report is created

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4 - Evaluating age Media Requir ements Business area/unit Stor being assessed Chapter 5

- Gener al Discussion on Configur ation System person's Chapter 6 - administration Monitor in g the support Backup Pr ocess name and phone number Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Business unit manager's name and phone number

Chapter 9 what - Thefinancial Expanding System would expect to see should this particular business area Also note lossBack theup company Pa r t I I I - TheaEnte r pri se based I m pa cton of the Back up Sy ms experience disaster, level ofste importance it

holds for the overall business. Table E.2

Chapter 10sample - The form Fut urewhere of Backup shows a you can record this information. Chapter 11 - Maj or Players in the Backup Ar ena Appendix A -Financial Com m and-Line I nterOutage face Gu ide Table E.2: Loss per Duration Appendix B - Glossar y

OUTAGE DURATION

< 1 HOUR

1 - 12 HOURS

Appendix C - Tuning Your Backup and Recov er y Application

1 DAY

1 WEEK

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Kit—The e t he

Amount

Amount

Appendix G - Net Backu p Per form ance Tuning on Windows

Amount

Enter $$ Amount

Enter $$ Amount

Enter $$ Amount

Enter $$ Amount

Enter $$ Amount

ListComponent> of Sidebars

Enter $$ Amount

Enter $$ Amount

Enter $$ Amount

Enter $$ Amount

Enter $$ Amount

Enter $$ Amount

Enter $$ Amount

Enter $$ Amount

I ndex

List of Figur es List

Note: NOTE Before completing this form, you should first determine the loss ranges per outage duration. You will also need to note the following in your report: Could this loss have impact on the corporate image? At what point would it impact image negatively? What would be the impact to the customers? At what point would it impact the customers negatively?

Are there any legal ramifications to be concerned with as a result of this loss? < Day Day Up > At what point would it impact the company legally? I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Internet Resources Gu id e f or t h e Ent er pr ise by David B. Little that and David A. Chapa So many resources are available we decided to list only a ISBN:0471227145 few in Table E.3 to help you with your John Wiley & Sons © 2003 (340 pages) research. Since the BIAs can be used for all levels of your business, you will find a broad sampling of Thisthat guide es visit. r eaders thr ough the necessar y steps of resources and links youtak can deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting Table E.3: Internet Resources net wor k infr astr uctur e.

RESOURCES AND LINKS

URL

< ?xm l version= " 1.0" encoding= Disaster Recovery Journal " I SO- 8859- 1" ?> Ta ble o f Con t en t s

www.drj.com

Contingency Planning Management www.contingencyplanning.com I mplem ent ing Backup and and Recover y—The Readiness Guide for the Enter pr ise ( VERI Magazine TAS Ser ies) I ntr oduction

Disaster Recovery Institute International

www.dr.org

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter FEMA1

- Backup and Recover y Sy st em Requir emwww.fema.gov ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Disaster Links

Pa rDisaster t I I - Back Prevention up P roductand Tutor Recovery ia l

www.Disasterlinks.com

Guide

www.system.missouri.edu/

Chapter 4

- Evaluating Stor age Media Requir ementsrecords/disaster.html

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

X-Force Threat Analysis Service

http://xforce.iss.net

The Business Continuity Institute Chapter 7 - Evaluating Ot her Back up- Related Featurwww.thebci.org es and Options Chapter 8

- Gener al Tr oubleshooting Tips Disaster Recovery Information Exchange

Chapter 9

www.drie.org

- The Expanding Back up System

Kansas Business Pa rState t I I I -ofThe Ente r pri se I m paContingency ct of Back up Sy ste m s

http://da.state.ks.us/disc/dr/

Planning Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena

SOME VENDORS TO KNOW ABOUT

Appendix A - Com m and-Line I nter face Gu ide Appendix B -Data Glossar y On-Track Recovery

URL

www.ontrack.com

Appendix C - Tuning Your Backup and Recov er y Application

Media Recovery

www.mediarecovery.com

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm ServiceMaster Recovery Management www.servicemasterrecovery.com/ Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es

< Day Day Up >

List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Summary

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by David Little and David on A. Chapa This appendix should giveB.you a jump-start creating business impact analyses for your company or John Wiley Sons 2003 (340when pages)you conduct an interview and keep it on a organization. Remember to &use an©agenda professional levelThis at all times. is a very critical you are attempting to document guide tak This es r eaders thr ough thebusiness necessarfunction y steps of ser vwith ices the by showing addr ess the and thus requiresdeploy focus.ing Stay agenda,how keeptofocused, and if you have a difficult time with the chitectur e, lim it with ations, and capabilities ex isting interviews or are ar not comfortable interviewing, then of wet he suggest you role-play with other members net wor k infr astr uctur e. of your IT staff. Write down notes for yourself if you find that you drift during the role-playing, and create scenarios to help the individuals you are interviewing properly appreciate the level of severity < ?xm version= " 1.0" encoding= " I SO8859?> youl are attempting to plan for. This is a 1" dynamic process, so as the interview takes place, you may Tahave ble o other f Con tquestions en t s that come up. Write them down on your agenda, and make sure to ask them I mplem Backup keeping and Recover y—The Guideshould for thebe Enter pr ise duringent theingmeeting, in mind thatReadiness the question within the context of the agenda you ( VERI ies)Also, ask if you can record the meeting for the purposes of increasing the quality of your haveTAS set Ser forth. I ntr oduction analysis. Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up < Systems Day Day Up > - An I ntr odu ction to NetBackup

Chapter 3

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

en t ing Ba cku p an d Reco ver y: Th e Rea din ess AppendixIGum idplem F: Performance Test Tech Note e f or t h e Ent er pr ise by David B. Little and David A. Chapa

ISBN:0471227145

John Wiley & Sons © 2003 (340 pages) Introduction This guide tak es r eaders thr ough the necessar y steps of

This document has deploy been ingcompiled ser v ices by from showing notes how that to have addrbeen ess the made over the past several years ar chitectur e, limof it ations, and capabilities of t he ex isting working with NetBackup. Some the information is original and some has come from other net wor k infr astr uctur e. NetBackup Professional Consultants. This was created to assist in the troubleshooting of network performance issue as it relates to NetBackup. Some of the following are undocumented and 'unsupported' by Veritas Software, and are < ?xm l version= " 1.0" encoding= " I SO- 88591" ?>provided merely for testing purposes only. Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) < Day Day Up > I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p NetBackup an d Reco ver y: Th e Rea din ess Testing Performance with Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by of David Little andperform David A.toChapa There are a variety testsB.one can identify where the 'problems' exist within ones backup Wiley & only Sonscovers © 2003 (340 pages) environment. ThisJohn document a few that I have found to be most useful in my capacity as a Consultant working NetBackup. Thisthr document briefly expose Thiswith guide tak es r eaders ough the will necessar y steps of you to some of these ideas and deploy ing ser v ices by showing how to addr ess the concepts.

ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

Where to Begin

< ?xm version= 1.0" encoding= " I SO-is88591"performance ?> So lyou have "identified that there some problem with some of your backup clients. TaPerhaps ble o f Con t en t s you have noticed it because of some errors you have been receiving or you have been using I mplem ent ing Backupscript and Recover y—The Guide the Enter pr for ise a particular client. Whatever my clnt_thruput.sh and started to Readiness see a decline infor performance ( VERI TAS Ser ies)

the case may be, you are now here looking at ways to troubleshoot this issue. We have many connection points that could be potential bottlenecks for our backup client. From the client we have Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt CPU, MEMORY, DISK, NIC, just to name a few with a NETWORK in between the client and the server. Chapter 1 be - Backup Recover y Sy st em emas ents Ex plained We could seeing and similar issues with theRequir server well. So simply saying that we have performance Chapter 2 is- aBusiness Requirements Back up Systems problems very broad statement of and requires us to 'drill down' and narrow that statement a bit. The Chapter An isI ntr ction to to divide NetBackup way we3do -this to odu attempt these areas up as much as possible in order to troubleshoot with Pa r t high I I - Back up of P roduct Tutor iaas l possible. Network performance is probably blamed for 90% of the as a level consistency Chapter - Evaluatingproblems. Stor age Media ements backup4performance Why?Requir Because network is the easiest target, well here's to the defense Chapter 5 Gener al Discussion on Configur ation of the network groups out there, it may be your backup server, or the client's disk. It may also be the network, this document will helpPrus better discern where the problem lies. Chapter 6 but - Monitor in g the Backup ocess I ntr oduction

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

- Gener Tr oubleshooting Tips Dumping to althe 'Bit-Bucket'

Chapter 8 Chapter 9

- The Expanding Back up System

Pa r t I I there I - Theare Ente pri se I m ct ofthat Backcan up Sy ms Now a rcouple ofpa thing beste done

to eliminate the many variables that exist between the

client and server. Forof our first example, we make an assumption that the client and server are two Chapter 10 the - The Fut ure Backup different and therefore will take the network and the server out of the equation and focus Chapter 11machines - Maj or Players in the Backup Ar ena solely onA the client. What weI nter want to Gu do ide is test how fast the client can 'read' data off of the disk. We do Appendix - Com m and-Line face this by having it sentyto an infinitely fast device, the bit-bucket or NUL. Appendix B - Glossar Appendix C - Tuning Your Backup and Recov er y Application

From the Client

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

To see if the client is the bottleneck in the network performance, perform the following using bpbkar,

Appendix Per fordirectory m ance Test Techyour NoteNetBackup software is installed. For information's sake, bpbkar which is Fin -the bin where Appendix G Net Backu p Per form ance Tuningthat on is Windows is the backup/archive process or daemon responsible for file collection and creating the image I ndex that will eventually be put on the tape or disk being used for backup. In our example however, we will List es notofbeFigur sending data across the network, but redirect STDOUT to NUL and STDERR to a file to be List of Tables reviewed later. This file will give you the number of files that it processed and the size of the 'backup image' that was created, but ultimately sent to NUL. When you begin this process, you want to select a List of Sidebars

sizeable amount of data in order to get a fairly accurate representation and you want to simply track the amount of time it takes to process this command. Do not write to the same device you are reading from, this will skew your results. < Day Day Up > NT/2000: This test will use just bpbkar writing to /dev/null (the bit bucket), which eliminates the network portion of the equation. c:\Veritas\Netbackup\bin\bpbkar32.exe -nocont > NUL 2> (for NT) i.e. c:\Veritas\Netbackup\bin\bpbkar32.exe -nocont c:\ > NUL 2> temp.f temp.f will contain all of the files that bpbkar has collected. This will grow considerably if there is a large file system or directory structure you are testing with. BE WARNED. From Unix:

< Day Day Up > /usr/openv/netbackup/bin/bpbkar -nocont / > /dev/null 2> /tmp/files.out

Same idea.I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa & Sons © 2003 (340 pages)

From the Server John Wiley

ISBN:0471227145

guide tak es r eaders thrclient ough the necessar y steps of these tests will have left the So now we have This taken the testing from the to the server. Both of deploy ing ser v ices by showing how to addr ess the network completely out of the respective equations. If your of the client has left you with ar chitectur e, lim it ations, and capabilities of t testing he ex isting reasonable results, is astr timeuctur to test net then wor k itinfr e. the server. This may be moot especially if your overall backup performance is good with the exception of a few clients. But as good-natured System Administrators we want to make sure that we have adequate test documentation before we address our network group. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Besides it's always good to perform these self-assessments every now and then. Ta ble o f Con t en t s

I mplem ing undocumented Backup and Recover y—The Guide the Enter pr ise Thereent is an feature withReadiness NetBackup thatfor allows you to eliminate the tape subsystems, ( VERI ies)controllers from the equation and simply write your backups to, yes, the bit-bucket. As I disk TAS and Ser drive I ntr oduction before this is an infinitely fast device, if we could only write to NUL for all of our backups, our mentioned Pa r t I - I nt r oduct ion t owould Ba ck up Recove r y in we the would Ent er pr i se Env onm e performance issues goand away, but alas have noirdata tontshow for

it, so we can't. If you

Chapter 1 to - Backup y Sy st em Requir em ents plained CAVEATS and WARNINGS that if you would like do this, and you Recover must understand that there areExseveral Chapter 2 - will Business Requirements of Back up Systems do not heed have negative effects on your environment. Particularly with this one, will be your Chapter - An I ntr odudata ctionfrom to NetBackup inability3to restore any disk storage units, because the data will just simply not be there. Pa r t I I - Back up P roduct Tutor ia l

So here's reason weStor want run this type of test. First of all it will let us know how NetBackup is Chapter 4 the - Evaluating agetoMedia Requir ements processing data. Could there anything inherently wrong with our NetBackup configuration? Chapter 5 -the Gener al Discussion onbe Configur ation

Hopefully part one of this test will help us to see that a bit clearer. The second reason we want to run - Monitor in g the Backup Pr ocess this test, is after we validate our NetBackup Server configuration has been ruled out as the culprit, our Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options client is performing well with its local test, we can test the backup from the client to the server across the Chapter 8 - Gener al Tr oubleshooting Tips network. Chapter 6

Chapter 9

- The Expanding Back up System

Pa r t I I I -how The we Ente r pri se I m pa ct of Back up Sy ste m s Here's begin:

Chapter 10 - The Fut ure of Backup

1. Create a disk storage unit; even if you already have some created I recommend that you create a new one and call it DISK_STU_TEST or something similar.

Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide

Appendix 2. Now B - touch Glossar /usr/openv/netbackup/bpdm_dev_null y or for the WINTEL systems, create an empty

bpdm_dev_null the Recov NetBackup directory. Appendixfile C call - Tuning Your Backupinand er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

3. Run your test backup.

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix - Per a forbackup m ance Test Tech Notespecial that I use for adhoc backups or testing. You may want to I usuallyFcreate policy called Appendix G Net Backu p Per form ance Tuning on Windows do something similar to avoid any modifications of your production backup policies. Whatever you I ndex decide to do, make sure you select the DISK_STU_TEST storage unit to be used by the test backup List of Figur es this backup job runs, the fragments will be created but the file length will remain 0 and policy. When List bpdm of Tables will write the image to the bit-bucket (i.e. /dev/null). List of Sidebars

Note: NOTE When you back up to a disk storage unit, bptm (backup tape manager) daemon or process will not be invoked, rather bpdm (backup disk manager) will be. Therefore if the < Day Day Up > test proves to be successful, then we may be looking at a tuning issue with regard to shared memory and/or tape buffers.

Since we are sending all of the image data to NUL, we will not be able to restore any of this data that we backed up during our test. This is true for ALL disk storage units created on this particular media server. You must remember to DELETE bpdm_dev_null after your testing is complete. If you touch the file, you should see the following in bpdm debug log for backups: > really writing to /dev/null This tells us that we have created the storage unit correctly for this test and that any other subsequent backups to a disk storage unit on this media server will really write to /dev/null.

Caveats:

< Day Day Up >

Don't try restores. Doing this affects ALL disk-based backups on the server (all go to null). I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

I have been told that while it has yet to be proven, it may cause problems with tape based backups ISBN:0471227145 by David B. Little and David A. Chapa as well. I personally haven't had this experience. John Wiley & Sons © 2003 (340 pages)

This guide es r eaderslying thr ough the in necessar y steps of Doing this leaves extra tak information around NB databases. deploy ing ser v ices by showing how to addr ess the ar chitectur limcreate it ations, andthis capabilities t hetest ex isting Expire any images thate, you with test afterofthe is over using the bpexpdate command. net wor k infr astr uctur e.

When you are done remove the /usr/openv/netbackup/ bpdm_dev_null file. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s

Using FTP

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI ies) The TAS finalSer test is simply using FTP. We have now tested and timed the backup at the client to the bit I ntr oduction bucket, client to the server to the bit bucket and now we want to try the network, from the client to the Pa r t I - I nt r oduct o Ba and Recoveat r yainclient the Ent er pr server i se Env issue ir onm eor ntnetwork server. This will ion tellt us if ck weupare looking issue,

issue. If anything it will

Chapter give us1good - Backup information and Recover as to how y Syto st proceed em Requirresolving em ents Ex our plained performance problem. Chapter 2

- Business Requirements of Back up Systems

Run this test from the client, then from the server and evaluate both findings to determine the next step. - An I ntr odu ction to NetBackup

Chapter 3

the client toiathe Pa r t 1. I I - FTP Backfrom up P roduct Tutor l

server, then server to client.

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

2. FTP something large enough to measure (1 GB preferably).

Chapter 6 may - Monitor in g the Backup ocess While this not seem like a realPrtest, it does accomplish something for us. We are able to transfer Chapter 7 Evaluating Ot her Back upRelated Featur es Options the times with FTP and the times with data OUTSIDE of the backup application, allowing us and to compare Chapter - Gener Tr oubleshooting Tips backup.8 With all ofalthis information and testing complete, the profile of the client backup should be Chapter 9 The Expanding Back up System relatively clear and we should be able to at least determine where the root cause of the problem exists. Pa t I I I is- not The the Ente r pri seopen I m paactsupport of Backcall up Sy ste m s Ifrthis case, with VERITAS.

Be prepared to submit all of your

documentation them, soBackup you can avoid any lost time resolving your issue. Chapter 10 - ThetoFut ure of Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y

< Day Day Up >

Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Summary

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by David Little and David on A. Chapa This appendix should giveB.you a jump-start creating business impact analyses for your company or John Wiley Sons 2003 (340when pages)you conduct an interview and keep it on a organization. Remember to &use an©agenda professional levelThis at all times. is a very critical you are attempting to document guide tak This es r eaders thr ough thebusiness necessarfunction y steps of ser vwith ices the by showing addr ess the and thus requiresdeploy focus.ing Stay agenda,how keeptofocused, and if you have a difficult time with the chitectur e, lim it with ations, and capabilities ex isting interviews or are ar not comfortable interviewing, then of wet he suggest you role-play with other members net wor k infr astr uctur e. of your IT staff. Write down notes for yourself if you find that you drift during the role-playing, and create scenarios to help the individuals you are interviewing properly appreciate the level of severity < ?xm version= " 1.0" encoding= " I SO8859?> youl are attempting to plan for. This is a 1" dynamic process, so as the interview takes place, you may Tahave ble o other f Con tquestions en t s that come up. Write them down on your agenda, and make sure to ask them I mplem Backup keeping and Recover y—The Guideshould for thebe Enter pr ise duringent theingmeeting, in mind thatReadiness the question within the context of the agenda you ( VERI ies)Also, ask if you can record the meeting for the purposes of increasing the quality of your haveTAS set Ser forth. I ntr oduction analysis. Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up < Systems Day Day Up > - An I ntr odu ction to NetBackup

Chapter 3

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

en t ing Ba cku p an d Reco ver y: Th e Rea din ess AppendixIGum idplem F: Performance Test Tech Note e f or t h e Ent er pr ise by David B. Little and David A. Chapa

ISBN:0471227145

John Wiley & Sons © 2003 (340 pages) Introduction This guide tak es r eaders thr ough the necessar y steps of

This document has deploy been ingcompiled ser v ices by from showing notes how that to have addrbeen ess the made over the past several years ar chitectur e, limof it ations, and capabilities of t he ex isting working with NetBackup. Some the information is original and some has come from other net wor k infr astr uctur e. NetBackup Professional Consultants. This was created to assist in the troubleshooting of network performance issue as it relates to NetBackup. Some of the following are undocumented and 'unsupported' by Veritas Software, and are < ?xm l version= " 1.0" encoding= " I SO- 88591" ?>provided merely for testing purposes only. Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) < Day Day Up > I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p NetBackup an d Reco ver y: Th e Rea din ess Testing Performance with Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by of David Little andperform David A.toChapa There are a variety testsB.one can identify where the 'problems' exist within ones backup Wiley & only Sonscovers © 2003 (340 pages) environment. ThisJohn document a few that I have found to be most useful in my capacity as a Consultant working NetBackup. Thisthr document briefly expose Thiswith guide tak es r eaders ough the will necessar y steps of you to some of these ideas and deploy ing ser v ices by showing how to addr ess the concepts.

ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

Where to Begin

< ?xm version= 1.0" encoding= " I SO-is88591"performance ?> So lyou have "identified that there some problem with some of your backup clients. TaPerhaps ble o f Con t en t s you have noticed it because of some errors you have been receiving or you have been using I mplem ent ing Backupscript and Recover y—The Guide the Enter pr for ise a particular client. Whatever my clnt_thruput.sh and started to Readiness see a decline infor performance ( VERI TAS Ser ies)

the case may be, you are now here looking at ways to troubleshoot this issue. We have many connection points that could be potential bottlenecks for our backup client. From the client we have Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt CPU, MEMORY, DISK, NIC, just to name a few with a NETWORK in between the client and the server. Chapter 1 be - Backup Recover y Sy st em emas ents Ex plained We could seeing and similar issues with theRequir server well. So simply saying that we have performance Chapter 2 is- aBusiness Requirements Back up Systems problems very broad statement of and requires us to 'drill down' and narrow that statement a bit. The Chapter An isI ntr ction to to divide NetBackup way we3do -this to odu attempt these areas up as much as possible in order to troubleshoot with Pa r t high I I - Back up of P roduct Tutor iaas l possible. Network performance is probably blamed for 90% of the as a level consistency Chapter - Evaluatingproblems. Stor age Media ements backup4performance Why?Requir Because network is the easiest target, well here's to the defense Chapter 5 Gener al Discussion on Configur ation of the network groups out there, it may be your backup server, or the client's disk. It may also be the network, this document will helpPrus better discern where the problem lies. Chapter 6 but - Monitor in g the Backup ocess I ntr oduction

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

- Gener Tr oubleshooting Tips Dumping to althe 'Bit-Bucket'

Chapter 8 Chapter 9

- The Expanding Back up System

Pa r t I I there I - Theare Ente pri se I m ct ofthat Backcan up Sy ms Now a rcouple ofpa thing beste done

to eliminate the many variables that exist between the

client and server. Forof our first example, we make an assumption that the client and server are two Chapter 10 the - The Fut ure Backup different and therefore will take the network and the server out of the equation and focus Chapter 11machines - Maj or Players in the Backup Ar ena solely onA the client. What weI nter want to Gu do ide is test how fast the client can 'read' data off of the disk. We do Appendix - Com m and-Line face this by having it sentyto an infinitely fast device, the bit-bucket or NUL. Appendix B - Glossar Appendix C - Tuning Your Backup and Recov er y Application

From the Client

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

To see if the client is the bottleneck in the network performance, perform the following using bpbkar,

Appendix Per fordirectory m ance Test Techyour NoteNetBackup software is installed. For information's sake, bpbkar which is Fin -the bin where Appendix G Net Backu p Per form ance Tuningthat on is Windows is the backup/archive process or daemon responsible for file collection and creating the image I ndex that will eventually be put on the tape or disk being used for backup. In our example however, we will List es notofbeFigur sending data across the network, but redirect STDOUT to NUL and STDERR to a file to be List of Tables reviewed later. This file will give you the number of files that it processed and the size of the 'backup image' that was created, but ultimately sent to NUL. When you begin this process, you want to select a List of Sidebars

sizeable amount of data in order to get a fairly accurate representation and you want to simply track the amount of time it takes to process this command. Do not write to the same device you are reading from, this will skew your results. < Day Day Up > NT/2000: This test will use just bpbkar writing to /dev/null (the bit bucket), which eliminates the network portion of the equation. c:\Veritas\Netbackup\bin\bpbkar32.exe -nocont > NUL 2> (for NT) i.e. c:\Veritas\Netbackup\bin\bpbkar32.exe -nocont c:\ > NUL 2> temp.f temp.f will contain all of the files that bpbkar has collected. This will grow considerably if there is a large file system or directory structure you are testing with. BE WARNED. From Unix:

< Day Day Up > /usr/openv/netbackup/bin/bpbkar -nocont / > /dev/null 2> /tmp/files.out

Same idea.I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa & Sons © 2003 (340 pages)

From the Server John Wiley

ISBN:0471227145

guide tak es r eaders thrclient ough the necessar y steps of these tests will have left the So now we have This taken the testing from the to the server. Both of deploy ing ser v ices by showing how to addr ess the network completely out of the respective equations. If your of the client has left you with ar chitectur e, lim it ations, and capabilities of t testing he ex isting reasonable results, is astr timeuctur to test net then wor k itinfr e. the server. This may be moot especially if your overall backup performance is good with the exception of a few clients. But as good-natured System Administrators we want to make sure that we have adequate test documentation before we address our network group. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Besides it's always good to perform these self-assessments every now and then. Ta ble o f Con t en t s

I mplem ing undocumented Backup and Recover y—The Guide the Enter pr ise Thereent is an feature withReadiness NetBackup thatfor allows you to eliminate the tape subsystems, ( VERI ies)controllers from the equation and simply write your backups to, yes, the bit-bucket. As I disk TAS and Ser drive I ntr oduction before this is an infinitely fast device, if we could only write to NUL for all of our backups, our mentioned Pa r t I - I nt r oduct ion t owould Ba ck up Recove r y in we the would Ent er pr i se Env onm e performance issues goand away, but alas have noirdata tontshow for

it, so we can't. If you

Chapter 1 to - Backup y Sy st em Requir em ents plained CAVEATS and WARNINGS that if you would like do this, and you Recover must understand that there areExseveral Chapter 2 - will Business Requirements of Back up Systems do not heed have negative effects on your environment. Particularly with this one, will be your Chapter - An I ntr odudata ctionfrom to NetBackup inability3to restore any disk storage units, because the data will just simply not be there. Pa r t I I - Back up P roduct Tutor ia l

So here's reason weStor want run this type of test. First of all it will let us know how NetBackup is Chapter 4 the - Evaluating agetoMedia Requir ements processing data. Could there anything inherently wrong with our NetBackup configuration? Chapter 5 -the Gener al Discussion onbe Configur ation

Hopefully part one of this test will help us to see that a bit clearer. The second reason we want to run - Monitor in g the Backup Pr ocess this test, is after we validate our NetBackup Server configuration has been ruled out as the culprit, our Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options client is performing well with its local test, we can test the backup from the client to the server across the Chapter 8 - Gener al Tr oubleshooting Tips network. Chapter 6

Chapter 9

- The Expanding Back up System

Pa r t I I I -how The we Ente r pri se I m pa ct of Back up Sy ste m s Here's begin:

Chapter 10 - The Fut ure of Backup

1. Create a disk storage unit; even if you already have some created I recommend that you create a new one and call it DISK_STU_TEST or something similar.

Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide

Appendix 2. Now B - touch Glossar /usr/openv/netbackup/bpdm_dev_null y or for the WINTEL systems, create an empty

bpdm_dev_null the Recov NetBackup directory. Appendixfile C call - Tuning Your Backupinand er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

3. Run your test backup.

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix - Per a forbackup m ance Test Tech Notespecial that I use for adhoc backups or testing. You may want to I usuallyFcreate policy called Appendix G Net Backu p Per form ance Tuning on Windows do something similar to avoid any modifications of your production backup policies. Whatever you I ndex decide to do, make sure you select the DISK_STU_TEST storage unit to be used by the test backup List of Figur es this backup job runs, the fragments will be created but the file length will remain 0 and policy. When List bpdm of Tables will write the image to the bit-bucket (i.e. /dev/null). List of Sidebars

Note: NOTE When you back up to a disk storage unit, bptm (backup tape manager) daemon or process will not be invoked, rather bpdm (backup disk manager) will be. Therefore if the < Day Day Up > test proves to be successful, then we may be looking at a tuning issue with regard to shared memory and/or tape buffers.

Since we are sending all of the image data to NUL, we will not be able to restore any of this data that we backed up during our test. This is true for ALL disk storage units created on this particular media server. You must remember to DELETE bpdm_dev_null after your testing is complete. If you touch the file, you should see the following in bpdm debug log for backups: > really writing to /dev/null This tells us that we have created the storage unit correctly for this test and that any other subsequent backups to a disk storage unit on this media server will really write to /dev/null.

Caveats:

< Day Day Up >

Don't try restores. Doing this affects ALL disk-based backups on the server (all go to null). I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

I have been told that while it has yet to be proven, it may cause problems with tape based backups ISBN:0471227145 by David B. Little and David A. Chapa as well. I personally haven't had this experience. John Wiley & Sons © 2003 (340 pages)

This guide es r eaderslying thr ough the in necessar y steps of Doing this leaves extra tak information around NB databases. deploy ing ser v ices by showing how to addr ess the ar chitectur limcreate it ations, andthis capabilities t hetest ex isting Expire any images thate, you with test afterofthe is over using the bpexpdate command. net wor k infr astr uctur e.

When you are done remove the /usr/openv/netbackup/ bpdm_dev_null file. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s

Using FTP

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI ies) The TAS finalSer test is simply using FTP. We have now tested and timed the backup at the client to the bit I ntr oduction bucket, client to the server to the bit bucket and now we want to try the network, from the client to the Pa r t I - I nt r oduct o Ba and Recoveat r yainclient the Ent er pr server i se Env issue ir onm eor ntnetwork server. This will ion tellt us if ck weupare looking issue,

issue. If anything it will

Chapter give us1good - Backup information and Recover as to how y Syto st proceed em Requirresolving em ents Ex our plained performance problem. Chapter 2

- Business Requirements of Back up Systems

Run this test from the client, then from the server and evaluate both findings to determine the next step. - An I ntr odu ction to NetBackup

Chapter 3

the client toiathe Pa r t 1. I I - FTP Backfrom up P roduct Tutor l

server, then server to client.

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

2. FTP something large enough to measure (1 GB preferably).

Chapter 6 may - Monitor in g the Backup ocess While this not seem like a realPrtest, it does accomplish something for us. We are able to transfer Chapter 7 Evaluating Ot her Back upRelated Featur es Options the times with FTP and the times with data OUTSIDE of the backup application, allowing us and to compare Chapter - Gener Tr oubleshooting Tips backup.8 With all ofalthis information and testing complete, the profile of the client backup should be Chapter 9 The Expanding Back up System relatively clear and we should be able to at least determine where the root cause of the problem exists. Pa t I I I is- not The the Ente r pri seopen I m paactsupport of Backcall up Sy ste m s Ifrthis case, with VERITAS.

Be prepared to submit all of your

documentation them, soBackup you can avoid any lost time resolving your issue. Chapter 10 - ThetoFut ure of Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y

< Day Day Up >

Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Summary

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by prove David quite B. Little and David A. I'm Chapa These tests should helpful to you. sure there are a dozen more that I haven't even Johnhave Wileyalways & Sonsworked © 2003 (340 pages) thought of, but these well for me. If there is a final word I can leave with you it would be to document, document, document. As the much as wey all loathe This guide tak es r eaders thr ough necessar steps of the thought, it is central to ing ser v ices bywould showing to addr ess the everything we do.deploy Our environments be how completely unmanageable without it. Every ounce of ar chitectur e, lim it ations, andconfidence capabilities to of administer, t he ex isting maintain and troubleshoot your documentation gives you and your staff the net wor k infr astr uctur e. NetBackup environment.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s < Day Day Up > I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

en t ing Ba cku p an d Reco ver y: Th e Rea din ess AppendixIGum idplem G: NetBackup Performance Tuning on e f or t h e Ent er pr ise ISBN:0471227145 David B. Little and David A. Chapa Windowsby John Wiley & Sons © 2003 (340 pages) This guide tak es r eaders thr ough the necessar y steps of

deploy ing ser v ices by showing how to addr ess the Document Description

ar chitectur e, lim it ations, and capabilities of t he ex isting

net wor k information infr astr ucturon e. ways to optimize NetBackup on Windows systems. It is This document contains relevant for NetBackup 4.5 and for earlier releases. This document is intended, primarily for system administrators, to provide a guide for NetBackup performance evaluation. It is not intended to provide < ?xm l version= " 1.0" encoding= " I SO- 88591" ?> tuning advice for particular systems. If you would like help fine-tuning your system, please contact the Ta ble o f Con t en t s VERITAS consulting service. I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in er pr < the DayEnt Day Upi se > Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m to plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Introduction NetBackup Performance Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by David B. Little and David A. Chapa Before we examine the factors that affect backup performance, please note that an important first step John system Wiley & meets Sons ©NetBackup's 2003 (340 pages)recommended minimum requirements. Refer to your is to ensure that your NetBackup Installation Guide Release for necessar information about This guide takand es r eaders thrNotes ough the y steps of these requirements. deploy ing serthat v icesyou by have showing addr ess the Additionally, we recommend the how mosttorecent NetBackup software patch installed. For ar chitectur e, limNetBackup it ations, and3.4x, capabilities of t he includes ex isting significant restore performance example, if you are testing with patch 341_2 net wor k infr astr uctur e. enhancement to tar32.exe.

Thel version= final measure of performance is the1"length of time required for backup operations to complete < ?xm " 1.0" encoding= " I SO- 8859?> (usually known as the backup window), or the length of time required for a critical restore operation to Ta ble o f Con t en t s complete. However, in order to measure performance thenEnter useprthose I mplem ent ing Backup and Recover y—The Readiness Guideand for the ise measurements to implement to improve performance, a performance metric more reliable and reproducible ( VERI TAS Serchanges ies) than simple wall clock time should be used. We will discuss these types of metrics in this document. I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Many performance issues can be traced to hardware or other environmental issues. A basic - Backup and Recover y Sy st em Requir em ents Ex plained understanding of the entire data transfer path is essential in determining the maximum obtainable Chapter 2 - Business Requirements of Back up Systems performance in your environment. Poor performance is often the result of poor planning, which can be Chapter 3 - An I ntr odu ction to NetBackup based on unrealistic expectations of any particular component of the data transfer path. Chapter 1

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4 - component Evaluating Stor age data Mediatransfer Requir ements The slowest in the path (for a backup, the path usually starts at the data on Chapter 5 Gener al Discussion on Configur ationwill be the bottleneck that will limit the overall the disk and ends with a backup copy on tape)

performance of NetBackup. For example, Chapter 6 - Monitor in g the Backup Pr ocess a fast tape drive combined with an overloaded server will yield poor a slow network with a fast tape drive will also yield poor Chapter 7 performance. - Evaluating OtSimilarly, her Back upRelated Featurcombined es and Options performance. Chapter 8 - Gener al Tr oubleshooting Tips Chapter 9

- The Expanding Back up System

This document subdivides the standard NetBackup data transfer path into four basic components: the NetBackup client, the network, the NetBackup server, and the storage device. While it may be useful Chapter 10 - The Fut ure of Backup to subdivide the data transfer path even further in some installations, to identify and ease specific Chapter 11 - Maj or Players in the Backup Ar ena bottlenecks, these four components offer a good general approach to illustrate the ‘divide and Appendix A - Com m and-Line I nter face Gu ide conquer' approach to improving overall NetBackup performance. Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Appendix B - Glossar y

This document discusses NetBackup performance evaluation and improvement from a testing Appendix C - Tuning Your Backup and Recov er y Application perspective. describes ways to isolateKit—Fr performance in order to get a sense of the effect Appendix D - It Disaster Recovery Planning om End variables to Beginning each variable has on overall and Stor to optimize Appendix E - Business I mpact system Analysisperformance, Planning Kit—The m Befor eNetBackup t he Calm performance with regTard Fto -that mayTech not be possible to optimize every variable on your production system. Appendix Pervariable. for m anceItTest Note Appendix G - Net Backu p Per form ance Tuning on Windows

This document was written with file system backups in mind. Database backups may have different requirements.

I ndex

List of Figur es List of Tables

List of Sidebars

< Day Day Up >

< Day Day Up >

< Day Day Up >

m plem en t ing Ba Performance cku p an d Reco ver y: Th e Rea din ess Measuring INetBackup Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by David B. an Little and David A. Chapa Once you have established accurate metric as described here, you can measure the current John Wiley & Sons © 2003 (340 pages) performance of NetBackup and your system components to compile a baseline performance benchmark. Once youguide havetak a baseline, can apply changes in a controlled way. By measuring This es r eadersyou thr ough the necessar y steps of deploy ser v ices by can showing how tomeasure addr ess the performance after eaching change, you accurately the effect of each change on ar chitectur e, lim it ations, and capabilities of t he ex isting NetBackup's performance.

net wor k infr astr uctur e.

The following topics are covered in this section: < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Controlling system variables for consistent testing conditions Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for thethe Enter ise Entries report Evaluating performance through the Activity Monitor and All pr Log ( VERI TAS Ser ies) I ntr oduction Evaluating system components, such as your CPU and memory Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained Controlling System Variables for Consistent Testing Conditions - Business Requirements of Back up Systems

Chapter 2

Chapter 3 - performance An I ntr odu ction to NetBackup For reliable evaluation, eliminate as many unpredictable variables as possible in order to Pa r t I I - aBack up P roduct Tutorenvironment. ia l create consistent backup

Only a consistent environment will produce reliable and

Chapter 4 - Evaluating Stormeasurements. age Media RequirSome ementsof the variables to consider are described below as reproducible performance Chapter 5 Gener al Discussion on Configur ation they relate to the NetBackup server, the network, the NetBackup client, or the data itself. Chapter 6

Server Chapter 7 Chapter 8

- Monitor in g the Backup Pr ocess

Variables - Evaluating

Ot her Back up- Related Featur es and Options

- Gener al Tr oubleshooting Tips

Of course, it is important to eliminate all other NetBackup activity from your environment when you are - The Expanding Back up System measuring the performance of a particular NetBackup operation. One area which you must consider Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s during this process is the automatic scheduling of backup jobs by the NetBackup scheduler. Chapter 9

Chapter 10 - The Fut ure of Backup

Chapter 11 - Maj or created, Players inthey the are Backup Ar ena When policies are usually set up to allow the NetBackup scheduler to initiate the Appendix - Com m and-Linescheduler I nter face will Gu ide backups.A The NetBackup initiate backups based on the traditional NetBackup Appendix B - Glossar y frequency-based scheduling or on certain days of the week, month, or other time interval. This process Appendix is calledCcalendar-based - Tuning Your Backup scheduling and Recov and isernew y Application in NetBackup 4.5. As part of the backup policy

Start Window used to indicate theBeginning NetBackup scheduler can start backups definition, Appendix D the - Disaster RecoveryisPlanning Kit—Fr omwhen End to using either or calendar-based scheduling. perform backups for the Appendix E - frequency-based Business I mpact Analysis Planning Kit—The Stor m When Befor e you t he Calm purposeFof -performance thisNote setup might interfere since the NetBackup scheduler may initiate Appendix Per for m ance testing, Test Tech backupsGunexpectedly; especially if the operations you intend to measure run for an extended period Appendix - Net Backu p Per form ance Tuning on Windows of time. I ndex

List of Figur es

The simplest way to prevent the NetBackup scheduler from running backup jobs during your

List of Tables testing (assuming you are testing the performance of a backup job), is to create a new performance List of policySidebars specifically for use in performance testing and to leave the Start Window field blank in the

schedule definition for that policy. This prevents the NetBackup scheduler from initiating any backups automatically for that policy. After creating the policy, you can run the backup on demand by using the Manual Backup command from the NetBackup Administration Console. < Day Day Up > To prevent the NetBackup scheduler from running backup jobs unrelated to the performance test, you may want to set all other backup policies to inactive by using the Deactivate command from the NetBackup Administration Console. Of course, you must reactivate the policies to start running backups again. You can use a user-directed backup to run the performance test as well. However, we suggest using the manual backup option for a policy, (or immediate backup, as it is sometimes called) instead of a user-directed backup to more closely simulate initiation of a backup job by the NetBackup Scheduler. Additionally, if you use a manual backup, the backup policy will contain the entire definition of the backup job, including the clients and files that are part of the performance test. Confining the definition of the backup job to a single location makes it easier to manage changes to the definition, which in turn makes reliable performance test results more likely.

You may want to consider changing the wakeup interval for the NetBackup Scheduler to a larger value < Day Day Up > for the duration of performance testing. Use the Global NetBackup Attributes tab of the Master Server Properties dialog to modify the wakeup interval. Access the Master Server Properties dialog through the Host Properties node of the NetBackup Administration Console in release 4.5, or the Configure plem en t ing Ba The cku pwakeup an d Reco ver y: controls Th e Reahow din ess NetBackup GUI inI mearlier releases. interval often the NetBackup Scheduler Gu id e f or t h e on Entthe er pr ise examines the policy definitions master server to determine if there are any new backup jobs to Davidnumber B. Little of and David A. Chapa start. If there are by a large NetBackup policies definedISBN:0471227145 for the master server, this action by the John Wiley & Sons © 2003 (340 pages) Scheduler may affect the performance test. Setting the wakeup interval to a large value, such as 1440 Thisany guide tak esof r eaders thr ough the y steps of test. (24 hours) will avoid impact this processing onnecessar the performance deploy ing ser v ices by showing how to addr ess the ar chitectur lim it ations, and will capabilities of t performance he ex isting Be aware that changing thee,wakeup interval not reflect in your actual production net wor k infr astr uctur e. environment. For more realistic results, use the wakeup interval specified in your production environment. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> you tstart TaBefore ble o f Con en t s the performance test, check the Activity Monitor to make sure there is no NetBackup

processing in progress. Similarly, check Guide the Activity I mplem ent ingcurrently Backup and Recover y—The Readiness for theMonitor Enter prafter ise the performance test for unexpected activity (such as an unanticipated restore job) that may have occurred during the test. ( VERI TAS Ser ies) I ntr oduction

Additionally, check for non-NetBackup activity on the server during the performance test and try to reduce or eliminate it.

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

Business Requirements of Network- Variables

Chapter 3

Back up Systems

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct is Tutor Network performance key iatol

achieving optimum performance with NetBackup. Ideally, you would

Chapter 4 - Evaluating Stornetwork age Media ements testing to avoid the possibility of skewing the use a completely separate forRequir performance results 5by encountering unrelated activity during the course of the test. Chapter - Gener al Discussion on network Configur ation Chapter 6

- Monitor in g the Backup Pr ocess

In many cases, a separate network is not available. Ensure that non-NetBackup activity is kept to an - Evaluating Ot her Back up- Related Featur es and Options absolute minimum during the time you are evaluating performance. If possible, schedule testing for Chapter 8 - Gener al Tr oubleshooting Tips times when backups are not active. Even occasional short bursts of network activity may be enough to Chapter 9 - The Expanding Back up System skew the results during portions of the performance test. If you are sharing the same network as any Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s production backups occurring for other systems, you must account for this activity during the Chapter 10 - The Fut ure of Backup performance test. Chapter 7

Chapter 11 - Maj or Players in the Backup Ar ena

Appendix - Com variable m and-Line I nter faceconsider Gu ide is host name resolution. NetBackup depends heavily upon Another Anetwork you must Appendix - Glossarofy host names to operate correctly. If you have any delays in host name resolution, a timely Bresolution

includingCreverse name identify name from an incoming connection from a certain Appendix - Tuning Yourlookup Backuptoand Recovaerserver y Application IP address, may want to eliminate delay the HOSTS file for host name resolution on Appendix D - you Disaster Recovery Planning that Kit—Fr om by Endusing to Beginning systemsEinvolved in your performance test environment. Appendix - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note

Client Variables

Appendix G - Net Backu p Per form ance Tuning on Windows I ndex

Make sure the client system is in a relatively quiescent state during performance testing. A lot of

List of Figur es activity, especially disk-intensive activity such as virus scanning, will limit the data transfer rate and List of Tables skew the results of your tests. List of Sidebars

One possible mistake is to allow another NetBackup server, such as a production backup server, to have access to the client during the course of the test. This may result in NetBackup attempting to backup the same client to two different servers at the < Day Daysame Up > time, which would severely impact the results of a performance test in progress at that time. Different file systems have different performance characteristics. For example, comparing data throughput results from operations on a FAT file system to those from operations on an NTFS system may not be valid, even if the systems are otherwise identical. If you do need to make such a comparison, factor the difference between the file systems into your performance evaluation testing, and into any conclusions you may draw from that testing. Take care when OTM (Open Transaction Manager) is enabled to back up open files on the client during performance testing. OTM will delay for a certain amount of time waiting for the disk drive to quiesce. This delay can vary from one performance test run to the next, causing unreliable results. You may want to disable OTM on the client during performance testing if it is not needed to back up open files and avoid this unpredictable delay.

Data Variables

< Day Day Up >

Monitoring the data you are backing up improves the repeatability of performance testing. If possible, move the data you will use for testing backups to its own drive or logical partition (not a mirrored drive), I m plem t ing Ba p anperformance d Reco ver y: Th e ReaFor din testing ess and defragment the driveen before youcku begin testing. restores, start with an Guaidrecently e f or t h edefragmented Ent er pr ise disk drive with ample empty space. This will help reduce empty disk drive or ISBN:0471227145 David B. Little etc., and David Chapa the impact of diskbyfragmentation, on theA.NetBackup performance test run and yield more John Wiley & Sons © 2003 (340 pages) consistent results between test runs. This guide tak es r eaders thr ough the necessar y steps of deploy ing serto v ices by always showingstart howeach to addr ess thewith an empty piece of media. You can Similarly, for testing backups tape, test run chitecturimages e, lim it ations, capabilities t he ex isting do this by expiringarexisting for thatand piece of mediaofthrough the Catalog node of the NetBackup net wor k infr astr uctur e. Administration Console (new in release 4.5), or by running the bpexpdate command. Another approach is to use the bpmedia command to freeze any media containing existing backup images so thatl version= NetBackup selects a new piece of media < ?xm " 1.0" encoding= " I SO88591" ?> for the backup operation. This step will help reduce the Taimpact ble o f Con t en tpositioning, s of tape etc., on the NetBackup performance test run and will yield more consistent resultsent between test and runs. Wheny—The you test restoresGuide from for tape, from the same backup I mplem ing Backup Recover Readiness thealways Enter prrestore ise ( VERI TAS ies) image onSer the tape to achieve consistent results between test runs. I ntr oduction

Inr tgeneral, usingiona tlarge data set will generate a more reliable reproducible Pa I - I nt r oduct o Ba ck up and Recove r y in the Ent er pr i se Envand ir onm e nt

performance test than a small data set. A performance test using a small data set would probably be skewed by startup and Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained shutdown overhead within the NetBackup operation. These variables are difficult to keep consistent Chapter 2 - Business Requirements of Back up Systems between test runs and are therefore likely to produce inconsistent test results. Using a large data set Chapter 3 - An I ntr odu ction to NetBackup will minimize the effect of start up and shutdown times. Pa r t I I - Back up P roduct Tutor ia l Chapter Evaluating Stordataset age Media Requir ements Design4the -makeup of the to represent the makeup of the data in the intended production Chapter 5 Gener al Discussion on Configur environment. For example, if the data set ination the production environment contains many small files on Chapter 6 - then Monitor g theset Backup Prperformance ocess file servers, theindata for the testing should also contain many small files. A Chapter 7 - Evaluating herwill Back up- Related Featur es and Options representative test dataOtset more accurately predict the NetBackup performance that you can Chapter 8 Gener al Tr oubleshooting Tips reasonably expect in a production environment. Chapter 9

- The Expanding Back up System

The of data help reveal Pa r t I Itype I - The Ente rcan pri se I m pa ct of bottlenecks Back up Sy stein mthe s

system. Files consisting of non-compressible (random) data cause the tape drive to run at its lower rated speed. As long as the other components of Chapter 10 - The Fut ure of Backup the data transfer path are keeping up, you may identify the tape drive as the bottleneck. On the other Chapter 11 - Maj or Players in the Backup Ar ena hand, files consisting of highly-compressible data can be processed at higher rates by the tape drive Appendix A - Com m and-Line I nter face Gu ide when hardware compression is enabled. This scenario may result in a higher overall throughput and Appendix B - Glossar y possibly expose the network as the bottleneck. Appendix C - Tuning Your Backup and Recov er y Application

Appendix D - Disaster Recovery Planning om End to and Beginning Many values in NetBackup provide dataKit—Fr amounts in KB rates in KB/Sec. For greater accuracy, Appendix - Business I mpact Analysisoff Planning Storconvert m Beforfrom e t heKB Calm divide byE1024 rather than rounding to 1000Kit—The when you to MB or from KB/Sec. to Appendix MB/Sec.F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es

< Day Day Up >

List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Evaluating IPerformance Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by David B. Littlefrom and which David A. Chapa There are two primary locations NetBackup data throughput performance statistics can be John Wileyoperation: & Sons © 2003 (340 pages) obtained for a NetBackup the NetBackup Activity Monitor and the NetBackup All Log Entries report. The choice of which location to use determined by the type of of NetBackup operation you are This guide tak es r eaders thris ough the necessar y steps deploy ing serbackup, v ices byrestore, showingor how to addr essbackup. the measuring: non-multiplexed multiplexed

ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k for infrall astrthree ucturtypes e. You can obtain statistics of operations from the NetBackup All Log Entries report. You can obtain statistics for non-multiplexed backup or restore operations from the NetBackup Activity Monitor (statistics restore "operations are < ?xm l version= " 1.0" for encoding= I SO- 8859- 1" ?> newly available in the Activity Monitor with the 4.5 release). For multiplexed backup operations, you can obtain the overall statistics from the All Log Entries report Ta ble o f Con t en t s after all the individual backup operations which are part for of the I mplem ent ing Backup and Recover y—The Readiness Guide the multiplexed Enter pr ise backup are complete. In this case, theSer statistics available in the Activity Monitors for each of the individual backup operations are ( VERI TAS ies) relative only to that operation, and do not reflect the actual total data throughput to the tape drive. I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

There may be small differences between the statistics available from these two locations due to slight - Backup and Recover y Sy st em Requir em ents Ex plained differences in rounding techniques between the entries in the Activity Monitor and the entries in the All Chapter 2 - Business Requirements of Back up Systems Logs report. Therefore, we suggest you pick one location from which to obtain statistics and Chapter 3 - An I ntr odu ction to NetBackup consistently use it to compare performance between test runs. Chapter 1

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Evaluating Performance Through the NetBackup Activity Monitor - Gener al Discussion on Configur ation

Chapter 5

Chapter 6 - the Monitor in g or therestore Backupjob Pr ocess 1. Run backup (restore job statistics available only in the 4.5 release). Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options

2. Open the NetBackup Activity Monitor. Chapter 8 - Gener al Tr oubleshooting Tips Chapter 9

- The Expanding Back up System 3. Verify the backup or restore job completed successfully. A 0 should appear in the status column.

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 4. View 11 - the Maj details or Players for in thethe jobBackup by selecting Ar ena the Details menu option, or by double-clicking on the

job. Appendixentry A - for Comthe m and-Line I nter face Gu ide Appendix B - Glossar y

5. Select the Detailed Status tab.

Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recoveryperformance Planning Kit—Fr om Endfrom to Beginning 6. Obtain the NetBackup statistics the following fields: Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

fields show the time window during which the backup or restore job Appendix F - Started/Ended: Per for m ance TestThese Tech Note place. Appendix G - took Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables

Elapsed: This field shows the total elapsed time from when the job was initiated to job completion and can be used as an indication of total wall clock time for the operation.

List of Sidebars KB/sec: This is the data throughput rate.

Current Kilobytes Written: Compare this value to the amount of data. Although it should be comparable, the NetBackup data amount will be slightly higher because of < Day Day Up > administrative information, known as metadata, saved for the backed up data. For example, if you display properties for a directory containing 500 files, each 1 MB in size, the directory shows a size of 500 MB, or 524,288,000 bytes, which is equal to 512,000 KB. The NetBackup report may show 513,255 KB written, reporting an extra 1,255 KB than provided through viewing the directory's properties. This is true for a flat directory. Subdirectory structures may diverge due to the way the operating system tracks used and available space on the disk. Also, be aware that the operating system may be reporting how much space was allocated for the files in question, not just how much data is actually there. For example, if the allocation block size is 1 KB, 1000 1 byte files will report a total size of 1 MB, even though 1 KB of data is all that exists. The greater the number of files, the larger this discrepancy may become.

Evaluating Performance Using < Day the Day All Up >Log Entries Report 1. Run the backup or restore job. 2. Run the AllI mLog Entries report from the NetBackup reports node in the NetBackup plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Administrative release 4.5, or the NetBackup Reports GUI in earlier releases. Be Gu idConsole e f or t h einEnt er pr ise sure that the Date/Time Range that you select covers the time period during which the job was ISBN:0471227145 by David B. Little and David A. Chapa run. John Wiley & Sons © 2003 (340 pages) guide tak es r eaders thr ough the necessar y steps of 3. Verify thatThis the job completed successfully by searching for an entry such as 'the requested deploy ing ser v ices by showing how to addr ess the operation was successfully completed' for a backup, orex 'successfully read (restore) backup id ar chitectur e, lim it ations, and capabilities of t he isting … ' for a restore. net wor k infr astr uctur e.

4. Obtain the NetBackup performance statistics from the following entries in the report. (Note that < ?xm l version= " 1.0" shown encoding= " I SO?> release 4.5. The entries for earlier releases will be the the entries here are8859based1"on Ta ble o f same Con t en ort ssimilar.) I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntrENTRY oduction

STATISTIC

Pa rstarted t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt backup job for

TheDate and Time fields for this entry show the time at

Chapter 1 , Backup and Recover y Sy st em Requir ents Ex plained client policy which theem backup job started. Chapter 2 - schedule Business Requirements , of Back up Systems Chapter 3 - An I unit ntr odu ction to NetBackup on storage

Pa r t I I - Back up P roduct Tutor ia l

successfully wrote For a multiplexed backup, this entry shows the size of the - Evaluating Stor age Media Requir ements backup id , copy individual backup job and the Date and Time fields show Chapter 5 - Gener al Discussion on Configur ation , Kbytes the time at which the job finished writing to the storage Chapter 6 - Monitor in g the Backup Pr ocess device. The overall statistics for the multiplexed backup Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options group, including the data throughput rate to the storage Chapter 8 - Gener al Tr oubleshooting Tips device, are found in a subsequent entry below. Chapter 4

Chapter 9

- The Expanding Back up System

ForSymultiplexed backups, Pa rsuccessfully t I I I - The Ente r priwrote se I m pa ct of Back up ste m s

this entry shows the overall statistics for the multiplexed backup group including the multiplexed throughput rate. Chapter 11 - Maj orbackups, Players in the Backupdata Ar ena total Kbytes

at Appendix A - Com m and-Line I nter face Gu ide Kbytes/sec

of Fut

Chapter 10 - The ure of Backup

Appendix B - Glossar y

Appendix C - Tuning wrote Your Backup and Recov y Application successfully For er non-multiplexed backups, this entry essentially Appendix backup D -id Disaster , Recovery copy Planningcombines Kit—Fr om the Endinformation to Beginningin the previous two entries for , fragment multiplexed backups one showing the size of the Appendix E - Business I mpact Analysis Planning Kit—The Stor minto Befor e tentry he Calm

,

backup job, the data throughput rate, and the time, in the Appendix F - Per for m ance Kbytes Test Tech Note at Date on and Time fields, at which the job finished writing to Appendix G - Net Kbytes/sec Backu p Per form ance Tuning Windows I ndex

the storage device.

Listthe of Figur es requested operation Listwas of Tables successfully

TheDate and Time fields for this entry show the time at which the backup job completed. This value is later than the 'successfully wrote' entry above because it includes extra processing time at the end of the job for tasks such as NetBackup image validation.

Listcompleted of Sidebars

begin reading backup id , (restore), copy , fragment from media id on drive index

< Day Day Up >

TheDate and Time fields for this entry show the time at which the restore job started reading from the storage device. (Note that the latter part of the entry is not shown for restores from disk, as it does not apply.)

Day Day Uprestore > For a atl Kbytes/sec Ta ble o f Con t en t s

successfully non-multiplexed restores (generally speaking, only I mplem ent ing Backupread and Recover y—TheFor Readiness Guide for the Enter pr ise (restore) restores from disk are treated as non-multiplexed ( VERI TAS Ser ies) backup id restores), this entry essentially combines the information into ,

Kbytes one entry showing the size of the restore job, the data Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained at Kbytes/sec throughput rate, and the time, in the Date and Time fields, Chapter 2 - Business Requirements of Back up Systems at which the job finished reading from the storage device. Chapter 3 - An I ntr odu ction to NetBackup , copy I ntrmedia oduction

from the previous entries Pa r, t I - I nt r oductfragment ion t o Ba ck up and Recove r y in the Ent er pr itwo se Env ir onmfor e ntmultiplexed restores

Pa r t I I - Back up P roduct Tutor ia l

Additional Information Chapter 4 - Evaluating Stor age Media Requir ements Chapter 5

- Gener al Discussion on Configur ation

The NetBackup All Log Entries report will also have entries similar to those described above for other - Monitor in g the Backup Pr ocess NetBackup operations such as image duplication operations used to create additional copies of a Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options backup image. Those entries have a very similar format and may be useful for analyzing the Chapter 8 - Gener al Tr oubleshooting Tips performance of NetBackup for those operations. Chapter 6

Chapter 9

- The Expanding Back up System

Pa The r t I bptm I I - The debug Ente rlog pri se fileI mwill pa contain ct of Back the upentries Sy ste mthat s

are in the All Log Entries report, as well as

Chapter 10 detail - Theabout Fut urethe of Backup additional operation that may be useful for performance analysis. One example of this

additional is the intermediate data Ar throughput rate message for multiplexed backups, as shown Chapter 11 detail - Maj or Players in the Backup ena below: A - Com m and-Line I nter face Gu ide Appendix Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Kbytes at … intermediate after

successful, Appendix Kbytes/sec D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

This message isfor generated whenever an individual backup job completes that is part of a multiplexed Appendix F - Per m ance Test Tech Note backup group. In the debug log file for a multiplexed backup group consisting of three individual backup jobs, for example, there could be two intermediate status lines, then the final (overall) I ndex throughput rate. Appendix G - Net Backu p Per form ance Tuning on Windows List of Figur es

List ForofaTables backup operation, the bpbkar debug log file will also contain additional detail about the List of Sidebars operation that may be useful for performance analysis. One such example would be data regarding

the delay involved in initializing OTM to back up open files on the NetBackup client. Keep in mind, however, that writing the debug log files during the NetBackup operation introduces < Day Day Up > some overhead that would not normally be present in a production environment. Factor that additional overhead into any calculations done on data captures while debug log files are in use. See the NetBackup Troubleshooting Guide to learn how to set up NetBackup to write these debug log files during the NetBackup operation.

< Day Day Up >

< Day Day Up >

m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Evaluating ISystem Components Gu id e f or t h e Ent er pr ise

by DavidNetBackup's B. Little and performance, David A. Chapayou shouldISBN:0471227145 In addition to evaluating also verify that common system John Wileysupply. & Sons You © 2003 (340want pages)to use the Windows Performance Monitor utility resources are in adequate may included with Windows NT or Forthe information the Performance Monitor, This guide takWindows es r eaders2000. thr ough necessar yabout steps using of deploydocumentation. ing ser v ices by showing how to addr ess the refer to your Microsoft ar chitectur e, lim it ations, and capabilities of t he ex isting wor k infr astr ucturinformation e. The Performancenet Monitor organizes by object,counter, and instance.

Anobject is a system resource category, such as a processor or physical disk. Properties of an object

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> arecounters. Counters for the Processor object include %Processor Time, which is the default Ta ble o f Con t en t s

counter, and Interrupts/sec. Duplicate counters are handled via instances. For example, to monitor

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise the%Processor ( VERI TAS Ser ies) Time of a specific CPU on a multiple CPU system, the Processor object is selected,

then the %Processor Time counter for that object is selected, followed by the specific CPU instance for the counter. Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt I ntr oduction

Chapter 1 - Backup and Recover yMonitor, Sy st em you Requir emview ents data Ex plained When you use the Performance can in real time format or collect the data in a Chapter - Business of Back uptoSystems log for 2future analysis.Requirements Specific components evaluate include CPU load, memory use, and disk load. Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Monitoring CPU Load - Evaluating Stor age Media Requir ements

Chapter 4

Chapter 5 - Gener Discussion Configur ationto accomplish the requested tasks, monitor the % To determine if thealsystem has on enough power Chapter 6 Monitor in g the Backup Pr ocess Processor Time counter for the Processor object to determine how hard the CPU is working, and Chapter Evaluating Ot her Length Back up- Related and Options monitor7 the- Process Queue counterFeatur for theesSystem object to determine how many processes Chapter 8 Gener al Tr oubleshooting Tips are actively waiting for the processor. Chapter 9

- The Expanding Back up System

For Time, values ofBack 0 to up 80Sy percent Pa r t I% I I Processor - The Ente r pri se I m pa ct of ste m s

are generally considered safe. Values from 80

percent10to 90 percent that the system is being pushed hard, while consistent values above 90 Chapter - The Fut ureindicate of Backup percent11indicate that the CPU is a bottleneck. Chapter - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide

Spikes approaching 100 percent are normal and do not necessarily indicate a bottleneck. However, if

Appendix B loads - Glossar y sustained approaching 100 percent are observed, efforts to tune the system to decrease Appendix C Tuning Your Backup Recov er y Application process load or an upgrade to a and faster processor should be considered. Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Sustained LengthsPlanning greaterKit—The than twoStor indicate too threads are waiting to be Appendix E Processor - Business IQueue mpact Analysis m Befor e tmany he Calm executed. correctly monitor the Processor Queue Length counter, the Performance Monitor must Appendix F To - Per for m ance Test Tech Note be tracking thread-related counter. If you consistently Appendix G - aNet Backu p Per form ance Tuning on Windows see a queue length of 0, verify that a non-zero value can be displayed. I ndex List of Figur es

The default scale for the Processor Queue Length may not be equal to 1. Be sure to read the data

List of Tables correctly. For example, if the default scale is 10x, then a reading of 40 actually means that only 4 List of Sidebars processes are waiting.

Monitoring Memory Use

< Day Day Up >

Memory is a critical resource for increasing the performance of backup operations. When you examine memory usage, view information on: Committed Bytes. Committed Bytes displays the size of virtual memory that has been committed, as opposed to reserved. Committed memory must have disk storage available or must not require the disk storage because the main memory is large enough. If the number of Committed Bytes approaches or exceeds the amount of physical memory, you may encounter problems with page swapping. Page Faults/sec. Page Faults/sec is a count of the page faults in the processor. A page fault occurs when a process refers to a virtual memory page that is not in its Working Set in main memory. A high Page Fault rate may indicate insufficient memory.

Monitoring Disk Load

< Day Day Up >

To use disk performance counters to monitor the disk performance in Performance Monitor, you may need to enable those counters. may not have I m plem en t ingWindows Ba cku p an d Reco ver y:enabled Th e Reathe dindisk ess performance counters by default for your system. Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa

ISBN:0471227145

For more information about disk performance counters, from a command prompt, type: John Wiley & Sons © 2003 (340 pages) This guide tak es r eaders thr ough the necessar y steps of

diskperf -help deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting wor k infrand astr uctur e. disk monitoring: To enable thesenet counters allow

1. From a command prompt, type: < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f diskperf Con t en t s -y I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI2.TAS Ser ies)the system. Reboot I ntr oduction

To these monitoring: Pa r t Idisable - I nt r oduct ion counters t o Ba ck up and and cancel Recove rdisk y in the Ent er pr i se Env ir onm e nt Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained 1. From a command prompt, type: Chapter 2 - Business Requirements of Back up Systems Chapter diskperf 3 - An I ntr-n odu ction to NetBackup Pa r t I I - Back up P roduct Tutor ia l

Chapter 2. Reboot 4 - Evaluating the system. Stor age Media Requir ements Chapter 5

- Gener al Discussion on Configur ation

When you monitor disk performance, use the %Disk Time counter for the PhysicalDisk object to - Monitor in g the Backup Pr ocess track the percentage of elapsed time that the selected disk drive is busy servicing read or write Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options requests. Chapter 6 Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9 - The up System Also monitor the Expanding Avg. Disk Back Queue Length counter and watch for values greater than 1 that last for Pa r t I I Ithan - Theone Ente r pri se I m pa ct ofgreater Back upthan Sy ste s more second. Values 1m for

more than a second indicate that multiple processes

Chapter 10 -for The ure to of service Backup their requests. are waiting theFut disk Chapter 11 - Maj or Players in the Backup Ar ena

Several Atechniques may be Iused to increase Appendix - Com m and-Line nter face Gu ide disk performance, including: Appendix B - Glossar y

Check fragmentation of theerdata . A highly fragmented disk limits throughput levels. Appendix C - the Tuning Your Backuplevel and Recov y Application Use a disk maintenance utility to defragment the disk.

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix Consider F - Per adding for m ance additional Test Techdisks Note to the system to increase performance . If multiple

processes attempting log Tuning data simultaneously, dividing the data among multiple physical Appendix G - Netare Backu p Per formto ance on Windows I ndex disks may help. List of Figur es List ofDetermine Tables if the data transfer involves a compressed disk . The use of Windows NT List ofcompression Sidebars to automatically compress the data on the drive adds additional overhead to disk

read or write operations, adversely affecting the performance of NetBackup. Only use Windows NT compression if it is needed to avoid a disk full condition. < Day Day Up >

Consider converting to a system based on a Redundant Array of Inexpensive Disks (RAID) . Though more expensive, RAID devices generally offer greater throughput, and, (depending on the RAID level employed), improved reliability. Determine what type of controller technology is being used to drive the disk . Consider if a different system would yield better results. The following table shows some typical throughput rates for common controllers:

CONTROLLER TECHNOLOGY

Day Day Up >RATE MAX< TRANSFER

# DEVICES

BIOS Hard disk (MFM, RLL, ESDI)

8MB/s

2

IDE

I m plem en t ing Ba cku p5MB/s an d Reco ver y: Th e Rea din2ess Gu id e f or t h e Ent er pr ise

SCSI

5MB/s

SCSI-2 Fast SCSI-2 Wide SCSI-2 F/W

by David B. Little and David A. Chapa John Wiley & Sons © 200310MB/s (340 pages)

7

ISBN:0471227145

7

This guide tak es r eaders thr ough the necessar y steps of 20MB/show to addr ess the 7 deploy ing ser v ices by showing ar chitectur e, lim it ations, and capabilities of t he ex isting 7 net wor k infr astr uctur e. 40MB/s

Ultra SCSI

80MB/s

15

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness for>the Enter pr ise < Day Guide Day Up ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

m plem en tPerformance ing Ba cku p an d Reco ver y: Th e Rea din ess NetBackupI Client Gu id e f or t h e Ent er pr ise

ISBN:0471227145 David B. Little and Davidwhen A. Chapa This section lists by some factors to consider you evaluate the NetBackup client component of the John Wiley & Sons © 2003these (340 pages) NetBackup data transfer path. Examine conditions to identify possible changes that may improve the overall performance of tak NetBackup. This guide es r eaders thr ough the necessar y steps of

deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting Disk Fragmentation. net wor k infr Fragmentation astr uctur e. is a condition where data is scattered around the disk in non-

contiguous blocks. This condition severely impacts the data transfer rate from the disk. Fragmentation can be repaired using hard disk management utility software offered by a variety of < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> vendors. Ta ble o f Con t en t s

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) Virus Scanning. If virus scanning is turned on for the system, it may severely impact the I ntr oduction performance of the NetBackup client during a backup or restore operation. This may be especially Pa r t I true - I ntfor r oduct ion t o such Ba ck up r y servers. in the Ent er prmay i se Env ir onm e nt systems as and largeRecove NT file You wish to disable

virus scanning during

Chapter 1 - or Backup and Recover y to Sy avoid st em Requir em ents plained backup restore operations the impact onExperformance. Chapter 2 - Business Requirements of Back up Systems Chapter 3

- An I ntr odu ction to NetBackup NetBackup Notify Scripts. The bpstart_notify.bat and bpend_notify.bat scripts are very useful in certain situations, such as shutting down a running application to back up its data. Chapter 4 - Evaluating Stor age Media Requir ements However, these scripts must be written with care to avoid any unnecessary lengthy delays at the Chapter 5 Gener Discussion on Configur ation are not performing tasks essential to the backup start or- end of al the backup job. If the scripts Chapter 6 Monitor in g the Backup Pr ocess operation, you may want to remove them. Pa r t I I - Back up P roduct Tutor ia l

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

NetBackup Software Location . If the data being backed up is located on the same physical disk - The Expanding Back up System drive as the NetBackup installation, performance may be adversely affected, especially if Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s NetBackup debug log files are being used. If they are being used, the extent of the degradation Chapter 10 - The Fut ure of Backup will be greatly influenced by the NetBackup verbose setting for the debug logs. If possible, install Chapter 11 - Maj or Players in the Backup Ar ena NetBackup on a separate physical disk drive to avoid this disk drive contention. Chapter 9

Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y

Open (OTM) . When OTM is enabled, there is a delay at the start of the Appendix C Transaction - Tuning YourManager Backup and Recov er y Application

backup information gathered about being snapped and while the OTM driver Appendix D - while Disaster Recovery isPlanning Kit—Fr omthe Endvolumes to Beginning

is waiting for the disk activity to quiesce. In some cases, there will be an additional delay while OTM creates the snapshot cache file. NetBackup transfer rates are affected by this delay because Appendix F - Per for m ance Test Tech Note NetBackup treats the start of the data transfer as the time that the backup process is started on Appendix G - Net Backu p Per form ance Tuning on Windows the client. You may wish to disable OTM to eliminate this delay unless it is needed to back up open I ndex files. Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

List of Figur es List of Tables

Tracker . If the NetBackup Client Job Tracker is running on the client, then NetBackup will List ofJob Sidebars

gather an estimate of the data to be backed up prior to the start of a backup job. Gathering this estimate will affect the startup time, and therefore the data throughput rate, because no data is being written to the NetBackup server during this estimation phase. You may wish to avoid running < Day Day Up > the NetBackup Client Job Tracker to avoid this delay.

Client Location. You may wish to consider adding a locally attached tape device to the client and changing the client to a NetBackup media server if you have a substantial amount of data on the client. For example, backing up 100 GBs of data to a locally attached tape drive will generally be more efficient than backing up the same amount of data across a network connection to a NetBackup server. Of course, there are many variables to consider, such as the bandwidth available on the network, that will affect the decision to back up the data to a locally attached tape drive as opposed to moving the data across the network. Determining the Theoretical Performance of the NetBackup Client Software . There is a useful feature in the NetBackup client software utility bpbkar32 that may be used to determine

the speed at which the NetBackup client< can read the data to be backed up from the disk drive. Day Day Up > This feature can be used to eliminate as a possible performance bottleneck the speed at which the data can be read when you are attempting to improve a poorly performing NetBackup installation. Use the following syntax for this utility: I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

bpbkar32 -nocont > NUL 2 > NUL by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

In the above syntax, would be replaced with the path to the data to be read from the disk, ThisUsing guidethis tak syntax es r eaders thr oughan the necessar y steps of for the other components of the C:\ for example. simulates infinitely fast speed deploy ing ser v ices by showing how to addr ess the NetBackup data transfer path, such as the network. ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

You can view the performance statistics of the operation in the bpbkar debug log file, or use a stopwatch to time the operation and then manually calculate the performance statistics. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness for>the Enter pr ise < Day Guide Day Up ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

m plem en t ingPerformance Ba cku p an d Reco ver y: Th e Rea din ess NetBackupI Network Gu id e f or t h e Ent er pr ise

ISBN:0471227145 David B. Little and Davidwhen A. Chapa This section lists by some factors to consider you evaluate the network component of the John Wiley & Sons © 2003possible (340 pages)changes that may improve the overall performance NetBackup data transfer path to identify of NetBackup. This guide tak es r eaders thr ough the necessar y steps of

deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting Network Load. There are two key considerations to monitor when you evaluate remote backup net wor k infr astr uctur e.

performance:

The" 1.0" amount of network < ?xm l version= encoding= " I SO-traffic 8859- 1" ?> Ta ble o f Con t en t s

The amount of time that network traffic is high

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

Small bursts of high network traffic for short durations will have some negative impact on the data throughput rate. However, if the network traffic remains consistently high for a significant amount Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt of time during the operation, the network component of the NetBackup data transfer path will very Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained likely be the bottleneck. Always try to schedule backups during times when network traffic is low. If Chapter 2 - Business Requirements Back upwish Systems your network is heavily loaded, of you may to implement a secondary network which can be Chapter 3 - AntoI ntr odu ction NetBackup dedicated backup andtorestore traffic. I ntr oduction

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

NetBackup Media Server Network Buffer Size . The NetBackup media server has a tunable - Gener al Discussion on Configur ation parameter that you can use to adjust the size of the Winsock2 network communications buffer Chapter 6 - Monitor in g the Backup Pr ocess used to receive data from the network (a backup) or write data to the network (a restore). This Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options parameter specifies the value that is used to call the setsockopt() Winsock2 API to set the network Chapter 8 - Gener al Tr oubleshooting Tips buffer size for backups (SO_RCVBUF) and restores (SO_SNDBUF). Chapter 5

Chapter 9

- The Expanding Back up System

Pa r t I The I I - The Entevalue r pri se for I m this pa ct parameter of Back up Sy ms default in ste release

3.4.1 and earlier is 32032 bytes. In release 4.5, the

Chapter 10 - value The Fut Backup default forure thisofparameter is derived from the NetBackup data buffer size (see below for more about buffer size) using the following formula: Chapter 11 information - Maj or Players in the data Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide

For backup jobs: ( * 4) + 1024

Appendix B - Glossar y

Appendix - Tuning Backup and Recov *er2) y Application For C restore jobs:Your ( + 1024 Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Because the default value for thePlanning NetBackup data Stor buffer size is bytes, this formula results Appendix E - Business I mpact Analysis Kit—The m Befor e t65536 he Calm in a Fdefault value of 263168 bytes Appendix - Per for m ance Test Tech Notefor backups and 132096 bytes for restores. Appendix G - Net Backu p Per form ance Tuning on Windows I ndex

To set this parameter, create the following files:

List of Figur\NetBackup\NET_BUFFER_SZ es List of Tables

\NetBackup\NET_BUFFER_SZ_REST

List of Sidebars

(new in 4.5, not used in earlier releases) These files contain a single integer specifying the network buffer size in bytes. For example, to use < Day Day Up > a network buffer size of 64 KB, the file would contain 65536. If the files contain the integer 0 (zero), the setsockopt() Winsock2 API call will be skipped and the system default value for the network buffer size will be used. If the NET_BUFFER_SZ file exists, its contents will be used to specify the network buffer size for both backup and restores. If the NET_BUFFER_SZ_REST file exists (only in 4.5), its contents will be used to specify the network buffer size for restores. If both files exist, the NET_BUFFER_SZ file will be used to specify the network buffer size for backups, and the NET_BUFFER_SZ_REST file will be used to specify the network buffer size for restores.

Because local backup or restore jobs on the media server do not send data over the network, this < Day Day Up > parameter has no effect on those operations. It is used only by the NetBackup media server processes which read from or write to the network, specifically, the bptm or bpdm processes. It is not used by any other NetBackup for Windows processes on a master server, media server, or I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess client. Gu id e f or t h e Ent er pr ise ISBN:0471227145 This parameter by David is the B. counterpart Little and David on theA.media Chapaserver to the Communications Buffer Size parameter onJohn the Wiley client,&which is2003 described below. The network buffer sizes are not required to be Sons © (340 pages) the same on This all ofguide yourtak NetBackup to function properly, however, setting es r eaderssystems thr ough for the NetBackup necessar y steps of serparameter v ices by showing to server addr essand the the Communications Buffer Size the Network deploy Buffering Size on the how media chitectur lim itbelow) ations, to andthe capabilities of t has he exachieved isting parameter onarthe cliente,(see same value the best performance in net wor k infr astr uctur e. some NetBackup installations.

< ?xm l Ta ble

Similarly," 1.0" the network buffer does version= encoding= " I SO-size 88591" ?>not have a direct relationship with the NetBackup data buffer size (see below). They are separately tunable parameters. However, as you can see by the o f Con t en t s

default forand network buffer size in release 4.5, for setting the network buffer to a substantially I mplem ent ing value Backup Recover y—The Readiness Guide the Enter pr ise larger ( VERI TAS Servalue ies) than the data buffer has achieved the best performance in many NetBackup installations. I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Tuning this parameter along with the Communications Buffer Size parameter on the client has - Backup and Recover y Sy st em Requir em ents Ex plained resulted in significant improvements in the throughput of the network component of the NetBackup Chapter 2 - Business Requirements of Back up Systems data transfer path in some NetBackup installations. Chapter 1 Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

NetBackup Client Stor Communications Chapter 4 - Evaluating age Media RequirBuffer ementsSize. The NetBackup client has a tunable parameter that can use to adjust the of the Winsock2 network communications buffer used to write Chapter 5 you - Gener al Discussion on size Configur ation data network for Backup backups. This parameter specifies the value that is used to call the Chapter 6 to- the Monitor in g the Pr ocess setsockopt() Winsock2 API to set the network buffer size for backups (SO_SNDBUF). - Evaluating Ot her Back up- Related Featur es and Options

Chapter 7

Chapter 8 parameter - Gener al is Trthe oubleshooting This counterpartTips on the client to the Network Buffer Size parameter on the media Chapter 9 The Expanding Back System server, described above. Asup mentioned, the network buffer sizes are not required to be the same Pa r t I on I I -all The se I m pa ct systems of Back up ste m s ofEnte yourr pri NetBackup forSyNetBackup

to function properly. However, setting the

Chapter 10 - The Fut Size ure ofparameter Backup Network Buffer on the media server (see above) and the Communications Buffer Chapter 11 parameter - Maj or Players the Backup Ar ena value achieves the best performance in some Size on theinclient to the same Appendix A - Cominstallations. m and-Line I nter face Gu ide NetBackup Appendix B - Glossar y

To set the Buffer Size er parameter: Appendix C -Communications Tuning Your Backup and Recov y Application 1. From Properties the NetBackup Console in release 4.5, or from the Appendix D - Host Disaster Recovery inPlanning Kit—Fr omAdministration End to Beginning NetBackup GUI in earlier releases, open Client Properties dialog for the client AppendixConfigure E - Business I mpact Analysis Planning Kit—The Storthe m Befor e t he Calm them parameter is toNote be changed. Appendixon F which - Per for ance Test Tech Appendix G - Net Backu p Per form ance Tuning on Windows

2. From the Windows Client tab, set the Communications buffer size: field.

I ndex

List of parameter Figur es This is specified in number of kilobytes. The default value is 32. An extra kilobyte is added List of Tables internally for backup operations (SO_SNDBUF). Therefore, the default network buffer size for backups List is 33792 of Sidebars bytes. In some NetBackup installations, this default value is too small. Increasing the value to

128 improves performance in these installations. Another way to set this parameter is to configure the Buffer_Size parameter in the registry. < Day Day Up >

Locate the following key under HKEY_LOCAL_MACHINE Software/VERITAS/NetBackup/CurrentVersion/Config Add or modify the Buffer_Size value, which is a REG_DWORD value. Set it to 0x20. Because local backup jobs on the media server do not send data over the network, this parameter has no effect on these local operations. This parameter is used by only the NetBackup client processes which write to the network, specifically, the bpbkar32 process. It is not used by any other NetBackup for Windows processes on a master server, media server, or client.

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess NetBackupI Server Performance Gu id e f or t h e Ent er pr ise

ISBN:0471227145 David B. Little and Davidwhen A. Chapa This section lists by some factors to consider you evaluate the NetBackup server component of the John Wiley & Sons © 2003possible (340 pages)changes that may improve the overall performance NetBackup data transfer path to identify of NetBackup. This guide tak es r eaders thr ough the necessar y steps of

deploy ing ser v ices by showing how to addr ess the chitectur e, lim it ations, and capabilities of t he ex isting Number andarSize of Shared Data Buffers. By default, NetBackup uses eight shared data buffers net wor k infr astr uctur e.

for a multiplexed backup, 16 shared data buffers for a non-multiplexed backup, 12 shared data buffers for a multiplexed restore, and 16 shared data buffers for a non-multiplexed restore. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> these TaTo blechange o f Con t en t s settings, create the following file(s): I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction \NetBackup\db\config\NUMBER_DATA_BUFFERS Pa r t I - \NetBackup\db\config\NUMBER_DATA_BUFFERS_RESTORE I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained files contain a single integer the number of shared data buffers NetBackup will ChapterThese 2 - Business Requirements of Backspecifying up Systems Chapteruse. 3 - An I ntr odu ction to NetBackup Pa r t I I - Back up P roduct Tutor ia l

If the NUMBER_DATA_BUFFERS file exists, its contents will be used to determine the number - Evaluating Stor age Media Requir ements of shared data buffers to be used for multiplexed and non-multiplexed backups.

Chapter 4 Chapter 5

- Gener al Discussion on Configur ation

ChapterIf6the- NUMBER_DATA_BUFFERS_RESTORE Monitor in g the Backup Pr ocess file exists, its contents will be used to determine Chapterthe 7 number - Evaluating Ot herdata Backbuffers up- Related Featur and Options restores. of shared to be usedesfor multiplexed Chapter 8

- Gener al Tr oubleshooting Tips NetBackupBack uses KB (65536 bytes) as the size of each shared data buffer. A single ChapterBy 9 default, - The Expanding up 64 System

tape I/O operation is performed for each shared data buffer. Therefore, this size must not exceed the maximum block size for the tape device or operating system. For Windows systems, Chapter 10 - The Fut ure of Backup the maximum block size is generally 64 KB, although in some cases customers are using a Chapter 11 - Maj or Players in the Backup Ar ena larger value successfully. Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Appendix A - Com m and-Line I nter face Gu ide

Appendix B this - Glossar y the terms ‘tape block size' and ‘shared data buffer size' are synonymous in this For reason, Appendix C - Tuning Your Backup and Recov er y Application context. Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

The server will query the tape Stor device for its Appendix E NetBackup - Business I media mpact Analysis Planning Kit—The m Befor e tmaximum he Calm block size, and cause theF backup to Tech fail if Note the shared data buffer size exceeds the value that is returned. Appendix - Per foroperation m ance Test Appendix G - Net Backu p Per form ance Tuning on Windows

Note: NOTE Some tape devices may not reliably return this information. Therefore, it is critical to List of Figur es perform both backup and restore testing if the shared data buffer size value is List of Tables changed. If all NetBackup media servers are not running in the same operating system List of Sidebars environment, it is critical to test restores on each of the NetBackup media servers that may be involved in a restore operation. For example, if a UNIX NetBackup media server is used to write a backup to tape with a shared data buffer (block size) of 256 KB, then it is possible that a Windows NetBackup < Day Day media Up > server will not be able to read that tape. In general, we strongly recommend you test restore as well as backup operations. I ndex

To change the size of the shared data buffers, create the following file:

\NetBackup\db\config\SIZE_DATA_BUFFERS This file contains a single integer specifying the size of each shared data buffer in bytes. For example, to use a shared data buffer size of 32 KB, the file would contain the integer 32768. Note that the size of the shared data buffers used for a restore operation is determined by the size of the shared data buffers in use at the time the backup was written. This file is not used by restores.

In general, the number and size of the< shared data buffers can be used to calculate the amount Day Day Up > of shared memory required by NetBackup using this formula: (number_data_buffers * size_data_buffers) * number_tape_drives * max_multiplexing_setting I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess

For example, assume theernumber Gu id e f or t hthat e Ent pr ise of shared data buffers is 16, the size of the shared data buffers is 64 there are two drives, and the maximum multiplexing setting is four. ISBN:0471227145 byKB, David B. Little andtape David A. Chapa Following the formula of shared memory required by NetBackup is: John Wiley &above, Sons ©the 2003amount (340 pages) This guide tak es r eaders thr ough the necessar y steps of v ices showing (65536 *deploy 16) ing * ser 2 * 4 by = 8 MB how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting k infr astr uctur See below net for wor information aboute.how to determine if you should change these settings. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Parent/Child Delay Values. Although rarely changed, it is possible to modify the parent and child Ta ble o f Con t en t s

delay values for a process.

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) To change these values, create the following files: I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained \NetBackup\db\config\PARENT_DELAY - Business Requirements of Back up Systems \NetBackup\db\config\CHILD_DELAY

Chapter 2 Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I -These Back up P roduct Tutor ia l files contain a single

integer specifying the value in milliseconds to be used for the delay

Chaptercorresponding 4 - Evaluating age Media Requir to Stor the name of the file.ements For example, to use a parent delay of 50 milliseconds, the file would contain the ChapterPARENT_DELAY 5 - Gener al Discussion on Configur ationinteger 50. Chapter 6

- Monitor in g the Backup Pr ocess

See below for more information about how to determine if you should change these values. - Evaluating Ot her Back up- Related Featur es and Options

Chapter 7 Chapter 8

- Gener al Tr oubleshooting Tips The following section refers to the bptm process on the media server during back up and restore The Expanding Back up System operations -from a tape storage device. If you are backing up to or restoring from a disk storage device, Pa r t I I I - The Entefor r pri se I mthroughout pa ct of Backthe up section. Sy ste m s For example, to activate debug logging for a disk substitute bpdm bptm Chapter 10 The Fut ure of Backup storage device, the following directory must be created: Chapter 9

Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide

\NetBackup\logs\bpdm

Appendix B - Glossar y

Appendix C - Tuning Your Backup and Recov er y Application

Using NetBackup Wait and Delay Counters

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

During a backup or restore operation the NetBackup media server uses a set of shared data buffers to isolate the process of communicating with the tape from the process of interacting with the disk or Appendix G - Net Backu p Per form ance Tuning on Windows network. Through the use of Wait and Delay counters, you can determine which process on the I ndex NetBackup media server, the data producer or the data consumer, has to wait more often. Appendix F - Per for m ance Test Tech Note

List of Figur es List Achieving of Tablesa good balance between the data producer and the data consumer processes on the

NetBackup media server is an important factor in achieving optimal performance from the NetBackup List of Sidebars server component of the NetBackup data transfer path.

Understanding the Two-Part Communication Process < Day Day Up > The two-part communication process differs depending on whether the operation is a backup or restore and whether the operation involves a local client or a remote client. Local Clients When the NetBackup media server and the NetBackup client are part of the same system, the NetBackup client is referred to as a local client. Backup of Local Client. For a local client, the bpbkar32 process reads data from the disk during a backup and places it in the shared buffers. The bptm process reads the data from the shared buffer and writes it to tape.

Restore of Local Client. During a restore of a local client, the bptm process reads data from the < Day Day Up > tape and places it in the shared buffers. The tar32 process reads the data from the shared buffers and writes it to disk. Remote Clients I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

When the NetBackup media server and the A. NetBackup client are part of two different systems, the ISBN:0471227145 by David B. Little and David Chapa NetBackup clientJohn is referred as a©remote Wiley &toSons 2003 (340client. pages) This guide tak es r eaders thr ough the necessar y steps of

The process Backup of Remote Client. deploy ing ser v ices bybpbkar32 showing how to addron essthe theremote client reads data from the disk and writes it to the network. a child ar chitectur e, lim Then it ations, and capabilities bptm process of t he onexthe isting media server receives data from net wor k infritastr e. the network and places in uctur the shared buffers. The parent bptm process on the media server reads the data from the shared buffers and writes it to tape. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t enof t sRemote Client. During the restore of the remote client, the parent bptm process Restore I mplem ent ing Backup y—The Readiness Guide for buffers. the EnterThe pr isechild bptm process reads the reads data fromand the Recover tape and places it into the shared ( VERI TAS Ser ies)

data from the shared buffers and writes it to the network. The tar32 process on the remote client receives the data from the network and writes it to disk.

I ntr oduction

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1 Processes - Backup and Recover y Sy st and em Requir em ents Ex plained Roles of during Backup Restore Operations Chapter 2 - Business Requirements of Back up Systems

When a3 process attempts to to use a shared data buffer, it first verifies that the next buffer in order is in a Chapter - An I ntr odu ction NetBackup

correct state. A data producer needs an empty buffer, while a data consumer needs a full buffer. The following chart provides a mapping of processes and their roles during backup and restore operations: - Evaluating Stor age Media Requir ements

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4 Chapter 5

- Gener al Discussion on Configur ation

OPERATION DATA PRODUCER Chapter 6 - Monitor in g the Backup Pr ocess

DATA CONSUMER

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

bptm

Local Backup

bpbkar32

Remote bptm (child) Chapter 9 Backup - The Expanding Back up System

bptm (parent)

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Local Restore

bptm

tar32

Chapter 10 - The Fut ure of Backup

Remote bptmin(parent) Chapter 11 Restore - Maj or Players the Backup Ar enabptm (child) Appendix A - Com m and-Line I nter face Gu ide

If a full buffer is needed by the data consumer but is not available, the data consumer increments the Appendix B - Glossar y

Wait andCDelay counters to indicate it had to wait for a full buffer. After a delay, the data consumer Appendix - Tuning Your Backup and that Recov er y Application will check again for a full buffer. If a full buffer is still not available, the data consumer increments the Delay counter to indicate that it had to delay again while waiting for a full buffer. The data consumer Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm will repeat the delay and full buffer check steps until a full buffer is available. Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix F - Per for m ance Test Tech Note

Appendix G - NetisBacku p Per formin ance on algorithm: Windows This sequence summarized theTuning following I ndex List of Figur es while (Buffer_Is_Not_Full) { List of Tables ++Wait_Counter; List ofwhile Sidebars(Buffer_Is_Not_Full) {

++Delay_Counter; delay (DELAY_DURATION); }

< Day Day Up >

} If an empty buffer is needed by the data producer but is not available, the data producer increments the Wait and Delay counter to indicate that it had to wait for an empty buffer. After a delay, the data producer will check again for an empty buffer. If an empty buffer is still not available, the data producer increments the Delay counter to indicate that it had to delay again while waiting for an empty buffer. The data producer will relate the delay and empty buffer check steps until an empty buffer is available. The algorithm for a data producer has a similar structure: while (Buffer_Is_Not_Empty) { ++Wait_Counter; while (Buffer_Is_Not_Empty) {

++Delay_Counter; delay (DELAY_DURATION); } }

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e counter Ent er pr ise Analysis of the Wait and Delay values indicates which process, producer or consumer, has ISBN:0471227145 David Little David A. Chapa had to wait most by often andB.for howand long. John Wiley & Sons © 2003 (340 pages)

There are four basic Wait and Delay Counter relationships: This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, Consumer lim it ations, .and of t hehas ex isting Data Producer >> Data Thecapabilities data producer substantially larger Wait and Delay netthan wor k the infr data astr uctur e. counter values consumer.

The data consumer is unable to receive data fast enough to keep the data producer busy.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Investigate means to improve the performance of the data consumer. For a back up operation, Ta ble o f Con t en t s

check if the data buffer size is appropriate for the tape drive being used (see below).

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

If data consumer still has a substantially large value in this case, try increasing the number of shared data buffers to improve performance (see below).

I ntr oduction

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained Data Data Consumer. The producer and the data consumer have very similar Chapter 2 Producer - Business= Requirements of Back up data Systems

Wait Delay counter values, but those values are relatively large. Chapter 3 and - An I ntr odu ction to NetBackup Pa r t I I - Back up P roduct Tutor ia l

This may indicate that the data producer and data consumer are regularly attempting to use the - Evaluating Stor age Media Requir ements same shared data buffer. Try increasing the number of shared data buffers to improve Chapter 5 - Gener(see al Discussion performance below). on Configur ation Chapter 4 Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Data Producer = Data Consumer. The data producer and the data consumer have very similar - Gener al Tr oubleshooting Tips Wait and Delay counter values, but those values are relatively small.

Chapter 8 Chapter 9

- The Expanding Back up System

Pa r t I This I I - The Ente r pri se Ithere m pa ctis of Back up Sy ste mbetween s indicates that a good balance the

data producer and data consumer, which

Chapter 10 - yield The good Fut ureperformance of Backup should from the NetBackup server component of the NetBackup data Chapter 11 Maj or Players in the Backup Ar ena transfer path. Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y

Data Producer the cause of a bottleneck within the NetBackup data transfer path.

Determining Wait and Delay Counter Values Wait and Delay counter values can be found by creating and reading debug log files on the NetBackup media server. Note: NOTE Writing the debug log files introduces some additional overhead and will have a small impact on the overall performance of NetBackup. This impact will be more noticeable for a high verbose level setting. Normally, you should not need to run with debug logging enabled on a production system. To determine Wait and Delay counter values for a local client backup:

1. Activate debug logging by creating these two directories on the media server: < Day Day Up > \NetBackup\Logs\bpbkar \NetBackup\Logs\bptm I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

2. Execute your backup.

ISBN:0471227145 by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages) 3. Look at the log for the data producer (bpbkar32) process in: This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the \NetBackup\Logs\bpbkar ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

The line you are looking for should be similar to the following, and will have a timestamp corresponding to the completion time of the backup:

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s

… waited 224 times for empty buffer, delayed 254 times

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

In this example the Wait counter value is 224 and the Delay counter value is 254.

I ntr oduction

Pa r t 4. I - I Look nt r oduct ion log t o Ba up and r y in (bptm) the Ent er pr i se Env at the forckthe dataRecove consumer process in:ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

\NetBackup\Logs\bptm

Pa r t I I The - Back up you P roduct Tutor ia lfor line are looking

should be similar to the following, and will have a timestamp

Chaptercorresponding 4 - Evaluating Storcompletion age Media Requir to the time ements of the backup: Chapter 5

- Gener al Discussion on Configur ation

Chapter… 6 waited - Monitorfor in g the Backup Pr ocess1 times, delayed 22 times full buffer Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options ChapterIn8 this - example, Gener al Trthe oubleshooting Wait counter Tips value is 1 and the Delay counter value is 22. Chapter 9

- The Expanding Back up System

To determine Wait and Delay counter values for a remote client backup:

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

1. Activate by creating this directory on the media server Chapter 10 - Thedebug Fut urelogging of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix\NetBackup\Logs\bptm A - Com m and-Line I nter face Gu ide Appendix B - Glossar y

2. Execute yourYour backup. Appendix C - Tuning Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

3. Look at the log for the bptm process in:

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note

\NetBackup\Logs\bptm

Appendix G - Net Backu p Per form ance Tuning on Windows I ndex Delays associated with the data producer (bptm child) process will appear as follows: List of Figur es List of Tables

… waited for empty buffer 22 times, delayed 151 times, …

List of Sidebars

In this example, the Wait counter value is 22 and the Delay counter value is 151. parent) process will appear as: Delays associated with the data consumer < Day(bptm Day Up > … waited for full buffer 12 times, delayed 69 times In this example the Wait counter value is 12, and the Delay counter value is 69. To determine Wait and Delay counter values for a local client restore: 1. Activate logging by creating the following two directories on the NetBackup media server: \NetBackup\Logs\bptm and \NetBackup\Logs\tar

2. Execute your restore.

< Day Day Up >

3. Look at the log for the data consumer (tar32) process in: I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise \NetBackup\Logs\tar by David B. Little and David A. Chapa

ISBN:0471227145

The line you areWiley looking for should be similar John & Sons © 2003 (340 pages) to the following, and will have a timestamp corresponding the completion time of thethe restore: This to guide tak es r eaders thr ough necessar y steps of deploy ing ser v ices by showing how to addr ess the e, limbuffer it ations, and of t he ex isting … waitedar chitectur for full 27 capabilities times, delayed 79 times net wor k infr astr uctur e.

In this example, the Wait counter value is 27, and the Delay counter value is 79. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> 4. Look at the log for the data producer (bptm) process in: Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) \NetBackup\Logs\bptm I ntr oduction

line you looking for Recove shouldr be following, Pa r t I - The I nt r oduct ion are t o Ba ck up and y insimilar the Entto erthe pr i se Env ir onmand e nt

will have a timestamp

to the completion time of the Chaptercorresponding 1 - Backup and Recover y Sy st em Requir emrestore: ents Ex plained Chapter 2

- Business Requirements of Back up Systems empty buffer 1 times, delayed 68 times Chapter… 3 waited - An I ntrfor odu ction to NetBackup Pa r t I I - Back up P roduct Tutor ia l

In this- example, the Wait counter value is 1 and the delay counter value is 68. Evaluating Stor age Media Requir ements

Chapter 4

Chapter 5 - Gener Discussion Configur ation for a remote client restore: To determine Waital and Delay on counter values Chapter 6 - Monitor in g the Backup Pr ocess

1. Activate debug logging by creating the following directory on the media server:

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips Chapter \NetBackup\Logs\bptm 9 - The Expanding Back up System Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

2. Execute your restore.

Chapter 10 - The Fut ure of Backup Chapter 11 - at Majthe or log Players in thein: Backup Ar ena 3. Look for bptm Appendix A - Com m and-Line I nter face Gu ide Appendix\NetBackup\Logs\bptm B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application

4. Delays associated with the data consumer (bptm child) process will appear as follows: Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix… F waited - Per for m for ance Test Tech Note 36 times, delayed 139 times full buffer Appendix G - Net Backu p Per form ance Tuning on Windows I ndex In this example, the Wait counter value is 36 and the Delay counter value is 139. List of Figur es

Delays associated with the data producer (bptm parent) process will appear as follows:

List of Tables

List of Sidebars

… waited for emtpy buffer 95 times, delayed 513 times In this example the Wait counter value is 95 and the Delay counter value is 513. < Day Day Up >

Note: NOTE When you run multiple tests, you can rename the current log file. NetBackup will automatically create a new log file, which prevents you from erroneously reading the wrong set of values. Deleting the debug log file will not stop NetBackup from generating the debug logs. You must delete the entire directory. For example, to stop bptm logging, you must delete the bptm subdirectory. NetBackup will automatically generate debug logs at the specified verbose setting whenever the directory is detected.

Using Wait and Delay Counter Values to Analyze Problems

You can use the bptm debug log file to verify that the following tunable parameters have successfully < Day Day Up > been set to the desired values. You can use these parameters and the Wait and Delay counter values to analyze problems. These additional values include: I m plem t ingofBa cku pshared an d Reco y: Thcan e Rea ess on a line similar to: Data buffer size. Theensize each dataver buffer bedin found Gu id e f or t h e Ent er pr ise

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

… io_init: using 65536 data buffer size

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v The ices by showing how to addr the may be found on a line similar to: Number of data buffers. number of shared dataess buffers ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

… io_init: using 16 data buffers < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Parent/child Ta ble o f Con t en t s delay values . The values in use for the duration of the parent and child delays can

beent found on a line to:y—The Readiness Guide for the Enter pr ise I mplem ing Backup andsimilar Recover ( VERI TAS Ser ies) I ntr oduction … io_init: child delay = 20, parent delay = 30 (milliseconds) Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained NetBackup Media Server Network Buffer Size. The values in use for the Network Buffer Size Chapter 2 - Business Requirements of Back up Systems

parameter on the media server can be found on lines similar to these (may only be part of 4.5 - An I ntr odu ction to NetBackup debug log files):

Chapter 3

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4 receive - Evaluating Stor age Media Requir ements The network buffer is used by the bptm child process to read from the network during a Chapter 5 Gener al Discussion on Configur ation remote backup. Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options …setting receive network buffer to 263168 bytes

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter - The Expanding up System The9send network bufferBack is used by the bptm child process to write to the network during a remote Pa r t restore. I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena …setting send network buffer to 131072 bytes Appendix A - Com m and-Line I nter face Gu ide

See the Appendix B - section Glossaron y NetBackup Network Performance for more information about the Network Buffer parameter on the and media server. Appendix C Size - Tuning Your Backup Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Suppose you wanted to analyze a local backup in which there was a 30-minute data transfer duration baselined at 5 MB/sec with a total data transfer of 9,000 MB. Because a local backup is involved, if you Appendix F - Per for m ance Test Tech Note refer to the table under 'Roles of Processes during Backup and Restore Operations,' you can Appendix G that - Netbpbkar32 Backu p Per form on Windows determine is theance dataTuning producer and bptm is the data consumer. Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

I ndex

You List of would Figur esnext want to determine the Wait and Delay values for bpbkar32 and bptm by following the procedures List of Tables described in the section 'Determining Wait and Delay Counter Values.' For this example, suppose those values were: List of Sidebars PROCESS

WAIT

DELAY

bpbkar32

29364

58033

bptm

95

105

< Day Day Up >

Using these values, you can determine that the bpbkar32 process is being forced to wait by a bptm process which cannot move data out of the shared buffer fast enough. Next, you can determine time lost due to delays by multiplying the Delay counter value by the parent or child delay value, whichever applies. In this example, the bpbkar32 process uses the child delay value, while the bptm process uses the parent delay value. (The defaults for these values are 20 for child delay and 30 for parent delay.) The values are specified in milliseconds. See 'Parent/Child Delay Values' under the 'NetBackup Server Performance' section for more information on how to modify these values.

Use the following equations to determine the amount of time lost due to these delays: < Day Day Up > bpbkar32

= 58033 delays X 0.020 seconds = 1160 I m plem seconds en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

= 19 seconds by minutes David B. 20 Little and David A. Chapa

ISBN:0471227145

JohnXWiley Sons © 2003 (340 pages) bptm = 105 0.030& seconds This guide tak es r eaders thr ough the necessar y steps of = 3deploy seconds ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr that astr uctur e. This is useful in determining the delay duration for the bpbkar32 process is significant. If this

delay were entirely removed, the resulting transfer time of 10:40 (total transfer time of 30 minutes minus delay of 19 encoding= minutes and 208859seconds) < ?xm l version= " 1.0" " I SO1" ?> would indicate a throughput value of 14 Mb/sec, nearly a threefold increase. This type of performance increase would warrant expending effort to investigate Ta ble o f Con t en t s how the drive performance can beReadiness improved.Guide for the Enter pr ise I mplem enttape ing Backup and Recover y—The ( VERI TAS Ser ies)

The number of delays should be interpreted within the context of how much data was moved. As the amount of data moved increases, the significance threshold for counter values increases as well. Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt I ntr oduction

Chapter - Backup and Recover y Syofst 9,000 em Requir ents Ex plained Again, 1using the example of a total MB em of data being transferred, assume a 64 KB buffer size. Chapter 2 determine - Business up Systems You can theRequirements total numberofofBack buffers to be transferred using the following equation: Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Number_Kbytes

= 9,000 X 1024

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

= 9,216,000 - Gener al Discussion on KB Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

= oubleshooting 144,000 - Gener al Tr Tips

Chapter 9

- The Expanding Back up System

Number_Slots

= 9,216,000 / 64

The counter value can now expressed Pa r t I IWait I - The Ente r pri se I m pa ct of be Back up Sy ste mas s

a percentage of the total divided by the number of

buffers10 transferred: Chapter - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena

bpbkar32 = 29364 / 144,000 Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y

= 20.39%

Appendix C - Tuning Your Backup and Recov er y Application

bptm D - Disaster = 95 / 144,000 Appendix Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

= 0.07%

Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu Perpercent form ance on Windows In this example, in thep20 of Tuning cases where the bpbkar32 process needed an empty shared I ndex data buffer, that shared data buffer has not yet been emptied by the bptm process. A value this large List of Figuraesserious problem, and additional investigation would be warranted to determine why the indicates List data of consumer Tables (bptm) is having problems keeping up. List of Sidebars

In contrast, the delays experienced by bptm are insignificant for the amount of data transferred.

You can also view the Delay and Wait counters as a ratio: < Day Day Up >

bpbkar32

= 58033/29364 = 1.98

In this example, on average the bpbkar32 process had to delay twice for each wait condition that was encountered. If this ratio is substantially large, you may wish to consider increasing the parent or child delay value, whichever one applies, to avoid the unnecessary overhead of checking for a shared data buffer in the correct state too often. Conversely, if this ratio is close to 1, you may wish to consider reducing the applicable delay value to check more often and see if that increases your data throughput performance. Keep in mind that the parent and child delay values are rarely changed in most NetBackup installations. The preceding information explains how to determine if the values for Wait and Delay counters are

substantial enough for concern. The Wait and Delay counters are related to the size of data transfer. A < Day Day Up > value of 1,000 may be extreme when only 1 MB of data is being moved. The same value may indicate a well-tuned system when gigabytes of data are being moved. The final analysis must determine how these counters affect performance by considering such factors as how much time is being lost and m time plemaenprocess t ing Ba is cku p anforced d Recoto verdelay. y: Th e Rea din ess what percentage Iof being Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa

Common Restore John Wiley &Performance Sons © 2003 (340 pages)Issues

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of This section details performance problems often seen with restore actions.

deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting Improper Multiplex net wor k Settings. infr astr uctur If multiplexing e. is too high, needless tape searching may occur. The

ideal setting is the minimum needed to stream the drives. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s Catalog Performance. The disk subsystem where the NetBackup catalog resides NetBackup I mplem entaing Backup andon Recover y—Theperformance Readiness Guide for the EnterTo pr ise has large impact the overall of NetBackup. improve restore performance, ( VERI TAS Ser ies)this subsystem for fast reads. configure I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Fragment Size. The fragment size affects where tape markers are placed and how many tape - Backup and Recover y Sy st em Requir em ents Ex plained markers are used. Fewer tape marks can slow recovers if a fast locate block is not available. SCSI Chapter 2 - Business Requirements of Back up Systems fast locate block positioning can help. A typical fragment size setting is 2048 MB. Chapter 1 Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

MPX_RESTORE_DELAY . NetBackup Chapter 4 - Evaluating Stor age setting Media Requir ements can perform multiple restores at the same time from The default Chapter 5 a-single Genermultiplexed al Discussiontape. on Configur ation delay setting is 30 seconds. If multiple restore requests are6 submitted within theBackup time window Chapter - Monitor in g the Pr ocessindicated by this delay setting, they will be considered as

candidates to be run same time, if Featur possible. This may be a useful parameter to change if Chapter 7 - Evaluating Ot at herthe Back up- Related es and Options multiple stripes from a large database backup are multiplexed together on the same tape. - Gener al Tr oubleshooting Tips

Chapter 8 Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup

< Day Day Up >

Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Evaluating IPerformance Gu id e f or t h e Ent er pr ise

ISBN:0471227145 by David B. Littlefrom and which David A. Chapa There are two primary locations NetBackup data throughput performance statistics can be John Wileyoperation: & Sons © 2003 (340 pages) obtained for a NetBackup the NetBackup Activity Monitor and the NetBackup All Log Entries report. The choice of which location to use determined by the type of of NetBackup operation you are This guide tak es r eaders thris ough the necessar y steps deploy ing serbackup, v ices byrestore, showingor how to addr essbackup. the measuring: non-multiplexed multiplexed

ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k for infrall astrthree ucturtypes e. You can obtain statistics of operations from the NetBackup All Log Entries report. You can obtain statistics for non-multiplexed backup or restore operations from the NetBackup Activity Monitor (statistics restore "operations are < ?xm l version= " 1.0" for encoding= I SO- 8859- 1" ?> newly available in the Activity Monitor with the 4.5 release). For multiplexed backup operations, you can obtain the overall statistics from the All Log Entries report Ta ble o f Con t en t s after all the individual backup operations which are part for of the I mplem ent ing Backup and Recover y—The Readiness Guide the multiplexed Enter pr ise backup are complete. In this case, theSer statistics available in the Activity Monitors for each of the individual backup operations are ( VERI TAS ies) relative only to that operation, and do not reflect the actual total data throughput to the tape drive. I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

There may be small differences between the statistics available from these two locations due to slight - Backup and Recover y Sy st em Requir em ents Ex plained differences in rounding techniques between the entries in the Activity Monitor and the entries in the All Chapter 2 - Business Requirements of Back up Systems Logs report. Therefore, we suggest you pick one location from which to obtain statistics and Chapter 3 - An I ntr odu ction to NetBackup consistently use it to compare performance between test runs. Chapter 1

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Evaluating Performance Through the NetBackup Activity Monitor - Gener al Discussion on Configur ation

Chapter 5

Chapter 6 - the Monitor in g or therestore Backupjob Pr ocess 1. Run backup (restore job statistics available only in the 4.5 release). Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options

2. Open the NetBackup Activity Monitor. Chapter 8 - Gener al Tr oubleshooting Tips Chapter 9

- The Expanding Back up System 3. Verify the backup or restore job completed successfully. A 0 should appear in the status column.

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 4. View 11 - the Maj details or Players for in thethe jobBackup by selecting Ar ena the Details menu option, or by double-clicking on the

job. Appendixentry A - for Comthe m and-Line I nter face Gu ide Appendix B - Glossar y

5. Select the Detailed Status tab.

Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recoveryperformance Planning Kit—Fr om Endfrom to Beginning 6. Obtain the NetBackup statistics the following fields: Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

fields show the time window during which the backup or restore job Appendix F - Started/Ended: Per for m ance TestThese Tech Note place. Appendix G - took Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables

Elapsed: This field shows the total elapsed time from when the job was initiated to job completion and can be used as an indication of total wall clock time for the operation.

List of Sidebars KB/sec: This is the data throughput rate.

Current Kilobytes Written: Compare this value to the amount of data. Although it should be comparable, the NetBackup data amount will be slightly higher because of < Day Day Up > administrative information, known as metadata, saved for the backed up data. For example, if you display properties for a directory containing 500 files, each 1 MB in size, the directory shows a size of 500 MB, or 524,288,000 bytes, which is equal to 512,000 KB. The NetBackup report may show 513,255 KB written, reporting an extra 1,255 KB than provided through viewing the directory's properties. This is true for a flat directory. Subdirectory structures may diverge due to the way the operating system tracks used and available space on the disk. Also, be aware that the operating system may be reporting how much space was allocated for the files in question, not just how much data is actually there. For example, if the allocation block size is 1 KB, 1000 1 byte files will report a total size of 1 MB, even though 1 KB of data is all that exists. The greater the number of files, the larger this discrepancy may become.

Evaluating Performance Using < Day the Day All Up >Log Entries Report 1. Run the backup or restore job. 2. Run the AllI mLog Entries report from the NetBackup reports node in the NetBackup plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Administrative release 4.5, or the NetBackup Reports GUI in earlier releases. Be Gu idConsole e f or t h einEnt er pr ise sure that the Date/Time Range that you select covers the time period during which the job was ISBN:0471227145 by David B. Little and David A. Chapa run. John Wiley & Sons © 2003 (340 pages) guide tak es r eaders thr ough the necessar y steps of 3. Verify thatThis the job completed successfully by searching for an entry such as 'the requested deploy ing ser v ices by showing how to addr ess the operation was successfully completed' for a backup, orex 'successfully read (restore) backup id ar chitectur e, lim it ations, and capabilities of t he isting … ' for a restore. net wor k infr astr uctur e.

4. Obtain the NetBackup performance statistics from the following entries in the report. (Note that < ?xm l version= " 1.0" shown encoding= " I SO?> release 4.5. The entries for earlier releases will be the the entries here are8859based1"on Ta ble o f same Con t en ort ssimilar.) I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntrENTRY oduction

STATISTIC

Pa rstarted t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt backup job for

TheDate and Time fields for this entry show the time at

Chapter 1 , Backup and Recover y Sy st em Requir ents Ex plained client policy which theem backup job started. Chapter 2 - schedule Business Requirements , of Back up Systems Chapter 3 - An I unit ntr odu ction to NetBackup on storage

Pa r t I I - Back up P roduct Tutor ia l

successfully wrote For a multiplexed backup, this entry shows the size of the - Evaluating Stor age Media Requir ements backup id , copy individual backup job and the Date and Time fields show Chapter 5 - Gener al Discussion on Configur ation , Kbytes the time at which the job finished writing to the storage Chapter 6 - Monitor in g the Backup Pr ocess device. The overall statistics for the multiplexed backup Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options group, including the data throughput rate to the storage Chapter 8 - Gener al Tr oubleshooting Tips device, are found in a subsequent entry below. Chapter 4

Chapter 9

- The Expanding Back up System

ForSymultiplexed backups, Pa rsuccessfully t I I I - The Ente r priwrote se I m pa ct of Back up ste m s

this entry shows the overall statistics for the multiplexed backup group including the multiplexed throughput rate. Chapter 11 - Maj orbackups, Players in the Backupdata Ar ena total Kbytes

at Appendix A - Com m and-Line I nter face Gu ide Kbytes/sec

of Fut

Chapter 10 - The ure of Backup

Appendix B - Glossar y

Appendix C - Tuning wrote Your Backup and Recov y Application successfully For er non-multiplexed backups, this entry essentially Appendix backup D -id Disaster , Recovery copy Planningcombines Kit—Fr om the Endinformation to Beginningin the previous two entries for , fragment multiplexed backups one showing the size of the Appendix E - Business I mpact Analysis Planning Kit—The Stor minto Befor e tentry he Calm

,

backup job, the data throughput rate, and the time, in the Appendix F - Per for m ance Kbytes Test Tech Note at Date on and Time fields, at which the job finished writing to Appendix G - Net Kbytes/sec Backu p Per form ance Tuning Windows I ndex

the storage device.

Listthe of Figur es requested operation Listwas of Tables successfully

TheDate and Time fields for this entry show the time at which the backup job completed. This value is later than the 'successfully wrote' entry above because it includes extra processing time at the end of the job for tasks such as NetBackup image validation.

Listcompleted of Sidebars

begin reading backup id , (restore), copy , fragment from media id on drive index

< Day Day Up >

TheDate and Time fields for this entry show the time at which the restore job started reading from the storage device. (Note that the latter part of the entry is not shown for restores from disk, as it does not apply.)

Day Day Uprestore > For a atl Kbytes/sec Ta ble o f Con t en t s

successfully non-multiplexed restores (generally speaking, only I mplem ent ing Backupread and Recover y—TheFor Readiness Guide for the Enter pr ise (restore) restores from disk are treated as non-multiplexed ( VERI TAS Ser ies) backup id restores), this entry essentially combines the information into ,

Kbytes one entry showing the size of the restore job, the data Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained at Kbytes/sec throughput rate, and the time, in the Date and Time fields, Chapter 2 - Business Requirements of Back up Systems at which the job finished reading from the storage device. Chapter 3 - An I ntr odu ction to NetBackup , copy I ntrmedia oduction

from the previous entries Pa r, t I - I nt r oductfragment ion t o Ba ck up and Recove r y in the Ent er pr itwo se Env ir onmfor e ntmultiplexed restores

Pa r t I I - Back up P roduct Tutor ia l

Additional Information Chapter 4 - Evaluating Stor age Media Requir ements Chapter 5

- Gener al Discussion on Configur ation

The NetBackup All Log Entries report will also have entries similar to those described above for other - Monitor in g the Backup Pr ocess NetBackup operations such as image duplication operations used to create additional copies of a Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options backup image. Those entries have a very similar format and may be useful for analyzing the Chapter 8 - Gener al Tr oubleshooting Tips performance of NetBackup for those operations. Chapter 6

Chapter 9

- The Expanding Back up System

Pa The r t I bptm I I - The debug Ente rlog pri se fileI mwill pa contain ct of Back the upentries Sy ste mthat s

are in the All Log Entries report, as well as

Chapter 10 detail - Theabout Fut urethe of Backup additional operation that may be useful for performance analysis. One example of this

additional is the intermediate data Ar throughput rate message for multiplexed backups, as shown Chapter 11 detail - Maj or Players in the Backup ena below: A - Com m and-Line I nter face Gu ide Appendix Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Kbytes at … intermediate after

successful, Appendix Kbytes/sec D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

This message isfor generated whenever an individual backup job completes that is part of a multiplexed Appendix F - Per m ance Test Tech Note backup group. In the debug log file for a multiplexed backup group consisting of three individual backup jobs, for example, there could be two intermediate status lines, then the final (overall) I ndex throughput rate. Appendix G - Net Backu p Per form ance Tuning on Windows List of Figur es

List ForofaTables backup operation, the bpbkar debug log file will also contain additional detail about the List of Sidebars operation that may be useful for performance analysis. One such example would be data regarding

the delay involved in initializing OTM to back up open files on the NetBackup client. Keep in mind, however, that writing the debug log files during the NetBackup operation introduces < Day Day Up > some overhead that would not normally be present in a production environment. Factor that additional overhead into any calculations done on data captures while debug log files are in use. See the NetBackup Troubleshooting Guide to learn how to set up NetBackup to write these debug log files during the NetBackup operation.

< Day Day Up >

< Day Day Up >

m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Evaluating ISystem Components Gu id e f or t h e Ent er pr ise

by DavidNetBackup's B. Little and performance, David A. Chapayou shouldISBN:0471227145 In addition to evaluating also verify that common system John Wileysupply. & Sons You © 2003 (340want pages)to use the Windows Performance Monitor utility resources are in adequate may included with Windows NT or Forthe information the Performance Monitor, This guide takWindows es r eaders2000. thr ough necessar yabout steps using of deploydocumentation. ing ser v ices by showing how to addr ess the refer to your Microsoft ar chitectur e, lim it ations, and capabilities of t he ex isting wor k infr astr ucturinformation e. The Performancenet Monitor organizes by object,counter, and instance.

Anobject is a system resource category, such as a processor or physical disk. Properties of an object

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> arecounters. Counters for the Processor object include %Processor Time, which is the default Ta ble o f Con t en t s

counter, and Interrupts/sec. Duplicate counters are handled via instances. For example, to monitor

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise the%Processor ( VERI TAS Ser ies) Time of a specific CPU on a multiple CPU system, the Processor object is selected,

then the %Processor Time counter for that object is selected, followed by the specific CPU instance for the counter. Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt I ntr oduction

Chapter 1 - Backup and Recover yMonitor, Sy st em you Requir emview ents data Ex plained When you use the Performance can in real time format or collect the data in a Chapter - Business of Back uptoSystems log for 2future analysis.Requirements Specific components evaluate include CPU load, memory use, and disk load. Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Monitoring CPU Load - Evaluating Stor age Media Requir ements

Chapter 4

Chapter 5 - Gener Discussion Configur ationto accomplish the requested tasks, monitor the % To determine if thealsystem has on enough power Chapter 6 Monitor in g the Backup Pr ocess Processor Time counter for the Processor object to determine how hard the CPU is working, and Chapter Evaluating Ot her Length Back up- Related and Options monitor7 the- Process Queue counterFeatur for theesSystem object to determine how many processes Chapter 8 Gener al Tr oubleshooting Tips are actively waiting for the processor. Chapter 9

- The Expanding Back up System

For Time, values ofBack 0 to up 80Sy percent Pa r t I% I I Processor - The Ente r pri se I m pa ct of ste m s

are generally considered safe. Values from 80

percent10to 90 percent that the system is being pushed hard, while consistent values above 90 Chapter - The Fut ureindicate of Backup percent11indicate that the CPU is a bottleneck. Chapter - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide

Spikes approaching 100 percent are normal and do not necessarily indicate a bottleneck. However, if

Appendix B loads - Glossar y sustained approaching 100 percent are observed, efforts to tune the system to decrease Appendix C Tuning Your Backup Recov er y Application process load or an upgrade to a and faster processor should be considered. Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Sustained LengthsPlanning greaterKit—The than twoStor indicate too threads are waiting to be Appendix E Processor - Business IQueue mpact Analysis m Befor e tmany he Calm executed. correctly monitor the Processor Queue Length counter, the Performance Monitor must Appendix F To - Per for m ance Test Tech Note be tracking thread-related counter. If you consistently Appendix G - aNet Backu p Per form ance Tuning on Windows see a queue length of 0, verify that a non-zero value can be displayed. I ndex List of Figur es

The default scale for the Processor Queue Length may not be equal to 1. Be sure to read the data

List of Tables correctly. For example, if the default scale is 10x, then a reading of 40 actually means that only 4 List of Sidebars processes are waiting.

Monitoring Memory Use

< Day Day Up >

Memory is a critical resource for increasing the performance of backup operations. When you examine memory usage, view information on: Committed Bytes. Committed Bytes displays the size of virtual memory that has been committed, as opposed to reserved. Committed memory must have disk storage available or must not require the disk storage because the main memory is large enough. If the number of Committed Bytes approaches or exceeds the amount of physical memory, you may encounter problems with page swapping. Page Faults/sec. Page Faults/sec is a count of the page faults in the processor. A page fault occurs when a process refers to a virtual memory page that is not in its Working Set in main memory. A high Page Fault rate may indicate insufficient memory.

Monitoring Disk Load

< Day Day Up >

To use disk performance counters to monitor the disk performance in Performance Monitor, you may need to enable those counters. may not have I m plem en t ingWindows Ba cku p an d Reco ver y:enabled Th e Reathe dindisk ess performance counters by default for your system. Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa

ISBN:0471227145

For more information about disk performance counters, from a command prompt, type: John Wiley & Sons © 2003 (340 pages) This guide tak es r eaders thr ough the necessar y steps of

diskperf -help deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting wor k infrand astr uctur e. disk monitoring: To enable thesenet counters allow

1. From a command prompt, type: < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f diskperf Con t en t s -y I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI2.TAS Ser ies)the system. Reboot I ntr oduction

To these monitoring: Pa r t Idisable - I nt r oduct ion counters t o Ba ck up and and cancel Recove rdisk y in the Ent er pr i se Env ir onm e nt Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained 1. From a command prompt, type: Chapter 2 - Business Requirements of Back up Systems Chapter diskperf 3 - An I ntr-n odu ction to NetBackup Pa r t I I - Back up P roduct Tutor ia l

Chapter 2. Reboot 4 - Evaluating the system. Stor age Media Requir ements Chapter 5

- Gener al Discussion on Configur ation

When you monitor disk performance, use the %Disk Time counter for the PhysicalDisk object to - Monitor in g the Backup Pr ocess track the percentage of elapsed time that the selected disk drive is busy servicing read or write Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options requests. Chapter 6 Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9 - The up System Also monitor the Expanding Avg. Disk Back Queue Length counter and watch for values greater than 1 that last for Pa r t I I Ithan - Theone Ente r pri se I m pa ct ofgreater Back upthan Sy ste s more second. Values 1m for

more than a second indicate that multiple processes

Chapter 10 -for The ure to of service Backup their requests. are waiting theFut disk Chapter 11 - Maj or Players in the Backup Ar ena

Several Atechniques may be Iused to increase Appendix - Com m and-Line nter face Gu ide disk performance, including: Appendix B - Glossar y

Check fragmentation of theerdata . A highly fragmented disk limits throughput levels. Appendix C - the Tuning Your Backuplevel and Recov y Application Use a disk maintenance utility to defragment the disk.

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix Consider F - Per adding for m ance additional Test Techdisks Note to the system to increase performance . If multiple

processes attempting log Tuning data simultaneously, dividing the data among multiple physical Appendix G - Netare Backu p Per formto ance on Windows I ndex disks may help. List of Figur es List ofDetermine Tables if the data transfer involves a compressed disk . The use of Windows NT List ofcompression Sidebars to automatically compress the data on the drive adds additional overhead to disk

read or write operations, adversely affecting the performance of NetBackup. Only use Windows NT compression if it is needed to avoid a disk full condition. < Day Day Up >

Consider converting to a system based on a Redundant Array of Inexpensive Disks (RAID) . Though more expensive, RAID devices generally offer greater throughput, and, (depending on the RAID level employed), improved reliability. Determine what type of controller technology is being used to drive the disk . Consider if a different system would yield better results. The following table shows some typical throughput rates for common controllers:

CONTROLLER TECHNOLOGY

Day Day Up >RATE MAX< TRANSFER

# DEVICES

BIOS Hard disk (MFM, RLL, ESDI)

8MB/s

2

IDE

I m plem en t ing Ba cku p5MB/s an d Reco ver y: Th e Rea din2ess Gu id e f or t h e Ent er pr ise

SCSI

5MB/s

SCSI-2 Fast SCSI-2 Wide SCSI-2 F/W

by David B. Little and David A. Chapa John Wiley & Sons © 200310MB/s (340 pages)

7

ISBN:0471227145

7

This guide tak es r eaders thr ough the necessar y steps of 20MB/show to addr ess the 7 deploy ing ser v ices by showing ar chitectur e, lim it ations, and capabilities of t he ex isting 7 net wor k infr astr uctur e. 40MB/s

Ultra SCSI

80MB/s

15

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness for>the Enter pr ise < Day Guide Day Up ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

m plem en tPerformance ing Ba cku p an d Reco ver y: Th e Rea din ess NetBackupI Client Gu id e f or t h e Ent er pr ise

ISBN:0471227145 David B. Little and Davidwhen A. Chapa This section lists by some factors to consider you evaluate the NetBackup client component of the John Wiley & Sons © 2003these (340 pages) NetBackup data transfer path. Examine conditions to identify possible changes that may improve the overall performance of tak NetBackup. This guide es r eaders thr ough the necessar y steps of

deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting Disk Fragmentation. net wor k infr Fragmentation astr uctur e. is a condition where data is scattered around the disk in non-

contiguous blocks. This condition severely impacts the data transfer rate from the disk. Fragmentation can be repaired using hard disk management utility software offered by a variety of < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> vendors. Ta ble o f Con t en t s

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) Virus Scanning. If virus scanning is turned on for the system, it may severely impact the I ntr oduction performance of the NetBackup client during a backup or restore operation. This may be especially Pa r t I true - I ntfor r oduct ion t o such Ba ck up r y servers. in the Ent er prmay i se Env ir onm e nt systems as and largeRecove NT file You wish to disable

virus scanning during

Chapter 1 - or Backup and Recover y to Sy avoid st em Requir em ents plained backup restore operations the impact onExperformance. Chapter 2 - Business Requirements of Back up Systems Chapter 3

- An I ntr odu ction to NetBackup NetBackup Notify Scripts. The bpstart_notify.bat and bpend_notify.bat scripts are very useful in certain situations, such as shutting down a running application to back up its data. Chapter 4 - Evaluating Stor age Media Requir ements However, these scripts must be written with care to avoid any unnecessary lengthy delays at the Chapter 5 Gener Discussion on Configur ation are not performing tasks essential to the backup start or- end of al the backup job. If the scripts Chapter 6 Monitor in g the Backup Pr ocess operation, you may want to remove them. Pa r t I I - Back up P roduct Tutor ia l

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

NetBackup Software Location . If the data being backed up is located on the same physical disk - The Expanding Back up System drive as the NetBackup installation, performance may be adversely affected, especially if Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s NetBackup debug log files are being used. If they are being used, the extent of the degradation Chapter 10 - The Fut ure of Backup will be greatly influenced by the NetBackup verbose setting for the debug logs. If possible, install Chapter 11 - Maj or Players in the Backup Ar ena NetBackup on a separate physical disk drive to avoid this disk drive contention. Chapter 9

Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y

Open (OTM) . When OTM is enabled, there is a delay at the start of the Appendix C Transaction - Tuning YourManager Backup and Recov er y Application

backup information gathered about being snapped and while the OTM driver Appendix D - while Disaster Recovery isPlanning Kit—Fr omthe Endvolumes to Beginning

is waiting for the disk activity to quiesce. In some cases, there will be an additional delay while OTM creates the snapshot cache file. NetBackup transfer rates are affected by this delay because Appendix F - Per for m ance Test Tech Note NetBackup treats the start of the data transfer as the time that the backup process is started on Appendix G - Net Backu p Per form ance Tuning on Windows the client. You may wish to disable OTM to eliminate this delay unless it is needed to back up open I ndex files. Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

List of Figur es List of Tables

Tracker . If the NetBackup Client Job Tracker is running on the client, then NetBackup will List ofJob Sidebars

gather an estimate of the data to be backed up prior to the start of a backup job. Gathering this estimate will affect the startup time, and therefore the data throughput rate, because no data is being written to the NetBackup server during this estimation phase. You may wish to avoid running < Day Day Up > the NetBackup Client Job Tracker to avoid this delay.

Client Location. You may wish to consider adding a locally attached tape device to the client and changing the client to a NetBackup media server if you have a substantial amount of data on the client. For example, backing up 100 GBs of data to a locally attached tape drive will generally be more efficient than backing up the same amount of data across a network connection to a NetBackup server. Of course, there are many variables to consider, such as the bandwidth available on the network, that will affect the decision to back up the data to a locally attached tape drive as opposed to moving the data across the network. Determining the Theoretical Performance of the NetBackup Client Software . There is a useful feature in the NetBackup client software utility bpbkar32 that may be used to determine

the speed at which the NetBackup client< can read the data to be backed up from the disk drive. Day Day Up > This feature can be used to eliminate as a possible performance bottleneck the speed at which the data can be read when you are attempting to improve a poorly performing NetBackup installation. Use the following syntax for this utility: I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

bpbkar32 -nocont > NUL 2 > NUL by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

In the above syntax, would be replaced with the path to the data to be read from the disk, ThisUsing guidethis tak syntax es r eaders thr oughan the necessar y steps of for the other components of the C:\ for example. simulates infinitely fast speed deploy ing ser v ices by showing how to addr ess the NetBackup data transfer path, such as the network. ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

You can view the performance statistics of the operation in the bpbkar debug log file, or use a stopwatch to time the operation and then manually calculate the performance statistics. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness for>the Enter pr ise < Day Guide Day Up ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

m plem en t ingPerformance Ba cku p an d Reco ver y: Th e Rea din ess NetBackupI Network Gu id e f or t h e Ent er pr ise

ISBN:0471227145 David B. Little and Davidwhen A. Chapa This section lists by some factors to consider you evaluate the network component of the John Wiley & Sons © 2003possible (340 pages)changes that may improve the overall performance NetBackup data transfer path to identify of NetBackup. This guide tak es r eaders thr ough the necessar y steps of

deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting Network Load. There are two key considerations to monitor when you evaluate remote backup net wor k infr astr uctur e.

performance:

The" 1.0" amount of network < ?xm l version= encoding= " I SO-traffic 8859- 1" ?> Ta ble o f Con t en t s

The amount of time that network traffic is high

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

Small bursts of high network traffic for short durations will have some negative impact on the data throughput rate. However, if the network traffic remains consistently high for a significant amount Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt of time during the operation, the network component of the NetBackup data transfer path will very Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained likely be the bottleneck. Always try to schedule backups during times when network traffic is low. If Chapter 2 - Business Requirements Back upwish Systems your network is heavily loaded, of you may to implement a secondary network which can be Chapter 3 - AntoI ntr odu ction NetBackup dedicated backup andtorestore traffic. I ntr oduction

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

NetBackup Media Server Network Buffer Size . The NetBackup media server has a tunable - Gener al Discussion on Configur ation parameter that you can use to adjust the size of the Winsock2 network communications buffer Chapter 6 - Monitor in g the Backup Pr ocess used to receive data from the network (a backup) or write data to the network (a restore). This Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options parameter specifies the value that is used to call the setsockopt() Winsock2 API to set the network Chapter 8 - Gener al Tr oubleshooting Tips buffer size for backups (SO_RCVBUF) and restores (SO_SNDBUF). Chapter 5

Chapter 9

- The Expanding Back up System

Pa r t I The I I - The Entevalue r pri se for I m this pa ct parameter of Back up Sy ms default in ste release

3.4.1 and earlier is 32032 bytes. In release 4.5, the

Chapter 10 - value The Fut Backup default forure thisofparameter is derived from the NetBackup data buffer size (see below for more about buffer size) using the following formula: Chapter 11 information - Maj or Players in the data Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide

For backup jobs: ( * 4) + 1024

Appendix B - Glossar y

Appendix - Tuning Backup and Recov *er2) y Application For C restore jobs:Your ( + 1024 Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Because the default value for thePlanning NetBackup data Stor buffer size is bytes, this formula results Appendix E - Business I mpact Analysis Kit—The m Befor e t65536 he Calm in a Fdefault value of 263168 bytes Appendix - Per for m ance Test Tech Notefor backups and 132096 bytes for restores. Appendix G - Net Backu p Per form ance Tuning on Windows I ndex

To set this parameter, create the following files:

List of Figur\NetBackup\NET_BUFFER_SZ es List of Tables

\NetBackup\NET_BUFFER_SZ_REST

List of Sidebars

(new in 4.5, not used in earlier releases) These files contain a single integer specifying the network buffer size in bytes. For example, to use < Day Day Up > a network buffer size of 64 KB, the file would contain 65536. If the files contain the integer 0 (zero), the setsockopt() Winsock2 API call will be skipped and the system default value for the network buffer size will be used. If the NET_BUFFER_SZ file exists, its contents will be used to specify the network buffer size for both backup and restores. If the NET_BUFFER_SZ_REST file exists (only in 4.5), its contents will be used to specify the network buffer size for restores. If both files exist, the NET_BUFFER_SZ file will be used to specify the network buffer size for backups, and the NET_BUFFER_SZ_REST file will be used to specify the network buffer size for restores.

Because local backup or restore jobs on the media server do not send data over the network, this < Day Day Up > parameter has no effect on those operations. It is used only by the NetBackup media server processes which read from or write to the network, specifically, the bptm or bpdm processes. It is not used by any other NetBackup for Windows processes on a master server, media server, or I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess client. Gu id e f or t h e Ent er pr ise ISBN:0471227145 This parameter by David is the B. counterpart Little and David on theA.media Chapaserver to the Communications Buffer Size parameter onJohn the Wiley client,&which is2003 described below. The network buffer sizes are not required to be Sons © (340 pages) the same on This all ofguide yourtak NetBackup to function properly, however, setting es r eaderssystems thr ough for the NetBackup necessar y steps of serparameter v ices by showing to server addr essand the the Communications Buffer Size the Network deploy Buffering Size on the how media chitectur lim itbelow) ations, to andthe capabilities of t has he exachieved isting parameter onarthe cliente,(see same value the best performance in net wor k infr astr uctur e. some NetBackup installations.

< ?xm l Ta ble

Similarly," 1.0" the network buffer does version= encoding= " I SO-size 88591" ?>not have a direct relationship with the NetBackup data buffer size (see below). They are separately tunable parameters. However, as you can see by the o f Con t en t s

default forand network buffer size in release 4.5, for setting the network buffer to a substantially I mplem ent ing value Backup Recover y—The Readiness Guide the Enter pr ise larger ( VERI TAS Servalue ies) than the data buffer has achieved the best performance in many NetBackup installations. I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Tuning this parameter along with the Communications Buffer Size parameter on the client has - Backup and Recover y Sy st em Requir em ents Ex plained resulted in significant improvements in the throughput of the network component of the NetBackup Chapter 2 - Business Requirements of Back up Systems data transfer path in some NetBackup installations. Chapter 1 Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

NetBackup Client Stor Communications Chapter 4 - Evaluating age Media RequirBuffer ementsSize. The NetBackup client has a tunable parameter that can use to adjust the of the Winsock2 network communications buffer used to write Chapter 5 you - Gener al Discussion on size Configur ation data network for Backup backups. This parameter specifies the value that is used to call the Chapter 6 to- the Monitor in g the Pr ocess setsockopt() Winsock2 API to set the network buffer size for backups (SO_SNDBUF). - Evaluating Ot her Back up- Related Featur es and Options

Chapter 7

Chapter 8 parameter - Gener al is Trthe oubleshooting This counterpartTips on the client to the Network Buffer Size parameter on the media Chapter 9 The Expanding Back System server, described above. Asup mentioned, the network buffer sizes are not required to be the same Pa r t I on I I -all The se I m pa ct systems of Back up ste m s ofEnte yourr pri NetBackup forSyNetBackup

to function properly. However, setting the

Chapter 10 - The Fut Size ure ofparameter Backup Network Buffer on the media server (see above) and the Communications Buffer Chapter 11 parameter - Maj or Players the Backup Ar ena value achieves the best performance in some Size on theinclient to the same Appendix A - Cominstallations. m and-Line I nter face Gu ide NetBackup Appendix B - Glossar y

To set the Buffer Size er parameter: Appendix C -Communications Tuning Your Backup and Recov y Application 1. From Properties the NetBackup Console in release 4.5, or from the Appendix D - Host Disaster Recovery inPlanning Kit—Fr omAdministration End to Beginning NetBackup GUI in earlier releases, open Client Properties dialog for the client AppendixConfigure E - Business I mpact Analysis Planning Kit—The Storthe m Befor e t he Calm them parameter is toNote be changed. Appendixon F which - Per for ance Test Tech Appendix G - Net Backu p Per form ance Tuning on Windows

2. From the Windows Client tab, set the Communications buffer size: field.

I ndex

List of parameter Figur es This is specified in number of kilobytes. The default value is 32. An extra kilobyte is added List of Tables internally for backup operations (SO_SNDBUF). Therefore, the default network buffer size for backups List is 33792 of Sidebars bytes. In some NetBackup installations, this default value is too small. Increasing the value to

128 improves performance in these installations. Another way to set this parameter is to configure the Buffer_Size parameter in the registry. < Day Day Up >

Locate the following key under HKEY_LOCAL_MACHINE Software/VERITAS/NetBackup/CurrentVersion/Config Add or modify the Buffer_Size value, which is a REG_DWORD value. Set it to 0x20. Because local backup jobs on the media server do not send data over the network, this parameter has no effect on these local operations. This parameter is used by only the NetBackup client processes which write to the network, specifically, the bpbkar32 process. It is not used by any other NetBackup for Windows processes on a master server, media server, or client.

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess NetBackupI Server Performance Gu id e f or t h e Ent er pr ise

ISBN:0471227145 David B. Little and Davidwhen A. Chapa This section lists by some factors to consider you evaluate the NetBackup server component of the John Wiley & Sons © 2003possible (340 pages)changes that may improve the overall performance NetBackup data transfer path to identify of NetBackup. This guide tak es r eaders thr ough the necessar y steps of

deploy ing ser v ices by showing how to addr ess the chitectur e, lim it ations, and capabilities of t he ex isting Number andarSize of Shared Data Buffers. By default, NetBackup uses eight shared data buffers net wor k infr astr uctur e.

for a multiplexed backup, 16 shared data buffers for a non-multiplexed backup, 12 shared data buffers for a multiplexed restore, and 16 shared data buffers for a non-multiplexed restore. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> these TaTo blechange o f Con t en t s settings, create the following file(s): I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction \NetBackup\db\config\NUMBER_DATA_BUFFERS Pa r t I - \NetBackup\db\config\NUMBER_DATA_BUFFERS_RESTORE I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained files contain a single integer the number of shared data buffers NetBackup will ChapterThese 2 - Business Requirements of Backspecifying up Systems Chapteruse. 3 - An I ntr odu ction to NetBackup Pa r t I I - Back up P roduct Tutor ia l

If the NUMBER_DATA_BUFFERS file exists, its contents will be used to determine the number - Evaluating Stor age Media Requir ements of shared data buffers to be used for multiplexed and non-multiplexed backups.

Chapter 4 Chapter 5

- Gener al Discussion on Configur ation

ChapterIf6the- NUMBER_DATA_BUFFERS_RESTORE Monitor in g the Backup Pr ocess file exists, its contents will be used to determine Chapterthe 7 number - Evaluating Ot herdata Backbuffers up- Related Featur and Options restores. of shared to be usedesfor multiplexed Chapter 8

- Gener al Tr oubleshooting Tips NetBackupBack uses KB (65536 bytes) as the size of each shared data buffer. A single ChapterBy 9 default, - The Expanding up 64 System

tape I/O operation is performed for each shared data buffer. Therefore, this size must not exceed the maximum block size for the tape device or operating system. For Windows systems, Chapter 10 - The Fut ure of Backup the maximum block size is generally 64 KB, although in some cases customers are using a Chapter 11 - Maj or Players in the Backup Ar ena larger value successfully. Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Appendix A - Com m and-Line I nter face Gu ide

Appendix B this - Glossar y the terms ‘tape block size' and ‘shared data buffer size' are synonymous in this For reason, Appendix C - Tuning Your Backup and Recov er y Application context. Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

The server will query the tape Stor device for its Appendix E NetBackup - Business I media mpact Analysis Planning Kit—The m Befor e tmaximum he Calm block size, and cause theF backup to Tech fail if Note the shared data buffer size exceeds the value that is returned. Appendix - Per foroperation m ance Test Appendix G - Net Backu p Per form ance Tuning on Windows

Note: NOTE Some tape devices may not reliably return this information. Therefore, it is critical to List of Figur es perform both backup and restore testing if the shared data buffer size value is List of Tables changed. If all NetBackup media servers are not running in the same operating system List of Sidebars environment, it is critical to test restores on each of the NetBackup media servers that may be involved in a restore operation. For example, if a UNIX NetBackup media server is used to write a backup to tape with a shared data buffer (block size) of 256 KB, then it is possible that a Windows NetBackup < Day Day media Up > server will not be able to read that tape. In general, we strongly recommend you test restore as well as backup operations. I ndex

To change the size of the shared data buffers, create the following file:

\NetBackup\db\config\SIZE_DATA_BUFFERS This file contains a single integer specifying the size of each shared data buffer in bytes. For example, to use a shared data buffer size of 32 KB, the file would contain the integer 32768. Note that the size of the shared data buffers used for a restore operation is determined by the size of the shared data buffers in use at the time the backup was written. This file is not used by restores.

In general, the number and size of the< shared data buffers can be used to calculate the amount Day Day Up > of shared memory required by NetBackup using this formula: (number_data_buffers * size_data_buffers) * number_tape_drives * max_multiplexing_setting I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess

For example, assume theernumber Gu id e f or t hthat e Ent pr ise of shared data buffers is 16, the size of the shared data buffers is 64 there are two drives, and the maximum multiplexing setting is four. ISBN:0471227145 byKB, David B. Little andtape David A. Chapa Following the formula of shared memory required by NetBackup is: John Wiley &above, Sons ©the 2003amount (340 pages) This guide tak es r eaders thr ough the necessar y steps of v ices showing (65536 *deploy 16) ing * ser 2 * 4 by = 8 MB how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting k infr astr uctur See below net for wor information aboute.how to determine if you should change these settings. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Parent/Child Delay Values. Although rarely changed, it is possible to modify the parent and child Ta ble o f Con t en t s

delay values for a process.

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) To change these values, create the following files: I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained \NetBackup\db\config\PARENT_DELAY - Business Requirements of Back up Systems \NetBackup\db\config\CHILD_DELAY

Chapter 2 Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I -These Back up P roduct Tutor ia l files contain a single

integer specifying the value in milliseconds to be used for the delay

Chaptercorresponding 4 - Evaluating age Media Requir to Stor the name of the file.ements For example, to use a parent delay of 50 milliseconds, the file would contain the ChapterPARENT_DELAY 5 - Gener al Discussion on Configur ationinteger 50. Chapter 6

- Monitor in g the Backup Pr ocess

See below for more information about how to determine if you should change these values. - Evaluating Ot her Back up- Related Featur es and Options

Chapter 7 Chapter 8

- Gener al Tr oubleshooting Tips The following section refers to the bptm process on the media server during back up and restore The Expanding Back up System operations -from a tape storage device. If you are backing up to or restoring from a disk storage device, Pa r t I I I - The Entefor r pri se I mthroughout pa ct of Backthe up section. Sy ste m s For example, to activate debug logging for a disk substitute bpdm bptm Chapter 10 The Fut ure of Backup storage device, the following directory must be created: Chapter 9

Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide

\NetBackup\logs\bpdm

Appendix B - Glossar y

Appendix C - Tuning Your Backup and Recov er y Application

Using NetBackup Wait and Delay Counters

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

During a backup or restore operation the NetBackup media server uses a set of shared data buffers to isolate the process of communicating with the tape from the process of interacting with the disk or Appendix G - Net Backu p Per form ance Tuning on Windows network. Through the use of Wait and Delay counters, you can determine which process on the I ndex NetBackup media server, the data producer or the data consumer, has to wait more often. Appendix F - Per for m ance Test Tech Note

List of Figur es List Achieving of Tablesa good balance between the data producer and the data consumer processes on the

NetBackup media server is an important factor in achieving optimal performance from the NetBackup List of Sidebars server component of the NetBackup data transfer path.

Understanding the Two-Part Communication Process < Day Day Up > The two-part communication process differs depending on whether the operation is a backup or restore and whether the operation involves a local client or a remote client. Local Clients When the NetBackup media server and the NetBackup client are part of the same system, the NetBackup client is referred to as a local client. Backup of Local Client. For a local client, the bpbkar32 process reads data from the disk during a backup and places it in the shared buffers. The bptm process reads the data from the shared buffer and writes it to tape.

Restore of Local Client. During a restore of a local client, the bptm process reads data from the < Day Day Up > tape and places it in the shared buffers. The tar32 process reads the data from the shared buffers and writes it to disk. Remote Clients I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

When the NetBackup media server and the A. NetBackup client are part of two different systems, the ISBN:0471227145 by David B. Little and David Chapa NetBackup clientJohn is referred as a©remote Wiley &toSons 2003 (340client. pages) This guide tak es r eaders thr ough the necessar y steps of

The process Backup of Remote Client. deploy ing ser v ices bybpbkar32 showing how to addron essthe theremote client reads data from the disk and writes it to the network. a child ar chitectur e, lim Then it ations, and capabilities bptm process of t he onexthe isting media server receives data from net wor k infritastr e. the network and places in uctur the shared buffers. The parent bptm process on the media server reads the data from the shared buffers and writes it to tape. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t enof t sRemote Client. During the restore of the remote client, the parent bptm process Restore I mplem ent ing Backup y—The Readiness Guide for buffers. the EnterThe pr isechild bptm process reads the reads data fromand the Recover tape and places it into the shared ( VERI TAS Ser ies)

data from the shared buffers and writes it to the network. The tar32 process on the remote client receives the data from the network and writes it to disk.

I ntr oduction

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1 Processes - Backup and Recover y Sy st and em Requir em ents Ex plained Roles of during Backup Restore Operations Chapter 2 - Business Requirements of Back up Systems

When a3 process attempts to to use a shared data buffer, it first verifies that the next buffer in order is in a Chapter - An I ntr odu ction NetBackup

correct state. A data producer needs an empty buffer, while a data consumer needs a full buffer. The following chart provides a mapping of processes and their roles during backup and restore operations: - Evaluating Stor age Media Requir ements

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4 Chapter 5

- Gener al Discussion on Configur ation

OPERATION DATA PRODUCER Chapter 6 - Monitor in g the Backup Pr ocess

DATA CONSUMER

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

bptm

Local Backup

bpbkar32

Remote bptm (child) Chapter 9 Backup - The Expanding Back up System

bptm (parent)

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Local Restore

bptm

tar32

Chapter 10 - The Fut ure of Backup

Remote bptmin(parent) Chapter 11 Restore - Maj or Players the Backup Ar enabptm (child) Appendix A - Com m and-Line I nter face Gu ide

If a full buffer is needed by the data consumer but is not available, the data consumer increments the Appendix B - Glossar y

Wait andCDelay counters to indicate it had to wait for a full buffer. After a delay, the data consumer Appendix - Tuning Your Backup and that Recov er y Application will check again for a full buffer. If a full buffer is still not available, the data consumer increments the Delay counter to indicate that it had to delay again while waiting for a full buffer. The data consumer Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm will repeat the delay and full buffer check steps until a full buffer is available. Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix F - Per for m ance Test Tech Note

Appendix G - NetisBacku p Per formin ance on algorithm: Windows This sequence summarized theTuning following I ndex List of Figur es while (Buffer_Is_Not_Full) { List of Tables ++Wait_Counter; List ofwhile Sidebars(Buffer_Is_Not_Full) {

++Delay_Counter; delay (DELAY_DURATION); }

< Day Day Up >

} If an empty buffer is needed by the data producer but is not available, the data producer increments the Wait and Delay counter to indicate that it had to wait for an empty buffer. After a delay, the data producer will check again for an empty buffer. If an empty buffer is still not available, the data producer increments the Delay counter to indicate that it had to delay again while waiting for an empty buffer. The data producer will relate the delay and empty buffer check steps until an empty buffer is available. The algorithm for a data producer has a similar structure: while (Buffer_Is_Not_Empty) { ++Wait_Counter; while (Buffer_Is_Not_Empty) {

++Delay_Counter; delay (DELAY_DURATION); } }

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e counter Ent er pr ise Analysis of the Wait and Delay values indicates which process, producer or consumer, has ISBN:0471227145 David Little David A. Chapa had to wait most by often andB.for howand long. John Wiley & Sons © 2003 (340 pages)

There are four basic Wait and Delay Counter relationships: This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, Consumer lim it ations, .and of t hehas ex isting Data Producer >> Data Thecapabilities data producer substantially larger Wait and Delay netthan wor k the infr data astr uctur e. counter values consumer.

The data consumer is unable to receive data fast enough to keep the data producer busy.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Investigate means to improve the performance of the data consumer. For a back up operation, Ta ble o f Con t en t s

check if the data buffer size is appropriate for the tape drive being used (see below).

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

If data consumer still has a substantially large value in this case, try increasing the number of shared data buffers to improve performance (see below).

I ntr oduction

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained Data Data Consumer. The producer and the data consumer have very similar Chapter 2 Producer - Business= Requirements of Back up data Systems

Wait Delay counter values, but those values are relatively large. Chapter 3 and - An I ntr odu ction to NetBackup Pa r t I I - Back up P roduct Tutor ia l

This may indicate that the data producer and data consumer are regularly attempting to use the - Evaluating Stor age Media Requir ements same shared data buffer. Try increasing the number of shared data buffers to improve Chapter 5 - Gener(see al Discussion performance below). on Configur ation Chapter 4 Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Data Producer = Data Consumer. The data producer and the data consumer have very similar - Gener al Tr oubleshooting Tips Wait and Delay counter values, but those values are relatively small.

Chapter 8 Chapter 9

- The Expanding Back up System

Pa r t I This I I - The Ente r pri se Ithere m pa ctis of Back up Sy ste mbetween s indicates that a good balance the

data producer and data consumer, which

Chapter 10 - yield The good Fut ureperformance of Backup should from the NetBackup server component of the NetBackup data Chapter 11 Maj or Players in the Backup Ar ena transfer path. Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y

Data Producer the cause of a bottleneck within the NetBackup data transfer path.

Determining Wait and Delay Counter Values Wait and Delay counter values can be found by creating and reading debug log files on the NetBackup media server. Note: NOTE Writing the debug log files introduces some additional overhead and will have a small impact on the overall performance of NetBackup. This impact will be more noticeable for a high verbose level setting. Normally, you should not need to run with debug logging enabled on a production system. To determine Wait and Delay counter values for a local client backup:

1. Activate debug logging by creating these two directories on the media server: < Day Day Up > \NetBackup\Logs\bpbkar \NetBackup\Logs\bptm I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

2. Execute your backup.

ISBN:0471227145 by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages) 3. Look at the log for the data producer (bpbkar32) process in: This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the \NetBackup\Logs\bpbkar ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

The line you are looking for should be similar to the following, and will have a timestamp corresponding to the completion time of the backup:

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s

… waited 224 times for empty buffer, delayed 254 times

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

In this example the Wait counter value is 224 and the Delay counter value is 254.

I ntr oduction

Pa r t 4. I - I Look nt r oduct ion log t o Ba up and r y in (bptm) the Ent er pr i se Env at the forckthe dataRecove consumer process in:ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

\NetBackup\Logs\bptm

Pa r t I I The - Back up you P roduct Tutor ia lfor line are looking

should be similar to the following, and will have a timestamp

Chaptercorresponding 4 - Evaluating Storcompletion age Media Requir to the time ements of the backup: Chapter 5

- Gener al Discussion on Configur ation

Chapter… 6 waited - Monitorfor in g the Backup Pr ocess1 times, delayed 22 times full buffer Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options ChapterIn8 this - example, Gener al Trthe oubleshooting Wait counter Tips value is 1 and the Delay counter value is 22. Chapter 9

- The Expanding Back up System

To determine Wait and Delay counter values for a remote client backup:

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

1. Activate by creating this directory on the media server Chapter 10 - Thedebug Fut urelogging of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix\NetBackup\Logs\bptm A - Com m and-Line I nter face Gu ide Appendix B - Glossar y

2. Execute yourYour backup. Appendix C - Tuning Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

3. Look at the log for the bptm process in:

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note

\NetBackup\Logs\bptm

Appendix G - Net Backu p Per form ance Tuning on Windows I ndex Delays associated with the data producer (bptm child) process will appear as follows: List of Figur es List of Tables

… waited for empty buffer 22 times, delayed 151 times, …

List of Sidebars

In this example, the Wait counter value is 22 and the Delay counter value is 151. parent) process will appear as: Delays associated with the data consumer < Day(bptm Day Up > … waited for full buffer 12 times, delayed 69 times In this example the Wait counter value is 12, and the Delay counter value is 69. To determine Wait and Delay counter values for a local client restore: 1. Activate logging by creating the following two directories on the NetBackup media server: \NetBackup\Logs\bptm and \NetBackup\Logs\tar

2. Execute your restore.

< Day Day Up >

3. Look at the log for the data consumer (tar32) process in: I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise \NetBackup\Logs\tar by David B. Little and David A. Chapa

ISBN:0471227145

The line you areWiley looking for should be similar John & Sons © 2003 (340 pages) to the following, and will have a timestamp corresponding the completion time of thethe restore: This to guide tak es r eaders thr ough necessar y steps of deploy ing ser v ices by showing how to addr ess the e, limbuffer it ations, and of t he ex isting … waitedar chitectur for full 27 capabilities times, delayed 79 times net wor k infr astr uctur e.

In this example, the Wait counter value is 27, and the Delay counter value is 79. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> 4. Look at the log for the data producer (bptm) process in: Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) \NetBackup\Logs\bptm I ntr oduction

line you looking for Recove shouldr be following, Pa r t I - The I nt r oduct ion are t o Ba ck up and y insimilar the Entto erthe pr i se Env ir onmand e nt

will have a timestamp

to the completion time of the Chaptercorresponding 1 - Backup and Recover y Sy st em Requir emrestore: ents Ex plained Chapter 2

- Business Requirements of Back up Systems empty buffer 1 times, delayed 68 times Chapter… 3 waited - An I ntrfor odu ction to NetBackup Pa r t I I - Back up P roduct Tutor ia l

In this- example, the Wait counter value is 1 and the delay counter value is 68. Evaluating Stor age Media Requir ements

Chapter 4

Chapter 5 - Gener Discussion Configur ation for a remote client restore: To determine Waital and Delay on counter values Chapter 6 - Monitor in g the Backup Pr ocess

1. Activate debug logging by creating the following directory on the media server:

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips Chapter \NetBackup\Logs\bptm 9 - The Expanding Back up System Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

2. Execute your restore.

Chapter 10 - The Fut ure of Backup Chapter 11 - at Majthe or log Players in thein: Backup Ar ena 3. Look for bptm Appendix A - Com m and-Line I nter face Gu ide Appendix\NetBackup\Logs\bptm B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application

4. Delays associated with the data consumer (bptm child) process will appear as follows: Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix… F waited - Per for m for ance Test Tech Note 36 times, delayed 139 times full buffer Appendix G - Net Backu p Per form ance Tuning on Windows I ndex In this example, the Wait counter value is 36 and the Delay counter value is 139. List of Figur es

Delays associated with the data producer (bptm parent) process will appear as follows:

List of Tables

List of Sidebars

… waited for emtpy buffer 95 times, delayed 513 times In this example the Wait counter value is 95 and the Delay counter value is 513. < Day Day Up >

Note: NOTE When you run multiple tests, you can rename the current log file. NetBackup will automatically create a new log file, which prevents you from erroneously reading the wrong set of values. Deleting the debug log file will not stop NetBackup from generating the debug logs. You must delete the entire directory. For example, to stop bptm logging, you must delete the bptm subdirectory. NetBackup will automatically generate debug logs at the specified verbose setting whenever the directory is detected.

Using Wait and Delay Counter Values to Analyze Problems

You can use the bptm debug log file to verify that the following tunable parameters have successfully < Day Day Up > been set to the desired values. You can use these parameters and the Wait and Delay counter values to analyze problems. These additional values include: I m plem t ingofBa cku pshared an d Reco y: Thcan e Rea ess on a line similar to: Data buffer size. Theensize each dataver buffer bedin found Gu id e f or t h e Ent er pr ise

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

… io_init: using 65536 data buffer size

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v The ices by showing how to addr the may be found on a line similar to: Number of data buffers. number of shared dataess buffers ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

… io_init: using 16 data buffers < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Parent/child Ta ble o f Con t en t s delay values . The values in use for the duration of the parent and child delays can

beent found on a line to:y—The Readiness Guide for the Enter pr ise I mplem ing Backup andsimilar Recover ( VERI TAS Ser ies) I ntr oduction … io_init: child delay = 20, parent delay = 30 (milliseconds) Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained NetBackup Media Server Network Buffer Size. The values in use for the Network Buffer Size Chapter 2 - Business Requirements of Back up Systems

parameter on the media server can be found on lines similar to these (may only be part of 4.5 - An I ntr odu ction to NetBackup debug log files):

Chapter 3

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4 receive - Evaluating Stor age Media Requir ements The network buffer is used by the bptm child process to read from the network during a Chapter 5 Gener al Discussion on Configur ation remote backup. Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options …setting receive network buffer to 263168 bytes

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter - The Expanding up System The9send network bufferBack is used by the bptm child process to write to the network during a remote Pa r t restore. I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena …setting send network buffer to 131072 bytes Appendix A - Com m and-Line I nter face Gu ide

See the Appendix B - section Glossaron y NetBackup Network Performance for more information about the Network Buffer parameter on the and media server. Appendix C Size - Tuning Your Backup Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Suppose you wanted to analyze a local backup in which there was a 30-minute data transfer duration baselined at 5 MB/sec with a total data transfer of 9,000 MB. Because a local backup is involved, if you Appendix F - Per for m ance Test Tech Note refer to the table under 'Roles of Processes during Backup and Restore Operations,' you can Appendix G that - Netbpbkar32 Backu p Per form on Windows determine is theance dataTuning producer and bptm is the data consumer. Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

I ndex

You List of would Figur esnext want to determine the Wait and Delay values for bpbkar32 and bptm by following the procedures List of Tables described in the section 'Determining Wait and Delay Counter Values.' For this example, suppose those values were: List of Sidebars PROCESS

WAIT

DELAY

bpbkar32

29364

58033

bptm

95

105

< Day Day Up >

Using these values, you can determine that the bpbkar32 process is being forced to wait by a bptm process which cannot move data out of the shared buffer fast enough. Next, you can determine time lost due to delays by multiplying the Delay counter value by the parent or child delay value, whichever applies. In this example, the bpbkar32 process uses the child delay value, while the bptm process uses the parent delay value. (The defaults for these values are 20 for child delay and 30 for parent delay.) The values are specified in milliseconds. See 'Parent/Child Delay Values' under the 'NetBackup Server Performance' section for more information on how to modify these values.

Use the following equations to determine the amount of time lost due to these delays: < Day Day Up > bpbkar32

= 58033 delays X 0.020 seconds = 1160 I m plem seconds en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

= 19 seconds by minutes David B. 20 Little and David A. Chapa

ISBN:0471227145

JohnXWiley Sons © 2003 (340 pages) bptm = 105 0.030& seconds This guide tak es r eaders thr ough the necessar y steps of = 3deploy seconds ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr that astr uctur e. This is useful in determining the delay duration for the bpbkar32 process is significant. If this

delay were entirely removed, the resulting transfer time of 10:40 (total transfer time of 30 minutes minus delay of 19 encoding= minutes and 208859seconds) < ?xm l version= " 1.0" " I SO1" ?> would indicate a throughput value of 14 Mb/sec, nearly a threefold increase. This type of performance increase would warrant expending effort to investigate Ta ble o f Con t en t s how the drive performance can beReadiness improved.Guide for the Enter pr ise I mplem enttape ing Backup and Recover y—The ( VERI TAS Ser ies)

The number of delays should be interpreted within the context of how much data was moved. As the amount of data moved increases, the significance threshold for counter values increases as well. Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt I ntr oduction

Chapter - Backup and Recover y Syofst 9,000 em Requir ents Ex plained Again, 1using the example of a total MB em of data being transferred, assume a 64 KB buffer size. Chapter 2 determine - Business up Systems You can theRequirements total numberofofBack buffers to be transferred using the following equation: Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Number_Kbytes

= 9,000 X 1024

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

= 9,216,000 - Gener al Discussion on KB Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

= oubleshooting 144,000 - Gener al Tr Tips

Chapter 9

- The Expanding Back up System

Number_Slots

= 9,216,000 / 64

The counter value can now expressed Pa r t I IWait I - The Ente r pri se I m pa ct of be Back up Sy ste mas s

a percentage of the total divided by the number of

buffers10 transferred: Chapter - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena

bpbkar32 = 29364 / 144,000 Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y

= 20.39%

Appendix C - Tuning Your Backup and Recov er y Application

bptm D - Disaster = 95 / 144,000 Appendix Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

= 0.07%

Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu Perpercent form ance on Windows In this example, in thep20 of Tuning cases where the bpbkar32 process needed an empty shared I ndex data buffer, that shared data buffer has not yet been emptied by the bptm process. A value this large List of Figuraesserious problem, and additional investigation would be warranted to determine why the indicates List data of consumer Tables (bptm) is having problems keeping up. List of Sidebars

In contrast, the delays experienced by bptm are insignificant for the amount of data transferred.

You can also view the Delay and Wait counters as a ratio: < Day Day Up >

bpbkar32

= 58033/29364 = 1.98

In this example, on average the bpbkar32 process had to delay twice for each wait condition that was encountered. If this ratio is substantially large, you may wish to consider increasing the parent or child delay value, whichever one applies, to avoid the unnecessary overhead of checking for a shared data buffer in the correct state too often. Conversely, if this ratio is close to 1, you may wish to consider reducing the applicable delay value to check more often and see if that increases your data throughput performance. Keep in mind that the parent and child delay values are rarely changed in most NetBackup installations. The preceding information explains how to determine if the values for Wait and Delay counters are

substantial enough for concern. The Wait and Delay counters are related to the size of data transfer. A < Day Day Up > value of 1,000 may be extreme when only 1 MB of data is being moved. The same value may indicate a well-tuned system when gigabytes of data are being moved. The final analysis must determine how these counters affect performance by considering such factors as how much time is being lost and m time plemaenprocess t ing Ba is cku p anforced d Recoto verdelay. y: Th e Rea din ess what percentage Iof being Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa

Common Restore John Wiley &Performance Sons © 2003 (340 pages)Issues

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of This section details performance problems often seen with restore actions.

deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting Improper Multiplex net wor k Settings. infr astr uctur If multiplexing e. is too high, needless tape searching may occur. The

ideal setting is the minimum needed to stream the drives. < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s Catalog Performance. The disk subsystem where the NetBackup catalog resides NetBackup I mplem entaing Backup andon Recover y—Theperformance Readiness Guide for the EnterTo pr ise has large impact the overall of NetBackup. improve restore performance, ( VERI TAS Ser ies)this subsystem for fast reads. configure I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Fragment Size. The fragment size affects where tape markers are placed and how many tape - Backup and Recover y Sy st em Requir em ents Ex plained markers are used. Fewer tape marks can slow recovers if a fast locate block is not available. SCSI Chapter 2 - Business Requirements of Back up Systems fast locate block positioning can help. A typical fragment size setting is 2048 MB. Chapter 1 Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

MPX_RESTORE_DELAY . NetBackup Chapter 4 - Evaluating Stor age setting Media Requir ements can perform multiple restores at the same time from The default Chapter 5 a-single Genermultiplexed al Discussiontape. on Configur ation delay setting is 30 seconds. If multiple restore requests are6 submitted within theBackup time window Chapter - Monitor in g the Pr ocessindicated by this delay setting, they will be considered as

candidates to be run same time, if Featur possible. This may be a useful parameter to change if Chapter 7 - Evaluating Ot at herthe Back up- Related es and Options multiple stripes from a large database backup are multiplexed together on the same tape. - Gener al Tr oubleshooting Tips

Chapter 8 Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup

< Day Day Up >

Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

m plem en t ingDevice Ba cku p an d Reco ver y: Th e Rea din ess NetBackupI Storage Performance Gu id e f or t h e Ent er pr ise

ISBN:0471227145 David B. Little and Davidwhen A. Chapa This section lists by some factors to consider you evaluate the storage device component of the John Wiley & Sons © 2003possible (340 pages)changes that may improve the overall performance NetBackup data transfer path to identify of NetBackup. This guide tak es r eaders thr ough the necessar y steps of

deploy ing ser v ices by showing how to addr ess the ar chitectur lim it ations, andefficiency capabilities t he exifisting Tape drive wear and tear ise,much less, and is of greater the data stream matches the tape netiswor k infr astrGenerally uctur e. drive capacity and sustained. speaking, most tape drives have much slower throughput than most disk drives. We recommend using no more than two high performance tape drives per SCSI/FC connection. The SCSI/FC connection should be able to handle both drives at the maximum < ?xm l version= " 1.0" encoding= " I SO- 88591" ?> rated throughput. Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise These are ( VERI TAS Sersome ies) of the factors which affect tape drives: I ntr oduction

Media Positioning. When a backup or restore is performed, the storage device must position the tape so- that the data is over the read/write head. Depending on the location of the data and the Chapter 1 Backup and Recover y Sy st em Requir em ents Ex plained overall performance of the media device, this can take a significant amount of time. When you Chapter 2 - Business Requirements of Back up Systems conduct performance analysis with media containing multiple images, it is important to account for Chapter 3 - An I ntr odu ction to NetBackup the time lag that occurs before the data transfer starts. Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements Tape If a tape device is being Chapter 5 Streaming. - Gener al Discussion on Configur ationused at its most efficient speed, it is said to be

streaming the data ontoBackup the tape. Generally speaking, if a tape device is streaming, there will be Chapter 6 - Monitor in g the Pr ocess little stopping and starting of theFeatur media. the media will be constantly spinning Chapter 7 physical - Evaluating Ot her Back up- Related es Instead and Options within tapealdrive. If the tape device Chapter 8 the - Gener Tr oubleshooting Tips is not being used at its most efficient speed, it may

continually start and stop the media from spinning. This behavior is the opposite of tape streaming - The Expanding Back up System and usually results in a poor data throughput rate. I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 9 Pa r t

Chapter 10 - The Fut ure of Backup Chapter Data 11 Compression. - Maj or Players Most in thetape Backup devices Ar ena support some form of data compression within the tape

device Highly compressible data Appendix A -itself. Com m and-Line I nter face Gu ide will yield a higher data throughput rate than incompressible dataBif -the tape ydevice supports hardware data compression. This will be true even if the tape Appendix Glossar device able toYour stream the data onto er the tape for both the highly compressible data and the Appendix C -isTuning Backup and Recov y Application incompressible Appendix D - Disasterdata. Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

Tape devices typically come with two performance values: Maximum Throughput Rate and Nominal Throughput Rate. The maximum throughput rate is based on how fast compressible data can be Appendix - Net Backu p Per formhardware ance Tuning on Windows written toG the tape drive when compression is enabled. The nominal throughput rates applies I ndex to less than ideal conditions. Appendix F - Per for m ance Test Tech Note

List of Figur es

In general, List of Tables if your hardware device supports compression, you may not want to use software compression List of Sidebars such as that available in NetBackup. If you do so, in some cases the size of the data as stored on the media may actually increase because the data has gone through more than one compression algorithm. However, there may still be other valid reasons to use the software compression in NetBackup, such as reducing the amount of data that must be transmitted across the < Day Day Up > network for a remote client backup.

< Day Day Up >

< Day Day Up >

Index

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

A

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of absolute pathnames, storage units, 74 deploy ing ser v ices by showing how to addr ess the

ar chitectur e, lim it ations, and capabilities of t he ex isting acsd command, 224 net wor k infr astr uctur e.

Activity Monitor bperror command, 97-98 < ?xm ldaemons, version= "98-99 1.0" encoding= " I SO- 8859- 1" ?> Ta blefields, o f Con t en t s 93-94 I mplem ing Backup and Recover y—The Readiness Guide for the Enter pr ise Jobent Details, 94-98 ( VERInon-zero TAS Ser ies) job details, 96-97 I ntr oduction performance evaluation, 297-298 Pa r t services, I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt 98-99 Chapter 1 - Backup96-97 and Recover y Sy st em Requir em ents Ex plained troubleshooting, Chapter 2

Business Requirements of Back up Systems ADIC, tape-library vendor, 50

Chapter 3

- An I ntr odu ction to NetBackup

agenda email, BIA (business impact analysis), 278

Pa r t I I - Back up P roduct Tutor ia l

agents,4embedded, 192-193 Chapter - Evaluating Stor age Media Requir ements Chapter 5 Software, - Gener alSecuritus Discussion on ConfigurVirtual ation Tape Library, 127 Alacritus Disk-Based Chapter 6 - Monitor in g the Backup Pr ocess

All Log Entries report, 102-104,297,299-301

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

ALL_LOCAL_DRIVES directive, policy settings, 85

Chapter 8

- Gener al Tr oubleshooting Tips alternate backup storage, 3 System Chapter 9 sites, - The Expanding Back up

Pa r t I I I - The backup, Ente r pri se I m pa ct of Back up Sy ste m s appliances, 194

Chapter 10 - The Fut ure of Backup

application availability, 10,14

Chapter 11 - Maj or Players in the Backup Ar ena

application failures, 8-9

Appendix A - Com m and-Line I nter face Gu ide

application troubleshooting importance, 134 Appendix B -functionality, Glossar y Appendix C -guides, Tuning troubleshooting Your Backup andsource, Recov er146-147 y Application application Appendix D -server, Disaster Recovery Planning Kit—Fr application using as a media server, 55om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

applications, performance tuning, 241-244

Appendix F - Per for m ance Test Tech Note

appointment confirmation BIATuning (business impact analysis), 277 Appendix G - Net Backu p Peremail, form ance on Windows I ndex architecture inventory, disaster recovery plan, 259 List of Figur es ASCII catalogs, maximum number of file calculations, 36 List of Tables

assessment team, 248,255-256

List of Sidebars

assumptions, disaster recovery plan, 250 ATL, tape library vendor, 50 < Day Day Up > < Day Day Up >

< Day Day Up >

Index

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

B

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of back window, NetBackup element, 40 deploy ing ser v ices by showing how to addr ess the

ar chitectur e, lim it ations, and capabilities of t he ex isting backup and recovery strategies net worneeds k infr astr uctur e. 169-179 additional resource determination, business requirements, 18 guidelines, < ?xm lcapacity version=planning " 1.0" encoding= " I SO-153-159 8859- 1" ?> concepts, 4-5 Ta ble o f Con t en t s frequency guidelines, 23-24 y—The Readiness Guide for the Enter pr ise I mplem ent ing Backup and Recover trends, ( VERIfuture TAS Ser ies) 183-185 information gathering, 11-15 I ntr oduction Pa r t legal I - I ntrequirements, r oduct ion t o Ba18 ck up and Recove r y in the Ent er pr i se Env ir onm e nt media Chapter 1 security, - Backup24-25 and Recover y Sy st em Requir em ents Ex plained off-site facility, 159-168 of Back up Systems Chapter 2 staging - Business Requirements off-site storage requirements, 25-26 Chapter 3 - An I ntr odu ction to NetBackup react versus respond, 152-153 Pa r t I I - Back up P roduct Tutor ia l retention guidelines, 24 Chapter 4 - Evaluating Stor age Media Requir ements

backup5and- replication, real-time Chapter Gener al Discussion onbackup, Configur187-191 ation Chapter - Monitorfuture in g thetrend, Backup backup6appliance, 194Pr ocess Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options backup hardware, backup strategy information gathering, 13

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Backup Policy Configuration Wizard, 78-86

backup Pa r t I I I - servers The Ente r pri se I m pa ct of Back up Sy ste m s lone-server advantages/disadvantages, 162-165 Chapter 10 - The Fut ure of Backup multiple-server Chapter 11 - Maj or advantages/disadvantages, Players in the Backup Ar ena 165-168 performance 241-244 Appendix A - Com tuning, m and-Line I nter face Gu ide Backup BStatus report, Appendix - Glossar y 103-104 Appendix C - Tuning Your media Backup considerations, and Recov er y Application backup window, storage 46-47 Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

backups block level, 118-119 Appendix - Per for m ance Test blockF level incremental, 15Tech Note Appendix G Net Backu p Per form ance Tuning on Windows cumulative incremental, 19,20 I ndexdefined, 3 List of Figur es incremental, 19, 20-21 differential List of Tables disk-image, 7 List of fileSidebars requirement calculations, 35-36 files,15 frequency guidelines, 23-24 frozen image, 119-123 < Day Day Up > full,8-9,19 incremental,8-9,19 intelligent, 193-194 mapped raw, 15 off-host, 15,123-124 off-site,125-127 personal computer users versus enterprise data, 5-6 raw, 15 raw partition, 7 raw volume, 7 real-time,187-191 report types, 104 retention guidelines, 24

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

synthetic,191-192 < Day Day Up > true image restore, 19,21-22 vault solutions, 125-127 virtual,185-187 I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess volume pool assignments, 26-27 volumes, 15 Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

BakBone Software, 118,127

ISBN:0471227145

beconv command, 220 This guide tak es r eaders thr ough the necessar y steps of deployonly, ing ser v ices by showing how to addr ess the behaviors, on demand 71 ar chitectur e, lim it ations, and capabilities of t he ex isting

bephyinv command, 220 net wor k infr astr uctur e. BIA. Seebusiness impact analysis

< ?xm version= " 1.0"Sheet, encoding= " I SO- 8859- 1" ?> BIAl Assessment 280-282 Ta ble o f Con t en t s

bit bucket, performance testing, 286-289

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise BLI Backup, block level backups, 118-119 ( VERI TAS Ser ies) I ntr oduction block level backups, Database Editions, 118-119 Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

block level incremental backups, advantages/disadvantages, 15

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

bp command, 216 - Business Requirements of Back up Systems bp, menu-driven interface, Chapter 3 - An I ntr odu ction88 to NetBackup Chapter 2

Pa r t I I - Back bpadm utilityup P roduct Tutor ia l

Chapter 4 -reports, Evaluating Stor age Media Requir ements backup 103-104 Chapter 5 - Gener described, 216 al Discussion on Configur ation Chapter menu-driven 6 - Monitor interface, in g the88-90 Backup Pr ocess Chapter 7 command, - Evaluating216, Ot her bparchive 220Back up- Related Featur es and Options Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

bpauthorize command, 216,220

bpauthsync 221 Pa r t I I I - The command, Ente r pri se I 216, m pa ct of Back up Sy ste m s Chapter bpbackup 10 command, - The Fut ure 216, of Backup 221 Chapter 11 - Maj or Players in the bpbackupdb command, 217, 221Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide

bpbkar32 utility, client performance tuning, 306

Appendix B - Glossar y

bpchangeprimary 217, 221 Appendix C - Tuningcommand, Your Backup and Recov er y Application bpclassnew 223 Planning Kit—Fr om End to Beginning Appendix D - command, Disaster Recovery Appendix E -command, Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm bpclclients 218,223 Appendix F - Per for m ance Test Tech Note

bpclient command, 217,221

Appendix G - Net Backu p Per form ance Tuning on Windows

bpclinclude command, 219,223

I ndex

bpclinfo command, 219,223 List of Figur es List of Tablescommand, 219, 223 bpclsched List of Sidebars

bpclschedrep command, 219,223 bpconfig command, 217,221 bpdbjobs command, 217,221-222

< Day Day Up >

bpdbm command, 217 bpduplicate command, 217,222 bpend_notify.bat script, client performance tuning, 305 bperror command, 97,217,222 bpexpdate command, 217,222 bpimagelist command, 218,222 bpimmedia command, 218,222 bpimport command, 218,222 bplabel command, 218,222 bplist command, 218,222

bpmedia command, 218,223

< Day Day Up >

bpmedialist command, 218,223 bpminlicense command, 218,223 I m plem en223 t ing Ba cku p an d Reco ver y: Th e Rea din ess bpplclients command, 218, Gu id e f or t h e Ent er pr ise

bppldelete command, 218,223

by David B. Little and David A. Chapa

ISBN:0471227145

bpplinclude command, 219,&223 John Wiley Sons © 2003 (340 pages) bpplinfo command, This219, guide 223tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the

bppllist command, 218,223e, lim it ations, and capabilities of t he ex isting ar chitectur net wor219, k infr astr uctur e. bpplsched command, 223 bpplschedrep command, 219,223 < ?xm l version= "command, 1.0" encoding= I SO- 8859- 1" ?> bppolicynew 219,"223 Ta ble o f Con t en t s

bprd command, 219

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) bprecover command, 219,223 I ntr oduction

bprestore command, 219,224

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

bpstart_notify.bat script, client performance tuning , 305 - Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 1

bpstaudd 219 Chapter 2 command, - Business 224, Requirements of Back up Systems Chapter 3 command, - An I ntr odu ction bpstudel 219, 224to NetBackup Pa r t I I - Back up P roduct Tutor ia l

bpstulist command, 219,224

Chapter 4

- Evaluating Stor age Media Requir ements

bpsturep command, 219,224 - Gener al Discussion on Configur ation bpverify6 command, 224Backup Pr ocess Chapter - Monitor 219, in g the Chapter 5

Chapter - Evaluating bridge, 7defined, 149 Ot her Back up- Related Featur es and Options Chapter 8

buffers

- Gener al Tr oubleshooting Tips

Chapter 9 308 - The Expanding Back up System clients, Pa r t communications, I I I - The Ente r pri se I m pa ct of Back up Sy ste m s 309

Chapter 10 server, - The Fut ure of Backup media 307-308 Chapter 11 - Maj or Players in the Backup Ar ena performance tuning, 242-243 Appendix A data, - Com309-311 m and-Line I nter face Gu ide shared Appendix B - Glossar y

business goals, tape backup purpose, 5

Appendix C - Tuning Your Backup and Recov er y Application

business impact analysis (BIA) agenda email, 278 Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm appointment confirmation email, 278 Appendix F - Per for m ance Test Tech Note assessment sheet, 280-282 Appendix G - Net Backu p Per form ance Tuning on Windows backup and recovery strategy element, 4 I ndexcontact list building, 273-274 List of Figur es270 defined, List of Tables recovery plan element, 251-252 disaster List of Sidebars meeting invitation, 277 discovery DR plan component, 270 email examples, 276-279 forms,279-282 < Day Day Up > identification phase, 272 Internet resources, 282-283 interview phase, 274-276 key components, 271 methodology,271 overall impact assessment sheet, 281-282 process steps, 270 reminder emails, 274 report generation, 276 scope,272-276 Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

business interruption, defined, 248 business policies, tape backup data retention, 5

business requirements < Day Day Up > data backup reason, 6-7 data retention timelines, 18 recovery point objectives, 18 m plem en t ing recovery time Iobjectives, 18 Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h(SLAs), e Ent er 18 pr ise service level agreements by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

business unit managers, backup and recovery concern emphasis, 4

business units, data Thissegregation guide tak es issues, r eaders 26-28 thr ough the necessar y steps of ing248 ser v ices by showing how to addr ess the business-critical, deploy defined, ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< Day Day Up > < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Index

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

C

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of calendar-based scheduling, policy configuration, 85 deploy ing ser v ices by showing how to addr ess the

chitecturplan, e, lim it260-263 ations, and capabilities of t he ex isting call tree, disasterarrecovery net wor k infr astr uctur e.

capacity planning charts, 153-159 cartridges,48-50,172-175

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Tacase ble ostudies f Con t en t s

frozen image backups, 122 y—The Readiness Guide for the Enter pr ise I mplem ent ing Backup and Recover companies, 27-28 ( VERIglobal TAS Ser ies) learning from other's errors, 13 I ntr oduction Pa r t restorability, I - I nt r oduct 246 ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

sample plan, and 248-249 Chapter 1 -DR Backup Recover y Sy st em Requir em ents Ex plained troubleshooting, 138-139 Chapter 2 - Business Requirements of Back up Systems Catalog3 Backup 86-88 Chapter - An I Wizard, ntr odu ction to NetBackup Pa r t I I - Back up P roduct Tutor ia l catalogs

Chapter 4 - Evaluating configuration, 86-88 Stor age Media Requir ements Chapter - Gener al Discussion on Configur ation data5 paths, 86-87 Chapter 6 - Monitor in g the34Backup Pr ocess default directory path, Chapter destinations, 7 - Evaluating 87 Ot her Back up- Related Featur es and Options

maximum number file calculations, Chapter 8 - Gener al Trof oubleshooting Tips 36 schedules, 87-88 Chapter 9 - The Expanding Back up System Pa r t I I I - The command, Ente r pri se I 220, m pa ct of Back up Sy ste m s cat_convert 224

Chapter 10 - The Fut ure of Backup

CD-ROM drives, unalterable backup uses, 3

Chapter 11 - Maj or Players in the Backup Ar ena

CDs, unalterable backup uses, 3

Appendix A - Com m and-Line I nter face Gu ide

central catalog repository, lone-server advantage/disadvantage, 162,165 Appendix B - Glossar y Appendix C - Tuning Your Backup and Recovadvantage, er y Application central configuration control, lone-server 163 Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

central processing units (CPUs), 37,302

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

charts, capacity planning, 153-159

Appendix F - Per for m ance Test Tech Note

cleaningGmedia, identifying, 76 ance Tuning on Windows Appendix - Net Backu p Per form I ndex CLI.Seecommand-line interface List of Figur es Client Backups report, 102-103 List of Tables

Client Location, client performance tuning, 306

List of Sidebars

Client tier, 31,34 client variables, performance tuning, 295-296 < Day Day Up > clients buffer size, 308 Client Location, 306 communications,312-313 configuration, 56 disk fragmentation, 305 Job Tracker, 305 NetBackup Notify Scripts, 305 NetBackup Software Location, 305 Open Transaction Manager (OTM), 305 performance testing, 286-287 performance tuning, 244,304-306 theoretical performance, 306 UNIX installation, 61

virus scanning, 305 Windows installation, 63

< Day Day Up >

command-line interface (CLI) described,88 I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess job monitoring, 100-101 Gu id e f or t h e Ent er pr ise UNIX commands, 216-220 ISBN:0471227145 by David B. Little and David A. Chapa

commands John Wiley & Sons © 2003 (340 pages) acsd,224 This guide tak es r eaders thr ough the necessar y steps of beconv,220 deploy ing ser v ices by showing how to addr ess the bephyinv,220 ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e. bp,216 bpadm,216 216,220 < ?xm lbparchive, version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta blebpauthorize, o f Con t en t s216, 220 bpauthsync, 216,221 I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERIbpbackup, TAS Ser ies) 216,221 bpbackupdb, 217,221 I ntr oduction Pa r t bpchangeprimary, I - I nt r oduct ion t o 217, Ba ck 221 up and Recove r y in the Ent er pr i se Env ir onm e nt bpclassnew, 223 and Recover y Sy st em Requir em ents Ex plained Chapter 1 - Backup bpclclients, 218,223Requirements of Back up Systems Chapter 2 - Business bpclient, 217, Chapter 3 - An I221 ntr odu ction to NetBackup 223Tutor ia l Pa r t bpclinclude, I I - Back up P219, roduct bpclinfo, 223 Stor age Media Requir ements Chapter 4 - 219, Evaluating bpclsched, 219,223 Chapter 5 - Gener al Discussion on Configur ation bpclschedrep, 219,223 Chapter 6 - Monitor in g the Backup Pr ocess bpconfig,217,221 Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options bpdbjobs,217,221-222 Chapter 8 - Gener al Tr oubleshooting Tips bpdbm,217 Chapter 9 - The Expanding Back up System bpduplicate, 217,222 Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s bperror,97,217,222 Chapter 10 - The Fut222 ure of Backup bpexpdate, 217, Chapter 11 Maj or Players bpimagelist,218,222 in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide bpimmedia, 218, 222 Appendix B - Glossar y bpimport, 218,222 Appendix C -218, Tuning bplabel, 222 Your Backup and Recov er y Application Appendix bplist,D218, - Disaster 222 Recovery Planning Kit—Fr om End to Beginning bpmedia, 223 I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix E - 218, Business bpmedialist, Appendix F - Per218, for m223 ance Test Tech Note bpminlicense, 218,223 Appendix G - Net Backu p Per form ance Tuning on Windows I ndexbpplclients, 218, 223 bppldelete, List of Figur es 218, 223 bpplinclude, 219,223 List of Tables bpplinfo, 219,223 List of Sidebars bppllist,218,223 bpplsched, 219,223 bpplschedrep,219,223 < Day Day Up > bppolicynew, 219,223 bprd,219 bprecover,219,223 bprestore,219,224 bpstaudd, 224,219 bpstudel,219,224 bpstulist,219,224 bpsturep, 219,224 bpverify,219,224 cat_convert,220,224 jbpSA,220 jnbSA,220 lmfcd,224 lmfd,224

ltid,225 < Day Day Up > nbdbsetport, 224 nbdbsetpw,224 nbdsetport, 220 nbdsetpw, 220I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise netstat,145-146 ISBN:0471227145 by David B. Little and David A. Chapa odld, 225 John Wiley & Sons © 2003 (340 pages) par, 148 This guide tak es r eaders thr ough the necessar y steps of pbclassnew,219 deploy ing ser v ices by showing how to addr ess the rsmd,225 ar chitectur e, lim it ations, and capabilities of t he ex isting stopltid,225 net wor k infr astr uctur e. tl4d,225 tl8cd, 225 < ?xm ltl8d, version= 225 " 1.0" encoding= " I SO- 8859- 1" ?> Ta bletldcd, o f Con t en t s 225 I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise tldd, 225 ( VERI TAS Ser ies) tlhcd, 225 I ntr oduction tlhd,225 Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt tlmd,225 Chapter 1 - Backup tpautoconf, 225 and Recover y Sy st em Requir em ents Ex plained Chapter 2 -226 Business Requirements of Back up Systems tpclean, Chapter 3 - 226 An I ntr odu ction to NetBackup tpconfig, Pa r t tpformat, I I - Back up 226P roduct Tutor ia l Chapter 4 226 - Evaluating Stor age Media Requir ements tpreq, Chapter tpunmount, 5 - Gener 226al Discussion on Configur ation truss, Chapter 6 148 - Monitor in g the Backup Pr ocess ts8d, Chapter 7 226 - Evaluating Ot her Back up- Related Featur es and Options tsdd, Chapter 8 226 - Gener al Tr oubleshooting Tips tshd, Chapter 9 226 - The Expanding Back up System Pa r t tusc, I I I - 148 The Ente r pri se I m pa ct of Back up Sy ste m s vmadd, Chapter 10 226 - The Fut ure of Backup vmadm, 226 Chapter 11 - Maj or Players in the Backup Ar ena vmchange, 226 Appendix A - Com m and-Line I nter face Gu ide vmcheck, 226 Appendix B - Glossar y vmd,227 Appendix C - Tuning Your Backup and Recov er y Application vmdelete,227 Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning vmoprcmd, 227 Appendix E -227 Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm vmpool, Appendix F Per for m ance Test Tech Note vmquery, 227 Appendix G Net Backu p Per form ance Tuning on Windows vmrule, 227 I ndexvmupdate,227 List of Figur es 220, 224 vopie_util, List of vopied, Tables220, 224 xbp, 220 List of Sidebars communications buffer size, 309 local clients, 312 remote clients, 312-313

< Day Day Up >

Compaq, tape library vendor, 50 complexity, lone-server advantage/ disadvantage, 163,165 compression, policy configuration, 83 contacts, disaster recovery plan call tree, 260-263 contractor contacts, disaster recovery plan call tree, 261 copies off-site storage element, 25-26 policy destination configuration, 85 copy-on-write snapshot, frozen image backups, 120-122

CPUs (central processing units), 37,302

< Day Day Up >

cross mount points, policy configuration, 82 cumulative incremental backups capacity planning, 156-157 I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess described,19,Gu 20 id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

Daythe Daynecessar Up > y steps of This guide tak es r eaders thr < ough deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Index

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

D

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of daemons deploy ing ser v ices by showing how to addr ess the Activity Monitor, 98-99 e, lim it ations, and capabilities of t he ex isting ar chitectur CLI (command-line monitoring, 100-101 net worinterface) k infr astr uctur e.

data availability, backup strategy information gathering, 14 < ?xm l version= data backups" 1.0" encoding= " I SO- 8859- 1" ?> Ta bleenterprise o f Con t enbackup ts requirements, 10 I mplem ent ing for, Backup reasons 6-10and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

data center, backup storage guidelines, 3

I ntr oduction

data performance issue, 322er pr i se Env ir onm e nt Pa r t I -compression, I nt r oduct ion ttape o Ba drive ck up and Recove r y in the Ent Chapter 1 - Backup and Recover y Sy st data locations, NetBackup element, 40em Requir em ents Ex plained Chapter 2 - Business Requirements of Back data management, NetBackup element, 39up Systems Chapter 3

- An I ntr odu ction to NetBackup

data manager integration, enterprise backup element, 10

Pa r t I I - Back up P roduct Tutor ia l

data relocation, tape backup purpose, 5 Chapter 4 - Evaluating Stor age Media Requir ements Chapter 5 - Gener data retention, 18 al Discussion on Configur ation Chapter 6 - Monitor in g the Backup Pr ocess data segregation, business units, 26-28 Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

data streams, policy configuration, 83

data transfer rates Chapter 9 - The Expanding Back up System

controllers, 38-39 Pa r t drive I I I - The Ente r pri se I m pa ct of Back up Sy ste m s network types, 41 Chapter 10 - topology The Fut ure of Backup tape drives by capacity, 48

Chapter 11 - Maj or Players in the Backup Ar ena

data transportation, backup Istrategy Appendix A - Com m and-Line nter face Gu ide information gathering, 14-15 Appendix B - Glossar y Appendix C - Tuning Your Backup and 296-297 Recov er y Application data variables, performance tuning, Appendix D agents, - Disaster database 118Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

Database Editions, block level backups, 118-119

Appendix F - Per for m ance Test Tech Note

databases Appendix G - Net Backu p Per form ance Tuning on Windows I ndexblock level backups, 118-119

poolDB (pool database), 54 volDB (volume database), 54 List of Tables volume updating, 75-76 List of Figur es

List of Sidebars

debug logs, default directory path, 34 dedicated backup networks, when to use, 177-179 dedicated media server, 55

< Day Day Up >

destinations catalog configuration, 87 policy configuration, 85 Device Configuration Wizard, 66-72 Device Discovery and Configuration Wizard, 64 device hosts, 67-68,169-172 devices CLI (command-line interface) monitoring, 100-101 configuration, 56 future trends, 194-195 media type/volume matching, 77

NetBackup configuration, 63-71 serialization support issues, 68-69

< Day Day Up >

differential incremental backups capacity planning, 155-156 I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess described,19,20-21 Gu id e f or t h e Ent er pr ise directives ISBN:0471227145 by David B. Little and David A. Chapa ALL_LOCAL_DRIVES, John Wiley85& Sons © 2003 (340 pages) NEW_STREAM, This85guide tak es r eaders thr ough the necessar y steps of SYSTEM_STATE, 85ing ser v ices by showing how to addr ess the deploy UNSET,86 ar chitectur e, lim it ations, and capabilities of t he ex isting UNSET_ALL,net 86 wor k infr astr uctur e. disaster, defined, 249 < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> disaster recovery (DR) Ta ble o f Con t en t s

data backup reason, 8

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise tape backup purpose, 5 ( VERI TAS Ser ies)

disaster recovery plan I ntr oduction 248 team, Pa r t assessment I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt assessment teamand positions, Chapter 1 - Backup Recover255-256 y Sy st em Requir em ents Ex plained assumptions, 250 Requirements of Back up Systems Chapter 2 - Business BIA3(business impact analysis), 251-252 Chapter - An I ntr odu ction to NetBackup

business interruption, 248 business-critical, 248 - Evaluating Stor age Media Requir ements call tree, 260-263 Chapter 5 - Gener al Discussion on Configur ation disaster,249 Chapter 6 - Monitor in g the Backup Pr ocess disaster declaration process, 252-253 Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options emergency on-call, 249 Chapter 8 - Gener al Tr oubleshooting Tips emergency on-call team, 254-255 Chapter 9 - The Expanding functional critical, 249 Back up System Pa r t infrastructure I I I - The Ente rinventory, pri se I m pa258-259 ct of Back up Sy ste m s Chapter 10 The Fut ure of Backup management team, 249 Chapter 11 - Maj or 249 Players in the Backup Ar ena mission-critical, Appendix A -246-247 Com m and-Line I nter face Gu ide models, Appendix B location, - Glossar 250-251 y off-site Appendix questions C - Tuning beforeYour declaring Backup a disaster, and Recov253 er y Application recovery 256-257 Appendix D - teams, Disaster249, Recovery Planning Kit—Fr om End to Beginning response teams, 253-255 Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm scope, Appendix F 249-250 - Per for m ance Test Tech Note teamGmeetings, 263 Appendix - Net Backu p Per form ance Tuning on Windows testing, 265-266 I ndex update procedures, 264-265 List of Figur es Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

discovery meeting invitation, BIA (business impact analysis), 277 List of Tables List of fragmentation, Sidebars disk client performance tuning, 305

disk load, monitoring, 303-304 disk mirroring, hardware failure protection method, 7

< Day Day Up >

disk staging, defined, 128 disk storage units, configuration, 71-72,74 disk-based devices, future trends, 194-195 disk-based storage units, 127-128 disk-image backups, Windows NT/2000, 7 documents, disaster recovery plan model, 246-247 Double-Take, replication software, 189-190 DR. Seedisaster recovery Drag and Drop, configuration, 69-70 drive controllers, data transfer rates, 38-39

drives, storage media considerations, 47-48< Day Day Up > duplex settings, performance tuning, 244 Duplication Suite, 125 I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Index

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

E

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of email, BIA (business impact analysis) examples, 276-279 deploy ing ser v ices by showing how to addr ess the

ar chitectur e, lim it192-193 ations, and capabilities of t he ex isting embedded agents, future trend, net wor k infr astr uctur e.

EMC TimeFinder, mirroring software, 123 EMC, block-level replication, 188-189

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> on-call, defined, 249 Taemergency ble o f Con t en ts I mplem emergency ent ing on-call Backupteam, and Recover disaster y—The recovery Readiness plan element, Guide for254-255 the Enter pr ise ( VERI TAS Ser ies)

enterprise backups all data backup requirement, 10 Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt application availability issues, 10 Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained data manager integration, 10 Chapter 2 - Business Requirements data protection requirements, 6 of Back up Systems Chapter 3 - An I ntr odu frequency issues, 10ction to NetBackup Pa r t location I I - Backmanagement up P roduct Tutor ia l issues, 11 Chapter 4 Evaluating Stor age Media Requir media management requirements, 10-11ements I ntr oduction

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

environmental events, backup protection methods, 3

error logs, troubleshooting uses, 136 - Evaluating Ot her Back up- Related Featur es and Options Ethernet ratings, 176 Chapter 8 networks, - Gener alspeed Tr oubleshooting Tips Chapter 7

Chapter 9 tape - The Expanding Exabyte, library vendor,Back 50 up System Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena < Day Day Up > Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Index

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

F

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of FalconStor, 118,188-189 deploy ing ser v ices by showing how to addr ess the

ar chitectur e, lim it ations, and capabilities of t he ex isting fields net93-94 wor k infr astr uctur e. Activity Monitor, Job Details, 95-96 < ?xm version= " 1.0" encoding= " I SO- 88591" ?> file ldirectives, policy configuration, 85-86 Ta ble o f Con t en t s

file transfer protocol (FTP), performance testing uses, 289

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise files,TAS dataSer backup advantages/disadvantages, 15 ( VERI ies) I ntr oduction files Pa r t image I - I nt r oduct ion t o Ba ck up and calculations, Recove r y in the Ent er pr i se Env ir onm e nt database requirement 35-36

Chapter 1 - Backup and307 Recover y Sy st em Requir em ents Ex plained NET_BUFFER_SZ, Chapter NET_BUFFER_SZ_REST, 2 - Business Requirements 307 of Back up Systems

NUMBER_DATA_BUFFERS, 310 Chapter 3 - An I ntr odu ction to NetBackup 310 Pa r t NUMBER_DATA_BUFFERS_RESTORE, I I - Back up P roduct Tutor ia l st.conf, Chapter 4 137 - Evaluating Stor age Media Requir ements syslog.conf, 144-146 Chapter 5 - Gener al Discussion on Configur ation Chapter 6 - Monitor in g the Backup Pr ocess FlashBackup, copy-on-write snapshot, 121-122 Chapter Evaluating Ot her analysis), Back up- Related Featur es and Options forms, 7BIA -(business impact 279-282 Chapter 8

- Gener al Tr oubleshooting Tips

formulas - The Expanding Back up System capacity planning, 154 Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s data cartridge requirements, 49 Chapter 10 - The Fut ure of Backup maximum number of files per backup type, 35-36 Chapter 9

Chapter 11 - Maj or Players in the Backup Ar ena

four-tiered architecture, NetBackup, 31-32

Appendix A - Com m and-Line I nter face Gu ide

frequency, 10,23-24 Appendix B -backup Glossarguidelines, y Appendix C - Tuning Your Backup and configuration, Recov er y Application frequency-based scheduling, policy 85 Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

frozen image backups

Appendix E - Business I mpact120-122 Analysis Planning Kit—The Stor m Befor e t he Calm copy-on-write snapshot, Appendix F -119 Per for m ance Test Tech Note defined, Appendix G -122-123 Net Backu p Per form ance Tuning on Windows mirrors, I ndex

frozen image clients, policy configuration, 82

List of Figur es

FTP (file transfer protocol), performance testing uses, 289

List of Tables

Fujitsu, tape library vendor, 50 List of Sidebars full backups application failure protection, 8-9 capacity planning, 154-155 < Day Day Up > described,19 maximum number of file calculations, 35-36 Fulldata Storage Checkpoints, block level backups, 119 functional critical, defined, 249 functionality, troubleshooting importance, 134

< Day Day Up >

< Day Day Up >

Index

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

G

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of GDM (Global Data Manager), 32,124-125 deploy ing ser v ices by showing how to addr ess the

ar chitectur Getting Started Wizard, 65 e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

Global Data Manager (GDM) tier, 32,124-125 glossary, 229-240

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> 5 Tagoals, ble o f tape Con t backups, en t s I mplem Gray House ent ing Solutions, Backup andDuplication Recover y—The Suite, Readiness 125 Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

< Day Day Up > - Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Index

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

H

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of hardware failures, 7-8 deploy ing ser v ices by showing how to addr ess the

ar chitectur lim it ations, and258-259 capabilities of t he ex isting hardware inventory, disastere,recovery plan, net wor k infr astr uctur e.

hierarchical storage management (HSM), 128 high-profile users, disaster recovery plan call tree, 260

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> block-level replication, 188-189 TaHitachi, ble o f Con t en t s

I mplem Hitachient Data ing Backup Systems and Shadow-Image, Recover y—The mirroring Readinesssoftware, Guide for 123 the Enter pr ise ( VERI TAS Ser ies)

home directories, troubleshooting example, 139-143

I ntr oduction

hostnames, diskion storage 74 Recove r y in the Ent er pr i se Env ir onm e nt Pa r t I - I nt r oduct t o Ba ckunit, up and Chapter HP Data 1 Protector, - Backup 199-202 and Recover y Sy st em Requir em ents Ex plained Chapter 2 library - Business Requirements of Back up Systems HP, tape vendor, 50 Chapter 3

- An I ntr odu ction to NetBackup

HP-UX BusinessCopy, mirroring software, 123

Pa r t I I - Back up P roduct Tutor ia l

HP-UX4system, syslog.conf file,Media 145 Requir ements Chapter - Evaluating Stor age Chapter HSM (hierarchical 5 - Gener al storage Discussion management), on Configur 128 ation Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

< Day Day Up >

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Index

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

I

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of IBM deploy ing ser v ices by showing how to addr ess the tape library vendor, 50 e, lim it ations, and capabilities of t he ex isting ar chitectur TSM (Tivoli Storage 127, net wor kManager), infr astr uctur e. 202-204

IBM FlashCopy, mirroring software, 123 < ?xm l version= " 1.0" encoding= " I SO- 8859image clients, policy configuration, 82 1" ?> Ta ble o f Con t en t s

image database, 34-39

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise image restores, ( VERI TAS Ser ies) policy configuration, 82 I ntr oduction Images on Media report, 102-103,108 Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

incremental backups - Backup and Recover y Sy st em Requir em ents Ex plained application failure protection, 8-9 Chapter 2 - Business Requirements of Back up Systems described, 19 Chapter 3 - An I ntr oduof ction to NetBackup 35-36 maximum number file calculations, Pa r t true I I - Back up restore P roductcalculations, Tutor ia l image 36 Chapter 1

Chapter 4

- Evaluating Stor age Media Requir ements

information services - Gener al Discussion on Configur ation enterprise backup integration issues, 10 Chapter 6 - Monitor in g the Backup Pr ocess tape backup purpose, 5 Chapter 5 Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Informix, hot backups, 118

Chapter 8

- Gener al Tr oubleshooting Tips infrastructure inventory, disaster recovery Chapter 9 - The Expanding Back up System plan, 258-259 Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s installation

Chapter 10 client, - The61 Fut ure of Backup UNIX Chapter UNIX 11 master - Maj or server, Players 57-61 in the Backup Ar ena

UNIXAmedia 61 I nter face Gu ide Appendix - Comserver, m and-Line Windows client, 63 Appendix B - Glossar y Windows masterYour server, 61-62 Appendix C - Tuning Backup and Recov er y Application Windows media server, 63 Planning Kit—Fr om End to Beginning Appendix D - Disaster Recovery Appendix intelligent E backups, - Business future I mpact trend, Analysis 193-194 Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note interfaces Appendix G - Net Backu p interface), Per form ance CLI (command-line 88Tuning on Windows I ndexNetBackup menu-driven, 88-90 List of Figur es

Internet, BIA resources, 282-283

List of Tables

inventory, disaster recovery plan, 258-259

List of Sidebars

IPStor, block-level replication, 188-189 < Day Day Up > < Day Day Up >

< Day Day Up >

Index

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

J

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of JavaGUI, UNIX startup, 64 deploy ing ser v ices by showing how to addr ess the

chitectur e, lim it ations, and capabilities of t he ex isting jbpSA command,ar220 net wor k infr astr uctur e.

jnbSA command, 220

Job Details, Activity Monitor, 94-98

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> field,t en Activity Monitor, 93 TaJob ble ID o f Con ts I mplem Job Tracker, ent ing Backup client performance and Recover y—The tuning,Readiness 305 Guide for the Enter pr ise ( VERI TAS Ser ies)

jobs, CLI (command-line interface) monitoring, 100-101

I ntr oduction

jobs configuration, 81 Recove r y in the Ent er pr i se Env ir onm e nt Pa r t I per - I ntpolicy, r oduct ion t o Ba ck up and Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems - An I ntr odu ction to NetBackup < Day Day Up >

Chapter 3

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Index

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

K

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of kernel, performance tuning, 243 deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e. < Day Day Up > < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Index

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

L

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of LeftHand Networks, filer-based storage solution, 127 deploy ing ser v ices by showing how to addr ess the

ar chitectur e, lim it ations, and capabilities of t he ex isting legal requirements net element, wor k infr astr backup strategy 18 uctur e. data backup reason, 9-10 < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Legato Systems Ta bledisk-based o f Con t en tstorage s solutions, 127 I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise NetWorker, 204-208 ( VERI TAS Ser ies)

libraries cleaning media identification, 76 Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt robotic tape, 50 Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained serialization support issues, 68-69 Chapter 2 Business Requirements of Back up Systems storage -unit configuration, 71-72 Chapter 3 An I ntr volume pools, 77odu ction to NetBackup I ntr oduction

Pa r t I I - Back up P roduct Tutor ia l

library sharing, versus SAN (storage area network), 115-116

Chapter 4

- Evaluating Stor age Media Requir ements List Client 103-104 Chapter 5 Backups - Gener alreport, Discussion on Configur ation Chapter 6 - Monitor in g the Backup Pr ocess lmfcd command, 224

Chapter 7 - Evaluating lmfd command, 224 Ot her Back up- Related Featur es and Options Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

local authorities, disaster recovery plan call tree, 261

local communications, 312 Pa r t I I Iclients, - The Ente r pri se I m pa ct of Back up Sy ste m s Chapter 10 - The Fut ure of Backup locations Chapter enterprise 11 - Maj backup or Players element, in the11 Backup Ar ena

off-site, Appendix A 250-251 - Com m and-Line I nter face Gu ide Appendix B - utility, Glossar y log analysis troubleshootinguses, 147 Appendix C - Tuning Your Backup and Recov er y Application

ltid command, 225

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note

< Day Day Up > Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Index

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

M

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of management team, defined, 249 deploy ing ser v ices by showing how to addr ess the

ar chitectur e, lim it ations, and capabilities mapped raw backups, advantages/ disadvantages, 15 of t he ex isting net wor k infr astr uctur e.

master server configuration, 54-55 < ?xm lpool version= " 1.0" (poolDB), encoding= "54 I SO- 8859- 1" ?> database Ta bleUNIX o f Con t en t s installation, 57-61 I mplem ent ing Recover using as aBackup mediaand server, 55 y—The Readiness Guide for the Enter pr ise ( VERIvolume TAS Serdatabase ies) (volDB), 54 I ntr oduction Windows installation, 61-62 Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Master tier - Backup and Recover y Sy st em Requir em ents Ex plained dedicated server, 34 Chapter 2 - Business Requirements of Back up Systems described, 31-32 Chapter 3 - An I ntr odu ction to NetBackup disk capacity requirements, 34 Pa r t NetBackup I I - Back up requirements, P roduct Tutor ia34 l Chapter 4 - Evaluating supported systems, Stor 37 age Media Requir ements Chapter 1

Chapter 5

- Gener al Discussion on Configur ation

MaxAttach, filer-based storage solution, 127

Chapter 6

- Monitor in g the Backup Pr ocess Maxtor's 127Ot her Back up- Related Featur es and Options Chapter 7 MaxAttach, - Evaluating

media. See storage media Chapter 8 -also Gener al Tr oubleshooting Tips physical issues, Back 24-25 Chapter 9 - security The Expanding up System types, Pa r t report I I I - The Ente104 r pri se I m pa ct of Back up Sy ste m s volume 26-27 Chapter 10 -pool Theassignments, Fut ure of Backup Chapter 11 - Maj or Players in the Backup Media Contents report, 102-103, 104,111Ar ena Appendix A Com m and-Line I nter face Gu ide Media Lists report, 102-103,106 Appendix B - Glossar y

Media Logs report, 102-103,109

Appendix C - Tuning Your Backup and Recov er y Application

media management, enterprisePlanning backupKit—Fr issues, Appendix D - Disaster Recovery om10-11 End to Beginning Appendix Media Manager E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

command-line display, Appendix F - Per for configuration m ance Test Tech Note 136 commands, Appendix G - Net224-227 Backu p Per form ance Tuning on Windows I ndexconfiguration troubleshooting, 136-137

NetBackup component responsibilities, 33 List of Figur es reports, List of Tables105

storage unit configuration, 72-73 volume configuration, 75-77

List of Sidebars

media multiplexing, policy configuration, 85 media positioning, tape drive performance issue, < Day 322 Day Up > Media Server tier, 31,34 media servers application server as, 55 buffer size, 307-308 catalog data paths, 86-87 configuration, 55-56 dedicated use, 55 master server as, 55 naming,66 parent/child delay values, 311 performance testing, 287-289 reports,105-106

restore performance issues, 321-322 < Day Day Up > SAN,55 shared data buffers, 309-311 UNIX installation, 61 I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess wait/delay counters, 312-321 Gu id e f or Windows installation, 63t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

Media Summary report, 102-103,107-108

ISBN:0471227145

Media Written report, 102-103, 110 This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the memory ar chitectur e, lim it ations, and capabilities of t he ex isting backup servernet component requirements, 37 wor k infr astr uctur e. usage monitoring, 302-303 menu-drive interfaces, NetBackup, 88-90

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> 122-123 Tamirrors, ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise mission-critical, defined, 249 ( VERI TAS Ser ies)

models, disaster recovery, 246-247

I ntr oduction

MS Pa r t I Exchange, - I nt r oducthot ion backups, t o Ba ck up 118 and Recove r y in the Ent er pr i se Env ir onm e nt Chapter 1 - Backup and Recover y Sy st em Requir em ents Ex plained MS SQLServer, hot backups, 118 Chapter - Business Requirements of Back up Systems 167 multiple2 points of recovery, multiple-server advantage, Chapter 3 - An I ntr odu ction to NetBackup Pa r t I I - Back up P roduct Tutor ia l

Chapter 4 Chapter 5

- Evaluating Stor age Media Requir ements < Day Day Up > - Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Index

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

N

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of NBAR (NetBackup Advanced Reporter), 111-112 deploy ing ser v ices by showing how to addr ess the

ar chitectur nbdbsetport command, 224e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

nbdbsetpw command, 224 nbdsetport command, 220

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> 220 Tanbdsetpw ble o f Concommand, t en t s I mplem NCVUent utility, ing Backup configuration and Recover verification, y—The 146 Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

NearStore, filer-based storage solution, 127

I ntr oduction

NEC, library Pa r t I - tape I nt r oduct ionvendor, t o Ba ck50 up and Recove r y in the Ent er pr i se Env ir onm e nt Chapter NetBackup 1 - Backup and Recover y Sy st em Requir em ents Ex plained

availability, 211 Chapter 2 - Business Requirements of Back up Systems backup 40 ction to NetBackup Chapter 3 -window, An I ntr odu configuration, Pa r t catalog I I - Backbackup up P roduct Tutor ia l

86-88

catalogs, Chapter 4 - 34 Evaluating Stor age Media Requir ements client 56 Chapter 5 configuration, - Gener al Discussion on Configur ation data6 locations, 40in g the Backup Pr ocess Chapter - Monitor

data management requirements, 39 - Evaluating Ot her Back up- Related Featur es and Options debug logs, 34 Chapter 8 - Gener al Tr oubleshooting Tips development history, 208-209 Chapter 9 - The Expanding Back up System device configuration, 56,63-71 Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s disk space requirement calculations, 34-39 Chapter 10 - The Fut ure of Backup domain layout, 33-41 Chapter 11 - Maj or Players in the Backup Ar ena FlashBackup, 121-122 Appendix A - Com m and-Line 31-32 I nter face Gu ide four-tiered architecture, Appendix B Glossar y hot backup support, 118 Appendix C database - Tuning Your Backup and Recov er y Application image requirements, 34-35 Appendix D - Disaster interfaces, 88-90 Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I211-212 mpact Analysis Planning Kit—The Stor m Befor e t he Calm key differentiators, Appendix mapped F - raw Per for backups, m ance Test 15 Tech Note master configuration, 54-55 Appendix G server - Net Backu p Per form ance Tuning on Windows I ndexmedia manager component responsibilities, 33 media server configuration, 55-56 List of Figur es methodology, 210 List of Tables netbackup component responsibilities, 33 List of Sidebars network performance tuning, 306-309 network speed, 40 performance evaluation methods, 297-301 < Day Day Up > performance measurements, 292-297 performance testing, 285-289 performance tuning, 241-244 policy configuration, 77-86 recovery principles, 210-211 reports,102-112 server performance tuning, 309-322 server variables, 293-295 SSO (Shared Storage Option), 117 storage unit configuration, 71-74 storage units, 54,56 system information, 33-34 UNIX client installation, 61 UNIX commands, 216-220 Chapter 7

UNIX master server installation, 57-61 < Day Day Up > UNIX media server installation, 61 volume configuration, 75-77 volume database (volDB), 54 I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess volume pool assignments, 26-27 Guinstallation, id e f or t h e 63 Ent er pr ise Windows client ISBN:0471227145 by David 220-224 B. Little and David A. Chapa Windows commands, John Wiley & Sons © 2003 (340 pages) Windows master server installation, 61-62 Thisserver guide installation, tak es r eaders Windows media 63thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the

NetBackup Advanced Reporter 111-112 ar chitectur e, lim(NBAR), it ations, and capabilities of t he ex isting net wor k infr astr uctur e. netbackup component, NetBackup responsibilities, 33 NetBackup for Oracle Advanced BLI Agent, 118-119 < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> NetBackup Notify Scripts, client performance tuning, 305 Ta ble o f Con t en t s

NetBackup Location, performance tuning, I mplem ent ingSoftware Backup and Recoverclient y—The Readiness Guide for 305 the Enter pr ise ( VERI TAS Ser ies) NetBackup Troubleshooting Guide, 112 I ntr oduction

NetBackup Vault, 125

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

NET_BUFFER_SZ tuning, 307 Chapter 1 - Backup file, and network Recover yperformance Sy st em Requir em ents Ex plained Chapter NET_BUFFER_ZE_REST, 2 - Business Requirements network ofperformance Back up Systems tuning, 307 Chapter - An I ntr145-146 odu ction to NetBackup netstat 3command, Pa r t I I - Back up P roduct Tutor ia l

NetVault, disk-based storage solution, 127

Chapter 4

- Evaluating Stor age Media Requir ements Network 127 Chapter 5 Appliance, - Gener al NearStore, Discussion on Configur ation Chapter network6 layouts, - Monitor backup in g the strategy Backupinformation Pr ocess gathering, 12-13 Chapter - Evaluating Ot her Back up-tuning, Related306-307 Featur es and Options network7 load, network performance Chapter 8 - Gener al Tr oubleshooting Tips

network locations, enterprise backup element, 11

Chapter 9

- The Expanding Back up System

network speed, Pa r t I I I - The EnteNetBackup r pri se I m paelement, ct of Back40 up Sy ste m s Chapter network10topology, - The Fut data ure transfer of Backup rates, 41 Chapter - Maj or performance Players in the Backup Ar ena network11variables, tuning, 295 Appendix A - Com m and-Line I nter face Gu ide

NetWorker,204-208

Appendix B - Glossar y

networks, Appendix C performance - Tuning Yourtuning, Backup306-309 and Recov er y Application NEW_STREAM directive, policy settings, 85 om End to Beginning Appendix D - Disaster Recovery Planning Kit—Fr Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm NFS filesystems, policy configuration, 82 Appendix F - Per for m ance Test Tech Note

Nodata Storage Checkpoints, Proxy copy BLI backups, 119

Appendix G - Net Backu p Per form ance Tuning on Windows

non-zero job details, Activity Monitor, 96-97

I ndex

NSIofSoftware, List Figur es Double-Take, 189-190 List of Tables NUMBER_DATA_BUFFERS file, server performance tuning, 310 List of Sidebars

NUMBER_DATA_BUFFERS_ RESTORE file, server performance tuning, 310

< < Day Day Day Day Up Up > >

< Day Day Up >

Index

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

O

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of odld command, 225 deploy ing ser v ices by showing how to addr ess the

off-host backups ar chitectur e, lim it ations, and capabilities of t he ex isting net copy) wor k infr astr uctur e. 3PC (third-party devices, 123 advantages/disadvantages,15 < ?xm ldefined, version=123 " 1.0" encoding= " I SO- 8859- 1" ?> policy configuration, 81 Ta ble o f Con t en t s I mplem ing Backup and Recover y—The Readiness Guide for the Enter pr ise off-siteent backups, 125-127 ( VERI TAS Ser ies)

off-site, defined, 251

I ntr oduction

off-site location, disaster recovery plan element, Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the 250-251 Ent er pr i se Env ir onm e nt Chapter - Backup and Recover y Sy st em Requir em ents Ex plained off-site 1staging facility, backup strategies, 159-168 Chapter - Business Requirements of Back25-26 up Systems off-site 2storage, backup strategy element, Chapter 3

- An I ntr odu ction to NetBackup

on demand only behavior, storage units, 71

Pa r t I I - Back up P roduct Tutor ia l

Open Transaction Manager (OTM), performance tuning, 305 Chapter 4 - Evaluating Stor age Mediaclient Requir ements Chapter 5 systems, - Gener alduplex Discussion on Configur operating settings, 244 ation Chapter - Monitor in g the Backup Pr ocess Oracle,6118-119 Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

OTM (Open Transaction Manager), client performance tuning, 305

Overall9Impact Sheet, BIA, 281-282 Chapter - TheAssessment Expanding Back up System Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup < Day Day Up > Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Index

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

P

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of par command, 148 deploy ing ser v ices by showing how to addr ess the

chitecturmedia e, lim itserver ations,performance and capabilities of t he311 ex isting parent/child delayarvalues, tuning, net wor k infr astr uctur e.

pbclassnew command, 219

Performance Monitor, system component evaluations, 301-304

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Taperformance ble o f Con t entesting ts

clients, 286-287 I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise to the bit-bucket, 286-289 ( VERIdumping TAS Ser ies) FTP uses, 289 I ntr oduction Pa r t NetBackup, I - I nt r oduct285-289 ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

servers, Chapter 1 -287-289 Backup and Recover y Sy st em Requir em ents Ex plained Chapter performance 2 - Business tuning Requirements of Back up Systems

client Chapter 3 variables, - An I ntr 295-296 odu ction to NetBackup 304-306 Pa r t clients, I I - Back up P roduct Tutor ia l CPU4 load monitoring, 302 Chapter - Evaluating Stor age Media Requir ements data5 variables, 296-297 Chapter - Gener al Discussion on Configur ation described, 241-244 Chapter 6 - Monitor in g the Backup Pr ocess

disk7load Chapter - monitoring, Evaluating Ot303-304 her Back up- Related Featur es and Options media servers, 309-322 - Gener al Tr oubleshooting Tips memory use monitoring, 302-303 Chapter 9 - The Expanding Back up System NetBackup measurements, 292-297 Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s NetBackup network, 306-309 Chapter 10 - The Fut ure of Backup network variables, 295 Chapter 11 - Maj or Players in the Backup Ar ena performance evaluation, 297-301 Appendix A - Com m and-Line I nter face Gu ide server variables, 293-295 Appendix B -components, Glossar y system 301-304 Chapter 8

Appendix C - Tuning Your Backup and Recov er y Application

personal computer users, versus enterprise data backup, 5-6

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

physicalEsecurity, backup media, 24-25 Appendix - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix point-in-time F - Per snapshots, for m ancereal-time Test Techbackups, Note 190-191 Appendix policies G - Net Backu p Per form ance Tuning on Windows I ndexactive. go into effect at, 81 List of Figurfrozen es allow image clients, 82 List of Tables allow multiple data streams, 83 List of calendar-based Sidebars scheduling, 85

collect true image restore information, 82 compression,83 configuration, 77-86 cross mount points, 82 destination settings, 85 file directives, 85-86 follow NFS, 82 frequency-based scheduling, 85 limit jobs per policy, 81 media multiplexing, 85 naming conventions, 77 offhost backup method, 81 retention configuration, 85 rotation settings, 79-80 schedules,83-86

< Day Day Up >

tape backup data retention, 5 timelines,80 type selections, 77-79

< Day Day Up >

pool database (poolDB), NetBackup, 54

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess

poolDB (pool database), NetBackup, 54ise Gu id e f or t h e Ent er pr

David B. Little and David A. Chapa Problems report, by 102-104

ISBN:0471227145

John Wiley & Sons © 2003 (340 pages)

problem-solving questions, troubleshooting, 137

This guide tak es r eaders thr ough the necessar y steps of

properties, storage units, deploy ing72-73 ser v ices by showing how to addr ess the

ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e. < Day Day Up > < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Index

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

Q

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

guide tak es r eaders thr ough the necessar y steps of Quantum DX-30,This disk-based storage unit, 127 deploy ing ser v ices by showing how to addr ess the

ar chitectur e, lim it ations, and capabilities of t he ex isting questions net wor k infr astr uctur e. capacity planning, 153 disaster declarations, 253 137 < ?xm ltroubleshooting, version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) < Day Day Up > I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Index

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

R

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of RAID5, troubleshooting example, 139-143 deploy ing ser v ices by showing how to addr ess the

ar chitectur raw backups, defined, 15 e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

raw partition backups, 7

raw volume backups, hardware failure protection method, 7

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> backups, 187-191 Tareal-time ble o f Con t en t s

I mplem recovery. ent ing SeeBackup disasterand recovery Recover plan y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

recovery goals, tape backup purpose, 5

I ntr oduction

Recovery Manager Agent interface, 119ir onm e nt Pa r t I - I nt r oduct ion t (RMAN), o Ba ck up Advanced and RecoveBLI r y in the Ent er pr i se Env Chapter recovery 1 point - Backup objectives, and Recover business y Syrequirement, st em Requir em 18ents Ex plained Chapter 2 requirements, - Business Requirements of Back up Systems recovery 14,19 Chapter 3

- An I ntr odu ction to NetBackup

recovery team, 249,256-257

Pa r t I I - Back up P roduct Tutor ia l

recovery objectives, business requirement, 18 Chapter 4 time - Evaluating Stor age Media Requir ements Chapter regulatory 5 policies, - Gener altape Discussion backupon data Configur retention, ation 5 Chapter 6 - Monitor in gdelay the Backup Pr ocess relationships, wait and counter, 314-315 Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

remote clients, communications, 312-313

reports9 Chapter

- The Expanding Back up System

advanced,110-112 All Log Entries, 103-104,297,299-301 Chapter 10 - The Fut ure of Backup Backup Status, 103-104 Chapter 11 - Maj or Players in the Backup Ar ena backup types, 104 Appendix A - Com m and-Line I nter face Gu ide bpadm reports, 103-104 Appendix B - Glossar y Client Backups, 102-103 Appendix C - Tuning Your Backup and Recov er y Application Images on Media, 102-103,108 Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning List Client Backups, 103-104 Appendix E Business I mpact Analysis Media Contents, 102-103,104,111Planning Kit—The Stor m Befor e t he Calm Appendix F Lists, - Per 102-103, for m ance 106 Test Tech Note Media Appendix G Logs, - Net Backu p Per form ance Tuning on Windows Media 102-103, 109 I ndexMedia Manager, 105 List of media Figur es server, 105-106 Media Summary, 102-103,107-108 List of Tables media types, 104 List of Sidebars Media Written, 102-103,110 NBAR (NetBackup Advanced Reporter), 111-112 Problems, 102-104 < Day Day Up > Status of Backups, 102-103 tape states, 107 Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

resources, BIA (business impact analysis), 282-283 response team, 249,253-255 restore actions, performance issues, 321-322 retention backup strategy element, 24 policy configuration, 85 review email, BIA (business impact analysis), 279 RMAN (Recovery Manager), Advanced BLI Agent interface, 119 roles, tape backups, 5-6

rotation, policy configuration, 79-80

< Day Day Up >

router, defined, 149 rsmd command, 225 I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Index

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

S

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of SAN (storage area network) deploy ing ser v ices by showing how to addr ess the 115-117 backup and restore environment, ar chitectur e, lim it ations, and capabilities of t he ex isting backup strategy 14 net information wor k infr astrgathering, uctur e. versus library sharing, 115-116 SSO (Shared Storage Option), 117 < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> when to use, 178-179 Ta ble o f Con t en t s

SAN media I mplem ent ing server, Backup 55 and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) scalability I ntr oduction lone-server advantage, 163 Pa r t multiple-server I - I nt r oduct ion advantage, t o Ba ck up and 167Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

scanning hosts, configuration, 67

schedules - An I ntr odu ction to NetBackup catalogs, 87-88 Pa r t I I - Back up P roduct Tutor ia l policy configuration, 83-86 Chapter 3 Chapter 4

- Evaluating Stor age Media Requir ements

scope 5 Chapter

- Gener al Discussion on Configur ation

BIA6(business impact analysis), 272-276 Chapter - Monitor in g the Backup Pr ocess

disaster plan, 249-250 Chapter 7 - recovery Evaluating Ot her Back up- Related Featur es and Options scripts 8 Chapter

- Gener al Tr oubleshooting Tips

bpend_notify.bat, 305 Back up System Chapter 9 - The Expanding 305 Pa r t bpstart_notify.bat, I I I - The Ente r pri se I m pa ct of Back up Sy ste m s NetBackup Notify, 305 Chapter 10 - The Fut ure of Backup troubleshooting information Chapter 11 - Maj or Players in thegathering, Backup Ar 146 ena Appendix securedAsegregation, - Com m and-Line multiple-server I nter face Gu advantage, ide 167 Appendix B Disk-Based - Glossar y Virtual Tape Library, 127 Securitus Appendix C - Tuning Your Backup and Recov er y Application

security, backup media, 24-25

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

serialization, device support Appendix E - Business I mpact issues, Analysis68-69 Planning Kit—The Stor m Befor e t he Calm server variables, performance tuning, 293-295 Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per(SLAs), form ance Tuning on Windows service level agreements 9,18 I ndex

services, Activity Monitor, 98-99

List of Figur es

shared data buffers backup/restore operation processes, 313-315 List of Sidebars server performance tuning, 309-311 List of Tables

Shared Storage Option (SSO), 117 single point of administration, lone-server advantage, < Day Day 162 Up > single point of failure, lone-server disadvantage, 164 SLAs (service level agreements), 9,18 software inventory, disaster recovery plan, 259 Solaris system minimum kernel settings, 243 syslog.conf file, 144-145 solid-state devices, future trends, 194-195 Sony, tape library vendor, 50 Spectra Logic, tape library vendor, 50 speed ratings, Ethernet networks, 176

SSO (Shared Storage Option), 117

< Day Day Up >

st.conf file, troubleshooting, 137 State field, Activity Monitor, 93 I m Monitor, plem en t 94 ing Ba cku p an d Reco ver y: Th e Rea din ess Status field, Activity Gu id e f or t h e Ent er pr ise

Status of Backups report, 102-103

by David B. Little and David A. Chapa

ISBN:0471227145

stopltid command, 225Wiley & Sons © 2003 (340 pages) John storage access, lone-server This guide tak advantage, es r eaders 163 thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the

storage area network (SAN)e, lim it ations, and capabilities of t he ex isting ar chitectur 115-117 backup and restore net worenvironment, k infr astr uctur e. backup strategy information gathering, 14 versus library sharing, 115-116 < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> SSO (Shared Storage Option), 117 Ta ble o f Con t en t s when to use, 178-179

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise storage ( VERI TAS media. Ser ies) See also media

backup window considerations, 46-47 I ntr oduction capacity Pa r t cartridge I - I nt r oduct ion t o issues, Ba ck up 48-50 and Recove r y in the Ent er pr i se Env ir onm e nt data1 transfer rates, Chapter - Backup and47-48 Recover y Sy st em Requir em ents Ex plained determination factors, 45-46 Chapter 2 - Business Requirements of Back up Systems drive type considerations, 47-48 - An I ntr odu ction to NetBackup robotic tape libraries, 50

Chapter 3

Pa r t I I - Back up P roduct Tutor ia l

Storage4 Migrator, HSM Stor (hierarchical management), 128,129-130 Chapter - Evaluating age Mediastorage Requir ements Chapter - Gener al Discussion on Configur ation storage5 units Chapter 6 - pathname, Monitor in g the absolute 74 Backup Pr ocess Chapter configuration, 7 - Evaluating 56,71-74 Ot her Back up- Related Featur es and Options

defined, Chapter 8 -54 Gener al Tr oubleshooting Tips on demand behavior, 71up System Chapter 9 - Theonly Expanding Back configuration, 71-72, 74 up Sy ste m s Pa r t disk I I I - type The Ente r pri se I m pa ct of Back disk-based, 127-128 Chapter 10 - The Fut ure of Backup hostnames, Chapter 11 - Maj74 or Players in the Backup Ar ena library 71-72 Appendix A configuration, - Com m and-Line I nter face Gu ide

maximum concurrent drives property, 73 maximum fragment size property, 73 Appendix C - Tuning Your Backup and Recov er y Application maximum multiplexing per drive property, 73 Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning media manager configuration, 72-73 Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm properties,72-73 Appendix F - Per for m ance Test Tech Note type attributes, 71 Appendix B - Glossar y

Appendix G - Net Backu p Per form ance Tuning on Windows

StorageTek, tape library vendor, 50

I ndex

Sybase, hot List of Figur es backups, 118 List of Tables troubleshooting, 134-135 symptoms, List of Sidebars synthetic backups, future trend, 191-192

syslog.conf file, troubleshooting, 144-146 system components, performance tuning, 301-304 < Day Day Up > system identification, backup strategy information gathering, 12 SYSTEM_STATE directive, policy settings, 85

< Day Day Up >

< Day Day Up >

Index

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

T

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

tape backups, 5-6This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the

ar chitectur e, lim it ations, and capabilities of t he ex isting tape drives net wor k infr astr uctur172-175 e. additional needs determinations, cartridge capacity issues, 48-50 compression, 322 " I SO- 8859- 1" ?> < ?xm ldata version= " 1.0" encoding= data transfer rates/capacities, 48 Ta ble o f Con t en t s media positioning, 322 I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise tape ( VERIrobotic TAS Ser ies) libraries, 50 tape streaming, 322 I ntr oduction Pa r t I -libraries, I nt r oduct ion t o Baguidelines, ck up and Recove tape selection 50 r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

tape streaming, tape drive performance issue, 322

tape technologies, additional needs determinations, 175 - An I ntr odu ction to NetBackup

Chapter 3

tapes, Pa r t I I - states, Back up107 P roduct Tutor ia l Chapter 4 - Evaluating age Media ements team meetings, disasterStor recovery planRequir call tree, 263 Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

terms, 229-240

testing, disaster recovery plan, 265-266 - Evaluating Ot her Back up- Related Featur es and Options third-party (3PC) offhost backups, 123 Chapter 8 copy - Gener al Trdevices, oubleshooting Tips Chapter 7

Chapter 9 timelines

- The Expanding Back up System

Pa r t backup I I I - Theretention, Ente r pri se 24I m pa ct of Back up Sy ste m s

Chapter - The Fut data10retention, 18ure of Backup Chapter off-site 11 storage - Maj or Players element, in 26 the Backup Ar ena

policyA activation, 81 Appendix - Com m and-Line I nter face Gu ide policyB configuration, 80 Appendix - Glossar y Appendix C -database Tuning Your Backup TimeMark, agent, 118 and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Tivoli Storage Manager (TSM), 127,202-204

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

tl4d command, 225

Appendix F - Per for m ance Test Tech Note

tl8cd command, 225 p Per form ance Tuning on Windows Appendix G - Net Backu I ndex tl8d command, 225 List of Figur es tldcd command, 225 List of Tables

tldd command, 225

List of Sidebars

tlhcd command, 225 tlhd command, 225 tlmd command, 225 tools, troubleshooting, 148-149 tpautoconf command, 225 tpclean command, 226 tpconfig command, 226 tpformat command, 226 tpreq command, 226 tpunmount command, 226 Troubleshooter Wizard, 96-97 troubleshooting application guide as source, 146-147

< Day Day Up >

application understanding importance, 134 < Day Day Up > home directories, 139-143 information gathering techniques, 146 Media Manager configuration, 136-137 I m plem en145-146 t ing Ba cku p an d Reco ver y: Th e Rea din ess netstat command uses, Gu id e f or 134-135 t h e Ent er pr ise problem determination, ISBN:0471227145 by David B. Little problem-solving questions, 137and David A. Chapa John Wiley & Sons © 2003 (340 pages) progression steps, 136-138 This guide tak es r eaders thr ough the necessar y steps of RAID5,139-143 deploy ing ser v ices by showing how to addr ess the restore performance issues, 321-322 ar chitectur e, lim it ations, and capabilities of t he ex isting st.conf file, 137 net wor k infr astr uctur e. symptoms, 134-135 syslog.conf file, 144-146 < ?xm ltools, version= " 1.0" encoding= " I SO- 8859- 1" ?> 148-149 Ta blewhen o f Con en t s professional support, 144-146 tot seek I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise Windows NT/2000 example, 139-143 ( VERI TAS Ser ies)

true image restore, 36,19,21-22

I ntr oduction

truss 148 Pa r t I -command, I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt Chapter 1 - Backup ts8d command, 226 and Recover y Sy st em Requir em ents Ex plained Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

tsdd command, 226 tshd command, 226

Pa r t I I - Back up P roduct Tutor ia l

TSM (Tivoli Manager), 127,202-204 Chapter 4 - Storage Evaluating Stor age Media Requir ements Chapter 5 - Gener al Discussion on Configur ation tusc command, 148 Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Type field, Activity Monitor, 93

< Day Day Up >

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Index

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

U

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

UNIX systems This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the administrativearinterface method, chitectur startup e, lim it ations, and64 capabilities of t he ex isting client installation, 61k infr astr uctur e. net wor client performance testing, 287 master server installation, 57-61 < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Media Manager commands, 224-227 Ta ble o f Con t en t s media server installation, 61 I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise NetBackup commands, 216-220 ( VERI TAS Ser ies) NetBackup configuration startup method, 64 I ntr oduction raw partition backups, 7 Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt syslog.conf file, 144-146 Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

UNSET2 directive, policy settings, 86of Back up Systems Chapter - Business Requirements Chapter UNSET_ALL 3 - An directive, I ntr odu ction policytosettings, NetBackup 86 Pa r t I I - Back up P roduct Tutor ia l updates, disaster recovery plan

element, 264-265

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7 Chapter 8

- Evaluating Ot her Back up- Related Featur es and Options < Day Day Up > - Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

user errors, data backup reason, 9

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Index

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

V

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of vault solutions, 125-127 deploy ing ser v ices by showing how to addr ess the

chitectur e, lim it ations, and capabilities of t he ex isting vendor contacts, ar disaster recovery plan, 262-263 net wor k infr astr uctur e.

VERITAS Database Edition for Oracle, 118-119 VERITAS NetBackup DataCenter 4.5

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Media Manager Device Configuration Guide 63 Ta ble o f Con t en t s

VERITAS Software I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERIdisk-based TAS Ser ies)storage solutions, 127 GDM (Global Data Manager), 124-125 I ntr oduction utility, 147 Pa r t log I - I analysis nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt mapped backups, 15 Chapter 1 - raw Backup and Recover y Sy st em Requir em ents Ex plained NetBackup development history,of208-209 Chapter 2 - Business Requirements Back up Systems NetBackup Vault, 125 - An I ntr odu ction to NetBackup Storage Migrator, 128,129-130 Volume Replicator, 188-189 Chapter 4 - Evaluating Stor age Media Requir ements VxVM mirrors, 122-123,186 Chapter 5 - Gener al Discussion on Configur ation Zero-Impact Backup Enable support, 118 Chapter 3

Pa r t I I - Back up P roduct Tutor ia l

Chapter 6

- Monitor in g the Backup Pr ocess virtual backups, future trend, Chapter 7 - Evaluating Ot her 185-187 Back up- Related Featur es and Options

virus scanning, client performance Chapter 8 - Gener al Tr oubleshootingtuning, Tips 305 Chapter - The Expanding Back up System vmadd 9command, 226 Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

vmadm command, 226

Chapter 10 - The Fut ure of Backup

vmadm, interface, Chapter 11menu-driven - Maj or Players in the 88 Backup Ar ena vmchange 226 I nter face Gu ide Appendix A -command, Com m and-Line Appendix - Glossar y 226 vmcheckB command, Appendix C - Tuning Your Backup and Recov er y Application

vmd command, 227

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

vmdelete command, 227

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

vmoprcmd 227 Appendix F -command, Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows vmpool command, 227 I ndex

vmquery command, 227

List of Figur es

vmrule command, 227

List of Tables

vmupdate command, 227 List of Sidebars volDB (volume database), NetBackup, 54 Volume Configuration Wizard, 75-77 volume database (volDB), NetBackup, 54

< Day Day Up >

volume pools, 26-27,77 Volume Replicator, block-level replication, 188-189 volumes cleaning media identification, 76 configuration, 75-77 data backup advantages/disadvantages, 15 media type matching, 77 volume pools, 77 vopie_util command, 220,224 vopied command, 220,224 VxFS Storage Checkpoint facility, block level backups, 118-119

VxVM mirrors, 122-123,186

< Day Day Up >

< Day Day Up > I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Index

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

W

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of wait/delay counters deploy ing ser v ices by showing how to addr ess the 312-331 media server performance tuning, ar chitectur e, lim it ations, and capabilities of t he ex isting problem analysis uses, 318-321 net wor k infr astr uctur e. relationships, 314-315 value determinations, 315-318

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> TaWeb ble osites f Con t en t s

BackupScripts.com, I mplem ent ing Backup and102 Recover y—The Readiness Guide for the Enter pr ise analysis ( VERIlog TAS Ser ies) utility, 147 NCVU utility information, 146 I ntr oduction Pa r t storagemountain.com, I - I nt r oduct ion t o Ba ck46 up and Recove r y in the Ent er pr i se Env ir onm e nt

VERITAS Software's support,y 241-244 Chapter 1 - Backup and Recover Sy st em Requir em ents Ex plained Chapter 2 NT/2000 - Business Requirements of Back up Systems Windows Chapter client 3 performance - An I ntr odutesting, ction to 287 NetBackup Pa r t disk-image I I - Back up backup, P roduct Tutor 7 ia l

troubleshooting example, 139-143 Chapter 4 - Evaluating Stor age Media Requir ements Chapter 5 systems - Gener al Discussion on Configur ation Windows Chapter 6 installation, - Monitor in63 g the Backup Pr ocess client Chapter 7 Evaluating Ot her Back up- Related Featur es and Options master server installation, 61-62 Chapter Media 8 Manager - Gener alcommands, Tr oubleshooting 224-227 Tips

media 63 up System Chapter 9 server - The installation, Expanding Back commands, Pa r t NetBackup I I I - The Ente r pri se I m pa220-224 ct of Back up Sy ste m s NetBackup configuration startup method, 64 Chapter 10 - The Fut ure of Backup performance tuning, 291-332 Chapter 11 - Maj or Players in the Backup Ar ena Appendix wizards A - Com m and-Line I nter face Gu ide Appendix Backup B -Policy Glossar Configuration, y 78-86

Catalog 86-88 Appendix C - Backup, Tuning Your Backup and Recov er y Application Device 66-72Planning Kit—Fr om End to Beginning Appendix D Configuration, - Disaster Recovery Device Configuration, 64 Appendix E Discovery - Business and I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Getting Appendix F -Started, Per for m65 ance Test Tech Note

Troubleshooter, 96-97 Appendix G - Net Backu p Per form ance Tuning on Windows Volume Configuration, 75-77

I ndex

List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

< Day Day Up >

Index

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

X

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of xbp command, 220 deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e. < Day Day Up > < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

Index

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

Z

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of Zero-Impact Backup Enabler, 118 deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e. < Day Day Up > < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess List of Figures Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa

ISBN:0471227145

Wiley & Sons © 2003 (340 pages) Chapter 2: John Business Requirements of Backup Systems This guide tak es r eaders thr ough the necessar y steps of deploy ingpoint ser v ices showingtime. how to addr ess the Figure 2.1: Recovery and by recovery

ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

Figure 2.2: Cumulative incremental backup. 2.3: Differential < ?xm l Figure version= " 1.0" encoding=incremental. " I SO- 8859- 1" ?> Ta ble o f Con t en t s

Chapter 3: An Introduction to NetBackup

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Figure 3.1: NetBackup tiered architecture. Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter Figure 1 -3.2: Backup LAN-based and Recover backup. y Sy st em Requir em ents Ex plained Chapter 2

- Business Requirements of Back up Systems

Figure -3.3: Library sharing. An I ntr odu ction to NetBackup

Chapter 3

Pa r t I I - Back up P roduct Tutor ia l

Chapter- Evaluating 5: General on Configuration Stor ageDiscussion Media Requir ements

Chapter 4 Chapter 5

- Gener al Discussion on Configur ation Figure NetBackup install shield. Chapter 6 -5.1: Monitor in g the Windows Backup Pr ocess Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Figure 5.2: NetBackup License Key screen.

Chapter 9 -5.3: TheInitial Expanding Back up System Figure screen. Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Figure Wizard welcome screen. Chapter 10 -5.4: TheGetting Fut ure Started of Backup Chapter 11 - Maj or Players in the Backup Ar ena

Figure 5.5: Getting Started Wizard: Step 1.

Appendix A - Com m and-Line I nter face Gu ide

Appendix B -5.6: Glossar y Configuration Wizard welcome screen. Figure Device Appendix C - Tuning Your Backup and Recov er y Application

Figure Device Configuration Wizard: Appendix D -5.7: Disaster Recovery Planning Kit—FrDevice om End Hosts. to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm

Figure 5.8: Device Configuration Wizard: Scanning Hosts.

Appendix F - Per for m ance Test Tech Note

Appendix G -5.9: NetDevice Backu p Configuration Per form ance Tuning onBackup Windows Figure Wizard: Devices. I ndex List ofFigure Figur es5.10: Device Configuration Wizard: Drag and Drop Configuration #1. List of Tables

Figure 5.11: Device Configuration Wizard with full serialization Drag and Drop Configuration.

List of Sidebars

Figure 5.12: Device Configuration Wizard. Figure 5.13: Device Configuration Wizard: Updating Configuration. < Day Day UpDevice > Figure 5.14: Device Configuration Wizard: Configure Storage Units. Figure 5.15: Select storage unit type. Figure 5.16: Storage unit configuration: Media Manager. Figure 5.17: Storage unit configuration: Disk. Figure 5.18: Newest storage unit configuration screen for NetBackup 4.5 FP3. Figure 5.19: Volume Configuration Wizard. Figure 5.20: Volume Configuration Wizard: Updated volume database.

Figure 5.21: Volume Configuration Wizard: Identify Cleaning Media. < Day Day Up > Figure 5.22: Backup Policy Configuration Wizard-Windows. Figure 5.23: Policy Configuration Wizard-UNIX. I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

Figure 5.24: Backup Policy Configuration Wizard: Backup Type.

ISBN:0471227145 by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages) Figure 5.25: Backup Policy Configuration Wizard: Rotation. This guide tak es r eaders thr ough the necessar y steps of deploy ingPolicy ser v ices by showing Wizard-Windows. how to addr ess the Figure 5.26: Backup Configuration ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k Policy infr astrConfiguration uctur e. Figure 5.27: Backup Wizard-UNIX.

Figure 5.28: Backup Policy Configuration Wizard: Attributes.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble Figure o f Con t5.29: en t s Windows Policy Configuration Wizard: Schedules. I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI Figure TAS Ser5.30: ies) UNIX Policy Configuration Wizard: Schedules. I ntr oduction

5.31:ion UNIX Policy Configuration Wizard: schedule. Pa r t I Figure - I nt r oduct t o Ba ck up and Recove r y in the EntAdding er pr i se a Env ir onm e nt Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Figure 5.32: NetBackup Catalog Backup Wizard.

Chapter 6: Monitoring the Backup Process

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Figure Administration Chapter 5 -6.1: Gener al DiscussionConsole. on Configur ation Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Figure 6.2: Activity Monitor.

Chapter 8 -6.3: Gener Tr oubleshooting Figure JobalDetails: OverviewTips tab. Chapter 9

- The Expanding Back up System

Job Status Pa r t I Figure I I - The6.4: Ente r priDetails: se I m pa Details ct of Back up Sytab. ste m s Chapter 10 - The Fut ure of Backup

Figure 6.5: Job Details: Non-zero job details.

Chapter 11 - Maj or Players in the Backup Ar ena

Appendix A -6.6: Com m and-Line I nterProblem face Gu ide Figure Troubleshooter: description. Appendix B - Glossar y

Figure Troubleshooter: actions. Appendix C -6.7: Tuning Your Backup Recommended and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Figure 6.8: Troubleshooter from the command line.

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix Figure F -6.9: PerActivity for m ance Monitor: Test Tech Services. Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex

Figure 6.10: Activity Monitor: Daemons.

List ofFigure Figur es6.11: Monitoring jobs from the command-line interface on a Windows system. List of Tables

6.12: Display UNIX daemons from command-line interface. List ofFigure Sidebars Figure 6.13: Drive status output from the command-line interface. < Day Day Up > Figure 6.14: Reports from Windows Administration Console.

Figure 6.15: Character-based interface bpadm. Figure 6.16: Media Manager reports. Figure 6.17: Media list report. Figure 6.18: Media summary report. Figure 6.19: Images on the media report. Figure 6.20: Media log entries report. Figure 6.21: Media written report.

Figure 6.22: Media contents report.

< Day Day Up >

Chapter 7: Evaluating Other Backup-Related Features and Options I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa Figure 7.1: Library sharing.

ISBN:0471227145

John Wiley & Sons © 2003 (340 pages)

Figure 7.2: NetBackup Storage Option This guide Shared tak es r eaders thr ough the(SSO). necessar y steps of deploy ing ser v ices by showing how to addr ess the

Figure 7.3: Offhost backup. ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

Figure 7.4: Global Data Manager. < ?xm l Figure version= " 1.0" encoding= " I SO- 8859- 1" ?> 7.5: GDM dashboard. Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

Chapter 9: The Expanding Backup System

I ntr oduction

9.1: ion Fullt Backup Pa r t I Figure - I nt r oduct o Ba ck upModel. and Recove r y in the Ent er pr i se Env ir onm e nt Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Figure 9.2: Differential Incremental Backup Model.

Chapter 3 -9.3: An Cumulative I ntr odu ctionIncremental to NetBackupBackup Model. Figure Pa r t I I - Back up P roduct Tutor ia l

Figure Proof ofStor Differential Archive Size. Chapter 4 -9.4: Evaluating age Media Requir ements Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Figure 9.5: Active-passive master server solution.

Chapter 7 -9.6: Evaluating Ot herserver Back upRelated Featur es and Options Figure Two-master configuration. Chapter 8

- Gener al Tr oubleshooting Tips

Figure Chapter 9 -9.7: The100-Mbps Expandingnetwork Back up bottleneck. System Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Figure 9.8: GbE network enhancement.

Chapter 10 - The Fut ure of Backup

Chapter 11 -9.9: MajMultiple or Players in the Backup Ar ena Figure network bottleneck. Appendix A - Com m and-Line I nter face Gu ide

Figure Network enhancement. Appendix B -9.10: Glossar y

Appendix C - Tuning Your Backup and Recov er y Application

Figure 9.11: Dual networked master.

Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix Figure E -9.12: Business SAN Iattached mpact Analysis masterPlanning server. Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note

Chapter 10: The Future of Backup

Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List ofFigure Figur es10.1: Virtual backups. List of Tables

10.2: Real-time backup-High level. List ofFigure Sidebars Figure 10.3: Future real-time backup-Block-level replication. Figure 10.4: Double-Take replication. < Day Day Up > Figure 10.5: Consistent snapshots.

Appendix D: Disaster Recovery Planning Kit-From End to Beginning Figure D.1: Disaster recovery plan model.

Appendix E: Business Impact Analysis Planning Kit-The Storm Before the Calm

Figure E.1: Discovery meeting invitation.< Day Day Up > Figure E.2: Appointment confirmation email. Figure E.3: Agenda email. I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

Figure E.4: Review email.

by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of < Day Up >ess the deploy ing ser v ices by showing howDay to addr ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess List of Tables Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa

ISBN:0471227145

& Sons © 2003 (340 Chapter 3: John An Wiley Introduction topages) NetBackup This guide tak es r eaders thr ough the necessar y steps of deploy ing ser vper icesBackup by showing howComponent to addr ess the Table 3.1: CPUs Needed Server

ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

Table 3.2: Memory Needed per Backup Server Component 3.3: Drive Controller Data Transfer < ?xm l Table version= " 1.0" encoding= " I SO88591" ?> Rates Ta ble o f Con t en t s Table 3.4: Network Data Transfer Rates

I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies)

Chapter 4: Evaluating Storage Media Requirements

I ntr oduction

Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter Table 1 4.1: - Backup Tape and Drive Recover Data Transfer y Sy st em Rates Requir and em ents Capacities Ex plained Chapter 2

- Business Requirements of Back up Systems

odu ction to NetBackup Backup System Chapter- An 9:I ntr The Expanding

Chapter 3

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4 9.1: - Evaluating age Media Requir ements Table CapacityStor Planning Chart Chapter 5

- Gener al Discussion on Configur ation Table DriveinTypes and Speeds Chapter 6 9.2: - Monitor g the Backup Pr ocess Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Table 9.3: Example of Network Bottleneck and Proposed Resolution

Chapter 9 9.4: - The Expanding up System Table Example of aBack Server that Can Support More Tape Drives Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Table Ethernet Speeds Chapter 10 9.5: - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena

Appendix C: Tuning Your Backup and Recovery Application

Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y

Appendix C C.1: - Tuning Your Backup-SIZE_DATA_BUFFERS and Recov er y Application Table Default Values Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Table DefaultI mpact Values-NUMBER_DATA_BUFFERS Appendix E C.2: - Business Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note

Table C.3: Minimum Kernel Settings on Solaris System

Appendix G - Net Backu p Per form ance Tuning on Windows I ndex

Appendix D: Disaster Recovery Planning Kit-From End to List of Tables Beginning List of Figur es

List of Sidebars

Table D.1: Sample BIA Summary Report Template Table D.2: Key Positions on the Emergency On-Call Team < Day Day Up > Table D.3: Emergency On-Call Team Table D.4: Key Positions on the Assessment Team Table D.5: Assessment Team Table D.6: Key Positions on the Recovery Team Table D.7: Recovery Team Table D.8: Example of an Architecture Inventory Table D.9: Example of a Call Tree

Table D.10: Example of a Call Tree for Table D.11: Example of a Call Tree for Local Authorities Table D.12: Example of a List of Contractors I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise

Table D.13: Example of a List of Vendor Contacts

ISBN:0471227145 by David B. Little and David A. Chapa John Wiley & Sons © 2003 (340 pages) Table D.14: Example of a List of Plan Authors and Editors This guide tak es r eaders thr ough the necessar y steps of deploy ingof seravLocation ices by showing to addrComponents ess the Table D.15: Example List forhow Electronic of a DR Plan ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

Appendix E: Business Impact Analysis Planning Kit-The Storm Before the < ?xm l version= " 1.0"Calm encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s

Table E.1: Preliminary List y—The Readiness Guide for the Enter pr ise I mplem ent ing Backup and Recover ( VERI TAS Ser ies) Table E.2: Financial Loss per Outage Duration I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Table E.3: Internet Resources

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

< Day Day Up >

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess List of Sidebars Gu id e f or t h e Ent er pr ise by David B. Little and David A. Chapa

ISBN:0471227145

Wiley & Sons 2003 (340 pages) System Requirements Explained Chapter 1: John Backup and© Recovery This guide tak es r eaders thr ough the necessar y steps of deploy ser v ices by how to addr ess the LEARN FROM THEing ERRORS OFshowing THEIR WAYS

ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

Chapter 2: Business Requirements of Backup Systems < ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> OF CUMULATIVE INCREMENTAL: Ta ble EXAMPLE o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise EXAMPLE OF DIFFERENTIAL INCREMENTAL ( VERI TAS Ser ies) I ntr oduction EXAMPLE OF TRUE IMAGE RESTORE WITH MOVE DETECTION Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter EXAMPLE 1 - Backup OF WHAT and Recover HAPPENS y Sy st DURING em RequirTRUE em entsIMAGE Ex plained RESTORES Chapter 2

- Business Requirements of Back up Systems

REAL-WORLD CUSTOMER CASE STUDY: PROBLEMS AND SOLUTIONS FOR ENTERPRISE - An I ntr odu ction to NetBackup BACKUP AT GLOBAL COMPANIES I I - Back up P roduct Tutor ia l

Chapter 3 Pa r t

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter- Gener 3: An Introduction al Discussion on Configurto ationNetBackup

Chapter 5 Chapter 6

- Monitor in g the Backup Pr ocess

EXAMPLE OF SIZING METHODOLOGY Chapter 7 - Evaluating Ot her Back up- Related Featur es and Options Chapter 8

- Gener al Tr oubleshooting Tips

Back up Other System Backup-Related Features and Chapter- The 7: Expanding Evaluating Options Chapter 10 - The Fut ure of Backup Chapter 9

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 11 - Maj or Players in the Backup Ar ena

BACKUP AND THE SAN

Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y BACKING UP THE MAIL Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning

Chapter 8: General Troubleshooting Tips

Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note

BACKUP OF 19 GB IN 10 TO 11 HOURS? SOMETHING'S WRONG

Appendix G - Net Backu p Per form ance Tuning on Windows I ndex

Appendix D: Disaster Recovery Planning Kit-From End to List Beginning of Tables List of Figur es

List of Sidebars

BACKUP IS IMPORTANT; HOWEVER, RESTORABILITY DEFINES OUR SUCCESS SAMPLE DR PLAN

< Day Day Up >

WHAT TO ASK BEFORE DECLARING A DISASTER

< Day Day Up >

< Day Day Up >

I m plem en t ing Ba cku p an d Reco ver y: Th e Rea din ess Gu id e f or t h e Ent er pr ise by David B. Little and David John Wiley & Sons © 2003 (340 pages)

ISBN:0471227145

This guide tak es r eaders thr ough the necessar y steps of deploy ing ser v ices by showing how to addr ess the ar chitectur e, lim it ations, and capabilities of t he ex isting net wor k infr astr uctur e.

< ?xm l version= " 1.0" encoding= " I SO- 8859- 1" ?> Ta ble o f Con t en t s I mplem ent ing Backup and Recover y—The Readiness Guide for the Enter pr ise ( VERI TAS Ser ies) I ntr oduction Pa r t I - I nt r oduct ion t o Ba ck up and Recove r y in the Ent er pr i se Env ir onm e nt

Chapter 1

- Backup and Recover y Sy st em Requir em ents Ex plained

Chapter 2

- Business Requirements of Back up Systems

Chapter 3

- An I ntr odu ction to NetBackup

Pa r t I I - Back up P roduct Tutor ia l

Chapter 4

- Evaluating Stor age Media Requir ements

Chapter 5

- Gener al Discussion on Configur ation

Chapter 6

- Monitor in g the Backup Pr ocess

Chapter 7

- Evaluating Ot her Back up- Related Featur es and Options

Chapter 8

- Gener al Tr oubleshooting Tips

Chapter 9

- The Expanding Back up System

Pa r t I I I - The Ente r pri se I m pa ct of Back up Sy ste m s

Chapter 10 - The Fut ure of Backup Chapter 11 - Maj or Players in the Backup Ar ena Appendix A - Com m and-Line I nter face Gu ide Appendix B - Glossar y Appendix C - Tuning Your Backup and Recov er y Application Appendix D - Disaster Recovery Planning Kit—Fr om End to Beginning Appendix E - Business I mpact Analysis Planning Kit—The Stor m Befor e t he Calm Appendix F - Per for m ance Test Tech Note Appendix G - Net Backu p Per form ance Tuning on Windows I ndex List of Figur es List of Tables List of Sidebars

< Day Day Up >