DD With Networker Boost Integration
DD With Networker Boost Integration
Version 19.2
Dell believes the information in this publication is accurate as of its publication date. The information is subject to change without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS-IS.” DELL MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND
WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. USE, COPYING, AND DISTRIBUTION OF ANY DELL SOFTWARE DESCRIBED
IN THIS PUBLICATION REQUIRES AN APPLICABLE SOFTWARE LICENSE.
Dell Technologies, Dell, EMC, Dell EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property
of their respective owners. Published in the USA.
Dell EMC
Hopkinton, Massachusetts 01748-9103
1-508-435-1000 In North America 1-866-464-7381
www.DellEMC.com
Figures 7
Tables 9
Preface 11
Deduplication efficiency....................................................................................34
Retention periods.................................................................................34
Types of data backed up...................................................................... 35
Change rate......................................................................................... 35
Frequency of full backups.................................................................... 35
Host naming guidelines..................................................................................... 35
Example name formats.........................................................................36
IP addresses.........................................................................................36
Example topologies........................................................................................... 37
Client Direct deduplication environment...............................................37
Disaster recovery environment............................................................ 38
Cascaded replication environment....................................................... 39
Shared datazones environment............................................................ 41
Dedicated storage node environment...................................................42
Creating a policy.................................................................................103
Create a workflow for a new policy in NetWorker Administration....... 105
Protection groups for traditional backups...........................................106
Supported actions in traditional backup workflows.............................108
Actions sequences in traditional backup workflows............................ 109
Visual representation of workflows..................................................... 125
Cloning with Data Domain (DD Boost).............................................................125
Clone formats..................................................................................... 126
CCR requirements.............................................................................. 126
Cloning by pools..................................................................................127
DD Boost clone and replication support........................................................... 127
Clone formats..................................................................................... 128
Native Data Domain replication considerations................................... 128
Data Domain Automated Multi-streaming (AMS)............................................ 129
Configuring the Data Domain CCR environment.............................................. 129
Strategies for cloning....................................................................................... 131
Road map for configuring a new cloning data protection policy.......... 133
Road map to add a clone workflow to an existing policy..................... 144
Clone reports...................................................................................................154
Monitoring the status of Cloud Tier save sets................................................. 154
Cloning with nsrclone...................................................................................... 155
Staging data from DD Cloud Tier devices........................................................ 155
Glossary 191
1 Revision history..................................................................................................................11
2 Style conventions.............................................................................................................. 13
3 Firewall ports for DD Boost............................................................................................... 33
4 Field and Attribute names................................................................................................. 82
5 Schedule icons................................................................................................................. 110
6 Schedule icons................................................................................................................. 113
7 Schedule icons................................................................................................................. 116
8 Schedule icons................................................................................................................. 121
9 nsrcloneconfig file details................................................................................................ 132
10 Save set criteria.............................................................................................................. 135
11 Schedule icons................................................................................................................ 140
12 Save set criteria...............................................................................................................147
13 Schedule icons................................................................................................................ 150
14 Staging criteria options................................................................................................... 156
15 Data Domain report configuration parameters ................................................................ 170
16 Data Domain basic reports ...............................................................................................171
17 Data Domain statistics drill-down reports........................................................................ 173
As part of an effort to improve product lines, periodic revisions of software and hardware are
released. Therefore, all versions of the software or hardware currently in use might not support
some functions that are described in this document. The product release notes provide the most
up-to-date information on product features.
If a product does not function correctly or does not function as described in this document,
contact a technical support professional.
Note: This document was accurate at publication time. To ensure that you are using the latest
version of this document, go to the Support website https://www.dell.com/support.
Purpose
This document provides planning, practices, and configuration information for the use of DD Boost
devices within a NetWorker backup and storage management environment.
Audience
This document is intended for system administrators. Readers of this document must be familiar
with the following tasks:
l Identifying the different hardware and software components that make up the NetWorker
datazone.
l Following procedures to configure storage management operations.
l Following guidelines to locate problems and implement solutions.
Revision history
The following table presents the revision history of this document.
Related documentation
The NetWorker documentation set includes the following publications, available on the Support
website:
l NetWorker E-LAB Navigator
Provides compatibility information, including specific software and hardware configurations
that NetWorker supports. To access E-LAB Navigator, go to https://
elabnavigator.emc.com/eln/elnhome.
l NetWorker Administration Guide
Describes how to configure and maintain the NetWorker software.
l NetWorker Network Data Management Protocol (NDMP) User Guide
Describes how to use the NetWorker software to provide data protection for NDMP filers.
l NetWorker Cluster Integration Guide
Contains information related to configuring NetWorker software on cluster servers and clients.
l NetWorker Installation Guide
Provides information on how to install, uninstall, and update the NetWorker software for
clients, storage nodes, and servers on all supported operating systems.
l NetWorker Updating from a Previous Release Guide
Describes how to update the NetWorker software from a previously installed release.
l NetWorker Release Notes
Contains information on new features and changes, fixed problems, known limitations,
environment and system requirements for the latest NetWorker software release.
l NetWorker Command Reference Guide
Provides reference information for NetWorker commands and options.
l NetWorker Data Domain Boost Integration Guide
Provides planning and configuration information on the use of Data Domain devices for data
deduplication backup and storage in a NetWorker environment.
l NetWorker Performance Optimization Planning Guide
Contains basic performance tuning information for NetWorker.
l NetWorker Server Disaster Recovery and Availability Best Practices Guide
Describes how to design, plan for, and perform a step-by-step NetWorker disaster recovery.
l NetWorker Snapshot Management Integration Guide
Describes the ability to catalog and manage snapshot copies of production data that are
created by using mirror technologies on storage arrays.
l NetWorkerSnapshot Management for NAS Devices Integration Guide
Describes how to catalog and manage snapshot copies of production data that are created by
using replication technologies on NAS devices.
l NetWorker Security Configuration Guide
Provides an overview of security configuration settings available in NetWorker, secure
deployment, and physical security controls needed to ensure the secure operation of the
product.
l NetWorker VMware Integration Guide
Provides planning and configuration information on the use of VMware in a NetWorker
environment.
l NetWorker Error Message Guide
Provides information on common NetWorker error messages.
l NetWorker Licensing Guide
Provides information about licensing NetWorker products and features.
l NetWorker REST API Getting Started Guide
Describes how to configure and use the NetWorker REST API to create programmatic
interfaces to the NetWorker server.
l NetWorker REST API Reference Guide
Provides the NetWorker REST API specification used to create programmatic interfaces to the
NetWorker server.
l NetWorker 19.2 with CloudBoost 19.2 Integration Guide
Describes the integration of NetWorker with CloudBoost.
l NetWorker 19.2 with CloudBoost 19.2Security Configuration Guide
Provides an overview of security configuration settings available in NetWorker and Cloud
Boost, secure deployment, and physical security controls needed to ensure the secure
operation of the product.
l NetWorker Management Console Online Help
Describes the day-to-day administration tasks performed in the NetWorker Management
Console and the NetWorker Administration window. To view the online help, click Help in the
main menu.
Note: Contains information that is incidental, but not essential, to the topic.
Typographical conventions
The following type style conventions are used in this document:
Bold Used for interface elements that a user specifically selects or clicks,
for example, names of buttons, fields, tab names, and menu paths.
Also used for the name of a dialog box, page, pane, screen area with
title, table label, and window.
Italic Used for full titles of publications that are referenced in text.
Monospace Used for:
l System code
l System output, such as an error message or script
l Pathnames, file names, file name extensions, prompts, and
syntax
l Commands and options
You can use the following resources to find more information about this product, obtain support,
and provide feedback.
Where to find product documentation
l https://www.dell.com/support
l https://community.emc.com
Secure multi-tenancy
NetWorker supports DD Boost devices in secure multi-tenancy (SMT) storage on Data Domain
systems. SMT enables service providers to isolate tenant users on a Data Domain system. A global
storage administrator assigns or creates a tenant unit (TU) for each tenant user. Tenant users (for
example, backup administrators) must use a DD Boost username and password to create the
secure storage units (SUs) that the DD Boost devices use to store data.
DD Retention Lock
The Data Domain Retention Lock (DD Retention Lock) feature within NetWorker allows you to
efficiently manage and store different types of data backed up by NetWorker to a single Data
Domain system by securely locking the data on that system, preventing accidental deletion of save
sets.
When you enable a device with DD Retention lock and DD Retention lock period is set in data
protection policy action, the save sets backed up by the NetWorker policy cannot be overwritten,
modified, or deleted for the duration of the retention period, up to a maximum of 70 years.
Additionally, the device cannot be removed or relabeled at any time during the retention period,
though the device that contains the Retention Lock save sets can be mounted and unmounted.
The secure locking of data occurs at an individual file level, and locked files can co-exist with
unlocked files on the same Data Domain system.
With DD Retention Lock, you can set the retention time to meet the requirements driven by
governance policies. The DD Retention Lock Time specified at the save set level must fall within
the range of the minimum and maximum retention times configured on the DD Boost Mtree during
device creation. The Retention lock modes are Compliance lock mode and Governance lock mode.
Governance mode is supported from NetWorker 9.2 onwards. Compliance mode is supported from
NetWorker 18.1 onwards.
You can enable DD Retention Lock on the DD Boost Mtree during device configuration, as
described in the section Configuring DD Boost devices with the NMC Device Configuration wizard,
or by modifying the device properties after configuration, as described in the section Configuring a
DD Boost device manually. If using the NMC Device Configuration wizard for the first instance of
Data Domain device configuration, ensure that you populate the Data Domain device management
credentials (Management host, Management user name, management password and management
port).
When you enable DD Retention Lock at the device level, you must additionally set Retention Lock
period to the data protection policy action so that data is backed up with Retention Lock set. The
section Creating a traditional backup action provides more information.
After successful backup, save set queries in the Media window of NetWorker Administration
displays DD Retention Lock Period and DD Retention Lock Type columns to indicate which save
sets have Retention Lock enabled and provide the Retention Lock expiry date and time. If these
columns are not initially visible, you can customize the view to include this information. This
information is also available within the NMC Enterprise Reports window, under Policy
Statistics > Save Set Details. Similarly, if these columns are not initially visible, you can customize
the view to include this information.
Requirements
Review the following requirements for enabling DD Retention Lock:
l The NetWorker Server and storage node version must be NetWorker 19.2.
l The minimum DDOS version required when using the DD Retention Lock feature is DDOS 6.0.
The minimum DD Boost version is 3.4.
l Workflows that contain Data Domain Retention Lock enabled save sets require a separate
destination pool. The pool cannot contain a mixture of Retention Lock and non-Retention Lock
enabled Data Domain devices.
l The Data Domain devices storing primary and cloned backups with DD Retention Lock enabled
cannot be labelled or deleted. Disk space utilization issues will result on the Data Domain
system.
l The Data Domain Retention Lock feature is only supported only for DD Boost instances.
l All configuration changes must be performed from NetWorker. Any configuration changes
from the Data Domain device will not be reflected in NetWorker.
CCR preserves the deduplicated data format and minimizes bandwidth usage between the
Data Domain systems.
l Clone to native format operations. This operation clones data from DD Boost storage to
conventional storage media, such as disk or tape. This operation reverts the data to the native
non-deduplicated format, to enable recovery from a conventional disk device or tape device.
NetWorker client
A NetWorker client is a supported host whose data requires protection. The NetWorker client
software includes an integrated DD Boost plug-in. The NMC server, NetWorker server, and
NetWorker storage nodes are also NetWorker clients.
NetWorker clients that use Client Direct deduplication must have direct network access to the
Data Domain system, which stores the data. By default, NetWorker enables Client Direct in the
properties of the Client resource.
Client Direct with FC connectivity to DD Boost devices requires NetWorker client 8.1 or later.
The NetWorker E-LAB Navigator provides information on supported releases.
NetWorker Server
The NetWorker Server is a collection of processes and programs that are installed on a host that
performs NetWorker services. The NetWorker Server also acts as a storage node and can control
multiple remote storage nodes.
NMC Server
The NetWorker Management Console (NMC) server or Console server is a Java-based application
and database server. The NMC Server manages all NetWorker Servers and Clients. The NMC
Server provides reporting and monitoring capabilities for all NetWorker Servers and Clients in the
environment. The NMC Server relies on the NetWorker Authentication Service for user account
authentication.
l Capacity Licensing from NetWorker 8.2.x and previous releases, which licenses the datazone
by using capacity-based enabler codes.
The NetWorker Licensing Guide provides licensing details.
SMT structure
For SMT storage, a global storage administrator isolates DD Boost users, for example backup
administrators, by assigning them to tenant units (TUs). A TU cannot span Data Domain systems.
You can assign a DD Boost user to only one TU, but you can assign multiple DD Boost users to the
same TU. Each DD Boost user can create SUs within the assigned TU only. Security is enforced at
the TU level by the DD Boost user assignment on the Data Domain system, and at the SU level by
the DD Boost credentials.
For example:
Tenant 1: bob, tu1, su1
Tenant 2: joe, tu2, su2
Tenant 3: sue, tu2, su3
l Each DD Boost device operates with a single NetWorker storage volume and you must specify
each device by its device access pathname.
l You can create multiple devices with the same device access pathname, provided that you
assign each device a different name, as an alias. You can use the different device aliases, for
example, to manage different client hosts that share the same volume.
Configuring a DD Boost device manually on page 89 provides details on device access
information.
DD Boost performance
DD Boost devices use multiple concurrent nsrmmd (media mover) processes per device and each
nsrmmd process uses multiple concurrent save sessions (streams or threads). This reduces the
performance and maintenance impacts on the Data Domain system.
Balance the session load among the available DD Boost devices so that new sessions attach to
devices with the least load. To enable best performance, you can adjust the Target Sessions, Max
Sessions, and Max nsrmmd Count attributes assigned to the Device resource on the NetWorker
server.
Configuring a DD Boost device manually on page 89 provides details on session settings.
The Data Domain documentation provides additional details on save sessions and performance.
You can assign alternative data movement policies to the client data by using additional SUs,
created by NMC or nsradmin, for moving data from one tier to another. For example, you can
store data to different archive DD Boost devices in separate SUs with different archive policies.
Also, you can move data within the same Data Domain Extended Retention system by using CCR.
To use CCR on the same Data Domain system that includes the Extended Retention software
feature, you must replicate between two different SUs. You can apply different retention policies
to manage the data efficiently.
Network requirements
DD Boost devices support data transport over both Ethernet IP networks and FC SAN
environments for both data backup and data recovery operations.
The NetWorker server requires Ethernet IP connections to control all hosts involved in the DD
Boost operations.
Ethernet IP support
DD Boost devices do not distinguish between different TCP/IP network types (LAN, WAN, or
MAN) and can successfully operate in a network where packet loss is strictly 0% and latency is
less than 20ms. Variations of IP network connections can improve data throughput, depending on
the Data Domain system model.
It is recommended to use a minimum of two separate IP network connections to the Data Domain
system. One is used for administration and the other is used for data backup.
Aggregated multiple connections can further improve data throughput for the Data Domain
system. For example, you can use multiple 1 GbE connections for dedicated storage nodes and
storage devices. Connections for 10 GbE are also available and you can use these instead of or
with 1 GbE links.
You can configure two basic IP interfaces:
l Dedicated 1 GbE data connection from the storage node directly to the Data Domain system.
This connection provides a private, high-bandwidth data connection and avoids the latency and
The NetWorker E-LAB Navigator provides the latest details of supported versions.
Alternatively, accept the default, which has the format DFC-<base hostname>. The
hostname cannot be the fully-qualified domain name.
A valid DFC server name consists of one or more of the following characters:
l lowercase letters (“a”–“z”)
l upper-case letters (“A”–“Z”)
l digits (“0”–“9”)
l underscore (“_”)
l dash (“–”)
Note: The dot or period character (“.”) is not valid within a dfc-server-name; this
precludes using the fully qualified domain name of a Data Domain system as its dfc-
server-name.
Note: Similar to IP hostnames, the dfc-server-name is not case-sensitive. Multiple
Data Domain sytems accessible by the same clients using DDBoost-over-FC should be
configured without case-sensitive dfc-server-name.
Example:
# ddboost fc group create lab_group
4. To display the available list of scsitarget endpoints, enter:
# scsitarget endpoint show list
Endpoint System Address Transport Enabled Status
Note: The disk option in the previous example is optional and supported only if the client
is AIX.
Example:
# ddboost fc group add lab_group device-set count 8 endpoint 6a
6. Verify that initiators are present. To view a list of initiators seen by the Data Domain system:
# scsitarget initiator show list
7. Add initiators to the SCSI target access group:
# ddboost fc group add group-name initiator initiator-spec
Example:
# ddboost fc group add lab_group initiator "initiator-15,initiator-16"
The number of DFC devices advertised to the initiator is controlled by configuring the device-set
of the scsitarget access group:
The maximum number of supported DFC devices per protection system is 64. You can have the
same devices in multiple groups, but each group is limited to 64 devices.
Note: AIX DDdfc drivers support 128 devices. However, if you use the disk option with the
ddboost fc add command, this limitation is removed.
Because the DFC client sees each path to the protection system as a separate device, more paths
and more DFC devices mean better performance for constrained clients such as AIX, Windows,
and Solaris.
So, how many DFC devices should be advertised to initiators on a given backup server? The
answer depends upon several factors:
1. Is the backup server queue-depth constrained?
Windows platforms are considered “queue-depth constrained,” because the Windows SCSI
Pass-Through Interface mechanism will only conduct 1 SCSI request at a time through each of
its generic SCSI devices. This impacts the performance of the DD Boost-over FC solution, if
multiple connections (for example, backup jobs) are trying to use the same generic SCSI
device. So, for Windows platforms running more than one job, it is useful to advertise multiple
DFC devices.
Contrast this with the behavior of the Linux SCSI Generic driver, which imposes no such
restriction. Linux is not considered “queue-depth constrained,” so it is sufficient to simply
advertise one DFC device to initiators on Linux systems.
2. Number of physical paths between backup server and protection system
For each advertised DFC device, the backup server operating system will create n generic
SCSI devices, one for each physical path through which the backup server OS can access the
device.
For example, if:
l Backup server has 2 initiator HBA ports (A and B)
l Protection System has 2 FC target endpoints (C and D)
l Fibre Channel Fabric zoning is configured such that both initiator HBA ports can access
both FC target endpoints
then the backup server OS will see each device through four physical paths:
A -> C
A -> D
B -> C
B -> D
and will create 4 generic SCSI devices for each advertised DFC device.
For a Windows backup server (with its queue-depth=1 limitation), this allows up to 4
simultaneous SCSI requests to the protection system, even with only one DFC device
advertised.
Sizing calculation
The following calculation may be used to determine the number of DFC devices to advertise on the
Data Domain system and to the initiators on a given media server. Dell EMC recommends that the
same number of DFC devices be advertised to all initiators on the same media server.
The following calculation may be used to determine the number of DFC devices to advertise on the
Data Domain system and to the initiators on a given backup server. It is recommended that the
same number of DFC devices be advertised to all initiators on the same storage nodes.
On the Data Domain System
The Data Domain system imposes a limit on the number of simultaneous requests to a single DFC
SCSI device. Because of this limit, the number of devices advertised needs to be tuned depending
on the maximum number of simultaneous jobs to the system at any given time. In general, the
larger the number of jobs expected from media servers using DD Boost over FC, the higher the
number of devices advertised.
The Data Domain system imposes a limit on the number of simultaneous requests to a single DFC
SCSI device. Because of this limit, the number of devices advertised needs to be tuned depending
on the maximum number of simultaneous jobs to the system at any given time. In general, the
larger the number of jobs expected from storage nodes using DD Boost over FC, the higher the
number of devices advertised.
Let J be the maximum number of simultaneous jobs running using DFC, to the Data Domain System
at any given time.
Let C be the maximum number of connections per job:
l 3 for Data Domain Extended Retention Systems
l 1 for other types Data Domain systems
Let D be the DFC device count. All device groups on the server and storage node must be
configured with "D" devices.
Calculate:
l Maximum simultaneous connections to the DD system, using DFC, from ALL media servers:
n S=J*C
n DFC Device Count (D) = minimum (64, 2*(S/128)), rounded up to a whole number.
l Maximum simultaneous connections to the DD system, using DFC, from ALL storage nodes:
n S=J*C
n DFC Device Count (D) = minimum (64, 2*(S/128)), rounded up to a whole number.
Example:
To calculate the max simultaneous connections to the Data Domain system by using DFC from ALL
media servers, assume:
l 8 media/master servers, single Data Domain systems, each server running a maximum of 50
jobs at any given time.
Therefore, J = 8 * 50 = 400
C = 1 (single Data Domain system)
S= J * C
S= 400 * 1
S= 400
l 8 storage nodes, single Data Domain systems, each server running a maximum of 50 jobs at
any given time.
Therefore, J = 8 * 50 = 400
C = 1 (single Data Domain system)
S = J * C = 400
D = 2 * 400 / 128 = 6.25. Round up to 7.
l Therefore, all DFC groups on the Data Domain system must be configured with 7 devices.
Assume:
l 8 media servers, DD Extended Retention systems, each server running a maximum of 30 jobs
at any given time.
l 8 storage nodes, DD Extended Retention systems, each server running a maximum of 30 jobs
at any given time.
l Here, J = 8 * 30 = 240, C = 3 (DD Extended Retention system), S = J * C = 720, D = 2 * 720 /
128 = 11.25, round up to 12.
l Therefore, all DFC groups on the DD system must be configured with 12 devices.
Linux
The number of DFC devices advertised on the Data Domain system using the calculations listed
above in On the Data Domain System is sufficient for Linux backup servers. No additional
configuration is required. Linux storage nodes are not queue-depth constrained, so many
connections can share the same DFC generic SCSI device with no performance impact.
Windows
The Data Domain server path management logic spreads out connections across available logical
paths (Initiator, Target Endpoint, DFC Device). We want to configure enough DFC devices such
that each connection uses its own generic SCSI device (logical path) on the backup server, with a
max DFC device count of 64.
Let X = the number of DFC devices configured on the Data Domain system (from On the Data
Domain System). Let P = number of physical paths between backup server and Data Domain
32 Dell EMC NetWorker Data Domain Boost Integration Guide
Planning and Practices
system. Let J = maximum number of simultaneous jobs, and let C = maximum number of
connections per job:
– 3 for DD Extended Retention systems – 1 for other types of Data Domain systems
Calculate:
l Maximum simultaneous connections from storage node S = J * C, DFC device count D =
minimum((S/P), X), round up, up to a maximum of 64.
Note that if the value of D is greater than X, then it is sufficient to configure D devices, but only
for the access group(s) with Windows clients.
Examples:
Assume:
l 4 physical paths between the storage node and Data Domain system, 30 maximum jobs, DD
Extended Retention system
l In this case, X = 25, P = 4, J = 30, and C = 3
l Maximum simultaneous connections from backup server S = (J * C) = 90
l DFC device count D = (90/4, 25) = 25
So, the Data Domain system should be configured to advertise 25 devices to each initiator on the
storage node.
Assume:
l 2 physical paths between the backup server and Data Domain system, 50 maximum jobs, single
Data Domain system
l In this case, X=18, P = 2, J = 40, C = 1
l Maximum simultaneous connections from backup server S = (J * C) = 40
l DFC device count D = max(40/2, 18) = 20
So, the Data Domain system should be configured to advertise 20 devices to each initiator on the
storage node.
Note that since the value of D (20) is greater than the value of X (18), it is sufficient to configure
two devices only for the DFC access group with Windows clients.
Firewall requirements
Regardless of the network connections that are used, communication through a firewall requires
the use of specific ports and specific protocols to perform backup, monitoring, and replication
operations across sites.
The following table lists the required firewall ports, which you must open between the Data Domain
system, the NetWorker server, and the NMC server.
The Data Domain system provides functionality to review the network configuration and network
capabilities and provides SSH Telnet to help diagnose issues.
Deduplication efficiency
The deduplication ratio measures the efficiency of reduction in storage space that results from the
data deduplication and compression technology. Ratios of 20:1 are broadly achievable and
reductions of even 5:1 are extremely valuable.
Several factors can contribute to the deduplication ratio:
l Retention periods
l Types of data backed up
l Change rates
l Frequency of full backups
l Use of encryption and compression
For the best use of storage space, consider the factors in the following sections, along with the
periodic clearing of expired storage space, and the removal of unused pools.
Retention periods
The deduplication ratio increases with longer data retention periods. The longer you retain the
stored save sets, the greater the chance that identical data will exist on the storage that
NetWorker uses to deduplicate each subsequent backup, and the greater is the efficiency of the
storage usage.
When you define longer retention periods, the data remains on the Data Domain device for a longer
period of time. This enables NetWorker to use the retained data to deduplicate subsequent
backups, and results in a more efficient use of storage.
Change rate
Data with a low change rate changes little between backups, produces high deduplication ratios,
and is a good candidate for deduplication. Deduplication removes data that is already in storage
and only stores new data.
When a new save set is deduplicated, the number of unique blocks within the save set can vary
widely depending on the data type, and often there is little that can be deduplicated. Yet because
the Data Domain system compresses the data blocks, there is typically a 2:1 to 3:1 (50%–75%)
data reduction.
The storage savings increase with each subsequent backup of the save set because a
deduplication backup writes to disk only the data blocks that are unique to the backup. In
conventional business operations, the data change rate is typically low and unique data may
represent only 1%–2% of the data present in each additional backup set. The remainder of the
backup is deduplicated against the data already stored on the system.
l Use a single hostname that is associated with each NIC, IP, or FC interface within the same
NetWorker datazone.
l Names can include abbreviations for the source or the target to quickly identify whether the
network connections are correct. For example, add an abbreviation of the storage node
hostname in the Data Domain name and an abbreviation of the Data Domain hostname in the
storage node name. Include the names in the Data Domain /etc/hosts file.
l Specify all aliases, such as long and short names and IP addresses, for the NetWorker server
and the storage nodes in their respective Client resources. Specify the aliases in the Aliases
attribute on the Globals (1 of 2) tab of a Client resource.
l Test to ensure that you can consistently resolve all hostnames in the network from multiple
locations in both directions. For example, ensure that you can resolve the short name to IP
address, long name to IP address, IP address to short name, and IP address to long name.
l In general, use short, easy-to-identify, descriptive names instead of IP addresses or fully
qualified name strings for devices and storage nodes. Long names may not fit into some views.
The following examples include a long name and a short name:
NWDD365-1.burloak.lab.mycorp.com:/NWDZ_Dr1
NWDD365-1:/NWDZ_Dr1
l Except for hostnames, use standard alphanumeric characters, including dot (.), hyphen (-),
and underscore (_), with no spaces and no special characters. Hostnames may not use
underscores (_).
l Use consistent formats, in terms of text field length and text case, and include leading zeros in
numbers, with a maximum of 50 characters.
l Avoid the use of dates in names where the dates could change or become meaningless in the
future.
DD Boost devices
Format: Data_Domain_system_name-device_name
For example: dd-tenendo-device01
IP addresses
Avoid IP addresses because numbers are more difficult to identify and troubleshoot than
descriptive names. However, there are exceptions:
l The Data Domain system requires the use of IP addresses to interface with an ifgroup for
Advanced Load Balancing and Link Failover features.
l For CCRs, the hosts file on the source Data Domain system must list the IP address of the
target Data Domain system. Otherwise, the CCR will use the same network access that the
backup and restore operations use.
The Data Domain documentation provides details.
Example topologies
This section provides some examples of how you can deploy the Data Domain integration in
NetWorker backup environments. Dell EMC recommends that you use two interfaces in Ethernet
IP networks, 1 GbE for administration and 10 GbE for data. For FC environments, use IP interfaces
for administration and clone operations, and a SAN interface for backup operations. Use the
following examples to plan your environment.
l You can share a single storage volume among multiple DD Boost devices and among multiple
backup hosts and storage nodes. You can improve performance and maintainability by
configuring multiple hosts and multiple sessions for each device, instead of creating multiple
devices.
l Client Direct deduplication offers an alternative to an environment that uses dedicated
NetWorker storage nodes, as described in Dedicated storage node environment on page 42.
The dedicated storage node environment requires additional licensing and configuration, and
the backup clients or the applications on the clients may not support a dedicated storage node.
1. The NetWorker server starts the backup of the client groups within the datazone.
2. Two storage nodes in the datazone write the backup data to media pools, which target specific
DD Boost devices on the primary system. The pool that is associated with the data protection
policy defines which storage devices receive the data.
3. The storage nodes communicate with the primary Data Domain system over a dedicated 10
GbE network connection, and store deduplicated backup data on the devices.
Note: An ifgroup configuration of 1 GbE or 10 GbE NICs on the Data Domain system
enables multiple storage nodes to use the same network identity. This bandwidth
aggregation can improve performance for DD Boost devices. The Data Domain
documentation provides details.
4. You can use CCR to store optimized clone copies of backups from the primary Data Domain
system over a network to a geographically distant secondary Data Domain system for disaster
recovery.
5. An additional option enables a further clone to conventional disk or conventional tape media. A
NetWorker storage node, which is attached to the secondary Data Domain system, creates an
additional NetWorker clone copy of the data for one of the backup groups, which NetWorker
stores on conventional media. NetWorker reverts the data in this copy to the native non-
deduplicated format, which is necessary for storage on conventional media.
source backup. NetWorker does not limit the number of cascaded clone copies that you can
create, provided that the source save set for each clone successfully completes.
As with the previous example, configure, enable, and manage each Data Domain system in a
cascaded environment within a single NetWorker datazone. Configure target devices on the Data
Domain systems that receive the clone copies.
The figure in this section illustrates an example of a cascaded replication environment with three
separate Data Domain systems at three different sites.
l The first site is the primary backup location and is the production site.
l The second site is a local site with good communication links to the production site, typically
within the same geographic location as the first site.
l The third site serves as the disaster recovery site, which is located at a geographically distant
location. Communication to this more distant site is subject to greater restrictions on
bandwidth and latency. This distant site could be in a different country or 250 kilometers
(150 miles) or more distant from either of the other two sites.
Note: The NetWorker server requires three Data Domain Storage System Enablers, one for
each Data Domain system. DR in the figure signifies disaster recovery.
This example environment operates as follows.
1. The NetWorker server starts the backup of production site client groups within its datazone.
2. The production site storage node assigns the backup data to media pools, which uses specific
DD Boost devices on the primary Data Domain system.
3. The storage node communicates with the primary Data Domain system over dedicated 10 GbE
network connection, and stores deduplicated backup data on devices DD Device 01 and DD
Device 02.
4. After the backup completes successfully, you can use CCR to store optimized clone copies of
the backups, which reside on the primary Data Domain system, over the network to Data
Domain systems at a local secondary site. You can create these clone copies by using one of
the following methods:
l Sequential method—NetWorker performs only one clone operation at a time, in sequence.
This method allows the production system to continue to function without the need to
create additional clones for a distant site.
For example, NetWorker uses the original backup on the primary Data Domain system to
create an optimized clone copy on a local secondary Data Domain system. Once this
process completes, NetWorker uses this copy to create an additional optimized clone copy
on the geographically distant Data Domain system.
Data paths 1a and 1b in the following figure represent this method.
l Concurrent method—NetWorker may be able to perform the clone operations
simultaneously. This method impacts the production system and requires more replication
bandwidth.
Note: The concurrent method depends on many factors, and you would must validate
and test the performance at the individual sites.
For example, NetWorker uses the original backup on the primary Data Domain system as
the source to create simultaneous clones on two target Data Domain systems.
Data paths 2a and 2b in the following figure represent this method.
3. You can perform an additional backup to tape storage operation, either directly from a storage
node or by a NetWorker clone operation from the Data Domain system.
Configuring the Data Domain system for DD Boost or Cloud Tier by using the
Data Domain System Manager
Use the Data Domain System Manager to configure the Data Domain system for DD Boost and
Cloud Tier.
Before you begin
Deploy the Data Domain system, create a disk for the storage unit, and complete the network
configuration.
Procedure
1. Use a web browser to log in to the Data Domain System Manager as the system
administrator.
2. In the left navigation pane, select Hardware > Storage.
3. In the Active Tier section, click Configure.
4. In the Addable Storage table, select the device, which stores backup data, click Add to
Tier, and then click Save.
Note: If a device does not appear in the Addable Storage table, add a new disk to the
virtual machine.
b. In the Addable Storage table, select the device that stores Cloud data.
Note: If a device does not appear in the Addable Storage table, add a new disk to
the virtual machine.
13. In the Summary tab, Protocols pane, select NFS export > create export.
The Create NFS Exports window appears.
14. In the Create NFS Exports window:
a. In the Export Name field, specify the name of the Data Domain MTree.
b. In the Directory path field, specify the full directory path for Data Domain MTree that
you created. Ensure that you use the same name for the directory.
c. In the Clients table, select the NetWorker server, if the NetWorker server does not
appear, and then click the + (Add) button. In the Client field, specify the FQDN of the
NetWorker server, and then click OK.
Configuring the Data Domain system for DD Boost by using the CLI
You can enable the Data Domain system for storage operations with DD Boost devices by using the
Data Domain CLI to complete the following steps.
About this task
The Data Domain Boost for OpenStorage Administration Guide provides details.
Procedure
1. Log in to the Data Domain system console as the system administrator user.
2. Use the license add command to add the OPENSTORAGE license key, the DD Boost
license, and optionally, to enable CCR, the Replication license key:
license add license_key
3. To verify that the file system and the NFS protocol are running, type the following
commands:
filesys status
nfs status
filesys enable
nfs enable
Note: For DD Boost functionality, you must enable NFS services on the Data Domain
system, even if you do not configure users or shares. You do not need to enable NFS on
the NetWorker server, NetWorker storage nodes, or NetWorker clients.
5. To create one or more new user accounts, type the following command:
user add username password password [role role]
For example:
Note: To unassign one of more users from the DD Boost user list, type the following
command:
ddboost enable
8. To configure the system to receive and generate SNMP traps, type the following command.
snmp add ro-community community_name
snmp enable
where community_name is typically “public”, which allows all users to monitor events.
SNMP traps enable users to monitor backup events that are captured by SNMP traps.
9. To configure Distributed Segment Processing (DSP), type the following commands:
a. To enable DSP, type: ddboost option set distributed-segment-processing
enabled
Note: Do not use the "DFC-" prefix on the DFC server name, as suggested in the output
of the ddboost fc dfc-server-name show command. This prefix is intended for
use with other vendors only and will cause NetWorker communications to the DFC
server to fail.
Procedure
1. Log in to the Data Domain system console with a user account that has the Global Storage
Administrator role.
2. Use the user add command to create one or more new user account, and assign the none
role to the user:
user add username password password [role role]
For example, to create three SMT user accounts named bob, joe and sue, type the following
commands:
4. To create one or more tenant units (TU), type the following command:
smt tenant-unit create tu-name
For example, to create a two TUs named tu1 and tu2, type:
To assign TU tu2 to DD Boost users joe and sue, type the following commands:
Note: Avoid changing the owners of DD Boost SUs. A new owner cannot use the DD
Boost devices from a previous owner. Create a device for the new owner instead.
l (Optional) To list the DD Boost users and their default TUs, or the DD Boost users within
a specific default TU, type the following command:
Note: You can use the CLI to review tenant space usage and the performance data at
both the TU and SU levels. As the global storage administrator, you can enable
tenants to use the Data Domain CLI to review the space usage and the performance
data of their TU and SUs. The Data Domain documentation provides details.
Adding a DD Cloud Tier storage to the Data Domain system by using the CLI
Before you begin
On a DDVE, add new storage to the virtual machine for the Cloud Tier.
Procedure
1. Log in to the Data Domain system console as the sysadmin user.
2. To enable the Cloud Tier feature, type the following command:
cloud enable
4. At the New Passphrase prompt, type a passphrase for Cloud Tier encryption.
5. At the Confirm Passphrase prompt, type a passphrase for Cloud Tier encryption.
6. To configure the Cloud Tier device, type one of the following commands:
l Data Domain system—storage add tier cloud enclosures number
where number is the device number.
l DDVE—storage add tier cloud device
where device is the name of the device, for example dev4.
Creating the Cloud Profile and Cloud Unit by using the CLI
Data Domain supports a maximum of two Cloud Units.
About this task
Perform the following steps on the Data Domain system or DDVE to create the Cloud Profile and
Cloud Unit.
Procedure
1. Log in to the Data Domain system or DDVE as the sysadmin user.
2. Type the following command to create the Cloud Profile:
cloud profile add profile_name
where profile_name is a descriptive name for the profile.
3. At the Enter provider name prompt, type the name of the provider:
l Dell EMC Elastic Cloud Storage (ECS)—ecs
l Virtustream Cloud Storage—virtustream
l Amazon Web Services S3—aws
4. For the Virtustream Storage Cloud provider only, at the Enter Storage Class prompt, type
the storage class.
5. For the Virtustream Storage Cloud and Amazon Web Service S3 providers only, at the Enter
Storage Region prompt, type the storage region.
6. At the Enter the access key prompt, type the cloud provider access key.
7. At the Enter the secret key prompt, type the cloud provider secret key.
8. For Dell EMC Elastic Cloud Storage (ECS) only, at the Enter the endpoint prompt, type the
load balancer endpoint address for the cloud provider.
For example: http://172.21.21.10:9020
Load balancer is mandatory for all ECS Cloud Tier deployments.
9. At the Do you want to enter proxy details prompt, press Enter to accept the default value,
no.
10. Type the following command to add a new Cloud Unit:
cloud unit add unit_name profile profile_name
where:
l unit_name is a descriptive name for the Cloud Unit, for example cloud-unit-1.
l profile_name is the name of the cloud profile that you created.
For example:
Creating the Cloud Profile and Cloud Unit by using Data Domain System Manager
Data Domain supports a maximum of 2 Cloud Units.
About this task
Perform the following steps to create the Cloud Profile and Cloud Unit.
Procedure
1. Use a web browser to log in to the Data Domain System Manager as the system
administrator.
2. In the left navigation pane, select Data Management > File System.
3. On the Cloud Units tab, click Add.
4. In the Name field, provide a descriptive name for the Cloud Unit.
Results
The Cloud Units page displays information about the Cloud Unit, and the status of the unit is
Enabled.
For example, to schedule the data movement operation to run every two weeks at 11 pm on
a Thursday, type:
l Monthly—From each At box, select the hour, minute, and AM or PM. In the On field,
perform one of the following steps:
a. To schedule the movement to occur on a specific date in the month, leave the default
selection Dates, and then select the day of the month on which to schedule the
movement.
b. To schedule the movement to occur on the last day of every month, select Last Day
of the Month.
The following figure provides an example of a movement schedule that occurs on the last
day of each month.
Figure 9 Monthly data movement schedule
6. Click OK.
l For the highly available Data Domain system, specify the floating IP.
l For node 1, specify the hostname with the correct community string.
l For node 2, specify the hostname with the correct community string.
b. Click Next.
5. In the Select Host Type page:
a. Select DataDomain.
b. Click Next.
6. In the Manage DataDomain page:
a. Review the configuration details.
b. Click Next.
c. Leave the Capture Events option selected.
7. (Optional) In the Configure SNMP Monitoring page, perform the following steps:
a. In the SNMP Community String field, type the name of the SNMP community string.
Note: If you do not know the name of the community, leave this field blank.
b. With the Receive SNMP trap events option selected, specify the SNMP Process port
that is used by the Data Domain system and select the events in which to monitor. Use
the Reset to defaults option to reset the events in which to monitor back to the default
settings.
Note: The default SNMP process port is 162.
c. Click Next.
SNMP monitoring enables NMC to display the Data Domain system status and to list the
backup and the recovery events. The monitoring feature also provides a launcher link for
the Data Domain interface.
d. Click Finish.
8. Configure alerts for Data Domain High Availability events:
a. Click the Devices button on the taskbar.
b. In the left navigation pane, right-click Data Domain Systems and select New Device
Wizard.
c. Open the SNMP Monitoring Options page and select the following options:
l HA Setup Degraded
l HA Setup Offline
l HA Setup Out-of-Sync
l Each DD Boost device appears as a folder on the Data Domain system. A unique NetWorker
volume label identifies each device and associates the device with a pool.
l NetWorker uses pools to direct backups or clones of backups to specific local or remote
devices.
l NetWorker uses Data Protection policy resources to specify the backup and cloning schedules
for member clients. It is recommended that you create policies that are dedicated solely to DD
Boost backups.
l VMware Backup Appliance does not support the SMT feature. The NetWorker VMware
Integration Guide provides details.
6. In the Select the Device Type page, select the Data Domain device type, and then click
Next.
The following figure provides an example of the Select the Device Type page.
7. In the Data Domain Preconfiguration Checklist page, review the requirements, and then
click Next.
The following figure provides an example of the Data Domain Preconfiguration Checklist
page.
Figure 11 Data Domain Preconfiguration Checklist page
8. In the Specify the Data Domain Configuration Options page, configure the following
fields:
a. In the Data Domain System section, select one of the following options:
l To use a Data Domain system on which you have previously created devices or
configured as a managed host, select Use an existing Data Domain System, and
then select the host.
l To use a new Data Domain system, select Add a new Data Domain System, and then
type the FQDN or IP address of the Data Domain system or DDVE.
Note: If you use DFC connectivity, Do not use the "DFC-" prefix on the DFC server
name, as suggested in the output of the ddboost fc dfc-server-name show
command. This prefix is intended for use with other vendors only and will cause
NetWorker communications to the DFC server to fail.
b. In the DD Boost Credentials section, type the username for the DD Boost user in the DD
Boost Username field.
c. In the Secure Multi-Tenancy section, to use only DD Boost devices in secure Storage
Units (SUs), select Configure Secure Multi-Tenancy (SMT), and then perform one of
the following tasks:
l To use an existing storage unit (SU), select Use an existing secure storage unit, and
then select the SU.
l To create a SU, select Create a new secure storage unit, and then specify the name
of the SU.
Note: SMT restricts access of each SU to one owner according to the provided DD
Boost credentials.
e. In the Configuration Method field, select Browse and Select, and then click Next.
Note: If you do not configure the SMT option, the wizard will create an SU for you on
the Data Domain system, and name the SU after the shortname of the NetWorker
server.
The following figure provides an example of the Specify the Data Domain Configuration
Options page.
9. In the Select Folders to use as Devices page, to create a DD Boost device, perform the
following steps:
a. Select the Data Domain system, and then click New Folder.
A new folder appears in the navigation tree. This folder is the new device.
Note: The navigation tree does not show the SU folder under the Data Domain
system folder. However, the SU folder is verifiable in the final Review
Configurations Settings wizard page. The wizard names the SU folder after the
short hostname of the NetWorker server and places the devices that you create into
this SU folder.
b. Type a name for the new folder, and then select the checkbox next to the folder or
device name.
The Device table displays the full NetWorker device name, the storage pathname, and
details about the device.
Note: The device name refers to the subfolder created within the SU. The folder
path must not contain other folders deeper than these device folders.
c. (Optional) To rename a DD Boost device as it appears in NMC, select the device in the
table, and type a new name in the NetWorker Device Name field. Do not use special
characters other than dot (.) and underscore (_). The Storage Path field remains
unchanged.
Note: Implicit in the SU folder pathname on the Data Domain system is the hidden
mount point folders/data/col1. Do not modify this folder structure, which all
NetWorker server hosts use. The final wizard page, Review Configurations
Settings, shows the complete location.
The /backup folder stores NFS service data. The clients that are configured for
NFS access can view, change, and delete the /data/col1 directory that contains
the DD Boost devices. If you use NFS devices, you can avoid the risk of potential
interference by using alternative path names.
d. Click Next.
The following figure provides an example of the Select the Folders to use as Devices
page.
Figure 13 Select the Folders to use as Devices page
10. On the Configure Pool Information page, perform the following steps:
a. Select Configure Media Pools for Devices.
b. In the Pool Type section, select the type of data to send to the Data Domain device,
either Backup for backups or Backup Clone for cloning or staging operation.
c. In the Pool section, select Create and use a new Pool to create a pool to receive the
data, or select Use an existing Pool to select a pool that exists on NetWorker server.
NetWorker provides a preconfigured Data Domain pool that you can select, named Data
Domain Default.
d. Leave the Label and Mount device after creation option selected.
e. Click Next.
The following figure provides as example of the Configure Pool Information page.
11. On the Select Storage Nodes page, perform the following steps:
a. In the Storage Node Options section, specify the storage node that manages the
device.
l To use an existing storage node on the NetWorker server, select Use an existing
storage node.
l To use a new storage node, select Create a new storage node, and then type the
hostname of a storage node host.
If the new Storage Node is also a Dedicated Storage Node, select Dedicated Storage
Node.
b. (Optional) To enable FC data transport for this device, perform the following steps:
l Select Enable Fibre Channel.
l In the Fibre Channel Host Name field, type the hostname that the Data Domain
system uses to identify itself for FC operations. By default, this hostname is the same
name used for IP operations, but the hostnames can be different. The hostname must
match the Server Name displayed on the Data Domain system in the Data
Management > DD Boost > Fibre Channel tab of the Data Domain Enterprise
Manager. The name is case-sensitive.
Note: All NetWorker clients that use an FC-enabled DD Boost device must be
enabled for FC in the Data Domain Interface field.
Note: If you plan to use the REST API for features such as DD Cloud Tier policy
creation and DD Retention Lock, you must additionally update the NSR Data Domain
RAP resource with the Management username, password, port, and host. If these
credentials and details are not specified in the RAP resource, then a validation error
occurs.
The following figure provides an example of the Select Storage Nodes page.
Figure 15 Select Storage Nodes page
12. In the Select SNMP Monitoring Options page perform the following steps:
a. In the Data Domain SNMP Community String field, type the name of the SNMP
community string.
Note: If you do not know the name of the community, then clear the Gather Usage
Information selection.
b. With the Receive SNMP trap events option selected, specify the SNMP Process port
used by the Data Domain system and select the events in which to monitor. Use the
Reset to defaults option to reset the events in which to monitor back to the default
settings.
Note: The default SNMP process port is 162.
c. Click Next.
SNMP monitoring enables NMC to display the Data Domain system status and to list the
backup and the recovery events. The monitoring feature also provides a launcher link for the
Data Domain interface. The following figure provides an example of the Select SNMP
Monitoring Options page.
13. On the Review the Device Configuration Settings page, review the configuration
information and then click Configure.
Note: The name that is listed as the SU is really the pathname for the device folder. The
format is: SU/device_name, where SU is the short hostname of the NetWorker server.
The following figure provides an example of the Review the Device Configuration Settings
page.
Figure 17 Review the Device Configuration Settings page
NetWorker configures, mounts, and labels the DD Boost device for the specified pool.
14. On the Device Configuration Results page, review the information, and then click Finish.
The following figure provides an example of the Device Configuration Results page.
Results
After the wizard successfully creates the device, the following changes appear in NMC:
l The Data Domain Systems window displays the new Data Domain device and the name of the
volume. The following figure provides an example of the Data Domain System window with
the new Data Domain device.
Figure 19 Data Domain System window
l If you configured a device for a Data Domain system that does not have previously configured
NetWorker devices, NetWorker adds the Data Domain system as a managed host. The NMC
Enterprise window provides you details about the Data Domain system.
3. Provide the device name, device access information, username for the DD boost user
(username filed) and password for the account . These are mandatory attributes to create a
device resource.
Device access information must be in the following form:
9. Click on the Select option which displays the types of resources available. Select the option
NSR Device. It lists out all the devices that has been created and is available. Browse
through the list using Next and Previous, once you find the device that you want to
configure, click on the Edit option.
10. Selecting the pool in Volume Pool field. If you want to create a new Pool, select the pool
using NSR Pool resource and select the Create option. Once it is complete revert back to
the current device Window (follow Step 9) and select the new pool that has just been
created.
Figure 21 Configuring the media pool information
11. In order to configure the volume operations, enable the hidden attribute in Options section
(If it is disabled).
Figure 22 Enabling the hidden attribute
12. Select options available in Volume operation field in order to label, mount and perform
other volume operations on the device. Operations have to be performed one at a time.
Labeling and mounting of the device can also be performed by running the command. nsrmm
-s <server_name> -v -y -m -b <pool_name> -l -f <device_name>.
13. In order to permanently erase all data and remove media and index information erase volume
operation has to be performed.
Figure 23 Performing erase volume operation
14. Select Delete from the menu to delete the device RAP resource. Delete operation would
also need device to be unmounted and removed as a target device from the corresponding
NSR Pool resource.
Note: To use Data Domain with NetWorker, the NetWorker server hostname should be in lower
case. Data Domain functions with lowercase and DD Cloud tier operations fails if it is mixed
case.
6. In the Select the Device Type page, select the DD Cloud Tier device type, and then click
Next.
The following figure provides an example of the Select the Device Type page.
7. In the DD Cloud Tier Configuration Options page, perform the following steps:
a. From the Select an existing Data Domain list, select the Data Domain host.
b. In the DD Boost Credentials section, type the username for the DD Boost user in the DD
Boost Username field.
c. In the Secure Multi-Tenancy section, to use only DD Boost devices in secure Storage
Units (SUs), select Configure Secure Multi-Tenancy (SMT), and then perform one of
the following tasks:
l To use an existing storage unit (SU), select Use an existing secure storage unit, and
then select the SU.
l To create a SU, select Create a new secure storage unit, and then specify the name
of the SU.
Note: SMT restricts access of each SU to one owner according to the provided DD
Boost credentials.
d. In the Configuration Method field, select Browse and Select, and then click Next.
Note: If you do not configure the SMT option, the wizard will create an SU for you on
the Data Domain system, and name the SU after the shortname of the NetWorker
server.
The following figure provides an example of the DD Cloud Tier Configuration Options
page.
8. In the Select the Folders to use as DD Cloud Tier Device page, configure a device in the
same mtree as the Data Domain backup device:
a. Select the Data Domain system, and then click New Folder.
A new folder appears in the navigation tree. This folder is the new device.
Note: The navigation tree does not show the SU folder under the Data Domain
system folder. However, the SU folder is verifiable in the final Review
Configurations Settings wizard page. The wizard names the SU folder after the
short hostname of the NetWorker server and places the devices that you create into
this SU folder.
b. Type a name for the new folder, and then select the checkbox next to the folder or
device name.
The Device table displays the full NetWorker device name, the storage pathname, and
details about the device.
Note: The device name refers to the subfolder created within the SU. The folder
path must not contain other folders deeper than these device folders.
Note: Implicit in the SU folder pathname on the Data Domain system is the hidden
mount point folders/data/col1. Do not modify this folder structure, which all
NetWorker server hosts use. The final wizard page, Review Configurations
d. Click Next.
The following figure provides an example of the Select the Folders to use as DD Cloud
Tier Device page.
Figure 26 Select the Folders to use as DD Cloud Tier Device page
9. In the Configure a Pool for the DD Cloud Tier Device page, perform the following steps:
a. Select Configure Media Pools for Devices.
b. In the Pool section, perform either of the following steps:
Note: The pool that you select or create must contain only Cloud Tier devices. NMC
lists pools of the type Backup Clone that contain only DD Cloud Tier devices.
c. Leave the Label and Mount device after creation option selected.
d. Click Next.
The following figure provides an example of theConfigure a Pool for the DD Cloud Tier
Device page.
10. In the Select the Storage Nodes for the DD Cloud Tier Device page, perform the
following steps:
a. In the Storage Node Options section, select the storage node that manages the device.
l To use an existing storage node on the NetWorker server, select Use an existing
storage node.
l To use a new storage node:
a. Select Create a new storage node.
b. Type the hostname of a storage node host.
c. If the new Storage Node is also a Dedicated Storage Node, select Dedicated
Storage Node.
b. Click Next.
The following figure provides an example of the Select the Storage Nodes for the DD
Cloud Tier Device page.
Figure 28 Select the Storage Nodes for the DD Cloud Tier Device page
11. In the Configure the Data Domain Management Policy page, perform the following steps:
a. In the Data Domain Host field, specify the host name of the Data Domain system.
b. In the Admin User field, specify the username for a Data Domain user that has admin
access. For example, sysadmin.
c. In the Admin Password field, specify the password of the management user.
d. In the Port field, specify the management port. By default, the port is 3009.
e. In the CA Certificate field, click Pull Certificate.
The Device wizard contacts the Data Domain system and displays the certificate in the
Certificate field.
i. Click Next.
j. On the confirmation window, review the details, and then click OK.
The following figure provides an example of the Configure the Data Domain Management
Policy page.
a. Review whether the devices were successfully configured or if any messages appeared.
b. Click Finish.
c. To change any of the settings, click Back to the correct wizard page.
The following figure provides an example of the Check results page.
Figure 31 Check results page
f. In the Management Certificate field, paste the management certificate, from the Data
Domain system.
g. Click OK.
NetWorker updates the Data Domain resource but does not validate the values with the
Data Domain system to ensure accuracy.
2. In the left navigation pane, right-click Devices, and then and select New Device
Properties.
3. On the General tab, identify the Cloud Tier device by typing its name and access
information:
Note: Multiple devices can share a single volume. Configuring volume sharing on
multiple devices provides details.
a. In the Name field, type a name for the Cloud Tier device.
For example:
ct_1
If you configure the device on a separate storage node host that is not the NetWorker
server host, it is a remote device. Specify the Name field in the following format:
rd=remote_storagenode_hostname:device_name
For example:
rd=dzone1_sn2:ct_1
b. In the Device access information field, type the Data Domain hostname followed by a
colon and the path to the device folder.
If you are configuring a device with secure multi-tenancy (SMT) protection, the device
folder must reside in a password-protected tenant unit on the Data Domain.
Use the following format:
DD_hostname:/DD_storage_unit_name/device_name
where, as a best practice, DD_storage_unit_name is the NetWorker server name, and
device_name is a name for the device, which appears as a folder.
For example, the following figure uses the following name:
ddr1:/dzone1/ct_1
NetWorker does not limit the number device folders that you can create, but the Device
access information field accepts one device folder only. Do not create any folders
within a device folder.
Note: Implicit in this pathname is the hidden mount point folder /data/col1. Do
not modify this folder structure, which all NetWorker servers use.
Figure 33 Example of the General tab configuration properties for a Cloud Tier device
4. On the Configuration tab, in the Save Sessions area, in the Remote user and Password
fields, type the DD Boost username and password, respectively.
You can only define one DD Boost (OST) user. All NetWorker storage nodes and servers
that access the Data Domain system must use the same username and password.
Note: Avoid changing the user of an existing device with a labeled volume. The new user
will not have write permission to the files and directories that are created by the
previous user and cannot re-label the volume. Create a device for the new user.
If a pool other than Backup Clone is used for a DD Cloud Tier device, the following error
message appears when you attempt to label the device:
Pool <pool name> is of type 'Backup. A DD Cloud Tier device must belong
to a pool of type 'Backup Clone'.
c. From the Label template list, select DD Cloud Tier Default Clone.
5. On the Selection Criteria tab, perform the following configuration tasks:
a. (Optional) To restrict the devices associated with the pool, from the Device box, select
the Cloud Tier devices.
Note: Select devices that reside on the same mtree as the Data Domain devices that
contain the source backup data.
b. From the Media type required drop down, select DD Cloud Tier.
6. Click OK.
Cloud Unit Name Specify the name of the cloud unit that you
created on the Data Domain system
4. Select the Create option in the menu and select the type as NSR device. The following full
screen appears with list of attributes to be configured for new device resource.
5. Provide Device name, Device access information, username for the DD boost user
(username filed), and password for the account (all four are mandatory attributes to create
a device resource.)
Device access information must be of the following form:
9. Click on the Select option which displays the types of resources available. Select the option
NSR Device. It lists out all the devices that has been created and is available. Browse
through the list using Next and Previous, once you find the device that you want to
configure, click on the Edit option.
10. Selecting the pool in Volume Pool field. If you want to create a new pool, select the pool
using NSR Pool resource and select the Create option. Once it is complete revert back to
the current device Window (follow Step 9) and select the new pool that has just been
created.
11. In order to configure the volume operations, enable the hidden attribute in Options section
(If it is disabled).
Figure 37 Enabling hidden attribute
12. Select options available in Volume operation field in order to label, mount and perform
other volume operations on the device. Operations have to be performed one at a time.
Labeling and mounting of the device can also be performed by running the command nsrmm
-s <server_name> -v -y -m -b <pool_name> -l -f <device_name>.
13. In order to permanently erase all data and remove media and index information erase volume
operation has to be performed.
Figure 38 Performing erase volume operation
14. Select Delete from the menu to delete the device RAP resource. Delete operation would
also need device to be unmounted and removed as a target device from the corresponding
NSR Pool resource.
Procedure
1. Use NMC to connect to the NetWorker server and click Protection.
2. In the left navigation pane, select Clients:
l To create a Client resource, from the File menu, select New.
l To edit an existing Client resource, select the client name from the list in the right panel,
and from the File menu, select Properties.
a. On the General tab, in the Name field, type the hostname for the client and, optionally,
type a comment in the Comment field.
b. Optional, select Block based backup.
c. In the Save Sets field, click the Browse button to open the Choose Directory window.
Browse to and select the volumes or individual file systems that you want to back up.
When finished selecting, click OK.
Type each item on a separate line. For example:
E:\
F:\
To back up all client data, type All in the Save Sets field.
Note: For Microsoft Windows systems, back up the SYSTEM or Volume Shadow
Copy Service (VSS) SYSTEM on a periodic basis to prepare for disaster recovery of
the client system.
The NetWorker Administration Guide provides details for this step.
3. On the General tab, in the Backup area, complete the following steps:
a. To enable deduplicated backup data from this client to bypass the NetWorker storage
node and be sent directly to the Data Domain system, select Client Direct. Review the
following requirements:
l Ensure that you have not selected the Checkpoint restart field. If selected, backups
revert to traditional storage node backups.
l Ensure that the client interface configuration, whether FC or IP, matches the
DD Boost device interface configuration. If the interfaces do not match, then the
storage node performs the backup and restore operations.
l Ensure that you have configured the Data Domain system to use the DD Boost
devices. Configuring the Data Domain system for DD Boost by using the CLI on page
48 provides details.
l Ensure that you have configured the NetWorker Device resource for the Data Domain
system with a Remote User field that specifies a DD Boost username. Configuring a
DD Boost device manually on page 89 provides details.
Note: Client Direct access from a Linux host to a Data Domain system requires a
glibc 2.3.4 or later library on the Linux system.
b. (Optional) In the Protection group list field, select the group in which to add the Client
resource. If you have not created the protection group, you can create one later and add
the client to the group.
4. On the Apps & Modules tab, perform the following tasks:
a. In the Deduplication area, select Data Domain backup. This ensures that NetWorker
backs up the client data only to DD Boost devices, even if the selected pool contains DD
Boost and other types of devices. It is best not to include different device types in a
single pool.
b. In the Data Domain Interface field, select the type of connectivity the client uses for DD
Boost devices:
l Select IP for TCP/IP connectivity only.
Do not select IP if the Enable fibre channel attribute is enabled on the
Configuration tab of the DD Boost Device resource. This conflict in settings could
cause backups to fail and restores to operate only through the storage node.
l Select Fibre Channel for FC connectivity only.
You cannot select the FC-only setting when you create a Client resource for the
NetWorker server resource because the NetWorker server requires IP connectivity to
send control information to the hosts within the datazone.
l Select Fibre Channel for FC connectivity only.
You cannot select the FC-only setting when you create a Client resource for the
NetWorker server resource because the NetWorker server requires IP connectivity to
send control information to the hosts within the datazone.
l To enable both FC and IP connectivity to the devices, select Any.
If the NetWorker server contains multiple definitions of this Client resource, any
changes to this field propagate to the other instances of the client.
c. To redirect an NDMP client from a tape backup to a DD Boost backup, change the
Backup fields as follows:
a. Select the NDMP option.
b. In the Backup Command field, type the following command:
nsrndmp -T backup_type -M
5. On the Globals (2 of 2) tab, in the Configuration area, configure the following settings:
a. In the Storage Nodes field, type the hostnames of the remote storage nodes that
receive the client backup data.
b. In the Recover Storage Nodes field, type the hostnames of the storage nodes that you
use to restore the client data.
c. (Optional), In the Backup target disks field, specify an ordered list of AFTD and Data
Domain disk devices that will receive data for this client. When you specify a value in this
attribute, NetWorker ignores the values that you specify in the Storage nodes attribute.
This attribute does not apply to the client resource of the NetWorker server, and applies
to each instance of the client resource. You can specify devices that are local or remote
to the NetWorker server.
6. When you have completed the client configuration, click OK.
The NetWorker server window shows a check mark in the Scheduled backup column of
clients that are enabled for scheduled backup.
b. Click Next.
5. In the Select Host Type page:
a. Select DataDomain.
b. Click Next.
6. In the Manage DataDomain page:
a. Review the configuration details.
b. Click Next.
c. Leave the Capture Events option selected.
7. (Optional) In the Configure SNMP Monitoring page, perform the following steps:
a. In the SNMP Community String field, type the name of the SNMP community string.
Note: If you do not know the name of the community, leave this field blank.
b. With the Receive SNMP trap events option selected, specify the SNMP Process port
used by the Data Domain system and select the events in which to monitor. Use the
Reset to defaults option to reset the events in which to monitor back to the default
settings.
Note: The default SNMP process port is 162.
c. Click Next.
SNMP monitoring enables NMC to display the Data Domain system status and to list the
backup and the recovery events. The monitoring feature also provides a launcher link for
the Data Domain interface.
8. Click Finish.
Results
The Data Domain system or DDVE appears in the Enterprise window.
a. In the Name field, type a name for the Data Domain device.
For example:
dd_1
Configuring a DD Boost device manually on page 89 uses the following example values:
l NetWorker server short hostname = dzone1
l NetWorker remote storage node hostname = dzone1_sn2
l Data Domain hostname = ddr1
l DD Boost device name = dd_1
If you configure the device on a separate storage node host that is not the NetWorker
server host as shown in Configuring a DD Boost device manually on page 89, it is a
remote device. Specify the Name field in the following format:
rd=remote_storagenode_hostname:device_name
For example:
rd=dzone1_sn2:dd_1
b. In the Device access information field, type the Data Domain hostname followed by a
colon and the path to the device folder.
If you are configuring a device with secure multi-tenancy (SMT) protection, the device
folder must reside in a password-protected tenant unit on the Data Domain. Configuring
the Data Domain system for DD Boost by using the CLI on page 48 provides details.
Use the following format:
DD_hostname:/DD_storage_unit_name/device_name
where, as a best practice, DD_storage_unit_name is the short hostname of the
NetWorker server and device_name is a name for the device, which appears as a folder.
For example, the following figure uses the following name:
ddr1:/dzone1/dd_1
NetWorker does not limit the number device folders that you can create, but the Device
access information field accepts one device folder only. Do not create any folders within
a device folder.
Note: Implicit in this pathname is the hidden mount point folder /data/col1. Do
not modify this folder structure, which all NetWorker servers use.
Figure 39 Example of the device name and the access information for a DD Boost device
c. In the Media type field, select Data Domain from the list.
5. On the Configuration tab, in the Save Sessions area, set the number of concurrent save
sessions (streams) and the number of nsrmmd (media storage) processes that the device
can handle:
l In the Target sessions field, specify the number of save sessions that a nsrmmd process
on the device handles before another device on the Data Domain host takes the
additional sessions. If another device is not available, then another nsrmmd process on
the same device takes the additional sessions. Use this setting to balance the sessions
load among nsrmmd processes.
It is recommended that you set this field to a low value. The default value is 20. The
maximum value is 60.
l In the Max sessions field, specify the maximum number of save sessions that the device
can handle. At the maximum limit, if no additional devices are available on the host, then
another available Data Domain system takes the additional sessions. If no other Data
Domain hosts are available, then the system retries the save sessions until a nsrmmd
process become available.
The default value is 60. The maximum value is 60.
Note: The Max sessions setting does not apply to concurrent recovery sessions.
l In the Max nsrmmd count field, specify the maximum number of nsrmmd processes that
can run on the device. Use this setting to balance the nsrmmd load among devices.
If you enabled Dynamic nsrmmds on the storage node, NetWorker automatically adjusts
this value by using the formula max/target +4, with the default value being 14.
Otherwise, the default value is 4.
To modify this value, first adjust the two sessions fields, apply and monitor the effects,
and then tweak the Max nsrmmd count value.
Note: NetWorker reserves at least one nsrmmd process for restore and clone
operations.
6. In the Remote user and Password fields, type the DD Boost username and password,
respectively.
You can only define one DD Boost (OST) user. All NetWorker storage nodes and servers
that access the Data Domain system must use the same username and password.
Note: Avoid changing the user of an existing device with a labeled volume. The new user
will not have write permission to the files and directories that are created by the
previous user and cannot re-label the volume. Create a device for the new user.
7. If you want the DD Boost device to use FC connectivity, complete the following steps:
a. Select the Enable fibre channel field.
b. In the Fibre Channel Host Name field, type the hostname that the Data Domain system
uses to identify itself for FC operations. By default, this hostname is the same name used
for IP operations, but the hostnames can be different. The hostname must match the
Server Name displayed on the Data Domain system in the Data Management > DD
Boost > Fibre Channel tab of the Data Domain Enterprise Manager. The name is case-
sensitive.
Note: All NetWorker clients that use an FC-enabled DD Boost device must be
enabled for FC in the Data Domain Interface field.
8. If you want to enable DD Retention Lock on the Data Domain device, select Governance
mode or Compliance mode from the DD Retention Lock Mode drop-down. If you do not
want to use DD Retention Lock on this device, select None.
Figure 40 Data Domain Device Properties Configuration tab
9. If you want to enable Compliance mode on the device, manually enable compliance mode
on the device Mtree before enabling it on the NetWorker device.
11. Ensure that the device is associated with a NetWorker storage volume before you try to use
the device. Otherwise, an error appears. Labeling and mounting devices on the storage node
provides the procedure.
Client Direct over IP from an FC-enabled device provides details on a volume sharing solution
for restore operations.
l You can create multiple devices for shared volumes on the same storage node or on separate
storage nodes.
l For clients that are not Client Direct clients, a shared volume can improve bandwidth for
backup or restore operations to a DD Boost device because NetWorker can use the storage
node that is closest to the requesting client.
Note: In some environments however, concurrent read or write operations to a volume
from multiple storage nodes or Client Direct clients can result in disk thrashing that impairs
performance.
You must create each device separately, with a different name, and you must correctly specify the
path to the storage volume location.
For example, to create three devices, one on the NetWorker server host named dzone1 that uses
local devices and two remote devices (rd) on storage nodes dzone1_sb2 and dzone1_sn3, specify
the name of each device in Name field of each device as follows:
dd_1a
rd=dzone1_sn2:dd_1b
rd=dzone1_sn3:dd_1c
The Device access information field would specify the same single directory as a valid complete
path for each alias.
For example, for a directory named dd_1 on the Data Domain storage host named ddr1, specify the
correct pathname:
l If the storage node uses an automounter, you can specify the following pathname:
/net/ddr1/dzone1/dd_1
l If the storage node uses an explicit system mount point, you can specify one of the following
pathnames:
/mnt/ddr1/dzone1/dd_1
/mnt/dzone1/dd_1
l dd_myvol.001
l dd_myvol.002
l dd_myvol.003
To create a label template, perform the following steps:
Procedure
1. In the NetWorker Administration window, click Media.
2. In the browser tree, select Label Templates, and from the File menu, click New.
The Create Label Template window appears.
3. In the Name and Comment fields, type a name and description for the label template. The
label will associate a storage pool to a device.
4. In the Fields field, type the components of the label. Place each label component on a
separate line. The template must include at least one volume number range component.
NetWorker applies the label template to the volumes mounted on DD Boost devices in a
Data Domain system.
For example:
dd_myvol
001-999
Complete the following steps to manually create a pool for Data Domain backups:
Procedure
1. Ensure that the devices that you assign to the pool were created in NetWorker.
2. Ensure that a label template has been created for the pool. Creating a volume label template
for DD Boost devices on page 93 provides details.
3. From the NetWorker Administration window, click Media.
4. In the left navigation pane, select Media Pools, and from the File menu, select New to open
the Create Media Pool window with the Basic tab selected.
5. In the Name field, type a name for each pool. Create names that clearly indicate whether
the pool is for a Data Domain backup or a Data Domain clone operation.
For example:
DDsite1
DDCLsite2
A pool name that starts with DD would be a Data Domain pool, and a pool name that starts
with DDCL would be a Data Domain clone pool. The pool name can also include the physical
location where NetWorker stores the backup data. These conventions make the name easier
to use for scripting and reporting.
9. In the Label Template field, select a label template to associate with the pool.
You can later apply the pool to DD Boost devices. Labeling and mounting devices on the
Data Domain device on page 96 provides details.
10. On the Selection Criteria tab, under Target Devices, select all the DD Boost devices that
this pool may use for storage. The pool may store data on any of these devices. Use the
following practices:
l Select only DD Boost devices for the pool. Do not mix DD Boost devices with other types
of storage devices. If you modify a pool in this step, ensure that the pool excludes all
devices that are not DD Boost devices.
l Select only DD Boost devices that reside on the same Data Domain system. To add DD
Boost devices that reside on other Data Domain systems, first save the pool
configuration, and then modify the pool and add the DD Boost devices.
l Do not select devices that reside on more than one Data Domain system. Backups from a
single NetWorker client can target any of these Data Domain systems. This behavior
impairs the backup window and deduplication ratio.
Note: Backups from a single NetWorker client can target any of these Data Domain
systems. This behavior impairs the backup window and deduplication ratio.
11. Under Media type required, if you intend to use the pool for a Data Domain backup only,
set this field to Data Domain. This setting ensures that only Data Domain devices use this
pool.
Note: It is recommended that you do not include different media types in a single pool.
Backup fails for older NetWorker application modules on page 180 provides further
details.
Disabling a device
When you disable a DD Boost device, NetWorker does not use the device for backup, recovery, or
clone operations. You can reenable the device to restore old data that is retained on the device.
Procedure
1. Use NMC to connect to the NetWorker server, select the Devices view. In the left
navigation pane, select the Data Domain Systems folder.
2. In the Data Domain Systems table, right-click the device that you want to disable, and
select Unmount.
Actions
Actions are the key resources in a workflow for a data protection policy and define a specific task
(for example, a backup or clone) that occurs on the client resources in the group assigned to the
workflow. NetWorker uses a work list to define the task. A work list is composed of one or several
work items. Work items include client resources, virtual machines, save sets, or tags. You can
chain multiple actions together to occur sequentially or concurrently in a workflow. All chained
actions use the same work list.
When you configure an action, you define the days on which to perform the action, as well as other
settings specific to the action. For example, you can specify a destination pool, a retention period,
and a target storage node for the backup action, which can differ from the subsequent action that
clones the data.
When you create an action for a policy that is associated with the virtual machine backup, you can
select one of the following data protection action types:
l Backup — Performs a backup of virtual machines in vCenter to a Data Domain system. You
can only perform one VMware backup action per workflow. The VMware backup action must
occur before clone actions.
l Clone — Performs a clone of the VMware backup on a Data Domain system to any clone
device that NetWorker supports (including Data Domain system or tape targets). You can
specify multiple clone actions. Clone actions must occur after the Backup action.
You can create multiple actions for a single workflow. However, each action applies to a single
workflow and policy.
The following figure provides a high level overview of the components that make up a data
protection policy in a datazone.
Figure 41 Data Protection Policy
Platinum policy
The Platinum policy provides an example of a data protection policy for an environment that
contains supported storage arrays or storage appliances and requires backup data redundancy.
The policy contains one workflow with two actions, a snapshot backup action, followed by a clone
action.
Figure 42 Platinum policy configuration
Gold policy
The Gold policy provides an example of a data protection policy for an environment that contains
virtual machines and requires backup data redundancy.
Silver policy
The Silver policy provides an example of a data protection policy for an environment that contains
machines where file systems or applications are running and requires backup data redundancy.
Bronze policy
The Bronze policy provides an example of a data protection policy for an environment that
contains machines where file systems or applications are running.
5. Configure client resources, to define the backup data that you want to protect, and then
assign the client resources to a protection group.
The following figure illustrates a policy with two different workflows. Workflow 1
performs a probe action, then a backup of the client resources in Client group 1, and
then a clone of the save sets from the backups. Workflow 2 performs a backup of the
client resources in Dynamic client group 1, and then a clone of the save sets from the
backup.
Note: For more information on configuring a new data protection policy using the
NetWorker Management Web UI, see the NetWorker Administration Guide.
Creating a policy
Procedure
1. In the Administration window, click Protection.
2. In the expanded left pane, right-click Policies, and then select New.
The Create Policy dialog box appears.
3. On the General tab, in the Name field, type a name for the policy.
The maximum number of characters for the policy name is 64.
l Legal Characters: _ : - + = # , . % @
l Illegal Characters: /\*?[]()$!^;'"`~><&|{}
Note: After you create a policy, the Name attribute is read-only.
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
where:
n -s subject—Includes a standard email header with the message and specifies the
subject text for that header. Without this option, the smtpmail program assumes
that the message contains a correctly formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to relay the SMTP
email message.
n recipient1@mailserver—Is the email address of the recipient of the notification.
Multiple email recipients are separated by a space.
7. To specify the Restricted Data Zone (RDZ) for the policy, select the Restricted Data
Zones tab, and then select the RDZ from the list.
8. Click OK.
After you finish
Create the workflows and actions for the policy.
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
where:
n -s subject—Includes a standard email header with the message and specifies the
subject text for that header. Without this option, the smtpmail program assumes
that the message contains a correctly formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to relay the SMTP
email message.
n recipient1@mailserver—Is the email address of the recipient of the notification.
Multiple email recipients are separated by a space.
8. In the Running section, perform the following steps to specify when and how often the
workflow runs:
a. To ensure that the actions that are contained in the workflow run when the policy or
workflow starts, in the Enabled box, leave the option selected. To prevent the actions in
the workflow from running when the policy or workflow that contains the action starts,
clear this option.
b. To start the workflow at the time that is specified in the Start time attribute, on the
days that are defined in the action resource, in the AutoStart Enabled box, leave the
option selected. To prevent the workflow from starting at the time that is specified in the
Start time attribute, clear this option.
c. To specify the time to start the actions in the workflow, in the Start Time attribute, use
the spin boxes.
The default value is 9:00 PM.
d. To specify how frequently to run the actions that are defined in the workflow over a 24-
hour period, use the Interval attribute spin boxes. If you are performing transaction log
backup as part of application-consistent protection, you must specify a value for this
attribute in order for incremental transaction log backup of SQL databases to occur.
The default Interval attribute value is 24 hours, or once a day. When you select a value
that is less than 24 hours, the Interval End attribute appears. To specify the last start
time in a defined interval period, use the spin boxes.
e. To specify the duration of time in which NetWorker can manually or automatically restart
a failed or canceled workflow, in the Restart Window attribute, use the spin boxes.
If the restart window has elapsed, NetWorker considers the restart as a new run of the
workflow. NetWorker calculates the restart window from the start of the last incomplete
workflow. The default value is 24 hours.
For example, if the Start Time is 7:00 PM, the Interval is 1 hour, and the Interval End is
11:00 PM., then the workflow automatically starts every hour beginning at 7:00 PM. and
the last start time is 11:00 PM.
l Dynamic client group—A dynamic list of client resources to back up. A dynamic client group
automatically generates a list of the client resources that use a client tag which matches the
client tag that is specified for the group.
Create multiple groups to perform different types of backups for different Client resources, or to
perform backups on different schedules. For example:
l Create one group for backups of clients in the Accounting department, and another group for
backups of clients in the Marketing department.
l Create one group for file system backups and one group for backups of Microsoft Exchange
data with the NetWorker Module for Microsoft.
l Create one group for a workflow with backups actions that start at 11 p.m., and another group
for a workflow with backup actions that start at 2 a.m.
Note: A Client resource can belong to more than one group.
4. From the Group Type list, leave the default selection of Clients.
5. In the Comment field, type a description of the group.
6. From the Policy-Workflow list, select the workflow that you want to assign the group to.
Note: You can also assign the group to a workflow when you create or edit a workflow.
7. (Optional) To specify the Restricted Datazone (RDZ) for the group, on the Restricted
Datazones tab, select the RDZ from the list.
8. Click OK.
After you finish
Create Client resources. Assign clients to a protection group, by using the Client Configuration
wizard or the General tab on the Client Properties page.
NetWorker server or you can configure the dynamic client group to perform a query that
generates a list of clients that is based on a matching tag value.
About this task
A tag is a string attribute that you define in a Client resource. When an action starts in a workflow
that is a member of a tagged dynamic protection group, the policy engine dynamically generates a
list of client resources that match the tag value.
Use dynamic client groups to specify a dynamic list of Client resources for a traditional backup, a
probe action, a check connectivity action, or a server backup action.
Procedure
1. In the NetWorker Administration window, click Protection.
2. In the expanded left pane, right-click Groups and select New from the drop-down, or right-
click an existing group and select Edit from the drop-down.
The Create Group or Edit Group dialog box appears, with the General tab selected.
3. In the Name attribute, type a name for the group.
The maximum number of characters for the group name is 64.
l Legal Characters: _ : - + = # , . % @
l Illegal Characters: /\*?[]()$!^;'"`~><&|{}
4. From the Group Type list, select Dynamic Clients. For steps 5 to 8, follow the instructions
given in Creating a client group.
Check connectivity
A check connectivity action tests the connectivity between the clients and the NetWorker server
before the start of a probe or backup action occurs. If the connectivity test fails, then the probe
action and backup action does not start for the client.
Traditional backup
A traditional backup is a scheduled backup of the save sets defined for the Client resources in the
assigned group. You must specify the destination storage node, destination pool, the schedule
(period and activity), and the retention period for the backup.
Clone
A clone action creates a copy of one or more save sets. Cloning enables secure offsite storage, the
transfer of data from one location to another, and the verification of backups.
You can configure a clone action to occur after a backup in a single workflow, or concurrently with
a backup action in a single workflow. You can use save set and query groups to define a specific list
of save sets to clone, in a separate workflow.
Note: The clone action clones the scheduled backup save sets only, and it does not clone the
manual backup save sets. Some NetWorker module backups might appear to be scheduled
backups that are initiated by a policy backup action, but they are manual backups because they
are initiated or converted by a database or application. The NetWorker Module for Databases
and Applications Administration Guide and the NetWorker Module for SAP Administration Guide
provides more details.
4. To ensure that the action runs when the policy or workflow that contains the action is
started, in the Enabled box, select the option. To prevent the action from running when the
policy or workflow that contains the action is started, clear this option.
Note: When you clear the Enabled option, actions that occurs after a disabled action do
not start, even if the subsequent options are enabled.
14. In the Parallelism field, specify the maximum number of concurrent operations for the
action. This is applicable if multiple rollover is implemented at an action level.
15. From the Failure Impact list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the current action if there is a failure with one of the jobs, but continue with
subsequent actions in the workflow, select Abort action.
Note: The Abort action option applies to probe actions, and the backup actions for
the Traditional and Snapshot action types.
l To abort the entire workflow if there is a failure with one of the jobs in the action, select
Abort workflow.
Note: If any of the actions fail in the workflow, the workflow status does not appear as
interrupted or cancelled. NetWorker reports the workflow status as failed.
16. From the Soft Limit list, select the amount of time after the action starts to stop the
initiation of new activities. The default value of 0 (zero) indicates no amount of time.
17. From the Hard Limit list, select the amount of time after the action starts to begin
terminating activities. The default value of 0 (zero) indicates no amount of time.
18. (Optional) In Start Time specify the time to start the action.
Use the spin boxes to set the hour and minute values, and select one of the following
options from the drop-down list:
l Disabled—Do not enforce an action start time. The action will start at the time defined
by the workflow.
l Absolute—Start the action at the time specified by the values in the spin boxes.
l Relative—Start the action after the period of time defined in the spin boxes has elapsed
after the start of the workflow.
19. (Optional) Configure overrides for the task that is scheduled on a specific day.
To specify the month, use the navigation buttons and the month list box. To specify the
year, use the spin boxes. You can set an override in the following ways:
l Select the day in the calendar, which changes the action task for the specific day.
l Use the action task list to select the task, and then perform one of the following steps:
n To define an override that occurs on a specific day of the week, every week, select
Specified day, and then use the lists. Click Add Rules based override.
n To define an override that occurs on the last day of the calendar month, select Last
day of the month. Click Add Rules based override.
Note:
n You can edit or add the rules in the Override field.
n To remove an override, delete the entry from the Override field.
n If a schedule is associated to an action, then override option is disabled.
l Snapshot backup
6. If you create the action as part of the workflow configuration, the workflow appears
automatically in the Workflow box and the box is dimmed.
7. Specify the order of the action in relation to other actions in the workflow:
l If the action is part of a sequence of actions in a workflow path, in the Previous box,
select the action that should precede this action.
l If the action should run concurrently with an action, in the Previous box, select the
concurrent action, and then select the Concurrent checkbox.
8. Specify a weekly, monthly, or reference schedule for the action:
l To specify a schedule for each day of the week, select Define option under Select
Schedule and period as Weekly by day.
l To specify a schedule for each day of the month, select Define option under Select
Schedule and period as Monthly by day.
l To specify a customized schedule to the action, select Select option under Select
Schedule and choose a customized schedule using the drop down menu that is already
created under NSR schedule resource.
9. Specify the days to probe the client:
l To perform a probe action on a specific day, click the Execute icon on the day.
l To skip a probe action, click the Skip icon on the day.
l To perform a probe action every day, select Execute from the list, and then click Make
All.
The following table provides details on the icons.
Note: The Retries option applies to probe actions, and the backup actions for the
Traditional and Snapshot action types. If you specify a value for this option for other
actions, NetWorker ignores the values.
14. In the Retry Delay field, specify a delay in seconds to wait before retrying a failed probe or
backup action. When the Retry Delay value is 0, NetWorker retries the failed probe or
backup action immediately.
Note: The Retry Delay option applies to probe actions, and the backup actions for the
Traditional and Snapshot action types. When you specify a value for this option in other
actions, NetWorker ignores the values.
15. In the Inactivity Timeout field, specify the maximum number of minutes that a job run by an
action can try to respond to the server.
If the job does not respond within the specified time, the server considers the job a failure
and NetWorker retries the job immediately to ensures that no time is lost due to failures.
Increase the timeout value if a backup consistently stops due to inactivity. Inactivity might
occur for backups of large save sets, backups of save sets with large sparse files, and
incremental backups of many small static files.
Note: The Inactivity Timeout option applies to probe actions, and the backup actions
for the Traditional and Snapshot action types. If you specify a value for this option in
other actions, NetWorker ignores the value.
16. In the Parallelism field, specify the maximum number of concurrent operations for the
action. This is applicable if multiple rollover is implemented at an action level.
17. From the Failure Impact list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the current action if there is a failure with one of the jobs, but continue with
subsequent actions in the workflow, select Abort action.
Note: The Abort action option applies to probe actions, and the backup actions for
the Traditional and Snapshot action types.
l To abort the entire workflow if there is a failure with one of the jobs in the action, select
Abort workflow.
Note: If any of the actions fail in the workflow, the workflow status does not appear as
interrupted or cancelled. NetWorker reports the workflow status as failed.
18. Do not change the default selections for the Notification group box. NetWorker does not
support notifications for probe actions and ignores and specified values.
19. From the Soft Limit list, select the amount of time after the action starts to stop the
initiation of new activities. The default value of 0 (zero) indicates no amount of time.
20. From the Hard Limit list, select the amount of time after the action starts to begin
terminating activities. The default value of 0 (zero) indicates no amount of time.
21. (Optional) In Start Time specify the time to start the action.
Use the spin boxes to set the hour and minute values, and select one of the following
options from the drop-down list:
l Disabled—Do not enforce an action start time. The action will start at the time defined
by the workflow.
l Absolute—Start the action at the time specified by the values in the spin boxes.
l Relative—Start the action after the period of time defined in the spin boxes has elapsed
after the start of the workflow.
22. (Optional) Configure overrides for the task that is scheduled on a specific day.
To specify the month, use the navigation buttons and the month list box. To specify the
year, use the spin boxes. You can set an override in the following ways:
l Select the day in the calendar, which changes the action task for the specific day.
l Use the action task list to select the task, and then perform one of the following steps:
n To define an override that occurs on a specific day of the week, every week, select
Specified day, and then use the lists. Click Add Rules based override.
n To define an override that occurs on the last day of the calendar month, select Last
day of the month. Click Add Rules based override.
Note:
n You can edit or add the rules in the Override field.
n To remove an override, delete the entry from the Override field.
n If a schedule is associated to an action, then override option is disabled.
4. To ensure that the action runs when the policy or workflow that contains the action is
started, in the Enabled box, select the option. To prevent the action from running when the
policy or workflow that contains the action is started, clear this option.
Note: When you clear the Enabled option, actions that occurs after a disabled action do
not start, even if the subsequent options are enabled.
To perform the same type of backup on each day, select the backup type from the list and
click Make All.
15. From the Client Override Behavior box, specify how NetWorker uses certain client
configuration attributes that perform the same function as attributes in the Action resource:
l Client Can Override—The values in the Client resource for Schedule, Pool, Retention
policy, and the Storage Node attributes take precedence over the values that are
defined in the equivalent Action resource attributes.
Note: If the NetWorker policy action schedule is set to the Skip backup level, the
Client can Override option is not honored. For NetWorker to consider the Client
can Override option, change the action schedule to a different level.
l Client Can Not Override—The values in the Action resource for the Schedule,
Destination Pool, Destination Storage Node, and the Retention attributes take
precedence over the values that are defined in the equivalent Client resource attributes.
l Legacy Backup Rules—This value only appears in actions that are created by the
migration process. The updating process sets the Client Override Behavior for the
migrated backup actions to Legacy Backup Rules.
16. Select the Apply DD Retention Lock checkbox to enable retention lock for the save sets
included in this backup action. Note that the device used for backing up these save sets
must also have DD Retention lock enabled in the Device Properties window or during
device creation.
17. In the DD Retention Lock Time box, specify the duration the save sets will remain on the
Data Domain device before the retention lock expires. During this time, these save sets
cannot be overwritten, modified, or deleted for the duration of the retention period,
although the backups can be mounted and unmounted. The retention time period set here
must fall within the minimum and maximum values set for the Data Domain Mtree, and
should be lower than or equal to the NetWorker Retention Period.
18. Click Next.
The Specify the Advanced Options page appears.
19. In the Retries field, specify the number of times that NetWorker should retry a failed probe
or backup action, before NetWorker considers the action as failed. When the Retries value
is 0, NetWorker does not retry a failed probe or backup action.
Note: The Retries option applies to probe actions, and the backup actions for the
Traditional and Snapshot action types. If you specify a value for this option for other
actions, NetWorker ignores the values.
20. In the Retry Delay field, specify a delay in seconds to wait before retrying a failed probe or
backup action. When the Retry Delay value is 0, NetWorker retries the failed probe or
backup action immediately.
Note: The Retry Delay option applies to probe actions, and the backup actions for the
Traditional and Snapshot action types. When you specify a value for this option in other
actions, NetWorker ignores the values.
21. In the Inactivity Timeout field, specify the maximum number of minutes that a job run by an
action can try to respond to the server.
If the job does not respond within the specified time, the server considers the job a failure
and NetWorker retries the job immediately to ensures that no time is lost due to failures.
Increase the timeout value if a backup consistently stops due to inactivity. Inactivity might
occur for backups of large save sets, backups of save sets with large sparse files, and
incremental backups of many small static files.
Note: The Inactivity Timeout option applies to probe actions, and the backup actions
for the Traditional and Snapshot action types. If you specify a value for this option in
other actions, NetWorker ignores the value.
22. In the Parallelism field, specify the maximum number of concurrent operations for the
action. This is applicable if multiple rollover is implemented at an action level.
23. From the Failure Impact list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the current action if there is a failure with one of the jobs, but continue with
subsequent actions in the workflow, select Abort action.
Note: The Abort action option applies to probe actions, and the backup actions for
the Traditional and Snapshot action types.
l To abort the entire workflow if there is a failure with one of the jobs in the action, select
Abort workflow.
Note: If any of the actions fail in the workflow, the workflow status does not appear as
interrupted or cancelled. NetWorker reports the workflow status as failed.
24. From the Soft Limit list, select the amount of time after the action starts to stop the
initiation of new activities. The default value of 0 (zero) indicates no amount of time.
25. From the Hard Limit list, select the amount of time after the action starts to begin
terminating activities. The default value of 0 (zero) indicates no amount of time.
26. Optional, in Start Time specify the time to start the action.
Use the spin boxes to set the hour and minute values, and select one of the following
options from the drop-down list:
l Disabled—Do not enforce an action start time. The action will start at the time defined
by the workflow.
l Absolute—Start the action at the time specified by the values in the spin boxes.
l Relative—Start the action after the period of time defined in the spin boxes has elapsed
after the start of the workflow.
27. (Optional) Configure overrides for the task that is scheduled on a specific day.
To specify the month, use the navigation buttons and the month list box. To specify the
year, use the spin boxes. You can set an override in the following ways:
l Select the day in the calendar, which changes the action task for the specific day.
l Use the action task list to select the task, and then perform one of the following steps:
n To define an override that occurs on a specific day of the week, every week, select
Specified day, and then use the lists. Click Add Rules based override.
n To define an override that occurs on the last day of the calendar month, select Last
day of the month. Click Add Rules based override.
Note:
n You can edit or add the rules in the Override field.
n To remove an override, delete the entry from the Override field.
n If a schedule is associated to an action, then override option is disabled.
28. From the Send Notifications list box, select whether to send notifications for the action:
l To use the notification configuration that is defined in the Policy resource to send the
notification, select Set at policy level.
l To send a notification on completion of the action, select On Completion.
l To send a notification only if the action fails to complete, select On Failure.
29. In the Send notification attribute, when you select the On Completion option or On failure
option, the Command box appears. Use this box to configure how NetWorker sends the
notifications. You can use the nsrlog command to send the notifications to a log file or you
can send an email notification.
The default notification action is to send the information to the
policy_notifications.log file. By default, the policy_notifications.log file is
located in the /nsr/logs directory on Linux and in the C:\Program Files\EMC
NetWorker\nsr\logs folder on Windows.
Use the default mailer program on Linux to send email messages or the smtpmail
application on Windows:
l To send notifications to a file, type the following command, where
policy_notifications.log is the name of the file:
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
where:
n -s subject—Includes a standard email header with the message and specifies the
subject text for that header. Without this option, the smtpmail program assumes
that the message contains a correctly formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to relay the SMTP
email message.
n recipient1@mailserver—Is the email address of the recipient of the notification.
Multiple email recipients are separated by a space.
6. If you create the action as part of the workflow configuration, the workflow appears
automatically in the Workflow box and the box is dimmed.
7. Specify the order of the action in relation to other actions in the workflow:
l If the action is part of a sequence of actions in a workflow path, in the Previous box,
select the action that should precede this action.
l If the action should run concurrently with an action, in the Previous box, select the
concurrent action, and then select the Concurrent checkbox.
8. Specify a weekly, monthly, or reference schedule for the action:
l To specify a schedule for each day of the week, select Define option under Select
Schedule and period as Weekly by day.
l To specify a schedule for each day of the month, select Define option under Select
Schedule and period as Monthly by day.
l To specify a customized schedule to the action, select Select option under Select
Schedule and choose a customized schedule using the drop down menu that is already
created under NSR schedule resource.
9. Specify the days to perform cloning:
l To clone on a specific day, click the Execute icon on the day.
l To skip a clone on a specific day, click the Skip icon on the day.
l To check connectivity every day, select Execute from the list, and then click Make All.
The following table provides details on the icons.
c. In the Delete source save sets after clone completes box, select the option to instruct
NetWorker to move the data from the source volume to the destination volume after
clone operation completes. This is equivalent to staging the save sets.
d. From the Destination pool list, select a clone pool.
To clone to a DD Cloud Tier device, select a Cloud Tier pool.
e. From the Retention list, specify the amount of time to retain the cloned save sets.
After the retention period expires, the save sets are marked as recyclable during an
expiration server maintenance task.
12. Select the Apply DD Retention Lock checkbox to enable Retention Lock for the save sets
included in this clone action. Note that the device used for cloning these save sets must also
have DD Retention lock enabled in the Device Properties window or during device creation.
13. In the DD Retention Lock Time box, specify the duration the save sets will remain on the
Data Domain device before the Retention Lock expires. During this time, these save sets
cannot be overwritten, modified, or deleted for the duration of the retention period,
although the device with the cloned backup can be mounted and unmounted. The retention
time period set here must fall within the minimum and maximum values set for the Data
Domain Mtree, and should be lower than or equal to the NetWorker Retention Period.
14. In the Filters section, define the criteria that NetWorker uses to create the list of eligible
save sets to clone. The eligible save sets must match the requirements that are defined in
each filter. NetWorker provides the following filter options:
a. Time filter—In the Time section, specify the time range in which NetWorker searches
for eligible save sets to clone in the media database. Use the spin boxes to specify the
start time and the end time. The Time filter list includes the following options to define
how NetWorker determines save set eligibility, based on the time criteria:
l Do Not Filter—NetWorker inspects the save sets in the media database to create a
clone save set list that meets the time filter criteria.
l Accept—The clone save set list includes save sets that are saved within the time
range and meet all the other defined filter criteria.
l Reject—The clone save set list does not include save sets that are saved within the
time range and meet all the other defined filter criteria.
b. Save Set filter—In the Save Set section, specify whether to include or exclude
ProtectPoint and Snapshot save sets, when NetWorker searches for eligible save sets to
clone in the media database. The Save Set filter list includes to the following options
define how NetWorker determines save set eligibility, based on the save set filter
criteria:
l Do Not Filter—NetWorker inspects the save sets in the media database to create a
clone save set list that meets the save set filter criteria.
l Accept—The clone save set list includes eligible ProtectPoint save sets or Snapshot
save sets, when you also enable the ProtectPoint checkbox or Snapshot checkbox.
l Reject—The clone save set list does not include eligible ProtectPoint save sets and
Snapshot save sets when you also enable the ProtectPoint checkbox or Snapshot
checkbox.
Note: For NAS device, only Snapshot save set is applicable.
c. Clients filter—In the Client section, specify a list of clients to include or exclude, when
NetWorker searches for eligible save sets to clone in the media database. The Client
filter list includes the following options, which define how NetWorker determines save
set eligibility, based on the client filter criteria:
l Do Not Filter—NetWorker inspects the save sets that are associated with the clients
in the media database, to create a clone save set list that meets the client filter
criteria.
l Accept—The clone save set list includes eligible save sets for the selected clients.
l Reject—The clone save set list does not include eligible save sets for the selected
clients.
d. Levels filter—In the Levels section, specify a list of backup levels to include or exclude,
when NetWorker searches for eligible save sets to clone in the media database. The
Levels filter list includes the following options define how NetWorker determines save
set eligibility, based on the level filter criteria:
l Do Not Filter—NetWorker inspects the save sets regardless of the level in the media
database, to create a clone save set list that meets all the level filter criteria.
l Accept—The clone save set list includes eligible save sets with the selected backup
levels.
l Reject—The clone save set list does not include eligible save sets with the selected
backup levels.
Note: For NAS device, only full backup level is applicable.
17. In the Parallelism field, specify the maximum number of concurrent operations for the
action. This is applicable if multiple rollover is implemented at an action level.
18. From the Failure Impact list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the current action if there is a failure with one of the jobs, but continue with
subsequent actions in the workflow, select Abort action.
Note: The Abort action option applies to probe actions, and the backup actions for
the Traditional and Snapshot action types.
l To abort the entire workflow if there is a failure with one of the jobs in the action, select
Abort workflow.
Note: If any of the actions fail in the workflow, the workflow status does not appear as
interrupted or cancelled. NetWorker reports the workflow status as failed.
19. From the Send Notifications list box, select whether to send notifications for the action:
l To use the notification configuration that is defined in the Policy resource to send the
notification, select Set at policy level.
l To send a notification on completion of the action, select On Completion.
l To send a notification only if the action fails to complete, select On Failure.
20. In the Send notification attribute, when you select the On Completion option or On failure
option, the Command box appears. Use this box to configure how NetWorker sends the
notifications. You can use the nsrlog command to send the notifications to a log file or you
can send an email notification.
The default notification action is to send the information to the
policy_notifications.log file. By default, the policy_notifications.log file is
located in the /nsr/logs directory on Linux and in the C:\Program Files\EMC
NetWorker\nsr\logs folder on Windows.
Use the default mailer program on Linux to send email messages or the smtpmail
application on Windows:
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
where:
n -s subject—Includes a standard email header with the message and specifies the
subject text for that header. Without this option, the smtpmail program assumes
that the message contains a correctly formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to relay the SMTP
email message.
n recipient1@mailserver—Is the email address of the recipient of the notification.
Multiple email recipients are separated by a space.
21. From the Soft Limit list, select the amount of time after the action starts to stop the
initiation of new activities. The default value of 0 (zero) indicates no amount of time.
22. From the Hard Limit list, select the amount of time after the action starts to begin
terminating activities. The default value of 0 (zero) indicates no amount of time.
23. Optional, in Start Time specify the time to start the action.
Use the spin boxes to set the hour and minute values, and select one of the following
options from the drop-down list:
l Disabled—Do not enforce an action start time. The action will start at the time defined
by the workflow.
l Absolute—Start the action at the time specified by the values in the spin boxes.
l Relative—Start the action after the period of time defined in the spin boxes has elapsed
after the start of the workflow.
24. (Optional) Configure overrides for the task that is scheduled on a specific day.
To specify the month, use the navigation buttons and the month list box. To specify the
year, use the spin boxes. You can set an override in the following ways:
l Select the day in the calendar, which changes the action task for the specific day.
l Use the action task list to select the task, and then perform one of the following steps:
n To define an override that occurs on a specific day of the week, every week, select
Specified day, and then use the lists. Click Add Rules based override.
n To define an override that occurs on the last day of the calendar month, select Last
day of the month. Click Add Rules based override.
Note:
n You can edit or add the rules in the Override field.
n To remove an override, delete the entry from the Override field.
n If a schedule is associated to an action, then override option is disabled.
The oval icon specifies the group to which the workflow applies. The rounded rectangle icons
identify actions. The parallelogram icons identify the destination pool for the action.
l You can adjust the display of the visual representation by right-clicking and selecting one of
the following options:
n Zoom In—Increase the size of the visual representation.
n Zoom Out—Decrease the size of the visual representation.
n Zoom Area—Limit the display to a single section of the visual representation.
n Fit Content—Fit the visual representation to the window area.
n Reset—Reset the visual representation to the default settings.
n Overview—View a separate dialog box with a high-level view of the visual representation
and a legend of the icons.
l You can view and edit the properties for the group, action, or destination pool by right-clicking
the icon for the item, and then select Properties.
l You can create a group, action, or destination pool by right-clicking the icon for the item, and
then select New.
Note: To use Data Domain with NetWorker, the NetWorker server hostname should be in lower
case. Data Domain functions with lowercase and DD Cloud tier operations fails if it is mixed
case.
Clone formats
Yo can clone data that is stored on a Data Domain device in one of two formats, which depend on
the target media device:
l CCR format
l Regular clone format
CCR requirements
Before you use CCR to clone data, ensure that following requirements are met.
1. Ensure that both the source and target storage nodes are clients of the same NetWorker
server.
2. Ensure that the Data Domain systems are properly licensed, including a replication license,
which is required to create optimized clones.
3. Ensure that the Client resource for the NetWorker server and both storage nodes specify all of
the host identifiers in the Aliases attribute.
Cloning by pools
To copy save sets from Data Domain storage to a Data Domain device, you must specify a pool.
This pool is known as a "clone pool." A clone pool must be assigned to a device on the target Data
Domain system, where it will be available for use.
There are two main purposes for a clone pool:
l To copy existing deduplicated VTL or CIFS/NFS AFTD save sets to a Data Domain device.
l To copy the existing save sets from one Data Domain device to another Data Domain device,
typically at a remote location for disaster recovery purposes.
Clone formats
The type of NetWorker clone you produce depends on the type of storage media you use for the
clone. NetWorker will use either CCR when cloning to DD Boost devices or a normal clone when
cloning to conventional storage media.
CCR format
When NetWorker clones data from a source DD Boost device to a target DD Boost device, usually
at a geographically distant location, the operation uses CCR, also known as optimized clone or DD
format clone. CCR is a fast process that uses low bandwidth, multiple parallel sessions, and low
storage capacity. You can use CCR clones for data recovery or to create additional copies with
minimal impact on the primary operations of production, backup, or recovery.
CCR operations use only IP connectivity between DD Boost devices on separate Data Domain
systems, whether you have configured the participating devices for FC or IP.
For CCR operations on the same Data Domain system, Dell EMC recommends that you replicate
the data between two different SUs (MTrees), so you can apply different retention policies and
manage the data independently. When you perform CCR operations to disks that reside within the
same Data Domain system, CCR uses fast copy operation.
During the CCR process, the storage node reviews the incoming clone for data that NetWorker
has already stored on the target DD Boost device. The storage node stores only unique data that
does not exist on the device.
Note: When you perform a collection replication of a Data Domain system, the NetWorker
software is not aware of any DD Boost devices on that system. Additional procedures,
tests, and qualifications are required to configure NetWorker to detect the devices and
enable data recovery of the replicated DD Boost data. Contact Dell EMC Professional
services for assistance.
Note: Do not use the Default Clone Pool. You cannot change the Media type required
setting.
About this task
Complete the following steps to configure the network environment for CCR:
Procedure
1. Ensure that you have enabled valid licenses to the Data Domain systems that you will use for
CCR operations, including a Replication license.
2. Ensure that the source and destination storage nodes are within the same datazone. A single
NetWorker server must manage the clone operations and maintain the retention policies for
all cloned copies. The server also monitors and reports on the storage operations.
3. Ensure Ethernet IP connectivity between the source and destination Data Domain systems.
CCR occurs only over TCP/IP connectivity. If a DD Boost device participating in the CCR
also has an FC connection, ensure IP access to the DD Boost device.
4. Ensure that you map the Data Domain FC server name to the IP address, if the Domain FC
and IP hostnames differ.
Note: Do not use connections with ifgroup links for clone operations.
Data Domain FC and IP hostnames are the same by default but they can be different. If they
are different you must map the host Data Domain FC server name to its own IP address as
follows:
a. Open the Data Domain Enterprise Manager, and navigate to the Data Management > DD
Boost. The Data Domain Server Name appears on the Fibre Channel tab.
Alternatively, type the following command:
b. Associate this server name to the IP address in the /etc/hosts file with the following
command:
net hosts add fc_server_name IP_address
For example, if the Data Domain system has the IP address 10.99.99.99 and the IP
hostname dd555-5.lss.mcm.com, and the DFC server name is dd-tenendo, then type the
following command:
global-authentication-mode none
global-encryption-strength none
l The save set file being copied is large enough for the use of AMS to provide an improvement
over normal replication.
l All save set types other than VBA, vProxy, Hyper-V, BBB, and synthetic full. The exception is
for Microsoft NMM Exchange module save sets, where AMS is used even though it uses BBB
and synthetic full.
Enable AMS, if the underlying bandwidth between two DDRs is 10Gbps. Because the use of AMS
creates multiple streams, there must be enough bandwidth between the two DDRs being used for
the clone workflow.
The nsrcloneconfig file enables you to add debug flags, control cloning sessions, and use the
AMS functionality. It must be manually created under the /nsr/debug folder.
By default, AMS is disabled. To enable AMS, ensure that the ams_enabled flag is set to Yes.
The following table describes the nsrcloneconfig file details and their default values.
Debug 9
Note: The Backup Data Management chapter describes how you can clone save sets manually
by using the nsrclone command.
2. Create a policy. When you create a policy, you specify the name and notification settings for
the policy.
3. Within the policy, create a workflow. When you create a workflow, you specify the name of
the workflow, the schedule for running the workflow, notification settings for the workflow,
and the protection group to which the workflow applies.
4. Create one or more clone actions for the workflow.
Procedure
1. In the Administration window, click Protection.
2. In the expanded left pane, right-click Groups, and then select New.
The Create Group dialog box appears, starting with the General tab.
3. In the Name field, type a name for the group.
The maximum number of characters for the group name is 64.
l Legal Characters: _ : - + = # , . % @
l Illegal Characters: /\*?[]()$!^;'"`~><&|{}
7. Specify one or more of the save set criteria in the following table.
Note: When you specify more than one save set criteria, the list of save sets only
includes save sets that match all the specified criteria.
Criteria Description
Date and time range Specify the start date and time range for the save sets.
To specify the current date and time as the end date for the range,
select Up to now.
Backup level In the Filter save sets by level section, next to the backup level for
the save set, select the full checkbox.
Note: Only the full backup level is applicable for network-attached
storage (NAS) devices.
Limit the number of Specify the number for the limit in the Limit number of clones list.
clones The clone limit is the maximum number of clone instances that can be
created for the save set. By default, the value is set to 1, and cannot
be changed for NAS or Block.
Note: When this criteria is set to 1, which is the default value, you
may experience volume outage issues with Data Domain and
advanced file type devices.
Client Next to one or more client resources that are associated with the save
set in the Client list, select the checkbox.
Policy Next to the policy used to generate the save set in the Policy list,
select the checkbox.
Workflow Next to the workflow used to generate the save set in the Workflow
list, select the checkbox.
Action Next to the action used to generate the save set in the Action list,
select the checkbox.
Group Next to the group associated with the save set in the Group list,
select the checkbox.
Pools Next to the media pool on which the save set is stored in the Pools
list, select the checkbox.
Note: You cannot select Pools for NAS.
Name In the Filter save sets by name field, specify the name of the save
set.
Note: You cannot use wildcards to specify the save set name.
If you specify multiple criteria, the save set must match all the criteria to belong to the
group.
8. To specify the Restricted Data Zone (RDZ) for the group, select the Restricted Data Zones
tab, and then select the RDZ from the list.
9. Click OK.
Creating a policy
Procedure
1. In the Administration window, click Protection.
2. In the expanded left pane, right-click Policies, and then select New.
The Create Policy dialog box appears.
3. On the General tab, in the Name field, type a name for the policy.
The maximum number of characters for the policy name is 64.
l Legal Characters: _ : - + = # , . % @
l Illegal Characters: /\*?[]()$!^;'"`~><&|{}
Note: After you create a policy, the Name attribute is read-only.
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
where:
n -s subject—Includes a standard email header with the message and specifies the
subject text for that header. Without this option, the smtpmail program assumes
that the message contains a correctly formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to relay the SMTP
email message.
n recipient1@mailserver—Is the email address of the recipient of the notification.
Multiple email recipients are separated by a space.
7. To specify the Restricted Data Zone (RDZ) for the policy, select the Restricted Data
Zones tab, and then select the RDZ from the list.
8. Click OK.
After you finish
Create the workflows and actions for the policy.
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
where:
n -s subject—Includes a standard email header with the message and specifies the
subject text for that header. Without this option, the smtpmail program assumes
that the message contains a correctly formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to relay the SMTP
email message.
n recipient1@mailserver—Is the email address of the recipient of the notification.
Multiple email recipients are separated by a space.
8. In the Running section, perform the following steps to specify when and how often the
workflow runs:
a. To ensure that the actions that are contained in the workflow run when the policy or
workflow starts, in the Enabled box, leave the option selected. To prevent the actions in
the workflow from running when the policy or workflow that contains the action starts,
clear this option.
b. To start the workflow at the time that is specified in the Start time attribute, on the
days that are defined in the action resource, in the AutoStart Enabled box, leave the
option selected. To prevent the workflow from starting at the time that is specified in the
Start time attribute, clear this option.
c. To specify the time to start the actions in the workflow, in the Start Time attribute, use
the spin boxes.
The default value is 9:00 PM.
d. To specify how frequently to run the actions that are defined in the workflow over a 24-
hour period, use the Interval attribute spin boxes. If you are performing transaction log
backup as part of application-consistent protection, you must specify a value for this
attribute in order for incremental transaction log backup of SQL databases to occur.
The default Interval attribute value is 24 hours, or once a day. When you select a value
that is less than 24 hours, the Interval End attribute appears. To specify the last start
time in a defined interval period, use the spin boxes.
e. To specify the duration of time in which NetWorker can manually or automatically restart
a failed or canceled workflow, in the Restart Window attribute, use the spin boxes.
If the restart window has elapsed, NetWorker considers the restart as a new run of the
workflow. NetWorker calculates the restart window from the start of the last incomplete
workflow. The default value is 24 hours.
For example, if the Start Time is 7:00 PM, the Interval is 1 hour, and the Interval End is
11:00 PM., then the workflow automatically starts every hour beginning at 7:00 PM. and
the last start time is 11:00 PM.
l If the action is part of a sequence of actions in a workflow path, in the Previous box,
select the action that should precede this action.
l If the action should run concurrently with an action, in the Previous box, select the
concurrent action, and then select the Concurrent checkbox.
8. Specify a weekly, monthly, or reference schedule for the action:
l To specify a schedule for each day of the week, select Define option under Select
Schedule and period as Weekly by day.
l To specify a schedule for each day of the month, select Define option under Select
Schedule and period as Monthly by day.
l To specify a customized schedule to the action, select Select option under Select
Schedule and choose a customized schedule using the drop down menu that is already
created under NSR schedule resource.
9. Specify the days to perform cloning:
l To clone on a specific day, click the Execute icon on the day.
l To skip a clone on a specific day, click the Skip icon on the day.
l To check connectivity every day, select Execute from the list, and then click Make All.
The following table provides details on the icons.
c. In the Delete source save sets after clone completes box, select the option to instruct
NetWorker to move the data from the source volume to the destination volume after
clone operation completes. This is equivalent to staging the save sets.
d. From the Destination pool list, select a clone pool.
To clone to a DD Cloud Tier device, select a Cloud Tier pool.
e. From the Retention list, specify the amount of time to retain the cloned save sets.
After the retention period expires, the save sets are marked as recyclable during an
expiration server maintenance task.
12. Select the Apply DD Retention Lock checkbox to enable Retention Lock for the save sets
included in this clone action. Note that the device used for cloning these save sets must also
have DD Retention lock enabled in the Device Properties window or during device creation.
13. In the DD Retention Lock Time box, specify the duration the save sets will remain on the
Data Domain device before the Retention Lock expires. During this time, these save sets
cannot be overwritten, modified, or deleted for the duration of the retention period,
although the device with the cloned backup can be mounted and unmounted. The retention
time period set here must fall within the minimum and maximum values set for the Data
Domain Mtree, and should be lower than or equal to the NetWorker Retention Period.
14. In the Filters section, define the criteria that NetWorker uses to create the list of eligible
save sets to clone. The eligible save sets must match the requirements that are defined in
each filter. NetWorker provides the following filter options:
a. Time filter—In the Time section, specify the time range in which NetWorker searches
for eligible save sets to clone in the media database. Use the spin boxes to specify the
start time and the end time. The Time filter list includes the following options to define
how NetWorker determines save set eligibility, based on the time criteria:
l Do Not Filter—NetWorker inspects the save sets in the media database to create a
clone save set list that meets the time filter criteria.
l Accept—The clone save set list includes save sets that are saved within the time
range and meet all the other defined filter criteria.
l Reject—The clone save set list does not include save sets that are saved within the
time range and meet all the other defined filter criteria.
b. Save Set filter—In the Save Set section, specify whether to include or exclude
ProtectPoint and Snapshot save sets, when NetWorker searches for eligible save sets to
clone in the media database. The Save Set filter list includes to the following options
define how NetWorker determines save set eligibility, based on the save set filter
criteria:
l Do Not Filter—NetWorker inspects the save sets in the media database to create a
clone save set list that meets the save set filter criteria.
l Accept—The clone save set list includes eligible ProtectPoint save sets or Snapshot
save sets, when you also enable the ProtectPoint checkbox or Snapshot checkbox.
l Reject—The clone save set list does not include eligible ProtectPoint save sets and
Snapshot save sets when you also enable the ProtectPoint checkbox or Snapshot
checkbox.
Note: For NAS device, only Snapshot save set is applicable.
c. Clients filter—In the Client section, specify a list of clients to include or exclude, when
NetWorker searches for eligible save sets to clone in the media database. The Client
filter list includes the following options, which define how NetWorker determines save
set eligibility, based on the client filter criteria:
l Do Not Filter—NetWorker inspects the save sets that are associated with the clients
in the media database, to create a clone save set list that meets the client filter
criteria.
l Accept—The clone save set list includes eligible save sets for the selected clients.
l Reject—The clone save set list does not include eligible save sets for the selected
clients.
d. Levels filter—In the Levels section, specify a list of backup levels to include or exclude,
when NetWorker searches for eligible save sets to clone in the media database. The
Levels filter list includes the following options define how NetWorker determines save
set eligibility, based on the level filter criteria:
l Do Not Filter—NetWorker inspects the save sets regardless of the level in the media
database, to create a clone save set list that meets all the level filter criteria.
l Accept—The clone save set list includes eligible save sets with the selected backup
levels.
l Reject—The clone save set list does not include eligible save sets with the selected
backup levels.
Note: For NAS device, only full backup level is applicable.
17. In the Parallelism field, specify the maximum number of concurrent operations for the
action. This is applicable if multiple rollover is implemented at an action level.
18. From the Failure Impact list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the current action if there is a failure with one of the jobs, but continue with
subsequent actions in the workflow, select Abort action.
Note: The Abort action option applies to probe actions, and the backup actions for
the Traditional and Snapshot action types.
l To abort the entire workflow if there is a failure with one of the jobs in the action, select
Abort workflow.
Note: If any of the actions fail in the workflow, the workflow status does not appear as
interrupted or cancelled. NetWorker reports the workflow status as failed.
19. From the Send Notifications list box, select whether to send notifications for the action:
l To use the notification configuration that is defined in the Policy resource to send the
notification, select Set at policy level.
l To send a notification on completion of the action, select On Completion.
l To send a notification only if the action fails to complete, select On Failure.
20. In the Send notification attribute, when you select the On Completion option or On failure
option, the Command box appears. Use this box to configure how NetWorker sends the
notifications. You can use the nsrlog command to send the notifications to a log file or you
can send an email notification.
The default notification action is to send the information to the
policy_notifications.log file. By default, the policy_notifications.log file is
located in the /nsr/logs directory on Linux and in the C:\Program Files\EMC
NetWorker\nsr\logs folder on Windows.
Use the default mailer program on Linux to send email messages or the smtpmail
application on Windows:
l To send notifications to a file, type the following command, where
policy_notifications.log is the name of the file:
nsrlog -f policy_notifications.log
where:
n -s subject—Includes a standard email header with the message and specifies the
subject text for that header. Without this option, the smtpmail program assumes
that the message contains a correctly formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to relay the SMTP
email message.
n recipient1@mailserver—Is the email address of the recipient of the notification.
Multiple email recipients are separated by a space.
21. From the Soft Limit list, select the amount of time after the action starts to stop the
initiation of new activities. The default value of 0 (zero) indicates no amount of time.
22. From the Hard Limit list, select the amount of time after the action starts to begin
terminating activities. The default value of 0 (zero) indicates no amount of time.
23. Optional, in Start Time specify the time to start the action.
Use the spin boxes to set the hour and minute values, and select one of the following
options from the drop-down list:
l Disabled—Do not enforce an action start time. The action will start at the time defined
by the workflow.
l Absolute—Start the action at the time specified by the values in the spin boxes.
l Relative—Start the action after the period of time defined in the spin boxes has elapsed
after the start of the workflow.
24. (Optional) Configure overrides for the task that is scheduled on a specific day.
To specify the month, use the navigation buttons and the month list box. To specify the
year, use the spin boxes. You can set an override in the following ways:
l Select the day in the calendar, which changes the action task for the specific day.
l Use the action task list to select the task, and then perform one of the following steps:
n To define an override that occurs on a specific day of the week, every week, select
Specified day, and then use the lists. Click Add Rules based override.
n To define an override that occurs on the last day of the calendar month, select Last
day of the month. Click Add Rules based override.
Note:
n You can edit or add the rules in the Override field.
n To remove an override, delete the entry from the Override field.
n If a schedule is associated to an action, then override option is disabled.
The oval icon specifies the group to which the workflow applies. The rounded rectangle icons
identify actions. The parallelogram icons identify the destination pool for the action.
You can work directly in the visual representation of a workflow to perform the following tasks:
l You can adjust the display of the visual representation by right-clicking and selecting one of
the following options:
n Zoom In—Increase the size of the visual representation.
n Zoom Out—Decrease the size of the visual representation.
n Zoom Area—Limit the display to a single section of the visual representation.
n Fit Content—Fit the visual representation to the window area.
n Reset—Reset the visual representation to the default settings.
n Overview—View a separate dialog box with a high-level view of the visual representation
and a legend of the icons.
l You can view and edit the properties for the group, action, or destination pool by right-clicking
the icon for the item, and then select Properties.
l You can create a group, action, or destination pool by right-clicking the icon for the item, and
then select New.
Note: The amount of data and length of time that is required to complete the backup can
impact the ability to clone data when the backup and clone workflows are in the same policy.
For example, if the clone action starts before the backup action completes, there might not be
any data yet to clone, or in other cases, only the save sets that completed at the start time of
the workflow is taken into account. In both cases, NetWorker marks the Clone Workflow as
successful, but there is no guarantee that all the data from the backup workflow was cloned.
l Create a basic client group for a workflow that performs a traditional backup of the a client file
system followed by cloning of the save sets that result from the backup. In this case,
concurrent cloning can be enabled.
l Create a query group that identifies full save sets in the last two days to clone.
Criteria Description
Date and time range Specify the start date and time range for the save sets.
To specify the current date and time as the end date for the range,
select Up to now.
Backup level In the Filter save sets by level section, next to the backup level for
the save set, select the full checkbox.
Note: Only the full backup level is applicable for network-attached
storage (NAS) devices.
Limit the number of Specify the number for the limit in the Limit number of clones list.
clones The clone limit is the maximum number of clone instances that can be
created for the save set. By default, the value is set to 1, and cannot
be changed for NAS or Block.
Note: When this criteria is set to 1, which is the default value, you
may experience volume outage issues with Data Domain and
advanced file type devices.
Client Next to one or more client resources that are associated with the save
set in the Client list, select the checkbox.
Policy Next to the policy used to generate the save set in the Policy list,
select the checkbox.
Workflow Next to the workflow used to generate the save set in the Workflow
list, select the checkbox.
Action Next to the action used to generate the save set in the Action list,
select the checkbox.
Group Next to the group associated with the save set in the Group list,
select the checkbox.
Pools Next to the media pool on which the save set is stored in the Pools
list, select the checkbox.
Note: You cannot select Pools for NAS.
Criteria Description
Name In the Filter save sets by name field, specify the name of the save
set.
Note: You cannot use wildcards to specify the save set name.
If you specify multiple criteria, the save set must match all the criteria to belong to the
group.
8. To specify the Restricted Data Zone (RDZ) for the group, select the Restricted Data Zones
tab, and then select the RDZ from the list.
9. Click OK.
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
where:
n -s subject—Includes a standard email header with the message and specifies the
subject text for that header. Without this option, the smtpmail program assumes
that the message contains a correctly formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to relay the SMTP
email message.
n recipient1@mailserver—Is the email address of the recipient of the notification.
Multiple email recipients are separated by a space.
8. In the Running section, perform the following steps to specify when and how often the
workflow runs:
a. To ensure that the actions that are contained in the workflow run when the policy or
workflow starts, in the Enabled box, leave the option selected. To prevent the actions in
the workflow from running when the policy or workflow that contains the action starts,
clear this option.
b. To start the workflow at the time that is specified in the Start time attribute, on the
days that are defined in the action resource, in the AutoStart Enabled box, leave the
option selected. To prevent the workflow from starting at the time that is specified in the
Start time attribute, clear this option.
c. To specify the time to start the actions in the workflow, in the Start Time attribute, use
the spin boxes.
The default value is 9:00 PM.
d. To specify how frequently to run the actions that are defined in the workflow over a 24-
hour period, use the Interval attribute spin boxes. If you are performing transaction log
backup as part of application-consistent protection, you must specify a value for this
attribute in order for incremental transaction log backup of SQL databases to occur.
The default Interval attribute value is 24 hours, or once a day. When you select a value
that is less than 24 hours, the Interval End attribute appears. To specify the last start
time in a defined interval period, use the spin boxes.
e. To specify the duration of time in which NetWorker can manually or automatically restart
a failed or canceled workflow, in the Restart Window attribute, use the spin boxes.
If the restart window has elapsed, NetWorker considers the restart as a new run of the
workflow. NetWorker calculates the restart window from the start of the last incomplete
workflow. The default value is 24 hours.
For example, if the Start Time is 7:00 PM, the Interval is 1 hour, and the Interval End is
11:00 PM., then the workflow automatically starts every hour beginning at 7:00 PM. and
the last start time is 11:00 PM.
9. In the Groups group box, specify the protection group to which the workflow applies.
To use a group, select a protection group from the Groups list. To create a protection
group, click the + button that is located to the right of the Groups list.
10. Click Add.
The Policy Action Wizard appears.
11. In the Name field, type the name of the action.
The maximum number of characters for the action name is 64.
l Legal Characters: _ : - + = # , . % @
l Illegal Characters: /\*?[]()$!^;'"`~><&|{}
c. Clients filter—In the Client section, specify a list of clients to include or exclude, when
NetWorker searches for eligible save sets to clone in the media database. The Client
filter list includes the following options, which define how NetWorker determines save
set eligibility, based on the client filter criteria:
l Do Not Filter—NetWorker inspects the save sets that are associated with the clients
in the media database, to create a clone save set list that meets the client filter
criteria.
l Accept—The clone save set list includes eligible save sets for the selected clients.
l Reject—The clone save set list does not include eligible save sets for the selected
clients.
d. Levels filter—In the Levels section, specify a list of backup levels to include or exclude,
when NetWorker searches for eligible save sets to clone in the media database. The
Levels filter list includes the following options define how NetWorker determines save
set eligibility, based on the level filter criteria:
l Do Not Filter—NetWorker inspects the save sets regardless of the level in the media
database, to create a clone save set list that meets all the level filter criteria.
l Accept—The clone save set list includes eligible save sets with the selected backup
levels.
l Reject—The clone save set list does not include eligible save sets with the selected
backup levels.
Note: For NAS device, only full backup level is applicable.
23. In the Parallelism field, specify the maximum number of concurrent operations for the
action. This is applicable if multiple rollover is implemented at an action level.
24. From the Failure Impact list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the current action if there is a failure with one of the jobs, but continue with
subsequent actions in the workflow, select Abort action.
Note: The Abort action option applies to probe actions, and the backup actions for
the Traditional and Snapshot action types.
l To abort the entire workflow if there is a failure with one of the jobs in the action, select
Abort workflow.
Note: If any of the actions fail in the workflow, the workflow status does not appear as
interrupted or cancelled. NetWorker reports the workflow status as failed.
25. From the Send Notifications list box, select whether to send notifications for the action:
l To use the notification configuration that is defined in the Policy resource to send the
notification, select Set at policy level.
l To send a notification on completion of the action, select On Completion.
l To send a notification only if the action fails to complete, select On Failure.
26. In the Send notification attribute, when you select the On Completion option or On failure
option, the Command box appears. Use this box to configure how NetWorker sends the
notifications. You can use the nsrlog command to send the notifications to a log file or you
can send an email notification.
The default notification action is to send the information to the
policy_notifications.log file. By default, the policy_notifications.log file is
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
mail -s subject recipient
l On Window, to send a notification email, type the following command:
where:
n -s subject—Includes a standard email header with the message and specifies the
subject text for that header. Without this option, the smtpmail program assumes
that the message contains a correctly formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to relay the SMTP
email message.
n recipient1@mailserver—Is the email address of the recipient of the notification.
Multiple email recipients are separated by a space.
27. From the Soft Limit list, select the amount of time after the action starts to stop the
initiation of new activities. The default value of 0 (zero) indicates no amount of time.
28. From the Hard Limit list, select the amount of time after the action starts to begin
terminating activities. The default value of 0 (zero) indicates no amount of time.
29. (Optional) Configure overrides for the task that is scheduled on a specific day.
To specify the month, use the navigation buttons and the month list box. To specify the
year, use the spin boxes. You can set an override in the following ways:
l Select the day in the calendar, which changes the action task for the specific day.
l Use the action task list to select the task, and then perform one of the following steps:
n To define an override that occurs on a specific day of the week, every week, select
Specified day, and then use the lists. Click Add Rules based override.
n To define an override that occurs on the last day of the calendar month, select Last
day of the month. Click Add Rules based override.
Note:
n You can edit or add the rules in the Override field.
n To remove an override, delete the entry from the Override field.
n If a schedule is associated to an action, then override option is disabled.
Clone reports
You can use the NMC Reports view to access reports of NetWorker clone operations on a Data
Domain system. Generating reports on page 169 provides details.
The following figure provides an example of the mminfo output for a save set that resides on a
Cloud Tier device and does not yet reside in the public cloud.
Figure 50 mminfo output for Cloud Tier save set
Using NMC to review the status of a save set cloned to a Cloud Tier device
Use the Save set window to review the status of save set on a Cloud Tier device. A T flag appears
in the Save Set Flags column for a save set that resides on a Cloud Tier device but does not yet
reside in the public cloud.
To review the status of a save set on a Cloud Tier device, perform the following steps:
1. Connect to the NetWorker server by using NMC, and then on the Administration window,
click Media.
2. On the left navigation pane, select Save Sets.
3. Click the Save Set List tab.
4. (Optional) From the View menu, select Choose Table Columns, and then select Save Set
Flags.
The Save Set Flags column displays a T for a save set that resides on a Cloud Tier device but does
not yet reside in the public cloud.
Procedure
1. In the Administration window, click Devices.
2. In the left navigation pane, select Staging.
3. From the File menu, select New.
The Create Staging dialog box appears, starting with the General tab.
4. In the Name box, type a name for the staging policy.
5. In the Comment attribute, type a description for the staging policy.
6. In the Enabled attribute, select Yes to enable the staging policy or No to disable the staging
policy.
When you select Yes, NetWorker automatically starts the staging policy, based on the
configuration settings that you define.
7. In the Devices attribute, select the check boxes next to each source device from which you
want to stage data.
You can assign multiple devices to a single staging policy. However, you cannot assign a
single device to multiple staging policies.
8. In the Destination pool attribute, select a DD Cloud Tier pool. For example, DD Cloud Tier
Default Clone.
9. In the Configuration group box, specify the criteria that starts the staging policy.
The following table summarizes the available criteria that you can define for the staging
policy.
High water mark Use these options to start the stage policy based on the amount of
(%) used disk space on the file system partition on the source device. You
must define a value higher than the value defined in the Low water
Low water mark (%)
mark (%) attribute.
High water mark (%)—Defines the upper used disk space limit. When
the percentage of used disk space reaches the value that is defined in
the High water
mark (%) attribute, NetWorker starts the stage operation to move
save sets from the source disk.
Low water mark (%)—Defines the lower used disk space limit. When
the
percentage of used disk space reaches the value that is defined in the
Lower water mark (%) attribute, NetWorker stops moving save
sets from the source disk.
Save set selection Use this option to rank the order in which NetWorker stages the save
sets, based on save set size or age. Available values include:
l largest save set—Stage the save sets in order of largest save set
size to smallest save set size.
l oldest save set —Stage the save sets in order of oldest save set
to most recent save set.
l smallest save set—Stage the save sets in order of smallest save
set size to largest save set size.
Max storage period Use this option to start the stage operation based on the amount of
time that a save set has resided on the volume.
Max storage period
unit l Max storage period—Defines the number of hours or days that a
save set can reside on a volume before the stage process considers
the save eligible to move to a different volume.
l Max storage period unit—Defines the unit of measurement for
the value in the max storage period attribute. Available values are
Hours and Days.
The maximum storage period setting is used along with the file system
check interval. Once the maximum storage period is reached, staging
does not begin until the next file system check.
Recover space Use this option to determine when the stage operation removes the
interval successfully staged save set from the source volume.
File system check Use this option to define when NetWorker automatically starts the
interval staging process.
l File System Check Interval—Defines the frequency in which
NetWorker starts the staging process. At every file system check
interval, if either the high water mark or the maximum storage
period has been reached, then staging begins.
l File system check unit—Defines the unit of measurement for the
value in the file system check interval attribute. Available values are
Hours and Days.
Note:
For a Linux client with 2 GB of (RAM), it is recommended that you recover only up to a
maximum of 3500 files at a time. If you try to recover more than this limit, an error message
similar to the following appears:
readv from DD failed for read size 262144: Reading from a file failed
recover: Reading from a file failed [5001] ([31587] [140129876305664] ddp_read()
failed Offset 0, BytesToRead 262144, BytesRead 0 Err: 5001-Unable to allocate file
ddcl buffers rec_create: out of memory.
3. Modify the Client resource for the client that will receive the restored data.
l Configure this client for Client Direct and IP connectivity.
l On the Globals (2 of 2) tab, in the Recovery storage nodes field, specify the storage
node that you associated with the IP-enabled DD Boost device.
Note: This option is now only available in the Diagnostic Mode view.
4. Mount the volume on the new IP-enabled DD Boost device and perform the restore by using
the new IP-restore Client resource.
Disaster recovery
A disaster is defined as the loss of data where the computing environment required to restore that
data is not available. Disaster recovery is necessary when ordinary data recovery procedures are
not sufficient to recover the computing environment and its data to normal day-to-day operations.
Causes of disaster
A disaster can result from any of the following situations:
l Debilitating hardware or software failures
l Computer viruses that corrupt the computing system
l Infrastructure interruptions, inconsistencies, or loss of services, such as problems with
communications or network connections that result in damage to the computing environment
Potential losses
Disaster recovery of the primary site must cover the potential loss of one of more of the following
systems at the primary site:
l The Data Domain server that stores the deduplicated client backups
l The NetWorker storage node that stores the deduplication metadata for the backups
l The NetWorker server that stores the metadata for the backups in the media database and
client file indexes
n The Devices area shows the following device and usage information:
4. On the Configure SNMP monitoring tab, type a value for SNMP Community String. The
typical setting is public, which allows all users to monitor events.
5. In the SNMP Process Port field, type a value for the port that the Data Domain system
uses for SNMP traps. Firewall requirements provides details.
6. In the SNMP Traps section, select the SNMP traps that you want to monitor. Some traps
are pre-selected. The following figure shows an example for Data Domain 5 alerts. Other
versions might differ.
7. Click OK.
Generating reports
You can use the NetWorker Management Console (NMC) Reports view to create statistical
reports of NetWorker with Data Domain backup, recovery, and cloning activities.
Configuring a report
You can configure and display a Data Domain report for backup or clone activities in the
NetWorker Management Console (NMC).
Procedure
1. In the NetWorker Management Console window, click Reports.
2. Expand the Reports folder, expand the Legacy Reports folder, and then the Data Domain
Statistics folder. Select the report that you want to view.
Note: The types of reports include summary, statement, and details.
The Configure tab for the selected report type appears in the right panel.
3. In the Configure tab, configure the items that you want to include in the report. Select the
item parameters and click the Remove, Add, Remove All , or Add All buttons as required.
The specific parameters that are available depend on the type of report that you select.
If you do not specify Save Time values, the report displays all the available data. The
following table lists details of report configuration parameters.
Save Set Name Specifies one or more save Selected save set names
sets. Values are case-
sensitive and you cannot use
wildcard characters.
Note: Monthly report
does not include the Save
Set Name parameter.
For clone operations, no specific reports are available. You can query and list the copies of save
sets in the NetWorker Administration, Media view, under Save Sets.
Basic reports
A basic report displays statistics for a specific datazone component, a time span, or a field. You
can view reports within the NetWorker Management Console (NMC) Enterprise Reports window,
and also modify the scope of a basic report by adjusting the parameters.
The following table describes the basic reports that are available for Data Domain statistics.
Client Summary For all or specified clients, displays the following statistics:
l Amount of data—Amount of the data that NetWorker
would have moved by using a conventional backup
(protected data).
l Target size—Size of the data after deduplication has
taken place on the Data Domain system (stored data).
l Deduplication ratio—Percentage of savings by using Data
Domain deduplication.
Save Set Summary For all or specified save sets, displays the following
deduplication statistics:
l Amount of data—Amount of the data that NetWorker
would have moved by using a conventional backup.
l Target size—Size of the data after deduplication has
taken place on the Data Domain system.
l Deduplication ratio—Percentage of disk space that is
saved by using deduplication.
l Number of save sets—Number of save sets in the backup.
l Number of files—Number of files in the save set.
Save Set Details Displays details about each save set, including backup duration
and the following statistics:
l Server Name
l Save Set Name and ID
l DD Retention Lock Type
l DD Retention Locked Till
l Action Type
l Policy Name
l Workflow and Workflow Start Time
l Status
l Save Set size—Protected data size
l Target size—Size of the data after deduplication has
taken place on the Data Domain system (stored data size).
l Deduplication ratio—Percentage of savings by using
deduplication.
l Number of files—Number of files in the save set.
Drill-down reports
A drill-down report consists of multiple basic reports, which are connected as layers and all
configured with the same parameters that the top layer uses.
You can run reports for groups, clients, or save sets. You can view reports within the NetWorker
Management Console (NMC) Enterprise Reports window, and also modify the scope of a report
by adjusting the parameters.
The following table lists the drill-down reports that are available for Data Domain statistics.
Advanced reporting
The NetWorker Management Console (NMC) provides reports for only the recent backup history
in a specific datazone. The optional Data Protection Advisor (DPA) software can provide extended
reports of backups, trends, and analysis for one or multiple datazones, including reports of Data
Domain systems. DPA is best for larger environments where you require additional analysis with
forecasts and trends.
If the replacement storage node has a different name or if you use the NetWorker server as the
storage node, then you must re-create the devices in NetWorker as follows.
Procedure
1. Use NMC to connect to the NetWorker server. In the NetWorker Administration window,
select the Devices view, and then select Devices in the left navigation pane.
2. For each affected original remote storage node-based DD Boost device, right-click the
device, select Properties. Record the following information:
l On the General tab:
n Name
n Device Access Information
l On the Operations tab:
n Volume Name
n Volume Pool
3. Remove the original DD Boost devices from the NetWorker application. The device folders
continue to exist on the Data Domain system.
a. In the Devices view, from the Devices tree, right-click and unmount each affected
device. Mounted devices have a Volume Name.
b. In the Media view, from the Media Pool tree, right-click each affected media pool
(Volume Pool), select Properties, and on the Selection Criteria tab, remove each
affected device from the Target Devices list.
c. In the Devices view, from the Devices tree, right-click and delete each affected device.
4. Re-create the devices on the NetWorker application that is associated with a replacement
storage node.
a. In the Devices view, right-click the Data Domain systems tree, and then start the New
Device Wizard.
b. To access the system, specify the Data Domain system and DD Boost (OST) credentials.
c. On the Select Folders to use as Devices page, select the DD Boost devices (device
folders) that are associated with the failed storage node.
When you leave this page, a message notifies you that NetWorker previously associated
the devices with a different storage node. Confirm the selection.
d. On the Configure Pool Information page, specify the media pool for the devices, and
clear the Label and Mount selection. You must manually mount the devices on the new
storage node later in this procedure.
NOTICE If you enable Label and Mount at this point, NetWorker relabels the volume
and you lose all the data. You cannot undo this action.
e. On the Select the Storage Nodes page, select a storage node to handle the new
devices by doing one of the following.
l Select an existing storage node.
l Create a replacement storage node.
l Use the NetWorker server’s storage node.
The storage node must be running on the correct network and its hostname must be
resolvable by DNS.
Troubleshooting
The following sections will help you identify and resolve common issues of configuration and
operation.
Core dumps
The Data Domain system generates core dump files that provide detailed information about
process crashes.
To display a list of core dumps on the Data Domain system, log in to the Data Domain system
console as the sysadmin user, and then type the following command: support coredump list
Accessing Support Bundles and core dumps from a remote host
Use an NFS client to access Support Bundles and core dump files from a remote host, and to
transfer the files to a remote host.
Perform the following steps to access the Support Bundle or core dumps by using an NFS client:
1. On the Data Domain system:
a. To enable NFS, type: enable NFS
b. To provide NFS clients access to the Data Domain system, type: nfs add /ddvar *
2. On the NFS client:
a. Create a local folder, by typing: mkdir/nfsshare
b. Mount the NFS share on the Data Domain system to the nfsshare folder by typing: sudo
mount data_domain_system:/ddvar/nfsshare
where data_domain_system is the hostname or IP address of the Data Domain system.
c. Change to the directory /nfsshare/support
d. Type the ls command to display a list of Support Bundles on the Data Domain system.
e. Use the cp command to copy the files from the /nfsshare/support directory to a
location on the NFS client.
To determine when the data will move from the DD Cloud Tier device or troubleshoot why the data
movement operation has not completed, perform the following steps as the sysadmin user on the
Data Domain system:
1. Determine the data movement schedule, by typing the following command:
Note: Each mtree can have only one data movement policy.
2. Determine when the status of the last data movement operation, by typing the following
command:
data-movement status
3. Determine the data movement schedule, by typing the following command:
data-movement watch
The following output displays the status of a data movement operation that successfully moves
4 files:
Data-movement: phase 1 of 3 (copying)
100% complete; time: phase 0:02:20, total 0:02:31
Copied (post-comp): None, (pre-comp): 6.63 KiB,
Files copied: 4, Files verified: 0, Files installed: 0
Data-movement: phase 2 of 3 (verifying)
100% complete; time: phase 0:00:02, total 0:02:41
Copied (post-comp): None, (pre-comp): 6.63 KiB,
Note: If the data-movement watch command displays the following line: Files
copied: 0, Files verified: 0, Files installed: 0., then the operation did
not move any files. This can happen for one of the following reasons:
l The DD Cloud Tier devices does not contain data that is eligible for movement. In this
case, confirm that you cloned data to the DD Cloud Tier device.
l Cloud connectivity issues or other issues exist.
6. Display system alerts that might indicate why a data movement operation failed to copy files,
by typing the following command:
Data Domain system log files on page 175 provide more information about the logs files to
review to troubleshoot error messages.
3. To enable the device, in the Enabled column, right-click the device, and select Enable/
Disable.
Configuring the Data Domain system for DD Boost describes how to enable NFS access.
93124:recover: readv from DD failed for read size 262144: Reading from a file
failed ([5001] memory no longer available)
To avoid this error, export the following environment variable on the client shell.
LDR_CNTRL=MAXDATA=0x70000000
3. Configure the Data Domain Interface field of the NetWorker clients for FC.
Configuring a backup client with NMC property windows provides details.
2. Configure the Data Domain system for use with NetWorker. Configuring the Data Domain
system for DD Boost provides details.
3. If you plan to migrate existing save sets to the new DD Boost devices, migrate the save sets
before the scheduled redirected backups begin. Migration will “seed” the Data Domain
system and help to reduce the bandwidth requirements for future backups. Considerations
for migrating legacy save sets provides details.
4. Use the NMC Device Configuration wizard to perform the following tasks:
a. Select or create DD Boost devices on the Data Domain system.
b. Select or create a Pool resource that is configured to send the save sets to DD Boost
devices.
Note: The wizard creates and configures a pool for the Data Domain system that
uses only DD Boost devices.
c. Select or create a NetWorker storage node on which to label and mount the new devices.
d. Complete the wizard pages.
Configuring DD Boost devices with the NMC Device Configuration wizard on page 59
provides details.
5. Test the backup environment to ensure that the new configuration operates correctly and
that existing backups, that will not use DD Boost devices, continue to run as expected. For
backups to new devices, test a restore from those devices.
6. Start the redirection with a full backup to the new devices. This practice avoids a
dependency on the last full backup that is stored with the legacy storage environment and
the potential need to restore from two different environments.
7. Monitor backup performance, and adjust the backup schedule to optimize the configuration
for maximum throughput or additional clients. Monitoring Data Domain events, statistics,
and logs on page 166 provides details.
n Offers more flexible storage features for storage, recovery, and cloning, for example,
multiple concurrent operations.
n Maintains the NetWorker browse and retention policies and ensures that NetWorker
manages all save sets.
Migration methods
Data migration is a one-time NetWorker clone operation which you can customize to different
device types and time periods. You can include all the data in the migration or you can select a
limited amount of data from a specific timeframe or a specific backup type (for example, weekly
full backups).
The details of the migration procedure depend on the method that you use and the granularity of
the data that you want to migrate.
l To perform a NetWorker scheduled clone operation, refer to Migrating legacy save sets to DD
Boost devices.
l To run a NetWorker nsrclone script from a command line, refer to the NetWorker
Administration Guide for details.
l To perform a NetWorker staging (data movement) operation to move data from an AFTD,
refer to the NetWorker Administration Guide for details.
DD Boost devices. This reversion process occurs for both Data Domain and non-Data
Domain storage.
3. Create a clone pool for the DD Boost devices to be used for the migration:
l In the Data Source field, select groups for the migration.
Typically, you migrate the same groups that you selected for the redirection of backups.
Redirecting backups from other devices to DD Boost on page 182 provides details.
l In the Target Devices field, select the DD Boost devices to store the migrated data.
Creating pools to target DD Boost devices on page 94 provides details.
4. Configure a clone task with the Write Clone Data to Pool field that is selected for the clone
pool.
Road map for configuring a new cloning data protection policy on page 133 provides details
about the scheduled clone option.
5. Run the clone action, either according to its schedule or by a manual start.
To manually start the clone action, right-click the workflow that contains the clone action,
and select Start.
6. After the clone operation is completed, verify that the cloned data appears on the target
devices.
DD Boost Conversion and Upgrade on page 181 provides details about the verification of
NetWorker operations.
7. After you have verified the cloned save sets, remove the original save sets, as required.
8. If you remove the original save sets, remove unused devices and pools, as required. You
cannot delete a pool until you delete or relabel in other pools all the volumes that belong to
that pool.
9. To ensure that adequate storage capacity is available, monitor the Data Domain system.
Monitor a complete backup cycle of all clients, including save set expirations.
DD Boost Conversion and Upgrade on page 181 provides details.
Migration scenarios
You can migrate existing backup data from legacy devices or file systems to DD Boost devices. The
best scenario for your situation depends on the storage environment configuration and the
available capacities and bandwidth.
There are two scenarios for this type of migration. In the first case, you create the DD Boost
devices on a new storage node. In the second case, you create the devices on the existing storage
node.
l Although you use the same storage node for the same backup clients, you must change the
device allocations and the pools. These changes can add confusion and result in configuration
errors.
There are also advantages to this scenario. For smaller sites, to avoid network restrictions you can
migrate the data to new devices on the same storage node. This scenario could also be an option
for larger sites where you want to reuse multiple storage nodes or reconfigure the storage nodes
to share one or more Data Domain systems. You can configure a storage node for data migration to
seed the DD Boost devices as an interim step.
Figure 56 Migration from conventional storage to DD Boost devices on the same storage node
Figure 58 Migration from VTL to DD Boost devices on the same storage node
administrator Person who normally installs, configures, and maintains software on network
computers, and who adds users and defines user privileges.
advanced file type Disk storage device that uses a volume manager to enable multiple concurrent backup
device (AFTD) and recovery operations and dynamically extend available disk space.
authorization code Unique code that in combination with an associated enabler code unlocks the software
for permanent use on a specific host computer. See license key.
bootstrap Save set that is essential for disaster recovery procedures. The bootstrap consists of
three components that reside on the NetWorker server: the media database, the
resource database, and a server index.
client Host on a network, such as a computer, workstation, or application server whose data
can be backed up and restored with the backup server software.
Client Direct Feature that enables clients to deduplicate backup data and send it directly to AFTD or
DD Boost storage devices, bypassing the NetWorker storage node. The storage node
manages the backup devices but does not handle the backup data.
client file index Database maintained by the NetWorker server that tracks every database object, file,
or file system backed up. The NetWorker server maintains a single index file for each
client computer. The tracking information is purged from the index after the browse
time of each backup expires.
Client resource NetWorker server resource that identifies the save sets to be backed up on a client.
The Client resource also specifies information about the backup, such as the schedule,
browse policy, and retention policy for the save sets.
clone 1. Duplicate copy of backed-up data, which is indexed and tracked by the NetWorker
server. Single save sets or entire volumes can be cloned.
2. Type of mirror that is specific to a storage array.
clone-controlled Creation of a replica of deduplicated data copied from one DD Boost device to another,
replication (CCR) which can be scheduled by the NMC clone feature and is indexed and tracked by the
NetWorker server.
database 1. Collection of data arranged for ease and speed of update, search, and retrieval by
computer software.
2. Instance of a database management system (DBMS), which in a simple case might
be a single file containing many records, each of which contains the same set of
fields.
datazone Group of clients, storage devices, and storage nodes that are administered by a
NetWorker server.
DD Boost Optimized library and communication framework with a special Data Domain API that
allows the backup software to define and interact with storage devices on the Data
Domain system.
DD Boost device Logical storage device created on a Data Domain system that is used to store
deduplicated NetWorker backups. Each device appears as a folder on the Data Domain
system and is listed with a storage volume name in NMC.
deduplication backup Type of backup in which redundant data blocks are identified and only unique blocks of
data are stored. When the deduplicated data is restored, the data is returned to its
original native format.
deduplication ratio Reduction in storage space required to store data as a result of deduplication
technology, usually combined with data compression, for example, a 20:1 space
reduction.
device 1. Storage folder or storage unit that can contain a backup volume. A device can be a
tape device, optical drive, autochanger, or disk connected to the server or storage
node.
2. General term that refers to storage hardware.
3. Access path to the physical drive, when dynamic drive sharing (DDS) is enabled.
disaster recovery Restore and recovery of data and business operations in the event of hardware failure
or software corruption.
distributed segment Part of the DD Boost interface, which enables data deduplication to be performed on a
processing (DSP) host before the data is sent to the Data Domain system for storage.
group One or more client computers that are configured to perform a backup together,
according to a single designated schedule or set of conditions.
hostname Name or address of a physical or virtual host computer that is connected to a network.
ifgroup A private network configured on the Data Domain system consisting of multiple
network interfaces logically designated as a single group IP address. The ifgroup
provides dynamic load balancing, fault tolerance within the group, and better network
bandwidth usage than traditional network aggregation.
license key Combination of an enabler code and authorization code for a specific product release
to permanently enable its use. Also called an activation key.
managed application Program that can be monitored or administered, or both from the Console server.
media Physical storage, such as a disk file system or magnetic tape, to which backup data is
written. See volume.
media index Database that contains indexed entries of storage volume location and the life cycle
status of all data and volumes managed by the NetWorker server. Also known as media
database.
metadata Hash information that identifies stored sub-file information for deduplication, and is
required to revert deduplicated client backup data to the regular nondeduplicated
format.
MTree Shortened from "managed tree," also referred to as storage units, logical partition of
the namespace in a Data Domain file system that can be used to group a set of files for
management purposes. MTrees are normally associated with a single NetWorker
datazone.
NetWorker Management Software program that is used to manage NetWorker servers and clients. The NMC
Console (NMC) server also provides reporting and monitoring capabilities for all NetWorker processes.
NetWorker server Computer on a network that runs the NetWorker server software, contains the online
indexes, and provides backup and restore services to the clients and storage nodes on
the same network.
notification Message sent to the NetWorker administrator about important NetWorker events.
online indexes Databases located on the NetWorker server that contain all the information pertaining
to the client backups (client file index) and backup volumes (media index).
policy Set of defined rules for client backups that can be applied to multiple groups. Groups
have dataset, schedule, browse, and retention policies.
pool 1. NetWorker sorting feature that assigns specific backup data to be stored on
specified media volumes.
2. Collection of NetWorker backup volumes to which specific data has been backed
up.
recover To restore data files from backup storage to a client and apply transaction (redo) logs
to the data to make it consistent with a given point-in-time.
remote device 1. Storage device that is attached to a storage node that is separate from the
NetWorker server.
2. Storage device at an offsite location that stores a copy of data from a primary
storage device for disaster recovery.
replication Process of creating an exact copy of an object or data. This is different than
NetWorker cloning. See clone
resource Software component whose configurable attributes define the operational properties
of the NetWorker server or its clients. Clients, devices, schedules, groups, and policies
are all NetWorker resources.
restore To retrieve individual data files from backup media and copy the files to a client
without applying transaction logs.
retention policy NetWorker setting that determines the minimum period of time that backup data is
retained on a storage volume and available for recovery. After this time is exceeded,
the data is eligible to be overwritten.
save NetWorker command that backs up client files to backup media volumes and makes
data entries in the online index.
save set 1. Group of tiles or a file system copied to storage media by a backup or snapshot
rollover operation.
2. NetWorker media database record for a specific backup or rollover.
save stream Data and save set information that is written to a storage volume during a backup. A
save stream originates from a single save set.
scheduled backup Type of backup that is configured to start automatically at a specified time for a group
of one or more NetWorker clients. A scheduled backup generates a bootstrap save set.
storage node Computer that manages physically attached storage devices or libraries, whose backup
operations are administered from the controlling NetWorker server. Typically a
“remote” storage node that resides on a host other than the NetWorker server.
storage unit (SU) Logical unit of disk storage on a Data Domain system that is associated with a
NetWorker datazone.
trap Setting in an SNMP event management system to report errors or status messages.
virtual tape library (VTL) Software emulation of a physical tape library storage system.
volume 1. Unit of physical storage medium, such as a disk or magnetic tape, to which backup
data is written.
2. Identifiable unit of data storage that may reside on one or more computer disks.
volume name Name that you assign to a backup volume when it is labeled.