NetWorker 19.5 Administration Guide
NetWorker 19.5 Administration Guide
Administration Guide
19.5
November 2021
Rev. 02
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid
the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 1990- 2021 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries.
Other trademarks may be trademarks of their respective owners.
Contents
Figures........................................................................................................................................ 16
Tables..........................................................................................................................................19
Preface...................................................................................................................................................................................... 23
Chapter 1: Overview.................................................................................................................... 27
The NetWorker environment.......................................................................................................................................... 27
NetWorker Components............................................................................................................................................ 27
NetWorker services.......................................................................................................................................................... 29
Processes on NetWorker hosts .............................................................................................................................. 30
Stop and start the NMC Server...............................................................................................................................32
Stop and start a NetWorker Server, Client, or Storage Node......................................................................... 33
NetWorker user interfaces............................................................................................................................................. 35
NMC user interface.................................................................................................................................................... 35
NetWorker Administration window......................................................................................................................... 37
NetWorker client interface........................................................................................................................................37
NetWorker character-based interface................................................................................................................... 37
NetWorker command-line interface........................................................................................................................37
Introduction to the NetWorker Management Web UI........................................................................................ 37
Contents 3
Using media pools........................................................................................................................................................69
Storage nodes.................................................................................................................................................................... 80
Requirements............................................................................................................................................................... 80
Licensing........................................................................................................................................................................80
Storage node configuration....................................................................................................................................... 81
Storage Node Options................................................................................................................................................85
Configuring a dedicated storage node................................................................................................................... 86
Troubleshooting storage nodes................................................................................................................................86
Disk storage devices......................................................................................................................................................... 87
Example environment................................................................................................................................................. 88
Considerations for Client Direct clients................................................................................................................. 88
Differences between FTDs, AFTDs, and DD Boost devices............................................................................. 89
Device target and max sessions default values and ranges.............................................................................. 91
Advanced file type devices....................................................................................................................................... 92
DD Boost and Cloud Tier devices.......................................................................................................................... 102
Libraries and silos.............................................................................................................................................................103
Overview of tape device storage...........................................................................................................................103
Support for LTO-4 hardware-based encryption................................................................................................ 103
Linux device considerations.................................................................................................................................... 103
Solaris device considerations.................................................................................................................................. 104
HP-UX device considerations................................................................................................................................. 104
AIX device considerations........................................................................................................................................ 107
SCSI and VTL libraries.............................................................................................................................................. 107
Silo libraries..................................................................................................................................................................134
NDMP libraries.............................................................................................................................................................141
NetWorker hosts with shared libraries.................................................................................................................. 141
Dynamic drive sharing...............................................................................................................................................143
File type devices...............................................................................................................................................................147
FTD capacity issues...................................................................................................................................................147
Full FTD prevention................................................................................................................................................... 148
Stand-alone devices........................................................................................................................................................148
Autodetecting and configuring a stand-alone tape drive.................................................................................148
Adding a stand-alone device manually..................................................................................................................148
Auto Media Management for stand-alone devices............................................................................................149
Mounting or unmounting a volume in a stand-alone tape drive..................................................................... 149
Labeling and mounting a volume in one operation (stand-alone tape drive).............................................. 150
Labeling volumes without mounting......................................................................................................................150
Mounting uninventoried volumes...........................................................................................................................150
Labeling volumes.............................................................................................................................................................. 151
Labeling or re-labeling library volumes.................................................................................................................. 151
Verifying the label when a volume is unloaded................................................................................................... 152
Troubleshooting devices and autochangers..............................................................................................................152
Additional attributes in the Autochanger resource............................................................................................152
Maintenance commands.......................................................................................................................................... 152
Autodetected SCSI jukebox option causes server to stop responding........................................................ 152
Autochanger inventory problems...........................................................................................................................153
Destination component full messages.................................................................................................................. 153
Tapes do not fill to capacity....................................................................................................................................153
Tapes get stuck in drive when labeling tapes on Linux Red Hat platform...................................................154
Increasing the value of Save Mount Time-out for label operations.............................................................. 154
4 Contents
Server cannot access autochanger control port............................................................................................... 154
Changing the sleep times required for TZ89 drive types................................................................................ 155
Message displayed when CDI enabled on NDMP or file type device............................................................155
Verify firmware for switches and routers............................................................................................................155
Commands issued with nsrjb on a multi-NIC host fail...................................................................................... 155
SCSI reserve/release with dynamic drive sharing............................................................................................. 156
Recovering save sets from a VTL on a different NetWorker server............................................................ 156
Contents 5
Backup levels................................................................................................................................................................... 232
Comparing backup levels.........................................................................................................................................232
Backup levels and data recovery requirements................................................................................................. 233
Backup levels for the online indexes.................................................................................................................... 233
Synthetic full backups..............................................................................................................................................234
Virtual synthetic full backups................................................................................................................................. 239
Backup scheduling........................................................................................................................................................... 241
Migration of NSR schedule from 8.x to 19.5....................................................................................................... 241
Scheduling backup cycles........................................................................................................................................ 241
Considerations for scheduling backups............................................................................................................... 242
Methods for scheduling backups.......................................................................................................................... 243
Backup Browse and Retention.................................................................................................................................... 249
Methods for Setting Browse and Retention...................................................................................................... 249
Assigning a retention policy to a Client resource...............................................................................................251
Modifying the browse and retention policy on a save set............................................................................... 251
Changing browse and retention policies with nsrmm examples.................................................................... 252
NetWorker Year 2038 Readiness................................................................................................................................ 253
Upgrade path............................................................................................................................................................. 253
Limitations of the Year 2038 Readiness..............................................................................................................253
Querying save sets for old and new forever retention time...........................................................................254
Data Domain Retention Lock..................................................................................................................................254
Overrides and time policies.....................................................................................................................................255
Backward Compatibility...........................................................................................................................................255
General backup considerations....................................................................................................................................255
Renamed directories................................................................................................................................................ 255
Raw partitions............................................................................................................................................................256
Access control lists...................................................................................................................................................256
Client parallelism and parallel save streams........................................................................................................256
Maximum path and save set length......................................................................................................................259
Open files.................................................................................................................................................................... 259
Data deduplication.................................................................................................................................................... 260
Directives.......................................................................................................................................................................... 260
Types of directives................................................................................................................................................... 260
Format of directive statements..............................................................................................................................261
Order of Execution in the Directive......................................................................................................................264
Global directives........................................................................................................................................................265
NetWorker User local directives............................................................................................................................268
Creating local directives.......................................................................................................................................... 268
6 Contents
Configuring a Client resource for backups on Mac OS X hosts .........................................................................304
Mac OS X backup considerations......................................................................................................................... 304
Creating a Client resource with the Client Backup Configuration wizard.................................................. 305
Assigning directives to Mac OS X clients............................................................................................................307
Configuring Open Directory database backups................................................................................................. 307
Sending client data to AFTD or Data Domain devices only.................................................................................. 308
Non-ASCII files and directories................................................................................................................................... 308
Configuring checkpoint restart backups................................................................................................................... 308
About partial save sets............................................................................................................................................ 309
Partial saveset cloning and scanning................................................................................................................... 309
Checkpoint restart requirements.......................................................................................................................... 309
Configuring checkpoint restart.............................................................................................................................. 310
Restarting checkpoint-enabled backups...............................................................................................................311
Recovering data from partial save sets................................................................................................................312
Probe-based backups..................................................................................................................................................... 312
Encryption......................................................................................................................................................................... 313
AES Encryption...........................................................................................................................................................313
In-flight encryption.................................................................................................................................................... 314
Compression..................................................................................................................................................................... 315
Configuring compression for scheduled backups.............................................................................................. 315
Configuring compression for manual backups.................................................................................................... 315
Backing up distributed file systems.............................................................................................................................316
Configuring Single Name Space for Global Indexing......................................................................................... 316
Performing a Data Recover.....................................................................................................................................316
Best Practices and Recommendations for using Index Hostname................................................................ 316
Configuring Client Direct backups............................................................................................................................... 317
Requirements for Client Direct backups...............................................................................................................317
Configuring Client Direct backups......................................................................................................................... 317
Backup command customization................................................................................................................................. 318
Creating a custom backup script........................................................................................................................... 318
Customizing backups with the pre and post commands.................................................................................323
Client resources...............................................................................................................................................................323
Create a Client resource with the Client Properties dialog box.................................................................... 323
Editing a Client resource......................................................................................................................................... 324
Copying a Client resource....................................................................................................................................... 325
Changing the hostname of a client.......................................................................................................................325
Deleting a Client resource.......................................................................................................................................326
Decommission a Client resource........................................................................................................................... 326
Manual backups...............................................................................................................................................................328
Performing a manual backup on Windows.......................................................................................................... 328
Performing a manual backup from the command prompt.............................................................................. 329
Performing a manual backup on Mac OS X........................................................................................................ 329
Troubleshooting manual backups.......................................................................................................................... 329
Verifying backup data.................................................................................................................................................... 329
NetWorker Client FQDN compliant with RFC 1123.................................................................................................330
Contents 7
Deciding when to clone........................................................................................................................................... 332
Clone Browse and Retention..................................................................................................................................332
Cloning requirements and considerations........................................................................................................... 332
Cloning example.........................................................................................................................................................334
Cloning with tape devices.......................................................................................................................................335
Cloning with file type and AFTD devices.............................................................................................................336
Cloning with Avamar................................................................................................................................................ 336
Cloning with Data Domain (DD Boost).................................................................................................................337
Controlling storage node selection for cloning...................................................................................................337
Recover Pipe to Save ............................................................................................................................................. 340
Cloning save sets from the command prompt....................................................................................................341
Updates to group, policy, workflow, and action fields in mediadb for a cloned save set .......................344
Staging save sets............................................................................................................................................................344
Staging bootstrap backups.....................................................................................................................................345
Creating a staging resource................................................................................................................................... 345
Editing staging configurations................................................................................................................................347
Copying a Staging resource....................................................................................................................................347
Deleting a staging policy.......................................................................................................................................... 347
Manual staging from the command prompt....................................................................................................... 348
Common NetWorker staging commands and issues........................................................................................ 348
Archiving data..................................................................................................................................................................349
Storage of archived data........................................................................................................................................ 350
Enabling archiving......................................................................................................................................................351
Archiving data from Windows.................................................................................................................................351
Archiving data from UNIX....................................................................................................................................... 352
Recovering archived data....................................................................................................................................... 352
Troubleshooting NetWorker archiving and retrieval.........................................................................................354
Chapter 9: Recovery..................................................................................................................368
Recovering data.............................................................................................................................................................. 369
Recovery roadmap..........................................................................................................................................................369
Planning and preparing to recovering data...............................................................................................................370
8 Contents
Gathering key information.......................................................................................................................................370
Prerequisites for recovering a NetWorker client or storage node................................................................ 370
Downloading the NetWorker software and documentation............................................................................ 371
Reinstalling the NetWorker storage node............................................................................................................ 371
Optional, resetting the autochanger..................................................................................................................... 371
NetWorker recovery overview......................................................................................................................................371
Recovery types................................................................................................................................................................ 372
Directed recoveries...................................................................................................................................................372
Local recoveries.........................................................................................................................................................375
Recover programs...........................................................................................................................................................375
Using the NetWorker User program.....................................................................................................................376
Using the NetWorker Recovery program............................................................................................................ 376
Using the Recovery Wizard.................................................................................................................................... 376
Using the recover command.................................................................................................................................. 380
Scanner recovery...................................................................................................................................................... 380
Recovering the data........................................................................................................................................................381
Determining the volume for recovering cloned data.........................................................................................381
Recovering access control list files...................................................................................................................... 382
Browsable recovery.................................................................................................................................................. 382
Save set recovery...................................................................................................................................................... 391
Using the scanner program to recover data...................................................................................................... 394
VSS File Level Recovery......................................................................................................................................... 396
Recovering deduplication data.................................................................................................................................... 396
Improving restore performance with multiple threads.......................................................................................... 396
vProxy recovery in NMC............................................................................................................................................... 397
Entering management credentials for the Data Domain resource (instant recovery and User
mode file-level restore only)...............................................................................................................................397
File-level restore as an Active Directory user.................................................................................................... 398
Recovering a virtual machine using the NMC Recovery wizard................................................................... 399
vProxy Log Bundle collection using NMC..................................................................................................................413
Recovering file system data on Windows.................................................................................................................. 413
Recovering Windows volume mount points........................................................................................................ 413
Recovering Windows DHCP and WINS databases............................................................................................ 413
Recovering DFS..........................................................................................................................................................414
Recovering data on OS-X clients.................................................................................................................................415
Recovering files and directories from the command prompt..........................................................................415
Recovering files and directories by using the NetWorker Recover GUI...................................................... 415
Recovering client files on a different NetWorker server....................................................................................... 419
Recovering as NMC User with Non-Admin Privileges ..........................................................................................420
Preparing the NMC Sever for Recovery....................................................................................................................421
Creating an NMC Group for Recovery................................................................................................................. 421
Creating an NMC User with recovery privileges................................................................................................421
Creating a NetWorker User Group for recovery............................................................................................... 422
Recover the NMC Server database........................................................................................................................... 422
Prepare for an NMC Server recovery.................................................................................................................. 422
Recovering the NMC Server.................................................................................................................................. 423
Contents 9
Selecting a restore method.................................................................................................................................... 425
Performing a non-authoritative AD restore on Windows Server 2012, 2012 R2, 2016, and 2019.........426
Performing an authoritative AD restore on Windows Server 2012, 2012 R2, 2016, and 2019............... 426
Performing a Windows BMR to physical or virtual computers............................................................................ 426
Prerequisites to performing a Windows BMR.................................................................................................... 427
Gathering configuration information required by a Windows BMR.............................................................. 427
Obtaining the Windows BMR image..................................................................................................................... 427
Creating a Windows BMR bootable image..........................................................................................................427
Perform the BMR......................................................................................................................................................428
Troubleshooting Windows BMR............................................................................................................................ 434
Additional recovery options.................................................................................................................................... 438
Restart required after recovery operation..........................................................................................................438
Online recovery of Active Directory, DFSR, or Cluster services.........................................................................438
10 Contents
Deleting a custom notification...............................................................................................................................506
Configuring owner notifications............................................................................................................................ 506
Logging event notifications.................................................................................................................................... 507
Breakthrough logging ..............................................................................................................................................507
Front-end Capacity Estimation....................................................................................................................................507
Configuring MailHome............................................................................................................................................. 509
Configuring EMC Secure Remote Services (ESRS).......................................................................................... 511
Troubleshooting ESRS..............................................................................................................................................513
Contents 11
Modifying user groups for new NetWorker Authentication Service users................................................. 543
Adding the NMC service account to the Users user group................................................................................. 545
Enabling two factor authentication for AD and LDAP users................................................................................546
Moving the NMC Server............................................................................................................................................... 546
Migrating NMC users to the authentication service database............................................................................548
Updating the NetWorker User Group resources for migrated NMC users.................................................548
Resetting the administrator password...................................................................................................................... 549
Changing the service port used by the NMC database........................................................................................ 550
Changing the service port used by the NMC database on Linux................................................................. 550
Changing the service port used by the NMC database on Windows........................................................... 551
Changing database connection credentials..............................................................................................................552
Updating the NMC server IP address/hostname................................................................................................... 552
Setting system options to improve NMC server performance............................................................................552
Individual User Authentication............................................................................................................................... 554
Displaying international fonts in non-US locale environments.............................................................................554
NetWorker License Manager....................................................................................................................................... 554
Entering an enabler code........................................................................................................................................ 555
Deleting an enabler code.........................................................................................................................................555
Entering an authorization code............................................................................................................................. 555
Changing the License Manager server................................................................................................................ 555
NMC error messages and corrective actions.......................................................................................................... 555
Console troubleshooting notes and tips....................................................................................................................558
Troubleshooting an NMC server that is not responding................................................................................. 558
Unable to connect to host: Please check Security setting and daemon logs on the NetWorker
client and Console server for more information............................................................................................559
Username/password validation fails when you use the NMC New Device wizard to configure an
AFTD if storage node is UNIX............................................................................................................................560
Querying large numbers of save sets in the NetWorker user interface may cause a Java heap
space error............................................................................................................................................................. 560
NMC user interface exits unexpectedly...............................................................................................................561
Label and Mount devices page is not displayed in NMC device configuration wizard............................. 561
Error: Unable to connect to server is displayed while browsing the savesets in the client
properties using NMC GUI ................................................................................................................................. 561
12 Contents
Characteristics of the online indexes...................................................................................................................569
Automated index activities..................................................................................................................................... 570
Checking online indexes.......................................................................................................................................... 570
Viewing information about the indexes............................................................................................................... 570
Index save sets.......................................................................................................................................................... 570
Querying the media database................................................................................................................................. 571
Cross-checking client file indexes..........................................................................................................................571
Refreshing index information................................................................................................................................. 572
Client file index locations.........................................................................................................................................572
Managing the size of the online indexes............................................................................................................. 573
Internationalization......................................................................................................................................................... 576
Log file viewer............................................................................................................................................................576
Display issues............................................................................................................................................................. 576
Creating a Server Backup action.................................................................................................................................577
Creating an expire action.............................................................................................................................................. 579
Contents 13
Preparing for block based recoveries.................................................................................................................. 603
Performing block based recoveries...................................................................................................................... 603
Performing block based clone recoveries........................................................................................................... 605
Troubleshooting block based backup and recovery issues................................................................................... 607
14 Contents
Memory usage and nsrjobd.....................................................................................................................................652
Media position errors encountered when auto media verify is enabled...................................................... 652
The scanner program marks a volume read-only.............................................................................................. 653
The scanner program requests an entry for record size.................................................................................653
Limitations for groups containing a bootstrap...................................................................................................653
Index recovery to a different location fails......................................................................................................... 653
Illegal characters in configurations....................................................................................................................... 653
Inaccessible object exception error when launching NMC with Java 9...................................................... 654
Error backing up large number of clients............................................................................................................ 654
Hostname aliases...................................................................................................................................................... 654
Directory pathname restrictions............................................................................................................................655
Backup of a new client defaults to level full.......................................................................................................655
Non-full backup of Solaris files with modified extended attributes..............................................................655
Client file index errors..............................................................................................................................................655
Aborting a recovery..................................................................................................................................................656
xdr of win32 attributes failed for directory........................................................................................................ 656
Cannot create directory directory........................................................................................................................ 657
The All save set and duplicate drive serial numbers......................................................................................... 657
No disk label errors................................................................................................................................................... 657
Resolving copy violation errors..............................................................................................................................657
Converting sparse files to fully allocated files....................................................................................................657
Backing up large sparse files.................................................................................................................................. 658
Queries using the mminfo -N command are case-sensitive........................................................................... 658
Usage of multiple pool names in the mminfo command.................................................................................. 658
Renamed directories and incremental backups................................................................................................. 658
Resolving names for multiple network interface cards....................................................................................658
Libraries entering ready state................................................................................................................................ 659
Successful save sets listed as failed in the Group Backup Details window................................................659
The NetWorker Server window does not appear on HP-UX......................................................................... 659
Backup fails with Win32 error 0x2........................................................................................................................659
Error displaying workflow details.......................................................................................................................... 660
Back up of All Save Sets takes a long time to complete.............................................................................. 660
GSS-API authentication error ...............................................................................................................................660
NetWorker locale and code set support.................................................................................................................... 661
Enabling service mode for NetWorker....................................................................................................................... 661
Resetting the NMC password for NetWorker 19.1 and later................................................................................ 661
No privileges to view NetWorker server from NMC...............................................................................................661
Network and server communication errors.............................................................................................................. 662
Unapproved server error.........................................................................................................................................662
Unapproved server error during client setup..................................................................................................... 662
Server copy violation................................................................................................................................................662
Remote recover access rights............................................................................................................................... 663
NetWorker server takes a long time to restart..................................................................................................663
Changing the NetWorker server address............................................................................................................663
Binding to server errors...........................................................................................................................................663
Identifying connection lost to device................................................................................................................... 664
Device Connectivity Check Configurations .......................................................................................................665
New.Net and NetWorker software are incompatible....................................................................................... 666
Glossary.................................................................................................................................... 667
Contents 15
Figures
1 NetWorker components......................................................................................................................................... 27
2 Stopping the NetWorker Remote Exec Service...............................................................................................34
3 NMC GUI window.................................................................................................................................................... 36
4 Welcome to the NMC Server Configuration Wizard page.............................................................................43
5 Set authentication server service account for the NMC Server page....................................................... 43
6 Specify a list of managed NetWorker servers page........................................................................................ 44
7 Administration window........................................................................................................................................... 45
8 Monitoring window..................................................................................................................................................49
9 Recover window...................................................................................................................................................... 54
10 Labeling a volume by using a label template..................................................................................................... 64
11 Identifying WORM tapes in the NetWorker Console...................................................................................... 78
12 Example NetWorker disk backup configuration in a mixed backup environment.................................... 88
13 Paths for CIFS AFTD.............................................................................................................................................. 89
14 How library sharing works....................................................................................................................................142
15 Dynamic Drive Sharing.......................................................................................................................................... 144
16 Platinum policy configuration.............................................................................................................................. 159
17 Data protection policy example.......................................................................................................................... 160
18 Workflow path from a traditional backup action............................................................................................ 165
19 Visual representation of a workflow.................................................................................................................. 177
20 Workflow path from a server database backup action.................................................................................180
21 Workflow path from an NMC server backup action.......................................................................................181
22 Visual representation of the Server Protection workflows.......................................................................... 181
23 Replication using AMS.......................................................................................................................................... 182
24 Workflow path from a clone action................................................................................................................... 188
25 Visual representation of a clone workflow.......................................................................................................192
26 Example of a policy with separate workflows for backup and cloning......................................................193
27 Data Protection Policy......................................................................................................................................... 200
28 Creating a new policy........................................................................................................................................... 203
29 Policy properties.................................................................................................................................................... 204
30 Workflow path from a snapshot backup action............................................................................................. 206
31 Workflow path from a probe action..................................................................................................................206
32 Workflow path from a server backup action.................................................................................................. 206
33 Workflow path from a check connectivity action......................................................................................... 206
34 Workflow path from a clone action...................................................................................................................207
35 Workflow path from a discover action............................................................................................................. 207
36 Workflow path from a generate index action................................................................................................. 207
37 Workflow path from a VBA checkpoint discover action.............................................................................. 207
38 Traditional backup workflow...............................................................................................................................207
39 Incremental and cumulative incremental backup levels............................................................................... 233
40 Synthetic full backups.......................................................................................................................................... 234
16 Figures
41 Default weekly backup schedule........................................................................................................................242
42 Staggered weekly backup schedule for multiple groups of clients........................................................... 242
43 Selecting the schedule......................................................................................................................................... 243
44 Defining the schedule........................................................................................................................................... 244
45 The Force Backup Level attribute.....................................................................................................................245
46 Example....................................................................................................................................................................252
47 Example....................................................................................................................................................................252
48 Example....................................................................................................................................................................252
49 VSS backup process............................................................................................................................................. 278
50 Paths for CIFS AFTD.............................................................................................................................................318
51 Cloning example.....................................................................................................................................................335
52 Overview of archive operation...........................................................................................................................350
53 Volume Save Sets window..................................................................................................................................360
54 Change Expiration window..................................................................................................................................366
55 Recovery roadmap................................................................................................................................................ 369
56 A directed recovery from a remote client....................................................................................................... 373
57 NSR Data Domain Properties............................................................................................................................. 397
58 Virtual machine recovery in the NMC Recovery wizard..............................................................................400
59 Select the Virtual Machine to Recover.............................................................................................................401
60 Select the Target Backup (individual virtual machine)................................................................................. 401
61 Select the Target Backup (multiple virtual machines)................................................................................. 402
62 Select the Virtual Machine Recovery method................................................................................................402
63 Choose Disks to Revert....................................................................................................................................... 403
64 Select Alternate Recovery Sources.................................................................................................................. 404
65 Configure the Instant Recovery........................................................................................................................ 405
66 Configure the virtual machine recovery.......................................................................................................... 406
67 Configure the Virtual Disk Recovery.................................................................................................................407
68 Configure the Emergency Recovery.................................................................................................................408
69 Select Alternate Recovery Sources for file level recovery......................................................................... 409
70 Mount the save set for file level recovery....................................................................................................... 410
71 Select the files and folders to recover.............................................................................................................. 411
72 Connect to Server................................................................................................................................................. 416
73 NetWorker Recover window............................................................................................................................... 416
74 List of clients available for a NetWorker server............................................................................................. 417
75 Search browse view.............................................................................................................................................. 418
76 Versions side bar.................................................................................................................................................... 418
77 Group Summary in table view.............................................................................................................................444
78 Group Summary in Bar Chart view....................................................................................................................445
79 Sample log output................................................................................................................................................. 496
80 SNMP trap output.................................................................................................................................................497
81 Usage Analytics Properties- MailHome............................................................................................................ 510
82 Usage Analytics Properties- ESRS configuration...........................................................................................512
83 Monitoring window................................................................................................................................................ 519
Figures 17
84 Recover window.................................................................................................................................................... 527
85 NetWorker servers worldwide............................................................................................................................532
86 Using filters to search and view policies......................................................................................................... 538
87 Copying the group DN..........................................................................................................................................544
88 Copying the group DN......................................................................................................................................... 545
89 Add Distinguished Names window.................................................................................................................... 546
90 Hosts window.........................................................................................................................................................582
91 NetWorker User program....................................................................................................................................583
92 Example of the browse window.........................................................................................................................585
93 Restricted Data Zones in NMC..........................................................................................................................589
94 Restricted Datazone User Configuration........................................................................................................ 590
95 Create Restricted Data Zone in the NetWorker Administration Server window....................................591
96 Restricted Data Zone Client Properties...........................................................................................................592
97 Restricted Data Zones in Device Properties window................................................................................... 592
98 Restricted Data Zones in Create Policy window........................................................................................... 593
99 New workflow associated with RDZ group.....................................................................................................593
100 Multihomed environment..................................................................................................................................... 621
101 Configuring the Aliases attribute for NetWorker Server Client resource................................................622
102 Configuring the Aliases attribute for NetWorker Storage Node Client resource.................................. 622
103 Storage Nodes attribute for clients in VLAN1................................................................................................ 623
104 Aliases and Server network interface attributes for VLAN1 clients..........................................................623
105 Storage Nodes attribute for clients in VLAN2............................................................................................... 624
106 Aliases and Server network interface attributes for VLAN2 clients......................................................... 624
107 Azure stack backup and disaster recovery..................................................................................................... 627
108 WinPE registry key to troubleshoot recoveries..............................................................................................647
109 Settings on Server CLI.........................................................................................................................................665
110 Settings on Storage Node CLI........................................................................................................................... 665
111 NMC Server settings............................................................................................................................................665
112 NMC Storage Node Settings............................................................................................................................. 666
18 Figures
Tables
1 Revision history........................................................................................................................................................ 23
2 Style conventions.................................................................................................................................................... 25
3 NetWorker Server processes................................................................................................................................30
4 NetWorker Storage Node processes................................................................................................................... 31
5 NMC Server processes.......................................................................................................................................... 32
6 NetWorker startup commands............................................................................................................................. 35
7 Windows opened from the NMC GUI................................................................................................................. 36
8 Supported operations in the NetWorker Management Web UI................................................................... 38
9 Windows that are launched from the Administration window......................................................................46
10 Monitoring window panel.......................................................................................................................................49
11 Alerts window icons................................................................................................................................................. 51
12 Devices status icons............................................................................................................................................... 52
13 Operations window icons.......................................................................................................................................52
14 Icons in the Log pane..............................................................................................................................................53
15 Recovery toolbar options.......................................................................................................................................55
16 Save recover configuration job status............................................................................................................... 56
17 Find options...............................................................................................................................................................56
18 Key label template attributes................................................................................................................................65
19 Examples of number sequences for volume labels.......................................................................................... 66
20 Using label template components........................................................................................................................ 67
21 Preconfigured media pools.................................................................................................................................... 70
22 Determining which pool receives backup data................................................................................................. 72
23 NetWorker hierarchy for resolving media pool conflicts................................................................................ 73
24 WORM supported devices.....................................................................................................................................76
25 WORM/DLTWORM attributes............................................................................................................................. 78
26 Differences between disk devices.......................................................................................................................90
27 Default values and ranges for target and max sessions attributes.............................................................. 91
28 Determining the major number value................................................................................................................ 105
29 ioscan output when driver is configured.......................................................................................................... 105
30 ioscan output when driver is not configured...................................................................................................106
31 Tape alert severity................................................................................................................................................. 126
32 Common jbedit options......................................................................................................................................... 128
33 Device settings and environment variables..................................................................................................... 133
34 StorageTek environment variables.....................................................................................................................137
35 Library resource sleep attributes........................................................................................................................142
36 Shared Devices attributes....................................................................................................................................146
37 Schedule icons........................................................................................................................................................ 166
38 Schedule icons........................................................................................................................................................ 168
39 Schedule icons........................................................................................................................................................ 170
40 Schedule icons........................................................................................................................................................ 174
Tables 19
41 nsrcloneconfig file details.....................................................................................................................................183
42 Save set criteria..................................................................................................................................................... 185
43 Schedule icons........................................................................................................................................................ 189
44 Schedule icons........................................................................................................................................................ 195
45 Policy status icons................................................................................................................................................. 198
46 Methods to create an action............................................................................................................................... 213
47 Methods to open the Policy Action wizard......................................................................................................215
48 Command descriptions......................................................................................................................................... 216
49 Commands to manage NSR Protection Policy resources............................................................................ 216
50 Commands to manage NSR Protection Policy Workflow resources......................................................... 217
51 Commands to manage NSR Protection Policy Action resources............................................................... 218
52 Filter values for clone and index actions.......................................................................................................... 219
53 Resource overview................................................................................................................................................229
54 Data in the ALL save set..................................................................................................................................... 230
55 File systems excluded from the ALL save set................................................................................................. 231
56 Special ALL save sets............................................................................................................................................231
57 Backup levels.......................................................................................................................................................... 232
58 Advantages and disadvantages of backup levels.......................................................................................... 232
59 mminfo commands for synthetic full backup validation...............................................................................238
60 Comparison of traditional synthetic full and virtual synthetic full backups.............................................239
61 Requirements for virtual synthetic full backups............................................................................................ 239
62 mminfo commands for VSF backup validation................................................................................................ 241
63 Scheduled backup level icons.............................................................................................................................243
64 Preconfigured NetWorker schedules................................................................................................................246
65 Types of schedule................................................................................................................................................. 248
66 Types of actions.................................................................................................................................................... 248
67 Backward Compatibility....................................................................................................................................... 255
68 Log files for PSS troubleshooting..................................................................................................................... 259
69 Supported wildcards in directives..................................................................................................................... 263
70 Preconfigured directives..................................................................................................................................... 265
71 Backup considerations for Windows features................................................................................................ 270
72 VSS Save operation attribute values.................................................................................................................281
73 DISASTER_RECOVERY:\ components in an incremental backup............................................................ 283
74 Save set configuration for a specific host...................................................................................................... 289
75 Special ALL save sets...........................................................................................................................................298
76 File systems excluded from the ALL save set................................................................................................ 303
77 Special ALL save sets...........................................................................................................................................303
78 NetWorker software requirements for checkpoint restart......................................................................... 309
79 Example backup script on Windows.................................................................................................................. 319
80 NetWorker Server Versions.................................................................................................................................321
81 Job control attribute selections......................................................................................................................... 322
82 Operations allowed in each client state........................................................................................................... 327
83 RPS Clone State....................................................................................................................................................340
20 Tables
84 List of nsrclone options and their descriptions.............................................................................................. 343
85 Staging criteria options........................................................................................................................................345
86 Disk volumes window........................................................................................................................................... 355
87 Volume details........................................................................................................................................................ 356
88 Save Set details..................................................................................................................................................... 358
89 Query criteria..........................................................................................................................................................360
90 Save set search results view...............................................................................................................................361
91 Query criteria..........................................................................................................................................................362
92 VBA save set search results window................................................................................................................363
93 General recover requirements............................................................................................................................ 373
94 Volume selection by recovery method..............................................................................................................381
95 Query criteria..........................................................................................................................................................383
96 Save set status...................................................................................................................................................... 384
97 Optional browsable recovery options............................................................................................................... 387
98 Save set information............................................................................................................................................ 390
99 Optional save set recovery options.................................................................................................................. 392
100 Save set information.............................................................................................................................................393
101 Additional recovery options................................................................................................................................ 438
102 Data retention policies.......................................................................................................................................... 441
103 Report categories..................................................................................................................................................442
104 Legacy report categories.....................................................................................................................................443
105 Report icons............................................................................................................................................................443
106 Report chart formats............................................................................................................................................446
107 NetWorker recovery statistics parameters.....................................................................................................458
108 Event parameters..................................................................................................................................................460
109 Host reports............................................................................................................................................................ 461
110 NetWorker backup statistics parameters........................................................................................................462
111 NetWorker backup status parameters............................................................................................................. 464
112 Clone report parameters..................................................................................................................................... 466
113 Date and time input formats for common locales......................................................................................... 469
114 Workflow-specific job record attributes.......................................................................................................... 476
115 Action job record attributes................................................................................................................................ 479
116 Job details for a Workflow.................................................................................................................................. 485
117 Job details for a Workflow continued.............................................................................................................. 485
118 SNMP attributes and descriptions.................................................................................................................... 489
119 Command-line options for nsrtrap.................................................................................................................... 493
120 Preconfigured notifications.................................................................................................................................499
121 Actions..................................................................................................................................................................... 503
122 Priorities.................................................................................................................................................................. 505
123 Event Viewer messages.......................................................................................................................................507
124 MailHome fields and descriptions...................................................................................................................... 510
125 ESRS fields and descriptions...............................................................................................................................512
126 NMC event information........................................................................................................................................516
Tables 21
127 Event priorities........................................................................................................................................................517
128 Monitoring window panel..................................................................................................................................... 519
129 Policy status icons................................................................................................................................................. 521
130 Devices status icons.............................................................................................................................................525
131 Operations window icons.................................................................................................................................... 525
132 Icons in the Log pane........................................................................................................................................... 526
133 Recovery toolbar options.................................................................................................................................... 528
134 Save recover configuration job status............................................................................................................. 529
135 Find options............................................................................................................................................................ 529
136 Viewing the enterprise......................................................................................................................................... 532
137 NMC windows with filtering capability............................................................................................................ 538
138 NMC server system options............................................................................................................................... 553
139 Error messages or symptoms.............................................................................................................................555
140 Indexes window information............................................................................................................................... 570
141 Index save sets dialog box information............................................................................................................ 570
142 Schedule icons for the expire action................................................................................................................ 579
143 When to modify the servers file......................................................................................................................... 581
144 Summary pane....................................................................................................................................................... 582
145 NetWorker User Groups requirements............................................................................................................ 583
146 NetWorker User toolbar functions....................................................................................................................584
147 Supported backup and recovery scenarios.....................................................................................................596
148 Key options for the block based recover.exe command..............................................................................605
149 Troubleshooting block based backup and recovery issues..........................................................................607
150 Network Protocol Support...................................................................................................................................612
151 Configuring multihomed hosts in NetWorker (continued).......................................................................... 620
152 TCP/IP parameters...............................................................................................................................................625
153 Attributes................................................................................................................................................................ 626
154 Cloud service provider support matrix............................................................................................................. 628
155 NetWorker Server log files.................................................................................................................................. 631
156 NMC server log files............................................................................................................................................. 633
157 Client log files......................................................................................................................................................... 634
158 Message types....................................................................................................................................................... 637
159 Raw log file attributes that manage log file size............................................................................................639
160 Raw log file attributes that manage the log file trimming mechanism..................................................... 639
161 NetWorker Authentication Service log files....................................................................................................648
162 NetWorker Startup commands.......................................................................................................................... 664
163 Enabling and Disabling DCC based on Server and Storage node settings.............................................. 666
22 Tables
Preface
As part of an effort to improve product lines, periodic revisions of software and hardware are released. Therefore, all versions of
the software or hardware currently in use might not support some functions that are described in this document. The product
release notes provide the most up-to-date information on product features.
If a product does not function correctly or does not function as described in this document, contact a technical support
professional.
NOTE: This document was accurate at publication time. To ensure that you are using the latest version of this document,
go to the Support website https://www.dell.com/support.
Purpose
This document describes how to configure and use NetWorker.
Audience
This guide is part of the NetWorker documentation set, and is intended for use by system administrators who are responsible for
setting up and maintaining backups on a network. Operators who monitor daily backups will also find this guide useful.
Revision history
The following table presents the revision history of this document.
Related documentation
The NetWorker documentation set includes the following publications, available on the Support website:
● NetWorker E-LAB Navigator
Provides compatibility information, including specific software and hardware configurations that NetWorker supports. To
access E-LAB Navigator, go to https://elabnavigator.emc.com/eln/elnhome.
● NetWorker Administration Guide
Describes how to configure and maintain the NetWorker software.
● NetWorker Network Data Management Protocol (NDMP) User Guide
Describes how to use the NetWorker software to provide data protection for NDMP filers.
● NetWorker Cluster Integration Guide
Contains information related to configuring NetWorker software on cluster servers and clients.
● NetWorker Installation Guide
Provides information on how to install, uninstall, and update the NetWorker software for clients, storage nodes, and servers
on all supported operating systems.
● NetWorker Updating from a Previous Release Guide
Preface 23
Describes how to update the NetWorker software from a previously installed release.
● NetWorker Release Notes
Contains information on new features and changes, fixed problems, known limitations, environment and system requirements
for the latest NetWorker software release.
● NetWorker Command Reference Guide
Provides reference information for NetWorker commands and options.
● NetWorker Data Domain Boost Integration Guide
Provides planning and configuration information on the use of Data Domain devices for data deduplication backup and
storage in a NetWorker environment.
● NetWorker Performance Optimization Planning Guide
Contains basic performance tuning information for NetWorker.
● NetWorker Server Disaster Recovery and Availability Best Practices Guide
Describes how to design, plan for, and perform a step-by-step NetWorker disaster recovery.
● NetWorker Snapshot Management Integration Guide
Describes the ability to catalog and manage snapshot copies of production data that are created by using mirror technologies
on storage arrays.
● NetWorkerSnapshot Management for NAS Devices Integration Guide
Describes how to catalog and manage snapshot copies of production data that are created by using replication technologies
on NAS devices.
● NetWorker Security Configuration Guide
Provides an overview of security configuration settings available in NetWorker, secure deployment, and physical security
controls needed to ensure the secure operation of the product.
● NetWorker VMware Integration Guide
Provides planning and configuration information on the use of VMware in a NetWorker environment.
● NetWorker Error Message Guide
Provides information on common NetWorker error messages.
● NetWorker Licensing Guide
Provides information about licensing NetWorker products and features.
● NetWorker REST API Getting Started Guide
Describes how to configure and use the NetWorker REST API to create programmatic interfaces to the NetWorker server.
● NetWorker REST API Reference Guide
Provides the NetWorker REST API specification used to create programmatic interfaces to the NetWorker server.
● NetWorker 19.5 with CloudBoost 19.5 Integration Guide
Describes the integration of NetWorker with CloudBoost.
● NetWorker 19.5 with CloudBoost 19.5 Security Configuration Guide
Provides an overview of security configuration settings available in NetWorker and Cloud Boost, secure deployment, and
physical security controls needed to ensure the secure operation of the product.
● NetWorker Management Console Online Help
Describes the day-to-day administration tasks performed in the NetWorker Management Console and the NetWorker
Administration window. To view the online help, click Help in the main menu.
● NetWorker User Online Help
Describes how to use the NetWorker User program, which is the Windows client interface, to connect to a NetWorker
server to back up, recover, archive, and retrieve files over a network.
24 Preface
NOTE: Data Domain is now PowerProtect DD. References to Data Domain or DD systems in this documentation, in the UI,
and elsewhere in the product include PowerProtect DD systems and older Data Domain systems. In many cases the UI has
not yet been updated to reflect this change.
Typographical conventions
The following type style conventions are used in this document:
You can use the following resources to find more information about this product, obtain support, and provide feedback.
Knowledgebase
The Knowledgebase contains applicable solutions that you can search for either by solution number (for example, KB000xxxxxx)
or by keyword.
To search the Knowledgebase:
1. Go to https://www.dell.com/support.
Preface 25
2. On the Support tab, click Knowledge Base.
3. In the search box, type either the solution number or keywords. Optionally, you can limit the search to specific products by
typing a product name in the search box, and then selecting the product from the list that appears.
Live chat
To participate in a live interactive chat with a support agent:
1. Go to https://www.dell.com/support.
2. On the Support tab, click Contact Support.
3. On the Contact Information page, click the relevant support, and then proceed.
Service requests
To obtain in-depth help from Licensing, submit a service request. To submit a service request:
1. Go to https://www.dell.com/support.
2. On the Support tab, click Service Requests.
NOTE: To create a service request, you must have a valid support agreement. For details about either an account or
obtaining a valid support agreement, contact a sales representative. To find the details of a service request, in the
Service Request Number field, type the service request number, and then click the right arrow.
Online communities
For peer contacts, conversations, and content on product support and solutions, go to the Community Network https://
www.dell.com/community. Interactively engage with customers, partners, and certified professionals online.
26 Preface
1
Overview
This chapter contains the following topics:
Topics:
• The NetWorker environment
• NetWorker services
• NetWorker user interfaces
NetWorker Components
Several components make up the NetWorker environment and provide the ability to protect against data loss.
The following figure illustrates the main components in a NetWorker environment.
Overview 27
NMC Server
The NetWorker Management Console (NMC) server or Console server is a Java-based application and database server. The
NMC Server manages all NetWorker Servers and Clients. The NMC Server provides reporting and monitoring capabilities for all
NetWorker Servers and Clients in the environment. The NMC Server relies on the NetWorker Authentication Service for user
account authentication.
Datazone
A NetWorker datazone is composed of a single NetWorker Server, its clients, and storage nodes. You can add additional
datazones as backup requirements increase.
NetWorker Server
The NetWorker Server is a collection of processes and programs that are installed on a host that performs NetWorker services.
The NetWorker Server also acts as a storage node and can control multiple remote storage nodes.
NetWorker client
A NetWorker client is a physical or virtual computer on which you install the NetWorker client software on. The NetWorker
client computer can be any computer in a datazone that contains data you want to back up. The NMC server, NetWorker
server, and NetWorker storage node hosts are also NetWorker clients.
28 Overview
bandwidth to manage data transfer from local clients or network clients to target devices. The operating system of a remote
storage node can differ from the NetWorker Server.
Restricted datazones
Restricted datazones provide NetWorker administrators with the ability to organize a NetWorker environment into a multi-
tenancy configuration.
In a multi-tenancy configuration, each restricted datazone contains one NetWorker server and other associated NetWorker
resources. Global administrators oversee the setup and management of several restricted data zones and assign tenant
administrators with access to a restricted datazone. A tenant administrator can only manage NetWorker resources within an
assigned restricted datazone.
Virtual environments
The NetWorker Vmware Integration Guide provides more information on the virtual environment solutions from Networker.
NetWorker services
The main services and programs for the NetWorker Server are the NetWorker Storage Node, NetWorker Client, and the
NetWorker Management Console (NMC) server.
This section includes information on the NetWorker services, and how to start and stop the services.
For more information about:
● Main NetWorker services—The NetWorker Command Reference Guide or the UNIX man pages provides more information.
● Service port requirements when configuring a firewall—The NetWorker Security Configuration Guide provides more
information.
Overview 29
Processes on NetWorker hosts
Each NetWorker host requires processes to provide configuration and management support of the NetWorker software.
NetWorker Client
The nsrexecd process runs on a NetWorker Client. This process authenticates and manages NetWorker Server remote
execution requests and starts the save and savefs processes on the client to support backup requests.
NetWorker Server
The following table summarizes the processes that support the NetWorker Server software.
30 Overview
Table 3. NetWorker Server processes (continued)
Process Function
nsrmmgd ● Manages tape library operations.
● Provides an RPC-based service that manages all jukebox
operations on behalf of the nsrd service.
● The nsrd service starts only one instance of nsrmmgd on
the NetWorker Server as needed.
nsrlogd Supports the NetWorker audit log service, which is configured
to run on the NetWorker Server by default.
nsrcpd ● Starts automatically when a user accesses the Hosts Task
window in the NetWorker Administration interface.
● Allows users to distribute and upgrade NetWorker and
module software from a centralized software repository
across a network.
nsrdispd Handles RPC-based calls for the nsrd process, from remote
third party processes.
nsrdisp_nwbg Started by nsrdispd to handle NMC Server requests for
information from the RAP and media databases on the
NetWorker Server.
nsrlmc ● Supports licensing requests.
● For the traditional licensing model, nsrlmc requests a
license from the lgtolmd process.
● For the CLP/ELMS licensing model, nsrlmc requests
capacity and update licenses from the ELMS server.
nsrvmwsd Provides a web service to manage VMware VM backups that
are part of the NetWorker VMware protection feature.
tomcat7 (Windows), tomcat (UNIX) Tomcat web server instance for the NetWorker
Authentication Service.
nsrexecd Authenticates and processes the NetWorker Server remote
execution requests and runs the save and savefs programs
on the client.
Overview 31
Table 4. NetWorker Storage Node processes (continued)
Process Function
● Only one nsrsnmd runs on each storage node that has
configured and enabled devices.
nsrlcpd ● Provides a uniform library interface to the NetWorker
media management daemon, nsrmmgd.
● Manages the library subsystem media, slot, drive, and
port resources providing control to move and access the
resources within the library subsystems.
● One nsrlcpd starts for each configured tape library.
nsrexecd Authenticates and processes the NetWorker Server remote
execution requests and runs the save and savefs programs
on the client.
NMC Server
The following table summarizes the processes that support the NMC Server software.
32 Overview
Starting the NMC Server on Windows
Perform the following steps as a Windows administrator to start the NMC Server service, which also starts the postgres and
httpd processes.
1. Right-click My Computer, and then select Manage.
2. Expand Services and Applications, and then select Services.
3. Verify that the NetWorker Client service is running.
The NetWorker Remote Exec Service should have a status of Started. If the service has not started:
2. To start the NMC Server daemon, postgres, and httpd processes., type /etc/init.d/gst start
3. To confirm that the gstd, postgres, and httpd processes have started, type ps -ef | grep lgtonmc
When the processes have started, output similar to the following appears:
nsrnmc 7190 1 0 Nov23 ? 00:00:06 /opt/lgtonmc/bin/gstd
nsrnmc 7196 1 0 Nov23 ? 00:00:00 /opt/lgtonmc/apache/bin/httpd -f /opt/lgtonmc/apache/
conf/httpd.conf
nsrnmc 7197 7196 0 Nov23 ? 00:00:00 /opt/lgtonmc/apache/bin/httpd -f /opt/lgtonmc/apache/
conf/httpd.conf
nsrnmc 7212 1 0 Nov23 ? 00:00:00 /opt/lgtonmc/postgres/bin/postgres -D /nsr/nmc/nmcdb/
pgdata
root 18176 18141 0 02:47 pts/0 00:00:00 grep lgtonmc
Overview 33
Stopping a NetWorker host on Windows
Perform the following steps as a Windows administrator to stop the services on a NetWorker Server, Storage Node, and Client.
1. Right-click My Computer, and then select Manage.
2. Expand Services and Applications, and then select Services.
3. Right-click NetWorker Remote Exec Service, and then select Stop.
NOTE: On a NetWorker Server, the NetWorker Remote Exec Service stops the NetWorker Backup and Recovery
and the NetWorker Message Queue Adaptor services. On an NMC Server, the NetWorker Remote Exec Service
also stops the EMC GST Service.
The following figure shows how to stop the NetWorker Remote Exec Service service.
34 Overview
Starting a NetWorker host on UNIX
Perform the following steps as the root user to start the NetWorker processes on a NetWorker server, storage node, or client.
1. Type the appropriate startup command for the operating system, as summarized in the following table.
AIX /etc/rc.nsr
2. Type /etc/init.d/networker status to confirm that the NetWorker processes that are appropriate to the
NetWorker installation type have started.
Processes on NetWorker hosts on page 30 provides more information.
Overview 35
NMC GUI
Use the NMC GUI to manage an NMC server and NetWorker servers.
The following figure illustrates the NMC GUI.
36 Overview
NetWorker Administration window
The NetWorker Administration window provides you with the ability to manage and configure NetWorker server resources
in a GUI. The NMC UI provides you with the ability to open up a NetWorker Administration window for each managed
NetWorker server.
For more information about nsradmin, the NetWorker Command Reference Guide or the UNIX man pages provides more
information.
Overview 37
● Creating and updating user groups
● Creating and updating label templates, media pools, storage nodes, devices, and volumes
● Creating and updating external authorities, groups, tenants, and users
● Monitoring recover jobs, active sessions, devices, and server messages
● Viewing alerts
● Using the dashboard to view a summary of active sessions and alerts
The following table provides more information on the functionality available in the NetWorker Management Web UI.
38 Overview
Table 8. Supported operations in the NetWorker Management Web UI (continued)
Operation Description
● Add, edit, and delete lockboxes
● Refresh and view lockboxes
Notifications
● Add, edit, and delete notifications
● Refresh and view notifications
Security Audit Log
● Edit security audit logs
● Refresh and view security audit logs
Device and Media management Media pools
● Add, edit, and delete media pools
● Refresh and view media pools
Label templates
● Add, edit, and delete label templates
● Refresh and view label templates
Storage nodes
● Add, edit, and delete storage nodes
● Refresh and view storage nodes
Devices
● Add, edit, delete, label, mount, and unmount devices
● Refresh and view devices
NOTE: Mount, unmount, label, and delete are not
supported for tape devices.
Data Domain systems
● Add, edit, and delete Data Domain systems
● Refresh and view Data Domain systems
Volumes—Manage tape and disk volumes
Overview 39
Table 8. Supported operations in the NetWorker Management Web UI (continued)
Operation Description
Monitoring ● View and monitor the status of recover jobs, active
sessions, devices, and server messages.
● View recover logs.
Alerts Summary of alerts generated by a NetWorker server.
You can log in to the NetWorker Management Web UI by using the NetWorker credentials for authentication.
The NetWorker Management Web User Interface Online Help provides more information on how to use the NetWorker
Management Web UI to perform the supported tasks.
The NetWorker Administration Guide provides conceptual information that you might require to use the NetWorker
Management Web UI.
The NetWorker Installation Guide provides more information on how to install the NetWorker Management Web UI.
NOTE: NetWorker Management Web UI is not backward-compatible with the earlier versions of NetWorker.
Supported browsers
The NetWorker Management Web UI supports the latest versions of the following browsers:
● Google Chrome
● Mozilla Firefox
● Safari
● Microsoft Edge
● Microsoft Internet Explorer 11
40 Overview
2
Getting Started
This chapter contains the following topics:
Topics:
• NetWorker Management Console interface
• Connecting to the Administration window
• Getting started with a new installation
• Enabling and Disabling NetWorker services
Getting Started 41
1. Type ps -ef | /usr/sbin/nsrexecd. Output similar to the following example should appear:
2. Type ps -ef | grep lgtonmc Output similar to the following should appear:
4. For Internet Explorer only, if a security warning appears, select I accept the risks and want to run this application, and
then click Run.
5. On the Log in page, specify the NetWorker Authentication Service administrator username and password, and then click
OK.
6. On the NetWorker Server Login Disclaimer, select Accept.
NOTE: If the banner.txt is empty, banner is not displayed. The NetWorker Security Configuration Guide provides more
information. In NMC, if you reject the login banner disclaimer, NMC is closed.
7. On the Welcome to the NMC Server Configuration Wizard page, click Next.
The following figures shows the Welcome to the NMC Server Configuration Wizard page.
42 Getting Started
Figure 4. Welcome to the NMC Server Configuration Wizard page
8. On the Set authentication server service account for the NMC server page, review the setting and click Next.
The following figure shows the Set authentication server service account for the NMC server page.
Figure 5. Set authentication server service account for the NMC Server page
b. Leave the default Capture Events and Gather Reporting Data options enabled.
Consider the following options:
● To allow the NMC Server to monitor and record alerts for events that occur on the NetWorker Server, select Capture
Events.
Getting Started 43
● To allow the NMC Server to collect data about the NetWorker Server and generate reports, select Gather Reporting
Data.
The following figure shows the Specify a list of managed NetWorker servers page.
10. Click Finish. The installation starts the default web browser and connects to the NMC server. The NetWorker
Management Console and Getting Started windows appear.
11. In the Enterprise window, right-click the NetWorker Server, and then select Launch Application.
NOTE: If you do not specify any NetWorker Servers in the Specify a list of managed NetWorker servers page, the
NMC Enterprise window does not display any NetWorker Servers. To add a host, in the left navigation pane, right-click
Enterprise, and then click New > Host. The Add New Host wizard appears.
● Double-click the desktop button , if one was configured by using the Java Web Start Application Manager.
NOTE: If you changed the default NMC server ports, specify the correct port numbers.
44 Getting Started
javaws https://localhost:9000/gconsole.jnlp
Administration window
NetWorker Servers are managed through the Administration window.
The following figure illustrates the NetWorker Administration window.
You can toggle between the Administration window and the NMC UI.
The following table lists the windows that can be launched from the Administration window taskbar.
Getting Started 45
Table 9. Windows that are launched from the Administration window
Button Window Description
Monitoring Monitor various activities that are related to the NetWorker Server. For example, you can
monitor the progress of a policy and view any alerts. A portion of the Monitoring window
always appears at the bottom of the Administration window, providing information on Log
messages and Alerts.
Protection Manage NetWorker Server resources such as clients, groups, policies, probes, and schedules.
Provide the ability to monitor, start, stop, and restart data protection policies.
Recover Manage recover configurations and schedule recover jobs for NetWorker hosts from a
centralized location on the NMC Server.
Devices Add, configure, and operate single or multiple devices, libraries, and silos for the NetWorker
Server.
Media Manage the activities and the resources that are related to backup volumes. For example, you
can mount a backup volume or create a label template for backup volumes.
Hosts View information about known NetWorker hosts such as the NetWorker version, CPU type,
and operating system. Manage the NetWorker Client resource database. Perform software
upgrades on NetWorker hosts by using Package Manager.
Server Manage NetWorker Server resources such as licenses, notifications, user groups, directives,
and restricted datazones.
3. Right-click in that column and select from the list of available options. The options include Edit, Add to, and Remove from,
depending on the column selected.
Only the columns that appear in the window can be selected for multiple resource editing. To add a column that is not
currently in view:
a. Right-click a table header and select Add Column from the drop-down.
b. Select from the list of available attributes.
Drag-and-drop functionality
Drag-and-drop functionality is available in the Console and Administration interfaces for many tasks.
46 Getting Started
● Copy a selected number of objects in a folder to a new folder in the hierarchy tree or folder contents table. Select an
individual folder in the navigation tree to display the contents of the folder, select the contents, while pressing Ctrl, drag
the contents to a new folder. Select a collection of folders or hosts and drag them to a new folder by creating a copy of the
selected contents in a new location.
● Move a selected number of objects in a folder to a new folder in the hierarchy tree or folder contents table. Select an
individual folder in the navigation tree to display the contents of the folder, select the contents, and drag the contents to a
new folder. Select a collection of folders and or hosts and drag them to a new folder by moving the selected contents to a
new location.
NOTE: Only one object may be selected for drag-and-drop in the navigation tree.
Getting Started 47
● Withdraw
● Label
● Inventory
● Remove (STL only)
48 Getting Started
Figure 8. Monitoring window
Getting Started 49
Table 10. Monitoring window panel (continued)
Window Information provided
Sessions Allows you to customize whether to display all session types, or only certain session types. The
information that is provided depends on which session type you select. For example, if you
select Save Sessions, the window lists clients, save sets, groups, backup level, backup start
time, duration of the backup, devices, rate, and size. Sessions window on page 50 provides
more information.
NOTE: The size displayed in the NMC GUI is as per the digital calculator, that is, 1 MB is
equal to 1000 KB (decimal).
Alerts Lists the priority, category, time, and message of any alerts. Alerts pane provides more
information.
NOTE: Alerts displayed in the NMC Monitoring page is from the server and cannot be
cleared from the GUI.
Devices Lists devices, device status, storage nodes, libraries, volumes, pools, and related messages.
Devices pane on page 51 provides more information.
Operations Lists the status of all library and silo operations, including nsrjb operations that are run from
the command prompt. Also lists user input, libraries, origin, operation data, operation start
time, duration of the operation, progress messages, and error messages.
When displaying Show Details from the Operations window, the length of time that the
window is
displayed depends on the value that is typed in the Operation Lifespan attribute on the
Timers tab of
the Properties dialog box for the corresponding library. To access library properties, click
Devices in the taskbar. By default, this pane is hidden.
Log Lists messages that are generated by the NetWorker server, including the priority of each
message, the time the message was generated, the source of the message, and the category.
Log window on page 53 provides more information.
Sessions window
Use the Sessions window to view the sessions that are running on a NetWorker server. You can change the view of this
window to display these sessions:
The Sessions pane below the Policies/Actions pane provides details on individual save, recover, clone, and synthetic full
sessions by client.
To view all sessions or to limit the list of sessions by the session type, click the tabs at the bottom of the Sessions pane.
Session types include:
● Save
● Recover
● Clone
● Browse
● Synthetic Full/Rehydrated Sessions
● All
To change the displayed session types go to View > Show, and select the type of sessions to display. To display all sessions
currently running on the NetWorker Server, regardless of type, select All Sessions.
You can stop a session (backup, synthetic full backup, clone, and recovery sessions) from the Monitoring window, even if the
session was started by running the nsrworkflow command.
To stop a session, right-click the workflow in the pane, and select Stop from the list box.
50 Getting Started
Alerts pane
The Alerts pane displays alerts that are generated by a particular NetWorker server or Data Domain system that has devices
that are configured on the NetWorker server. The Alerts pane includes priority, category, time, and message information.
An icon represents the priority of the alert. The following table lists and describes each icon.
Emergency Condition exists that could cause NetWorker software to fail unless
corrected immediately. This icon represents the highest priority.
Information Information about the current state of the server. This icon represents the
lowest priority.
Notification Important information.
Waiting The NetWorker server is waiting for an operator to perform a task, such as
mounting a tape.
When items on the Alerts pane are sorted by the Priority column, they are sorted in alphabetical order based on the label of
the icon.
Devices pane
The Devices pane allows you to monitor the status of all devices, including NDMP devices. If the NetWorker server uses shared
and logical devices, the window is adjusted dynamically to present a set of columns appropriate for the current configuration.
The Devices pane provides the following information:
● Status of the operation.
● Name of the device.
● Name of the storage node that contains the device.
● For tape devices, the name of the library that contains the device.
● Name of the volume in the device.
● Name of the pool that is associated with the volume.
● Last message generated for the device.
● Whether the operation requires user input.
For example, a labeling operation may want the user to acknowledge whether the system should overwrite the label on a
tape.
Entering user input on page 53 provides instructions on how to deal with a user input notification.
If the current server configuration includes a shared device, a Shared Device Name column appears on the Devices pane. The
name of the shared device appears in the Shared Device Name column. If other devices for that configuration are not shared
devices, then the Shared Device Name column is blank for those devices. Only a single device per hardware ID can be active at
any particular moment. The information for inactive shared devices is filtered out, and as a result, only one device per hardware
ID is presented on the window at any time.
An icon represents the device status. The following table lists and describes each icon.
Getting Started 51
Table 12. Devices status icons
Icon Label Description
Library device active The library device is active.
When you sort items in the Devices pane by the Status column, NetWorker sorts the devices in alphabetical order based on
the label name of the icon.
Operations window
The Operations window displays information about device operations. It provides the following information:
● Status of the operation.
● Name of the library.
● Whether the operation requires user input.
For example, a labeling operation may want the user to acknowledge whether the system should overwrite the label on a
tape. Entering user input on page 53 provides instructions on how to deal with a user input notification.
● The origin, or source, of the operation.
For example, the interface, nsrjb or the NetWorker server.
● Time the operation started.
● Type of operation.
● Duration of the operation.
● Status messages from the operation.
● Any error messages.
NOTE: Only the last error message of the operation appears in the Error Messages column. Move the mouse pointer
over the cell containing the last error message to display the entire list of error messages.
The operation status is represented by an icon. The following table lists and describes each of the icons.
Retry The operation failed, but may work if you try again.
52 Getting Started
When items on the Operations window are sorted by the Status column, they are sorted in alphabetical order based on the
label of the icon.
Stopping an operation
Certain operations can be stopped from the Operations window.
1. From the Administration window, click Monitoring.
2. Click Operations in the docking panel.
3. Right-click the operation to stop, then select Stop.
4. Click Yes to confirm the stop.
NOTE: Operations that were started from a command line program, such as the nsrjb command, cannot be stopped
from the Operations window. To stop these operations, press Ctrl-c from the window where the command was
started.
Log window
To view the most recent notification logs, click the Log window from the docking panel in the Monitoring window. The Log
window provides the priority, time, source, category, and message for each log.
NOTE: If a particular log file is no longer available, check the log file on the NetWorker server. The log files are located in
NetWorker_install_path\logs directory.
An icon represents the priority of the log entry. The following table lists and describes each icon.
Getting Started 53
Table 14. Icons in the Log pane (continued)
Icon Label Description
Emergency Condition exists that could cause NetWorker software to fail unless
corrected immediately. This icon represents the highest priority.
Information Information about the current state of the server. This icon represents the
lowest priority.
Notification Important information.
Waiting The NetWorker server is waiting for an operator to perform a task, such as
mounting a tape.
When you sort items on the Log pane by using the Priority column, NetWorker sorts the icons in alphabetical order based on
the name of the label.
Recover window
The Recover window displays information about recover configurations that are created with the NetWorker Management
Console (NMC) Recovery wizard.
You can use this window to:
● Start the NMC Recovery wizard to create recover configurations or modify saved recover configurations.
● Identify the status of a recover configuration that is created with the NMC Recovery wizard.
● Start and stop a recover job.
The Recover window is divided into five sections:
● Toolbar—The toolbar is hidden by default. To display the recovery toolbar, select View > Show toolbar
● Summary
● Configured Recovers
● Currently Running
A splitter separates the Configured Recovers section from Currently running window. You can click and move the splitter to
resize these two windows.
The following table shows an example of the Recover window.
54 Getting Started
Recover toolbar
The Recover toolbar provides you with the ability to quickly perform common recover operations. The following table
summarizes the function of each toolbar button.
Displays the Properties window for the saved recover configuration that you selected in the
Configured Recover window.
Deletes the saved recover configuration that you selected in the Configured Recover window.
Displays the Find window at the bottom of the Recover window. The Find window allows you to
perform keyword searches for messages that appear in the Logs window.
Start the recover operation for a selected saved recover configuration. This option is only available for a
recover configuration that has a Never run, or Failed status.
Stop in-progress recover operation that you selected in the Currently Running window.
NOTE: The Recover toolbar does not appear by default. To display the Recover toolbar, select View > Show toolbar.
Recover Summary
The Recover Summary section displays a high-level overview of recover jobs.
This section includes the following information:
● Total Recovers—The total number of successful recover jobs.
● Since—The number of successful recover jobs since this date.
Configured Recovers
The Configured Recovers window displays a list of saved recover configurations in a tabular format. You can sort
the information by column. The Configured Recovers table displays the following information for each saved recover
configuration:
● Status—The job status of a saved recover configuration.
● Name
● Source client
● Destination client
● Recovery list
● Recover type—For example, file system or BBB.
● Comment
● OS—The operating system of the source host.
● Recover requestor—The Windows or UNIX account used to create the recover configuration.
● Start Time
● End Time
● Start date
Getting Started 55
Table 16. Save recover configuration job status
Icon Description
The last recover attempt failed.
Currently running
The Currently Running window displays a list of in progress recover jobs in a tabular format. You can sort the information by
column. The Currently Running table displays the following information for each job:
● Status
● Name
● Source client
● Destination client
● Recovery list
● Recover type—For example, file system or BBB
● Volume
● Comment
● Device
● Size
● Total size
● % complete
● Rate (KB/s)
● Start time
● Duration
● Currently running
Find
The Find section appears along the bottom of the Recover window, after you select the Find button on the Recover toolbar.
Find allows you to search for keywords in the Configured Recovers window. The following table summarizes the available find
options.
56 Getting Started
Getting started with a new installation
The following section provides basic information on how to get started with a new installation by configuring the NetWorker
datazone and starting the NetWorker Management Console (NMC) Enterprise window and Administration window.
8. Click Finish.
Device configuration
You can configure devices to test the NetWorker software.
Getting Started 57
Configuring a stand-alone advanced file type device
Create a device that is local to the NetWorker server to receive the backup data.
1. Log in to the NMC GUI as an administrator of the NetWorker server.
Labeling media
You can label tapes from the NMC GUI.
58 Getting Started
Scheduling backups
Perform scheduled backups to automatically backup client data on an ongoing basis. Data protection policies enable you to
define the client resources, schedule, and other settings for the backup. The client resources and backup storage resources
must also be configured.
1. Configure the backup storage resources:
a. Configure the storage node that will own the backup storage devices.
b. Configure the backup storage device.
c. Create a label template for labeling volumes, or use one of the preconfigured label templates.
d. Create media pools for sorting and storing backup data.
Backup Target on page 64 provides more information on configuring backup storage resources.
2. Configure one or more client resources for each client computer by using either the Client Backup Configuration Wizard
or the Client Properties dialog box.
When you configure a client resource, you specify backup settings for the client, including:
● The save sets for the client, which define the data to back up on the client.
● Whether to automatically restart failed backups from a known good point, which is called checkpoint restart.
● Whether to bypass the storage node and send backup data directly to AFTD or DD Boost storage devices, which is called
Client Direct.
● Directives that control how the NetWorker server processes files and directories during the backup.
● Probe resources for probe-based backups, where the NetWorker server probes the client for a user-defined script before
the backup starts.
● Whether to back up each save set for the client by using multiple parallel save streams.
● Backup command customizations.
Client resources on page 323 provides more information on configuring client resources.
Getting Started 59
2. On the taskbar, click the Enterprise icon .
3. In the navigation tree, highlight a host:
a. Right-click NetWorker.
b. Select Launch Application. The NetWorker Administration window appears.
4. Click Monitoring .
The Monitoring window displays four windows panes. The Log pane provides a summary of NetWorker server events. The
Policies pane displays all configured policies on the NetWorker server. To view details information about the status of the
actions in a workflow, expand the policy, right-click the workflow, and select Show Details.
nsrlogin [-s NetWorker_server] [-H authentication_host] [-P port] [-t tenant] [-d domain]
[-p password] [-f] [-u user]
where:
● -s NetWorker_server—Specifies the name of the NetWorker Server. Use this option when you use the nsrlogin
command on a NetWorker host that is not the NetWorker Server.
● -H authentication_host—Specifies the name of the NetWorker Authentication Service host. Use this option when
you use the nsrlogin command on a NetWorker host that is not the NetWorker Server. This option is only required
when you do not use the -s option.
● -P port—Specifies the NetWorker Authentication Service port number. Use this option when you do not use the -s
option and when the NetWorker Authentication Service does not use the default port number 9090 for communications.
● -t tenant— Specifies the tenant name that the NetWorker Authentication Service should use to verify the username
and password. When you omit this option, NetWorker Authentication Service uses the Default tenant to verify the user
credentials.
● -d logindomain—Specifies the domain name that the NetWorker Authentication Service should use to verify
the username and password with an external authentication authority. When you omit this option, the NetWorker
Authentication Service uses the local user database to verify the user credentials.
● -f— Allows nsrlogin to be run as a root user.
● -u username—Specifies the username that the NetWorker Authentication Service should validate to generate a token.
The user string might be a username, email address, or another string, depending on configuration of the identity
provider. After successful authentication, the banner is displayed on the screen with a prompt to accept or reject the
banner. If the user enters yes, the user can proceed. Otherwise, the user is logged out.
NOTE: The banner content is empty by default. If banner content is empty, the confirmation prompt does not
appear.
● -p "password"—Specifies the password to send to the identity provider to verify the user. If this argument is not
provided, nsrlogin prompts the user to specify the password. If the password contains special characters, the password
must be enclosed in double quote marks (""). After successful authentication, the banner is displayed on the screen.
For example, to generate a token for user Konstantin in the idddomain domain and the idd tenant, type the following
command:
If the /nsr/authc-server/conf/banner.txt file is empty, no banner content is displayed.
60 Getting Started
If the /nsr/authc-server/conf/banner.txt is updated with content, the banner content is displayed on successful
authentication.
Log in to the NetWorker server with username Konstantin, which is defined in the local user directory with the password
1.Password. When you enter Yes at the prompt, the banner content is accepted and you can proceed. When you enter
No at the prompt, the banner content is rejected and user is logged out.
nsrlogin -u Konstantin
Enter the password: <password>
Authentication succeeded
<Banner Content>
Do you wish to accept and continue (Yes/No)? Yes
When the NetWorker Authentication Service successfully validates the user, the service issues an authentication token to
the requesting host.
2. At the command prompt, type the NetWorker command.
If the validated user does not have the appropriate privileges to run the command, an error message appears or the
command does not return the expected result. For example, when you try to perform an operation with a user account that
does not have the required privilege, a message similar to the following appears:
Permission denied, user must have the 'Operate NetWorker' privilege'.
The CLI command uses the authenticated token, until the token expires. By default the token expiration period is 480 minutes
or 8 hours. When the token expires and the user tries to run a CLI command, the command fails with a permissions error and a
message similar to the following appears to indicate that the token has expired:
Security token has expired
To resolve this issue, run the nsrlogin command again to generate a new authenticated token.
NOTE: To revoke the user token and enable the CLI commands to use the Users attribute in the Usergroups resources
to authenticate users, use the nsrlogout command. The nsrlogout UNIX man page and the NetWorker Command
Reference Guide provides detailed information about the nsrlogout command.
7. Click Start.
Getting Started 61
The Backup Status window displays the progress of the backup. When the NetWorker server has successfully
finished the backup, this message appears:
Backup completion time: 2-15-07 3:27p
● Review the NetWorker daemon.raw log file on both the NetWorker server and client hosts. Use the nsr_render_log
program to review the log file in a readable format. The NetWorker Command Reference Guide describes how to use the
nsr_render_log program.
The location of the daemon.raw file is different on Windows and UNIX:
○ On Windows, the log file appears in the C:\Program Files\EMC NetWorker\nsr\logs directory.
○ On UNIX, the log file appears in the /nsr/logs directory.
● To determine the cause, refer to the Troubleshooting chapter.
● Review the operating system log files (Application event log on a Windows client) for more information.
The UNIX man pages describe how to use the save program.
62 Getting Started
Removed symlink /etc/systemd/system/graphical.target.wants/networker.service.
Removed symlink /etc/systemd/system/networker.service.
Getting Started 63
3
Backup Target
This chapter contains the following topics:
Topics:
• Label templates
• Media pools
• Storage nodes
• Disk storage devices
• Libraries and silos
• File type devices
• Stand-alone devices
• Labeling volumes
• Troubleshooting devices and autochangers
Label templates
The NetWorker server creates a unique label for each volume by applying a label template. This section describes how label
templates and media pools are used to sort, store, and track data on media volumes.
64 Backup Target
How the NetWorker server uses volume labels
A volume label is a unique internal code, applied by the NetWorker server, that initializes the volume for the server to use and
identifies a storage volume as part of a specific pool. Using media pools on page 69 provides more information about pools.
Labeling a volume provides a unique name for tracking and recognizing the media, as well as references to volume labels in the
records stored in the media database. The NetWorker server uses the media database records to determine which volumes are
needed for backing up or recovering data.
When NetWorker labels a volume, the label operation performs the following actions:
1. Verifies that the volume is unlabeled.
2. Labels the volume with the name specified in the Volume Name attribute by using one of the following:
● The next sequential label from the label template that is associated with the chosen pool.
If a recyclable volume from the same pool is relabeled, the volume label name and sequence number remain the same, but
access to the original data on the volume is destroyed. The volume becomes available for new data.
● An override volume name that was entered by the user.
/\*?[]()$!^;’"’~<>&|{}:-._
Backup Target 65
Table 18. Key label template attributes (continued)
Attribute Guidelines
Fields A label template is made up of one or more fields. Each field, or component, provides a layer of
specificity to your organizational structure. There can be any number of components, but it is best to
keep the template simple with as few as necessary. The label cannot exceed 64 characters.
Each range includes a start value, a dash (-), and an end value. The start value and the end value
must have the same number of characters. For example, use 01-99 (not 1-99) or aaa-zzz (not
aa-zzz).
The order in which you enter each component of the Field attribute is important.
The NetWorker Server applies each component in a left-to-right order, starting with the first one
entered.
Separator Choose the symbol to appear between component entries. Use the period, dash, colon, or underscore
to separate each component of the label template. If label components do not have separators (for
example, AA00aa), the labels can be difficult to read.
Next Choose the next sequence number to write on the label that the NetWorker Server places on a
volume (according to the template).
● To force a label to start the label scheme at a particular point, type a start label value. The server
continues to generate labels from that point on, according to the rules of the template.
● To have the NetWorker Server generate the first label, leave this attribute blank.
When the NetWorker Server recycles a storage volume, the volume label does not
change as long as the volume remains in the same media pool. That is, if a storage
volume labeled "Dev.006" is recycled, it retains the volume label "Dev.006" and does not
receive a new label with the next sequence number.
The following table lists examples of number sequences for volume labels.
ac.00,...ac.99,
az.00...az.99,
ba.00,...ba.99
:
zz.00,...zz.99
The label template should allow for expansion of the backup media storage system. For example, it is better to create a template
for 100 tapes and not use all of them, than it is to create a template for only 10 tapes and run out of labels. When the server
reaches the end of the template numbering sequence, it wraps to the starting value. For example, after zz.99 (used for the
67,600th label), the next label the server uses is aa.00 for label 67,601.
66 Backup Target
NOTE: When the NetWorker server recycles a volume, the volume label does not change if the volume remains in the same
media pool. That is, if a volume labeled Dev.006 is recycled, it will retain the volume label Dev.006 and will not receive a new
label with the next sequence number. The original data on the volume, however, will be overwritten by the new data.
jupiter.001
Consider that the simpler a convention is, the easier it can be understood by operators and administrators.
The maximum length for a volume name is 63 characters. With advanced file type devices (adv_file), the maximum length is 60
characters.
Each volume should have a physical (adhesive) label attached to it. Since the NetWorker server keeps track of the backups and
which volumes they are on, you can name the volumes with any convenient name. For example, you can label your volumes 1, 2,
3, or Monday.1, Tuesday.1, Wednesday.1. You can assign a volume any name as long as each one is unique.
The adhesive label on the volume should match the name generated by NetWorker. For example, if you physically label a volume
mars.1, its NetWorker name should also be mars.1.
Backup Target 67
Working with label templates
This section explains how to create, edit, copy, and delete label templates.
5. Click OK.
68 Backup Target
Deleting a label template
You cannot delete a preconfigured label template or a label template that is in use.
1. In the Administration window, click Media.
2. In the expanded left pane, select Label Templates.
3. In the right pane, select the label template to delete.
4. From the File menu, select Delete.
5. When prompted, click Yes to confirm the deletion.
Media pools
NetWorker uses media pools and volume labels to sort backup and clone data on media.
Media is a specific collection of volumes to which the NetWorker server writes data. For example, a tape volume or a Data
Domain device. A volume is identified with a unique label based on user configurable label templates.
Media pools act as filters that tell the NetWorker server which backup volumes should receive specific data. The NetWorker
server uses media pools along with label templates to track what data is on which specific volume. When you use a barcode-
enabled tape library, the NetWorker server uses media pools along with the volume barcode Labels to track which data is on a
specific volume.
NOTE: NetWorker does not use media pools for backup and clone operations to deduplication devices.
Backup Target 69
the volume. If there is no correctly labeled volume mounted on a storage device, the NetWorker server generates a request to
mount a volume that is labeled for the pool, and waits until an operator or an autochanger mounts an appropriate volume.
70 Backup Target
Table 21. Preconfigured media pools (continued)
Pool name Description
the Indexed Archive pool, NetWorker writes information about
the archive save set to the client file index for the client.
Indexed Archive Clone Receives the clone copy of an indexed archive. NetWorker
does not assign an expiration date to the clone copy of an
archive save set. NetWorker does not write information about
the clone save set to the client file index for the client.
The following table summarizes how NetWorker determines which pool receives the backup data, which is based on the
configuration of the Action, Client, and Pool resource attributes.
Backup Target 71
Table 22. Determining which pool receives backup data
Client Override Behavior Destination pool Pool (Client) Legacy criteria Pool that receives the
(Action) (Action) attributes (Pool) data
Client Can Override Defined Defined Defined and criteria Pool defined in Client
matches resource
Client Can Override Defined Undefined Defined and criteria Pool defined in Action
matches resource
Client Cannot Override Defined Defined Defined and criteria Pool defined in Action
matches resource
Legacy Backup Rules Defined Undefined Defined and criteria Pool that matches legacy
matches criteria
Legacy Backup Rules Defined Defined Defined and criteria Pool that matches legacy
matches criteria
Legacy Backup Rules Defined Undefined Undefined or no matches Default
72 Backup Target
Legacy Backup Rules is enabled
A Protection group contains two clients, SQL_clnt and Exchange_clnt. The workflow that is associated with the protection
group contains a backup action.
● Backup action configuration:
○ Destination Pool=App_backups
○ Schedule=daily full backup
○ Client Override Behavior= Legacy Backup Rules
● The Pool attribute that is defined for the SQL_clnt client resource is SQL_backups.
● The Pool attribute for Exchange_clnt is not defined.
● The Full level is enabled in the Levels attribute of a pool resource named Backups.
In this example, NetWorker sends the backup data for SQL_clnt and Exchange_clnt to Backups, the pool that matches the level
Full backup criteria.
Legacy Backup Rules is enabled
A Protection group contains two clients, SQL_clnt and Exchange_clnt. The workflow that is associated with the protection
group contains a backup action.
● Backup action configuration:
○ Destination Pool= App_backups
○ Schedule=daily full backup
○ Client Override Behavior= Legacy Backup Rules
● The Pool attribute that is defined for the SQL_clnt client resource is SQL_backups.
● The Pool attribute for Exchange_clnt is not defined.
● The manual level is enabled in the Levels attribute of a pool resource named Backups.
In this example, NetWorker sends the backup data for SQL_clnt and Exchange_clnt to the Default pool because a pool does not
exist with legacy attributes that match the configuration for the backup data.
Backup Target 73
Table 23. NetWorker hierarchy for resolving media pool conflicts (continued)
Precedence Groups attribute Clients attribute Save sets attribute Levels attribute
x x
x
x x x
x x
x x
x
x x
x
Lowest x
74 Backup Target
Attribute Definition
Auto Media Verify Select this attribute to perform automated media verification while data is written to a volume labeled
for this media pool. Auto media verification provides more information.
Max parallelism Increase the value to define the maximum number of simultaneous save streams that NetWorker
writes to each device in the pool. The default value for this attribute is 0, which means that the
attribute has no effect on other parallelism settings. When you set the Max parallelism attribute to
1, a prolonged delay might occur between the backup of save sets. To resolve this issue, increase
the Max parallelism attribute for the pool resource. However, when you increase the pool parallelism
value, the time to recover data on the volume increases.
NOTE: For AFTD and DD Boost devices, the Max nsrmmd count attribute value for a device
affects the Max parallelism attribute. For example, consider an AFTD device (AFTD_1) that has
a Max sessions attribute value of 20 and a Max nsrmmd value of 4. Now suppose a backup
pool with a Pool parallelism attribute of 1 selects AFTD_1 . The total number of save sessions that
NetWorker can start for AFTD_1 is 4, one for each nsrmmd process. Tape and FTD devices can
only spawn one nsrmmd process at a time, so if the previous example used a tape device, then the
total number of save sessions would be 1.
Recycle from Select this option to enable NetWorker to use expired volumes that are labeled for other media pools
other pools in this pool that have the Recycle to other pools attribute enabled, when the NetWorker server does
not have access to blank volumes or volumes eligible for reuse and assigned to this pool.
Recycle to other Select this option to enable NetWorker to use expired volumes that are labeled for this media pool in
pools other pools that have the Recycle from other pools attribute enabled, when the NetWorker server
does not have access to blank volumes or volumes eligible for reuse and assigned to the other pool.
Recycle start Defines the time to start the automatic relabel process each day. By default this attribute is empty
and the automatic relabeling of recyclable volumes is not done. Use the format HH:MM. Automatically
relabeling volumes in a media pool provides more information.
Recycle interval Defines the interval between two starts of the automatic relabel processes. The default value is 24:00.
Use the format HH:MM.
Max volumes to Defines the maximum number of recyclable volumes that NetWorker can relabel during each automatic
recycle relabel process. The default value is 200.
Recycle start now Select this attribute to start the automatic relabel process of recyclable volumes for this pool
immediately after you create the pool. The default value is No.
Store index For archive pools only. Select this attribute to configure an archive pool that creates client file index
entries entries for the archive save sets. Clear this option to configure an archive pool that will not create
client file index entries for the archive save sets.
Worm pool/ Supported WORM and DLTWORM tape drives provides more information about how to create Worm
Create pools.
DLTWORM
12. Optionally, on the Restricted Data Zones tab, from the restricted datazone list, select the restricted datazone in which to
add the pool.
13. Click OK
If any of the settings for a new media pool match an existing media pool, this message appears:
If this message appears, review the media pool configuration and modify any overlapping criteria.
14. If you did not select a label template when you create the media pool, a message appears that tells you that NetWorker
creates a label template for the media pool, click OK.
Backup Target 75
Auto media verification
If the Auto Media Verify attribute is enabled, the NetWorker server verifies data written to tape volumes from this media pool.
This attribute does not apply to AFTD, file type and Data Domain devices.
Data is verified by repositioning the tape volume to read a portion of the data previously written to the media. The data read is
compared to the original data written. This feature does not verify the entire length of the tape.
If the data read matches the data written, verification succeeds.
Media is verified when the following occurs:
● A volume becomes full while saving and it becomes necessary to continue on to another volume.
● A volume goes idle because all save sets being written to the volume are complete.
When a volume fails verification, it is marked full so that the server will not select that volume for future saves. The volume
remains full until it is recycled or a user marks it not full. If a volume fails verification while the server is attempting to switch
volumes, all save sets writing to the volume are terminated.
Auto media verification should not be used to verify the integrity of the data written to the entire tape. To fully verify the data
written to the tape, either restore the tape contents or clone the data.
76 Backup Target
Table 24. WORM supported devices (continued)
Device Description
IBM 3592 Unique to IBM 03592:
● Mode sense page 0x24, byte 7 bit 4 indicates WORM capable
● Mode sense page 0x23, byte 20 bit 4 indicates WORM tape present
STK 9840A/B/C, 9940B, T10000 Any drive with STK as the vendor data that reports WORM capability like these:
● Standard inquiry data byte 55 bit 2 indicates WORM capable
● Request sense data byte 24 bit 1 indicates WORM tape present
IBM LTO Ultrium 3 and higher, and These drives use the SCSI-3 method to report WORM capabilities, so there is not
Quantum LTO Ultrium 3 and higher a match against any of the inquiry data. Any drive that does not match the inquiry
data patterns listed above will have the SCSI-3 method applied to them:
● Inquiry data VPD page
0xb0, byte 4, bit 0 indicates WORM capable
● Mode sense page
0x1d, byte 2 bit 0 indicates WORM tape present
Byte 4, bits 0,1: label restrictions include
- 00 indicates no overwriting allowed
- 01 indicates some labels can be overwritten
● Byte 5, bits 0,1: filemark overwrite restrictions
- 0x02: any filemark at EOD can be overwritten except for the one closest to
the beginning of the tape
- 0x03: any filemark at EOD can be overwritten
The WORM and DLTWORM attributes determine whether or not the NetWorker software will back up to a write once-read
many (WORM) tape. You can apply these tape attributes to any pool.
NOTE: Various Quantum drive models (SDLT600, DLT-S4, and DLT-V4) have the ability to create WORM tapes from
ordinary blank DLT tapes supported by that particular drive. You cannot recycle an existing NetWorker tape to create a
DLTWORM volume without first having bulk-erased the tape. When the DLTWORM attribute is set, labeling one of these
drives into a WORM pool causes the Quantum drive to make the current tape a WORM tape.
Savegroups that belong to pools that have either the WORM or DLTWORM attribute set, are considered to be WORM
savegroups.
Backup Target 77
How to identify WORM media
Since WORM media cannot be reused, the tapes are uniquely identified as such so that they are only used when required. As
shown in this figure, a (W) is appended to the volume names displayed in the Volumes window. If a volume is both read-only
and WORM, an (R) is appended to the volume name.
WORM capable This attribute indicates that this drive supports the use of
WORM media.
78 Backup Target
Table 25. WORM/DLTWORM attributes (continued)
Attribute Description
DLTWORM capable This attribute indicates that this drive can create DLTWORM
tapes from a blank tape.
WORM pool This pool should hold WORM tapes (depending on the setting
of “WORM pools only hold WORM tape” in the server).
create DLTWORM If selected, before the NetWorker software labels a tape in
a drive capable of creating DLTWORM volumes, NetWorker
will try to convert the tape into a DLTWORM tape. If that
conversion fails, the labeling for that tape will fail. If a tape
drive in a pool where this attribute is set cannot create
DLTWORM tapes, (that is, the tape drive is not a Quantum
SDLT600, DLT-S4 or DLT-V4 tape drive, this attribute is
simply ignored.
NOTE: You cannot change the name of a media pool. Preconfigured media pools cannot be modified.
Backup Target 79
Copying a media pool
Perform these steps to create a copy of a pool resource.
1. In the Administration window, click Media.
2. In the left pane, select Media Pools.
3. In the right pane, select the media pool.
4. From the Edit menu, select Copy. The Create Media Pool dialog box appears, containing the same information as the
media pool that was copied, except for the Name attribute.
5. In the Name attribute, type a name for the new media pool.
6. Edit any other attributes as appropriate, and click OK.
Storage nodes
Storage nodes (including the NetWorker server) are host computers with attached storage devices. A storage node has the
physical connection and ownership of the attached devices, but the NetWorker server maintains the client file index and media
database. With the NetWorker software, client data can be routed directly to a storage node’s storage devices without the data
first going to the NetWorker server. A storage node may be a client of the NetWorker server, although this is not a requirement.
However, the storage node must have the NetWorker client software installed.
From the NetWorker server, typical storage tasks can be performed, such as:
● Mounting and labeling volumes for the storage node devices.
● Configuring NetWorker resources associated with the storage nodes.
Only users who have the Configure NetWorker privilege can add to or change the configuration of the NetWorker server, media
devices, and libraries. The NetWorker Security Configuration Guide provides more information.
Requirements
To operate the NetWorker software with storage nodes, certain requirements must be met.
● On UNIX systems, this software must be installed on the storage nodes. The packages must be installed in the following
order:
1. NetWorker client software
2. NetWorker storage node software
● On Windows systems, the Storage Node Option must be installed. The Storage Node Option installs both the NetWorker
client and storage node software.
Licensing
The NetWorker Licensing Guide provides information on NetWorker licensing support for storage nodes.
80 Backup Target
Storage node configuration
The following sections provide the procedures for configuring a NetWorker storage node.
Backup Target 81
● The format is bus.target.lun where the target and LUN fields are optional.
● You can exclude a maximum of 63 targets.
9. For AFTD or DD Boost devices, configure the following settings in Advanced Devices:
● In Server network interface, type the unique network interface hostname of the NetWorker server to be used by the
storage nodes.
● In Clone storage nodes, list by priority the hostnames of the storage nodes to be used for the save or “write source”
side of clone operations originating from this storage node as the “read source.” The clone operation selects the first
storage node in this list that has an enabled device and a functional nsrmmd process.
○ If the Clone storage nodes attribute does not contain a value, then the device operations use the value that is
defined in the Clone storage nodes attribute for the Storage Node resource that was created for the NetWorker
server.
○ If the Clone storage nodes attribute for the storage node resource is empty, then device operations use the values
that are defined in Storage nodes attribute for the client resource that was created for the NetWorker server.
In backup-to-disk environments, it is possible for a single backup volume to be shared by multiple storage devices on
different storage nodes. This can result in an ambiguous clone write source.
NOTE: The Save Mount Timeout applies only to the initial volume of a save request.
To modify the Save Mount Timeout and Save Lockout attributes, perform the following steps.
1. In the server’s Administration interface, click the Devices button.
2. Select View > Diagnostic Node.
3. Right-click the remote device and select Properties.
4. Select the Advanced tab.
5. Modify the attributes as appropriate and click OK.
82 Backup Target
Balancing the load on the storage node
The Save Session Distribution feature allows you to configure how NetWorker distributes save sessions between the storage
nodes.
NOTE: This feature is not available for clone and recover operations.
You can apply this feature to all NetWorker clients or to selected clients. This feature has two options:
● Max sessions—Distributes save sessions that are based on the setting in the Max sessions option in the storage node
device resource. This is the default distribution method. The Max sessions option is more likely to concentrate the backup
load on fewer storage nodes.
● Target sessions—Distributes save sessions that are based on the setting defined in the Target sessions option in each
storage node device resource. The Target sessions option is more likely to spread the backup across multiple storage
nodes.
When you select the Max sessions option, the NetWorker server distributes the save sessions for a client among eligible
storage nodes as follows:
1. Identifies the available storage nodes in the NetWorker client’s storage node affinity list.
2. Uses an available device on the first storage node in the list that is working below its Target sessions level.
3. When all devices on the first storage node are running at their target sessions level but some are running below their max
sessions level, then NetWorker uses the least loaded device.
4. Continues until all available devices on all storage nodes in the client’s storage node affinity list are in use.
When you select the Target sessions option, the NetWorker server distributes save sessions among eligible storage nodes as
follows:
1. Identifies the available storage nodes in the storage node affinity list for the client.
2. Uses an available device on the first storage node in the list that is working below its Target sessions level.
3. When all devices on the first storage node are running at their target sessions levels, continue to the next storage node even
if some devices are running below their max sessions level.
4. When all devices on all eligible storage nodes are running at their target sessions level, use the least loaded device that is
running below its max session value.
5. Continues to send data to the least loaded device that is running below the max session value, until all devices on all available
storage nodes are running at their max session levels.
Note the following performance considerations for storage node load balancing:
● Depending on the configuration of the backup environment, there is a potential to shorten the backup times by using the
device Target sessions option rather than the device Max sessions option. However, using the device Target sessions
option with the checkpoint restart feature can result in slower recovery times because a single save set is more likely to be
spread across multiple storage nodes.
● It is recommended to use the default values for Max sessions as lowering these values can impact performance.
● Each NetWorker client has a storage node affinity list. The Save sessions distribution feature can only distribute a backup
session for a client to multiple storage nodes when the client resource has two or more storage nodes in its storage node
affinity list. The storage node affinity list is specified on the Globals (2 of 2) tab in the NetWorker Client Properties
window.
Backup Target 83
The NetWorker software directs the client data to the first storage node in the affinity list with an enabled device, capable of
receiving the data. The NetWorker software sends additional saves to the next storage node in the storage node affinity list that
is based on criteria that are specified in Balancing the load on the storage node on page 83.
Multiplexing
Multiplexing is the ability to write multiple data streams simultaneously to the same storage device. It is often more efficient for
the NetWorker server to multiplex multiple save sets to the same device. There are also times when limiting the number of data
streams to a particular device improves performance of the NetWorker environment.
Use the Target sessions, Max sessions, and Pool parallelism attributes to increase or limit the number of data streams that
NetWorker writes to a device.
Target sessions
Use the Target sessions attribute on the Configuration tab of the Device resource to define the optimal number of backup
sessions to assign to an active device.
Target sessions is not a hard limit; to set a hard limit for the number of sessions that a particular device can accept, use the Max
sessions attribute.
The Target sessions attribute aids in load balancing devices by determining when the NetWorker software should write save
streams to a device.
When a save session starts, the following actions occur:
● If a device is already receiving the number of backup sessions determined by the target sessions value, the NetWorker
server uses the next underutilized device for the backups.
● If all available devices are receiving the number of backup sessions determined by their target sessions value, the NetWorker
server overrides the set value and uses the device with the least activity for the next backup session.
Because it is often more efficient for the NetWorker server to multiplex multiple save sets to the same device, rather than write
each save set to a separate device, the NetWorker server attempts to assign to each device a number of save sets, up to the
value of target sessions, before assigning a save set to another device.
84 Backup Target
NOTE: When the NetWorker software assesses how many devices need to be involved in multiple save streams
assignments with the same storage node, the device with the lowest target session value is used as a reference.
Max sessions
The Max sessions attribute on the Configuration tab of the Device resource defines the maximum number of save sessions for a
device. The max sessions value is never less than the target sessions value. It is recommended to use the default values for Max
sessions as lowering these values can impact performance.
Backup Target 85
MMDS for Disabled Devices Dynamic nsrmmds Functionality
No No This is a static configuration. The number of ports that are to be
open is equal to the number of disk devices on the storage node, that
is, the "max nsrmmd count".
Yes No This is a "static" configuration. The number of ports that are to be
open is equal to the number of disk devices on the storage node, that
is, the number of nsrmmds. In this configuration, the ports are not
utilized efficiently. A few of them remain unused. When the disabled
devices are re-enabled, then all the open ports might be used.
Yes/No Yes This is a "dynamic" configuration. This configuration ensures that the
nsrmmds are started on demand by the server.
NOTE: You must ensure that the sum of storage node devices nsrmmds count should not exceed 655.
86 Backup Target
Storage node timeout errors
If the nsrd process starts on the NetWorker server and detects that a setting for the NSR_MMDCONTROL variable exists, a
message similar to the following appears:
NSR_MMDCONTROL env variable is being ignored
use nsrmmd control timeout attribute instead
FTD
A file type device (FTD) is a basic disk device type that has been available for many years. FTDs have limited use and support
and this chapter describes them for legacy purposes only.
AFTD
Advanced file type devices (AFTDs) support concurrent backup and restore operations and require the NetWorker DiskBackup
Option (DBO) license. AFTDs are supported for the following configurations:
● A local disk on a NetWorker storage node.
● A network-attached disk device that is NFS-mountable to a NetWorker storage node running a Linux or UNIX operating
system.
● A network-attached disk device that is CIFS-mountable to a NetWorker storage node running on Windows.
The Client Direct feature enables NetWorker clients to back up directly to AFTDs over a CIFS or NFS network, bypassing the
storage node. For Client Direct backups, the storage node manages the devices but does not handle the backup data unless the
Client Direct workflow is not available.
DD Boost devices
DD Boost devices reside on Data Domain storage systems that have the DD Boost features enabled. These devices are similar
to AFTDs except they store backup data in a highly compressed and deduplicated format. The DD Boost API accesses the DD
Boost devices over a network. NetWorker can perform DD Boost backups through either the NetWorker storage node workflow
or the Client Direct file access workflow.
The Client Direct workflow enables NetWorker clients with distributed segment processing (DSP) and network access to
deduplicate their own backup data and send the data directly to the DD Boost devices. This method bypasses the storage node
and frees up network bandwidth. The storage node manages the devices but does not handle the backup data workflow if the
Client Direct workflow is available.
If Client Direct backup is not available, NetWorker automatically routes the backup through the storage node where it is
deduplicated and sent to the DD Boost devices for storage. Restore operations work similarly. If Client Direct is not available for
a restore, then NetWorker performs a traditional storage node recovery.
Backup Target 87
This guide does not cover DD Boost operations. The NetWorker Data Domain Boost Integration Guide provides details on DD
Boost devices
Example environment
The following figure shows various backup-to-disk options deployed in a mixed operating system environment.
● Linux/UNIX Storage Node A writes its backups to either of the following:
○ The AFTD through an NFS connection to Disk Device 1.
○ The AFTD on Local Disk 1.
● Windows Storage Node B uses a CIFS connection to back up to the NAS AFTD on Disk Device 2.
● Data Domain system C writes its backups to a DD Boost device on Local Disk 2.
Figure 12. Example NetWorker disk backup configuration in a mixed backup environment.
88 Backup Target
● Archive operations are not currently supported for Client Direct backups.
3. If an NFS server provides the AFTD storage for Client Direct backups, then specify the username and password that is
required to access the NFS server for the AFTD in the Remote user and Password attributes on the Configuration tab of
the Device Properties dialog box for the device.
4. Ensure that the Client direct attribute is enabled on the General tab of the Client Properties dialog box for each Client
Direct client.
Client Direct backups are enabled by default.
Select View > Diagnostic Mode in the Administration interface to access the Client direct attribute in the Client
Properties dialog box.
Backup Target 89
Table 26. Differences between disk devices
Function or operation File type device (FTD) Advanced file type device DD Boost device
(AFTD)
Create a device ● Device Property Window ● Device Configuration ● Device Configuration
Wizard Wizard
Select the media type: file.
● Device Property Window ● Device Property Window
UNIX/Linux storage node:
Select media type: Select media type:
local or NFS only.
adv_file. Data Domain
Windows storage node:
UNIX/Linux storage node:
local
local
path only. CIFS is not
or NFS only.
supported for
FTDs. Windows storage node:
local or
CIFS using UNC path or
using NFS:
Remote user, Password.
Storage location ● Specified in the Name ● Specified in the Device ● Specified in the Device
attribute. Access Information Access Information
attribute. attribute.
Concurrent save set ● No. ● Yes. ● Yes.
operations
Reclaiming or recovering ● The nsrim program ● Aborted save sets ● Reclaims only data that
space removes both aborted and immediately removed. is unique, not required by
expired save sets, once ● The nsrim program other existing backups.
NOTE: For Read-only
every 24 hours, by the removes expired save ● NetWorker does not
disk type volumes, nsrim Expiration action, at the sets from the media immediately remove
does not reclaim/recover time defined in the Server database once every 24 aborted save sets, but
the space. backup workflow (if you hours, by the Expiration marks them recyclable. A
have set volume recycle to action, at the time defined restarted save can be
Auto). in the Server backup deduplicated. Otherwise,
. workflow (if you have set NetWorker removes the
volume recycle to Auto). aborted save set during
NetWorker removes space the next Recover Space
on the AFTD as specified operation.
in the Reclaim Space
Interval of the staging
policy.
Volume default capacity for ● If the file type device was ● Does not apply. ● Does not apply.
devices used before setting the
Volume Default Capacity
attribute, the data for
that file type device must
be staged or cloned to
another device.
AFTD Percentage Capacity ● Does not apply. ● A setting determines the ● Does not apply.
capacity that NetWorker
software should stop
90 Backup Target
Table 26. Differences between disk devices (continued)
Function or operation File type device (FTD) Advanced file type device DD Boost device
(AFTD)
writing to an AFTD: spans
from 1% to 100%.
When file system or volume is ● Waiting message is ● Message is displayed ● Backup to a DD Boost
full displayed if no writable stating file system requires device fails and stops
volume available or until more space. when full.
volume becomes available. ● The nsrim program
● Volume marked full and invoked to reclaim space
is no longer available for for expired save set on
backups until the volume AFTD.
becomes appendable. ● Notification is sent by
email stating device is full.
● Device waits until space
become available. The
volume is never marked as
full.
Save set continuation ● Yes. ● No. Save sets that start ● No. Save sets that start
on an AFTD must be on a DD Boost device
completed on the same must be completed on the
device. same device.
Data format in device ● Open Tape Format (OTF). ● Save stream (uasm) ● Deduplicated
format (uses less space).
Client Direct backup: ● No. ● Yes. ● Yes.
the storage node manages the
devices for the NetWorker Clients send their own Clients use DD Boost
clients, but the clients send backup data DSP functionality to
their backup data directly directly to the storage deduplicate
to the devices via network devices. If Client their own backup data
access, bypassing the storage Direct backup is not before
node. available, a traditional sending it directly to the
storage node backup is storage
performed. devices. If Client Direct
backup is not
NetWorker archive available, a traditional
operations are storage
not supported for Client node backup is performed.
Direct backup.
NetWorker archive
operations are not
supported for
Client Direct backup.
Table 27. Default values and ranges for target and max sessions attributes
Device type Default target Default max sessions Recommended Range
sessions sessions*
AFTD (traditional 4 32 1 - 32 1 - 1024
storage)
AFTD (including Data 4 32 1 - 10 1 - 1024
Domain CIFS/NFS)
Backup Target 91
Table 27. Default values and ranges for target and max sessions attributes (continued)
Device type Default target Default max sessions Recommended Range
sessions sessions*
CloudBoost 10 80 1 - 10 1 - 200
Data Domain (DD 20 60 1 - 10 1 - 60
Boost)
DD Cloud Tier 20 60 1 - 10 1 - 60
NDMP 4 512 1 - 32 1 - 1024
FTD (traditional) 4 32 1 - 16 1 - 1024
ProtectPoint 20 120 1 - 10 1 - 1024
VTL/Tape (traditional) 4 32 1 - 16 1 - 512
VTL/Tape (Data 4 32 1-1 1 - 512
Domain / Deduplicated)
* The recommended
session values are
guidelines only and are
subject to bandwidth,
data type, and device
capabilities.
92 Backup Target
Create and configure an AFTD
You can create an AFTD by using either the Device Wizard or the device properties window.
d. Click OK.
4. In the navigation tree, right-click Devices, and select New Device Wizard.
5. In the Select the Device Type window, select AFTD and click Next.
6. In the Select Storage Node window, specify the path to the storage directory that will contain the AFTDs.
a. In the Storage Node list, select the storage node that you will use.
b. If the directory for the intended AFTDs is on a different storage node or a remote storage system, select Device
storage is remote from this Storage Node and type the Network Path of the remote host directory that will contain
the devices.
For example, if the storage node is a Microsoft Windows system and you use a CIFS AFTD on a remote storage system
host, this path could be something like the following:
\\dzone1_storhost2.lss.corp.com\share-1
This storage path is not a device. It is the directory location in which the shared devices are to be created.
7. In Browse or Manual, select which option you will use to specify the pathnames of the devices:
● Browse Storage Node or network path. The next wizard step will prompt you to browse and add the devices.
● Manually enter local or remote device paths. Select this to skip the browse step and manually type unique names for
the devices you want to add:
○ For remote devices, type the device paths relative to the Network Path that you specified for the storage directory.
For example:
cifsaftd-1
cifsaftd-2
○ For local devices, type the absolute paths to these devices. For example:
C:\cifsaftd-1
C:\cifsaftd-2
Multiple devices for a single volume configuration on page 98 provides details for shared volumes.
8. If the storage host is remote from the storage node, in the Authentication area, type the appropriate Username and
Password to access the storage directory.
9. Click Next.
10. If you selected the Browse option in the previous window:
a. In the Select the Device Path window, verify that the storage node shows the path of a storage directory.
b. Add devices to the storage directory by clicking New Folder and typing unique device names. For example:
cifsaftd-1
cifsaftd-2
Backup Target 93
11. In the Configure Device Attributes window, specify the attributes. If you added multiple devices in the previous window,
select each device individually and specify its attributes:
a. In NetWorker Device Name, type a unique name for the AFTD device.
For example, for a device on the NetWorker server host storage node:
aftd-1
If you configure the device on a storage node host that is not the NetWorker server host, it is a “remote device” and this
attribute must be specified with rd= and a colon (:) in the following format (for Microsoft Windows):
rd=remote_storagenode_hostname:device_name
For example:
rd=dzone1_storhost2:aftd-1
e. In Max Sessions specify the maximum number sessions the device may handle. If no additional devices are available
on the host, then another available storage host takes the additional sessions, or retries are tried until sessions become
available.
The default value is 32 for AFTDs, which typically provides best performance. It cannot be set to a value greater than 60.
NOTE: The Max Sessions setting does not apply to concurrent recover sessions.
f. Click Next.
12. In the Label and Mount device window, if you select the Label and Mount option, specify the attributes for:
● Pool Type.
● Pool to use.
13. On the Review the Device Configuration page:
a. Review the settings.
b. Click Configure.
14. On the Check results page:
a. Review whether the devices were successfully configured or if any messages appeared.
b. Click Finish.
c. To change any of the settings, click Back to the correct wizard page.
NOTE: Do not use a temporary directory for AFTDs. The data could be overwritten.
d. Click OK.
4. In the navigation tree, right-click Devices and select New.
94 Backup Target
The Create Device window opens, with the General tab selected. The Identity area might show a default device name in
the Name field.
rd=remote_snode_hostname:device_name
For example:
rd=snode-1:aftd-1
b. (Optional) Add a comment in the Comment field.
c. In the Device Access Information attribute, provide complete paths to the device directory. You can provide alternate
paths for the storage node and for Client Direct clients, for example:
For non-root or cross-platform Client Direct access:
For non-root or cross-platform Client Direct access to an AFTD, do not specify an automounter path or a mounted path.
Instead, specify the path in the host:/path format, even if the AFTD is local to the storage node.
For example:
NFS_host:/path
where:
● NFS_host is the hostname of the NFS file server
● path is the NFS-mountable path that is exported by the file server
This format is required to allow Client Direct access for Windows or non-root UNIX clients.
NOTE: Non-root Client Direct access to an NFS AFTD is supported only with the NFSv3 protocol and
AUTH_SYS authentication on the NFS host. For Client Direct access to an AFTD when the backup client is
able to run as root on the AFTD host, provide a mount point or automounter path.
/mnt/aftd-1
/net/storho-1/snode-1/aftd-1
where:
○ aftd-1 is the storage device directory name
○ storho-1 is the storage system hostname
○ snode-1 is the storage node hostname
The first path enables the storage node to access the device via its defined mount point. The second path enables
Client Direct clients to use the automounter path to directly access the device, bypassing the storage node.
6. In the Status area, ensure that the Auto Media Management tape feature is not enabled.
7. In the Cleaning area, leave the options for cleaning at their default (disabled) settings, so that automatic cleaning is not
invoked.
8. Select the Configuration tab.
9. In the Save Sessions area, set the number of concurrent save sessions (streams) and the number of nsrmmd (data mover)
processes the device may handle:
● Target Sessions is the number of sessions that a nsrmmd process on the device will handle before another device on
the host will take the additional sessions. Use this setting to balance the sessions among nsrmmd processes.
If another device is not available, then another nsrmmd process on the same device will take the additional sessions.
Backup Target 95
Typically, set this attribute to a low value. The default values are 4 for AFTDs and 6 for DD Boost devices. It may not be
set to a value greater than 60.
Multiple devices for a single volume configuration on page 98 provides details on volume sharing.
● Max Sessions is the maximum number sessions the device may handle. If no additional devices are available on the
host, then another available storage host takes the additional sessions, or retries are attempted until sessions become
available.
The default values are 32 for AFTDs and 60 for DD Boost devices, which typically provides best performance. It cannot
be set to a value greater than 60.
The Max Sessions setting does not apply to concurrent recover sessions.
● Max nsrmmd count limits the number of nsrmmd processes that can run on the device. Use this setting to balance the
nsrmmd load among devices. The default value is 4.
To modify this value, first adjust the sessions attributes, apply, and monitor the effects, then update max nsrmmd count.
At least one nsrmmd process is reserved for restore or clone operations.
10. In the Local Backup area, leave Dedicated Storage Node at No (the default).
11. In the Remote Host area, if an NFS path is specified in the Device Access Information, then type a Remote User name
and Password.
The remote username is the name of the user on the NFS server. It is recommended that you also specify the numeric user
id (UID) of that user. Do this by appending a colon (:) and the UID after the username, for example, user_name:4242.
NOTE: If the device username is changed after labeling, manual action may be required to change the owner of all files
and directories in the AFTD. NetWorker will try to perform this automatically during the next operation, however the
ability to do so depends on the security configuration of the file server where the AFTD storage resides.
1. Create one directory for each disk (or partition) to be used for an AFTD.
AFTDs require a directory (folder) to be created in the disk file system that the NetWorker server or storage node
recognizes as the device name (and the destination for the data).
NOTE: Do not use a temporary directory for AFTDs. The data could be overwritten.
d. Click OK.
4. In the navigation tree, right-click Devices and select New.
The Create Device window opens, with the General tab selected. The Identity area might show a default device name in
the Name field.
96 Backup Target
rd=remote_snode_hostname:device_name
For example:
rd=snode-1:aftd-1
b. (Optional) Add a comment in the Comment field.
c. In the Device Access Information attribute, provide complete paths to the device directory. You can provide alternate
paths for the storage node and for Client Direct clients, for example:
● For an AFTD on the storage node’s local disk, which it shares via CIFS:
E:\aftd-1
\\snode-1\aftd-1
The first path enables the storage node to access the device via its local drive. The second path enables Client Direct
clients to access the device directly, bypassing the storage node.
● For a CIFS-mounted AFTD, specify the complete paths of the directory that is created by using the Universal Naming
Convention (UNC), for example:
\\CIFS_host\share-point-name\path
6. In the Status area, ensure that the Auto Media Management tape feature is not enabled.
7. In the Cleaning area, leave the options for cleaning at their default (disabled) settings, so that automatic cleaning is not
invoked.
8. Select the Configuration tab.
9. In the Save Sessions area, set the number of concurrent save sessions (streams) and the number of nsrmmd (data mover)
processes the device may handle:
● Target Sessions is the number of sessions that a nsrmmd process on the device will handle before another device on
the host will take the additional sessions. Use this setting to balance the sessions among nsrmmd processes.
If another device is not available, then another nsrmmd process on the same device will take the additional sessions.
Typically, set this attribute to a low value. The default values are 4 for AFTDs and 6 for DD Boost devices. It may not be
set to a value greater than 60.
Multiple devices for a single volume configuration on page 98 provides details on volume sharing.
● Max Sessions is the maximum number sessions the device may handle. If no additional devices are available on the
host, then another available storage host takes the additional sessions, or retries are attempted until sessions become
available.
The default values are 32 for AFTDs and 60 for DD Boost devices, which typically provides best performance. It cannot
be set to a value greater than 60.
The Max Sessions setting does not apply to concurrent recover sessions.
● Max nsrmmd count limits the number of nsrmmd processes that can run on the device. Use this setting to balance the
nsrmmd load among devices. The default value is 4.
To modify this value, first adjust the sessions attributes, apply, and monitor the effects, then update max nsrmmd count.
At least one nsrmmd process is reserved for restore or clone operations.
10. In the Local Backup area, leave Dedicated Storage Node at No (the default).
11. In the Remote Host area, if a network path is specified in the Device Access Information, then type a Remote User
name and Password.
12. Click OK when the configuration is complete.
13. If a new password for an AFTD is provided, unmount and re-mount the device to ensure that the change takes effect.
Backup Target 97
● Device max sessions is 32 to avoid disk thrashing
If required, both device target, and max session attributes can be modified to reflect values appropriate for the environment.
NOTE: The Max Sessions setting does not apply to concurrent recover sessions.
2. In the Pools field, select the media pool to be used for the device.
A label for the storage device is generated and displays in the Volume Label field. The label name is based on the label
template for the selected pool.
98 Backup Target
It is recommended to use a pool that is dedicated to AFTD backup devices only.
NOTE: If an existing volume is re-labeled, a warning is issued. The data that is previously stored on the volume is lost
and this action cannot be undone. Mounting the volume without labeling provides access to previous data.
Immediately following the message, the action that is associated with the "Filesystem Full — Recover adv_file Space"
notification occurs. By default, the action for this notification uses the nsrim command to delete expired save sets. If enough
space is cleared, the backup continues. If the recycle setting for the volume is manual, then the expired save sets are not
removed from the volume.
The AFTD deletes expired save sets depending on the retention policy and the recycle setting. If sufficient storage space is not
available after 10 minutes from when the expired savesets begin deletion, the associated "Filesystem Full—Waiting for adv_file
Space" notification action occurs. By default, an email notification is sent to the root user on the NetWorker server on UNIX and
Linux, and a message is logged in the media log file in NetWorker_install_path\logs on Windows.
When the notification is sent, and the message is logged in the media log file, the backup stops until space is available for the
backup to continue. You can create customized notifications to change and expand how the NetWorker software behaves when
an "AFTD Filesystem Full" notification occurs. Custom notifications can also run custom scripts and other programs to expand
the capacity of existing AFTDs.
The chapter "Reporting NetWorker Datazone Activities" provides more information about how to configure notifications.
Backup Target 99
AFTD load balancing
You can adjust the target and max sessions attributes per device to balance the data load for simultaneous sessions more
evenly across available devices. These parameters specify the maximum number of save sessions to be established before the
NetWorker server attempts to assign save sessions to another device.
For AFTDs, all volumes, depending on the selection criteria (pool settings), choose the AFTD with the least amount of data
written to it, and join sessions based on the device's target and max sessions. If the number of sessions being written to the
first device exceeds the target sessions setting, another AFTD is considered for new backup sessions and is selected from the
remaining suitable AFTDs. The AFTD that is selected will be the AFTD with the least amount of NetWorker data written to it.
The least amount of data written is calculated in bytes (not by percentage of disk space used) and only bytes that were written
by NetWorker are counted.
To ensure that a new session always writes to the AFTD with the least amount of data written to it, you can set each AFTD
device's max sessions attribute to 1. However, setting the max sessions attribute to 1 may not be practical. Alternatively, set the
target sessions attribute to 1. In this way, load balancing will occur on a best efforts basis.
Disabling a device
Disabling a device prevents further operation of the device. The device may be re-enabled to restore old data, which is retained
but not active.
1. In the NMC window for your NetWorker server, click the Devices view and select the Devices folder in the navigation tree.
2. In the Devices table, right-click the device to be disabled and select Unmount.
3. Right-click this unmounted device and select Enable/Disable to disable.
4. Inspect the Enabled column of the table to verify that the device is disabled.
Deleting a device
The procedure for deleting a device includes an option for also erasing the volume (access path) that stores the device’s data.
The volume can be erased only if no other device in the system shares the volume.
1. In the NetWorker server Device view, click Devices in the navigation tree.
2. In the Devices table, right-click the device to be removed and select Delete.
A confirmation window appears.
As of HP-UX 11iv3, two different addressing modes are supported: LEGACY and AGILE. The inquire program lists devices
using the B.T.L. notation for the LEGACY addressing mode, for example:
scsidev@B.T.L.
For the AGILE addressing mode, it lists devices using the DSF notation, for example:
/dev/rtape/tape106_BESTnb
VTL licensing
The NetWorker Licensing Guide provides information about NetWorker licensing support for a Virtual Tape Library.
where input_file.txt is a text file that contains the following lines that you can customize to the own environment:
option regexp: on
. type: nsr device; media type: LTO Ultrium-3; media family: tape; name: /dev/rmt*
update max sessions: 4; target sessions: 4; device block size: 512KB
3. Create a no intra-block multiplexing (nibmp) tag file in the NetWorker debug folder on the NetWorker storage node.
For example, you can use the standard NetWorker installation paths for the tag file. You can limit the tag file path to a
specific pool by adding the _poolname variable as a suffix to the tag file. The _poolname can include spaces, for example,
_My Pool. On Microsoft Windows systems, ensure that the specified pathname is enclosed in quotes.
Unix/Linux system examples.
touch /nsr/debug/nibmp
touch /nsr/debug/nibmp_My Pool
Persistent binding
Persistent binding guarantees that the operating system always uses the same SCSI target ID for SAN devices, regardless
of reboots or other events, by statically mapping a target's WWN address to a desired SCSI address. On some operating
systems, this is done by default, while on others it has to be set manually. The operating system documentation provides further
information.
In most cases, persistent binding should also be set on the Host Bus Adapter (HBA) by using the configuration utility that comes
with the Fibre Channel HBA. The HBA device driver documentation provides details.
Persistent binding is required for consistent library operations within NetWorker, because the NetWorker server communicates
with the library controller over a SCSI address that is chosen during initial library configuration. If the SCSI address changes, the
library will become unavailable. In this case, disable the library and change the “control port” address to reflect the new SCSI
address of the library controller.
If devices have already been configured in NetWorker prior to enabling persistent binding on the host, delete existing devices
from the library resource and perform a re-scan of devices followed by a reconfiguration of the tape library.
Persistent naming
Persistent naming is used to ensure that the operating system or device driver of a server always creates and uses the same
symbolic path for a device (referred to as device file).
After you create persistently named device files and they are present on the host, enable the Use persistent names option
when scanning for tape devices from the NetWorker Management Console.
Configure libraries
A library resource must be created on a storage node for each library, including silos, that you want to use with NetWorker.
Because the NetWorker server is also a storage node, this procedure applies to a NetWorker server and all storage nodes. You
can configure a library either automatically with the Configure All Libraries wizard or manually with the user interface.
Before you create devices, you must create the storage node that will manage the devices. Storage nodes on page 80 provides
details. When you create the new devices, you can use NetWorker to perform a device scan, which searches for new devices
across multiple storage nodes.
NetWorker can only automatically create tape devices that have serial numbers. Use the inquire or sn commands to
determine if a device returns a serial number. UNIX man page and the NetWorker Command Reference Guide provides detailed
information about how to use the inquire and sn commands.
NetWorker can automatically configure the following library types:
● SCSI
● NDMP
● ACSLS Silo
Use the jbconfig command to configure a library that contains tape devices or a robotic arm that does not have serial
numbers. Use the jbconfig command to configure IBM tape libraries that are controlled through the use of the IBMs tape
driver. This is because the device autodetection code uses the internal lus driver to control libraries.
NOTE: Before you create devices on a storage node, update the devices to the most recent firmware and driver versions.
The Configure All Libraries wizard appears. This lets you step through library configuration, including this input (some of
which is filled in by default):
4. After specifying the required information, click Start Configuration. The configuration window displays a message that the
Configure All Libraries process has started. The status of the configuration activity can be viewed by the Monitoring > Log
screen.
5. When the configuration is complete, click Finish to close the configuration wizard. If problems occur during configuration,
you can click the Back button on the configuration window to adjust the settings.
6. Click OK.
NOTE: If unmatched volume and barcode labels are to be used, ensure that labels are attached to the outside of the
volumes.
1. Apply barcode labels to the volumes.
2. Place the volumes with the barcode labels in the library.
3. In the Administration window, click Devices.
4. Open the Libraries folder. The Libraries detail table appears.
5. Right-click the appropriate library, and select Properties. The Properties window appears.
6. Select the Configuration tab.
7. In the Media Management area of the Configuration tab:
● Select Bar Code Reader.
● Ensure that Match Bar Code Labels is not selected.
8. Click OK. The NetWorker server uses the next available label from the label template for the volume name. It labels the
volumes and records both labels in the media database.
9. Inventory the volumes to ensure that the NetWorker server has the most current volume information.
10. Use Media > Volumes to match the correct volume labels to the barcode labels. Consider making a list of the name
correlations.
NOTE: If the barcode function is enabled, but no barcode label is affixed to the volume, an error message indicates that
a barcode label does not exist.
Labeling volumes
The NetWorker software applies a label template to create a unique internal label for each volume. The label corresponds to a
pool and identifies the pool for the volume during backup and other operations.
Several preconfigured label templates are supplied with the NetWorker software. You cannot delete these preconfigured label
templates. Naming label templates on page 67 provides more information.
When you label a volume, the labeling process:
● Writes a label on the volume.
● Adds the volume label to the media database.
● Prepares tape media to have data written to it.
When you re-label tape, the data on the tape is effectively gone.
During data recovery, the server requests the volume that contains the required data, identifying the required volume by the
name with which it was labeled.
Label templates
Several preconfigured label templates are supplied with the NetWorker software. These preconfigured label templates cannot be
deleted. Naming label templates on page 67 provides more information about label templates and preconfigured label template.
6. To be prompted before the existing label is overwritten, select Prompt to overwrite label.
7. Click OK.
The Library Operation dialog box appears, stating that the library operation has started.
8. To track the status of the label operation, click Monitoring in the Administration window.
9. If you selected Prompt to overwrite label, confirm the overwrite of the existing volume label with a new label:
a. Right-click the label operation in the Monitoring window and select Supply Input.
A confirmation message appears.
b. Click Yes.
Barcode labels
The option to label a library volume with a barcode is available during automatic device configuration. This option can be set in
the library’s Properties tab after configuration.
Barcode labels make volume inventory fast and efficient. They eliminate the need to mount the volumes in a device. The library
scans the external barcode labels with an infrared light while the volumes remain in their slots. Inventorying with barcode labels
greatly reduces the time needed to locate a volume or determine the contents of a library.
Barcode labels also provide greater labeling accuracy. The labels are placed on the volumes before the volumes are loaded and
scanned in the library. Once the library has scanned the barcode, the NetWorker server records and tracks the label in the media
database. The NetWorker server uses barcode labels only to inventory volumes. A volume must have a label, but it need not
have a barcode label.
NOTE: Libraries include hardware that reads barcode labels. The barcode information is then forwarded to the NetWorker
server. Problems reading barcode labels indicate hardware problems. In the event of a barcode-related problem, consult the
library’s documentation or the hardware vendor.
NOTE: The drive must be manually reset to Enabled for the NetWorker software to use the device again.
Reconfiguring a library
Use this procedure to reconfigure a tape library.
To reconfigure a library or to add or remove access paths to the devices in a library, use an account with the Configure
NetWorker privilege. This includes access paths that allow libraries to be shared.
NOTE: The following procedure does not support adding NDMP devices to a non-NDMP library if both the NDMP server
and the NetWorker storage node are on the same host. Instead, use the jbedit command.
1. Run Scan for Devices, in case a device path has been added to, or removed from, the library since the latest scan.
2. In the server’s Administration window, click Devices.
3. Select Libraries in the navigation tree. The Libraries detail table appears.
4. In the navigation tree, right-click the entry for the library to be reconfigured, or open the Storage Nodes folder, open the
library folder, and then right-click the library entry there.
5. Select Reconfigure Library. The Reconfigure Library window appears. Note that the storage node name and library name
cannot be changed in this window.
6. Make appropriate changes in the Configure devices on various storage nodes using existing drive connectivity area,
selecting or clearing checkboxes as necessary, or using the buttons at the right side of the area (Check All, Clear All,
Reset).
Drives that are already configured to be used by the library display check marks in the boxes that are adjacent to their
names:
2. In the server’s NetWorker Administration interface, select View > Diagnostic Mode from the menu bar.
3. Click Devices.
Reset a library
A library must be reset each time the library and the NetWorker software become out of sync. A library reset can be done using
either the Administration interface or the command prompt.
4. Right-click a library in the Device column, and select Reset. You are prompted to reset the library.
5. Click Yes. The Library Operation window appears and displays this message:
6. Click OK.
Deleting libraries
The library's devices remain, and can still respond to NetWorker operations (such as monitoring, labeling, deletion, and so on)
after the library definition is deleted. A deletion of a library deletes the library, not its devices.
"Are you sure you want to delete this jukebox? If so, please re-attempt
deletion within a minute."
Library notifications
The NetWorker server uses notifications to send messages about NetWorker events. Several preconfigured notifications, such
as the following, provide information about various situations:
● Volumes in the library are 90% full
● Library needs more volumes to continue
● Library has a mechanical problem
● Library device needs cleaning
● Cleaning cartridge needs attention.
The NetWorker software automatically mounts a required volume as long as the volume is loaded in the library. If a recovery
operation requires a volume that is not loaded in the library, the Tape mount request 1 notification sends an alert to Monitoring >
Alerts, with a request to do something with a specific volume.
After a library problem is corrected, it might be necessary to mount a volume so the NetWorker server can continue to back up
or recover files.
2. Once the library is in disabled mode, use the library's front panel to add and remove tapes.
3. In the Properties window for the Library, on the General tab, set Status Enabled to Enabled.
4. Inventory the library. Inventorying library volumes on page 124 has information about inventorying libraries.
6. Click OK.
b. Select a pool on the Pools menu. The NetWorker server automatically applies the label template that is associated with
the Default pool unless a different pool is selected.
c. Select the Manual Recycle attribute if the volume should be manually recycled.
If the Manual Recycle attribute is enabled when the volume is labeled, the volume cannot automatically be marked
as recyclable according to the retention policy. When a volume is marked as manual recycle, the NetWorker server
disregards the assigned browse and retention policies. Therefore, only an administrator can mark the volume recyclable.
A volume that has been set to manual recycle retains that setting, even after re-labeling. A Manual Recycle policy cannot
be changed back to Auto Recycle by clearing the Manual Recycle checkbox. The volume must be explicitly reset to use
auto recycle.
d. The Mount After Labeling attribute is selected by default. The NetWorker server automatically labels the volume, and
then mounts the volume into the device.
5. Click OK.
6. If the volume is recyclable, a message warns that the named volume is about to be recycled, and asks whether to continue.
Click Yes to re-label and recycle the volume.
7. After a volume is labeled and mounted in a device, the volume is available to receive data. Since the NetWorker label is
internal and machine-readable, place an adhesive label on each volume that matches that internal volume label.
Configuring a library to use volumes with barcodes on page 114 provides information on using barcode labels.
NOTE: If you are in the process of re-labeling a mounted volume and you choose not to overwrite the existing label, the
volume is left in an unmounted state. To use this volume, mount it again.
9. Click OK.
● The Library Operation window displays this message:
The library operation has started.
● The Monitoring > Operations screen displays its status.
The NetWorker software then inventories the specified slot.
1. Ensure that the volume to be withdrawn is in a known slot, and that the CAP has an empty port to hold the withdrawn
volume.
2. In the Administration window, click Devices.
3. Select Libraries in the navigation tree. The Libraries detail table appears.
4. Double-click the library from which the volume is to be NetWorker Command Reference Guide withdrawn. The Libraries
detail table changes to the double-paned library operations view.
5. Right-click the slot that contains the volume, and select Eject/Withdraw.
You are prompted to withdraw the volume.
6. Click Yes.
● The Library Operation window displays this message:
The library operation has started.
● The Monitoring > Operations screen displays the status.
7. Click OK.
8. To review the result, select Monitoring > Log. A successful Eject/Withdraw operation ends with a Succeeded comment
in the log.
8. Click OK. If the volumes do not have barcode labels, the NetWorker software must mount each volume, read its label, and
unmount it. In this case, the inventory process can take some time to complete.
Library maintenance
Periodically clean a storage library to keep it working correctly. The NetWorker server provides automatic cleaning of devices
located in libraries. The server does not support automatic cleaning for stand-alone devices. Cleaning is an option set during
configuration.
The service mode feature allows a library to be taken offline temporarily for cleaning or other maintenance.
NOTE: Do not enable automated cleaning for silos in the NetWorker software. The automated device cleaning feature
cannot be used in a silo, because it depends on fixed slot numbers. For information about how to clean devices in a silo,
refer to the silo manufacturer’s software documentation.
1. In the server’s NetWorker Administration interface, click Devices.
2. Open the Libraries folder in the navigation tree and select the drive that contains the mounted volume with the block size
being checked. The drive’s detail table appears.
3. Right-click the drive in the detail table, and select Properties. The Properties window appears.
4. Select the General tab.
Tape alert
The TapeAlert feature provides, among other things, diagnostic information for devices for which hardware cleaning is enabled.
NetWorker provides the following attributes for tape device cleaning:
● Cleaning required
● Cleaning interval
● Date last cleaned
When the Common Device Interface (CDI) is enabled, TapeAlert attributes provide tape drive status. SCSI Commands must be
selected for the CDI attribute on the Configuration tab of the relevant device’s Properties. If CDI cannot be enabled, TapeAlert
is not supported.
Devices that are capable of TapeAlert perform constant self-diagnostics and communicate the diagnostic information via the
nsrmmd program to logs that can be viewed in the Monitoring task.
The following TapeAlert attributes are found in the device’s Properties, on the Volume tab.
● TapeAlert Critical: Displays critical diagnostic information, such as for media or drive failure, when user intervention is urgent
and data is at risk.
● TapeAlert Warning: Displays a message when the media or device needs servicing.
● TapeAlert Information: Displays status information.
The following table describes the nature of the tape alert levels.
The messages indicate tape and drive states related to tape drive read/write management, cleaning management, or drive
hardware errors.
Informative messages
Informative messages indicate status information:
● A data or cleaning tape is nearing its end of life.
● A tape format that is not supported.
NOTE: When automatic cleaning is enabled, a diagnostic message to indicate that a drive needs cleaning initiates
NetWorker drive cleaning.
Critical messages
Critical messages are warnings that a drive might be disabled and requires immediate attention to avoid data loss:
● Unrecoverable read or write errors occurred.
● Tape is marked read-only.
● Drive require immediate cleaning.
● Drive is predicting hardware failure.
Informative and warning messages should clear automatically by nsrmmd once the reported issue is handled.
Critical messages about hardware errors are not cleared by nsrmmd because they might indicate intermittent hardware
problems.
The NetWorker Command Reference Guide or the UNIX man page provides a detailed description of the jbedit command, its
options, and associated diagnostic messages.
Device ordering
The NetWorker server uses logical device names assigned by the operating system when communicating with devices. It is
possible for the operating system to re-associate logical device names with the physical addresses of the devices, generally
after rebooting the host or after plug-and-play events. This may cause device reordering, where the physical device will have
a different device filename. As a result, tape devices configured in the NetWorker software no longer match the names of the
devices as recognized by the operating system.
If device reordering occurs, the NetWorker software is unable to use any affected drives until the configuration is manually
corrected.
The NetWorker server detects device reordering events by comparing the current serial number of the device to the serial
number of the device at configuration. If the serial numbers do not match, the NetWorker server stops all operations on
that device and an error message will be posted, similar to the alert identified for device serial number mismatch in the table
Preconfigured notifications on page 499. CDI must be enabled for this functionality. Setting the common device interface on
page 133 provides more information about enabling CDI.
sjisn scsidev@bus.target.lun
where bus.target.lun is the SCSI address of the robotic arm returned by the inquire command in step 1, for example, 1.2.0.
3. Match the serial numbers of the devices in the sjisn output to the device names that correspond to these serial numbers in
the inquire -cl output. This will give you the current device order by device filename.
4. Execute the nsrjb command to determine the order of devices as configured in NetWorker. Drive entries towards the end
of the nsrjb output list the device order as configured in NetWorker.
5. Compare the device ordering as determined in step 3 and step 4. If the device ordering in these two steps do not match, the
device ordering has changed and the library will need to be reconfigured.
“Check system device ordering. Moving device on %s to . To correct, scan for devices in
NMC and re-enable the device.”
An Event ID for the error is also created, which will be removed along with the alert when the problem is resolved. You can
resolve the problem and clear the error message.
1. Disable the drive.
2. Perform one of the above procedures to correct the problem.
3. Re-enable the drive, and retry the operation that was being performed prior to receiving the error.
The Alert will be removed and the event dismissed.
Device calibration
For information about the frequency and method for calibrating the loading mechanism for the device, refer to the library
manufacturer’s documentation.
where:
○ MEDIA_TYPE is the backup device type available to the NetWorker server (also found in the Media Type attribute
on the General tab of the device’s properties). The media type syntax must be all uppercase, with underscores (_)
replacing blank spaces and hyphens. Therefore, a device displayed in the NetWorker software as "8mm Mammoth-2"
would be listed as:
8MM_MAMMOTH_2
○ value must be a multiple of 32 KB, with a minimum value of 32 KB.
● On Microsoft Windows only, install a later model HBA, or upgrade to drivers that can support up to 128 KB blocks.
Windows also accepts the same environment variable format as UNIX to set block size.
2. Restart the NetWorker server in order for changed environment variables to take effect.
NSR_DEV_BLOCK_SIZE_MEDIA_TYPE
NSR_DEV_BLOCK_SIZE_MEDIA_TYPE is organized in units of kilobytes. This environment variable will cause NetWorker to
override the default block-size setting defined for the tape drive in the operating system. The value set must be a multiple of 32,
with a minimum value of 32. Maximums are determined by platform, SCSI driver, and device.
For example:
NSR_DEV_BLOCK_SIZE_4MM_20GB=64
For information about using this environment variable to set block-size compatibility between UNIX and Microsoft Windows.
SCSI data block size issues between UNIX and Windows on page 129 provides more information.
NSR_DEV_LOAD_TIME_MEDIA_TYPE
NSR_DEV_LOAD_TIME_MEDIA_TYPE is the number of seconds that nsrmmd polls and waits for a drive to become ready
after the library inserts a tape into the device. NSR_DEV_LOAD_POLL_INTERVAL_MEDIA_TYPE is used to set the number of
seconds nsrmmd waits between polls during load time.
If the value of NSR_DEV_LOAD_TIME_MEDIA_TYPE is too short, there could be unnecessary load failures. If it is too long, then
labeling new tapes takes longer than necessary. The minimum allowable value is 10 seconds. The maximum value is 600 seconds.
For example:
NSR_DEV_LOAD_TIME_DTL8000=300
NSR_DEV_LOAD_POLL_INTERVAL_MEDIA_TYPE
NSR_DEV_LOAD_POLL_INTERVAL_MEDIA_TYPE is the number of seconds that nsrmmd waits between each attempt to read
a newly inserted tape. The minimum allowable value is 1 second, the maximum value is 30 seconds. For example:
NSR_DEV_LOAD_POLL_INTERVAL_DLT=10
NSR_DEV_LOAD_TRY_LIMIT_MEDIA_TYPE
NSR_DEV_LOAD_TRY_LIMIT_MEDIA_TYPE is the number of times that nsrmmd will attempt to open a drive. The nsrmmd
program will poll the drive until the limit set in NSR_DEV_LOAD_TIME_MEDIA_TYPE is reached. After the limit is reached, it will
retry until the NSR_DEV_LOAD_TRY_LIMIT_MEDIA_TYPE is reached. The default value and minimum allowable value is 2, the
maximum value is 120.
NSR_DEV_LOAD_TRY_LIMIT_DLT=4
NSR_DEV_DEFAULT_CAPACITY_MEDIA_TYPE
NSR_DEV_DEFAULT_CAPACITY_MEDIA_TYPE is the size of the particular tape used to base the percent full calculation. This
variable value has no effect on the actual tape capacity. Any integer value is allowed, with a KB, MB or GB designation to
indicate a range of values. Any value less than 200 MB will be overridden by the normal default capacity. There is no obvious
maximum, with the only practical limitation being the actual storage size. For example:
NSR_DEV_DEFAULT_CAPACITY_DTL7000=12GB
When device parameters are set in this interface, it is not necessary to stop and restart the NetWorker server in order for the
settings to take effect.
ENV_VAR_NAME = value
export ENV_VAR_NAME
3. Stop and start the NetWorker server processes in order for the environment variables to take effect.
In this situation, create an empty file named /nsr/debug directory and create an empty file that is named cdidisable.
Then restart the NetWorker server. The presence of this file disables the use of CDI for that server and all the storage nodes
that are controlled by that server.
NOTE: Use of CDI does not change what is written to tape. A tape that is written with CDI enabled can be read with
CDI disabled. Conversely, a tape that is written with CDI disabled can be read with CDI enabled. The CDI feature enables
NetWorker software to collect better diagnostic information and facilitates tape usage when enabled. Only set or disable
the CDI feature on the advice of an Customer Service representative. If tape or SCSI issues occur while the CDI feature
is enabled, contact Customer Service.
Re-enabling a device
Once the number of retries equals the Max Consecutive Errors value, the device becomes disabled. After the problem that
disabled the device has been fixed, the device (drive) must be reenabled before it can be used again.
1. When the NetWorker computer is idle, remove any volume from the disabled drive and ensure that the drive is in good
working order.
2. In the Administration window, click Devices. The Devices detail table appears.
3. Right-click the drive to be reenabled, and select Properties. The Properties window appears.
4. In the Status area of the General tab, set Enabled to Yes.
5. Click OK.
If the disabled drive is part of a library, it might be necessary to reset the device. To do this:
6. From the command prompt, change the path to the directory that contains the NetWorker binaries.
7. Type this command:
nsrjb -HE
NOTE: A device retains it enabled or disabled status in the Properties window and in the Devices detail table regardless
of whether its storage node is enabled or disabled. Therefore, it is possible that the storage node Properties window is
set to disabled while its devices appear to be enabled in the GUI.
Silo libraries
This section describes silos and silo devices. Silos and libraries are managed similarly by NetWorker software.
A silo tape library (STL) is a peripheral that usually contains many storage devices.
Silos libraries have a robotic controller that moves tape media between slots and devices. Silos do not use a SCSI interface to
access and control the media movements. Media movements are controlled by a separate host that is called the silo server. The
silo server uses silo management software to manage media movement requests over the network. The silo vendor provides the
silo management software. The silo server cannot be the same computer as the NetWorker server.
Installing a silo
1. Install the silo management software on the silo server.
2. If required, install the STLI library on the NetWorker server. For more information, refer to the documentation from the silo
vendor.
For example, for a NetWorker server or storage node running Windows to control an STK silo, the libattach program must be
installed.
On UNIX systems, do not install the STLI library because all the necessary software is installed when the NetWorker
software is installed.
3. Ensure that the NetWorker server is properly connected to the media devices in the silo.
4. Add the silo. Configuring silo libraries on page 136 provides further details.
The Configure All Libraries wizard appears, and allows the user to step through library configuration, including the
following input (some of which is filled in by default):
● Library type (select STL Silo).
● Adjust the Enable New Device option, if required.
● Current server sharing policy (use maximal sharing with Dynamic Drive Sharing [DDS]).
● Storage nodes on which the libraries should configure. You can select a storage node to see its details that are displayed.
If the appropriate storage node is not listed, click Create a New Storage Node. When creating a storage node, replace
the default value in the Name field with the name of the new storage node:
a. Update storage node properties, if required.
b. Type the Silo Controller count, which sets the number of silos to be configured for the selected storage node. The
default is 1. If a silo count of greater than one is selected, then a library name and hostname must be typed for each
one.
c. Type the Hostname of the silo controller.
d. (Optional) Use the Test Silo Controller Connectivity button to see whether the connection to a silo controller
works. Use it once for each silo. If the connection to a given silo fails, an error message appears.
4. Click Start Configuration after filling in the requested information. The Configuration window displays a message that the
Configure All Libraries process has started, and that the configuration activity can be viewed by checking the Monitoring >
Log screen for status.
5. Click Finish on the Configuration window to close the configuration wizard. If problems occur during configuration, then
the Back button on the Configuration window becomes active, which allows the user to return to the input screen to
adjust input.
6. Click OK.
7. Repeat all steps for each device to be released.
The following commands should also be running on the system and can be
in the NetWorker startup script:
● <binaries_path>/mini_el &
● <binaries_path>/ssi &
1. Create a Bourne shell script file named/nsr/nsrrc on the NetWorker server if it does not already exist.
2. Add the variables in this format:
ENV_VAR_NAME = value
export ENV_VAR_NAME
3. Stop and start the NetWorker server daemons in order for the environment variables to take effect.
Barcode IDs
A list of available barcode-labeled volumes is available from the silo management software. Refer to the silo manufacturer’s
documentation for how to generate the list of barcode IDs.
To specify a barcode identifier or template for the volumes from a command prompt, use the -T option with the nsrjb
command. The UNIX man page and the NetWorker Command Reference Guide provides detailed information about the nsrjb
command.
8. Click OK.
The Library detail table displays the added volumes.
Inventory silos
Taking inventory of the volumes in a silo ensures that the mapping between slot number and volume name is correct, or
reconciles the actual volumes in a silo with the volumes listed in the NetWorker media database.
The slot number of a silo volume is not a numbered slot inside the silo, as it is in a library. The slot number of a silo volume is the
number of the volume’s position in the list of volumes in a silo.
The tasks for inventorying volumes in a silo are the same as those for a library. Inventorying library volumes on page 124
provides information about inventorying a library.
The NetWorker software examines all of the volumes in the silo and compares the new list of volumes to the NetWorker media
database. Then the NetWorker software produces a message listing any volumes located in the silo that are not in the media
database.
When the NetWorker software inventories a silo, the silo’s barcode label reader reads the barcode labels on the outside of each
volume. When a barcode matches an entry in the NetWorker media database, the volume does not need to be loaded. The
inventory proceeds rapidly. If, however, the NetWorker software reads a barcode that does not match any of the entries in the
media database, the volume must be mounted and read in order for a proper inventory to be taken.
Troubleshooting a silo
If the particular silo model does not automatically deposit the volume, then place the volumes in the insert area, right-click the
volume, and select Deposit.
To perform the Deposit and Add operations from a command prompt:
● On silos that require manual depositing, type nsrjb -a -T tags -d
● On silos where the silo management software deposits volumes automatically, such as StorageTek silos, type
nsrjb -a -T tags
where:
○ tags specifies the tags or barcodes of volumes in a remote silo.
○ -d performs the manual deposit.
NetWorker software interactions with a silo on page 135 provides more information on STLIs.
9. Click OK. Notice that on return to the Libraries detail table, the removed volumes are no longer listed.
NetWorker software interactions with a silo on page 135 provides information on STLs.
NDMP libraries
NDMP libraries or devices are accessed by using the NDMP protocol and are typically used by network attached storage (NAS)
systems. These devices do not allow direct access to control from the host operating system. Control and data movement is
performed over the network by using the NDMP protocol.
The NDMP guide provides more information.
Introduction to DDS
DDS controls application requests for tape media and allows the NetWorker server and all storage nodes to access and share all
attached devices.
A system administrator can configure DDS by setting a sharing policy for devices that are accessible from multiple storage
nodes.
There are two terms that are central to the use of DDS are drive and device. Within the context of DDS, these terms are
defined as follows:
● Drive—The physical backup object, such as a tape drive, disk, or file.
● Device—The access path to the physical drive.
NOTE: NetWorker only supports DDS in a storage area network (SAN) Fibre Channel environment and not in a
direct-connect SCSI environment.
Benefits of DDS
Enabling DDS on a NetWorker system provides these benefits:
● Reduces storage costs—You can share a single tape drive among several storage nodes. In fact, since NetWorker software
uses the same open tape format for UNIX, Windows, NetWare and Linux, you can share the same tape between different
platforms (assuming that respective save sets belong to the same pool).
● Reduces LAN traffic—You can configure clients as SAN storage nodes that can send save sets over the SAN to shared
drives.
● Provides fault tolerance—Within a SAN environment, you can configure hardware to eliminate a single point of failure.
In this figure:
● Storage nodes sn_1 and sn_2 are attached to the library.
● Each storage node, on its own, has access to drive_1 and drive_2.
● With DDS enabled, both storage nodes have access to both drives and can recognize when a shared drive is in use.
This configuration requires two DDS licenses, one for each drive.
NOTE: Ensure that all applicable devices can be seen from each storage node by running the inquire -l command
locally on each storage node.
Hardware ID attribute
The Hardware ID attribute tracks the drives that are shared between multiple hosts. Device instances that share the same
physical drive across multiple hosts have the same hardware ID. The device autoconfiguration process automatically assigns the
Hardware ID to a device, or it is added when manually configuring a device. Users cannot edit the Hardware ID.
You can view the Hardware ID in the Properties window for a device, on the General tab, in the Device Sharing area.
NetWorker generates the Hardware ID when a device is scanned or configured. The Hardware ID consists of the following
components:
● Hardware serial number
● Device type
● Worldwide part number (WWPN)
● Worldwide name (WWN)
You cannot configure the Shared Devices attribute with the jbconfig program.
The Volume Default Capacity attribute displays on the Configuration tab of the Device properties when Diagnostic Mode (View
> Diagnostic Mode) is enabled:
● To avoid accidentally filling an FTD, set the Volume Default Capacity attribute to restrict the size of the device. For example,
if a capacity of 100 MB is set, then the device will be marked full when 100 MB is reached.
● Volume Default Capacity attribute must not be set to a value of more than 4 TB.
● If the Volume Default Capacity of a volume changes, the changes do not take effect until the FTD is re-created, the
directory contents are deleted, and the volume is relabeled.
NOTE: If the FTD is used before the Volume Default Capacity attribute is set, then the legacy data on that FTD must be
staged or cloned to another device. Otherwise, this data will be overwritten.
Stand-alone devices
A Device resource must be created for each stand-alone tape device on a storage node. Stand-alone drives must be configured
individually.
Storage nodes must have been created before devices can be configured to be used by them. Storage nodes on page 80
provides information about storage nodes and how to create them. Note that all scanning for devices is done at the storage
node level, and can be done across multiple storage nodes. Only devices that have serial numbers can be autoconfigured. Use
the jbconfig command to configure devices that do not have serial numbers.
NOTE: Devices must be updated to the most recent firmware and drivers.
6. Click OK.
b. Select a pool on the Pools menu. The NetWorker server automatically applies the label template that is associated with
the Default pool unless a different pool is selected.
c. Select the Manual Recycle attribute if the volume should be manually recycled.
If the Manual Recycle attribute is enabled when the volume is labeled, the volume cannot automatically be marked
as recyclable according to the retention policy. When a volume is marked as manual recycle, the NetWorker server
disregards the assigned browse and retention policies. Therefore, only an administrator can mark the volume recyclable.
A volume that has been set to manual recycle retains that setting, even after re-labeling. A Manual Recycle policy cannot
be changed back to Auto Recycle by clearing the Manual Recycle checkbox. The volume must be explicitly reset to use
auto recycle.
d. The Mount After Labeling attribute is selected by default. The NetWorker server automatically labels the volume, and
then mounts the volume into the device.
5. Click OK.
6. If the volume is recyclable, a message warns that the named volume is about to be recycled, and asks whether to continue.
Click Yes to re-label and recycle the volume.
7. After a volume is labeled and mounted in a device, the volume is available to receive data. Since the NetWorker label is
internal and machine-readable, place an adhesive label on each volume that matches that internal volume label.
Configuring a library to use volumes with barcodes on page 114 provides information on using barcode labels.
NOTE: If you are in the process of re-labeling a mounted volume and you choose not to overwrite the existing label, the
volume is left in an unmounted state. To use this volume, mount it again.
9. Click OK.
● The Library Operation window displays this message:
The library operation has started.
● The Monitoring > Operations screen displays its status.
The NetWorker software then inventories the specified slot.
Labeling volumes
The NetWorker software applies a label template to create a unique internal label for each volume. The label corresponds to a
pool and identifies the pool for the volume during backup and other operations.
Several preconfigured label templates are supplied with the NetWorker software. You cannot delete these preconfigured label
templates. Naming label templates on page 67 provides more information.
When you label a volume, the labeling process:
● Writes a label on the volume.
● Adds the volume label to the media database.
● Prepares tape media to have data written to it.
When you re-label tape, the data on the tape is effectively gone.
During data recovery, the server requests the volume that contains the required data, identifying the required volume by the
name with which it was labeled.
6. To be prompted before the existing label is overwritten, select Prompt to overwrite label.
7. Click OK.
The Library Operation dialog box appears, stating that the library operation has started.
8. To track the status of the label operation, click Monitoring in the Administration window.
9. If you selected Prompt to overwrite label, confirm the overwrite of the existing volume label with a new label:
a. Right-click the label operation in the Monitoring window and select Supply Input.
A confirmation message appears.
b. Click Yes.
NOTE: Do not change time related attributes unless advised to do so by a Technical Support representative.
Maintenance commands
NetWorker device driver software provides maintenance commands, such as lusbinfo and lusdebug, that you can use to
diagnose problems on tape devices and autochangers.
The UNIX man page and the NetWorker Command Reference Guide provides detailed information about how to use these
commands.
To resolve the problem, use the nsrjb -H command to reset the autochanger.
To resolve this issue, set the auto_lock setting attribute to “0” (Off) in the /etc/stinit.def file for the following
drive types:
● Sony AIT-2 and AIT-3
● IBM LTO Gen1
● HP LTO Gen1
● IBM LTO GEN2
● IBM 3580 drive LTO-1
● IBM 3592 J1A
● Quantum DLT 7000
By default the auto_lock setting is set to 1 (On).
● If inquire reports the serial number of the arm, follow the procedure at Scanning for libraries and devices on page 112 to scan
the library for devices, then enable the library in NMC:
a. In the Administration window, click Devices.
b. Expand the Libraries folder, then right-click the library and select Enabled/Disable.
● If inquire does not report the serial number or if the scan for devices operation does not detect the control port change, use
the nsradmin command to change the control port:
a. Log in as root or as Windows administrator on the NetWorker host that manages the control port.
where b.t.l is the bus.target.lun of the library’s robotic arm (as reported by the inquire command).
f. When nsradmin prompts you to update the resource, type yes.
g. To re-enable the library, type:
update enabled: yes
h. When nsradmin prompts you to update the resource, type yes.
i. To verify that the control port was changed and the library is now enabled, type print at the nsradmin prompt.
To resolve this issue, changes the sleep attributes in the Autochanger resource.
1. Shut down NetWorker services.
2. Shut down and restart the autochanger that contains the TZ89 drives.
3. When the autochanger is back online, restart NetWorker services. NetWorker will not try to unload the drive again.
4. Use NMC to edit the following autochanger sleep time attributes, and use the following values:
● Eject Sleep: 18 secs
● Unload Sleep: 40 secs
● Load Sleep: 40 secs
Additional attributes in the Autochanger resource on page 152 provides information about how to set the sleep attributes.
5. Try to unload the drive again. If the drive fails to unload, repeat this procedure and increase the sleep times.
To avoid this message, do not enable the CDI attribute for these device types.
Solaris
The st.conf file contains a setting for each device type in use that enables or disables the SCSI reserve/release feature. The
Tape Configuration section of the st man page provides more information. Use the most up-to-date st driver that is available
for the version of Solaris.
Edit the st.conf file only if one of the following conditions apply:
● The NetWorker configuration includes DDS.
● Solaris st does not support a tape drive that is configured on a Solaris host.
To determine if the Solaris st tape driver supports a tape drive, perform the following steps:
1. Use the mt command to load a tape in the drive. For example, with the tape device file 0cbn, the type: mt -f /dev/rmt/
0cbn status
● If the output of the mt command includes the line SCSI tape drive or appears similar to the following, the st tape driver
uses generic settings, which do not support the tape drive:
mt -f /dev/rmt/4cbn status
Vendor 'IBM ' Product 'ULT3580-TD2 ' tape drive:
sense key(0x6)= Unit Attention residual= 0
retries= 0 file no= 0 block no= 0
Tape operations may appear to work in NetWorker but you may run into problems when you try to recover saved data.
● If the output of the mt command appears similar to the following, the st tape driver recognizes the drive and uses the
correct internal settings to manage the drive:
mt -f /dev/rmt/0cbn status
HP Ultrium LTO tape drive:
sense key(0x0)= No Additional Sense residual= 0
retries= 0 file no= 0 block no= 0
In this configuration, you must only edit the st.conf file when you use the drive in a DDS configuration.
AIX
To reset the reserve/release setting on an AIX operating system, use the SMIT interface.
1. From the Devices menu, select Tapes.
2. Change the value for the RESERVE/RELEASE support attribute from No to Yes.
HP-UX
To reset the reserve/release setting on an HP-UX 11 operating system, perform the following steps.
1. Change the st_ats_enable kernel variable to a value other than zero.
2. (Optional) Restart the computer to ensure that the operating system implements the change.
NOTE: The reserve/release is a fixed setting in HP-UX 10.
NOTE: NMC also includes a pre-configured Server Protection policy to protect the NetWorker and NMC server databases.
Platinum policy
The Platinum policy provides an example of a data protection policy for an environment that contains supported storage arrays
or storage appliances and requires backup data redundancy. The policy contains one workflow with two actions, a snapshot
backup action, followed by a clone action.
Gold policy
The Gold policy provides an example of a data protection policy for an environment that contains virtual machines and requires
backup data redundancy.
Silver policy
The Silver policy provides an example of a data protection policy for an environment that contains machines where file systems
or applications are running and requires backup data redundancy.
Bronze policy
The Bronze policy provides an example of a data protection policy for an environment that contains machines where file systems
or applications are running.
NOTE: For more information on configuring a new data protection policy using the NetWorker Management Web UI, see
the NetWorker Management Web User Interface Online Help.
Creating a policy
1. In the Administration window, click Protection.
2. In the expanded left pane, right-click Policies, and then select New.
The Create Policy dialog box appears.
3. On the General tab, in the Name field, type a name for the policy.
The maximum number of characters for the policy name is 64.
● Legal Characters: _ - + = # , . % @
● Illegal Characters: /\*:?[]()$!^;'"`~><&|{}
where:
○ -s subject—Includes a standard email header with the message and specifies the subject text for that header.
Without this option, the smtpmail program assumes that the message contains a correctly formatted email header
and nothing is added.
○ -h mailserver—Specifies the hostname of the mail server to use to relay the SMTP email message.
○ recipient1@mailserver—Is the email address of the recipient of the notification. Multiple email recipients are
separated by a space.
7. To specify the Restricted Data Zone (RDZ) for the policy, select the Restricted Data Zones tab, and then select the RDZ
from the list.
8. Click OK.
Create the workflows and actions for the policy.
where:
○ -s subject—Includes a standard email header with the message and specifies the subject text for that header.
Without this option, the smtpmail program assumes that the message contains a correctly formatted email header
and nothing is added.
○ -h mailserver—Specifies the hostname of the mail server to use to relay the SMTP email message.
○ recipient1@mailserver—Is the email address of the recipient of the notification. Multiple email recipients are
separated by a space.
8. In the Running section, perform the following steps to specify when and how often the workflow runs:
a. To ensure that the actions that are contained in the workflow run when the policy or workflow starts, in the Enabled
box, leave the option selected. To prevent the actions in the workflow from running when the policy or workflow that
contains the action starts, clear this option.
b. To start the workflow at the time that is specified in the Start time attribute, on the days that are defined in the action
resource, in the AutoStart Enabled box, leave the option selected. To prevent the workflow from starting at the time
that is specified in the Start time attribute, clear this option.
c. To specify the time to start the actions in the workflow, in the Start Time attribute, use the spin boxes.
The default value is 9:00 PM.
d. To specify how frequently to run the actions that are defined in the workflow over a 24-hour period, use the Interval
attribute spin boxes. If you are performing transaction log backup as part of application-consistent protection, you must
specify a value for this attribute in order for incremental transaction log backup of SQL databases to occur.
The default Interval attribute value is 24 hours, or once a day. When you select a value that is less than 24 hours, the
Interval End attribute appears. To specify the last start time in a defined interval period, use the spin boxes.
e. To specify the duration of time in which NetWorker can manually or automatically restart a failed or canceled workflow, in
the Restart Window attribute, use the spin boxes.
If the restart window has elapsed, NetWorker considers the restart as a new run of the workflow. NetWorker calculates
the restart window from the start of the last incomplete workflow. The default value is 24 hours.
For example, if the Start Time is 7:00 PM, the Interval is 1 hour, and the Interval End is 11:00 PM., then the workflow
automatically starts every hour beginning at 7:00 PM. and the last start time is 11:00 PM.
4. From the Group Type list, leave the default selection of Clients.
5. In the Comment field, type a description of the group.
6. From the Policy-Workflow list, select the workflow that you want to assign the group to.
NOTE: You can also assign the group to a workflow when you create or edit a workflow.
7. (Optional) To specify the Restricted Datazone (RDZ) for the group, on the Restricted Datazones tab, select the RDZ from
the list.
8. Click OK.
Create Client resources. Assign clients to a protection group, by using the Client Configuration wizard or the General tab on the
Client Properties page.
4. From the Group Type list, select Dynamic Clients. For steps 5 to 8, follow the instructions given in Creating a client group.
Probe
A probe action runs a user-defined script on a NetWorker client before the start of a backup. A user-defined script is any
program that passes a return code. If the return code is 0 (zero), then a client backup is required. If the return code is 1, then a
client backup is not required.
Only a backup action can follow a probe action.
Check connectivity
A check connectivity action tests the connectivity between the clients and the NetWorker server before the start of a probe or
backup action occurs. If the connectivity test fails, then the probe action and backup action does not start for the client.
Traditional backup
A traditional backup is a scheduled backup of the save sets defined for the Client resources in the assigned group. You must
specify the destination storage node, destination pool, the schedule (period and activity) and , the browse and retention period
for the backup.
Clone
A clone action creates a copy of one or more save sets. Cloning enables secure offsite storage, the transfer of data from one
location to another, and the verification of backups.
You can configure a clone action to occur after a backup in a single workflow, or concurrently with a backup action in a single
workflow. You can use save set and query groups to define a specific list of save sets to clone, in a separate workflow.
14. In the Parallelism field, specify the maximum number of concurrent operations for the clone action.The default value is 0
and the maximum value is 1000.
15. From the Failure Impact list, specify what to do when a job fails:
● To continue the workflow when there are job failures, select Continue.
● To stop the current action if there is a failure with one of the jobs, but continue with subsequent actions in the workflow,
select Abort action.
NOTE: The Abort action option applies to probe actions, and the backup actions for the Traditional and Snapshot
action types.
● To stop the entire workflow if there is a failure with one of the jobs in the action, select Abort workflow.
NOTE: If any of the actions fail in the workflow, the workflow status does not appear as interrupted or canceled.
NetWorker reports the workflow status as failed.
16. From the Soft Limit list, select the amount of time after the action starts to stop the initiation of new activities. The default
value of 0 (zero) indicates no amount of time.
17. From the Hard Limit list, select the amount of time after the action starts to begin terminating activities. The default value
of 0 (zero) indicates no amount of time.
18. (Optional) In Start Time specify the time to start the action.
Use the spin boxes to set the hour and minute values, and select one of the following options from the drop-down list:
● Disabled—Do not enforce an action start time. The action will start at the time defined by the workflow.
● Absolute—Start the action at the time specified by the values in the spin boxes.
● Relative—Start the action after the period of time defined in the spin boxes has elapsed after the start of the workflow.
19. (Optional) Configure overrides for the task that is scheduled on a specific day.
14. In the Retry Delay field, specify a delay in seconds to wait before retrying a failed probe or backup action. When the Retry
Delay value is 0, NetWorker retries the failed probe or backup action immediately.
NOTE: The Retry Delay option applies to probe actions, and the backup actions for the Traditional and Snapshot action
types. When you specify a value for this option in other actions, NetWorker ignores the values.
15. In the Inactivity Timeout field, specify the maximum number of minutes that a job that is run by an action can try to
respond to the server.
If the job does not respond within the specified time, the server considers the job a failure and NetWorker retries the job
immediately to ensures that no time is lost due to failures.
Increase the timeout value if a backup consistently stops due to inactivity. Inactivity might occur for backups of large save
sets, backups of save sets with large sparse files, and incremental backups of many small static files.
NOTE: The Inactivity Timeout option applies to probe actions, and the backup actions for the Traditional and
Snapshot action types. If you specify a value for this option in other actions, NetWorker ignores the value.
16. In the Parallelism field, specify the maximum number of concurrent operations for the clone action.The default value is 0
and the maximum value is 1000.
17. From the Failure Impact list, specify what to do when a job fails:
18. Do not change the default selections for the Notification group box. NetWorker does not support notifications for probe
actions and ignores and specified values.
19. From the Soft Limit list, select the amount of time after the action starts to stop the initiation of new activities. The default
value of 0 (zero) indicates no amount of time.
20. From the Hard Limit list, select the amount of time after the action starts to begin terminating activities. The default value
of 0 (zero) indicates no amount of time.
21. (Optional) In Start Time specify the time to start the action.
Use the spin boxes to set the hour and minute values, and select one of the following options from the drop-down list:
● Disabled—Do not enforce an action start time. The action will start at the time defined by the workflow.
● Absolute—Start the action at the time specified by the values in the spin boxes.
● Relative—Start the action after the period of time defined in the spin boxes has elapsed after the start of the workflow.
22. (Optional) Configure overrides for the task that is scheduled on a specific day.
To specify the month, use the navigation buttons and the month list box. To specify the year, use the spin boxes. You can
set an override in the following ways:
● Select the day in the calendar, which changes the action task for the specific day.
● Use the action task list to select the task, and then perform one of the following steps:
○ To define an override that occurs on a specific day of the week, every week, select Specified day, and then use the
lists. Click Add Rules based override.
○ To define an override that occurs on the last day of the calendar month, select Last day of the month. Click Add
Rules based override.
NOTE:
○ You can edit or add the rules in the Override field.
○ To remove an override, delete the entry from the Override field.
○ If a schedule is associated to an action, then override option is disabled.
23. Click Next.
The Action Configuration Summary page appears.
24. Review the settings that you specified for the action, and then click Configure.
8. If you create the action as part of the workflow configuration, the workflow appears automatically in the Workflow box and
the box is dimmed.
9. Specify the order of the action in relation to other actions in the workflow:
● If the action is part of a sequence of actions in a workflow path, in the Previous box, select the action that should
precede this action.
● If the action should run concurrently with an action, in the Previous box, select the concurrent action, and then select
the Concurrent checkbox.
10. Specify a weekly, monthly, or reference schedule for the action:
● To specify a schedule for each day of the week, select Define option under Select Schedule and period as Weekly by
day.
● To specify a schedule for each day of the month, select Define option under Select Schedule and period as Monthly
by day.
● To specify a customized schedule to the action, select Select option under Select Schedule and choose a customized
schedule using the drop-down menu that is already created under NSR schedule resource.
11. To specify the backup level to perform when Define option under Select Schedule is selected, click the icon on each day.
If it is Select option under Select Schedule, choose the customized NSR schedule using the drop down, after specifying the
backup level within the NSR schedule resource.
The following table provides details about the backup level that each icon represents.
To perform the same type of backup on each day, select the backup type from the list and click Make All.
NetWorker does not support the use of synthetic full backup levels for NDMP data.
Celerra, Isilon, VNX, Unity, and NetApp filers with NDMP version 4 or later support token-based backups (TBB) to perform
NDMP full and incremental backups. NetWorker supports the same number of incremental levels that the NAS vendor
supports. Celerra, Isilon, and NetApp documentation provide the maximum number of incremental levels that the TBB
incremental backup can support.
When you configure TBB after you update the NetWorker server from 7.6 SP1 or earlier, the first incremental backup does
not occur until after one complete full backup.
Filers that do not support TBB, do not support incremental backups. If you select the level Incr, the NetWorker server
performs a full backup.
Verify that the NAS storage vendor supports NDMP incremental backups before you use this feature.
16. From the Browse boxes, specify the amount of time you want to browse the backed-up data.
After the browse period expires, the client file indexes are deleted and savesets will not be browsable.
17. From the Client Override Behavior box, specify how NetWorker uses certain client configuration attributes that perform
the same function as attributes in the Action resource:
● Client Can Override—The values in the Client resource for Schedule, Pool, Retention policy, and the Storage Node
attributes take precedence over the values that are defined in the equivalent Action resource attributes.
NOTE: If the NetWorker policy action schedule is set to the Skip backup level, the Client can Override option is
not honored. For NetWorker to consider the Client can Override option, change the action schedule to a different
level.
● Client Can Not Override—The values in the Action resource for the Schedule, Destination Pool, Destination
Storage Node, and the Retention attributes take precedence over the values that are defined in the equivalent Client
resource attributes.
20. In the Retry Delay field, specify a delay in seconds to wait before retrying a failed probe or backup action. When the Retry
Delay value is 0, NetWorker retries the failed probe or backup action immediately.
NOTE: The Retry Delay option applies to probe actions, and the backup actions for the Traditional and Snapshot action
types. When you specify a value for this option in other actions, NetWorker ignores the values.
21. In the Inactivity Timeout field, specify the maximum number of minutes that a job that is run by an action can try to
respond to the server.
If the job does not respond within the specified time, the server considers the job a failure and NetWorker retries the job
immediately to ensures that no time is lost due to failures.
Increase the timeout value if a backup consistently stops due to inactivity. Inactivity might occur for backups of large save
sets, backups of save sets with large sparse files, and incremental backups of many small static files.
NOTE: The Inactivity Timeout option applies to probe actions, and the backup actions for the Traditional and
Snapshot action types. If you specify a value for this option in other actions, NetWorker ignores the value.
22. In the Parallelism field, specify the maximum number of concurrent operations for the clone action.The default value is 0
and the maximum value is 1000.
23. From the Failure Impact list, specify what to do when a job fails:
● To continue the workflow when there are job failures, select Continue.
● To stop the current action if there is a failure with one of the jobs, but continue with subsequent actions in the workflow,
select Abort action.
NOTE: The Abort action option applies to probe actions, and the backup actions for the Traditional and Snapshot
action types.
● To stop the entire workflow if there is a failure with one of the jobs in the action, select Abort workflow.
NOTE: If any of the actions fail in the workflow, the workflow status does not appear as interrupted or canceled.
NetWorker reports the workflow status as failed.
24. From the Soft Limit list, select the amount of time after the action starts to stop the initiation of new activities. The default
value of 0 (zero) indicates no amount of time.
25. From the Hard Limit list, select the amount of time after the action starts to begin terminating activities. The default value
of 0 (zero) indicates no amount of time.
26. (Optional) In Start Time specify the time to start the action.
Use the spin boxes to set the hour and minute values, and select one of the following options from the drop-down list:
● Disabled—Do not enforce an action start time. The action will start at the time defined by the workflow.
● Absolute—Start the action at the time specified by the values in the spin boxes.
● Relative—Start the action after the period of time defined in the spin boxes has elapsed after the start of the workflow.
27. (Optional) Configure overrides for the task that is scheduled on a specific day.
To specify the month, use the navigation buttons and the month list box. To specify the year, use the spin boxes. You can
set an override in the following ways:
● Select the day in the calendar, which changes the action task for the specific day.
● Use the action task list to select the task, and then perform one of the following steps:
○ To define an override that occurs on a specific day of the week, every week, select Specified day, and then use the
lists. Click Add Rules based override.
○ To define an override that occurs on the last day of the calendar month, select Last day of the month. Click Add
Rules based override.
NOTE:
where:
○ -s subject—Includes a standard email header with the message and specifies the subject text for that header.
Without this option, the smtpmail program assumes that the message contains a correctly formatted email header
and nothing is added.
○ -h mailserver—Specifies the hostname of the mail server to use to relay the SMTP email message.
○ recipient1@mailserver—Is the email address of the recipient of the notification. Multiple email recipients are
separated by a space.
15. In the Parallelism field, specify the maximum number of concurrent operations for the clone action.The default value is 0
and the maximum value is 1000.
16. From the Failure Impact list, specify what to do when a job fails:
● To continue the workflow when there are job failures, select Continue.
● To stop the current action if there is a failure with one of the jobs, but continue with subsequent actions in the workflow,
select Abort action.
NOTE: The Abort action option applies to probe actions, and the backup actions for the Traditional and Snapshot
action types.
● To stop the entire workflow if there is a failure with one of the jobs in the action, select Abort workflow.
NOTE: If any of the actions fail in the workflow, the workflow status does not appear as interrupted or canceled.
NetWorker reports the workflow status as failed.
17. From the Send Notifications list box, select whether to send notifications for the action:
● To use the notification configuration that is defined in the Policy resource to send the notification, select Set at policy
level.
● To send a notification on completion of the action, select On Completion.
● To send a notification only if the action fails to complete, select On Failure.
18. In the Send notification attribute, when you select the On Completion option or On failure option, the Command box
appears. Use this box to configure how NetWorker sends the notifications. You can use the nsrlog command to send the
notifications to a log file or you can send an email notification.
where:
○ -s subject—Includes a standard email header with the message and specifies the subject text for that header.
Without this option, the smtpmail program assumes that the message contains a correctly formatted email header
and nothing is added.
○ -h mailserver—Specifies the hostname of the mail server to use to relay the SMTP email message.
○ recipient1@mailserver—Is the email address of the recipient of the notification. Multiple email recipients are
separated by a space.
19. From the Soft Limit list, select the amount of time after the action starts to stop the initiation of new activities. The default
value of 0 (zero) indicates no amount of time.
20. From the Hard Limit list, select the amount of time after the action starts to begin terminating activities. The default value
of 0 (zero) indicates no amount of time.
21. (Optional) In the Start Time option, specify the time to start the action.
Use the spin boxes to set the hour and minute values, and select one of the following options from the list box:
● Disabled—Do not enforce an action start time. The action will start at the time defined by the workflow.
● Absolute—Start the action at the time specified by the values in the spin boxes.
● Relative—Start the action after the period of time defined in the spin boxes has elapsed after the start of the workflow.
22. (Optional) Configure overrides for the task that is scheduled on a specific day.
To specify the month, use the navigation buttons and the month list box. To specify the year, use the spin boxes. You can
set an override in the following ways:
● Select the day in the calendar, which changes the action task for the specific day.
● Use the action task list to select the task, and then perform one of the following steps:
○ To define an override that occurs on a specific day of the week, every week, select Specified day, and then use the
lists. Click Add Rules based override.
○ To define an override that occurs on the last day of the calendar month, select Last day of the month. Click Add
Rules based override.
NOTE:
○ You can edit or add the rules in the Override field.
○ To remove an override, delete the entry from the Override field.
○ If a schedule is associated to an action, then override option is disabled.
23. Click Next.
The Action Configuration Summary page appears.
24. Review the settings that you specified for the action, and then click Configure.
(Optional) Create a clone action to automatically clone the save sets again after this clone action. Another clone action is the
only supported action after a clone action in a workflow.
The oval icon specifies the group to which the workflow applies. The rounded rectangle icons identify actions. The parallelogram
icons identify the destination pool for the action.
● You can adjust the display of the visual representation by right-clicking and selecting one of the following options:
○ Zoom In—Increase the size of the visual representation.
○ Zoom Out—Decrease the size of the visual representation.
○ Zoom Area—Limit the display to a single section of the visual representation.
○ Fit Content—Fit the visual representation to the window area.
○ Reset—Reset the visual representation to the default settings.
○ Overview—View a separate dialog box with a high-level view of the visual representation and a legend of the icons.
● You can view and edit the properties for the group, action, or destination pool by right-clicking the icon for the item, and
then select Properties.
● You can create a group, action, or destination pool by right-clicking the icon for the item, and then select New.
The file system that contains the staging directory must have free disk space that is a least equal to the size of the
current NMC database. The section "Changing the staging directory for NMC database backups" describes how to
change the staging directory location.
cst folder is not listed as save set under Server Protection - NMC server backup for linux servers.
Only /nsr/nmc/nmcdb_stage is listed under backed up save set. Backup of cst folder is taken internally, which
can be verified in Recovery Wizard after the Server Protection policy backup is succeeded.
● Creates a group called NMC server.
● Adds the Client resource to the NMC server group.
● Creates a workflow that is called NMC server backup in the Server Protection policy. The workflow contains the NMC
server backup action, which performs a full backup of the NMC server database every day at 2 P.M.
● Adds the NMC server group to the NMC server backup workflow.
NOTE: The NMC Server database backup only supports the full and skip backup levels. If you edit the NMC Server backup
action and change the levels in the backup schedule to a different level, for example synthetic full, NetWorker performs a
full backup of the database.
Protection groups for NetWorker and NMC server backup and maintenance
When you install or upgrade the NetWorker server, the installation or upgrade process creates a default protection group for the
NetWorker server workflows in the Server Protection policy.
Server backup
The workflow performs two actions:
● Expiration—An expire action to mark expired save sets as recyclable.
● Server database backup—A backup of the NetWorker server media database, authentication service database, and the
client file indexes. The data in this backup, also called a bootstrap backup, enables you to perform a disaster recovery of the
NetWorker server.
The workflow is scheduled to start daily at 10 a.m. The workflow is assigned to the default Server Protection group, which
contains a dynamically generated list of the Client resources for the NetWorker server.
Expiration
The expiration action expires save sets in the media database based on retention time of the save set. When the retention time
of the save set has been reached, NetWorker uses the nsrim process to expire the save set. When a save set expires, the
nsrim process performs the following actions:
● Removes information about the save set from the client file index.
● If the save set data resides on an AFTD, removes the save set information from the media database and removes the save
set data from the AFTD.
● If the save set data resides on a tape device, the nsrim process marks the save set as recyclable in the media database.
When all save sets on a tape volume have expired, the volume is eligible for reuse.
● If the disk type(AFTD and DD Boost) volume is marked read-only, nsrim does not reclaim or recover the space by deleting
expired save sets.
An expiration action is created automatically in the Server maintenance workflow of the Server Protection policy. An expiration
action only supports Execute and Skip backup levels.
Clone
A clone action creates a copy of one or more save sets. Cloning enables secure offsite storage, the transfer of data from one
location to another, and the verification of backups.
You can configure a clone action to occur after a backup in a single workflow, or concurrently with a backup action in a single
workflow. You can use save set and query groups to define a specific list of save sets to clone, in a separate workflow.
NOTE: The clone action clones the scheduled backup save sets only, and it does not clone the manual backup save sets.
Some NetWorker module backups might appear to be scheduled backups that are initiated by a policy backup action, but
they are manual backups because they are initiated or converted by a database or application. The NetWorker Module for
Databases and Applications Administration Guide and the NetWorker Module for SAP Administration Guide provides more
details.
Clone
A clone action creates a copy of one or more save sets. Cloning enables secure offsite storage, the transfer of data from one
location to another, and the verification of backups.
You can configure a clone action to occur after a backup in a single workflow, or concurrently with a backup action in a single
workflow. You can use save set and query groups to define a specific list of save sets to clone, in a separate workflow.
NOTE: The clone action clones the scheduled backup save sets only, and it does not clone the manual backup save sets.
Some NetWorker module backups might appear to be scheduled backups that are initiated by a policy backup action, but
they are manual backups because they are initiated or converted by a database or application. The NetWorker Module for
Databases and Applications Administration Guide and the NetWorker Module for SAP Administration Guide provides more
details.
You can add the following actions before the NMC server backup action:
Probe
A probe action runs a user-defined script on a NetWorker client before the start of a backup. A user-defined script is any
program that passes a return code. If the return code is 0 (zero), then a client backup is required. If the return code is 1, then a
client backup is not required.
Only a backup action can follow a probe action.
Check connectivity
A check connectivity action tests the connectivity between the clients and the NetWorker server before the start of a probe or
backup action occurs. If the connectivity test fails, then the probe action and backup action does not start for the client.
Actions in the server database backup and NMC server backup workflows
Workflows enable you to chain together multiple actions and run them sequentially or concurrently.
The following supported actions can follow the lead action and other actions in a workflow.
The oval icon specifies the group to which the workflow applies. The rounded rectangle icons identify actions. The parallelogram
icons identify the destination pool for the action.
You can work directly in the visual representation of a workflow to perform the following tasks:
● You can adjust the display of the visual representation by right-clicking and selecting one of the following options:
○ Zoom In—Increase the size of the visual representation.
○ Zoom Out—Decrease the size of the visual representation.
○ Zoom Area—Limit the display to a single section of the visual representation.
○ Fit Content—Fit the visual representation to the window area.
○ Reset—Reset the visual representation to the default settings.
○ Overview—View a separate dialog box with a high-level view of the visual representation and a legend of the icons.
● You can view and edit the properties for the group, action, or destination pool by right-clicking the icon for the item, and
then select Properties.
● You can create a group, action, or destination pool by right-clicking the icon for the item, and then select New.
max_client_threads *
max_threads_per_client <=
max_concurrency
max_concurrency =
MIN(30, dest_pool_parallelism,
available_stream_count)
NOTE: The Backup Data Management chapter describes how you can clone save sets manually by using the nsrclone
command.
Backup level In the Filter save sets by level section, next to the backup level for the save set, select
the full checkbox.
NOTE: Only the full backup level is applicable for network-attached storage (NAS)
devices.
Limit the number of clones Specify the number for the limit in the Limit number of clones list. The clone limit is the
maximum number of clone instances that can be created for the save set. By default, the
value is set to 1, and cannot be changed for NAS or Block.
NOTE: When this criteria is set to 1, which is the default value, you may experience
volume outage issues with Data Domain and advanced file type devices.
Client Next to one or more client resources that are associated with the save set in the Client list,
select the checkbox.
Policy Next to the policy used to generate the save set in the Policy list, select the checkbox.
Workflow Next to the workflow used to generate the save set in the Workflow list, select the
checkbox.
Action Next to the action used to generate the save set in the Action list, select the checkbox.
Name In the Filter save sets by name field, specify the name of the save set.
NOTE: You cannot use wildcards to specify the save set name.
If you specify multiple criteria, the save set must match all the criteria to belong to the group.
8. To specify the Restricted Data Zone (RDZ) for the group, select the Restricted Data Zones tab, and then select the RDZ
from the list.
9. Click OK.
Creating a policy
1. In the Administration window, click Protection.
2. In the expanded left pane, right-click Policies, and then select New.
The Create Policy dialog box appears.
3. On the General tab, in the Name field, type a name for the policy.
The maximum number of characters for the policy name is 64.
● Legal Characters: _ - + = # , . % @
● Illegal Characters: /\*:?[]()$!^;'"`~><&|{}
NOTE: After you create a policy, the Name attribute is read-only.
where:
○ recipient1@mailserver—Is the email address of the recipient of the notification. Multiple email recipients are
separated by a space.
7. To specify the Restricted Data Zone (RDZ) for the policy, select the Restricted Data Zones tab, and then select the RDZ
from the list.
8. Click OK.
Create the workflows and actions for the policy.
where:
○ -s subject—Includes a standard email header with the message and specifies the subject text for that header.
Without this option, the smtpmail program assumes that the message contains a correctly formatted email header
and nothing is added.
○ recipient1@mailserver—Is the email address of the recipient of the notification. Multiple email recipients are
separated by a space.
8. In the Running section, perform the following steps to specify when and how often the workflow runs:
a. To ensure that the actions that are contained in the workflow run when the policy or workflow starts, in the Enabled
box, leave the option selected. To prevent the actions in the workflow from running when the policy or workflow that
contains the action starts, clear this option.
b. To start the workflow at the time that is specified in the Start time attribute, on the days that are defined in the action
resource, in the AutoStart Enabled box, leave the option selected. To prevent the workflow from starting at the time
that is specified in the Start time attribute, clear this option.
c. To specify the time to start the actions in the workflow, in the Start Time attribute, use the spin boxes.
The default value is 9:00 PM.
d. To specify how frequently to run the actions that are defined in the workflow over a 24-hour period, use the Interval
attribute spin boxes. If you are performing transaction log backup as part of application-consistent protection, you must
specify a value for this attribute in order for incremental transaction log backup of SQL databases to occur.
The default Interval attribute value is 24 hours, or once a day. When you select a value that is less than 24 hours, the
Interval End attribute appears. To specify the last start time in a defined interval period, use the spin boxes.
e. To specify the duration of time in which NetWorker can manually or automatically restart a failed or canceled workflow, in
the Restart Window attribute, use the spin boxes.
If the restart window has elapsed, NetWorker considers the restart as a new run of the workflow. NetWorker calculates
the restart window from the start of the last incomplete workflow. The default value is 24 hours.
For example, if the Start Time is 7:00 PM, the Interval is 1 hour, and the Interval End is 11:00 PM., then the workflow
automatically starts every hour beginning at 7:00 PM. and the last start time is 11:00 PM.
NOTE: If the interval attribute is set with less than 24 hours and the vProxy backup schedule is set to run, level Full
from backup action, manual start of the workflow will run level Incremental instead of level Full. Level Full backup will
be run during manual start of workflow only if the Interval is changed to 24 hours in the Workflow.
15. In the Parallelism field, specify the maximum number of concurrent operations for the clone action.The default value is 0
and the maximum value is 1000.
16. From the Failure Impact list, specify what to do when a job fails:
● To continue the workflow when there are job failures, select Continue.
● To stop the current action if there is a failure with one of the jobs, but continue with subsequent actions in the workflow,
select Abort action.
NOTE: The Abort action option applies to probe actions, and the backup actions for the Traditional and Snapshot
action types.
● To stop the entire workflow if there is a failure with one of the jobs in the action, select Abort workflow.
NOTE: If any of the actions fail in the workflow, the workflow status does not appear as interrupted or canceled.
NetWorker reports the workflow status as failed.
17. From the Send Notifications list box, select whether to send notifications for the action:
● To use the notification configuration that is defined in the Policy resource to send the notification, select Set at policy
level.
● To send a notification on completion of the action, select On Completion.
● To send a notification only if the action fails to complete, select On Failure.
where:
○ -s subject—Includes a standard email header with the message and specifies the subject text for that header.
Without this option, the smtpmail program assumes that the message contains a correctly formatted email header
and nothing is added.
○ -h mailserver—Specifies the hostname of the mail server to use to relay the SMTP email message.
○ recipient1@mailserver—Is the email address of the recipient of the notification. Multiple email recipients are
separated by a space.
19. From the Soft Limit list, select the amount of time after the action starts to stop the initiation of new activities. The default
value of 0 (zero) indicates no amount of time.
20. From the Hard Limit list, select the amount of time after the action starts to begin terminating activities. The default value
of 0 (zero) indicates no amount of time.
21. (Optional) In the Start Time option, specify the time to start the action.
Use the spin boxes to set the hour and minute values, and select one of the following options from the list box:
● Disabled—Do not enforce an action start time. The action will start at the time defined by the workflow.
● Absolute—Start the action at the time specified by the values in the spin boxes.
● Relative—Start the action after the period of time defined in the spin boxes has elapsed after the start of the workflow.
22. (Optional) Configure overrides for the task that is scheduled on a specific day.
To specify the month, use the navigation buttons and the month list box. To specify the year, use the spin boxes. You can
set an override in the following ways:
● Select the day in the calendar, which changes the action task for the specific day.
● Use the action task list to select the task, and then perform one of the following steps:
○ To define an override that occurs on a specific day of the week, every week, select Specified day, and then use the
lists. Click Add Rules based override.
○ To define an override that occurs on the last day of the calendar month, select Last day of the month. Click Add
Rules based override.
NOTE:
○ You can edit or add the rules in the Override field.
○ To remove an override, delete the entry from the Override field.
○ If a schedule is associated to an action, then override option is disabled.
23. Click Next.
The Action Configuration Summary page appears.
24. Review the settings that you specified for the action, and then click Configure.
(Optional) Create a clone action to automatically clone the save sets again after this clone action. Another clone action is the
only supported action after a clone action in a workflow.
The oval icon specifies the group to which the workflow applies. The rounded rectangle icons identify actions. The parallelogram
icons identify the destination pool for the action.
You can work directly in the visual representation of a workflow to perform the following tasks:
● You can adjust the display of the visual representation by right-clicking and selecting one of the following options:
○ Zoom In—Increase the size of the visual representation.
○ Zoom Out—Decrease the size of the visual representation.
○ Zoom Area—Limit the display to a single section of the visual representation.
○ Fit Content—Fit the visual representation to the window area.
○ Reset—Reset the visual representation to the default settings.
○ Overview—View a separate dialog box with a high-level view of the visual representation and a legend of the icons.
● You can view and edit the properties for the group, action, or destination pool by right-clicking the icon for the item, and
then select Properties.
● You can create a group, action, or destination pool by right-clicking the icon for the item, and then select New.
Figure 26. Example of a policy with separate workflows for backup and cloning
NOTE: The amount of data and length of time that is required to complete the backup can impact the ability to clone data
when the backup and clone workflows are in the same policy. For example, if the clone action starts before the backup
action completes, there might not be any data yet to clone, or in other cases, only the save sets that completed at the start
time of the workflow is taken into account. In both cases, NetWorker marks the Clone Workflow as successful, but there is
no guarantee that all the data from the backup workflow was cloned.
where:
○ -s subject—Includes a standard email header with the message and specifies the subject text for that header.
Without this option, the smtpmail program assumes that the message contains a correctly formatted email header
and nothing is added.
○ -h mailserver—Specifies the hostname of the mail server to use to relay the SMTP email message.
○ recipient1@mailserver—Is the email address of the recipient of the notification. Multiple email recipients are
separated by a space.
8. In the Running section, perform the following steps to specify when and how often the workflow runs:
a. To ensure that the actions that are contained in the workflow run when the policy or workflow starts, in the Enabled
box, leave the option selected. To prevent the actions in the workflow from running when the policy or workflow that
contains the action starts, clear this option.
b. To start the workflow at the time that is specified in the Start time attribute, on the days that are defined in the action
resource, in the AutoStart Enabled box, leave the option selected. To prevent the workflow from starting at the time
that is specified in the Start time attribute, clear this option.
c. To specify the time to start the actions in the workflow, in the Start Time attribute, use the spin boxes.
The default value is 9:00 PM.
d. To specify how frequently to run the actions that are defined in the workflow over a 24-hour period, use the Interval
attribute spin boxes. If you are performing transaction log backup as part of application-consistent protection, you must
specify a value for this attribute in order for incremental transaction log backup of SQL databases to occur.
The default Interval attribute value is 24 hours, or once a day. When you select a value that is less than 24 hours, the
Interval End attribute appears. To specify the last start time in a defined interval period, use the spin boxes.
e. To specify the duration of time in which NetWorker can manually or automatically restart a failed or canceled workflow, in
the Restart Window attribute, use the spin boxes.
If the restart window has elapsed, NetWorker considers the restart as a new run of the workflow. NetWorker calculates
the restart window from the start of the last incomplete workflow. The default value is 24 hours.
For example, if the Start Time is 7:00 PM, the Interval is 1 hour, and the Interval End is 11:00 PM., then the workflow
automatically starts every hour beginning at 7:00 PM. and the last start time is 11:00 PM.
NOTE: If the interval attribute is set with less than 24 hours and the vProxy backup schedule is set to run, level Full
from backup action, manual start of the workflow will run level Incremental instead of level Full. Level Full backup will
be run during manual start of workflow only if the Interval is changed to 24 hours in the Workflow.
9. In the Groups group box, specify the protection group to which the workflow applies.
To use a group, select a protection group from the Groups list. To create a protection group, click the + button that is
located to the right of the Groups list.
10. Click Add.
The Policy Action Wizard appears.
11. In the Name field, type the name of the action.
The maximum number of characters for the action name is 64.
● Legal Characters: _ - + = # , . % @
● Illegal Characters: /\*:?[]()$!^;'"`~><&|{}
12. In the Comment field, type a description for the action.
23. In the Parallelism field, specify the maximum number of concurrent operations for the clone action.The default value is 0
and the maximum value is 1000.
24. From the Failure Impact list, specify what to do when a job fails:
● To continue the workflow when there are job failures, select Continue.
● To stop the current action if there is a failure with one of the jobs, but continue with subsequent actions in the workflow,
select Abort action.
NOTE: The Abort action option applies to probe actions, and the backup actions for the Traditional and Snapshot
action types.
● To stop the entire workflow if there is a failure with one of the jobs in the action, select Abort workflow.
NOTE: If any of the actions fail in the workflow, the workflow status does not appear as interrupted or canceled.
NetWorker reports the workflow status as failed.
25. From the Send Notifications list box, select whether to send notifications for the action:
● To use the notification configuration that is defined in the Policy resource to send the notification, select Set at policy
level.
● To send a notification on completion of the action, select On Completion.
● To send a notification only if the action fails to complete, select On Failure.
26. In the Send notification attribute, when you select the On Completion option or On failure option, the Command box
appears. Use this box to configure how NetWorker sends the notifications. You can use the nsrlog command to send the
notifications to a log file or you can send an email notification.
The default notification action is to send the information to the policy_notifications.log file. By default, the
policy_notifications.log file is located in the /nsr/logs directory on Linux and in the C:\Program Files\EMC
NetWorker\nsr\logs folder on Windows.
where:
○ -s subject—Includes a standard email header with the message and specifies the subject text for that header.
Without this option, the smtpmail program assumes that the message contains a correctly formatted email header
and nothing is added.
○ -h mailserver—Specifies the hostname of the mail server to use to relay the SMTP email message.
○ recipient1@mailserver—Is the email address of the recipient of the notification. Multiple email recipients are
separated by a space.
27. From the Soft Limit list, select the amount of time after the action starts to stop the initiation of new activities. The default
value of 0 (zero) indicates no amount of time.
28. From the Hard Limit list, select the amount of time after the action starts to begin terminating activities. The default value
of 0 (zero) indicates no amount of time.
29. (Optional) Configure overrides for the task that is scheduled on a specific day.
To specify the month, use the navigation buttons and the month list box. To specify the year, use the spin boxes. You can
set an override in the following ways:
● Select the day in the calendar, which changes the action task for the specific day.
● Use the action task list to select the task, and then perform one of the following steps:
○ To define an override that occurs on a specific day of the week, every week, select Specified day, and then use the
lists. Click Add Rules based override.
○ To define an override that occurs on the last day of the calendar month, select Last day of the month. Click Add
Rules based override.
NOTE:
○ You can edit or add the rules in the Override field.
○ To remove an override, delete the entry from the Override field.
○ If a schedule is associated to an action, then override option is disabled.
30. Click Next.
The Action Configuration Summary page appears.
31. Review the settings that you specified for the action, and then click Configure.
Policy Notifications
You can define how a Data Protection Policy sends notifications in the Policy, Workflow, and Action resources.
The following table summarizes how the notification settings in each resource work together.
In the Policy resource, the following notification choices are available:
● Never —Select this option when you do not want to send any notifications.
● On Completion—Select this option when you want to send a notification on completion of the workflows and actions in the
policy.
● On Failure—Select this option when you want to send a notification only if one or more of the workflows in the policy fail.
When you configure a notification at the policy level, NetWorker applies the notification to all workflows and actions in the policy
that are not configured to send out notifications.
In the Workflow resource, the following notification choices are available:
● To use the notification configuration that is defined in the policy resource to send the notification, select Set a policy level.
Policies/Actions pane
The Policies/Actions pane at the top of the Monitoring window lists the policies on the NetWorker server by default. Click
the + (plus) sign next to a policy in the list to view the workflows in the policy, and the + (plus) sign next to a workflow to view
the actions for a workflow.
The Policies pane provides the following information for each item (where applicable):
● Overall status
The following table provides details on the status icons that may appear in the Policies pane.
Never run
Running
Succeeded
Failed
Probing
● Most recent start time
● Duration of the most recent run
● Next scheduled runtime
● Name of the assigned save set
● Device on which the save set is stored
● Backup level
● Data transfer rate
● Size of the save set
● Messages that resulted from an action
Right-click an action in the Policies pane, and select Show Details to view details on currently running, successfully
completed, and failed activities for the action.
When you sort the items on the Policy/Actions pane by using the Status column, NetWorker sorts the items in alphabetical
order that is based on the label of the icon.
Consider the following when a policy/action is in a probing state:
● A message is sent when the group starts and finishes the probe operation.
Actions pane
To view a list of all actions, click the Actions tab at the bottom of the Policies pane. The Policies pane becomes the Actions
pane.
The Actions pane provides the following information for each action:
● Overall status
NOTE: The Actions pane displays the same status icons as the Policies pane.
● Name
● Assigned policy
● Assigned workflow
● Type
● Date and time of the most recent run
● Duration of the most recent run
● Percent complete, for actions that are in progress
● Next scheduled runtime
Right-click an action in the Actions pane, and select Show Details to view details on currently running, completed, and failed
activities for the action.
Monitoring cloning
You can view the status of scheduled clone jobs in the Monitoring window. Status information includes the last start time
of the policy, workflow, or clone action, the duration of the action, the size of the save set, and the target device, pool, and
volume.
To determine whether a save set on a volume has been cloned, or is itself a clone, check the search for the save set by using
the Query Save Set tab when you select Save Sets in the Media window.
Policies
Policies provide you with a service-catalog approach to the configuration of a NetWorker datazone. Policies enable you to
manage all data protection tasks and the data protection lifecycle from a central location.
Policies provide an organizational container for the workflows, actions, and groups that support and define the backup, clone,
management, and system maintenance actions that you want to perform.
Workflows
The policy workflow defines a list of actions to perform sequentially or concurrently, a schedule window during which the
workflow can run, and the protection group to which the workflow applies. You can create a workflow when you create a new
policy, or you can create a workflow for an existing policy.
Protection groups
Protection groups define a set of static or dynamic Client resources or save sets to which a workflow applies. There are also
dedicated protection groups for backups in a VMware environment or for snapshot backups on a NAS device. Review the
following information about protection groups:
● Create one protection group for each workflow. Each group can be assigned to only one workflow.
● You can add the same Client resources and save sets to more than one group at a time.
● You can create the group before you create the workflow, or you can create the group after you create the workflow and
then assign the group to the workflow later.
Actions
Actions are the key resources in a workflow for a data protection policy and define a specific task (for example, a backup or
clone) that occurs on the client resources in the group assigned to the workflow. NetWorker uses a work list to define the task.
A work list is composed of one or several work items. Work items include client resources, virtual machines, save sets, or tags.
You can chain multiple actions together to occur sequentially or concurrently in a workflow. All chained actions use the same
work list.
When you configure an action, you define the days on which to perform the action, as well as other settings specific to the
action. For example, you can specify a destination pool, browse and retention period, and a target storage node for the backup
action, which can differ from the subsequent action that clones the data.
When you create an action for a policy that is associated with the virtual machine backup, you can select one of the following
data protection action types:
● Backup — Performs a backup of virtual machines in vCenter to a Data Domain system. You can only perform one VMware
backup action per workflow. The VMware backup action must occur before clone actions.
● Clone — Performs a clone of the VMware backup on a Data Domain system to any clone device that NetWorker supports
(including Data Domain system or tape targets). You can specify multiple clone actions. Clone actions must occur after the
Backup action.
You can create multiple actions for a single workflow. However, each action applies to a single workflow and policy.
The following figure provides a high level overview of the components that make up a data protection policy in a datazone.
● Linux:
/nsr/logs/policy_name/workflow_name/action_name
where:
● Policy_name—is the name of the Policy resource. One folder per policy.
● Workflow_name—is the name of the workflow directory. One folder per action sequence.
● Action_name—is the name of the action log file within the workflow.
NetWorker clears the information about a job from the jobsdb and deletes the associated log files at the interval that is defined
by the Jobsdb retention in hours attribute in the properties of the NetWorker Server resource. In NetWorker 9.0.1, the
default jobsdb retention is 72 hours.
Policies
Policies enable you to manage all data protection tasks and the data protection lifecycle from a central location.
A policy contains one or more workflows, which define the actions that should be performed, the order for the actions to occur,
and the group of Client resources or save sets on which to perform the actions.
Actions include backups, cloning, client/server connectivity checks, and NetWorker server maintenance activities.
Editing a policy
You can edit the description, notification setting, and RDZ for a policy.
You cannot edit the name of a policy. To rename a policy, first delete the policy, and then re-create it with the new name.
1. In the Administration window, click Protection.
2. In the expanded left pane, select Policies.
3. Right-click the policy, and select Properties.
The Policy Properties dialog box appears.
4. Edit the properties for the policy. The properties are the same properties that you specified when you created the policy.
5. Click OK.
Deleting a policy
When you delete a policy, the deletion process also deletes all workflows and actions for the policy.
Groups that are assigned to the workflows in the policy are not deleted, however. The workflow assignment for the group is
removed from the group properties. You can assign the group to a workflow in a different policy, or delete the group.
1. In the Administration window, click Protection.
2. In the expanded left pane, select Policies.
3. Right-click the policy, and select Delete.
A confirmation message appears.
4. Click Yes.
NOTE: The Policy resource remains in the Monitoring window until all the information about the workflows and actions
within the policy expire in the jobs database. The default job expiration time is 72 hours. Modifying the retention period
for jobs in the jobs database describes how to change the default job expiration time.
Workflows
Workflows define a list of actions to perform sequentially or concurrently, a schedule window during which the workflow can
run, and the protection group to which the workflow applies.
A workflow can be as simple as a single action that applies to a finite list of Client resources, or it can be a complex chain of
actions that apply to a dynamically changing list of resources, with some actions occurring sequentially and others occurring
concurrently.
You can also define notification settings for a workflow.
○ recipient1@mailserver—Is the email address of the recipient of the notification. Multiple email recipients are
separated by a space.
10. In the Running section, perform the following steps to specify when and how often the workflow runs:
a. To ensure that the actions that are contained in the workflow run when the policy or workflow starts, in the Enabled
box, leave the option selected. To prevent the actions in the workflow from running when the policy or workflow that
contains the action starts, clear this option.
b. To start the workflow at the time that is specified in the Start time attribute, on the days that are defined in the action
resource, in the AutoStart Enabled box, leave the option selected. To prevent the workflow from starting at the time
that is specified in the Start time attribute, clear this option.
c. To specify the time to start the actions in the workflow, in the Start Time attribute, use the spin boxes.
The default value is 9:00 PM.
d. To specify how frequently to run the actions that are defined in the workflow over a 24-hour period, use the Interval
attribute spin boxes. If you are performing transaction log backup as part of application-consistent protection, you must
specify a value for this attribute in order for incremental transaction log backup of SQL databases to occur.
The default Interval attribute value is 24 hours, or once a day. When you select a value that is less than 24 hours, the
Interval End attribute appears. To specify the last start time in a defined interval period, use the spin boxes.
e. To specify the duration of time in which NetWorker can manually or automatically restart a failed or canceled workflow, in
the Restart Window attribute, use the spin boxes.
If the restart window has elapsed, NetWorker considers the restart as a new run of the workflow. NetWorker calculates
the restart window from the start of the last incomplete workflow. The default value is 24 hours.
For example, if the Start Time is 7:00 PM, the Interval is 1 hour, and the Interval End is 11:00 PM., then the workflow
automatically starts every hour beginning at 7:00 PM. and the last start time is 11:00 PM.
NOTE: If the interval attribute is set with less than 24 hours and the vProxy backup schedule is set to run, level Full
from backup action, manual start of the workflow will run level Incremental instead of level Full. Level Full backup will
be run during manual start of workflow only if the Interval is changed to 24 hours in the Workflow.
11. In the Groups group box, specify the protection group to which the workflow applies.
To use a group, select a protection group from the Groups list. To create a protection group, click the + button that is
located to the right of the Groups list.
12. The Actions table displays a list of actions in the workflow. To edit or delete an action in the workflow, select the action and
click Edit or Delete. To create one or more actions for the workflow, click Add.
The Actions table organizes the information in sortable columns. Right-click in the table to customize the attributes that
appear.
13. To create the workflow, click OK.
where:
○ -s subject—Includes a standard email header with the message and specifies the subject text for that header.
Without this option, the smtpmail program assumes that the message contains a correctly formatted email header
and nothing is added.
○ -h mailserver—Specifies the hostname of the mail server to use to relay the SMTP email message.
○ recipient1@mailserver—Is the email address of the recipient of the notification. Multiple email recipients are
separated by a space.
8. In the Running section, perform the following steps to specify when and how often the workflow runs:
a. To ensure that the actions that are contained in the workflow run when the policy or workflow starts, in the Enabled
box, leave the option selected. To prevent the actions in the workflow from running when the policy or workflow that
contains the action starts, clear this option.
b. To start the workflow at the time that is specified in the Start time attribute, on the days that are defined in the action
resource, in the AutoStart Enabled box, leave the option selected. To prevent the workflow from starting at the time
that is specified in the Start time attribute, clear this option.
c. To specify the time to start the actions in the workflow, in the Start Time attribute, use the spin boxes.
The default value is 9:00 PM.
d. To specify how frequently to run the actions that are defined in the workflow over a 24-hour period, use the Interval
attribute spin boxes. If you are performing transaction log backup as part of application-consistent protection, you must
specify a value for this attribute in order for incremental transaction log backup of SQL databases to occur.
The default Interval attribute value is 24 hours, or once a day. When you select a value that is less than 24 hours, the
Interval End attribute appears. To specify the last start time in a defined interval period, use the spin boxes.
e. To specify the duration of time in which NetWorker can manually or automatically restart a failed or canceled workflow, in
the Restart Window attribute, use the spin boxes.
If the restart window has elapsed, NetWorker considers the restart as a new run of the workflow. NetWorker calculates
the restart window from the start of the last incomplete workflow. The default value is 24 hours.
For example, if the Start Time is 7:00 PM, the Interval is 1 hour, and the Interval End is 11:00 PM., then the workflow
automatically starts every hour beginning at 7:00 PM. and the last start time is 11:00 PM.
Editing a workflow
You can edit all the properties for a workflow, including the name, description, schedule, notification settings, group, and
actions.
1. In the Administration window, click Protection.
2. In the expanded left pane, select Policies.
3. Select the policy for the workflow.
4. In the right pane of the window, select the Workflows tab.
5. In the right pane, perform one of the following tasks:
● To modify multiple attributes in a single configuration resource by using the Workflow Properties window, right-click
the staging configuration and select Properties.
● To modify a specific attribute that appears in the resource window, place the mouse in the cell that contains the attribute
that you want to change, then right-click. The menu displays an option to edit the attribute. For example, to modify the
Comment attribute, right-click the resource in the Comment cell and select Edit Comment.
NOTE: To modify a specific attribute for multiple resources, press and hold the Ctrl key, select each resource, and
then right-click in the cell that contains the attribute that you want to change. The menu displays an option to edit
the attribute. Application information field or any environment variable must be set in the following way:
○ VARIABLE_NAME=VARIABLE_VALUE
Include the = symbol between an application information variable name and the value of the variable.
6. Edit the properties for the workflow. The properties are the same properties that you specified when you created the
workflow.
NOTE: When you add actions to an existing workflow that is associated with a group, you only see the action types that
are allowed in the action sequence.
7. Click OK.
Deleting a workflow
When you delete a workflow, the deletion process also deletes all actions for the workflow.
The group that is assigned to the workflow is not deleted, however. The workflow assignment for the group is removed from
the group properties. You can assign the group to a different workflow or delete the group.
1. In the Administration window, click Protection.
2. In the expanded left pane, select Policies.
3. Select the policy for the workflow.
4. In the right pane of the window, select the Workflows tab.
5. Right-click the workflow, and select Delete.
A confirmation message appears.
6. Click Yes.
Actions
Actions are the key resources in a workflow for a data protection policy. An action is a task that occurs on a work list. A work
list is a list of pending work items, such a group of Client resources or save sets.
You can chain multiple actions together to occur sequentially or concurrently in a workflow.
Creating an action
The Policy Action wizard walks you through the steps to create an action. You can create an action either when you are
creating or editing a workflow, or as a separate process from the workflow configuration.
Create the policy and workflow that contains the action.
1. Open the Policy Action wizard by using one of the methods in the following table.
To create the first action in a workflow a. In the Administration window, click Protection.
b. In the expanded left pane select Policies.
c. Select the policy.
d. Select the workflow.
e. In the right pane, select Create a new action.
To add an action before an action in an existing workflow a. In the Administration window, click Protection.
b. In the expanded left pane select Policies.
c. Select the policy.
d. Select the workflow.
e. In the right pane, select the action that you want the
new action to precede and select Insert before.
NOTE: When you add actions to an existing workflow
that is associated with a group, you only see the action
types that are allowed in the action sequence.
Editing an action
You can edit all the properties of an existing action.
Perform one of the following tasks to edit an action.
● Open the Policy Action wizard for the action by using one of the methods in the following table.
● Use the quick edit option in the Actions window of a Workflow resource. To modify a specific attribute that appears in the
resource window, place the mouse in the cell that contains the attribute that you want to change, then right-click. The
menu displays an option to edit the attribute. For example, to modify the Comment attribute, right-click the resource in the
Comment cell and select Edit Comment.
NOTE: To modify a specific attribute for multiple resources, press and hold the Ctrl key, select each resource, and
then right-click in the cell that contains the attribute that you want to change. The menu displays an option to edit the
attribute. Application information field or any environment variable must be set in the following way:
○ VARIABLE_NAME=VARIABLE_VALUE
Deleting an action
You can delete an action in a workflow either when you are creating or editing a workflow, or as a separate process from the
workflow configuration.
If the action that you delete is part of a sequence of actions in a workflow, then you can only delete the action if the removal of
the action from the sequence would still result in a valid workflow. The properties for other actions in a sequence are updated to
reflect the new sequence of actions after the deletion.
● To delete an action when you are creating or editing a workflow:
1. Select the action in either the New Workflow dialog box or the Workflow Properties dialog box.
2. Click Delete.
A confirmation message appears.
3. Click Yes.
● To delete an action as a separate process from workflow configuration:
1. In the Administration window, click Protection.
2. In the expanded left pane, select Policies.
3. Select the policy.
4. Select the workflow.
5. In the right pane, select the Actions tab.
6. Right-click the action and select Delete.
A confirmation message appears.
7. Click Yes.
Commands
At each input prompt, nsradmin command expects a command name and some optional arguments. Command names can be
shortened to the smallest unique string (for example, p for print). Command arguments are always specified in the form of an
attribute list.
NOTE: Comma separated inputs for resource names are supported for print, update, and delete operations only.
The number of characters allowed for policy, action, and workflow are 64.
● Legal Characters:_ - + = # , . % @
● Illegal Characters: /\*:?[]()$!^;'"`~><&|{}
To print (display) all policies nsradmin> . type: NSR Protection Policy; Notification action:
with specific attribute value "nsrlog -f policy_notifications_updated.log" nsradmin> print
To update all policies that nsradmin> . type: NSR Protection Policy; comment: Gold policy
match specific comment value
nsradmin> update Notification action:"nsrlog -f
policy_notifications_updated.log"
To delete a policy nsradmin> delete type: NSR Protection Policy; name: Policy1
To delete multiple policies nsradmin> delete type: NSR Protection Policy; name: Policy1,
with comma separated names Policy3, Policy3
To set current query to nsradmin>. type: NSR Protection Policy; comment: Backup
all policies with specific
comment attribute value
Managing Workflows
The following table lists the nsradmin commands to manage NSR Protection Policy Workflow resources:
To create workflow with nsradmin> create type: NSR Protection Policy Workflow; name:
specific settings Policy1-Workflow1; policy name: Policy1; Auto Start enabled: yes;
Start time:"08:00"
To print (display) workflow with nsradmin> . type: NSR Protection Policy Workflow; name: Policy1-
query name Workflow1
nsradmin> print
To print all workflows nsradmin> print type: NSR Protection Policy Workflow
To update query set workflow nsradmin> . type: NSR Protection Policy Workflow; policy name:
Policy1; name: Policy1-Workflow1
nsradmin> update Notification action: "nsrlog -f
workflow_notifications_SAP.log"
To delete workflow nsradmin> delete type: NSR Protection Policy Workflow; policy
name: Policy1; name: Policy1-Workflow1
To delete all workflows with nsradmin> delete type: NSR Protection Policy Workflow; name:
query set as name Policy1-Workflow1
To delete multiple workflows nsradmin> delete type: NSR Protection Policy Workflow;
name: policy1-Workflow1; name: Policy1-Workflow2; name: Policy1-
Workflow3
To delete all workflows from nsradmin> delete type: NSR Protection Policy Workflow; policy
multiple policies, policy names name: policy1, Policy3, Policy3
given as comma separated
To set current query to a nsradmin> . type: NSR Protection Policy Workflow; policy name:
workflow Policy1; name: Policy1-Workflow1
Managing Actions
The following table lists nsradmin commands that manage NSR Protection Policy Action resources:
To create action with nsradmin> create type: NSR Protection Policy Action; policy name:
specific settings Policy1; Workflow name: Policy1-Workflow1; name: BackupAction1;
action type:backup; backup subtype:traditional; period:week;
actions:"full,full,full,incr,incr,incr,incr"; destination storage
node:"nsrserverhost"; destination pool: Data Domain Default;apply dd
retention lock:yes; dd retention lock time:"16 Days"; client can
override:no; overrides:"full third wednesday every month"; action
retries:3; retry delay:10; action inactivity timeout:44; action
parallelism:50; failure impact:"abort action"; soft limit:"21:23";
hard limit:"18:14"; start time:"14:14"
To create action with nsradmin> create type: NSR Protection Policy Action; name:
subtype snapshot Snaphot1 ; policy name: Policy1; workflow name: Policy1-Workflow1;
action type: backup; backup subtype: snapshot
To create action with type nsradmin> create type: NSR Protection Policy Action; policy name:
clone following action type Policy1; workflow name: Policy1-Workflow1; action type: clone;
backup driven by: BackupAction1; name: Clone1; Retention: 1 Years;
browse:"2 Days"; destination pool: Data Domain Default Clone
To create a dependent clone nsradmin> create type: NSR Protection Policy Action; policy name:
action driven by earlier clone Policy1; workflow name: Policy1-Workflow1; action type: clone;
action driven by: Clone1; name: Clone2; Retention: 5 Years; Browse: 2
Years; destination pool: Data Domain Default Clone
To print (display) query set nsradmin> print type: NSR Protection Policy Action; policy name:
action Policy1; workflow name: Policy1-Workflow1; name: BackupAction1
To update a query set action nsradmin> . type: NSR Protection Policy Action; policy name:
Policy1; workflow name: Policy1-Workflow1; name: BackupAction1
nsradmin> update retention: 6 Months; browse:2 Months; dd retention
lock time:3 Months; destination storage node: networker; client
can override: yes; comment "This is special action with 3 Months
Retention Lock!"
nsradmin> update period: month; actions:
"full,incr,full,incr,full,incr,full,full,incr,full,incr,full,incr,fu
ll,full,incr,full,incr,full,incr,full,full,incr,full,incr,full,incr,
full,incr,full,incr"
To delete a query set action nsradmin> delete type: NSR Protection Policy Action; policy name:
Policy1; workflow name: Policy1-Workflow1; name: BackupAction1
To delete all actions with nsradmin> delete type: NSR Protection Policy Action; name: Snaphot1
query set name from all
workflows
To delete multiple actions nsradmin> delete type: NSR Protection Policy Action; policy name:
from single workflow Policy1; workflow name: Policy1-Workflow1; name: Clone1; name:
specifying action names Clone2; name: BackupAction1
To delete multiple actions nsradmin> delete type: NSR Protection Policy Action; name:
with comma separated BackupAction1, Clone1, Clone2
names
To delete all actions from nsradmin> delete type: NSR Protection Policy Action; policy name:
query set workflow Policy1; workflow name: Policy1-Workflow1
To set current query to an nsradmin> . type: NSR Protection Policy Action; policy name:
action Policy1; workflow name: Policy1-Workflow1; name: BackupAction1
Specify the time range in which NetWorker searches for eligible save sets to clone in
the media database.
Filter Time Range Start: Start time of the saveset in 24-hours format
Filter Time Range End: End time of saveset in 24-hours format
Save set Filter Exclude saveset type: Yes/No/Do not filter (Default value for attribute)
Filter Save set type: Protectpoint, Snapshot
Client Filter Exclude client: Yes/No/Do not filter (Default value for attribute)
Filter Client: Comma separated list of clients
Level Filter Exclude level: Yes/No/Do not filter (Default value for attribute)
Filter level: full, incr, 1, txnlog
When the value for Exclude is set to Do not Filter, filters (Time, Saveset, Client, Level) attribute values are not applied. Any
changes to filters do not take effect unless exclude level is set to Yes or No. When Exclude is updated to Do not filter, all filters
attribute values are set to Null. When Exclude is set to Do not filter, filter values are not updated and processed and no error
messages are printed.
NOTE: If the head action has more than one action dependent on it, then the head action cannot be deleted.
All other RAP resources including NSR Protection Policy resource can be queried without specifying RAP resource Types.
To specify a backup level override of 3 and a retention period of 3 years for the backup and clone actions for a workflow named
fs_backup_clone, an backup action named backup and a clone action named clone, type the following command:
nsrworkflow -p Backup -w fs_backup_clone -A "backup -l 3 -y \"3 years\"" -A "clone -y \"3
years\""
The following example commands use the nsrworkflow -a flag, the -A flag to specify the schedule activity, and the
backup-level override flag:
● Single saveset backup:
nsrworkflow -p <Policy> -w <Workflow> -A "backup -l full -c 10.63.101.77:<file_path>" -a
{
"policyName": "Server Protection",
"policyComment": "Default policy for server that includes server backup and maintenance",
"policySummaryNotification": {
"policyCompletionNotificationAction": "nsrlog -f policy_notifications.log",
"policyCompletionNotificationExecuteOn": "completion"
},
"policyWorkflows": [
{
"workflowName": "Server backup",
"synthesisRoot": [
"NSR group/Server backup",
"NSR Snapshot Policy/Server backup"
],
"workflowActions": [
{
"actionName": "Server db backup",
"actionSpecific": {
"actions": {
"actionType": "server backup",
"asbDestinationPool": "Default",
"asbDestinationStorageNode": "nsrserverhost",
"asbPerformBootstrap": true,
"asbPerformCFI": true,
"asbRetentionPeriod": "1 Months"
}
Troubleshooting policies
This section provides information about issues related to the configuration and management of policy resources.
nsradmin
3. From the nsradmin prompt, define the attributes that nsradmin will display for a resource, for example, the resource
name and the save set value, by typing the following command:
show name; save set
4. Enable nsradmin to display the hidden resource ID attribute for the NetWorker resources:
option resource id
5. Display a list of client resources, by typing the following command:
p type: nsr client
6. From the output, record the resource identifier that appears for the client resource that contains the save set associated
with the action that you want to debug. For example, output similar to the following appears:
name:foo.com;
saveset:/baz;
resourceidentifier:70.0.77.10.0.0.0.0.208.36.124.87.128.222.109.22(1);
name:foo.com;
saveset:/foo,/bar;
resourceidentifier:93.0.89.114.0.0.0.0.55.25.124.87.128.222.109.22;(9)
NOTE: The resource ID does not include the brackets or the number contained within the brackets.
7. Use the savegrp command and the resource ID to start the action:
For example:
echo 93.0.89.114.0.0.0.0.55.25.124.87.128.222.109.22|savegrp --policy_name=Backup --
workflow_name=traditional1 --action_name=backup -v --driven_by_action=stdin
Save sets
The collection of data items that are backed up during a backup session between the NetWorker server and a Client resource is
called a save set.
A save set can consist of the following:
Table 55. File systems excluded from the ALL save set
● hsfs ● sharefs ● dfs ● binfmt_misc ● nucam
● proc ● nfs2 ● autofs ● usbfs ● fdfs
● fd ● nfs3 ● iso9060 ● devpts ● xx
● cachefs ● nfs3perf ● udf ● cifs ● none
● lofs ● profs ● sysfs ● swap
● mntfs ● nfs4 ● debugfs ● tmp
● ctfs ● nfs ● subfs ● tmpfs
● objfs ● brfs ● usbdevfs ● nucfs
NOTE: When you use the ALL save set for a backup, the NetWorker software creates a temporary file similar to a directive
under each drive. The file name uses the format drive guid.txt and lists the files that are excluded from the backup.
The file is temporary and is automatically deleted when the backup completes.
To recover all data from a disk failure on Day 4, you need the data from the full backup from September 30 and the cumulative
incremental backup on Day 4. You no longer need the data from Day 1, 2, and 3, because the volume with the cumulative
incremental backup includes that information.
In this example, the synthetic full backup operation creates the incremental backup at T4. Then a synthetic full backup is
created by combining the full backup at T1 with the subsequent incremental backups at T2, T3, and T4 to form a synthetic full
backup at T4 + Delta. The save set at T4 + Delta is equivalent to a full backup that is taken at T4.
The T4 + Delta represents a small time change of one or two seconds from the time of T4, since two separate save sets
cannot be assigned the exact same save set time. For example, if T4 is created at 1334389404, then T4+Delta is created at
1334389405, with a difference of one second.
The synthetic full save set includes only files that are covered by save sets up to T4 at 1334389404. The incremental backup
after the synthetic full backup at 1334389405 includes all changes since 1334389404. Note that the synthetic full backup does
not include the changes since T4, since only one save set can exist at any particular time.
After a synthetic full backup is performed, the next synthetic full backup combines the previous synthetic full backup and
subsequent incremental backups.
To manage resource usage, perform synthetic full operations outside of the normal backup window. Also, synthetic full
backups do not eliminate the requirement for full backups. It is best practice to schedule and perform full backups on a
monthly or quarterly basis and limit the number of incremental backups.
Backups that are performed during a checkpoint restart might be in a synthetic full backup, if the other requirements for
synthetic full backups are met.
For UNIX clients, include the forward slash to designate root (/) when specifying a save set name for the client resource.
Otherwise, the synthetic full backup fails. For example, specify /tmp instead of tmp.
For Windows clients, include the backslash (\) when specifying a drive letter in a save set name for the client resource.
Otherwise, the synthetic full backup fails. For example, specify D:\ instead of D:.
Create separate groups for Windows clients and UNIX clients. Do not mix clients with different operating system types in the
same group.
3. Create a policy.
Policies provide a container for the workflows, actions, and groups that support and define the backup action.
4. Create a workflow.
Workflows define the start time for a series of actions, the order of actions in a sequence, and the group of client resources
for which the action occurs.
5. Use the Policy Action wizard to create a traditional backup action with the following settings:
● In the schedule area of the Choose Action Type page, click the icon on each day to specify the type of backup to
perform. The following icon indicates that a synthetic full backup will occur on the selected day:
● On the Options page, leave the Verify synthetic full option selected to verify the integrity of the new index entries
that are created in the client file index for the synthetic full backup.
● On the Options page, leave the Revert to full when synthetic full fails option selected to perform a full backup of
the save set if the synthetic full backup fails.
Validating synthetic full backups in the Media window of the Administration interface
When you search for save sets in the Media window of the Administration interface, you can limit the save set results to
synthetic full save sets by selecting the Synthetic Full checkbox on the Query Save Set tab. Searching for save sets on page
360 provides instructions.
Table 60. Comparison of traditional synthetic full and virtual synthetic full backups
Traditional synthetic full Virtual synthetic full
Data is read from and written to volumes. Data movement is limited within the same Data Domain
system.
Read/write for all types of volumes is supported. Only Data Domain devices are supported, and the source and
destination volumes must belong to the same Data Domain
system. However, the volumes can belong to different MTrees
in the same Data Domain system.
The client file index is created by nsrrecopy. The client file index is created by nsrconsolidate.
Backup storage All constituent backups for the VSF backup must be on the
same Data Domain system. The save sets can be distributed
across multiple storage nodes and located in different MTrees
on the Data Domain system.
Client resource configuration ● Enable the Client direct attribute on the General tab of
the Client Properties dialog box for the client resource.
NetWorker upgrade requirements If you upgrade the NetWorker client to release 8.1 or later
from a release before 8.1, you must perform a full backup
before you perform a VSF backup. Otherwise, file-by-file
recovery fails.
Cloning requirements The virtual-synthetics option must be enabled for
Data Domain systems being used for cloning VSF backups.
Otherwise, cloning fails.
The NetWorker Data Domain Boost Integration Guide provides details on configuring the NetWorker environment for use with a
Data Domain system.
Backup scheduling
When you schedule backups, you define the days on which backups occur and the level of backup (full, incremental, and so on)
that occurs each day.
Depending on the size of a network, you could perform full backups for all clients simultaneously. For example, if no one works
over the weekend you could schedule full backups during this time.
Alternatively, you may need to configure backups to balance the backup load on and increase the efficiency of a NetWorker
server. Since full backups transfer large amounts of data and typically take longer than other backup levels, you might want
to stagger them throughout the week. For example, you could configure backups so that full backups occur for one group of
clients on Sunday, for a second group of clients on Tuesday, and a third group of clients on Thursday, as illustrated in the
following figure.
Figure 42. Staggered weekly backup schedule for multiple groups of clients
NOTE: Consider using a synthetic full backup in environments with a short backup window period when you must create a
full backup.
Recovery considerations
You must also determine the requirements for recovering files. For example, if users expect to recover any version of a lost file
that was backed up during a three-month period (that is, the retention setting is three months), then you must maintain all the
backup volumes for a three-month period. However, if users expect to be able to recover data from only the last month, you do
not need to maintain as many volumes.
You can also configure the schedule for a backup action on a monthly basis instead of on a weekly basis.
Click the icon in the schedule to change the backup level that is performed on that day. The following table provides details
about the backup level that each icon represents.
The following figure illustrates the Predefined NSR schedule that can be associated with the action. If a level needs to be
changed, it can be done by updating the NSR schedule resource:
Preconfigured schedules
When you override the policy backup schedule for a client resource, you can select or customize one of the preconfigured
schedules that are available when you install or upgrade the NetWorker software.
The following table describes the preconfigured schedules.
Full on 1st of Month Monthly schedule that performs a full backup on the first
calendar day of the month, and incremental backups on all
other days.
Quarterly Monthly schedule that performs a full backup on the first day
of a quarter, a cumulative incremental backup once a week
after the full backup, and then incremental backups on all
other days.
Synthetic Full Monthly schedule that performs a synthetic full backup on the
1st Friday of Month first Friday of every month, and incremental backups on all
other days.
Synthetic Full Weekly schedule that performs a synthetic full backup on
Every Friday every Friday and incremental backups on all other days.
Synthetic Full Monthly schedule that performs a synthetic full backup on the
on 1st of Month first calendar day of the month, and incremental backups on
all other days.
Synthetic Full Monthly schedule that performs a synthetic full backup on
Quarterly the first day of each quarter, a cumulative incremental
backup once a week after the synthetic full backup, and then
incremental backups on all other days.
You can edit all preconfigured schedules except for schedules that contain overrides, which are indicated by an asterisk next to
a backup level in the schedule calendar. You cannot delete a preconfigured schedule.
Editing a schedule
You can edit all custom schedules, and all preconfigured schedules, except for preconfigured schedules that contain overrides.
Overrides are indicated by an asterisk next to a backup level in the schedule calendar. You can edit all schedule settings except
for the name.
1. In the Administration window, click Protection.
2. In the expanded left pane, select Schedules.
3. In the right pane, right-click the schedule and select Properties.
The Schedule Properties dialog box appears.
4. Edit the settings for the schedule and click OK.
Copying a schedule
You can create a new backup schedule by copying an existing schedule and then editing the copy.
1. In the Administration window, click Protection.
2. In the expanded left pane, select Schedules.
3. In the right pane, right-click the schedule to copy and select Copy.
The Create Schedule dialog box appears with the same information as the copied schedule except for the name.
4. In the Name box, type a name for the new schedule.
5. Edit the settings for the schedule and click OK.
Deleting a schedule
You can delete any custom schedules that you have created. You cannot delete preconfigured schedules.
Ensure that the schedule has not been applied to any Client resources by verifying the setting in the Schedule list on the
General tab of the Client Properties dialog box for each Client resource.
1. In the Administration window, click Protection.
2. In the expanded left pane, select Schedules.
3. In the right pane, right-click the schedule and select Delete.
A confirmation message appears.
4. Click Yes.
Types of schedule
The following table mentions the various schedule types, the corresponding activity type that needs to be provided during
create, update, and delete of NSR schedule resource and the supported levels and the actions of the NSR schedule resource
that can be used for.
NOTE:
● The default activity type is backup and the default period is month.
● The default values for the action attribute are populated as per the above table.
● If the action attribute is being provided, then the period attribute also needs to be provided.
● The activity type can be set only during the create operation and cannot be updated.
● All NSR schedule associations need to be removed from the workflow or action, before it can be deleted.
● The create or update operation might fail if an invalid level is specified for a given activity type.
VMware incr incr incr incr incr incr incr incr incr incr incr incr incr
incr
incr incr incr incr incr incr incr
incr incr incr incr incr incr incr
incr incr incr incr incr incr incr
incr incr incr
Server backup full incr incr incr incr incr incr full incr incr incr incr incr
incr
incr incr incr incr incr incr incr
incr incr incr incr incr incr incr
incr incr incr incr incr incr incr
incr incr incr
Execute exec exec exec exec exec exec exec exec exec exec exec exec
exec exec
exec exec exec exec exec exec exec
exec exec exec exec exec exec exec
exec exec exec exec exec exec exec
If you set a retention policy on February 29 of a leap year, the last day in which the policy applied is 1 day earlier than you
might expect. For example, if you set a retention policy to 1 year on March 3, 2015, the save set will expire on March 3, 2016
as expected, which is 366 days. If you set a retention policy to 1 year on February 29, 2016, you might expect that the policy
will expire March 1, 2017. However, the policy will actually expire on February 28, 2017, which is 365 days. This behavior is
only seen when a retention policy is set on February 29 for one or more years.
● To change the browse time to six months from the current date and time, type the following commands:
● To change the retention time to two years from the current date and time, type the following commands:
● To change the he retention time to 50 years from the current date and time, type the following commands:
NOTE:
This feature is only supported for File systems type of savesets and not supported for NAS (snapshot and clone), VMware,
NMDA, NMSAP, and NMM savesets.
2. Update the browse and retention time value of the respective clone action to a value greater than the year 2038 and
perform the respective clone actions.
NOTE: Update only the NetWorker server to NetWorker 19.3 or later and clients can still be on any supported
NetWorker version. The backups are limited to the retention time of the year 2038. You can later change it to a value
greater than the year 2038 using the nsrmm command available as part of NetWorker 19.3 and later.
3. Change the browse and retention time value of the backups and clones using the nsrmm command available as part of
NetWorker 19.3 and later. No change in the actions are required.
NOTE: Update only the NetWorker server to NetWorker 19.3 or later.
Upgrade path
To support save set retention time beyond the year 2038, update the NetWorker server to NetWorker 19.5. Direct upgrade from
NetWorker 8.2.4 to NetWorker 19.5 is supported. Versions prior to NetWorker 8.2.4, need to be upgraded to NetWorker 8.2.4
before upgrading to NetWorker 19.5.
Querying save sets for old and new forever retention time
When the NetWorker server is upgraded to NetWorker 19.3 or later, the save sets with the old forever retention time are not
automatically upgraded to the new forever time. Manually modify this to a value according to your requirement.
To obtain the save sets with the old and new forever retention time, use the following commands:
The mminfo command returns retention time of save sets with old forever retention time as the absolute value of retention
time and the retention time of save sets with new forever retention time as a value of forever. For example,
NOTE: During the upgrade of the NetWorker server to NetWorker 19.3 and later, the media database is queried
for all the save sets with an old forever retention time and are logged under the nsr/logs folder in the file
old_forever_retention_savesets-<timestamp>.log of the NetWorker installation.
Following are the save sets which have an older forever retention time of 2147483647
(Tuesday Jan 19 08:44:06 2038)
Start time: Mon Dec 16 16:08:23 2019
ClientName Saveset ID Saveset Name
Backward Compatibility
With NetWorker versions prior to 19.3, the save sets cannot be configured for retention time beyond the year 2038. When you
try to set a date beyond the year 2038, NetWorker returns an invalid retention time and the corresponding operation fails. From
NetWorker 19.3 onwards, you can set a retention time beyond the year 2038, up to 136 years from the current date of execution
for the respective action.
Refer to the following table for backward compatibility information of older clients:
1. A NetWorker 19.5 client communicating with a pre-NetWorker 19.5 server is not an officially supported configuration.
2. Backup actions are not supported due to 32 bit operating system limitation. However, clone actions are supported.
3. Backup actions are not supported. However, clone actions are supported.
NOTE: Old forever value is 19th Jan 2038 and new forever value is ~292 billion years.
Renamed directories
When you rename a directory, a full backup is performed on all subdirectories and files of the renamed directory.
If you then rename the directory back to its original name, then files and subdirectories of the directory are not eligible for
backup until the files or subdirectories are updated or the next full backup occurs.
You can change this default behavior by clearing the Backup renamed directories checkbox on the General tab of the Client
Properties dialog box for a Client resource. You must select View > Diagnostic Mode in the Administration interface to
access the Backup renamed directories attribute in the Client Properties dialog box.
When you clear the Backup renamed directories checkbox for a Client resource, unchanged files and folders under the
renamed directory are skipped during a non-full backup. This behavior can cause unexpected results during a recovery operation.
If you try to recover data under a renamed directory from a date between the time that the directory was renamed and the next
Raw partitions
The NetWorker software must have exclusive access to a file system to perform a raw backup. Close as many applications as
possible before doing a raw disk backup. If the raw partition contains data that are managed by an active database management
system (DBMS), ensure that the partition is offline and the database manager is shut down. For greater flexibility when backing
up partitions that contain DBMS data, use a NetWorker Module application.
If the client parallelism is less than the PSS:streams_per_ss default 4 or the lowest configured value, the backup fails
displaying an error message.
The PSS:streams_per_ss values range from 1 to 8. If you specify an invalid value, the backup proceeds with the default
value 4, and a warning message displays stating that that the entire PSS:streams_per_ss parameter is ignored.
The NetWorker Performance Optimization Planning Guide provides complete details on PSS requirements and performance
benefits.
Troubleshooting PSS
It is recommended that you troubleshoot PSS with the guidance of Customer Service. The NetWorker Performance
Optimization Planning Guide provides complete details on PSS requirements and performance benefits.
1. Enable detailed logging for the client:
a. Specify the following value for the Backup command attribute on the Apps & Modules tab of the Client Properties
box:
save -v -D7 (or D9 for more detailed logging)
b. Type the following command at the command prompt on the client computer:
touch /nsr/debug/mbsdfopen
2. In the Protection window of the Administration interface, enable the -v verbose option for scheduled backups by
selecting Policies > policy name > workflow name.
3. Wait for the next backup to occur, or manually start a backup by using one of the following methods:
● In the Protection window of the Administration interface, right-click the workflow and select Start.
● Use the nsrpolicy command on NetWorker server:
4. After the workflow finishes, collect the log files in the following table for Customer Service.
NetWorker ● /nsr/logs/daemon.raw
server ● All log files in /nsr/logs/policy/policy_name/ workflow_name/
action_name_sequence#_logs/*
For example, /nsr/logs/policy/Silver/Filesystem/Backup_032334_logs/*
● /nsr/tmp/savegrp.log
Open files
Open files are a problem that all data backup applications must solve. Open files that are not backed up correctly represent a
potential data loss. They might be skipped, improperly backed up, or locked.
NetWorker can open files that are owned by the operating system and files that are owned by a specific application.
When you use VSS technology with NetWorker to create snapshot backups of volumes and exact copies of files, the backup
includes all open files and files that change during the backup process.
Data deduplication
Data deduplication is a type of data compression that removes duplicate information to reduce the amount of backup data sent
to storage devices and reduce the bandwidth that is required for the data transport. You can implement data deduplication of
NetWorker backup data by storing backups on Data Domain Boost deduplication devices.
Directives
Directives are resources that contain special instructions that control how the NetWorker server processes files and directories
during backup and recovery. Directives enable you to customize the NetWorker software, maximize the efficiency of backups,
and apply special handling to individual files or directories.
Types of directives
There are three types of directives.
● Global directives—Stored as resources on the NetWorker server and can be selectively applied to individual clients by using
the Directive attribute of the Client resource.
● NetWorker User local directive—On Windows clients only, users with local Windows Administrator or Backup Operator
privileges can create a local directive in the NetWorker User program. A file that is named networkr.cfg on the
client file system contains the directive configuration information. NetWorker uses the directive that is specified in the
networkr.cfg during a scheduled backup, a backup that is started with the NetWorker User application, and save
operations that do not include the -i option.
● Local directive files—User-created files named nsr.dir (Windows) or .nsr (UNIX) anywhere on a client file system
where they have permission to create files. These directives apply only to the immediate data within the path where the
directive file is located.
where:
● The directive statement does not contain blank lines.
● directory_specification is the absolute path to the highest-level directory for which the ASM in the directive applies.
● [+] is optional. The presence of the plus (+) sign indicates that the directive recursively applies to the directory defined by
the absolute path and all subdirectories.
● ASM is the ASM that specifies the action to take on one or more files in the current directory.
● pattern is a list of file or directory names, in the current directory on which to apply the ASM.
The pattern can include multiple names that are separated by spaces, and wildcards. Wildcards can replace a single character
or string of characters. Directive statements support the use of standard shell command interpreter file matching patterns.
You cannot specify lower-level subdirectories in the pattern. That is, the pattern must not contain the Unix "/" or Windows
"\" directory separator.
NOTE: File names are case-insensitive for directives that are applied to Windows clients.
● save_environment_keyword is a NetWorker keyword that controls how the current ASM and subsequent ASMs that apply
to the current directory and subdirectories are applied in the directive statement.
● comment is a user-defined description of the directive statement. A hash (#) character must precede the comment.
NOTE: If an ASM or pattern name includes a space, enclose the name or argument in double quotation marks.
The UNIX man page and the NetWorker Command Reference Guide provides detailed information about directives in the nsr
and nsr_directive commands.
● The following Windows directive compresses the tmp folder data for each user whose name starts with letters A, B, C, or D:
<< "*C:\*\users\[A-D]*\tmp\" >> +compressasm: *
NOTE:
● Networker does not support symbolic links in skip directives. Symbolic links are considered as regular files.
For example, the symbolic link for the file example.dbf is .example.dbf.To skip the file .example.dbf, you must use
+skip: .*.dbf.
● Do not use wildcards in Windows VSS source volume directory mount names.
When the compressasm is positioned at the end of the directive, the commands in the directive work in the order that is
mentioned. The files specified with +skip are skipped and the rest are compressed. Example
+skip: zzz_DUMMY*
+skip: *.tmp
+skip: .db2diag.log.swp
skip: tmp_mnt
+compressasm -gzip -1: * .* *.*
! Exclamation Must be used directly after the opening square bracket in an expression, for
example, [!...]. Matches any single character except for the characters typed after
the !. For example, to match any single character except a, b, and c, type:
[!abc]
- Hyphen When a hyphen is used between two characters within square brackets, it indicates
a range inclusive of those two characters. For example, the following directory
specification includes all user folders beginning with A, B, C, or D:
<< */*/users/[A-D]*/tmp/ >>
NOTE: Wildcards directives are applied only by the save process in the scheduled backup workflow. When you skip
unwanted mount points using directory specification wildcard directives with the save set keyword All, save processes still
run for the unwanted mount points. However, the save processes only log messages that the contents of the mount points
were skipped. For example: << */TestFileSystem[5-9]?/ >> +skip: *.
NOTE: A space appears after the first asterisk (*) in the pattern.
This example uses the skip ASM to instruct the NetWorker server to skip all files that are named *.o in the SRC directory and
all subdirectories. It then uses the forget keyword to instruct the server to not apply the skip ASM to the SYS subdirectory.
Both the G:\SRC and the G:\SRC\SYS directories must be explicitly specified on separate lines in the client resource Save
Set attribute.
Global directives
Global directives are stored as resources on the NetWorker server and can be selectively applied to individual clients by using
the Directive attribute of the Client resource.
Global directives are listed when you select Directives in the expanded left pane of the Server window in the Administration
interface. You can add, edit, copy, and delete global directives.
/Desktop DF
/cores
/VM_Storage
/TheVolumeSettingsFolder
/private/var/db/netinfo
/private/var/db/openldap
/private/tmp
/.Spotlight-V100
/.hotfiles.btree
● The allow save environment keyword is applied to
the /nsr directory to ensure that local directives in /nsr
and subsequent subdirectories are applied.
● The logasm ASM is applied to the /nsr/logs and /var
directories.
● The swapasm ASM is applied to the /private/var/vm
VCB directives VCB directives are valid for backing up virtual machines using
the VCB methodology. This directive is supported in the
following scenarios:
● When file level incremental backups are performed instead
of FULL image level backups.
● When FULL file level or incremental file level backups are
performed when the save set is ALLVMFS.
The vcb directive skips the following files and folders:
● pagefile.sys
● hiberfil.sys (Hibernation file)
● WINDOWS\system folder
● WINDOWS\System32 folder
<<"C:\TEMP">>
skip
Format of directive statements provides more information about how to create a directive statement.
7. To specify a restricted datazone (RDZ) for the directive, click the Restricted Data Zones tab and then select the RDZ
from the list.
8. Click OK.
Apply the global directive to a Client resource by selecting the directive from the Directive list on the General tab of the
Client Properties dialog box for the Client resource.
4. Edit the settings for the global directive, then click OK.
5. From the File menu, select Save Backup Directives to save changes.
Depending on user privileges and the operating system version, the networkr.cfg file is created in one of the following
locations:
● If you are logged in with local Windows Administrator or Backup Operator privileges, networkr.cfg is created in the
root of the system volume (usually C:\).
● If you are not logged in with local Windows Administrator or Backup Operator privileges, networkr.cfg is created in
%SystemDrive%\Documents and Settings\User_name\Application Data\EMC NetWorker.
NOTE: The Application Data directories are hidden by default. To view these directories by using Windows
Explorer, select Tools > Folder Options. On the View tab of the View Options dialog box, select the Show
hidden files and folders option.
<<"C:\TEMP">>
skip
Format of directive statements provides more information about how to create a directive statement.
3. Save the local directive file.
● On Windows, the file must be named nsr.dir. The user account that creates the file must have the permissions to
create files either within the root of the volume or in a folder within the volume.
● On UNIX, the file must be named .nsr.
Hard links
You can back up and recover files with hard links on a Windows client. However, the hard links of files that are created by using
a Portable Operating System Interface (POSIX) application are not preserved during recovery.
Support for hard links is disabled by default to improve performance.
Microsoft DFS
You can back up and restore Microsoft Distributed File System (DFS) data.
Microsoft DFS is a Windows file system feature that enables you to create a namespace of shared directories that are physically
distributed across a network. With DFS, you can organize a set of distributed directories logically, according to any scheme you
choose, to provide centralized access to files that reside in a variety of locations.
DFS junctions
A DFS junction is a DFS root or link:
● A DFS root is a namespace for files and DFS links.
● A DFS link is a connection to a shared file or folder.
DFS junctions are file system objects, not files or directories. Therefore, the NetWorker software does not treat DFS junctions
the same as files or directories for backup and recovery. However, DFS junctions appear as files and directories in the
NetWorker User program.
To avoid inconsistencies among the various save sets, configure a scheduled backup that includes the DFS topology information,
junctions, and destination directories. Alternatively, you can use the ALL-DFSR save set.
NOTE: When a DFS client resource is run for the first time, the save set sizes should be verified to ensure that they are
correct.
To configure a scheduled backup for a DFS:
1. In the Administration screen, include the following clients in the NetWorker group that will back up the DFS:
● The DFS host server
● Any computer where remote DFS destination directories reside
● A domain controller (domain-based DFS only)
For example, you could create a NetWorker group named DFS, then make each of the preceding clients a member of the
DFS group.
2. Enter the following save sets in the Save Set attribute of the DFS host server’s client resource:
● The DFS root. For example, C:\MyDfsRoot.
● DFS destination directories that reside on the DFS host. For example, D:\MyLocalDir
NOTE: DFS destination directories are also be backed up if you enter the entire volume (for example, D:\) in the
Save Set attribute.
E:\MyRemoteDir
E:\MyOtherRemoteDir
E:\
Short filenames
You can back up and recover the short filenames that are automatically assigned by the Windows filename mapping feature.
Windows filename mapping is an operating system feature in which each file or folder with a name that does not conform to the
MS-DOS 8.3 naming standard is automatically assigned a second name that does. For example, a directory named Microsoft
Office might be assigned a second name of MICROS~2.
Backup and recovery of short filenames is disabled by default to improve performance. To enable backup and recovery of short
filenames on a client, select the Short filenames checkbox on the Globals (2 of 2) tab of the Client Properties dialog box
for the client resource.
You must enable diagnostic mode view by selecting View > Diagnostic Mode in the Administration window to access the
Short filenames checkbox.
To include mount points in a manual backup with the NetWorker User program, select the checkbox next to the mount point
name within the host volume entry in the Backup window.
To perform a manual backup of nested mount points and their data, perform a separate backup for each mount point. When you
select a mount point in the Backup window, all files, directories, and nested mount points beneath the mount point are selected
by default. Before you start the backup, clear the checkboxes next to any nested mount points. Then perform separate backups
for the nested mount points.
Overview of VSS
If the NetWorker Module for Microsoft is installed on the client computer, information in this chapter might be superseded by
information in the NetWorker Module for Microsoft documentation. The NetWorker Module for Microsoft Administration Guide
provides more information about the NetWorker Module for Microsoft.
Volume Shadow Copy Service (VSS) is a Microsoft technology that acts as a coordinator among all the components that create,
archive, modify, back up, and restore data, including:
● The operating system
● Storage hardware
● Applications
● Utility or backup programs, such as NetWorker software
VSS allows for the creation of a point-in-time snapshot, or temporary copy, of a volume. Instead of backing up data directly
from the physical file system, data is backed up from the snapshot. In addition, VSS allows for a single, point-in-time capture of
the system state.
NetWorker uses VSS technology to create snapshot backups of volumes and exact copies of files, including all open files.
Databases and files that are open due to operator or system activity are backed up during a volume shadow copy. In this way,
files that have changed during the backup process are copied correctly.
Shadow copy (snapshot) backups ensure that:
● Applications can continue to write data to the volume during a backup.
● Open files are not omitted during a backup.
● Backups can be performed at any time, without locking out users.
NOTE: VSS backups do not use snapshot policies, which are required to perform snapshot backups. The NetWorker
Snapshot Management Integration Guide documentation provides more information.
Provider support
By default, the NetWorker client always chooses the Windows VSS system provider for backups. If you want to use a hardware
provider or a specific software provider for a particular NetWorker client, enter the following command in the NetWorker client
resource Save Operations attribute:
VSS:VSS_ALLOW_DEFAULT_PROVIDER=yes
When the previous command is specified for a NetWorker client, a backup provider is selected based on the following default
criteria as specified by Microsoft:
Notes:
● The Save Operations attribute does not support NetWorker Module save sets. If a NetWorker Module save set name is
entered in the window, the backup fails.
● If you enter a VSS command in the Save Operations attribute of the Administration window, the command runs when the
client backup is started as part of a save set.
● Use the Save Operations attribute only for clients running NetWorker software release 7.2 or later. If anything is entered in
this attribute for a client that is running an earlier NetWorker software release, the backup will fail.
Although the server name is not required in the preceding command example, include the name to ensure that the save
command finds the correct server. Separate multiple Save Operations commands with a semicolon (;).
The NetWorker Command Reference Guide provides more information about the save, savefs, and nsrarchive commands.
NOTE: If you change the VSS setting on a client by using the Local Save Operations dialog box or the command prompt,
it does not affect that client’s VSS setting on the server. Likewise, if you change a client’s VSS setting on the server, it
does not affect the Local Save Operations setting or the command-prompt VSS setting on the client.
VSS commands
This section lists the commands and syntax that are used to control VSS.
Backups fail.
To use a hardware provider or a specific VSS:VSS_ALLOW_DEFAULT_PROVIDE A backup provider is selected based on
software provider for a NetWorker client R=yes the following default Microsoft criteria:
backup.
If a hardware provider that supports
the particular volume on the NetWorker
client is available, it is selected.
Terminology
The following list provides a description of typical Windows BMR backup and recovery terminology. The road map indicates
which steps you must perform before you try a Windows BMR recovery.
This chapter uses the following terms to describe NetWorker support for Windows BMR technology:
Bare Metal The operation that restores the operating system and data on a host after a catastrophic failure, such
Recovery (BMR) as a hard disk failure or the corruption of critical operating system components. A BMR is an automated
Recovery The restoration of the operating system and data for a host after a catastrophic failure, such as a hard
disk failure or the corruption of critical operating system components. The recovery operation might be an
offline recovery (Windows BMR) or an online recovery.
NetWorker A bootable image that contains the NetWorker binaries and a wizard to control the Windows BMR
Windows BMR recovery process.
image
Non-critical A volume that contains user data and does not contain installed applications that run as a service.
volume
System State All the files that belong to VSS writers with a usage type of BootableSystemState or SystemService. You
data require these files to perform an offline recovery.
User data Data that users generate, typically for the purposes of a business function. For example, a Microsoft
Word document or an Excel spreadsheet. Windows BMR does not back up or recover user data unless the
data resides on a critical volume. The simplest way to back up all user data is to specify the keyword All in
the backup save set of the client resource. You can recover user data online at any time (on demand) or
after a Windows BMR recovery operation.
WinPE A bootable stripped-down version of the Windows operating system. The NetWorker Windows BMR
image contains a customized WinPE with NetWorker binaries and a wizard to control the offline recovery
process. WinPE does not support writers, except for the ASR writer. Therefore, VSS writers are not
available with a NetWorker Windows BMR.
NOTE: The NetWorker E-LAB Navigator provides more information about operating systems support for Windows BMR.
During an incremental backup, the backup operation checks both the modification time and the archive bit to determine if a file
must be backed up. The backup operation ignores the archive bit when you assign the nsr_avoid_archive variable a value of Yes
on the client host. As a result, NetWorker only uses the modification time to determine which files to back up.
Use the environment variable nsr_avoid_archive with caution. If you use the environment variable nsr_avoid_archive, test the
BMR backup image to ensure that you can recover the Windows system state correctly. Performing a BMR recovery to a
physical computer provides more information on validating the BMR backup image.
A Windows BMR recovery requires a successful backup of each component save set in the DISASTER_RECOVERY:\ save
set. If one component of the save set fails, then the backup operation fails. For a scheduled backup, NetWorker retries the
DISASTER_RECOVERY:\ backup. The number of retries that NetWorker performs is based on the value that is defined in the
client retries attribute of the protection group that the Client resource is assigned to.
Critical volumes
This topic describes critical volumes and the associated management tools.
NetWorker considers a volume as critical when it contains files for an installed Windows service. NetWorker also considers the
following volumes as critical and will include the volumes in a DISASTER_RECOVERY:\ backup:
● A non-critical volume that has a critical volume mounted on it, or a non-critical volume that serves as a parent to a critical
volume.
● All volumes on a dynamic disk when one of the volumes critical. If one disk in a dynamic disk pack is critical, then NetWorker
must treat all disks in that pack as critical. This can substantially increase the number of disks that NetWorker includes in the
BMR backup. It is recommended that you do not install services on a dynamic disk.
NOTE: By default, the Windows 2012 System Writer does not report Win32 Service Files as a part of systems components.
As a result, the volumes that contain Win32 Service Files are not considered critical and the DISASTER_RECOVERY:\ save
set will not include a volume that contains files for an installed service. To configure the Windows 2012 server to report
Win32 Service Files as a part of system components, set the ReportWin32ServicesNonSystemState registry sub key to 0.
Microsoft KB article 2792088 provides more information.
A Windows BMR backup does not back up the following files on a critical volume:
● Files listed in the FilesNotToBackup registry key.
● Files excluded by system writers.
● Files that an application VSS writer backs up. For example, Exchange databases. Use NetWorker Module for Microsoft
Applications (NMM) to backup these files.
NetWorker_install_path\bin>save -o VSS:LCV=yes
NetWorker does not support Windows Server 2012 Cluster Shared Volumes () as a critical volume. If a CSV disk is marked as a
NetWorker critical disk, then the Windows BMR backup reports a warning, and continues to perform the backup operation as if
the CSV is not on the critical list. NetWorker does not backup the CSV because a CSV cannot reside in the same shadow copy
set with a local volumes.
Applications such as SQL Server and Hyper-V in a Windows Continuous Availability scenario using CSV are not supported.
The NetWorker Cluster Integration Guide provides more details.
Active Directory SolVe Desktop provides procedures that describe how to recover this service.
NetWorker does not support the online recovery of any other Windows service that the WINDOWS ROLES AND FEATURES
save set contains. Unsupported online recovery of WINDOWS ROLES AND FEATURES components results in an inconsistent
state of the Windows server.
NOTE: When you perform an online recovery, you cannot mark the WINDOWS ROLES AND FEATURES save set and use
the Required Volumes option. To determine the volume that contains the WINDOWS ROLES AND FEATURES save set
that you want to restore, mark the DISASTER RECOVERY:\ save set, then use the Required Volumes option. After you
determine the required volumes, unmark the DISASTER RECOVERY:\ save set and mark the WINDOWS ROLES AND
FEATURES save set.
This section provides guidelines on how to plan your Windows BMR backups.
The BMR recovery process restores the operating system that was installed on the source host. If you perform a BMR recovery
to a different host with different hardware, after the recovery operation and restart completes, Windows prompts you to install
the required drivers.
Before you perform a BMR recovery to a different host, ensure that you meet the following requirements:
● The source and target hosts use the same processor architecture.
● The hardware on the target host is operational.
● The target host has a minimum of 512 MB of RAM.
● The target host startup hard disk capacity must be larger or the same size as on the source host, regardless of the amount
of space actually in use. If the disk is smaller by a single byte, BMR fails.
NOTE: Verify whether the source critical volumes are part of a larger physical disk. If critical volumes are on a larger
physical disk, all target critical volumes must be large enough to accommodate the entire underlying physical disk. Use
the Windows Disk Management utility to verify disk configuration and size.
● The number of disks on the target host is greater than or equal to the number of disks there were on the source host. The
disk LUN numbering on the target host must match the disk LUN numbering on the source host.
● The RAID configuration on the target host should match the disk order of the hard disks.
● The disk or RAID drivers that are used on the source system must be compatible with the disk or RAID controllers in the
target system. The recovery process restores the backup to the same logical disk number that was used by the source host.
You cannot restore the operating system to another hard disk.
● Windows BMR supports IDE, SATA, or SCSI hard disks. You can make the backup on one type of hard disk and recover on
another type of hard disk. For example, SAS to SATA is supported.
● The target system can access the Windows BMR image as a bootable CD/DVD volume or from a network start location.
● The target system has the NIC or storage device drivers installed that match the NIC.
NOTE: All NIC or storage device drivers must not require a restart to complete the driver installation process. If the
drivers require a restart, then the BMR recovery process fails and prompts you to install the drivers again.
The NetWorker BMR recovery operation uses the Microsoft ASR writer to reconstruct a disk configuration. The ASR writer
is sensitive to the disk numbers and disk configuration of the original host. NetWorker saves this disk information during a
Windows BMR backup and uses the disk configuration information to perform the recovery. After you reconfigure any disk on a
host, reboot the host and then perform a Windows BMR backup to ensure that NetWorker captures the new disk configuration.
Examples of a disk reconfiguration include the addition or removal of a disk or partition.
NOTE: Do not mix critical and non-critical volumes on the same physical disk.
Use the following practices to minimize the size of Windows BMR backups.
● Do not store non-critical data, such as MPEG files, on critical volumes.
● Consolidate critical volumes. For example, install services on the same disk.
● Do not mount critical volumes on a non-critical volume.
Review the following Windows BMR limitations and special considerations before you perform Windows BMR backup, clone and
recovery operations.
Dynamic disks
A BMR recovery does not bring dynamic disk volumes online. After the BMR recovery completes, use Windows Disk Manager to
bring the dynamic disks back online.
Critical volumes
Windows BMR only supports critical volumes on NTFS and ReFS partitions. This is a Microsoft ASR limitation. If a critical volume
is on a partition other than NTFS or ReFS, the backup of the DISASTER_RECOVERY:\ save set fails. A message similar to the
following appears in the policy.log file:
Disaster Recovery: critical volume volumename identified for disaster recovery backup has
a non-NTFS file system, filesystemname. Backups of non-NTFS critical volumes are not
supported.
NOTE: Windows BMR does not support FAT and FAT32 file systems as critical volumes.
You cannot recover from a Windows BMR backup on an HP ProLiant system when the HP i Provisioning Tool (IPT) 1.4 or 1.5
was used to configure an entire disk as a critical volume, such as the system partition.
To resolve this issue, shrink the logical volume before you perform the Windows BMR restore. The HP website contains a
customer advisory that describes the issue and the impact to Windows Bare Metal Recovery with Windows Server Backup. This
advisory and the resolution also applies to NetWorker Windows BMR critical volumes.
NOTE: It is recommended that you test your BMR solution before a disaster recovery is required.
Checkpoint restart backup for Windows DISASTER_RECOVERY:\ save set is not supported
The NetWorker software does not support a checkpoint restart backup for the Windows DISASTER_RECOVERY:\ save set.
When you enable the Checkpoint restart option for a Client resource that you configure to back up the DISASTER_RECOVERY:
\ save set, the backup fails.
where:
save_set1 or save_set2 are unique save set names, such as a drive letter (f:\) or mount point (n:\mountpoint).
Cloning considerations
To clone a Windows BMR backup, ensure that you clone all of the critical volumes, DISASTER_RECOVERY:\, and WINDOWS
ROLES AND FEATURES save sets that were created during the backup operation. While you can clone individual save sets, you
cannot perform a successful BMR recovery unless you recover each save set that the backup operation created.
To ensure that you clone all of the BMR save sets, review the following information before you start a clone operation:
● When you use the automatic clone, you enable the Clone attribute on the group resource that contains the BMR client. The
automatic clone operation will clone all of the required save sets after the scheduled backup operation completes.
NOTE: Synchronize the NetWorker server and client host clocks before the backup operation to ensure that all of the
save sets are cloned.
● When you use the nsrclone command to perform a manual clone, ensure that you include the ssid/cloneid for each save
set. Use the mminfo or nsrinfo -v command to report all save set backups that occurred for the Windows client during
the save session. The Command Reference Guide provides detailed information about using the mminfo and nsrinfo
commands.
● When you use the schedule clone function, do not filter on other attributes such as save set name. Filter only by client name.
When you enable automatic cloning for a backup group that contains the DISASTER_RECOVERY:\ save set, synchronize
the clocks on the NetWorker server and client host clocks across the network to ensure that NetWorker clones all save sets.
NOTE: Starting with NetWorker 19.3, BMR can be performed for clients that uses nsrauth as authentication method.
When you recover a Windows client that uses NetWorker strong authentication (nsrauth) to communicate with other
NetWorker hosts, communications with the NetWorker server may fail during a Windows BMR recovery. When you perform
a Windows BMR recovery for a host that uses nsrauth authentication only, the Windows PE image does not have the nsrauth
credentials file that the original client used, and it generates the new credentials. NetWorker server refuses to allow the
recovery operation to complete as it is not aware of the new credentials.
To resolve this issue, before you perform the BMR recovery perform the following task:
● Delete the NSR Peer Information resource for the NetWorker Client from the NSRLA database on the NetWorker Server.
This will cause the NetWorker Server to create a new NSR Peer Information resource for the client.
NOTE: The SQL Server installation media contains the Setup tool.
6. Bring the SQL server services online.
7. Use NMM or a third-party backup application to recover the SQL system databases (primary, model, msdb).
8. Use NMM or a third-party backup application to recover the role databases.
9. Restart the services that require the role databases that you recovered.
NOTE: The NetWorkerModule for Microsoft Applications Application Guide provides more information about using
NMM to recover SQL databases.
DFSR considerations
DFSR namespaces are junction mount points. The DISASTER _RECOVERY:\ and ALL save sets do not backup DFSR
namespaces, even if the DFSR shares reside on a critical volume. To backup DFSR Shares, either use the new save set
ALL-DFSR or provide the full DFSR Share path as the save set name. The ALL-DFSR save set applies to all supported
MSCS considerations
Review these considerations before you perform a Windows BMR recovery on a clustered host.
● Before you start the Windows BMR recovery operation, ensure that you detach the shared disks. After the Windows BMR
recovery operation and the restart completes, attach the shared disks before you perform the online recovery.
● After an authoritative restore completes, the recovery operation does not bring the cluster services online on the remote
nodes. You must bring the services online manually.
When a system failure occurs which damages Storage Pools, perform the following steps as recommended by Microsoft to
perform a BMR recovery to a new host. In the case of a complete system failure, a Storage Pool may not exist on the target
host. There can only be physical disks. Some of these disks are required to create Storage Pools.
Before beginning Windows BMR wizard, physically remove from the target recovery computer any physical disks reserved for
storage pools. This manual step is required because the Windows BMR wizard does not have any option to exclude the disks.
To recover Storage Spaces to a new host, perform the following steps:
1. Boot the host with the Windows BMR image.
2. Recover only the critical volumes.
3. Reboot the host.
4. Attach physical disks that are reserved for Storage Pools.
5. Use Windows Server Manager or Powershell Cmdlets to configure the Storage Pools.
6. Perform a volume or file recovery of the Storage Spaces volumes.
7. Perform a volume or file recovery of other volumes on physical disks.
When you recover to a host that uses a SAN boot device, the WinPE environment requires that you temporarily disable all but
one path to the boot device. After the BMR recovery and reboot completes you can re-enable the remaining paths.
The Windows BMR image does not contain a driver for any of the VMware VMXNET, VMXNET3, or the VMware Paravirtual
SCSI NIC models. The Windows BMR image does contain a driver for the e1000 NIC. When you perform a Windows BMR
recovery, ensure that the VM has at least one configured e1000 NIC, or add custom NIC drivers when you run the NetWorker
BMR wizard.
The VMware Tools installation media in the \Program Files\VMware\VMware Tools\Drivers folder on the system
drive of the VM contains the VMware NIC drivers.
NetWorker requires that the BCD partitions are online during a Windows BMR backup. If a BCD partition is offline during a
Windows BMR backup, the backup fails with an messages similar to the following:
save: Unable to get volume information of file system.The device is not ready. (Win32
error 0x15) with the volume offline
For application cluster hosts, type the FQDN of the application cluster host. For example:
NOTE: If the Client Configuration wizard cannot resolve the specified hostname, an error message appears after you
click Next.
NOTE: You can also assign the client to one or more groups after you create the Client resource.
8. Click Next.
9. On the Specify the Backup Configuration Type page, select Filesystem, and then click Next.
10. On the Select the NetWorker Client Properties page, configure the following options:
Option Description
Priority Enables you to control the order in which the NetWorker server contacts clients for backup. During a
backup operation, the NetWorker server contacts the client with the lowest priority value first. If you do
not specify a priority for the client resources, then the backup order is random. The default value is 500.
While the Priority attribute specifies the order of client contact, many variables affect the order in which
clients complete their backups. For example:
● The backup operation on a client does not begin until the worklists for each of the save sets on the
client are complete.
Parallelism Specifies the maximum number of data streams that a client can send simultaneously during a backup
action.
Data streams include backup data streams, savefs processes, and probe jobs.
The default value is different for the NetWorker server than it is for all other client resources:
● For the NetWorker server client resource, the default value is 12. This higher default value enables the
server to complete a larger number of index backups during a Server backup action.
● For all other clients, the default value is 4.
To avoid disk contention for clients other than the NetWorker server, specify a value that is the same as
or fewer than the number of physical disks on the client that are included in the backup.
The NetWorker Performance Optimization Planning Guide provides more information about recommended
client parallelism values and performance benefits.
Remote Specifies a list of the users that have access to perform remote access operations. For example, users
Access that can perform a directed recovery of backup data that originated on this host.
Data Domain Specifies the protocol to use if you send the backup data to a Data Domain Device. Available selections are
Interface IP, Fibre Channel, or Both.
Client Direct
Block Based Enables Block Based Backups for the host. When you select this option, you must also select the .
Backup (BBB)
This option applies to Linux only.
NOTE: The Block Based Backup chapter provides complete information about how to configure a
host for BBB backups.
Client Direct Allows the client to try to directly connect to the backup storage device, instead of connecting to a
NetWorker storage node. If a direct connection is not possible, then the backup operation connects to the
NetWorker storage node that you configure to accept data from the client.
Parallel Save Enables NetWorker to use multiple parallel save streams to backup each save set defined for the client, to
Streams one or more destination devices. PSS does not support Checkpoint Restart backups.
(PSS)
CIFS, DFS, and msdos file systems do not appear as selectable file system objects. Modifying_the save_sets defined for a
Windows client describes how to modify the save set attribute to define backup a remote file system.
NOTE: When you select all file system objects and the DISASTER_RECOVERY:\ save set, the ALL value appears
in the Save set attribute for the client resource. When you select file system objects, enables you to perform
granular recoveries of files and directories. The DISASTER_RECOVERY:\ save set enables you to perform a BMR
Verifying that a valid DISASTER_RECOVERY:\ save set exists by using the NetWorker
User Program
By default, the Recovery window displays the most recent backup. To verify an older backup select the View > Change
Browse Time menu option, and then specify a different backup date and time.
1. Start the NetWorker User program by using the winworkr command with the -s option to connect to the NetWorker server
to which the source client data is backed up:
winworkr -s server_name
If the -s option is not entered and there is only one server detected, that server is connected automatically. If there are
no servers detected, or if there is more than one server available, the Change Server dialog box appears, enabling you to
choose the server.
2. Click Recover.
The Source Client dialog box appears.
3. Select the source client of the DISASTER_RECOVERY:\ save set, and then click OK.
4. Select a destination client, and then click OK.
5. In the Recover window, browse and locate the save set named DISASTER_RECOVERY:\.
Verifying that a valid DISASTER_RECOVERY:\ save set exists by using the nsrinfo
program
To query the client file index of the Windows host and display information about the DISASTER_RECOVERY: save set, type the
following command from a command prompt.
nsrinfo -v -s server_name -N "DISASTER_RECOVERY:\\" client_name
where:
● server_name is the name of the NetWorker server.
● client_name is the name of the client that performed the Windows BMR backup.
NOTE: After you test the wizard, you can safely exit the wizard before completing the entire recovery process.
1. Follow the procedures in Performing a Windows BMR to physical or virtual computers on page 426.
Verify the following as you step through the BMR recovery wizard screens:
● If DNS is not available, that the host can resolve the NetWorker server name by some method, such as a local hosts file.
● You can see the network interface that is required to communicate with the NetWorker server. If you cannot see the
network interface, use the wizard to load the required NIC driver.
● You can see the critical and non-critical disks for the host that is to be recovered. If you cannot see all of the disks, use
the wizard to load the required disk drivers.
2. Click Exit to safely exit the wizard.
3. Exit the command window.
The system automatically reboots.
Mapped drives
To back up mapped or CIFS drives on a Windows client for either a scheduled or a manual backup, you must perform additional
configuration steps in the Client resource.
● Create a dedicated client resource for the backups of mapped drives. A common user account must have access to each
mapped drive.
● Create a separate Client resource for backups of local drives.
● Ensure that the Administration window is in Diagnostic Mode. To enable Diagnostic Mode, from the View menu, select
Diagnostic Mode.
1. In the NetWorker Administration window, click Protection.
2. In the expanded left panel, select Clients.
Linux
You can install the NetWorker client, server, storage node, and NetWorker Management Console (NMC) server software on
Linux.
Backup and recovery operations are supported on the following Linux journaled file systems:
● ext3
● reiserfs
● jfs
● xfs
For ext3 file systems with the journal set to visible, do not back up or recover the journal. Recovering the journal may cause
the file system to become unstable. Use a directive to ensure that the file system is excluded from a backup. Directives on page
260 provides information on directives.
Solaris
You can install NetWorker client and storage node on the Solaris platform.
The NetWorker software supports local and global zones for a NetWorker client and a dedicated storage node. You can install
and back up a NetWorker client, server, or storage node on a computer running in a local zone. The NMC and NetWorker
License Manager can only be installed in a global zone.
NOTE: Extended file attribute data is in the calculation of the save set file size for Solaris clients. As a result, the save set
file size in NetWorker appears to slightly larger than expected.
HP-UX
You can install NetWorker client and storage node on the HP-UX platform.
AIX
You can install the NetWorker client and storage node on the AIX platform.
NOTE: On AIX, non-root users who are performing a recovery cannot restore group ownership (the set-group-id-on-
execution or setuid permission bit) on binaries or files. This behavior is to be expected.
For application cluster hosts, type the FQDN of the application cluster host. For example:
NOTE: If the Client Configuration wizard cannot resolve the specified hostname, an error message appears after you
click Next.
NOTE: You can also assign the client to one or more groups after you create the Client resource.
8. Click Next.
9. On the Specify the Backup Configuration Type page, select Filesystem, and then click Next.
10. On the Select the NetWorker Client Properties page, configure the following options:
Option Description
Priority Enables you to control the order in which the NetWorker server contacts clients for backup. During a
backup operation, the NetWorker server contacts the client with the lowest priority value first. If you do
not specify a priority for the client resources, then the backup order is random. The default value is 500.
While the Priority attribute specifies the order of client contact, many variables affect the order in which
clients complete their backups. For example:
● The backup operation on a client does not begin until the worklists for each of the save sets on the
client are complete.
● The amount of work can vary greatly from one client to the next.
● If a client stops responding and times out, then the backup operation puts the client backup at the end
of the backup order list.
The only way to guarantee that the backup of one client occurs before the backup of another client is to
configure the workflows for the clients to start at different times.
Parallelism Specifies the maximum number of data streams that a client can send simultaneously during a backup
action.
Data streams include backup data streams, savefs processes, and probe jobs.
The default value is different for the NetWorker server than it is for all other client resources:
● For the NetWorker server client resource, the default value is 12. This higher default value enables the
server to complete a larger number of index backups during a Server backup action.
● For all other clients, the default value is 4.
To avoid disk contention for clients other than the NetWorker server, specify a value that is the same as
or fewer than the number of physical disks on the client that are included in the backup.
The NetWorker Performance Optimization Planning Guide provides more information about recommended
client parallelism values and performance benefits.
Remote Specifies a list of the users that have access to perform remote access operations. For example, users
Access that can perform a directed recovery of backup data that originated on this host.
Data Domain Specifies the protocol to use if you send the backup data to a Data Domain Device. Available selections are
Interface IP, Fibre Channel, or Both.
Client Direct
Block Based Enables Block Based Backups for the host. When you select this option, you must also select the .
Backup (BBB)
This option applies to Linux only.
NOTE: The Block Based Backup chapter provides complete information about how to configure a
host for BBB backups.
Client Direct Allows the client to try to directly connect to the backup storage device, instead of connecting to a
NetWorker storage node. If a direct connection is not possible, then the backup operation connects to the
NetWorker storage node that you configure to accept data from the client.
Parallel Save Enables NetWorker to use multiple parallel save streams to backup each save set defined for the client, to
Streams one or more destination devices. PSS does not support Checkpoint Restart backups.
(PSS)
● For a Solaris sparse or whole root zone client, all mounted file systems in the sparse or whole root zone that are not
normally skipped, such as NFS, are backed up.
● ZFS file systems are backed up.
● If the save set name includes a symbolic link, a save set recovery is not supported.
all-local For a global zone client, the file systems in the sparse
or whole root zone on the physical host are backed up. File
systems in the global zone are skipped.
all-global For a global zone client, all file systems in the global
zone are backed up. All sparse and whole root zone file
systems
on the physical host are skipped.
NOTE: If you explicitly list a BTRFS sub-volume in the Save set field, NetWorker will back up the files in the sub-
volume, even if the sub-volume does not appear in the /etc/fstab file. When NetWorker encounters a sub-directory
that has a sub-volume ID that differs from the parent sub-volume ID, NetWorker will not backup the contents of the
subdirectory, unless you specify the save -x in the Backup command field or select the Cross mount points
enabled option in Client Properties. To back up data in the subdirectories, perform one of the following tasks:
● Specify save -x in the Backup command field or select the Cross mount points enabled option in Client
Properties.
● Explicitly list the path of each sub-volume in the Save set field.
● Mount each sub-volume, include the mount point in the /etc/fstab file, and then specify ALL or all-btrfs in
the Save set field.
5. Click OK.
For application cluster hosts, type the FQDN of the application cluster host. For example:
NOTE: If the Client Configuration wizard cannot resolve the specified hostname, an error message appears after you
click Next.
NOTE: You can also assign the client to one or more groups after you create the Client resource.
8. Click Next.
9. On the Specify the Backup Configuration Type page, select Filesystem, and then click Next.
10. On the Select the NetWorker Client Properties page, configure the following options:
Option Description
Priority Enables you to control the order in which the NetWorker server contacts clients for backup. During a
backup operation, the NetWorker server contacts the client with the lowest priority value first. If you do
not specify a priority for the client resources, then the backup order is random. The default value is 500.
While the Priority attribute specifies the order of client contact, many variables affect the order in which
clients complete their backups. For example:
● The backup operation on a client does not begin until the worklists for each of the save sets on the
client are complete.
Parallelism Specifies the maximum number of data streams that a client can send simultaneously during a backup
action.
Data streams include backup data streams, savefs processes, and probe jobs.
The default value is different for the NetWorker server than it is for all other client resources:
● For the NetWorker server client resource, the default value is 12. This higher default value enables the
server to complete a larger number of index backups during a Server backup action.
● For all other clients, the default value is 4.
To avoid disk contention for clients other than the NetWorker server, specify a value that is the same as
or fewer than the number of physical disks on the client that are included in the backup.
The NetWorker Performance Optimization Planning Guide provides more information about recommended
client parallelism values and performance benefits.
Remote Specifies a list of the users that have access to perform remote access operations. For example, users
Access that can perform a directed recovery of backup data that originated on this host.
Data Domain Specifies the protocol to use if you send the backup data to a Data Domain Device. Available selections are
Interface IP, Fibre Channel, or Both.
Client Direct
Block Based Enables Block Based Backups for the host. When you select this option, you must also select the .
Backup (BBB)
This option applies to Linux only.
NOTE: The Block Based Backup chapter provides complete information about how to configure a
host for BBB backups.
Client Direct Allows the client to try to directly connect to the backup storage device, instead of connecting to a
NetWorker storage node. If a direct connection is not possible, then the backup operation connects to the
NetWorker storage node that you configure to accept data from the client.
Parallel Save Enables NetWorker to use multiple parallel save streams to backup each save set defined for the client, to
Streams one or more destination devices. PSS does not support Checkpoint Restart backups.
(PSS)
5. Click OK.
The following script file provides an example of how to back up the LDAP directory, Password Server, and NetInfo databases
before each scheduled save:
"/usr/sbin/slapcat -l /var/backups/networker.ldif;
/bin/mkdir -p /var/backups/networker.odpdb;
/usr/sbin/mkpassdb -backupdb /var/backups/networker.odpdb;
/usr/bin/nidump -r / . > /var/backups/networker.nidump"
8. Click OK.
Platform requirements
Checkpoint restart is only supported on Linux and UNIX environments when performing standard save operations. You cannot
use checkpoint restart with block-based backup or parallel save streams enabled.
Performance requirements
Enabling checkpoint restart might impact backup speed, depending on the datazone environment and configuration.
Checkpoint restart also might increase the size of the index because additional index records are created for the valid
recoverable data. These partial save sets should not be manually removed from the index.
Example 1
There are six clients in a group, each with three save sets. The Retries attribute for the backup is 1. One save set fails and is
checkpoint restarted immediately. The remaining save sets in the group continue to back up. The save set fails a second time. A
checkpoint restart for the save set does not occur because the retry attempt would exceed the value for the Retries attribute.
When all the save set backup attempts in the group complete, the backup completion report:
● Provides a list of the successful save sets.
● Reports that the failed partial save set is unsuccessful.
● Reports that the backup failed.
Example 2
There are six clients in a group, each with three save sets. The Retries attribute for the backup is 2. One save set fails and is
checkpoint restarted immediately. The remaining save sets continue to back up. The partial save set fails a second time and is
checkpoint restarted immediately. This time, the partial save set succeeds.
When all the save set backup attempts in the group are complete, the backup completion report:
● Provides a list of the successful save sets.
● Reports that the two partial save sets are successful.
● Reports that the backup completed successfully.
Probe-based backups
You can configure the NetWorker server to search or probe a NetWorker client for a user-defined script before the start of a
scheduled backup operation. A user-defined script is any program that passes a return code.
When the NetWorker server detects the script, the NetWorker server runs the script and interprets two return codes:
● Return code 0 indicates that a client backup is required.
● Return code 1 indicates that a client backup is not required.
NetWorker interprets all other return codes as an error and does not perform a backup.
1. Create the Probe resource script, and save the script in the same directory as the NetWorker binaries on each client that
uses the client probe.
The name of the probe script must begin with save or nsr.
NOTE: Users are responsible for creating and supporting user-defined scripts.
f. Click OK.
3. Associate the probe with a Client resource:
a. In the expanded left pane of the Protection window, select Clients.
b. In the right pane, right-click the Client resource, and select Modify Client Properties.
The Client Properties dialog box appears.
c. Click the Apps & Modules tab.
d. Select the probe resource from the Probe resource name list.
e. Click OK.
4. Configure a data protection policy with a workflow that includes a probe action:
a. Create a group that includes the client with the assigned probe resource.
b. Create a policy.
c. Create a workflow.
d. Create a probe action and a backup action for the workflow.
AES Encryption
You can apply password protection and 256-bit data Advanced Encryption Standard (AES) encryption to backup and archive
data on UNIX and Windows hosts for additional security.
NOTE: You can apply password protection alone, AES encryption alone, password protection and encryption together,
or compression alone. You cannot apply password protection and compression together or encryption and compression
together. Do not apply AES encryption and in-flight encryption together.
When NetWorker uses aes to encrypt the backup data, backup times increase. The process of encrypting the data increases
CPU and memory usage on the backup client. The impact to CPU and memory resources depends on a number of factors
including the load on the host, network speed, and the number of backup files. A backup of a single large file requires less
resources than a backup of a dense file system, where NetWorker must access a large number of small-sized files.
Do not use the aes ASM for data encryption when backing up files that are encrypted by using the Microsoft Windows
Encrypting File System (EFS). The backup is reported as successful, but recovery of the file fails and the following message is
written to the NetWorker log file:
recover: Error recovering
filename. The RPC call completed before all pipes were processed.
When a backup includes EFS encrypted files, the files are transmitted and stored on backup volumes in their encrypted format.
When the files are recovered, they are also recovered in their encrypted format.
Password protection
AES Encryption is supported through the use of the aes Application Specific Module (ASM) based on the password that is
defined on the UNIX or Windows host. If a password is not defined on the host, then data is encrypted with the default
password that is configured for the NetWorker server.
NOTE: You must specify the password to recover password-protected files. If the password was configured or changed
after the backup occurred, then you must provide the password that was in effect when the file was originally backed up.
Keep password changes to a minimum.
In-flight encryption
In-flight encryption secures data that is in transit. By default, the in-flight encryption feature is not enabled in NetWorker.
Backup times might be longer with in-flight encryption than with AES encryption. Because in-flight decryption occurs on the
target NetWorker storage node, CPU and memory usage could significantly increase. The impact to CPU and memory resources
depends on a number of factors including the load on the host, network speed, and the number of backup files.
You can enable in-flight encryption from the NMC or from nsradmin.
NOTE:
● Do not use the in-flight encryption feature and the AES encryption feature together. Combining the encryption types is
redundant and could significantly increase the duration of the backup.
● Do not use in-flight encryption to backup and recover to Data Domain devices (DDBoost). Refer to the Data Domain
documentation set to configure DDBoost encryption.
● In-flight encryption is not supported for a client direct backup and recovery operation from a NetWorker client host over
a network to a remote host's AFTD. If in-flight encryption is enabled, data is not encrypted in-flight over the network.
Use AES encryption for a client direct save operation from a NetWorker client host over a network to a remote host's
AFTD.
The EMC NetWorker Security Configuration Guide provides more information about the nsrexec database and how to modify
attributes in the nsrexec database.
Compression
You can compress backup data to reduce network traffic and backup storage requirements.
Compressing data for a backup generates less network traffic. However, compression uses computing resources, so its benefits
may be limited on low-powered systems. If the storage device also compresses data, the result may be that more data is actually
written to tape.
NOTE: You can apply password protection alone, encryption alone, password protection and encryption together, or
compression alone. You cannot apply password protection and compression together or encryption and compression
together.
3. If an NFS server provides the AFTD storage for Client Direct backups, then specify the username and password that is
required to access the NFS server for the AFTD in the Remote user and Password attributes on the Configuration tab of
the Device Properties dialog box for the device.
4. Ensure that the Client direct attribute is enabled on the General tab of the Client Properties dialog box for each Client
Direct client.
Client Direct backups are enabled by default.
Select View > Diagnostic Mode in the Administration interface to access the Client direct attribute in the Client
Properties dialog box.
The netstart.txt and set.txt files are placed in the C:\directory. New information is appended to these files each
time a backup is run.
@ECHO OFF
SETLOCAL
ECHO =======START BATCH FILE================
ECHO =====NetWorker PRE_BACKUP COMMAND======
ECHO =======NET START - creates netstart.txt file and
ECHO =======sends all Started Services information
ECHO =======to the file c:\netstart.txt
:loop
SHIFT
IF %0.==. GOTO save
SET arg=%arg% %0
GOTO loop
REM These are the save commands that run the required
REM NetWorker backup commands.
:save
SET >>C:\SET.TXT
ENDLOCAL
#!/bin/sh
# export the SHELL that we are going to use
SHELL=/bin/sh
export SHELL
# export the correct PATH so that all the required binaries can be found
case $0 in
/* ) PATH=/usr/atria/bin:/bin:/usr/bin:`/bin/dirname $0`
c=`/bin/basename $0`
;;
* )PATH=/usr/atria/bin:/bin:/usr/bin:/usr/sbin
c=$0
;;
esac
export PATH
# These are the valid statuses that save reports upon completion of the backup
statuses="
failed.
abandoned.
succeeded.
completed savetime=
"
# Perform the PRECMD (Lock VOB)
/usr/atria/bin/cleartool setview -exec "/usr/atria/bin/cleartoollock -c \
‘VOB backups in progress’ -vob /cm_data/mis_dev" magic_view >
/tmp/voblock.log 2>&1
# Perform backup on client
save "$@" > /tmp/saveout$$ 2>&1
# cat out the save output
cat /tmp/saveout$$
# search for backup status in output reported by save
for i in ${statuses}; do
result=`grep "${i}" /tmp/saveout$$`
if [$? != 0]; then
echo ${result}
fi
done
# Perform the POSTCMD (Unlock VOB)
/usr/atria/bin/cleartool setview -exec "/usr/atria/bin/cleartoolunlock -vob
/cm_data/mis_dev" \
magic_view > /tmp/vobunlock.log 2>&
# exit gracefully out of the shell script
exit 0
The exit code of the custom script process is not taken into consideration.
end on job end only A backup job is considered to be ended as soon as an end job message is received from the
save command.
Select this option when you do not want to wait for the postprocessing commands of the script
to end.
end on process exit only A backup job is considered to be ended as soon as the started process exits. Background
processes started by the backup command could still be running on the client.
Use this option when you want the custom script to start background processes and you do
not want savegrp or nsrjobd to wait for the processes to complete.
use process exit code only Only the process exit code is used to determine the success or failure of the job. An exit code
of 0 indicates success. Otherwise, the job is reported as failed.
Use this option when you want the script postprocessing command status to have an impact
on the status of the save backup command without having to unset the NSR_STD_MSG_FD
environment variable.
If the script invokes more than one NetWorker backup command such as save, then you must
still unset the NSR_STD_MSG_FD environment variable.
Both end on job end and Either event can trigger the end of a job.
end on process exit
Both end on job end and If an end job message is received before the process exits, then the exit status provided by the
use process exit code end job message is used to determine the success or failure of the job.
5. Optionally, in the Post command attribute, specify the name of the script file that you require NetWorker to run after a
backup of all the save sets for the client completes.
NOTE: Do not specify the path to the file.
6. Click OK.
The customized instructions are applied the next time that the client is backed up.
Client resources
A client is both a physical computer with NetWorker client software installed on it and a NetWorker resource that specifies a set
of files and directories to be in a scheduled backup. A Client resource also controls backup settings for the client, such as the
save sets to back up for the client, the groups to which the client belongs, and whether to automatically restart failed backups
for the client.
You can configure multiple Client resources for a single NetWorker client computer, although clients with the same save set
cannot be in the same group. You might want to create multiple Client resources for a single client computer in the following
scenarios:
● To separate different types of backup data, such as application data and operating system files. For instance, to back up the
accounting data on a computer on a different schedule than the operating system files, create two client resources for the
computer: one for accounting data and another for operating system data.
● To back up large client file systems more efficiently. For instance, you could create separate client resources for each file
system on a computer and back them up on different schedules.
You can create a Client resource either by using the Client Backup Configuration wizard or the Client Properties dialog box.
You can configure NetWorker clients to use a unique network interface on the NetWorker server and storage node for backup
and recovery operations. Using multihomed systems on page 619 provides more information.
When you manually specify the save set value, place multiple entries on separate lines. For example, to back up a log file
directory that is named C:\log and all the data under the directory that is named D:\accounting, type the following
entries:
C:\log
D:\accounting
Follow the guidelines in the section "Mapped drives" to back up mapped drives on Windows systems.
To back up all client data, type ALL. For Windows operating systems, the ALL save set includes the
DISASTER_RECOVERY:\ save set, which includes the WINDOWS ROLES AND FEATURES save set.
NOTE: Some operating systems contain files and directories that should not be backed up. Use directives to ensure that
these files and directories are not backed up.
Save sets on page 229 provides more information on defining the save sets for a Client resource.
10. Select the other tabs in the Client Properties dialog box and configure options as necessary.
11. Click OK.
Verify that the client is enabled for scheduled backups by ensuring that a check mark appears next to the client in the
Scheduled backup column in the right pane for the client.
5. Click OK.
Client priority
The Priority attribute on the Globals (1 of 2) tab of the Client Properties dialog box for a Client resource enables you to
control the order in which the NetWorker server contacts clients for backup.
The attribute can contain a value between 1 and 1,000. The lower the value, the higher the priority.
You must select View > Diagnostic Mode in the Administration interface to access the Priority attribute in the Client
Properties dialog box.
During a backup operation, the NetWorker server contacts the client with the lowest priority value first. If you do not specify a
priority for the Client resources, then the backup order is random.
While the Priority attribute specifies the order of client contact, many variables affect the order in which clients complete their
backups. For example:
● The backup operation on a client does not begin until the worklists for each of the save sets on the client are complete.
● The amount of work can vary greatly from one client to the next.
● If a client stops responding and times out, then the backup operation puts the client backup at the end of the backup order
list.
The only way to guarantee that the backup of one client occurs before the backup of another client is to configure the data
protection policies for the clients to start at different times.
NOTE: In such cases, ensure that the client is reachable and the valid entries are added in hosts or in the DNS server.
State transitioning from retired to decommissioned is done automatically by the NetWorker Server, when the retention time of
all the save sets of the client has expired.
The following restrictions are applicable for the client in the decommissioned state:
● A client cannot be transitioned from active to decommissioned state.
● A client in the decommissioned state cannot be changed back to retired or active state.
● If you want to take backups for the decommissioned client again, you must delete the client and add it back to the
NetWorker Server.
For more information about the types of clients to which the state transition is not applicable, see the NetWorker Command
Reference Guide or the UNIX manual page nsr_client.
1. In the Administration window, click Protection.
2. In the expanded left pane, click Clients.
3. In the right pane, select the Client resource, and then in the Client State column click Right.
4. Select Edit client state and then select the state as Retired.
A confirmation message appears.
5. Click OK.
BTRFS backups
NetWorker support BTRFS volume backups. When you specify a BTRFS volume or sub-volume save set, NetWorker performs
a recursive back up of the directory tree that you specified with the save command. When NetWorker encounters a sub-
directory that has a sub-volume ID that differs from the parent sub-volume ID, NetWorker will not back up the contents of the
subdirectory, unless you specify the -x option with the save command.
export CB_LOG_DIR_LOCATION=log_dir
where:
● cache_dir is the directory that stores backup cache files.
● log_dir is the directory that stores for the backup log files.
Retention considerations
A Retention policy value applies to every type of save set. The retention policy value determines the length of time that the data
remains available for recovery in the NetWorker media database and the client file index. You can specify a retention policy value
for the clone save set that differs from the value that is defined for the original save set. When the retention policy differs for
the original and clone save set, you can expire the original save set and reclaim the space on the source volume but maintain the
data on a clone volume for future recoveries.
NOTE: The retention setting impacts the amount of disk space that is required by the NetWorker Server. The recovery
procedure is likely to be different if retention has expired. The retention setting should be equal to or greater than the client
or data requirements, and allow for the expected recovery conditions.
Cloning example
In this example, a backup of a client with three data drives creates three save sets. These save sets are stored on a volume that
is accessible through Storage Node A. Once a cloning action occurs, the copies of these save sets are sent to eligible devices in
the clone pool on Storage Node B.
In this figure:
● A client performs a backup of three data drives to Storage Node A. NetWorker creates three save sets, one save set for
each data drive.
● A clone operation reads the data from the volumes on Storage Node A, and then copies the save sets to Storage Node B.
Advantages
The advantages of cloning data to physical tapes include the following:
● Cloning can occur with the disk libraries under NetWorker control with standard NetWorker policy support. You can use
multiple retention policies for different cloned copies of the data.
● Cloning can occur at the save set and volume level.
NOTE: NetWorker can clone a single save set, multiple save sets or all of the save sets on a volume.
● Copying can occur from one tape type (virtual) to another tape type (target tape library), also known as tape conversion.
● Copying can occur from multiple virtual tapes to a single tape, also known as tape stacking.
Disadvantages
The disadvantages of cloning data to physical tapes include the following:
● Requires storage node licenses.
● Requires maintenance of front-end SAN infrastructure to a target tape library as well as the virtual tape library.
● Consumes SAN bandwidth as data must be from virtual tape over the SAN to a target device on the SAN.
Example
Consider the following example for a volume that resides in a media library and is not mounted:
● The Recover storage nodes attribute in the NetWorker server Client resource lists the following storage nodes in order:
○ Storage node F
○ Storage node E
○ Storage node D
● The Read Hostname attribute for the Library resource is not set, but the following devices in the media library are
configured with storage nodes:
○ Device A is configured on storage node D.
○ Device B is configured on storage node E.
○ Device C is configured on storage node B.
The list of eligible storage nodes is the intersection of the two previous lists (storage nodes E and D). The order in which the
storage node is selected depends on the order of the storage nodes in the Recover storage node attribute list. In this example,
storage node E is selected first as the read source storage node. If storage node E is not available, then storage node D is
selected.
If no matching storage nodes are found in the intersecting list, then an error is written to the daemon log file that indicates that
no matching devices are available for the operation. To correct the problem, ensure that at least one matching storage node
appears in both lists.
Recovery operation logic for selecting the storage node from which to recover cloned data
The recovery operation uses the following logic to determine the storage node from which to recover cloned data:
1. If the source volume is mounted, then the storage node of the device on which the volume is mounted is used as the read
source except in the following scenarios:
● If the FORCE_REC_AFFINITY environment variable is set to Yes.
● In a Virtual Tape Library (VTL) environment such as a CLARiiON Disk Library (CDL).
In these scenarios, the NetWorker software ignores whether the source volume is mounted and behaves as though the
volume is not mounted.
NOTE: If -S ssid/cloneid is used then the recovery operation picks up the exact copy. If only -S ssid or the save set
path is used, any valid copy can be read.
2. If the source volume is not mounted, or the FORCE_REC_AFFINITY environment variable is set to Yes, then the
NetWorker software creates a list of eligible storage nodes, based on the following criteria:
● The storage node is listed in the Recover storage nodes attribute of the NetWorker Client resource that is being
recovered.
If there are no storage nodes in the list and the Autoselect storage node checkbox in the Client resource is clear, then
the clone operation uses the value in the Storage Nodes attribute for the Client resource.
If there are no storage nodes in the list and the Autoselect storage node checkbox in the Client resource is selected,
then the recovery operation uses autoselect logic to choose the storage node.
● If the requested volume is in a media library, then the storage node is listed in the Read Hostname attribute for the
Library resource is used.
If the Read Hostname attribute for the Library resource is not set, then all storage nodes on which any device in the
library is configured are added to the list of eligible storage nodes.
Failed to get mmd reservation with err: Clone saveset(s) operation from a non-
Data Domain device to a DD Cloud Tier device is not supported.
● When you perform a fresh installation of NetWorker Server 19.5, RPS cloning is disabled by default.
● If you have NetWorker 19.5 server installed, Dell EMC recommends that you maintain parity with the NetWorker
19.5 storage node in both the RPS Enabled and Disabled mode. However, if you have compatibility and migration
challenges and want to maintain earlier versions of the storage node, that is, the N-2 version, then Dell EMC
recommends that you use the RPS Disabled mode for cloning. In cases where VMware vProxy save sets are used for
cloning, RPS Enabled mode is supported by default. Therefore, Dell EMC recommends that you maintain NetWorker
server and storage node compatibility and configure clone actions with the appropriate storage node based on the
workloads.
3. From a command prompt on the NetWorker server, use the nsrclone command to clone the save sets on a volume. For
example to clone save sets to volume in the default clone pool, type:
nsrclone -v -b Default backup.001
where:
● backup.001 is the name of the volume that contains the source save sets.
● The clone pool that the clone operation uses to write the clone save sets is the Default clone pool.
● To clone all save sets created in the last 24 hours for clients mars and jupiter with save set names /data1 and /data2 for
only backup level full, type:
nsrclone -S -e now -c mars -c jupiter -N /data1 -N /data2 -l full
● To clone all save sets that were not copied to the default clone pool in a previous partially aborted nsrclone session, type:
nsrclone -S -e now -C 1
● To clone all save sets that were not copied to the default clone pool in a previous partially aborted nsrclone session and
then assign the save sets a browse and retention policy value that differs from the original save set, type:
nsrclone -S -e now -C 1 -y 12/12/2016
nsrclone -S -e now -C 1 -y 12/12/2022 -w 12/12/2021
● Combination of 2 options:
nsrclone -q "action=backup" -q "policy=Gold" -S -t "1 month ago"
nsrclone -q "workflow=NMC server backup" -q "policy=Gold" -S -t "1 month ago"
nsrclone -q "workflow=NMC server backup" -q "action=backup" -S -t "1 month ago"
● Combination of 3 options:
User can add pre-existing group query options along with the newly added query options . For example, -q group=<>
nsrclone -q "group=DPG" -q "action=backup" -q "policy=Gold" -q "workflow=NMC server backup" -S -t "1 month ago"
The following table provides the descriptions of the options that are used in the nsrclone command example.
-N save_set_name Specifies the save set name to search for when nsrclone
determines which save sets to clone. Use multiple -N options
to specify more than one save set name.
-w date Specifies the browse policy date to assign to the clone save
set.
9. In the Configuration group box, specify the criteria that starts the staging policy.
The following table summarizes the available criteria that you can define for the staging policy.
High water mark (%)—Defines the upper used disk space limit. When the percentage of
used disk space reaches the value that is defined in the High water
mark (%) attribute, NetWorker starts the stage operation to move save sets from the
source disk.
Low water mark (%)—Defines the lower used disk space limit. When the
percentage of used disk space reaches the value that is defined in the Lower water mark
NOTE: When staging and backup operations occur concurrently on the source disk
device, NetWorker does not accurately display the disk volume usage total in the Written
column in output of the mminfo -mv command or in the Used column on the Media
window of the NetWorker Administration application.
Save set selection Use this option to rank the order in which NetWorker stages the save sets, based on save
set size or age. Available values include:
● largest save set—Stage the save sets in order of largest save set size to smallest save
set size.
● oldest save set —Stage the save sets in order of oldest save set to most recent save
set.
● smallest save set—Stage the save sets in order of smallest save set size to largest
save set size.
● youngest save set—Stage the save sets in order of most recent save set to least
recent save set.
Max storage period Use this option to start the stage operation based on the amount of time that a save set has
resided on the volume.
Max storage period unit
● Max storage period—Defines the number of hours or days that a save set can reside
on a volume before the stage process considers the save eligible to move to a different
volume.
● Max storage period unit—Defines the unit of measurement for the value in the max
storage period attribute. Available values are Hours and Days.
The maximum storage period setting is used along with the file system check interval. Once
the maximum storage period is reached, staging does not begin until the next file system
check.
Recover space interval Use this option to determine when the stage operation removes the successfully staged
save set from the source volume.
Recover space unit
● Recover space interval—Defines the frequency in which NetWorker starts of the
recover space operation, which removes successfully stage data from the source volume.
● Recover space unit—Defines the unit of measurement for the value in the recover
space interval attribute. Available values are Hours and Days.
File system check interval Use this option to define when NetWorker automatically starts the staging process.
● File System Check Interval—Defines the frequency in which NetWorker starts the
staging process. At every file system check interval, if either the high water mark or the
maximum storage period has been reached, then staging begins.
● File system check unit—Defines the unit of measurement for the value in the file
system check interval attribute. Available values are Hours and Days.
Read-only volumes contain No new data can be written to the volume. However, the save sets are still subject to
read-only save sets retention settings. Space recover and reclaim operation (nsrim) does not delete the expired
save sets from read-only disk type volumes
3. Use the nsrstage command to migrate the save sets to another volume.
For example:
nsrstage -m -S ssid/cloneid
NOTE: When you do not use the -b option to specify a destination clone pool, the nsrstage command migrates the
save sets to a volume in the Default Clone pool.
UNIX man page and the NetWorker Command Reference Guide provides detailed information about the nsrstage and
mminfo commands.
How to remove incomplete or aborted save sets that the staging process does not
migrate
The stage operation does not move aborted or incomplete save sets to a tape device. To remove the save sets from the source
device, perform the following steps:
1. Manually delete the save set from the media database by typing: nsrmm -d -S ssid
2. Remove the save sets from the source device by typing: nsrstage -C -V volume
Archiving data
The archive process captures files or directories as they exist at a specific time, and writes the data to archive storage volumes,
which are not automatically recycled. After the archive process completes, you can delete (groom) the original files from the
disk to conserve space.
The client archive program (nsrarchive) creates an archive. The client nsrexecd service starts this archive.
The following figure illustrates how the NetWorker software archives data.
where:
1. Client file systems
2. Backup data tracking structures
3. Data
4. Media database information
5. File index information
Licensing
You must purchase and license the archive feature separately from other NetWorker software components. The NetWorker
Licensing Guide provides more information on licensing procedures.
Limitations
The following limitations apply to the archive feature:
● You cannot archive the WINDOWS ROLES AND FEATURES save set.
● The Client Direct feature does not support archiving.
Enabling archiving
After you license the archive service and type the enabler code in the NetWorker server, all clients for that server are enabled
for the NetWorker archive feature by default. You can specify which clients and users have permission to archive data.
Ensure that the NetWorker Server is in diagnostic mode. To enable diagnostic mode, from the View menu, select Diagnostic
mode.
1. To control whether a client can archive data, in the Client Properties window, on the Globals (2 of 2) tab, perform one of
the following actions on the Archive services box.
● Clear the checkbox to disable archiving for the client.
● Select the checkbox to enable archiving for the client.
You must select or clear the Archive services checkbox for all Client resources that are associated with the client. You
might have multiple Client resources for a single client. For example, if both the NetWorker module software and the
NetWorker client software are installed on the same computer, there are multiple Client resources.
2. Add users that should have permission to perform archiving to the Archive Users user group in the Server window of the
Administration interface.
The NetWorker Security Configuration Guide provides details.
The NetWorker Command Reference Guide or the UNIX man pages provide more information about nsrclone command
parameters.
4. To check the integrity of the archive data on the storage volume, select the Verify checkbox.
5. To remove the archived files from the disk after archiving completes, select the Groom checkbox.
6. Click OK.
The Archive browse dialog box appears.
7. Select the checkbox next to the directories and files to archive, and clear the checkbox next to the directories and files that
you do not want to archive.
8. From the File menu, select Start Archive.
The Archive Status dialog box displays the status of the archive process. When the archive process completes, a
confirmation message appears if you selected the Groom checkbox.
9. Click Yes to continue with deletion of archived files from the local disk.
where:
● NetWorker_server is the hostname of the NetWorker server.
● -A annotation specifies the annotation string for the archive save set. You must specify at least one annotation or save
set ID.
Consider an example where archive A is annotated with Accounting_Fed and archive B is annotated with
Accounting_Local. If you type nsrretrieve -A Accounting, then no match is found and the archive data
is not recovered. If you type nsrretrieve -A ting_L, then the recovery process recovers the data from Archive B.
● -S ssid/cloneid specifies the archive save set to recover. To recover a cloned archive save set, specify both the save set
ID and the clone ID. You must specify at least one annotation or save set ID.
Archive request succeeds but generates error when nsrexecd is not running
If the nsrexecd process is not running on a remote client during an archive request operation, NetWorker reports that the
archive operations completed successfully, but the following error message appears in the daemon.raw file and the archive
fails:
Failed to get port range from local nsrexecd: Service not available.
To resolve this issue, ensure that you start the nsrexecd daemon on a UNIX client or the NetWorker Remote Exec service on
a Windows client before you perform an archive operation.
At the end of the name, one of the following designations might appear:
The value of full indicates that there is no more space on the volume and the end-of-tape
marker has been reached, or that an error has occurred.
% Used An estimate of the percentage that is used, based on the total capacity of the volume, and on the
Media type setting of the device resource.
A value of 100% indicates that the value is equal to or exceeds the estimate for this volume.
A value of full indicates that the volume is full and you cannot write any more data to the
volume, regardless of the estimate of the volume capacity.
Flags Flags that provide additional details about the save set.
The first flag indicates which part of the save set is on the
volume:
NOTE: You cannot search for save sets that were created in releases prior to NetWorker 9.0.x.
● Browsable
● Recoverable
● Recyclable
● Scanned-in
● Suspect
● Aborted
● In-Progress
● Checkpoint Enabled
Type Select All to view save sets of any type.
● Normal
● Raw
● Data Domain
● Synthetic Full
● Rehydrated
● NDMP
● Snapshot
● ProtectPoint
Maximum Level Select the maximum level of the backup. Save sets that
meet the selected level and backups of levels below the
selected level appear in the results.
● Recyclable
● Recoverable
● Suspect
● Scanned-in
Managing volumes
A volume is a physical piece of media such as a tape cartridge or disk. On file type devices, a volume is a directory on a file
system. Volume management tasks include changing the mode or recycle policy for the volume, relabeling the volume, removing
volumes from the media database and online indexes, and marking a volume as full for offsite storage.
If a volume is not mounted when a backup is started, then one of three messages appears, suggesting that one of these tasks
be performed:
● Mount a volume.
● Relabel a volume (only when Auto Media Management is enabled).
● Label a new volume (only when Auto Media Management is enabled).
During file recovery, the NetWorker server requests the volume name. If multiple volumes are needed to recover the files,
the server lists all the volumes in the order of which they are needed. During the recovery process, the server requests each
volume, one at a time. If a library is used, the server automatically mounts volumes that are stored in the library.
To manage volumes, you must have the correct permissions that are associated with the NetWorker server and its storage
nodes.
Perform the following steps to change the retention time on save sets:
NOTE: To achieve consistency of setting the browse or retention time from remote machine, it is recommended to have
time sync between NetWorker server and remote machine such as NMC. Ensure that browse is always lower or equal to
retention period. On the NMC server, if the user specifies the saveset expiration as now and the machine is not in sync with
NetWorker server, then the time of the NMC server machine will be updated to saveset which might be in future.
1. In the Administration window, click Media.
2. In the left navigation pane, select Disk Volumes or Tape Volumes.
3. Right-click the volume for the save set and select Show Save Sets.
The Volume Save Sets box appears.
4. Select the save set, and the click Change Expiration.
The Change Expiration window appears. The following figure provides an example of the Change Expiration window.
368 Recovery
Recovering data
You can recover NetWorker data by using the recover command, the NetWorker User program on Windows, or the NMC
Recovery wizard on the NMC server.
Recovery roadmap
The following figure provides a high-level roadmap of the recovery paths for a NetWorker Client and Storage Node host.
1. The "Special recoveries on Windows hosts" chapter describes how to perform a Bare Metal Recovery (BMR) of a NetWorker
Client or Storage Node. The NetWorker Module for Microsoft Administration Guide describes how to perform a BMR of an
Microsoft application data.
2. The "Special recoveries on Windows hosts" chapter describes how to recover the Active Directory Domain Service (AD DS)
on a Windows domain controller.
3. The "Recovery" chapter describes how to recover file system data on Window, Linux, UNIX, and OS X hosts.
4. The NetWorker application documentation describes how to recover application data. For example, the NetWorker Module
for Microsoft Administration Guide describes how to recover Microsoft application data that was backed up by using the
NetWorker Module for Microsoft.
NOTE: The NetWorker Server Disaster Recovery and Availability Best Practices Guide describes how to perform a disaster
recovery of a host.
Recovery 369
Planning and preparing to recovering data
NetWorker enables you to recover backup data on hosts that use supported operating systems. Unless you are performing a
bare metal recovery (BMR), you can only use NetWorker to recover data to a host that has a supported operating system and
the NetWorker software installed on it.
The following sections provide you with an overview of the information and steps that you might need to perform before you
can use the NetWorker software to recover backup data.
Hardware information
Maintain up-to-date information on computer hardware as follows:
● File system configuration
● Fully qualified domain names, IP addresses, and hostnames
● For Domain Name System (DNS) clients, maintain the DNS host's internet address and hostname
● Hard drive configuration
● Media device names
● Hardware vendor
● Configuration information for each piece of hardware, both active and inactive, within the organization or organizational site
Software information
Maintain up-to-date information on computer software as follows:
● Copies of the original operating system media and patches (and where they are located)
● Software enabler and authorization codes
● Software vendor contact information and contract number
● The operating system version and patches installed
● Operating system configuration
● Emergency media that can be used to recover a computer if a disaster occurs
● NetWorker bootstrap information for each NetWorker server
● Kernel configuration and location
● Device drivers
● List of any volume mount points
370 Recovery
Downloading the NetWorker software and documentation
To obtain the latest NetWorker software and documentation, perform the following steps.
1. Review the online NetWorker documentation, such as the NetWorker Administration Guide, NetWorker Installation Guide,
and NetWorker Release Notes, for the latest information.
2. Obtain the required NetWorker cumulative hotfix media kits that provide customers with the opportunity to install the latest
version of NetWorker including important hotfixes. Cumulative builds are released approximately once a month and each
build contain a rollup of the fixes in each previous build.
If additional hotfixes are required in an environment where a cumulative build is installed, hotfixes can be generated for
use with the latest cumulative version. The cumulative releases for specific NetWorker versions are available at the Online
Support website.
3. Open the NetWorker Cumulative Hotfix document for details regarding fixes that are in each build, knowledge base articles
that are related to the fixes in each build, and download instructions.
2. Reinstall any NetWorker backup patches that were installed before the disaster.
3. Re-create any links to NetWorker directories.
4. (Optional) To perform a test recovery to ensure that the recovery process is functioning correctly, use the recover
command.
NOTE: The NetWorker client software is also installed when you install the storage node software.
The storage node can now access volumes that contain backups for other computers on the network. These volumes contain
the application and user data that are required to recover computers that were protected with the NetWorker client software.
Recovery 371
● Compressed restore is the default behavior of the DD Boost workflow. To disable compressed restore, create the
disable_compressed_restore file in the <install_location>/nsr/debug/ folder.
Recovery types
NetWorker provides you with two types of recoveries.
● Local recover—A single NetWorker host is the administering, source, and destination host.
● Directed recover—The administering host is the source host or any other NetWorker host in the datazone. The destination
host is not the source host. Use a directed recovery:
○ To centralize the administration of data recoveries from a single host.
○ To recover the data to a shared server, when the user cannot recover the data themselves.
○ To recover data to another host because the source host is inoperable or the network does not recognize the source
host.
○ To transfer files between two NetWorker hosts.
Directed recoveries
A directed recovery enables a user to recover data to a NetWorker host that differs from the source of the backup, while
retaining the original file ownership and permissions.
A directed recovery is a restricted NetWorker function available only to user accounts that have the necessary privileges that
are required to perform the directed recovery operation.
A user with directed recovery privileges can:
● Browse the backup data of all NetWorker clients.
● Recover the data to any NetWorker client.
The following figure provides an example of a directed recovery.
In this figure:
● Saturn is the administering host.
● Neptune is the NetWorker server.
● Mars is the destination host.
● Pluto is the source host (not shown).
● The OS of destination host is the same as a source host.
372 Recovery
Figure 56. A directed recovery from a remote client
Recovery 373
Table 93. General recover requirements (continued)
Host Requirements
■ Group DN for a group that contains the authenticated user
○ If you do not run the nsrlogin command on the administering host to create an
authenticated session, the root user or the Administrator user on the destination
host must appear in one of the following configurations:
■ A member of a NetWorker User Group with Remote Access All Clients
privileges. Add an entry to the User attributes for the Root or Admin account in
this format.
■ Added to the Remote Access attribute of the source host.
For example:
374 Recovery
Table 93. General recover requirements (continued)
Host Requirements
○ Monitor NetWorker
○ Operate Devices and Jukeboxes
○ Backup Local Data
○ Recover Local Data
○ Recover Remote Data
You must have operator privileges in the Operators user group to perform a
selective file restore from a Microsoft Windows deduplication backup. Microsoft
provides complete documentation for working with the Windows deduplication
functionality.
Windows requirements
NetWorker enables you to perform directed recoveries of data to a local drive on Windows destination host, when you enable
Windows File and Print Sharing option on the destination host . You cannot perform a directed recovery to a CIFS share.
When you use the recover command on a Windows destination host and the NetWorker server is also a Windows host,
change the account that starts the NetWorker Backup and Recovery service on the NetWorker server:
● When the NetWorker server and the destination host are in the same domain, start service with a domain user that is a
member of the local Administrators group.
● When the NetWorker server and destination host are not in a domain, or are not in the same domain, start the service with a
local user that meets the following requirements:
○ The same username exists as a local user on the destination host.
○ The local user must have the same password on both hosts.
○ The local user on the NetWorker server is a member of the local Administrators group.
Local recoveries
When you perform a local recovery, the administering host is also the source and destination host. Local recoveries are the
simplest way to recover NetWorker data.
Ensure that user account that performs the recovery operation meets the following requirements:
● Belong to a NetWorker User Group that has the Recover Local Data privilege.
If you use nsrlogin, add the DN or the user or group to the External Roles. If you do not use nsrlogin, add the account in
user@host to the Users attribute. The NetWorker Security Configuration Guide provides more information.
● Have operating system ownership of the recovered files. The root user on UNIX, and a Windows Administrator have this
privilege.
● Have write privileges to the local destination directories. The root user on UNIX, and a Windows Administrator have this
privilege.
Recover programs
NetWorker provides you with the following tools to recover data.
● NetWorker Recover program—Recover GUI for OS-X hosts.
Recovery 375
● NMC Recovery wizard—Recover wizard that you start from the NMC server. The NMC Recovery wizard provides a
NetWorker datazone with a centralized recovery method.
● The recover command—CLI tool available on Windows, UNIX, and OS-X. Use the recover command to recover data
from a command prompt. To perform multiple recovery operations in parallel, use multiple recover commands.
● NetWorker User program—Recover GUI for Windows hosts. Use the NetWorker User program to recover file system data
when the administering client is Windows.
● The scanner command—CLI tool available on Windows, UNIX, and OS-X. Use the scanner command to recover data
from a volume by save set ID (SSID) to the host that starts the program. To perform multiple recovery operations in parallel,
use multiple scanner commands.
When the retention value of a save set is changed, nsrmm only updates the media database record and not the save set
metadata on the media. When a volume is scanned to re-create save set records in the media database using scanner, the
retention values of save sets on that volume is different from the updated retention time using nsrmm. The new retention
time is based on the retention information in the save set metadata on the media. For information about the new retention
time for scanned save sets, see the NetWorker Command Reference Guide or UNIX man pages.
NOTE: The NetWorker User, NetWorker Recover, and NMC Recovery wizard programs only recover data sequentially.
376 Recovery
NOTE: NetWorker removes the recover log file and the job information from the job database based on value of the
Jobsdb retention in hours attribute in the properties of the NetWorker server resource. In NetWorker 9.0.1, the default
jobsdb retention is 72 hours.
Recovery 377
2. Click Recover on the Administration window toolbar. The Recover window appears. Recover window on page 54 provides
more information about the Recover window.
3. In the Configured recovers window, right-click the saved recover configuration, select Recover Again.
4. Change the configuration as required and save the configuration with a new name.
b. Display the attributes for the Recover resource that you want to troubleshoot. For example:
c. Make note of the values in the recover, recovery options, and recover stdin attributes. For example:
378 Recovery
May 30, 2013 4:49:57 PM GMT -0400
</browsetime>
<recoverpath>
C:
</recoverpath>
</xml>”;
where:
● nw_server.corp.com is the name of the NetWorker server.
● mnd.corp.com is the name of the source NetWorker client.
3. To confirm that the nsrd process can schedule the recover job:
a. To start the recover job, update the Recover resource:
5. When the nsrtask command completes, review the nsrtask output for errors.
6. To confirm that the Recovery UI sends the correct recovery arguments to the recover process:
a. Open a command prompt on the destination client.
b. Run the recover command with the recover options that the Recover resource uses. For example:
c. At the Recover prompt, specify the value in the recover stdin attribute.
NOTE: Do not include the “ ,”, or the ; that appears with the recover stdin attribute.
d. If the recover command appears to stop responding, review the daemon.raw file for errors.
e. When the recover command completes, review the recover output for errors. If the recover command fails, then
review the values that are specified in the Recover resource for errors.
7. Use the jobquery command to review the details of the Recover job. From a command prompt on the NetWorker server,
type: jobquery.
8. From the jobquery prompt, perform one of the following steps:
a. To set the query to the Recovery resource and display the results of all recovery jobs for a Recovery resource, type:
print name: recover_resource_name
Where recover_resource_name is the name of the Recover resource.
b. To set the query to a particular jobid and display the results of the job, type:
print job id: jobid
Where jobid is the jobid of the Recover job that you want to review.
NOTE: Review the daemon.raw file on the NetWorker server to obtain the jobid for the recovery operation.
Recovery 379
Common recovery error messages
This section contains a summary of common recovery error messages and resolutions.
Host destination_hostname is missing from the remote access list of source_hostname. Press [Yes] to update the remote
access list of source_hostname with destination_hostname
This message appears in the Select the Recovery Hosts window when you select a destination host that does not have the
correct permissions to receive directed recovery data.
To resolve this issue, click Yes. The Recovery Wizard will update the Remote access attribute in the properties of the source
host with the hostname of the destination host.
If you click No, then you cannot proceed in the recovery wizard until you select a destination host that is in the Remote access
attribute of the source host.
This host is either improperly configured or does not support this operation
This message appears in the Select the Recovery Hosts window after you select a source or destination host when the source
or destination host is running NetWorker 8.0 or earlier.
Scanner recovery
The scanner program enables you to recover data directly from a NetWorker volume.
Use the scanner program in the following scenarios:
● To perform a by-file-selection recovery, when the save set information is not in the client file index.
● To recover data directly from a tape.
● To recover data from an incomplete save set.
380 Recovery
Recovering the data
Use one of the recovery applications to recover data.
NetWorker provides you with a number of recovery methods:
● Browsable recovery—By selecting individual files and folders.
● Save set recovery—By recovering all data in a save set.
● Scanner recovery—By recovering the data directly from the media
● VSS File Level Recovery—By recovering Windows System State data with VSS File Level Recovery (FLR).
recover command You can specify the clone pool for a browsable recovery or
the clone ID for a save set recovery.
If you do not specify the clone pool or the clone ID, then
NetWorker
selects the volume.
When NetWorker selects the volume from which to recover data, the recovery operation uses the following logic:
1. The highest priority is assigned to the volume (clone or original volume) that has a complete, non-suspect save set status. A
complete save set that is suspect has a higher priority than an incomplete non-suspect save set.
2. If the volumes still have equal priority, then priority is assigned to the mounted volume.
3. If the volumes are mounted, then priority is based on the media type. The media types from highest to lowest priority are:
● Advanced file type device
● File type device
● Other (such as tape or optical)
4. If the volumes are not mounted, then priority is based on the media location. The media locations from highest to lowest
priority are:
● Volumes in a library.
● Volumes that are not in a library but are onsite (or, the offsite flag is not set).
● Volumes that are offsite (or, the offsite flag is set).
To specify that a volume is offsite, use the nsrmm command. For example:
Recovery 381
The volumes that are required for recovery appear in the Required Volumes window of the NMC Recovery wizard and the
NetWorker User (Windows) programs.
Browsable recovery
A file selection recovery method, or browsable recovery inspects the client file index that NetWorker creates for the source
host, to gather information about backups. When the recovery process reviews entries in the client file index, you can browse
the backup data and select the files and directories to recover. The retention policy that NetWorker applies to a backup
determines the earliest versions of files and file systems that are available for recovery. Backup Browse and Retention on page
249 provides more information about browse and retention policies.
Use a browsable recovery in the following scenarios:
● To recover a file or directory when you are not certain of its exact name or location.
● To recover a small number of files or directories. When you select many files and directories, the process of marking the files
for recovery and the recovery process can take some time to complete, particularly from the NetWorker User program.
● To perform a directed recovery.
● To recover only the files that you select in one or more directories, not all files in a directory.
Adding information about recyclable save sets to the client file index
Each NetWorker client, including the NetWorker server, has a client file index (CFI). The CFI is a database that contains
information about the files that are in a save set.
When NetWorker adds save set information into the media database and CFI, NetWorker assigns the save set a retention date,
which is based on the retention policy that is assigned to the backup, clone, or archive. Browsable information about the save
set remains in the CFI until the current date is equal to the retention date.
When the current date is equal to the retention date, NetWorker expires the save set and identifies the save set as no longer
required for recovery, or as eligible for recycling. When the status of the save set is eligible for recycling, NetWorker removes
the information about the save set from the CFI, and you cannot perform a browsable recovery of the save set data. Some
applications, such as the NetWorker Module for Databases and Applications, require that a save set is browsable to perform a
recovery.
You can make expired save set files browsable for recovery by adding the save set information back into the client file index.
382 Recovery
4. In the right pane, select All Save Sets.
5. On the Query Save Set tab, specify one or more of the search criteria in the following table.
● Browsable
● Recoverable
● Recyclable
● Scanned-in
● Suspect
● Aborted
● In-Progress
● Checkpoint Enabled
Type Select All to view save sets of any type.
● Normal
● Raw
● Data Domain
● Synthetic Full
● Rehydrated
● NDMP
● Snapshot
● ProtectPoint
Recovery 383
Table 95. Query criteria (continued)
Criterion Description
Maximum Level Select the maximum level of the backup. Save sets that
meet the selected level and backups of levels below the
selected level appear in the results.
where:
● MM/DD/YYYY is the date that is chosen to make the save set browsable from.
● ssid/cloneid is the save set ID/cloneid.
For example:
nsrmm -e "11/21/2009" -S 4294078835/1257402739
When more than one SSID was recorded, repeat this step for all SSIDs.
When more than one SSID was recorded, repeat this step for all SSIDs.
384 Recovery
For example:
mminfo -q ssid=4294078835 -r sumflags cr
When more than one SSID was recorded, repeat this step for all SSIDs.
2. Query the media database to confirm that the index save set for a client is recoverable:
mminfo -avot -N index:client_name
where client_name is the name of the client to which this save set is located.
3. Confirm that the value in the fl column is cr for an index backup with the time frame of the client save set to be restored.
NOTE: If the index save set is not recoverable, the save set expires when the NetWorker software cross checks the
indexes. For example, when the NetWorker server runs the nsrim -X command.
where ssid is the associated save set id for the data you want to recover.
3. Use the information from the mminfo command for the save set to run the scanner program. When the save set spans
more than one volume, scan the volumes in the order in which in which they were written:
where:
● mediafile is the starting file number for the save set, obtained from the mminfo output.
● mediarec is the starting record number for the save set, obtained from the mminfo output.
● device is the name of the device the volume is loaded in, for example /dev/rmt0.1 or \\.\Tape0.
4. When the save set spans multiple volumes, the scanner program prompts for a new volume as needed.
Recovery 385
where:
● where client_name is the name of the client with the data to be recovered.
● MM/DD/YYYY is the backup date of the save set.
For example:
<NetWorker_install_path>\nsr\bin>nsrck -L 7 -t "11/21/2009" swift nsrck: checking index
for 'swift' 9343:nsrck: The file index for client 'swift' will be recovered.Requesting
1 rec over session(s) from server Recover completion time: 11/20/2009 1:45:55 PM
nsrck: <NetWorker_install_path>\nsr\index\swift contains 12 records occupying 2 KB nsrck:
Completed checking 1 client(s)
When you recover a client file index from a time and date in the past, nsrck adds the full contents of the index from that
time and date to a temporary subdirectory of the client file index directory. When a time value is not specified, everything for
the specified date (up to 23:59) is included. After the index has been read from the backup media, the required index data is
integrated fully into the client file indexes and the temporary subdirectory is removed. The “required index data” includes the
indexes from the date specified to the first full backup that occurred prior to the date specified.
Be aware that if a save set from the specified date runs into the next day, which would be Nov 22, 2009 in this example,
then the index required to browse the save set will not be recovered. To recover this index, you would have to specify Nov
22, 2009 as the recovery date as shown in the following command:
nsrck -t "11/22/2009" -L7 swift
A check on the required index date may be necessary if index backups are set to be taken once daily. When the back up of
the index does not take place until the following day, the date of the following day must be specified.
3. Confirm that the client save sets are now browsable:
mminfo -q ssid=ssid -r sumflags
Browsable save sets contain a b, in addition to other values in the sumflags output.
For example:
4. Perform a file-by-file recovery by using the NetWorker User program (Windows), the recover command or the NMC
Recovery Wizard.
Adding information about a save set in the client file index and media
database
When a volume contains a save set that does not appear in the media database or client file index, use the scanner command
to restore save set information into the media database and client file indexes.
5. Use the scanner command to add the save information into the media database and CFIs:
● To repopulate media database and CFIs with the save set information for all save sets on the volume, type scanner -i
device_name
● To repopulate the media database and client file index with the save set information for a specific save set , type
scanner -i -S ssid device_name
386 Recovery
NOTE: When the volume contains data from an earlier version of NetWorker, there may be no pool information on
the volume. In this case, the volume is considered to belong to the Default pool. To assign the volume to another
pool, use the -b pool_name option in this step. When the volume already belongs to a pool, the -b option will have
no effect.
7. Select optional recover options. The following table summarizes the available recovery options.
NOTE: To achieve consistency of setting the browse or retention time from remote machine, it is recommended to have
time sync between NetWorker server and remote machine such as NMC. Ensure that browse is always lower or equal to
retention period.
To change the browse date and time for all files in the
Recovery
window:
View all versions of a selected file or directory The Recovery window appears with the latest version of
the backup files. When you mark a file system object for
example, a file or directory, you recover the last backup
version. To view earlier versions of file system objects:
Recovery 387
Table 97. Optional browsable recovery options (continued)
Recover option Details
Relocate the recovered file system objects By default, NetWorker recovers file system objects to their
original location. To relocate the files to a different location:
View volumes required for recovery Before you start the recovery operation, monitor which
volumes NetWorker requires to recover the selected file
system objects.
388 Recovery
Table 97. Optional browsable recovery options (continued)
Recover option Details
● Overwrite and replace a reboot: Replaces the file on the
file system with the recovered version after you restart
the destination host.
8. Click Start to begin the recovery. It takes the NetWorker server a few moments to recover the files, depending on file size,
network traffic, server load, and tape positioning. During this time, messages appear so that you can monitor the progress of
the recovery.
When the recovery is successful, a message similar to this appears:
NOTE: When an error occurs while recovering Microsoft Exchange Server or Microsoft SQL Server data by using VSS,
you must restart the recovery process. When the recovery fails due to a problem with VSS or a writer, an error message
appears. Use the Windows Event Viewer to examine the event logs for more information. VSS recovery error messages
are also written to the NetWorker log file.
Recovery 389
Table 98. Save set information
volume date client ssid pool name
backup.001 05/03/2015 bu_iddnwserve 3644194209 Default C:\ddlib
r
clone.001 05/03/2015 bu_iddnwserve 3644194209 Default Clone C:\ddlib
r
The mminfo command provides you with information that you require to recover the save set. For example, the name of
the volume that contains the save set, the date that the save set was created and the name of the pool that contains the
volume. NetWorker assigns each backup and clone save set the same save set ID (SSID) and unique clone ID (cloneid). To
recover from a clone volume, the name of the clone pool is required.
2. Ensure that the volume which contains the save set is available for a device in the datazone.
3. Use the recover command to select and then to recover the data from the backup save set or the clone save set.
For example, type:
recover -t date -c source_host -R destination_host -b pool_name - i_recover_option
where:
● date is the date that NetWorker created the save set.
NOTE: When you do not specify a date, the recover command displays the latest version of each file in the save
set.
● source_host is the original data host.
NOTE: When you do not specify source host, NetWorker assumes that the source client is the host where you run
the recover program.
● destination_host is the host on which to recover the data.
● pool_name is the name of the pool that contains the volume. Use this option when you want to recover data from a clone
volume.
● - i_recover_option specifies how NetWorker handles a naming conflict between a recovered file and an existing
file.
○ iN does not recover the file when a conflict occurs.
○ iY overwrites the existing file when a conflict occurs.
○ iR renames the file when a conflict occurs. The recover process appends a .R to each recovered file name.
NOTE: The recover command requires the -i option when you use the -R option to perform a directed recovery.
For example, to recover the data from a clone volume from a clone operation that was performed on July 20, 2015, type:
390 Recovery
● When the current directory is /temp and -Accounting resides in the /temp directory, type add /temp/
Accounting. This input adds -Accounting and the contents of the directory to the recovery list.
c. To view the files or directory that you marked for recovery, type:
recover> list
d. To view the list of the volumes that NetWorker requires to recover the data, type:
recover> volumes
e. To recover the files to a location that differs from the original location, type:
recover> relocate path
When the recovery process completes, messages similar to the following appear:
Received 1 file(s) from NSR server `bu-idd-nwserver2'
Recover completion time: Tue Aug 21 08:33:04 2015
recover>
6. To close the recover program, type Quit.
NOTE: Only members of the Windows Administrators group have permission to perform a save set recovery.
Recovery 391
5. In the Save Sets window, select the name of the save set from the Save Set Name list.
6. Select the version of the save set . Optionally, select the cloned version of a save set.
7. Select optional recover options. The following table summarizes the recover options that are available with a save set
recovery.
Click Files...
Specify the files and directories to recover, one full path per
line.
Click OK.
View required volumes Before you start the recovery operation, monitor which
volumes NetWorker requires to recover the selected file
system objects.To view the required volumes, select
Required Volumes.
Relocate the recovered file system objects By default, NetWorker recovers file system objects to
their original location. To relocate the files to a different
location:Select Recover Options.
Resolve name conflicts By default, the Naming Conflict window appears each time
there is a file name conflict during a recovery. To specify the
method to automatically resolve all name conflicts:
392 Recovery
Table 99. Optional save set recovery options (continued)
Recover option Description
● Overwrite and replace a reboot: Replaces the file on the
file system with the recovered version after you restart
the destination host.
8. Click OK to begin the recovery. The NetWorker server takes a few moments to start the file recovery, depending on file size,
network traffic, server load, and tape positioning. When NetWorker starts to recover the files, messages appear that enable
you to monitor the progress of the recovery.
When the recovery is successful, a message similar to the following appears:
Received 1 file(S) from NSR server server Recover completion time: Tue Jan 21 08:33:04
2009
The mminfo command provides you with information that you require to recover the save set. For example, the name of the
volume that contains the save set and the date that the save set was created. NetWorker assigns each backup and clone
save set the same save set ID (SSID) and unique clone ID (cloneid).
3. Ensure that the volume which contains the save set is available for a device in the datazone.
4. Use the recover command to recover the data from the backup save set or the clone save set.
Recovery 393
NOTE: To perform concurrent recoveries from an advanced file type by either using multiple -S options to identify
multiple save sets, or starting multiple recover commands.
● To recover the all the data from a backup save set, type the following command:
recover -S ssid - i_recover_option
where:
○ ssid is the SSID of the backup save set.
○ - i_recover_option specifies how NetWorker handles a naming conflict between a recovered file and an existing
file.
■ iN does not recover the file when a conflict occurs.
■ iY overwrites the existing file when a conflict occurs.
■ iR renames the file when a conflict occurs. The recover process appends a .R to each recovered file name.
For example:
recover -S 3644194209 -iR
● To recover the all the data from a clone save set, type the following command:
recover -S ssid/cloneid
where:
○ ssid is the SSID of the backup save set.
○ clonied is the cloneid of the clone save set.
For example:
recover -S 3644194209/1362493448
NOTE: When you do not specify the cloneid of the save set, the recover command recovers the data from the
backup save set.
● To recover a single directory from the clone save set and relocate the data to a new directory location, type the following
command:
recover -S ssid/cloneid -d destination_dir original_dir
where:
○ ssid is the SSID of the backup save set.
○ cloneid is the cloneid of the clone save set.
○ destination_dir is the location to which you want to recover the data.
○ original_dir is the directory that is contained in the save set that you want to recover.
For example, to recover the directory /var/adm on the backup save set to the /usr/mnd directory, type the following
command:
recover -S 3644194209/1362493448 -d /usr/mnd /var/adm
● To recover data that was encrypted with the current AES pass phrase, no special action is required. However, to recover
data that was encrypted with an AES pass phrase that is different than the current pass phrase,start the recover
command specify the -p pass_phrase. To enter multiple pass phrases with the -p option, type: recover -p
pass_phrase1 -p pass_phrase2 -p pass_phrase3.
NOTE: When an incorrect pass phrase or no pass phrase is entered, encrypted data is not recovered. Instead, the
file names are created without data. However, if unencrypted data is also selected for recovery, it is recovered.
394 Recovery
Group resource to authenticate a user. Classic authentication does not require an authentication token to run the command. For
example, if you run the command without first running nsrlogin, NetWorker assigns the privileges to the user based on the
entries that are specified in the Users attribute of the User Group resource. When you use nsrlogin to log in as a NetWorker
Authentication Service user, NetWorker assigns the privileges to the user based on the entries that are specified in the External
Roles attributes of the user Group resource. The NetWorker Security Configuration Guide provides more information about
privileges
NOTE: You cannot use the scanner command recover data from a NetWorker Module, NDMP or DSA save set.
1. Optionally, use the nsrlogin command to authenticate a user and generate a token for the
Using nsrlogin for authentication and authorization provides more information.
2. Ensure the value in the Idle device timeout attribute of the device that contains the volume is 0. Unmounting volumes
automatically (idle device timeout) on page 121 provides more information.
3. Use the mminfo program to query the media database for save set information.
For example:
mminfo -avq ssid=ssid -r volume,client,name,ssid,mediafile,mediarec
4. Use the save set information from the mminfo command to run the scanner program:
● To recover all files in a save set on Windows, type:
scanner -v -Sssid -f mediafile -r mediarec device | path\uasm -rv
where:
○ ssid specifies the save set ID value that you obtained from the mminfo output.
○ mediafile specifies the starting file number of the save set that you obtained from the mminfo output.
○ mediarec specifies the starting file record number of the save set that you obtained from the mminfo output.
○ device is the name of the device that contains the volume. is the name of the device the volume is loaded in, for
example /dev/rmt0.1 or \\.\Tape0
○ path is the path on the NetWorker host that contains the uasm binary.
For example, on Windows:
C:\Program Files\EMC NetWorker\nsr\bin
Where:
● source_dir is the directory where the data resided during the backup.
● dest_dir is the directory where the data is relocated during the recovery.
● filename is the name of the file or directory to recover.
Recovery 395
scanner -v -S ssid -f mediafile device -x path/uasm -rv -m source_dir=dest_dir filename
The UNIX man page and the NetWorker Command Reference Guide provides detailed information about the scanner program.
Where:
● mediafile is the starting file number for the save set, obtained from the mminfo output.
● mediarec is the starting record number for the save set, obtained from the mminfo output.
● device is the name of the device the volume is loaded. For example, /dev/rmt0.1 or \ \.\Tape0.
When the save set spans multiple volumes, the scanner program prompts for a new volume as needed. All the parts of the
saveset must be scanned to be able to recover.
396 Recovery
This feature is not enabled by default. The user can turn on this feature using "-z" flag using recover command line. To
enable from NMC , select the advanced options check box and pass the "-z" flag in the additional command line options. The
NetWorker Performance Optimization Planning Guide provides more details on when to turn on the feature.
NOTE:
NDMP and BBB backup types are not supported for parallel restore. Tape, VTL, CloudBoost, and DDCT device types are not
supported. The Recover feature is not supported using WinWorkr GUI application.
Recovery 397
a. In the Management host field, specify the hostname of the Data Domain system that is used for management
commands.
b. In the Management user field, specify the username for a Data Domain user that has admin access. For example,
sysadmin. The Management user should have Data Domain administrator privileges.
c. In the Management password field, specify the password of the management user.
d. In the Management port field, specify the management port. By default, the port is 3009.
NOTE: The NetWorker Data Domain Boost Integration Guide provides information about the Cloud unit field and use of
the Cloud tier device.
5. If required, in the Configuration pane, update the export path. It is recommended that you leave this field blank, which sets
the export path to the default path. The short name of the NetWorker server is the default path.
If you do type a path in this field, ensure that the path has NFS permissions. When you log in to the Data Domain resource,
browse to the NFS section and add the Mtree device path (the path to the NetWorker backup device) as a valid NFS path.
6. To save the changes, click OK.
398 Recovery
● User Object Class
● User Search Path
● User ID Attribute
2. Register the AD domain user to NetWorker either using the command line or the NetWorker Management Console user
interface.
If using the command line:
a. Create a tenant user on NetWorker by running the authc_config command, as in the following:
authc_config -u administrator -e add-tenant -D tenant-name=your tenant name -D tenant-
alias your selected aliases -p password
For example, to create a tenant user ADuser with the alias FLR, run authc_config -u administrator -e
add-tenant -D tenant-name=ADuser -D tenant-alias FLR -p password
b. Obtain the tenant ID by running the authc_config command using the find-tenant parameter. For example:
authc_config -u administrator -e find-tenant -D tenantname=ADuser -p password
c. Register the AD domain user to NetWorker by running the authc_config command using the add-config parameter
and using the values obtained in Step1d, as in the following:
authc_config -u administrator -e add-config -D config-tenant-id=tenant ID
number -D config-name=your tenant name -D config-server-address=ldap IPv4/
IPv6 address OU=proxy,DC=domain name,DC=com -D config-domain=domain name -D
config-user-dn=CN=Aduser,OU=user,OU=proxy,DC=domain name,DC=com -D config-user-dn-
password=password -D config-user-objectclass= inetOrgPerson -D config-user-search-
path=OU=user -D config-userid- attr=cn -D config-group-search-path=OU=user -D config-
group-nameattr= cn -D config-group-object-class=group -D config-group-memberattr=
member -D config-active-directory=y -p password
If using the NetWorker Management Console:
a. Click the Setup tab.
b. On the left pane of the Setup window, expand Users and Roles, right-click External Authority and select New from
the drop-down. The Add External Authentication Authority dialog displays.
c. Provide a name for the external authority (for example, Aduser), select Active Directory from the Server Type
drop-down, and then fill in the required details with the values obtained from Step1e.
d. Click OK.
3. In the NetWorker Management Console, click the Server tab.
4. On the Server window, select User Groups.
5. Add a user group (for example, ADuser group) with the following permissions:
● View Security Settings
● View Application Settings
● Remote Access All Clients
● Operate NetWorker
● Monitor NetWorker
● Operate Devices and Jukeboxes
● Recover Local Data
● Recover Remote Data
● Backup Local Data
6. Edit the new user to add the required AD user and AD group in the External Roles field. For example, for a user named
ADuser with the domain rideblr, add the following in the External Roles field:
CN=Aduser,OU=user,OU=proxy,DC=rideblr,DC=com CN=vmware,OU=proxy,DC=rideblr,DC=com
7. Log in to the Dell EMC Data Protection Restore Client as the AD user, in the format
<tenant>\<domain>\<userid>. For example, default\rideblr.com\ADuser.
You can now perform file-level restore as an Active Directory user.
Recovery 399
Figure 58. Virtual machine recovery in the NMC Recovery wizard
After selecting the Virtual Machine Recovery type, you can perform recovery of individual virtual machines, or (for revert and
virtual machine recovery options) recovery from multiple virtual machines.
1. In the Select the Recovery Type page, select Virtual Machine Recovery, and then select a vCenter server to recover
from using the Source vCenter server drop-down. Click Next.
2. In the Select the Virtual Machine to Recover page, enter the name of the source virtual machine(s) to recover from, or
perform a search for the virtual machine. Additionally, you can use the tabs on this page to choose a single virtual machine
or multiple virtual machines from a selected backup, or browse the source vCenter to determine the required virtual machine
source. When you locate and choose the desired virtual machine(s), click Next.
400 Recovery
Figure 59. Select the Virtual Machine to Recover
3. In the Select the Target Backups page, select the virtual machine backup(s) you want to restore from the Available
Backups pane. This pane lists both primary backups and, if available, clone copies. If you selected recovery from multiple
virtual machines, you can switch between virtual machines to browse each machine's available backups by using the Virtual
Machine Name drop-down. Click Next.
Recovery 401
Figure 61. Select the Target Backup (multiple virtual machines)
4. In the Select the Virtual Machine Recovery method page, select from one of the available recovery options:
● Revert (or rollback) a virtual machine
● Instant Recovery of a virtual machine (direct restore from a Data Domain device)
● Virtual Machine recovery (recovery to a new virtual machine)
● Virtual Disk recovery (recover VMDKs to an existing virtual machine)
● Emergency recovery (recovery to an ESX host)
● File Level recovery (recover files from VMDKs to a file system, or as a download).
Subsequent wizard options change based on the recovery option selected, as described in the following sections.
402 Recovery
a. Select Revert both VM configuration and data to revert both the configuration information (such as operating
system, virtual machine size) and data for a virtual machine. When you select this revert type, the Delete existing disk
on disk configuration mismatch option appears in the Revert Options pane to allow you to overwrite an existing disk
if a configuration mismatch occurs.
b. Select Revert VM Data Only to revert only the virtual machine data without changing the virtual machine configuration.
3. In the Revert Options pane of the Select Options to Revert a Virtual Machine page, choose from the following options
a. Select Revert all disks on this virtual machine to rollback all VMDKs, or select Revert one or more disks only and
then select a specific disk drive to rollback only that disk.
b. Select the Power on virtual machine checkbox to power on the virtual machine after the restore.
c. Select Delete existing disk on disk configuration mismatch if you want to be presented with the option of deleting
the existing disk if a disk configuration mismatch is detected. Note that this option only appears when you select the
Revert both VM configuration and data revert type in step two.
d. Click Next.
NOTE: If the virtual machine is currently powered on, a dialog displays requesting confirmation to power off the virtual
machine. Additionally, if a change has occurred in the virtual machine configuration since the backup, a warning message
displays.
NOTE: The entire VMDK will be rolled back unless you have CBT enabled, in which case only the changed blocks will be
moved.
Recovery 403
Figure 64. Select Alternate Recovery Sources
404 Recovery
Figure 65. Configure the Instant Recovery
Recovery 405
where you want to recover the files. You can recover the virtual machine to a Blue folder by using the VM Folder
drop-down, as shown in the following figure. The folder can be the default folder, or a new folder.
If you have a single disks, or multiple disks with multiple datastores, you can perform the following:
● Choose to recover a collection of all the available hard drives.
● Select a different datastore than the original datastore.
● Select a different datatore for each disk you want to recover.
● Specify the datastore where the virtual machine configuration files reside.
Optionally, select the Power on virtual machine and Reconnect to network options to power on and reconnect after the
recovery, and then click Next.
406 Recovery
1. In the Select the Virtual Machine Recovery Method page:
a. Select Virtual Disk Recovery.
b. Click Next.
2. In the Configure the Virtual Disk Recovery page:
a. Select the virtual machine where you want to restore the VMDKs. This can be the original virtual machine, or another
existing virtual machine.
b. Select the desired disks from the Recovery Data pane, and select a datastore.
c. Click Next.
Emergency Recovery
The next virtual machine recovery option available in the NMC Recovery wizard is an Emergency Recovery. An Emergency
Recovery is required when you need to restore the virtual machine to an ESXi host.
Emergency Recovery requires a vProxy set up on the ESXi host prior to running the recovery.
Additionally, ensure that you disconnect the ESXi host from the vCenter server.
NOTE: During an Emergency Recovery, the vProxy gets associated with the ESXi host and is unavailable for other
operations on the vCenter server. Wait until the recovery completes before initiating any other operations on the vProxy.
Recovery 407
To complete the Recovery wizard with the Emergency Recovery method, perform the following:
1. In the Select the Virtual Machine Recovery Method page:
a. Select Emergency Recovery.
b. Click Next.
2. In the Configure the Emergency Recovery page:
a. Specify the target ESXi server in the vCenter environment.
b. Click Connect.
The Proxy Selection and Recovery Data panes get populated with the ESXi server details.
3. In the Proxy Selection pane, if a proxy is not discovered, add a new proxy which is deployed in vCenter but not added to
NetWorker.
4. For the disks in the Recovery Data pane:
a. Select a datastore.
b. Optionally, select the Power on virtual machine and Reconnect to network options.
c. Click Next.
5. In the Select Alternate Recovery Sources page:
a. Select the original disk backup, or a clone copy if one is available.
b. If recovering from a clone that is not on a Data Domain device, or recovering from a Data Domain Cloud Tier device,
specify the staging pool.
6. In the Perform the Recovery page:
a. Specify a name for the recovery and check the summary at the bottom of the page to ensure all the details are correct.
b. Click Run Recovery.
The Check the Recovery Results page will display a progress bar with the duration of the recovery, and a log file entry when
the Emergency Recovery is complete.
NOTE: The progress bar may not update correctly when you perform an Emergency Recovery directly to the ESXi host.
408 Recovery
NetWorker only supports file level recovery operations from a primary or cloned backup if the save set is on a Data Domain
device. If a cloned backup does not exist on the Data Domain device, you must manually clone a save set from the tape device
to Data Domain before launching the Recovery wizard.
For the Data Domain resource, ensure that you provide the management credentials and, if required, type the export path
appropriately. The section Entering management credentials for the Data Domain resource (instant recovery and User mode
file-level restore only) provides detailed steps.
Additionally, if recovering to a virtual machine on a secondary vCenter, ensure that a vProxy appliance has been deployed on the
secondary vCenter server and configured with the NetWorker server.
NOTE: vProxy FLR Agent creates and maintains a file on each discovered file system (volume) that has information about
the volume’s original path. The file name is in the form “DellEMC_VolumeID_path.info”, where the path is in URL-encoded
form of the last discovered path of the file system. These files are used during the FLR mount operation and are re-created
again if they are found missing.
File level recovery in the NMC Recovery wizard can only be performed by an administrator.
NOTE: For file-level recovery of high-density file systems (more than few hundred files/folders), it is recommended to use
either the NetWorker Management Web UI or the Dell EMC Data Protection Restore Client (User or Admin mode, as
applicable) instead of the NMC Recovery wizard.
To complete the Recovery wizard with the file level recovery method, perform the following:
1. In the Select the Virtual Machine Recovery Method page:
a. Select File Level recovery.
b. Click Next.
2. In the Select Alternate Recovery Sources page:
a. Select the primary backup to recover from, or select the Recover the Virtual machine from a clone on a Data
Domain device option.
b. Select the clone copy that you want to recover files from.
c. Click Next.
NOTE: If selecting a clone from Select Alternate Recovery Sources, additionally review the section "Selecting
alternate recovery sources".
Figure 69. Select Alternate Recovery Sources for file level recovery
Recovery 409
By default, the virtual machine that you selected for recovery in the Select the Virtual Machine to Recover page is
displayed.
b. To recover to another virtual machine in the vCenter, or recover to a virtual machine on a secondary vCenter, select
Browse the vCenter server to select a Virtual Machine to recover to, and choose a vCenter from the drop-down to
browse that vCenter's tree and select a different virtual machine.
c. Click Next.
NOTE: Cross-platform recovery, for example from a Windows to a Linux virtual machine, is not supported.
Figure 70. Mount the save set for file level recovery
When the Mount Results pane shows that the mount has succeeded, click Next.
NOTE: This user should have privileges to install the FLR Agent, which is required to perform file level recovery. For
Linux virtual machines, this requires the root user account or an equivalent sudo local user account, as described in the
section "FLR Agent installation on Linux platforms" of the NetWorker VMware Integration Guide.
410 Recovery
Figure 71. Select the files and folders to recover
The Check the Recovery Results page displays the duration of the recovery, and a log file entry when the file level recovery is
complete.
Recovery 411
5. For each volume you do not want to recover from that you made note of in step 1, locate the corresponding device, and
make note of that device name.
6. For each device you identify as corresponding with those volumes, right-click the device and select Unmount from the
drop-down, and then also select Disable from the drop-down.
NOTE: Ensure that no backups are currently running to these devices prior to unmounting.
7. In the NMC Administration window, click Recover to display the Recover window, and locate the saved recovery
8. Right-click the saved recovery and select Open Recover.
The Recovery wizard re-opens on the Select Alternative Recovery Sources page.
9. In the Recovery Source pane of the Select Alternative Recovery Sources page, select either Recover the virtual
machine from a clone on a Data Domain device, or Recover the virtual machine from a clone on a non-Data Domain
device. Click Next.
NOTE: If you want to recover from a clone on a non-Data Domain device, manually change the staging pool to a
different pool, and ensure that your selected pool does not already contain copies for this backup. If the primary source
is present and you select a clone to recover from using the same staging pool that contains the existing copy, the
recovery may become unresponsive.
10. In the Perform the Recovery page, specify a name for the recovery and check the summary at the bottom of the page to
ensure all the details are correct. Click Run Recovery.
The Check the Recovery Results page will display the duration of the recovery, and a log file entry when the recovery is
complete.
11. In the NMC Administration window, click Devices to return to the Devices window, and in the left navigation pane, select
Devices to display the list of devices in the right pane.
12. For each device that you unmounted and disabled in step 6, right-click the device and select Enable from the drop-down,
and then select Mount from the drop-down.
412 Recovery
vProxy Log Bundle collection using NMC
To collect log bundle information for a particular vProxy, perform the following steps in NMC:
1. From NMC's NetWorker Administration, open the Devices window.
2. From the left pane, select VMware Proxies to display the configured vProxies.
3. Right-click the vProxy that you want to collect log bundle information from, and then from the menu, click Log Bundle.
4. (Optional) Collect the recycled logs from the pop-up window selection.
NOTE:
● Since the temporary log bundle download occurs on the NetWorker server, ensure that there is sufficient space on the
drive where the Networker server is installed.
● NMC cannot collect the log bundle when accessed from a remote machine that cannot communicate with vProxy.
Recovery 413
2. Use the Microsoft DHCP administrative tools to restore the DHCP database. The Microsoft documentation provides detailed
instructions about Microsoft DHCP administrative tools.
1. Use the NetWorker User program to recover the backup configured in the WINS backup procedure. DHCP and WINS
databases on page 272 provides more information.
2. Use Microsoft WINS administrative tools to restore the WINS database.
Recovering DFS
Review this section for information about how to recover DFS.
Restoring a DFS
Restore DFSR through the WINDOWS ROLES AND FEATURES save set.
1. Restore the DFS topology information:
● To restore a domain-based system, restore the WINDOWS ROLES AND FEATURES save sets on the domain controller.
414 Recovery
DFSR Shared Directories supports granular DFSR folder and file recoveries on computers that run Windows Server 2012 and
later operating systems. You do not have to recover the entire WINDOWS ROLES AND FEATURES save sets to restore DFSR
shared directories. If you perform a file level non-VSS granular recovery, then the recovered file is treated as new version of the
file by DFS.
You must use volume backup to correctly back up a DFSR namespace. Also, namespaces are skipped when specifying the ALL
save set. You must back up namespaces directly by specifying the path of the namespaces as separate save sets in the Save
Set attribute.
For recovery of namespace data, use the NetWorker User program and select individual files or folders of the NetWorker Client
resource.
NOTE: If you do not specify the -s NetWorker_server option, the save command contacts the NetWorker server that
is defined in the /nsr/res/servers file.
c. Optionally, to automatically overwrite existing files, use the force option at the recover prompt.
d. To start the recovery operation, type recover:
recover> recover
NOTE: Do not recover any OS-X operating system start files. For example, do not recover the OS-X operating
system kernel, /mach_kernel.
Recovery 415
○ In the Available Servers field, select the NetWorker server, and click Connect.
The Available Servers field displays a list of host names that appear in the /nsr/res/servers file on the Mac
client. To query the network for other NetWorker servers, click Update.
○ In the Server Address field, specify the hostname or IP address of the NetWorker server, and click Connect.
The following figure shows the Connect to Server dialog box.
● When you close the NetWorker Recover GUI, subsequent recover operations will connect to the last NetWorker server
selected, by default. To change the NetWorker server, perform one of the following steps:
○ In the SERVERS section on the side bar, select the NetWorker server, then click Connect.
○ On the Go menu, select Connect to Server. The Connect to Server dialog box appears.
After you successfully connect to a NetWorker server, the NetWorker Recover window appears.
416 Recovery
Changing the source NetWorker Client
After you connect to the NetWorker server, the browse view displays a list of files and folders that you can recover from the
last local host backup.
NetWorker Recover provides you with the ability to recover of files from a host that is not the local host. Directed recoveries on
page 372 provides detailed information about directed recovery requirements.
To change the source host, perform one of the following actions:
● From the Go menu, select Browse Client. A list of clients for the current NetWorker server appear in a drop down. To
establish a browse session with a new host, select the source host from the drop down.
● On the side bar, in the SERVERS section, select the NetWorker server. The browse view displays a list of clients. To
establish a browse session with a new host, double-click the source host. The following figure provides an example of
browse session window after you select a NetWorker server from the SERVERS section.
NOTE: To show hidden files, from the View menu, select Show Hidden Files.
Recovery 417
● To perform a save set recover, on the side bar in the SAVE SETS section, select a save set. NetWorker Recover queries
the media database and displays each instance of the save set, including cloned save sets.
NOTE: The Save Sets filter bar, located above the list of save sets enables you to filer the save set list by save
set type. For example, to show all the original save set instance, select Save Sets s or to display cloned save set
instances, select Cloned Save Sets.
2. To search browser view for the files you want to recover:
a. Type the text string in the Search field in the upper right of the NetWorker Recover window.
b. Use the Search Scope bar to narrow the scope of the search result. The following figure displays some of the search
criteria you can use.
3. To display information about an object, right-click the object, and select Get Info.
4. To mark objects in the browser view for recovery, select the checkbox next to each object that you want to recover. You
can only mark one save set or clone instance at a time.
NetWorker Recover adds each item that you mark to the RECOVERY SETS section on the side bar. A number appears next
to each recovery set in the sidebar, which represents the total number of items that are selected for recovery.
5. To view or select different versions of a marked file, perform the following steps:
a. Right-click the file and select File Versions. The Versions side bar appears. The following figure provides an example of
the Versions side bar.
418 Recovery
● Select Save Sets to display a list of objects that you marked for a save set recovery.
The Recover Files browse view displays a list of marked files and the list of volumes that the recovery operation
requires.
7. To view the status of the required volumes, click Volume Status. Ensure that the status of the required volume indicates
online, then close the dialog box.
8. To start the recover operation, click the Recover button in the toolbar. The Recover window appears.
9. In the Recover window, select the recovery options.
● To recover the objects to a directory that differs from the original location, perform one of the following actions:
○ In the Relocate files to field, type the path on the destination host to recover the data.
○ Click Browse and select the target directory.
● Select a conflict resolution option:
○ Rename the recovered file— By default, the recover operation appends a tilde (~) to the beginning of the name
of the recovered file ~file_name. When a file named ~file_name already exists, the recovered file is renamed
~00_file_name, and so forth, to ~99_file_name. When this fails, the recover process does not automatically rename
the file and prompts the user is to specify a name for the file.
○ Discard recovered file— Discards the recovered file and keeps the existing file.
○ Replace local file— Replaces the file on the file system with the recovered version.
○ Prompt me for an action— Each time the recovery operation encounters a file or folder with the same name in the
destination location, the recovery operation prompts you to select a conflict resolution method.
● To recover the files to a different host, select the hostname from the Direct recover to drop down.
● Click OK. The recover status dialog box appears. At any time during the recovery, you can click the Stop button to
cancel the operation.
10. To monitor the recovery process, on the Recover progress, select Monitor Server.
The NetWorker Monitor dialog box appears with the following tabs:
● Info— Displays general server information including name, IP, OS type, NetWorker version, Save totals, and Recover
totals.
● Messages— Displays server messages that are logged during the recovery, for example, errors and warnings.
● Devices— Displays the status for all connected devices.
● Sessions— Displays Save sessions, Recover sessions, and Browse sessions.
● Settings— Allows you to adjust the polling interval for server updates.
11. To review the recover log, after the recovery operation completes, select Recover Log. The Console application appears
and displays the contents of the ~/Library/Logs/recover.log file.
Recovery 419
a. In the Name attribute, type a name for the client.
You can use the same name that was used on the original server, but you cannot use a name that exists for the new
server. When a client with the same name exists on the new server, use this format to specify the client name:
~hostname-#
where hostname is the hostname of the client.
For example, if the client’s hostname is jupiter, and a client named jupiter already exists on the new server, type:
~jupiter-1
3. On the new NetWorker server, create each Pool resource that was used to write the client data on the original NetWorker
server.
NOTE: Ensure that you create each Pool resource with the same name that you used on the original NetWorker server.
4. Use the scanner command to import the save set information into the new NetWorker server.
● To import the save set information into the client file index and media database entries, type the following command:
scanner -i -c client_name device_name
where client_name is the name of the client that appears on the original NetWorker server.
● To import the save set information into the media database only, type the following command: scanner -m -c
client_name device_name
where client_name is the name of the client that appears on the original NetWorker server.
NOTE: When you use the scanner -i or scanner -m to import data before you configure the Client resource on
the new server:
● Only the media database contains the client ID and save set information for the imported save sets.
● If the same hostname already exists on the NetWorker server, NetWorker will not use the original hostname to store
the save set information because the client ID is different. NetWorker associates the save set information with a
hostname in the format clientname-#.
● You must create a Client resource with the name clientname-# and specify the client ID that you recorded from the
original NetWorker server.
● Optionally, after you create the new Client resource, run the scanner -i command to store the save set
information into the client file index. When you use the scanner command, specify the client name as it appears on
the original NetWorker server.
420 Recovery
● Recovery through REST API
○ Filesystem
○ VMware
● Recovery through NMUI
○ VMware
Exception: As a non-admin NMC user, user cannot add or delete any resources. Therefore the following recovery operation does
not work:
● Creating new remote recovery job
● VMware emergency recovery
NOTE: If the non-admin user performs remote recovery, the administrator should configure the remote access list attribute
in client properties and provide view security privilege to the non-admin user. For non-admin users, a module recovery that
requires Lockbox operation, needs Configure NetWorker privileges that the admin should grant.
6. Click OK.
NOTE: Perform recovery operation as NMC user through NMC GUI, REST API, and NWUI.
Recovery 421
Creating a NetWorker User Group for recovery
Use the NMC GUI to create user group resources.
Perform the following steps to create a NetWorker user group for recovery:
1. Connect to the NMC server with the NetWorker Authentication Service administrator account.
2. Click Enterprise.
3. Right-click the NetWorker server and select Launch Application.
4. On the NetWorker Administration window, select Servers.
5. In the left navigation pane, select User Groups.
6. In the User Groups window, right-click and then select New.
The Create User Group window appears.
7. In the Name attribute, type a name for the user group.
NOTE: You can not modify the name of an existing user.
422 Recovery
On Linux:
/etc/init.d gst stop
On Linux:
2. On a target Linux NetWorker Authentication Service, set the LD_LIBRARY_PATH environment variable to include the
postgres library path.
For example:
export LD_LIBRARY_PATH=NMC_Installation_dir/postgres/lib
NOTE: If you had set datazone pass phrase during backup, then -p AES_Passphrase is required.
where:
● -f instructs the recovery operation to delete the database files that currently exist in the database directory. Do not use
this option if you want to restore the database files to a different location.
● NetWorker_server specifies the name of the NetWorker Server.
● source_NMC_server specifies the name of the source NetWorker Authentication Service, when you recover the
database to a different NetWorker Authentication Service host.
● AES_Passphrase specifies the passphrase that was used during the NMC database backup.
Recovery 423
● staging_dir specifies the staging directory that was used during the backup of the database on the source NetWorker
Authentication Service.
● dir_name specifies the directory to relocate the recovered database files. When you use this option, you must
manually copy the database files from the destination directory to the database directory defined for the NetWorker
Authentication Service. Ensure that you retain the same ownership and permissions on the database files and the
credential files after the copy completes.
During a recovery of the NetWorker Authentication Service database, the console GUI is unavailable. Consequently,
messages such as mount requests cannot be addressed from the console. Consider the following during a recovery of
the NetWorker Authentication Service database:
● Monitor the daemon log files for messages. The use of the NetWorker nsr_render_log command can make the
daemon.raw file more user friendly for interpretation.
● Use the nsrwatch command to view messages and use commands such as nsrjb to address those messages.
The NetWorker Command Reference Guide provides more information about nsr_render_log, nsrwatch, nsrjb
and other NetWorker commands.
6. After the recovery completes, if you stopped the NMC services, start the NMC services, by typing the following command
from a prompt:
On Windows:
net start gstd
On Linux:
/etc/init.d gst start
424 Recovery
10
Special recoveries on Windows hosts
This chapter contains the following sections:
Topics:
• Special windows recoveries Restoring a Windows Domain Controller host
• Performing a Windows BMR to physical or virtual computers
• Online recovery of Active Directory, DFSR, or Cluster services
Non-authoritative restore
A non-authoritative restore returns the domain controller to its state at the time of backup, then allows normal replication to
overwrite that state with any changes that have occurred after the backup completed.
Authoritative restore
An authoritative restore is an extension of the non-authoritative restore process that allows an administrator to recover a
domain controller to a specific point in time and mark objects in the AD as authoritative. After you recover objects that
are marked authoritative the objects are replicated to all the other domain controllers in the domain. Before you perform an
authoritative restore, you must complete the steps for a non-authoritative restore.
3. When the restore completes, verify that the operation was successful.
4. To complete the AD restore, restart the domain controller.
where recovering_host is the name of the host that you are performing the BMR to.
2. Select the boot options menu, and then ensure that the CD/DVD boot option is at the top of the list of locations from
which to boot.
3. Save the changes, and then exit the BIOS program.
2. Select BIOS options necessary so that the network boot option is enabled.
The BIOS documentation provides more information.
f. In the DNS Server section, select either Obtain DNS server address automatically or Use the following DNS
server address:
● If you choose Use the following DNS server address, type the IP address of the DNS server in the Preferred
DNS server field.
● If applicable, type an alternate DNS server address in the Alternate DNS server field.
NOTE: If you added the NetWorker server hostname and IP address to the X:
\Windows\System32\Drivers\etc\hosts file, you can ignore the DNS Server fields.
g. Click Next.
The Available Disks screen displays all detected local disks.
6. If the Windows BMR wizard fails to detect a disk, perform the following steps:
a. Select Load Driver.
b. Browse to the location that contains the disk driver, and then load the required disk driver.
c. To update the list of detected disks, select Refresh.
d. Click Next.
7. On the Select NetWorker Server screen, complete the fields:
a. In the Server field, specify the NetWorker server that performed the backup:
c. Click Next.
8. On the Select Bare Metal Recovery Backup screen, select the system backup that you want to recover, and then click
Next.
System backups appear in descending order from most recent to oldest.
9. Review the Save Sets to Restore screen, and then click Next.
The recovery process reformats critical volumes. The recovery process reformats non-critical volumes only if the disk
signature on the target disk differs from the original disk.
For example, to perform a quick format instead of a full format operation if the disk was replaced, select Perform a quick
format of disks.
NOTE: A quick format is much faster than full format but does not verify each sector on the volume.
The recovery process does not recover non-critical volume data. Recovering file system data provides more information.
10. On the Bare Metal Recovery Summary screen, select Options to display the Non-Default Recover Options screen.
11. On the Non-Default Recover Options screen:
a. In the Additional Options field, type any required non-default options with their corresponding values.
Non-default options are primarily used for troubleshooting purposes.
b. To save and close the Non-Default Recover Options screen, and then return to the Bare Metal Recovery Summary
screen, click OK.
c. To begin the recovery process, click Restore.
12. On the Confirmation screen, select the I confirm that I want to format the disks and restore the backup option, and
then click OK.
NOTE: All data is lost on all volumes that the recovery process reformats.
After the data recovery completes, the wizard writes the recovery log files to volumes in the backup media pool being used.
If you do not have a volume available, then the recovery operation appears to be unavailable until media for the media pool
becomes available.
NOTE: You can cancel the log file backup without affecting the recovery operation.
13. After the wizard and log files complete, click either Reboot or Exit:
● To restart the system when any subsequent application data resources must be performed, click Reboot. If you are
recovering an Active Directory domain controller, it is recovered in non-authoritative mode by default.
● If you must recover a domain controller in authoritative mode, click Exit. The computer returns to the WinPE command
prompt. Start into Directory Services Restore Mode (DSRM). See Performing post recovery tasks for active directory
services for more information.
The numbers and dashes in the previous message form a Globally Unique Identifier (GUID) that identifies a new entry. In
this example, the GUID is for illustration purposes only. The actual GUID that is generated when you run the command is
unique.
b. To set the safeboot option for the bootloader entry in the BCD store, type the following command using the generated
GUID:
bcdedit /set {GUID_value} safeboot dsrepair
3. (Optional) If you have a WINDOWS ROLES AND FEATURES:\ Active Directory subcomponent save set that is newer than
the DISASTER_RECOVERY:\ save set used in the preceding BMR, you can recover the save set in DSRM through the
NetWorker User program.
4. From the WinPE command prompt, run the Windows ntdsutil utility.
The ntdsutil prompt appears. The ntdsutil utility is a command interface similar to the NetWorker recover interface.
For help with the ntdsutil utility, type:
NTDSUTIL: ?
For example:
NTDSUTIL: restore subtree “OU=engineering,DC=Seattle,DC=jupiter,DC=com”
NTDSUTIL: restore subtree “CN=mars,CN=users,DC=Seattle,DC=jupiter,DC=com”
The Microsoft Windows Server Resource Kit documentation on Active Directory provides information.
7. Exit the ntdsutil utility by typing quit at each successive ntdsutil prompt until the command prompt appears.
8. Type the following command at the WinPE command prompt so that the host does not start into DSRM mode on restart.
bcdedit /deletevalue safeboot
9. Restart the domain controller in normal mode, log in, and then verify that the authoritative changes are replicated to the
Active Directory replication partners.
The Setup tool is located on the SQL Server installation media and must be run from the command prompt with Windows
Administrator privileges. Before you run this command, ensure that the SQL group is offline except for the shared disks.
https://msdn.microsoft.com/en-us/library/ms189302
For VMware hypervisors, use a Windows Server 2012 (64-bit) templates as the guest operating system when you create the
VM.
3. On the VM, start the WinPE ISO which starts the BMR wizard.
4. On the VM, use the BMR wizard to configure the hostname and network configuration:
a. On the Select NetWorker Server screen, specify the name of the physical computer as the NetWorker client.
b. On the Save Sets to Restore screen, review the selected items to restore, and then click Next.
c. On the Select Bare Metal Recovery Backup screen, select the backup to restore. Backups are listed in chronological
order with the most recent backup first.
1. In the Device Manager, select Display disabled devices > Uninstall the disabled NIC.
2. Configure the new NIC with the wanted network settings.
To direct the Ossr_director.raw file to a text file that can be viewed in a text editor, type the following:
nsr_render_log "C:\logs\Client-bv1\Ossr_director.raw" > mylog.txt
By default, the Windows firewall is enabled on WinPE, and this action blocks the FTP port from transferring files.
4. To move the log files to another NetWorker host, use the FTP utility.
winworkr -s server_name
If the -s option is not included, and there is only one server that is detected, that server is connected automatically. If
there are no servers that are detected or if there is more than one server available, the Change Server dialog box appears,
enabling you to choose the server.
Windows Server 2012, and Windows Server 2012 R2 has 100 MB reserved as the System Reserved Partition. When backing
up the system state, VSS includes the System Reserved Partition (used for BitLocker and Boot files), but the backup fails
because the System Reserved Partition is offline. This can occur if the Windows automount capability is disabled. Although there
are circumstances where the automount capability must be disabled, it can result in the partition being offline after a restart.
Automount must be enabled for a BMR backup to succeed.
To work around this issue, use either of the following solutions:
Solution 1
From the command prompt, run DISKPART with the following commands:
DISKPART
List volume
If automount is disabled while using third party storage software or if the user manually disabled the automount for the volume,
the volumes can go offline.
This Microsoft KB article 2419286, available at http://support.microsoft.com/kb/2419286, provides details on preventing
volumes from going offline by checking and setting the system automount attribute.
Solution 2
From the Disk Management console:
1. Access Disk Management from the command prompt:
C:\>Diskmgmt.msc
2. To bring the disk online, assign the drive letter to the 100 MB partition:
a. Right-click the 100 MB volume, and then select Change Drive Letter and Paths.
b. Assign a new drive letter to the volume.
Assigning the drive letter ensures that the volume are online after a restart.
NOTE: After the wizard has been restarted, you can switch between the wizard and the WinPE command line without
exiting the wizard.
This message is an indication that the NIC selected by the wizard is not the NIC that was connected to the NetWorker server
when the backup was performed and the NIC might not have connectivity to the server. This applies when searching for an
available server or specifying a specific server. To resolve the issue, select another NIC.
Sometimes, a host does not retain its network configuration data after a Windows BMR operation and after the host starts. If
the recovered host is experiencing network connectivity issues, confirm that network properties for the local connections are
correct. If required, manually update the network configuration data on the host.
http://support.microsoft.com/kb/980794
The patch that is mentioned in this knowledgebase article is most likely on the Windows system if it is up-to-date. In this case,
you can create and populate the Registry keys as described in the article.
This issue is most often encountered when backing up a passive node in an MSCS cluster and a critical volume is not on the
physical host of the passive node but is instead on the physical host of the active node.
The Microsoft knowledgebase article 121007, available at http://support.microsoft.com/kb/121007, provides more information.
By using the -p option, any existing partitions are deleted and all disks are
reformatted on the recovered computer to match the layout of the system image.
However, by Microsoft specification, even if the -p option is selected, a non-
critical volume is not reformatted if the disk signature has not changed since the
backup.
This option might be useful in situations where a system fails to recover because of
disk mismatch errors. In this case, the -p option might resolve those errors.
The recovery process does not recover non-critical volume data even if the volume
is reformatted. Non-critical volumes can be recovered by using the NetWorker User
program after the wizard has completed and the host has been restarted.
recover -s <NetWorker server> When the restored data is meant to override the data on other nodes, it should
-U -N "WINDOWS ROLES AND be restored using the authoritative mode. Once this data is restored to one of the
FEATURES\Cluster Database" nodes, it is propagated to the other nodes and overwrites any newer data on those
nodes. Perform Authoritative restore by using the command on the left.
While the recovery is in progress, observe that the status of the groups changes
from Online to Pending to Offline in the Failover Cluster Management application.
Alternatively, check the Event Viewer, under Application and Services Logs >
Failover Clustering > Operational on all nodes that the Cluster Service has
stopped and restarted.
Recover the shared drive data through winworkr on the cluster node with its
current active node. Select source client as the virtual client, and destination
client as the current active node.
NetWorker does not support the online recovery of any other Windows service that the WINDOWS ROLES AND FEATURES
save set contains. Unsupported online recovery of WINDOWS ROLES AND FEATURES components results in an inconsistent
state of the Windows server.
NOTE: When you perform an online recovery, you cannot mark the WINDOWS ROLES AND FEATURES save set and use
the Required Volumes option. To determine the volume that contains the WINDOWS ROLES AND FEATURES save set
that you want to restore, mark the DISASTER RECOVERY:\ save set, then use the Required Volumes option. After you
determine the required volumes, unmark the DISASTER RECOVERY:\ save set and mark the WINDOWS ROLES AND
FEATURES save set.
Recover Statistics — Affects Save Set Data in Save set records. One year
Recover Statistics reports.
Audit Data— Affects User reports. Reports on all NetWorker tasks (except License One year
Manager tasks) performed by specified users
The retention policy for audit data affects only (but only when the NetWorker User Auditing
audit reports. system option is activated).
Completion Data (legacy)— Affects Backup Savegroup and save set completion data and One month
Status reports, except in the save set output. drive data.
Completion Message (legacy)— Affects Backup Messages, such as error messages for failed save Two weeks
Status reports, only in the save set output). sets.
You can view the retention policies for data to which they have access by following the first three steps in Setting expiration
policies for data retention on page 441. These different policies give administrators the flexibility to retain certain types of
information for less time than others, as showed in the following example.
NOTE: Reports not mentioned in the above table have no retention policies.
Retention Flexibility
An administrator might want to set the completion message policy to a shorter period than the completion data policy. The
precise error messages about what caused a save set backup to stop might not be relevant over a longer period. But it might be
useful to save the completion data for a somewhat longer period to help with load balancing and trends.
The longest period (one or more years) might be a suitable selection for save set data. This data is used to generate the
NetWorker Backup Statistics reports. These reports can be used to determine historical trends about backups and to help guide
capacity planning.
NOTE: The expiration policies restrict the data that can be retrieved by NetWorker Console. In other words, reports cannot
include data that is older than the data retention policy. If, for example, an administrator changed a policy expiration period
from 1 year to 1 month and soon afterwards reset it to 1 year, 11 months of data would be lost. Once data is cleared because
of the retention policy, you can only retrieve the data by recovering the full database.
Report categories
The following table describes the various report categories in the NetWorker software. Each of these categories is discussed in
detail in Preconfigured reports on page 449.
Report categories appear as folders within the Reports folder in the Reports window. You can run these reports from the NMC
GUI or from a command prompt.
Drill-down report
Table view
The table view in interactive mode enables you to:
● Scroll through rows of the table.
● Sort, rearrange, or resize columns in the table, in the same way you sort data in other NMC windows.
● Use the Choose Table Columns menu to choose the columns to display, and the order in which to display them.
● Create and view drill-down reports.
The following images provides an example of the Group Summary report in table view.
Chart view
The chart view in interactive mode displays data in a chart format. You can switch back and forth between different chart
formats by selecting a format from the Chart Type list.
The following image provides an example of a Group Summary report in Bar Chart view.
Some legacy reports in chart view provide a Data Selector option that provides the ability to control the information that
appears in the chart. Use the Data Selector section to display interesting and useful data groupings in chart format.
For example, in a Group Summary by Server report that is displayed in Bar Chart format, the bar chart displays the amount of
data in each group, and the Data Selector lists the "Server" control column, making it possible to see—in one place—a summary
of groups across all servers, simply by moving through the list of servers in the Data Selector. This could be useful for finding
the group that backed up the most data, or for balancing groups on servers.
You can limit the set of X and Y axes in the report by clearing one or more options from the Chart Selector boxes. This does
not apply to Drive Utilization reports.
● For Drive Utilization reports, hover over a chart in Save Set view or Drive view to display a tool tip that includes this
information:
○ Drive (Drive view only)
○ Save Set Name (Save Set view only)
○ Start Time
○ End Time
○ Client Name
○ Throughput (B/Sec)
NOTE: The tool tip feature for Drive Utilization reports is available only in interactive mode.
Document mode
Document mode displays data in a static table or chart report that resembles the view in Print Preview as shown by a PDF file
viewer.
The following options are available with document mode:
● Orientation (portrait or landscape)
● Table or chart format
● Size (zoom level)
Table view
Document mode reports displayed in a table view contains several columns of information:
● One or more control columns represent qualitative information. For example, server name, save set name, and backup type.
The control columns topics generally appear as X-axis data in charts.
Chart view
In document mode, NMC displays two graphs for any chart type that displays X-Y axes. If the top graph contains excessive
Y-axis data, NMC may display truncated data in both graphs.
You cannot sort, rearrange, or resize the columns of a tabular report. Also, you cannot choose which columns to display, and
the order in which to display the columns. Likewise, you cannot change the chart format while viewing a report. NetWorker
software does not maintain any customized changes made while displaying a report in interactive mode (such as sorting or
rearranging the columns in a table), except for charts (in Chart Type and Chart Selector). Instead, document mode displays the
report in a standard table or chart format, as specified by the internal report definition within NetWorker software.
Unlike interactive mode, which provides you with a set of chart selection parameters that limit the displayed data, a report in
document mode displays all the data. As a result, report views in document mode often consist of several screens. For this
reason, the viewing choices in document mode include these navigation options to enable you to page through the output:
● First
● Previous
● Next
● Last
The set of axes that are displayed in the report depends on the type
of report.
In Save Set view, the x-axis displays the time, and the y-axis displays
save set data.
Hovering over the chart in Save Set view displays a tool tip that
provides this
information.
● Drive
● Start time
● End time
● Throughput value
NOTE: Document mode can display more than one chart in the document. You can insert any or all available Y axes into the
report. When you change to document mode, print or export a report, or save a configuration, NMC uses the axis selection
that is currently set in the Chart Selector section of the Configuration tab. The exceptions to this are stacked bar and pie
charts, which display all axes when the gstclreport command is used to generate a report.
Basic reports
The basic reports organize the collected data in a manner that focuses on a specific datazone component, time span, or
attribute. For example:
● A Server Summary of Backup Statistics provides backup statistics in a server-centric manner.
● A Monthly Summary of Backup Statistics provides the backup statistics in a date-centric manner.
Select the basic report that best provides the information you need.
Drill-down reports
Drill-down reports present report information in a preset sequence of basic reports. You can save drill-down reports as
customized reports in shared mode. You can only use drill-down reports from the NMC GUI. You cannot use drill-down reports
from a command prompt.
Select a line of output in a report to generate information about the selected item in the next report in the drill-down sequence.
For example, configure a Policy Summary Over Time category report, and then click View report. From the generated Policy
Summary report, double-click the output for one of the policies. NMC generates a Monthly Summary report of data for the
policy that you selected in the Policy Summary report. In the Monthly Summary report, double-click a month. NMC generates a
Daily Summary report of data that is generated on each day of the month that you selected in the Monthly Summary report. In
the Daily Summary report, double-click a day. NMC generates a Client Summary report with information about clients for whom
data was generated on the day that you selected in the Daily Summary report. In the Client Summary report, double-click one of
the clients. NMC generates a Save Set Summary report of all save sets associated with the client that you selected in the Client
Summary report, on the day you selected in the Daily Summary report, in the month that you selected in the Monthly Summary,
for the policy you selected in the Policy Summary report.
NOTE: In document mode for drill-down reports, the print and export commands do not print or export the entire drill-down
report, just the basic report that is displayed.
Customized reports
A report that is included with NetWorker software is known as a canned reports, and includes several configuration parameters
that allow the tailoring of report data. With customized reports, report versions can be configured—a single time—to fit the
needs of the enterprise. These reports can then be saved and rerun whenever necessary, without having to be configured again.
This feature saves time, especially with regularly run reports that include complex combinations of parameters. Customized
reports can be run either on demand, or according to a preset schedule. The owner of a saved report can also allow it to be
shared with all users.
Preconfigured reports
The Reports window contains two folders that contain preconfigured reports.
The Reports folder contains preconfigured reports that enable you to query for information about data that is created with
a NetWorker 19.5 server. The Legacy Reports folder contains preconfigured reports that enable you to query for information
about that created with a NetWorker 8.2.x and earlier server.
Preconfigured reports
The Reports folder contains preconfigured reports that enable you to generate reports about data that was created with a
NetWorker 19.5 server :
Policy statistics
The Policy Statistics report category provides you with the ability to create reports that contain details and summary
information about Data Protection Policy resources for each selected NetWorker server within the enterprise.
The Policy Statistics report category includes basic and drill-down reports.
Policy reports
NMC provides two types of reports that provide information about Policy resources: Policy Summary reports, and Policy
Summary over time reports.
Policy Summary
A basic report that provides information that is gathered from the media database and client file indexes about data that are
generated by backup and clone actions in all workflows that are associated with a Policy resource. The reported Information
includes the following statistics:
● NetWorker server—Name of the NetWorker server.
● Policy—Name of the Policy resource.
● File count—Total number of files.
● Save Sets Count—Total number of save sets that are stored in the media database.
● Amount of data—Total size of backup data that is stored on media.
● Target size— Size of the save set on the target backup or clone device. When the target device is a Data Domain device,
the value represents the size of the data after deduplication. When the target device is an AFTD device, the value is the
same size as the original save set size.
● Deduplication ratio— Deduplication ratio for the data.
● Clone count—Total number of clone save sets that are stored in the media database.
● Clone size—Total size of cloned data that is stored on media.
Group reports
NMC provides three types of reports that provide information about Group resources: Group Summary reports, Group Details
reports, and Group Summary over time reports.
Report parameters
The Parameters section allows you to define the selection criteria to generate a customized report:
● NetWorker server—By default, the report generates information about all the NetWorker servers that are managed by
the NMC server. The Server Name Selected field provides a list of NetWorker server on which to report information. The
Server Name Available field provides a list of NetWorker servers for which you do not want to report information about.
Use the Add, Add All, Remove, and Remove All buttons to modify the list of NetWorker servers on which to report.
● Policy— By default, the report generates information about all policies that are configured on each NetWorker server. The
Policy Name Selected field provides a list of policies on which to report information. The Policy Name Available field
provides a list of policies for which you do not want to report information about. Use the Add, Add All, Remove, and
Remove All buttons to modify the list of Policy resources on which to report.
● Group—By default, the report generates information about all groups that are configured on each NetWorker server. The
Group Name Selected field provides a list of groups on which to report information. The Group Name Available field
provides a list of groups for which you do not want to report information about. Use the Add, Add All, Remove, and
Remove All buttons to modify the list of Group resources on which to report.
● Workflow start and end times— By default the report generates information about all workflows that started within one
day of the current time. Use the From and To arrows to select a new date range.
Group Summary
A basic report that provides a list of groups in each policy resource on NetWorker servers that are managed by the NMC server.
The report provides the following information:
● NetWorker server—Name of the NetWorker server.
● Group—Name of the Group resource.
● Policy Name—Name of the Policy resource that is associated with the Group resource.
● Workflow—Name of the workflow that is associated with the Group resource.
● File count—Total number of files.
● Save Sets Count—Total number of save sets that are stored in the media database.
● Amount of data—Total size of backup data that is stored on media.
● Target size— Size of the save set on the target backup or clone device. When the target device is a Data Domain device,
the value represents the size of the data after deduplication. When the target device is an AFTD device, the value is the
same size as the original save set size.
● Deduplication ratio— Deduplication ratio for the data.
● Clone count—Total number of clone save sets that are stored in the media database.
● Clone size—Total size of cloned data that is stored on media.
Group Details
A basic report that provides details about all groups on all NetWorker servers that are managed by the NMC server. The report
provides the following information:
● NetWorker server—Name of the NetWorker server.
Workflow reports
NMC provides two types of reports that provide information about Workflow resources: Workflow Summary reports, and
Workflow Details reports.
Report parameters
The Parameters section allows you to define the selection criteria to generate a customized report:
● NetWorker server—By default, the report generates information about all the NetWorker servers that are managed by
the NMC server. The Server Name Selected field provides a list of NetWorker server on which to report information. The
Server Name Available field provides a list of NetWorker servers for which you do not want to report information about.
Use the Add, Add All, Remove, and Remove All buttons to modify the list of NetWorker servers on which to report.
● Policy— By default, the report generates information about all policies that are configured on each NetWorker server. The
Policy Name Selected field provides a list of policies on which to report information. The Policy Name Available field
provides a list of policies for which you do not want to report information about. Use the Add, Add All, Remove, and
Remove All buttons to modify the list of Policy resources on which to report.
● Workflow—By default, the report generates information about all workflows that are configured on each NetWorker server.
The Workflow Name Selected field provides a list of workflows on which to report information. The Workflow Name
Available field provides a list of workflows for which you do not want to report information about. Use the Add, Add All,
Remove, and Remove All buttons to modify the list of Workflow resources on which to report.
● Workflow start and end times— By default the report generates information about all workflows that started within one
day of the current time. Use the From and To arrows to select a new date range.
Workflow Summary
A basic report that provides a list of groups for the resources that you selected in the Parameter section. The report includes
the following Information:
● NetWorker server—Name of the NetWorker server.
● Policy Name—Name of the Policy resource that is associated with the Workflow resource.
● Number of runs—Number of times that the Workflow resource has run.
Workflow Details
A basic report that provides detailed information about the backup and clone data that are generated by all actions that are
associated with a Workflow resource. The report includes the following Information:
● NetWorker server—Name of the NetWorker server.
● Policy Name—Name of the Policy resource that is associated with the Workflow resource.
● Workflow start time—Start time of the workflow.
● Total duration—Total amount of time that the actions in the workflow have run.
● Workflow status—Status of the workflow. For example, successful or failed.
● Name of the Group that is associated to the workflow.
● Successful save sets—Total number of backup or clone save sets that are created successfully by the action task.
● Failed save sets—Total number of failed attempts to create backup or clone save sets by the action task.
● File count—Total number of files.
● Save Sets Count—Total number of save sets that are stored in the media database.
● Amount of data—Total size of backup data that is stored on media.
● Target size— Size of the save set on the target backup or clone device. When the target device is a Data Domain device,
the value represents the size of the data after deduplication. When the target device is an AFTD device, the value is the
same size as the original save set size.
● Deduplication ratio— Deduplication ratio for the data.
● Clone count—Total number of clone save sets that are stored in the media database.
● Clone size—Total size of cloned data that is stored on media.
● Successful clones—Total number of clone save sets that are created successfully by clone actions in the workflow.
● Failed Clones—Total number of failed attempts to create a clone save set by clone actions in the workflow.
Action reports
NMC provides four types of reports that provide information about Action resources: Action Summary By Group reports, Action
Summary By Policy and Workflow reports, Action Details reports, and Action Details By workflow reports.
Report parameters
The Parameters section allows you to define the selection criteria to generate a customized report:
● NetWorker server—By default, the report generates information about all the NetWorker servers that are managed by
the NMC server. The Server Name Selected field provides a list of NetWorker server on which to report information. The
Server Name Available field provides a list of NetWorker servers for which you do not want to report information about.
Use the Add, Add All, Remove, and Remove All buttons to modify the list of NetWorker servers on which to report.
● Policy— By default, the report generates information about all policies that are configured on each NetWorker server. The
Policy Name Selected field provides a list of policies on which to report information. The Policy Name Available field
provides a list of policies for which you do not want to report information about. Use the Add, Add All, Remove, and
Remove All buttons to modify the list of Policy resources on which to report.
● Workflow—Action Summary By Policy or Workflow report only. By default, the report generates information about all
workflows that are configured on each NetWorker server. The Workflow Name Selected field provides a list of workflows
on which to report information. The Workflow Name Available field provides a list of workflows for which you do not
want to report information about. Use the Add, Add All, Remove, and Remove All buttons to modify the list of Workflow
resources on which to report.
● Group—Action Summary By Group report only. By default, the report generates information about all groups that are
configured on each NetWorker server. The Group Name Selected field provides a list of groups on which to report
information. The Group Name Available field provides a list of groups for which you do not want to report information
about. Use the Add, Add All, Remove, and Remove All buttons to modify the list of Group resources on which to report.
● Workflow start and end times— By default the report generates information about all workflows that started within one
day of the current time. Use the From and To arrows to select a new date range.
Report parameters
The Parameters section allows you to define the selection criteria to generate a customized report:
● NetWorker server—By default, the report generates information about all the NetWorker servers that are managed by
the NMC server. The Server Name Selected field provides a list of NetWorker server on which to report information. The
Action Details
A basic report that provides detailed information about the backup and clone data generated by the resources that are defined
in the Parameters section. The report includes the following Information:
● NetWorker server—Name of the NetWorker server.
● Policy Name—Name of the Policy resource that is associated with the Workflow resource.
● Workflow—Name of the Workflow resource that contains the action.
● Action—Name of the Action resource.
● Action Type—The action type that is defined for the Action resource. For example, Backup, Clone, or Check Connectivity.
● Action Start Time—The time that the task in the Action resource starts.
● Status—Status of the task that is performed by the Action resource. For example, succeeded or failed.
● Group—Name of the group that is associated with the Action resource.
● File count—Total number of files.
● Save Sets Count—Total number of save sets that are stored in the media database.
● Successful save sets—Total number of backup or clone save sets that are created successfully by the action task.
● Failed save sets—Total number of failed attempts to create backup or clone save sets by the action task.
● Amount of data—Total size of backup data that is stored on media.
● Target size— Size of the save set on the target backup or clone device. When the target device is a Data Domain device,
the value represents the size of the data after deduplication. When the target device is an AFTD device, the value is the
same size as the original save set size.
● Deduplication ratio— Deduplication ratio for the data.
● Clone count—Total number of clone save sets that are stored in the media database.
● Clone size—Total size of cloned data that is stored on media.
● Successful clones—Total number of clone save sets that are created successfully Group resource.
● Failed Clones—Total number of failed attempts to create a clone save set Group resource.
Report parameters
The Parameters section allows you to define the selection criteria to generate a customized report:
● NetWorker server—By default, the report generates information about all the NetWorker servers that are managed by
the NMC server. The Server Name Selected field provides a list of NetWorker server on which to report information. The
Server Name Available field provides a list of NetWorker servers for which you do not want to report information about.
Use the Add, Add All, Remove, and Remove All buttons to modify the list of NetWorker servers on which to report.
● Policy— By default, the report generates information about all policies that are configured on each NetWorker server. The
Policy Name Selected field provides a list of policies on which to report information. The Policy Name Available field
provides a list of policies for which you do not want to report information about. Use the Add, Add All, Remove, and
Remove All buttons to modify the list of Policy resources on which to report.
● Group—Client Summary by Group report only. By default, the report generates information about all groups that are
configured on each NetWorker server. The Group Name Selected field provides a list of groups on which to report
information. The Group Name Available field provides a list of groups for which you do not want to report information
about. Use the Add, Add All, Remove, and Remove All buttons to modify the list of Group resources on which to report.
● Workflow—Client Summary report only. By default, the report generates information about all workflows that are configured
on each NetWorker server. The Workflow Name Selected field provides a list of workflows on which to report information.
The Workflow Name Available field provides a list of workflows for which you do not want to report information about.
Use the Add, Add All, Remove, and Remove All buttons to modify the list of Workflow resources on which to report.
● Workflow start and end times— By default the report generates information about all workflows that started within one
day of the current time. Use the From and To arrows to select a new date range.
Client Summary
A basic report that provides a list of clients for the resources that you selected in the Parameter section. The report includes
the following Information:
● NetWorker server—Name of the NetWorker server.
● Client Name—Name of the Client resource.
● File count—Total number of files.
● Save Sets Count—Total number of save sets that are stored in the media database.
● Amount of data—Total size of backup data that is stored on media.
● Target size— Size of the save set on the target backup or clone device. When the target device is a Data Domain device,
the value represents the size of the data after deduplication. When the target device is an AFTD device, the value is the
same size as the original save set size.
● Deduplication ratio— Deduplication ratio for the data.
● Clone count—Total number of clone save sets that are stored in the media database.
● Clone size—Total size of cloned data that is stored on media.
Client Details
A basic report that provides detailed information about the backup and clone data that are generated for a Client resource. The
report includes the following Information:
● NetWorker server—Name of the NetWorker server.
● Client Name—Name of the Client resource.
● Policy Name—Name of the Policy resource that is associated with the Workflow resource.
● Workflow—Name of the Workflow that is associated with the Client resource.
● Group—Name of the Group resource.
● Workflow start time—Start time of the workflow.
● Status—Status of the save set in the media database. For example, succeeded or failed.
● File count—Total number of files.
● Save set size—The original size of the save set, as recorded in the media database.
● Target size— Size of the save set on the target backup or clone device. When the target device is a Data Domain device,
the value represents the size of the data after deduplication. When the target device is an AFTD device, the value is the
same size as the original save set size.
● Deduplication ratio— Deduplication ratio for the data.
Report Parameters
The Parameters section allows you to define the selection criteria to generate a customized report:
● NetWorker server—By default, the report generates information about all the NetWorker servers that are managed by
the NMC server. The Server Name Selected field provides a list of NetWorker server on which to report information. The
Server Name Available field provides a list of NetWorker servers for which you do not want to report information about.
Use the Add, Add All, Remove, and Remove All buttons to modify the list of NetWorker servers on which to report.
● Policy— By default, the report generates information about all policies that are configured on each NetWorker server. The
Policy Name Selected field provides a list of policies on which to report information. The Policy Name Available field
provides a list of policies for which you do not want to report information about. Use the Add, Add All, Remove, and
Remove All buttons to modify the list of Policy resources on which to report.
● Client—By default, the report generates information about all the save sets for each client that is configured on the
selected NetWorker servers. The Client Name Selected field provides a list of clients on which to report information. The
Client Name Available field provides a list of clients for which you do not want to report information about. Use the Add,
Add All, Remove, and Remove All buttons to modify the list of clients on which to report.
● Workflow—By default, the report generates information about all workflows that are configured on each NetWorker server.
The Workflow Name Selected field provides a list of workflows on which to report information. The Workflow Name
Available field provides a list of workflows for which you do not want to report information about. Use the Add, Add All,
Remove, and Remove All buttons to modify the list of Workflow resources on which to report.
● Save set name—By default, the report generates information about all save sets for the selected clients on the selected
NetWorker servers. The Save Set Name Selected field provides a list of save sets on which to report information. The
Save Set Name Available field provides a list of save sets for which you do not want to report information about. Use the
Add, Add All, Remove, and Remove All buttons to modify the list of save sets on which to report.
● Action type—By default, the report generates information about all action types for the selected clients on the selected
NetWorker servers. The Action Type Selected field provides a list of action types on which to report information. The
Action Type Available field provides a list of action types for which you do not want to report information about. Use the
Add, Add All, Remove, and Remove All buttons to modify the list of action types on which to report.
● Workflow start and end times— By default the report generates information about all workflows that started within one
day of the current time. Use the From and To arrows to select a new date range.
Manual saves
Users must run the following commands in order to view the save set reports.
● save -b Default "<C:\Program Files\Java>"
● mminfo -q "name=C:\Program Files\Java" -r
"volume,client,name,ssid,nfiles,savetime(24),sumsize"
Report parameters
The Parameters section allows you to define the selection criteria to generate a customized report:
● NetWorker server—By default, the report generates information about all the NetWorker servers that are managed by
the NMC server. The Server Name Selected field provides a list of NetWorker server on which to report information. The
Server Name Available field provides a list of NetWorker servers for which you do not want to report information about.
Use the Add, Add All, Remove, and Remove All buttons to modify the list of NetWorker servers on which to report.
● Policy— By default, the report generates information about all policies that are configured on each NetWorker server. The
Policy Name Selected field provides a list of policies on which to report information. The Policy Name Available field
provides a list of policies for which you do not want to report information about. Use the Add, Add All, Remove, and
Remove All buttons to modify the list of Policy resources on which to report.
● Group—By default, the report generates information about all groups that are configured on each NetWorker server. The
Group Name Selected field provides a list of groups on which to report information. The Group Name Available field
provides a list of groups for which you do not want to report information about. Use the Add, Add All, Remove, and
Remove All buttons to modify the list of Group resources on which to report.
● Workflow start and end times— By default the report generates information about all workflows that started within one
day of the current time. Use the From and To arrows to select a new date range.
The parameters available for each report type in the NetWorker Recovery Statistics report category are listed in the user
interface.
Recovery This drill-down report consists of multiple NetWorker Recovery Statistics basic reports, which are
Statistics drill- connected in a predetermined sequence. Drill-down reports on page 448 provides general information
down report about drill-down reports.
The configuration parameters for a drill-down report are the same as the parameters for the top-level
report in the report sequence. Thus, if the top layer of the drill-down report is a Server Summary report,
the configuration parameters are the same as they would be for the basic report, Server Summary.
To generate the Recover Summary Over Time report, you must first specify the same parameters as those in the Server
Summary report, which is the first report that is displayed in the sequence.
To drill-down to the client level, perform one of the following, depending on the viewing mode:
● When in table mode, double-click any individual row referencing the desired NetWorker Server.
● When in chart mode, click anywhere in the chart area of the desired NetWorker Server.
The Client Summary report for the selected NetWorker Server appears. Return to the Server Summary report to select another
server to explore.
To drill-down to the Recover Details level, perform one of the following, depending on the viewing mode:
● When in table mode, double-click any individual row referencing the desired NetWorker Client.
● When in chart mode, click anywhere in the chart area of the desired NetWorker Client.
The Recover Details report for the selected NetWorker Client appears. Return to the Client Summary report to select another
client to explore.
Device reports
Device reports provide information about the way devices are being used. They show scheduled and manual backup activity on
one or more selected devices over time. You can identify periods of heavy activity or inactivity. Device reports aid NetWorker
administrators in performance tuning, and they help identify bottlenecks. For example, if all drives are being used continuously
for a long period, at maximum throughput, backup speeds may improve by adding tape drives or moving clients to another
backup server.
Event reports
These reports provide summary information about current events on NetWorker and Console servers within the Enterprise.
Additional details about a particular event can be displayed, including annotation contents. While the Events window within the
NetWorker Console displays the current events of the NetWorker servers, the Event reports provide additional features. The
reports enable you to organize, export, and print the event data.
Event reports can include this information:
● Number of events
● Priority of events
● Category of events
● Server name
● Server type
● Event time
● Notes and annotations
NOTE: When an event has been resolved, it does not remain in the records.
NOTE: Data retention policies do not have any impact on Event reports.
Info
Emergency
Critical
Alert
Host reports
The Hosts report category includes only basic reports. There are two basic reports, as described in this table.
Enterprise on page 531 provides a description of the Enterprise and its folders.
User reports
The Users report category provides information on NetWorker Console user activity. NMC Server Management provides
information about NetWorker Console users and creating user accounts.
The parameters available for each report type in the NetWorker Backup Statistics report category are listed in the user
interface.
NOTE: These basic reports do not distinguish between regular and deduplication clients.
The parameters available for each report type are listed in the user interface.
● To limit the scope of the report, click any of the parameters in the Selected box, then click Remove ( ).
● To remove all the parameters from the Selected box, click Remove All (
).
Removed parameters appear in the Available boxes.
● To return a single parameter to the Selected box, select it from the Available box, and then click Add ( ).
● To return all available parameters to the Selected box, click Add All ( ).
4. To display the report, select the View Report tab.
NOTE: If you receive the error com.sybase.jdbc3.jdbs.SybDriver when you generate a report, close the NMC
GUI, clear the Java Cache on the NMC client, and then generate the report again. The NetWorker Installation Guide
describes how to clear the Java Cache.
Option Description
Table Display the data in Table view.
Chart Display the data in Chart view
Document Display the report in Document mode.
Interactive Display the report in Interactive mode.
Portrait Display the data in Portrait format.
Landscape Display the data in Landscape format.
6. To print the report, right-click the View Report tab, and select Print.
7. To export the report, right-click the View Report tab, and select Export. In the Save dialog box, specify the file name and
file location, and then click Save.
You can export the report to one of the following formats:
Option Description
Postscript For printing. Shows data totals.
PDF For printing or viewing with a PDF viewer such as Adobe Acrobat. Shows data totals.
HTML For viewing in a browser. Shows data totals.
CSV For importing raw data into other programs, such as spreadsheets, that accept the comma separated values
(CSV) format. Does not show data totals.
Table 113. Date and time input formats for common locales
Language Date formats Time formats
US English ● EEEE, MMMM D, YYYY (Monday, March 8, ● h:mm:ss a z (11:27:30 P.M. PST)
2009) ● h:mm:ss a (11:27:30 P.M.)
● MMMM D, YYYY (March 8, 2009) ● h:mm a (11:27 A.M.)
● MMM D, YYYY (Mar 8, 2009)
● M/D/YY (3/8/07)
UK English ● DD MMMM YYYY 08 March 2009) ● HH:mm:ss z (23:27:30 PST)
● DD-MMM-YYYY (08-Mar-2009) ● HH:mm:ss (23:27:30)
● DD/MM/YY (08/03/07) ● HH:mm (23:27)
French ● EEEE D MMMM YYYY (lundi 8 mars 2009) ● HH:mm:ss z (23:27:30 PST)
● D MMMM YYYY (8 mars 2009) ● HH:mm:ss (23:27:30)
● D MMM YYYY (8 mar. 2009) ● HH:mm (23:27)
● DD/MM/YY (08/03/07)
German ● EEEE, D. MMMM YYYY (Montag, 8. März ● HH:mm:ss z (23:27:30 PST)
2009) ● HH:mm:ss (23:27:30)
● D. MMMM YYYY (8. März 2009) ● HH:mm (23:27)
● DD.MM.YYYY (08.03.2009DD)
● MM.YY (08.03.07)
Japanese ● YYYY/MM/DD (2009/03/08) ● HH:mm:ss z (23:27:30 JST)
● YY/MM/DD (07/03/08) ● HH:mm:ss (23:27:30)
● HH:mm (23:27)
Simplified Chinese ● YYYY-M-D (2009-3-8) ● HH:mm:ss (23:27:30)
● YY-M-D (07-03-8)
Naming reports
When naming a report to save, keep in mind that the set of usable characters is limited in the same way as for hostnames and
usernames. Report names may not contain:
● Characters having an ASCII representation number less than ASCII 32 (such as carriage return, bell, newline, escape)
● Comma (,)
● Slash (/) or backslash (\)
● Double quote (“) or single quote (’)
NOTE: Report names are not case-sensitive. Also, canned reports cannot be deleted or customized, and then saved under
the same name as a report that already exists under the same parent folder or directory.
Sharing a report
By default, when you save a customized report, the report is private and appears only in the report hierarchy. The report
owner or an NMC user with the Console Application Administrator role can share the report with other NMC users. Perform the
following steps to share a customized report.
Any user viewing a sharable report may perform these operations on the report:
● Change any runtime parameter of the report (such as configuration or view type).
● Run the report, but not save changes to the report.
● Copy the report by using the Save As command. The user becomes the owner of the new report, and by default, the report
is not shared.
● Choose the Hide Other Users’ Reports option to toggle the view of reports between only those reports owned by the user
(both private and shared), and all shared custom reports.
Perform the following steps to share a report.
1. From the NMC GUI window, click Reports.
2. Expand the report folder that contains the customized report that you want to share.
3. Right-click the customized report, then select Share.
The report is now shared, and is represented in the report hierarchy by a shared-report icon or .
Once you enable a report for sharing, all users can see the report in the report folder hierarchy.
NOTE: The Share option is a toggle. To disable sharing, right-click the shared report and select Share.
System performance
Each time the gstclreport command is run, it starts a separate JVM, which can use many system resources. The
gstclreport command runs a database query and generates report output by using the results. Since this uses both CPU and
memory resources on the host computer, it could affect performance of NetWorker software and of the host. Consequently,
Security
The gstclreport command must contact the Console server in order to run a report. The command requires a valid username
and password. A user either uses the -P option to type the password, or the command checks standard input to see whether
the password is there. If a password is not supplied, the program prompts for a password.
On UNIX systems, use of the -P option is a security concern, because a user may type the ps command and see the commands
that were used to start any program that is running.
To solve this problem, use scheduling software that can conceal password input. Alternatively, ensure that the scheduling
system sends the password as standard input. For example:
A cron command can be used to schedule the report, or the command could be placed in a secure script file that is invoked by
the cron command.
Using jobquery
The jobquery program provides a CLI similar to the nsradmin program. The jobquery program contacts the nsrjobd
process to query job information that is stored in the jobsdb. A query is defined by an attribute list that is made up of one or
more attribute names with or without values.
In the query, the attribute name (for example, 'type') is preceded by a period ('.'), and optionally followed by a colon (':') and
a comma-separated list of values (for example, "host: mars";"job state: STARTED, ACTIVE, SESSION ACTIVE"). When a query
consists of more than one attribute names, attributes are separated by a semi-colon (';'). When an attribute name is specified
without values, any resource descriptor that contains this attribute is a match. If an attribute name is followed by one or more
values, a resource whose value list matches at least one of the values for the specified attribute satisfies the criteria.
To launch the jobquery interface, type:
jobquery -s NetWorker_server
The jobquery -s<server> command connects to the specified NetWorker server and returns jobquery prompt. The data in
the job database is queried with the following commands:
● types — a command that lists all job types currently known by nsrjobd that does not take any argument (for example,
types return a list indicating Known types: save job, savegroup job, and so on).
● . — a command that sets the query criteria and is followed by one or more attribute names, or lists current query criteria
when not followed by any attribute.
Query criteria may contain several attributes, including job type, host, and job state, with each attribute separated by a
semi-colon and each value separated by a comma, as in the following example:
jobquery> . type: savegroup job; host: mars; job state: ACTIVE, COMPLETED
This example would return information on all savegroup jobs from the host mars that are either in progress or in completed
state.
● show — restricts the list of attributes that are returned for each resource descriptor that matches the query. For the above
example, specifying the following:
show name; job id; completion status; completion severity
returns the names, job ids, completion status, and completion severity for all matched completed and active savegroups.
● print — runs the query and displays the results. If show list is in effect, each resource descriptor in the result list is
restricted to desired attributes.
● all — returns all resource descriptors in the jobs database. If show list is in effect, result is restricted to desired attributes.
● help — displays help text.
● quit — exits jobquery.
Running jobquery -s NetWorker_server -i input_file reads input from the file for non-interactive usage. The man
pages or the NetWorker Command Reference Guide provides detailed information about the jobquery program.
where policy_name is the name of the policy that contains the workflow and workflow_name is the name of the workflow.
For example, to query the jobsdb for a workflow named SQL Clients in a policy named Backup, type the following commands at
the jobquery prompt:
jobquery>. type: workflow job; data protection policy name: Backup; workflow name: SQL
Clients
jobquery>print
The following table summarizes some of the attributes that appear in workflow job types.
Start time The time the job started, in seconds since Jan 1, 1970.
End time The time the job ended, in seconds since Jan 1, 1970.
Completion status The completion status set by the job. Status values include
never started, did not run, succeeded, failed, abandoned,
canceled, and communication lost between job and nsrjobd.
Completion severity The severity level of any error that caused the job to
end. Severity levels include: EMERGENCY, ALERT, CRITICAL,
SEVERE, ERROR, INTERVENTION, WARNING, NOTICE, and
INFORMATION.
Data protection policy name The name of the policy that contains the workflow.
Workflow name The name of the Workflow resource.
Override parameters A list of parameters that were configured in the
Workflow resource, when the workflow started. Use override
parameters to override the value that is defined for an
equivalent action property.
Protection groups The protection groups that are assigned to the workflow.
Restricted datazone The datazone to which the resource is assigned.
Policy definition changetime The last change time of the policy that contains the workflow.
Previous jobid The job id of the instance of a restarted workflow.
. type:action_name
The following table summarizes some of the attributes that appear in action job types.
Start time The time the job started, in seconds since Jan 1, 1970.
End time The time the job ended, in seconds since Jan 1, 1970.
Completion status The completion status set by the job. Status values include
never started, did not run, succeeded, failed, abandoned,
canceled, and communication lost between job and nsrjobd.
Completion severity The severity level of any error that caused the job to
end. Severity levels include: EMERGENCY, ALERT, CRITICAL,
SEVERE, ERROR, INTERVENTION, WARNING, NOTICE, and
INFORMATION.
In this example, two action jobs created child jobs. The server database backup action created a child process for the
nsrdbsave command and the expiration action created a utility job. Output for the bootstrap save job appears, as follows.
The job id for the failed bootstrap backup action is 832050. The following example displays some of the attributes that
appear in the print output.
type: bootstrap save job;
The jobquery program displays detailed information about the save jobs that are created by the job. The following example
displays some of the attributes that appear in the print output.
type: save job;
actual exit code: 0;
adhoc job: False;
authtype: ;
The jobquery program displays detailed session information about the save job. For example, output similar to the
following appears:
type: session info;
client name: bu-iddnwserver.iddlab.local;
completed: 1;
compression ratio: 0;
current pool: Default;
current read/write total: 254;
device family: disk;
Device path: aftd;
device type: adv_file;
extended information: ;
Jobid from session info: 832055;
number of volumes used: 0;
recover file count: 0;
recover file total: 0;
restricted data zone: ;
savegroup name: Server Protection;
saveset id: \
7d52bfb9-00000006-fb8c0b44-558c0b44-00065000-7396bc56;
saveset name: bootstrap;
Session end time: 1435241299;
session id: 18269;
Session mode: 0;
Session start time: 1435241284;
total amount to be read/written: 0;
total volumes needed: 0;
transfer rate: 0;
type attributes: ;
type classes: ;
type help: ;
type name: ;
type references: ;
type table: ;
volume name: bu_iddnwserver.iddlab.local.002;
For example, to provide detailed information about the last active or inactive jobs in a workflow that is called Default in the
Backup Policy, type:
nsrpolicy monitor -p Backup -w Default -d
For example, to display detailed information about the last active or inactive job in a Workflow resource, in a non-tabular format,
type:
nsrpolicy monitor -p Backup -w Default -d -n
Workflow status:
data protection policy name:Backup
workflow name:Default
Workflow status:
data protection policy name:Backup
workflow name:Default
name:savegrp
job id:32525
type:backup action job
job state:ACTIVE
completion status:
start time: 5/26/15 16:59:43
duration: unknown
where -b -1 is optional and used to override the default 2kb limit for job output.
Example: Summary report of the last recovery job
To generate a summary of last recovery job for a Recover resource, type:
nsrreccomp -H group_name
The UNIX man page and the NetWorker Command Reference Guide provides detailed information about the nsrsreccomp
program.
nsrd info, Savegroup Info: group_name:client_name checkpoint enabled, mode: mode. (severity
0, message 71193)
This message is reported when a backup action starts. This message reports the names of the clients that are checkpoint-
enabled, and the mode that was selected at the time of the backup.
savegrp test: checkpoint restartable saveset client_name:save_set created in previous
run(s) of the group. It will be checkpoint restarted. Checkpoint ID cp_id.
This message reports that a partial save set is detected for a client in the group and a checkpoint restart occurs for the save
set.
This message is reported when the backup of a checkpoint-enabled client fails and the backup will not be retried.
Common reasons for this error message include:
● The restart window for the group has been exceeded.
● The maximum number of client retries has been reached.
NOTE: When this message is reported, the failed save set are removed from an AFTD:
nsrd info, MeDia Info: save set save_set for client client_name was aborted and
removed from volume volume_name (severity 0, message 71193)Recovering data.
This message reports that the save set for a checkpoint-enabled client successfully completed during the backup action.
SNMP traps
The NetWorker Simple Network Management Protocol (SNMP) Module allows NetWorker servers to send notification messages
to SNMP management agents.
You must configure SNMP-enabled network management software to accept traps from the NetWorker server. For detailed
information about SNMP management operations refer to your network management documentation.
The NetWorker SNMP Module uses traps to communicate NetWorker event notifications to SNMP management stations. A trap
is an unsolicited notification sent from the SNMP agent (the NetWorker server) to the SNMP event manager.
When you configure the SNMP notification in NetWorker, you can define the types of traps that the NetWorker server sends to
the SNMP event manager. Typical traps include warnings, critical errors, and other messages from the NetWorker server.
NetWorker 19.3 and later includes the following SNMP trap enhancements:
● SNMP v2c and v3 MIB support. The same MIB file is used for SNMP v3 support.
● SNMP trap alert for NetWorker to comply with the MIB format.
● Both SNMP v2c and SNMP v3 traps have the same content. The only difference with the SNMP v3 is that it introduces the
security model to all trap messages and it is still based on SNMPv2-Trap-PDU.
● Do not configure both SNMP v2c and SNMP v3 on the same trap receiver. Also, only a single SNMP v3 user is supported
and not multiple users.
● SNMP v2c and v3 traps are also supported in an IPv6 environment for file system workflows.
● SNMP MIB support for successful or failed notifications for backup, clone, and restore
NOTE: SNMP v2c traps are not supported for client initiated RMAN triggered backup in NMDA Oracle and for client
initiated brbackup in NMSAP Oracle.
● File system save set with backup and clone workflows with the following payload or attributes:
To save the SNMP traps log file to a predefined location, type the following command:
nohup snmptrapd -f -C -c ./snmptrapd.conf -Lf /var/log/snmptrap.log -M /usr/share/snmp/mibs
-m NETWORKER-MIB &
The nohup option ensures that the command runs even after the session is terminated. Use & to run the command in the
background.
c. Start snmptrapd.
4. To receive SNMP v3 traps for backup and clone action, specify the SNMP notification command only at policy level on the
NetWorker server:
● For Linux: /usr/sbin/nsrtrap <IP address of trap receiver> -i 3
● For Windows: “C:\Program Files\EMC NetWorker\nsr\bin\nsrtrap.exe” <IP address of trap
receiver> -i 3
5. On the Linux trap receiver, execute the snmptrapd -f -C -c ./snmptrapd.conf -Le -M /usr/share/snmp/
mibs -m NETWORKER-MIB commands to receive SNMP traps. If you are using putty to capture the session output for
SNMP traps, perform the following:
a. Launch PuTTY.exe. .
b. Navigate to Session > Logging > All session output to capture the SNMP traps in a log file.
c. Type the snmptrapd -f -C -c ./snmptrapd.conf -Le -M /usr/ share/snmp/ mibs -m NETWORKER-
MIB command.
NOTE: To save the SNMP traps log file to a predefined location use the nohup snmptrapd -f -C -c ./
snmptrapd.conf -Lf /var/log/ snmptrap.log -M /usr/share/snmp/mibs -m NETWORKER-MIB &
command. The nohup option ensures that the command runs even after the session is terminated. Use & to run the
command in the background.
6. Initiate the policy or workflow on the NetWorker server to view the traps on the Linux trap receiver.
NOTE: In case of IPv6 addresses, provide the snmptrapd -f -C -c /etc/snmp/snmptrapd.conf -Leo
udp6:162 -m /usr/share/snmp/mibs/NETWORKER-MIB.txt parameter to receive the SNMP traps in Linux
trap receiver.
2. Go to the Edit User option and add the following SNMP v3 security parameters:
● Security user name- Name of the SNMP v3 user should be of the same value as provided in NetWorker server properties
under the Security tab.
● Context name- This is not mandatory and can be provided as any set of alphabetical characters.
● Context Engine ID- Specify the same Engine ID that is provided in NetWorker server properties under the Security tab.
● Authentication Protocol- Specify the authentication protocol as HMAC MD5 or HMAC-SHA.
● Private Protocol- Specify the private protocol as CBC-DES or CFB-AES.
3. Load the user profile after making the necessary entries for the attributes in Step 2.
4. Load the MIB file to the MG-Soft MIB browser using the option Import MIB from the MIB tab.
Keep the NetWorker MIB file at the location C:\ProgramData\MG-SOFT\SMI Modules\MIB Modules\SMI.
NOTE: Copy the NetWorker MIB file from the following locations:
● Linux NetWorker server: /opt/nsr/snmp
● Windows NetWorker server: C:\Program Files\EMC NetWorker\nsr\snmp
5. Go to the Remote SNMP Agent box on the top left of the MG-Soft MIB browser. Provide the IP address of the
NetWorker server from which the SNMP v3 traps are to be received.
6. On the MG-Soft MIB browser, go to Tools > Trap Ringer Console section.
7. Start the Policy> Workflow on the NetWorker server to receive traps on the MG-Soft MIB browser.
6. In the Action attribute, specify the options for the nsrtrap command:
For security purposes, system administrators often customize the SNMP server
to limit the
communities that can accept traps. If the SNMP server configuration specifies a
community other
than Public, specify the community name.
-t trap_type Optional, sets the type of trap that the NetWorker SNMP Module sends to the
SNMP server. The default setting is six, which sets the trap type to “enterprise-
specific” and is the correct type for the notifications (error messages) that
the NetWorker server sends to the SNMP server. Only modify the trap type if
you intend to send a specific trap to the SNMP server and not a NetWorker
notification.
-s specific_trap_type Optional, allows you to customize the identity of the type of trap that the
NetWorker server sends. Set this option to any integer value. Use this option
along with different SNMP notifications to distinguish different traps from the
NetWorker server.
For example, you can create separate SNMP notifications for critical messages,
warnings, and events
or priorities then use the -s option with a unique number to differentiate the
various notifications.
The Action attribute for each notification appears as follows:
7. Click OK.
a. SNMP v2c traps are not supported for client initiated RMAN scripts.
b. SNMP v2c traps are not supported for client initiated RMAN scripts.
c. Multiple notifications (one notification per save set) for a single restore.
d. Multiple notifications (one notification per save set) for a single restore.
e. SNMP v2c traps are not supported for client initiated RMAN scripts.
f. SNMP v2c traps are not supported for client initiated RMAN scripts.
g. Multiple notifications (one notification per save set) for a single restore.
h. Multiple notifications (one notification per save set) for a single restore.
NetWorker Notifications
A notification provides information about events that occur in a NetWorker environment. You can configure the events to
be reported and how the NetWorker server reports them to you. Specific programs can be run when an event occurs,
including third-party programs. By default, the NetWorker server sends notifications to log files that are located in the
NetWorker_install_dir\logs directory on Windows and the /nsr/logs directory on UNIX.
Device ordering issue detect Windows: Provides the syntax for the smptmail command to
send an email to the administrator account with the message
Check system device ordering. Moving device
on NetWorker_server to service mode.
Inactive Files Alert Windows: Reports that the space occupied by inactive
files exceeds configured threshold to the C:\Program
Files\EMC NetWorker\nsr\logs\messages log file.
Index size Windows: Reports a message that the size of the index
will soon exceed the space available to the C:\Program
Files\EMC NetWorker\nsr\logs\index.log file.
NetWorker Daemons Not Running Windows: Provides the syntax for the smptmail program
to send an email to the administrator account stating that
NetWorker daemons are not running on the NetWorker
server. The action attribute must be modified to replace
mailserver with the actual hostname of the mail server. Using
smtpmail to email notifications on page 504 describes how to
customize the smtpmail program.
New Virtual Machine Windows: Reports a message that new virtual machines
have been detected to the C:\Program Files\EMC
NetWorker\nsr\logs\messages log file.
Resource File Corruption Windows: Provides the syntax for the smptmail program
to send an email to the administrator account stating that
resource file corruption has been detected on the NetWorker
server.
Linux: Sends an email to the root account when a save set has
been marked suspect.
SNMP notification request Sends event notifications to a network management console.
This notification occurs when the NetWorker SNMP module
Tape mount request 2 Windows: Requests that media be mounted in a device and
displays a critical message.
Tape mount request 4 Windows: Provides the syntax for the smptmail program to
send an email to the administrator account that a Tape mount
request 4 event has occurred.
Customizing notifications
Notifications require the following three elements:
● Events
● Actions
● Priorities
About Events
An event signals that user intervention is required. For example, if a NetWorker server needs a new tape, the server alerts users
to the situation by posting an event to the Console window.
NetWorker software generates an event that is based on various factors, including the following scenarios:
● The software or hardware encounters an error that requires user intervention to resolve.
● A NetWorker savegroup has failed.
● Drive ordering or serial number mismatch issues — a description of the problem is provided, along with a corrective action to
fix the problem.
● Capacity monitoring — for example, reaching the space threshold on the deduplication node.
● NetWorker software is unable to poll a host it is monitoring for events or for generating reports.
● A license or enabler code that is managed by the License Manager is about to expire.
Some situations do not result in the generation of an event. For example, when a license managed by the NetWorker Console
(instead of by the License Manager) approaches its expiration date. In this situation, a message is recorded in the NetWorker
logs, but an event is not generated until the expired license causes a backup to fail. Check the Administration window from
time to time for important messages.
Actions
The Actions attribute defines the action that the NetWorker server takes after an event notification occurs. The following table
provides a summary of actions.
NOTE: The log file path must not include any space or special characters, and
must not be enclosed in quotes.
logger UNIX only, uses the UNIX syslog facility (/usr/bin/logger) to log information
or send messages.
lp UNIX only, prints the notification.
mail UNIX only, sends an email to the specified user.
sendmail NetWorker Virtual Appliance (NVE), sends an email to a specified user.
smtpmail Windows only, sends an email to the specified user.
nsrtrap Sends notifications to an SNMP management console. Use with the following
options:
● -c community (if not specified, then the default public is used)
● -f file (reads message from a file and sends as snmp trap.)
● -i version (if not specified, then the default version is SNMPV2)
● -s specific (default is NetWorker enterprise assignment, which is 1)
● -t trap (default trap is #6 which is the enterprise-specific trap)
● -u snmp uptime
● -v verbose
Third-party programs can also be used for the action, if the programs support reading from standard input.
For example:
● On UNIX systems, you can use a third-party email program rather than the mail program.
● On Windows systems, you can use a third-party email program rather than the smtpmail program to send the information
to other locations, such as an email address or pager system.
Only users who belong to the NetWorker server Administrators list, or a member of the Application Administrators user group,
can change the Action attribute of an existing notification.
where:
● recipient1@mailserver—Is the email address of the recipient of the notification. Multiple email recipients are separated by
a space.
5. Click Ok.
Priorities
Each NetWorker event has a series of associated messages, and each message has an associated priority. The preconfigured
notifications have selected priorities based on the importance of the message being sent. For example, the first time the
NetWorker server sends a mount backup volume request, the priority that is assigned to the message is Waiting. The priority of
the second request is Alert. The priority of the third request is Critical.
The following table lists the priorities on which notifications are based.
Editing a notification
NOTE: You cannot change the name of a notification.
Copying a notification
1. From the Administration window, click Server.
2. Click Notifications.
3. Right-click the notification to copy, then select Copy. The Create Notification dialog box appears, containing the same
information as the notification that was copied, for Name attribute.
4. In the Name attribute, type a name for the new notification.
5. Edit any other attributes as appropriate, then click OK.
For example:
/usr/ucb/mail -s "Backup status for client xyz in group abc" debbie@mymailhost.com
5. Click OK.
Breakthrough logging
Breakthrough logging feature in NetWorker helps you to understand the steps involved in the various operations such as Save,
Recover and Clone. Each step is logged in the defined order to ensure successful completion of Save, Recover and Clone
operations. Breakthrough logging helps the user to review the log associated with each step of operation and determine the
step that failed during the execution of that particular operation.
You can check logs for clone and backup at/nsr/logs/Policy/<policy name> .
You can check logs for recovery at /nsr/logs/recover.
The NetWorker Command Reference Guide provides more information on the nsrcapinfo command usage and client granular
reports.
Configuring MailHome
1. In the NetWorker Management Console (NMC) click Server, and then select Usage Analytics.
2. In the Usage Analytics area, select the Telemetry option as MailHome to configure MailHome (default selection).
If you select the Telemetry option as ESRS, then reports are sent using ESRS.
3. Clear Enable alerts to remove all the alerts pertaining to Usage Analytics. This option is enabled by default.
4. In the MailHome Identity area, type information for the fields in the following table.
Sender email address The email address of the sender for MailHome.
Email address Email address to which the reports are sent. The default value is
NetWorkerProfile@emc.com and it is non-editable.
Additional email recipients The list of additional email addresses to receive reports from MailHome. In case
of multiple values, use space as a separator.
Frequency in weeks Select the frequency in weeks that the local database is sent. The default
frequency is set to 2.
Day of the week Select the day of the week that the local database is sent. The default day is set
to Monday.
Hours Select the hour of the day that the local database is sent. The default hour is set
to 8 for 8am.
Exclude attributes To prevent nsrdump from reporting certain attributes through MailHome, type
the list of comma-separated attributes. Excluded attribute names apply to all
resources across the database. The default attributes are hostname, datazone
pass phrase, password, and user id.
Exclude resources To prevent nsrdump from reporting certain resources through MailHome, type
the list of comma-separated resources. The default excluded resource is set to
NSR lockbox.
6. Once the details are updated, click OK. Infrastructure Telemetry Notice banner is populated and on accepting, MailHome
changes are honored.
If you want to cancel the changes that you entered click Reset.
4. In the Usage Analytics area, select the Telemetry option as ESRS to configure ESRS.
5. Clear Enable alerts to remove all the alerts pertaining to Usage Analytics. This option is enabled by default.
6. In the ESRS Identity area, type information for the fields in the following table.
During the ESRS Provisioning process, after you use your online support credentials to authenticate, you select your
particular site ID from a list of site IDs associated with your login. An email containing a code will be sent to the associated
email address. The code that is sent is used to complete the provisioning. The EMC Secure Remote Services Installation
Guide provides information.
Field Description
Name Identifier for the ESRS resource.
Product key After a successful registration, ESRS returns the product key. This key is
used for authentication with the ESRS service. (Hidden Attribute) The key
Field Description
Send now Identifier for the ESRS resource.
Frequency in weeks Select the frequency in weeks that the local database is sent to ESRS. 0 disables
scheduled sends. The default frequency is set to 2.
Day of the week Choose the day of the week that the local database is sent to ESRS. The default
day is set to Monday.
Hours Select the hour of the day that the local database is sent to ESRS. The default
hour is set to 8 for 8am.
Exclude attributes To prevent nsrdump from reporting certain attributes through ESRS, type
the list of comma-separated attributes. Excluded attribute names apply to all
resources across the database. The default attributes are hostname, datazone
pass phrase, password, and user id.
Exclude resources To prevent nsrdump from reporting certain resources through ESRS, type the
list of comma-separated resources. The default excluded resource is set to NSR
lockbox.
8. Once the details are updated, click OK. Infrastructure Telemetry Notice banner is populated and on accepting, the ESRS
related changes are honored.
If you want to cancel the changes you entered click Reset.
Troubleshooting ESRS
Issue
The registration could fail due to:
● Incorrect ESRS hostname, IP, or port
● Incorrect ESRS username or password
● Firewall blocks access to the ESRS port
Fix
Use the correct connection information and open the ESRS port on the firewall.
For incorrect ESRS username or password, go to the Support website at https://support.emc.com to check your online support
account and verify that you have access to the NetWorker asset. If you still have issues, create a support ticket for ESRS
deployment issues that are caused due to username or password issues.
NOTE: For more details on Support website, see the Preface section of theNetWorker Administration Guide.
Issue
The failure could be due to invalid credentials:
● ESRS has not been configured and registered
● ESRS instance id has been edited manually
● ESRS product key has been modified
Fix
Configure ESRS and verify that the registration call obtained an ESRS instance id:
● Undo modification of ESRS instance id and/or the product key.
● Alternatively, force the ESRS re-registration by deleting the contents of the ESRS instance id in the NSR ESRS resource.
Setting system options to improve NMC server performance on page 552 provides information on setting polling intervals.
Event viewing
Events appear in the lower right pane of the Console window.
The following table describes the information that appears in the columns for each event.
The time format depends on the current locale setting. Start date and time formats
on page 468 provides more
information.
Each annotation can be up to 12 KB. For example, use annotations to log steps that
are taken to resolve
an event.
You can add multiple annotations to a single event, but you cannot edit or delete
annotations.
Note Provides an editable field for making brief administrative information that is
associated with an event. For example:
● Name of the NetWorker administrator or operator that is assigned to the event.
● Letters or numbers that allow the sorting of events into a preferred order.
To add, edit, or delete a note, double-click the cell in the Note column for the
event. When you finish
adding, editing, or deleting the note, click outside the cell.
Event priorities
Each event is designated with one of seven possible priorities. When the Console window sorts events by priority, it lists the
events in alphabetical order, with Emergency between Critical and Information.
The following table provides more information on each type of event priority.
Dismissing an event
After you view and act on an event, you can dismiss the event from the Console window to prevent other users from acting
unnecessarily on events that have already been resolved.
NOTE: Dismissing an event makes it disappear from the Console window for all NetWorker users.
1. From the Console window, right-click the event and select Dismiss.
A confirmation message appears.
2. Click Yes.
There are slight differences in how event dismissals are handled, depending on the source:
● Events from NetWorker software are automatically dismissed in the Console window when the problem that triggered the
event is resolved.
● Events from device ordering or serial mismatch issues are automatically dismissed in the Console window when the problem
is resolved via the corrective action provided.
There are individual alerts for each NetWorker client whose occupied disk space goes beyond 80%. These alerts are not
persistent and get cleared automatically when the occupied disk space goes below 80%.
Once the services are up and running, the following alerts are generated if there is low disk space:
● Info - If the disk volume occupied is 80% to 90% of the total disk size.
● Warning - If the disk volume occupied is 90% to 95% of the total disk size.
● Emergency - If the disk volume occupied is greater than 95% of the total disk size.
The minimum available disk space for monitoring threshold is 20% of the disk size. This is for disk size less than 100 GB. If the
disk size is greater than 100 GB, the minimum available disk space monitoring threshold is 20 GB. Based on this threshold limit,
the corresponding alert is generated.
NOTE: NetWorker server services start only if the available disk space is greater than 10 MB.
Alerts Lists the priority, category, time, and message of any alerts. Alerts pane provides more
information.
NOTE: Alerts displayed in the NMC Monitoring page is from the server and cannot be
cleared from the GUI.
Devices Lists devices, device status, storage nodes, libraries, volumes, pools, and related messages.
Devices pane on page 51 provides more information.
Operations Lists the status of all library and silo operations, including nsrjb operations that are run from
the command prompt. Also lists user input, libraries, origin, operation data, operation start
time, duration of the operation, progress messages, and error messages.
When displaying Show Details from the Operations window, the length of time that the
window is
displayed depends on the value that is typed in the Operation Lifespan attribute on the
Timers tab of
the Properties dialog box for the corresponding library. To access library properties, click
Devices in the taskbar. By default, this pane is hidden.
Log Lists messages that are generated by the NetWorker server, including the priority of each
message, the time the message was generated, the source of the message, and the category.
Log window on page 53 provides more information.
Customizing tables
You can customize the organization and display of tabular information in the Monitoring window.
Sorting tables
You can change the display of tabular information that appears in the window. You can sort Table grids by column heading, and
then by alphabetic or numeric order within those columns.
1. Drag and drop the column heading to its new position.
2. Click the column heading to sort the items into alphabetic and numeric order. An arrow appears in the column heading to
indicate the sort order.
Displaying panes
You can choose to show or hide panes in the Monitoring window.
Perform the following steps to hide or show a pane in the Monitoring window.
1. From the View menu, select Show. A check mark appears beside the panes that appear in the Monitoring window.
2. To hide a pane, select a marked pane.
A check mark does not appear beside the pane.
3. To show a pane, select an unmarked pane.
A check mark appears beside the pane.
Policies/Actions pane
The Policies/Actions pane provides you with the ability to review status information about policies and actions.
This pane has two tabs:
● Policies—Provides a navigation tree that displays all configured policies on the NetWorker Server. Expand each policy to
display the workflows that are associated with each policy. Expand each workflow to display each action that is contained in
the workflow.
● Actions—Provides a list of all Action resources.
Policies pane
The Monitoring window in the NetWorker Administration window enables you to monitor activities for specific policies,
workflows, and actions.
The Policies/Actions pane at the top of the Monitoring window lists the policies on the NetWorker Server by default. Click
the + (plus) sign next to a policy in the list to view the workflows in the policy, and the + (plus) sign next to a workflow to view
the actions for a workflow.
The Policies pane provides the following information for each item (where applicable):
● Overall status
The following table provides details on the status icons that may appear in the Policies pane.
Never run
Running
Succeeded
Failed
Probing
Interrupted
Queued
Cloning
NOTE: When the schedule for an action is skip, the status of the action appears as Never Run and the status of the
Workflow is Succeeded.
● Most recent start time.
● Duration of the most recent run.
● Next scheduled runtime.
● Name of the assigned save set.
● Device on which the save set is stored.
● Backup level.
● Data transfer rate.
● Size of the save set.
● Messages that resulted from an action.
Right-click an action in the Policies pane and select Show Details to view details on currently running, successfully completed,
and failed activities for the action.
When you sort the items on the Policies/Actions pane by using the Status column, NetWorker sorts the items in alphabetical
order that is based on the label of the icon.
Consider the following when a policy/action is in a probing state:
● A message is sent when the group starts and finishes the probe operation.
● The results of the probe operation (run backup/do not run backup) are also logged.
● Probes do not affect the final status of the group, and the group status does not indicate the results of the probe.
● If probing indicates that a backup should not run, then the group status reverts to its state before the group running.
● Check the results of the probe in the Log window to ensure that the probe indicates that the backup can be taken.
Actions pane
To view a list of all actions, click the Actions tab at the bottom of the Policies pane. The Policies pane becomes the Actions
pane.
The Actions pane provides the following information for each action:
● Overall status
NOTE: The Actions pane displays the same status icons as the Policies pane.
● Name
● Assigned policy
● Assigned workflow
● Type
● Date and time of the most recent run
● Duration of the most recent run
Workflow operations
This section describes how to use the Monitoring window to start, stop, and restart workflows.
Sessions window
Use the Sessions window to view the sessions that are running on a NetWorker server. You can change the view of this
window to display these sessions:
The Sessions pane below the Policies/Actions pane provides details on individual save, recover, clone, and synthetic full
sessions by client.
To view all sessions or to limit the list of sessions by the session type, click the tabs at the bottom of the Sessions pane.
Session types include:
● Save
● Recover
● Clone
● Browse
● Synthetic Full/Rehydrated Sessions
● All
To change the displayed session types go to View > Show, and select the type of sessions to display. To display all sessions
currently running on the NetWorker Server, regardless of type, select All Sessions.
You can stop a session (backup, synthetic full backup, clone, and recovery sessions) from the Monitoring window, even if the
session was started by running the nsrworkflow command.
To stop a session, right-click the workflow in the pane, and select Stop from the list box.
Devices pane
The Devices pane allows you to monitor the status of all devices, including NDMP devices. If the NetWorker server uses shared
and logical devices, the window is adjusted dynamically to present a set of columns appropriate for the current configuration.
The Devices pane provides the following information:
● Status of the operation.
● Name of the device.
● Name of the storage node that contains the device.
● For tape devices, the name of the library that contains the device.
● Name of the volume in the device.
● Name of the pool that is associated with the volume.
● Last message generated for the device.
● Whether the operation requires user input.
For example, a labeling operation may want the user to acknowledge whether the system should overwrite the label on a
tape.
Entering user input on page 53 provides instructions on how to deal with a user input notification.
If the current server configuration includes a shared device, a Shared Device Name column appears on the Devices pane. The
name of the shared device appears in the Shared Device Name column. If other devices for that configuration are not shared
devices, then the Shared Device Name column is blank for those devices. Only a single device per hardware ID can be active at
any particular moment. The information for inactive shared devices is filtered out, and as a result, only one device per hardware
ID is presented on the window at any time.
An icon represents the device status. The following table lists and describes each icon.
When you sort items in the Devices pane by the Status column, NetWorker sorts the devices in alphabetical order based on
the label name of the icon.
Operations window
The Operations window displays information about device operations. It provides the following information:
● Status of the operation.
● Name of the library.
● Whether the operation requires user input.
For example, a labeling operation may want the user to acknowledge whether the system should overwrite the label on a
tape. Entering user input on page 53 provides instructions on how to deal with a user input notification.
● The origin, or source, of the operation.
For example, the interface, nsrjb or the NetWorker server.
● Time the operation started.
● Type of operation.
● Duration of the operation.
● Status messages from the operation.
● Any error messages.
NOTE: Only the last error message of the operation appears in the Error Messages column. Move the mouse pointer
over the cell containing the last error message to display the entire list of error messages.
The operation status is represented by an icon. The following table lists and describes each of the icons.
Retry The operation failed, but may work if you try again.
Stopping an operation
Certain operations can be stopped from the Operations window.
1. From the Administration window, click Monitoring.
2. Click Operations in the docking panel.
3. Right-click the operation to stop, then select Stop.
4. Click Yes to confirm the stop.
NOTE: Operations that were started from a command line program, such as the nsrjb command, cannot be stopped
from the Operations window. To stop these operations, press Ctrl-c from the window where the command was
started.
Log window
To view the most recent notification logs, click the Log window from the docking panel in the Monitoring window. The Log
window provides the priority, time, source, category, and message for each log.
NOTE: If a particular log file is no longer available, check the log file on the NetWorker server. The log files are located in
NetWorker_install_path\logs directory.
An icon represents the priority of the log entry. The following table lists and describes each icon.
Information Information about the current state of the server. This icon represents the
lowest priority.
Notification Important information.
Waiting The NetWorker server is waiting for an operator to perform a task, such as
mounting a tape.
When you sort items on the Log pane by using the Priority column, NetWorker sorts the icons in alphabetical order based on
the name of the label.
Recover window
The Recover window displays information about recover configurations that are created with the NetWorker Management
Console (NMC) Recovery wizard.
You can use this window to:
● Start the NMC Recovery wizard to create recover configurations or modify saved recover configurations.
● Identify the status of a recover configuration that is created with the NMC Recovery wizard.
● Start and stop a recover job.
The Recover window is divided into five sections:
● Toolbar—The toolbar is hidden by default. To display the recovery toolbar, select View > Show toolbar
● Summary
● Configured Recovers
● Currently Running
A splitter separates the Configured Recovers section from Currently running window. You can click and move the splitter to
resize these two windows.
The following table shows an example of the Recover window.
Displays the Properties window for the saved recover configuration that you selected in the
Configured Recover window.
Deletes the saved recover configuration that you selected in the Configured Recover window.
Displays the Find window at the bottom of the Recover window. The Find window allows you to
perform keyword searches for messages that appear in the Logs window.
Start the recover operation for a selected saved recover configuration. This option is only available for a
recover configuration that has a Never run, or Failed status.
Stop in-progress recover operation that you selected in the Currently Running window.
NOTE: The Recover toolbar does not appear by default. To display the Recover toolbar, select View > Show toolbar.
Recover Summary
The Recover Summary section displays a high-level overview of recover jobs.
This section includes the following information:
● Total Recovers—The total number of successful recover jobs.
● Since—The number of successful recover jobs since this date.
Configured Recovers
The Configured Recovers window displays a list of saved recover configurations in a tabular format. You can sort
the information by column. The Configured Recovers table displays the following information for each saved recover
configuration:
● Status—The job status of a saved recover configuration.
● Name
● Source client
● Destination client
● Recovery list
● Recover type—For example, file system or BBB.
● Comment
● OS—The operating system of the source host.
● Recover requestor—The Windows or UNIX account used to create the recover configuration.
● Start Time
● End Time
● Start date
Currently running
The Currently Running window displays a list of in progress recover jobs in a tabular format. You can sort the information by
column. The Currently Running table displays the following information for each job:
● Status
● Name
● Source client
● Destination client
● Recovery list
● Recover type—For example, file system or BBB
● Volume
● Comment
● Device
● Size
● Total size
● % complete
● Rate (KB/s)
● Start time
● Duration
● Currently running
Find
The Find section appears along the bottom of the Recover window, after you select the Find button on the Recover toolbar.
Find allows you to search for keywords in the Configured Recovers window. The following table summarizes the available find
options.
Enterprise
The Enterprise is a visual representation of the NetWorker Console control zone. You can monitor various servers in the
enterprise such as the NetWorker and Data Domain servers for events. You can also generate various reports on events,
backups, and user activity.
Enterprise components
Enterprise components include hosts and folders.
Hosts A host, also known as a managed node, is the NetWorker or Data Domain server being monitored. A host
terminates a branch in the Enterprise.
Folders The purpose of folders is to enable the Enterprise to contain multiple levels. Each folder can contain more
folders, more hosts, or more of both.
Deleting a host
You can delete a single host or multiple hosts within a folder.
1. From the Console window, click Enterprise.
2. Right-click the host, then select Delete. The Deleting Host dialog box appears.
● To delete multiple hosts, select multiple hosts in the details pane and select Delete.
● If additional copies of the host exist in the Enterprise, use the Delete all existing copies of the host option to delete all
instances of that same host in a single operation.
Copying a host
You can create multiple copies of a host for a single NetWorker server. For example, you can create one copy of a host in the
logical position of the host in the Enterprise, while another copy of the host is in a Hosts-to-Watch folder where you can easily
monitor it. In this configuration, you can check the server without browsing through the Enterprise.
1. From the Console window, click Enterprise.
2. Right-click the host, then select Copy.
3. Right-click a new location, then select Paste.
NOTE: You can also use the drag-and-drop feature while press and holding the Ctrl key to copy hosts.
Adding a folder
1. From the Console window, click Enterprise.
2. Right-click the location within the Enterprise where you want the new folder to appear, then select New > Folder.
A new folder appears in the Enterprise with the default name Untitled1.
3. Highlight the default name and type a new name to replace it. The name must meet these criteria:
● Include at least one, but no more than 80 characters.
● Exclude forward slashes (/).
4. Press Enter.
Deleting a folder
1. From the Console window, click Enterprise.
2. Right-click the folder to delete, then select Delete.
● If hosts exist in the folder, a dialog box prompts you to confirm the deletion of each host. Select Yes to continue with the
operation, or No to cancel it.
● If hosts do not exist in the folder, the NMC server deletes the folder.
● If the folder contains any unique hosts (meaning hosts that do not have copies anywhere else in the Enterprise), an
additional dialog box appears to confirm deletion of the unique host.
A separate dialog box with four options appears for each unique host in the folder:
● To delete the specified host, click Yes.
● To delete all hosts and subfolders in the selected folder, without further prompts, click Yes to All.
○ To cancel the deletion, click No.
○ To cancel any further deletion of hosts in the selected folder, and leave the remaining contents intact, click Cancel.
The NMC server deletes non-unique hosts, and folders containing only non-unique hosts without additional
prompting.
NOTE: If there are user group restrictions in place that control which hosts a user can view, the folder might
appear empty.
Copying a folder
1. From the Console window, click Enterprise.
2. Right-click the folder to copy, then select Copy.
Moving a folder
1. From the Console window, click Enterprise.
2. Right-click the folder to move, then select Move.
3. Right-click a new location, then select Paste. The folder appears in its new location.
NOTE: You can also use the drag-and-drop feature to move folders while holding down the Ctrl key.
Renaming a folder
1. From the Console window, click Enterprise.
2. Right-click the folder, then select Rename.
3. Highlight the folder name and type a new name to replace it. The name must meet these criteria:
● Include at least one, but no more than 80 characters.
● Exclude forward slashes (/).
4. Press Enter.
Restrictions
Before you use the gstmodconf command, review the following restrictions.
If a host already exists anywhere in the Enterprise, either at the base or within a folder, you cannot use the gstmodconf
command to add copies of the host.
You cannot use this command to add a host to a folder. You can only add a host to the base level of the Enterprise. After you
add the host to the Enterprise, use the Console GUI to move the host to a folder. Moving a host on page 534 provides more
information.
When you use the gstmodconf command to delete a host, the command only deletes hosts from the base level. The command
does not delete hosts that are within folders.
You can use the gstmodconf -s myconsole -i xyz_hostlist -f delete command to delete multiple Networker
hosts.
NOTE: The gstmodconf file on Windows is located in the following folder: C:\Program Files\EMC
NetWorker\Management\GST\bin. The gstmodconf file on Linux is located in the following folder: /opt/
lgtonmc/bin/. The folder location is not in the default environment path.
The following output provides an example of the error that appears when you use the gstmodconf command but you did not
specify the administrator password when the password is not the default value.
Example: Trying to use gstmodconf without specifying the password
Sorting tables
You can change the display of tabular information that appears in the window. You can sort Table grids by column heading, and
then by alphabetic or numeric order within those columns.
1. Drag and drop the column heading to its new position.
2. Click the column heading to sort the items into alphabetic and numeric order. An arrow appears in the column heading to
indicate the sort order.
For example: to see all the managed events about servers that were unreachable by the NMC server, perform the following
steps.
1. From the Console window, select Events.
2. Drag the Message column until it is over the Priority column and drop it.
3. Click the Message column heading. A down-arrow appears.
Scan down the list of messages until you find all three servers with the message, Unable to connect to server. You
can also generate a Managed Event Details report to get the same information, and then print, or export it for use in another
application.
In this example, the policy with the name Bronze displays and the Send Notification attribute is set to On Completion.
The following table describes how to use filters to search and view details in the Administration window.
Media To search and view detailed information about the following activities and resources, type a value in the
search fields or select an option from the list box, and then press Enter.
● Label Templates
● Media Pools
● Disk Volumes
● Tape Volumes
● Client Indexes
● Save Sets
NOTE: In the Save Sets window, filtering is not available on the Query Save Set tab.
Hosts To search and view detailed information about hosts, type a value in the search fields or select an option
from the list box, and then press Enter.
NOTE: Filtering is not available on the Software Inventory or Software Repository tabs.
Server To search and view detailed information about the following NetWorker server resources, type a value in
the search fields or select an option from the list box, and then press Enter.
● Directives
Clear filters
To clear all filters, select Clear All. The display returns to the default view.
NOTE: If you changed the default NMC server ports, specify the correct port numbers.
4. Click OK.
savepsm staging_directory
where staging_directory is the location that the backup uses to temporarily store a copy of the NMC database for backup.
For example, on windows, type:
savepsm e:\nmcdb_stage
where:
● The location of the nsrauthtrust command differs on Linux and Windows:
○ Linux—/usr/sbin
○ Windows—C:\Program Files\EMC NetWorker\nsr
● Authentication_service_host is the hostname of the NetWorker Server that authenticates the NMC Server host.
● Authentication_service_port_number is the port number used by the NetWorker Authentication Service. The default port
number is 9090.
For example:
nsrauthtrust -H nwserver.corp.com -P 9090
3. Grant the NetWorker Authentication Service user groups access to the NetWorker Server, by typing the nsraddadmin
command:
nsraddadmin -H Authentication_service_host -P Authentication_service_port_number
For example:
nsraddadmin -H nwserver.corp.com -P 9090
where:
● The location of the nsrauthtrust command differs on Linux and Windows:
○ Linux—/usr/sbin
○ Windows—C:\Program Files\EMC NetWorker\nsr
● Authentication_service_host is the hostname of the NetWorker Server that authenticates the NMC Server host.
● Authentication_service_port_number is the port number used by the NetWorker Authentication Service. The default port
number is 9090.
For example:
nsrauthtrust -H nwserver.corp.com -P 9090
6. Grant the NetWorker Authentication Service user groups access to the NetWorker Server, by typing the nsraddadmin
command:
nsraddadmin -H Authentication_service_host -P Authentication_service_port_number
For example:
nsraddadmin -H nwserver.corp.com -P 9090
"query-domain=ldapdomain"
GST_LDAP_USING_2FA="true"
export GST_LDAP_USING_2FA
where:
● NetWorker_server is the name of the NetWorker Server.
● source_NMC_server is the name of the source NMC Server.
● AES_Passphrase is the passphrase that was specified for the NMC database backup.
● staging_dir is the staging directory specified during the backup of the database on the source NMC Server.
NOTE: When you perform an NMC database backup, the backup operation performs a backup of the database from
the staging directory. As a result, the save set name is name of the staging directory. Use the mminfo command on
the NetWorker Server to determine the name of the staging directory.
The NetWorker Command Reference Guide or the UNIX man pages provide a complete description of the recoverpsm
command line options.
11. If the source NMC Server managed NetWorker 8.2.x and earlier servers that use LDAP authentication, then recover
the LDAP configuration authority files. Use the recover command, the NetWorker User program, or the NMC
Recovery wizard to recover all the files in the console_install_dir/cst directory. Recover these files to the
console_install_dir/cst directory on the target NMC Server.
12. Start the NMC Server service on the target NMC Server and connect to the NMC GUI.
If the target NMC Server uses a different NetWorker Server to provide authentication services than the NetWorker Server that
the source NMC Server used, then you must use the gstauthcfg command on the NMC Server to update the NetWorker
Authentication Service host, and then run the nsrauthtrust commands on each NetWorker Server that is managed by the
NMC Server.
When the source NMC Server uses a different NetWorker Server for authentication and you do not establish a trust, the
following behavior occurs:
● The NMC Events window displays Unable to connect to the server error messages for each managed NetWorker
Server.
● When you try to connect to the NetWorker Server, a message similar to the following appears: Unable to connect
to the server: Unable to set user privileges based on user token for SYSTEM: Failed to
validate security token.
Changing the Authentication service hostname and port number provides more information.
where mypassword_out.txt is the name of the output file that contains the Base64 encoded password.
Output similar to the following appears:
Input Length = 10
Output Length = 74
CertUtil: -encode command completed successfully.
The contents of the mypassword_out.txt file contains the following encoded text for the password value
"1.Password":
-----BEGIN CERTIFICATE-----
MS5QYXNzd29yZA==
-----END CERTIFICATE-----
The command displays the encoded text for the password value "1.Password": MS5QYXNzd29yZA==
2. Use a text editor to open the authc-local-config.json.template file, which is located in the C:\Program
Files\EMC NetWorker\nsr\authc-server\scripts folder on Windows and the /opt/nsr/authc-server/
scripts directory on Linux.
3. In the template file, perform the following steps:
a. Replace the your_username variable with the name of the administrator account for which you want to reset the
password.
b. Replace the your_encoded_password variable with the base64 encoded password value.
For example, to reset the password for the user account administrator with a password of "1.Password ", the modified file
appears as follows:
{
"local_users": [
{
"user name": "administrator",
"password": "MS5QYXNzd29yZA=="
}]
}
4. Rename the authc-local-config.json.template file to authc-local-config.json.
5. Copy the authc-local-config.json file to the Tomcat conf folder.
By default, the conf folder is/nsr/authc/conf on Linux and C:\Program Files\EMC NetWorker\authc-
server\tomcat\conf on Windows.
NOTE: If the NetWorker server is also the NMC server, start the NMC server service. Type the following
commands: net start gstd
● For Linux, type the following commands:
/etc/init.d/networker stop
/etc/init.d/networker start
When the NetWorker Authentication Service starts, the startup process checks for the authc-local-config.json.
If the file exists and the password adheres to the minimum password policy requirements defined for a password, the
NetWorker Authentication Service resets the password. Review the authc-server.log file for errors.
By default, the authc-server.log file is located in /nsr/authc/logs on Linux and C:\Program Files\EMC
NetWorker\authc\tomcat\logs on Windows.
NOTE: The startup process automatically deletes the authc-local-config.json file to ensure that the password
is not reset the next time that you restart the NetWorker Authentication Service.
8. To confirm that you can connect to the NetWorker Authentication Service with the new password, use the authc_mgmt
command.
For example:
authc_mgmt -u administrator -p "1.Password" -e find-all-users
3. Run the /opt/lgtonmc/bin/gstconfig command to update the port value in the NetWorker NMC server configuration
file.
4. Edit the postgresql.conf file to add or change the following line:
port=port_number
NOTE: If /etc/init.d/gst file is missing for sysvinit systems or gst file is not enabled for systemd systems, run the
script - /opt/lgtonmc/bin/nmc_config
Multiple Postgres processes appear. Two or more httpd processes appear. By default, these httpd processes run as
nsrnmc.
7. Confirm that the daemons have started, by typing the following command: ps -ef | grep lgtonmc.
Output similar to the following appears when the daemons have started:
nsrnmc 7190 1 0 Nov23 ? 00:00:06 /opt/lgtonmc/bin/gstd
nsrnmc 7196 1 0 Nov23 ? 00:00:00 /opt/lgtonmc/apache/bin/httpd -f /opt/lgtonmc/apache/
conf/httpd.conf
nsrnmc 7197 7196 0 Nov23 ? 00:00:00 /opt/lgtonmc/apache/bin/httpd -f /opt/lgtonmc/apache/
conf/httpd.conf
nsrnmc 7212 1 0 Nov23 ? 00:00:00 /opt/lgtonmc/postgres/11.1/bin/postgres -D /nsr/nmc/
nmcdb/pgdata
root 18176 18141 0 02:47 pts/0 00:00:00 grep lgtonmc
4. Use the regedit command to update the port number in the registry.
a. Browse to \\HKEY_LOCAL_MACHINE\SOFTWARE\ODBC\ODBC.INI\lgto_gst_pgsql.
b. Edit the Port registry key.
c. In the Value Data field, specify the new port number.
d. Click OK.
5. Start the EMC GST Service.
Defines the log-on banner displayed in the NMC server login window.
Range: 1-20
Defines the level of debug information to log in the gstd.raw file. Increase this
value to troubleshoot only.
Polling interval for events and reporting Default value: 20
(seconds)
Range: 2-unlimited
Defines how frequently the NMC server contacts the managed NetWorker
servers for event and report updates.
Polling interval for NetWorker activities Default value: 10
(seconds)
Range: 2-unlimited
Defines the frequency in which the NMC server contacts the managed
NetWorker servers for activity updates.
Polling thread factor Default value: 5
Range: 0-10
Defines how many server threads to create when polling the NetWorker server
for NetWorker activities, events, and reporting. The higher the number the higher
the number of threads created. It is not a one-to-one relationship.
Maximum number of log messages Default value: 32
Range: 32-512
Defines the number of log messages that display in the Console Log window.
NetWorker user auditing Default value: enabled
When enabled, the NMC server collects auditing information. For example,
NetWorker server
configuration changes performed from the Console GUI. The NMC server
database stores the
auditing information. To view audit information browse to Reports > Users >
User Audit Report.
When disabled, the NMC server does not collect auditing information.
User authentication for NetWorker Default value: enabled
● When enabled, the Console username determines the Console user access.
Individual User Authentication on page 554 provides detailed information.
● When disabled, the user id of the gstd process owner determines the Console
user access.
RPC ping via UDP when connecting to Default value: disabled
NetWorker
Before the NMC server connects to a managed NetWorker server, the NMC
server confirms that
the NetWorker server daemons are running.
● When enabled, the NMC server uses the UDP protocol to confirm that the
NetWorker server is up and running.
4. Click OK.
Console server has been started Wait a couple of minutes and retry.
within the previous few minutes.
Failed to bind to port port_mumber Another process is using the gstd Close any running NMC GUIs or any
message appears in the gstd.raw log service port (default 9001) or the processes that may be using the gstd
file. port is in a timeout (TIME_WAIT/ service port. Wait until the timeout period
FIN_WAIT) state. passes so that the operating system can
free up the port. The timeout period may
differ between operating systems.
Database fetch operation failed The NMC database is corrupt. Recover the database.
messages appears in the gstd.raw log
file.
Display problem: The gstd service is not running on Restart the NMC server.
the NMC server.
In Internet Explorer:
Browser is not pointing to the correct Check the install log file to determine the
The page cannot be displayed. URL. HTTP port that is used by the NMC Server.
Network connection is down. Ping the NMC Server to confirm the
network connection. If it is available,
contact the system administrator.
Enabler code not accepted. Temporary enabler code has expired. Close the NMC Server and log in again.
Database delete operation failed: Another user has already deleted that None
Reference object does not exist. user or folder.
Database store operation failed: An ● Another user is trying to add a ● Wait a few moments and try again.
object with pathname folder to the same location in the ● Check whether there is an existing
Enterprise simultaneously. object with the same name.
“pathname” already exists.
● An object was added with the
same name as an existing object.
Invalid Object ID. Another user deleted that host. None
Click OK.
If License Manager is installed, but not
running, start it.
The NetWorker License Manager server
Installation and Administration Guide
provides details.
NetWorker Client was stopped, Stop the NetWorker software.
but the License Manager was not
stopped, and then the NetWorker Stop License Manager, if it is running.
Client was restarted. Restart License Manager.
Although both services are now Restart the NetWorker software.
running,
NetWorker Client must be started
before License
Manager is started. If the services are
not
started in the correct order, an error
condition
occurs.
License allocation failed. Temporary license for NetWorker Enter enabler codes and register the
software is expired. product.
License managed event indicates that License has been authorized within None needed. To remove the managed
license is expiring/expired even though the last 24 hours. event from the display, dismiss the event
it has been authorized. or it is deleted within 24 hours.
Logging of troubleshoot messages has Disk space on the /opt file system is Allocate more disk space.
stopped. nearly full.
Event disappears from the Events Another user dismissed it, or the None
window. problem that was causing the event
no longer exists.
Dialog box: "Java Web Start –Download Java Web Start preferences are set Check the Preference settings in the
Error" with the message, "Unable to to something that is incompatible with Java Web Start Application Manager for
launch NetWorker Console". the rest of the environment. compatibility with the environment. Change
any settings that prohibit the download of
(For example, a proxy server has been the Console client software.
set up
that stops Java Web Start from In the proxy server example, go to the
downloading the General tab of
Console client software from the the Preferences dialog box and select
Console web None, for
server.) Proxies.
This error message may also occur if If the Java Web Start cache path contains
the non-English characters, change the path to
Console is being launched on a contain no non-English characters.
localized
operating system and the Java Web
Start cache
path contains non-English characters.
gstd.log file error: internal error: could When you move the system time None
not end transaction ahead, the NMC Server starts a time
out event and closes database client
connection for the gstd process.
GC overhead limit exceeds This error message appears when you Increase the Java heap size to 1400MB.
are performing tasks in NMC and 1. Start the Java Control Panel
there is insufficient Java memory, or application: javaws -viewer.
heap. 2. Close the Java Cache window.
3. On the Java tab, click View.
4. On the Java Runtime Environment
Settings window, double-click in the
Runtime Parameters cell for the Java
version that you use with NMC.
5. In the Runtime Parameters field, specify
a heap size of 1400 MB: -Xms1400m
6. Click OK.
7. Click OK to close the Java Control
Panel.
8. Close the NMC and NetWorker
Administration windows and reconnect
to the NetWorker.
NOTE: Identify the Console Server’s NSR Peer Information, and delete it.
NOTE: Identify the NetWorker Client’s NSR Peer Information, and delete it.
After the deletion is complete, it is not mandatory to restart the NetWorker or Console services.
● The Client cannot resolve hostname of NMC Server or NetWorker Server. Sometimes, NMC can resolve the client
hostname, but, client cannot resolve the NMC or NetWorker Server hostname.
To resolve this issue, ping the NetWorker Server and NMC server from the Client. If the ping fails, DNS is not resolving the
hostname issue and add the hostname to the client hosts file.
● Ensure NetWorker users have at least the “Operate NetWorker” privilege to launch the Client Wizard. To resolve this issue,
add the user to the user_group in the NetWorker Server.
● The NetWorker Server may not be present in the client's servers file. To resolve this issue, add the NetWorker Server to the
client's servers file.
● The NMC Server, NetWorker Server, and NetWorker client hosts must only use nsrauth authentication.
NOTE: To provide meaningful query results and to reduce the chance of encountering this error, narrow the save set
search criteria by specifying selection parameters.
6. Click OK.
Hostname changes
NetWorker considers each unique client name as a separate client. NetWorker assigns each unique client name in the datazone a
unique identifier called client ID. NetWorker stores the client ID for each client in the media database.
The NetWorker software has a built-in mechanism to prevent the nsrd daemon from starting on the NetWorker server if the
startup process detects a change in the name of the NetWorker server. For example, when you change the hostname of the
NetWorker server or modify the aliases order in the hosts file.
A message similar to the following appears in the daemon.raw file:
NetWorker is unable to continue its startup sequence due to a server hostname change
to hostname. Please verify that the server's hostname and its aliases are properly
represented in the local host database (eg. /etc/hosts) and DNS.
This mechanism prevents the NetWorker software from assigning a new client ID to the NetWorker server, which is based
on the new hostname. To resolve this issue, verify the hostname resolution of the NetWorker server. The "Networking and
Connectivity" chapter provides more information.
If the startup process did not detect the hostname change, NetWorker assigns the NetWorker server a new client ID, which
can impact NetWorker operations. Use the nsrclientfix command to analyze the media database and identify client ID
inconsistencies. To resolve client ID issues, use the nsrclientfix command to merge information about multiple clients in the
media database and resource database into one client resource with the original client ID. The following KB articles on the Online
Support website provide more information about using the nsrclientfix command:
● For NetWorker Server client ID issues: 000185727
● For NetWorker Client client ID issues: 000193911
nsrd NSR Index Warning: Detected error with client id(s): hostname
You can use the nsradmin program to modify the schedule of the scan.
1. On the NetWorker server, start the nsradmin program from a command prompt.
2. At the nsradmin prompt, set the current query to select the NSR task resource named DefaultNsrclientfixTask:
print type:nsr task;name:DefaultNsrclientfixtask
For example, to specify that the task should run every day of the week at 1:00 P.M. except for Sunday, type the following
command:
update: start time: "13:00"; plan: skip exec exec exec exec exec exec
The Command Reference Guide provides more information about the nsrtask and NSR client fix resources.
Parallelism
You can use several attributes in various NetWorker resources to adjust the volume of data that a host processes to improve
overall performance.
The following attributes are related to parallelism:
● Client parallelism
● Server parallelism
● Action parallelism
● Max active devices
● Media library parallelism
These attributes are described in detail in the following sections.
If the client parallelism is less than the PSS:streams_per_ss default 4 or the lowest configured value, the backup fails
displaying an error message.
The PSS:streams_per_ss values range from 1 to 8. If you specify an invalid value, the backup proceeds with the default
value 4, and a warning message displays stating that that the entire PSS:streams_per_ss parameter is ignored.
The NetWorker Performance Optimization Planning Guide provides complete details on PSS requirements and performance
benefits.
Server parallelism
To define the server parallelism for a NetWorker server, use the Parallelism attribute of the Server resource. The Parallelism
attribute appears in the NetWorker Administrator window on the General tab of the Server property dialog box.
Server parallelism defines the number of simultaneous data streams that the NetWorker server allows.
Data streams include backup data streams, savefs processes, and probe jobs.
The default and the maximum server parallelism values vary depending on the edition of NetWorker software. Each storage
node that you enable and connect to the NetWorker server can increase the parallelism maximum value. The maximum
parallelism value for any NetWorker server and storage node combination can vary. The NetWorker Release Notes provides
more information.
Optimally, configure the NetWorker server to process enough data streams to keep all the backup devices in the datazone
writing at their maximum speed. When you tune the server parallelism setting, along with other settings discussed in this
section, you can maximize the speed that NetWorker writes the data to backup devices.
Action parallelism
Action parallelism defines the maximum number of simultaneous data streams that can occur on all clients in a group that is
associated with the workflow that contains action.
Data streams include backup data streams, savefs processes, and probe jobs.
To define the parallelism for an action, modify the Parallelism attribute on the Specify the Advanced Options page in the
Action wizard. For a Backup action, the default parallelism value is 100 and maximum value is 1000. For a clone action, the
default parallelism value is 0 and maximum value is 1000. For all other action types, the default value is 0, or unlimited.
Multiplexing
Multiplexing is the ability to write multiple data streams simultaneously to the same storage device. It is often more efficient for
the NetWorker server to multiplex multiple save sets to the same device. There are also times when limiting the number of data
streams to a particular device improves performance of the NetWorker environment.
Use the Target sessions, Max sessions, and Pool parallelism attributes to increase or limit the number of data streams that
NetWorker writes to a device.
Target sessions
Use the Target sessions attribute on the Configuration tab of the Device resource to define the optimal number of backup
sessions to assign to an active device.
Target sessions is not a hard limit; to set a hard limit for the number of sessions that a particular device can accept, use the Max
sessions attribute.
The Target sessions attribute aids in load balancing devices by determining when the NetWorker software should write save
streams to a device.
When a save session starts, the following actions occur:
● If a device is already receiving the number of backup sessions determined by the target sessions value, the NetWorker
server uses the next underutilized device for the backups.
● If all available devices are receiving the number of backup sessions determined by their target sessions value, the NetWorker
server overrides the set value and uses the device with the least activity for the next backup session.
Because it is often more efficient for the NetWorker server to multiplex multiple save sets to the same device, rather than write
each save set to a separate device, the NetWorker server attempts to assign to each device a number of save sets, up to the
value of target sessions, before assigning a save set to another device.
NOTE: When the NetWorker software assesses how many devices need to be involved in multiple save streams
assignments with the same storage node, the device with the lowest target session value is used as a reference.
Max sessions
The Max sessions attribute on the Configuration tab of the Device resource defines the maximum number of save sessions for a
device. The max sessions value is never less than the target sessions value. It is recommended to use the default values for Max
sessions as lowering these values can impact performance.
Pool parallelism
The Max parallelism attribute on the Configuration tab of the Pool resource defines the parallelism for a pool.
Pool parallelism determines the maximum number of simultaneous save streams for each device that belong to a NetWorker
pool. The default value for this attribute is 0, which means that the attribute has no effect on other parallelism settings.
You can use pool parallelism to increase recovery times. For example, you can create a pool to back up business critical data
and use this attribute to restrict the number of save sets that NetWorker writes in parallel to the media in the pool. As a result,
recovery speed increases for data on that media.
Resource databases
Information about the NetWorker Server resides in series of files in the following directories:
NetWorker_install_path\res\nsrdb\00
.
NetWorker_install_path\res\nsrdb\09
NetWorker stores each resource in a separate numbered file. As you create resources, for example, a new Client, Group, or Pool
resources, the NetWorker Server adds files to the directories.
A Client resource database (nsrexec) also exists on each NetWorker host and contains configuration information about each
NetWorker host. The nsrexec database resides in a series of files in the following directories:
NetWorker_install_path\res\nsrladb\00
.
NetWorker_install_path\res\nsrladb\09
The NetWorker Security Configuration Guide provides more information about the Client resource database.
nsradmin -s server_name
● To access the client resource database, use the following command :
nsradmin -p nsrexec
● To access the Package Manager database, use the following command:
nsradmin -p nsrcpd
The NetWorker server removes any corrupt resource files from the nsrdb directory structure and places them in the dbg
directory. NetWorker creates the dbg directory only after resource database file corruption has occurred. To correct this issue,
open the corrupt file with a text editor and review the file contents, then re-create the resource. You can delete the corrupted
resource file.
NOTE: If you do not know the cause of the resource file corruption, contact Technical Support assistance.
Indexes
The NetWorker server tracks the files it backs up in two databases, which are stored on the local file system of the server:
● The client file index tracks the files that belong to a save set. There is one client file index for each client.
● The media database tracks:
○ Volume name
○ Backup dates of the save sets on the volume
○ File systems in each save set
Unlike the client file indexes, there is only one media database per server.
The client file indexes and media database can grow to become prohibitively large over time. Managing the size of the online
indexes on page 573 provides information about managing the size of these indexes.
If the index is still corrupt, recover the index by using the procedure that is outlined in Adding information about recyclable save
sets to the client file index on page 382.
It is recommended that you periodically run the nsrck -F and nsrim -X commands to check the integrity of the client
and media indexes. The NetWorker Command Reference Guide or the UNIX man pages provide more information about these
commands.
Reduce the size of the client file index on page 573 provides information about reducing the size of the client file indexes by
using the Remove Oldest Cycle button.
1. From the Administration window, click Media.
2. Click Indexes.
3. Right-click the client whose save sets you want to view, then click Show Save Sets. The Index Save Sets dialog box
appears.
4. To view detailed information about a save set, click the save set name.
You can also use the mminfo -av command to query the media database. The NetWorker Command Reference Guide or the
UNIX man pages provides detailed information about how to use the mminfo command.
4. Click Yes to continue. The NetWorker server displays a status box until the cross-checking is complete.
NOTE: On Solaris and Linux platforms, uasm is installed in /usr/lib/nsr. On all other platforms, uasm is installed in
the same location as the NetWorker binaries.
NOTE: Depending on the size of the client file index, running either nsrck or nsrls can take a considerable amount of
time. Running the nsrck -L6 command, as shown in the example, also checks the index for corruption.
If no problems are found, then all future client file index information is saved to the new location.
2. Use mminfo to determine the save set ID. At the command prompt, type:
mminfo -v -c client_name
The UNIX man page and the NetWorker Command Reference Guide provides detailed information about the nsrmm and
mminfo commands.
When NetWorker marks a save set as recoverable, you cannot browse to recover these files. Use the save set recover
procedure to recover data from a recoverable save set.
5. Click OK.
To remove information about the volume from the client file index only, type the following command:
nsrmm -d -P volume_name
● On UNIX:
/nsr/mm/.cmprssd
Internationalization
The NetWorker software supports language packs, which you can install as part of the NetWorker installation, or you can install
the language packs separately after you have installed the NetWorker software. The NetWorker Installation Guide provides
more information.
Internationalization support in the NetWorker software depends on internationalization support of the underlying operating
system. If you plan to use non-English data in the NetWorker software, ensure that you install and configure the appropriate
support for that language on the operating system.
The following sections describe a number of issues and limitations that relate to the use of NetWorker software in a multi-
language environment.
Display issues
There are number of issues and limitations associated with displaying characters in various locales.
7. Click Next.
The Server Backup Options page appears.
8. From the Destination Storage Node list, select the storage node with the devices on which to store the backup data.
9. From the Destination Pool list, select the media pool in which to store the backup data.
10. From the Retention lists, specify the amount of time to retain the backup data.
After the retention period expires, the save set is marked as recyclable during an expiration server maintenance task.
11. Specify whether to include the client file indexes in the server backup by selecting or clearing the Perform CFI checkbox.
When you clear this option, the action will only backup the bootstrap.
12. Specify whether to include a bootstrap backup in the server backup by selecting or clearing the Perform Bootstrap
checkbox.
When you clear this option, the action will only backup the client file indexes.
NOTE: You must select either the Perform CFI checkbox, the Perform Bootstrap checkbox, or both checkboxes.
Otherwise, the server backup action does not back up any data.
15. In the Retry Delay field, specify a delay in seconds to wait before retrying a failed probe or backup action. When the Retry
Delay value is 0, NetWorker retries the failed probe or backup action immediately.
16. In the Inactivity Timeout field, specify the maximum number of minutes that a job that is run by an action can try to
respond to the server.
If the job does not respond within the specified time, the server considers the job a failure and NetWorker retries the job
immediately to ensures that no time is lost due to failures.
Increase the timeout value if a backup consistently stops due to inactivity. Inactivity might occur for backups of large save
sets, backups of save sets with large sparse files, and incremental backups of many small static files.
NOTE: The Inactivity Timeout option applies to probe actions, and the backup actions for the Traditional and
Snapshot action types. If you specify a value for this option in other actions, NetWorker ignores the value.
17. In the Parallelism field, specify the maximum number of concurrent operations for the action. This is applicable if multiple
rollover is implemented at an action level.
For Direct-NDMP backups, set the parallelism value to the number of available NDMP drives.
If you set the parallelism attribute to a higher value, there will not be enough drives to support all the queued backup save
sets. Large save sets might fail due to the inactivity timeout limit.
When NDMP groups back up simultaneously, divide the number of drives by the number of groups. Use this value for each of
the parallelism attributes.
Setting the parallelism value for the group overrides the parallelism value that is defined for the NDMP clients.
18. From the Failure Impact list, specify what to do when a job fails:
● To continue the workflow when there are job failures, select Continue.
● To stop the current action if there is a failure with one of the jobs, but continue with subsequent actions in the workflow,
select Abort action.
NOTE: The Abort action option applies to probe actions, and the backup actions for the Traditional and Snapshot
action types.
● To stop the entire workflow if there is a failure with one of the jobs in the action, select Abort workflow.
NOTE: If any of the actions fail in the workflow, the workflow status does not appear as interrupted or canceled.
NetWorker reports the workflow status as failed.
19. From the Send Notifications list box, select whether to send notifications for the action:
● To use the notification configuration that is defined in the Policy resource to send the notification, select Set at policy
level.
● To send a notification on completion of the action, select On Completion.
● To send a notification only if the action fails to complete, select On Failure.
20. From the Soft Limit list, select the amount of time after the action starts to stop the initiation of new activities. The default
value of 0 (zero) indicates no amount of time.
21. From the Hard Limit list, select the amount of time after the action starts to begin terminating activities. The default value
of 0 (zero) indicates no amount of time.
22. (Optional) Configure overrides for the task that is scheduled on a specific day.
To specify the month, use the navigation buttons and the month list box. To specify the year, use the spin boxes. You can
set an override in the following ways:
● Select the day in the calendar, which changes the action task for the specific day.
● Use the action task list to select the task, and then perform one of the following steps:
○ To define an override that occurs on a specific day of the week, every week, select Specified day, and then use the
lists. Click Add Rules based override.
○ To define an override that occurs on the last day of the calendar month, select Last day of the month. Click Add
Rules based override.
NOTE:
○ You can edit or add the rules in the Override field.
○ To remove an override, delete the entry from the Override field.
○ If a schedule is associated to an action, then override option is disabled.
23. Click Next.
NOTE: NetWorker only supports one action after the server backup action.
To perform expiration every day, select Execute from the list, and click Make All.
9. Click Next.
12. From the Send Notifications list box, select whether to send notifications for the action:
● To use the notification configuration that is defined in the Policy resource to send the notification, select Set at policy
level.
● To send a notification on completion of the action, select On Completion.
● To send a notification only if the action fails to complete, select On Failure.
13. (Optional) Configure overrides for the task that is scheduled on a specific day.
To specify the month, use the navigation buttons and the month list box. To specify the year, use the spin boxes. You can
set an override in the following ways:
● Select the day in the calendar, which changes the action task for the specific day.
● Use the action task list to select the task, and then perform one of the following steps:
○ To define an override that occurs on a specific day of the week, every week, select Specified day, and then use the
lists. Click Add Rules based override.
○ To define an override that occurs on the last day of the calendar month, select Last day of the month. Click Add
Rules based override.
NOTE:
○ You can edit or add the rules in the Override field.
○ To remove an override, delete the entry from the Override field.
○ If a schedule is associated to an action, then override option is disabled.
14. Click Next.
The Action Configuration Summary page appears.
15. Review the settings that you specified for the action, and then click Configure.
For a clustered NetWorker server, add the FQDN and shortname of the virtual
NetWorker and all physical
nodes.
Remote Directed Restore Add the FQDN or shortname of the administering client to the server file on the
destination client.
NDMP DSA backups Add the FQDN or shortname of the NetWorker client that starts the backup.
NOTE: For NDMP, the servers file resides in the NetWorker Server.
NOTE: Before adding the FQDN or shortname to the NetWorker server file, ensure that the host name resolution for FQDN
or short name is working correctly.
The NetWorker Security Configuration Guide provides more information about client-tasking rights and how to modify the
servers file.
The Hosts window contains a taskbar and two window panels, the summary panel and a task monitoring panel.
The information that appears in summary panel changes based on the task option that you select on the taskbar. The following
table provides an overview of the information that appears in the summary panel when you select a task on the taskbar.
The user program you are trying to run (winworkr) is either not installed on this
computer, or is not in your path.
To start the NetWorker User program, you must belong to the appropriate Windows groups. The following table lists the groups
that you must belong to in order to run the NetWorker User program.
The Backup Operators and Administrators groups are the local and remote Microsoft security groups.
Administrators Administrators
Administrators
Toolbar buttons
The NetWorker User program has a toolbar with buttons for common User program tasks. The following table describes the
function of each button.
Browse window
If you select menu items or buttons, a browse window opens in the NetWorker User program .
A browse window opens if you select any of the following items:
● A toolbar button.
● A Backup, Recover, Archive, Verify, or Local Directive command from the NetWorker User File menu.
The browse window, which is shown in the following figure, displays the directory tree of the file system that is being browsed.
NOTE: When you mark a disk volume or directory for an operation, all its nested subdirectories and files are also marked.
A check mark beside an item name indicates that the item is selected for backup, recovery, archiving, or verification.
The Attributes column indicates any special handling option that was applied:
● P — The item is marked for password-protection.
● E — The item is marked for password-protection and encryption, using the PW2 ASM.
● C — The item is marked for compression.
3. Click OK.
3. To determine the current settings for attributes in the NSRLA resource, perform the following two steps:
option Hidden
4. To change the value of attributes in the NSRLA resource, type the following line at the nsradmin prompt:
update attribute:value;
For example, to update the Disable Directed Recover attribute, type the following:
update disable directed recover:Yes
The NetWorker Security Configuration Guide provides more information about the nsrexec database and how to modify
attributes in the nsrexec database.
Administrator roles
Management and use of RDZs is divided among global administrators and tenant administrators. A global administrator creates
and manages RDZs. The global administrator can perform all the RDZ tasks, or associate specific tasks and privileges within
each RDZ to one or more RDZ users as tenant administrators.
Although there are many possibilities for the roles of administrators, most setups fall into the following two approaches:
● Global administrator sets up the initial configuration, and also configures everything, so there is no need for a tenant
administrator. This approach may be preferred for a customer with a very large environment, where one individual controls
the network and sets up RDZs for various divisions within their company.
● Global administrator sets up the initial configuration, and tenant Administrators can configure and operate clients and create,
view, operate, manage, and modify the NetWorker resources that are associated with their own RDZ according to the
privileges assigned by the global administrator. Controls can be put in place to limit a tenant administrator's impact on the
server. The global administrator can restrict the NetWorker resources that each RDZ can use, such as the maximum number
of clients, devices, jukeboxes, or storage nodes.
Adding a User
Add a user to the RDZ to allow them to do administrative tasks within the RDZ by right-clicking Restricted Datazones in the
Server window and selecting Properties.
In the User Configuration section of the window, click the + next to External roles to add a group that contains a user, and
check the privileges that this user has.
2. Create the RDZ (for example, RDZ1) by naming the RDZ and specifying any restrictions.
Use the Restrictions subsection to set limits on the clients, devices, storage nodes, and jukeboxes that can be owned by
the restricted datazone to prevent resource abuse and limit what the tenant administrator can create. Setting restrictions
can provide more control for major events that may impact the server, licensing limitations, and so on. These restrictions are
in place even if using the RDZ as a global administrator.
NOTE: Setting a resource restriction to a value of 0 indicates that the user cannot create this resource.
You can specify multiple users. However, they will each have the same privileges. To set up separate users with different
privileges within the same RDZ, create a separate instance of the RDZ by repeating the above steps using the same RDZ
name and restrictions, but with different External Roles, Users, and Privileges.
If the global administrator is going to administer the RDZ and if there are no RDZ users, then the User Configuration
section of the Create Restricted Data Zone window can be ignored.
3. In the left navigation pane of the Protection window, right-click the desired resource (for example, Client) and select
Properties to configure the resource with the RDZ. Note that in addition to using an existing resource, you can also create
the resource for the RDZ.
Resources that you can associate to an RDZ displays a Restricted Datazone tab in NMC (or the Restricted Datazone
attribute in nsradmin).
4. Select the Restricted Datazone tab. Resources automatically get associated to the Restricted Datazone a user belongs to
when they create a resource.
5. (Optional) In the left navigation pane of the Devices window, select a device if you want to give this RDZ client access to a
specific device by right-clicking the device and selecting Properties. Give the RDZ client access to this device.
NOTE: The RDZ can access the shared devices without any further device setup requirements for the shared resource
if these devices are configured. Note, however, that multiple RDZs cannot simultaneously access the same device.
6. Create a policy. In the Protection window, right-click Policy in the left navigation pane and select Create Policy.
7. In the General tab, specify a name for the policy (in this example, RDZ1). In the Restricted Data Zone tab, select the RDZ
from the drop-down, then click OK.
8. Create a group. In the Protection window, right-click Group, and select New.
9. Name the group and select the desired client(s). In the Restricted Datazone tab, select the RDZ from the drop-down, then
click OK.
10. In the Protection window, highlight the new policy and create a workflow. Associate this workflow with the new group.
NOTE: You only must configure the policy and group resources for RDZ when using policies. The workflows and actions
that are created as a result of it are kept within the policy feature and do not need any further RDZ configuration.
11. Return to the Server window and highlight Restricted Datazones. Right-click and select Properties.
12. Browse to the Clients tab. This tab now shows the clients that are associated with this RDZ. When a user belongs to an
RDZ and creates a resource, this resource is automatically set to being owned by that RDZ.
Overview
The NetWorker block based backups are high-performance backups which are supported on Windows and Linux.
During block based backups, the backup application scans a volume or a disk in a file system, and backs up all the blocks that are
in use in the file system. Block based backups use the following technologies:
● The Volume Shadow Copy Service (VSS) snapshot capability on Windows and Logical Volume Manager (LVM) and Veritas
Volume Manager (VxVM) on Linux to create consistent copies of the source volume for backups.
● The Virtual Hard Disk (VHDx), which is sparse, to back up data to the target device.
Block based backups support only the following Client Direct enabled devices as target devices:
● Advanced File Type Devices (AFTDs)
● Data Domain devices
● Cloud Boost devices
The block based incremental backups use the Change Block Tracking (CBT) driver to identify the changed blocks, and back up
only the changed blocks.
Block based full and incremental backups are fast backups with reduced backup times because the backup process backs up
only the occupied disk blocks and changed disk blocks respectively. Block based backups can coexist with traditional backups.
Block based backups provide instant access to the backups. The block based backups enable you to mount the backups by using
the same file systems that you used to back up the data.
Block based backups provide the following capabilities:
● Mounting of a backup as a file system
● Mounting of an incremental backup
● Sparse backup support
● Backups to disk-like devices
● Backups of operating system-deduplicated file systems as source volumes on Windows
● Forever virtual full backups to Data Domain
● Data Domain retention lock
● 38 incremental backups to AFTD and Cloud Boost devices
● Synthetic full backups to AFTD and Cloud Boost devices
● Backups of volumes up to 63 TB each
● NetWorker-supported devices as secondary devices for backups
● Recoveries from Data Domain without using CIFS share
● Recovery of multiple save sets in a single operation
● Setting parallel save streams if the target or destination is Data Domain
The following table lists the backup scenarios and the recovery scenarios that block based backups support.
Limitations
NetWorker's block based backups and recoveries do not support the following capabilities and configurations:
● FAT32 file system
In the case of the ALL save set backups, either unmount or remove the FAT32 volumes, and perform the backups.
● Live updates and service patches for Ubuntu 14.04 and 16.04
● Backup levels 1 through 9
● Backups of Microsoft 2012 clusters without Cluster Shared Volumes
● Incremental backups of cluster shared volumes
● Cloning of AFTD incremental backups
For block based backups to succeed, ensure that you meet the following requirements:
● Block based full and subsequent incremental backups of a client must reside on the same volume.
● As a best practice, a pool with a single device can be created and configured to hold the block based backups.
● Multiple clients configured for block based backups may share the same device, or they can each have their own device
in individual pools.
If you want to make a local AFTD a Client Direct enabled device, specify either the CIFS path or the NFS path in the Device
access information field of the Create device properties dialog box.
The "Backup Target" chapter describes how to configure devices.
● On SLES:
a. Ensure that the lsb-release package from the operating system installation media is installed.
b. Run the following command:
rpm -ivh lgtobbb-18.0.0.0-1.x86_64.rpmm
● On Ubuntu:
2. Select the following fields to enable the block based backup feature:
● Client direct (selected by default)
● Block based backup
3. [Optional] To set parallel save streams if the target or destination is Data Domain:
a. In the NetWorker Client Properties dialog box, on the Globals (1 of 2) tab, select Parallel save streams per save
set.
b. On the Apps & Modules tab, in the Save operations field, type one of the following values:
● PSS:streams_per_ss=2,*
● PSS:streams_per_ss=4,*
This is the default value.
c. To perform parallel save streams enabled backups for block based backup volumes:
i. In NMC, under Server, select User Groups.
ii. Right click Application Administrators and select Properties.
iii. In the User Group Properties Application Administrators window, under Users, add
user=system,host='hostname'.
NOTE: Consider the following notes about parallel save streams and save sets:
● When a backup contains more than four save sets, the parallel save streams value must be either greater than or
equal to the number of save sets.
● The parallel save streams per save set value is the same for all the save sets of the client, that is, you cannot set the
value of one save set to 2 and the value of another save set to 4 on the same client.
Scheduled backups
NetWorker supports block based backups for all scheduled backups.
The scheduled backup process is transparent to you and does not require any additional actions or considerations.
Incremental backups
You must perform an incremental backup of a volume only to the same device, to which a full backup of the volume was
performed.
NOTE: Incremental backups can span across multiple storage units on the same Data Domain device.
On AFTDs, selecting any backup level apart from full or incremental results in performing an incremental backup.
An incremental backup shifts to a full backup when any of the following conditions occur:
● You restart the client host for any reason when the backup is either in progress or scheduled.
● The preceding incremental backup failed.
NOTE: This condition applies only to Windows. On Linux, an incremental backup continues even if its preceding
incremental backup failed.
● You already performed 38 incremental backups to AFTD.
NOTE: After you perform a full backup, you can perform a maximum of 38 incremental backups.
● You add a volume for the backup of the ALL save set.
● You change the size of the volume.
The incremental backup process is transparent to you and does not require any additional actions or considerations.
● The client-initiated block based backup supports the full level save sets that you define only at the volume level.
● Do not name a manual snapshot with the same name as the block based backup snapshot.
If a block based backup snapshot and a manual snapshot have the same name, performing the manual snapshot deletes the
block based backup snapshot.
● Linux:
○ ALL—All the mounted volumes that the /etc/fstab file lists.
NOTE: If the ALL save set contains block based backup supported and unsupported volumes, and you specify
parallel save streams for the save set, the following types of backups will be performed:
■ Block based backup of the supported volumes, each with random parallel save streams, but not with the parallel
save streams that you specified
■ NetWorker traditional backup of the unsupported volumes
○ Volume mount points—Specify volume mount points as save sets. For example:
/<mount_point_name> (for a single mount point)
/<mount_point_name1/mount_point_name2/mount_point_name3> (for nested mount points)
To list the block based virtual full backup save sets, run the following command:
mminfo -avot -q "ssattr=*BlockBased Virtual Full"
To list the block based synthetic full backup save sets, run the following command:
mminfo -avot -q "ssattr=*Synthetic full"
2. Verify whether all the selected save sets have been successfully backed up.
NOTE: For Windows hosts only, to ensure that you use the NetWorker recover.exe command and not the Windows OS
recover command, perform one of the following tasks:
● Ensure that NetWorker_install_path\bin appears before %SystemRoot%\System32 in the $PATH
environment variable.
● When you start the recover command include the path to the binary. For example:
NetWorker_install_path\bin\recover.exe.
1. On Windows:
a. Run the following command to mount the backup and start the command prompt at the mount point:
recover.exe -w -S <save_set_ID>
Use the Windows copy option and paste option to recover the backup.
After you perform the recovery, close the command prompt to exit the process.
b. Run the following command to mount the backup and copy specific files from the input file to the destination:
recover.exe -w -S <save_set_ID> -I <input_file> -d <destination>
2. On Linux:
Ensure that you meet the following prerequisites before you perform a file level recovery:
a. You have disabled Security-Enhanced Linux (SELinux) by running one of the following relevant commands:
● setsebool -P nis_enabled 1, if you use either RHEL 7.x or CentOS 7.x
● setsebool -P allow_ypbind 1, if you use either RHEL 6.x or CentOS 6.x
b. You have installed the iscsiadm utility by installing one of the following relevant packages on the Linux client:
● iscsi-initiator-utils<version_number>.rpm, if you use either RHEL or CentOS
● open-iscsi<version_number>.rpm, if you use SLES
c. On SLES, if you want to start the iscsiadm utility for the first time, restart the iSCSI services by running the following
command:
service open-iscsi restart
b. Run the following command to mount the backup and copy specific files from the input file to the destination:
Table 148. Key options for the block based recover.exe command
Option Description
-r [volume GUID or mount point] (On Windows) Specifies the supported destinations for save set recovery on
Windows:
-r [raw device name or mount point] (On Linux)
● Volume name
● Raw pathname
● Volume GUID
● Existing mount point
● Mount point
● Raw device name
-S [save set ID or clone ID] Specifies the save set ID or the clone ID that you want to
recover.
-I [input file] Specifies a file that contains a list of files that you want to
recover. This is useful to perform the disaster and remote
recoveries.
-w Specifies the file level recovery of Block Based backup.
NOTE: The pool that you select must have a Client Direct enabled device. The pool must also be a backup clone type
pool.
● For image recoveries:
No save sets clone to clone device. Block based backups clone only full backup save sets. Block
based backups do not clone incremental backup save sets.
Block based backup failed partially, when parallel save streams To perform parallel save streams enabled backups for block
is enabled: based backup volumes:
1. In NMC, under Server, select User Groups.
9904:nsrmmdbd: access denied to media database, `SYSTEM'
on 2. Right click Application Administrators and select
`hostname' must have 'Operate NetWorker' or 'Change Properties.
Application 3. In the User Group Properties Application
Settings' privilege 90096:save: save of 'E:\' to 'hostname' Administrators window, under Users, add
failed: user=system,host='hostname'.
access denied to media database, `SYSTEM' on `hostname'
must have
'Operate NetWorker' or 'Change Application Settings' privilege
Block based backup failed partially, when parallel save streams For block based backup to succeed, ensure that the following
is enabled: requirements are met:
1. Create a separate pool.
155185:save: Successfully closed the backup session
158612:save:GUID of the current plex and previous plex for 2. The pool must contain only one backup device.
the save set 3. Perform all backups of a client on the same backup device.
'<2>C:\' are different. However if more clients are backed up, create a separate
12/11/20 10:12:55.884595 VHDx format generator successful. group. For more information about Parallel Save Streams
12/11/20 10:12:55.884595 NsrBlockSave Failed. (PSS), see Dell EMC NetWorker Performance Optimization
12/11/20 10:12:55.884595 Initiating nsrblockbase failed for Planning Guide.
save set 'C:\'.
■ Using NMC Device Properties- On an NFS share, provide the Device Access Information and the name in square
brackets. For example,
- Name- rd=[x:x:x:x:x:x:x:x]:AFTD_Device
- Device Access Information- [x:x:x:x:x:x:x:x]:/data/col1/testnfs
On a CIFS share, provide the name in square brackets. For example,
- Name- rd=[x:x:x:x:x:x:x:x]:AFTD_Device
- Device Access Information- \\x-x-x-x-x-x-x-x.ipv6-literal.net\x$
● REST API- To launch NetWorker RESTAPI using IPv6 address, the address should be enclosed in "[]" brackets. For
example, https://[x:x:x:x:x:x:x:x]:9090/nwrestapi. Here are some examples of using IPv6 addresses for
various configurations.
NOTE: "[] "should not be used in the API payloads
○ Client configuration-
○ vProxy Registration-
Standard URL strings which contain IPv6 address should be enclosed by the "[" and "]" characters.
To launch NWUI through IPv6 address, the address should be enclosed in "[]" brackets. For example, https://
[x:x:x:x:x:x:x:x]:9090/nwui.
NOTE: During NWUI installation, user can provide IPv6 address or hostname for the authentication server and NetWorker
server if they are running on a IPv6 environment.
To launch NMC using IPv6 address, the address should be enclosed in "[]" brackets. For example, https://
[x:x:x:x:x:x:x:x]:9000.
NOTE: During NMC configuration wizard, specify a list of IPv6 addresses or hostnames of NetWorker servers if they are
running on a IPv6 environment.
IPv6 only client Not supported Supported - File system (v6) Supported - File system (v6)
Not supported- NMM, NMDA Not supported- NMM, NMDA
NOTE: Clients, Storage Nodes, NDMP, Clusters is supported. NetWorker prefers to communicate over IPv4 where both
IPv4 and IPv6 communication channels exist.
pathping pwd.corp.com
pathping pwd
pathping 10.1.1.20
pathping mnd.corp.com
pathping mnd
pathping 10.1.1.10
ping pwd.corp.com
ping pwd
ping 10.1.1.20
ping mnd.corp.com
ping mnd
ping 10.1.1.10
traceroute pwd.corp.com
traceroute pwd
traceroute 10.1.1.20
traceroute mnd.corp.com
traceroute mnd
traceroute 10.1.1.10
Ensure that each ping and traceroute command succeeds. Lost packets can indicate a slow connection between
hosts. If any try to transmit a packet fails with an error message, then verify the name resolution and ensure that all
routers between the source host and destination hosts are operational.
nsrrpcinfo -p hostame_of_NetWorker_server
nsrrpcinfo -p FQDN_of_NetWorker_server
nsrrpcinfo -p IP_address_of_NetWorker_server
nsrrpcinfo -p shortname_of_destination_host
nsrrpcinfo -p FQDN_of_destination_host
nsrrpcinfo -p IP_address of the destination host
# nsrrpcinfo -p
program vers proto port
100000 2 tcp 7938 nsrportmapper
100000 2 udp 7938 nsrportmapper
390436 1 tcp 7943 nsrexecd
390435 1 tcp 9549 nsrexecd
390113 1 tcp 7937 nsrexecd
Ensure that the correct program number appears for each NetWorker process. If you do not see the correct program number or
the appropriate NetWorker ports, and a personal or external firewall exists between the source and the destination hosts, then
review the NetWorker configuration port requirements.
The EMC NetWorker Security Configuration Guide provides more information about how to configure NetWorker in a firewall
environment and the correct program numbers for each NetWorker daemon.
● AIX operating systems use one of three methods to select the name resolution search order:
○ The NSORDER environment variable.
For example, when the operating system checks the hosts file first and then DNS, the NSORDER environment variables
appears as follows:
NSORDER=local,bind4
hosts=local,bind4
NOTE: The IPv6 loopback entry must remain in the hosts file when the host exists in a pure IPv4, pure IPv6, or dual
stack configuration to ensure that localhost is resolvable. If IPv6 is enabled and ::1(IPv6 localhost) cannot be resolved,
the following error message is displayed:
Ensure that host 'hostname' is resolvable in the IPV6 enabled environment.
Shortname_of_source_host
FQDN_of_source_host
IP_address_of_source_host
Shortname_of_destination_host
FQDN_of_destination_host
IP_address_of_destination_host
NOTE: It is recommended that you resolve every name and IP address for each host three times to ensure that
successive queries return correct and consistent values.
3. Complete the following steps when the host uses multiple DNS Servers for name resolution:
a. Change the DNS Server that nslookup uses for name resolution.
C:\>nslookup
Default Server: lad.corp.com
Address: 10.5.5.10
> server 10.5.5.11
Default Server: dmd.corp.com
Address: 10.5.5.11
NOTE: It is recommended that you resolve every name and IP address for each host three times to ensure that
successive queries return correct and consistent values.
4. Use the nslookup command in interactive mode to validate reverse name resolution lookups in the reverse lookup zone
with the Primary DNS Server:
a. From a command prompt, type: nslookup.
b. In the nslookup command prompt, type:
set q=ptr
IP_address_of_source_host
IP_address_of_destination_host
Use the appropriate command to even the contents of the resolver cache:
● On AIX and HP-UX:
○ For bind 9, type:
rndc flush
If you receive this message but the requesting host requires access, then manually edit the servers file on the destination
host and add each short name and FQDN for the requesting host, on a separate line.
NOTE: After you make changes to the servers file, stop and then restart the NetWorker Server services on the host. The
NetWorker Security Configuration Guide provides more information about how to modify the servers file.
NOTE: Dell Technologies recommends that you set the FQDN as the hostname, instead of short names.
Each storage node library sends The Server network interface attribute
metadata to the NetWorker server by of Library resource must contain the
using a specific NIC on the NetWorker FQDN of the NetWorker server NIC.
server.
The Aliases attribute of the NetWorker
The metadata includes SCSI commands server Client resource must contain an
for entry for
the tape movements and the library the shortname and FQDN of each NIC.
inventory
operations that connect back to
nsrmmgd process.
Storage node The client sends backup data to a The Storage Nodes attribute of each
NetWorker storage node over a specific Client resource must contain the FQDN
NIC. of the storage node NIC.
2. Create a Client resource for the storage node. Update the Aliases attribute to include the FQDN and the shortname for
each storage node NIC. This figure shows the values in the Aliases attribute.
Figure 102. Configuring the Aliases attribute for NetWorker Storage Node Client resource
3. Update the Storage Nodes attribute for each Client resource in VLAN1 to contain the hostname of the NIC for the storage
node to which the client connects. For example, for NetWorker Client VLAN1_client, specify the storage node hostname sn1.
This figure shows the values in the Storage Nodes attribute.
4. Update the Aliases attribute for each Client resource in VLAN1 to contain the FQDN and shortname of the client. The
Server network Interface attribute must contain the hostname of the NIC for the NetWorker Server to which the client
connects. This figure shows the values in the Aliases and Server network interface attributes.
Figure 104. Aliases and Server network interface attributes for VLAN1 clients
5. Update the Storage Nodes attribute for each Client resource in VLAN2 to contain the hostname of the NIC interface for
the storage node to which the client connects. For example, for NetWorker Client VLAN2_client, specify the storage node
hostname sn2. This figure shows the values in the Storage Nodes attribute.
6. Update the Aliases attribute for each Client resource in VLAN2 to contain the FQDN and shortname of the client. The
Server network Interface must contain the hostname of the NIC interface for the NetWorker Server to which the client
connects. This figure shows the values in the Aliases and Server network interface attributes.
Figure 106. Aliases and Server network interface attributes for VLAN2 clients
7. Create the Device resource on the remote storage node by specifying either one of the hostnames for the storage node.
NIC Teaming
NIC Teaming is a term that describes the use of multiple network interfaces in parallel. NIC teaming increases the link speed
beyond the limits of any one cable or any one port and increases redundancy for higher availability.
Other terms for NIC Teaming include link aggregation, Ethernet trunk, port channel, port teaming, port trunking, link bundling,
EtherChannel, Multi-Link Trunking (MLT), and NIC bonding.
NIC Teaming at the TCP level, regardless of the protocol or algorithm used, has no effect on a single TCP session. When you
combine multiple links into a single link, the backup performance of a single session does not improve.
Depending on the algorithm used, starting parallel backup jobs with multiple NICs produces load balancing and can improve
backup performance. To achieve load balancing, use a TCP session-based link aggregation algorithm and not a host-based
algorithm. For example, use the IEEE 803.3ad/802.1ax Link Aggregation Control Protocol (LACP).
3. Enter the parameters and the values in seconds as per your network settings.
NW_TCP_KEEPIDLE_SECS=<value>
export NW_TCP_KEEPIDLE_SECS
NW_TCP_KEEPINTVL_SECS=<value>
export NW_TCP_KEEPINTVL_SECS
NW_TCP_KEEPCNT=<value>
export NW_TCP_KEEPCNT
NW_TCP_KEEPIDLE_SECS=200
export NW_TCP_KEEPIDLE_SECS
NW_TCP_KEEPINTVL_SECS=20
export NW_TCP_KEEPINTVL_SECS
NW_TCP_KEEPCNT=10
export NW_TCP_KEEPCNT
NOTE: You must restart the NetWorker services for the changes to take effect.
NOTE: You must restart the system for the changes to take effect.
After the iteration on all the entries is complete for the first attempt, the same
operations
are performed on the next retry and the timeout is 4 seconds. The timeout for the
third, fourth,
and fifth retry attempts are 8 seconds, 16 seconds, and 32 seconds respectively.
The TCP
retry attribute is dependent on the Multi-subnet attribute. It takes effect only
when the
Multi-subnet state attribute is set to enabled.
Restart the NetWorker services after this attribute is updated. The default value
is 5 and the
maximum supported value is 25.
For more information on deploying NetWorker Virtual Edition, see NetWorker Virtual Edition Installation Guide.
NOTE: For more details on Support website, see the Preface section of the NetWorker Administration Guide.
Troubleshooting 629
Determining the version of NetWorker software running on a client
To determine the version of the NetWorker software running on a client, use either the client properties window in NMC, the
NetWorker User program on Windows or the nsradmin command.
630 Troubleshooting
NetWorker Server log files
This section provides a summary of the log files available on a NetWorker Server and log file management.
Windows:
● C:\Program Files\EMC
NetWorker\nsr\logs\client_fix
● C:\Program Files\EMC
NetWorker\nsr\logs\client_fix.ra
w
Windows:
C:\Program Files\EMC
NetWorker\nsr\logs\messages
NetWorker Log file name and location that is defined by the UNIX only, OS log file.
Servergenerated syslog system log configuration file. NOTE: NetWorker does not modify
the syslog.conf file to configure
messages
local0.notice and local0.notice and local0.alert.
local0.alert Vendor specific documentation describes
how to configure local0.notice and
local0.alert
Index log UNIX: Contains warnings about the size of the client file
index and low disk space on the file system that
/nsr/logs/index.log contains the index files. By default, the Index
size notification on the NetWorker Server sends
Windows: information to the log file.
C:\Program Files\EMC
NetWorker\nsr\logs\index.log
Windows:
Troubleshooting 631
Table 155. NetWorker Server log files (continued)
Component File name and default location Description
C:\Program Files\EMC
NetWorker\nsr\logs\hyperv-flr-
ui\hyperv-flr-ui.log
Windows:
C:\Program Files\EMC
NetWorker\nsr\logs\Policy\VMware_pro
tection_policy_name
Policies UNIX: Contains completion information about VMware
Protection Policies. By default, the VMware
/nsr/logs/policy.log Protection Policy Failure notification on the
NetWorker Server sends information to the log
Windows: file.
C:\Program Files\EMC
NetWorker\nsr\logs\policy.log
Windows:
C:\Program Files\EMC
NetWorker\nsr\logs\recover\recover_co
nfig_name_YYYYMMDDHHMMSS
Package Manager log UNIX: Contains information that is related to the
Package Manager and the nsrpush command.
/nsr/logs/nsrcpd.raw Use the nsr_render_log program to view the
contents of the log file.
632 Troubleshooting
Table 155. NetWorker Server log files (continued)
Component File name and default location Description
Windows:
C:\Program Files\EMC
NetWorker\logs\nsrcpd.raw
Windows:
C:\Program Files\EMC
NetWorker\logs\rap.log
/nsr/logs/
NetWorker_server_sec_audit.raw
Windows:
C:\Program Files\EMC
NetWorker\logs\Networker_server_sec
_audit.raw
NMC server database Linux: Contains the results of the NMC server database
conversion conversion that is performed during an upgrade
/opt/lgtonmc/logs/gstdbupgrade.log operation.
Windows:
C:\Program Files\EMC
NetWorker\Management\logs\gstdbupgr
ade.log
NMC web server Linux: Contains messages for the embedded Apache
httpd web server on the NMC server.
/opt/lgtonmc/management/logs/
web_output
Windows:
C:\Program Files\EMC
NetWorker\Management\logs\web_outpu
t
Troubleshooting 633
Table 156. NMC server log files (continued)
Component File name and default location Description
NMC server database Linux: Contains messages for the embedded
log files PostgreSQL database server on the NMC server.
/opt/lgtonmc/management/nmcdb/
pgdata/db_output
Windows:
C:\Program Files\EMC
NetWorker\Management\nmcdb\pgdata\d
b_output
634 Troubleshooting
Table 157. Client log files (continued)
Component File name and default location Description
CloudBoost - CloudBoost Appliance The following log files in the /nsr/logs/ These files appear on the CloudBoost
cloudboost directory: appliance and contain information about
operations performed on a CloudBoost
MagFS.log.ERROR.date- device. The severity of the message
timestamp.pid.txt determines which log file that error
MagFS.log.FATAL.date- message is written to.
timestamp.pid.txt The maximum size of the log files are 100
MagFS.log.INFO.date- MB.
timestamp.pid.txt When the maximum size is reached, the
nsrmmd
process starts an automatic trimming
mechanism,
which renames and compresses the log
file. The
maximum number of versions for a file is
10. When
the number of renamed log files reaches
the
maximum version value, NetWorker
removes the
oldest log when a new version of the log
file is
created.
Troubleshooting 635
View log files
NetWorker sends messages to two types of logs. Plain text log files that are saved with the .log extension and unrendered log
files that are saved with the .raw extension.
The .log files and the messages that appear in NMC use the locale setting of the service that generates the log message. To
view the contents of .log files, use any text editor. Before you can view .raw files in a text editor, render the .raw file into
the locale of the local computer. You can use the nsr_render_log command manually render the raw log files or you can
configure NetWorker to render the log files at runtime.
The nsr_render_log command renders internationalized NetWorker log files in to the current locale of the host that the
user uses to run the program. All other log files, as well as messages displayed in NMC, use the locale of the service that is
generating the log message. The nsr_render_log program is non-interactive. Use command line options to specify the log
file that you want to view and the format of the output. The nsr_render_log program sends the results to stdout. You can
redirect and save the output to a file.
636 Troubleshooting
where devicename is the name of the device.
● To render only the most recently logged messages, type: nsr_render_log -c -empathy -B number
raw_filename 1>output_filename 2>&1
where number is the number of lines that you want to render.
The NetWorker Command Reference Guide provides detailed information about the nsr_render_log program and the
available options.
● To render a .raw file and only view certain messages severities, type: nsr_render_log -c -empath -Y
message_severity 1>output_filename 2>&1
where message_severity is one of the severity types listed in the following table.
The UNIX man page and the NetWorker Command Reference Guide provides detailed information about the
nsr_render_log program and the available options.
nsradmin -p nsrexec
For example, on a Windows NMC server, output similar to the following appears:
nsradmin> print
type: NSR log;
administrator: Administrators,
"group=Administrators,host=bu-iddnwserver.iddlab.local";
owner: NMC Log File;
maximum size MB: 2;
maximum versions: 10;
Troubleshooting 637
runtime rendered log: ;
runtime rollover by size: Disabled;
runtime rollover by time: ;
name: gstd.raw;
log path: \
"C:\\Program Files\\EMC NetWorker\\Management\\GST\\logs\\gstd.raw";
5. To define the path and file name for the rendered log file, use the Runtime rendered log attribute.
For example, to save rendered messages to the file rendered.log in the default NetWorker logs directory on a Windows
host, type:
update runtime rendered log: "C:\\Program Files\\EMC NetWorker\\nsr\\logs\\rendered.log"
638 Troubleshooting
NetWorker enables you to customize the maximum file size, maximum number of file versions, and the runtime rollover of the
daemon.raw, gstd.raw, networkr.raw, and Networker_server_sec_audit.raw files. Use the nsradmin program
to access the NSRLA database, and modify the attributes that define how large the log file becomes before NetWorker trims or
renames the log file.
The following table describes the resource attributes that manage the log file sizes.
Table 159. Raw log file attributes that manage log file size
Attribute Information
Maximum size MB Defines the maximum size of the log files.
Default: 500 MB
The accepted range for the attribute is 500 MB to 4000 MB. If the value is less
then 500 MB, the default value is considered.
Maximum versions Defines the maximum number of the saved log files.
When the number of copied log files reaches the maximum version value,
NetWorker removes the oldest log when a new copy of the log file is created.
Default: 10
Runtime rollover by size When set, this attribute invokes an automatic hourly check of the log file size.
Default: disabled
Runtime rollover by time When set, this attribute runs an automatic trimming of the log file at the
defined time, regardless of the size. The accepted formats for the variable are:
HH:MM (hour:minute), day
in the week (Sunday to Saturday), and N day every month (N must be
in the range 1-31). The rollover based on the day in the week and the day in
the month happens in the first hour of the appropriate day.
When you configure the runtime rendered log attribute, NetWorker trims the
runtime rendered log file and the associated .raw file simultaneously.
Default: undefined
NOTE: After setting this attribute, restart NetWorker services for the change
to take effect.
How the trimming mechanism trims the log files differs depending on how you define the log file size management attributes.
The following table summarizes the trimming behavior.
Table 160. Raw log file attributes that manage the log file trimming mechanism
Attribute configuration Trimming behavior
When you configure runtime rollover by time or runtime ● NetWorker copies the contents of the existing
rollover by size log file to a new file with the naming
convention:daemondate_time.raw
● NetWorker truncates the existing daemon.raw to 0 MB.
NOTE: When this mechanism starts on a NetWorker
Server that is under a heavy load, this process may take
some time to complete.
When you do not configure runtime rollover by time or runtime ● NetWorker checks the log file size when the nsrexecd
rollover by size process starts on the computer.
● When the log file size exceeds the size that is defined by
the maximum size MB attribute, NetWorker renames the
Troubleshooting 639
Table 160. Raw log file attributes that manage the log file trimming mechanism (continued)
Attribute configuration Trimming behavior
existing log file to log_file_name_date_time.raw
then creates a new empty log file.
NOTE: When the nsrd daemon or NetWorker Backup
and Recover Server service runs for a long time, the size
of the log file can become much larger than the value
defined by maximum size MB.
Managing raw log file size for the daemon.raw, networkr.raw, and gstd.raw
files
To configure the NetWorker software to rollover the .raw file by time, perform the following steps.
1. Log in to the NetWorker host with root on UNIX or Administrator on Windows.
2. To access the NSRLA database, use the nsradmin program:
nsradmin -p nsrexec
For example, on a Windows NMC server, output similar to the following appears:
nsradmin> print
type: NSR log;
administrator: Administrators,
"group=Administrators,host=bu-iddnwserver.iddlab.local";
owner: NMC Log File;
maximum size MB: 500;
maximum versions: 10;
runtime rendered log: ;
runtime rollover by size: Disabled;
runtime rollover by time: ;
name: gstd.raw;
log path: \
"C:\\Program Files\\EMC NetWorker\\Management\\GST\\logs\\gstd.raw";
640 Troubleshooting
6. Update the runtime rollover by time attribute with the time that you want to rollover the log file.
For example:
● To configure the gstd.raw file to rollover at 12:34 AM, type:
Troubleshooting 641
Where filename is the name of the text file that NetWorker uses to store the troubleshoot messages.
3. After you collect the necessary troubleshoot information, perform the following steps:
a. Stop the NetWorker processes by using the nsr_shutdown command.
b. Restart the processes by using the NetWorker startup script:
● On Solaris and Linux, type:
/etc/init.d/networker start
● On HP-UX, type:
/sbin/init.d/networker start
● On AIX, type:
/etc/rc.nsr
642 Troubleshooting
Starting the NMC server daemon in troubleshoot mode using environment variables
Use environment variable to put the gstd daemon in troubleshoot mode when you cannot access the NMC GUI.
then
/etc/init.d/gst start
● AIX: Type:
/etc/rc.gst start
then
/etc/rc.gst stop
Troubleshooting 643
NOTE: If you do not see the PID for each process on the Process tab, browse to View > Select Columns, and
then select PID (Process Identifier)
● On UNIX, use the ps command. For example, to get a list of all the NetWorker processes that start with nsr, type ps
-ef | grep nsr.
2. From a command prompt, type:
dbgcommand -p PID -Debug= x
where:
● PID is the process id of the process.
● x is a number between 0 and 9.
NOTE: 0 turns off troubleshoot.
1>filename
2>&1
where:
● x is a number between 1 and 99.
● file_sytem_objects is the name of the files or directory to backup.
● filename is the name of the file that stores the troubleshoot information.
NOTE: The NetWorker Command Reference Guide provides detailed information about all the available backup options and
how to use the save command.
644 Troubleshooting
Running Recoveries in troubleshoot mode
You can configure NetWorker to log verbose output for recoveries when you Recovery wizard, perform Windows disaster
recoveries and by using the recover command.
2. To create or modify the recover job, use the Recovery wizard. On the Select the Recovery Options window, select
Advanced Options.
3. In the Debug level attribute, select a troubleshooting level between 0 and 9.
4. Complete the remaining steps in the Recovery Wizard.
NetWorker logs the troubleshoot recovery information to the recover log file.
where:
● nw_server.corp.com is the name of the NetWorker server.
● mnd.corp.com is the name of the source NetWorker client.
3. Confirm that the nsrd process can schedule the recover job:
Troubleshooting 645
a. Update the Recover resource to start the recover job:
update: name: recover_resource_name ;start time: now
where recover_resource_name is the name of the Recover resource.
b. Exit the nsradmin application
c. Confirm that the nsrtask process starts.
If the nsrtask process does not start, the review the daemon.raw file on the NetWorker server for errors.
4. To confirm that the NetWorker server can run the recover command on the remote host, on the NetWorker server type
the following command:
Where jobid is the jobid of the Recover job that you want to review.
NOTE: Review the daemon.raw file on the NetWorker server to obtain the jobid for the recovery operation.
646 Troubleshooting
Figure 108. WinPE registry key to troubleshoot recoveries
where:
● x is a number between 1 and 99.
● file_sytem_objects is the name of the files or directory to recover.
● filename is the name of the file that stores the troubleshoot information.
NOTE: The NetWorker Command Reference Guide provides detailed information about all the available recovery options
and how to use the recover command.
Troubleshooting 647
NetWorker Authentication Service logs
This section provides an overview of the log files that are available for the NetWorker Authentication Service.
Windows:
C:\Program Files\EMC
NetWorker\nsr\authc\tomcat\logs\authc-server.log
Refer to the Apache website for detailed information about the Apache Tomcat log files.
648 Troubleshooting
NetWorker Authentication Service server log file management
NetWorker Authentication Services uses the Apache log4j API to manage log files. To modify how NetWorker Authentication
Services manage the authc-server.log log file, edit the log4j.properties file:
● UNIX: The log4j.properties file is located in /nsr/authc/webapps/auth-server/WEB-INF/classes.
● Windows: The file is located in C:\Program Files\EMC\authc-server\tomcat\webapps\auth-server\WEB-
INF\classes.
This section describes how to modify the commonly used log attributes in the log4j.properties file. Apache documentation
provides more detailed information about each attribute in the log4j.properties file.
Modifying the The rootLogger.level= attribute defines the level of logging that the NetWorker Authentication Service
logging level writes to the log files and where the messages appear. By default, the NetWorker Authentication Service
sets the logging level to warn and messages appear in the log files, stdout, and in the Java application,
There are five standard log levels: debug, info, warn, error, and fatal.
To change the logging level to error, modify the rootLogger.level= attribute to appear as follows:
rootLogger.level=error
Modifying the The appender.app.policies.size.size attribute defines the maximum size of the authc-server.log file.
maximum log file When the log file reaches the maximum size, NetWorker Authentication Service renames the log file for
size archival purposes and creates log file. By default, NetWorker Authentication Service sets the maximum
size to 2000 KB.
To increase the size of the log file to 5MB, modify the appender.app.policies.size.size attribute to appear
as follows: appender.app.policies.size.size=5MB
Modifying the The appender.app.strategy.max attribute defines the number of authc-server.log rollover log files
number of that the NetWorker Authentication Service maintains. When the size of the authc-server.log
rollover log files reaches the maximum file size value, NetWorker Authentication Service copies the contents of the log file
to a new log file with the naming convention authc-server-incrementalNumber.log. By default,
NetWorker Authentication Service maintains 10 rollover log files.
To increase the number of rollover log files by 4, modify the appender.app.strategy.max attribute to
appear as follows: appender.app.strategy.max=14
Modifying the The rootLogger.level= attribute defines the level of logging that the NetWorker Authentication Service
logging level writes to the log files and where the messages appear. By default, the NetWorker Authentication Service
sets the logging level to warn and messages appear in the log files, stdout, and in the Java application,
There are five standard log levels: debug, info, warn, error, and fatal.
To change the logging level to error, modify the rootLogger.level= attribute to appear as follows:
rootLogger.level=error
Modifying the The appender.app.policies.size.size attribute defines the maximum size of the authc-cli.log file.
maximum log file When the log file reaches the maximum size, NetWorker Authentication Service renames the log file for
size archival purposes and creates a log file. By default, NetWorker Authentication Service sets the maximum
size to 100 KB.
To increase the size of the log file to 2MB, modify the appender.app.policies.size.size attribute to appear
as follows: appender.app.policies.size.size=2MB
Troubleshooting 649
Modifying the The appender.app.strategy.max attribute defines the number of authc-cli.log rollover log files that
number of the NetWorker Authentication Service maintains. When the size of the authc-cli.log reaches the
rollover log files maximum file size value, NetWorker Authentication Service copies the contents of the log file to a new
log file with the naming convention authc-cli-incrementalNumber.log. By default, NetWorker
Authentication Service maintains 10 rollover log files.
To increase the number of rollover log files to 4, modify the appender.app.strategy.max attribute to
appear as follows: appender.app.strategy.max=4
Improper font size for the Client wizard with Netscape on Solaris
When you use the Netscape browser on Solaris, the font size of the Client wizard may appear too small.
To change the font type and size:
1. Open the /usr/bin/nwwiz script file in a text editor.
2. Edit the following line to change the font size:
NSR_WIZARD_FONT_SIZE=size
3. Save and close the nwwiz file.
650 Troubleshooting
nsrexecd GSS critical An authentication request from NetWorker_server was denied. The 'NSR
peer information' provided did not match the one stored by Windows_host. To accept this
request, delete the 'NSR peer information' resource with the following attributes from
Windows_host's NSRLA database: name: NetWorker_server; NW instance ID: instance_id; peer
hostname: NetWorker_server
To resolve this issue, delete the NSR Peer Information resource for the NetWorker server on the Windows host.
The Certificate window displays a list of NSR Peer Information resources stored in the nsrexec database on the host.
3. In the Certificate pane, right-click the certificate that you want to delete, and then select Delete.
4. When prompted to confirm the delete operation, select Yes.
If you receive the error, User username on machine hostname is not on administrator list, you cannot
modify the resource until you configure the NSRLA access privileges on the target host. The section "Configuring NSRLA
access privileges" provides more information.
The target host creates a new NSR Peer Information resource for the initiating host the next time that the initiating host
attempts to establish a connection with the target host.
2. Set the query type to the NSR Peer Information resource of the initiating host:
. type: nsr peer information;name:initiating_host_name
Troubleshooting 651
show
4. Print the attributes for the NSR Peer Information resource and confirm that the name and peer hostname attributes
match the hostname of the initiating host:
print
delete
The target host creates a new NSR Peer Information resource for the initiating host the next time that the initiating host
attempts to establish a connection with the target host.
Clone ID timestamp does not reflect the time the clone was
created
To guarantee that the cloned save sets that NetWorker creates on different storage nodes do not have the same timestamp,
the NetWorker software assigns a timestamp to cloned save sets that does not reflect the actual time that NetWorker creates
the clone.
652 Troubleshooting
media warning: /dev/rmt2.1 moving: fsr 15: I/O error
media emergency: could not position jupiter.007 to file 44, record 16
If the server can find the correct position, media verification succeeds and a successful completion message appears:
media info: verification of volume "jupiter.007" volid 30052 succeeded.
If this message appears, specify a block size that is greater than or equal to 32.
To resolve this issue, ensure that you recover indexes to the original location then move the indexes to another directory.
Moving a client file index describes how to move indexes to another directory.
Troubleshooting 653
Inaccessible object exception error when launching NMC with Java
9
When you are running NMC with Java 9, your system displays a number of InaccessibleObjectException errors for
JButton and BasicSplitPaneUI objects in Console logs. You need to add JVM option --illegal-access=permit in Java
Control Panel of Java 9 to avoid InaccessibleObjectException errors, when launching NMC.
The updated entry, with a desktop heap allocation of 1024 KB appears as:
%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows
SharedSection=1024,3072,1024 Windows=On SubSystemType=Windows
ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3
ServerDll=winsrv:ConServerDllInitialization,2 ProfileControl=Off
MaxRequestThreads=16
Hostname aliases
When you incorrectly define an alias for a client, the backup fails. Under certain conditions, such as improperly configured DNS
servers or hosts files, the NetWorker software does not create any aliases for a new client. If you use TCP/IP, ensure that you
specify the hostname and the fully qualified domain name (FQDN) for a client in Aliases field of the client properties window.
When the alias field is incorrectly defined you can see the following behavior:
● Backup operations for the client fail with the following error message:
No Client resource for client_name
● NetWorker always performs backups for a client at a level full, regardless of the level of the scheduled backup.
● Automatic index management, as set up in the browse and retention policies, does not work.
● The /nsr/index directory, which contains the indexes for all the clients that are configured on the NetWorker server
contains two directories for the same client, but each directory uses a different client name.
You must update the alias field for a client to include all hosts names for the client in the following situations:
● When a host have two or more network interfaces.
654 Troubleshooting
● When sites use a mixture of short and FQDNs for the same servers, for example, mars and mars.jupiter.com.
● When the datazone uses both (Network Information Services (NIS) and DNS.
NOTE: Do not include aliases that are shared by other hosts in the datazone.
This message indicates that NetWorker has not previously performed a back up of the specified save set. Before you can
perform an incremental or level backup on a save set, perform a full backup of the save set.
If a level full backup exists for this save set, this error message can appear in the following situations:
● The clocks on the client and server are not synchronized.
● The savegrp session begins before midnight and ends after midnight.
● Multiple client ids exist for the client.
Troubleshooting 655
scanner: ssid 25312: scan complete
scanner: ssid 25312: 91 KB, 13 file(s)
scanner: done with file disk default.001
To resolve this issue, use the nsrck -L2 clientname to create a client file index for the client, then try the scanner
command again.
If the command does not resolve the index corruption, refer to Adding information about recyclable save sets to the client file
index on page 382 for more information.
Aborting a recovery
When you stop a recovery operation on a client, the following could occur:
● The recovery might stop immediately.
● The recover program will display a list of the files that were not recovered.
● Messages similar to the following appears, which indicates that the recovery operation did not stop cleanly:
Recover: ***Canceled***
Recover: Unable to read checksum from save stream
Recover: error recovering C:\WINDOWS\CURSORS\APPSTART.ANI
Didn't recover requested file C:\WINDOWS\CURSORS\APPSTART.ANI
656 Troubleshooting
Cannot create directory directory
This error message appears when you attempt to relocate data to a directory that does not exist on the target host. You can
ignore this message. The recovery process creates the new directory and completes successfully.
cp recovered_filename zero_filled_filename
Troubleshooting 657
NOTE: Ensure that you have enough free disk space to accommodate a duplicate of each copied sparse file.
This can occur when the backup operation does not write any data to the backup media during the compression operation and
time the backup is idle reaches the time that is specified by the group Inactivity Timeout attribute. To resolve this issue, increase
the Inactivity Timeout attribute for the backup group.
To help determine an adequate timeout limit:
1. Set the Inactivity Timeout value to zero. A value of zero results in no timeout limit.
2. Determine the time that the backup requires to complete a full save of the file system, and specify this time as the inactivity
timeout limit.
For example, if the save set field contains E:\ and you rename the E:\test directory to E:\test1, NetWorker does
not back up the E:\test1 directory when you enable Backup renamed directories. When the save set field contains E:
\test and you rename the E:\test directory to E:\test1, NetWorker performs a backup of the E:\test1 directory
when you enable Backup renamed directories.
658 Troubleshooting
Follow these steps to ensure that NetWorker uses the appropriate hostname for an IP address, and to ensure that you properly
configure the hosts file and routing table on the host:
● Set up DNS to associate each IP address with a separate name.
● Configure the hosts file and routing table on each host that has multiple NICs with the appropriate IP address.
● Configure NetWorker to use the names that you configured in the DNS and hosts file.
Troubleshooting 659
To resolve the issue, ensure that the backup start time of the virtual server and the physical node is different.
Unable to obtain root job list: Unable to accept message bus block, while expecting
basic-consume method, received another method.: Message bus encountered library
exception: (unknown error)
In addition, the gstd.raw file had messages indicating that there is an error with the RabbitMQ server.
gstd NSR warning nsm: Initial jobs info RPC failed for server: <NetworkerServer> - Check
if RabbitMQ server is running!
This can occur if RPC communication with the RabbitMQ server fails because of missing exchanges such as amq.direct,
amq.fanout, amq.headers, amq.match, and so on.
To resolve the issue, do the following:
1. Shutdown NetWorker.
2. From the command prompt, type the following command to go to the directory that contains the RabbitMQ files:
● Windows: cd C:\Windows\system32\config\systemprofile\AppData\Roaming
● Linux: /opt/nsr/rabbitmq-server-3.7.16/var
3. Type ren RabbitMQ RabbitMQ.v01 to save the existing RabbitMQ directory.
4. Start NetWorker.
After NetWorker starts, new RabbitMQ files are created.
● Windows: C:\Windows\system32\config\systemprofile\AppData\Roaming\RabbitMQ
● Linux: /opt/nsr/rabbitmq-server-3.7.16/var
To verify if the missing exchanges are present, run the following commands:
Windows:
% set ERLANG_HOME=C:\PROGRA~1\EMCNET~1\nsr\rabbitmq-server-3.7.16
% set HOMEPATH=\Windows
% rabbitmqctl report
Linux:
This error is resolved automatically after about an hour. There is no action required from the user.
660 Troubleshooting
NetWorker locale and code set support
The NetWorker software does not support locales that are defined by the operating system or code sets that remap characters,
which have a special meaning for file systems. Depending on the file system, the special characters may include the slash (/),
the backslash(\), the colon (:), or the period(.). De_DE.646 is an example of one unsupported locale.
The NetWorker software might not function normally after you change the locale to an unsupported locale. Client file indexes
that were created in a supported locale can become inaccessible.
Troubleshooting 661
Network and server communication errors
This section provides general, UNIX and Windows network and communication issues that you may encounter in a NetWorker
environment.
The errors that are encountered during registering a new client are as follows:
● The NetWorker sever and client running on the same box- During the registration of the client, register for the client
hostname and not for the client IP address. If the Client IP is registered, then during recovery, based on client IP address,
recovery doesn't display the backed up save set list in the browse tab.
● Networker server and client running on different box- Client IP address can be registered and recovery also proceeds
without any issues.
To help ensure successful communication between NetWorker clients and servers,
each NetWorker host configured must not have any invalid or inactive IP addresses stored in the hostname resolution service
(DNS, NIS, Active Directory, hosts file, and so on). Each IP address that maps to a host must have a configured network
interface (NIC).
Ignore the message, and continue to add the client to the UNIX server. To avoid the message, add the UNIX server hostname to
the servers file on the client after you add the client to the UNIX server.
To resolve this issue, add all of the server aliases that are related to any additional network interfaces to the alias list of Client
resource for the NetWorker server.
662 Troubleshooting
Remote recover access rights
You can control client recover access with attributes in the Client resource. The Remote Access attribute displays a list of the
users that can recover save sets for a client. Add or remove user names depending on the level of security the files require.
NOTE: If you type a hostname or host=hostname in the Remote Access attribute, you allow any user on that host to
recover files for the client. To enter a username without specifying the host, type user=name.
The following users have permission to recover any files on any client, regardless of the users who are listed in the Remote
Access attribute:
● ‘Root’ user on a UNIX host
● Member of the ‘Administrators’ local group on a Windows host
● Members of a ‘Application Administrator’ User group on the NetWorker Server
● Members of a NetWorker Server User group that has the ‘Change Security Settings’ privilege
Other users can only recover files for which they have read permission, which is based on file permissions at the time of backup.
Files recovered by a user other than root, operator, or the operator group are owned by that user.
NOTE: If you are using DHCP, use a static IP address for the NetWorker server.
These messages indicate that one or more NetWorker services are not running on the NetWorker server. The following table
summarizes the startup commands that you can use to startup the services on a UNIX NetWorker server.
Troubleshooting 663
Table 162. NetWorker Startup commands
Operating system Startup command
Solaris, Linux /etc/init.d/networker start
AIX /etc/rc.nsr
664 Troubleshooting
NOTE: DCC feature works only when both NetWorker server and storage nodes are on 19.3 and later version. Starting with
NetWorker 19.3, the default value of DCC interval is 3 minutes.
To set storage node in NMC, select Storage node properties in the Configuration tab (Diagnostic mode).
Troubleshooting 665
Figure 112. NMC Storage Node Settings
DCC can be enabled or disabled based on the settings of server and storage Node.
Table 163. Enabling and Disabling DCC based on Server and Storage node settings
DCC check on server DCC check on storage node Resultant DCC
On Off Off
On On On
Off On/Off Off
Interval 1 Interval 2 Whichever is greater
When DCC identifies any unreachable device due to various reasons, it moves the device to suspected state and it sets two
attributes Suspected device and Suspected mark time.
● Suspected device and suspect time attributes are set when the device state is changed to suspected state from normal
state and these attributes are cleared when the device is available.
● If there is any device that is in suspected state and is moved to service mode manually, suspected flag is cleared off and
there won't be any DCC check on that going forward. DCC starts checking this device only if it again moves to enabled
state.
NOTE: If you manually delete the newdotnet.dll file, the system will become unusable.
666 Troubleshooting
Glossary
This glossary provides definitions for terms used in this guide.
A
access control list (ACL)
List that specifies the permissions assigned to a specific file or directory.
, See administrator.
active group
NetWorker backup group that has its Autostart attribute enabled.
administrator
Person who normally installs, configures, and maintains software on network computers, and who adds users and defines user
privileges.
Administrators group
Microsoft Windows user group whose members have the rights and privileges of users in other groups, plus the ability to create
and manage the users and groups in the domain.
agent
Term used by Sun Microsystems to denote a cluster server. Also known as a package (HP-UX), and a virtual server (Microsoft).
annotation
1. Comment associated with an archive save set.
2. Comment associated with an event.
archive
Process that backs up directories or files to an archive volume to free up disk space for regular backups. Archived data is not
recyclable. , See groom.
archive request
NetWorker resource used to schedule and manage archiving.
archive volume
Volume used to store archive data. Archive data cannot be stored on a backup volume or a clone volume.
attribute
Name or value property of a resource.
authentication
Process by which a user or software process is determined to be trusted or not trusted.
authorization
Privileges assigned to users.
Glossary 667
authorization code
Unique code that in combination with an associated enabler code unlocks the software for permanent use on a specific host
computer. , See license key.
autochanger
, See library.
B
backup
1. Duplicate of database or application data, or an entire computer system, stored separately from the original, which can be
used to recover the original if it is lost or damaged.
2. Operation that saves data to a volume for use as a backup.
backup cycle
Full or level 0 backup and all the subsequent incremental backups that are dependent on that backup.
backup volume
A volume used to store backup data. NetWorker backup data cannot be stored on an archive volume or a clone volume.
bootstrap
Save set that is essential for disaster recovery procedures. The bootstrap consists of three components that reside on the
NetWorker server: the media database, the resource database, and a server index.
browse policy
NetWorker policy that specifies the period of time during which backup entries are retained in the client file index. Backups
listed in the index are browsable and readily accessible for recovery.
C
canned report
Preconfigured report that can be tailored by the user.
carousel
, See library.
client
Host on a network, such as a computer, workstation, or application server whose data can be backed up and restored with the
backup server software.
client-initiated backup
, See manual backup.
668 Glossary
Client resource
NetWorker server resource that identifies the save sets to be backed up on a client. The Client resource also specifies
information about the backup, such as the schedule, browse policy, and retention policy for the save sets.
clone
1. Duplicate copy of backed-up data, which is indexed and tracked by the NetWorker server. Single save sets or entire volumes
can be cloned.
2. Type of mirror that is specific to a storage array.
clone volume
Exact duplicate of a backup or archive volume. NetWorker software can index and track four types of volumes (backup, archive,
backup clone, and archive clone). Save sets of these different types may not be intermixed on one volume. Clone volumes may
be used in exactly the same way as the original backup or archive volume.
cluster
Group of linked virtual or physical hosts, each of which is identified as a node, with shared storage that work together and
represent themselves as a single host.
connection port
Port used to perform functions through a firewall.
Console server
, See NetWorker Management Console (NMC).
consolidate
To create a full backup by merging a new level 1 backup with the last full level backup.
control zone
Group of datazones managed by the NetWorker software.
conventional storage
Storage library attached to the NetWorker server or storage node, used to store backups or snapshot backups. Also known as
secondary storage. , See primary storage.
D
daemon
Process on UNIX systems that runs in the background and performs a specified operation at predefined times or in response to
certain events.
database
1. Collection of data arranged for ease and speed of update, search, and retrieval by computer software.
2. Instance of a database management system (DBMS), which in a simple case might be a single file containing many records,
each of which contains the same set of fields.
Glossary 669
data management application (DMA)
Application that manages a backup or recovery session through an NDMP connection.
datazone
Group of clients, storage devices, and storage nodes that are administered by a NetWorker server.
deduplication backup
Type of backup in which redundant data blocks are identified and only unique blocks of data are stored. When the deduplicated
data is restored, the data is returned to its original native format.
destination client
Computer to which database files are restored in a directed recovery.
device
1. Storage folder or storage unit that can contain a backup volume. A device can be a tape device, optical drive, autochanger,
or disk connected to the server or storage node.
2. General term that refers to storage hardware.
3. Access path to the physical drive, when dynamic drive sharing (DDS) is enabled.
Device Central
Interface from which one can manage all NetWorker libraries.
DFS component
1. A namespace for files and DFS links, called a DFS root.
2. A connection to a shared file or folder, called a DFS child node.
, See distributed File System (DFS).
directed recovery
Method that recovers data that originated on one client host and re-creates it on a different client host, known as the
destination client.
directive
Instruction that directs NetWorker software to take special actions on a given set of files for a specified client during a backup
or recovery operation. Directives are ignored in manual (unscheduled) backups.
disaster recovery
Restore and recovery of data and business operations in the event of hardware failure or software corruption.
670 Glossary
document mode
Display mode that presents static reports such as charts or tables in a format that resembles the Print Preview mode in a PDF
viewer.
drill-down
Organization of report information by granularity. For example, within a group summary report, a client report may be viewed,
and then a report for a selected save set for that client.
drive
Hardware device through which media can be read or written to. , See device.
E
enabler code
Unique code that activates the software:
● Evaluation enablers or temporary enablers expire after a fixed period of time.
● Base enablers unlock the basic features for software.
● Add-on enablers unlock additional features or products, for example, library support.
, See license key.
enterprise
Computers and folders organized into a tree-based visual representation.
event
Notification generated by an application that could require user action, such as the impending expiration of a software enabler
key that appears in the daemon log of the Console server.
event-based backup
, See probe-based backup.
exit code
Indicator that specifies whether a backup or recovery session succeeded. An exit code of zero (0) indicates the session
completed successfully. A nonzero exit code indicates that the session did not complete successfully.
expiration date
Date when a volume changes from read/write to read-only.
F
file index
, See client file index.
file system
1. Software interface used to save, retrieve, and manage files on storage media by providing directory structures, data transfer
methods, and file association.
Glossary 671
2. Entire set of all files.
3. Method of storing files.
firewall
Security software designed to prevent unauthorized access to or from a private network.
folder
An icon on a computer screen that can be used to access a directory.
full backup
Type of backup that backs up all data objects or files, including the transaction logs contained in databases, regardless of when
they last changed. , See level.
G
generic services toolkit (GST)
Software framework that underlies the Console server.
groom
Process that removes the original files from a local disk after a successful archive operation.
group
One or more client computers that are configured to perform a backup together, according to a single designated schedule or
set of conditions.
H
hash
Number generated from a string of text that is used to encrypt a user password. , See salted hash.
heterogeneous network
Network with systems of different platforms and operating systems that interact across the network.
high-availability system
System of multiple computers configured as cluster nodes on a network that ensures that the application services continue
despite a hardware or software failure. Each cluster node has its own IP address with private resources or disks that are
available only to that computer.
high-water mark
Percentage of disk space that, when filled, automatically starts the staging process.
host
Computer on a network.
host authentication
Encryption and verification services between NetWorker hosts. , See user authentication.
host ID
Eight-character alphanumeric number that uniquely identifies a computer.
hostname
Name or address of a physical or virtual host computer that is connected to a network.
672 Glossary
I
inactivity timeout
Time in minutes to wait before a client is considered to be unavailable for backup.
incremental backup
, See level.
insertion time
Time that the save set record was most recently introduced into the save set database.
Interactive mode
Console mode that displays reports (as charts or tables) that users can interact with. For example, one can sort, rearrange, and
resize columns in a table-format report that was run in this mode.
Internationalization (I18N)
Process of adapting software to accept input and output of data in various languages and locales.
J
JAR (Java Archive)
A file that contains compressed components needed for a Java applet or application.
Java
Type of high-level programming language that enables the same, unmodified Java program to run on most computer operating
systems. , See Java Virtual Machine (JVM).
Java plug-in
JVM that can be used by a web browser to run Java applets.
jukebox
, See library.
L
label
Electronic header on a volume used for identification by a backup application.
legacy method
Use of special-case Microsoft APIs to back up and recover operating system components, services, and applications.
level
Backup configuration option that specifies how much data is saved during a scheduled or manual backup:
● A full backup backs up all data objects or files, regardless of when they last changed.
● An incremental backup backs up only data objects or files that have changed since the previous backup.
Glossary 673
library
Hardware device that contains one or more removable media drives, as well as slots for pieces of media, media access
ports, and a robotic mechanism for moving pieces of media between these components. Libraries automate media loading
and mounting functions during backup and recovery. The term library is synonymous with autochanger, autoloader, carousel,
datawheel, jukebox, and near-line storage.
library sharing
Shared access of servers and storage nodes to the individual tape drives within a library. The drives are statically assigned to
hosts.
license key
Combination of an enabler code and authorization code for a specific product release to permanently enable its use. Also called
an activation key.
live backup
, See rollover-only backup.
localization (L10N)
Translation and adaptation of software for the user language, time formats, and other conventions of a specific locale.
logical device
Virtual device used in the integration of NetWorker software with SmartMedia. Many logical devices can be assigned to a single
physical device.
low-water mark
Percentage of disk space filled that, when reached, automatically stops the migration process.
LUS
Driver used by EMC software products as a proprietary device driver that sends arbitrary SCSI commands to an autochanger.
Also known as the EMC User SCSI.
M
managed application
Program that can be monitored or administered, or both from the Console server.
managed node
Storage management application under the control of Console. For example, a system running NetWorker on a backup server or
storage node is considered to be a managed node.
man pages
Online technical reference manual, normally provided on UNIX servers, for the syntax and function of program commands that
may be issued from the command line.
674 Glossary
manual backup
Backup that a user performs from the client, also known as an unscheduled, on-demand, or ad hoc backup.
media
Physical storage, such as a disk file system or magnetic tape, to which backup data is written. , See volume.
media index
Database that contains indexed entries of storage volume location and the life cycle status of all data and volumes managed by
the NetWorker server. Also known as media database.
member
Physical host that occupies a node in a cluster environment. Each member has its own IP address.
mount
To make a volume physically available for use, such as the placement of a removable disk volume or tape into a drive for reading
or writing.
mount host
Host in a network that is used to mount storage array snapshot volumes to perform snapshot restore and rollover operations.
mount point
, See volume mount point.
multiple session
, See parallelism.
multiplex
To simultaneously write data from more than one save set to the same storage device.
N
NDMP server
Instance of one or more NDMP services, such as a data, tape, or SCSI server, that is managed by a single control connection.
NDMP service
Virtual machine that is controlled by a data management application (DMA) such as NetWorker software. Example services
include:
● Server with a directly attached storage appliance
● Storage device system with one or more tape drives
● Software process that reads two datastreams and multiplexes them into one stream
near-line storage
, See library.
Glossary 675
NetWorker administrator
NetWorker server user who may add, change, or delete NetWorker server users.
NetWorker server
Computer on a network that runs the NetWorker server software, contains the online indexes, and provides backup and restore
services to the clients and storage nodes on the same network.
NFS server
Host that contains exported file systems that NFS clients can access. , See network file system (NFS).
node
, See cluster.
non-critical volume
A volume that contains files that are not part of the system state or an installed service.
notification
Message sent to the NetWorker administrator about important NetWorker events.
nsrd
Master NetWorker server process.
nsrhost
Logical hostname of the NetWorker server.
O
offline backup
Backup of database objects performed while the corresponding database or instance is shut down and unavailable to users. Also
known as a cold backup.
offline restore
Automated restore that does not require the manual installation of an operating system. A bare metal recovery (BMR) is an
offline restore.
online backup
Backup of database objects performed while the corresponding database or instance is running and available to users. Also
known as a hot backup.
676 Glossary
online indexes
Databases located on the NetWorker server that contain all the information pertaining to the client backups (client file index)
and backup volumes (media index).
online restore
Restore operation that is performed from a NetWorker recover program. An online restore requires that the computer has been
booted from an installed operating system. See also offline restore.
operator
Person who performs day-to-day data storage tasks such as loading backup volumes into storage devices, monitoring volume
locations and server status, verifying backups, and labeling volumes.
override
Different backup level that is used in place of the regularly scheduled backup.
P
package
A term used by HP-UX to denote a cluster server. Also known as an agent (Sun) or virtual server (Microsoft).
parallelism
Feature that enables a maximum number of concurrent streams of data during backup or restore operations. For example,
parallelism values can be set for the NetWorker server, clients, pools, and groups.
pathname
Set of instructions to the operating system for accessing a file:
● An absolute pathname indicates how to find a file by starting from the root directory and working down the directory tree.
● A relative pathname indicates how to find a file by starting from the current location.
peer
NetWorker host that is involved in an authentication process with another NetWorker host.
permanent enabler
Enabler code that has been made permanent by the application of an authorization code. , See enabler code.
physical host
Node or host that forms part of a cluster.
policy
Set of defined rules for client backups that can be applied to multiple groups. Groups have dataset, schedule, browse, and
retention policies.
pool
1. NetWorker sorting feature that assigns specific backup data to be stored on specified media volumes.
2. Collection of NetWorker backup volumes to which specific data has been backed up.
primary storage
Server storage subsystem, such as a disk array, that contains application data and any persistent snapshots of data.
Glossary 677
probe-based backup
Type of scheduled backup, also known as an event-based backup, where the NetWorker server initiates the backup only when
specified conditions are met, as determined by one or more probe settings.
proxy host
Surrogate host computer that performs backup or clone operations in place the production host by using a snapshot copy of the
production data. , See mount host.
purge
Operation that deletes file entries from the client file index.
Q
quiesce
State in which all writes to a disk are stopped and the file system cache is flushed. Quiescing the database prior to creating the
snapshot provides a transactionally consistent image that can be remounted.
R
recover
To restore data files from backup storage to a client and apply transaction (redo) logs to the data to make it consistent with a
given point-in-time.
recyclable volume
Storage volume whose data has exceeded both its browse and retention policies and is now available to be relabeled and reused.
Registry
Microsoft Windows database that centralizes all Windows settings and provides security and control of system, security, and
user account settings.
remote device
1. Storage device that is attached to a storage node that is separate from the NetWorker server.
2. Storage device at an offsite location that stores a copy of data from a primary storage device for disaster recovery.
repository
Console database that contains configuration and reporting information.
requester
A VSS-aware application that creates and destroys a shadow copy. NetWorker software is a requester. , See shadow copy.
resource
Software component whose configurable attributes define the operational properties of the NetWorker server or its clients.
Clients, devices, schedules, groups, and policies are all NetWorker resources.
resource database
NetWorker database of information about each configured resource.
resource owner
Logical cluster host that owns the resource. If a Cluster resource, such as a shared disk, is not owned by a virtual host, it is
assumed to be owned by the physical node that hosts the resource.
678 Glossary
restore
To retrieve individual data files from backup media and copy the files to a client without applying transaction logs.
retention policy
NetWorker setting that determines the minimum period of time that backup data is retained on a storage volume and available
for recovery. After this time is exceeded, the data is eligible to be overwritten.
retrieve
To locate and recover archived files and directories.
retry mechanism
Action that NetWorker software performs when client operations fail. This situation might occur because the rate of
transmission is either low or undetectable.
role
Grant of user privileges to the Console. There are three roles: Console Application Administrator, Console Security administrator,
and the Console User. , See user groups.
roll forward
To apply transactional logs to a recovered database to restore it to a state that is consistent with a given point-in-time.
rollover
Backup of a snapshot to conventional storage media, such as disk or tape. Previously known as a live backup.
rollover-only backup
Rollover whereupon the snapshot copy is deleted. Previously known as a serverless backup, live backup, or nonpersistent
backup.
root
1. (UNIX only) UNIX superuser account.
2. (Microsoft Windows and UNIX) Highest level of the system directory structure.
S
salted hash
Added string of random data that provides a unique identifier to a user's password. , See hash.
save
NetWorker command that backs up client files to backup media volumes and makes data entries in the online index.
save set
1. Group of tiles or a file system copied to storage media by a backup or snapshot rollover operation.
2. NetWorker media database record for a specific backup or rollover.
Glossary 679
save stream
Data and save set information that is written to a storage volume during a backup. A save stream originates from a single save
set.
scanner
NetWorker command used to read a backup volume when the online indexes are not available.
scheduled backup
Type of backup that is configured to start automatically at a specified time for a group of one or more NetWorker clients. A
scheduled backup generates a bootstrap save set.
secondary storage
Storage media managed by a NetWorker server or storage node that stores conventional or snapshot data. Configure a storage
device on a NetWorker server or storage node for each secondary storage.
security event
Operation related to authorization, authentication, or configuration.
service port
Port used to listen for backup and recover requests from clients through a firewall.
shadow copy
Temporary, point-in-time copy of a volume created using VSS technology. , See VSS (Volume Shadow Copy Service).
shared disk
Storage disk that is connected to multiple nodes in a cluster.
shell prompt
Cursor in a shell window where commands are typed.
silo
Repository for holding hundreds or thousands of volumes. Silo volumes are identified by bar codes, not by slot numbers.
skip
Backup level in which designated files are not backed up. , See level.
Smart Media
EMC software application that manages media resources within a distributed environment.
snapset
, See snapshot save set.
snapshot
Point-in-time, read-only copy of specific data files, volumes, or file systems on an application host. Operations on the application
host are momentarily suspended while the snapshot is created on a proxy host. Also called a PiT copy, image, or shadow copy.
snapshot policy
Sets of rules that control the life cycle of snapshots. These rule specify the frequency of snapshot creation, how long snapshots
are retained, and which snapshots will be backed up to conventional storage media.
680 Glossary
stage
To move data from one storage medium to a less costly medium, and later removing the data from its original location.
stand-alone
In a cluster environment, a NetWorker server that starts in noncluster (stand-alone) mode.
stand-alone device
Storage device that contains a single drive for backing up data. Stand-alone devices cannot automatically load backup volumes.
STL
Silo Tape Library.
storage node
Computer that manages physically attached storage devices or libraries, whose backup operations are administered from the
controlling NetWorker server. Typically a “remote” storage node that resides on a host other than the NetWorker server.
T
tape service
NDMP DSP service that controls access to tape storage. A system can simultaneously host multiple tape services corresponding
to multiple backup streams.
target client
NetWorker client on which data is to be restored This may be the same as the original source client from which the data was
backed up, or it may be a different client.
target database
Database that the NetWorker server backs up as a safeguard against data loss.
target sessions
The number of simultaneous backup data streams accepted by a backup device.
temporary enabler
Code that enables operation of the software for an additional period of time beyond the evaluation period. , See enabler code.
transaction log
Record of named database transactions or list of changed files in a database, stored in a log file to execute quick restore and
rollback transactions.
trap
Setting in an SNMP event management system to report errors or status messages.
U
update enabler
Code that updates software from a previous release. It expires after a fixed period of time.
user
1. A NetWorker user who can back up and recover files from a computer.
Glossary 681
2. A Console user who has standard access privileges to the Console server.
user alias
Username seen by the NetWorker server when a Console user connects to the NetWorker server.
user authentication
Feature that validates user sign-on attempts. NetWorker can validate sign-on attempts against either a central authority, such
as an LDAP database, or a local Console database. , See host authentication.
user data
Data that is generated by users, typically for the purposes of a business function. A Microsoft Word document or an Excel
spreadsheet is an example of user data.
user groups
Feature that assigns user privileges. , See role.
V
versions
Date-stamped collection of available backups for any single file.
virtual server
1. Server, usually a web server, that shares resources with other virtual servers on the same computer to provide low-cost
hosting services.
2. In a cluster configuration, a set of two nodes, which are physical computers, and virtual servers. Each node and virtual server
has its own IP address and network name. Each virtual server also owns a subset of shared cluster disks and is responsible
for starting cluster applications that can fail over from one cluster node to another.
volume
1. Unit of physical storage medium, such as a disk or magnetic tape, to which backup data is written.
2. Identifiable unit of data storage that may reside on one or more computer disks.
volume ID (volid)
Internal identification that NetWorker software assigns to a backup volume.
volume name
Name that you assign to a backup volume when it is labeled.
VSS component
A subordinate unit of a writer. , See writer.
682 Glossary
W
Windows disaster recovery
Bare metal recovery of a host. NetWorker provides an automated bare metal recovery solution for Windows.
writer
Database, system service, or application code that works with VSS to provide metadata about what to back up and how to
handle VSS components and applications during backup and restore. , See VSS (Volume Shadow Copy Service).
Glossary 683