Professional Documents
Culture Documents
and Management
Copyright
2012 Syncsort Incorporated. All rights reserved. DMExpress, Backup Express, DMX, MFX and
BEX are trademarks of Syncsort Incorporated. All other company and product names used herein
may be the trademarks of their respective companies.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED AS IS.
SYNCSORT
INCORPORATED MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH
RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS
IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR
PURPOSE.
Syncsort Education Services is committed to providing accurate and up to date information.
However, we cannot and do not guarantee that the publications are free from errors or omissions.
The information is subject to change without notice and is at the sole discretion of Syncsort
Education Services.
The use of this information or implementation of any of these techniques is a customer
responsibility and depends on the customers ability to evaluate and integrate them into the
customers operational environment. All elements such as examples, demos, exercises, and any
simulations included in this training have been developed and performed in a controlled lab
environment. While each item may have been reviewed by Syncsort for accuracy in a specific
situation, there is no guarantee that the same or similar results will result elsewhere. Customers
attempting to adapt these techniques to their own environments do so at their own risk.
The content may include references to third party claims, assertions, statements, or quotes.
Syncsort does not endorse, verify, or validate the accuracy of such references.
No part of the contents of this book may be reproduced, delivered, or transmitted in any form or
by any means without the written permission of Syncsort Education Services.
About Syncsort
Syncsort is a global software company that helps the worlds most successful organizations
rethink the economics of data. Syncsort provides extreme data performance and rapid time to
value through easy to use data integration and data protection solutions. With over 12,000
deployments, Syncsort has transformed decision making and delivered more profitable results to
thousands of customers worldwide.
2012 Syncsort Incorporated. All rights reserved. DMExpress, Backup Express and BEX are trademarks of Syncsort Incorporated. All other company and product names
used herein may be the trademarks of their respective companies.
NSB IInstallation,
t ll ti
Configuration and
Management
Revision History
Rev Number
Course Date
Revisions
1.0
Feb 2012
Completed
p
1.1
April 2012
Completed
1.2
June 2012
Completed
1.3
Sep 2012
Completed
1.4
Jan 2013
Work In Progress
Page 0 - 1
Pre-Assessment
Log on to https://iLearn.syncsort.com
You will need an iLearn account
Browse to the course you are attending
Course Objectives
Upon completion of this course, you will be able to:
Describe the major
j components
p
of the NSB solution
Install and configure DPX
Define, run, and monitor DPX backup and recovery jobs
Use DPX Advanced Recovery options including IA, BMR, IV and FV
Explain and use DPX application protection features for Exchange, SQL,
SharePoint,, and Oracle environments
Discuss the importance of DPX Catalog Protection and Maintenance
Explain the Tertiary Protection and DR Features of DPX and how they can
be used to provide total enterprise protection
Module 00 - Course Agenda
Page 0 - 2
Course Agenda
Day 1:
NSB Overview
DPX IInstallation
t ll ti
Configuring DPX Backups
Protecting MS Clusters with
DPX
Day 3:
DPX Agentless
VMware Protection
g
DPX Disaster Recovery Overview
Archiving to Tape
Catalog Maintenance
Change Journal Overview
DPX Design Considerations and
Advanced Configuration
Day 2:
DPX Advanced Recovery Options
Overview
Restoring Files using DPX
DPX Instant Access
DPX Application Protection
Exchange Protection
SQL and SharePoint Protection
Oracle Protection
DPX Bare Metal Recovery
DPX Virtualization
Continued Education
ABCs of NSB
15 Minutes
60 Minutes
15 Minutes
NSB Product
Overview
NSB Technical
Fundamentals
15 Minutes
60 Minutes
1 Day
NSB Technical
Deep Dive
Notes
Accreditation/Certification
Exams can be taken at any
time
Details on
partnerportal.syncsort.com
3 Days
Page 0 - 3
https://partnerportal.syncsort.com
http://community.syncsort.com
https://iLearn.syncsort.com
www.blog.syncsort.com
Page 0 - 4
NSB S
Solution
l ti
O
Overview
i
Module Objectives
Upon completion of this module, you will be able to:
Page 1- 1
DPX Software*
NSB
SnapVault Secondary,
FlexClone, iSCSI,
SnapMirror (optional)
Syncsort Terminology
Syncsort DPX
Also known as the Syncsort Data Protection Software
Part of the NSB Solution
Latest Release v4.1
Backup Express
Commonly referred to as BEX
g y Data Protection solution from Syncsort
y
Legacy
Combined File, AROS, and ARSV functionalities
Last Release v3.4.x
Page 1- 2
Single Pane of
Glass
Replication
DPX Backup
WAN
LAN
DPX Clients
Exchange, SharePoint, SQL, VMware
optional
NetApp FAS
NetApp FAS
DR Target
SAN
optional
Tape Archive
Physical and
Virtual Servers
optional
Instant / Full
Virtualization
Tape Archive
Remote Disaster
Recovery
DPX Technology
DPX is a block-level, snapshot based data protection
technology
DPX is built on NetApps SnapVault and Open
Systems SnapVault (OSSV) technologies
Uses SnapVault block-incremental replication to offer
D2D and D2D2T backup
Page 1- 3
Why NSB?
Extends NetApps core data protection technologies
Full catalog spans disk and tape for wildcard
search/restore
Heterogeneous application support
Exchange, Oracle, SQL, SharePoint
Bare Metal Recovery to dissimilar hardware
Advanced recovery options like Instant Access (IA),
Instant and Full Virtualization (IV & FV)
Recovery from replicated DR (SnapMirror) copy
Deeper integration with VMware for advanced and
more efficient protection of virtual environments
Host-based and Agentless protection
Tape support
7
File
Recovery
DPX
Snapshots
Application
and Item
Recovery
Exchange, SQL,
Oracle, SharePoint
Base
Block update
Server
Recovery**
R
**
C:\
D:\
OS and Data
Block update
Block update
Site
Recovery**
** Agentbased/Agentless
Integrated DR,
SnapMirror
8
Page 1- 4
Supported Technologies
Operating Systems
Microsoft Windows
Linux
RedHat Enterprise Linux, SUSE Linux Enterprise
Server, CentOS (x64, x86)
Storage
Any block-level primary storage, both SAN and Direct
Attached
Windows Cluster aware
Always refer to the online compatibility guide for latest information
Module 01 - NSB Solution Overview
* on supported OS platforms
10
Page 1- 5
Compatibility Guide
Latest compatibility guide or support matrix can be
downloaded from the Syncsort website
www.syncsort.com
Update this screenshot
11
Distributed Architecture
All systems (nodes) in the NSB Enterprise are
classified as one of these types:
Master Server
Client
12
Page 1- 6
Master Server
Only one in an enterprise
Initiates and manages jobs
DPX
Catalog
13
Client
Any node which is the source of data to be backed up
or any node where data will be restored
Physical
Ph i l or Vi
Virtual
t l
Supported OS: Linux, Windows, Solaris
14
Page 1- 7
15
Technical References
Syncsort Support
Syncsort online customer support
http://www.syncsort.com/support
Requires MySupport account to:
Download latest software and
patches
Access latest Support Matrix
Search Knowledge Base (KB)
articles
Refer to and download Product
Documentation
Request Emergency license keys
NetApp Support
NetApp online customer support
http://support.netapp.com
Requires NOW account to:
Download ONTAP updates
Search KBs
Module 01 - NSB Solution Overview
16
Page 1- 8
Knowledge Check
1. Which type of primary storage can be protected using DPX?
2 What is the target (destination) for DPX backups?
2.
3. DPX belongs to which data protection solution category?
o
o
o
Block-level
File-level
Snapshot-based
4 What
4.
Wh t are th
the basic
b i components
t off an NSB Solution?
S l ti ?
5. Which application backups are supported by DPX?
17
Module Summary
You are now able to:
Di
Discuss N
NetApp
tA S
Syncsortt IIntegrated
t
t d Backup
B k (NSB)
solution
Identify the basic components of an NSB solution
Articulate NSB topology
List operating systems and technologies supported by
NSB
Explain
E l i NSB architecture
hit t
List the key features and benefits of NSB
18
Page 1- 9
DPX IInstallation
t ll ti
Module Objectives
Upon completion of this module, you will be able to:
Install DPX Master Server and Clients
Use the DPX Management Console
Update nodes using the Autoupdate feature
Recognise, start and stop DPX services
Add and Configure Node Groups and nodes, including
NetApp Storage Systems, in the Enterprise
Module 02 - DPX Installation
Page 2- 1
Lesson 1
Page 2- 2
Option
available
il bl only
l
on 64-bit
machines
Page 2- 3
DPX Licensing
Source-side, Capacity-based License
One license for most of the features, including:
Windows,
Wi d
and
d Li
Linux nodes
d
All supported applications
Exchange, SQL, SharePoint, Oracle
Virtualized environments
Both Host-based and Agentless
Unlimited clients (nodes)
Tape Archive
Additional licenses required for:
Application Recovery Options (EMR, SPOR)
File-Level Backups (Backup Express)
Managing OSSV relationships
Module 02 - DPX Installation
Page 2- 4
10
Page 2- 5
License Keys
Copy and Paste
the actual key
DO NOT
BROWSE
Verify Checksum
11
Lab Exercise
12
Page 2- 6
13
Lesson 2
14
Page 2- 7
15
16
Page 2- 8
17
18
Page 2- 9
19
20
Page 2- 10
Lab Exercise
Duration: 30 mins
21
Lesson 3
22
Page 2- 11
23
24
Page 2- 12
DPX Enterprise
Enterprise : set of all DPX components
Node Groups
Device Clusters
Media Pools
25
Node Groups
Node Group A logical grouping of nodes
Node Each host running DPX
Node Groups are logical
No relationship with backups or recoveries
Typical Node Groups are based on:
Physical / Geographical Location
Business Function
OS type
Operational Responsibility
Nodes can be moved across groups
Module 02 - DPX Installation
26
Page 2- 13
Nodes
Each Node must belong to a Node Group
2 methods to add Nodes to a Node Group
During DPX Client installation
Using the DPX Management Console
Backup jobs are defined at the Node level
Nodes without a Client installation
NAS (NDMP) devices
pp storage
g systems
y
NetApp
SnapVault Secondary, SnapMirror Secondary
27
28
Page 2- 14
Knowledge Check
1. Which two components are installed as part of an DPX
Installation?
2. Which type of Windows operating systems are supported
for the DPX Master Server?
3. Differentiate Evaluation Keys from Emergency Keys.
4. How many Emergency Keys can be downloaded per
year?
?
5. What are the recommended pre-requisites when
installing DPX client on a Windows host?
29
Lesson 4
30
Page 2- 15
31
32
Page 2- 16
33
Lab Exercise
Duration: 15 mins
34
Page 2- 17
Lesson 5
35
36
Page 2- 18
SSPRODIR/misc/sscmagent start
SSPRODIR/misc/bexads start
Stopping DPX
cmagent:
nibbler:
SSPRODIR/misc/sscmagent stop
SSPRODIR/misc/bexads stop
37
Lesson 6
Configuring NetApp
Storage for DPX
38
Page 2- 19
39
40
Page 2- 20
41
42
Page 2- 21
43
ndmpd on
option ndmpd version
option ndmpd version 4
options ndmpd.access all
>
>
>
options snap
snapvault.access
a lt access all
options snapvault.enable on
options httpd.admin.ssl.enable on
44
Page 2- 22
options httpd.enable on
iSCSI
options iscsi.enable
iscsi enable on
Tape
FTP
SSH
45
46
Page 2- 23
47
Lesson 7
48
Page 2- 24
Change Access
Method to NDMP
Client Node is
usually your
master server
Default Port No is
10000 for NDMP
Specify root
username and
password for FAS
50
Page 2- 25
51
Ensure dump is
selected for Backup
type and click OK
52
Page 2- 26
53
Catalog
The Catalog is the heart of an DPX Enterprise and is essentially
just a set of files stored on the master server
For Windows Master Servers the default Catalog Location is:
...\DPX\db
...\DPX\sched
...\DPX\cat
And for Unix/Linux:
/opt/DPX/db
/opt/DPX/sched
/opt/DPX/cat
Module 02 - DPX Installation
54
Page 2- 27
Catalog
Every time you perform a backup or make a configuration
change to your Enterprise, the Catalog is updated
In particular, a backup job updates the Catalog with
information identifying the location of every
node/volume/file that has been backed up. This
information is crucial during restores
Because the Catalog is so vital to DPX,
DPX it needs to be
properly maintained. To maintain the Catalog, you should
regularly perform essential Catalog operations
* We will discuss in detail about DPX Catalog Maintenance in a later module
55
Lab Exercise
56
Page 2- 28
Knowledge Check
1. Which NetApp licenses are required on the secondary
storage system to be used as a destination for DPX
backups?
2. What are the recommended best practices when
enabling ASIS on a volume?
3. What must be the Access Method attribute set to when
adding a NetApp storage system as a node to the DPX
Enterprise?
4. Which port is used, by default, for NDMP?
Module 02 - DPX Installation
57
Module Summary
You are now able to:
E
Explain
l i th
the major
j steps
t
required
i d tto install
i t ll and
d
configure an DPX Enterprise
Perform an DPX Master Server and Client installation
Start and log in to the DPX Management Console
Update all nodes using the Autoupdate feature
Recognise, start and stop DPX Services on various
client
li t types
t
Add and Configure Node Groups and nodes, including
NetApp Storage Systems, in the Enterprise
Discuss the DPX Catalog
Module 02 - DPX Installation
58
Page 2- 29
C fi
Configuring
i
DPX B
Backups
k
Module Objectives
Upon completion of this module, you will be able to:
Differentiate NetApp SnapVa
SnapVault
lt and Open S
Systems
stems
SnapVault from Syncsort Advanced Recovery
SnapVault
Describe how SnapVault backups work
Define, save, run and monitor an DPX backup job
Create different types of schedules for a backup job
Discuss the implications of modifying a backup job
Module 03 - Configuring DPX Backups
Page 3 - 1
Lesson 1
What is SnapVault?
A disk-based backup technology by NetApp
Initially developed for NetApp Storage Systems
And
A d th
then ffor other
th open systems
t
servers that
th t use
block-based data transfer
Uses snapshots and asynchronous mirroring to
create an incremental-forever backup scheme
Protects data residing on a hosts primary storage by
maintaining a number of read-only versions of that
data on a SnapVault secondary system
Destination for the backup (SnapVault Secondary) is
always a data storage system running Data ONTAP
Module 03 - Configuring DPX Backups
Page 3 - 2
Page 3 - 3
Vendor
Source
Destination
Purpose
Requirements
SnapVault
NetApp
NetApp
Storage
System
(Primary)
NetApp
Storage
System
(Secondary)
Block-Level SnapVault
Backup of NetApp
Systems to NetApp
System
NetApp SV Primary
and Secondary
Licenses
Open Systems
SnapVault
(OSSV)
NetApp
NetApp
Open
Systems
Clients
NetApp
Storage
System
(Secondary)
Block-Level SnapVault
Backup of non-NetApp
systems to NetApp
System
DPX Advanced
Recovery for
SnapVault
(ARSV)
Syncsort &
NetApp
DPX
Advanced
Clients
NetApp
Storage
System
(Secondary)
Block-Level SnapVault
Backup of non-NetApp
systems to NetApp
System
DPX Advanced
Client & NetApp
Secondary License
Page 3 - 4
SV Terminology
SnapVault Snapshot
Point in time image of a dataset that SnapVault creates on its
primary and secondary nodes
SnapVault Primary
A system whose data is to be backed up (client)
SnapVault Secondary
NetApp Storage System to which the data will backed up
SnapVault Relationship
The backup relationship between a QTree on the primary node
(or a directory on a open system (OSSV) primary node) and its
corresponding secondary node Qtree
DPX Advanced Recovery
DPX Advanced Client Software
Module 03 - Configuring DPX Backups
SnapVault Backup
1. For the first backup, a complete copy of the source data
is transferred to the secondary device (Base)
2. Subsequent backups only transfer data blocks modified
since the last backup (Incremental)
3. No further Base backups are ever run
10
Page 3 - 5
NetApp SV Secondary
Snapshots
Full Backup
9am
9am
9am
Snapshots
10am
Snapshots
10am
11am
11
SnapVault Snapshots
The backups are stored in the WAFL (Write Anywhere File
Layout) file system
A snapshot is created at the end of each backup
SnapVault takes advantage of the snapshotting capability
of the WAFL filesystem in ONTAP
Maximum of 250 snapshots per volume can be stored at
any one time
Snapshots are always made at the volume level
All managed from DPX Management Console
12
Page 3 - 6
13
14
Page 3 - 7
DPX Agents
Windows, Linux & Solaris
Installed as part of the DPX
Client installation - no additional
configuration is required
15
16
Page 3 - 8
Go to
Backup >
Advanced
Recovery
Recovery
2.
Select
NetApp
volume to
backup
3.
Select
NetApp
Storage
System
Volume as
destination
17
Non-Qtree Data
Non-QTree data is any data on a Storage System that is not
contained in its QTrees. Non-QTree data can include
Configuration and logging directories on the Storage System
(for example, /etc or /logs) that are not normally visible to
Storage System clients
Directories and files on a Storage System volume that has
no QTree configured
Use logical object non-QTree data for backup selection.
Note
The non-QTree part of the primary storage system volume can be
replicated only to the SnapVault secondary storage system. The
data can be restored to a QTree on the primary storage system,
but cannot be restored as non-QTree data.
Module 03 - Configuring DPX Backups
18
Page 3 - 9
19
Knowledge Check
1. What are the two data protection technologies
offered by NetApp?
2. Differentiate SnapVault and Open Systems
SnapVault (OSSV).
3. Which data protection software offers the Advanced
Recovery for SnapVault (ARSV) agent?
4. Which operating systems are currently supported
by the DPX Advanced Client?
20
Page 3 - 10
Lesson 2
21
Vendor
Source
Destination
Purpose
Requirements
SnapVault
NetApp
NetApp
Storage
System
(Primary)
NetApp
Storage
System
(Secondary)
Block-Level SnapVault
Backups of NetApp
Systems to NetApp
System
NetApp SV Primary
and Secondary
Licenses
Open Systems
SnapVault
(OSSV)
NetApp
NetApp
Open
Systems
Clients
NetApp
Storage
System
(Secondary)
Block-Level SnapVault
Backups of non-NetApp
systems to NetApp
System
DPX Advanced
Recovery for
SnapVault
(ARSV)
Syncsort &
NetApp
DPX
Advanced
Clients
NetApp
Storage
System
(Secondary)
Block-Level SnapVault
Backups of non-NetApp
systems to NetApp
System
DPX Advanced
Client & NetApp
Secondary License
22
Page 3 - 11
23
24
Page 3 - 12
25
26
Page 3 - 13
27
28
Page 3 - 14
Checkpoint Restart
Checkpoint Restart is supported within the context of
a backup job (failed jobs will not be retried)
The failed task will continue from the last checkpoint
taken
Checkpoints are taken every 128MB (configurable)
The behavior is controlled by the DPX Job Options
Down Node Retries: how many times should the task
(relationship) be retried
Task Retry Interval: what should be the interval (in
minutes) between retries
Module 03 - Configuring DPX Backups
29
30
Page 3 - 15
Select SV destination
volume on secondary
BMR/ExpressDR - points to
the images (disks) that
house the operating system
EXCH / SQL etc point to the
images (virtual disks) that
house the application and all
its data
Select whole node for
complete protection with all
recovery options
32
Page 3 - 16
Lab Exercise
33
Lesson 3
34
Page 3 - 17
35
36
Page 3 - 18
37
38
Page 3 - 19
Lesson 4
39
Schedule
A backup job can be run
interactively or scheduled to
run once, hourly, daily,
weekly or monthly
weekly,
monthly.
A scheduled job can have
multiple schedules of
different schedule types, all
with the same or different
retention periods.
NB - Be sure to click Apply
to save any changes made
on these Scheduling
Screens.
OK closes the screen, but
not save changes made.
Module 03 - Configuring DPX Backups
40
Page 3 - 20
Schedule - Once
Use Once to run a
backup at a specified
date and time with a
specified retention
period
41
Schedule - Hourly
Hourly Schedules allow
q
backups
p
more frequent
for mission critical
servers / applications
Example shows
backups configured for
every 2 hours by using
two separate hourly
schedules
42
Page 3 - 21
Schedule - Daily
Daily schedules allow
p to run every
y
backups
day at the specified
time(s)
Example shows a
backup configured for
every day at 11pm,
y
retention 7 days
43
Schedule - Weekly 1
Use Weekly Schedules
((Select Weeks)) to
configure backups to run
on only certain days of the
week or month.
Example shows a backup
to be run:
Sunday Friday at 11pm
with retention of 7 days
Saturday with a retention
of 30 days
44
Page 3 - 22
Schedule - Weekly 2
Use Weekly Schedules
((Weekday
y in Month)) to
configure backups to run
on only certain days of the
month.
Example shows a backup
to be run:
Monday Friday at 11pm
with retention of 7 days
The last Saturday of the
month with a retention of
30 days
Module 03 - Configuring DPX Backups
45
Schedule - Monthly
Use Monthly Schedules to
g
regular
g
monthly
y
configure
backups with long
retention periods
Example shows a backup
to be run:
Last day of the month
with a retention of 365
days
46
Page 3 - 23
Schedule - Exceptions
Exceptions can be set for
a particular date and
point in restore.
A date can be selected
from the calendar.
Example shows
Christmas and Boxing
Day exclusions
Or on configured Holiday
(Set
Configure,
(S t iin C
fi
Holidays)
47
Schedule - Preview
The preview screen
allows the user to see
the current job and all
jobs scheduled to run in
DPX on a particular day
48
Page 3 - 24
Lesson 5
49
50
Page 3 - 25
Definitions
Target-side
Deduplication
Client-side
Deduplication
Source-side Data
Reduction
Single Instancing
Compression
51
52
Page 3 - 26
DedupeAppliance
3rd PartyStorage
BU&Recovery
Hours
3rdPartyStorage
CPUUtilization
DedupeApplianceor
StorageArraywithDeduplication
BU&Recovery
Mins
53
54
Page 3 - 27
55
Pre-Implementation Considerations
Design Considerations
Maximum number of data streams
Restrictions
R t i ti
on the
th volume
l
size
i if deduplication
d d li ti is
i tto b
be
enabled on that volume
Maximum number of snapshots on volume is limited to 255
Only 250 are usable on a SV Secondary volume
Maximum Qtrees per volume
Depends on the ONTAP version
at itt means
ea s to DPX?
What
Number of parallel data streams limits the number of servers
a job can have OR two jobs that may overlap can have
Stream = volume/disk (plus an additional stream for APPS)
Retention policy of snapshots on volume
Module 03 - Configuring DPX Backups
56
Page 3 - 28
Module Summary
You are now able to:
Explain features of NetApp SnapVault, NetApp Open
S t
Systems
SnapVault
S
V lt (OSSV) and
d Advanced
Ad
d Recovery
R
SnapVault (ARSV)
Describe how SnapVault backups work
Understand the considerations in configuring
SnapVault Secondary storage
Define, save, run and monitor an DPX backup job
Create
backup
C t different
diff
t ttypes off schedules
h d l ffor a b
k job
j b
Discuss the implications of defining a new job name
and/or new destinations
57
Page 3 - 29
Protecting
P
t ti
MS Clusters
Cl t
with
ith
DPX
Module Objectives
Upon completion of this module, you will be able to:
Discuss the basics of Windows Cluster Data Protection
with DPX
List the Installation Requirements for DPX on MS
Clusters
Explain how to backup and restore Local and
Clustered Volumes
Explain the Failover process in Windows Clusters
Module 04 - Protecting MS Cluster with DPX
Page 4 - 1
Windows Cluster
Physical view
C:
Local Disk
D:
C:
D:
Heartbeat
FC Switch
Shared Disks
for the Cluster
3
Windows Cluster
Logical View of Volumes
C:
D:
C:
D:
G:
H:
L:
Page 4 - 2
C:
D:
C:
D:
Heartbeat
FC Switch
Replicated Disks
for the Cluster
5
C: D: G: H: L:
C: D: G: H: L:
Page 4 - 3
Installation Summary
Cluster services must be up and running
Install DPX on every
y physical
p y
cluster node
Configuration questions will be asked during the installation
(available IP addresses etc)
Required changes will be made to the cluster - Backup Express
group will be created and brought online
An available IP address must be provided at install time for the
Backup Express cluster resource
The Backup Express cluster resource must be able to run on all
nodes in the cluster
Module 04 - Protecting MS Cluster with DPX
Page 4 - 4
10
Page 4 - 5
Enter the IP
Address and
subnet mask you
have obtained for
the DPX Virtual
Node
From pull-down,
select the public IP
of the physical
node
From pull-down,
select the name of
the public cluster
network
11
Cluster now
shows the DPX
Cluster Service
Group
12
Page 4 - 6
13
14
Page 4 - 7
15
16
Page 4 - 8
BEX_
17
18
Page 4 - 9
20
Page 4 - 10
Module Summary
You are now able to:
Discuss the basics of Windows Cluster Data Protection
with DPX
List the Installation Requirements for DPX on MS
Clusters
Install the DPX Client Software in a Microsoft Cluster
Environment
Explain
how tto backup
Locall and
E l i h
b k and
d restore
t
L
d
Clustered Volumes
Explain the Failover process in Windows Clusters
21
Page 4 - 11
DPX Ad
Advanced
dR
Recovery
Options Overview
Module Objectives
By the end of this module, you will be able to:
Describe the various recovery options for data,
applications, volumes, servers, virtual machines and
sites that form part of the DPX Advanced Recovery
Suite.
Page 5 - 1
File
Recovery
DPX
Application
and Item
Recovery
Exchange, SQL,
Oracle, SharePoint
Base
Block update
Server
Recovery**
R
**
C:\
D:\
OS and Data
Block update
Block update
Site
Recovery**
** Agentbased/Agentless
Integrated DR
SnapMirror
4
Page 5 - 2
File Recovery
Ability to perform file-level restores from snapshots
Catalog-based file search and restore
Search based on file name, type, size, etc
10:00 Snapshot
File
11:00 Snapshot
12:00 Snapshot
Searchable
catalog
DPX
NetApp FAS
Application
G:\
Data is LIVE!
10:00 Data Image
Mapping
request
Application Data
12:05
DPX
G:\
12:12
12:10
8:00
Repair Hardware
Failure on
Application Server
Select
desired
Recovery
Point
Map Server
to SnapShot.
Server is
back on-line!
Scheduled downtime of
Server to resync secondary
storage to primary storage
6
Page 5 - 3
NetApp FAS
1. CD Establishes
communication
DPX Recovery
CD or ISO image
2. Copies
data
12:05
Server HD Failure
Occurs
12:20
12:25
12:32
12:40
Select
desired
Recovery
Point
Recover
Server Image
Reboot server
and restore
complete!
7
NetApp FAS
VM of
Application
Creates VM
automatically
Backup
VMware ESX
Bootable VM
Page 5 - 4
VM of
Application
1. Create VM
VMware ESX
4. Storage
Vmotion
migrates
g ates disks
ds s
3. Background
migration of data
to datastore
VMDK
VMX
Datastore
SnapMirror
DR Site
DPX
Recovery via
Snapshots,
Virtualization
DPX
Central Recovery
Management
10
Page 5 - 5
Instant VM Restore
VMDK
DPX
Agentless
Backup
Full VM Restore
NetApp Snapshots
VMDK
VMDK
VMDK
11
Module Objectives
You are now able to:
Describe the various recovery options for data,
applications, volumes, servers and sites that form part
of the DPX Advanced Recovery Suite.
12
Page 5 - 6
R t i
Restoring
Fil
Files using
i
DPX
Module Objectives
Upon completion of this module, you will be able to:
Perform File Level Restores using the DPX Advanced
Recovery
Page 6 - 1
File Recovery
Ability to perform file-level restores from snapshots
Catalog-based file search and restore
Search based on file name, type, size, etc
10:00 Snapshot
File
11:00 Snapshot
12:00 Snapshot
Searchable
catalog
DPX
Page 6 - 2
Page 6 - 3
Source / Destination
Options (e.g. overwrite
existing files) can be set
here
Page 6 - 4
Mount point and disk will be gone as soon as you leave the Restore
window in the DPX console
10
Page 6 - 5
Lab Exercise
11
Module Summary
You are now able to:
Perform File Level Restores using the DPX Advanced
Recovery
12
Page 6 - 6
DPX IInstant
t tA
Access
Module Objectives
Upon completion of this module, you will be able to:
Explain the DPX Instant Access feature
Configure and use Instant Access to perform volume
mapping in order to recover data, applications,
volumes and servers in DR scenarios
Page 7 - 1
Block-level backups
9 am
D:\MyFile.txt
10 am
Copy
File(s)
Data is LIVE!
M:\
11:15 am
File Deletion /
Corruption on Server
11 am
11:20
11:22
11:25
Select
desired
Recovery
Point
Copy File(s)
from IA drive
M:\ to D:\
Have
additional
drive (M:)
on-line!
File(s) back
on-line!
Page 7 - 2
9 am
E:\
F:\
10 am
E:\
FlexClone
Data is LIVE!
11 am
11:15 am
Failure on
Application Server
11:20
Select
desired
Recovery
Point
11:22
Repair Hardware
Map Server
to SnapShot.
Server is
back
on-line!
8:00 PM
Scheduled
downtime of Server
to resync secondary
storage to primary
storage
Alternate Secondary
Node:
iSCSI map the selected drive
from a location of your choice
when an Alternate Secondary is
available
Page 7 - 3
Instant Access
The MAP function allows for the iSCSI mapping to be created on any Windows
node in the Enterprise and Drive information translated by DPX.
Node List
Select the Node to which the
drive will be mapped to
Can be any node in the DPX
Enterprise
iSCSI Initiator must be
running on this node
Instant Access
An Informational message confirms the mapping as soon as it completes.
Page 7 - 4
Instant Access
The M: drive
now points to
the selected
snapshot on the
Secondary
It appears as a
local drive to
Windows users
and applications
It is a block-level
device (iSCSI
LUN). Its not a
(file level) CIFS
share.
Instant Access
Un-mapping the
iSCSI drive
Restore
>Advanced
Recovery for
SnapVault screen
Right-click on the
node that has the
mapping and
select Show
mapped Drives
Select the drive
letter, and click
Unmap
10
Page 7 - 5
Instant Access
Lets assume the E: drive, which houses the SQL database
and logs dies on the SQL server. To perform a recovery
using IA the following steps should be followed:
iSCSI map the
th E:
E drive
d i tto point
i t tto the
th latest
l t t snapshot
h t using
i
the DPX Management Console
Replace the broken drive, and reformat it as F:
Do an Advanced Recovery restore of the latest snapshot
taken of the E: drive using the DPX software and throttle the
restore not to impact the IA operation
At the end of the restore job, the F: drive should be
recovered to the point in time of the latest snapshot. The E:
d
e will now
o house
ouse add
t o a information.
o at o Att tthis
s po
drive
additional
pointt
schedule downtime of the SQL database
With the database down, do a xcopy (or other incremental
copy) command from E: to F:
Unmap the iSCSI drive
Change F: to E: and start the SQL database
Module 07 - DPX Instant Access
11
Lab Exercise
12
Page 7 - 6
Module Summary
You are now able to:
Explain DPX Instant Access
Configure and use Instant Access to perform volume
mapping in order to recover data, applications,
volumes and servers in DR scenarios
13
Page 7 - 7
DPX Application
A li ti
Protection Overview
Module Objectives
Upon completion of this module, you will be able to:
Explain how DPX interfaces with Servers running MS
Applications - Exchange, SQL and SharePoint
Discuss how DPX interacts with these applications in
clustered configurations
Identify the tools and options available when protecting
MS Applications
Page 8 - 1
Overview
Uses Microsoft VSS framework to perform consistent
backups of supported Microsoft applications
Quiesce;
Q i
f
freeze;
and
d th
thaw
No application specific agents to be installed
Automatically detects the location of application
related data files and logs that need to be protected
All databases are internally translated by DPX to be
Exchange and SQL aware snapshots of volumes that
host the database and logs
Module 08 - DPX Application Protection Overview
Page 8 - 2
Page 8 - 3
Page 8 - 4
10
Page 8 - 5
To check if verification
completed
l t d successfully:
f ll
Refresh the Restore tab
Expand the
Exchange/SQL instance
Verify the point in
recovery snapshot
thatt
h t th
was verified
11
Module Summary
You are now able to:
Explain how DPX interfaces with Servers running MS
Applications - Exchange, SQL and SharePoint
Discuss how DPX interacts with these applications in
clustered configurations
Identify the tools and options available when protecting
MS Applications
12
Page 8 - 6
DPX E
Exchange
h
P
Protection
t ti
Module Objectives
Upon completion of this module, you will be able to:
Explain
p
how DPX interfaces with Exchange
g servers
List the requirements for using DPX in an Exchange
environment
Identify the options available when protecting
Exchange databases
Configure and use the DPX Exchange Mailbox
Recovery (EMR) utility to recover individual mailboxes
or emails
Module 09 - DPX Exchange Protection
Page 9 - 1
Lesson 1
Page 9 - 2
Page 9 - 3
Requirements - Permissions
The DPX CMAgent service account must be a DOMAIN ADMIN
user account with full access to the Exchange database
The Domain controller is queried for information during an
Exchange database recovery and the recoveries will fail without
DOMAIN ADMIN privileges
This requirement is only for recovery purposes
Page 9 - 4
10
Page 9 - 5
Lesson 2
11
12
Page 9 - 6
13
14
Page 9 - 7
EMR - Installation
The DPX Exchange Mailbox Recovery Program (EMR) is a
separate utility that needs to be installed.
Installation ISOs can be downloaded from the Syncsort
MySupport website.
A separate license is required at additional cost
It needs Microsoft .NET Framework 2.0.(50727) installed and
will install it for you if not present
No reboot is needed after installation / patching
Can change license from menu or by replacing file after
installation
15
16
Page 9 - 8
17
EMR - Permissions
In Exchange Server 2000/2003/2007, the permission that
controls whether or not any mailbox can be copied to is
Full Mailbox Access
Access.
You must have Full Mailbox Access set to "Allow" in order
to copy to a mailbox other than the one you logged in
under.
18
Page 9 - 9
19
Lesson 3
20
Page 9 - 10
21
22
Page 9 - 11
23
24
Page 9 - 12
Select user,
inbox, mail or
attachment
25
26
Page 9 - 13
27
Lesson 4
Troubleshooting Exchange
Backups and Restores
28
Page 9 - 14
29
30
Page 9 - 15
31
Lab Exercise
32
Page 9 - 16
Module Summary
You are now able to:
Explain how DPX interfaces with Exchange servers
List the requirements for using DPX in an Exchange
environment
Identify the options available when protecting
Exchange databases
Configure and use the DPX Exchange Mailbox
Recovery (EMR) utility to recover individual mailboxes
or emails
Module 09 - DPX Exchange Protection
33
Page 9 - 17
Module Objectives
Upon completion of this module, you will be able to:
Explain how DPX interfaces with Microsoft SQL and
SharePoint
List the requirements for backing up SQL machines
Discuss the various methodologies used to restore
SQL and SharePoint data
Identify limitations and other considerations in backing
up and restoring a SQL server
Discuss protection of SharePoint servers using DPX
Module 10 - Data Recovery - Applications - SQL & SharePoint
Page 10 - 1
Lesson 1
Supported Versions
Various versions of Microsoft SQL Server on
numerous Windows platforms including 2008 x64
and
d 2008 R2 x64
64 are supported
t d
Whilst it is always recommended to stay up to date
with the SQL / Windows service packs, always
check the DPX Compatibility Matrix before
implementing changes
Page 10 - 2
Requirements - Permissions
Service account requirements:
A local system account with full administrative access to the database (OR)
A windows login account with administrative access to the local
system/cluster and SQL
Page 10 - 3
Page 10 - 4
Lesson 2
10
Page 10 - 5
11
12
Page 10 - 6
Lesson 3
13
14
Page 10 - 7
15
16
Page 10 - 8
Lesson 3
17
Restore operations
Restore the SQL database from the snapshot that was created
immediately prior to the required point in time.
Use Instant Access to map the snapshot created immediately after the
required point in time to the SQL server. This mapped snapshot will
provide transaction logs that can be used for point in time restores.
Use the required transaction logs and the necessary SQL Server
utilities to roll forward the database to the necessary point in time.
Module 10 - Data Recovery - Applications - SQL & SharePoint
18
Page 10 - 9
19
20
Page 10 - 10
21
22
Page 10 - 11
23
24
Page 10 - 12
25
26
Page 10 - 13
27
28
Page 10 - 14
29
30
Page 10 - 15
31
Lesson 4
SharePoint Protection
32
Page 10 - 16
SharePoint - Support
DPX supports backups and recoveries of SharePoint 2007/2010 standalone and SharePoint farm configurations through Advanced
Recovery SnapVault.
Supported Operating Systems and Applications SharePoint support
include:
Microsoft Office SharePoint Server 2007/Windows SharePoint Services
3.0
Microsoft Office SharePoint Server 2010/Microsoft SharePoint
Foundation 2010
Granular search and object recovery using DPX SPOR
Stand-alone and farm configurations of SharePoint
Windows 2003 platforms: x86, R2 x86, x64, and R2 x64
Windows 2008 platforms:
x86,
f
86 R2
2 x86,
86 x64,
6 and R2
2 x64
6
SQL Server 2008, SQL Server 2008 R2, SQL Server 2005, and SQL
Server 2000 (Clustered and Non-Clustered) platforms:
Whilst it is always recommended to stay up to date with the SQL /
Windows service packs, always check the Syncsort DPX Compatibility
Matrix before implementing changes
Module 10 - Data Recovery - Applications - SQL & SharePoint
33
SharePoint - Configuration
While a SharePoint installation can run on a single
server, it is much more common to see a single
SharePoint application deployed on a number of
different servers in what is called a farm
configuration.
The servers in a SharePoint (server) farm, that is,
front-end web servers, application servers, and
p
y distinct
database servers,, will often perform
very
tasks that fulfill unique SharePoint requirements. It is
the combination of these different server types
working together that provide the full set of
SharePoint functionality.
Module 10 - Data Recovery - Applications - SQL & SharePoint
34
Page 10 - 17
ISAPI ASP.
NET
HTTP Request
OLEDB
HTML Pages
Web Server
(IIS)
Windows
SharePoint
Services
SQL Server
35
User requests
through web
browser
Web Servers
Dedicated
Search Server
1
Dedicated
Search Server
2
Content
Database
Server 2
Config and
Admin Content
Databases
Server 3
36
Page 10 - 18
37
38
Page 10 - 19
39
40
Page 10 - 20
41
42
Page 10 - 21
Module Summary
You are now able to:
Explain
p
how DPX interfaces with Microsoft SQL and
SharePoint
List the requirements for backing up SQL machines
Discuss the various methodologies used to restore
Microsoft SQL and SharePoint
Identify limitations and other considerations in
backing up and restoring a SQL server
Configure and perform backups of SharePoint servers
Module 10 - Data Recovery - Applications - SQL & SharePoint
43
Page 10 - 22
DPX O
Oracle
l P
Protection
t ti
Module Objectives
Upon completion of this module, you will be able to:
Explain how DPX interfaces with Oracle
List the requirements for backing up Oracle
Databases
Discuss the various methodologies used to restore
Oracle and SharePoint servers
Page 11 - 1
Oracle - Support
DPX supports Oracle on Windows, Solaris, and Linux
(RedHat, SLES, CentOS)
Provides auto-discovery of Oracle database instances
Backup of Oracle databases or tablespaces residing
on drives or mount points at local machines
Restore of Oracle tablespaces that are in either online
or offline mode
Restore
off iindividual
R t
di id l Oracle
O
l files
fil
DPX Bare Metal Recovery disaster recovery for Oracle
nodes
Page 11 - 2
Oracle - Considerations
DPX Advanced Recovery backups and restores for Oracle are executed from the DPX
Management Console
Oracle must be running in ARCHIVELOG mode during backup and restore
The Oracle archive destination variable must be set to a specific location, not the
default. The following example shows a setting for a specific location on UNIX/Linux:
alter system set log_archive_dest_1='location=/db/DB1_arc';
archive log list;
alter system switch logfile;
TNS Listener process must be running for all operations
iSCSI Initiator
that
I iti t mustt be
b installed
i t ll d for
f all
ll operations
ti
th t require
i Instant
I t t Availability,
A il bilit
including RMAN cataloging
On each Oracle node, after DPX has been installed, OracleConfig must be run from
the DPX Command Prompt
Oracle - Configuration
Run OracleConfig:
From Windows, open an
DPX C
Command
dP
Promptt and
d
run the command
run-java
OracleConfig
From UNIX/Linux, navigate
to the DPX bin directory and
run the command
run.java OracleConfig
Page 11 - 3
Oracle - Backup
On the DPX Advanced Recovery source tree, the Oracle object will
appears as a yellow disk.
The Oracle database or the tablespace can be selected for backup.
Page 11 - 4
Description
Logical View
Restore:
Regular
This is the default view that appears when you open the Restore
window in DPX. It is the default method for DPX Advanced Recovery
restores, transferring data over the network. It is also the most
limited method.
Logical View
Restore:
Quick Restore
Logical View
Restore:
Cloning
Physical View
Restore
With this method, all backed up Oracle data files, control file,
parameter file, and archive logs are available for individual selection,
but no Oracle application level processing is done by DPX.
10
Page 11 - 5
Quick Restore
Advanced restore in which an Oracle
DBA can leverage RMAN to perform
more granular or point in time
restores
Clone Database
Restore creates Oracle instance to
another database server. User will be
required to supply
ORACLE_HOME location
ORACLE Username and Instance
Password
11
Module Summary
You are now able to:
E l i h
Explain
how DPX interfaces
i t f
with
ith Oracle
O
l
List the requirements for backing up Oracle
Databases
Discuss the various methodologies used to restore
Oracle
O
l and
d SharePoint
Sh
P i t servers
12
Page 11 - 6
DPX Bare
B
M t l Recovery
Metal
R
(BMR)
Module Objectives
Upon completion of this module, you will be able to:
Explain the process of recovering a server using DPX
Bare Metal Recovery (BMR)
Explain the role played by different components of an
DPX Enterprise in recovering servers
Describe the various options available during the
BMR process
Page 12 - 1
What is BMR?
DPX Bare Metal Recovery (BMR) is a disk-based disaster
recovery feature that enables administrators to quickly and
easily restore the entire system for an individual computer,
including:
The operating system,
Point-in-time backed up data
MS Exchange, SQL Server and Oracle applications if
applicable.
During the BMR Process, DPX Master Server
plays no part.
S
It doesnt even need to be running!
Only the NetApp Secondary Storage that holds the backup
of the server to be recovered (and the BMR ISO) is used
3
Primary
9 am
Block-level backups
backups of Server Image
10 am
11am
11:30
11:35
11:42
11:50
Replace Hard
Drive &
Boot from DPX
Bare Metal
Recovery CD
Select
desired
Recovery
Point
Recover
Server Image
Reboot
server and
restore
complete!
11:15 am
Server HD Failure
Occurs
11 am
Page 12 - 2
Page 12 - 3
Lesson 1
Page 12 - 4
10
Page 12 - 5
Lesson 2
11
12
Page 12 - 6
13
Lesson 3
14
Page 12 - 7
15
Available
Snapshot(s)
on the
Secondary
16
Page 12 - 8
17
18
Page 12 - 9
19
Troubleshooting BMR
You can capture and transmit the DPX Bare Metal
Recovery diagnostic logs by doing the following:
Invoke GetSystemsInfo dialog by
clicking the Send email
notification when finished
checkbox before restore, or by
clicking the email logs tab at the
top of the user interface. The
Sender/Recipient Information
dialog appears.
Bare node needs to be able to
connect to SMTP server
specified
Click Send. DPX Bare Metal
Recovery accumulates diagnostic
logs and sends them to e-mail
recipient
Module 12 - DPX Bare Metal Recovery
20
Page 12 - 10
Lab Exercise
21
Module Summary
You are now able to:
Explain the process of recovering a server using DPX
Bare Metal Recovery (BMR)
Explain the role played by different components of an
DPX Enterprise in recovering servers
Describe the various options available during the
BMR process
22
Page 12 - 11
DPX Virtualization
Vi t li ti
Module Objectives
Upon completion of this module, you will be able to:
Explain the advanced recovery options provided by
DPX using virtualization techniques
Configure and use the following DPX Advanced
Recovery alternatives to file restore in order to
recover data, applications, volumes and servers in DR
scenarios:
Instant Virtualization (IV)
Full Virtualization (FullV or FV)
Rapid Return to Production (RRP)
Module 13 - DPX Virtualization
Page 13 - 1
Lesson 1
DPX Virtualization
Overview
Virtualization Overview
Recover an entire server as a virtual machine
Source machine can be a physical or virtual machine
Recovered machine is always a virtual machine
Different from DPX Bare Metal Recovery
Benefits:
High Availability of Clients
Exchange server backed up using DPX
Exchange server fails
Restore the entire server, within minutes, using virtualization
Clone servers for testing purposes
Oracle
DBA wants to run queries
O
Create a VM from the latest backup snapshot using IV
Perform the queries and delete the IV virtual machine
Zero footprint, zero impact to production environment
Physical to Virtual Migration
Zero impact to production (source) machines
Module 13 - DPX Virtualization
Page 13 - 2
Virtualization Types
Instant Virtualization
Servers can be accessed in minutes from backup
snapshots
Uses IA mapping functionality to create RDM Luns
Full Virtualization
Restores the backup snapshots as a virtual machine
Creates the .vmdk files (not RDM Luns)
Rapid Return to Production (RRP)
Used to convert the IV machine (RDMs) to a
production VM (VMDKs)
Uses vMotion to create the permanent .vmdk files
5
Instant Virtualization
Windows Server
(Source for Backup)
NetApp Secondary
Storage
Block-level backups
ESX Host
9 am
Create VM in ESX
10 am
VM Boots
Server is Live
and Running
as a VM!
Automatic IA mapping
of the drives on the
source machine
11:15 am
Failure on
Server
11:20
Select
desired
Recovery
Point
11 am
11:25
Perform Instant
Virtualization.
Server is back
on-line, running
as a VM!
6
Page 13 - 3
Virtualization Process
Two Step Process
Backup the source node using DPX Advanced
R
Recovery
jjob
b iincluding
l di th
the BMR! object
bj t
This backup can be used to create a VM on the Virtual
Controller (vCenter Server or ESX Host) using either of
the two previously mentioned Virtualization methods:
Instant Virtualization (IV)
No Data is restored; uses IA and Raw Device
Mapping (RDM)
*Depending
on DPX version,
BMR object is also referred
to as ExpressDR
Page 13 - 4
Lesson 2
Defining a Virtualization
Job
*Depending
on DPX version,
BMR object is also referred
to as ExpressDR
10
Page 13 - 5
Virtual machine
(
(system)
) name
12
Page 13 - 6
13
A VMware vCenter or
licensed ESX/ESXi server
Account with
administrative rights
14
Page 13 - 7
Resources
15
Network Information
16
Page 13 - 8
Virtualization Options
Copy the virtualization ISOs to
the target ESX server
L
Location
ti off the
th ISOs:
ISO
$SSPRODIR\misc
17
Job Summary
18
Page 13 - 9
Virtualcenter client
shows VM creation
in real time
Module 13 - DPX Virtualization
19
20
Page 13 - 10
Instant Virtualization
Creates an iSCSI map of data stored on the source instance
to the virtual node
No data is restored / transferred to the virtual machine and
therefore the VM does not require any .vmdk space on the
virtual controllers datastore (a small amount of space will
be used to record changes while mapped).
Changes made to the mapped drive do not affect the
backed up data
data, which is part of a read only snapshot
stored on the NetApp Secondary Storage.
Requires that an iSCSI initiator is enabled on your virtual
controller (ESX Server)
21
Instant Virtualization
1.
2.
3.
4.
5.
6.
1.
22
Page 13 - 11
Lab Exercise
23
Lesson 3
24
Page 13 - 12
VM of
Application
1. Create VM
10:00
Data
10 00 D
t Image
I
VMware ESX
4. Storage
4
VMotion
migrates disks
3. Background
migration of data
to datastore
VMDK
VMX
Datastore
25
26
Page 13 - 13
27
28
Page 13 - 14
Cloning
Cl i
Used if the VM is in the Powered Off state when
the RRP job starts
29
30
Page 13 - 15
RRP Wizard
Launch the RRP
Wizard from the DPX
Management
Console, Restore >
Advanced Recovery
screen
Follow the prompts
and enter the
required information
31
RRP Wizard
Account with
administrative rights
32
Page 13 - 16
RRP Wizard
33
RRP Wizard
At the next screen,
choose the Datastore
where production VM
will reside
reside.
34
Page 13 - 17
RRP Wizard
At the Summary screen, check all information is correct and if all is good, then
Finish, when you will be asked if you want to run the job now
35
36
Page 13 - 18
RRP - On Completion
VM configuration after DPX IV
After the RRP Job
completes:
The Mapped RAW
LUNs for the VM
have been
converted to Virtual
Disks (.vmdk)
37
Lab Exercise
38
Page 13 - 19
Lesson 4
39
40
Page 13 - 20
41
42
Page 13 - 21
43
44
Page 13 - 22
45
46
Page 13 - 23
Module Summary
You are now able to:
Explain the advanced recovery options provided by
DPX using virtualization techniques
Configure and use the following DPX Advanced
Recovery alternatives to file restore in order to recover
data, applications, volumes and servers in DR
scenarios:
Instant Virtualization (IV)
Full Virtualization (FullV)
Rapid Return to Production
47
Page 13 - 24
DPX Agentless
A
tl
VM
VMware
Protection
Module Objectives
Upon completion of this module, you will be able to:
Explain the DPX Agentless VMware backup and
recovery feature
Configure and use the following DPX Agentless
recovery alternatives to protect VMware virtualized
environments:
Instant
I t t VM Restore
R t
Full VM Restore
Instant VMDK Restore
Full VMDK Restore
Module 14 DPX Agentless VMware Protection
Page 14 - 1
Lesson 1
Agentless VMware
Protection Overview
Page 14 - 2
NetApp Secondary
Load
Balancing
Physical Proxy
SAN
LAN
SAN
Module 14 DPX Agentless VMware Protection
Page 14 - 3
Proxy-Based vs Guest-Based
Agentless VMware Backup
Advanced Recovery
Lesson 2
Performing Agentless
Backups
Page 14 - 4
Installation Requirements
vSphere 4.0 or later on hosts
An DPX release supporting Agentless VMware Backup
(DPX 4.0
4 0 or llater)
t )
At least one proxy server
64-bit Windows or Linux machine
Physical or virtual
Physical Proxy required for SAN-based
infrastructure
Recommended to have multiple proxy servers
iSCSI initiator enabled
On the ESX server hosting the restored VM
On the target node for VMDK Instant Access
Module 14 DPX Agentless VMware Protection
Installation Requirements
Additional Requirements
vCenter administrative privileges
VMware Tools installed on each VM that needs to be
protected
Virtual hardware version 7+ on each VM that needs to
be protected
10
Page 14 - 5
11
12
Page 14 - 6
13
14
Page 14 - 7
Step 2
Set Proxy per
Job
Step 1
Node
Configuration page
Step 3
Choose correct
server
Module 14 DPX Agentless VMware Protection
15
Lab Task
16
Page 14 - 8
Lesson 3
Agentless VMware
Restores
17
18
Page 14 - 9
Instant VM Restore
Creates a new VM from the snapshot
Restores to original or alternate ESX host
Uses iSCSI LUN mapping
No physical data transfer
Restored disks attached as RDM LUNs to the new VM
VMs
Restored VM
NetApp Snapshots
DPX Agentless
Backup
ESX host
19
Full VM Restore
Creates a new VM with VMDKs from the snapshot
Restores to original or alternate ESX host
Physical data is transferred
Uses Instant VM Restore, internally, for immediate
availability of the VM
Data copy (VMDK creation) in the background
Restored VM with VMDKs
VMs
VMDK
NetApp Snapshots
DPX Agentless
Backup
VMDK
ESX host
20
Page 14 - 10
Restored VMDK
VMDK
NetApp Snapshots
DPX Agentless
Backup
21
Restored VMDK
VMDK
NetApp Snapshots
DPX Agentless
Backup
22
Page 14 - 11
Restore
Source
(Backup
Type)
Restore
Target
DPX
Required
on
Restore
Target
Requires
iSCSI Initiator
enabled
On
Host
On
VM
Storage
Relocation
Used
Instant VM
Restore
Agentless
VMware
ESX
Server
No
Yes
No
No
Full VM
Restore
Agentless
VMware
ESX
Server
No
Yes
No
Yes*
Instant VMDK
Restore
Agentless
VMware
VM
No
Yes
No
No
Full VMDK
Restore
Agentless
VMware
VM
No
Yes
No
Yes*
23
Lesson 4
Performing Agentless
VMware Restores
24
Page 14 - 12
25
26
Page 14 - 13
27
28
Page 14 - 14
29
30
Page 14 - 15
31
32
Page 14 - 16
Lab Task
33
Module Summary
You are now able to:
Explain DPX Proxy-Based (agentless) backup and
recovery feature
Configure and use the following DPX Agentless
recovery alternatives to protect VMware virtualized
environments:
Instant VM Restore
Full
Restore
F ll VM R
t
Instant VMDK Restore
Full VMDK Restore
34
Page 14 - 17
DPX Di
Disaster
t R
Recovery
Overview
Module Objectives
Upon completion of this module you will be able to:
Discuss DPX Integrated Disaster Recovery Features
Discuss the importance of DPX Alternate Secondary
destinations
Perform DPX recoveries from a NetApp SnapMirror
destination
Explain DPX +Tape features to archive backup data to
tape
Module 15 - DPX Disaster Recovery Overview
Page 15 - 1
NetApp SnapMirror
WAN
LAN
DPX Clients
Exchange, SharePoint, SQL,
VMware
VM
NetApp FAS
Backup
Targett
D2D B
k T
SAN
DPX
Master
optional
NetApp FAS
DR Target
DR Site
Any Primary Disk
EMC, HP, IBM - or DAS
optional
Tape Archive
Instant / Full
Virtualization
Lesson 1
Page 15 - 2
Page 15 - 3
Configuring SnapMirror
Recommended to use SnapMirror Relationship Create
Wizard in the NetApp System Manager console
Invoking SnapMirror
Submitted through console or NetApp management
console (outside of Syncsort)
Can be submitted via post-job script upon job completion
or after a dummy job using rsh
If using asynchronous A-SIS, recommended to snapmirror
Scheduled via snapmirror.conf
U
sy
c o ous s
ap
o
<UKN>
synchronous
snapmirror
Commands:
snapmirror initiailize
snapmirror update
Module 15 - DPX Disaster Recovery Overview
Page 15 - 4
Snapmirror operations
snapmirror initialize
request start of initial transfer
Usage:
snapmirror initialize -S [<srcfiler>:]<srcpath>]
[<dstfiler>:]<dstpath>
snapmirror update
forces snapmirror update of snapmirror destination
Usage:
snapmirror update -S
S [<srcfiler>:]<srcpath>]
[<dstfiler>:]<dstpath>
Note: srcpath and dstpath are <volname> or
</vol/volname/qtreename>
10
Page 15 - 5
11
Lab Task
12
Page 15 - 6
Lesson 2
13
14
Page 15 - 7
15
16
Page 15 - 8
17
* We will be discussing DPX NDMP Restores from tape in more detail in a later module
18
Page 15 - 9
Module Summary
You are now able to:
Disc
Discuss
ss alternate secondary
secondar destinations and their
importance
Explain the process to restore DPX backup data from a
NetApp SnapMirror destination
Explain DPXs integration with NetApp SnapMirror
technology to provide a disaster recovery solution
Explain DPX +Tape feature to archive backup data to
tape
Module 15 - DPX Disaster Recovery Overview
19
Page 15 - 10
DPX T
Tape A
Archiving
hi i
Module Objectives
Upon completion of this module, you will be able to:
Configure
g
Tape
p Devices and Libraries for use with
DPX
Configure Backup-to-Disk Devices
Configure Media Management
Discuss the use of NDMP backups for D2D2T
protection
Discuss Recovery Scenarios
Page 16 - 1
Lesson 1
Device Configuration
Page 16 - 2
Device Clusters
A Device is any tape or disk drive used as the
destination for a backup
A Device Cluster is a set of devices of same media
type
Even a single Device must be defined within a Device
Cluster
A Tape Library or VTL is considered a logical device
cluster
Device Clusters
Device
Clusters
Jukebox
SAN
Jukebox
Device
Cluster
Type
Page 16 - 3
Device Types
Stand-alone tape drive
Tape library (jukebox) or VTL requires extra
installation of changer and slot range
SAN-attached devices also require special
configuration to allow resource sharing
Backup-to-Disk devices require special configuration
Page 16 - 4
10
Page 16 - 5
11
Implemented via
Wizard (always) or
through Management
Console (selectable)
Module 16 - DPX Tape Archiving
12
Page 16 - 6
13
Medium Changer
Command: sysconfig - m
displays tape library information
e g Device ID
e.g.
Command: storage show mc
provides the following information:
14
Page 16 - 7
15
Tape Drives
The sysconfig -t command displays device and configuration
information for each tape drive on the system.
16
Page 16 - 8
17
18
Page 16 - 9
Device Troubleshooting
There are some Syncsort and 3rd Party utilities that can be used to
aid / troubleshoot Device configuration:
Syncsort
Detect Command line utility that scans the SCSI bus (including
Fibre Channel) and is used as an aid to configuration and
troubleshooting of libraries and tape devices
JITest - command line utility for testing robotic arm
3rd
functionality
Party
Tar - Tool on most UNIX and LINUX which can be used to write data to
tape. It is useful for testing tape devices. Tar is not capable of reading or
restoring data written to tape by DPX
NTBackup - included with most versions of Windows and can be used to
test tape drive functionality.
19
Lab Exercise
20
Page 16 - 10
Lesson 2
Media Management
21
Tape Flexibility
DPX writes in SIDF (System Independent Data Format)
tape format
Allows any-to-any backup and restore*
Data from any node can be written to any device
server during backup
Data written by any device server can be restored
using any other device server
The data must be restored to the original operating
and file system type
* This does not include NAS nodes
Module 16 - DPX Tape Archiving
22
Page 16 - 11
Media Management
For a Media to be recognized by DPX it must first be
labeled with a given VOLSER (Volume Serial Number)
Media Pools must have available media for jobs to run
Jobs automatically select an appropriate Media from
the specified Media Pool
Media need to be added to the Media Pools
Labeling will write information in the beginning of the
Tape, including the VOLSER of this media
Module 16 - DPX Tape Archiving
23
Media
Volumes
VOLSER
(Volume
Serial
Number)
Media Status
24
Page 16 - 12
25
26
Page 16 - 13
27
28
Page 16 - 14
29
Media Pools
Media must be added to a Media
Pool in one of the aforementioned
y or backups will fail ((unable to
ways
find a free tape)
Labeling brand-new tapes require
checking Ignore Read Error in the
Option pull-down menu in the
Device Control window
Overwriting existing tapes (tapes that
already have labels) require checking
Ignore Volser option in the Option
pull-down menu in the Device Control
window
Module 16 - DPX Tape Archiving
30
Page 16 - 15
Life of a Tape
Before tapes are labelled, they
have a NEW status
When tapes are first labeled
labeled, but
before they are used, they have
EMPTY status.
After being used by a backup,
they have APPENDABLE
status.
When end-of-tape (EOT) is
reached tapes have status
reached,
FULL
Once all the jobs on a tape have
expired, tapes go back to
EMPTY
Module 16 - DPX Tape Archiving
31
EOT
Label Tape
at beginning
p with 80 Bytes
y
g
g ((VOLSER))
EOT
New Tape:
VOLSER
Empty
Appendable
VOLSER
Partition 1
Retention:
7 Days
Partition 2
Retention:
30 Days
Partition 3
Retention:
14 Days
FULL
Retention:
EOT
VOLSER
Partition 1
32
Page 16 - 16
FUL
LL
Retention:
FULL
30 Days
EO
OT
Retention:
Partition 3
EOT
VOLSER
Partition 2
After 14 days
VOLSER
Partition 2
Retention:
30 Days
EMPTY
EOT
VOLSER
33
Cleaning Tapes
Jukebox drive cleaning-on-demand
A cleaning tape will be mounted automatically when
the drive requests it
The cleaning slot must be presented to the software,
and not reserved by the jukebox
34
Page 16 - 17
Lab Exercise
35
Lesson 3
NDMP Backups
36
Page 16 - 18
What is NDMP?
Open standard protocol (TCP/IP-based) for networkbased backup
Allows for backup/restore of NAS devices that do not
allow for a backup agent to be installed. E.g. NetApp
filers
Runs in place of proprietary backup agent
NDMP Client/Deamon:
reads
data
Cli t/D
d and
d sends
d d
t
NDMP Server: writes data to secondary storage device
37
38
Page 16 - 19
Nibbler
Nibbler (APM) allows communication between DPX
and NDMP-enabled NAS devices
NAS Device must be running NDMP version 3 or
higher*
39
NDMP Backups
Four Supported NDMP Backup Configurations
Local Backup
Data is backed up to a Tape Library/Tape Drive(s)
attached locally (SCSI of FC) to the filer.
Three-way Backup
Data is backed up to a Tape Library/Tape Drive(s)
attached to another filer.
Filer-to-Server Backup
ata iss backed
bac ed up to a Tape
ape Library/Tape
b a y/ ape Drive(s)
e(s)
Data
attached to a server.
Server-to-Filer Backup
Data residing on a open systems server is backed up to
a Tape Library/Tape Drive(s) attached to a filer.
40
Page 16 - 20
NDMP Backups
LAN
Tape Library
NDMP
NAS
Unix,
Linux or
Windows
NDMP
NAS
SCSI
NDMP
NAS
SCSI
Local Backup
Remote (3-way) Backup
Filer to Server Backup
Tape Library
Tape Library
41
NDMP Backups
42
Page 16 - 21
43
44
Page 16 - 22
45
46
Page 16 - 23
NAS Appliance
ID C
SORT!
Tape
Library
Dump File History
Sorted and Manipulated
47
48
Page 16 - 24
49
50
Page 16 - 25
51
52
Page 16 - 26
Lab Exercise
53
Lesson 4
54
Page 16 - 27
55
56
Page 16 - 28
57
58
Page 16 - 29
59
60
Page 16 - 30
61
62
Page 16 - 31
63
64
Page 16 - 32
65
66
Page 16 - 33
DPX +T
+Tape
Recovery Scenarios
IA Map
Lesson 5
68
Page 16 - 34
69
70
Page 16 - 35
71
72
Page 16 - 36
73
74
Page 16 - 37
75
76
Page 16 - 38
77
78
Page 16 - 39
79
80
Page 16 - 40
81
The igroup show command shows the existence of the group rkkIAMAP containing our node after
successfully completing the igroup create command.
command
e.g.: igroup show rkkIAMAP
82
Page 16 - 41
83
84
Page 16 - 42
85
86
Page 16 - 43
87
These two commands will delete the LUN on the filer. After the LUN is deleted, also delete the snapshot
created used to create the LUN, by issuing the following command on the filer:
Syntax: snap delete <volume_name> <snapshot_name>
e.g.: snap delete sv_restore SSSV_rkktmp.0
The volume where the QTree was restored can be destroyed as well if the restore operation has been
completed.
Module 16 - DPX Tape Archiving
88
Page 16 - 44
Module Summary
You are now able to:
Config
Configure
re Tape De
Devices
ices and Libraries for use
se with
ith
DPX
Configure Backup-to-Disk Devices
Configure Media Management
Discuss the use of NDMP backups for D2D2T
protection
Discuss Recovery Scenarios
Module 16 - DPX Tape Archiving
89
Page 16 - 45
DPX C
Catalog
t l
M
Maintenance
i t
Module Objectives
Upon completion of this module, you will be able to:
E
Explain
l i th
the iimportance
t
off th
the DPX C
Catalog
t l
Administer / maintain DPX Catalog
Discuss the DPX Catalog maintenance procedures
Catalog Report
Catalog Condense
Catalog Backup, including configuring a
S
C O
de ce and
a d media
ed a
DISKDIRECTORY
device
Catalog Restore and Master Server recovery options
Remove all traces of an existing job from the catalog and
free up disk space on NetApp Secondary volume
Page 17 - 1
Page 17 - 2
Page 17 - 3
Right Click
Page 17 - 4
Condensing Catalog
When a job is expired (either manually or when its
retention period is reached), it is only marked for
deletion in the catalog.
Likewise when an object is manually deleted.
The actual purge happens when condensed.
Maintaining Catalog
Catalog protection
Catalog recovery
Catalog Condense
Condense is the primary catalog maintenance operation
and it should be performed on a regular basis. Once a day
is recommended. The catalog condense essentially
performs these main functions:
Deletes the recovery points that are no longer required
Reduces the size of the catalog
When run, backups that have passed their retention period
are removed from the catalog and their snapshots from
secondary storage (for File Level backups, any media used
by the job will have their status updated
updated, allowing reuse and
recycling).
Deletes db files associated with expired jobs/tasks and any
objects manually removed from the Enterprise
10
Page 17 - 5
Create / Edit
Schedule
Run or Run
and Monitor
11
Recommended to run
Catalog Condense on
a daily basis
Recommended to run
before scheduled or
manual Catalog
backup
12
Page 17 - 6
13
S t up a DiskDirectory
Set
Di kDi t
D i and
Device
d media
di on th
the M
Master
t S
Server
Schedule a daily Catalog Condense
Schedule a daily Catalog Backup to a Disk Directory
Schedule a daily Master Server Backup to the SnapVault
Secondary Filer
14
Page 17 - 7
15
Create Device
1. Click on the newly
create Device Cluster
and Click on Add
Device
2. Supply the Device
Name
3. For Logical Node
Name, add the name of
the server on which
you created directory
in step 1
4. For Device ID add the
yy
you created
directory
earlier
5. Click on Add to create
the Device
16
Page 17 - 8
2.
3.
To Create Media
1.
2.
3.
4.
5.
6.
17
Media Volumes
created and are now
ready to use
18
Page 17 - 9
19
20
Page 17 - 10
21
22
Page 17 - 11
23
Recovery Scenarios
If you have lost the volume that contained the original
DPX Master server installation, and the catalog: (D:
volume is lost.)
lost )
Repair / replace the servers disks and then use DPX
IA to recover the D: drive from the Advanced Recovery
backup.
If you have lost the entire Master server
Repair / replace the servers
server s disks and then use BMR
to recover all drives from the Advanced Recovery
backup.
24
Page 17 - 12
Recovery Scenarios
Catalog Corruption - If some or all of the files within the DPX Master
server install location are corrupt or missing.
\BEX\cat,
\BEX\cat
\BEX\db,
\BEX\sched
Option 1.
Restore Catalog from the backup of the last known good recovery point
Option 2.
If you have taken a manual copy of the catalog folders and have this
location included as part of an AR backup
backup, use DPX Instant Availability
to map a drive of the last known good recovery point of this copy.
Stop the CMAgent Service on the Master Server and copy the cat, db
and sched folders to the live catalog location
Restart the CMAgent Service
25
Recovery Scenarios
You wish to remove all traces of a job from the
catalog, including the base snapshot from the
secondary destination volume in order to free up
space.
Go to Catalog->Job Functions
Expire all instances of the job
Delete the job definition
Run
Catalog
Condense
R aC
t l C
d
26
Page 17 - 13
Lab Exercise
27
Module Summary
You are now able to:
Explain the importance of the DPX Catalog
Administer / maintain DPX Catalog
Discuss the DPX Catalog maintenance procedures
Catalog Report
Catalog Condense
Catalog Backup, including configuring a
DISKDIRECTORY device and media
Catalog Restore and Master Server recovery
options
Remove all traces of an existing job from the
catalog and free up disk space on NetApp
Secondary volume
Module 17 - DPX Catalog Maintenance
28
Page 17 - 14
DPX Ch
Change J
Journall
Module Objectives
Upon completion of this module, you will be able to:
Explain the function of the client change journal
Describe the various components of the change journal
Perform simple tasks related to change journal
troubleshooting scenarios
Page 18 - 1
Page 18 - 2
Filter Driver
The filter driver keeps track of blocks that change on the volume being protected
Tracking info is stored in bitmap format in file named with format CJ_x where x
will be the incarnation no. in increasing order
These CJ bitmap files are kept on the corresponding volume being protected under the
repository folder named Backup Express Journal Depository
Each bitmap file stores bitmap
representing changed blocks info over
certain period of time
This time info is stored in CJs
metadata file named cjrepo in its
repository folder
This cjrepo file or CJ_x bitmap files
are internal to CJ and not supposed to
be accessed or changed by anybody
else
Filter Driver
First instance of a backup job copies all the allocated
blocks from the volume
This
Thi is
i referred
f
d as B
Base R
Recovery P
Point
i t
After the first instance job, tracked block info is used
to identify and transfer only changed blocks during
backup job.
If CJ had
any bl
blocks
h d nott missed
i
d tracking
t
ki
k since
i
llastt
backup job instance then only changed blocks are
transferred.
This is referred as Incremental Recovery Point
Module 18 - DPX Change Journal
Page 18 - 3
Drivers
BexWinCj.sys
BexWinCjFlt.sys
Located in <Windows path>\system32\drivers
directory
CJ Registry Entries
CJ registry entries - If properly configured, you will
find all BexWinCj settings in the following location:
HKLM / System
S t
/ CurrentControlSet
C
tC t lS t / Services
S i
/
BexWinCj
HKLM / System / CurrentControlSet / Services /
BexWinCjFlt
NOTE: The registry variables have details about the
Journal State
State, location of the driver files and other CJ
book-keeping.
Page 18 - 4
Debug Trace
CJ driver takes 2 levels of debug
Basic (critical / error messages)
Advanced (Informational / Alert)
Enabled by appended d 3 or d 5 to SSSNAP module
10
Page 18 - 5
Forcing a Base
Use syncui command line interface to disable/enable
cj on a given volume to force a base
syncui
c s <ClientServerName> sssnap
snap disablecj D:
snap enablecj D:
quit
11
Module Objectives
You are now able to:
Explain the function of the client change journal
Describe the various components of the change journal
Perform simple tasks related to change journal
troubleshooting scenarios
12
Page 18 - 6
DPX D
Design
i
Considerations and
Advanced Configuration
Module Objectives
Upon completion of this module, you will be able to:
Explain how to architect a complete block level solution
using a combination of NetApp and Syncsort technologies
Explain some of the design concepts that need to be taken
into consideration when planning an DPX implementation
Discuss remote seeding
Explain the Design Considerations of an DPX Enterprise
Discuss issues around Network Security and Firewalls with
DPX
Manage users in an DPX Enterprise
Page 19 - 1
Lesson 1
Page 19 - 2
SnapVault / OSSV
There are some restrictions imposed by the NetApp
Secondary device that impacts the way that one
should create the DPX backup jobs
Each volume is limited to 250 snapshots*
Each filer is limited up to 500 volumes*
Page 19 - 3
SnapVault Summary
Each DPX Backup Job should have as destination a
single volume on the filer
The destination volume can also be used by other
backup jobs to take advantage of de-duplication
Jobs should be defined and scheduled not to overlap
to the extent that the number of concurrent SnapVault
transfers exceed the allowed number
Page 19 - 4
10
Page 19 - 5
Remote Seeding
Used to backup nodes at remote sites and consists of the
following major steps:
Perform an Express
p
Image
g Backup
p of Source volume on
remote node
Transport the Media
Restore the Image to a temporary node
Define and save a OSSV or Advanced Server Job
Prepare the change journal
Run the first base
Run
R iincrementals
t l ffrom the
th remote
t server
Usually Remote seeding requires Syncsort Professional
Services implementation
11
Remote Seeding
Remote Site
Central Location
DPX Client
Seeding Node
SV Base Backup
Image Backup
Image Restore
Device Server
12
Page 19 - 6
13
14
Page 19 - 7
15
16
Page 19 - 8
Note:
A DPX Enterprise will contain one Large Site, and may
contain several Small and Medium Sites. The Master
Server is local to the Large Site.
17
Small A
MS
UNIX
FAS2040
WIN
/vol/SA
/vol/MA
UNIX
UNIX
FAS3160
UNIX
WIN
SM Vols
/vol/Ljb0
/vol/Ljb1
...
D/R Site
FAS2040
UNIX
Filer
UNIX
UNIX
WIN
WIN
Filer
Filer
Secondary Volume
Name Uniqueness
Important
DPX Supports Remote
Seeding of Secondary
SM Vols
TAPE
18
Page 19 - 9
Lesson 2
DPX Advanced
Configuration
19
20
Page 19 - 10
21
22
Page 19 - 11
23
24
Page 19 - 12
25
26
Page 19 - 13
27
28
Page 19 - 14
29
SNMP Configuration
Also set in Configure > Enterprise
Configure hosts to receive traps
MIB files in SSPRODIR\misc ((bex_mib.hp
_
p and bex_mib.nov)
_
)
30
Page 19 - 15
E-mail Notification
Set in Configure > Default > Backup > Report
Enter email addresses for To:, CC:, and BCC fields
Customize the subject line with standard variables
%RC (J
(Job
bR
Return
t
Code)
C d )
%JOBNAME
%JOBID
%JOBTYPE
31
Authentication Modes
Set in the Configure > Enterprise screen
Two Authentication Modes:
Native
N ti (default
(d f lt mode)
d )
LDAP
32
Page 19 - 16
LDAP Authentication
Authenticates users against an LDAP Server
Provides better security and centralized user
managementt
Supports Microsoft Active Directory (AD) and
OpenLDAP (Linux)
Windows 2003, Windows 2008, Windows 2008 R2
33
LDAP Authentication
Default Port
1-20 unicode
characters
34
Page 19 - 17
35
36
Page 19 - 18
37
User Administration
DPX has the ability to create users other than the
sysadmin user
Th
These
users (or
( sub-administrators)
b d i i t t
) can be
b assigned
i
d
the authority to manage specific node groups, device
clusters, media pools and jobs
Creating new users varies depending on the
Authentication Mode: Native or LDAP
LDAP Mode:
Native Mode:
Username and
Password are required
Only Username is
required
38
Page 19 - 19
User Administration
To create a new user,
select Configure,
Administrators and Add
Administrator
[Native Mode]Set a
username and password
[LDAP Mode] Specify
the username configured
in the LDAP/AD
Assign resources to the
admin (node groups,
groups
devices, jobs, jukeboxes,
media)
Assign privilege classes
to the admin
Module 19 - DPX Advanced Design and Configuration Topics
39
Firewall Support
Out-of-the-box, DPX randomly allocates as
many TCP ports as needed.
40
Page 19 - 20
41
42
Page 19 - 21
43
44
Page 19 - 22
Advanced Configuration
DPX Software is made up of several different
modules/processes
It uses a set of configuration parameters for each
module to enable detailed configuration / tuning
Two ways to retrieve/set parameters
Configuration text entries/files or Windows Registry
DPX Management Console
45
Configuration Parameters
In Windows, product-specific Information held in Registry Key:
HKLM/Software/Syncsort/BackupExpress/HOSTNAME/0
SSPRODIR = Install
Directory
SSICMAPI =
Communication
Parameters for Cmagent
46
Page 19 - 23
47
48
Page 19 - 24
Lab Task
49
Module Objectives
You are now able to:
E
Explain
plain ho
how to architect a complete block le
level
el sol
solution
tion
using a combination of NetApp and Syncsort
technologies
Explain some of the design concepts that need to be
taken into consideration when planning an DPX
implementation
Configure remote seeding
Understand
U d t dD
Design
i C
Considerations
id ti
off an DPX
Enterprise
Manage users in an DPX Enterprise
Discuss issues around Network Security and Firewalls
with DPX
Module 19 - DPX Advanced Design and Configuration Topics
50
Page 19 - 25
NSB R
Reporter
t
Module Objectives
Upon completion of this module, you will be able to:
Describe the value of Syncsort NSB Reporter
Explain the main features of NSB Reporter
Install and configure the NSB Reporter Agent on a
Windows Master Server
Read and use the data collected from NSB Reporter
Set up and schedule automatic reporting per e-mail
Find the general logs that could give you indications if
an issue comes up
Page A - 1
Page A - 2
10 Additional
3rd Party Licensed
Interfaces
Page A - 3
Initial set up
When running with reporter backup
licenses, you only need to install
Reporter Agent on your master server default setting in Reporter will add node
into Reporter Environment
If not already visible, add Master server
as a normal specific OS node first
Select from 'Choose Type' - OS Windows
if y
your master server is windows
Add - fill out and add node
Select from 'Choose Type' - 'Backup
Syncsort BEX' - fill out details and click
save
Appendix 1 - NSB Reporter
Page A - 4
10
Page A - 5
Configuration Master
Adding master
server as a backup
d i
device
Provide installation
directory, username
and hostname.
11
12
Page A - 6
13
14
Page A - 7
15
16
Page A - 8
17
Agents upgrade
Upgrading Agents from the Management Console;
administration, upgrade agents, select all agents,
click save
save,
No need to upgrade clients seperately, manually
Status of upgrade shown in: mode push report in
upper right corner of same page, F5 to refresh
18
Page A - 9
19
Backup Console
Status Links
Historical View of
Master Server
20
Page A - 10
NSB R
Reporter
t 4
4.8
8
22
Page A - 11
23
24
Page A - 12
25
26
Page A - 13
27
28
Page A - 14
Module Summary
You are now able to:
Describe the value of NSB Reporter
Explain the main features of the product.
Install and configure the NSB Reporter Agent on a
Windows Master Server
Read and use the data collected from NSB Reporter
Find the general logs that could give you indications if
an issue comes up
29
Page A - 15
NSB NetApp
N tA
Ad
Advanced
d
Integration
Module Objectives
Upon completion of this module, you will be able to:
Understand NetApp OSSV agents in more detail
Install NetApp OSSV agents for clients unsupported by
NSB Advanced Client
Use NetApp OSSV backup and recovery features
Understand the differences between NetApp OSSV
Agents and NSB Advanced Client
Page B - 1
Page B - 2
Page B - 3
Partition
level
No filter
ineligible
partitions
Page B - 4
e.g.
snapvault start S linuxossv:/opt
sv_secondary:/vol/linuxossv/opt_qtree
10
Page B - 5
OSSV Restore
Restore of one object at a time
File
Folder
Partition or volume
Restoring multiple files requires selecting the parent
folder object of that file
Issues a snapvault restore operation in the
background
11
Snapshot Contents
There are differences between NetApp OSSV agent vs.
Syncsort ARSV agent:
Change Journaling
Images stored
Functionality
Advanced Recovery functionality (IA, BMR, IV, FullV) is
only available in NSB Advanced Client.
Application aware agents are only available in NSB
Advanced Client.
By storing the contents as a RAW disk image instead of
copied filesystem, NSB Advanced Client is able to
accomplish Advanced Restore tasks like IA, BMR, and
Virtualization
Appendix 2 - OSSV with NSB
12
Page B - 6
NSB
Copied
Filesystem
Raw disk
image
13
Module Summary
You are now able to:
Understand NetApp OSSV agents in more detail
Install NetApp OSSV agents for clients unsupported by
NSB Advanced Client
Use NetApp OSSV backup and recovery features
Understand the differences between NetApp OSSV
Agents and NSB Advanced Client
14
Page B - 7