You've reached the end of your free preview.
Want to read all 310 pages?
Unformatted text preview: Veritas NetBackup™
Snapshot Client
Administrator's Guide
UNIX, Windows, and Linux Release 8.3 Veritas NetBackup™ Snapshot Client Administrator's
Guide
Document version: 8.3 Technical Support
Technical Support maintains support centers globally. All support services will be delivered
in accordance with your support agreement and the then-current enterprise technical support
policies. For information about our support offerings and how to contact Technical Support,
visit our website:
You can manage your Veritas account information at the following URL:
If you have questions regarding an existing support agreement, please email the support
agreement administration team for your region as follows:
Worldwide (except Japan) [email protected] Japan [email protected] Documentation
The latest documentation is available on the Veritas website:
Documentation feedback
Your feedback is important to us. Suggest improvements or report errors or omissions to the
documentation. Include the document title, document version, chapter title, and section title
of the text on which you are reporting. Send feedback to:
[email protected]
You can also see documentation information or ask a question on the Veritas community site:
Veritas Services and Operations Readiness Tools (SORT)
Veritas Services and Operations Readiness Tools (SORT) is a website that provides information
and tools to automate and simplify certain time-consuming administrative tasks. Depending
on the product, SORT helps you prepare for installations and upgrades, identify risks in your
datacenters, and improve operational efficiency. To see what services and tools SORT provides
for your product, see the data sheet:
Legal Notice
Copyright © 2020 Veritas Technologies LLC. All rights reserved.
Veritas, the Veritas Logo, and NetBackup are trademarks or registered trademarks of Veritas
Technologies LLC or its affiliates in the U.S. and other countries. Other names may be
trademarks of their respective owners.
This product may contain third-party software for which Veritas is required to provide attribution
to the third party (“Third-party Programs”). Some of the Third-party Programs are available
under open source or free software licenses. The License Agreement accompanying the
Software does not alter any rights or obligations you may have under those open source or
free software licenses. Refer to the Third-party Legal Notices document accompanying this
Veritas product or available at:
The product described in this document is distributed under licenses restricting its use, copying,
distribution, and decompilation/reverse engineering. No part of this document may be
reproduced in any form by any means without prior written authorization of Veritas Technologies
LLC and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED
CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED
WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR
NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH
DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. Veritas Technologies LLC SHALL
NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION
WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE
INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE
WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software
as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq.
"Commercial Computer Software and Commercial Computer Software Documentation," as
applicable, and any successor regulations, whether delivered by Veritas as on premises or
hosted services. Any use, modification, reproduction release, performance, display or disclosure
of the Licensed Software and Documentation by the U.S. Government shall be solely in
accordance with the terms of this Agreement.
Veritas Technologies LLC
2625 Augustine Drive
Santa Clara, CA 95054
Contents Chapter 1 Introduction .......................................................................... 14
Snapshot Client features at a glance ................................................
Snapshot Client features ................................................................
About snapshots ....................................................................
About snapshot methods .........................................................
About snapshot providers .........................................................
About off-host backup support ...................................................
About Instant Recovery ...........................................................
About FlashBackup policies ......................................................
About snapshot methods for disk arrays ......................................
About block level incremental backup .........................................
About Snapshot Client and NDMP .............................................
About snapshot basics ..................................................................
About the copy-on-write snapshot type .......................................
About the mirror snapshot type ..................................................
Benefits of copy-on-write versus mirror .............................................
About local backup of a snapshot ....................................................
Off-host backup overview ...............................................................
About file and volume mapping methods .....................................
Off-host backup methods ...............................................................
About alternate client backup ....................................................
FlashBackup and alternate client combination example ..................
NetBackup media server data mover example (UNIX only) .............
About the NDMP data mover ....................................................
Snapshot Client requirements .........................................................
Snapshot Client restrictions ......................................................
Snapshot Client terminology ...........................................................
Snapshot Client assistance ............................................................
About open file backups for Windows ............................................... Chapter 2 Installation 14
16
16
16
17
18
19
19
19
20
20
20
21
21
22
23
24
25
26
26
32
33
34
34
35
37
41
42 ........................................................................... 43 Installation prerequisites for Snapshot Client ...................................... 43
Snapshot Client installation notes .................................................... 44
About distributing Client Software in mixed-platform environments
........................................................................................... 45 Contents About creating log directories .......................................................... 45
About the snapshot state file ........................................................... 45 Chapter 3 Policy configuration ........................................................... 47
Notes on Snapshot Client policies ....................................................
Configuring a Snapshot Client policy ................................................
Backup Selections tab options when configuring a policy ......................
Off-host backup configuration options ..............................................
Automatic snapshot selection ..........................................................
Selecting the snapshot method .......................................................
Snapshot methods ..................................................................
Configuration parameters for Snapshot Client ..............................
Snapshot Resources ...............................................................
Configuring backup scripts .............................................................
About using alternate client backup ..................................................
Alternate client backup requirements ..........................................
Configuring alternate client backup ..................................................
Before running the alternate client backup ...................................
Example alternate client backup configurations .............................
Policy configuration tips .................................................................
Maximum pathname length ......................................................
Snapshot tips ........................................................................
Multiple data streams ..............................................................
About incremental backup of mirror-based snapshots ....................
About disabling snapshots .............................................................
Disabling Open File Backups on Windows ...................................
Disabling Snapshot Client snapshots .......................................... Chapter 4 FlashBackup configuration 47
48
51
53
55
56
58
61
67
67
68
68
70
70
70
71
72
72
73
73
74
74
75 ............................................. 77 About FlashBackup .......................................................................
FlashBackup restrictions ................................................................
Restores of Windows encrypted files and hard links .......................
Configuring a FlashBackup policy ....................................................
Configuring FlashBackup policy for backward compatibility (UNIX only)
...........................................................................................
About the cache partition .........................................................
Requirements for the cache partition ..........................................
Directives for multiple data streams ............................................ 77
78
79
79
83
85
86
86 5 Contents Chapter 5 Instant Recovery configuration ...................................... 89
About Instant Recovery capabilities .................................................. 89
Instant Recovery requirements ........................................................ 90
Instant Recovery restrictions ........................................................... 90
Giving full server privileges to the media server .................................. 92
About Instant Recovery ................................................................. 93
About snapshot and backup for Instant Recovery .......................... 94
About NetBackup catalog maintenance ....................................... 94
About snapshot management ................................................... 95
Means of controlling snapshots ................................................. 96
Configuring a policy for Instant Recovery ........................................... 98
About sizing the cache for Instant Recovery copy-on-write snapshots
.......................................................................................... 100
Cache size during restore ....................................................... 101
Setting an adequate size for the snapshot cache ......................... 101
Large restores from an Instant Recovery snapshot ...................... 102
About configuring VxVM ............................................................... 102
Creating a snapshot mirror ..................................................... 103
About creating Instant Snapshots ............................................. 104
Using the VxVM 3.5 GUI to configure VxVM mirrors ..................... 106
Modifying the VxVM or FlashSnap resync options for point in time
rollback .............................................................................. 107
Instant Recovery for databases ..................................................... 107
About storage lifecycle policies for snapshots ................................... 108
Configuring a storage lifecycle policy to manage snapshot-based
backups for Instant Recovery ........................................... 108
Storage lifecycle polices and Snapshot Client troubleshooting
.................................................................................... 110 Chapter 6 Network Attached Storage (NAS) snapshot
configuration ................................................................ 113
About NAS snapshot overview ......................................................
Notes on NAS_Snapshot ..............................................................
Logging on to the NetBackup Client Service as the Administrator .........
Setting up a policy for NAS snapshots .............................................
NAS snapshot naming scheme ......................................................
Dynamic data streaming for NAS workloads .....................................
Understanding the features .....................................................
Example of dynamic data streaming with backup host pool ............
Configuring dynamic data streaming with backup host pool .................
Configuring a backup host pool .....................................................
Setting up a NAS-Data-Protection policy .......................................... 113
114
116
116
118
118
118
119
120
121
122 6 Contents Chapter 7 Configuration of software-based snapshot
methods ........................................................................ 126
Software-based snapshot methods ................................................
About nbu_snap ...................................................................
Cache device requirements ....................................................
About VxFS_Checkpoint ........................................................
About VxFS_Snapshot ...........................................................
About VxVM ........................................................................
About FlashSnap ..................................................................
About VVR ..........................................................................
About NAS_Snapshot ............................................................
About VSS .......................................................................... Chapter 8 Support for Cluster Volume Manager
Environments (CVM) ................................................ 144
About support for CVM environments ..............................................
Note on NetBackup and CVM ........................................................
About enabling VxVM or FlashSnap snapshots in a CVM environment
..........................................................................................
About enabling the NetBackup client to execute VxVM commands on
the CVM master node ............................................................ Chapter 9 126
126
127
131
133
133
136
139
141
141 144
145
145
146 Configuration of snapshot methods for disk arrays
.......................................................................................... 147
About the new disk array snapshot methods .....................................
About array-specific methods vs array-independent methods
....................................................................................
Advantages of the new array-specific methods ...........................
About types of disk array methods ............................................
Important disk array method notes and restrictions ......................
Disk array methods at a glance ................................................
Disk array configuration tasks ........................................................
Configuration tasks for the array administrator ............................
Configuration tasks for the NetBackup administrator ....................
Disk array configuration tasks diagram ......................................
OS-specific configuration tasks ......................................................
About dynamic multi-pathing ...................................................
HBA configuration .................................................................
About Solaris sd.conf file ........................................................
Linux modprobe.conf file ........................................................ 147
148
149
149
150
151
153
153
154
155
156
156
156
157
158 7 Contents Verifying NetBackup client access, zoning, and LUN masking
....................................................................................
About VSS configuration (Windows) ...............................................
Note on NetBackup array credentials ........................................
Initial configuration of certain arrays ..........................................
About EMC CLARiiON arrays ........................................................
EMC CLARiiON software requirements for UNIX .........................
Veritas support for VSS Snapshot and EMC CLARiiON ................
Diagram of installed software for EMC CLARiiON ........................
Verifying connectivity from client to array ...................................
About resolving host names on the network ...............................
Configuring NetBackup to access the CLARiiON array .................
Adding clients to a CLARiiON storage group ..............................
Configuring for EMC_CLARiiON_SnapView_Clone ......................
Creating a clone private LUN with the EMC Navisphere Web
interface .......................................................................
Creating a clone group and select a LUN as source .....................
Adding clone LUNs to the clone group ......................................
Obtaining the device identifier for each source and clone LUN
....................................................................................
About configuration for EMC_CLARiiON_SnapView_Snapshot
....................................................................................
Configuring a reserved LUN pool for the storage processors ..........
Configuring a NetBackup policy for a CLARiiON array method
....................................................................................
Common CLARiiON array configuration problems .......................
About EMC Symmetrix arrays .......................................................
EMC Symmetrix DMX software requirements .............................
Clone emulation flag can cause snapshots to fail .........................
EMC snapshot operation fails .................................................
Support for EMC Symmetrix with Volume Shadow Copy Service
....................................................................................
Prerequisites for using EMC Symmetrix disk arrays .....................
Configuring NetBackup clients to use EMC Symmetrix .................
About configuring NetBackup to access the Symmetrix array .........
About configuration for EMC_TimeFinder_Mirror .........................
About configuration for EMC_TimeFinder_Clone .........................
About configuration for EMC_TimeFinder_Snap ..........................
Configuring a policy for EMC_TimeFinder methods ......................
About HP EVA arrays ..................................................................
Prerequisites for working with HP EVA arrays .............................
HP EVA software requirements for UNIX ...................................
Diagram of installed software for HP EVA .................................. 158
160
160
160
164
165
165
165
167
168
168
169
170
171
171
172
174
175
176
177
178
178
179
179
179
180
180
180
182
182
183
184
184
186
186
186
187 8 Contents Veritas support for VSS Snapshot and HP EVA ....
View
Full Document
- Spring '17
- kevin croteu
- Snapshot, NetBackup, Snapshot Client Administrator