docu91933.pdf - Dell EMC NetWorker Version 18.2...

This preview shows page 1 out of 890 pages.

Unformatted text preview: Dell EMC NetWorker Version 18.2 Administration Guide 302-005-314 REV 04 September, 2019 Copyright © 1990-2019 Dell Inc. or its subsidiaries. All rights reserved. Dell believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS-IS.” DELL MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. USE, COPYING, AND DISTRIBUTION OF ANY DELL SOFTWARE DESCRIBED IN THIS PUBLICATION REQUIRES AN APPLICABLE SOFTWARE LICENSE. Dell Technologies, Dell, EMC, Dell EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property of their respective owners. Published in the USA. Dell EMC Hopkinton, Massachusetts 01748-9103 1-508-435-1000 In North America 1-866-464-7381 2 Dell EMC NetWorker Administration Guide CONTENTS Figures 15 Tables 17 Preface 21 Chapter 1 Overview 25 The NetWorker environment.............................................................................26 NetWorker Components...................................................................... 26 NetWorker services.......................................................................................... 28 Processes on NetWorker hosts ........................................................... 28 Stop and start the NMC Server........................................................... 32 Stop and start a NetWorker Server, Client, or Storage Node...............34 NetWorker user interfaces................................................................................36 NMC user interface..............................................................................36 NetWorker Administration window.......................................................38 NetWorker client interface...................................................................38 NetWorker character-based interface................................................. 38 NetWorker command-line interface..................................................... 38 Introduction to the NetWorker Management Web UI...........................39 Chapter 2 Getting Started 41 NetWorker Management Console interface...................................................... 42 Connecting to the Console window......................................................42 Connecting to the Administration window.........................................................47 Opening the Administration window..................................................... 47 Administration window......................................................................... 47 Editing multiple resources.................................................................... 49 Drag-and-drop functionality.................................................................49 Multiple library devices and slots.......................................................... 51 Setting user interaction preferences.................................................... 51 Monitoring NetWorker Server activities in the Administration window.... 51 Getting started with a new installation.............................................................. 61 Common NetWorker tasks....................................................................61 Chapter 3 Backup Target 69 Label templates.................................................................................................70 Using label templates........................................................................... 70 How the NetWorker server uses volume labels.................................... 70 Preconfigured label templates.............................................................. 71 Guidelines for completing Label Template attributes............................ 71 Naming label templates........................................................................ 74 Working with label templates............................................................... 75 Setting up a label template to identify volumes.................................... 76 Dell EMC NetWorker Administration Guide 3 Contents Media pools....................................................................................................... 77 Using media pools.................................................................................77 Storage nodes................................................................................................... 91 Requirements....................................................................................... 91 Licensing..............................................................................................92 Storage node configuration..................................................................92 Storage Node Options......................................................................... 98 Configuring a dedicated storage node..................................................99 Troubleshooting storage nodes............................................................ 99 Disk storage devices........................................................................................100 Example environment.......................................................................... 101 Considerations for Client Direct clients............................................... 101 Differences between FTDs, AFTDs, and DD Boost devices.................103 Device target and max sessions default values and ranges................. 106 Advanced file type devices................................................................. 107 DD Boost and Cloud Tier devices........................................................ 120 Libraries and silos............................................................................................. 121 Overview of tape device storage......................................................... 121 Support for LTO-4 hardware-based encryption...................................121 Linux device considerations................................................................ 122 Solaris device considerations.............................................................. 123 HP-UX device considerations............................................................. 123 AIX device considerations................................................................... 126 SCSI and VTL libraries........................................................................ 126 Silo libraries.........................................................................................161 NDMP libraries....................................................................................170 NetWorker hosts with shared libraries................................................ 170 Dynamic drive sharing.........................................................................173 File type devices.............................................................................................. 178 FTD capacity issues............................................................................ 178 Full FTD prevention.............................................................................178 Stand-alone devices........................................................................................ 179 Autodetecting and configuring a stand-alone tape drive..................... 179 Adding a stand-alone device manually.................................................179 Auto Media Management for stand-alone devices.............................. 180 Mounting or unmounting a volume in a stand-alone tape drive............ 181 Labeling and mounting a volume in one operation (stand-alone tape drive).................................................................................................. 181 Labeling volumes without mounting.................................................... 182 Mounting uninventoried volumes........................................................ 182 Labeling volumes............................................................................................. 183 Labeling or re-labeling library volumes................................................ 183 Verifying the label when a volume is unloaded.................................... 184 Troubleshooting devices and autochangers..................................................... 184 Additional attributes in the Autochanger resource.............................. 184 Maintenance commands..................................................................... 185 Autodetected SCSI jukebox option causes server to stop responding 185 Autochanger inventory problems........................................................ 185 Destination component full messages.................................................185 Tapes do not fill to capacity................................................................186 Tapes get stuck in drive when labeling tapes on Linux Red Hat platform ........................................................................................................... 186 Increasing the value of Save Mount Time-out for label operations......187 Server cannot access autochanger control port................................. 187 Changing the sleep times required for TZ89 drive types.....................188 Message displayed when CDI enabled on NDMP or file type device... 188 4 Dell EMC NetWorker Administration Guide Contents Verify firmware for switches and routers............................................189 Commands issued with nsrjb on a multi-NIC host fail..........................189 SCSI reserve/release with dynamic drive sharing............................... 189 Recovering save sets from a VTL on a different NetWorker server.... 190 Chapter 4 Data Protection Policies 191 Overview of protection policies....................................................................... 192 Designing data protection policies................................................................... 193 Default data protection policies in NMC's NetWorker Administration window............................................................................................... 194 Overview of configuring a new data protection policy........................ 195 NetWorker resource considerations................................................... 196 Strategies for traditional backups.......................................................196 Strategies for server backup and maintenance................................... 218 Strategies for cloning.........................................................................223 Policy Notifications......................................................................................... 243 Monitoring policy activity................................................................................244 Monitoring cloning............................................................................. 245 Policy log files................................................................................................. 245 Starting, stopping, and restarting policies....................................................... 247 Protection period............................................................................... 247 Starting actions in a workflow for an individual client......................................249 Modifying data protection Policy resources....................................................250 Policies.............................................................................................. 250 Workflows.......................................................................................... 251 Protection groups.............................................................................. 258 Actions...............................................................................................259 Configuring NSR Protection Policies from nsradmin ...................................... 263 Commands......................................................................................... 263 Managing NSR Data Protection Policy...............................................264 Managing Workflows......................................................................... 265 Managing Actions.............................................................................. 266 Configuring Filters for Clone and Index Actions ................................ 268 Deleting multiple actions from multiple workflows and policies ......... 268 Querying NSR protection policy workflow and NSR protection policy action resources without specifying RAP resource types ..................269 Managing policies from the command prompt................................................ 269 Creating Data Protection Policy resources from a command prompt. 270 Creating Action resources from a command prompt........................... 271 Starting, stopping, and restarting workflows from a command prompt.... 272 Displaying Data Protection Policy resource configurations.................274 Identifying clients that missed the workflow schedule.....................................277 Managing policies using the NetWorker Management Web UI........................ 277 Policies, workflows, and actions in NetWorker Management Web UI. 278 Create a policy using the NetWorker Management Web UI................278 Create a workflow using the NetWorker Management Web UI.......... 279 Protection groups.............................................................................. 282 Create an action using the NetWorker Management Web UI............. 286 Create a rule using the NetWorker Management Web UI................... 323 Troubleshooting policies................................................................................. 325 Chapter 5 Backup Options 329 Overview of resources that support backups.................................................. 330 Dell EMC NetWorker Administration Guide 5 Contents Save sets........................................................................................................ 330 The ALL save set................................................................................ 331 Backup levels.................................................................................................. 333 Comparing backup levels....................................................................334 Backup levels and data recovery requirements.................................. 335 Backup levels for the online indexes...................................................336 Synthetic full backups........................................................................336 Virtual synthetic full backups............................................................. 342 Backup scheduling.......................................................................................... 346 Scheduling backup cycles.................................................................. 346 Considerations for scheduling backups.............................................. 346 Methods for scheduling backups........................................................348 Backup retention............................................................................................ 353 Methods for setting retention............................................................ 353 Assigning a retention policy to a Client resource................................355 Editing retention for a save set.......................................................... 356 General backup considerations....................................................................... 356 Renamed directories.......................................................................... 356 Raw partitions.................................................................................... 357 Access control lists............................................................................ 357 Client parallelism and parallel save streams........................................ 357 Maximum path and save set length.....................................................361 Open files........................................................................................... 361 Data deduplication............................................................................. 362 Directives........................................................................................................362 Types of directives.............................................................................363 Format of directive statements.......................................................... 363 Order of Execution in the Directive.................................................... 367 Global directives................................................................................ 368 NetWorker User local directives.........................................................372 Creating local directives..................................................................... 373 Chapter 6 Backing Up Data 375 Configuring a Client resource for backups on Windows hosts ........................ 376 Windows backup considerations.........................................................376 Windows file system backups.............................................................386 Windows Bare Metal Recovery.......................................................... 393 Creating a Client resource with the Client Backup Configuration wizard .......................................................................................................... 409 Mapped drives.................................................................................... 414 Configuring a Client resource for backups on UNIX hosts .............................. 415 UNIX/Linux backup considerations.....................................................415 Creating a Client resource with the Client Backup Configuration wizard ........................................................................................................... 416 Supported save set configurations for UNIX hosts............................. 419 Configuring a Client resource for backups on Mac OS X hosts ...................... 422 Mac OS X backup considerations....................................................... 422 Creating a Client resource with the Client Backup Configuration wizard ...........................................................................................................422 Assigning directives to Mac OS X clients........................................... 425 Configuring Open Directory database backups.................................. 425 Sending client data to AFTD or Data Domain devices only.............................. 426 Non-ASCII files and directories....................................................................... 427 Configuring checkpoint restart backups..........................................................427 About partial save sets....................................................................... 428 6 Dell EMC NetWorker Administration Guide Contents Partial saveset cloning and scanning.................................................. 428 Checkpoint restart requirements....................................................... 428 Configuring checkpoint restart.......................................................... 429 Restarting checkpoint-enabled backups............................................ 430 Recovering data from partial save sets............................................... 431 Probe-based backups...................................................................................... 431 Encryption...................................................................................................... 432 AES Encryption................
View Full Document

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture