Wearing Both Belt and Suspenders: Not the latest in fashion, but it keeps your butt covered
|
|
- Kristina Bryan
- 5 years ago
- Views:
Transcription
1 Wearing Both Belt and Suspenders: Not the latest in fashion, but it keeps your butt covered EMC Proven Professional Knowledge Sharing October, 2007 Tore Eikanger Senior Systems Engineer Ementor AS
2 Table of Contents Summary... 3 Introduction... 3 Setting it all up... 4 Pools... 4 Schedules... 4 Groups... 5 Notification... 6 Clients... 7 About the author... 9 Disclaimer: The views, processes or methodologies published in this compilation are those of the author. They do not necessarily reflect EMC Corporation s views, processes or methodologies. 2
3 SUMMARY When we ask customers whether they want security or long-term nearline storage, they tend to answer, Yes, I ll take both please. This article describes a method for using groups, schedules, pools and scripts to maintain two copies of your backup data, and to utilize your tape library to keep your backups nearline as long as possible. The scenario we are building consists of a NetWorker server, a number of clients, one disk device and a tape library. INTRODUCTION When we plan an EMC NetWorker installation, we place a disk device in a fire cell separate from the backup and production servers. Among the reasons for this: The disk device will contain the latest backups It will be the easiest device to set up in a new environment in case of disaster recovery Disk devices support concurrent restores The disk device can be a single USB attached disk to a NAS server or a SAN disk array. EMC NetWorker uses the built-in cloning function to maintain two copies of your backup data, and stage data to move from one media to another. Combining the two is not easy, and deadlock situations often occur when the automatic staging and cloning fight for devices to perform its function. To avoid this, we are going to use cloning only, and a script to remove the original that is on the disk device. When I first started working with backups, we used the grandfather-father-son media rotation scheme to maintain backup history. To keep backup data nearline for as long as possible, we are going to use this scheme to keep daily backups for a month, weekly backups for the next two months, and monthly backups for a year. We are using several groups and pools for backup and cloning. To keep the amount of data to backup as small as possible, we are going to use a month-based full, differential and incremental schedule for file system backups. Customers seldom need to restore databases older than a couple of weeks. For this reason, we are running database backups in a weekly full and incremental schedule that we keep for a month. We treat mail servers the same way as database servers. If the customer needs longer history for conversations, or to comply with regulations, we recommend an archiving solution. 3
4 SETTING IT ALL UP POOLS We assign the disk device to the Default pool which is the destination for all backups. For cloning in a grandfather-father-son scheme, we set up three pools: Keep a month, Keep a quarter and Keep a year. We need a backup clone that is able to recycle to and from other pools, will not store index entries, and has a retention policy based on backup policies. We enable recycle to/from other pools to let NetWorker dynamically allocate tapes between these pools. This removes the guesswork in assigning the right amount of tape to each pool. We do the initial assignment; NetWorker will then redistribute tapes when needed. SCHEDULES For file system backup, we use monthly schedules to obtain a full backup the first weekend of the month, incremental during weekdays and differential backups the rest of the weekends. Since we clone these backups automatically after the groups are finished, we must separate the backup levels in different schedules. The first schedule handles full backups. We call it FS_Full. To set it up in the GUI, select Schedules, click configuration and turn off Show Schedule as Calendar. Create a new schedule with the following properties: Name : FS_Full Period : Week Action : skip skip skip skip skip skip skip Override : full first friday every month The FS_Diff schedule handles differential backups. The properties are as follows: Name : FS_Diff Period : Week Action : skip skip skip skip skip 5 skip Override : skip first friday every month Our customer works on a 5-day work schedule. We create a schedule, FS_Incr, for handling the incremental backups Monday to Thursday: Name : FS_Incr Period : Week Action : skip incr incr incr incr skip skip Override : 4
5 For handling database backups, we create a weekly full and incremental schedule with these properties: Name : DB_Full_Incr Period : Week Action : skip incr incr incr incr full skip Override : If we turn on Show Schedule as Calendar, and view the newly created schedules, we will easily see the save levels of the backups during the month. GROUPS We use groups to organize which clients are backed up at what time, at which backup level and to which pool we cloned the save sets. For file system backups, we create three groups with the following properties: Name : Grp_Full Start time : 23:50 Autostart : Enabled Clones : Enabled Clone pool : Keep a year Schedule : FS_Full Name : Grp_Diff Start time : 23:50 Autostart : Enabled Clones : Enabled Clone pool : Keep a quarter Schedule : FS_Diff Name : Grp_Incr Start time : 23:50 Autostart : Enabled Clones : Enabled Clone pool : Keep a month Schedule : FS_Incr For database backups, the group looks like this: Name : Grp_DB Start time : 22:00 Autostart : Enabled Clones : Enabled Clone pool : Keep a month Schedule : DB_Full_Incr 5
6 NOTIFICATION We create a custom notification to trigger the script to purge old save sets from disk, keeping the clones on tape. Make a copy of the existing notification Filesystem full - recover adv_file space. Call it Filesystem full remove savesets on disk. In the action field, put: C:\Program Files\Legato\nsr\bin\purge-ss.cmd. The purge-ss.cmd script looks like this: REM ********************************************************************** REM ** This batch-file creates a list of all savesets on the disk-device ** REM ** with more than two copies, i.e. also cloned to tape. The list is ** REM ** sorted with the oldest savesets first and output to a file. ** REM ** This file is then parsed, and the size of the savesets are added ** REM ** together until it reaches the amount of MB we want to free up on ** REM ** the advanced file-device. The save sets that where added up, are ** REM ** removed from disk using ssid/cloneid, thus keeping the clone ** REM ** located on tape. ** REM ** ** REM ** This script is provided AS IS, with no support or warranties of ** REM ** any kind, including but not limited to warranties of ** REM ** merchantability or fitness of any kind, expressed or implied ** REM ** ** REM ** 2007 Tore Eikanger, Ementor Norge AS ** REM *********************************************************************** REM Remove temp file used. del %temp%\ssdelete.txt del %temp%\mminfo.txt del %temp%\nsrstage.txt REM Counter for saveset sizes set totalsize=0 REM Amount of data in MB to be purged from disk. set freeup= REM Volume name of the advanced-file device (case-sensitive) set volname=diskdev1 REM Create list of ssid/cloneid ordered by time and with total size less that freeup mminfo -xc, -q "volume=%volname%.ro,copies>2" -r "ssid, cloneid, sumsize, client, savetime, level, name" -ot>%temp%\mminfo.txt for /f "skip=1 tokens=1,2,3,4* delims=, " %%f in (%temp%\mminfo.txt) do call :PARSE %%f %%g %%h %%i REM Delete savesets on diskdevice for /f %%f in (%temp%\ssdelete.txt) do nsrmm -d -v -y -S %%f REM Clean up the adv_file device nsrstage -vvvv -C -V %volname%.ro >%temp%\nsrstage.txt goto END REM Here we add together sizes in KB, Mb and GB ignoring sizes in bytes 6
7 REM Sizes are accumulated in MB :PARSE if %totalsize% LEQ %freeup% ( echo %1/%2 >> "%4"=="MB" ( set /a totalsize="totalsize + %3" ) else ( if "%4"=="GB" ( set /a totalsize="totalsize + (%3 * 1024)" ) else ( if "%4"=="KB" ( set /a totalsize="totalsize + (%3 / 1024)" )))) goto :EOF :END CLIENTS Finally, we define clients into this environment. Clients with file-system backups must be members of the following groups: Grp_Full, Grp_Diff and Grp_Incr. Database backups must be member of the Grp_DB group. All clients should have a browse and retention policy equal to the son in our Grandfather-father-son setup, i.e. one month. The retention policy defined in the destination pool for the clones will extend the retention time for the save set once it has been cloned. To fully utilize the capacity of the disk device, we enable compression directives according to the clients OS, for instance NT with compression directive. Typically we will be able to store somewhere between 1.5 and twice the amount of data on the disk device when enabling compression. HOUSEKEEPING Savegroups will occasionally fail or be interrupted before cloning is complete. This will leave save sets on disk with no clones on tape. To handle this, we schedule a script to run once a week, staging orphaned save sets to tape. Take care to schedule this script to a day and time when the devices will not be busy with backup, cloning or restores. In our scenario, we run this script every night between Sunday and Monday. The script looks like this: REM ********************************************************************** REM ** This batch-file creates a list of all savesets on the disk-device ** REM ** with only two copies, i.e. no clones on tape. The list is parsed ** REM ** sorting savesets according to which group it belongs. These save ** REM ** sets are then staged to the pool in which it should have been ** REM ** cloned to initially. ** REM ** ** REM ** This script is provided AS IS, with no support or warranties of ** REM ** any kind, including but not limited to warranties of ** REM ** merchantability or fitness of any kind, expressed or implied ** REM ** ** 7
8 REM ** 2007 Tore Eikanger, Ementor Norge AS ** REM *********************************************************************** REM Volume name of the advanced-file device (case-sensitive) set volname=diskdev1 REM Set policy for which savesets are staged set stagetime=two weeks del %temp%\*.txt REM We find savesets that are not cloned, and output the ssid's to separate REM files named with group name. We are also adding the group name to groups.txt REM if it isn't already present there. for /f "skip=1 tokens=1,2*" %%f in ('mminfo -a -q "volume=%volname%, copies=2, savetime<%stagetime%" -r "ssid,group"') do echo %%f>>"%temp%\%%g.txt" & findstr %%g %temp%\groups.txt echo %%g >>%temp%\groups.txt REM We find if there are defined active clone pools. If so, start cloning for /f %%f in (%temp%\groups.txt) do echo print type: NSR group; Name: %%f; clones: Yes nsradmin find "clone pool:">%temp%\cpool.txt && call :CLONE %%f goto END :CLONE REM Extract clone pool to variable cpool for /f "tokens=1,2* delims=;:" %%f in (%temp%\cpool.txt) do set cpool=%%g REM Remove space from start of variable set cpool=%cpool:~1% REM Start staging of savesets nsrstage -d -b "%cpool%" -m -S -f "%temp%\%1" goto :EOF :END Name this script, for instance, housekeeping.cmd, and place it in the bin directory of NetWorker. We can schedule this script with anat command from the command prompt: at 03:00 /every: mo C:\Program Files\Legato\nsr\bin\housekeeping.cmd This completes our setup of the backup environment. As with all backup software installations, it must be monitored for a period of time to ensure that all is running smoothly. Use this setup as a framework to build customized installations. Some customers may want WORM media incorporated with retention policy forever. Others may want the script modified to set the browse time of the cloned save sets equal to the new retention time before deleting the original save set on disk. Feel free, and enjoy. 8
9 ABOUT THE AUTHOR Tore is a Senior Systems engineer working for Ementor AS, Norway s largest IT infrastructure solution provider. He has been working with NetWorker products since He has been working in the IT industry for nearly 20 years, gaining broad experience in different areas including DOS scripting, IBM AS/400, Novell NetWare, Linux, Solaris, Microsoft Windows, Cisco networking and training from different hardware vendors. This broad experience helps him to overcome backup related challenges related to hardware, OS and applications. 9
HP Designing and Implementing HP Enterprise Backup Solutions. Download Full Version :
HP HP0-771 Designing and Implementing HP Enterprise Backup Solutions Download Full Version : http://killexams.com/pass4sure/exam-detail/hp0-771 A. copy backup B. normal backup C. differential backup D.
More informationBackup and Restore SOP FOR CONGO CLUSTER
Backup and Restore SOP FOR CONGO CLUSTER IT Department, Congo Cluster Version 1.0 January 2008 1. Contents 1. CONTENTS... 2 2. INTRODUCTION TO BACKUPS... 3 2.1. Objectives... 3 2.2. Scope of the document...
More informationBackup Tab. User Guide
Backup Tab User Guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Create a New Backup... 3 3. Manage backup jobs... 4 Using the Edit menu... 5 Overview... 5 Destination...
More informationZettaMirror Install Guide
ZettaMirror Install Guide March 2014 Table of Contents Planning Your ZettaMirror Deployment...3 Where to install ZettaMirror?...3 Do I need extra retention policies?...3 How to Download & Install ZettaMirror...4
More informationBackup Tab User Guide
Backup Tab User Guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Create a New Backup... 3 3. Manage backup jobs... 4 Using the Edit menu... 5 Overview... 5 Destination...
More informationEMC Data Domain for Archiving Are You Kidding?
EMC Data Domain for Archiving Are You Kidding? Bill Roth / Bob Spurzem EMC EMC 1 Agenda EMC Introduction Data Domain Enterprise Vault Integration Data Domain NetBackup Integration Q & A EMC 2 EMC Introduction
More informationProviding a first class, enterprise-level, backup and archive service for Oxford University
Providing a first class, enterprise-level, backup and archive service for Oxford University delivering responsive, innovative IT 11th June 2013 11 th June 2013 Contents Service description Service infrastructure
More informationOnline Backup Client User Manual
Software version 3.21 For Mac OS X September 2010 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or
More informationEMC NetWorker. Cloning Integration Guide. Release 8.0 P/N REV A02
EMC NetWorker Release 8.0 Cloning Integration Guide P/N 300-013-558 REV A02 Copyright (2011-2013) EMC Corporation. All rights reserved. Published in the USA. Published January 2013 EMC believes the information
More informationGetting Started MAN E
2000 Getting Started MAN03112822E This documentation and related computer software program (hereinafter referred to as the Documentation ) is for the end user s informational purposes only and is subject
More informationPASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year
PASS4TEST \ http://www.pass4test.com We offer free update service for one year Exam : E20-597 Title : Backup Recovery - NetWorker Specialist Exam for Storage Administrators Vendor : EMC Version : DEMO
More informationEMC Retrospect 7.6 for Windows. Backup and Recovery Software
EMC Retrospect 7.6 for Windows Backup and Recovery Software Data Protection for Small and Medium Business EMC Retrospect backup and recovery software delivers automated, reliable data protection for small
More informationData protection for small and medium business & home networks
Data protection for small and medium business & home networks Roxio Retrospect delivers powerful yet easy-to-use data protection for your servers, 24x7 applications, desktops, and notebooks. It protects
More informationVault Backup Reference -Basic, Workgroup and Professional
Vault Backup Reference -Basic, Workgroup and Professional Contents Introduction... 1 Example backup routine... 2 Explanation of backup routine... 3 Testing... 4 User permissions... 4 Vault Professional
More informationBackup App V7. Quick Start Guide for Windows
Backup App V7 Quick Start Guide for Windows Revision History Date Descriptions Type of modification 30 Jun 2016 First Draft New 25 Nov 2016 Added Restore Options to Ch 8 Restoring Data; Combined Technical
More informationOnline Backup Client User Manual
Online Backup Client User Manual Software version 3.21 For Linux distributions October 2010 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have
More informationBest Practices for Using Symantec Online Storage for Backup Exec
WHITE PAPER: xxxxxx Data Protection [00-Cover_Bar] Best Practices for Using Symantec Online Storage for Backup Exec Confidence in a connected world. White Paper: Data Protection Best Practices for Using
More information(Self-Study) Identify How to Back Up and Restore NetWare Systems
SECTION 18 (Self-Study) Identify How to Back Up and Restore NetWare Systems The following objective will be tested: Develop a Network Backup Strategy In this section you learn how you can back up and restore
More informationWELCOME TO TIVOLI NOW!
! WELCOME TO TIVOLI NOW! IBM Tivoli Continuous Data Protection for Files IBM Tivoli Storage Manager Express Tivoli Continuous Data Protection for Files Modern (and necessary) Workstation/Laptop Backup
More informationTexas A&M AgriLife Research Procedures
Texas A&M AgriLife Research Procedures 29.01.99.A0.02 Enterprise File Service Approved: December 15, 2011 Revised: September 12, 2014 Next Scheduled Review: September 12, 2019 PROCEDURE STATEMENT This
More informationnsrd.info micromanual
nsrd.info micromanual NetWorker Power User s Guide to nsradmin Prepared by: Preston de Guise preston@nsrd.info Date: January 2010 Version: 1.0 1 Introduction 1.1 What is a micromanual? To understand what
More informationIT CONTINUITY, BACKUP AND RECOVERY POLICY
IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY Effective Date May 20, 2016 Cross- Reference 1. Emergency Response and Policy Holder Director, Information Business Resumption
More informationBACKUP RECOVERY MANAGEMENT
BACKUP RECOVERY MANAGEMENT Network Security Course Muhammad Salman Computer Engineering, University of Indonesia Backups and Disaster Recovery Factors in choosing backup media: Amount of data Cost of media
More informationBackup everything to cloud / local storage. CloudBacko Pro. Essential steps to get started
CloudBacko Pro Essential steps to get started Last update: September 22, 2017 Index Step 1). Configure a new backup set, and trigger a backup manually Step 2). Configure other backup set settings Step
More informationRedemption Backup USER GUIDE
Redemption TM User Guide OnSpec Electronic, Inc. Redemption Backup USER GUIDE OnSpec Redemption User Guide Copyright 1998-2005 CompuApps, Inc. All Rights Reserved. Portions Copyright (c) 2005-2006 OnSpec
More informationBackups and archives: What s the scoop?
E-Guide Backups and archives: What s the scoop? What s a backup and what s an archive? For starters, one of the differences worth noting is that a backup is always a copy while an archive should be original
More informationVersion 11. NOVASTOR CORPORATION NovaBACKUP
NOVASTOR CORPORATION NovaBACKUP Version 11 2009 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.
More informationVBAK BEST PRACTICES V3.0
VBAK BEST PRACTICES V3.0 Table of Contents Important Note...2 File System Backup task...3 Microsoft SQL Backup Task...4 Microsoft Exchange DR Backup Task...5 Microsoft Exchange Mailbox Backup Task...6
More informationRestoring from Mac and PC backups. John Steele (PC) Mike Burton (MAC)
Restoring from Mac and PC backups John Steele (PC) Mike Burton (MAC) 1 Structure Overview of backup and restore strategies Why you should backup data and ways in which the backups and restores work Windows
More informationVMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015
VMware vsphere Data Protection REVISED APRIL 2015 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Requirements.... 4 Evaluation Workflow... 5 Overview.... 5 Evaluation
More informationUser Guide. Version R95. English
Cloud Backup User Guide Version R95 English September 11, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS
More informationStoreVault and NetApp Snapshot Technology
StoreVault and NetApp Snapshot Technology Instant backup and instant restore The backup window eliminated Added data protection and ease of recovery Introduction 2 How NetApp Snapshot Technology Can Help
More information06 May 2011 CS 200. System Management. Backups. Backups. CS 200 Fall 2016
06 May 2011 CS 200 System Management 1 Let s discuss the facts of life... You will die. Your disk will die. Your disk will die first. 2 The user, manually at day s end, make copies on... Who does them?
More informationOracle 1Z Oracle Database 10g: Administration II. Download Full Version :
Oracle 1Z0-043 Oracle Database 10g: Administration II Download Full Version : https://killexams.com/pass4sure/exam-detail/1z0-043 QUESTION: 172 You lost the index tablespace in your database. You decided
More informationIronSync File Synchronization Server. IronSync FILE SYNC SERVER. User Manual. Version 2.6. May Flexense Ltd.
IronSync FILE SYNC SERVER User Manual Version 2.6 May 2014 www.ironsync.com info@flexense.com 1 1 Product Overview...3 2 Product Installation Procedure...4 3 Using IronSync Client GUI Application...5 3.1
More informationRazorSafe 7-Series Remote Backup and NAS Support
RazorSafe 7-Series Remote Backup and NAS Support Mirapoint Inc RazorSafe Mirapoint Inc TABLE OF CONTENTS Background... 3 Email Lifecycle... 3 Tape Backup Solution... 4 Raw Email Backup... 4 The Challenges...
More informationSecurity Correlation Server Backup and Recovery Guide
CorreLog Security Correlation Server Backup and Recovery Guide This guide provides information to assist administrators and operators with backing up the configuration and archive data of the CorreLog
More informationBackup App v7. Quick Start Guide for Windows
Backup App v7 Quick Start Guide for Windows Revision History Date Descriptions Type of modification 30 Jun 2016 First Draft New 25 Nov 2016 Added Restore Options to Ch 8 Restore Data; Combined Technical
More information95% of business information is now digital. 80% of this critical data is stored on laptop or desktop computers, and is not properly backed up.
95% of business information is now digital. 80% of this critical data is stored on laptop or desktop computers, and is not properly backed up. New in Retrospect 8 Instant Scan technology cuts backup and
More informationNetVault : Backup Built-in Plugins
NetVault : Backup Built-in Plugins Version: 8.5Product Number: NVG-129-8.5.1-EN-02 version 8.5.1 User s Guide NVG-129-8.5.1-EN-02 04/26/10 Copyrights NetVault: Backup Built-in Plugins User s Guide Software
More informationVMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014
VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Additional Features and Benefits of
More informationArcserve Solutions for Amazon Web Services (AWS)
Arcserve Solutions for Amazon Web Services (AWS) Introduction The public cloud has become a major factor in all IT decision making due to its endless supply of technical resources at an affordable cost.
More informationElixir Schedule Designer User Manual
Elixir Schedule Designer User Manual Release 8.4.1 Elixir Technology Pte Ltd Elixir Schedule Designer User Manual: Release 8.4.1 Elixir Technology Pte Ltd Published 2012 Copyright 2012 Elixir Technology
More informationChapter 3 `How a Storage Policy Works
Chapter 3 `How a Storage Policy Works 32 - How a Storage Policy Works A Storage Policy defines the lifecycle management rules for all protected data. In its most basic form, a storage policy can be thought
More informationDATA BACKUP AND RECOVERY POLICY
DATA BACKUP AND RECOVERY POLICY 4ITP04 Revision 01 TABLE OF CONTENTS 1. REVISION RECORD... 3 2. PURPOSE... 4 3. SCOPE AND APPLICABILITY... 4 4. DEFINITIONS AND ABBREVIATIONS... 4 5. POLICY STATEMENTS...
More informationChapter 2 CommVault Data Management Concepts
Chapter 2 CommVault Data Management Concepts 10 - CommVault Data Management Concepts The Simpana product suite offers a wide range of features and options to provide great flexibility in configuring and
More informationEMC NetWorker Module for SnapImage Release 2.0 Microsoft Windows Version
EMC NetWorker Module for SnapImage Release 2.0 Microsoft Windows Version Installation and Administration Guide P/N 300-007-130 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000
More informationBrightStor ARCserve Backup for Small Business Server
BrightStor ARCserve Backup for Small Business Server Getting Started MAN09104541E This documentation and related computer software program (hereinafter referred to as the Documentation ) is for the end
More informationBalakrishnan Nair. Senior Technology Consultant Back Up & Recovery Systems South Gulf. Copyright 2011 EMC Corporation. All rights reserved.
Balakrishnan Nair Senior Technology Consultant Back Up & Recovery Systems South Gulf 1 Thinking Fast: The World s Fastest Backup Now Does Archive Too Introducing the New EMC Backup and Recovery Solutions
More informationSetting Up the DR Series System on Veeam
Setting Up the DR Series System on Veeam Quest Engineering June 2017 A Quest Technical White Paper Revisions Date January 2014 May 2014 July 2014 April 2015 June 2015 November 2015 April 2016 Description
More informationA. Deduplication rate is less than expected, accounting for the remaining GSAN capacity
Volume: 326 Questions Question No: 1 An EMC Avamar customer s Gen-1 system with 4 TB of GSAN capacity has reached read-only threshold. The customer indicates that the deduplicated backup data accounts
More informationUser Guide - Exchange Mailbox Archiver Agent
Page 1 of 245 User Guide - Exchange Mailbox Archiver Agent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Terminology SYSTEM REQUIREMENTS - EXCHANGE MAILBOX ARCHIVER AGENT DEPLOYMENT
More informationTuskegee Backup and Offsite Policy and Procedures
TUSKEGEE UNVERSTY OCE O NORMATON TECHNOLOGY Tuskegee Backup and Offsite Policy and Procedures Purpose This policy defines how to safeguard the information assets of the University and how copies of stored
More informationUsing the Backup module
Using the Backup module THIS WIKI HAS BEEN UPDATED FOR VERSION 13 OF YOUR PBX GUI. Overview Logging In Menu Items Backups Restores Servers Templates Backup Settings Backup Name Description Status Email
More informationXAOperator Automated XA Operations!
XAOperator Automated XA Operations! Belinda Daub, Senior Consultant Technical Services belinda.daub@cistech.net 704-814-0004 Agenda XAO Overview Automated Backups and Operations Verification Recovery Process
More informationVeritas NetBackup Vault Administrator s Guide
Veritas NetBackup Vault Administrator s Guide UNIX, Windows, and Linux Release 6.5 12308354 Veritas NetBackup Vault Administrator s Guide Copyright 2001 2007 Symantec Corporation. All rights reserved.
More informationIBM Archiving Solution DB2 CommonStore for Lotus Domino
IBM Software Group IBM Email Archiving Solution DB2 CommonStore for Lotus Domino Anthony Tang Advisory Sales Specialist Information Management Software Group Challenges for Notes Administrators Increasing
More informationXLink EzRollBack Pro User Manual Table Contents
XLink EzRollBack Pro User Manual Table Contents Chapter 1 Welcome to XLink's EzRollback... 2 1.1 System Requirements... 4 1.2 Installation Guide... 5 1.3 License Information... 9 1.4 How To Get Help From
More informationAcronis Backup & Recovery 10 Workstation. User's Guide
Acronis Backup & Recovery 10 Workstation User's Guide Copyright Acronis, Inc., 2000-2009. All rights reserved. Acronis and Acronis Secure Zone are registered trademarks of Acronis, Inc. "Acronis Compute
More informationBraindumpsIT. BraindumpsIT - IT Certification Company provides Braindumps pdf!
BraindumpsIT http://www.braindumpsit.com BraindumpsIT - IT Certification Company provides Braindumps pdf! Exam : E20-891 Title : Backup Recovery Solutions Expert Exam for Technology Architects Vendor :
More informationNetVault 6.5.x Virtual Disk Library Backup Staging Guide
NetVault 6.5.x Virtual Disk Library Backup Staging Guide Rev 2 October 1, 2002 PERMISSION TO USE Permission to use this white paper is granted, provided that (1) the below copyright is included in all
More informationEMC Solutions for Backup to Disk EMC Celerra LAN Backup to Disk with IBM Tivoli Storage Manager Best Practices Planning
EMC Solutions for Backup to Disk EMC Celerra LAN Backup to Disk with IBM Tivoli Storage Manager Best Practices Planning Abstract This white paper describes how to configure the Celerra IP storage system
More informationBacula in the ISDS. Lance Brown ISDS December 2, It comes by night and sucks the vital essence from your computers.
Bacula in the ISDS It comes by night and sucks the vital essence from your computers. Lance Brown ISDS December 2, 2005 ISDS Environment 6 Servers 1 Beowulf Cluster 53 Linux Desktops NFS mount home and
More informationPhysical Representation of Files
Physical Representation of Files A disk drive consists of a disk pack containing one or more platters stacked like phonograph records. Information is stored on both sides of the platter. Each platter is
More informationAnnouncing Oracle Secure Backup 10.3: Fastest, Most Cost-Effective Oracle Backup
Announcing Oracle Secure Backup 10.3: Fastest, Most Cost-Effective Oracle Backup Donna Cooksey Principal Product Manager Richard McClain Senior Oracle DBA CSX Technology Program Agenda Introducing Oracle
More informationIntegrating RDX QuikStor into NetJapan ActiveImage Protector
Integrating RDX QuikStor into NetJapan ActiveImage Protector INTEGRATION BRIEF Backup is the life insurance of a company as it protects its crown jewels. Backup ensures data availability and business continuity
More informationBest Practices for Implementing Autodesk Vault
AUTODESK VAULT WHITE PAPER Best Practices for Implementing Autodesk Vault Introduction This document guides you through the best practices for implementing Autodesk Vault software. This document covers
More informationPASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year
PASS4TEST \ http://www.pass4test.com We offer free update service for one year Exam : E20-329 Title : Technology Architect Backup and Recovery Solutions Design Exam Vendor : EMC Version : DEMO Get Latest
More informationECE Engineering Robust Server Software. Spring 2018
ECE590-02 Engineering Robust Server Software Spring 2018 Business Continuity: Disaster Recovery Tyler Bletsch Duke University Includes material adapted from the course Information Storage and Management
More informationSetting Up the Dell DR Series System on Veeam
Setting Up the Dell DR Series System on Veeam Dell Engineering April 2016 A Dell Technical White Paper Revisions Date January 2014 May 2014 July 2014 April 2015 June 2015 November 2015 April 2016 Description
More informationBackup and Recovery FAQs
Backup and Recovery FAQs Introduction The Backup and Recovery application is an easy to use, easy to manage data backup and disaster recovery solution for your DeltaV Distributed Control System (DCS),
More informationKillTest. 半年免费更新服务
KillTest 质量更高 服务更好 学习资料 http://www.killtest.cn 半年免费更新服务 Exam : E20-895 Title : Backup Recovery - Avamar Expert Exam for Implementation Engineers Version : Demo 1 / 7 1.An EMC Avamar customer is currently
More informationAcronis Backup & Recovery 10 Workstation. User's Guide
Acronis Backup & Recovery 10 Workstation User's Guide Copyright Acronis, Inc., 2000-2009. All rights reserved. Acronis and Acronis Secure Zone are registered trademarks of Acronis, Inc. "Acronis Compute
More informationRetrospect 8 for Windows Reviewer s Guide
Retrospect 8 for Windows Reviewer s Guide 2012 Retrospect, Inc. About this Reviewer s Guide This document provides a concise guide to understanding Retrospect 8 for Windows. While it is not designed to
More informationSELECTING AN ORACLE BACKUP SOLUTION PART 3: HOT BACKUPS WITH THE NETBACKUP FOR ORACLE ADVANCED BLI AGENT
VERITAS Education INSTRUCTOR ARTICLES APRIL 2003 1. Selecting an Oracle Backup Solution Part 3: Hot Backups with the NetBackup for Oracle Advanced BLI Agent 2. Using a Volume Snapshot to Recover a Lost
More informationWhite Paper NetVault Backup Greatly Reduces the Cost of Backup Using All-Flash Arrays with the Latest LTO Ultrium Technology
White Paper NetVault Backup Greatly Reduces the Cost of Backup Using All-Flash Arrays with the Latest LTO Ultrium Technology Unlimited Backup Capacity and Number of Generations Adoption of all-flash arrays
More informationAdministration GUIDE. OnePass Agent for Exchange Mailbox. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 177
Administration GUIDE OnePass Agent for Exchange Mailbox Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 177 User Guide - One Pass Agent for Exchange Mailbox Table of Contents Overview Introduction
More informationvmguardian 3.0 Practical Operation Seminar First Edition
vmguardian 3.0 Practical Operation Seminar First Edition 1. Feature Overview ESX(i) Virtual Machine Backup vmguardian is a software appliance designed to backup virtual machines developed on ESX(i). Backup
More informationTitle Page. Guide. to Migrating a NetVault Smart Client to a Backup Server
Title Page Guide to Migrating a NetVault Smart Client to a Backup Server Copyrights Guide to Migrating a NetVault Smart Client to a Backup Server Software Copyright 2008 BakBone Software Documentation
More informationSAP HANA Backup and Recovery with SnapCenter
Technical Report SAP HANA Backup and Recovery with SnapCenter Nils Bauer, Bernd Herth, NetApp March 2018 TR-4614 Abstract This document describes the installation and configuration of the NetApp backup
More informationSymantec Backup Exec Blueprints
Symantec Backup Exec Blueprints Blueprint for Large Installations Backup Exec Technical Services Backup & Recovery Technical Education Services Symantec Backup Exec Blueprints 1 Symantec Backup Exec Blueprints
More informationCA ARCserve Backup for Windows
CA ARCserve Backup for Windows Release Summary r12.5 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the end user s informational
More informationQuest NetVault Backup
Quest NetVault Backup version 8.6.x Built-in Plug-ins User s Guide Version: Product Number: NVG-129-8.6.x-EN-01 NVG-129-8.6.x-EN-01 09/30/11 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains
More informationEMC NetWorker and EMC Avamar
EMC NetWorker and EMC Avamar Version 8.2 SP1 Integration Guide 302-001-568 REV 01 Copyright 1990-2015 EMC Corporation. All rights reserved. Published in USA. Published January, 2015 EMC believes the information
More informationInstalling Acronis Backup Advanced Edition
2015 Installing Acronis Backup Advanced Edition BEST PRACTISE Table of Contents Acronis Backup Advanced components... 4 Management Server... 4 Acronis Storage Node... 4 Agents / Appliance... 4 Bootable
More informationVCS-276.exam. Number: VCS-276 Passing Score: 800 Time Limit: 120 min File Version: VCS-276
VCS-276.exam Number: VCS-276 Passing Score: 800 Time Limit: 120 min File Version: 1.0 VCS-276 Administration of Veritas NetBackup 8.0 Version 1.0 Exam A QUESTION 1 A NetBackup policy is configured to back
More informationChapter 15 Technical Planning Methodology
Chapter 15 Technical Planning Methodology 294 - Technical Planning Methodology This chapter will focus on a straight forward methodology for implementing storage policies. This approach will allow you
More informationIntroduction. How Does it Work with Autodesk Vault? What is Microsoft Data Protection Manager (DPM)? autodesk vault
Introduction What is Microsoft Data Protection Manager (DPM)? The Microsoft Data Protection Manager is a member of the Microsoft System Center family of management products. DPM provides continuous data
More informationWHITE PAPER: ENTERPRISE SOLUTIONS. Disk-Based Data Protection Achieving Faster Backups and Restores and Reducing Backup Windows
WHITE PAPER: ENTERPRISE SOLUTIONS Disk-Based Data Protection Achieving Faster Backups and Restores and Reducing Backup Windows White Paper: Enterprise Security Disk-Based Data Protection Achieving Faster
More informationIntegrating RDX QuikStation into QNAP NAS Backup
Integrating RDX QuikStation into QNAP NAS Backup INTEGRATION BRIEF QNAP NAS Systems provide an OS built-in utility to secure business critical data. With the integration of Tandberg Data s RDX QuikStor
More informationAltaro Hyper-V Backup User Guide
Altaro Hyper-V Backup User Guide 1 / 144 Table of contents Introducing Altaro Hyper-V Backup... 4 Different Editions... 5 Getting Started... 6 System requirements... 6 Supported Backup Destinations...
More informationAcronis Backup & Recovery 10 Advanced Server SBS Edition. User's Guide
Acronis Backup & Recovery 10 Advanced Server SBS Edition User's Guide Copyright Acronis, Inc., 2000-2009. All rights reserved. Acronis and Acronis Secure Zone are registered trademarks of Acronis, Inc.
More informationArcserve Backup for Windows
Arcserve Backup for Windows Dashboard User Guide r16.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation )
More informationHP OpenView Storage Data Protector A.05.10
HP OpenView Storage Data Protector A.05.10 ZDB for HP StorageWorks Enterprise Virtual Array (EVA) in the CA Configuration White Paper Edition: August 2004 Manufacturing Part Number: n/a August 2004 Copyright
More informationIntegrating RDX QuikStor into QNAP NAS Backup
Integrating RDX QuikStor into QNAP NAS Backup INTEGRATION BRIEF QNAP NAS Systems provide an OS-built in utility to secure business critical data. With the integration of Tandberg Data s RDX QuikStor removable
More informationIntegrating RDX QuikStor TM into NetJapan ActiveImage TM Protector
Integrating RDX QuikStor TM into NetJapan ActiveImage TM Protector Backup is the life insurance of a company as it protects its systems and data. Backup also ensures that valuable data is available after
More informationChapter 10 Protecting Virtual Environments
Chapter 10 Protecting Virtual Environments 164 - Protecting Virtual Environments As more datacenters move to virtualize their environments and the number of virtual machines and the physical hosts they
More informationUsing QNAP Local and Remote Snapshot To Fully Protect Your Data
Using QNAP Local and Remote Snapshot To Fully Protect Your Data Local Snapshot Introduction and Usage Snapshot Space Allocation and Advanced Features Snapshot Replica and Restoration From Remote NAS Introduction
More informationComputer Backup Demo
Computer Backup Demo BSC Computer Club Seminar 2/07 & 10/08 by Eric Hein (hein1@verizon.net) you can download the slides from http://mysite.verizon.net/hein1/training Some Situations Situation Ooops, I
More informationIT ESSENTIALS V. 4.1 Module 5 Fundamental Operating Systems
IT ESSENTIALS V. 4.1 Module 5 Fundamental Operating Systems 5.0 Introduction 1. What controls almost all functions on a computer? The operating system 5.1 Explain the purpose of an operating system 2.
More information