Snapshot Management For NAS Devices Integration Guide
Snapshot Management For NAS Devices Integration Guide
Version 9.2
Dell believes the information in this publication is accurate as of its publication date. The information is subject to change without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS-IS.“ DELL MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND
WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. USE, COPYING, AND DISTRIBUTION OF ANY DELL SOFTWARE DESCRIBED
IN THIS PUBLICATION REQUIRES AN APPLICABLE SOFTWARE LICENSE.
Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property of their respective owners.
Published in the USA.
Dell EMC
Hopkinton, Massachusetts 01748-9103
1-508-435-1000 In North America 1-866-464-7381
www.DellEMC.com
Tables 5
Figures 7
Preface 9
Glossary 99
1 Revision history............................................................................................................ 9
2 Style conventions........................................................................................................ 11
3 NAS device support and limitations.............................................................................19
4 Save set criteria......................................................................................................... 39
5 Schedule icons............................................................................................................44
6 Schedule icons............................................................................................................47
7 Backup type icons...................................................................................................... 50
8 Snapshot discovery icons........................................................................................... 54
9 Snapshot generate icons............................................................................................ 56
10 Schedule icons............................................................................................................57
11 Migration of Group attributes..................................................................................... 64
12 Common Application Information variables................................................................. 84
13 Commands and options that are supported in nsrsnapadmin interactive mode........... 88
14 Device limitations and support for snapshot management.......................................... 94
15 Device support for recovery of save sets and individual files...................................... 96
16 NetApp support for types of local replication and platforms....................................... 97
17 NetApp C-Mode local replication and platforms......................................................... 97
18 NetApp support for types of remote replication and platforms...................................98
Note
This document was accurate at publication time. To ensure that you are using the
latest version of this document, go to the Support website at https://
support.emc.com.
Purpose
This document provides planning, practices, and configuration information for the use
of the NetWorker Snapshot Management (NSM) for network-attached storage (NAS)
devices features within an NetWorker backup and storage management environment.
Audience
This document is intended for system administrators. Readers of this document must
be familiar with the following tasks:
l Identifying the different hardware and software components that make up the
NetWorker datazone.
l Following procedures to configure storage management operations.
l Following guidelines to locate problems and implement solutions.
Revision history
The following table presents the revision history of this document.
Related documentation
The NetWorker documentation set includes the following publications, available on the
Support website:
l NetWorker Online Software Compatibility Matrix
Provides compatibility information, including specific software and hardware
configurations that NetWorker supports. To access the matrix, go to http://
compatibilityguide.emc.com:8080/CompGuideApp/.
l NetWorker Administration Guide
Describes how to configure and maintain the NetWorker software.
l NetWorker Network Data Management Protocol (NDMP) User Guide
Describes how to use the NetWorker software to provide data protection for
NDMP filers.
NOTICE
Note
Typographical conventions
The following type style conventions are used in this document:
Bold Used for interface elements that a user specifically selects or clicks,
for example, names of buttons, fields, tab names, and menu paths.
Also used for the name of a dialog box, page, pane, screen area with
title, table label, and window.
Italic Used for full titles of publications that are referenced in text.
Monospace Used for:
l System code
l System output, such as an error message or script
l Pathnames, file names, file name extensions, prompts, and
syntax
l Commands and options
You can use the following resources to find more information about this product,
obtain support, and provide feedback.
Where to find product documentation
l https://support.emc.com
l https://community.emc.com
Where to get support
The Support website at https://support.emc.com provides access to licensing
information, product documentation, advisories, and downloads, as well as how-to and
troubleshooting information. This information may enable you to resolve a product
issue before you contact Support.
To access a product specific Support page:
1. Go to https://support.emc.com/products.
2. In the Find a Product by Name box, type a product name, and then select the
product from the list that appears.
3. Click the following button:
Live chat
To participate in a live interactive chat with a support agent:
1. Go to https://support.emc.com.
2. Click Chat with a Support Agent.
Service requests
To obtain in-depth help from Support, submit a service request. To submit a service
request:
1. Go to https://support.emc.com.
2. Click Create a Service Request.
Note
To create a service request, you must have a valid support agreement. Contact a sales
representative for details about obtaining a valid support agreement or with questions
about an account.
Note
You can perform a clone directed restore to a similar NAS box only.
Note
Note
NetWorker 8.2.x and earlier versions do not support the cloning of snapshot save sets.
Recovery interfaces
You can recover snapshot-based data by using the following interfaces:
l NetWorker Recovery Wizard—The recommended interface to recover data from
snapshots and conventional storage media.
Internationalization support
NetWorker provides NAS snapshot operations with the standard NetWorker client
support for non-ASCII international character sets.
NAS devices
A network-attached storage (NAS) device is a dedicated file server that provides
primary data storage that you can use for Network Data Management Protocol
(NDMP) data operations. A NAS device may also be called an NDMP data server, data
mover, NDMP client, or NAS filer. You must configure a NAS device as a client of the
NetWorker server, but you do not install NetWorker client software on the NAS
device.
All the supported NAS devices can support a directed recovery to the host that runs
the recovery. You can recover to an NFS file share directory on that host, which
enables recovery to a remote host or remote device.
l Directed recovery.
This device does not support in-place or out-of-place recovery from a
remotely replicated snapshot.
NetApp This device requires operating system libraries from the NetApp
Manageability SDK, available from NetApp.
This device supports:
l Snapshots using 7-Mode and Cluster Mode, and requires NetAppData
ONTAP 8.0 or later.
Note
Note
The names must be alphanumeric with acceptable special characters, such as -, _,.
The replicated snapshot names will not reflect these prefixes. The prefix for replicated
snapshot depends on the NAS replication configuration settings.
NDMP environment
NetWorker software uses the Network Data Management Protocol (NDMP)
functionality to enable access to storage in a heterogeneous network environment.
NDMP uses TCP/IP to control the movement of the data, and specifies various device
drivers to store the data on devices.
NetWorker server
The NetWorker server manages the NAS devices and the configuration settings that
are required to create the snapshots and perform the clone and the recovery
operations. It is the Data Management Agent (DMA).
NetWorker client
The network-attached storage (NAS) devices do not run NetWorker client software.
However, for remote replication, if you want to perform backup, clone, or indexing
actions, you must have a client resource for the remote target NAS device, and you
must create a NetWorker Client resource for the NAS device. The NetWorker Client
resource specifies the snapshot replication target and provides the credentials to the
NetWorker server for replication, cloning, and recovery operations.
Licensing requirements
Network-attached storage (NAS) snapshot and replication features are covered by
Network Data Management Protocol (NDMP) licenses.
The NetWorker Licensing Guide and a sales representative can provide details about
licensing for NetWorker Snapshot Management (NSM).
6. The NAS device retains the snapshot until the snapshot expires or until a
NetWorker operator deletes it.
Figure 4 Out-of-place recovery restores data to a different location on the source device
Figure 5 Directed recovery restores data to the NetWorker client that runs the recovery
l Introduction....................................................................................................... 28
l Default data protection policies..........................................................................28
l Strategies for NAS snapshot backups................................................................30
l Overview of configuring a new data protection policy........................................30
l Creating a policy................................................................................................. 31
l Creating a workflow in a new policy................................................................... 32
l Protection groups for NAS snapshot devices.....................................................35
l Supported actions in snapshot workflows.......................................................... 40
l Action in snapshot workflows............................................................................. 41
l Visual representation of NAS snapshot workflows..............................................61
Introduction
You can protect your data on NAS devices in two ways:
l Using the NDMP protocol.
l Using snapshot management technology.
NDMP follows the traditional backup strategy.
For a detailed overview about creating, editing, and deleting groups and policies, refer
to the Data Protection Policies chapter in the NetWorker Administration Guide.
Note
Each preconfigured data protection policy provides the following best practices that
you should follow when you design the data protection solution:
l Separate the file system backups from application database backups, to provide
ease of access at recovery time.
l Stagger the start times for the file system backups and the application database
backups, to prevent disk contention on the target hosts.
Each default data protection policy mimics the requirements of a service provider, and
are designed to provide protection that is based on service-level agreements.
Platinum policy
The Platinum policy provides an example of a data protection policy for an
environment that contains supported storage arrays or storage appliances and
requires backup data redundancy. The policy contains one workflow with two actions,
a snapshot backup action, followed by a clone action.
Figure 6 Platinum policy configuration
Gold policy
The Gold policy provides an example of a data protection policy for an environment
that contains virtual machines and requires backup data redundancy. The policy
contains two workflows, one to protect Hyper-V hosts and one to protect VMware
hosts. Each workflow contains a backup action followed by a clone action.
Silver policy
The Silver policy provides an example of a data protection policy for an environment
that contains non-virtualized machines and requires backup data redundancy. The
policy contains two workflows, one to protect hosts file systems and one to protect
database applications. Each workflow contains a backup action followed by a clone
action.
Figure 8 Silver policy configuration
Bronze policy
The Bronze policy provides an example of a data protection policy for an environment
that contains non-virtualized machines. The policy contains two workflows, one to
protect hosts file systems and one to protect database applications. Each workflow
contains a backup action.
Figure 9 Bronze policy configuration
The following figure illustrates a policy with two different workflows. Workflow 1
performs a probe action, then a backup of the client resources in Client group 1, and
then a clone of the save sets from the backups. Workflow 2 performs a backup of the
Creating a policy
Procedure
1. In the Administration window, click Protection.
2. In the expanded left pane, right-click Policies, and then select New.
The Create Policy dialog box appears.
3. On the General tab, in the Name field type a name for the policy.
The maximum number of characters for the policy name is 128.
Note
Creating a policy 31
Data Protection Policies
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the
smtpmail program assumes that the message contains a correctly
formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to
relay the SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the
notification. Multiple email recipients are separated by a space.
7. To specify the Restricted Data Zone (RDZ) for the policy, select the Restricted
Data Zones tab, and then select the RDZ from the list.
8. Click OK.
After you finish
Create the workflows and actions for the policy.
Procedure
1. In the Administration window, click Protection.
2. In the left pane, expand Policies, and then select the policy that you created.
3. In the right pane, select Create a new workflow.
4. In the Name field, type the name of the workflow.
The maximum number of allowed characters for the Name field is 64. This name
cannot contain spaces or special characters such as + or %.
5. In the Comment box, type a description for the workflow.
The maximum number of allowed characters for the Comment field is 128.
6. From the Send Notifications list, select how to send notifications for the
workflow:
l To use the notification configuration that is defined in the policy resource to
specify when to send a notification, select Set at policy level.
l To send notifications with information about each successful and failed
workflow and action, after the workflow completes all the actions, select On
Completion.
l To send notifications with information about each failed workflow and
action, after the workflow completes all the actions, select On Failure.
7. In the Send notification attribute, when you select the On Completion option
or On failure option, the Command box appears. Use this box to configure how
NetWorker sends the notifications. You can use the nsrlog command to send
the notifications to a log file or you can send an email notification.
The default notification action is to send the information to the
policy_notifications.log file. By default, the
policy_notifications.log file is located in the /nsr/logs directory on
Linux and in the C:\Program Files\EMC NetWorker\nsr\logs folder on
Windows.
Use the default mailer program on Linux to send email messages or the
smtpmail application on Windows:
l To send notifications to a file, type the following command, where
policy_notifications.log is the name of the file:
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
mail -s subject recipient
l For NetWorker Virtual Edition (NVE), to send an email notification, type the
following command:
where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the
8. In the Running section, perform the following steps to specify when and how
often the workflow runs:
a. To ensure that the actions that are contained in the workflow run when the
policy or workflow starts, in the Enabled box, leave the option selected. To
prevent the actions in the workflow from running when the policy or
workflow that contains the action starts, clear this option.
b. To start the workflow at the time that is specified in the Start time
attribute, on the days that are defined in the action resource, in the
AutoStart Enabled box, leave the option selected. To prevent the workflow
from starting at the time that is specified in the Start time attribute, clear
this option.
c. To specify the time to start the actions in the workflow, in the Start Time
attribute, use the spin boxes.
The default value is 9:00 PM.
d. To specify how frequently to run the actions that are defined in the
workflow over a 24-hour period, use the Interval attribute spin boxes. If you
are performing transaction log backup as part of application-consistent
protection, you must specify a value for this attribute in order for
incremental transaction log backup of SQL databases to occur.
The default Interval attribute value is 24 hours, or once a day. When you
select a value that is less than 24 hours, the Interval End attribute appears.
To specify the last start time in a defined interval period, use the spin boxes.
Note
A NAS environment does not support the use of the Query by Pool or the Number
of clone copies criteria to generate a dynamic list of NAS snapshot backup save
sets.
Use a query group to generate a save set list to perform one of the following
operations:
n Create client file index entries for the save sets.
n Clone the save sets.
Note
For query groups that include NAS devices you cannot specify a volume. If you use
this query to do a clone, the clone will fail.
l Create one NAS device group for a workflow that performs discovery, and then a
query group to generate a list of save sets for a workflow that generates index
data for the snapshot save sets at a different time.
Note
4. From the Group Type list, leave the default selection of Clients.
5. In the Comment field, type a description of the group.
6. From the Policy-Workflow list, select the workflow that you want to assign the
group to.
Note
You can also assign the group to a workflow when you create or edit a
workflow.
7. (Optional) To specify the Restricted Datazone (RDZ) for the group, on the
Restricted Datazones tab, select the RDZ from the list.
8. Click OK.
After you finish
Create Client resources. Assign clients to a protection group, by using the Client
Configuration wizard or the General tab on the Client Properties page.
Procedure
1. In the Administration window, click Protection.
2. In the expanded left pane, right-click Groups, and then select New.
The Create Group dialog box appears, with the General tab selected.
3. In the Name attribute, type a name for the group.
The maximum number of characters for the group name is 64. This name cannot
contain spaces or special characters such as + or %.
Note
Note
You can also assign the group to a workflow when you create or edit a
workflow.
7. (Optional) To specify the Restricted Datazone (RDZ) for the group, on the
Restricted Datazones tab, select the RDZ from the list.
8. Click OK.
After you finish
Create Client resources. Assign clients to a protection group, by using the Client
Configuration wizard or the General tab on the Client Properties page. Then define
one or more tags.
Note
6. From the Policy-Workflow list, select the workflow that you want to assign the
group to.
Note
You can also assign the group to a workflow when you create or edit a
workflow.
7. Add and remove clients in the NAS Device section, under the Add/Remove
selected Clients to/from the following Groups area:
a. To add a client, select the checkbox next to the device, and then click OK.
If you want to select all the clients that are listed, click Highlight All.
b. To remove a client, select the checkbox next to the device, and then click
OK.
8. (Optional) To specify the Restricted Datazone (RDZ) for the group, on the
Restricted Datazones tab, select the RDZ from the list.
9. Click OK.
Note
When you specify more than one save set criteria, the list of save sets only
includes save sets that match all the specified criteria.
Criteria Description
Date and time range Specify the start date and time range for the save sets.
To specify the current date and time as the end date for the range,
select Up to now.
To specify a different date and time as the end date for the range,
select Up to, and then select the date and time from the lists.
Backup level In the Filter save sets by level section, next to the backup level for
the save set, select the checkbox:
l full
l cumulative incr
l logs
l incremental
l manual
Note
Criteria Description
Limit the number of Specify the number for the limit in the Limit number of clones list.
clones The clone limit is the maximum number of clone instances that can be
created for the save set.
Note
Client Next to one or more client resources that are associated with the save
set in the Client list, select the checkbox.
Policy Next to the policy used to generate the save set in the Policy list,
select the checkbox.
Workflow Next to the workflow used to generate the save set in the Workflow
list, select the checkbox.
Action Next to the action used to generate the save set in the Action list,
select the checkbox.
Group Next to the group associated with the save set in the Group list,
select the checkbox.
Pools Next to the media pool on which the save set is stored in the Pools
list, select the checkbox.
Note
Name In the Filter save sets by name field, specify the name of the save
set.
Note
If you specify multiple criteria, the save set must match all the criteria to belong
to the group.
8. To specify the Restricted Data Zone (RDZ) for the group, select the Restricted
Data Zones tab, and then select the RDZ from the list.
9. Click OK.
Check connectivity
A check connectivity action tests the connectivity between the clients and the
NetWorker server before the start of a probe or backup action occurs. If the
connectivity test fails, then the probe action and backup action does not start for the
client.
Snapshot backup
A snapshot backup action performs a snapshot on a supported NAS device, backs up
the snapshot, and then generates a save set entry for the snapshot backup in the
NetWorker media database.
Note
A snapshot backup does not generate an entry for the snapshot backup in the client
file index. To index a snapshot backup, use the generate index action after the
snapshot backup action.
Discover
A discover action discovers snapshots on a NAS device that the current NetWorker
server did not create. NetWorker then creates save set entries for the discovered
snapshots on a NAS client in the media database.
The discover action also compares the save sets in the media database for the NAS
client against the actual snapshots that are stored on the client. If the media database
entry does not have a corresponding snapshot on the NAS client, then the media
database entry is removed.
Note
A discover action does not generate entries for the discovered snapshots in the client
file indexes. To index a discovered snapshot, use the generate index action after the
discover action.
Generate index
A generate index action creates entries in the client file indexes for snapshot backups
and discovered snapshots.
You can configure a generate index action to occur automatically in a workflow after a
snapshot backup or discover action. Alternatively, you can configure a generate index
action to occur separately for a group of save sets.
Clone
A clone action creates a copy of one or more save sets. Cloning enables secure offsite
storage, the transfer of data from one location to another, and the verification of
backups.
You can configure a clone action to occur after a backup in a single workflow, or
concurrently with a backup action in a single workflow. You can use save set and
query groups to define a specific list of save sets to clone, in a separate workflow.
Neither the snapshot backup action nor the discover action create entries for
snapshots in the client file indexes. Use a generate index action to create snapshot
entries in the client file indexes. You can configure the generate index action to occur
automatically after the snapshot backup action or the discover action as part of a
single workflow. To index the snapshot at a different time than the snapshot backup
or discovery, create a separate workflow with the generate index action.
The NetWorker Snapshot Management for NAS Devices Integration Guide provides
details on backing up NAS devices with NetWorker.
The following supported actions can follow the lead action and other actions in a
workflow.
All possible workflow actions for a snapshot backup
You can perform a check connectivity and probe action before a snapshot backup
action, and a clone action after the snapshot action.
Figure 11 All possible workflow actions for a snapshot backup
Note
When you clear the Enabled option, actions that occurs after a disabled action
do not start, even if the subsequent options are enabled.
6. If you create the action as part of the workflow configuration, the workflow
appears automatically in the Workflow box and the box is dimmed.
7. Specify the order of the action in relation to other actions in the workflow:
l If the action is part of a sequence of actions in a workflow path, in the
Previous box, select the action that should precede this action.
l If the action should run concurrently with an action, in the Previous box,
select the concurrent action, and then select the Concurrent checkbox.
8. Specify a weekly or monthly schedule for the action:
l To specify a schedule for each day of the week, select Weekly by day.
l To specify a schedule for each day of the month, select Monthly by day.
Note
The Retries option applies to probe actions, and the backup actions for the
Traditional and Snapshot action types. If you specify a value for this option for
other actions, NetWorker ignores the values.
14. In the Retry Delay field, specify a delay in seconds to wait before retrying a
failed probe or backup action. When the Retry Delay value is 0, NetWorker
retries the failed probe or backup action immediately.
Note
The Retry Delay option applies to probe actions, and the backup actions for the
Traditional and Snapshot action types. When you specify a value for this option
in other actions, NetWorker ignores the values.
15. In the Inactivity Timeout field, specify the maximum number of minutes that a
job run by an action can try to respond to the server.
If the job does not to respond within the specified time, the server considers the
job a failure and NetWorker retries the job immediately to ensures that no time
is lost due to failures.
Increase the timeout value if a backup consistently stops due to inactivity.
Inactivity might occur for backups of large save sets, backups of save sets with
large sparse files, and incremental backups of many small static files.
Note
The Inactivity Timeout option applies to probe actions, and the backup actions
for the Traditional and Snapshot action types. If you specify a value for this
option in other actions, NetWorker ignores the value.
16. In the Parallelism field, specify the maximum number of concurrent operations
for the action.
Note
17. From the Failure Impact list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the current action if there is a failure with one of the jobs, but
continue with subsequent actions in the workflow, select Abort action.
Note
The Abort action option applies to probe actions, and the backup actions for
the Traditional and Snapshot action types.
l To abort the entire workflow if there is a failure with one of the jobs in the
action, select Abort workflow.
Note
If any of the actions fail in the workflow, the workflow status does not appear
as interrupted or cancelled. NetWorker reports the workflow status as failed.
18. Do not change the default selections for the Notification group box. NetWorker
does not support notifications for probe actions and ignores and specified
values.
19. From the Soft Limit list, select the amount of time after the action starts to
stop the initiation of new activities. The default value of 0 (zero) indicates no
amount of time.
20. From the Hard Limit list, select the amount of time after the action starts to
begin terminating activities. The default value of 0 (zero) indicates no amount
of time.
21. (Optional) In Start Time specify the time to start the action.
Use the spin boxes to set the hour and minute values, and select one of the
following options from the drop-down list:
l Disabled—Do not enforce an action start time. The action will start at the
time defined by the workflow.
l Absolute—Start the action at the time specified by the values in the spin
boxes.
l Relative—Start the action after the period of time defined in the spin boxes
has elapsed after the start of the workflow.
22. (Optional) Configure overrides for the task that is scheduled on a specific day.
To specify the month, use the navigation buttons and the month list box. To
specify the year, use the spin boxes. You can set an override in the following
ways:
l Select the day in the calendar, which changes the action task for the
specific day.
l Use the action task list to select the task, and then perform one of the
following steps:
n To define an override that occurs on a specific day of the week, every
week, select Specified day, and then use the lists. Click Add Rules
based override.
n To define an override that occurs on the last day of the calendar month,
select Last day of the month. Click Add Rules based override.
n In the Override field, type an override.
Note
4. To ensure that the action runs when the policy or workflow that contains the
action is started, in the Enabled box, select the option. To prevent the action
from running when the policy or workflow that contains the action is started,
clear this option.
Note
When you clear the Enabled option, actions that occurs after a disabled action
do not start, even if the subsequent options are enabled.
Note
14. In the Parallelism field, specify the maximum number of concurrent operations
for the action.
Note
15. From the Failure Impact list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the current action if there is a failure with one of the jobs, but
continue with subsequent actions in the workflow, select Abort action.
Note
The Abort action option applies to probe actions, and the backup actions for
the Traditional and Snapshot action types.
l To abort the entire workflow if there is a failure with one of the jobs in the
action, select Abort workflow.
Note
If any of the actions fail in the workflow, the workflow status does not appear
as interrupted or cancelled. NetWorker reports the workflow status as failed.
16. From the Soft Limit list, select the amount of time after the action starts to
stop the initiation of new activities. The default value of 0 (zero) indicates no
amount of time.
17. From the Hard Limit list, select the amount of time after the action starts to
begin terminating activities. The default value of 0 (zero) indicates no amount
of time.
18. (Optional) In Start Time specify the time to start the action.
Use the spin boxes to set the hour and minute values, and select one of the
following options from the drop-down list:
l Disabled—Do not enforce an action start time. The action will start at the
time defined by the workflow.
l Absolute—Start the action at the time specified by the values in the spin
boxes.
l Relative—Start the action after the period of time defined in the spin boxes
has elapsed after the start of the workflow.
19. (Optional) Configure overrides for the task that is scheduled on a specific day.
To specify the month, use the navigation buttons and the month list box. To
specify the year, use the spin boxes. You can set an override in the following
ways:
l Select the day in the calendar, which changes the action task for the
specific day.
l Use the action task list to select the task, and then perform one of the
following steps:
n To define an override that occurs on a specific day of the week, every
week, select Specified day, and then use the lists. Click Add Rules
based override.
n To define an override that occurs on the last day of the calendar month,
select Last day of the month. Click Add Rules based override.
n In the Override field, type an override.
Note
Note
l If the action is the first action in the workflow, select Create a new action.
l If the workflow has other actions, right-click an empty area of the Actions
pane, and then select New.
The Specify the Action Information page appears.
2. From the Action Type list, select Backup.
3. From the secondary action list, select Snapshot.
4. If you create the action as part of the workflow configuration, the workflow
appears automatically in the Workflow box and the box is dimmed.
5. Specify the order of the action in relation to other actions in the workflow:
l If the action is part of a sequence of actions in a workflow path, in the
Previous box, select the action that should precede this action.
l If the action should run concurrently with an action, in the Previous box,
select the concurrent action, and then select the Concurrent checkbox.
6. Specify a weekly or monthly schedule for the action:
l To specify a schedule for each day of the week, select Weekly by day.
l To specify a schedule for each day of the month, select Monthly by day.
7. Specify the type of backup to perform on each day:
l To specify a level on a specific day, click the backup type icon on the day.
l To specify the same type of backup on each day, select the backup type
from the list, and then click Make All.
Note
The schedule for a snapshot backup or discovery defines the days of the week
or month on which to perform the snapshot backup or discovery. For a
snapshot backup action, the schedule also defines the level of backup to
perform on each day. This level also applies to the clone action, if created.
The following table provides details on the backup type that each icon
represents.
Note
Note
8. Click Next.
The Snapshot Options page appears.
9. From the Destination Storage Node list box, select the storage node with the
devices on which to store the backup data.
10. From the Destination Pool list box, select the media pool in which to store the
backup data.
11. From the Retention list box, specify the amount of time to retain the backup
data.
After the retention period expires, the save set is removed from the media
database and the snapshot is deleted.
12. From the Minimum Retention Time list box, specify the minimum amount of
time to retain the backup data.
After the specified amount of time, an in-progress snapshot action can remove
the snapshot from the storage device to ensure that there sufficient disk space
is available for the new snapshot.
13. Click Next.
The Specify the Advanced Options page appears.
14. In the Retries field, specify the number of times that NetWorker should retry a
failed probe or backup action, before NetWorker considers the action as failed.
When the Retries value is 0, NetWorker does not retry a failed probe or backup
action.
Note
The Retries option applies to probe actions, and the backup actions for the
Traditional and Snapshot action types. If you specify a value for this option for
other actions, NetWorker ignores the values.
15. In the Retry Delay field, specify a delay in seconds to wait before retrying a
failed probe or backup action. When the Retry Delay value is 0, NetWorker
retries the failed probe or backup action immediately.
Note
The Retry Delay option applies to probe actions, and the backup actions for the
Traditional and Snapshot action types. When you specify a value for this option
in other actions, NetWorker ignores the values.
16. In the Inactivity Timeout field, specify the maximum number of minutes that a
job run by an action can try to respond to the server.
If the job does not to respond within the specified time, the server considers the
job a failure and NetWorker retries the job immediately to ensures that no time
is lost due to failures.
Increase the timeout value if a backup consistently stops due to inactivity.
Inactivity might occur for backups of large save sets, backups of save sets with
large sparse files, and incremental backups of many small static files.
Note
The Inactivity Timeout option applies to probe actions, and the backup actions
for the Traditional and Snapshot action types. If you specify a value for this
option in other actions, NetWorker ignores the value.
17. In the Parallelism field, specify the maximum number of concurrent operations
for the action.
Note
18. From the Failure Impact list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the current action if there is a failure with one of the jobs, but
continue with subsequent actions in the workflow, select Abort action.
Note
The Abort action option applies to probe actions, and the backup actions for
the Traditional and Snapshot action types.
l To abort the entire workflow if there is a failure with one of the jobs in the
action, select Abort workflow.
Note
If any of the actions fail in the workflow, the workflow status does not appear
as interrupted or cancelled. NetWorker reports the workflow status as failed.
19. From the Send Notifications list box, select whether to send notifications for
the action:
l To use the notification configuration that is defined in the Policy resource to
send the notification, select Set at policy level.
l To send a notification on completion of the action, select On Completion.
20. In the Send notification attribute, when you select the On Completion option
or On failure option, the Command box appears. Use this box to configure how
NetWorker sends the notifications. You can use the nsrlog command to send
the notifications to a log file or you can send an email notification.
The default notification action is to send the information to the
policy_notifications.log file. By default, the
policy_notifications.log file is located in the /nsr/logs directory on
Linux and in the C:\Program Files\EMC NetWorker\nsr\logs folder on
Windows.
Use the default mailer program on Linux to send email messages or the
smtpmail application on Windows:
l To send notifications to a file, type the following command, where
policy_notifications.log is the name of the file:
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the
smtpmail program assumes that the message contains a correctly
formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to
relay the SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the
notification. Multiple email recipients are separated by a space.
21. From the Soft Limit list, select the amount of time after the action starts to
stop the initiation of new activities. The default value of 0 (zero) indicates no
amount of time.
22. From the Hard Limit list, select the amount of time after the action starts to
begin terminating activities. The default value of 0 (zero) indicates no amount
of time.
23. Click Next.
The Action Configuration Summary page appears.
24. Review the settings that you specified for the action, and then click Configure.
stored on the client. If the media database entry does not have a corresponding
snapshot on the NAS client, then the media database entry is removed.
Before you begin
Create the policy and workflow that contain the action. Ensure that the group
assigned to the workflow contains only NAS devices. The discover action should be
the first action in the workflow.
Procedure
1. In the expanded left pane, select the workflow, and then perform one of the
following tasks in the right pane to start the Policy Action wizard:
l If the action is the first action in the workflow, select Create a new action.
l If the workflow has other actions, right-click an empty area of the Actions
pane, and then select New.
The Specify the Action Information page appears.
2. From the Action Type list, select Discover.
3. If you create the action as part of the workflow configuration, the workflow
appears automatically in the Workflow box and the box is dimmed.
4. Specify the order of the action in relation to other actions in the workflow:
l If the action is part of a sequence of actions in a workflow path, in the
Previous box, select the action that should precede this action.
l If the action should run concurrently with an action, in the Previous box,
select the concurrent action, and then select the Concurrent checkbox.
5. Specify a weekly or monthly schedule for the action:
l To specify a schedule for each day of the week, select Weekly by day.
l To specify a schedule for each day of the month, select Monthly by day.
6. To specify whether to perform snapshot discovery, click the icon on each day.
The following table provides details on the icons.
To perform snapshot discovery every day, select Execute from the list and click
Make All.
7. Click Next.
The Discover Options page appears.
8. From the Discover Type list, select the NAS snapshot data to discover.
9. Click Next.
The Specify the Advanced Options page appears.
Note
This point is only optional if you are using a saveset ID group. If you are using a
NAS Device group, or Client group, one of these two actions must be used for the
index action.
Procedure
1. In the expanded left pane, select the workflow, and then perform one of the
following tasks in the right pane to start the Policy Action wizard:
l If the action is the first action in the workflow, select Create a new action.
l If the workflow has other actions, right-click an empty area of the Actions
pane, and then select New.
The Specify the Action Information page appears.
2. From the Action Type list, select Generate Index.
3. If you create the action as part of the workflow configuration, the workflow
appears automatically in the Workflow box and the box is dimmed.
4. Specify the order of the action in relation to other actions in the workflow:
l If the action is part of a sequence of actions in a workflow path, in the
Previous box, select the action that should precede this action.
l If the action should run concurrently with an action, in the Previous box,
select the concurrent action, and then select the Concurrent checkbox.
5. Specify a weekly or monthly schedule for the action:
l To specify a schedule for each day of the week, select Weekly by day.
l To specify a schedule for each day of the month, select Monthly by day.
6. To specify whether to perform snapshot index generation, click the icon on
each day.
The following table provides details on the icons.
To perform snapshot index generation every day, select Execute from the list
and click Make All.
7. Click Next.
The Index Options page appears.
8. From the Type of saveset to be indexed list, select the NAS snapshot to index.
9. Click Next.
The Specify the Advanced Options page appears.
After you finish
(Optional) Create a clone action to automatically clone the data after the generate
index action. A clone action is the only supported action after a generate index action
in a workflow.
Note
A clone action is not supported for SmartSnap backups. If you perform a SmartSnap
backup, the Clone action fails displaying an unsupported error message.
Procedure
1. In the expanded left pane, select the workflow, and then perform one of the
following tasks in the right pane to start the Policy Action wizard:
l If the action is the first action in the workflow, select Create a new action.
l If the workflow has other actions, right-click an empty area of the Actions
pane, and then select New.
The Specify the Action Information page appears.
2. In the Name field, type the name of the action.
The maximum number of characters for the action name is 64.
3. In the Comment field, type a description for the action.
4. To ensure that the action runs when the policy or workflow that contains the
action is started, in the Enabled box, select the option. To prevent the action
from running when the policy or workflow that contains the action is started,
clear this option.
Note
When you clear the Enabled option, actions that occurs after a disabled action
do not start, even if the subsequent options are enabled.
Note
d. From the Retention list, specify the amount of time to retain the cloned
save sets.
After the retention period expires, the save sets are marked as recyclable
during an expiration server maintenance task.
12. In the Filters section, define the criteria that NetWorker uses to create the list
of eligible save sets to clone. The eligible save sets must match the
requirements that are defined in each filter. NetWorker provides the following
filter options:
a. Time filter—In the Time section, specify the time range in which NetWorker
searches for eligible save sets to clone in the media database. Use the spin
boxes to specify the start time and the end time. The Time filter list includes
the following options to define how NetWorker determines save set
eligibility, based on the time criteria:
l Do Not Filter—NetWorker inspects the save sets in the media database
to create a clone save set list that meets the time filter criteria.
l Accept—The clone save set list includes save sets that are saved within
the time range and meet all the other defined filter criteria.
l Reject—The clone save set list does not include save sets that are saved
within the time range and meet all the other defined filter criteria.
b. Save Set filter—In the Save Set section, specify whether to include or
exclude ProtectPoint and Snapshot save sets, when NetWorker searches for
eligible save sets to clone in the media database. The Save Set filter list
includes to the following options define how NetWorker determines save set
eligibility, based on the save set filter criteria:
l Do Not Filter—NetWorker inspects the save sets in the media database
to create a clone save set list that meets the save set filter criteria.
l Accept—The clone save set list includes eligible ProtectPoint save sets
or Snapshot save sets, when you also enable the ProtectPoint checkbox
or Snapshot checkbox.
l Reject—The clone save set list does not include eligible ProtectPoint
save sets and Snapshot save sets when you also enable the ProtectPoint
checkbox or Snapshot checkbox.
c. Clients filter—In the Client section, specify a list of clients to include or
exclude, when NetWorker searches for eligible save sets to clone in the
media database. The Client filter list includes the following options, which
define how NetWorker determines save set eligibility, based on the client
filter criteria:
l Do Not Filter—NetWorker inspects the save sets that are associated
with the clients in the media database, to create a clone save set list that
meets the client filter criteria.
l Accept—The clone save set list includes eligible save sets for the
selected clients.
l Reject—The clone save set list does not include eligible save sets for the
selected clients.
d. Levels filter—In the Levels section, specify a list of backup levels to include
or exclude, when NetWorker searches for eligible save sets to clone in the
media database. The Levels filter list includes the following options define
how NetWorker determines save set eligibility, based on the level filter
criteria:
l Do Not Filter—NetWorker inspects the save sets regardless of the level
in the media database, to create a clone save set list that meets all the
level filter criteria.
l Accept—The clone save set list includes eligible save sets with the
selected backup levels.
l Reject—The clone save set list does not include eligible save sets with
the selected backup levels.
Note
Although the Retries, Retry Delay, or the Inactivity Timeout options appear,
the clone action does not support these options and ignores the values.
15. In the Parallelism field, specify the maximum number of concurrent operations
for the action.
Note
16. From the Failure Impact list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the current action if there is a failure with one of the jobs, but
continue with subsequent actions in the workflow, select Abort action.
Note
The Abort action option applies to probe actions, and the backup actions for
the Traditional and Snapshot action types.
l To abort the entire workflow if there is a failure with one of the jobs in the
action, select Abort workflow.
Note
If any of the actions fail in the workflow, the workflow status does not appear
as interrupted or cancelled. NetWorker reports the workflow status as failed.
17. From the Send Notifications list box, select whether to send notifications for
the action:
18. In the Send notification attribute, when you select the On Completion option
or On failure option, the Command box appears. Use this box to configure how
NetWorker sends the notifications. You can use the nsrlog command to send
the notifications to a log file or you can send an email notification.
The default notification action is to send the information to the
policy_notifications.log file. By default, the
policy_notifications.log file is located in the /nsr/logs directory on
Linux and in the C:\Program Files\EMC NetWorker\nsr\logs folder on
Windows.
Use the default mailer program on Linux to send email messages or the
smtpmail application on Windows:
l To send notifications to a file, type the following command, where
policy_notifications.log is the name of the file:
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the
smtpmail program assumes that the message contains a correctly
formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to
relay the SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the
notification. Multiple email recipients are separated by a space.
19. From the Soft Limit list, select the amount of time after the action starts to
stop the initiation of new activities. The default value of 0 (zero) indicates no
amount of time.
20. From the Hard Limit list, select the amount of time after the action starts to
begin terminating activities. The default value of 0 (zero) indicates no amount
of time.
21. (Optional) In the Start Time option, specify the time to start the action.
Use the spin boxes to set the hour and minute values, and select one of the
following options from the list box:
l Disabled—Do not enforce an action start time. The action will start at the
time defined by the workflow.
l Absolute—Start the action at the time specified by the values in the spin
boxes.
l Relative—Start the action after the period of time defined in the spin boxes
has elapsed after the start of the workflow.
22. (Optional) Configure overrides for the task that is scheduled on a specific day.
To specify the month, use the navigation buttons and the month list box. To
specify the year, use the spin boxes. You can set an override in the following
ways:
l Select the day in the calendar, which changes the action task for the
specific day.
l Use the action task list to select the task, and then perform one of the
following steps:
n To define an override that occurs on a specific day of the week, every
week, select Specified day, and then use the lists. Click Add Rules
based override.
n To define an override that occurs on the last day of the calendar month,
select Last day of the month. Click Add Rules based override.
n In the Override field, type an override.
Note
The oval icon specifies the group to which the workflow applies. The rounded
rectangle icons identify actions. The parallelogram icons identify the destination pool
for the action.
You can work directly in the visual representation of a workflow to perform the
following tasks:
l You can adjust the display of the visual representation by right-clicking and
selecting one of the following options:
n Zoom In—Increase the size of the visual representation.
n Zoom Out—Decrease the size of the visual representation.
n Zoom Area—Limit the display to a single section of the visual representation.
n Fit Content—Fit the visual representation to the window area.
n Reset—Reset the visual representation to the default settings.
n Overview—View a separate dialog box with a high-level view of the visual
representation and a legend of the icons.
l You can view and edit the properties for the group, action, or destination pool by
right-clicking the icon for the item, and then select Properties.
l You can create a group, action, or destination pool by right-clicking the icon for
the item, and then select New.
Software Configuration 63
Software Configuration
Note
The NetWorker Updating from a Previous Release Guide provides details about
resources that are migrated during the update process.
Replication prerequisites
For replication operations, ensure that the following prerequisites are met:
l For remotely replicated directories, ensure the remote system has a Client
resource set up on the NetWorker server.
l Ensure you have correctly configured the replication policy on the NAS device
before you create the Client resource for the NAS device.
l Ensure you have configured the replication policy to create a snapshot when the
replication operation is completed.
The NAS device documentation provides details.
NetApp prerequisites
For SnapVault and SnapMirror replication operations, ensure that the following
prerequisites are met:
l The source and destination volumes or qtrees must exist before you configure a
replication. The volumes may be on the same or on separate NetApp devices on
the same or on separate servers that may be NetApp virtual machines or Vserver.
Both volumes must be in an online state.
l The source volume must be read-writable. The destination volume must be a data
protection type.
l Verify that the SnapVault and SnapMirror replication policies are configured on the
NetApp devices.
l Validate the replication configuration by performing an initial replication operation.
This operation makes the replication policies available for selection in the
NetWorker client wizard.
l In NMC under the Server area, ensure that you assign all privileges under User
Groups.
l The NetWorker server must be a part of the NetApp export policy for the share to
be accessible.
l The NAS shares must be mounted to the NetWorker server before performing a
backup.
The NetApp documentation provides details.
Note
Configuring NDMP
If you plan to clone the snapshot save sets to conventional storage media, complete
the NDMP configuration on the NAS client system. The NetWorker Network Data
Management Protocol (NDMP) User Guide provides information about NDMP
configuration.
Note
For the client creation to be successful, you must preconfigure the NDMP username
and password for the NAS devices.
Note
The Isilon OneFS Administration Guide provides updates and details about Isilon
commands. You can also perform this NDMP configuration through the Isilon OneFS
Storage Administration user interface.
The following steps are for Isilon version 8. If you are using an earlier version of Isilon,
https://support.emc.com/kb/471904 provides more information.
Procedure
1. To connect to a node in the cluster, use ssh.
2. To create the NDMP username and password, use the isi command.
isi ndmp users create <name> --password <string>
For example, the following command creates an NDMP user account with
username ndmp_user and password 1234:
isi ndmp users create ndmp_user --password=1234
Note
l ts—Tape silvering.
In the Advanced App Info field, you may specify additional NAS-specific
variables that are supported by the client's NDMP configuration, one per
line. For example, for an Isilon or NetApp remote replication backup, specify
NDMP_MNT_HOST=remote host. Common Application Information
variables on page 84 and Configuring the Application Information variables
on page 74 provides more information.
Review the App Info options that the wizard has selected for the NAS
device. You can disable options, as required.
c. Click Next.
8. For NAS devices that do not support file browsing, complete the Select the
File System Objects page:
a. Type the absolute pathnames of file systems, directories, and individual files
to include in the snapshot save set. Add each item on a separate line.
b. Click Next.
Note
For a NetApp Cluster Mode, while mounting the file system to the networker
server, specify the path as follows:
l 7-Mode—:/vol/volumename
l C-Mode—:/volumename
For example, the following replication policies are defined on a NAS Isilon
device:
Then the specified snapshot location paths will use the corresponding NAS
replication policies.
Note
For NetApp devices, if the snapshot destination volume is written to, the
destination becomes the new source volume and the relationship switches.
b. Click Next.
10. Complete the Backup Configuration Summary page:
a. Review the attributes and values that are listed in the summary.
To modify a setting, click Back or click the link in the steps panel.
Procedure
1. On the Administrator window, in the navigation pane, select Clients.
2. Right-click the client that you created, and then select Modify Client
Properties.
3. On the Globals (2 of 2) tab, in the Remote Access field, specify the remote
access credentials for the NetWorker server as follows:
l For a Windows NetWorker server—system@networker-server-name
l For a UNIX NetWorker server—root@networker-server-name
Where networker-server-name is the hostname of the NetWorker server.
4. Click OK.
Note
Note
For NetApp recovery operations, configure the NSR_MOUNTPOINT_NAME variable.
For SnapMirror and SnapVault the NDMP clone application variables must be set to N
as follows:
DIRECT=N
UPDATE=N
Note
Procedure
1. Provide the script files with the following security:
l On Microsoft Windows systems, provide the script files with security that
grants full control only to the local SYSTEM, local Administrators, or Backup
Operators groups. Otherwise, the scripts do not run.
To set this security, in Windows Explorer right-click the script file, select
Properties, and then in the Properties window Security tab, click
Advanced.
l On UNIX systems, the root user must own the script files. The scripts can
set only owner access permissions, and the scripts must at least have run
access. Otherwise, the scripts do not run. The parent directory of the
scripts must have at least owner run permissions, and must not have write
permissions for the group and world.
2. To add, modify, or run the resident scripts, place the scripts in a directory
where a user must have administrator/root privileges. Otherwise, any backups
that use the scripts fail.
On Microsoft Windows systems, NetWorker searches for relative pathnames in
the NetWorker_install_path/bin directory.
4. After a backup is completed, verify the log files that are generated in the /nsr/
logs (UNIX) directory on the application client host. The log file name is in the
form of script_name_LOGFILE.txt. The script output appears in the log file.
l Snapshot management.......................................................................................78
l NAS snapshot recovery support and limitations................................................. 79
l Recovering data from a snapshot with the Recovery Wizard............................. 79
Snapshot management
The management and the recovery operations for NAS device file system data are
described in this chapter.
The NMC Recovery wizard and the NetWorker CLI commands provide features that
enable you to browse, delete, change snapshot expiration, and recover snapshot data.
Snapshot reporting
You can create individual reports of NAS snapshot, replicate, and clone activities.
The NetWorker Administration Guide provides details.
Procedure
1. In NMC, select the Reports view.
2. In the Legacy Reports folder, select a summary report or a statement report to
view. The Configure tab for the selected report type appears in the right panel.
3. On the Configure tab, specify the items that you want to include in the report.
Select the item parameters. Click the Remove (<), Remove All (<<), or Add All
(>>) buttons as required. If you do not specify Save Time values, the report
displays all the available data.
The View Report tab shows the resultant report.
Note
NAS snapshot support and limitation on page 94 provides more information on NAS
file system limitations.
Note
Note
You can select only one save set for this operation. Each additional save set
volume requires a separate pass through the wizard.
Note
Clear this setting for NetApp NAS devices on Linux operating systems,
which cannot use a temporary mount point. Use an existing mount point.
Note
The wizard does not list expired save sets. You can recover expired save sets
manually by using the nsrsnapadmin command utility with the R command
option or the nsrnassnap_recover command. Using nsrsnapadmin
operations on page 88 and the NetWorker Command Reference Guide
provide details.
b. Click Next.
6. Complete the Select the Recovery Options page:
a. In the File Path for Recovery field, select, browse, or type a location where
the wizard will restore the recovered files:
l Original path:
n In-place recovery—Restore to the original location on the NAS
device.
l New destination path:
n Out-of-place recovery—Restore to a different location on the NAS
device.
n Directed recovery—Restore to a location on the NetWorker host that
is running the recovery. A directed recovery may specify a location
that is configured as a CIFS or NFS file share, which directs the
recovery to a remote location.
Note
In-place recovery and out-of place recovery on the NAS device is not
available for the following devices and conditions:
l VNX, VNX2, VNXe, and Unity devices.
l Isilon devices for a remotely replicated snapshot.
l NetApp recovery of an entire directory or save set. You may recover one
or more files, provided the files do not make up the entire contents of a
directory.
NSR_DIRECTED_RECOVER_HOST=<NetWorker_server>
<source_Isilon_restore_path>
b. In the Duplicate file options field, specify how the wizard resolves conflicts
in file names or directory names:
l Rename the recovered file—The wizard recovers the file or directory
with a new name that NetWorker automatically generates. This option is
available for directed recoveries only.
l Do not recover the file—The wizard does not recover the file or
directory, and skip it.
l Overwrite the existing file—The wizard replaces the file contents or
the directory contents.
n Fail the recover—The wizard does not recover any further files or
directories. This option is also available for directed recoveries.
Note
c. To specify further options, select Advanced Options , and then specify the
attributes.
Note
d. Click Next.
7. Complete the Perform the Recover page:
a. In the Recovery Name field, type a name for the recovery.
b. In the Recovery Start Time field, specify the following attributes:
l The Start recovery now option is the only option that snapshot recovery
supports.
l In the Specify a hard stop time option, you can specify a time limit that
stops an incomplete recovery process.
d. Review the Summary of the recovery and make any necessary corrections
by going to the previous pages in the wizard.
e. Click Run Recover.
The wizard performs the recovery. The NetWorker Administration Guide
provides more details on the NMC Recovery Wizard.
Note
To start interactive mode, type nsrsnapadmin at the CLI prompt. When you receive
an input prompt, you can type a specific command and its available options to perform
the NetWorker options that are listed in the following table.
Table 13 Commands and options that are supported in nsrsnapadmin interactive mode
Delete a snapshot d [-s nsr_server] [-c client] [-v] [-a] [-y] -S ssid [or -S "ssid ssid ..."]
save set
Perform a save set R [-s nsr_server] [-c client] [-M mount_host] [-v] -S ssid [-t
recovery destination] [-T recover_host] -m path [-A attr=val]
Perform a file-by-file r [-s nsr_server] [-c client] [-M mount_host] [-T recover_host] -S
browsing and ssid [-A attr=val]
recovery
where:
l nsr_server is the hostname of the NetWorker server.
l client is the name of the NAS device.
l mount_host is the hostname of the mount host.
l -v is for verbose logging.
The NetWorker Command Reference Guide and NetWorker man pages provide details.
nsrsnapadmin> p –c isilon-1.myorg.com
ssid = 643255862 savetime="4/16/2014 11:05:02 AM"
(1397660702) expiretime="4/17/2015 9:41:59 AM"
(1429278119) ssname=/ifs/data
where:
l server is the hostname of the NetWorker server.
l client is the name of the NAS device.
l ssid is the snapshot save set ID.
You can also use the nsrnassnapck command to delete a snapshot.
The message indicates that you have successfully changed the expiration time.
Note
l If you omit the year, the year defaults to the current year.
l If you omit the meridian, NetWorker uses a 24-hour clock.
l If you omit the time zone (for example, GMT), NetWorker uses the current time
zone.
l If you specify a date mm/dd/yy as in -e 09/04/13, the time defaults to 00:00:00.
NetWorker changes the snapshot save set browse and retention times to
09/04/13 00:00:00.
If you specify a time hh:mm:ss as in -e 20:00:00, the date defaults to the system
time, for example, 09/03/13. NetWorker changes the snapshot save set browse
and retention times to 09/03/13 20:00:00.
The NetWorker Command Reference Guide and the NetWorker man pages provide
details on the mminfo command.
Multiple files:
Note
For NetApp devices, a recovery option must be specified, otherwise the recovery fails.
For Isilon and NetApp devices, specify the -R remote hostname option to recover from
a remote replication backup.
Snapshot limitations 93
Snapshot limitations
Note
On Windows systems, a file share connection cannot exist between the Windows
system running the recovery and the NAS device with the stored data.
NAS Limitation
device
Isilon l Remote replication does not support in-place recoveries and out-of-place
recoveries.
l Renaming the data is supported only for directed recovery.
l Directed recoveries overwrite an existing file.
Note
Note
For Isilon and NetApp remote replication NDMP recoveries, you must specify the –
R with the source filer specified in the extra recovery options.
NAS Limitation
device
NetApp l In-place recoveries and out-of-place recoveries restore only selected files.
NetApp does not restore directory structures.
l To enable selected file-by-file (FBF) recovery from snapshot replications, you
must specify the NSR_MOUNTPOINT_NAME variable.
-A NSR_MOUNTPOINT_NAME=source_volume
-A NSR_PS_FILE_RECOVER_OPT=Y
Windows example:
-A NSR_USE_EXISTING_MOUNTPOINT=Yes
Linux example:
nsrsnapadmin> r -S 4046199999 -A
NSR_USE_EXISTING_MOUNTPOINT=yes
-A NSR_MOUNTPOINT_NAME=/vol/arnab -T 10.13.999.99
Current working directory is /vol/arnab/
snaprecover> cd dir1
snaprecover> add file1
1 file(s) marked for recovery
snaprecover> recover -A NSR_PS_FILE_RECOVER_OPT=Y
l On Linux systems, renaming the recovery data is not supported for in-place or
out-of-place recoveries. Renaming the data is supported only for directed
recovery.
NAS Limitation
device
Note
For NDMP recovery using a NetApp Cluster Mode system, in the Recovery
Configuration wizard, on the Select the Recovery Options window, select the
New destination path option. You must specify:
/vserver name/volume name. If you are using the command line option using
the CLI, specify:
-m /vserver name/volume name.
Only for remotely replicated NDMP recoveries, the -R command is required. For
example:
Note
For Isilon and NetApp remote replication NDMP recoveries, type -R with the source
filer specified in the extra recovery options.
Table 15 Device support for recovery of save sets and individual files
Recovery from Isilon Isilon Isilon NetApp VNX VNX2 VNXe Unity
snapshot local remote
replicat replication
ion
Directed recovery of Yes Yes Yes Not Yes Yes Yes Yes
save set applicable
In-place recovery of save Yes Yes Not Not Not Not Not Not
set applicable applicable applicable applicable applicable applicable
Out-of-place recovery of Yes Yes Not Not Not Not Not Not
save set applicable applicable applicable applicable applicable applicable
Directed recovery of Yes Yes Yes Yes Yes Yes Yes Yes
individual files
Table 15 Device support for recovery of save sets and individual files (continued)
Recovery from Isilon Isilon Isilon NetApp VNX VNX2 VNXe Unity
snapshot local remote
replicat replication
ion
In-place recovery of Yes Yes Not Yes Not Not Not Not
individual files applicable applicable applicable applicable applicable
Out-of-place recovery of Yes Yes Not Yes Not Not Not Not
individual files applicable applicable applicable applicable applicable
Note
For C-Mode local replication clones, enable Node Scope Mode on the Netapp filer.
backup volume A volume used to store backup data. NetWorker backup data cannot be stored on an
archive volume or a clone volume.
browse policy NetWorker policy that specifies the period of time during which backup entries are
retained in the client file index. Backups listed in the index are browsable and readily
accessible for recovery.
client Host on a network, such as a computer, workstation, or application server whose data
can be backed up and restored with the backup server software.
client file index Database maintained by the NetWorker server that tracks every database object, file,
or file system backed up. The NetWorker server maintains a single index file for each
client computer. The tracking information is purged from the index after the browse
time of each backup expires.
Client resource NetWorker server resource that identifies the save sets to be backed up on a client.
The Client resource also specifies information about the backup, such as the schedule,
browse policy, and retention policy for the save sets.
clone 1. Duplicate copy of backed-up data, which is indexed and tracked by the NetWorker
server. Single save sets or entire volumes can be cloned.
2. Type of mirror that is specific to a storage array.
cluster Group of linked virtual or physical hosts, each of which is identified as a node, with
shared storage that work together and represent themselves as a single host.
consistent State of a data set that fully matches an application's active view of the data at any
point in time.
datazone Group of clients, storage devices, and storage nodes that are administered by a
NetWorker server.
device 1. Storage folder or storage unit that can contain a backup volume. A device can be a
tape device, optical drive, autochanger, or disk connected to the server or storage
node.
2. General term that refers to storage hardware.
3. Access path to the physical drive, when dynamic drive sharing (DDS) is enabled.
file system 1. Software interface used to save, retrieve, and manage files on storage media by
providing directory structures, data transfer methods, and file association.
2. Entire set of all files.
3. Method of storing files.
group One or more client computers that are configured to perform a backup together,
according to a single designated schedule or set of conditions.
hostname Name or address of a physical or virtual host computer that is connected to a network.
logical unit (LUN) Logical storage space on a storage array that is addressed by SCSI or Fibre Channel
protocols. Multiple LUNs can be used to represent a storage volume.
logical volume manager Software that controls disk resources by mapping data between a logical view of
(LVM) storage space and the actual physical disks.
manual backup Backup that a user performs from the client, also known as an unscheduled, on-
demand, or ad hoc backup.
100 NetWorker 9.2 Snapshot Management for NAS Devices Integration Guide
Glossary
media Physical storage, such as a disk file system or magnetic tape, to which backup data is
written. See volume.
media database Database that contains indexed entries of storage volume location and the life cycle
status of all data and volumes managed by the NetWorker server.
mount To make a volume physically available for use, such as the placement of a removable
disk volume or tape into a drive for reading or writing.
mount host Host in a network that is used to mount storage array snapshot volumes to perform
snapshot restore and rollover operations.
network attached Disk array or storage device (NAS filer) that connects directly to the messaging
storage (NAS) network or LAN interfaces and uses the common communication protocols of TCP/IP
or NDMP.
Network Data Software component that uses TCP/IP standards to specify how heterogeneous
Management Protocol network components communicate for the purposes of backup, recovery, and transfer
(NDMP) of data between storage systems.
NetWorker Management Software program that is used to manage NetWorker servers and clients. The NMC
Console (NMC) server also provides reporting and monitoring capabilities for all NetWorker processes.
NetWorker server Computer on a network that runs the NetWorker server software, contains the online
indexes, and provides backup and restore services to the clients and storage nodes on
the same network.
NetWorker Snapshot Technology that provides point-in-time snapshot copies of data. NetWorker software
Management (NSM) backs up data from the snapshot. This allows applications to continue to write data
during the backup operation, and ensures that open files are not omitted.
point-in-time copy (PIT Fully usable copy of a defined collection of data, such as a consistent file system,
copy) database, or volume that contains an image of the data as it appeared at a specific point
in time. A PIT copy is also called a snapshot or shadow copy.
policy Set of defined rules for client backups that can be applied to multiple groups. Groups
have dataset, schedule, browse, and retention policies.
pool 1. NetWorker sorting feature that assigns specific backup data to be stored on
specified media volumes.
2. Collection of NetWorker backup volumes to which specific data has been backed
up.
NetWorker 9.2 Snapshot Management for NAS Devices Integration Guide 101
Glossary
quiesce State in which all writes to a disk are stopped and the file system cache is flushed.
Quiescing the database prior to creating the snapshot provides a transactionally
consistent image that can be remounted.
recover To restore data files from backup storage to a client and apply transaction (redo) logs
to the data to make it consistent with a given point-in-time.
resource Software component whose configurable attributes define the operational properties of
the NetWorker server or its clients. Clients, devices, schedules, groups, and policies are
all NetWorker resources.
restore To retrieve individual data files from backup media and copy the files to a client without
applying transaction logs.
retention policy NetWorker setting that determines the minimum period of time that backup data is
retained on a storage volume and available for recovery. After this time is exceeded, the
data is eligible to be overwritten.
rollback restore Process by which a snapshot is restored to its source or alternate location by using the
capability of the storage array. A rollback restore destroys existing data on the target
location.
rollover Backup of a snapshot to conventional storage media, such as disk or tape. Previously
known as a live backup.
rollover-only backup Rollover whereupon the snapshot copy is deleted. Previously known as a serverless
backup, live backup, or nonpersistent backup.
save set 1. Group of tiles or a file system copied to storage media by a backup or snapshot
rollover operation.
2. NetWorker media database record for a specific backup or rollover.
scheduled backup Type of backup that is configured to start automatically at a specified time for a group
of one or more NetWorker clients. A scheduled backup generates a bootstrap save set.
snapshot Point-in-time, read-only copy of specific data files, volumes, or file systems on an
application host. Operations on the application host are momentarily suspended while
the snapshot is created on a proxy host. Also called a PiT copy, image, or shadow copy.
snapshot backup Snapshot created on a storage array as a backup. Previously called instant backup.
102 NetWorker 9.2 Snapshot Management for NAS Devices Integration Guide
Glossary
snapshot policy Sets of rules that control the life cycle of snapshots. These rule specify the frequency
of snapshot creation, how long snapshots are retained, and which snapshots will be
backed up to conventional storage media.
snapshot restore Restore from a snapshot backup. Previously called instant restore.
snapshot save set Group of files or other data included in a single snapshot. Previously called a snapset.
source LUN LUN on the application host, whose production data can be copied by snapshot.
specific point-in-time RecoverPoint term for PIT copy. See point-in-time copy (PIT copy).
(SPIT) copy
storage array Integrated collection of subsystem disks, controllers, bus adapters, and software that
provides storage services to one or more hosts.
storage node Computer that manages physically attached storage devices or libraries, whose backup
operations are administered from the controlling NetWorker server. Typically a
“remote” storage node that resides on a host other than the NetWorker server.
target client NetWorker client on which data is to be restored This may be the same as the original
source client from which the data was backed up, or it may be a different client.
volume 1. Unit of physical storage medium, such as a disk or magnetic tape, to which backup
data is written.
2. Identifiable unit of data storage that may reside on one or more computer disks.
volume group Logical group that contains sets of disks, as configured by a volume manager.
NetWorker 9.2 Snapshot Management for NAS Devices Integration Guide 103
Glossary
104 NetWorker 9.2 Snapshot Management for NAS Devices Integration Guide