Microsoft Exchange Recovery using N series Snapshots

Similar documents
Disaster Recovery Procedures for Microsoft SQL 2000 and 2005 using N series

Active Directory Synchronization with Lotus ADSync

IBM Rational Rhapsody NoMagic Magicdraw: Integration Page 1/9. MagicDraw UML - IBM Rational Rhapsody. Integration

Rapid Data Backup and Restore Using NFS on IBM ProtecTIER TS7620 Deduplication Appliance Express IBM Redbooks Solution Guide

IBM Enterprise Marketing Management. Domain Name Options for

Installing on Windows

IBM Security QRadar Version Installing QRadar with a Bootable USB Flash-drive Technical Note

IBM Cognos Controller Version New Features Guide

Platform LSF Version 9 Release 1.2. Migrating on Windows SC

Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management

Integrating ERP and CRM Applications with IBM WebSphere Cast Iron IBM Redbooks Solution Guide

IBM Security QRadar Version (MR1) Checking the Integrity of Event and Flow Logs Technical Note

Tivoli Endpoint Manager for Security and Compliance Analytics. Setup Guide

IBM Network Advisor IBM Redbooks Product Guide

IBM Security SiteProtector System Migration Utility Guide

IBM Configuring Rational Insight and later for Rational Asset Manager

QLogic 8Gb FC Single-port and Dual-port HBAs for IBM System x IBM System x at-a-glance guide

IBM Endpoint Manager Version 9.2. Software Use Analysis Upgrading Guide

Tivoli Endpoint Manager for Configuration Management. User s Guide

Communications Server for Linux

Tivoli IBM Tivoli Monitoring for Transaction Performance

IBM Financial Transaction Manager for ACH Services IBM Redbooks Solution Guide

Setting up CIFS shares and joining the Active Directory. Why join an N series storage system to Active Directory?

Version 8.2. Tivoli Endpoint Manager for Asset Discovery User's Guide

Case Study: Process SOA Scenario

QLogic 4Gb Fibre Channel Expansion Card (CIOv) for IBM BladeCenter IBM BladeCenter at-a-glance guide

IBM TRIRIGA Anywhere Version 10 Release 4. Installing a development environment

IBM PowerSC Technical Overview IBM Redbooks Solution Guide

Broadcom NetXtreme Gigabit Ethernet Adapters IBM Redbooks Product Guide

IBM Enterprise Marketing Management. Domain Name Options for

IBM Security QRadar Version (MR1) Replacing the SSL Certificate Technical Note

Tivoli Endpoint Manager for Security and Compliance Analytics

IBM SmartCloud Analytics - Log Analysis. Anomaly App. Version 1.2

DataPower z/os crypto integration

Getting Started with IBM Bluemix: Web Application Hosting Scenario on Java Liberty IBM Redbooks Solution Guide

OS Deployment V2.0. User s Guide

Patch Management for Red Hat Enterprise Linux. User s Guide

IBM Flex System PCIe Expansion Node IBM Redbooks Product Guide

Redbooks Paper. Local versus Remote Database Access: A Performance Test. Victor Chao Leticia Cruz Nin Lei

Big Data Analytics with IBM Cognos BI Dynamic Query IBM Redbooks Solution Guide

IBM DB2 Data Archive Expert for z/os:

IBM Endpoint Manager for OS Deployment Windows Server OS provisioning using a Server Automation Plan

IBM FileNet Capture and IBM Datacap

Redpaper. IBM Workplace Collaborative Learning 2.5. A Guide to Skills Management. Front cover. ibm.com/redbooks. Using the skills dictionary

IBM Security QRadar Version (MR1) Configuring Custom Notifications Technical Note

Creating Applications in Bluemix using the Microservices Approach IBM Redbooks Solution Guide

Release Notes. IBM Tivoli Identity Manager Oracle Database Adapter. Version First Edition (December 7, 2007)

Linux. Managing security compliance

Redbooks Redpaper. IBM TotalStorage NAS Advantages of the Windows Powered OS. Roland Tretau

ServeRAID H1110 SAS/SATA Controller for IBM System x IBM System x at-a-glance guide

IBM VisualAge for Java,Version3.5. Remote Access to Tool API

IBM RDX USB 3.0 Disk Backup Solution IBM Redbooks Product Guide

IBM Cognos Controller Version New Features Guide

Getting Started With IBM Cúram Universal Access Entry Edition

IBM Tivoli Service Request Manager 7.1

Table 1 shows the LDAP server configuration required for configuring the federated repositories in the Tivoli Integrated Portal server.

IBM Endpoint Manager for Software Use Analysis Version 9 Release 0. Customizing the software catalog

IBM Security QRadar Version (MR1) Installing QRadar 7.1 Using a Bootable USB Flash-Drive Technical Note

z/os V1R11 Communications Server system management and monitoring

IBM TRIRIGA Application Platform Version Reporting: Creating Cross-Tab Reports in BIRT

IBM TRIRIGA Version 10 Release 4.2. Inventory Management User Guide IBM

Packet Capture Users Guide

IBM XIV Management Tools Version 4.7. Release Notes IBM

IBM FileNet System Monitor FSM Event Integration Whitepaper SC

IBM Security QRadar Version Common Ports Guide

Brocade Enterprise 20-port, 20-port, and 10-port 8Gb SAN Switch Modules IBM BladeCenter at-a-glance guide

IBM Client Security Solutions. Password Manager Version 1.4 User s Guide

IBM Lotus Protector for Mail Encryption

Sametime Version 9. Integration Guide. Integrating Sametime 9 with Domino 9, inotes 9, Connections 4.5, and WebSphere Portal

WebSphere Application Server V6: Diagnostic Data. It includes information about the following: JVM logs (SystemOut and SystemErr)

Redpaper. IBM Tivoli Storage Manager: Bare Machine Recovery for. Front cover. ibm.com/redbooks

Broadcom NetXtreme 10 GbE SFP+ Network Adapter Family for System x IBM Redbooks Product Guide

Emulex 8Gb Fibre Channel Expansion Card (CIOv) for IBM BladeCenter IBM BladeCenter at-a-glance guide

IBM XIV Provider for Microsoft Windows Volume Shadow Copy Service Version Release Notes

Introduction to Windows Server 2016 Nested Virtualization

Remote Support Proxy Installation and User's Guide

IBM FlashSystem. SNMP Guide

IBM Enterprise Content Management Software Requirements

Sterling Supplier Portal. Overview Guide. DocumentationDate:9June2013

IBM Storage Server. Installing the IBM storage server

WebSphere Commerce V7.0

IBM Flex System FC port 16Gb FC Adapter IBM Redbooks Product Guide

IBM WebSphere Message Broker - Integrating Tivoli Federated Identity Manager

Rational Reporting. Module 3: IBM Rational Insight and IBM Cognos Data Manager

ServeRAID M5000 Series Performance Accelerator Key for IBM System x IBM System x at-a-glance guide

Software Usage Analysis Version 1.3

New!! - Higher performance for Windows and UNIX environments

SmartCloud Monitoring - Capacity Planning ROI Case Study

Implementing the End User Experience Monitoring Solution

IBM Connections Plug-In for Microsoft Outlook Installation Help

IBM Client Security Solutions. Client Security User's Guide

Reading multi-temperature data with Cúram SPMP Analytics

Power Management. User s Guide. User s Guide

S/390 Virtual Image Facility for LINUX Guide and Reference

BlackBerry Web Desktop Manager. Version: 5.0 Service Pack: 4. User Guide

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and October 2013

IBM Lotus Protector for Mail Encryption. User's Guide

Tivoli Security Compliance Manager. Version 5.1 April, Collector and Message Reference Addendum

Front cover Smarter Backup and Recovery Management for Big Data with Tectrade Helix Protect

Transcription:

Redpaper Alex Osuna Bert Jonker Richard Waal Henk Vonk Peter Beijer Microsoft Exchange Recovery using N series Snapshots In this Redpaper we provide instructions on how to restore snapshots from the SnapManager console. Introduction Restore a snapshot when you must do one of the following: Recover lost or corrupt data Recover individual deleted or archived mailboxes Recover email items from a users mailbox Restore a mail store to the recovery storage group Our Environment The following configurations are used to develop this paper (Figure 1 on page 2): 2x IBM Xseries 3850 in a cluster Broadcom onboard for cluster heartbeat 2x Intel PCI dual port 1 GB Ethernet adapter One port of each dual port adapter setup with its own IP adress to the storage VLAN One port of each dual port adapter setup in a smart load balancing team One active 11 stanby adapter MS Windows 2003 Enterprise R2 32 bit with SP2 MS Exchange 2003 Enterprise with SP2 Snapmanager for Exchange 4.0.0.1273 Snapdrive 5.0 Microsoft iscsi initiator 2.05 with MPIO Copyright IBM Corp. 2008. All rights reserved. ibm.com/redbooks 1

Nseries 2x n5200 A20 Ontap 7.2.3 Clustered X3850 VLAN N5200 A20 s clustered Figure 1 Our environment Restoring snapshots with SnapManager To successfully restore a snapshot, follow the steps that are described below: From the start menu: 1. Open the SnapManager for Exchange console. 2. Select the server name. 3. Click Restore. 4. Right-click Restore, the context menu appears. 5. Choose Restore Wizard (Figure 2 on page 3). 6. The welcome page appears. 2 Microsoft Exchange Recovery using N series Snapshots

Figure 2 Snapshot restore 7. Click Next to continue. 8. Choose Restore SnapManagerbackups that were created on the same Exchange Server Figure 3 on page 4) option. 9. Click Next. Note: SnapManager thinks of the Exchange cluster as one server, even though it is comprised of two separate nodes. Microsoft Exchange Recovery using N series Snapshots 3

Figure 3 Exchange wizard 10.Choose the snapshot you are restoring from the list of available snapshots are on the left side of the window. 11.Double-click the snapshot so that the name of the snapshot shows in the Selected Backups to restore field (Figure 4 on page 5). 12.Click Next to continue to the next window. 4 Microsoft Exchange Recovery using N series Snapshots

Figure 4 Choosing snapshot Now you must choose a Restore option. There are two options: Restore back to the same Storage Group As the name implies, this option restores the snapshot to the original Storage Group, overwriting all present data. This option is chosen in case of an emergency, when the Exchange Storage Group, or mail store must be available after a hardware or software failure. Restore to the Recovery Storage Group This option restores the selected snapshot to the Recovery Storage group. Use this option when to recover a select number of individual mailboxes, or to test a SnapManager restore. The restore you make to a Recovery Storage group does not affect the production data, so this type of restore is relatively safe to perform. The next few steps are the same for both restore options described above. The only difference is the location in which the restored data becomes available. With the first option, the restored data is stored to the original storage group. With the second option the restored data is located in the Recovery Storage group. In this case the procedure describes a situation in which the Restore back to the same Storage Group option is chosen. 1. Choose the Restore option by selecting the corresponding radio button. 2. Click Next to continue (Figure 5 on page 6). Microsoft Exchange Recovery using N series Snapshots 5

Figure 5 Choosing restore option 3. Choose the database you want to restore from the list of available mail stores and Public folder stores. 4. Check the box for each store you are restoring. Check all stores if you are recovering from a hardware or software failure, and are trying to get all the Exchange data back to its most recent state (Figure 6 on page 7). 5. Click Next to continue. 6 Microsoft Exchange Recovery using N series Snapshots

Figure 6 Choosing items to be restored Figure 7 on page 8 shows you how to restore snapshots using the following two options: A Point-In-Time restore The Exchange storage group is restored to the original snapshot. This means that all changes made to the mail stores after the time of the snapshot are lost. This scenario can be used in cases when the Exchange mail store is corrupt, or when you want to restore Exchange, but the log files of a storage group are not available or corrupt. Up-to-the-minute restore The Exchange mail store is restored to its original state during the snapshot. But in this scenario all available log files are played back. This ensures that all changes that occurred after the snapshot are made are incorporated in the mail store. This scenario is the preferred method to restore after an emergency, but requires that the log files for the particular storage group are available, and that they are located in the log directory that is configured in Exchange 2003. 6. Choose your preferred method of restoration, by selecting the corresponding radio button. 7. Click Next to continue. Microsoft Exchange Recovery using N series Snapshots 7

Figure 7 Choosing method of restoration You are given a choice to perform a test restore, or to perform an actual restore. In some situations it is useful to perform a test restore before you restore. A test restore gives you the ability to see if a restore encounters problems. In this scenario we perform an actual restore. 8. Choose the option to perform an actual restore. 9. Click Next to continue (Figure 8 on page 9). 8 Microsoft Exchange Recovery using N series Snapshots

Figure 8 Choosing type of restore You can choose SnapManager to verify the Exchange log files and databases before a restore. Choosing to verify log files and databases takes some time. You can speed up the restoration process by unchecking these option, which are selected by default. However, it is recommended that you let SnapManager verify the log files and database files. This Redpaper assumes that you choose to perform the verifications. 10.Select the verification options you desire (verification of log and database files, and exhaustive verification are recommended). 11.Click Next to continue (Figure 9 on page 10). Microsoft Exchange Recovery using N series Snapshots 9

Figure 9 Selecting verification options On the Mount options window (Figure 10 on page 11) you are able to choose if SnapManager must automatically mount a recovered database in Exchange 2003. This is useful if you want to have the restored stores available immediately after the restore. The option is selected by default, and in this scenario we also choose to restore using this option. If you, however, want to manually mount the store, uncheck the option. 12.Click Next to continue. 10 Microsoft Exchange Recovery using N series Snapshots

Figure 10 Choosing mount options 13.Figure 11 on page 12 shows a summary of actions that are performed by SnapManger. 14.Read the summary, and then click the Finish to confirm the restore operation. Microsoft Exchange Recovery using N series Snapshots 11

Figure 11 Summary page 15.A status window appears (Figure 12 on page 13). The window displays the tasks that are carried out by SnapManager. 16.Click the Start Now to begin the actual restore operation. 12 Microsoft Exchange Recovery using N series Snapshots

Figure 12 Status window 17.If you have chosen to restore using the Point-in-Time option, a warning message appears (Figure 13). It warns you that all data created after the moment that the specific snapshot is created will be lost. If you are sure that this is ok, click the Yes to begin restoring. If not, choose No, go back and select the Up-to-the-Minute option. Figure 13 Warning message 18.The Restore Status window shows you the status of the restore operation. 19.When the restore is finished successfully, a message appears. 20.Click OK to close the message. Depending on the choice you made earlier to automatically mount recovered databases, you might need to mount the stores in Microsoft Exchange to make the data available for users. Microsoft Exchange Recovery using N series Snapshots 13

The team that wrote this IBM Redpaper This paper was produced by a team of specialists from around the world working at the International Technical Support Organization, Austin Center. Alex Osuna is a project leader at the International Technical Support Organization, Tucson Center. He has 30 years in the IT industry mainly focused on storage. He writes extensively and teaches IBM classes worldwide on all areas of storage. Before joining the ITSO 3 years ago, Alex worked as a Pricipal Engineer in Tivoli Storage. Alex holds over 10 certifications form IBM, Microsoft and RedHat. Bert Jonker is a Senior IT Specialist in the Netherlands. He has more than 10 years of experience as a technical teamlead on large acounts and complex projects. His areas of expertise include a range of Microsoft Windows products in combination with several storage solutions. He has written extensively on migration scenarios at large environment Richard Waal is an IT Specialist in the Netherlands. He has 6 years of experience as an engineer working on both national and international large infrastructure projects for different customers. His areas of expertise focuses on Microsoft technology and scripting. Henk Vonk is a IT Specialist in The Netherlands. He has more than 5 years experience on large accounts as technical engineer. His area of expertise include Microsoft Products. Peter Beijer is a IT Specialist in The Netherlands. He has more than 5 years experience on large accounts as technical engineer. His area of expertise include Microsoft Products. 14 Microsoft Exchange Recovery using N series Snapshots

Notices This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-ibm product, program, or service. IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not give you any license to these patents. You can send license inquiries, in writing, to: IBM Director of Licensing, IBM Corporation, North Castle Drive, Armonk, NY 10504-1785 U.S.A. The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Any references in this information to non-ibm Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk. IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you. Information concerning non-ibm products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-ibm products. Questions on the capabilities of non-ibm products should be addressed to the suppliers of those products. This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. COPYRIGHT LICENSE: This information contains sample application programs in source language, which illustrate programming techniques on various operating platforms. You may copy, modify, and distribute these sample programs in any form without payment to IBM, for the purposes of developing, using, marketing or distributing application programs conforming to the application programming interface for the operating platform for which the sample programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of these programs. Copyright International Business Machines Corporation 2008. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. 15

This document REDP-4428-00 was created or updated on July 7, 2008. Send us your comments in one of the following ways: Use the online Contact us review Redbooks form found at: ibm.com/redbooks Send your comments in an email to: redbooks@us.ibm.com Mail your comments to: IBM Corporation, International Technical Support Organization Dept. HYTD Mail Station P099 2455 South Road Poughkeepsie, NY 12601-5400 U.S.A. Redpaper Trademarks IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol ( or ), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at: http://www.ibm.com/legal/copytrade.shtml The following terms are trademarks of the International Business Machines Corporation in the United States, other countries, or both: IBM Redbooks (logo) Tivoli The following terms are trademarks of other companies: Snapshot, SnapManager, and the NetApp logo are trademarks or registered trademarks of NetApp, Inc. in the U.S. and other countries. Microsoft, Windows, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. "Microsoft product screen shot(s) reprinted with permission from Microsoft Corporation." Intel, Intel logo, Intel Inside logo, and Intel Centrino logo are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of others. 16 Microsoft Exchange Recovery using N series Snapshots