Aggregating File Data with the Snap Enterprise Data Replicator
|
|
- Thomas Fitzgerald
- 7 years ago
- Views:
Transcription
1 SERVER STORAGE SOLUTION BEST PRACTICES Aggregating File Data with the Snap Enterprise Data Replicator 1. Abstract Introduction to Snap EDR Product Architecture Aggregate Data Management Tool Default Functionality System Setup and Software Installation Installing the Snap EDR Management Console Software Installing Snap EDR Agents Configuring Schedules Monitoring Performance Viewing Job Statistics Viewing the Job Log Files Verifying Performance Report Types Best Practices Bandwidth Requirements Directory Configuration on Remote Nodes Permissions Selection Platform Choice Use of Compression Delivery Mode Conclusion Abstract This whitepaper provides an overview of the Snap Enterprise Data Replicator (Snap EDR) product, and details the components and configuration of a Snap EDR Aggregate solution. This solution allows users to aggregate file data to a common location from multiple Adaptec GuardianOS Snap Servers, Windows clients and UNIX/Linux clients. Common business needs for aggregation of file data include: Retrieval of daily sales files for sales reporting Collection of server logs to support monitoring Collection of Point of Sale transaction data 2. Introduction to Snap EDR Snap EDR includes three Data Management Tools that automate the secure flow of data between systems: The Aggregate tool allows job-based scheduling for transferring files from multiple hosts to a single target host, and storing the files on a local disk The Distribute tool allows job-based scheduling for transferring files from one source machine to one or more target machines The Replicate tool job-based scheduling of file transfers between two systems Also available for Snap EDR is the Advanced Data Management (ADM) Suite that groups together the functionality of Remote Inventory, Remote Archiving, and Remote Backup and Restore. These solutions provide exceptional functionality to create and deploy policies for solving remote data management problems such as variability, dissimilar computing platforms, security needs, and data integrity. The Advanced Data Management Suite simplifies the following tasks: Inventory to determine storage utilization Archive to move selected data to central sites Backup to protect data Restore to reinstall backup data in a recovery situation Separate white papers provide details on the Distribute and Replicate tools and the tools in the ADM suite, and are available at English+US&docType=Whitepapers&source=subnav
2 2 3. Product Architecture The Snap EDR consists of a Management Console that is installed on a single Snap Server, and a collection of Agents running on the various clients involved in the replication. The Management Console coordinates and logs the data transfer activities carried out by the distributed Agents. The Agents are responsible for the actual transfer of data. A web-based administration browser gives users access to the Management Console, allowing them to configure Snap EDR components and to create data management and transfer jobs from any location. The following diagram shows an example of the Snap EDR solution: SNAP EDR Snap EDR Manager REMOTE UNIX SERVER SNAP EDR SNAP EDR SNAP SERVER IP Network REMOTE LINUX SERVER SNAP EDR SNAP EDR REMOTE WINDOWS SERVER REMOTE SNAP SERVER 4500 MANAGEMENT CONSOLE INTERFACE Data Movement Control The Administrator logs into the Management Console via the Web-based administration browser. The administrator then creates and configures jobs through this interface. The Snap EDR Management Console then communicates with the agents involved in the job, and the agents transfer the data to the appropriate machine(s). The Management Console logs the transfer activity, and the user can view these log files and reports through the Management Console interface. Note that the flow of control and data movement illustrated above differs depending on the type of transfer that has been created. In some cases, users may want to transfer data from the central Management Console to remote agents (called a push transfer). In other cases, users may want to transfer data from remote agents to the central Management Console (called a pull transfer). Users may also choose to transfer data among the remote agents (e.g., data from a remote Windows server to a remote Unix Server). The role of the Management Console is analogous to that of an air traffic controller. Just as an air traffic controller informs, monitors, and supervises the movement of airplanes in a specified airspace, so the Management Console initiates, monitors and supervises the flow of data through specified areas of the network. The aggregation of file data using Snap EDR is a straightforward process involving the activation of the Snap EDR agents on two or more host machines, configuring the parameters of the aggregation (e.g., source and target directories, etc.) and scheduling the aggregation task.
3 3 4. Aggregate Data Management Tool The Aggregate data management tool retrieves files from multiple source Agents to a single target Agent, and stores the files on the target s local disk or device. The files transferred from the source Agents may be stored on a per Agent basis, or in a single flat namespace on the target Agent s storage device. This is referred to as a Pull file transfer Default Functionality The Aggregate data management tool has the following default functionality: File transfer from one or many Agents to a single source Agent Cross-platform support (transfers can go from one or more Snap Servers, running GuardianOS 3.1 or later, Windows, or UNIX/Linux Agents to a single Snap, Windows, or UNIX/Linux Agent) Store files from source Agents in a single flat namespace or in a separate namespace on a per source Agent basis Option to exclude files from the transfer Option to exclude directories Option to remove files transferred from source Agents after sending to the target Agent Users can set information in the following categories: Source Agent selection Target Agent selection Directory and file selection File transfer options (such as file compression, certified delivery, source and target synchronization, etc.) Schedule notification 5. System Setup and Software Installation The architecture of the Snap EDR system requires users to install a central Management Console that coordinates and logs the data transfer activities of the distributed Agents. This Management Console should be installed on only one Snap Server. In addition, users can install Agent software on any node that will be involved in the data transfers. Users can install the Agent software on Snap Server, Windows, or UNIX/Linux systems. Installing and configuring the Snap EDR software involves the following procedures: Installing the Management Console software on a Snap Server Installing Snap EDR Agent software on Snap Server, Windows, and/or UNIX/Linux nodes Snap EDR installs only on GuardianOS or higher Once the software is installed, the browser-based Administration tool can be used to login to the Management Console and configure and schedule aggregation jobs Installing the Snap EDR Management Console Software The Management Console software is the engine that drives Snap EDR. The Management Console software is installed on a single Snap Server from which it coordinates and logs the data transfer activities carried out by the distributed Agents. Users can login to the Management Console through a web-based administration browser in order to configure Snap EDR components and to create data management and transfer jobs. Note: Only one Management Console should be configured to handle all of the Agents in the Snap EDR replication environment. Install the Management Console software through the browser-based Administration Tool for the Snap Server. For detailed procedures on how to install the Management Console software, refer to the product documentation.
4 Installing Snap EDR Agents Snap EDR agents are responsible for the actual transfer of data. An agent is installed automatically on the Snap Server that is designated as the Management Console. The Snap EDR Agent software must be installed on each remote node in the system that will be part of the Snap EDR data transfer environment. Users can install a Snap EDR Agent on any Snap Server, Windows, or UNIX/Linux system that meets the following requirements: Item For detailed procedures on installing the Snap EDR Agent software on a Snap Server, Windows or UNIX/Linux system, refer to the product documentation 6. Configuring Schedules Description Operating System AIX 4.3, 5.1, 5.2 Solaris 5.7, 5.8 HP-UX 11.x, 11i Fedora Linux, RedHat Linux 7.2/7.3, Enterprise Linux 2.1 or 3.0 or SUSE LINUX 8.2 and 9.0 Windows 2000 (with SP2 or higher), Windows Server Appliance Kit (SAK) 2.01, or Windows XP System Memory 128 MB or more Disk Space Windows systems: 5 MB or more UNIX systems: 5 MB or more Installation directory: 100 MB, 20MB free in/tmp on all platforms Network Connection 100 Mb/sec Ethernet or faster After installing the Snap EDR software, login to the Management Console to configure the Aggregate tool to schedule the type of aggregation job you want to run. When you login to the Management Console, the following screen appears, displaying a menu on the left-side that allows users to schedule a variety of jobs (aggregate, distribute, backup, replicate, and so on), install agents, change user preferences, run maintenance tasks, generate reports, and view transfer logs:
5 5 To schedule an aggregate job click on the Aggregate menu item on the left side of the screen. The Aggregate configuration and scheduling screen is similar to the following: When creating a job, users can specify the source and target agents, which directories to exclude, file ownership preservation and so on. For detailed instructions on creating an aggregate job, see the product documentation. 7. Monitoring Performance There are a number of ways a user can monitor the performance of a job, including the following: Viewing Job Statistics Viewing the Job Log Files 7.1. Viewing Job Statistics A scheduled job s statistics provide information such as the start and end time of the job and whether or not the job ran successfully. The Scheduled Job View screen also allows access to Console functions where other tasks can be performed with the scheduled job. These tasks include manually running a job and viewing past log files. The following is a sample of the Job View screen:
6 Viewing the Job Log Files Whenever a scheduled job is run, the Management Console generates a log file. The display area shows log files for the most recent run and up to ten previous job runs. If there are more than ten job runs, the oldest job log is deleted to allow space for the newest job log. Clicking on the word view beside any past job run displays a detailed log summary screen for that particular job run. This screen displays messages about the transfer generated during the job run by the Management Console and the Agents. These messages vary in severity, from simple information messages (e.g., starting group: Aggregate (sequential)), to warnings (e.g., Preserve ownership may fail for target snap01 because the system types are different., to errors and debug messages. These messages are useful for evaluating the job run. Exit codes appear in the Exit Code column in the list of job runs. An exit code indicates whether or not a job completed successfully, and if there was an error, the type of error that occurred. A 0 exit code indicates the job completed successfully. For a description of what each non-zero exit code means, click more info beside the exit code in the Exit Code column of the job screen, or refer to the product documentation. Click Filter to change the type of log information that appears or download the job log file to your local machine. Downloading the file allows it to be loaded into different programs (for searching, printing and so on). The log file is a plain text file.
7 7 8. Verifying Performance The Management Console creates at least one statistics record for each completed job run and stores it in the Rules Database. Using the Management Console UI, users can generate a number of different types of reports to evaluate the operation of each job Report Types The following types of reports can be generated using the Management Console: Report Type Stats Summary Report Detail Report Custom Query Report Description Provides a summary and totals of the data from all jobs in the selected job group (all Distribute, Aggregate and Replicate jobs are in the Published_Solutions job group), based on how the user chooses to group the data (by month, day, etc.). Provides a detailed record of the data from the selected job group (all Distribute, Aggregate and Replicate jobs are in the Published_Solutions job group). Note that the number of records the report displays depends on the number of Agents on which the job runs. The report displays a record for every Agent on which the job runs. Provides a customized query of detail records from the job name within a selected job group (all Distribute, Aggregate and Replicate jobs are in the Published_Solutions job group). Note that the number of records the report displays depends on the number of Agents on which the job runs. The report displays a record for every Agent on which the job runs. When a report is created, a template name can be assigned to it. The template appears in the Report view. Report templates allows reports to be generated without having to change the existing parameters. Templates are especially useful for generating the same type of report on a regular basis. Run, Edit, Remove, or Schedule a report by clicking on the appropriate word beside the report template. Click Schedule to run reports daily, weekly or monthly at specific times. The following diagram is a sample of a Stats Summary Report: For detailed instructions on how to generate reports, see the product documentation.
8 8 9. Best Practices To obtain the best performance from the Aggregate job, consider these issues: bandwidth requirements directory configuration on remote nodes permissions selection platform choice use of compression delivery mode 9.1. Bandwidth Requirements To determine performance requirements for the aggregation job, it is important to have the following information: Amount of data to be retrieved Amount of time available for the aggregation Bandwidth of the most constrained segment of the network (can be either the speed of the network or a limit imposed by bandwidth throttling) Use the following equations to manually calculate bandwidth requirements: Sender bandwidth Mbps=(MB to transfer*8)/(avail. Hrs for Aggregation *3600) Receiver bandwidth Mbps=Sender bandwidth Mbps * Number of agents Example: A user needs to aggregate webserver logs nightly (between 6pm and 6am) from 100 locations. The maximum logsize is 1GB and each node being retrieving from has a T-1 (1.544 Mbps) network connection. The receiving (target) machine has a T-3 connection (44 Mbps) It has to be determined if the sender has enough bandwidth to send the data in the time required AND if the receiver has enough bandwidth to receive the data from ALL of the sources. Sender bandwidth Mbps=(MB to transfer*8)/(avail Hrs*3600) Sender bandwidth Mbps = 1000 * 8 / 12 * 3600 Sender bandwidth Mbps = 8,000 / 43,200 Sender bandwidth Mbps = Mbps (Each sender has sufficient bandwidth: Mbps < Mbps) Receiver bandwidth required Mbps=Sender bandwidth Mbps * Number of agents Receiver bandwidth required Mbps=0.185 x 100 Receiver bandwidth required Mbps=18.5 Mbps (The receive sufficient bandwidth Mbps < 44 Mbps) To determine the maximum network performance to the receiver, perform a transfer of a single large file (i.e., 20MB or more) across the same network using the same equipment and storage that will be used in production to the receiver. Ensure that network performance exceeds the required performance. Several network factors will impact the ability of the Snap EDR agents to use all of the available bandwidth: network latency, packet drop rates, network congestion, etc. For these reasons, it is useful to perform test data transfers over the actual networks that will be used. IMPORTANT: This calculation would be an estimate of WORST CASE bandwidth needs. The SNAP EDR software is optimized to make the best use of network bandwidth through features like in-stream data compression and byte-level incremental transfers. Therefore, if you are repeatedly transferring files that change only by a small amount, the bandwidth required might be very small for transfers that are not the first time transfer Directory Configuration on Remote Nodes When running an Aggregate job using hosts on multiple platforms, users must ensure that the same directory is being used on each host, or run separate jobs where the directories are different.
9 Permissions Selection The File Ownership Transfer option allows users to specify whether files maintain the source user ID and group ownership after they are transferred, and what method is used. Users can choose from the following options to preserve ownership: GuardianOS - When transferring between two GuardianOS machines, ACLs are extracted and set using the GuardianOS routines. When transferring between Windows, UNIX, Linux, or GuardianOS, user name matching is always done for the owner and group regardless of the source and target OS type, and for ACLs if the source and target are both Windows. If no match is found, a warning is generated. ACLs without matches are dropped. Owners and groups without matches are replaced with the transfer user (root, system or UID 1). Inherited ACLs are not explicitly copied between Windows machines. For example, a file that inherits its ACLs from a folder on the source is transferred to a folder on the target that has different ACLs. However, the source folder is not transferred. In this case, the file's inherited ACLs on the target will come from the target folder into which it is transferred and not from the source folder. GuardianOS mode is the default mode of transfer. Windows - Preserves Windows SIDs in homogenous Windows environments. A security identifier (SID) is a unique value of variable length that is used to identify a security principal (e.g., user or security group) in Windows Well-known SIDs are a group of SIDs that identify generic users or generic groups - these do not change from system to system. In this mode, the security stream, and all other alternate data streams, are copied; inherited ACLs are explicitly copied. Use when transferring data between Windows hosts only. UNIX - Tries to match the usernames/groupnames found on the source and target systems. Use when transferring between Windows and UNIX hosts. The file ownership transfer capability might not work on some UNIX systems such as HPUX 11 and Solaris 7 that use Orange Book security standards. Off - Do not preserve ownership. The user ID specified in the target User ID field of this job template owns files written to the target. The file will be owned by root on UNIX, NT Authority/System on Windows and UID1 on GuardianOS. The following table provides a matrix for transfer of Ownership, Permission and Attributes with Snap EDR: Transfer Type Permissions Transferred EDR Optimal Permissions Transfer Setting (c) Replicate, Aggregate, Distribute Tool Windows to Windows All Windows Windows to UNIX RWX, Owner, Group UNIX Windows to GuardianOS RWX(a),Owner, Group, Others GuardianOS GuardianOS to Windows RWX(b), Owner, Group, Others Windows UNIX to Windows RWX, Owner, Group GuardianOS UNIX to UNIX RWX, Owner, Group UNIX UNIX to GuardianOS RWX, Owner, Group UNIX GuardianOS to GuardianOS All GuardianOS (a) The read-only file attribute is mapped by setting permission bits to r--r--r-- for read only files and rw-rw-rw- for all others. The execute bit is also set for folders and executable files (e.g., file suffix.exe,.com, etc). The system, hidden, temporary, encrypted and compressed attributes are dropped. The modified and accessed dates are preserved from the source. The create date is not preserved from the source ACE entries for Owning user, group, and other users (b) File owner, group, and other users are mapped. If the write permission mode bit is off for "all" on the source, the read only attribute is set on the target. The system, hidden, temporary, encrypted and compressed attributes are set to off on the target. The modified date and accessed date are preserved from the source The create date is not preserved from the source (c) Optimal file ownership and permissions transfer is achieved when users are consistent across the servers involved in the data transfer, such as being in the same Domain. If not, EDR will try to match users based on the permissions transfer method selected.
10 Platform Choice Cross-platform transfer of file data is supported natively; however, to preserve permissions it is recommended that data be aggregated between similar platforms (e.g., Windows to Windows and UNIX/Linux to UNIX/Linux) Use of Compression If the compression option is set to Yes, the source Agent(s) compresses each file in stream before sending it. The files will be uncompressed automatically on the target Agent(s). The degree of compression depends on the type of data you being transferred. The following are typical rates of compression for different types of data: Plain text: 70-95% TIFF images: 20-40% Binary files: 0-5% Generally this feature provides maximum benefit in WAN data transfers where bandwidth is limited (e.g., less than 3 mbits per second) Using this feature may increase CPU usage, and is not recommended on a LAN, since it may slow down the transfer Delivery Mode In considering the selection of a delivery mode, the first question to ask is whether a signed receipt of the delivery is required. If so, the certified delivery option is the only mode that should be considered. The fast mode option will perform best when bandwidth is high-speed and highly available; however, check-pointing of file data will not be used (i.e., if a transfer is interrupted the entire file will be retransmitted). In most local area networks, the fast mode option is the best choice. Fast mode should be used when writing to a NAS share and preserving ownership. To summarize, in order to obtain the best performance from the Aggregate job, consider the following issues: bandwidth requirements directory configuration on remote nodes permissions selection platform choice use of compression delivery mode 10. Conclusion The Snap EDR Aggregate solution is a valuable and easy-to-use tool to aggregate file data to a common location from multiple GuardianOS Snap Servers, Windows or UNIX/Linux servers. It provides a comprehensive solution for aggregating file data from one or many remote sources to assist with common business needs for aggregation in a variety of business scenarios. Adaptec, Inc. 691 South Milpitas Boulevard Milpitas, California Tel: (408) Fax: (408) US and Canada: 1 (800) or (408) World Wide Web: Copyright 2005 Adaptec Inc. All rights reserved. Adaptec and the Adaptec logo are trademarks of Adaptec, Inc., which may be registered in some jurisdictions. All other trademarks used are owned by their respective owners. Information supplied by Adaptec Inc., is believed to be accurate and reliable at the time of printing, but Adaptec Inc., assumes no responsibility for any errors that may appear in this document. Adaptec, Inc., reserves the right, without notice, to make changes in product design or specifications. Information is subject to change without notice. P/N: Printed in USA 3662_1.3
Distributing File Data with Snap Enterprise Data Replicator (Snap EDR)
TECHNICAL OVERVIEW Distributing File Data with Snap Enterprise Data Replicator (Snap ) Contents 1. Abstract...1 2. Introduction to Snap...1 3. Product Architecture...2 4. Distribute Data Management Tool...2
More informationReplicating File Data with Snap Enterprise Data Replicator (Snap EDR)
TECHNICAL OVERVIEW Replicating File Data with Snap Enterprise Data Replicator (Snap ) 1. Abstract...1 2. Introduction to Snap...1 3. Product Architecture...1 4. Replicate Data Management Tool...2 4.1.
More informationArchiving File Data with Snap Enterprise Data Replicator (Snap EDR): Technical Overview
Archiving File Data with Snap Enterprise Data Replicator (Snap EDR): Technical Overview Contents 1. Abstract...1 2. Introduction to Snap EDR...1 2.1. Product Architecture...2 3. System Setup and Software
More informationVMware vsphere Data Protection 6.1
VMware vsphere Data Protection 6.1 Technical Overview Revised August 10, 2015 Contents Introduction... 3 Architecture... 3 Deployment and Configuration... 5 Backup... 6 Application Backup... 6 Backup Data
More informationRemote Data Management & Backup with Snap EDR
Remote Data Management & Backup with Snap EDR CONTENTS Abstract...1 Understanding the Challenges of Remote Data...1 Key Considerations for Managing Remote Data...1 Additional Requirements for Remote Data
More informationVMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014
VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Additional Features and Benefits of
More informationVMware vsphere Data Protection 6.0
VMware vsphere Data Protection 6.0 TECHNICAL OVERVIEW REVISED FEBRUARY 2015 Table of Contents Introduction.... 3 Architectural Overview... 4 Deployment and Configuration.... 5 Backup.... 6 Application
More informationAcronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide
Acronis Backup & Recovery 10 Advanced Server Virtual Edition Quick Start Guide Table of contents 1 Main components...3 2 License server...3 3 Supported operating systems...3 3.1 Agents... 3 3.2 License
More informationInstallation Guide. Capacity Planner 3.0 EN-000688-00
Capacity Planner 3.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
More informationefolder BDR for Veeam Cloud Connection Guide
efolder BDR for Veeam Cloud Connection Guide Setup Connect Preload Data uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder Cloud for Veeam. Using the efolder Cloud
More informationStellar Phoenix Exchange Server Backup
Stellar Phoenix Exchange Server Backup Version 1.0 Installation Guide Introduction This is the first release of Stellar Phoenix Exchange Server Backup tool documentation. The contents will be updated periodically
More informationCloud Storage Backup for Storage as a Service with AT&T
WHITE PAPER: CLOUD STORAGE BACKUP FOR STORAGE AS A SERVICE........ WITH..... AT&T........................... Cloud Storage Backup for Storage as a Service with AT&T Who should read this paper Customers,
More informationWHITE PAPER: TECHNICAL OVERVIEW. NetBackup Desktop Laptop Option Technical Product Overview
WHITE PAPER: TECHNICAL OVERVIEW NetBackup Desktop Laptop Option Technical Product Overview Mayur Dewaikar, Sr. Technical Product Manager NetBackup Platform Symantec Technical Network White Paper EXECUTIVE
More informationAttix5 Pro Server Edition
Attix5 Pro Server Edition V7.0.3 User Manual for Linux and Unix operating systems Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved.
More informationQuickStart Guide vcenter Server Heartbeat 5.5 Update 2
vcenter Server Heartbeat 5.5 Update 2 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent
More informationVodacom Managed Hosted Backups
Vodacom Managed Hosted Backups Robust Data Protection for your Business Critical Data Enterprise class Backup and Recovery and Data Management on Diverse Platforms Vodacom s Managed Hosted Backup offers
More informationRDS Directory Synchronization
RDS Directory Synchronization Installation and Setup Guide Software Version 3.1.1 For Windows, Linux and UNIX operating systems September 16, 2009 RepliWeb, Inc., 6441 Lyons Road, Coconut Creek, FL 33073
More informationW H I T E P A P E R : T E C H N I C A L. Understanding and Configuring Symantec Endpoint Protection Group Update Providers
W H I T E P A P E R : T E C H N I C A L Understanding and Configuring Symantec Endpoint Protection Group Update Providers Martial Richard, Technical Field Enablement Manager Table of Contents Content Introduction...
More informationAcronis Backup & Recovery 11
Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation
More informationNETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not
More informationSymantec NetBackup Getting Started Guide. Release 7.1
Symantec NetBackup Getting Started Guide Release 7.1 21159722 Contents NetBackup Getting Started Guide... 5 About NetBackup... 5 How a NetBackup system works... 6 How to make a NetBackup system work for
More informationScholastic Reading Inventory Installation Guide
Scholastic Reading Inventory Installation Guide For use with Scholastic Reading Inventory version 2.0.1 or later and SAM version 2.0.2 or later Copyright 2011 by Scholastic Inc. All rights reserved. Published
More informationHow To Restore An Org Server With Anor Backup For Windows 7.5.2 (Oracle)
Oracle Server Backup User Guide TABLE OF CONTENTS Introduction... 2 Oracle Server Backup... 3 Features... 3 Requirements for Oracle server backup... 3 How to enable ARCHIVELOG Mode... 3 System Requirements...
More informationDisk-to-Disk Backup Solution
SSTG-AIM 2004 Disk-to-Disk Backup Solution Using CommVault QiNetix v5.0.0 with Adaptec Snap Server 4500 Storage Array Contents Introduction: The Data Protection Challenge...2 The Solution: Disk-to-Disk
More information1 of 10 1/31/2014 4:08 PM
1 of 10 1/31/2014 4:08 PM copyright 2014 How to backup Microsoft SQL Server with Nordic Backup Pro Before creating a SQL backup set within Nordic Backup Pro it is first necessary to verify that the settings
More informationUsing Symantec NetBackup with Symantec Security Information Manager 4.5
Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager Legal Notice Copyright 2007 Symantec Corporation. All rights
More informationContent Distribution Management
Digitizing the Olympics was truly one of the most ambitious media projects in history, and we could not have done it without Signiant. We used Signiant CDM to automate 54 different workflows between 11
More informationEVault Software. Course 361 Protecting Linux and UNIX with EVault
EVault Software Course 361 Protecting Linux and UNIX with EVault Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers Used in
More informationIntroweb Remote Backup Client for Mac OS X User Manual. Version 3.20
Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup
More informationNetworking Best Practices Guide. Version 6.5
Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form
More informationSymantec NetBackup PureDisk Deduplication Option Guide
Symantec NetBackup PureDisk Deduplication Option Guide Windows, Linux, and UNIX Release 6.6.5 Revision 1 The software described in this book is furnished under a license agreement and may be used only
More informationALTIRIS Software Delivery Solution for Windows 6.1 SP3 Product Guide
ALTIRIS Software Delivery Solution for Windows 6.1 SP3 Product Guide Notice Altiris Software Delivery Solution for Windows 6.1 SP3 Product Guide 2007 Altiris, Inc. All rights reserved. Document Date: February
More informationSecureVault Online Backup Service FAQ
SecureVault Online Backup Service FAQ C0110 SecureVault FAQ (EN) - 1 - Rev. 19-Nov-2007 Table of Contents 1. General 4 Q1. Can I exchange the client type between SecureVault PC Backup Manager and SecureVault
More informationGuardianOS Data Migration Tool Enables Ease of Snap Server Deployment and Data Consolidation WHITE PAPER
GuardianOS Data Migration Tool Enables Ease of Snap Server Deployment and Data Consolidation WHITE PAPER Introduction Powered by the GuardianOS operating system, the Overland Storage Snap Server family
More information11.1. Performance Monitoring
11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts
More informationAttix5 Pro Server Edition
Attix5 Pro Server Edition V7.0.2 User Manual for Mac OS X Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved. Attix5, 2013 Trademarks
More informationHP IMC User Behavior Auditor
HP IMC User Behavior Auditor Administrator Guide Abstract This guide describes the User Behavior Auditor (UBA), an add-on service module of the HP Intelligent Management Center. UBA is designed for IMC
More informationSysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
More informationAvePoint DocAve 4.0 (Enterprise Solutions for SharePoint) User Guide August 2006
AvePoint DocAve 4.0 (Enterprise Solutions for SharePoint) User Guide August 2006 AvePoint DocAve 4.0 Install Guide August 2006 Copyright 2001-2006 AvePoint, Inc. All rights reserved. No part of this publication
More informationPATROL Console Server and RTserver Getting Started
PATROL Console Server and RTserver Getting Started Supporting PATROL Console Server 7.5.00 RTserver 6.6.00 February 14, 2005 Contacting BMC Software You can access the BMC Software website at http://www.bmc.com.
More informationVMware/Hyper-V Backup Plug-in User Guide
VMware/Hyper-V Backup Plug-in User Guide COPYRIGHT No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying,
More informationDisk-to-Disk-to-Tape Backup
Disk-to-Disk-to-Tape Backup Contents Introduction.....................................2 A Typical Solution Topology.........................4 Compatible Media and Tape Devices..................5 Configuring
More informationArcserve Backup for Windows
Arcserve Backup for Windows Agent for Microsoft SharePoint Server Guide r16 Pre-release Document, only for reference This Documentation, which includes embedded help systems and electronically distributed
More informationFrequently Asked Questions. Secure Log Manager. Last Update: 6/25/01. 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.
Frequently Asked Questions Secure Log Manager Last Update: 6/25/01 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 1. What is Secure Log Manager? Secure Log Manager (SLM) is designed
More informationVMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015
VMware vsphere Data Protection REVISED APRIL 2015 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Requirements.... 4 Evaluation Workflow... 5 Overview.... 5 Evaluation
More informationAcronis Backup & Recovery 11.5
Acronis Backup & Recovery 11.5 Update 2 Backing Up Microsoft Exchange Server Data Copyright Statement Copyright Acronis International GmbH, 2002-2013. All rights reserved. Acronis and Acronis Secure Zone
More informationFileNet System Manager Dashboard Help
FileNet System Manager Dashboard Help Release 3.5.0 June 2005 FileNet is a registered trademark of FileNet Corporation. All other products and brand names are trademarks or registered trademarks of their
More informationAltor Virtual Network Security Analyzer v1.0 Installation Guide
Altor Virtual Network Security Analyzer v1.0 Installation Guide The Altor Virtual Network Security Analyzer (VNSA) application is deployed as Virtual Appliance running on VMware ESX servers. A single Altor
More informationQuick Start for Network Agent. 5-Step Quick Start. What is Network Agent?
What is Network Agent? Websense Network Agent software monitors all internet traffic on the machines that you assign to it. Network Agent filters HTTP traffic and more than 70 other popular internet protocols,
More informationPN 00651. Connect:Enterprise Secure FTP Client Release Notes Version 1.2.00
PN 00651 Connect:Enterprise Secure FTP Client Release Notes Version 1.2.00 Connect:Enterprise Secure FTP Client Release Notes Version 1.2.00 First Edition This documentation was prepared to assist licensed
More informationQuick Start Guide. Apptix Online Backup by Mozy (AOBM) Live Support: 866-461-0851
Quick Start Guide (AOBM) Live Support: 866-461-0851 Quick Start Guide Page 2 of 16 Quick Start Guide Overview Other Guides & Training Resources Admin Guide... [76 Page PDF] Client Software User Guide [46
More informationSawmill Log Analyzer Best Practices!! Page 1 of 6. Sawmill Log Analyzer Best Practices
Sawmill Log Analyzer Best Practices!! Page 1 of 6 Sawmill Log Analyzer Best Practices! Sawmill Log Analyzer Best Practices!! Page 2 of 6 This document describes best practices for the Sawmill universal
More informationDirections for VMware Ready Testing for Application Software
Directions for VMware Ready Testing for Application Software Introduction To be awarded the VMware ready logo for your product requires a modest amount of engineering work, assuming that the pre-requisites
More informationBMC BladeLogic Client Automation Installation Guide
BMC BladeLogic Client Automation Installation Guide Supporting BMC BladeLogic Client Automation 8.2.02 January 2013 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com.
More informationUser s Manual. Management Software for ATS
ATS Monitor User s Manual Management Software for ATS Table of Contents 1. ATS Monitor Overview... 2 2. ATS Monitor Install and Uninstall... 2 2.1. System Requirement... 2 2.2. Software Install... 2 2.3.
More informationTECHNICAL PAPER. Veeam Backup & Replication with Nimble Storage
TECHNICAL PAPER Veeam Backup & Replication with Nimble Storage Document Revision Date Revision Description (author) 11/26/2014 1. 0 Draft release (Bill Roth) 12/23/2014 1.1 Draft update (Bill Roth) 2/20/2015
More informationGoAnywhere Director to GoAnywhere MFT Upgrade Guide. Version: 5.0.1 Publication Date: 07/09/2015
GoAnywhere Director to GoAnywhere MFT Upgrade Guide Version: 5.0.1 Publication Date: 07/09/2015 Copyright 2015 Linoma Software. All rights reserved. Information in this document is subject to change without
More informationKASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual
KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/
More informationRelease Notes. LiveVault. Contents. Version 7.65. Revision 0
R E L E A S E N O T E S LiveVault Version 7.65 Release Notes Revision 0 This document describes new features and resolved issues for LiveVault 7.65. You can retrieve the latest available product documentation
More informationInstalling and Configuring vcenter Support Assistant
Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
More informationVeeam Backup Enterprise Manager. Version 7.0
Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may
More information1 Download & Installation... 4. 1 Usernames and... Passwords
Contents I Table of Contents Part I Document Overview 2 Part II Document Details 3 Part III EventSentry Setup 4 1 Download & Installation... 4 Part IV Configuration 4 1 Usernames and... Passwords 5 2 Network...
More informationAcronis Backup & Recovery 11.5 Quick Start Guide
Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server
More informationWavelink Client License Server Version 4.0 Reference Guide
Wavelink Client License Server Version 4.0 Reference Guide tn rg licserv 20080730 Revised 07/30/08 Copyright 2008 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park
More informationREDCENTRIC MANAGED ARCHIVE SERVICE SERVICE DEFINITION
REDCENTRIC MANAGED ARCHIVE SERVICE SERVICE DEFINITION SD005 V2.0 Issue Date 02 July 2014 1) SERVICE OVERVIEW Redcentric's Managed Archive Service allows customers to regain control of their Microsoft Exchange
More informationSSL VPN. Virtual Appliance Installation Guide. Virtual Private Networks
SSL VPN Virtual Appliance Installation Guide Virtual Private Networks C ONTENTS Introduction... 2 Installing the Virtual Appliance... 2 Configuring Appliance Operating System Settings... 3 Setting up the
More informationDetailed Features. Detailed Features. EISOO AnyBackup Family 1 / 19 WWW.EISOO.COM
Detailed EISOO AnyBackup Family 1 / CONTENT Chapter 1. About AnyBackup Family... 4 Chapter 2. Detailed... 5 2.1 Data Protection... 5 2.2 Regular Backup... 6 2.3 Regular Backup and Restore for File... 7
More informationTesting and Restoring the Nasuni Filer in a Disaster Recovery Scenario
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.2 November 2015 Last modified: November 3, 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing
More informationVector Asset Management User Manual
Vector Asset Management User Manual This manual describes how to set up Vector Asset Management 6.0. It describes how to use the: Vector AM Console Vector AM Client Hardware Inventory Software Inventory
More informationProtect Microsoft Exchange databases, achieve long-term data retention
Technical white paper Protect Microsoft Exchange databases, achieve long-term data retention HP StoreOnce Backup systems, HP StoreOnce Catalyst, and Symantec NetBackup OpenStorage Table of contents Introduction...
More informationWorkflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
More informationVeeam Cloud Connect. Version 8.0. Administrator Guide
Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be
More informationIBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE
White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores
More informationContinuous Data Protection. PowerVault DL Backup to Disk Appliance
Continuous Data Protection PowerVault DL Backup to Disk Appliance Continuous Data Protection Current Situation The PowerVault DL Backup to Disk Appliance Powered by Symantec Backup Exec offers the industry
More informationGetting Started Guide
Getting Started Guide Microsoft Corporation Published: December 2005 Table of Contents Getting Started Guide...1 Table of Contents...2 Get Started with Windows Server 2003 R2...4 Windows Storage Server
More informationGladinet Cloud Backup V3.0 User Guide
Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet
More informationTABLE OF CONTENTS. Copyright Pro Softnet Corporation. All rights reserved. 2
Last modified on 08.11.2011 TABLE OF CONTENTS Introduction... 4 Features... 5 General Features... 5 Backup Features... 5 Restore Features... 6 Link for Application Download... 6 Install IBackup for Mac...
More informationAliOffice 2.0 Installation Guide
January 25, 2012 AliOffice 2.0 Installation Guide Overview This document contains instructions for installing AliOffice and readying the application for the completion and submission of compliance evaluations.
More informationNetwork device management solution.
Network device management solution. iw Management Console Version 3 you can Scalability. Reliability. Real-time communications. Productivity. Network efficiency. You demand it from your ERP systems and
More informationC p o y p r y i r g i h g t D t e a t i a lie l d
of EISOO AnyBackup Appliance Copyright 2003-2012 EISOO Software Co.,Ltd. No company or individual are allowed to copy, distribute and extract all or parts of this document without the permission of EISOO
More informationLevelOne MUS-1001. 1GB Smart Flash. User Manual V1.0.0-0610
LevelOne MUS-1001 1GB Smart Flash User Manual V1.0.0-0610 CONTENT CHAPTER 1 INTRODUCTION...4 1.1 About this Manual...4 1.2 Support Services...5 CHAPTER 2 PRODUCT OVERVIEW...6 2.1 Package Contents...6 2.2
More informationNetwork device management solution
iw Management Console Network device management solution iw MANAGEMENT CONSOLE Scalability. Reliability. Real-time communications. Productivity. Network efficiency. You demand it from your ERP systems
More informationUnderstanding EMC Avamar with EMC Data Protection Advisor
Understanding EMC Avamar with EMC Data Protection Advisor Applied Technology Abstract EMC Data Protection Advisor provides a comprehensive set of features to reduce the complexity of managing data protection
More informationCA XOsoft Replication for Windows
CA XOsoft Replication for Windows Microsoft SQL Server Operation Guide r12.5 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the
More informationSmartSync Backup Efficient NAS-to-NAS backup
Allion Ingrasys Europe SmartSync Backup Efficient NAS-to-NAS backup 1. Abstract A common approach to back up data stored in a NAS server is to run backup software on a Windows or UNIX systems and back
More informationZmanda Cloud Backup Frequently Asked Questions
Zmanda Cloud Backup Frequently Asked Questions Release 4.1 Zmanda, Inc Table of Contents Terminology... 4 What is Zmanda Cloud Backup?... 4 What is a backup set?... 4 What is amandabackup user?... 4 What
More informationSymantec Backup Exec.cloud
Automatic, continuous, and secure protection that backs up data to the cloud, or via a hybrid approach combining on-premise and cloud-based backup. Data Sheet: Symantec.cloud Only 21 percent of SMBs are
More informationAcronis Backup & Recovery 11.5. Backing Up Microsoft Exchange Server Data
Acronis Backup & Recovery 11.5 Backing Up Microsoft Exchange Server Data Copyright Statement Copyright Acronis International GmbH, 2002-2012. All rights reserved. Acronis and Acronis Secure Zone are registered
More informationStorage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V
Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised
More informationSTEALTHbits Technologies, Inc. StealthAUDIT v5.1 System Requirements and Installation Notes
STEALTHbits Technologies, Inc. StealthAUDIT v5.1 System Requirements and Installation Notes June 2011 Table of Contents Overview... 3 Installation Overview... 3 Hosting System Requirements... 4 Recommended
More informationAttix5 Pro. Your guide to protecting data with Attix5 Pro Desktop & Laptop Edition. V6.0 User Manual for Mac OS X
Attix5 Pro Your guide to protecting data with Attix5 Pro Desktop & Laptop Edition V6.0 User Manual for Mac OS X Copyright Notice and Proprietary Information All rights reserved. Attix5, 2011 Trademarks
More informationCrashPlan PRO Enterprise Backup
CrashPlan PRO Enterprise Backup People Friendly, Enterprise Tough CrashPlan PRO is a high performance, cross-platform backup solution that provides continuous protection onsite, offsite, and online for
More informationAcronis Backup & Recovery for Mac. Acronis Backup & Recovery & Acronis ExtremeZ-IP REFERENCE ARCHITECTURE
Acronis Backup & Recovery for Mac Acronis Backup & Recovery & Acronis ExtremeZ-IP This document describes the technical requirements and best practices for implementation of a disaster recovery solution
More informationGetting Started with ESXi Embedded
ESXi 4.1 Embedded vcenter Server 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent
More informationCloud Backup Service Service Description. PRECICOM Cloud Hosted Services
Cloud Backup Service Service Description PRECICOM Cloud Hosted Services Table of Contents Table of Contents 2 1. Cloud Backup Service Service Summary 3 2. Cloud Backup Service Service Definition 4 2.1.
More informationsimplify monitoring Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures
simplify monitoring Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures Simplify Monitoring Installation Guide 11.4 (v11.4) Document Date: February 2015 www.tricerat.com
More informationAcronis Backup & Recovery 11
Acronis Backup & Recovery 11 Update 0 Installation Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for
More informationQuick Start - NetApp File Archiver
Quick Start - NetApp File Archiver TABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS GETTING STARTED Upgrade Configuration Archive Recover Page 1 of 14 Overview - NetApp File Archiver Agent TABLE OF CONTENTS
More informationUser s Manual. Management Software for Inverter
WatchPower User s Manual Management Software for Inverter Table of Contents 1. WatchPower Overview... 2 1.1. Introduction... 2 1.2. Features... 2 2. WatchPower Install and Uninstall... 2 2.1. System Requirement...
More informationFile Protection using rsync. Setup guide
File Protection using rsync Setup guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Rsync technology... 3 Terminology... 3 Implementation... 3 3. Rsync data hosts...
More information