Catalogic DPX 4.3 Applications Guide dpx4305/22/2014ag
Catalogic Software, Inc., 2014. All rights reserved. This publication contains proprietary and confidential material, and is only for use by licensees of Catalogic DPX, Catalogic BEX, or Catalogic ECX proprietary software systems. This publication may not be reproduced in whole or in part, in any form, except with written permission from Catalogic Software. Catalogic, Catalogic Software, DPX, BEX, ECX, and NSB are trademarks of Catalogic Software, Inc. Backup Express is a registered trademark of Catalogic Software, Inc. All other company and product names used herein may be the trademarks of their respective owners.
Table of Contents Table of Contents Table of Contents 3 APPLICATIONS GUIDE OVERVIEW 5 Chapter 1: DPX Overview 6 Documentation, Knowledge Base, and Technical Support 6 Important Considerations 10 Chapter 2: Introduction to Applications Guide 11 Audience and Purpose 11 Topics Covered 11 DPX EXCHANGE MAILBOX RECOVERY and DPX SHAREPOINT OBJECT RECOVERY 12 Chapter 3: Using EMBR for Rapid Recovery of Exchange Mailbox Items 13 Introduction 13 How EMBR Works 13 How EMBR Works with Instant Access 13 Example Use of EMBR with Instant Access 13 Chapter 4: Using SPOR for Rapid Recovery of SharePoint Objects 17 Introduction 17 How SPOR Works 17 Supported Operating Systems and Applications 17 Additional Requirements 18 How SPOR Works with Instant Access 18 Using SPOR with Instant Access: A Quick Example 18 REPORTER 20 Chapter 5: Introduction to Reporter 21 About this Document 21 For Additional Information 22 Nomenclature 22 Important Considerations Before You Begin a Reporter Installation 22 Chapter 6: Installing Reporter 26 Chapter 7: Configuring Reporter 27 Step 1. Install Agent on the Master Server 27 Step 2. Configure the Master Server as a Reporter Resource 28 Step 3. Configure Virtualization VMware Resources 29 3
Table of Contents Step 4. Define Polling Resources 31 Chapter 8: Getting Started with Reporter 33 Logging In 33 Graphical User Interface Overview 33 Chapter 9: Uninstalling Reporter or Reporter Agents 35 ACRONYMS 36 TERMINOLOGY 43 TRADEMARKS 50 INDEX 53 4
APPLICATIONS GUIDE OVERVIEW APPLICATIONS GUIDE OVERVIEW DPX Overview on page 6 Introduction to Applications Guide on page 11 5
Chapter 1: DPX Overview Chapter 1: DPX Overview Catalogic DPX data protection software delivers unprecedented speed and savings with a single unified solution making backup and disaster recovery smarter, faster, and more efficient. It is uniquely designed to handle the most common data protection use cases that are challenging IT departments. DPX deploys quickly and scales easily to match the needs of rapidly growing cloud infrastructures. Additionally, the software exploits modern server virtualization and is optimized for backup and recovery of virtual systems. DPX Block Data Protection provides rapid and efficient backup, restore, bare metal recovery, application protection, and tape archiving. A complex backup environment can have multiple backup Enterprises each with more than one secondary system including NetApp storage and DPX open storage. There is one master server per data protection Enterprise. The master server is a DPX node that contains DPX software, including the Catalog and modules that control scheduling, media management, and distributed processing. Any other node in an Enterprise from which you may want to back up data is called a client. The master server may also be a client node. Note: For the latest system requirements and compatibility details regarding supported hardware, file systems, applications, operating systems, and service packs, go to System Requirements and Compatibility. Documentation, Knowledge Base, and Technical Support Documentation Roadmap The following documentation is available for Catalogic DPX : Quick Start Guide Deployment Guide User s Guide Reference Guide Bare Metal Recovery Guide Applications Guide Upgrade Assessment Tool Quick Start Guide Best Practices Troubleshooting Guide Documentation is available in both PDF and context-sensitive help invoked through DPX. You can find the documentation in the following locations: 6
Documentation, Knowledge Base, and Technical Support The MySupport website has the current documentation. For best results, use Internet Explorer to view the documentation PDFs. Select Help on the menu bar in the DPX management console. Navigate to the manuals directory on the product disk or in the ISO image to access the PDF documentation for the latest major release. Navigate to the directory on the master server where DPX was installed to find the documentation. Drill down to the \http\webapps\root\manuals directory to find the PDFs. Navigate to http://<masterserver hostname or IP address>:6122/manuals/_document_library.pdf for a summary of available documentation. Tip: In Adobe Reader, clear the Open cross-document links in same window option to open links to additional DPX documentation while retaining your location in the original PDF. Clear this option in the Documents section on the Preferences window. For the latest customer notices, product documentation, and access to the Catalogic Software knowledge base, go to MySupport. Documentation Suite Overview The following describes the content included in each manual and indicates the intended audience. You are encouraged to read through this information for an understanding of where to find the information you are looking for. Also, use the Search and Index features in the Help system to locate pertinent information. In Help, you can search the entire documentation suite instead of searching through individual manuals. Quick Start Guide This document is intended for administrators and other end users of DPX. It is the starting point for understanding DPX documentation and provides a roadmap for using the documentation. The Quick Start Guide contains procedures for creating a NetApp storage volume or DPX open storage volume, provides procedures for a simple DPX backup and recovery scenario, and describes how to obtain additional information including technical support and online resources. Deployment Guide This document is intended for those who are responsible for setting up DPX at customer sites. This might be a Catalogic field technician or a NetApp certified field technician who also has familiarity with DPX and its licensing. The guide contains instructions for setting up a NetApp storage system for DPX backups. It also presents, in abbreviated form, procedures found in the User's Guide and Reference Guide, including installing DPX, running a software update, setting up a DPX Enterprise, setting up Catalog protection, setting up a tape library, and configuring media. At the conclusion of the implementation, the customer is ready to perform DPX backups and recoveries using the features provided by their DPX license. User s Guide This document is intended for administrators and other end users of DPX. It contains information and procedures for the most commonly used functions of Catalogic Data Protection Software. The topics covered in the User s Guide assume 7
Documentation, Knowledge Base, and Technical Support that your Enterprise is deployed and that the Catalogic Data Protection Software is installed and configured. The User s Guide includes: Product Overview. Describes the management console and procedures for launch and login. Disk-to-Disk Data Protection. Describes procedures for DPX Block Data Protection, remote seeding using NetApp storage or open storage, Instant Access to data, and NetApp SnapVault Management. Also, it provides an overview of Bare Metal Recovery. Virtual Environments. Describes Full Virtualization, Instant Virtualization, and Rapid Return to Production. Also, describes procedures for Agentless VMware Backup. Application Support. Describes data protection procedures for major applications, including SharePoint, Exchange, SQL Server, and Oracle. Includes the procedures for verifying the integrity of an application backup. Also, describes considerations for Windows and Novell OES Clusters. Maintenance. Describes procedures for maintaining the Catalog and for monitoring backup and restore jobs. Reference Guide This document is intended for administrators with appropriate licenses to use DPX features. Other users might be limited to a subset of the features. The Reference Guide contains information, considerations, and procedures for the less commonly used features of Catalogic Data Protection Software. The more commonly used functions are described in the User s Guide. The Reference Guide includes: Installation. Describes procedures for installing, upgrading, and updating DPX on Windows, Linux, and other platforms. Also includes information about protecting and maintaining the Catalog and describes administrator privileges and security considerations. Configuration. Describes procedures for configuring DPX by using the management console. Operation. Describes procedures for defining and running backup, copy, and restore jobs by using the management console and performing additional tasks using scripts. Also, includes details on controlling tape devices and migrating tapes, and managing reports and logs. Procedures for DPX Block Data Protection jobs are described in the User s Guide. Tape Library Setup. Describes procedures for creating the media changer device file needed to enable communication between DPX and the tape library as well as defining tape library properties. Clusters. Describes procedures for setting up a Windows or Novell cluster to work with DPX. Special Procedures. Describes procedures for setting up special tape libraries. Interfaces. Describes setup and usage of application interfaces not included in the User's Guide or Applications Guide. This includes NDMP backup and restore for disks and tapes. The remaining application interfaces are set up outside the management console. Bare Metal Recovery Guide This document is intended for administrators who must restore an entire system environment for an individual computer. A full recovery using Bare Metal Recovery includes the operating system, point-in-time backed up data, and Exchange, 8
Documentation, Knowledge Base, and Technical Support SQL Server, and Oracle applications if applicable. If the computer being recovered is a master server, Bare Metal Recovery restores the DPX application. The Bare Metal Recovery Guide describes procedures for restoring a machine with Windows and Linux. Applications Guide This document is intended for administrators and other end users of DPX that are licensed to use several special applications. Other commonly used functions and applications are described in the User s Guide and Reference Guide. The Applications Guide includes: DPX Exchange Mailbox Recovery. This application allows administrators to easily recover mailbox items from unmounted Exchange databases and Information Store files. Additionally, EMBR enables copying, searching, and analyzing email and email attachments. DPX SharePoint Object Recovery. This application allows administrators to find, recover, and restore entire SharePoint sites or individual SharePoint server objects. Additionally, SPOR can be used to locate and restore individual items, without having to restore entire databases, volumes, or servers. Reporter. This application enables robust reporting on nodes, storage, job progress, trending, exceptions, and more. Upgrade Assessment Tool Quick Start Guide This document is intended for administrators who want to upgrade to Catalogic DPX 4.3. It provides instruction on using the Upgrade Assessment Tool. The UAT scans your Enterprise and generates a report identifying feature differences and upgrade concerns you need to be aware of when upgrading from BEX 3.4 or Catalogic Data Protection Software 4.0 to DPX 4.3. Best Practices This document is targeted at DPX implementation professionals and advanced DPX administrators. The guidelines provided are based on deployment and administration experience, as well as best practices of the respective technology vendors. This document lists known parameters and configurations that lead to a successful DPX implementation. Use this document as a tool when architecting a solution that fits specific data protection needs. Troubleshooting Guide This document is intended for Catalogic Software Level 1 Support Engineers and advanced users of DPX. It provides answers to many frequently asked questions. Areas covered include compatibility and support, installation, configuration, general operations, Microsoft Exchange, Microsoft SQL Server, virtualization, and DPX Bare Metal Recovery. Knowledge Base In addition to the documentation suite, search the Knowledge Base for solutions and answers to your issues and questions. The Knowledge Base has solutions that can help you resolve many technical problems. We encourage you to search the Knowledge Base prior to contacting Catalogic Software Data Protection Technical Support for assistance. The Knowledge Base has thousands of solutions that can help you resolve many technical problems before opening a Service Request. You can find the knowledge base on MySupport. 9
Important Considerations Contacting Catalogic Software Data Protection Technical Support For issues relating to Catalogic Data Protection software, contact Catalogic Software Data Protection Technical Support. To contact us in the US or Canada: Call toll free (877) 600-8280 or (201) 930-8280 By email: DPsupport@catalogicsoftware.com To contact us in Europe, the Middle East, or Africa: By phone: Call toll free +800 796-2767 or +31 20 3472366 By email: DPsupport@catalogicsoftware.com DPX provides a logs collection utility, bexcollect, for diagnostic purposes. The utility gathers informational files related to a specific job. If you contact Catalogic Software Data Protection Technical Support, you may be asked to run the utility and send the results for analysis. See Log Management in the Reference Guide. Tip: For NetApp or hardware related issues, contact your NetApp support representative at (888) 4NETAPP. For the latest system requirements and compatibility details regarding supported hardware, file systems, applications, operating systems, and service packs, go to System Requirements and Compatibility. Important Considerations Some features described in this guide are optional, separately licensable features. For inquiries regarding licensing of optional features, contact your data protection account representative or call (877) 327-8951. Catalogic DPX data protection software does not currently support Unicode for DPX-specific objects such as jobname, devicepath, qtree name, etc. Use the English character set only. Screen illustrations that appear in this guide may not match those found in your product implementation, due to variations in customization. For best results, use Internet Explorer to view the documentation PDFs. 10
Chapter 2: Introduction to Applications Guide Chapter 2: Introduction to Applications Guide Audience and Purpose The Catalogic DPX Applications Guide is intended for system administrators, administrators, and other end users of DPX that are licensed to use several special applications. Other commonly used functions and applications are described in the User s Guide and Reference Guide. Some features are optional, separately licensable features. For inquiries regarding licensing of optional features, contact your data protection account representative or call (877) 327-8951. Topics Covered The Catalogic DPX Applications Guide includes the following topics: Topic DPX Exchange Mailbox Recovery (EMBR) DPX SharePoint Object Recovery (SPOR) Reporter Description This application allows backup administrators to easily recover mailbox items from unmounted Exchange databases and Information Store files. Additionally, EMBR enables copying, searching, and analyzing email and email attachments. This application allows backup administrators to find, recover, and restore entire SharePoint sites or individual SharePoint server objects. Additionally, it can be used to locate and restore individual items, without having to restore entire databases, volumes, or servers. This application enables robust reporting on nodes, storage, job progress, trending, exceptions and more. 11
DPX EXCHANGE MAILBOX RECOVERY and DPX SHAREPOINT OBJECT RECOVERY DPX EXCHANGE MAILBOX RECOVERY and DPX SHAREPOINT OBJECT RECOVERY Using EMBR for Rapid Recovery of Exchange Mailbox Items on page 13 Using SPOR for Rapid Recovery of SharePoint Objects on page 17 12
Chapter 3: Using EMBR for Rapid Recovery of Exchange Mailbox Items Chapter 3: Using EMBR for Rapid Recovery of Exchange Mailbox Items Introduction DPX Exchange Mailbox Recovery allows backup administrators to easily recover mailbox items from unmounted Exchange databases and Information Store files. Additionally, EMBR enables copying, searching and analyzing email and email attachments. DPX can provide the backed up EDB files to EMBR through its Block backup functionality. The key is the Instant Access feature, which easily and rapidly mounts an Exchange backup instance to a Windows node. EMBR on this node can then quickly extract or search required email items. This process is described below. How EMBR Works EMBR requires as input the backed up EDB files. These files should be local to a server (other than the Exchange Server) or workstation that has EMBR installed. EMBR can then open these files and either extract the individual email items to a.pst file or import them directly into an online Exchange database. How EMBR Works with Instant Access Block backups of an Exchange server back up the logical volume (C:, D:, etc.) that contains the Exchange database files, which includes the EDB files. By virtue of the Block backup process, the database is backed up online once as a base backup; all subsequent backups are then block-level incremental backups, which greatly reduce CPU load, network traffic, and storage requirements. Any of the snapshots (one is created by each Block backup job) can then be mounted to a Windows node by using the IA feature. If EMBR is installed on this Windows node (the node should not be the Exchange Server), EMBR can then be used to extract mailbox items from the IA map. Example Use of EMBR with Instant Access For the example described below, a Windows 2003 Exchange server (IP 192.0.2.24) was backed up three times using the Block backup functionality. The backup ran once as a base backup and subsequently as a block-level incremental backup. This created three recovery points of the E: drive on the secondary storage device. The third recovery point is then selected and IA mapped as the K: drive on a server that has EMBR installed (IP address 203.0.113.24 in the example below): 13
Example Use of EMBR with Instant Access The IA function results in the K: drive on the server 203.0.113.24 and this K: drive now houses the EDB files from when the Block backup ran (in this example, 3/25/09 12:12:13 PM). Note: There are two backup sets for Exchange: the data files (on the E: drive in the example) and the application itself on the EXCH volume. Only the data files can be IA-mapped. EMBR is then launched from the workstation and pointed to the location on the K: drive that contains the EDB files: 14
Example Use of EMBR with Instant Access The screen shot above shows the opened source file (K:\Program Files\Exchsrvr\MDBDATA\priv.edb) with all the mailboxes displayed in the top-left panel. The mailbox for user Louis is opened and the Inbox of that mailbox is shown (top-right panel). You can now search for mail items, or read emails if needed (as shown in the open window above). To recover one or multiple emails (or any of the objects shown above: Calendar, Contacts, Deleted Items, etc.) you can either save the items to be recovered to a.pst file, which can be sent to the user, who can read the items, or you can import the items to be recovered directly to an online Exchange server. To do the latter, point EMBR to the Exchange server, which will then populate the bottom Target information with the contents on the live mailbox. A recovery is then done by drag-and-dropping the items from Source panel to the Target panel as shown below: 15
Example Use of EMBR with Instant Access At the completion of the recovery EMBR is shut down and the IA map is unmapped. The recovery and search activities can be done with no impact to the online Exchange server. Instant Access used with EMBR is one example of the exceptional versatility and simplicity of DPX s access to snapshots generated by routine Block backups. Related Topics: Exchange 2010/2013 in the User's Guide Exchange 2003/2007 in the User's Guide Note: For the latest system requirements and compatibility details regarding supported hardware, file systems, applications, operating systems, and service packs, go to System Requirements and Compatibility. 16
Chapter 4: Using SPOR for Rapid Recovery of SharePoint Objects Chapter 4: Using SPOR for Rapid Recovery of SharePoint Objects Introduction You can use DPX SharePoint Object Recovery to find, recover, and restore entire SharePoint sites or individual SharePoint server objects such as documents, lists, libraries, and folders. Because SPOR reads existing content database backups directly, use it to locate and restore individual items, without having to restore entire databases, volumes, servers, etc. SPOR enables direct restores to any SharePoint server (or you can restore objects to any Windows-supported file system) thereby eliminating many constraints on same-server restores. With these unique SPOR features, you may find that your need for an additional recovery server is minimized. How SPOR Works To provide item-level restore functionality, SPOR must have the ability to access the content databases mapped/restored from the Block backup. SPOR can then read, extract, or export the data from the content databases to a selected SharePoint server or to a windows file system. Supported Operating Systems and Applications For the latest system requirements and compatibility details regarding supported hardware, file systems, applications, operating systems, and service packs, go to System Requirements and Compatibility. Considerations for SPOR with SQL Server: The following applies to both Clustered and Non-Clustered SQL Server platforms: When using SQL Server 2005, (32 bit or 64-bit) as your database server, you must install Microsoft SQL Server 2005 SP2, or a later version of that service pack. In addition, you must also install the Microsoft SQL Server 2005 Backward Compatibility Components for SQL Server package, which is one of the components of the Microsoft SQL Server 2008 Feature Pack, August 2008 installation package collection, and is available for download from the Microsoft Download Center website. The Microsoft SQL Server 2008 Feature Pack, August 2008 installation package collection contains many different items, but you will only need to install the Microsoft SQL Server 2005 Backward Compatibility Components for SQL Server package. SPOR does not support SQL 2000 database servers. If you use SQL Server 2000, you will be able to back up your databases using the SharePoint application and restore whole databases, but you will not be able to do an item-level restore from those backups. 17
Additional Requirements Additional Requirements Each SharePoint server that you intend to protect must have a native installation. How SPOR Works with Instant Access Before you can start using SPOR in your recovery efforts, DPX must create at least one base backup of a SharePoint volume. When you select a SharePoint volume for backup, it automatically includes a backup of each SQL content database hosted on that volume, including all.mdf,.ldf and/or.ndf database files. Note: The first backup process transfers all existing data from the volume. Any subsequent incremental backups will only transfer data for block-level changes to that volume. Using the Instant Access feature, you can mount any valid, block-level backup to a SPOR-enabled Windows node; using SPOR, you can access that volume, open the content database, and retrieve individual SharePoint objects. Using SPOR with Instant Access: A Quick Example In this example, assume that the backup functionality provided by DPX Block Data Protection has created a SharePoint backup of a Windows 2008 SQL server. This backup job ran once as a full backup of the Windows 2008 SQL server and it subsequently created a snapshot of the C: drive on the secondary storage device. When you use Instant Access on a server that has a SPOR installation, you can map this snapshot to a drive. See Mapping a Block Backup Instance to a Drive Letter in the User's Guide. A newly mapped drive contains an exact duplicate of each database file, as recorded for that specific date and time in the node s DPX Data Protection backup. Note: There are two available backups for SharePoint: the data files, as found in the C: drive on the physical node, and the application itself, which appears underneath the tree branch for the SharePoint virtual node. Instant Access only provides mapping functionality for data files. Making a Source Path Selection In this step, you launch SPOR from your SharePoint node and use IA mapping to select the G: drive as the source path. After you navigate through the path to the location of the content database to restore, SPOR displays a listing of all available SharePoint entities on-screen exactly as they appear in the content database backup. For more information about how to make a source path selection in SPOR, see the DPX SharePoint Object Recovery User Guide which can be found on the Applications CD. 18
Using SPOR with Instant Access: A Quick Example Making a Target Server Selection In the next step, you select a target server restore location. When making a target server selection, you can choose to select an alternate SharePoint database server or you can elect to save those individually recovered items in a new location on the same source server. See The DPX SharePoint Object Recovery User Guide which can be found on the Applications CD. Selecting Files, and Completing the Restore Process Using SPOR, you can drill down through the file structure and browse the sites, documents, folders, lists, and libraries to locate the items to restore. You can also perform a search based on multiple criteria, searching across one or more content databases, and you can elect to see all available versions of a file in one screen. To execute the recovery of one or more SharePoint objects, drag-and-drop each item from the Source panel to the Target panel. At the completion of the recovery, close the SPOR application. Related Topics: SharePoint in the User's Guide 19
REPORTER REPORTER Introduction to Reporter on page 21 Installing Reporter on page 26 Configuring Reporter on page 27 Getting Started with Reporter on page 33 Uninstalling Reporter or Reporter Agents on page 35 20
Chapter 5: Introduction to Reporter Chapter 5: Introduction to Reporter Reporter can help you schedule and monitor backup jobs for completion within a predefined processing window to reduce the load on servers, clients, and the network. Reporter enables access to robust sets of data related to the below topics: Node perspective. Provides information from the server, client, and job perspective and displays job sizes and throughput per node. Monitoring. Enables real-time monitoring of backup job status on all nodes, including in-progress, inactive, failed, and successful jobs. Alerts administrators to job failures and interruptions and helps them pinpoint time and cause. Post-job reports. Summarizes exceptions and cumulative data volumes. Reports also display the number of bytes backed up per job and the success/failure ratio within a specified period. Management reports. Generates reports that group backup servers for chargeback, SLA, and compliance needs. Trending. Provides trending information for backups, including total data backed up in the enterprise, throughput, and success rate trends. Forecasts. Predicts available disk space based on backup history and storage capacity. Multiple backup server data. Provides a cumulative view if multiple master servers are deployed. Master server reports. Indicates operating system performance, available disk space, network usage, HBA card status, and system errors for the master server. Exception reports. Pre-defined daily and cumulative reports identify failed and inactive jobs by client and group. Reports also provide group details, weekly summaries per group, server details, and weekly server summaries. Media reports. Displays detailed media information, including listings of free tapes per media pool, tapes requiring removal from the tape library, and tapes that can be brought back into production. A predefined report lists tapes for tape library export and import. Sub-reports include offsite-to-onsite, onsite-to-offsite, tape pools, and jobs-per-tape. Customizable reporting. A report wizard and numerous templates enable administrators to design reports to meet specific analysis needs. The report wizard can be used to modify existing reports, create new reports, and define sets of reports. Notifications. Versatile notifications can utilize email, Web, SNMP for third party applications, and paging. About this Document This document describes how to install Reporter and configure resources for reporting. The major installation and configuration steps are: Install Reporter on a server. See Installing Reporter on page 26. 21
For Additional Information Install the Reporter agent on the master server. See Step 1. Install Agent on the Master Server on page 27. Use Reporter to configure the master server as a Reporter resource. See Step 2. Configure the Master Server as a Reporter Resource on page 28. Use Reporter to configure VM resources if necessary. See Step 3. Configure Virtualization VMware Resources on page 29. Use Reporter to define polling resources. See Step 4. Define Polling Resources on page 31. This document also describes: How to login to Reporter and briefly describes elements of the interface. See Getting Started with Reporter on page 33. How to uninstall Reporter. See Uninstalling Reporter or Reporter Agents on page 35. For Additional Information For a description of Reporter features and configuration options, see the Reporter online documentation. Nomenclature In this topic, Reporter software, running on the Reporter server, is referred to as Reporter" or "DPX Reporter". In other documentation and in the product, Reporter software may be referred to as Reporter Server to distinguish it from Reporter Agent, which runs on machines to be monitored by Reporter. In this topic Reporter always refers to the server software, unless agent is specified. Important Considerations Before You Begin a Reporter Installation The following points should be noted before you begin installing or upgrading Reporter. General Considerations Note the following general considerations before installing Reporter: Reporter server is recommended for use with Windows 2003 and 2008 (x32 and x64). Reporter agent is recommended for use with Windows 2003 and 2008 (x32 and x64). It is also compatible with Windows 2003 and XP Professional, along with the Red Hat Linux, CentOS, SUSE Linux Enterprise, and Sun Solaris 10 operating systems. For full compatibility with DPX, DPX Reporter 4.9.6 or later is required. For the latest system requirements and compatibility details regarding supported hardware, file systems, applications, operating systems, and service packs, go to System Requirements and Compatibility. 22
Important Considerations Before You Begin a Reporter Installation Reporter uses the following ports: Port 9000 as its Web Server Port (HTTP) for the GUI. This port can be changed in server.xml. Port 4319 as its communications port with Reporter Agents (HTTP). This port can be changed system wide or on an agent-by-agent basis. Port 162 as a trap listener. This port can be changed through the server setup. Related Topics: Administrative Privileges and Security Considerations in the Reference Guide Installing Reporter on a master server is not recommended. Reporter Server installs six services: MySQL (Reporter database): the MySQL repository for all data collected by Reporter. ReporterCollector (collector): collects data from agents. ReporterEventReceiver (event receiver): receives traps. ReporterMaintenance: runs maintenance routines in the background. ReporterPoller (poller): remotely polls devices or applications by a variety of methods. ReporterWebServer (web server): the Tomcat web server. An installation or upgrade does not require a reboot. Installing Reporter Server on a RAID or cluster drive is not recommended. The Reporter database should be excluded from normal backups and real time virus scans. For instructions to back up the database, request the document "Backing up the Reporter Database" from Catalogic Software Data Protection Technical Support. The Reporter server requires 3 GB memory, comprised of the following: Database: 512 MB Web Server: 512 MB Collector: 512 MB Event Receiver: 512 MB Maintenance Server: 256 MB Poller: 256 MB 23
Important Considerations Before You Begin a Reporter Installation Considerations for Fresh Install Note the following considerations for a fresh install of Reporter: Before installing, close any services windows. Installation will not work properly if you leave any of these windows open during install. If you have installed MySQL separately before installing Reporter, the installation will be terminated, since Windows can support only one instance of MySQL at a time. Before installing, stop the MySQL Windows service (if any) and then uninstall MySQL. Warning: Do not manually delete any MySQL directories even after uninstall is completed. Old database data is located under the MySQL install directory. All Reporter binary and data files are located under the installation directory. When installing, select a directory located on a partition with enough space (1 GB recommended) to store Reporter data files. If you are installing Reporter for the first time, you will need a license file from Catalogic Software to run Reporter. Email Catalogic Software Data Protection Technical Support and provide the IP address and MAC address of the machine where Reporter is to be installed. You will receive an email with the appropriate license file attached. Follow the license application instructions, as specified in this email, when applying this Reporter license. Considerations for Upgrades Note the following considerations for an upgrade installation of Reporter: The installation process will detect and upgrade previous versions of Reporter automatically. All historical data will be retained. Tip: It is highly recommended to back up your entire Reporter directory before upgrading to a new version of Reporter. The upgrade makes a physical copy of your database. Before upgrading, make sure you have free space equal to at least twice the current database size (for example if your database is 1 GB, ensure 2 GB of free space is available on that drive BEFORE starting the upgrade. Before upgrading, close any services windows. Installation will not work properly if you leave any of these windows open during installation. Close any applications viewing or editing a file or directory in the old installation directory. Versions older than 3.8.6 are no longer upgraded with this release. If you have a version older than 3.8.6, upgrade to 3.8.6 or later then upgrade to this version. You can reinstall Reporter, but you must first uninstall the existing software. You cannot reinstall over an existing installation. Tip: All previous data may be deleted after reinstallation. It is highly recommended that you do a backup of your entire Reporter directory before reinstallation. If you are upgrading Reporter, you will be prompted for a license key: 24
Important Considerations Before You Begin a Reporter Installation If you are upgrading from release 4.x, you do not need a new key. Click No; the existing license key will be used. If you are upgrading from a release earlier than 4.x, you will need a new license key. Click Yes and choose the new license key. An upgrade DOES NOT retain the current password for the Reporter database. If you are moving Reporter to a different host and/or switching IP addresses, you must request a new Reporter license, one that will accommodate the new MAC address assignment. For more information, obtain a copy of "Moving your Reporter Server" from Catalogic Software Data Protection Technical Support. 25
Chapter 6: Installing Reporter Chapter 6: Installing Reporter Install Reporter on any server that can communicate with the master server, as long as that Reporter installation will run on a supported operating system. Note: It is not recommended to install Reporter on your master server or any device server. Tip: 3 GB of space on the installed partition is recommended for installation and subsequent log file growth. To install Reporter: 1. Run <product>reporter_server-windows-xxx.exe (where xxx is the version number) from the Reporter installation CD. If you do not have a Reporter CD, contact Catalogic Software Data Protection Technical Support to get the URL for downloading the install.exe file from the Catalogic Software website. 2. You will be prompted for a destination folder. Accept the default or browse to another folder. Click Next. 3. You will be asked to specify a password for the database installed as part of Reporter. Supply the password and click Next. Tip: The database password is needed for assistance from Catalogic Software Data Protection Technical Support, so be sure to make a note of it in case you need support in the future. 4. You will be prompted to specify the Server Address (the IP Address used by the Reporter server), the Agent Port, and the SNMP Port. The Agent Port is used by the Reporter server to communicate with Reporter agents. The SNMP Port is used by the Reporter server to detect SNMP traps sent from configured devices. Accept the default values. The Reporter server stores this information to enable accurate configuration of the Reporter agents, discussed later in this instruction set. Click Next. 5. The Services Setup screen appears. Note that Reporter creates six services on your system as part of the installation. Five core services are created for Reporter plus a service for the backend database. It is recommended to accept the default values on the Services Setup screen. Click Next to install. 6. You will be prompted for a license key. If you click Yes, you can then browse for the license key. Select the license key file and click Open. Then click Next. Click Finish to complete the installation. 26
Chapter 7: Configuring Reporter Chapter 7: Configuring Reporter Following installation of Reporter, double-click the Reporter icon on the desktop. This opens a Web connection to the Reporter Web server on port 9000. If you chose to use a machine elsewhere on the network, type the URL, using either the domain name or IP address of your Reporter Server followed by a colon and the number 9000. If you successfully completed the installation, the Reporter login screen appears. The default username is admin and the default password is admin. To complete the setup of your Reporter environment, do the following: Step 1. Install a Reporter agent on the master server (and on other servers as needed to monitor their server activity not related to DPX). Step 2. Configure the master server agent (and other server agents as needed to monitor their server activity not related to DPX). Step 3. Configure Virtualization VMware Resources as needed. Step 4. Define Polling Resources. Step 1. Install Agent on the Master Server As a prerequisite for backup reporting, install a Reporter agent on your master server: 1. In Agents folder on the CD, locate the executable file for the operating system of your master server. For the latest system requirements and compatibility details regarding supported hardware, file systems, applications, operating systems, and service packs, go to System Requirements and Compatibility. Installing a Reporter agent on the master server is all that is required to monitor server activity of the master server itself. The agent on the master server does not enable monitoring of overall server activity on servers in the Enterprise, only related activity on those servers. 2. After agent software is installed on the master server, you will be prompted for Server Name (host name or IP address) of the Reporter server, the Agent Web Port (HTTP), and the Server Trap Port (SNMP). The ports should be identical to those you set up during installation of Reporter. See Installing Reporter on page 26. Tip: On the Resources screen, the port settings are displayed when you click in the Agent column for a machine. 3. Click Next. You will then be prompted for the default installation path of the agent software. The Windows default is product-directory\program Files\DPX\Reporter Agent. (Where product-directory represents the directory in which DPX was installed.) Other operating systems will have other defaults. In all cases, you can change the default path. After completing the Reporter agent installation, ReporterAgent is listed as a service among other Windows services. 27
Step 2. Configure the Master Server as a Reporter Resource Step 2. Configure the Master Server as a Reporter Resource After installing the appropriate resource agent on the master server, perform the following steps on the Reporter server to complete the configuration of your Agent: 1. On the main Reporter screen, select the Resources link under the Administration folder. The Resources screen appears. 2. From the drop-down list at the upper left, select Catalogic and click Add. The Create New Resource for Agent screen appears 3. Enter values for fields: Server IP Address: Select your master server. Resource Display Name: Enter a descriptive name for your master server (for example, win-210). Active: This check box is selected by default. It enables the Reporter agent to collect your Enterprise data. Accept the selection. Licensing: This check box is selected by default. Accept the selection. Location: Enter the location of DPX, usually c:\program Files\DPX. Click Save. The Configure Resource screen appears. 4. Configure Reporter agents by entering values in fields on the Configure Resource screen: Monitor Backup Server: Select whether or not to monitor backup/restore activity on the master server. Level of the Log: Select the level of detail the client agent will log. Install Dir: Enter the path of the install directory of DPX. Note that the default Windows path is C:\Program Files\DPX. User Name: Enter the user name used to log in to DPX. Password: Enter a password. Resource Name: Enter the resource name or IP address of the master server. Activity Frequency: Select how frequently the log file is monitored. The default frequency is five minutes. Media Frequency: Select how frequently the media database is monitored. The default frequency is twenty four hours. Click Save. This will return you to the Resources screen. 28
Step 3. Configure Virtualization VMware Resources On the Resources screen, the master server will display as two entries with same IP address: one entry is Reporter; the other entry is the master server. The master server entry enables Reporter to monitor computer activity on the master server. Note: On the Resources screen you will also see other resources, which are automatically discovered and added once agents are installed on those servers. Step 3. Configure Virtualization VMware Resources The following procedures apply to configuring agents in VMware environments. The procedures are described in the following two sections: Configuring VM Resources Configuring VM Virtual Center Resources Configuring VM Resources 1. On the main Reporter screen, select the Resources link under the Administration folder. The Resources screen appears. 2. From the drop-down list at the upper left, select Virtualization VMware ESX Host. Click Add. The Create New Resource for Agent: VMware ESX screen appears. 3. Enter values for fields on the Create New Resource for Agent: VMware ESX screen: Select Agent: Select a node that will communicate to DPX. This node can be any machine that has the Reporter agent installed. Note: Selecting the master server is not recommended. Tip: This node does not have to be in the Enterprise. Resource Display Name: Enter a descriptive name for your ESX master server. ESX IP Address: The IP address of your ESX Server. Active: Select this check box to enable the agent to collect VMware ESX data. Licensing: Select this check box. Click Save. A resources screen (Create New Resource for Agent: VMware ESX) appears. The added agent appears in the resources list in alphabetical order. 4. On the Resources screen, in the Agent column, select the agent you just added. The Configure Resource screen appears. 5. Configure Reporter VM ESX agents by entering values in fields under VMware Configuration (default values are recommended): 29
Step 3. Configure Virtualization VMware Resources Status: Select whether or not to monitor ESX activity. Selecting On ensures Reporter monitors your ESX server. URL: This is the path to the ESX server automatically generated based on the IP address. Accept the path provided. User Name: Enter the user name used to log in to the ESX host. Password: Enter the password used to log in to the ESX host. Config Frequency: Select how frequently to gather information on the ESX host. Performance Frequency: Select how frequently to gather information related to performance. Storage Frequency: Select how frequently to gather information related to storage. Collect Resource Pools: Specify whether or not to collect resource pool information for the ESX host. Click Save. This will return you to the Resources screen. 6. On the Resource screen, in the pane at the left, select Virtualization > Assign ESX Hosts. The host assignment screen appears. 7. On the host assignment screen: a. In the Assign By section, near the upper left, ensure the ESX radio button is selected. b. In the ESX Hosts section: i. In the Available field, select the ESX host to be monitored. ii. In the Reporter Data Collector field, select from the pull-down list the agent machine you previously defined for VM-related communication to Reporter. iii. In the Move field, use the down arrow to move items from Available to Selected. To deselect items, use the up arrow to move items from Selected to Available. c. Click Save. The Resources screen appears and the VM resource will be listed alphabetically. Configuring VM Virtual Center Resources 1. Select the Resources link under the Administration folder. The Resources screen appears. 2. From the drop-down list at the upper left, select Virtualization VMware VC Instance. Click Add. The Create New Resource for Agent: VMware VC appears. 3. Enter values for fields on the Create New Resource for Agent: VMware VC screen: Select Agent: Select a node that will communicate to DPX. This node can any machine that has the Reporter agent installed. Note: Selecting the master server is not recommended. 30
Step 4. Define Polling Resources Tip: This node does not have to be in the Enterprise. Resource Display Name: Enter a descriptive name for your VC server. VMware VC IP Address: The IP address of your VC server Click Save. The Configure Resource screen appears. 4. On the Configure Resource screen, enter values for your VM VC server: Status: Select whether or not to monitor activity on the VC server. URL: This is the path to the Virtual Center automatically generated based on the IP address. Accept the path provided. User Name: Enter the user name used to log in to the Virtual Center. Password: Enter the password used to log in to the Virtual Center. Discovery Frequency: Select how frequently to monitor Virtual Center clients. Collect Orphaned VMDK: Select whether or not to collect orphaned VMDK files. Click Save. This will return you to the Resources screen, where the Virtual Center will appear in alphabetical order 5. On the Resources screen, in the pane at the left, select Virtualization > Assign ESX hosts. The host assignment screen appears. 6. On the host assignment screen: a. In the Virtual Center Instance section at the top, select a Virtual Center from the pull-down list. b. In the Assign By section, near the upper left, make sure the ESX radio button is selected. c. In the ESX Hosts section: i. In the Available field, select the Virtual Center to be monitored. ii. In the Reporter Data Collector field, select from the pull-down list the agent you previously defined for VMrelated communication to Reporter. iii. In the Move field, use the down arrow to move items from Available to Selected. To deselect items, use the up arrow to move items from Selected to Available. d. Click Save. The Resources screen appears. All the ESX hosts in the Virtual Center will be displayed. Step 4. Define Polling Resources Reporter supports devices that can be polled for status information such as NetApp storage devices. On the Reporter Server, you can define these devices under the Administration folder's Resources screen. 31
Step 4. Define Polling Resources To define hosts, click the Resources link under Administration folder. You can create a new resource by selecting the type of device you want to add and then by clicking Add in the upper right. You will need the IP address, the name of the resource, and other parameters, depending on the type of resource. Choose the groups to which you want the device to belong. Assign the license types you want to use on that resource. 32
Chapter 8: Getting Started with Reporter Chapter 8: Getting Started with Reporter Logging In To log in, either click the Reporter icon on your desktop or open your web browser and type in the URL of Reporter server supplied by the administrator. If the administrator selected the default Web server port, type http://localhost:9000 into your browser. The login screen appears. Administrators logging in for the first time will also encounter a First Login window providing information on setting up Reporter defaults, defining groups and hosts, and starting the Reporter Services. Type the default username, which is admin, and the default password, which is also admin, to log in. Follow the instructions on the First Login window. We recommend you change the default password immediately and keep it different from the database password you entered during the installation process. Once devices are defined and being collected, a successful login will go to the Main Console not the First Login page. If you do not see the First Login window, you may see one of the following error messages. Message Reporter requires the use of JavaScript. The browser you are using either does not support JavaScript or it is disabled. Reporter requires the use of cookies. The browser you are using either does not support cookies or they are disabled. Resolution Enable JavaScript and press the Try Again link. Enable cookies and press the Try Again link. Type your assigned username and password in the appropriate fields and then click the Submit button. If you enter an incorrect username and/or password, the following message will appear. Login Failed. Please try again.' If you retry without success or never see a login or error message, contact your Reporter administrator for help. Note that a user will not be able to log in successfully if that user's privileges are restricted solely to email notification. If a login is successful, a customized console screen appears Note: The user's Main Console window presents a filtered view of data, blocking out information about hosts and devices that the user is not authorized to see. Only data pertaining to those groups to which the user has been assigned access will appear on the user's screen. Graphical User Interface Overview Once you have successfully logged in, you will be presented with a customized window including the following panes: the Navigation Tree, the Main Console, and the Enterprise Status (Enterprise License only). 33
Graphical User Interface Overview Navigation Tree The Navigation Tree appears on the left side of the screen with all folders closed. To view the contents, click on a folder and it will expand. Then you can choose an item beneath the main folder. Once the folder is open, you can click on an item and go to that function. Main Console The console you actually see will depend on both the permissions and the devices that the administrator has assigned to you. If you have been assigned to any group that contains at least one OS Host, you will see the Host Console for all the OS Hosts belonging to the same groups that you do. If none of the groups to which you have been assigned have an OS Host, but at least one contains a Backup Server, then you will see the Backup Console for all backup servers that belong to the same groups. Enterprise Status The Reporting Server Enterprise status screen gives the user a quick overview of the status of the OS hosts and backup status in near real time. Here you can link directly to the real time host monitor and the backup console. General GUI Notes The following points offer guidance regarding Reporter's graphical user interface. The user's console screen presents a filtered view of data, blocking out information about hosts and devices that the user is not authorized to see. Only data pertaining to those groups to which the user has been assigned access will appear on the user's screen. For example, if a user has been assigned to the Solaris group (with Solaris OS Hosts) but no other groups, then Solaris data will be displayed but information about Windows and HP-UX systems will not appear on that user's screen. If the user has not been assigned to a group, a Getting Started window will appear displaying the following message: There are currently no hosts visible to you. Either you have not been assigned to a group, or the hosts assigned to you have not begun collecting data. Contact your system administrator for more information. Administrators logging in for the first time will also encounter a similar Getting Started window providing information on defining groups and hosts, and starting the collector and event receiver. 34
Chapter 9: Uninstalling Reporter or Reporter Agents Chapter 9: Uninstalling Reporter or Reporter Agents To uninstall Reporter or Reporter agents: 1. Close the Services window. 2. Open the Windows Control Panel. 3. Select Add/Remove Programs. 4. Remove Reporter server or Reporter agent. 35
ACRONYMS A ACL Access Control List ACS Automated Cartridge System ACSLS Automated Storage Management ATL Automated Tape Library ATL Active Template Library AVB Agentless VMware Backup B ACRONYMS ACSSA AD ADIC AES AIX AML ANSI API ASCII A-SIS ASM Automated Cartridge System Library Software ACS System Administrator (StorageTek) Active Directory Advanced Digital Information Corporation Advanced Encryption Standard Advanced Interactive Executive Automated Mixed-Media Library American National Standards Institute Application Programming Interface American Standard Code for Information Interchange Advanced Single Instance Storage Bcc Blind Carbon Copy BLB Binary Large Object BLI Block Level Incremental BMR Bare Metal Recovery C CA Certificate Authorities CAP Cartridge Access Port CBT Change Block Tracking Cc Carbon Copy CCMS Computer Center Management System CCR Cluster Continuous Replication CD 36
Compact Disc Documentation Management Services ACRONYMS CIFS DNS Common Internet File System Domain Name System CLI DOM Command Line Interface Domain CPU DOS Central Processing Unit Disk Operating System CSI DOSS Client System Interface DPX Open Storage Server CSV DSR Comma Separated Value Dissimilar Restore D DAG Database Availability Group DAOS Domino Attachment and Object Service DAR Direct Access Recovery DAS Direct Attached Storage DFS Distributed File System DGUX Data General UNIX DHCP Dynamic Host Communication Protocol DLL Dynamic Link Library DLT Digital Linear Tape DMS DVD Digital Versatile Disc E EDB Exchange Database EE Enterprise Edition EEE Enterprise-Extended Edition EFS Encrypting File System EMBR DPX Exchange Mailbox Recovery EOJ End Of Job ESC Enhanced Security Configuration F FAS 37
Fibre-Attached Storage FV Full Virtualization G GB Gigabyte GNU General Public License GPT GUID Partition Table GUI Graphical User Interface GUID Global Unique Identifier H HBA Host Bus Adapter HP-UX Hewlett Packard UNIX HSM Hierarchical Storage Management HTTP Hypertext Transfer Protocol I IA Instant Access IBM International Business Machines ACRONYMS IBM 3494 IBM Magstar 3494 Tape Library IE Internet Explorer IIS Internet Information Services IP Internet Protocol IPX Internetwork Packet Exchange iscsi Internet Small Computer System Interface ISO International Organization for Standardization IV Instant Virtualization J JDBC Java Database Connectivity JRE Java Runtime Environment K KB Knowledge Base KMS Knowledge Management System L LAN 38
ACRONYMS Local Area Network LDAP Lightweight Directory Access Protocol LMU Library Management Unit LSM Library Storage Module LTO Linear Tape Open LUN Logical Unit Number LVM Logical Volume Management M MAC Media Access Control MB Megabyte MML Media Management Layer MOSS Microsoft Office SharePoint Server MTA Message Transfer Agent N NAS Network Attached Storage NCF NetWare Control File NCS Novell Clustering Services NDMP Network Data Management Protocol NDS Novell Directory Services NFS Network File System NIC Network Interface Controller NIS NetWare Installation Services NSS Novell Storage System NTFS NT File System O OES Open Enterprise Server OS Operating System OSSV Open System SnapVault P P2V Physical to Virtual PC Personal Computer PDF Portable Document Format PNL 39
ACRONYMS Panel Rapid Return to Production PO RSG Post Office Recovery Storage Group (Exchange) POA RSM Post Office Agent Removable Storage Manager PXE RSS Pre-boot Execution Environment Remote Storage Service Q QoS S SAN Quality of Service qtree Quota Tree R RAC Real Application Clusters RAID Redundant Array of Independent Disks RAM Random Access Memory RC Return Code RDB Recovery Database (Exchange) RDM Raw Device Mapping ReFS Resilient File System RMAN Recovery Manager (Oracle) RRP Storage Area Network SAPDBA SAP Database Administrator SCSI Small Computer System Interface SDLC Scalar Distributed Library Controller SGI Silicon Graphics International (IRIX) SIDF System Independent Data Format SIS Single Instance Storage SLA Service Level Agreement SLDM Solaris Logical Disk Manager SLES SUSE Linux Enterprise Server SMDR Storage Management Date Requester SMIT 40
System Management Interface Tool SMTape SnapMirror-to-Tape SMTP Simple Mail Transfer Protocol SNIA Storage Networking Industry Association SNMP Simple Network Monitoring Protocol SPF System Protected Files SPOR DPX SharePoint Object Recovery SQL Structured Query Language SRM Storage Resource Manager SSI Storage Server Interface SSL Secure Sockets Layer SSO Single Sign-On SSP Shared Service Provider SSPRODIR DPX Product Directory SVM Solaris Volume Manager SYSADMIN System Administrator T ACRONYMS TB Terabyte TCP/IP Transmission Control Protocol/Internet Protocol TFTP Trivial File Transfer Protocol TLS Transport Layer Security TNS Transparent Network Substrate TSA Target Service Agents TTY Teletype U UAT Upgrade Assessment Tool UEFI Unified Extensible Firmware Interface UFS UNIX File System URL Uniform Resource Locator USB Universal Serial Bus V V2P Virtual to Physical VADP vstorage APIs for Data Protection 41
ACRONYMS VC Virtual Center VD Virtual Desktop VG Volume Group VM Virtual Machine VMFS Virtual Machine File System VMDK Virtual Machine Disk VSS Volume Snapshot Service VTL Virtual Tape Library VTOC Virtual Table of Contents VxFS Veritas File System VxVM Veritas Volume Manager W WAN Wide Area Network WMI Windows Management Instrumentation WS Web Server WSPN Web Server Port Number 42
TERMINOLOGY A administrator A user authorized for administrative functions such as defining backup jobs. administrator group A set of administrators assigned to share common resources and functions. agentless backup A method to back up virtual machines under a hypervisor without the need for backup agents on the virtual machines. Agentless VMware Backup A feature that exploits VMware vstorage application programming interface for data protection and change block tracking to enable off-host backup of vsphere virtual machines through DPX backup proxy servers, eliminating the need to install and run a backup agent on virtual machines or ESX servers. alternate secondary An alternate location where backup data resides. This alternate location could be a replica of the original data using NetApp SnapMirror, copied through Data ONTAP commands, or restored from a tape backup. Data can be restored from an alternate secondary data source directly from the management console. Application Recovery A DPX Block Data Protection feature that rapidly recovers Oracle, SharePoint, SQL Server, and Exchange data with a high degree of granularity. B backup definition A set of parameters that defines key elements of a backup job, such as backup type, source data, destination, and schedule. TERMINOLOGY backup instance A point-in-time backup that can be selected for restore. backup mode Any of several modes for backing up, including Block, Agentless VMware, NDMP, Image, and File. One way in which the modes differ is the underlying method by which the data is transferred. backup type A term used to distinguish among base, incremental, and differential backups. Bare Metal Recovery A disk-based disaster recovery feature that enables administrators to restore an entire system environment for an individual computer. A full recovery using Bare Metal Recovery includes the operating system, point-in-time backed up data, and Oracle, SharePoint, SQL Server, and Exchange data if applicable. If the computer being recovered is a master server, Bare Metal Recovery additionally restores the application. base backup A backup type that backs up all the data in the selected job definition. Block backup to DPX open storage A feature that provides block-level incremental backup for Windows and Linux clients to any storage attached to a supported 64-bit Windows server. Block mode A backup and restore mode that uses DPX Block Data Protection technology to perform block-level backup to either DPX open storage or NetApp storage. block-level incremental A scheme used for backups where all backups after the first base backup transfer only blocks that have changed since the previous backup, and transferred data is synthesized on sec- 43
TERMINOLOGY C ondary storage into a full point-in-time snapshot of the primary system. Catalog A database that stores all job information, retention information, and information about all backed up data. The Catalog is on the master server. Catalog condense An operation to reduce the size of the Catalog by eliminating unneeded information such as expired backup jobs. Catalogic DPX Catalogic data protection software that uses block-level backup to protect data, applications, and servers. File-level backup and disk-to-diskto-tape is also supported. client or client node Any node in an Enterprise which is a source for backup data. Master servers and device servers can also be client nodes. cluster Multiple computers and redundant interconnections that form what appears to be a single, highly available system. Clustering ensures that when a computer unexpectedly fails or is intentionally taken down, the processes and services it is running fail over to another computer in the cluster without interruption or the need for immediate user intervention. configuration The process that entails defining the properties of nodes, storage devices, media, and administrators. controller node A node that communicates with and controls a media changer. D destination For a backup, the destination is the location to which data is backed up. For a restore, the destination is the location to which data is restored. The destination is selected in the destination panel of the backup or restore function window, as appropriate. Same as target. detect utility A utility that performs and reports on device detection within automated tape libraries. device cluster A set of similar devices, for example LTO4 tape drives, logically grouped to simplify backup definition. The software dynamically chooses an available device from the specified device cluster for use in a backup. The tape drives in a tape library can be considered a device cluster. Device Configuration Wizard A utility that bypasses many of the manual steps otherwise required for setting up tape libraries and standalone devices to work with the software. The Device Configuration Wizard helps discover, aggregate, and set up all the necessary media changer and device related hardware configuration for tape library use. device path The node through which data flows from the network to a storage area network device. A storage area network device can have multiple device paths, each through a different node. Every node that can access the storage area network could be a path to that device. For a non-storage area network device, there is only one device path per device device server A node where one or more storage devices are attached directly or through a storage area network. differential backup A backup type that backs up all data on the selected nodes that have changed since the 44
TERMINOLOGY last base backup of the same name. Direct Access Recovery A process that enables restores from a Network Data Management protocol backup without having to scan the entire backup image. DiskDirectory A virtual tape device that uses traditional media agents to save data into proprietary formatted files hosted on a device server. DiskDirectories are used with file mode backups and do not benefit from features such as Bare Metal Recovery. Backups to DiskDirectory are often used in cases where clients need to stream data to faster disk devices and later move the data to tape. DPX Block Data Protection A protection and recovery model that comprehensively backs up client nodes to diskbased storage using the DPX agent. Features include block-level incremental snapshot technology, Instant Access and Instant Virtualization, source and target side data reduction, bare metal recovery, and application recovery. DPX open storage server The destination server for a Block backup to DPX open storage operation. E Enterprise The entire set of resources, including nodes, devices, media, administrators, defined to a master server. Exchange Mailbox Recovery A utility that utilizes Instant Access to easily recover mailbox items from dismounted Exchange databases and information store files. Also enables copying, searching, and analyzing e-mail and e-mail attachments, calendar items, contacts, etc. F File mode A backup or restore mode that backs up and restores at the file level, not block level. Also referred to as File backup or File restore. Full Virtualization A feature that creates, and optionally boots, a virtual machine created directly from a DPX Block Data Protection snapshot. I Image mode A base backup mode at block level, typically to tape, or a restore mode from such a backup. This mode is used only for remote seeding and protection of a DPX open storage server. Also referred to as Image backup or Image restore. incremental backup A backup type that backs up data that has changed on the selected nodes since the last incremental, differential, or base backup of the same job name. installation The process of loading the software and adding new nodes to the Enterprise. Instant Access A feature that provides instant writable access to data and application recovery points. A DPX Block Data Protection snapshot is mapped to a target server where it can be accessed, copied, or put immediately into production use as needed. Instant Virtualization A feature that creates a virtual machine by directly mapping devices from the restore point for fast startup. Instant Virtualization is similar to Full Virtualization except that data is not physically transferred. 45
TERMINOLOGY J job folder User defined sets of jobs, such as backup jobs, that facilitate assigning job privileges to administrator groups. job monitor A feature that enables job control functions, including suspending a job, starting or resuming a job, canceling a job, previewing a job, and monitoring a job. K keyring A group of keys used for data encryption. L license key A proprietary alphanumeric string assigned when licensing. Same as product key. logical unit number A logical unit of storage identified by a number. This term is often used to describe a data set associated with fiber channel physical storage, or iscsi presented data sets. M management console A graphical user interface that offers clear and visual methods for performing functions. Same as GUI. manual configuration The process that employs the management console to define the properties of nodes, devices, media, and administrators. mapping A process that uses Instant Access to present a snapshot to a host, making the backup data set read/write accessible through iscsi. Same as IA mapping. master server A server that contains the product software including the Catalog and modules that control resource and job management, scheduling, and distributed processing. The master server can also be a client node. media A storage unit such as a tape or DiskDirectory. Same as media volume. media arm device file The file name of the tape library driver. It is installed on a controller node and enables the software to communicate with a given media changer. media changer The device in a tape library that moves tapes between storage devices and tape slots. Same as medium changer and robotic arm. media pool A set of similar media logically grouped to simplify tape management. The software dynamically chooses available media from the specified media pool for use in a backup. N NetApp Open System SnapVault A feature that backs up open systems, such as HP-UX and AIX, to disk-based storage hosted on NetApp secondary storage systems using the NetApp Open System SnapVault agent. NetApp Open System SnapVault does not have DPX Block Data Protection feature support such as Bare Metal Recovery and Instant Virtualization. NetApp SnapMirror A NetApp software product for replicating data sets between NetApp storage systems. NetApp SnapVault Management A feature that manages NetApp SnapVault and NetApp Open System SnapVault backup and 46
TERMINOLOGY recovery through the management console. NetApp storage controller The component of a NetApp storage system that runs the Data ONTAP operating system and controls its disk subsystem. Storage controllers are sometimes referred to as controllers, storage appliances, appliances, storage engines, heads, CPU modules, or controller modules. NetApp storage system A disk-based appliance that stores DPX Block Data Protection snapshots. For pre-configuration and Bare Metal Recovery, this is sometimes referred to as a SnapVault secondary storage system. Network Data Management Protocol An Internet standard protocol implemented and extended by hardware manufacturers for device control. Network Data Management Protocol operations typically cover access to disk and tape drive resources for backup and restore operations. Network Data Management Protocol mode A backup and restore mode that backs up from or restores data to disk storage system using Network Data Management Protocol. Also referred to as NDMP backup or NDMP restore. node A machine on the network that is part of the Enterprise. node group A set of nodes logically grouped to simplify backup definitions. All nodes must belong to a node group. P parameter configuration The process that entails defining software module parameters and environmental variables. privilege class A role-based set of administrative privileges that can be assigned to administrators. product upgrade A feature to upgrade the client and device server software across the Enterprise from a single point. Same as auto-upgrade and autoupgrade. R Rapid Return to Production A feature that creates a full production virtual machine from an existing virtual machine created with Instant Virtualization. The virtual machine is available immediately for production, while data is transferred in the background to a newly created virtual machine disk file. remote deployment A feature to install client software across the Enterprise from a single point. Reporter A feature that provides sophisticated reporting to help manage and administer protection for the Enterprise. restore definition A set of parameters that defines key elements of a restore job, such as source data, destination, and schedule. restore mode One of several types of restore, including Block, Agentless VMware, NDMP, Image, File, and Tape. retention period The time range during which snapshot data is available for restore. Same as retention. S scheduler A function for designating the time, frequency, and reoccurrence of a job. seeding A procedure used to initiate block-level incremental backups when the source data exists on 47
TERMINOLOGY the other side of a slow wide area network connection. The base backup is physically transported to the remote site, where it is copied to a disk storage system. Once seeded, the remote storage system continues to receive incremental backups over the wide area network. SharePoint Object Recovery A utility that enables administrators to easily find and rapidly recover SharePoint objects. snapshot A point-in-time block-level copy of a volume or entire node. The snapshot exists on a disk storage system for recovery at file, folder, volume, or node level. software update The process of applying software patches either manually or through the software update system. Same as auto-update and autoupdate. software update system A utility to deliver and deploy a software update. source For a backup, the source is the location of data to be backed up. For a restore, the source is the location of the backup. The source is selected in the source panel of the backup or restore function window in the management console, as appropriate. storage area network A fiber channel based network used to provide common access to storage and tape devices across many servers. See device path. storage device A device, such as a tape drive, used to write data onto or read data from disk or tape media. storage system The destination for backup snapshots and the source for recoveries. This is sometimes referred to as secondary storage or backup storage. Registration DB, registry, and system protected files. system table A collection of the Microsoft Windows components including event logs, removable storage manager, terminal server, and Windows Management Instrumental repository. T tape drive A device used to write data onto or read data from tape media. Same as tape device. tape library A hardware unit comprised of multiple physical or virtual tape drives and tape slots with a media changer for automatically inserting and removing tapes. Same as automated tape library and jukebox. Tape mode A restore mode that restores data from one or more media. This option is useful for restoring uncataloged data. In this mode, a search pattern is specified, and then searches the media for data that fits the pattern and restores it. Also referred to as Tape backup or Tape restore. tape slot A component of a tape library where a tape is stored when not in use. Transmission Control Protocol/Internet Protocol An Internet standard communication protocol used to communicate with nodes in the Enterprise. Usually referred to as TCP/IP. U Upgrade Assessment Tool A utility that identifies potential issues, such as unsupported features, before a product upgrade is run. system state A collection of the Microsoft Windows components including boot files, COM+ Class 48
TERMINOLOGY V virtual node An object that represents clustered or distributed services through two or more physical nodes. Examples of support through virtual nodes include clusters, SQL server, SharePoint farms, and Exchange 2010 database availability groups. virtualization The process of creating a virtual machine from a snapshot. Types of virtualization are Instant, Full, and Rapid Return to Production. virtualization proxy server A node that coordinates operations for virtualization restores and for agentless backup of virtual machines. volser The volume serial number. This is a unique identifying number written to a media volume, such as a tape, or a disk directory volume. Also referred to as a media volume label or tape label. 49
TRADEMARKS TRADEMARKS This publication contains proprietary and confidential material, and is only for use by licensees of Catalogic DPX, Catalogic BEX, or Catalogic ECX proprietary software systems. This publication may not be reproduced in whole or in part, in any form, except with written permission from Catalogic Software. Commonly Used Company and Product Names The following companies and products might be used in the Catalogic DPX documentation and management console: Adobe Reader, PDF Flexera Software InstallShield FreeBSD Hewlett Packard or HP HP-UX, HP Tru64 UNIX IBM DB2, Lotus Notes, Domino, AIX, Magstar, Tivoli Storage Manager Kroll Application Recovery Options, Exchange Mailbox Recovery, SharePoint Object Recovery Linux Microsoft AlwaysOn, Excel, Exchange, Hyper-V,Internet Explorer, Internet Information Services (IIS), iscsi Initiator, Notepad, SharePoint, SQL Server, Vista, Visual SourceSafe (VSS), Windows, Windows Server, Word, WordPad NetApp Novell Oracle Data ONTAP, FilerView, FlexVol, NearStore, NOW, RAID-DP, SnapMirror, Snapshot, OSSV, WAFL, FlexClone, SnapVault, SnapManager, OnCommand, MultiStore NetWare, Open Enterprise Server, GroupWise, SUSE, edirectory Java, Solaris, RMAN, StorageTek Tape Storage Quantum 50
TRADEMARKS Advanced Digital Information Corp. Red Hat CentOS SAP SGI Sybase IRIX, XFS UNIX VMware ESX server, ESXi server, vcenter, vsphere, VMware Consolidated Backup, vmotion, VDDK, VMDK Additional Trademark Information The following list contains additional trademark information: Catalogic, Catalogic Software, DPX, BEX, ECX, and NSB are trademarks of Catalogic Software, Inc. Backup Express is a registered trademark of Catalogic Software, Inc. All other company and product names used herein may be the trademarks of their respective owners. NetApp, the NetApp logo, Go further, faster, Data ONTAP, FilerView, FlexClone, FlexVol, NearStore, RAID-DP, Snapshot, and SnapVault are trademarks or registered trademarks of NetApp, Inc. in the United States and/or other countries. NetApp provides no representations or warranties regarding the accuracy, reliability, or serviceability of any information or recommendations provided in this publication, or with respect to any results that may be obtained by the use of the information or observance of any recommendations provided herein. The information in this document is distributed AS IS, and the use of this information or the implementation of any recommendations or techniques herein is a customer's responsibility and depends on the customer's ability to evaluate and integrate them into the customer's operational environment. This document and the information contained herein may be used solely in connection with the NetApp products discussed in this document. Windows and SharePoint are registered trademarks of Microsoft Corporation. Oracle and Java are registered trademarks of Oracle and/or its affiliates. VMware is a registered trademark of VMware, Inc. Novell is a service mark of Novell, Inc. and a registered trademark of Novell, Inc. in the United States and other countries. SUSE is a registered trademark of Novell, Inc. Linux is the registered trademark of Linus Torvalds in the U.S. and other countries. 51
TRADEMARKS UNIX is a registered trademark of The Open Group in the United States and other countries. Red Hat is a registered trademark of Red Hat, Inc. in the United States and other countries. AIX is a registered trademark of International Business Machines Corporation, registered in many jurisdictions worldwide. Sybase is a registered trademark of Sybase, Inc. or its affiliates. SAP is the trademark(s) or registered trademark(s) of SAP AG in Germany and in several other countries. Quantum is a registered trademark of Quantum Corporation, registered in the U.S. and other countries. FreeBSD is a registered trademark of The FreeBSD Foundation. SGI and IRIX are registered trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. This document might contain certain diagrams created using the official VMware icon and diagram library. Copyright 2010 VMware, Inc. All rights reserved. Copyright 2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed at http://www.vmware.com/go/patents. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. All other company and product names used herein may be the trademarks of their respective owners. 52
INDEX A About this Document 21 acronyms 36 Agents folder 27 applications guide audience and purpose 11 introduction 11 audience for applications guide 11 C compatibility considerations Solaris 22 SQL 17 Windows 22 D Database 23 Databases Media 28 definitions 43 device server 26 documentation 6 Documentation Knowledge Base and Technical Support 6 DPX Overview 6 E ESX server 29 F For Additional Information 22 Functional GUI windows Agent Setup 27 Configure Resource 28-29 Create New Resource for Agent VMware ESX 29 VMware VC 30 Create New Resources for Agent 28 First login 33 Getting Started 34 G Main Console 33 Enterprise Status 33 Main Console 33 Navigation Tree 33 Main Resources Screen 28 Resources 28-30 glossary 43 H Help getting 6 I Instant Access (IA) with EMR 13 with SOR 18 IP address 24-28, 32 ESX 29 VMware VC 31 K Knowledge Base 6 L License file 24 license key reporter installation 26 Login 27 M MAC address 24 master server 21, 28-29 Memory 23 N NetApp support 6 NetApp storage devices 31 Nomenclature 22 INDEX 53
INDEX O Orphaned VMDK 31 Overview 6 P Polling Resources 31 Ports 23 Agent port 26-27 Communications port 23 SNMP port 26-27 Trap listener port 23 Web server port 23, 27, 33 purpose of applications guide 11 R RAID 23 Report types Customizable reporting 21 Exception reports 21 Forecasts 21 Management reports 21 Master server reports 21 Media reports 21 Monitoring 21 Multiple backup server data 21 Node perspective 21 Notifications 21 Post-job reports 21 Trending 21 T terminology 43 Trademarks 50 U unicode 10 uninstalling reporter 35 Upgrades 24 V VC 30 Virtualization 29-30 VM Resources configuring 29 VM Virtual Center 30 VMware 29 S Servers HP-UX 34 Solaris 34 Windows 34 Services 26, 35 MySQL 23-24 ReporterAgent 27 Services Setup 26 SharePoint Object Recovery (SPOR) 17 SPOR 17 SQL Server and SOR 17 support contacting 6 Support 6 54