NetWorker 19.1.x Data Domain Boost Integration Guide
NetWorker 19.1.x Data Domain Boost Integration Guide
NetWorker 19.1.x Data Domain Boost Integration Guide
Version 19.1.x
Dell believes the information in this publication is accurate as of its publication date. The information is subject to change without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS-IS.” DELL MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND
WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. USE, COPYING, AND DISTRIBUTION OF ANY DELL SOFTWARE DESCRIBED
IN THIS PUBLICATION REQUIRES AN APPLICABLE SOFTWARE LICENSE.
Dell Technologies, Dell, EMC, Dell EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property
of their respective owners. Published in the USA.
Dell EMC
Hopkinton, Massachusetts 01748-9103
1-508-435-1000 In North America 1-866-464-7381
www.DellEMC.com
Figures 7
Tables 9
Preface 11
Deduplication efficiency............................................................................. 39
Retention periods.......................................................................... 39
Types of data backed up................................................................40
Change rate...................................................................................40
Frequency of full backups..............................................................40
Host naming guidelines...............................................................................40
Example name formats................................................................... 41
IP addresses.................................................................................. 42
Example topologies.....................................................................................42
Client Direct deduplication environment........................................ 42
Disaster recovery environment...................................................... 43
Cascaded replication environment.................................................45
Shared datazones environment..................................................... 46
Dedicated storage node environment............................................ 47
Glossary 203
54 Report configuration..................................................................................................181
55 Migration from conventional storage to DD Boost devices on a different storage node
..................................................................................................................................199
56 Migration from conventional storage to DD Boost devices on the same storage node
.................................................................................................................................200
57 Migration from VTL to DD Boost devices on a different storage node.......................201
58 Migration from VTL to DD Boost devices on the same storage node.........................201
1 Revision history........................................................................................................... 11
2 Style conventions........................................................................................................13
3 Firewall ports for DD Boost.........................................................................................38
4 Field and Attribute names........................................................................................... 87
5 Schedule icons........................................................................................................... 117
6 Schedule icons.......................................................................................................... 120
7 Schedule icons.......................................................................................................... 123
8 Schedule icons.......................................................................................................... 128
9 nsrcloneconfig file details..........................................................................................140
10 Save set criteria........................................................................................................ 143
11 Schedule icons.......................................................................................................... 148
12 Save set criteria........................................................................................................ 155
13 Schedule icons.......................................................................................................... 159
14 Staging criteria options............................................................................................. 165
15 Data Domain report configuration parameters ..........................................................180
16 Data Domain basic reports ........................................................................................ 181
17 Data Domain statistics drill-down reports..................................................................183
02 July 10, 2019 The topic "DD Boost and data deduplication"
is modified.
Related documentation
The NetWorker documentation set includes the following publications, available on the
Support website:
l NetWorker E-LAB Navigator
Provides compatibility information, including specific software and hardware
configurations that NetWorker supports. To access E-LAB Navigator, go to
https://elabnavigator.emc.com/eln/elnhome.
l NetWorker Administration Guide
Describes how to configure and maintain the NetWorker software.
Note: Contains information that is incidental, but not essential, to the topic.
Typographical conventions
The following type style conventions are used in this document:
Bold Used for interface elements that a user specifically selects or clicks,
for example, names of buttons, fields, tab names, and menu paths.
Also used for the name of a dialog box, page, pane, screen area with
title, table label, and window.
Italic Used for full titles of publications that are referenced in text.
Monospace Used for:
l System code
l System output, such as an error message or script
l Pathnames, file names, file name extensions, prompts, and
syntax
l Commands and options
You can use the following resources to find more information about this product,
obtain support, and provide feedback.
Where to find product documentation
l https://www.dell.com/support
l https://community.emc.com
Where to get support
The Support website https://www.dell.com/support provides access to product
licensing, documentation, advisories, downloads, and how-to and troubleshooting
information. The information can enable you to resolve a product issue before you
contact Support.
To access a product-specific page:
1. Go to https://www.dell.com/support.
2. In the search box, type a product name, and then from the list that appears, select
the product.
Knowledgebase
The Knowledgebase contains applicable solutions that you can search for either by
solution number (for example, KB000xxxxxx) or by keyword.
To search the Knowledgebase:
1. Go to https://www.dell.com/support.
2. On the Support tab, click Knowledge Base.
3. In the search box, type either the solution number or keywords. Optionally, you
can limit the search to specific products by typing a product name in the search
box, and then selecting the product from the list that appears.
Live chat
To participate in a live interactive chat with a support agent:
1. Go to https://www.dell.com/support.
2. On the Support tab, click Contact Support.
3. On the Contact Information page, click the relevant support, and then proceed.
Service requests
To obtain in-depth help from Licensing, submit a service request. To submit a service
request:
1. Go to https://www.dell.com/support.
2. On the Support tab, click Service Requests.
Note: To create a service request, you must have a valid support agreement. For
details about either an account or obtaining a valid support agreement, contact a
sales representative. To get the details of a service request, in the Service
Request Number field, type the service request number, and then click the right
arrow.
Secure multi-tenancy
NetWorker supports DD Boost devices in secure multi-tenancy (SMT) storage on
Data Domain systems. SMT enables service providers to isolate tenant users on a Data
Domain system. A global storage administrator assigns or creates a tenant unit (TU)
for each tenant user. Tenant users (for example, backup administrators) must use a
DD Boost username and password to create the secure storage units (SUs) that the
DD Boost devices use to store data.
DD Retention Lock
The Data Domain Retention Lock (DD Retention Lock) feature within NetWorker
allows you to efficiently manage and store different types of data backed up by
NetWorker to a single Data Domain system by securely locking the data on that
system, preventing accidental deletion of save sets.
When you enable a device with DD Retention lock and DD Retention lock period is set
in data protection policy action, the save sets backed up by the NetWorker policy
cannot be overwritten, modified, or deleted for the duration of the retention period, up
to a maximum of 70 years. Additionally, the device cannot be removed or relabeled at
any time during the retention period, though the device that contains the Retention
Lock save sets can be mounted and unmounted. The secure locking of data occurs at
an individual file level, and locked files can co-exist with unlocked files on the same
Data Domain system.
With DD Retention Lock, you can set the retention time to meet the requirements
driven by governance policies. The DD Retention Lock Time specified at the save set
level must fall within the range of the minimum and maximum retention times
configured on the DD Boost Mtree during device creation. The Retention lock modes
are Compliance lock mode and Governance lock mode. Governance mode is supported
from NetWorker 9.2 onwards. Compliance mode is supported from NetWorker 18.1
onwards.
You can enable DD Retention Lock on the DD Boost Mtree during device
configuration, as described in the section Configuring DD Boost devices with the NMC
Device Configuration wizard, or by modifying the device properties after
configuration, as described in the section Configuring a DD Boost device manually. If
using the NMC Device Configuration wizard for the first instance of Data Domain
device configuration, ensure that you populate the Data Domain device management
credentials (Management host, Management user name, management password and
management port).
When you enable DD Retention Lock at the device level, you must additionally set
Retention Lock period to the data protection policy action so that data is backed up
with Retention Lock set. The section Creating a traditional backup action provides
more information.
After successful backup, save set queries in the Media window of NetWorker
Administration displays DD Retention Lock Period and DD Retention Lock Type
columns to indicate which save sets have Retention Lock enabled and provide the
Retention Lock expiry date and time. If these columns are not initially visible, you can
customize the view to include this information. This information is also available within
the NMC Enterprise Reports window, under Policy Statistics > Save Set Details.
Similarly, if these columns are not initially visible, you can customize the view to
include this information.
Requirements
Review the following requirements for enabling DD Retention Lock:
l The NetWorker Server and storage node version must be NetWorker 19.1.
l The minimum DDOS version required when using the DD Retention Lock feature is
DDOS 6.0. The minimum DD Boost version is 3.4.
l Workflows that contain Data Domain Retention Lock enabled save sets require a
separate destination pool. The pool cannot contain a mixture of Retention Lock
and non-Retention Lock enabled Data Domain devices.
l The Data Domain devices storing primary and cloned backups with DD Retention
Lock enabled cannot be labelled or deleted. Disk space utilization issues will result
on the Data Domain system.
l The Data Domain Retention Lock feature is only supported only for DD Boost
instances.
l All configuration changes must be performed from NetWorker. Any configuration
changes from the Data Domain device will not be reflected in NetWorker.
feature, you must configure the Data Domain system to use medium-strength or high-
strength TLS encryption. The configuration is transparent to NetWorker.
The Data Domain documentation provides more information about DD Boost in-flight
encryption.
When you use DFC for data transport, verify the following requirements:
l The NetWorker server also requires IP connections, to communicate with all the
hosts that are involved in DD Boost operations and for data transport during
recovery and clone-controlled replication operations.
l Client Direct backup with DFC is not supported for 32-bit Linux NetWorker clients
that are installed on 64-bit Linux systems. The backup reverts to a storage node
backup.
l For DFC to work, the encryption strength for the client "*" on the DD OS, verify
that the option is set to None. By default, the setting is set to High.
NetWorker client
A NetWorker client is a supported host whose data requires protection. The
NetWorker client software includes an integrated DD Boost plug-in. The NMC server,
NetWorker server, and NetWorker storage nodes are also NetWorker clients.
NetWorker clients that use Client Direct deduplication must have direct network
access to the Data Domain system, which stores the data. By default, NetWorker
enables Client Direct in the properties of the Client resource.
Client Direct with FC connectivity to DD Boost devices requires NetWorker client 8.1
or later.
The NetWorker E-LAB Navigator provides information on supported releases.
NetWorker Server
The NetWorker Server is a collection of processes and programs that are installed on
a host that performs NetWorker services. The NetWorker Server also acts as a
storage node and can control multiple remote storage nodes.
NMC Server
The NetWorker Management Console (NMC) server or Console server is a Java-based
application and database server. The NMC Server manages all NetWorker Servers and
Clients. The NMC Server provides reporting and monitoring capabilities for all
NetWorker Servers and Clients in the environment. The NMC Server relies on the
NetWorker Authentication Service for user account authentication.
devices. Also, ensure that the storage node is at the same version as the NetWorker
Server.
For license inquiries, go to the Data Domain portal for service and support at https://
support.emc.com.
SMT structure
For SMT storage, a global storage administrator isolates DD Boost users, for example
backup administrators, by assigning them to tenant units (TUs). A TU cannot span
Data Domain systems. You can assign a DD Boost user to only one TU, but you can
assign multiple DD Boost users to the same TU. Each DD Boost user can create SUs
within the assigned TU only. Security is enforced at the TU level by the DD Boost user
assignment on the Data Domain system, and at the SU level by the DD Boost
credentials.
For example:
Tenant 1: bob, tu1, su1
Tenant 2: joe, tu2, su2
Tenant 3: sue, tu2, su3
DD Boost performance
DD Boost devices use multiple concurrent nsrmmd (media mover) processes per
device and each nsrmmd process uses multiple concurrent save sessions (streams or
threads). This reduces the performance and maintenance impacts on the Data Domain
system.
Balance the session load among the available DD Boost devices so that new sessions
attach to devices with the least load. To enable best performance, you can adjust the
Target Sessions, Max Sessions, and Max nsrmmd Count attributes assigned to the
Device resource on the NetWorker server.
Configuring a DD Boost device manually on page 95 provides details on session
settings.
The Data Domain documentation provides additional details on save sessions and
performance.
n DD OS 6.0
n DDVE— 8 CPUs, 80 GB memory, 200 GB Active Tier disk, 500 GB Cloud Tier
disk
Network requirements
DD Boost devices support data transport over both Ethernet IP networks and FC SAN
environments for both data backup and data recovery operations.
The NetWorker server requires Ethernet IP connections to control all hosts involved in
the DD Boost operations.
Ethernet IP support
DD Boost devices do not distinguish between different TCP/IP network types (LAN,
WAN, or MAN) and can successfully operate in a network where packet loss is strictly
0% and latency is less than 20ms. Variations of IP network connections can improve
data throughput, depending on the Data Domain system model.
It is recommended to use a minimum of two separate IP network connections to the
Data Domain system. One is used for administration and the other is used for data
backup.
Aggregated multiple connections can further improve data throughput for the Data
Domain system. For example, you can use multiple 1 GbE connections for dedicated
storage nodes and storage devices. Connections for 10 GbE are also available and you
can use these instead of or with 1 GbE links.
You can configure two basic IP interfaces:
l Dedicated 1 GbE data connection from the storage node directly to the Data
Domain system. This connection provides a private, high-bandwidth data
connection and avoids the latency and complexity of a shared IP connection. You
also require a separate conventional IP connection for administration and
NetWorker Console access.
The Data Domain Operating System Administration Guide provides details on network
support.
l Two or more NICs on the Data Domain system with 1 GbE or 10 GbE connections,
which are aggregated together by using the Data Domain ifgroup command.
This grouping provides increased data capacity and can improve resiliency. The
Data Domain system provides automatic Advanced Load Balancing and Link
Failover for NIC connections.
Note: NetWorker supports ifgroups for replication. Do not use aggregated
connections for replication operations.
The Data Domain Boost for Open Storage Administration Guide describes the
benefits, limitations, and examples of using ifgroups, which apply to NetWorker.
Domain system. DD Boost devices that are involved in CCR operations must have
IP connectivity for the data transport.
l FC-enabled NetWorker clients must run on a supported Windows, Linux, HP-UX,
AIX, or Solaris operating system. HP-UX systems must have minimum versions of
NetWorker 9.0.1 clients and storage nodes. AIX systems must use NetWorker 9.0.1
clients and storage nodes. Supported Solaris versions on a client are Solaris 10 and
11 on SPARC with x86 architectures. Solaris uses SCSI generic device driver, sgen.
The sgen driver is included in the Solaris installation. The NetWorker E-LAB
Navigator and the Dell EMC Data Domain Boost Compatibility Guide provide details.
Note: On AIX, DD Boost-over-FC requires a device driver. The AIX Installation
Chapter in the NetWorker Installation Guide provides more details.
l The NetWorker clients and NetWorker storage nodes must run NetWorker
NetWorker 9.0.1 or later software.
l All hosts that use FC must have an HBA card with at least 4 Gbps bandwidth
capacity and must devote an initiator port on each card to FC for DD Boost
devices. You should configure Access groups. The DD OS Administration Guide
provides details.
l FC-enabled DD Boost devices support Client Direct backup and restore over FC,
provided that you have enabled the clients with FC connections and settings.
l Data Domain systems support the coexistence of FC-enabled DD Boost devices
together with VTL devices on the same Data Domain system. However, the FC-
enabled DD Boost devices must not share an initiator with VTL devices on the
same Data Domain system.
l CCR is supported between FC-enabled DD Boost devices provided that there is IP
connectivity between the Data Domain systems. CCR is not supported over a Fibre
Channel network.
You can convert an existing DD Boost device from IP to FC connectivity and settings
without losing the stored data. You can restore the data to FC-enabled Client Direct
clients through their FC connection, and to IP-only clients through the storage node.
Converting DD Boost devices from IP to FC connectivity on page 194 provides details.
The NetWorker server can migrate legacy backup data stored on a VTL or tape device
to an FC-enabled DD Boost device. You can create a clone pool for this migration.
Considerations for migrating legacy save sets provides details.
The NetWorker E-LAB Navigator provides the latest details of supported versions.
l To enable DD Boost-over-FC on clients running AIX, you can also install the
AIX DDdfc device driver.
Ensure that the client's HBA ports and the Data Domain system's endpoints are
defined and that appropriate zoning has been done if you are connecting through a
Fibre Channel switch.
Procedure
1. Enable the DD Boost-over-FC service:
# ddboost option set fc enabled
2. Optional: set the DFC-server-name:
# ddboost fc dfc-server-name set <server-name>
Example:
# ddboost fc group create lab_group
4. To display the available list of scsitarget endpoints, enter:
# scsitarget endpoint show list
Endpoint System Address Transport Enabled Status
------------- -------------- ------------ ------- ------
endpoint-fc-0 6a FibreChannel Yes Online
endpoint-fc-1 6b FibreChannel Yes Online
------------- -------------- ------------ ------- ------
5. Indicate which endpoints to include in the group:
# ddboost fc group add <group-name> device-set
count count endpoint endpoint-list [disk <disk-name>]
Note: The disk option in the previous example is optional and supported only
if the client is AIX.
Example:
# ddboost fc group add lab_group device-set count 8 endpoint 6a
6. Verify that initiators are present. To view a list of initiators seen by the Data
Domain system:
Example:
# ddboost fc group add lab_group initiator
"initiator-15,initiator-16"
The number of DFC devices advertised to the initiator is controlled by configuring the
device-set of the scsitarget access group:
The maximum number of supported DFC devices per Data Domain system is 64. You
can have the same devices in multiple groups, but each group is limited to 64 devices.
Note: AIX DDdfc drivers support 128 devices. However, if you use the disk option
with the ddboost fc add command, this limitation is removed.
Because the DFC client sees each path to the Data Domain system as a separate
device, more paths and more DFC devices mean better performance for constrained
clients such as AIX, Windows, and Solaris.
So, how many DFC devices should be advertised to initiators on a given backup
server? The answer depends upon several factors:
1. Is the backup server queue-depth constrained?
Windows platforms are considered “queue-depth constrained,” because the
Windows SCSI Pass-Through Interface mechanism will only conduct 1 SCSI
request at a time through each of its generic SCSI devices. This impacts the
performance of the DD Boost-over FC solution, if multiple connections (for
example, backup jobs) are trying to use the same generic SCSI device. So, for
Windows platforms running more than one job, it is useful to advertise multiple
DFC devices.
Contrast this with the behavior of the Linux SCSI Generic driver, which imposes
no such restriction. Linux is not considered “queue-depth constrained,” so it is
sufficient to simply advertise one DFC device to initiators on Linux systems.
2. Number of physical paths between backup server and Data Domain system
For each advertised DFC device, the backup server operating system will create n
generic SCSI devices, one for each physical path through which the backup server
OS can access the device.
For example, if:
l Backup server has 2 initiator HBA ports (A and B)
Sizing calculation
The following calculation may be used to determine the number of DFC devices to
advertise on the Data Domain system and to the initiators on a given media server. Dell
EMC recommends that the same number of DFC devices be advertised to all initiators
on the same media server.
The following calculation may be used to determine the number of DFC devices to
advertise on the Data Domain system and to the initiators on a given backup server. It
is recommended that the same number of DFC devices be advertised to all initiators
on the same storage nodes.
On the Data Domain System
The Data Domain system imposes a limit on the number of simultaneous requests to a
single DFC SCSI device. Because of this limit, the number of devices advertised needs
to be tuned depending on the maximum number of simultaneous jobs to the system at
any given time. In general, the larger the number of jobs expected from media servers
using DD Boost over FC, the higher the number of devices advertised.
The Data Domain system imposes a limit on the number of simultaneous requests to a
single DFC SCSI device. Because of this limit, the number of devices advertised needs
to be tuned depending on the maximum number of simultaneous jobs to the system at
any given time. In general, the larger the number of jobs expected from storage nodes
using DD Boost over FC, the higher the number of devices advertised.
Let J be the maximum number of simultaneous jobs running using DFC, to the Data
Domain System at any given time.
Let C be the maximum number of connections per job:
l 3 for Data Domain Extended Retention Systems
l 1 for other types Data Domain systems
Let D be the DFC device count. All device groups on the server and storage node must
be configured with "D" devices.
Calculate:
l Maximum simultaneous connections to the DD system, using DFC, from ALL media
servers:
n S=J*C
n DFC Device Count (D) = minimum (64, 2*(S/128)), rounded up to a whole
number.
– 3 for DD Extended Retention systems – 1 for other types of Data Domain systems
Calculate:
l Maximum simultaneous connections from storage node S = J * C, DFC device
count D = minimum((S/P), X), round up, up to a maximum of 64.
Note that if the value of D is greater than X, then it is sufficient to configure D
devices, but only for the access group(s) with Windows clients.
Examples:
Assume:
l 4 physical paths between the storage node and Data Domain system, 30 maximum
jobs, DD Extended Retention system
l In this case, X = 25, P = 4, J = 30, and C = 3
l Maximum simultaneous connections from backup server S = (J * C) = 90
l DFC device count D = (90/4, 25) = 25
So, the Data Domain system should be configured to advertise 25 devices to each
initiator on the storage node.
Assume:
l 2 physical paths between the backup server and Data Domain system, 50
maximum jobs, single Data Domain system
l In this case, X=18, P = 2, J = 40, C = 1
l Maximum simultaneous connections from backup server S = (J * C) = 40
l DFC device count D = max(40/2, 18) = 20
So, the Data Domain system should be configured to advertise 20 devices to each
initiator on the storage node.
Note that since the value of D (20) is greater than the value of X (18), it is sufficient
to configure two devices only for the DFC access group with Windows clients.
Firewall requirements
Regardless of the network connections that are used, communication through a
firewall requires the use of specific ports and specific protocols to perform backup,
monitoring, and replication operations across sites.
The following table lists the required firewall ports, which you must open between the
Data Domain system, the NetWorker server, and the NMC server.
The Data Domain system provides functionality to review the network configuration
and network capabilities and provides SSH Telnet to help diagnose issues.
Deduplication efficiency
The deduplication ratio measures the efficiency of reduction in storage space that
results from the data deduplication and compression technology. Ratios of 20:1 are
broadly achievable and reductions of even 5:1 are extremely valuable.
Several factors can contribute to the deduplication ratio:
l Retention periods
l Types of data backed up
l Change rates
l Frequency of full backups
l Use of encryption and compression
For the best use of storage space, consider the factors in the following sections, along
with the periodic clearing of expired storage space, and the removal of unused pools.
Retention periods
The deduplication ratio increases with longer data retention periods. The longer you
retain the stored save sets, the greater the chance that identical data will exist on the
storage that NetWorker uses to deduplicate each subsequent backup, and the greater
is the efficiency of the storage usage.
When you define longer retention periods, the data remains on the Data Domain
device for a longer period of time. This enables NetWorker to use the retained data to
deduplicate subsequent backups, and results in a more efficient use of storage.
Change rate
Data with a low change rate changes little between backups, produces high
deduplication ratios, and is a good candidate for deduplication. Deduplication removes
data that is already in storage and only stores new data.
When a new save set is deduplicated, the number of unique blocks within the save set
can vary widely depending on the data type, and often there is little that can be
deduplicated. Yet because the Data Domain system compresses the data blocks, there
is typically a 2:1 to 3:1 (50%–75%) data reduction.
The storage savings increase with each subsequent backup of the save set because a
deduplication backup writes to disk only the data blocks that are unique to the backup.
In conventional business operations, the data change rate is typically low and unique
data may represent only 1%–2% of the data present in each additional backup set.
The remainder of the backup is deduplicated against the data already stored on the
system.
diagnose and resolve naming issues. You can use the net hosts add command on
the Data Domain system to add hosts to the /etc/hosts file.
Use the following guidelines to create consistent, easy-to-identify hostnames that
improve the configuration, report generation, and troubleshooting experience in the
DD Boost environment:
l Create names that are unique across all NetWorker datazones. Use names that
identify the network role, for example, administration, backup, cloning, or
production. A name can also include a location or a server name.
l Use a single hostname that is associated with each NIC, IP, or FC interface within
the same NetWorker datazone.
l Names can include abbreviations for the source or the target to quickly identify
whether the network connections are correct. For example, add an abbreviation of
the storage node hostname in the Data Domain name and an abbreviation of the
Data Domain hostname in the storage node name. Include the names in the Data
Domain /etc/hosts file.
l Specify all aliases, such as long and short names and IP addresses, for the
NetWorker server and the storage nodes in their respective Client resources.
Specify the aliases in the Aliases attribute on the Globals (1 of 2) tab of a Client
resource.
l Test to ensure that you can consistently resolve all hostnames in the network from
multiple locations in both directions. For example, ensure that you can resolve the
short name to IP address, long name to IP address, IP address to short name, and
IP address to long name.
l In general, use short, easy-to-identify, descriptive names instead of IP addresses
or fully qualified name strings for devices and storage nodes. Long names may not
fit into some views. The following examples include a long name and a short name:
NWDD365-1.burloak.lab.mycorp.com:/NWDZ_Dr1
NWDD365-1:/NWDZ_Dr1
l Except for hostnames, use standard alphanumeric characters, including dot (.),
hyphen (-), and underscore (_), with no spaces and no special characters.
Hostnames may not use underscores (_).
l Use consistent formats, in terms of text field length and text case, and include
leading zeros in numbers, with a maximum of 50 characters.
l Avoid the use of dates in names where the dates could change or become
meaningless in the future.
DD Boost devices
Format: Data_Domain_system_name-device_name
For example: dd-tenendo-device01
IP addresses
Avoid IP addresses because numbers are more difficult to identify and troubleshoot
than descriptive names. However, there are exceptions:
l The Data Domain system requires the use of IP addresses to interface with an
ifgroup for Advanced Load Balancing and Link Failover features.
l For CCRs, the hosts file on the source Data Domain system must list the IP
address of the target Data Domain system. Otherwise, the CCR will use the same
network access that the backup and restore operations use.
The Data Domain documentation provides details.
Example topologies
This section provides some examples of how you can deploy the Data Domain
integration in NetWorker backup environments. Dell EMC recommends that you use
two interfaces in Ethernet IP networks, 1 GbE for administration and 10 GbE for data.
For FC environments, use IP interfaces for administration and clone operations, and a
SAN interface for backup operations. Use the following examples to plan your
environment.
1. The NetWorker server starts the backup of the client groups within the datazone.
2. Two storage nodes in the datazone write the backup data to media pools, which
target specific DD Boost devices on the primary system. The pool that is
associated with the data protection policy defines which storage devices receive
the data.
3. The storage nodes communicate with the primary Data Domain system over a
dedicated 10 GbE network connection, and store deduplicated backup data on the
devices.
Note: An ifgroup configuration of 1 GbE or 10 GbE NICs on the Data Domain
system enables multiple storage nodes to use the same network identity. This
bandwidth aggregation can improve performance for DD Boost devices. The
Data Domain documentation provides details.
4. You can use CCR to store optimized clone copies of backups from the primary
Data Domain system over a network to a geographically distant secondary Data
Domain system for disaster recovery.
5. An additional option enables a further clone to conventional disk or conventional
tape media. A NetWorker storage node, which is attached to the secondary Data
Domain system, creates an additional NetWorker clone copy of the data for one of
the backup groups, which NetWorker stores on conventional media. NetWorker
reverts the data in this copy to the native non-deduplicated format, which is
necessary for storage on conventional media.
associated with the data protection policy defines which storage devices receive
the data.
Note: You cannot share a DD Boost device across datazones.
3. You can perform an additional backup to tape storage operation, either directly
from a storage node or by a NetWorker clone operation from the Data Domain
system.
Figure 5 Data Domain system shared across two NetWorker datazones
2. The storage nodes write the deduplicated backup data to the DD Boost storage
devices on the Data Domain system. The pool that is associated with the data
protection policy defines which storage devices receive the data.
Note: An ifgroup configuration of 1 GbE or 10 GbE NICs on the Data Domain
system enables multiple storage nodes to use the same identify on an IP
network. This aggregation of bandwidth can improve performance for DD
Boost devices. The Data Domain documentation provides details.
3. A high-volume storage node uses an additional dedicated 10 GbE direct
connection.
NetWorker E-LAB Navigator provides information on NetWorker application modules
compatible with Data Domain systems.
Figure 6 Single datazone with dedicated storage nodes and one high-bandwidth link
Configuring the Data Domain system for DD Boost or Cloud Tier by using the
Data Domain System Manager
Use the Data Domain System Manager to configure the Data Domain system for DD
Boost and Cloud Tier.
Before you begin
Deploy the Data Domain system, create a disk for the storage unit, and complete the
network configuration.
Procedure
1. Use a web browser to log in to the Data Domain System Manager as the
system administrator user.
2. In the left navigation pane, select Hardware > Storage.
3. In the Active Tier section, click Configure.
4. In the Addable Storage table, select the device, which stores backup data,
click Add to Tier, and then click Save.
Note: If a device does not appear in the Addable Storage table, add a new
disk to the virtual machine.
b. In the Addable Storage table, select the device that stores Cloud data.
Note: If a device does not appear in the Addable Storage table, add a
new disk to the virtual machine.
c. If it does not exist, add the DD Boost user to the Users with DD Boost
Access table:
a. Click the + (Add) button that is located above the table and to the right.
b. In the User list, select an existing local user, or select Create a new
Local User and then create a user account.
c. Click Add, and then click Close.
14. To create a storage unit for the appliance, perform the following steps on the
Storage Units tab, which is located along to top:
a. Click the + (Add) button that is located above the table and to the right.
b. In the Name field, specify a descriptive name for the storage unit.
c. In the User field, select the DD Boost user.
d. Click Create.
The Storage Unit table provides information about the new storage unit,
including the full path.
15. In the left navigation pane:
a. Select Protocols > NFS.
b. Ensure that the NFS Status option that is located above the Exports tab is
set to Enabled.
16. To configure an export for the file system that contains the storage unit,
perform the following tasks
a. Click Create.
b. In the Directory path field, specify the full directory path for storage unit
that you created.
c. In the Clients table, select the NetWorker server, if the NetWorker server
does not appear, and then click the + (Add) button. In the Client field,
specify the FQDN of the NetWorker server, and then click OK.
d. Click OK, and then click Close.
Configuring the Data Domain system for DD Boost by using the CLI
You can enable the Data Domain system for storage operations with DD Boost devices
by using the Data Domain CLI to complete the following steps.
About this task
The Data Domain Boost for OpenStorage Administration Guide provides details.
Procedure
1. Log in to the Data Domain system console as the system administrator user.
2. Use the license add command to add the OPENSTORAGE license key, the
DD Boost license, and optionally, to enable CCR, the Replication license key:
license add license_key
3. To verify that the file system and the NFS protocol are running, type the
following commands:
filesys status
nfs status
filesys enable
nfs enable
Note: For DD Boost functionality, you must enable NFS services on the
Data Domain system, even if you do not configure users or shares. You do
not need to enable NFS on the NetWorker server, NetWorker storage
nodes, or NetWorker clients.
5. To create one or more new user accounts, type the following command:
user add username password password [role role]
For example:
Note: To unassign one of more users from the DD Boost user list, type the
following command:
ddboost enable
8. To configure the system to receive and generate SNMP traps, type the
following command.
snmp add ro-community community_name
snmp enable
SNMP traps enable users to monitor backup events that are captured by SNMP
traps.
9. To configure Distributed Segment Processing (DSP), type the following
commands:
a. To enable DSP, type: ddboost option set distributed-segment-
processing enabled
Note: Do not use the "DFC-" prefix on the DFC server name, as suggested
in the output of the ddboost fc dfc-server-name show command.
This prefix is intended for use with other vendors only and will cause
NetWorker communications to the DFC server to fail.
Procedure
1. Log in to the Data Domain system console with a user account that has the
Global Storage Administrator role.
2. Use the user add command to create one or more new user account, and
assign the none role to the user:
user add username password password [role role]
For example, to create three SMT user accounts named bob, joe and sue, type
the following commands:
4. To create one or more tenant units (TU), type the following command:
smt tenant-unit create tu-name
For example, to create a two TUs named tu1 and tu2, type:
To assign TU tu2 to DD Boost users joe and sue, type the following commands:
Note: Avoid changing the owners of DD Boost SUs. A new owner cannot
use the DD Boost devices from a previous owner. Create a device for the
new owner instead.
l (Optional) To list the DD Boost users and their default TUs, or the DD Boost
users within a specific default TU, type the following command:
Note: You can use the CLI to review tenant space usage and the
performance data at both the TU and SU levels. As the global storage
administrator, you can enable tenants to use the Data Domain CLI to
review the space usage and the performance data of their TU and SUs.
The Data Domain documentation provides details.
Adding a DD Cloud Tier storage to the Data Domain system by using the CLI
Before you begin
On a DDVE, add new storage to the virtual machine for the Cloud Tier.
Procedure
1. Log in to the Data Domain system console as the sysadmin user.
2. To enable the Cloud Tier feature, type the following command:
cloud enable
6. To configure the Cloud Tier device, type one of the following commands:
l Data Domain system—storage add tier cloud enclosures number
where number is the device number.
l DDVE—storage add tier cloud device
where device is the name of the device, for example dev4.
Creating the Cloud Profile and Cloud Unit by using the CLI
Data Domain supports a maximum of two Cloud Units.
About this task
Perform the following steps on the Data Domain system or DDVE to create the Cloud
Profile and Cloud Unit.
Procedure
1. Log in to the Data Domain system or DDVE as the sysadmin user.
2. Type the following command to create the Cloud Profile:
cloud profile add profile_name
where profile_name is a descriptive name for the profile.
3. At the Enter provider name prompt, type the name of the provider:
l Dell EMC Elastic Cloud Storage (ECS)—ecs
l Virtustream Cloud Storage—virtustream
l Amazon Web Services S3—aws
4. For the Virtustream Storage Cloud provider only, at the Enter Storage Class
prompt, type the storage class.
5. For the Virtustream Storage Cloud and Amazon Web Service S3 providers only,
at the Enter Storage Region prompt, type the storage region.
6. At the Enter the access key prompt, type the cloud provider access key.
7. At the Enter the secret key prompt, type the cloud provider secret key.
8. For Dell EMC Elastic Cloud Storage (ECS) only, at the Enter the endpoint
prompt, type the load balancer endpoint address for the cloud provider.
For example: http://172.21.21.10:9020
Load balancer is mandatory for all ECS Cloud Tier deployments.
9. At the Do you want to enter proxy details prompt, press Enter to accept the
default value, no.
10. Type the following command to add a new Cloud Unit:
cloud unit add unit_name profile profile_name
where:
l unit_name is a descriptive name for the Cloud Unit, for example cloud-
unit-1.
l profile_name is the name of the cloud profile that you created.
For example:
Creating the Cloud Profile and Cloud Unit by using Data Domain System Manager
Data Domain supports a maximum of 2 Cloud Units.
About this task
Perform the following steps to create the Cloud Profile and Cloud Unit.
Procedure
1. Use a web browser to log in to the Data Domain System Manager as the
system administrator user.
2. In the left navigation pane, select Data Management > File System.
3. On the Cloud Units tab, click Add.
4. In the Name field, provide a descriptive name for the Cloud Unit.
Results
The Cloud Units page displays information about the Cloud Unit, and the status of the
unit is Enabled.
For example, to schedule the data movement operation to run every two weeks
at 11 pm on a Thursday, type:
l Monthly—From each At box, select the hour, minute, and AM or PM. In the
On field, perform one of the following steps:
a. To schedule the movement to occur on a specific date in the month,
leave the default selection Dates, and then select the day of the month
on which to schedule the movement.
b. To schedule the movement to occur on the last day of every month,
select Last Day of the Month.
The following figure provides an example of a movement schedule that
occurs on the last day of each month.
Figure 9 Monthly data movement schedule
6. Click OK.
b. Click Next.
5. In the Select Host Type page:
a. Select DataDomain.
b. Click Next.
6. In the Manage DataDomain page:
a. Review the configuration details.
b. Click Next.
c. Leave the Capture Events option selected.
7. (Optional) In the Configure SNMP Monitoring page, perform the following
steps:
a. In the SNMP Community String field, type the name of the SNMP
community string.
Note: If you do not know the name of the community, leave this field
blank.
b. With the Receive SNMP trap events option selected, specify the SNMP
Process port that is used by the Data Domain system and select the events
in which to monitor. Use the Reset to defaults option to reset the events in
which to monitor back to the default settings.
Note: The default SNMP process port is 162.
c. Click Next.
SNMP monitoring enables NMC to display the Data Domain system status
and to list the backup and the recovery events. The monitoring feature also
provides a launcher link for the Data Domain interface.
d. Click Finish.
8. Configure alerts for Data Domain High Availability events:
a. Click the Devices button on the taskbar.
b. In the left navigation pane, right-click Data Domain Systems and select
New Device Wizard.
c. Open the SNMP Monitoring Options page and select the following options:
l HA Setup Degraded
l HA Setup Offline
l HA Setup Out-of-Sync
6. In the Select the Device Type page, select the Data Domain device type, and
then click Next.
The following figure provides an example of the Select the Device Type page.
Figure 10 Select the Device Type page
8. In the Specify the Data Domain Configuration Options page, configure the
following fields:
a. In the Data Domain System section, select one of the following options:
b. In the DD Boost Credentials section, type the username for the DD Boost
user in the DD Boost Username field.
c. In the Secure Multi-Tenancy section, to use only DD Boost devices in
secure Storage Units (SUs), select Configure Secure Multi-Tenancy
(SMT), and then perform one of the following tasks:
l To use an existing storage unit (SU), select Use an existing secure
storage unit, and then select the SU.
l To create a SU, select Create a new secure storage unit, and then
specify the name of the SU.
Note: SMT restricts access of each SU to one owner according to the
provided DD Boost credentials.
e. In the Configuration Method field, select Browse and Select, and then
click Next.
Note: If you do not configure the SMT option, the wizard will create an
SU for you on the Data Domain system, and name the SU after the
shortname of the NetWorker server.
The following figure provides an example of the Specify the Data Domain
Configuration Options page.
b. Type a name for the new folder, and then select the checkbox next to the
folder or device name.
The Device table displays the full NetWorker device name, the storage
pathname, and details about the device.
Note: The device name refers to the subfolder created within the SU.
The folder path must not contain other folders deeper than these device
folders.
d. Click Next.
The following figure provides an example of the Select the Folders to use
as Devices page.
Figure 13 Select the Folders to use as Devices page
10. On the Configure Pool Information page, perform the following steps:
a. Select Configure Media Pools for Devices.
b. In the Pool Type section, select the type of data to send to the Data Domain
device, either Backup for backups or Backup Clone for cloning or staging
operation.
c. In the Pool section, select Create and use a new Pool to create a pool to
receive the data, or select Use an existing Pool to select a pool that exists
on NetWorker server.
NetWorker provides a preconfigured Data Domain pool that you can select,
named Data Domain Default.
d. Leave the Label and Mount device after creation option selected.
e. Click Next.
The following figure provides as example of the Configure Pool Information
page.
11. On the Select Storage Nodes page, perform the following steps:
a. In the Storage Node Options section, specify the storage node that
manages the device.
l To use an existing storage node on the NetWorker server, select Use an
existing storage node.
l To use a new storage node, select Create a new storage node, and then
type the hostname of a storage node host.
If the new Storage Node is also a Dedicated Storage Node, select
Dedicated Storage Node.
b. (Optional) To enable FC data transport for this device, perform the following
steps:
l Select Enable Fibre Channel.
l In the Fibre Channel Host Name field, type the hostname that the Data
Domain system uses to identify itself for FC operations. By default, this
hostname is the same name used for IP operations, but the hostnames
can be different. The hostname must match the Server Name displayed
on the Data Domain system in the Data Management > DD Boost >
Fibre Channel tab of the Data Domain Enterprise Manager. The name
is case-sensitive.
Note: All NetWorker clients that use an FC-enabled DD Boost device
must be enabled for FC in the Data Domain Interface field.
Note: You must also select Apply DD Retention Lock in the Policy
action wizard so that DD Retention lock gets applied to save sets in
the NetWorker data protection policy.
l Unselect Enable DD Retention Lock to disable this feature, or if you do
not plan to use DD Retention Lock on this device, and click Next.
Note: If you plan to use the REST API for features such as DD Cloud Tier
policy creation and DD Retention Lock, you must additionally update the
NSR Data Domain RAP resource with the Management username,
password, port, and host. If these credentials and details are not
specified in the RAP resource, then a validation error occurs.
The following figure provides an example of the Select Storage Nodes page.
Figure 15 Select Storage Nodes page
12. In the Select SNMP Monitoring Options page perform the following steps:
a. In the Data Domain SNMP Community String field, type the name of the
SNMP community string.
Note: If you do not know the name of the community, then clear the
Gather Usage Information selection.
b. With the Receive SNMP trap events option selected, specify the SNMP
Process port used by the Data Domain system and select the events in
which to monitor. Use the Reset to defaults option to reset the events in
which to monitor back to the default settings.
Note: The default SNMP process port is 162.
c. Click Next.
SNMP monitoring enables NMC to display the Data Domain system status and
to list the backup and the recovery events. The monitoring feature also provides
a launcher link for the Data Domain interface. The following figure provides an
example of the Select SNMP Monitoring Options page.
Figure 16 Select SNMP Monitoring Options page
13. On the Review the Device Configuration Settings page, review the
configuration information and then click Configure.
Note: The name that is listed as the SU is really the pathname for the
device folder. The format is: SU/device_name, where SU is the short
hostname of the NetWorker server.
The following figure provides an example of the Review the Device
Configuration Settings page.
NetWorker configures, mounts, and labels the DD Boost device for the specified
pool.
14. On the Device Configuration Results page, review the information, and then
click Finish.
The following figure provides an example of the Device Configuration Results
page.
Figure 18 Device Configuration Results page
Results
After the wizard successfully creates the device, the following changes appear in
NMC:
l The Data Domain Systems window displays the new Data Domain device and the
name of the volume. The following figure provides an example of the Data Domain
System window with the new Data Domain device.
l If you configured a device for a Data Domain system that does not have previously
configured NetWorker devices, NetWorker adds the Data Domain system as a
managed host. The NMC Enterprise window provides you details about the Data
Domain system.
3. Provide the device name, device access information, username for the DD boost
user (username filed) and password for the account . These are mandatory
attributes to create a device resource.
Device access information must be in the following form:
<DD IP>:<StorageUnitName>/<DeviceName> where Device Name
refers to the subfolder to be created within the storage unit.
Note:
l Device access information is parsed to get the storage unit and the
device name.
l If device with Mtree exists, then the nsradmin command displays the
error device already exist.
9. Click on the Select option which displays the types of resources available.
Select the option NSR Device. It lists out all the devices that has been created
and is available. Browse through the list using Next and Previous, once you find
the device that you want to configure, click on the Edit option.
10. Selecting the pool in Volume Pool field. If you want to create a new Pool, select
the pool using NSR Pool resource and select the Create option. Once it is
complete revert back to the current device Window (follow Step 9) and select
the new pool that has just been created.
Figure 21 Configuring the media pool information
11. In order to configure the volume operations, enable the hidden attribute in
Options section (If it is disabled).
Figure 22 Enabling the hidden attribute
12. Select options available in Volume operation field in order to label, mount and
perform other volume operations on the device. Operations have to be
performed one at a time. Labeling and mounting of the device can also be
performed by running the command. nsrmm -s <server_name> -v -y -m -b
<pool_name> -l -f <device_name>.
13. In order to permanently erase all data and remove media and index information
erase volume operation has to be performed.
Figure 23 Performing erase volume operation
14. Select Delete from the menu to delete the device RAP resource. Delete
operation would also need device to be unmounted and removed as a target
device from the corresponding NSR Pool resource.
a. Right-click NetWorker.
b. Select Launch Application. The NetWorker Administration window
appears.
4. On the taskbar, click the Devices button .
5. In the left navigation pane:
a. Right-click Data Domain Systems.
b. Select New Device Wizard.
Note: To modify completed wizard pages, click the links in the steps panel.
The number of steps may vary according to the type of configuration
chosen.
6. In the Select the Device Type page, select the DD Cloud Tier device type, and
then click Next.
The following figure provides an example of the Select the Device Type page.
Figure 24 Select the Device Type page
7. In the DD Cloud Tier Configuration Options page, perform the following steps:
a. From the Select an existing Data Domain list, select the Data Domain host.
b. In the DD Boost Credentials section, type the username for the DD Boost
user in the DD Boost Username field.
c. In the Secure Multi-Tenancy section, to use only DD Boost devices in
secure Storage Units (SUs), select Configure Secure Multi-Tenancy
(SMT), and then perform one of the following tasks:
l To use an existing storage unit (SU), select Use an existing secure
storage unit, and then select the SU.
l To create a SU, select Create a new secure storage unit, and then
specify the name of the SU.
Note: SMT restricts access of each SU to one owner according to the
provided DD Boost credentials.
d. In the Configuration Method field, select Browse and Select, and then
click Next.
Note: If you do not configure the SMT option, the wizard will create an
SU for you on the Data Domain system, and name the SU after the
shortname of the NetWorker server.
8. In the Select the Folders to use as DD Cloud Tier Device page, configure a
device in the same mtree as the Data Domain backup device:
a. Select the Data Domain system, and then click New Folder.
A new folder appears in the navigation tree. This folder is the new device.
Note: The navigation tree does not show the SU folder under the Data
Domain system folder. However, the SU folder is verifiable in the final
Review Configurations Settings wizard page. The wizard names the
SU folder after the short hostname of the NetWorker server and places
the devices that you create into this SU folder.
b. Type a name for the new folder, and then select the checkbox next to the
folder or device name.
The Device table displays the full NetWorker device name, the storage
pathname, and details about the device.
Note: The device name refers to the subfolder created within the SU.
The folder path must not contain other folders deeper than these device
folders.
d. Click Next.
The following figure provides an example of the Select the Folders to use as
DD Cloud Tier Device page.
Figure 26 Select the Folders to use as DD Cloud Tier Device page
9. In the Configure a Pool for the DD Cloud Tier Device page, perform the
following steps:
a. Select Configure Media Pools for Devices.
b. In the Pool section, perform either of the following steps:
Note: The pool that you select or create must contain only Cloud Tier
devices. NMC lists pools of the type Backup Clone that contain only DD
Cloud Tier devices.
c. Leave the Label and Mount device after creation option selected.
d. Click Next.
The following figure provides an example of theConfigure a Pool for the DD
Cloud Tier Device page.
Figure 27 Configure a Pool for the DD Cloud Tier Device page
10. In the Select the Storage Nodes for the DD Cloud Tier Device page, perform
the following steps:
a. In the Storage Node Options section, select the storage node that manages
the device.
l To use an existing storage node on the NetWorker server, select Use an
existing storage node.
l To use a new storage node:
a. Select Create a new storage node.
b. Type the hostname of a storage node host.
c. If the new Storage Node is also a Dedicated Storage Node, select
Dedicated Storage Node.
b. Click Next.
The following figure provides an example of the Select the Storage Nodes for
the DD Cloud Tier Device page.
Figure 28 Select the Storage Nodes for the DD Cloud Tier Device page
11. In the Configure the Data Domain Management Policy page, perform the
following steps:
a. In the Data Domain Host field, specify the host name of the Data Domain
system.
b. In the Admin User field, specify the username for a Data Domain user that
has admin access. For example, sysadmin.
c. In the Admin Password field, specify the password of the management
user.
d. In the Port field, specify the management port. By default, the port is 3009.
e. In the CA Certificate field, click Pull Certificate.
The Device wizard contacts the Data Domain system and displays the
certificate in the Certificate field.
i. Click Next.
j. On the confirmation window, review the details, and then click OK.
The following figure provides an example of the Configure the Data Domain
Management Policy page.
2. In the left navigation pane, right-click Devices, and then and select New Device
Properties.
3. On the General tab, identify the Cloud Tier device by typing its name and
access information:
Note: Multiple devices can share a single volume. Configuring volume
sharing on multiple devices provides details.
a. In the Name field, type a name for the Cloud Tier device.
For example:
ct_1
If you configure the device on a separate storage node host that is not the
NetWorker server host, it is a remote device. Specify the Name field in the
following format:
rd=remote_storagenode_hostname:device_name
For example:
rd=dzone1_sn2:ct_1
b. In the Device access information field, type the Data Domain hostname
followed by a colon and the path to the device folder.
If you are configuring a device with secure multi-tenancy (SMT) protection,
the device folder must reside in a password-protected tenant unit on the
Data Domain.
Use the following format:
DD_hostname:/DD_storage_unit_name/device_name
where, as a best practice, DD_storage_unit_name is the NetWorker server
name, and device_name is a name for the device, which appears as a folder.
For example, the following figure uses the following name:
ddr1:/dzone1/ct_1
NetWorker does not limit the number device folders that you can create, but
the Device access information field accepts one device folder only. Do not
create any folders within a device folder.
Note: Implicit in this pathname is the hidden mount point folder /data/
col1. Do not modify this folder structure, which all NetWorker servers
use.
Figure 33 Example of the General tab configuration properties for a Cloud Tier device
4. On the Configuration tab, in the Save Sessions area, in the Remote user and
Password fields, type the DD Boost username and password, respectively.
You can only define one DD Boost (OST) user. All NetWorker storage nodes and
servers that access the Data Domain system must use the same username and
password.
Note: Avoid changing the user of an existing device with a labeled volume.
The new user will not have write permission to the files and directories that
are created by the previous user and cannot re-label the volume. Create a
device for the new user.
c. From the Label template list, select DD Cloud Tier Default Clone.
5. On the Selection Criteria tab, perform the following configuration tasks:
a. (Optional) To restrict the devices associated with the pool, from the Device
box, select the Cloud Tier devices.
Note: Select devices that reside on the same mtree as the Data Domain
devices that contain the source backup data.
b. From the Media type required drop down, select DD Cloud Tier.
6. Click OK.
In order to create a DD Cloud Tier device, both NSR Device and NSR Data
Domain resource have to be created with certain attributes set.
2. Select the Create option in the menu and select the type as NSR Data Domain.
The following screen appears with list of attributes to be configured for new
data domain resource:
Figure 34 Attributes to be configured for new data domain resource
Cloud Unit Name Specify the name of the cloud unit that you
created on the Data Domain system
4. Select the Create option in the menu and select the type as NSR device. The
following full screen appears with list of attributes to be configured for new
device resource.
Figure 35 Attributes to be configured for new device resource
5. Provide Device name, Device access information, username for the DD boost
user (username filed), and password for the account (all four are mandatory
attributes to create a device resource.)
Device access information must be of the following form:
9. Click on the Select option which displays the types of resources available.
Select the option NSR Device. It lists out all the devices that has been created
and is available. Browse through the list using Next and Previous, once you find
the device that you want to configure, click on the Edit option.
10. Selecting the pool in Volume Pool field. If you want to create a new pool, select
the pool using NSR Pool resource and select the Create option. Once it is
complete revert back to the current device Window (follow Step 9) and select
the new pool that has just been created.
Figure 36 Configuring the media pool information
11. In order to configure the volume operations, enable the hidden attribute in
Options section (If it is disabled).
Figure 37 Enabling hidden attribute
12. Select options available in Volume operation field in order to label, mount and
perform other volume operations on the device. Operations have to be
performed one at a time. Labeling and mounting of the device can also be
performed by running the command nsrmm -s <server_name> -v -y -m -b
<pool_name> -l -f <device_name>.
13. In order to permanently erase all data and remove media and index information
erase volume operation has to be performed.
Figure 38 Performing erase volume operation
14. Select Delete from the menu to delete the device RAP resource. Delete
operation would also need device to be unmounted and removed as a target
device from the corresponding NSR Pool resource.
3. On the General tab, in the Backup area, complete the following steps:
a. To enable deduplicated backup data from this client to bypass the
NetWorker storage node and be sent directly to the Data Domain system,
select Client Direct. Review the following requirements:
l Ensure that you have not selected the Checkpoint restart field. If
selected, backups revert to traditional storage node backups.
l Ensure that the client interface configuration, whether FC or IP, matches
the DD Boost device interface configuration. If the interfaces do not
match, then the storage node performs the backup and restore
operations.
l Ensure that you have configured the Data Domain system to use the DD
Boost devices. Configuring the Data Domain system for DD Boost by
using the CLI on page 53 provides details.
l Ensure that you have configured the NetWorker Device resource for the
Data Domain system with a Remote User field that specifies a DD Boost
username. Configuring a DD Boost device manually on page 95 provides
details.
Note: Client Direct access from a Linux host to a Data Domain
system requires a glibc 2.3.4 or later library on the Linux system.
b. (Optional) In the Protection group list field, select the group in which to add
the Client resource. If you have not created the protection group, you can
create one later and add the client to the group.
4. On the Apps & Modules tab, perform the following tasks:
a. In the Deduplication area, select Data Domain backup. This ensures that
NetWorker backs up the client data only to DD Boost devices, even if the
selected pool contains DD Boost and other types of devices. It is best not to
include different device types in a single pool.
Note: Current versions of NetWorker application modules support
backup to DD Boost devices. Some of the earlier module versions do not
support the client fields for Data Domain backup and Pool. In this case,
do not set these fields. Backup fails for older NetWorker application
modules on page 191 provides details.
b. In the Data Domain Interface field, select the type of connectivity the client
uses for DD Boost devices:
l Select IP for TCP/IP connectivity only.
Do not select IP if the Enable fibre channel attribute is enabled on the
Configuration tab of the DD Boost Device resource. This conflict in
settings could cause backups to fail and restores to operate only through
the storage node.
l Select Fibre Channel for FC connectivity only.
You cannot select the FC-only setting when you create a Client resource
for the NetWorker server resource because the NetWorker server
requires IP connectivity to send control information to the hosts within
the datazone.
l Select Fibre Channel for FC connectivity only.
You cannot select the FC-only setting when you create a Client resource
for the NetWorker server resource because the NetWorker server
requires IP connectivity to send control information to the hosts within
the datazone.
l To enable both FC and IP connectivity to the devices, select Any.
If the NetWorker server contains multiple definitions of this Client
resource, any changes to this field propagate to the other instances of
the client.
nsrndmp -T backup_type -M
b. Click Next.
5. In the Select Host Type page:
a. Select DataDomain.
b. Click Next.
6. In the Manage DataDomain page:
a. Review the configuration details.
b. Click Next.
c. Leave the Capture Events option selected.
7. (Optional) In the Configure SNMP Monitoring page, perform the following
steps:
a. In the SNMP Community String field, type the name of the SNMP
community string.
Note: If you do not know the name of the community, leave this field
blank.
b. With the Receive SNMP trap events option selected, specify the SNMP
Process port used by the Data Domain system and select the events in
which to monitor. Use the Reset to defaults option to reset the events in
which to monitor back to the default settings.
Note: The default SNMP process port is 162.
c. Click Next.
SNMP monitoring enables NMC to display the Data Domain system status
and to list the backup and the recovery events. The monitoring feature also
provides a launcher link for the Data Domain interface.
8. Click Finish.
Results
The Data Domain system or DDVE appears in the Enterprise window.
a. In the Name field, type a name for the Data Domain device.
For example:
dd_1
Configuring a DD Boost device manually on page 95 uses the following
example values:
l NetWorker server short hostname = dzone1
l NetWorker remote storage node hostname = dzone1_sn2
l Data Domain hostname = ddr1
l DD Boost device name = dd_1
If you configure the device on a separate storage node host that is not the
NetWorker server host as shown in Configuring a DD Boost device manually
on page 95, it is a remote device. Specify the Name field in the following
format:
rd=remote_storagenode_hostname:device_name
For example:
rd=dzone1_sn2:dd_1
b. In the Device access information field, type the Data Domain hostname
followed by a colon and the path to the device folder.
If you are configuring a device with secure multi-tenancy (SMT) protection,
the device folder must reside in a password-protected tenant unit on the
Data Domain. Configuring the Data Domain system for DD Boost by using
the CLI on page 53 provides details.
Use the following format:
DD_hostname:/DD_storage_unit_name/device_name
where, as a best practice, DD_storage_unit_name is the short hostname of
the NetWorker server and device_name is a name for the device, which
appears as a folder.
For example, the following figure uses the following name:
ddr1:/dzone1/dd_1
NetWorker does not limit the number device folders that you can create, but
the Device access information field accepts one device folder only. Do not
create any folders within a device folder.
Note: Implicit in this pathname is the hidden mount point folder /data/
col1. Do not modify this folder structure, which all NetWorker servers
use.
Figure 39 Example of the device name and the access information for a DD Boost
device
c. In the Media type field, select Data Domain from the list.
5. On the Configuration tab, in the Save Sessions area, set the number of
concurrent save sessions (streams) and the number of nsrmmd (media storage)
processes that the device can handle:
l In the Target sessions field, specify the number of save sessions that a
nsrmmd process on the device handles before another device on the Data
Domain host takes the additional sessions. If another device is not available,
then another nsrmmd process on the same device takes the additional
sessions. Use this setting to balance the sessions load among nsrmmd
processes.
It is recommended that you set this field to a low value. The default value is
20. The maximum value is 60.
l In the Max sessions field, specify the maximum number of save sessions
that the device can handle. At the maximum limit, if no additional devices are
available on the host, then another available Data Domain system takes the
additional sessions. If no other Data Domain hosts are available, then the
system retries the save sessions until a nsrmmd process become available.
The default value is 60. The maximum value is 60.
Note: The Max sessions setting does not apply to concurrent recovery
sessions.
l In the Max nsrmmd count field, specify the maximum number of nsrmmd
processes that can run on the device. Use this setting to balance the
nsrmmd load among devices.
If you enabled Dynamic nsrmmds on the storage node, NetWorker
automatically adjusts this value by using the formula max/target +4, with the
default value being 14. Otherwise, the default value is 4.
To modify this value, first adjust the two sessions fields, apply and monitor
the effects, and then tweak the Max nsrmmd count value.
Note: NetWorker reserves at least one nsrmmd process for restore and
clone operations.
6. In the Remote user and Password fields, type the DD Boost username and
password, respectively.
You can only define one DD Boost (OST) user. All NetWorker storage nodes and
servers that access the Data Domain system must use the same username and
password.
Note: Avoid changing the user of an existing device with a labeled volume.
The new user will not have write permission to the files and directories that
are created by the previous user and cannot re-label the volume. Create a
device for the new user.
7. If you want the DD Boost device to use FC connectivity, complete the following
steps:
a. Select the Enable fibre channel field.
b. In the Fibre Channel Host Name field, type the hostname that the Data
Domain system uses to identify itself for FC operations. By default, this
hostname is the same name used for IP operations, but the hostnames can
be different. The hostname must match the Server Name displayed on the
Data Domain system in the Data Management > DD Boost > Fibre Channel
tab of the Data Domain Enterprise Manager. The name is case-sensitive.
Note: All NetWorker clients that use an FC-enabled DD Boost device
must be enabled for FC in the Data Domain Interface field.
8. If you want to enable DD Retention Lock on the Data Domain device, select
Governance mode or Compliance mode from the DD Retention Lock Mode
drop-down. If you do not want to use DD Retention Lock on this device, select
None.
Figure 40 Data Domain Device Properties Configuration tab
11. Ensure that the device is associated with a NetWorker storage volume before
you try to use the device. Otherwise, an error appears. Labeling and mounting
devices on the storage node provides the procedure.
dd_1a
rd=dzone1_sn2:dd_1b
rd=dzone1_sn3:dd_1c
The Device access information field would specify the same single directory as a
valid complete path for each alias.
For example, for a directory named dd_1 on the Data Domain storage host named ddr1,
specify the correct pathname:
l If the storage node uses an automounter, you can specify the following pathname:
/net/ddr1/dzone1/dd_1
l If the storage node uses an explicit system mount point, you can specify one of
the following pathnames:
/mnt/ddr1/dzone1/dd_1
/mnt/dzone1/dd_1
a DD Boost device. A label template provides a DD Boost device with a volume name
and numbering to all storage volumes that belong to the same pool.
A label template defines the components of a volume label, which includes the volume
name, a separator, and volume number. All the volumes in the same pool will have the
same label name, for example, dd_myvol, but different volume numbers, for
example, .001.003.
For example, a Data Domain system may have three devices, each of which is
mounted with a storage volume (Volume Name). If each device/volume is associated
with the same pool, the volume names would be as follows:
l dd_myvol.001
l dd_myvol.002
l dd_myvol.003
To create a label template, perform the following steps:
Procedure
1. In the NetWorker Administration window, click Media.
2. In the browser tree, select Label Templates, and from the File menu, click
New.
The Create Label Template window appears.
3. In the Name and Comment fields, type a name and description for the label
template. The label will associate a storage pool to a device.
4. In the Fields field, type the components of the label. Place each label
component on a separate line. The template must include at least one volume
number range component. NetWorker applies the label template to the volumes
mounted on DD Boost devices in a Data Domain system.
For example:
dd_myvol
001-999
Complete the following steps to manually create a pool for Data Domain backups:
Procedure
1. Ensure that the devices that you assign to the pool were created in NetWorker.
2. Ensure that a label template has been created for the pool. Creating a volume
label template for DD Boost devices on page 99 provides details.
3. From the NetWorker Administration window, click Media.
4. In the left navigation pane, select Media Pools, and from the File menu, select
New to open the Create Media Pool window with the Basic tab selected.
5. In the Name field, type a name for each pool. Create names that clearly indicate
whether the pool is for a Data Domain backup or a Data Domain clone operation.
For example:
DDsite1
DDCLsite2
A pool name that starts with DD would be a Data Domain pool, and a pool name
that starts with DDCL would be a Data Domain clone pool. The pool name can
also include the physical location where NetWorker stores the backup data.
These conventions make the name easier to use for scripting and reporting.
10. On the Selection Criteria tab, under Target Devices, select all the DD Boost
devices that this pool may use for storage. The pool may store data on any of
these devices. Use the following practices:
l Select only DD Boost devices for the pool. Do not mix DD Boost devices with
other types of storage devices. If you modify a pool in this step, ensure that
the pool excludes all devices that are not DD Boost devices.
l Select only DD Boost devices that reside on the same Data Domain system.
To add DD Boost devices that reside on other Data Domain systems, first
save the pool configuration, and then modify the pool and add the DD Boost
devices.
l Do not select devices that reside on more than one Data Domain system.
Backups from a single NetWorker client can target any of these Data
Domain systems. This behavior impairs the backup window and deduplication
ratio.
Note: Backups from a single NetWorker client can target any of these Data
Domain systems. This behavior impairs the backup window and
deduplication ratio.
11. Under Media type required, if you intend to use the pool for a Data Domain
backup only, set this field to Data Domain. This setting ensures that only Data
Domain devices use this pool.
Note: It is recommended that you do not include different media types in a
single pool. Backup fails for older NetWorker application modules on page
191 provides further details.
Disabling a device
When you disable a DD Boost device, NetWorker does not use the device for backup,
recovery, or clone operations. You can reenable the device to restore old data that is
retained on the device.
Procedure
1. Use NMC to connect to the NetWorker server, select the Devices view. In the
left navigation pane, select the Data Domain Systems folder.
2. In the Data Domain Systems table, right-click the device that you want to
disable, and select Unmount.
3. Right-click the device, and select Enable/Disable.
4. Confirm that the Enabled column of the table contains No, which indicates that
you have disabled the device.
l You can create the group before you create the workflow, or you can create the
group after you create the workflow and then assign the group to the workflow
later.
Actions
Actions are the key resources in a workflow for a data protection policy and define a
specific task (for example, a backup or clone) that occurs on the client resources in
the group assigned to the workflow. NetWorker uses a work list to define the task. A
work list is composed of one or several work items. Work items include client
resources, virtual machines, save sets, or tags. You can chain multiple actions
together to occur sequentially or concurrently in a workflow. All chained actions use
the same work list.
When you configure an action, you define the days on which to perform the action, as
well as other settings specific to the action. For example, you can specify a destination
pool, a retention period, and a target storage node for the backup action, which can
differ from the subsequent action that clones the data.
When you create an action for a policy that is associated with the virtual machine
backup, you can select one of the following data protection action types:
l Backup — Performs a backup of virtual machines in vCenter to a Data Domain
system. You can only perform one VMware backup action per workflow. The
VMware backup action must occur before clone actions.
l Clone — Performs a clone of the VMware backup on a Data Domain system to any
clone device that NetWorker supports (including Data Domain system or tape
targets). You can specify multiple clone actions. Clone actions must occur after
the Backup action.
You can create multiple actions for a single workflow. However, each action applies to
a single workflow and policy.
The following figure provides a high level overview of the components that make up a
data protection policy in a datazone.
Figure 41 Data Protection Policy
To use these pre-configured data protection policies, you must add clients to the
appropriate group resource.
Note: NMC also includes a pre-configured Server Protection policy to protect the
NetWorker and NMC server databases.
Platinum policy
The Platinum policy provides an example of a data protection policy for an
environment that contains supported storage arrays or storage appliances and
requires backup data redundancy. The policy contains one workflow with two actions,
a snapshot backup action, followed by a clone action.
Figure 42 Platinum policy configuration
Gold policy
The Gold policy provides an example of a data protection policy for an environment
that contains virtual machines and requires backup data redundancy.
Silver policy
The Silver policy provides an example of a data protection policy for an environment
that contains machines where file systems or applications are running and requires
backup data redundancy.
Bronze policy
The Bronze policy provides an example of a data protection policy for an environment
that contains machines where file systems or applications are running.
The following figure illustrates a policy with two different workflows. Workflow 1
performs a probe action, then a backup of the client resources in Client group 1, and
then a clone of the save sets from the backups. Workflow 2 performs a backup of the
client resources in Dynamic client group 1, and then a clone of the save sets from the
backup.
Creating a policy
Procedure
1. In the Administration window, click Protection.
2. In the expanded left pane, right-click Policies, and then select New.
The Create Policy dialog box appears.
3. On the General tab, in the Name field, type a name for the policy.
The maximum number of characters for the policy name is 64.
l Legal Characters: _ : - + = # , . % @
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the
smtpmail program assumes that the message contains a correctly
formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to
relay the SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the
notification. Multiple email recipients are separated by a space.
7. To specify the Restricted Data Zone (RDZ) for the policy, select the Restricted
Data Zones tab, and then select the RDZ from the list.
8. Click OK.
After you finish
Create the workflows and actions for the policy.
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the
smtpmail program assumes that the message contains a correctly
formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to
relay the SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the
notification. Multiple email recipients are separated by a space.
8. In the Running section, perform the following steps to specify when and how
often the workflow runs:
a. To ensure that the actions that are contained in the workflow run when the
policy or workflow starts, in the Enabled box, leave the option selected. To
prevent the actions in the workflow from running when the policy or
workflow that contains the action starts, clear this option.
b. To start the workflow at the time that is specified in the Start time
attribute, on the days that are defined in the action resource, in the
AutoStart Enabled box, leave the option selected. To prevent the workflow
from starting at the time that is specified in the Start time attribute, clear
this option.
c. To specify the time to start the actions in the workflow, in the Start Time
attribute, use the spin boxes.
The default value is 9:00 PM.
d. To specify how frequently to run the actions that are defined in the
workflow over a 24-hour period, use the Interval attribute spin boxes. If you
are performing transaction log backup as part of application-consistent
protection, you must specify a value for this attribute in order for
incremental transaction log backup of SQL databases to occur.
The default Interval attribute value is 24 hours, or once a day. When you
select a value that is less than 24 hours, the Interval End attribute appears.
To specify the last start time in a defined interval period, use the spin boxes.
4. From the Group Type list, leave the default selection of Clients.
5. In the Comment field, type a description of the group.
6. From the Policy-Workflow list, select the workflow that you want to assign the
group to.
Note: You can also assign the group to a workflow when you create or edit a
workflow.
7. (Optional) To specify the Restricted Datazone (RDZ) for the group, on the
Restricted Datazones tab, select the RDZ from the list.
8. Click OK.
After you finish
Create Client resources. Assign clients to a protection group, by using the Client
Configuration wizard or the General tab on the Client Properties page.
4. From the Group Type list, select Dynamic Clients. For steps 5 to 8, follow the
instructions given in Creating a client group.
14. In the Parallelism field, specify the maximum number of concurrent operations
for the action. This is applicable if multiple rollover is implemented at an action
level.
15. From the Failure Impact list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the current action if there is a failure with one of the jobs, but
continue with subsequent actions in the workflow, select Abort action.
Note: The Abort action option applies to probe actions, and the backup
actions for the Traditional and Snapshot action types.
l To abort the entire workflow if there is a failure with one of the jobs in the
action, select Abort workflow.
Note: If any of the actions fail in the workflow, the workflow status does
not appear as interrupted or cancelled. NetWorker reports the workflow
status as failed.
16. From the Soft Limit list, select the amount of time after the action starts to
stop the initiation of new activities. The default value of 0 (zero) indicates no
amount of time.
17. From the Hard Limit list, select the amount of time after the action starts to
begin terminating activities. The default value of 0 (zero) indicates no amount
of time.
18. (Optional) In Start Time specify the time to start the action.
Use the spin boxes to set the hour and minute values, and select one of the
following options from the drop-down list:
l Disabled—Do not enforce an action start time. The action will start at the
time defined by the workflow.
l Absolute—Start the action at the time specified by the values in the spin
boxes.
l Relative—Start the action after the period of time defined in the spin boxes
has elapsed after the start of the workflow.
19. (Optional) Configure overrides for the task that is scheduled on a specific day.
To specify the month, use the navigation buttons and the month list box. To
specify the year, use the spin boxes. You can set an override in the following
ways:
l Select the day in the calendar, which changes the action task for the
specific day.
l Use the action task list to select the task, and then perform one of the
following steps:
n To define an override that occurs on a specific day of the week, every
week, select Specified day, and then use the lists. Click Add Rules
based override.
n To define an override that occurs on the last day of the calendar month,
select Last day of the month. Click Add Rules based override.
Note:
n You can edit or add the rules in the Override field.
n To remove an override, delete the entry from the Override field.
l Snapshot backup
code is 0 (zero), then a client backup is required. If the return code is 1, then a client
backup is not required.
Before you begin
l Create the probe resource script on the NetWorker clients that use the probe.
Create a client probe resource on the NetWorker server. Associate the client
probe resource with the client resource on the NetWorker server.
l Create the policy and workflow that contain the action.
l Optional. Create a check connectivity action to precede the probe action in the
workflow. A check connectivity action is the only supported action that can
precede a probe action in a workflow.
Procedure
1. In the expanded left pane, select the policy's workflow, and then perform one of
the following tasks in the right pane to start the Policy Action wizard:
l If the action is the first action in the workflow, select Create a new action.
l If the workflow has other actions, right-click an empty area of the Actions
pane, and then select New.
The Policy Action wizard opens on the Specify the Action Information page.
2. In the Name field, type the name of the action.
The maximum number of characters for the action name is 64.
l Legal Characters: _ : - + = # , . % @
l Illegal Characters: /\*?[]()$!^;'"`~><&|{}
6. If you create the action as part of the workflow configuration, the workflow
appears automatically in the Workflow box and the box is dimmed.
7. Specify the order of the action in relation to other actions in the workflow:
l If the action is part of a sequence of actions in a workflow path, in the
Previous box, select the action that should precede this action.
l If the action should run concurrently with an action, in the Previous box,
select the concurrent action, and then select the Concurrent checkbox.
8. Specify a weekly or monthly schedule for the action:
l To specify a schedule for each day of the week, select Weekly by day.
l To specify a schedule for each day of the month, select Monthly by day.
9. Specify the days to probe the client:
l To perform a probe action on a specific day, click the Execute icon on the
day.
14. In the Retry Delay field, specify a delay in seconds to wait before retrying a
failed probe or backup action. When the Retry Delay value is 0, NetWorker
retries the failed probe or backup action immediately.
Note: The Retry Delay option applies to probe actions, and the backup
actions for the Traditional and Snapshot action types. When you specify a
value for this option in other actions, NetWorker ignores the values.
15. In the Inactivity Timeout field, specify the maximum number of minutes that a
job run by an action can try to respond to the server.
If the job does not respond within the specified time, the server considers the
job a failure and NetWorker retries the job immediately to ensures that no time
is lost due to failures.
Increase the timeout value if a backup consistently stops due to inactivity.
Inactivity might occur for backups of large save sets, backups of save sets with
large sparse files, and incremental backups of many small static files.
Note: The Inactivity Timeout option applies to probe actions, and the
backup actions for the Traditional and Snapshot action types. If you specify
a value for this option in other actions, NetWorker ignores the value.
16. In the Parallelism field, specify the maximum number of concurrent operations
for the action. This is applicable if multiple rollover is implemented at an action
level.
17. From the Failure Impact list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the current action if there is a failure with one of the jobs, but
continue with subsequent actions in the workflow, select Abort action.
Note: The Abort action option applies to probe actions, and the backup
actions for the Traditional and Snapshot action types.
l To abort the entire workflow if there is a failure with one of the jobs in the
action, select Abort workflow.
Note: If any of the actions fail in the workflow, the workflow status does
not appear as interrupted or cancelled. NetWorker reports the workflow
status as failed.
18. Do not change the default selections for the Notification group box. NetWorker
does not support notifications for probe actions and ignores and specified
values.
19. From the Soft Limit list, select the amount of time after the action starts to
stop the initiation of new activities. The default value of 0 (zero) indicates no
amount of time.
20. From the Hard Limit list, select the amount of time after the action starts to
begin terminating activities. The default value of 0 (zero) indicates no amount
of time.
21. (Optional) In Start Time specify the time to start the action.
Use the spin boxes to set the hour and minute values, and select one of the
following options from the drop-down list:
l Disabled—Do not enforce an action start time. The action will start at the
time defined by the workflow.
l Absolute—Start the action at the time specified by the values in the spin
boxes.
l Relative—Start the action after the period of time defined in the spin boxes
has elapsed after the start of the workflow.
22. (Optional) Configure overrides for the task that is scheduled on a specific day.
To specify the month, use the navigation buttons and the month list box. To
specify the year, use the spin boxes. You can set an override in the following
ways:
l Select the day in the calendar, which changes the action task for the
specific day.
l Use the action task list to select the task, and then perform one of the
following steps:
7. If you create the action as part of the workflow configuration, the workflow
appears automatically in the Workflow box and the box is dimmed.
8. Specify the order of the action in relation to other actions in the workflow:
l If the action is part of a sequence of actions in a workflow path, in the
Previous box, select the action that should precede this action.
l If the action should run concurrently with an action, in the Previous box,
select the concurrent action, and then select the Concurrent checkbox.
9. Specify a weekly or monthly schedule for the action:
l To specify a schedule for each day of the week, select Weekly by day.
l To specify a schedule for each day of the month, select Monthly by day.
10. To specify the backup level to perform, click the icon on each day.
The following table provides details about the backup level that each icon
represents.
To perform the same type of backup on each day, select the backup type from
the list and click Make All.
15. From the Client Override Behavior box, specify how NetWorker uses certain
client configuration attributes that perform the same function as attributes in
the Action resource:
l Client Can Override—The values in the Client resource for Schedule, Pool,
Retention policy, and the Storage Node attributes take precedence over
the values that are defined in the equivalent Action resource attributes.
Note: If the NetWorker policy action schedule is set to the Skip backup
level, the Client can Override option is not honored. For NetWorker to
consider the Client can Override option, change the action schedule to
a different level.
l Client Can Not Override—The values in the Action resource for the
Schedule, Destination Pool, Destination Storage Node, and the
Retention attributes take precedence over the values that are defined in the
equivalent Client resource attributes.
l Legacy Backup Rules—This value only appears in actions that are created
by the migration process. The updating process sets the Client Override
Behavior for the migrated backup actions to Legacy Backup Rules.
16. Select the Apply DD Retention Lock checkbox to enable retention lock for the
save sets included in this backup action. Note that the device used for backing
up these save sets must also have DD Retention lock enabled in the Device
Properties window or during device creation.
17. In the DD Retention Lock Time box, specify the duration the save sets will
remain on the Data Domain device before the retention lock expires. During this
time, these save sets cannot be overwritten, modified, or deleted for the
duration of the retention period, although the backups can be mounted and
unmounted. The retention time period set here must fall within the minimum
and maximum values set for the Data Domain Mtree, and should be lower than
or equal to the NetWorker Retention Period.
18. Click Next.
The Specify the Advanced Options page appears.
19. In the Retries field, specify the number of times that NetWorker should retry a
failed probe or backup action, before NetWorker considers the action as failed.
When the Retries value is 0, NetWorker does not retry a failed probe or backup
action.
Note: The Retries option applies to probe actions, and the backup actions
for the Traditional and Snapshot action types. If you specify a value for this
option for other actions, NetWorker ignores the values.
20. In the Retry Delay field, specify a delay in seconds to wait before retrying a
failed probe or backup action. When the Retry Delay value is 0, NetWorker
retries the failed probe or backup action immediately.
Note: The Retry Delay option applies to probe actions, and the backup
actions for the Traditional and Snapshot action types. When you specify a
value for this option in other actions, NetWorker ignores the values.
21. In the Inactivity Timeout field, specify the maximum number of minutes that a
job run by an action can try to respond to the server.
If the job does not respond within the specified time, the server considers the
job a failure and NetWorker retries the job immediately to ensures that no time
is lost due to failures.
Increase the timeout value if a backup consistently stops due to inactivity.
Inactivity might occur for backups of large save sets, backups of save sets with
large sparse files, and incremental backups of many small static files.
Note: The Inactivity Timeout option applies to probe actions, and the
backup actions for the Traditional and Snapshot action types. If you specify
a value for this option in other actions, NetWorker ignores the value.
22. In the Parallelism field, specify the maximum number of concurrent operations
for the action. This is applicable if multiple rollover is implemented at an action
level.
23. From the Failure Impact list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the current action if there is a failure with one of the jobs, but
continue with subsequent actions in the workflow, select Abort action.
Note: The Abort action option applies to probe actions, and the backup
actions for the Traditional and Snapshot action types.
l To abort the entire workflow if there is a failure with one of the jobs in the
action, select Abort workflow.
Note: If any of the actions fail in the workflow, the workflow status does
not appear as interrupted or cancelled. NetWorker reports the workflow
status as failed.
24. From the Soft Limit list, select the amount of time after the action starts to
stop the initiation of new activities. The default value of 0 (zero) indicates no
amount of time.
25. From the Hard Limit list, select the amount of time after the action starts to
begin terminating activities. The default value of 0 (zero) indicates no amount
of time.
26. Optional, in Start Time specify the time to start the action.
Use the spin boxes to set the hour and minute values, and select one of the
following options from the drop-down list:
l Disabled—Do not enforce an action start time. The action will start at the
time defined by the workflow.
l Absolute—Start the action at the time specified by the values in the spin
boxes.
l Relative—Start the action after the period of time defined in the spin boxes
has elapsed after the start of the workflow.
27. (Optional) Configure overrides for the task that is scheduled on a specific day.
To specify the month, use the navigation buttons and the month list box. To
specify the year, use the spin boxes. You can set an override in the following
ways:
l Select the day in the calendar, which changes the action task for the
specific day.
l Use the action task list to select the task, and then perform one of the
following steps:
n To define an override that occurs on a specific day of the week, every
week, select Specified day, and then use the lists. Click Add Rules
based override.
n To define an override that occurs on the last day of the calendar month,
select Last day of the month. Click Add Rules based override.
Note:
n You can edit or add the rules in the Override field.
n To remove an override, delete the entry from the Override field.
28. From the Send Notifications list box, select whether to send notifications for
the action:
l To use the notification configuration that is defined in the Policy resource to
send the notification, select Set at policy level.
l To send a notification on completion of the action, select On Completion.
l To send a notification only if the action fails to complete, select On Failure.
29. In the Send notification attribute, when you select the On Completion option
or On failure option, the Command box appears. Use this box to configure how
NetWorker sends the notifications. You can use the nsrlog command to send
the notifications to a log file or you can send an email notification.
The default notification action is to send the information to the
policy_notifications.log file. By default, the
policy_notifications.log file is located in the /nsr/logs directory on
Linux and in the C:\Program Files\EMC NetWorker\nsr\logs folder on
Windows.
Use the default mailer program on Linux to send email messages or the
smtpmail application on Windows:
l To send notifications to a file, type the following command, where
policy_notifications.log is the name of the file:
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the
smtpmail program assumes that the message contains a correctly
formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to
relay the SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the
notification. Multiple email recipients are separated by a space.
c. In the Delete source save sets after clone completes box, select the
option to instruct NetWorker to move the data from the source volume to
the destination volume after clone operation completes. This is equivalent to
staging the save sets.
d. From the Destination pool list, select a clone pool.
To clone to a DD Cloud Tier device, select a Cloud Tier pool.
e. From the Retention list, specify the amount of time to retain the cloned
save sets.
After the retention period expires, the save sets are marked as recyclable
during an expiration server maintenance task.
12. Select the Apply DD Retention Lock checkbox to enable Retention Lock for
the save sets included in this clone action. Note that the device used for cloning
these save sets must also have DD Retention lock enabled in the Device
Properties window or during device creation.
13. In the DD Retention Lock Time box, specify the duration the save sets will
remain on the Data Domain device before the Retention Lock expires. During
this time, these save sets cannot be overwritten, modified, or deleted for the
duration of the retention period, although the device with the cloned backup
can be mounted and unmounted. The retention time period set here must fall
within the minimum and maximum values set for the Data Domain Mtree, and
should be lower than or equal to the NetWorker Retention Period.
14. In the Filters section, define the criteria that NetWorker uses to create the list
of eligible save sets to clone. The eligible save sets must match the
requirements that are defined in each filter. NetWorker provides the following
filter options:
a. Time filter—In the Time section, specify the time range in which NetWorker
searches for eligible save sets to clone in the media database. Use the spin
boxes to specify the start time and the end time. The Time filter list includes
the following options to define how NetWorker determines save set
eligibility, based on the time criteria:
l Do Not Filter—NetWorker inspects the save sets in the media database
to create a clone save set list that meets the time filter criteria.
l Accept—The clone save set list includes save sets that are saved within
the time range and meet all the other defined filter criteria.
l Reject—The clone save set list does not include save sets that are saved
within the time range and meet all the other defined filter criteria.
b. Save Set filter—In the Save Set section, specify whether to include or
exclude ProtectPoint and Snapshot save sets, when NetWorker searches for
eligible save sets to clone in the media database. The Save Set filter list
includes to the following options define how NetWorker determines save set
eligibility, based on the save set filter criteria:
l Do Not Filter—NetWorker inspects the save sets in the media database
to create a clone save set list that meets the save set filter criteria.
l Accept—The clone save set list includes eligible ProtectPoint save sets
or Snapshot save sets, when you also enable the ProtectPoint checkbox
or Snapshot checkbox.
l Reject—The clone save set list does not include eligible ProtectPoint
save sets and Snapshot save sets when you also enable the ProtectPoint
checkbox or Snapshot checkbox.
Note: For NAS device, only Snapshot save set is applicable.
l Accept—The clone save set list includes eligible save sets for the
selected clients.
l Reject—The clone save set list does not include eligible save sets for the
selected clients.
d. Levels filter—In the Levels section, specify a list of backup levels to include
or exclude, when NetWorker searches for eligible save sets to clone in the
media database. The Levels filter list includes the following options define
how NetWorker determines save set eligibility, based on the level filter
criteria:
l Do Not Filter—NetWorker inspects the save sets regardless of the level
in the media database, to create a clone save set list that meets all the
level filter criteria.
l Accept—The clone save set list includes eligible save sets with the
selected backup levels.
l Reject—The clone save set list does not include eligible save sets with
the selected backup levels.
Note: For NAS device, only full backup level is applicable.
17. In the Parallelism field, specify the maximum number of concurrent operations
for the action. This is applicable if multiple rollover is implemented at an action
level.
18. From the Failure Impact list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the current action if there is a failure with one of the jobs, but
continue with subsequent actions in the workflow, select Abort action.
Note: The Abort action option applies to probe actions, and the backup
actions for the Traditional and Snapshot action types.
l To abort the entire workflow if there is a failure with one of the jobs in the
action, select Abort workflow.
Note: If any of the actions fail in the workflow, the workflow status does
not appear as interrupted or cancelled. NetWorker reports the workflow
status as failed.
19. From the Send Notifications list box, select whether to send notifications for
the action:
l To use the notification configuration that is defined in the Policy resource to
send the notification, select Set at policy level.
l To send a notification on completion of the action, select On Completion.
l To send a notification only if the action fails to complete, select On Failure.
20. In the Send notification attribute, when you select the On Completion option
or On failure option, the Command box appears. Use this box to configure how
NetWorker sends the notifications. You can use the nsrlog command to send
the notifications to a log file or you can send an email notification.
The default notification action is to send the information to the
policy_notifications.log file. By default, the
policy_notifications.log file is located in the /nsr/logs directory on
Linux and in the C:\Program Files\EMC NetWorker\nsr\logs folder on
Windows.
Use the default mailer program on Linux to send email messages or the
smtpmail application on Windows:
l To send notifications to a file, type the following command, where
policy_notifications.log is the name of the file:
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the
smtpmail program assumes that the message contains a correctly
formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to
relay the SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the
notification. Multiple email recipients are separated by a space.
21. From the Soft Limit list, select the amount of time after the action starts to
stop the initiation of new activities. The default value of 0 (zero) indicates no
amount of time.
22. From the Hard Limit list, select the amount of time after the action starts to
begin terminating activities. The default value of 0 (zero) indicates no amount
of time.
23. Optional, in Start Time specify the time to start the action.
Use the spin boxes to set the hour and minute values, and select one of the
following options from the drop-down list:
l Disabled—Do not enforce an action start time. The action will start at the
time defined by the workflow.
l Absolute—Start the action at the time specified by the values in the spin
boxes.
l Relative—Start the action after the period of time defined in the spin boxes
has elapsed after the start of the workflow.
24. (Optional) Configure overrides for the task that is scheduled on a specific day.
To specify the month, use the navigation buttons and the month list box. To
specify the year, use the spin boxes. You can set an override in the following
ways:
l Select the day in the calendar, which changes the action task for the
specific day.
l Use the action task list to select the task, and then perform one of the
following steps:
n To define an override that occurs on a specific day of the week, every
week, select Specified day, and then use the lists. Click Add Rules
based override.
n To define an override that occurs on the last day of the calendar month,
select Last day of the month. Click Add Rules based override.
Note:
n You can edit or add the rules in the Override field.
n To remove an override, delete the entry from the Override field.
The oval icon specifies the group to which the workflow applies. The rounded
rectangle icons identify actions. The parallelogram icons identify the destination pool
for the action.
l You can adjust the display of the visual representation by right-clicking and
selecting one of the following options:
n Zoom In—Increase the size of the visual representation.
n Zoom Out—Decrease the size of the visual representation.
Clone formats
Yo can clone data that is stored on a Data Domain device in one of two formats, which
depend on the target media device:
l CCR format
l Regular clone format
are most noticeable when there are many backup save sets in the backup queue or
when there are many save sets of different sizes.
You can set up immediate cloning by specifying the clone action as concurrent to the
previous backup action in a policy workflow.
CCR requirements
Before you use CCR to clone data, ensure that following requirements are met.
1. Ensure that both the source and target storage nodes are clients of the same
NetWorker server.
2. Ensure that the Data Domain systems are properly licensed, including a replication
license, which is required to create optimized clones.
3. Ensure that the Client resource for the NetWorker server and both storage nodes
specify all of the host identifiers in the Aliases attribute.
l Fully-qualified domain name
l Short name
l Aliases
l IP address
Note: If you use an nsrclone command to perform an optimized clone
from a host that is not the NetWorker server, then you must specify the
primary hostname of the NetWorker server by using the -S option. The
primary hostname of the NetWorker server is the name that appears in the
NMC Enterprise view. Otherwise, a regular clone might be produced
instead of an optimized clone.
4. Ensure that a target pool, for example, newclonepool, has been created for Backup
Clone type with the Media type required attribute set to Data Domain.
With this setting, if a Data Domain device is not available for a clone operation in
the specified target pool, then NMC displays a "Media waiting" message.
5. Ensure that the source Data Domain device is mounted and available on the source
storage node.
If the source device is not mounted, then NetWorker will perform a regular, non-
deduplicated clone. However, if the specified target pool is of Backup Clone type
with the Media type required attribute set to Data Domain a non-deduplicated
clone will not be performed.
6. Ensure that the target Data Domain device is labeled for a clone pool, and mounted
on the target storage node. The pool selected for the device label operation, for
example, newclonepool, must be of Backup Clone pool type.
7. Verify that the target clone pool, for example, newclonepool, is properly specified
or selected:
Cloning by pools
To copy save sets from Data Domain storage to a Data Domain device, you must
specify a pool. This pool is known as a "clone pool." A clone pool must be assigned to a
device on the target Data Domain system, where it will be available for use.
There are two main purposes for a clone pool:
l To copy existing deduplicated VTL or CIFS/NFS AFTD save sets to a Data Domain
device.
l To copy the existing save sets from one Data Domain device to another Data
Domain device, typically at a remote location for disaster recovery purposes.
Clone formats
The type of NetWorker clone you produce depends on the type of storage media you
use for the clone. NetWorker will use either CCR when cloning to DD Boost devices or
a normal clone when cloning to conventional storage media.
CCR format
When NetWorker clones data from a source DD Boost device to a target DD Boost
device, usually at a geographically distant location, the operation uses CCR, also
known as optimized clone or DD format clone. CCR is a fast process that uses low
bandwidth, multiple parallel sessions, and low storage capacity. You can use CCR
clones for data recovery or to create additional copies with minimal impact on the
primary operations of production, backup, or recovery.
CCR operations use only IP connectivity between DD Boost devices on separate Data
Domain systems, whether you have configured the participating devices for FC or IP.
For CCR operations on the same Data Domain system, Dell EMC recommends that
you replicate the data between two different SUs (MTrees), so you can apply
different retention policies and manage the data independently. When you perform
CCR operations to disks that reside within the same Data Domain system, CCR uses
fast copy operation.
During the CCR process, the storage node reviews the incoming clone for data that
NetWorker has already stored on the target DD Boost device. The storage node stores
only unique data that does not exist on the device.
enhancements to load balancing so that the load (save sets to clone) is spread evenly
across the multi-threaded nsrclone process were implemented.
By default the AMS feature is disabled. You can turn on the feature by changing the
command to ams_enabled=yes An example of how you can enable AMS is below:
Data Domain FC and IP hostnames are the same by default but they can be
different. If they are different you must map the host Data Domain FC server
name to its own IP address as follows:
a. Open the Data Domain Enterprise Manager, and navigate to the Data
Management > DD Boost. The Data Domain Server Name appears on the
Fibre Channel tab.
Alternatively, type the following command:
b. Associate this server name to the IP address in the /etc/hosts file with
the following command:
net hosts add fc_server_name IP_address
For example, if the Data Domain system has the IP address 10.99.99.99 and
the IP hostname dd555-5.lss.mcm.com, and the DFC server name is dd-
tenendo, then type the following command:
backup copies are created in order. The clone action is triggered only after the
backup copy is created for save set 100.
Note: Sequential cloning is the preferred cloning method.
The nsrcloneconfig file enables you to add debug flags, control cloning sessions,
and use the AMS functionality. It must be manually created under the /nsr/debug
folder.
By default, AMS is disabled. To enable AMS, ensure that the ams_enabled flag is set
to Yes.
The following table describes the nsrcloneconfig file details and their default
values.
Debug 9
Note: The Backup Data Management chapter describes how you can clone save
sets manually by using the nsrclone command.
Procedure
1. Create a group to define the data to clone.
2. Create a policy. When you create a policy, you specify the name and notification
settings for the policy.
3. Within the policy, create a workflow. When you create a workflow, you specify
the name of the workflow, the schedule for running the workflow, notification
settings for the workflow, and the protection group to which the workflow
applies.
4. Create one or more clone actions for the workflow.
l Legal Characters: _ : - + = # , . % @
l Illegal Characters: /\*?[]()$!^;'"`~><&|{}
Criteria Description
Date and time range Specify the start date and time range for the save sets.
To specify the current date and time as the end date for the range,
select Up to now.
Backup level In the Filter save sets by level section, next to the backup level for
the save set, select the full checkbox.
Note: Only the full backup level is applicable for network-attached
storage (NAS) devices.
Limit the number of Specify the number for the limit in the Limit number of clones list.
clones The clone limit is the maximum number of clone instances that can be
created for the save set. By default, the value is set to 1, and cannot
be changed for NAS or Block.
Note: When this criteria is set to 1, which is the default value, you
may experience volume outage issues with Data Domain and
advanced file type devices.
Client Next to one or more client resources that are associated with the save
set in the Client list, select the checkbox.
Policy Next to the policy used to generate the save set in the Policy list,
select the checkbox.
Workflow Next to the workflow used to generate the save set in the Workflow
list, select the checkbox.
Action Next to the action used to generate the save set in the Action list,
select the checkbox.
Group Next to the group associated with the save set in the Group list,
select the checkbox.
Pools Next to the media pool on which the save set is stored in the Pools
list, select the checkbox.
Note: You cannot select Pools for NAS.
Name In the Filter save sets by name field, specify the name of the save
set.
Note: You cannot use wildcards to specify the save set name.
If you specify multiple criteria, the save set must match all the criteria to belong
to the group.
8. To specify the Restricted Data Zone (RDZ) for the group, select the Restricted
Data Zones tab, and then select the RDZ from the list.
9. Click OK.
Creating a policy
Procedure
1. In the Administration window, click Protection.
2. In the expanded left pane, right-click Policies, and then select New.
The Create Policy dialog box appears.
3. On the General tab, in the Name field, type a name for the policy.
The maximum number of characters for the policy name is 64.
l Legal Characters: _ : - + = # , . % @
l Illegal Characters: /\*?[]()$!^;'"`~><&|{}
Note: After you create a policy, the Name attribute is read-only.
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the
smtpmail program assumes that the message contains a correctly
formatted email header and nothing is added.
7. To specify the Restricted Data Zone (RDZ) for the policy, select the Restricted
Data Zones tab, and then select the RDZ from the list.
8. Click OK.
After you finish
Create the workflows and actions for the policy.
nsrlog -f policy_notifications.log
where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the
smtpmail program assumes that the message contains a correctly
formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to
relay the SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the
notification. Multiple email recipients are separated by a space.
8. In the Running section, perform the following steps to specify when and how
often the workflow runs:
a. To ensure that the actions that are contained in the workflow run when the
policy or workflow starts, in the Enabled box, leave the option selected. To
prevent the actions in the workflow from running when the policy or
workflow that contains the action starts, clear this option.
b. To start the workflow at the time that is specified in the Start time
attribute, on the days that are defined in the action resource, in the
AutoStart Enabled box, leave the option selected. To prevent the workflow
from starting at the time that is specified in the Start time attribute, clear
this option.
c. To specify the time to start the actions in the workflow, in the Start Time
attribute, use the spin boxes.
The default value is 9:00 PM.
d. To specify how frequently to run the actions that are defined in the
workflow over a 24-hour period, use the Interval attribute spin boxes. If you
are performing transaction log backup as part of application-consistent
protection, you must specify a value for this attribute in order for
incremental transaction log backup of SQL databases to occur.
The default Interval attribute value is 24 hours, or once a day. When you
select a value that is less than 24 hours, the Interval End attribute appears.
To specify the last start time in a defined interval period, use the spin boxes.
For example, if the Start Time is 7:00 PM, the Interval is 1 hour, and the
Interval End is 11:00 PM., then the workflow automatically starts every hour
beginning at 7:00 PM. and the last start time is 11:00 PM.
Note: When you clear the Enabled option, actions that occurs after a
disabled action do not start, even if the subsequent options are enabled.
c. In the Delete source save sets after clone completes box, select the
option to instruct NetWorker to move the data from the source volume to
the destination volume after clone operation completes. This is equivalent to
staging the save sets.
d. From the Destination pool list, select a clone pool.
To clone to a DD Cloud Tier device, select a Cloud Tier pool.
e. From the Retention list, specify the amount of time to retain the cloned
save sets.
After the retention period expires, the save sets are marked as recyclable
during an expiration server maintenance task.
12. Select the Apply DD Retention Lock checkbox to enable Retention Lock for
the save sets included in this clone action. Note that the device used for cloning
these save sets must also have DD Retention lock enabled in the Device
Properties window or during device creation.
13. In the DD Retention Lock Time box, specify the duration the save sets will
remain on the Data Domain device before the Retention Lock expires. During
this time, these save sets cannot be overwritten, modified, or deleted for the
duration of the retention period, although the device with the cloned backup
can be mounted and unmounted. The retention time period set here must fall
within the minimum and maximum values set for the Data Domain Mtree, and
should be lower than or equal to the NetWorker Retention Period.
14. In the Filters section, define the criteria that NetWorker uses to create the list
of eligible save sets to clone. The eligible save sets must match the
requirements that are defined in each filter. NetWorker provides the following
filter options:
a. Time filter—In the Time section, specify the time range in which NetWorker
searches for eligible save sets to clone in the media database. Use the spin
boxes to specify the start time and the end time. The Time filter list includes
the following options to define how NetWorker determines save set
eligibility, based on the time criteria:
l Do Not Filter—NetWorker inspects the save sets in the media database
to create a clone save set list that meets the time filter criteria.
l Accept—The clone save set list includes save sets that are saved within
the time range and meet all the other defined filter criteria.
l Reject—The clone save set list does not include save sets that are saved
within the time range and meet all the other defined filter criteria.
b. Save Set filter—In the Save Set section, specify whether to include or
exclude ProtectPoint and Snapshot save sets, when NetWorker searches for
eligible save sets to clone in the media database. The Save Set filter list
includes to the following options define how NetWorker determines save set
eligibility, based on the save set filter criteria:
l Do Not Filter—NetWorker inspects the save sets in the media database
to create a clone save set list that meets the save set filter criteria.
l Accept—The clone save set list includes eligible ProtectPoint save sets
or Snapshot save sets, when you also enable the ProtectPoint checkbox
or Snapshot checkbox.
l Reject—The clone save set list does not include eligible ProtectPoint
save sets and Snapshot save sets when you also enable the ProtectPoint
checkbox or Snapshot checkbox.
Note: For NAS device, only Snapshot save set is applicable.
17. In the Parallelism field, specify the maximum number of concurrent operations
for the action. This is applicable if multiple rollover is implemented at an action
level.
18. From the Failure Impact list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the current action if there is a failure with one of the jobs, but
continue with subsequent actions in the workflow, select Abort action.
Note: The Abort action option applies to probe actions, and the backup
actions for the Traditional and Snapshot action types.
l To abort the entire workflow if there is a failure with one of the jobs in the
action, select Abort workflow.
Note: If any of the actions fail in the workflow, the workflow status does
not appear as interrupted or cancelled. NetWorker reports the workflow
status as failed.
19. From the Send Notifications list box, select whether to send notifications for
the action:
l To use the notification configuration that is defined in the Policy resource to
send the notification, select Set at policy level.
20. In the Send notification attribute, when you select the On Completion option
or On failure option, the Command box appears. Use this box to configure how
NetWorker sends the notifications. You can use the nsrlog command to send
the notifications to a log file or you can send an email notification.
The default notification action is to send the information to the
policy_notifications.log file. By default, the
policy_notifications.log file is located in the /nsr/logs directory on
Linux and in the C:\Program Files\EMC NetWorker\nsr\logs folder on
Windows.
Use the default mailer program on Linux to send email messages or the
smtpmail application on Windows:
l To send notifications to a file, type the following command, where
policy_notifications.log is the name of the file:
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
mail -s subject recipient
l On Windows, to send a notification email, type the following command:
where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the
smtpmail program assumes that the message contains a correctly
formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to
relay the SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the
notification. Multiple email recipients are separated by a space.
21. From the Soft Limit list, select the amount of time after the action starts to
stop the initiation of new activities. The default value of 0 (zero) indicates no
amount of time.
22. From the Hard Limit list, select the amount of time after the action starts to
begin terminating activities. The default value of 0 (zero) indicates no amount
of time.
23. Optional, in Start Time specify the time to start the action.
Use the spin boxes to set the hour and minute values, and select one of the
following options from the drop-down list:
l Disabled—Do not enforce an action start time. The action will start at the
time defined by the workflow.
l Absolute—Start the action at the time specified by the values in the spin
boxes.
l Relative—Start the action after the period of time defined in the spin boxes
has elapsed after the start of the workflow.
24. (Optional) Configure overrides for the task that is scheduled on a specific day.
To specify the month, use the navigation buttons and the month list box. To
specify the year, use the spin boxes. You can set an override in the following
ways:
l Select the day in the calendar, which changes the action task for the
specific day.
l Use the action task list to select the task, and then perform one of the
following steps:
n To define an override that occurs on a specific day of the week, every
week, select Specified day, and then use the lists. Click Add Rules
based override.
n To define an override that occurs on the last day of the calendar month,
select Last day of the month. Click Add Rules based override.
Note:
n You can edit or add the rules in the Override field.
n To remove an override, delete the entry from the Override field.
The oval icon specifies the group to which the workflow applies. The rounded
rectangle icons identify actions. The parallelogram icons identify the destination pool
for the action.
You can work directly in the visual representation of a workflow to perform the
following tasks:
l You can adjust the display of the visual representation by right-clicking and
selecting one of the following options:
n Zoom In—Increase the size of the visual representation.
Note: The amount of data and length of time that is required to complete the
backup can impact the ability to clone data when the backup and clone workflows
are in the same policy. For example, if the clone action starts before the backup
action completes, there might not be any data yet to clone, or in other cases, only
the save sets that completed at the start time of the workflow is taken into
account. In both cases, NetWorker marks the Clone Workflow as successful, but
there is no guarantee that all the data from the backup workflow was cloned.
Criteria Description
Date and time range Specify the start date and time range for the save sets.
Criteria Description
To specify the current date and time as the end date for the range,
select Up to now.
Backup level In the Filter save sets by level section, next to the backup level for
the save set, select the full checkbox.
Note: Only the full backup level is applicable for network-attached
storage (NAS) devices.
Limit the number of Specify the number for the limit in the Limit number of clones list.
clones The clone limit is the maximum number of clone instances that can be
created for the save set. By default, the value is set to 1, and cannot
be changed for NAS or Block.
Note: When this criteria is set to 1, which is the default value, you
may experience volume outage issues with Data Domain and
advanced file type devices.
Client Next to one or more client resources that are associated with the save
set in the Client list, select the checkbox.
Policy Next to the policy used to generate the save set in the Policy list,
select the checkbox.
Workflow Next to the workflow used to generate the save set in the Workflow
list, select the checkbox.
Action Next to the action used to generate the save set in the Action list,
select the checkbox.
Group Next to the group associated with the save set in the Group list,
select the checkbox.
Pools Next to the media pool on which the save set is stored in the Pools
list, select the checkbox.
Note: You cannot select Pools for NAS.
Name In the Filter save sets by name field, specify the name of the save
set.
Note: You cannot use wildcards to specify the save set name.
If you specify multiple criteria, the save set must match all the criteria to belong
to the group.
8. To specify the Restricted Data Zone (RDZ) for the group, select the Restricted
Data Zones tab, and then select the RDZ from the list.
9. Click OK.
2. In the expanded left pane, expand Policies, and then select the existing policy.
3. In the right pane, right-click in the workflow section and select New, and select
Properties.
The New Workflow dialog box appears.
4. In the Name field, type the name of the workflow.
The maximum number of allowed characters for the Name field is 64.
l Legal Characters: _ : - + = # , . % @
l Illegal Characters: /\*?[]()$!^;'"`~><&|{}
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the
smtpmail program assumes that the message contains a correctly
formatted email header and nothing is added.
8. In the Running section, perform the following steps to specify when and how
often the workflow runs:
a. To ensure that the actions that are contained in the workflow run when the
policy or workflow starts, in the Enabled box, leave the option selected. To
prevent the actions in the workflow from running when the policy or
workflow that contains the action starts, clear this option.
b. To start the workflow at the time that is specified in the Start time
attribute, on the days that are defined in the action resource, in the
AutoStart Enabled box, leave the option selected. To prevent the workflow
from starting at the time that is specified in the Start time attribute, clear
this option.
c. To specify the time to start the actions in the workflow, in the Start Time
attribute, use the spin boxes.
The default value is 9:00 PM.
d. To specify how frequently to run the actions that are defined in the
workflow over a 24-hour period, use the Interval attribute spin boxes. If you
are performing transaction log backup as part of application-consistent
protection, you must specify a value for this attribute in order for
incremental transaction log backup of SQL databases to occur.
The default Interval attribute value is 24 hours, or once a day. When you
select a value that is less than 24 hours, the Interval End attribute appears.
To specify the last start time in a defined interval period, use the spin boxes.
9. In the Groups group box, specify the protection group to which the workflow
applies.
To use a group, select a protection group from the Groups list. To create a
protection group, click the + button that is located to the right of the Groups
list.
10. Click Add.
The Policy Action Wizard appears.
11. In the Name field, type the name of the action.
The maximum number of characters for the action name is 64.
l Legal Characters: _ : - + = # , . % @
d. From the Retention list, specify the amount of time to retain the cloned
save sets.
After the retention period expires, the save sets are marked as recyclable
during an expiration server maintenance task.
20. In the Filters section, define the criteria that NetWorker uses to create the list
of eligible save sets to clone. The eligible save sets must match the
requirements that are defined in each filter. NetWorker provides the following
filter options:
a. Time filter—In the Time section, specify the time range in which NetWorker
searches for eligible save sets to clone in the media database. Use the spin
boxes to specify the start time and the end time. The Time filter list includes
the following options to define how NetWorker determines save set
eligibility, based on the time criteria:
l Do Not Filter—NetWorker inspects the save sets in the media database
to create a clone save set list that meets the time filter criteria.
l Accept—The clone save set list includes save sets that are saved within
the time range and meet all the other defined filter criteria.
l Reject—The clone save set list does not include save sets that are saved
within the time range and meet all the other defined filter criteria.
b. Save Set filter—In the Save Set section, specify whether to include or
exclude ProtectPoint and Snapshot save sets, when NetWorker searches for
eligible save sets to clone in the media database. The Save Set filter list
includes to the following options define how NetWorker determines save set
eligibility, based on the save set filter criteria:
l Do Not Filter—NetWorker inspects the save sets in the media database
to create a clone save set list that meets the save set filter criteria.
l Accept—The clone save set list includes eligible ProtectPoint save sets
or Snapshot save sets, when you also enable the ProtectPoint checkbox
or Snapshot checkbox.
l Reject—The clone save set list does not include eligible ProtectPoint
save sets and Snapshot save sets when you also enable the ProtectPoint
checkbox or Snapshot checkbox.
Note: For NAS device, only Snapshot save set is applicable.
how NetWorker determines save set eligibility, based on the level filter
criteria:
l Do Not Filter—NetWorker inspects the save sets regardless of the level
in the media database, to create a clone save set list that meets all the
level filter criteria.
l Accept—The clone save set list includes eligible save sets with the
selected backup levels.
l Reject—The clone save set list does not include eligible save sets with
the selected backup levels.
Note: For NAS device, only full backup level is applicable.
23. In the Parallelism field, specify the maximum number of concurrent operations
for the action. This is applicable if multiple rollover is implemented at an action
level.
24. From the Failure Impact list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the current action if there is a failure with one of the jobs, but
continue with subsequent actions in the workflow, select Abort action.
Note: The Abort action option applies to probe actions, and the backup
actions for the Traditional and Snapshot action types.
l To abort the entire workflow if there is a failure with one of the jobs in the
action, select Abort workflow.
Note: If any of the actions fail in the workflow, the workflow status does
not appear as interrupted or cancelled. NetWorker reports the workflow
status as failed.
25. From the Send Notifications list box, select whether to send notifications for
the action:
l To use the notification configuration that is defined in the Policy resource to
send the notification, select Set at policy level.
l To send a notification on completion of the action, select On Completion.
l To send a notification only if the action fails to complete, select On Failure.
26. In the Send notification attribute, when you select the On Completion option
or On failure option, the Command box appears. Use this box to configure how
NetWorker sends the notifications. You can use the nsrlog command to send
the notifications to a log file or you can send an email notification.
The default notification action is to send the information to the
policy_notifications.log file. By default, the
policy_notifications.log file is located in the /nsr/logs directory on
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the
smtpmail program assumes that the message contains a correctly
formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to
relay the SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the
notification. Multiple email recipients are separated by a space.
27. From the Soft Limit list, select the amount of time after the action starts to
stop the initiation of new activities. The default value of 0 (zero) indicates no
amount of time.
28. From the Hard Limit list, select the amount of time after the action starts to
begin terminating activities. The default value of 0 (zero) indicates no amount
of time.
29. (Optional) Configure overrides for the task that is scheduled on a specific day.
To specify the month, use the navigation buttons and the month list box. To
specify the year, use the spin boxes. You can set an override in the following
ways:
l Select the day in the calendar, which changes the action task for the
specific day.
l Use the action task list to select the task, and then perform one of the
following steps:
n To define an override that occurs on a specific day of the week, every
week, select Specified day, and then use the lists. Click Add Rules
based override.
n To define an override that occurs on the last day of the calendar month,
select Last day of the month. Click Add Rules based override.
Note:
n You can edit or add the rules in the Override field.
n To remove an override, delete the entry from the Override field.
Clone reports
You can use the NMC Reports view to access reports of NetWorker clone operations
on a Data Domain system. Generating reports on page 179 provides details.
The following figure provides an example of the mminfo output for a save set that
resides on a Cloud Tier device and does not yet reside in the public cloud.
Figure 50 mminfo output for Cloud Tier save set
Using NMC to review the status of a save set cloned to a Cloud Tier device
Use the Save set window to review the status of save set on a Cloud Tier device. A T
flag appears in the Save Set Flags column for a save set that resides on a Cloud Tier
device but does not yet reside in the public cloud.
To review the status of a save set on a Cloud Tier device, perform the following steps:
1. Connect to the NetWorker server by using NMC, and then on the Administration
window, click Media.
2. On the left navigation pane, select Save Sets.
3. Click the Save Set List tab.
4. (Optional) From the View menu, select Choose Table Columns, and then select
Save Set Flags.
The Save Set Flags column displays a T for a save set that resides on a Cloud Tier
device but does not yet reside in the public cloud.
Procedure
1. In the Administration window, click Devices.
2. In the left navigation pane, select Staging.
3. From the File menu, select New.
The Create Staging dialog box appears, starting with the General tab.
4. In the Name box, type a name for the staging policy.
5. In the Comment attribute, type a description for the staging policy.
6. In the Enabled attribute, select Yes to enable the staging policy or No to
disable the staging policy.
When you select Yes, NetWorker automatically starts the staging policy, based
on the configuration settings that you define.
7. In the Devices attribute, select the check boxes next to each source device
from which you want to stage data.
You can assign multiple devices to a single staging policy. However, you cannot
assign a single device to multiple staging policies.
8. In the Destination pool attribute, select a DD Cloud Tier pool. For example, DD
Cloud Tier Default Clone.
9. In the Configuration group box, specify the criteria that starts the staging
policy.
The following table summarizes the available criteria that you can define for the
staging policy.
High water mark (%)—Defines the upper used disk space limit. When
the percentage of used disk space reaches the value that is defined in
the High water
mark (%) attribute, NetWorker starts the stage operation to move
save sets from the source disk.
Low water mark (%)—Defines the lower used disk space limit. When
the
percentage of used disk space reaches the value that is defined in the
Lower water mark (%) attribute, NetWorker stops moving save
sets from the source disk.
Save set selection Use this option to rank the order in which NetWorker stages the save
sets, based on save set size or age. Available values include:
l largest save set—Stage the save sets in order of largest save set
size to smallest save set size.
l oldest save set —Stage the save sets in order of oldest save set
to most recent save set.
l smallest save set—Stage the save sets in order of smallest save
set size to largest save set size.
l youngest save set—Stage the save sets in order of most recent
save set to least recent save set.
Max storage period Use this option to start the stage operation based on the amount of
time that a save set has resided on the volume.
Max storage period
unit l Max storage period—Defines the number of hours or days that a
save set can reside on a volume before the stage process considers
the save eligible to move to a different volume.
l Max storage period unit—Defines the unit of measurement for
the value in the max storage period attribute. Available values are
Hours and Days.
The maximum storage period setting is used along with the file system
check interval. Once the maximum storage period is reached, staging
does not begin until the next file system check.
Recover space Use this option to determine when the stage operation removes the
interval successfully staged save set from the source volume.
File system check Use this option to define when NetWorker automatically starts the
interval staging process.
l File System Check Interval—Defines the frequency in which
NetWorker starts the staging process. At every file system check
interval, if either the high water mark or the maximum storage
period has been reached, then staging begins.
l File system check unit—Defines the unit of measurement for the
value in the file system check interval attribute. Available values are
Hours and Days.
l Select Check file system—To check the file system and stage eligible
sage set data to a destination volume.
l Select Stage all save sets—To stage all save sets to a volume in the
destination pool.
After the staging operation is complete, this option returns to the default
setting (blank).
l You can try to restore expired backup data by using the NetWorker scanner
program to reconstruct a media index from the surviving metadata.
The NetWorker Administration Guide provides procedures for data recovery.
Note:
For a Linux client with 2 GB of (RAM), it is recommended that you recover only up
to a maximum of 3500 files at a time. If you try to recover more than this limit, an
error message similar to the following appears:
readv from DD failed for read size 262144: Reading from a file failed
recover: Reading from a file failed [5001] ([31587] [140129876305664]
ddp_read() failed Offset 0, BytesToRead 262144, BytesRead 0 Err: 5001-
Unable to allocate file ddcl buffers rec_create: out of memory.
3. Modify the Client resource for the client that will receive the restored data.
l Configure this client for Client Direct and IP connectivity.
l On the Globals (2 of 2) tab, in the Recovery storage nodes field, specify
the storage node that you associated with the IP-enabled DD Boost device.
Note: This option is now only available in the Diagnostic Mode view.
Disaster recovery
A disaster is defined as the loss of data where the computing environment required to
restore that data is not available. Disaster recovery is necessary when ordinary data
recovery procedures are not sufficient to recover the computing environment and its
data to normal day-to-day operations.
Causes of disaster
A disaster can result from any of the following situations:
l Debilitating hardware or software failures
l Computer viruses that corrupt the computing system
l Infrastructure interruptions, inconsistencies, or loss of services, such as problems
with communications or network connections that result in damage to the
computing environment
Potential losses
Disaster recovery of the primary site must cover the potential loss of one of more of
the following systems at the primary site:
l The Data Domain server that stores the deduplicated client backups
l The NetWorker storage node that stores the deduplication metadata for the
backups
l The NetWorker server that stores the metadata for the backups in the media
database and client file indexes
l Disaster recovery NetWorker server with metadata that is cloned from the primary
NetWorker server
Disaster recovery environment on page 43 shows an example of a simple disaster
recovery environment.
n The Devices area shows the following device and usage information:
– Pre-Compression—If the data had not been deduplicated and
compressed, indicates the amount of space that the backup would
have used. NetWorker tracks this value as the size of backups.
– Compression (Reduction)—Represents the data compression with
the pre-compression and post-compression used values. Data
compression is calculated with:
[(1 - Post-comp Used) ÷ Pre-Compression] x 100%
– /backup: post-comp—Indicates the total capacity of the Data Domain
system, the amount of disk space already in use, and the amount of
space that is available.
– /ddvar—Indicates the amount of log file space that is in use on the
Data Domain file system.
n The Status area lists the connectivity usage.
n The Log table shows a chronological list of events that occur during
NetWorker server operations.
n The Alerts table lists the messages for operational issues that can require
administrative attention. Data Domain alerts are available only if SNMP
traps are configured.
Note: To delete individual messages from the Alerts table, open the
NMC Events view, select the messages, right-click, and select
Dismiss.
4. On the Configure SNMP monitoring tab, type a value for SNMP Community
String. The typical setting is public, which allows all users to monitor events.
5. In the SNMP Process Port field, type a value for the port that the Data Domain
system uses for SNMP traps. Firewall requirements provides details.
6. In the SNMP Traps section, select the SNMP traps that you want to monitor.
Some traps are pre-selected. The following figure shows an example for Data
Domain 5 alerts. Other versions might differ.
7. Click OK.
Generating reports
You can use the NetWorker Management Console (NMC) Reports view to create
statistical reports of NetWorker with Data Domain backup, recovery, and cloning
activities.
Configuring a report
You can configure and display a Data Domain report for backup or clone activities in
the NetWorker Management Console (NMC).
Procedure
1. In the NetWorker Management Console window, click Reports.
2. Expand the Reports folder, expand the Legacy Reports folder, and then the
Data Domain Statistics folder. Select the report that you want to view.
Note: The types of reports include summary, statement, and details.
The Configure tab for the selected report type appears in the right panel.
3. In the Configure tab, configure the items that you want to include in the report.
Select the item parameters and click the Remove, Add, Remove All , or Add All
buttons as required. The specific parameters that are available depend on the
type of report that you select.
If you do not specify Save Time values, the report displays all the available data.
The following table lists details of report configuration parameters.
Save Set Name Specifies one or more save Selected save set names
sets. Values are case-
sensitive and you cannot use
wildcard characters.
Note: Monthly report
does not include the Save
Set Name parameter.
For clone operations, no specific reports are available. You can query and list the
copies of save sets in the NetWorker Administration, Media view, under Save Sets.
Basic reports
A basic report displays statistics for a specific datazone component, a time span, or a
field. You can view reports within the NetWorker Management Console (NMC)
Enterprise Reports window, and also modify the scope of a basic report by adjusting
the parameters.
The following table describes the basic reports that are available for Data Domain
statistics.
Save Set Summary For all or specified save sets, displays the following
deduplication statistics:
l Amount of data—Amount of the data that NetWorker
would have moved by using a conventional backup.
l Target size—Size of the data after deduplication has
taken place on the Data Domain system.
l Deduplication ratio—Percentage of disk space that is
saved by using deduplication.
l Number of save sets—Number of save sets in the backup.
l Number of files—Number of files in the save set.
Save Set Details Displays details about each save set, including backup duration
and the following statistics:
l Server Name
l Save Set Name and ID
l DD Retention Lock Type
l DD Retention Locked Till
l Action Type
l Policy Name
l Workflow and Workflow Start Time
l Status
l Save Set size—Protected data size
l Target size—Size of the data after deduplication has
taken place on the Data Domain system (stored data size).
l Deduplication ratio—Percentage of savings by using
deduplication.
l Number of files—Number of files in the save set.
Drill-down reports
A drill-down report consists of multiple basic reports, which are connected as layers
and all configured with the same parameters that the top layer uses.
You can run reports for groups, clients, or save sets. You can view reports within the
NetWorker Management Console (NMC) Enterprise Reports window, and also modify
the scope of a report by adjusting the parameters.
The following table lists the drill-down reports that are available for Data Domain
statistics.
Advanced reporting
The NetWorker Management Console (NMC) provides reports for only the recent
backup history in a specific datazone. The optional Data Protection Advisor (DPA)
software can provide extended reports of backups, trends, and analysis for one or
multiple datazones, including reports of Data Domain systems. DPA is best for larger
environments where you require additional analysis with forecasts and trends.
different storage node. The success of the recovery depends on the state of the
devices at the time of the loss:
l If the storage volumes were unmounted when the disruption occurred, the
structure and integrity of the data remains intact and you can expect a complete
recovery.
l If the storage volumes were mounted but not reading or writing data during the
disruption, then a complete recovery is likely.
l If the devices were reading or writing at the time of the disruption, then data loss
or data corruption is likely to have occurred, and you cannot expect a complete
recovery.
If the volume structure is intact, then the NetWorker server can continue to
perform its operations with the existing devices, with minimal impact.
If the replacement storage node has a different name or if you use the NetWorker
server as the storage node, then you must re-create the devices in NetWorker as
follows.
Procedure
1. Use NMC to connect to the NetWorker server. In the NetWorker
Administration window, select the Devices view, and then select Devices in
the left navigation pane.
2. For each affected original remote storage node-based DD Boost device, right-
click the device, select Properties. Record the following information:
l On the General tab:
n Name
n Device Access Information
l On the Operations tab:
n Volume Name
n Volume Pool
3. Remove the original DD Boost devices from the NetWorker application. The
device folders continue to exist on the Data Domain system.
a. In the Devices view, from the Devices tree, right-click and unmount each
affected device. Mounted devices have a Volume Name.
b. In the Media view, from the Media Pool tree, right-click each affected
media pool (Volume Pool), select Properties, and on the Selection Criteria
tab, remove each affected device from the Target Devices list.
c. In the Devices view, from the Devices tree, right-click and delete each
affected device.
4. Re-create the devices on the NetWorker application that is associated with a
replacement storage node.
a. In the Devices view, right-click the Data Domain systems tree, and then
start the New Device Wizard.
b. To access the system, specify the Data Domain system and DD Boost (OST)
credentials.
c. On the Select Folders to use as Devices page, select the DD Boost devices
(device folders) that are associated with the failed storage node.
When you leave this page, a message notifies you that NetWorker previously
associated the devices with a different storage node. Confirm the selection.
d. On the Configure Pool Information page, specify the media pool for the
devices, and clear the Label and Mount selection. You must manually mount
the devices on the new storage node later in this procedure.
NOTICE If you enable Label and Mount at this point, NetWorker relabels
the volume and you lose all the data. You cannot undo this action.
e. On the Select the Storage Nodes page, select a storage node to handle the
new devices by doing one of the following.
l Select an existing storage node.
l Create a replacement storage node.
l Use the NetWorker server’s storage node.
The storage node must be running on the correct network and its
hostname must be resolvable by DNS.
Troubleshooting
The following sections will help you identify and resolve common issues of
configuration and operation.
l CLI—Log in to the Data Domain system console as the sysadmin user, and then
type the following command:
device to the Cloud Provider, you can only move data that you cloned to a DD Cloud
Tier device.
When data resides on a DD Cloud Tier device, NetWorker updates the clflags
attribute for save set with a T (in transit) flag. NetWorker clears the T flag within 30
minutes of the completion of the data movement operation, and the data is on the
Cloud Service Provider.
To view the status of a save set, use the mminfo command.
For example, the following output displays a list of save sets that reside on two
volumes:
l DDVEbushdev111.001 contains backup data on a Data Domain device
l nw_w2k8_c.ddctdefault.001 contains a clone copy of the save sets on the
DDVEbushdev111.001. The data movement operation has not started on these save
set yet, or the data movement operation is in progress but the data has not
completely moved to the Cloud Provider.
mminfo -q"savetime>11/27/2016" -
r"volume,savetime,totalsize,level,name,ssid,clflags"
To determine when the data will move from the DD Cloud Tier device or troubleshoot
why the data movement operation has not completed, perform the following steps as
the sysadmin user on the Data Domain system:
1. Determine the data movement schedule, by typing the following command:
Note: Each mtree can have only one data movement policy.
2. Determine when the status of the last data movement operation, by typing the
following command:
data-movement status
3. Determine the data movement schedule, by typing the following command:
data-movement watch
The following output displays the status of a data movement operation that
successfully moves 4 files:
Data-movement: phase 1 of 3 (copying)
100% complete; time: phase 0:02:20, total 0:02:31
Copied (post-comp): None, (pre-comp): 6.63 KiB,
Files copied: 4, Files verified: 0, Files installed: 0
Data-movement: phase 2 of 3 (verifying)
100% complete; time: phase 0:00:02, total 0:02:41
Copied (post-comp): None, (pre-comp): 6.63 KiB,
Files copied: 4, Files verified: 0, Files installed: 0
Data-movement: phase 3 of 3 (installing files)
100% complete; time: phase 0:00:31, total 0:03:21
Copied (post-comp): None, (pre-comp): 6.63 KiB,
Files copied: 4, Files verified: 0, Files installed: 0
Data-movement was started on Nov 28 2016 15:08 and completed
on Nov 28 2016 15:11
Copied (post-comp): None, (pre-comp): 6.63 KiB,
Files copied: 4, Files verified: 4, Files installed: 4
Data Domain system log files on page 185 provide more information about the logs
files to review to troubleshoot error messages.
Configuring the Data Domain system for DD Boost describes how to enable NFS
access.
To avoid this error, export the following environment variable on the client shell.
LDR_CNTRL=MAXDATA=0x70000000
3. Configure the Data Domain Interface field of the NetWorker clients for FC.
Configuring a backup client with NMC property windows provides details.
2. Configure the Data Domain system for use with NetWorker. Configuring the
Data Domain system for DD Boost provides details.
3. If you plan to migrate existing save sets to the new DD Boost devices, migrate
the save sets before the scheduled redirected backups begin. Migration will
“seed” the Data Domain system and help to reduce the bandwidth requirements
for future backups. Considerations for migrating legacy save sets provides
details.
4. Use the NMC Device Configuration wizard to perform the following tasks:
a. Select or create DD Boost devices on the Data Domain system.
b. Select or create a Pool resource that is configured to send the save sets to
DD Boost devices.
Note: The wizard creates and configures a pool for the Data Domain
system that uses only DD Boost devices.
c. Select or create a NetWorker storage node on which to label and mount the
new devices.
d. Complete the wizard pages.
Configuring DD Boost devices with the NMC Device Configuration wizard on
page 64 provides details.
5. Test the backup environment to ensure that the new configuration operates
correctly and that existing backups, that will not use DD Boost devices,
continue to run as expected. For backups to new devices, test a restore from
those devices.
6. Start the redirection with a full backup to the new devices. This practice avoids
a dependency on the last full backup that is stored with the legacy storage
environment and the potential need to restore from two different environments.
7. Monitor backup performance, and adjust the backup schedule to optimize the
configuration for maximum throughput or additional clients. Monitoring Data
Domain events, statistics, and logs on page 176 provides details.
n Provides features for storage, recovery, and clone operations that differ
between the legacy data and the new data.
l Migrate the existing save sets to the new DD Boost devices:
n Frees storage on the legacy storage system for removal or use by other clients.
n Allows you to “seed” the new devices with the legacy client data. Seeding
ensures that subsequent client backups are deduplicated against the legacy
data. This practice reduces the bandwidth and time that is required for the first
backup window with the new devices.
n Offers more flexible storage features for storage, recovery, and cloning, for
example, multiple concurrent operations.
n Maintains the NetWorker browse and retention policies and ensures that
NetWorker manages all save sets.
Migration methods
Data migration is a one-time NetWorker clone operation which you can customize to
different device types and time periods. You can include all the data in the migration or
you can select a limited amount of data from a specific timeframe or a specific backup
type (for example, weekly full backups).
The details of the migration procedure depend on the method that you use and the
granularity of the data that you want to migrate.
l To perform a NetWorker scheduled clone operation, refer to Migrating legacy save
sets to DD Boost devices.
l To run a NetWorker nsrclone script from a command line, refer to the
NetWorker Administration Guide for details.
l To perform a NetWorker staging (data movement) operation to move data from an
AFTD, refer to the NetWorker Administration Guide for details.
3. Create a clone pool for the DD Boost devices to be used for the migration:
l In the Data Source field, select groups for the migration.
Typically, you migrate the same groups that you selected for the redirection
of backups. Redirecting backups from other devices to DD Boost on page
194 provides details.
l In the Target Devices field, select the DD Boost devices to store the
migrated data.
Creating pools to target DD Boost devices on page 100 provides details.
4. Configure a clone task with the Write Clone Data to Pool field that is selected
for the clone pool.
Road map for configuring a new cloning data protection policy on page 140
provides details about the scheduled clone option.
5. Run the clone action, either according to its schedule or by a manual start.
To manually start the clone action, right-click the workflow that contains the
clone action, and select Start.
6. After the clone operation is completed, verify that the cloned data appears on
the target devices.
DD Boost Conversion and Upgrade on page 193 provides details about the
verification of NetWorker operations.
7. After you have verified the cloned save sets, remove the original save sets, as
required.
8. If you remove the original save sets, remove unused devices and pools, as
required. You cannot delete a pool until you delete or relabel in other pools all
the volumes that belong to that pool.
9. To ensure that adequate storage capacity is available, monitor the Data Domain
system. Monitor a complete backup cycle of all clients, including save set
expirations.
DD Boost Conversion and Upgrade on page 193 provides details.
Migration scenarios
You can migrate existing backup data from legacy devices or file systems to DD Boost
devices. The best scenario for your situation depends on the storage environment
configuration and the available capacities and bandwidth.
Figure 55 Migration from conventional storage to DD Boost devices on a different storage node
Figure 56 Migration from conventional storage to DD Boost devices on the same storage node
administrator Person who normally installs, configures, and maintains software on network
computers, and who adds users and defines user privileges.
advanced file type Disk storage device that uses a volume manager to enable multiple concurrent backup
device (AFTD) and recovery operations and dynamically extend available disk space.
authorization code Unique code that in combination with an associated enabler code unlocks the software
for permanent use on a specific host computer. See license key.
bootstrap Save set that is essential for disaster recovery procedures. The bootstrap consists of
three components that reside on the NetWorker server: the media database, the
resource database, and a server index.
client Host on a network, such as a computer, workstation, or application server whose data
can be backed up and restored with the backup server software.
Client Direct Feature that enables clients to deduplicate backup data and send it directly to AFTD or
DD Boost storage devices, bypassing the NetWorker storage node. The storage node
manages the backup devices but does not handle the backup data.
client file index Database maintained by the NetWorker server that tracks every database object, file,
or file system backed up. The NetWorker server maintains a single index file for each
client computer. The tracking information is purged from the index after the browse
time of each backup expires.
Client resource NetWorker server resource that identifies the save sets to be backed up on a client.
The Client resource also specifies information about the backup, such as the schedule,
browse policy, and retention policy for the save sets.
clone 1. Duplicate copy of backed-up data, which is indexed and tracked by the NetWorker
server. Single save sets or entire volumes can be cloned.
2. Type of mirror that is specific to a storage array.
clone-controlled Creation of a replica of deduplicated data copied from one DD Boost device to another,
replication (CCR) which can be scheduled by the NMC clone feature and is indexed and tracked by the
NetWorker server.
database 1. Collection of data arranged for ease and speed of update, search, and retrieval by
computer software.
2. Instance of a database management system (DBMS), which in a simple case might
be a single file containing many records, each of which contains the same set of
fields.
datazone Group of clients, storage devices, and storage nodes that are administered by a
NetWorker server.
DD Boost Optimized library and communication framework with a special Data Domain API that
allows the backup software to define and interact with storage devices on the Data
Domain system.
DD Boost device Logical storage device created on a Data Domain system that is used to store
deduplicated NetWorker backups. Each device appears as a folder on the Data Domain
system and is listed with a storage volume name in NMC.
deduplication backup Type of backup in which redundant data blocks are identified and only unique blocks of
data are stored. When the deduplicated data is restored, the data is returned to its
original native format.
deduplication ratio Reduction in storage space required to store data as a result of deduplication
technology, usually combined with data compression, for example, a 20:1 space
reduction.
device 1. Storage folder or storage unit that can contain a backup volume. A device can be a
tape device, optical drive, autochanger, or disk connected to the server or storage
node.
2. General term that refers to storage hardware.
3. Access path to the physical drive, when dynamic drive sharing (DDS) is enabled.
disaster recovery Restore and recovery of data and business operations in the event of hardware failure
or software corruption.
distributed segment Part of the DD Boost interface, which enables data deduplication to be performed on a
processing (DSP) host before the data is sent to the Data Domain system for storage.
group One or more client computers that are configured to perform a backup together,
according to a single designated schedule or set of conditions.
hostname Name or address of a physical or virtual host computer that is connected to a network.
ifgroup A private network configured on the Data Domain system consisting of multiple network
interfaces logically designated as a single group IP address. The ifgroup provides
dynamic load balancing, fault tolerance within the group, and better network bandwidth
usage than traditional network aggregation.
license key Combination of an enabler code and authorization code for a specific product release to
permanently enable its use. Also called an activation key.
managed application Program that can be monitored or administered, or both from the Console server.
media Physical storage, such as a disk file system or magnetic tape, to which backup data is
written. See volume.
media index Database that contains indexed entries of storage volume location and the life cycle
status of all data and volumes managed by the NetWorker server. Also known as media
database.
metadata Hash information that identifies stored sub-file information for deduplication, and is
required to revert deduplicated client backup data to the regular nondeduplicated
format.
MTree Shortened from "managed tree," also referred to as storage units, logical partition of
the namespace in a Data Domain file system that can be used to group a set of files for
management purposes. MTrees are normally associated with a single NetWorker
datazone.
NetWorker Management Software program that is used to manage NetWorker servers and clients. The NMC
Console (NMC) server also provides reporting and monitoring capabilities for all NetWorker processes.
NetWorker server Computer on a network that runs the NetWorker server software, contains the online
indexes, and provides backup and restore services to the clients and storage nodes on
the same network.
notification Message sent to the NetWorker administrator about important NetWorker events.
online indexes Databases located on the NetWorker server that contain all the information pertaining
to the client backups (client file index) and backup volumes (media index).
policy Set of defined rules for client backups that can be applied to multiple groups. Groups
have dataset, schedule, browse, and retention policies.
pool 1. NetWorker sorting feature that assigns specific backup data to be stored on
specified media volumes.
2. Collection of NetWorker backup volumes to which specific data has been backed
up.
recover To restore data files from backup storage to a client and apply transaction (redo) logs
to the data to make it consistent with a given point-in-time.
remote device 1. Storage device that is attached to a storage node that is separate from the
NetWorker server.
2. Storage device at an offsite location that stores a copy of data from a primary
storage device for disaster recovery.
replication Process of creating an exact copy of an object or data. This is different than NetWorker
cloning. See clone
resource Software component whose configurable attributes define the operational properties of
the NetWorker server or its clients. Clients, devices, schedules, groups, and policies are
all NetWorker resources.
restore To retrieve individual data files from backup media and copy the files to a client without
applying transaction logs.
retention policy NetWorker setting that determines the minimum period of time that backup data is
retained on a storage volume and available for recovery. After this time is exceeded, the
data is eligible to be overwritten.
save NetWorker command that backs up client files to backup media volumes and makes
data entries in the online index.
save set 1. Group of tiles or a file system copied to storage media by a backup or snapshot
rollover operation.
2. NetWorker media database record for a specific backup or rollover.
save stream Data and save set information that is written to a storage volume during a backup. A
save stream originates from a single save set.
scheduled backup Type of backup that is configured to start automatically at a specified time for a group
of one or more NetWorker clients. A scheduled backup generates a bootstrap save set.
storage node Computer that manages physically attached storage devices or libraries, whose backup
operations are administered from the controlling NetWorker server. Typically a
“remote” storage node that resides on a host other than the NetWorker server.
storage unit (SU) Logical unit of disk storage on a Data Domain system that is associated with a
NetWorker datazone.
trap Setting in an SNMP event management system to report errors or status messages.
virtual tape library (VTL) Software emulation of a physical tape library storage system.
volume 1. Unit of physical storage medium, such as a disk or magnetic tape, to which backup
data is written.
2. Identifiable unit of data storage that may reside on one or more computer disks.
volume name Name that you assign to a backup volume when it is labeled.