Transcript
Legacy Recovery-Series and UEB Administrator's Guide Release 9.0.0 Document Version 7.05192016
CONFIDENTIAL | ©2016 Unitrends | www.unitrends.com
2
Legacy Recovery-Series and UEB Administrator's Guide
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
3
Copyright Copyright © 2016 Unitrends Incorporated. All rights reserved. Content in this publication is copyright material and may not be copied or duplicated in any form without prior written permission from Unitrends, Inc (“Unitrends”). This information is subject to change without notice and does not represent a commitment on the part of Unitrends. The software described in this publication is furnished under a license agreement or nondisclosure agreement. The software may be used or copied only in accordance with the terms of the license agreement. See the End User License Agreement before using the software. The software described contains certain open source components that are copyrighted. For open source licenses, see the UnitrendsOpen Source Compliance section of the product Administrator’s Guide. Because of the nature of this material, numerous hardware and software products are mentioned by name. In most, if not all, cases these product names are claimed as trademarks by the companies that manufacture the products. It is not our intent to claim these names or trademarks as our own. The following applies to U.S. Government End Users: The Software and Documentation are “Commercial Items,” as that term is defined at 48 C.F.R. §2.101, consisting of “Commercial Computer Software” and “Commercial Computer Software Documentation,” as such terms are used in 48 C.F.R. §12.212 or 48 C.F.R. §227.7202, as applicable. Consistent with 48 C.F.R. §12.212 or 48 C.F.R. §§227.7202‐1 through 227.7202‐4, as applicable, the Commercial Computer Software and Commercial Computer Software Documentation are being licensed to U.S. Government end users (a) only as Commercial Items and (b) with only those rights as are granted to all other end users pursuant to the terms and conditions herein. Unpublished‐rights reserved under the copyright laws of the United States. Adobe agrees to comply with all applicable equal opportunity laws including, if appropriate, the provisions of Executive Order 11246, as amended, Section 402 of the Vietnam Era Veterans Readjustment Assistance Act of 1974 (38 USC 4212), and Section 503 of the Rehabilitation Act of 1973, as amended, and the regulations at 41 CFR Parts 60‐1 through 60‐60, 60‐250, and 60‐741. The affirmative action clause and regulations contained in the preceding sentence shall be incorporated by reference. The following applies to all contracts and subcontracts governed by the Rights in Technical Data and Computer Software Clause of the United States Department of Defense Federal Acquisition Regulations Supplement: RESTRICTED RIGHTS LEGEND: USE, DUPLICATION OR DISCLOSURE BY THE UNITED STATES GOVERNMENT IS SUBJECT TO RESTRICTIONS AS SET FORTH IN SUBDIVISION (C)(1)(II) OF THE RIGHTS AND TECHNICAL DATA AND COMPUTER SOFTWARE CLAUSE AT DFAR 252‐227‐7013. UNITRENDS CORPORATION IS THE CONTRACTOR AND IS LOCATED AT 200 WHEELER ROAD, NORTH TOWER, 2ND FLOOR, BURLINGTON, MASSACHUSETTS 01803. Unitrends, Inc 200 Wheeler Road North Tower, 2nd Floor Burlington, MA 01803, USA Phone: 1.866.359.5411
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide
4
Legacy Recovery-Series and UEB Administrator's Guide
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
5
Contents Chapter 1: About this Guide
39
Typographical conventions
39
Terminology
39
Contacting Unitrends Support
40
Unitrends Support Site
40
Contact by telephone
40
Chapter 2: Introducing Unitrends
43
The Unitrends Administrator Interface
43
Navigation grouping
45
Visibility of grouped items
45
Grouping clients for file-level backups
45
Grouping virtual machines
45
Unitrends user privileges
46
Navigation group procedures
47
Navigation pane options
50
Main menu icons
51
Chapter 3: Getting Started
55
Before you start
55
Overview of the Recovery-Series setup process
55
Prerequisites for Recovery-Series systems
56
Prerequisites for virtual systems
57
Initial configuration of Unitrends systems
57
System setup
59
Subsystem configuration settings
60
About the welcome screen
61
About date and time configuration
61
About hostname settings
62
About configuring notifications
62
Email setup
63
Email report recipients
63
About root password configuration
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
65
Legacy Recovery-Series and UEB Administrator's Guide
6
About user configuration
66
About the installation type
67
About installing agents
68
About adding clients
69
Adding a Windows client
70
Adding a Hyper-V client
72
Adding a VMware client
74
Adding a Cisco UCS Manager client
75
Adding a NAS NDMP client
76
Adding all other clients
78
About global retention and deduplication
80
Setup complete
81
Chapter 4: Advanced Configuration Options
83
About licensing the system
83
About network configuration
84
Ethernet settings
84
DNS settings
85
Hosts settings
86
About configuring root passwords
87
Operating system root password configuration
87
Administrator interface root password configuration
87
Auto-login feature
87
About working with clients
88
About renaming clients
89
Client trust credentials
91
About system updates
92
Shutting down the Unitrends system
93
About remote system management
95
Granting privilege for remote management
96
About credential management
97
About Active Directory authentication
99
About storage configuration
Legacy Recovery-Series and UEB Administrator's Guide
103
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
7
Storage types
104
Adding storage to the system
105
Adding backup storage
105
Adding archive storage
109
Adding vault storage
110
Configuring storage
110
About CHAP authentication
116
Storage allocation and distribution
117
Balancing backup performance and retention
118
About device configuration
119
About retention control
121
Legal hold example
123
About system notifications
124
About SNMP trap notifications
125
SNMP trap conditions
125
SNMP agent
127
About encryption
128
Archiving with encryption
131
Encryption limitations
131
About security levels
131
Open ports and security levels
132
About the Windows NTFS change journal
135
Change journal operation for master backup
136
Change journal operation for incremental backup
136
Configuring the change journal
137
Change journal configurable file types
138
Change journal per volume
138
Change journals and remote mounts
138
Chapter 5: Backups Overview
141
Types of data protected
141
Backup types
142
Full backup
142
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide
8
Incremental backup
143
Differential backup
143
Synthetic backup
144
Selective backup
145
Bare metal backup
145
Backup groups
145
Executing backups
146
Monitoring running backup jobs
147
Viewing backups
148
Backup Information page
152
Working with the Backup Browser
154
About the Backup Browser
154
Chapter 6: File-level Backups
159
File-level backup types
159
File-level backup strategies
160
Incremental forever backup strategy
161
Full with daily differentials backup strategy
161
Grouping clients for file-level protection
162
Using selection lists
162
When to use a selection list
162
Uses for selection lists
164
Using selection lists with full, differential, and incremental backups
165
Using selection lists with the selective backup type
166
About executing file-level backups
166
Default exclusions from file-level backups
166
Maximum file pathname lengths
166
Working with the computer backup subsystem About computer selection lists
167 171
Computer selection list procedures
172
Using wildcards in Computer selection lists
174
Working with the Enterprise backup subsystem
176
Enterprise backup elements
Legacy Recovery-Series and UEB Administrator's Guide
177
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
9
About calendars
177
Calendar procedures
178
About Enterprise selection lists
181
Backup groups and selection lists
181
Exclude active databases from file-level backups
182
Selective backups and include lists
182
Enterprise selection list procedures
182
Using wildcards in Enterprise selection lists
186
About backup options
187
Backup option procedures
187
About Enterprise backup schedules
192
About scheduling bare metal backups
192
Enterprise backup procedures
193
Working with client aliases
198
Note about excluding the system state for client aliases Chapter 7: Archiving Overview
200 201
Overview of the archiving process
201
About archiving
202
Backups that can be archived
202
Types of archives
202
Managing space on archive media
202
Archive sets and retention
203
How archiving uses available space on media
204
Purge
204
Overwrite
206
Purge and overwrite comparison
208
Creating space on archive media
209
Additional archiving considerations
209
Archive media types
210
Archiving to disk devices
211
Archiving to tape devices
211
Archiving to network storage devices
211
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide
10
Archiving to cloud storage
212
Archive restore
212
Disaster recovery with archived data
212
Bare metal recovery from archived data
212
Disaster recovery from archived data
213
Chapter 8: Archiving to Disk
215
About archiving to disk
215
Disk archiving unit
215
eSATA or USB device
218
Additional considerations for USB devices
218
Steps for setting up archiving to disk
218
Managing disk archive media
218
Chapter 9: Archiving to Network Storage
221
Limitations of archiving to network storage
221
Steps for archiving to network storage
221
Chapter 10: Archiving to the Cloud
223
About archiving to the cloud
223
Prerequisites and considerations for archiving to the cloud
224
Managing the amount of data you archive to the cloud
225
Steps for archiving to the cloud
226
Creating a cloud storage account
227
Creating an Amazon storage account
228
Creating a Google storage account
228
Creating a Rackspace storage account
228
Adding cloud archive storage to the Unitrends appliance
229
Archiving backups to the cloud
231
Managing cloud archive storage
231
Removing cloud archive sets
232
Reducing your storage footprint on the cloud
233
Restoring from cloud archives
233
Chapter 11: Archiving to Tape
235
About archiving to tape
Legacy Recovery-Series and UEB Administrator's Guide
235
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
11
Steps for archiving to tape
237
Prerequisites and considerations for archiving to tape
238
Managing tape inventory
239
Requirements and considerations for managing your tape inventory
240
Use of space on archive tapes
240
Archive tape status
241
Writing archive sets across multiple tapes
241
Examples of how the Unitrends appliance uses the available space on archive tapes 242 Successful archive job written across multiple tapes
242
Failed attempt to write an archive set across multiple tapes
242
Archive set written to as few tapes as possible
243
Email report for tape archives
243
Scheduling strategies for tape archives
244
Archive to tape setup
245
Step 1: Connecting the tape archiving device
245
Step 2: Configuring the tape archive device in the Unitrends system
246
About preparing tapes
246
Archiving backups to tape
250
Restoring from tape
250
Chapter 12: Archiving Procedures
253
General steps for archiving backups
253
Preparing archive media
254
Archive settings
255
Executing archive jobs
256
Monitoring running archive jobs
259
Stopping and starting the archive process
261
Viewing archives
261
Archive search options and results
261
Procedures for viewing archives
264
Managing archive schedules
267
Managing archive media
268
Restoring from archives
272
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide
12
Chapter 13: Replication About replication About secure tunnels for Unitrends systems
277 277 278
Replication features
278
Replication requirements
279
Replication limitations
280
Replication and legacy vaulting comparison
280
Installation types and replication
282
Replication setup
283
Standard replication setup Logical device considerations Cross-replication setup
283 285 290
Logical device considerations
292
Configuring replication after the initial setup
298
Configuring connection options and process control
298
Replicating backups manually
299
Seeding the initial data set
299
Configuring backups for replication
300
Tuning bandwidth and throttling options
301
Setting replication report options
301
Suspending replication
302
Moving a source to a different replication target
302
Removing replication
302
Upgrading from legacy vaulting to replication Migration limitations Navigating replicating systems
303 303 307
From the source system
307
From the target system
307
Viewing replicated backups
309
Working with the replication dashboard
309
Completed Replication Operations pane
310
Active Replication Operations pane
312
Legacy Recovery-Series and UEB Administrator's Guide
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
13
Pending Replication Operations pane
316
Dashboard controls
318
Archiving replicated backups
319
Restoring replicated backups
319
Bare metal recovery from a replication target
320
Integrated BMR from a replication target
320
Restoring a bare metal backup from a replication target
320
Restore a Linux or non-x86 client from the replication target
322
Deleting replicated backups
323
Replication reports
323
Chapter 14: Legacy Vaulting
325
Vaulting overview
325
Vaulting setup
326
Configuring a secure tunnel with legacy vaults
327
About secure tunnels for Unitrends legacy vaulting systems
328
Prerequisites to configuring a secure tunnel for legacy vaults
328
Granting privilege for legacy vault remote management
329
Adding the backup system to the vault
330
Tuning vaulting attributes on the backup system
331
Configuring clients for vaulting
333
Seeding the initial data set for legacy vaulting
334
Data protection vault restore
334
Working with the vaulting dashboard
334
Completed Vaulting Operations pane
335
Viewing completed vault details
335
Active Vaulting Operations pane
335
Viewing active vault details
336
Terminating a vault in progress
336
Pending Vaulting Operations pane
336
Vaulting dashboard controls
337
Vaulting reports
337
Granular restore from vault
337
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide
14
Export vaulted data to an archive device Chapter 15: Restore Overview
338 341
Types of backed up data that can be restored
341
Types of restores
342
Chapter 16: Restoring File-level Backups
345
Restore types
345
Restoring from a file-level backup
346
Restore options
348
Searching for a file to restore
349
File exclusion options
350
Advanced Execution Options for restore
351
Monitoring running restore jobs Chapter 17: Reports, Alerts, and Monitoring Reports Standard system reports (system-generated)
355 357 357 357
Configuring email for reporting
357
Standard system report descriptions
358
User-generated reports
360
Generating reports
361
Report buttons
361
Customizing reports
362
Saving custom report settings
365
Other report options
366
Downloading and printing reports
366
User-generated reports descriptions
367
Alerts Report
368
Audit History Report
368
Backups Report
369
Capacity Report
371
Client Information Report
373
Data Reduction Report
374
Devices Report
375
Legacy Recovery-Series and UEB Administrator's Guide
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
15
Failures Report
376
Last Backups Report
378
Legal Hold Backups Report
381
Policies Report
383
Replication Report (user-generated)
384
Replication Capacity Report
384
Replication History Report
386
Restores Report
388
SQL Server Report
389
Schedule History Report
390
Securesync Report
391
Storage Report
391
Vault Capacity Report
392
Vaulting Report
393
Vaulting Deduplication Report
394
Windows Virtual Restores Report
395
Alerts
397
Monitoring
397
Failures and warnings
397
System load
398
Support toolbox
398
Chapter 18: Disaster Recovery
401
Archive or replicate
401
Preparation
402
Restoring the system
403
Scenario 1: Restoring a backup system
403
Selecting storage devices during DR
404
Configuring the newly imaged system
404
System restore from the replication target
405
System restore from archive
407
Scenario 2: Recovering from a corrupt backup device
409
Scenario 3: Recovering from a corrupt RAID
409
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide
16
Scenario 4: Recovering a corrupt internal drive
410
Post-recovery considerations
410
Restoring backup data to the clients
411
Chapter 19: Legacy Disaster Recovery
413
Archive or vault
413
Preparation
414
Restoring the system
415
Scenario 1: Restoring a backup system
415
Scenario 2: Recovering from a corrupt backup device
416
Scenario 3: Recovering from a corrupt RAID
417
Scenario 4: Recovering a corrupt internal drive
417
Additional requirements for restoring to a virtual system
418
Storage setup
418
Disaster recovery from vault
419
Automatic disaster recovery from vault
420
Create an automatic disaster recovery profile
420
View an automatic disaster recovery profile
420
Remove an automatic disaster recovery profile
421
Change, stop, or suspend an automatic disaster recovery profile
421
Disaster recovery from archive
421
Post-recovery considerations
422
Restoring backup data to the clients
422
Chapter 20: Windows Protection
425
Windows agent versions
425
Windows agent requirements
426
Push installing the Windows agents
426
Agent push install requirements
426
Manually installing the Windows agents
428
Agent installer for Windows XP, 2003, and up
428
To install Unitrends_Agent86.msi, Unitrends_Agent64.msi, or Unitrends_ BareMetal.msi
428
To install Unitrends BareMetal.msi on Vista or Windows Server 2012/2008 running User Account Control
429
Legacy Recovery-Series and UEB Administrator's Guide
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
17
Agent installer for Windows 2000 client
430
Complete Installation for Windows 2000 client
431
Custom installation for Windows 2000 client
431
Command-line installer for Windows clients
431
Command-line installer parameters
431
Windows agent installer command-line examples
432
Windows protection software deployment using Group Policy Removing or repairing Windows agents
433 434
Maintenance mode for Windows XP, 2003, and up
435
Maintenance mode for Windows 2000 client
435
Updating the Windows agents
435
Push installing agent updates
435
Push install update notifications
435
Requirements for pushing agent updates
435
Manually updating Windows agents
437
About Windows protection
438
Windows selection lists
438
Exclusion lists for Windows clients
438
Inclusion lists for Windows clients
440
Inclusion and exclusion list combinations for Windows clients
441
Using selection lists with WIR and integrated BMR
442
Volume Shadow Copy Service on Windows Server
442
Backing up a Windows server
443
Backing up Windows applications
443
Protecting deduplication-enabled Windows 2012 Servers
443
System state backup and restore on Windows Server
443
Protecting Windows DFS Servers
444
Active Directory backup and restore on Windows Server
444
Bare metal restore of Active Directory Server on Windows Server
445
Microsoft IIS meta-directory backup and restore
445
Certificate Services database backup and restore
445
Cluster database backup and restore on Windows Server
446
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide
18
Protecting file clusters
446
Windows bare metal
446
Features of the Windows agent
447
Chapter 21: Windows Instant Recovery
451
Overview of Windows instant recovery
451
How Windows instant recovery works
452
About retrieving configuration data for a virtual failover client
455
Virtual restores for Windows instant recovery
455
Appliance and hypervisor resources used for Windows instant recovery
456
Steps for implementing Windows instant recovery
456
Appliance and hypervisor resources used for Windows instant recovery General requirements and considerations for Windows instant recovery Unitrends system requirements for WIR
457 457 458
Unitrends software requirements
458
Requirements and considerations for running a virtual failover client on an external hypervisor
459
Requirements and considerations for running a virtual client on an ESX server
459
Requirements and considerations for running a virtual failover client on a Hyper-V server
459
Windows client requirements for Windows instant recovery
461
Supported Windows operating systems and applications
461
Firmware interface type and disk and volume configuration
462
Considerations for the virtual failover client location
463
Accessing a virtual failover client
464
Running backups for clients protected with Windows instant recovery
464
Setting up a virtual failover client
464
Setting up a virtual failover client on a Recovery-Series appliance
464
Unitrends system resource considerations for Windows instant recovery
465
Allocating storage for Windows instant recovery
465
Setting up a virtual network for Windows instant recovery
466
Creating a virtual failover client
467
Setting up a virtual failover client on an external hypervisor
Legacy Recovery-Series and UEB Administrator's Guide
470
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
19
Adding a virtual failover client to an external hypervisor and configuring network settings Auditing a virtual failover client
470 471
Automated audits for a virtual failover client
471
Manually auditing a virtual failover client
472
Monitoring and managing virtual failover clients
474
Reports and notifications for Windows instant recovery
474
State and mode for virtual failover
475
Viewing virtual failover client details
476
Invalid virtual failover clients
477
Viewing restores for virtual failover clients
477
Modifying a virtual failover client
478
Viewing the IP address for a virtual failover client on an external hypervisor
480
Deleting a virtual failover client
480
Taking a virtual failover client live
481
Booting a virtual failover client in live mode
481
Live mode recommendations for a virtual failover client running on a Recovery-Series appliance
484
Live mode recommendations for a virtual failover client running on an external hypervisor
484
Troubleshooting Windows instant recovery
485
Conflict with volume using D:\ and the CD device on the virtual failover client
485
Hypervisors do not display when setting up a virtual failover client
485
Restores for the virtual failover client on an external hypervisor are not running
486
Virtual restores are not enabled for the virtual failover client
486
The Unitrends appliance cannot communicate with the virtual failover client
486
Configuration changes have been made to the original client
487
The virtual failover client has been booted in live mode
487
Exchange database will not mount when running VFC in Live mode Chapter 22: Microsoft SQL Protection About Microsoft SQL protection Supported SQL features Databases on Windows SQL Server
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
487 489 489 489 490
Legacy Recovery-Series and UEB Administrator's Guide
20
SQL clusters
490
Databases with disk storage on SMB 3.0 shares
490
Requirements for protecting SQL
490
Agent prerequisites for Microsoft SQL
490
SQL system requirements
491
Additional system requirements for SQL clusters and SMB 3.0
491
SQL cluster requirements and considerations
492
Requirements for SQL databases located on SMB 3.0 shares
495
About SQL backups
496
Executing SQL backups
499
SQL Server backups status
503
Restoring SQL backups
504
Considerations for restoring SQL backups
504
Restoring the master database
504
Restoring the model and msdb databases
505
Restoring SQL full backups
506
Restoring SQL differential and transaction backups
507
Restoring multiple SQL databases
508
Restoring a backup when the SQL icon does not display
508
SQL restore from the replication target
509
Replicated SQL restore requirements
509
Chapter 23: Microsoft Exchange Protection
511
About Exchange protection
511
Requirements for using Exchange Server protection
512
Installing Exchange protection
512
Recommended configurations for Exchange
513
Data protection strategies for Exchange
513
Exchange incremental backup
514
Automatic exclusion of Exchange data during file-level backups
515
About the circular logging setting for Exchange
515
Snapshot and streaming backups for Exchange
515
Executing Exchange backups
Legacy Recovery-Series and UEB Administrator's Guide
516
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
21
About Exchange 2016, 2013, and 2010 backup
520
About Exchange 2007/2003 backup
520
About protecting clustered Exchange environments
520
Requirements for protecting Exchange clusters
520
Exchange 2007 CCR or SCR configurations
521
Exchange 2016, 2013, and 2010 DAG configurations
522
Best practices for protecting Exchange clusters
523
Restore considerations for Exchange clusters
523
About Exchange 2000 backup
523
Exchange Archiving
524
Exchange Replication
524
Microsoft Exchange recovery
524
Restoring an Exchange database or storage group
524
Restoring to the original Exchange server
525
Restoring to a recovery area
526
Restoring to an alternate location
528
Restoring Exchange items
530
Restoring Exchange items directly from a backup
531
About the Exchange restore session
531
Restoring Exchange items from a previously restored backup
532
Restoring items with Kroll Ontrack PowerControls for Exchange
532
About restoring Exchange 2016, 2013, or 2010 from a backup
533
About restoring Exchange 2007 from a backup
533
About restoring Exchange 2003 from a backup
534
About restoring Exchange 2000 from a backup
534
Restoring Exchange from archives
534
Restoring Exchange from a legacy vault
534
Restoring a backup when the Exchange icon does not display
534
Chapter 24: Microsoft SharePoint Protection About SharePoint protection
535 535
SharePoint agent requirements
536
SharePoint configuration prerequisites
537
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide
22
SharePoint backup considerations
540
Display of SharePoint agent in the backup system
540
Executing SharePoint backups
541
Viewing SharePoint backups
543
Restoring SharePoint backups
543
SharePoint restore considerations
544
SharePoint restore procedures
544
About the SharePoint restore session
547
Restoring items with Kroll
547
Restoring a backup when the SharePoint icon does not display
548
Chapter 25: Oracle Protection
549
About Oracle protection
549
Requirements for Oracle protection
549
Unitrends version requirements for Oracle protection
550
Oracle client and instance requirements
550
Oracle credential considerations
552
Oracle on Linux Automatic Storage Management requirements
555
Oracle backup requirements
555
Steps for implementing Oracle protection
556
Display of Oracle application in the backup system
557
Upgrading to newer Oracle versions
558
Executing Oracle backups
558
Viewing Oracle backups
562
Oracle restore from the backup system
562
Oracle restore requirements and considerations
562
Restoring Oracle backups
563
Oracle for Windows restore from the replication target
565
Replicated Oracle restore considerations and procedures
565
About the Oracle restore session
567
Chapter 26: Protecting NAS Devices
569
Determining how to protect a NAS
569
NAS protection using NDMP
570
Legacy Recovery-Series and UEB Administrator's Guide
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
23
Prerequisites and considerations for NDMP
570
Working with NDMP clients
572
Advanced configuration settings for NDMP clients
572
Implementing NetApp cluster protection
573
About NDMP backups
574
Automatic promotions of NDMP Incremental backups
574
Backup groups for NAS NDMP clients
576
Selection lists for NDMP backups
576
Backing up NAS NDMP clients
576
Restoring NDMP backups
577
Point-in-time NDMP restores
578
NAS protection using CIFS/NFS
579
Prerequisites and considerations for CIFS/NFS clients
579
Working with CIFS/NFS clients
579
Adding CIFS/NFS clients
579
Modifying and Deleting CIFS/NFS clients
581
Backing up CIFS/NFS clients
582
Specifying data to include or exclude from CIFS/NFS backups Restoring backups of CIFS/NFS clients Chapter 27: Hyper-V Protection
582 583 585
About Hyper-V protection
585
Features of Unitrends Hyper-V protection
586
Prerequisites for Hyper-V protection
586
About Hyper-V backups
587
Hyper-V backup strategies
588
Online backups
589
Backups for VMs on servers running Hyper-V versions 2012 and 2012 R2
589
Automatic exclusion of Hyper-V data during file-level backups
589
Best practices for protecting Hyper-V virtual machines
589
Protecting virtualized Active Directory servers
590
Protecting virtual machines in Distributed File System environments
590
Protecting Hyper-V virtual machines at the guest OS level
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
590
Legacy Recovery-Series and UEB Administrator's Guide
24
Comparison between Hyper-V and guest-OS-level backups
591
Recommendations and considerations for protecting Hyper-V VMs at the guest OS level
592
Protecting Hyper-V virtual machines with storage located on SMB 3.0 shares Prerequisites and considerations
595 595
Granting the Windows agent read/write access to remote SMB 3.0 shares Working with Hyper-V servers
595 596
Special considerations for adding Hyper-V clusters
597
Displaying Hyper-V virtual machines in the Navigation pane
598
Grouping Hyper-V virtual machines
598
Executing Hyper-V backups
599
Selecting Hyper-V VMs to protect
599
Special considerations for backing up Hyper-V clusters
599
Working with Hyper-V clusters in the Navigation pane
600
Creating an alias for a Hyper-V cluster
601
Hyper-V backup procedures
602
Viewing the status of Hyper-V backups
606
Restoring the Hyper-V virtual infrastructure
606
Restoring Hyper-V virtual machines
606
Supported Hyper-V virtual machine restore procedures Restoring files from Hyper-V backups
607 611
Steps for performing Hyper-V file-level recovery
611
Prerequisites for performing Hyper-V file-level recovery
611
Performing Hyper-V file-level recovery
613
About the Hyper-V restore session
617
Instant recovery for Hyper-V
618
How Hyper-V instant recovery works
618
Audit mode
618
Instant recovery mode
619
Steps for implementing Hyper-V instant recovery
620
Prerequisites and considerations for Hyper-V instant recovery
621
Allocating storage for Hyper-V instant recovery
622
Legacy Recovery-Series and UEB Administrator's Guide
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
25
Configuring port security for Hyper-V instant recovery
623
Performing the audit process for Hyper-V instant recovery
623
Performing Hyper-V instant recovery
625
Chapter 28: VMware Protection
629
Best practices for protecting VMware virtual machines
629
About the Virtualization Protector
632
Virtualization Protector requirements
633
Raw device mapped disk limitations
634
vSphere 6 requirements and limitations
635
Protecting virtualized Active Directory servers
635
Protecting virtual machines in Distributed File System environments
635
Working with vCenter and ESX servers
635
Displaying VMware virtual machines in the Navigation pane
636
Upgrading the ESX(i) host
637
Setting VM credentials for application-aware protection
637
Working with VM credentials
638
Deleting vCenter and ESX servers
641
Grouping VMware virtual machines
641
About VMware backups
641
Requirements and considerations for VMware backups Supported backup methods
642 642
VMware backup strategies
643
Dynamic VMware protection
644
Example of a basic filter
645
Example of an advanced filter
646
Transitioning to filtered VMware schedules
646
VMware HotAdd backups VMware HotAdd requirements
647 647
VMware SAN-direct backups
650
VMware disk exclusions
652
Executing VMware backups
652
Creating VMware backup schedules
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
653
Legacy Recovery-Series and UEB Administrator's Guide
26
Restoring the VMware virtual infrastructure
656
Restoring the entire VMware virtual machine
656
Special considerations for RHEL/CentOS6.x virtual machines
657
Restoring files from VMware backups
657
About the VMware restore session
662
Instant recovery for VMware
663
How instant recovery for VMware works
663
Audit mode
664
Instant recovery mode
664
Steps for implementing VMware instant recovery
665
Prerequisites for implementing VMware instant recovery
666
Allocating storage for VMware instant recovery
667
Configuring port security for VMware instant recovery
668
Performing the audit process for VMware instant recovery
668
Performing VMware instant recovery
670
Recovering peripheral devices
672
Protecting VMware templates
672
Executing backups of VMware templates
672
Creating a backup schedule for VMware templates
673
Restoring VMware templates
676
Troubleshooting
678
Chapter 29: Cisco UCS Protection
679
Working with UCS blade and rack-mount servers
679
Protecting UCS blade and rack-mount servers
679
Restoring UCS client backups
682
Disaster recovery of UCS clients
683
Working with Cisco UCS service profiles
685
About protecting Cisco UCS service profiles
685
Data protection strategy for Cisco UCS service profiles
686
Cisco UCS service profile protection requirements
686
Adding Cisco UCS Manager clients to the Unitrends appliance
687
Executing and scheduling UCS service profile backups
688
Legacy Recovery-Series and UEB Administrator's Guide
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
27
Replicating UCS service profile backups
690
Viewing UCS service profile backups
690
Restoring UCS service profile backups
692
Chapter 30: AIX Protection
697
AIX agent versions
697
AIX agent restrictions
697
Installing protection software for AIX
697
Working with AIX clients
698
AIX client backup and restore
698
Uninstalling protection software on AIX client
698
Chapter 31: HP-UX Protection
699
Supported HP-UX operating systems
699
HP-UX agent versions
699
Installing the HP-UX agent
699
Working with HP-UX clients
700
Backup and restore for HP-UX clients
700
Uninstalling HP UNIX client protection software
700
Chapter 32: iSeries Protection
701
Getting started with iSeries protection
701
Space requirements and maximum file size for successful backup
702
iSeries master backup and restore considerations
703
iSeries backup operation
704
The iSeries backup menu
704
iSeries profile
705
iSeries backup now option
705
Schedule an iSeries backup
705
iSeries restore operation
706
iSeries disaster recovery
706
iSeries log files
706
Chapter 33: Linux Protection
707
Supported Linux distributions
707
Linux agent versions
707
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide
28
Linux distributions and agent installers
708
Installing the Linux agent
708
About Linux agent dependencies
711
Dependencies by operating system
712
Needed dependencies for Oracle
712
Configuring a Linux firewall to allow communication with the Unitrends backup system
713
Working with Linux clients
713
File-level backup and restore for Linux clients
713
Linux selection lists
714
Exclusion lists for Linux clients
714
Inclusion lists for Linux clients
715
Inclusion and exclusion list combinations for Linux clients
716
Pre- and post-backup commands for Linux clients
717
Linux restore considerations
717
Bare metal backup and disaster recovery for Linux clients
717
Uninstalling Linux protection software
718
Chapter 34: Mac OS X Protection
719
Mac OS X agent versions
719
Installing the Mac OS X agent
719
Working with Mac OS X clients
720
Backup and restore for Mac OS X clients
720
Uninstalling Mac OS X protection software
720
Chapter 35: Novell NetWare Protection
721
Unitrends Novell NetWare agent information
721
Novell NetWare agent restrictions and limitations
721
Installing the Unitrends Novell NetWare agent
722
Uninstalling the agent from a Novell client
723
Protecting GroupWise on Novell Netware
723
Considerations for protecting GroupWise
723
Considerations for TSA based GroupWise backups
724
Restoring GroupWise on Novell
724
Considerations when restoring GroupWise databases
Legacy Recovery-Series and UEB Administrator's Guide
724
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
29
Stopping and starting GroupWise databases Protecting eDirectory on your Novell client
724 725
eDirectory backup and restore using Novell agent
725
ConsoleOne recovery using NetWare agent
727
Switching between TSA and non-TSA backups Chapter 36: Novell OES Linux Protection OES Linux agent versions
728 729 729
Installing the OES agent
729
OES agent restrictions and limitations
730
Uninstalling the Unitrends agent for OES
730
Changing root password on OES agent
731
Protection software for OES with AppArmor
731
Protecting GroupWise on Novell OES Linux
731
Considerations for protecting GroupWise on OES Linux
731
Restoring GroupWise on Novell OES Linux
732
Considerations when restoring GroupWise databases
733
Starting and stopping GroupWise databases
733
Protecting eDirectory on your OES Linux client Chapter 37: SCO OpenServer Protection
733 737
SCO OpenServer agent versions
737
Installing protection software for SCO OpenServer
737
Working with SCO OpenServer clients
738
Uninstalling protection software on SCO OpenServer client
738
Chapter 38: Solaris Protection
739
Solaris agent versions
739
Installing Solaris protection software
739
Working with Solaris clients
739
Uninstalling Solaris protection software
740
Chapter 39: UnixWare Protection
741
UnixWare agent versions
741
Installing protection software for UnixWare
741
Working with UnixWare clients
742
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide
30
Master backup of the UnixWare client
742
Uninstalling protection software on UnixWare client
742
Chapter 40: Xen on OES 2 Protection
743
Xen virtualization architecture
743
Protecting OES on Linux with Xen
743
Domain Management and Control (Xen DM&C)
744
Xen backup scenarios
744
Scenario 1: Protecting Xen host only (recommended method)
745
Scenario 2: Protecting Xen virtual machines only
746
Scenario 3: Protecting Xen host and virtual machines together
747
Chapter 41: Bare Metal Protection Overview
749
Bare metal procedures by client operating system
750
Considerations for bare metal test restores
751
Recovering aliased clients
752
Chapter 42: Windows Bare Metal Protection
753
Integrated BMR and image-based BMR comparison
754
Windows integrated bare metal recovery
755
Implementing Windows integrated bare metal protection
756
Prerequisites for Windows integrated bare metal recovery
756
Supported integrated bare metal recovery scenarios
758
About eligible backups for Windows integrated bare metal recovery
758
About integrated bare metal recovery ISO images
759
About adding drivers during the integrated bare metal recovery
759
Performing the integrated bare metal recovery
760
Accessing the integrated bare metal recovery ISO images
760
Preparing the destination machine for an integrated bare metal recovery
761
Running the Integrated Bare Metal Recovery Wizard
762
Post-restore driver injection
769
Completing the integrated bare metal recovery
770
Performing a test integrated bare metal recovery
770
Windows image-based bare metal recovery Windows image-based recovery overview
Legacy Recovery-Series and UEB Administrator's Guide
771 771
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
31
Windows system requirements for image-based bare metal
771
Implementing image-based bare metal protection
772
Creating the boot media for image-based recovery
773
Testing bare metal media for image-based recovery
775
Image-based bare metal restore procedures
776
Physical to Virtual (P2V) image-based restores of Windows clients
776
Dissimilar image-based restore for Vista and later environments
780
Additional considerations for Windows imaged-based bare metal
781
Special consideration for Domain Controllers on Hyper-V
781
Windows imaged-based bare metal Interface
782
When a system does not boot following an image-based restore
783
Chapter 43: Bare Metal for Linux
787
Linux bare metal overview and requirements Linux hot bare metal recovery requirements and limitations Implementing Linux bare metal protection Creating Linux hot bare metal boot media
787 787 788 788
Linux bare metal restore procedure
789
Linux bare metal menu options
790
Initiate Linux client restore from backup system
791
Linux cold bare metal protection
791
Creating the iso for use with cold bare metal backups
791
Performing cold bare metal backups and restores
792
Chapter 44: Bare Metal for x86 Platforms
795
Intel platforms bare metal disaster recovery
795
Specifying bare metal settings for a client
797
Testing bare metal backups
798
Recovering from a crash with the bare metal boot CD
798
Using the bare metal crash recovery boot CD
798
Bare metal boot CD menu options
799
Manual bare metal backup
802
When to perform a cold bare metal backup
802
Recovering from a crash using cold bare metal
802
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide
32
Bare metal restore to a new disk
803
Bare metal restore to a disk of same size and controller
803
Bare metal restore to a larger disk
803
Bare metal restore to a different disk controller
803
Configuration settings for CD only version of bare metal
804
Bare metal optimization
804
Novell agent bare metal optimizer utility
804
Chapter 45: Bare Metal for non-x86 Platforms
807
Bare metal for AIX
807
AIX client hot bare metal restore
807
Generating bare metal media for an AIX client
807
Starting the bare metal restore for an AIX client
808
Bare metal for AIX menu options
808
Initiate AIX client restore from backup system
809
Reasons for AIX bare metal restore
809
Bare metal for Mac OS X
810
Hot bare metal disaster recovery using Mac OS X
810
Technical limitations and requirements
810
Creating a hot bare metal Mac OS X boot DVD
810
Mac OS X hot bare metal restore
811
Bare metal for UnixWare
812
UnixWare bare metal disaster recovery
812
Bare metal rapid recovery CD for UnixWare 7.13/7.14
814
Bare metal for UnixWare features
814
UnixWare bare metal Jump Start booting
814
UnixWare bare metal AIR-BAG main menu system
815
UnixWare bare metal diagnostic/confidence test
815
UnixWare bare metal single filesystem restore
815
UnixWare bare metal fully automated restore
815
UnixWare bare metal restore to same hard disk
816
UnixWare bare metal restoring to a new partition or hard disk
816
UnixWare bare metal filesystem status report
816
Legacy Recovery-Series and UEB Administrator's Guide
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
33
UnixWare bare metal adjusting filesystem sizes
816
UnixWare bare metal hard disk parameter information
816
UnixWare bare metal view controllers
817
UnixWare bare metal load BTLD modules
817
UnixWare bare metal view PCI, ISA, PCM/CIA cards
817
UnixWare bare metal modify resource manager database
817
UnixWare bare metal hard disk single user mode
817
UnixWare bare metal deleting filesystems from master list
817
UnixWare bare metal slice manager
817
UnixWare bare metal restore from the backup system
820
Bare metal for Solaris SPARC
821
Solaris SPARC bare metal restore
821
Generate and boot from the bare metal media
822
Creating and booting from the bare metal CD
822
Creating and booting from a bare metal USB drive
823
Bare metal recovery from a Jump Start boot server
824
Jump Start boot requirements
824
Booting into the bare metal interface
826
Performing a bare metal restore
826
Bare metal for Xen on OES 2 virtual machines Chapter 46: ConnectWise PSA Integration
826 829
Introduction
829
Configuring the PSA tool
830
Configuring settings in ConnectWise
830
Configuring the Unitrends PSA Integration feature
831
Configuring PSA settings in the Unitrends system
833
Modifying or deleting a PSA configuration
836
Viewing ticket history
836
Invoking the billing script
837
Chapter 47: Troubleshooting
839
Archive troubleshooting
839
Troubleshooting backups and schedules
839
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide
34
Troubleshooting bare metal restore
840
Troubleshooting encryption
841
Troubleshooting file restore
841
Troubleshooting iSeries
842
Troubleshooting license management
842
Troubleshooting Novell NetWare agent
842
Troubleshooting backup system messages
843
Troubleshooting tape devices
843
Troubleshooting VMware backup
845
Troubleshooting Windows event IDs
845
Starting event
845
VSS events leading up to execution of a volume snapshot
845
Troubleshooting Windows legacy Exchange agent
848
Troubleshooting legacy SQL Server agent
849
Troubleshooting Xen on OES 2 bare metal backup and restore
850
Appendix A: Windows Legacy Operations
851
Working with the legacy Windows agent
851
Launching the legacy Windows agent
851
Legacy Windows agent preferences
851
Environment settings
851
Log level
852
Current profile settings
852
Advanced preferences
852
Legacy Windows agent profiles
853
Performing backups with the legacy Windows agent
853
Performing restores with the legacy Windows agent
854
Restoring an entire backup
854
Restoring a backup by backup number
855
Performing selective restores
855
Include files option
855
Backup listing dialog
856
Restore options tab
856
Legacy Recovery-Series and UEB Administrator's Guide
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
35
Restore advanced options
856
Verifying or comparing a backup
856
Options and other functions
857
Skip file-in-use option
857
Snapshot properties option
857
Test protocol option
857
Register client option
857
Choose server/device option
857
Test a server connection option
858
Bare metal optimizer option
858
Settings file option
858
Legacy SQL Server agent
859
Launching the legacy SQL Server agent
860
Log in to legacy SQL Server agent
861
Features of the legacy SQL Server agent
861
Creating or modifying a legacy SQL backup schedule
861
Legacy SQL backup plan optimization
862
Legacy SQL backup types and schedules
862
Assigning or removing a legacy SQL backup schedule
863
Legacy SQL on-demand backups
863
Legacy SQL restore options
864
Restoring a legacy SQL Server database
864
Legacy SQL Server point in time restore
866
Viewing legacy SQL backup and restore history
866
Legacy SQL Server audit and error logs
866
Testing Legacy SQL Server database restore
866
Legacy Exchange agent
866
Legacy Exchange information store setup
867
Legacy Exchange agent setup
868
Legacy Exchange client registration
868
Legacy Exchange and Active Directory
868
Legacy Exchange and the Samba share
868
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide
36
Working with Legacy Exchange information stores
869
Legacy Exchange store level log in
869
Legacy Exchange Quantum Recovery setup
869
Legacy Exchange EQR system requirements
869
Installing Ontrack PowerControls on legacy Exchange
871
Licensing Ontrack PowerControls for legacy Exchange
871
About the Ontrack PowerControls license
872
Legacy Exchange store level functionality
873
Legacy Exchange information store level security
873
Legacy Exchange backup and purge options
873
Legacy Exchange define information store level items
874
Legacy Exchange launch information store level master
874
Legacy Exchange launch information store level differential
874
Legacy Exchange store level history
875
Legacy Exchange store level purge
875
EIR and EQR backup schedules
875
Legacy Exchange information store scheduling
876
Legacy Exchange master or differential schedule
877
Legacy Exchange recovery options
877
Legacy Exchange Quantum Recovery
878
Legacy Exchange directories for Ontrack PowerControls
878
Using the Ontrack PowerControls ExtractWizard
879
Setting up Ontrack PowerControls ™for legacy Exchange
880
Guidelines for selecting a legacy Exchange database
882
Restoring legacy Exchange data via Ontrack PowerControls™
883
Restoring Exchange messages via Ontrack PowerControls™
883
Legacy Exchange command line options
884
Testing the legacy Exchange agent setup
885
Testing legacy Exchange information store backups
885
Appendix B: Storage Footprint Reporting About storage footprint reporting Features of storage footprint reporting
Legacy Recovery-Series and UEB Administrator's Guide
887 887 887
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
37
Footprint report description
888
Prerequisites and considerations for storage footprint reporting
888
Computing the footprint of a source
889
Scheduling and managing footprint reports
889
Supported commands for footprint reports
889
Accessing the command line of a replication target
890
Scheduling footprint reports
890
Managing footprint reports
893
Monitoring a running report
894
Terminating footprint report tasks
894
Viewing footprint reports
895
Appendix C: Unitrends Open Source Compliance
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
897
Legacy Recovery-Series and UEB Administrator's Guide
38
Legacy Recovery-Series and UEB Administrator's Guide
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
39
Chapter 1: About this Guide The Legacy Recovery-Series and UEB Administrator's Guide provides detailed instructions for configuring and managing your Unitrends appliance using the legacy user interface. The target audience for Unitrends products are system administrators for small, medium, and large companies. All procedures are run from the Unitrends legacy Administrator Interface (AI), unless otherwise specified. See the following topics for details:
• •
"Typographical conventions" on page 39
•
"Contacting Unitrends Support" on page 40
"Terminology" on page 39
Typographical conventions Type
Convention
Example
Menu commands
Bold
Click Recover.
Text entered in fields
Courier bold
Set Date field
Sequential commands
Separated by greater than (>) symbol.
Click Recover > Instant Recovery.
Links and cross references within this guide
Display in blue.
"Introducing Unitrends"
Hyperlinks to external topics, sites, or documents
Display in blue, are underlined, and open in a separate window.
http://www.unitrends.com/support
Terminology The following table describes the terms used in this document. Terms have changed, and you may run into instances where deprecated names are still used. Term
Definition
backup system
Unitrends backup system, administered through the Unitrends Administrator Interface (AI). Equivalent to legacy terms DPU, appliance, Rapid Recovery Console (RRC), and BP.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 1: About this Guide
40
Term
Definition
managed system
A Unitrends backup system that is managed by another Unitrends backup system. You can administer multiple managed systems from the AI through a single pane of glass. Equivalent to legacy term MDPU. (See "About remote system management" on page 95.)
target system
A Unitrends backup system located off-site to which backups are replicated from other Unitrends systems. This can be another system owned by your company, or the Unitrends Cloud service.
vault
Replication is not supported on systems running versions older than 7.0.0. Instead, legacy vaulting is used. A vault is the target system to which backup data is replicated. This can be another system owned by your company, or the Unitrends Cloud service. Equivalent to legacy term DPV.
installation type
For systems running version 7.0.0 or later, the installation type determines whether the system functions as a backup system, replication target, or both a backup system and replication target. For systems running older versions, legacy vaulting is used. Installation types include backup system, vault, or cross-vault if performing both roles. Equivalent to legacy terms system personality or system identity.
Contacting Unitrends Support There are a variety of ways to contact Unitrends Support.
Unitrends Support Site Un itre n d s Su p p o rtS ite
Access the Unitrends Support Site at http://www.unitrends.com/support, where you can:
• • • • • •
Download or upgrade your product Download latest agent releases Search Knowledge Base articles Connect with Community Forums Log a support case Access the Partner Service Portal
Contact by telephone Co n ta c tb y te le p h o n e
Use the following to contact Unitrends Support by telephone:
• • •
Unitrends Support North America: 1.888.374.6124 Unitrends Support UK: +44 (0)80 8101 7687 Unitrends Support Germany: +49 (0)89 2154822 0
Legacy Recovery-Series and UEB Administrator's Guide Chapter 1: About this Guide
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
41
You can call at any time during the hours specified in your Unitrends support service level contract. This is the recommended method for logging high priority support issues.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 1: About this Guide
42
Legacy Recovery-Series and UEB Administrator's Guide Chapter 1: About this Guide
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
43
Chapter 2: Introducing Unitrends Unitrends products come in a wide variety of physical and virtual configurations, supporting many hardware and software versions and features. Unitrends backup and replication systems are integrated, turn-key, disk-to-disk backup, restore, and disaster recovery solutions. The system supports a multitude of operating system platforms and provides client-side agents for common database applications. All of the data that is protected on the backup system can be synchronized across wide area network (WAN) connections to a replication system for total site protection. See the following topics for details:
• • •
"The Unitrends Administrator Interface" on page 43 "Navigation pane options" on page 50 "Navigation grouping" on page 45
The Unitrends Administrator Interface After you log in, you see the Administrator Interface (AI). (See the following figure.) All procedures are executed from the AI, unless otherwise indicated. WARNING! It is recommended to perform all administration tasks using the Administrator Interface. The Unitrends operating system implementation is proprietary to Unitrends and should not be modified from the Linux command line unless following a certified Unitrends procedure. Performing general Linux command line administration tasks can have undesirable results.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 2: Introducing Unitrends
44
The high-level structure of the AI consists of a three-pane window with the following components: AI Components
Description
Main menu
A series of icons used to access the system’s primary functions. You can select to view a drop-down list of options when you click on these icons. You can also choose to see the drop-down list in horizontal or vertical order. See "Navigation pane options" on page 50 for more information. Note:
The drop-down list does not necessarily show every option on the second level screen and may also include related options that are not on the second level screen.
Navigation pane
The left-most pane of the AI contains a tree of customers, locations, backup systems, replication systems, and clients (a client is typically a customer's server).
Center Stage
The area to the right of the Navigation pane is called the Center Stage. Information displayed here is determined by the elements you have selected from both the Main menu and Navigation pane. The Center Stage may be presented as a single area or a subdivided area based on your selections.
See the following for details about the Navigation options and Main menu functions:
• • •
"Navigation pane options" on page 50 "Navigation grouping" on page 45 "Main menu icons" on page 51
Legacy Recovery-Series and UEB Administrator's Guide Chapter 2: Introducing Unitrends
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
45
Navigation grouping This feature enables you to quickly manage and navigate complex or well-populated systems by alleviating problems associated with having large client and virtual machine installations used by varying administrators. Navigation groups allow you to create custom folders to organize your clients and virtual machines. Navigation groups can be used to create backup, restore, or archive schedules, as well as to generate reports. For details on generating reports, see "User-generated reports" on page 360. When an item is removed from a group, or the group is deleted, all items are returned to their original place in the Navigation pane. Navigation grouping is supported on appliances running version 7.5 or higher. The following items can be grouped:
• •
Clients, such as Windows or Linux servers
• • • •
VMware virtual machines
Hyper-V virtual machines
Resource pools vApps VMware templates
See the following topics for details:
• •
"Visibility of grouped items" on page 45 "Navigation group procedures" on page 47
Visibility of grouped items Navigation grouping is for organizational purposes only. The groups do not display in replication view. A group can contain any number of items in the same hierarchical level of the Navigation pane. You can group clients to perform file-level backups, or you can group virtual machines to run VMware or Hyper-V backups. See the following for details:
• • •
"Grouping clients for file-level backups" on page 45 "Grouping virtual machines" on page 45 "Unitrends user privileges" on page 46
Grouping clients for file-level backups Gro u p in g c lie n ts fo rfile -le v e lb a c k u p s
Grouping clients is a way of easily selecting subsets of clients on a system that has a large number of clients. You can then create file-level backup schedules and generate reports based on the clients in the selected group. For a physical Hyper-V host, you can also create an inner group to protect its virtual machines.
Grouping virtual machines Gro u p in g v irtu a lma c h in e s
Grouping virtual machines is a way of easily selecting subsets of virtual machines on a host that has a large number of virtual machines. You can then create VMware or Hyper-V backup schedules and generate reports based on the selected group.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 2: Introducing Unitrends
46
See the following figures for an example of groups created for file-level and virtual machine protection:
In the figure on the left, the client-level group is selected. If you create a schedule based on the client-level group, the clients are protected with file-level backups. However, the virtual machines in the Virtual Machine Level Protection group are not protected. In the figure on the right, the inner group Virtual Machine Level Protection is selected. If you create a schedule based on the inner group, the virtual machines are protected with VMware or Hyper-V backups. However, the clients from the figure on the left are not.
Unitrends user privileges Un itre n d s u s e rp riv ile g e s
You can assign different Unitrends users to each group. Multiple users can be assigned to the same group. See the following table for information on which items are visible for each user privilege. Items that are not grouped are seen by all Unitrends users with Superuser or Administrator privileges. For information about the abilities of each user privilege, see "Privilege level" on page 67. User Privilege
Visible Items
Manage or Monitor
User sees only VMs and clients assigned to the user and any ungrouped items.
Superuser or Administrator
User sees all Navigation pane items regardless of group permissions.
The following figure provides an example of what a Superuser or Administrator sees versus what the user "Alice" sees.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 2: Introducing Unitrends
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
47
Navigation group procedures When using the Navigation grouping feature, groups can be created, edited, and deleted with no harm to the integrity of the Navigation pane hierarchy. Click the folder icon to enable or disable the Navigation grouping feature. (Release 7.5 and higher). Backup schedules are easily created with Navigation groups. Select the group from the Navigation pane, and the schedule created applies only to the selected items in the group. For details on scheduling backups, see "File-level Backups" on page 159. See the following for details:
• •
"Navigation group strategies" on page 48 "To create a navigation group" on page 48
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 2: Introducing Unitrends
48
• • •
"To modify a navigation group" on page 49 "To delete a navigation group" on page 49 "To assign users to a navigation group" on page 49
Navigation group strategies Use Case
Strategy Recommendation
Multiple users assigned to portions of a large virtual machine installation.
Create multiple groups and assign each user to one or more groups.
One administrator in charge of a large installation.
Create multiple groups corresponding with levels of importance or customers. No need to assign users because there is only one administrator.
To create a navigation group 1
Hover over the item under which you wish to create a group.
• •
To group clients, hover over the blue system icon. To group virtual machines, hover over the desired Hyper-V or ESX Server.
Note:
2
To group virtual machines, you must be able to view VMs in the Navigation pane. If you do not see VMs, click the Gear icon at the bottom of the Navigation pane, check Show Virtual Machines in Navigation Tree, and click Confirm.
Click the folder icon that displays to the item’s right. If the folder icon does not display (and the folder icon at the bottom of the Navigation pane has a red X), enable the Navigation grouping feature by selecting the folder icon.
3
Enter a Group Name.
4
(Optional) Select a color for the group. This allows for further distinction between each group. If a color is not specified, the default color is applied.
5
(Optional) Check the Set as default box to make the selected color the default.
6
Check the Configure Group box. The Add New Group window displays.
7
(Optional) Click the Users tab to add users to the group. For details, see "To assign users to a navigation group" on page 49. If no users are assigned, the group is visible to all Unitrends users with Superuser or Administrator privileges. Note:
Unitrends users with Superuser or Administrator privileges are selected by default to see all groups.
8
(Optional) Click the Not in Group tab to see all items that are not in the group. Check boxes as desired to add items.
9
Review your selections on the Not in Group and In Group tabs to ensure the items display as desired.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 2: Introducing Unitrends
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
49
10 Click Save.
To modify a navigation group 1
Hover over the group name.
2
Click the folder icon to the right. The Edit Group window displays.
3
Edit settings as desired.
4
•
To create a sub-group, click New Inner Group and set up just as you would a regular group.
•
For details on settings, see "To create a navigation group" on page 48.
Click Save. When an item is removed from a group, the item is returned to the original place in the Navigation pane
To delete a navigation group 1
Hover over the group name.
2
Select the folder icon to the right. The Edit Group window displays.
3
Select Delete at the bottom left of the window. When a group is deleted, all items are returned to their original place in the Navigation pane.
To assign users to a navigation group Use this procedure to assign a Unitrends user to a navigation group. The user must already be created before running this procedure. To create a Unitrends user, see "To add a user" on page 66. Note:
To ensure that each user can only see ungrouped items and the groups assigned to them, be sure that the Unitrends user has been assigned the Manage privilege level.
1
Hover over the group name in the Navigation pane.
2
Click the folder icon to the right. The Edit Group window displays.
3
Check the Configure Group box. Available Unitrends users display on the Users tab.
4
Check the desired boxes to assign Unitrends users to the group. If you do not see the user, add it with Manage privileges. For details, see "To add a user" on page 66.
5
(Optional) Add Active Directory users by entering the username in the Active Directory Users field and clicking +. For details, see "About Active Directory authentication" on page 99. Note:
The Active Directory username is just the name, not the domain.
6
Click on the Not in Group tab to add items to the group.
7
Click on the In Group tab to remove items from the group.
8
Click the Make selected users the default box to save these selections for future use in creating groups.
9
Click Save.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 2: Introducing Unitrends
50
Navigation pane options Use the icons at the bottom of the Navigation pane to change how information displays.
•
Click
•
Click
to refresh/reload the system. to see the System Preferences window and check the options you prefer. You can
also configure preferences by selecting Settings > System, Updates, and Licensing > System Preferences.
•
Click
to enable or disable the Navigation grouping feature. (Release 7.5 and higher).
System Preference Window Options
Description
Show system Client
Check to display the Unitrends system as a client in the navigation pane.
Show Customer/Locations
Check to display customers and locations in the navigation tree.
Show Menu Items in Check to display items on the Center Stage pane in a single column. Single Column Show Virtual Machines in Navigation Tree
Check to display virtual machines under the Hyper-V client or ESX server in the Navigation tree. You can then select a given VM to display information shown on various pages (backup status, reports, etc.). To refresh the VM list, select the Hyper-V client or ESX server, click Backup, then click the reload arrows below the VM list on the Backup page.
Save Open/Closed branch status in Navigation Tree?
Check to preserve the branch status of the Navigation pane. If you have expanded or collapsed items, the status is preserved when you log out of the appliance.
Show Drop Menu?
Check to show the drop-down menu when you click the icons in the Main Menu.
Horizontal Menu?
Check to see the drop-down menu when clicking the icons in the Main Menu in a horizontal list. Uncheck to see the drop-down menu in a vertical list.
Show Replication View
For replicating systems, check to switch to Replication View, and see replicated backups stored on the target system. See "Viewing replicated backups" on page 309 for details.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 2: Introducing Unitrends
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
51
Main menu icons See the following for more information about each icon on the Main menu:
• • • • • • • • •
"Status icon" on page 51 "Backup icon" on page 51 "Restore icon" on page 51 "Archive icon" on page 51 "Replication icon" on page 51 "Reports icon" on page 51 "Settings icon" on page 51 "About icon" on page 52 "Log out icon" on page 53
Status icon The front status page allows you to quickly change views to see the past, present, and future status of backup jobs. Change the status view by clicking on the perpendicular labels, or blinds, on either side of the status pane. Jobs that are currently running are displayed on the Present screen. Scheduled jobs are displayed on the Future screen, and the weekly backup status is displayed on the Past screen.
Backup icon Use this feature to schedule and run backups for clients registered to the backup system. For details, see the "Backups Overview" chapter. For additional information about the clients you wish to protect, see the chapter for the applicable OS. For example, "Windows Protection", "VMware Protection", and "Linux Protection" chapters.
Restore icon Use this feature to restore backups to a given client or to recover the backup system itself. For details on restoring client data, see the "Restore Overview" chapter. For details on recovering the backup system itself, see the "Disaster Recovery" and "Legacy Disaster Recovery" chapters.
Archive icon Use this feature to archive backups. Archiving to external media enables you to retain older backups as well as providing the safety of off-site storage. For details, see the "Archiving Overview" chapter.
Replication icon Use this feature to replicate backup data from one Unitrends system to another. Store replicated data in another location for protection in the event of a total site disaster. For details, see the "Replication" chapter.
Reports icon Use this feature to run reports on backups, archives, failures, replication or vaulting, storage, and more. For details, see the "Reports, Alerts, and Monitoring" chapter.
Settings icon Use this feature to view and modify configuration of each subsystem, such as customers, clients,
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 2: Introducing Unitrends
52
and storage, as well as to monitor these subsystems using various tools. For details, see "Subsystem configuration settings" on page 60 and "Advanced Configuration Options" on page 83. For a quick look at the items contained in each subsystem, hover over the subsystem icon.
Favorite pages Pages in the Settings subsystems can be bookmarked for quick navigation. The Bookmarks feature is located in the upper-right corner of the Settings page.
• • • •
To view a list bookmarked pages, click the down arrow. To go to a bookmarked page, select it in the list. To add a page to the list, navigate to the desired page, then click the star icon. To remove a bookmark, navigate to the bookmarked page, then click the star icon.
About icon Use this feature to:
• • • • • • •
Open the Unitrends Administrator’s Guide.
•
Access online support. You can use the “Online Support” icon to reach a self-help page for your appliance.
•
Access context-sensitive help. (See "Context-sensitive help" on page 52 for more information.)
View video tutorials. Access the KnowledgeBase articles. View release notes. See system information (such as the system version and asset tag information). Send feedback to Unitrends. Create or close a support tunnel with a Unitrends Customer Engineer. (See "Support tunnel" on page 52 for more information.)
Support tunnel Select About > Support Tunnel to open a support tunnel. Support tunnels are one of the preferred methods for Support Engineers to assist with troubleshooting issues on the system. Support tunnels provide a secure method of accessing a system remotely. In addition to encrypting the transmission (which helps to protect data), a port is randomly assigned to discourage unwanted access attempts (known as port knocking). Only one tunnel can be open at a time. If an existing tunnel is open, click Support Tunnel to force the tunnel to close. The Support Tunnel connection automatically closes if it is inactive for several minutes, or if there is no attachment within a few minutes of it being opened. Note:
You can also access the support tunnel in Settings > System, Updates, and Licensing > Support Toolbox (Advanced) > Support Tunnel.
Context-sensitive help To access help for any subsystem within the AI, select About > Help, click the ‘?’ icon, or rightclick an area in the subsystem. The context-sensitive help provides a general description of the system’s functionality. The Unitrends Administrator’s Guide is also accessible via the context-
Legacy Recovery-Series and UEB Administrator's Guide Chapter 2: Introducing Unitrends
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
53
sensitive help interface.
Log out icon Use this icon to log out of the system. Note:
You must change the root user password to disable the auto-login feature. If you have not yet changed this password, you are immediately logged back in upon logging out. To change the password, see "About configuring root passwords " on page 87.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 2: Introducing Unitrends
54
Legacy Recovery-Series and UEB Administrator's Guide Chapter 2: Introducing Unitrends
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
55
Chapter 3: Getting Started This chapter contains procedures to guide you through set up of a new Unitrends Recovery-Series appliance. If you are deploying another system type, see one of the following guides for setup procedures:
• • •
UEB Deployment Guide for Installable Software UEB Deployment Guide for VMware UEB Deployment Guide for Hyper-V
Before you start IMPORTANT! Unitrends should be your primary and only solution for backing up your data. Using multiple backup solutions for the same set of data can result in performance issues, VSS-related system issues, and broken log chains for databases. All procedures are executed from the Administrator Interface, unless otherwise indicated. WARNING! It is recommended to perform all administration tasks using the Administrator Interface. The Unitrends operating system implementation is proprietary to Unitrends and should not be modified from the Linux command line unless following a certified Unitrends procedure. Performing general Linux command line administration tasks can have undesirable results. Proceed to the following sections to set up your Recovery-Series appliance:
• • • • • •
"Overview of the Recovery-Series setup process" on page 55 "Prerequisites for Recovery-Series systems" on page 56 "Prerequisites for virtual systems" on page 57 "Initial configuration of Unitrends systems" on page 57 "System setup" on page 59 "Subsystem configuration settings" on page 60
Overview of the Recovery-Series setup process A high level overview of the steps required to set up your Recovery-Series appliance is given here. Proceed to each section referenced in these steps for detailed procedures. Step 1:
Complete the prerequisites for your Recovery-Series system. See "Prerequisites for Recovery-Series systems" on page 56 for details.
Step 2:
Configure the appliance onto the network. See "Initial configuration of Unitrends systems" on page 57 for details.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 3: Getting Started
56
Step 3:
• •
Configure each subsystem using the Setup Wizard. See the following: "System setup" on page 59 for an overview of the Setup Wizard steps. "Subsystem configuration settings" on page 60 for detailed procedures.
Prerequisites for Recovery-Series systems Additional requirements must be met when installing physical systems. For physical systems, complete the procedures in this section before proceeding to Initial configuration of Unitrends systems.
• •
"Site preparation" on page 56 "Physical System Preparation" on page 56
Site preparation It is important to ensure that the physical environment meets the requirements of the system. Proper preparation of the site helps to ensure consistent and stable operation of the Unitrends solution. The site preparation requirements that must be considered prior to installation are:
• • • • •
Space and clearance requirements Load bearing (weight) requirements Power requirements Cooling and environmental requirements Configuration requirements
The Unitrends Site Preparation Guide for Recovery-Series Appliances contains detailed requirements for all Unitrends Recovery-Series physical systems. Click to download: Site Preparation Guide for Recovery-Series Appliances. (If you are deploying UEB Installable Software to your own hardware, refer to your manufacturer's site preparation requirements.)
Physical System Preparation The following items are required to perform the initial configuration of a Unitrends Recovery-Series system:
•
Unitrends system – set up in accordance with the Site Preparation Guide for Recovery-Series Appliances.
•
Peripherals – the system must be connected to a direct attached mouse, keyboard, and monitor or have access to the peripheral devices via a KVM (Keyboard, video, mouse) switch.
•
Ethernet Connection – 1GbE Ethernet cable connected to the switching network backbone.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 3: Getting Started
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
57
Unitrends systems are configured with the following default settings. Item
Description
Default operating system credentials
Default user: root Default password: unitrends1
Default Administrator Interface (AI) credentials
Default user: root Default password: unitrends1
Network configuration
The first Ethernet port (eth0) is configured with an IP address of 10.10.10.1 and a subnet mask of 255.255.255.0
IPMI configuration
On some systems, the first Ethernet port (eth0) is also configured for IPMI with DHCP. IPMI can be used for advanced troubleshooting. The default IPMI credentials are: user: ADMIN password: ADMIN. It is strongly recommended that you change this password for security reasons. See KB 2971 for details.
Prerequisites for virtual systems Unitrends virtual appliances, known as Unitrends Enterprise Backup (UEB) systems, are available for Microsoft Hyper-V and VMware environments. For prerequisites and deployment instructions, see the following deployment guides:
• •
UEB Deployment Guide for VMware UEB Deployment Guide for Hyper-V
Initial configuration of Unitrends systems The first time you power on the Unitrends system, you can configure the network settings. Note:
For UEB systems, see these guides for configuration procedures: UEB Deployment Guide for VMware, UEB Deployment Guide for Hyper-V, or UEB Deployment Guide for Installable Software.
To configure the system 1
When you access the system, the Unitrends Enterprise Backup Console Interface displays. This may take a few minutes.
2
Type 1 in the Please enter choice field to access the Initial System Setup menu.
3
To configure the system on your network, type 1 in the Please enter choice field.
4
Enter a number in the Select a network adapter field. For example, type 0 to select eth0.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 3: Getting Started
58
5
6
Type Y in the Edit network configuration field. Modify these settings:
• •
Type an IP address for the Unitrends system, and press Enter.
•
Type a gateway address and press Enter, or just press Enter to leave this setting blank.
•
Review the settings, then type Y to save or N to exit without saving.
Type a netmask address and press Enter, or just press Enter to accept the default setting.
To configure DNS settings, type 2 in the Please enter choice field, then Y to edit. DNS allows you to resolve IP addresses and qualified domain names. Note:
• • • •
To add clients by name, you must configure DNS. If not using DNS, you must supply a static IP for each registered client. DNS-only registration is supported only for Windows, Linux, and Mac clients.
Type the primary domain name server IP address, and press Enter. If desired, enter a secondary DNS IP, or press Enter to leave this setting blank. If desired, enter a DNS Search domain. Review DNS settings and type Y to save or N to exit without saving.
7
To exit the Initial System Setup menu, type 5 in the Please enter choice field.
8
To change the direct console password, type 2 in the Please enter choice field. This is the root operating system password used to access the console.
• •
Type the password at the New UNIX Password prompt and press Enter. Type the password at the Retype New UNIX Password prompt and press Enter.
You have finished the initial configuration. 9
Once the Unitrends system is configured on the network, it can be set up, managed, and monitored from any workstation or server on the network. To log into the system, direct a web browser to: https://
/
For example: https://192.168.238.2/ Note:
If a security certificate is presented, you must accept the certificate to continue.
10 The Setup Wizard launches to provide step-by-step guidance through the remaining configuration settings. Proceed to System Setup to complete the configuration. Note:
If you are not logged in automatically, click the lock icon, enter the username root and password unitrends1, then click Login.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 3: Getting Started
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
59
System setup Use the Setup Wizard to configure the system in minutes. While the Setup Wizard can be used even after the initial configuration, it is designed to significantly decrease installation time. Additional configuration changes can be made by clicking on the individual activity icons under the Settings menu. See the "Advanced Configuration Options" chapter for details. The Setup Wizard procedures in this guide are for Recovery-Series physical appliances. Steps vary slightly for other Unitrends systems. See the following topics to set up your Recovery-Series appliance:
• •
"Setup Wizard overview" on page 59 "Complete the configuration" on page 60
Setup Wizard overview When you log in to the system for the first time, the Setup Wizard launches. The Setup Wizard enables easy configuration of the Unitrends system by providing step-by-step guidance to configure these subsystems: Step
Description
Date and time
Set the system to the date and local time zone. The system is pre-configured for the time zone: Eastern Time (US & Canada) (UTC-05:00). You can also enable Internet time.
Hostname
Configure the hostname of the system.
Notifications
The system supports push and pull notifications. Configure push notifications (email via SMTP) in this step. You also have the option to receive a PDF version of many of the reports in the email.
Root password
Set the password for the administrative account of the Unitrends system. The system ships with default credentials. It is highly recommended that you change this password.
Users
Unitrends systems can be managed and monitored using different credential levels. This step provides the means to create users with different privilege levels to monitor and/or manage the system.
Installation type
Configure the system as a backup system, replication system, or a backup and replication system. Note:
Install Agents
Replication is supported on systems running release 7.0 and higher. Older releases use the legacy vaulting feature. In these systems the installation type is backup system, vault, or backup system and vault.
For some client types, you must install a light-weight agent before registering the client to the Unitrends system.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 3: Getting Started
60
Step
Description
Clients
Register all protected assets to the system. Unitrends uses a common D2D backup and recovery engine to provide protection for over 100 different versions of operating systems, applications, and hypervisors. All protected environments are registered to the Unitrends system as clients.
Retention
Configure the system to balance retention and backup performance.
Complete the configuration Perform this procedure from any workstation or server on the network. To configure settings using the Setup Wizard 1
Connect to the Unitrends system by directing any browser to https:///recoveryconsole
2
You are automatically logged in to the Administrator Interface. Note:
If you are not logged in automatically, click the lock icon, enter username root and password unitrends1, then click Login.
3
If necessary, launch the wizard by selecting Settings > System, Updates, and Licensing > Setup Wizard.
4
Use the Setup Wizard to guide you through configuration of each subsystem, step by step. Once you have entered settings as desired on a screen, click Next to save and continue. For details on configuring each subsystem, see "Subsystem configuration settings" on page 60.
Subsystem configuration settings The following Setup Wizard steps or subsystems are described in this section:
• • • • • • • • • • •
Welcome screen, see "About the welcome screen" on page 61 Date and time, see "About date and time configuration" on page 61 Hostname, see "About hostname settings" on page 62 Notifications, see "About configuring notifications" on page 62 Root password, see "About root password configuration" on page 65 Users, see "About user configuration" on page 66 Installation type, see "About the installation type" on page 67 Installing agents, see "About installing agents" on page 68 Clients, see "About adding clients" on page 69 Retention, see "About global retention and deduplication" on page 80 Setup complete, see "Setup complete" on page 81
Legacy Recovery-Series and UEB Administrator's Guide Chapter 3: Getting Started
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
61
About the welcome screen The welcome screen displays upon launching the Setup Wizard for the first time. The Setup Wizard launches the first time you log in to the system, or by selecting Settings > System, Updates, and Licensing > Setup Wizard. Accept the license agreement and click Next to continue.
About date and time configuration The date and time interface allows the date and the time to be set on the system. To function properly, the system must be configured for the time zone in which it is deployed. You also have the option to enable Internet time. See the following procedures:
• •
"To set the date and time" on page 61 "To synchronize the system to an external date and time source" on page 61
Note:
The time that displays in the system is based on the time configuration that you set. This is in a 12-hour and AM/PM format.
To set the date and time 1
Access the Set the date and time of the system step in the Setup Wizard, or select Settings > System, Updates, and Licensing > Date/Time.
2
Set a date by clicking the calendar icon next to the Set Date field.
3
Set the time by modifying the hours: minutes AM/PM settings in the Set Time field.
4
Select the time zone in the Set Time Zone field and click Set Time Zone to save. The system is configured for America/New York time zone (UTC – 05:00) by default.
5
Click Next to save the settings and continue with the Setup Wizard, or click Close to exit without saving.
To synchronize the system to an external date and time source 1
Access the date and time step in the Setup Wizard, or select Settings > System, Updates, and Licensing > Date/Time.
2
Check the Enable/Disable Internet Time box. Note:
3
Once you enable Internet time, you cannot explicitly set the date, time, and time zone.
Set options as desired by clicking the Show Internet Time Options box. Internet time options include: Option
Description
NTP (Network Time Protocol) servers
These are the servers, in order, that are periodically queried for the Internetbased time.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 3: Getting Started
62
4
Option
Description
Synchronize system clock before starting service
Use this option to sync the system clock to the NTP time server before starting the NTP service. Do not use this option if the time server cannot be reached regularly. Waiting for synchronization to occur may block use of the system until a timeout has passed.
Use local time source
Use this option if there exists, for example, a radio controlled clock device that synchronizes the system clock with an authoritative time source.
Click Next to save the settings and continue with the Setup Wizard, or click Confirm to save settings in the Date/Time subsystem.
About hostname settings The hostname of the system can be changed to adhere to any naming conventions in your environment. Recovery-Series systems are shipped with the default hostname Recovery-.
To change the hostname 1
Access the Select the hostname step in the Setup Wizard, or select Settings > Clients, Networking, and Notifications > Networks > Hostname.
2
Enter the new hostname in the System Hostname field.
3
Enter the new long name for the system in the Fully-Qualified System Hostname field. This enables name resolution lookups with the long name as well as the short name.
4
If the system is already configured and schedules have been setup to protect the clients in your environment, check the Keep existing hostname aliases box. By checking this box, both the current and previous hostnames are resolved on the network.
5
Click Next to save the settings and continue with the Setup Wizard, or click Close to exit without saving.
About configuring notifications Unitrends systems use a push mechanism to send notifications. This enables you to receive notifications without having to log in to the system. Your appliance automatically notifies you of important system information by:
• •
Displaying alerts on the Status page of the Administrator Interface.
•
Sending email notifications. To receive email notification, you must configure the appliance to use your SMTP server and define email recipients.
Sending SNMP traps to notifiactions.unitrends.com, which are monitored and addressed by Unitrends Support. Your system comes configured to send traps to Unitrends, but you can also configure traps to your own network management server. For details, see "About SNMP trap notifications" on page 125.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 3: Getting Started
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
63
To configure SMTP notifications, see "Email setup" on page 63 and "Email report recipients" on page 63. For more on SMTP notifications, see "Reports, Alerts, and Monitoring" on page 357.
Email setup You must configure a fully qualified domain name for the system before configuring email. Select Settings > Clients, Networking, and Notifications > Networks > Hostname to configure the fully qualified domain name (for example, system.unitrends.com).
To configure email notifications from the Unitrends system 1
Access the Set the email SMTP information step in the Setup Wizard OR Select Settings > Clients, Networking, and Notifications > SMTP Server.
2
Enter the fully qualified SMTP server name or IP address in the SMTP Server field. If a DNS record has not been configured for the system, use the IP address of the SMTP server.
3
If you have an externally-hosted SMTP server that requires authentication, configure authenticated mail relay by checking the SMTP Server Authentication Required box and entering username and password credentials. Note:
When using a non-local mail server or an internal SMTP relay configurations, we recommend using an authenticated mail user to prevent filtering issues (for example, cases where alerts are not sent to specific recipients due to filtering rules applied to unauthenticated connections or defined in the mail domain policy). Use a mail user service account that is exempt from routine password change to prevent email from being blocked or delayed.
4
Enter a valid email address in the Test E-Mail Address field.
5
Click Next to save the settings and continue with the Setup Wizard. A test email is sent, confirming that the SMTP settings have been administered correctly. Firewall and spam filters can delay or prevent delivery. See your company network administrator regarding these issues.
Email report recipients After ensuring that the mail server settings are working properly, set up email recipients to receive reports and notices generated by the system, along with the option to receive PDF versions of the reports as email attachments. Notes:
•
Notifications are sent through email when urgent attention is required. Notifications are sent to the email addresses configured in the System Report Mailing List.
•
If you use replication, a Replication report is also available but must be configured through Replication. See "Tune replication attributes on the source system" on page 288. Note that you can use vaulting or replication, but not both. The Vaulting report is included in the System Report Mailing List.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 3: Getting Started
64
To configure email recipients 1
Access the Configure the report email addresses step in the Setup Wizard, OR Select Settings > Clients, Networking, and Notifications > Email Recipients.
2
Enter the email addresses in each recipient field as desired. To enter multiple recipients, separate the email addresses using a space. Mailing List System Report Mailing List
Description Enter email addresses to receive alerts and notifications from the system. Note:
Notifications are sent to the email addresses configured in the System Report Mailing List.
Examples include:
Schedule Summary Report Mailing List
•
Daily system status. This includes the System Status report (for one system) and the Management Status report (for a roll-up status of multiple systems). Note that your selection in the Navigation pane, when you configure the email recipients, determines which report you receive. Both of these reports are available in PDF format.
•
Vaulting, if used. This includes the Securesync report. (Note that you can use vaulting or replication, but not both.)
•
Windows Instant Recovery, if used. This includes the Recovery Verification report (for source or replicated target), Virtual Client Haled report, and WIR Failure report.
•
Archive report. This is sent for every job upon completion (success or failure) if you check the E-Mail Report box under Archive Options when you perform or schedule an archive. This is sent as a notification.
• •
Change in Client Volumes. This is sent as a notification. Alerts, including capacity, licensing, and legal.
Enter the email addresses to receive the Schedule report. This lists information about the last 24 hours of schedule events. The schedule must also be configured to send this report by checking the E-Mail Schedule Report box in the Advanced Execution Options area when creating a schedule. (See "Enterprise backup procedures" on page 193.)
Legacy Recovery-Series and UEB Administrator's Guide Chapter 3: Getting Started
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
65
Mailing List Failure Report Mailing List
Description Enter the email addresses to receive the Schedule Failure report. This is sent when there is a failed schedule event during the previous hour. The schedule must be configured to send this report by checking the E-Mail Failure Report checkbox in the Advanced Execution Options area when creating a schedule. (See "Enterprise backup procedures" on page 193.) This report does not include non-scheduled events like on-demand backup, restore, etc.
3
Select an Email Report Format. Choose Simple or Enhanced layout and style HTML output. For legacy-style reports, select Simple.
4
Check the Include PDF Report box to receive certain reports in PDF format as an email attachment. (This includes the System Status report, the Management Status report, the Schedule report, and the Schedule Failure report.) Note:
5
The body of the email still contains the report, but there is also an PDF attachment. Some PDF versions of reports retain the Email Report Format you selected (simple or enhanced), but others are only available in enhanced format.
Click Next to save the settings and continue with the Setup Wizard, or click Close to save settings in exit without saving.
About root password configuration The system automatically creates a superuser named root. The root password interface provides the ability to maintain system security by changing the default password for the root user of the Unitrends system. The default password is “unitrends1”. It is highly recommended that you change this password from the default. Leaving the root account’s password at the default will cause the Unitrends interface to automatically log in when accessing the system. If you do not change the password, any user with a browser can access the Unitrends system. Note:
This procedure changes the root password used to access Unitrends Administrator Interface. It does not change the root password of the operating system itself.
To set or modify the root password 1
Access the Set or modify root password step in the Setup Wizard, or select Settings > Customers, Locations, and Users > Users > Root and check Change Password.
2
Enter the new root password into the New Root Password and Confirm New Root Password fields. Passwords may contain upper and lower case letters, numbers, or special characters with the exception of a space and the equal sign (“=”).
3
Click Next to save the settings and continue with the Setup Wizard, or click Close to exit without saving.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 3: Getting Started
66
About user configuration Unitrends systems are managed and monitored from the Administrator Interface (AI). Based on the credentials provided, user’s privileges can be controlled to allow monitor or management capabilities for one or more systems. By default, a superuser named root is created on the system. You should change the password of the root user (the system superuser) to tighten security. User accounts can only be used to access the system for which they were created. Users are not shared across Unitrends systems. To log in to another system, the user must be created directly on that system or set up for that system using Active Directory authentication. See "About Active Directory authentication" on page 99 for information. User actions are logged in the system and can be viewed in the Audit History report. For details, see "Audit History Report" on page 368.
To add a user 1
In the Setup Wizard Add and Configure system users step, check the Do you want to add additional administrator users box, or select Settings > Customers, Locations, and Users > Users.
2
Click Add User.
3
Enter a username in the Username field.
4
Enter a password in the Password and Verify Password fields. Passwords may contain upper and lower case letters, numbers, and special characters with the exception of a space and an equal sign (“=”).
5
If desired, check Superuser. Note:
6
If you are using Navigation grouping, be sure the user has Manage level privileges. For details, see "Navigation grouping" on page 45.
•
A superuser has privileges to perform all operations provided by the Administrator Interface for any system, at any customer location defined in the Navigation pane.
•
Regular users are non-superusers that are added to the system to allow specific capabilities to manage one or more systems in the Navigation pane.
•
For superusers, no further configuration is needed. Click Next to save the settings and continue with the Setup Wizard, or click Confirm to save settings in the Users subsystem.
For regular users, continue with this procedure to add privileges. One or more privileges must be added to create the overall scope and access level for the regular user. Log in is prohibited if no privileges are set for regular users.
7
Click Add Privilege and modify settings as desired. Define a privilege level for each customer, location, and system. See descriptions of each privilege in the tables below.
8
Click Confirm to save the settings and Next to continue with the Setup Wizard, or click Cancel then Close to exit without saving.
Privilege levels are given here.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 3: Getting Started
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
67
Privilege level
Description
None
The user cannot access the customer, location, or system.
Monitor
The user is only able to view the status of operations, such as backups or replication, and run reports. The user cannot start backups, restores or configure the system in any way.
Manage
The user can view statuses and reports, start backups, and perform other management tasks, such as adding or modifying clients and retention settings. They can also view running jobs or processes, but cannot create or modify users other than modifying their own user account password.
Administer
In addition to monitoring and managing systems, the user can add, edit, or delete customers or customer locations, and add, edit, or delete users. Because administrators can create customers and locations, they can also assign systems to different customers and locations in the navigational tree (using Settings > System, Updates, and Licensing > Grid Management).
In addition, regular user’s privileges may be defined at various levels of breadth or scope. Privilege scope
Description
Customer
The most general privilege scope. The privilege level applies to all systems that are associated with all of this customer’s locations. By default, systems are assigned to the Default Location for the Default Customer.
Location
The privilege applies to all systems that are associated with this location for a selected customer. By default, systems are associated with the Default Location for the Default Customer.
System
The most finely-grained privilege scope. The privilege level applies to a particular system at a defined location for a defined customer.
About the installation type The installation type, also known as system personality or system identity, determines which functions the system can perform. Configure this setting in the Setup Wizard Select the installation type step. On systems that only support the backup system installation, this Setup Wizard step does not display. For a description of installation types supported by each system, see "Installation types and replication" on page 282. Select one of the following installations.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 3: Getting Started
68
Installation type
Description
Local backup system
The system will be used as an on-premise system to protect physical and virtual environments, structured and unstructured data on the local area network.
Replication target
The system will be used as an off-premise system. One or more on-premise systems can replicate data to the off-premise system for disaster recovery. Note:
Local backup system and replication target
A system must have a minimum of 128 GB of storage to be used as a replication target.
The system will be used as both a backup and disaster recovery system. It can be used to protect data on the local area network as well as receive replicated data from one or more off-premise systems for disaster recovery.
About installing agents For most operating systems, an agent must be installed on the client whose data you want to protect. For most Windows and Hyper-V clients, core and bare metal agents are automatically installed when you add the client to the backup system. For VMware, iSeries, and NDMP, no agent is required. For other operating systems, you must install the core agent before adding the client to the backup system. For additional information about the client you are adding, see the chapter for the applicable OS. For example, "Windows Protection" on page 425, "VMware Protection" on page 629, and "Linux Protection" on page 707. Note:
The automatic installation feature for Windows and Hyper-V clients is supported on Unitrends system release 7.0 and higher (8.2 and higher for Windows Server 2012 R2 and Windows 8.1). This feature is not supported for Windows NT or 2000. For detailed requirements, see "Agent push install requirements" on page 426.
Install the Unitrends agent on these client operating systems prior to adding the client to the backup system:
• • •
Linux, see "Linux Protection" on page 707.
• • • •
OES, see "Novell OES Linux Protection" on page 729.
Mac OS, see "Mac OS X Protection " on page 719. Unix, see "AIX Protection" on page 697, "HP-UX Protection" on page 699, or "UnixWare Protection" on page 741.
NetWare, see "Novell NetWare Protection" on page 721. Solaris, see "Solaris Protection" on page 739. Windows 2000 and Windows NT, see "Manually installing the Windows agents" on page 428.
The agents for these types of computers can be downloaded from: http://www.unitrends.com/support/latest-agent-releases.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 3: Getting Started
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
69
After installing any required, agents, perform these steps to continue with the Setup Wizard: 1
Access the Setup Wizard Physically install agents step, or select Settings> Clients, Networking, and Notifications> Clients.
2
In the Setup Wizard install agents step, select one of the following: (Skip this step if using the Clients subsystem.)
•
I do not have any of the types of computers in the list above, and click Next. (You can select this option to continue with the Setup Wizard without installing agents and adding the computer types listed above.)
•
I have physically installed the agent on each of the computers with operating systems in the list above, and click Next.
•
I have not physically installed the agent on each of the computers with operating systems in the list above. Install agents as required before proceeding, then click Next to continue.
About adding clients Use this procedure to add clients to the Unitrends appliance. You must add the client to the Unitrends appliance before its data can be protected. Notes:
•
For replicating systems, run this procedure from the replication target to add clients that can be used as restore targets for replicated backups.
•
For NDMP clients, the Unitrends appliance must be licensed for NDMP before you can add NDMP clients.
To add a client to the Unitrends appliance 1
Access the Setup Wizard Add all clients to protect step, or select Settings> Clients, Networking, and Notifications> Clients. Note:
The add computers Setup Wizard step only applies to the backup system installation type. If your system is configured as both a backup system and replication target, add clients using the Clients subsystem.
2
Click Add Client.
3
Select a Computer Type. Configuration options displayed vary based on this selection. Complete the fields appropriately for the selected computer type:
• • • • • •
"Adding a Windows client" on page 70 "Adding a Hyper-V client" on page 72 "Adding a VMware client" on page 74 "Adding a Cisco UCS Manager client" on page 75 "Adding a NAS NDMP client" on page 76 "Adding all other clients" on page 78
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 3: Getting Started
70
4
Click Setup to add the client.
•
For Windows and Hyper-V clients, lightweight core and bare metal agents are installed on the client upon clicking Setup.
•
Once the client is added, it displays on the Settings> Clients, Networking, and Notifications> Clients page.
•
If you see a failure message, the client could not be added. Verify DNS settings, and that ports 1743 and 1745 are open.
If you see the following error message,
"If repeatedly experiencing errors, please download and install the latest agent release on your Windows server from the Unitrends website. After installation, uncheck 'Establish Trust' when setting up your client." the agent could not be installed due to authentication issues. Install the agent manually (see the "Windows Protection" chapter), then add the client without checking the Establish Trust box. 5
Repeat this procedure to add all clients.
6
Click Next to proceed to the next Setup Wizard step.
For more on working with clients, see "About working with clients" on page 88.
Adding a Windows client The table below describes the fields you must complete to add a Windows client: Field
Description
Computer Type
Required. Select Windows.
Computer Name
Required. 15-character limit. The name must be resolvable using DNS or the host table of the Unitrends appliance.
IP Address
You can use DNS or IP to register the client. If not using DNS, an IP address is required.
Authentication
•
If using DNS, leave this field blank. Make sure both the client and the system have DNS entries and that reverse lookup is configured.
•
If using DHCP for client IP address assignment, this field must be left blank. DNS must be configured. For details, see "DNS settings" on page 85.
Do one of the following:
•
If you will be push-installing the agent, authentication is required. Use the Establish trust option described below to enter credentials.
•
If you have manually installed the agent, credentials are not supported. Uncheck the Establish trust box before adding the client.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 3: Getting Started
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
71
Field Establish trust
Use default credentials
Description Checking this box establishes trust between the client and the Unitrends appliance using new or existing credentials. Leave this box unchecked if you have installed the Windows agent manually.
•
Click Create New Credential or, if available, Use Existing Credential. If using new credentials or editing existing credentials, enter an Administrative Username and Password. The credentials must have local system administrator privileges.
•
You must enter a domain if the computer has been setup in a Windows domain.
This box can only be checked if default credentials have been configured. To use default credentials check the Establish trust box and the Use default credentials box. The default credentials must have local system administrator privileges.
Options Enable this computer to be protected...
Checked by default. This box must be checked in order to protect the client. (If you uncheck this box, the client will not be available for backup or restore.)
Automatically Optional. Checking this box creates a file-level backup schedule for the client create a backup and executes it immediately. If desired, uncheck this box and create your schedule for own backup schedules at any time. this computer... All backups performed on this computer are to be replicated...
Optional. Check this box to replicate this client’s file-level backups to an offsite Unitrends appliance for disaster recovery purposes. Applicable only if you have a replication system or Unitrends Cloud service.
All backups performed on this computer are to be encrypted.
Optional. Check this box to encrypt all the data protected for this client using an AES-256 bit algorithm. Applicable only if the system is licensed and configured for encryption. See "About encryption" on page 128 for details.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Note:
This option is not available for applications such as SQL, Exchange, and Oracle. Application databases must be configured for replication individually. For details, see "Configuring backups for replication" on page 300.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 3: Getting Started
72
Field
Description
Advanced options
Optional. Check this box to configure the client’s priority: Select a priority of high, medium, or low for the client. Backups for high priority clients are run before those of medium and low priority. Note:
The Use SSL... box is not used.
If you see the following error message,
"If repeatedly experiencing errors, please download and install the latest agent release on your Windows server from the Unitrends website. After installation, uncheck 'Establish Trust' when setting up your client." the agent could not be installed due to authentication issues. Install the agent manually (see the "Windows Protection" chapter), then add the client without checking the Establish Trust box.
Adding a Hyper-V client The following fields must be completed as described below to add a Hyper-V client. It is recommended that you read "Working with Hyper-V servers" on page 596 before registering your Hyper-V servers. Review the "Special considerations for adding Hyper-V clusters" on page 597 before registering a cluster. Notes:
•
If protecting a VM at the guest OS level, add it with that computer type's requirements rather than those listed below for Hyper-V.
•
For replicating systems, you can add Hyper-V servers to the replication target to use as restore targets for replicated backups. (Add servers as described in "About adding clients" on page 69 ).
Field
Description
Computer Type
Required. Select Hyper-V.
Computer Name
Required. The name must be resolvable using the host table of the Unitrends appliance. Note:
IP Address
You must register all nodes in a cluster before registering the cluster. When adding a cluster node to a Unitrends appliance, you must enter the exact name of the node.
Required. Enter a static IP address.
Authentication
Legacy Recovery-Series and UEB Administrator's Guide Chapter 3: Getting Started
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
73
Field
Description
Establish trust
Do one of the following:
Use default credentials
•
If you are registering a server for which automatic installation of the agent is supported, check this box and enter an Administrative Username and Password for authentication. The credentials must have local system administrator privileges.
•
If you are registering a cluster or server for which automatic installation of the agent is not supported, uncheck this box.
This box can only be checked if default credentials have been configured. To use default credentials check the Establish trust box and the Use default credentials box. The default credentials must have local system administrator privileges.
Options Enable this computer to be protected...
Checked by default. This box must be checked in order to protect the client. (If you uncheck this box, the client will not be available for backup or restore.)
Automatically create a backup schedule for this computer...
•
For individual servers or cluster nodes: Optional. Checking this box creates a file-level backup schedule and executes it immediately.
•
For clusters: Uncheck this box when registering a cluster. Because the cluster is a virtual manager, it does not have a file system that can be protected with file-level backups.
Note:
All backups performed on this computer are to be replicated...
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
The schedule created when you check this box protects only the file system of the server hosting the Hyper-V application. It does not protect the virtual machines. You can schedule backups for the VMs after registering the server.
Optional. Check this box to replicate this server’s file-level backups to an offsite Unitrends appliance for disaster recovery purposes. Applicable only if you have a replication system or Unitrends Cloud service. Note:
To replicate Hyper-V backups of the VMs hosted on the server, you must configure the VMs for replication after registering the server. For instructions, see "Configuring backups for replication" on page 300.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 3: Getting Started
74
Field
Description
All backups performed on this computer are to be encrypted.
Optional. Check this box to encrypt all the data protected for this client using an AES-256 bit algorithm. Applicable only if the system is licensed and configured for encryption. See "About encryption" on page 128 for details.
Advanced options
Optional. Check this box to configure the client’s priority: Select a priority of high, medium, or low for the client. Backups for high priority clients are run before those of medium and low priority. Note:
The Use SSL... box is not used.
Adding a VMware client The following fields must be completed as described below to add a VMware client. Note:
If protecting a VM using agent-based backups, add the VM with that computer type’s requirements rather than those listed below for VMware.
Field
Description
Computer Type
Required. Select VMware.
ESX or VCenter Server
Required. The name must be resolvable using the host table of the Unitrends appliance.
IP Address
Required. Enter the server’s IP address.
Authentication Required. Establish trust
Use default credentials
Checking this box establishes trust between the client and the Unitrends appliance using new or existing credentials.
•
Click Create New Credential or, if applicable, Use Existing Credential. If using new credentials or editing existing credentials, enter an Administrative Username and Password. The credentials provided must have local system administrator privileges.
•
If desired, enter a Domain. This is optional.
This box can only be checked if default credentials have been configured. To use default credentials check the Establish trust box and the Use default credentials box. The default credentials must have local system administrator privileges.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 3: Getting Started
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
75
Adding a Cisco UCS Manager client The following fields must be completed as described below to add a Cisco UCS Manager client. The Cisco UCS Manager client must be added before its service profiles, templates, pools, and policies can be protected. To protect a server hosted on the UCS, add the server to the Unitrends appliance as you would any stand-alone server of that operating system or hypervisor. See "Protecting UCS blade and rack-mount servers" on page 679. Note:
For replication targets. For replicating systems, run this procedure from the replication target to add a Cisco UCS manager that can be used as a restore target for replicated UCS profile backups.
Field
Description
Computer Name
Required. Select Cisco UCS Manager. The name must be resolvable using DNS or the host table of the Unitrends appliance. Note:
IP Address
You can use DNS or IP to register the client. If not using DNS, an IP address is required. If DNS is set up in your environment, you can leave this field empty. Note:
Authentication
If using a cluster configuration, make sure to add the client by cluster name. Do not use the name of either fabric interconnect.
If using a cluster configuration, make sure to add the client by cluster IP. Do not use the IP of either fabric interconnect.
Required. The credentials provided must support native backup and restore of UCS service profiles. To ensure sufficient privilege, the user must have Cisco UCS administrator privileges.
Establish trust
Use default credentials
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Checking this box establishes trust between the client and the Unitrends appliance using new or existing credentials.
•
Click Create New Credential or, if available, Use Existing Credential. If using new credentials or editing existing credentials, enter an Administrative Username and Password.
•
Do not specify a Domain.
This box can only be checked if default credentials have been configured. To use default credentials check the Establish trust box and the Use default credentials box. The default credentials must have local system administrator privileges.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 3: Getting Started
76
Field
Description
Options Enable this computer to be protected...
Checked by default. This box must be checked in order to protect the client. (If you uncheck this box, the client will not be available for backup or restore.)
Automatically create a backup schedule for this computer...
This option is not available because file-level backups are not supported for Cisco UCS Manager clients.
All backups performed on this computer are to be replicated...
This option is not available because file-level backups are not supported for Cisco UCS Manager clients. To replicate UCS service profile backups, see "To replicate application backups" on page 300.
All backups performed on this computer are to be encrypted.
Optional. Check this box to encrypt all the data protected for this client using an AES-256 bit algorithm. Applicable only if the system is licensed and configured for encryption. See "About encryption" on page 128 for details.
Advanced options...
Optional. Check this box to configure the client’s priority: Select a priority of high, medium, or low for the client. Backups for high priority clients are run before those of medium and low priority. Note:
The Use SSL... box is not used.
Adding a NAS NDMP client The following fields must be completed as described below to add an NDMP client. Note:
The Unitrends appliance must be licensed for NDMP and running software version 8.0 or higher and before you can add NDMP clients.
Field
Description
Computer Type
Required. Select NAS NDMP Client.
Computer Name
Required. The name must be resolvable using the host table of the Unitrends appliance.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 3: Getting Started
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
77
Field
Description
IP Address
Required. Enter the remote IP address for the NDMP device.
Authentication
Required. New, existing, or default credentials must be used to establish trust between the Unitrends appliance and the NDMP device.
Establish trust
Checked and grayed out by default. This establishes trust between the client and the Unitrends appliance using new or existing credentials. Click Create New Credential or, if available, Use Existing Credential. If using new credentials or editing existing credentials, enter an Administrative Username and Password. The credentials must have local system administrator privileges.
Use default credentials
This box can only be checked if default credentials have been configured. To use default credentials check the Use default credentials box. The default credentials must have local system administrator privileges.
NDMP Client Options Protocol
Required. Select ndmp.
Vendor
The vendor is automatically detected at the time the client is added.
• • Port
There are currently two supported vendors: NetApp and EMC. If any other NDMP devices are added as clients, this field populates with “Generic.” Behavior of generic NDMP clients is unpredictable.
The NDMP client side control port defaults to 10000.
Options Enable this computer to be protected...
Checked by default. This box must be checked in order to protect the client. (If you uncheck this box, the client will not be available for backup or restore.)
Automatically This option is not available because file-level backups are not supported for create a backup NAS NDMP clients. To schedule NDMP backups, see "About NDMP schedule for backups" on page 574. this computer...
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 3: Getting Started
78
Field
Description
All backups performed on this computer are to be replicated...
This option is not available because file-level backups are not supported for NAS NDMP clients. To replicate NDMP backups, see "To replicate application backups" on page 300.
All backups performed on this computer are to be encrypted.
Optional. Check this box to encrypt all the data protected for this client using an AES-256 bit algorithm. Applicable only if the system is licensed and configured for encryption. See "About encryption" on page 128 for details.
Advanced options...
Optional. Check this box to configure the client’s priority: Select a priority of high, medium, or low for the client. Backups for high priority clients are run before those of medium and low priority. Note:
The Use SSL... box is not used.
Adding all other clients The following fields must be completed as described below to add clients with all operating systems not listed in the Computer Type field of the Backup> Add Client screen. See the appropriate chapters for more information about protecting these operating systems. Note:
This does not apply to CIFS/NFS clients. CIFS/NFS clients must be added as NAS storage. See "Adding CIFS/NFS clients" on page 579 for details.
Field
Description
Computer Type
Required. Select All Other OS.
Computer Name
Required. The name must be resolvable using the host table of the Unitrends appliance. Linux clients have a 31-character limit.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 3: Getting Started
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
79
Field
Description
IP Address
For Linux and Mac, you have the option of using DNS or IP to register clients. If not using DNS, an IP address is required.
•
If using DNS, leave this field blank. Make sure both the client and the system have DNS entries and that reverse lookup is configured.
•
If using DHCP for client IP address assignment, this field must be left blank. DNS must be configured. For details, see "DNS settings" on page 85.
For all other clients, you must enter a static IP address. Authentication Establish trust
Uncheck this box, and do not provide credentials.
Use default credentials
Do not check this box.
Options Enable this computer to be protected...
Checked by default. This box must be checked in order to protect the client. (If you uncheck this box, the client will not be available for backup or restore.)
Automatically create a backup schedule for this computer...
Optional. Checking this box creates a file-level backup schedule for the client and executes it immediately. If desired, uncheck this box and create your own backup schedules at any time.
All backups performed on this computer are to be replicated...
Optional. Check this box to replicate this client’s file-level backups to an off-site Unitrends appliance for disaster recovery purposes. Applicable only if you have a replication system or Unitrends Cloud service. Note:
All backups performed on this computer are to be encrypted.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
This option is not available for applications such as Oracle. Application databases must be configured for replication individually. For details, see "Configuring backups for replication" on page 300.
Optional. Check this box to encrypt all the data protected for this client using an AES-256 bit algorithm. Applicable only if the system is licensed and configured for encryption. See "About encryption" on page 128 for details.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 3: Getting Started
80
Field Advanced options...
Description Optional. Check this box to configure the client’s priority: Select a priority of high, medium, or low for the client. Backups for high priority clients are run before those of medium and low priority. Note:
The Use SSL... box is not used.
About global retention and deduplication Unitrends systems are designed to use all available storage for protecting data (see "Storage allocation and distribution" on page 117). As scheduled or immediate backups are performed, or as backups are replicated to a target system, the oldest backups are deleted to ingest new backups. See "About retention control" on page 121 for details. To increase retention, Unitrends systems utilize adaptive deduplication to remove duplicate data blocks from backups. With deduplication, backup sizes decrease as duplicate blocks are removed, thereby increasing the number of backups that can be stored on the system, also referred to as onsystem retention. Native deduplication is enabled by default. An outside deduplication device can be used for Unitrends Enterprise Backup, but physical systems must use native deduplication. If you use an outside deduplication device, you can disable native deduplication for backups stored on this device when you add it to the system. For details, see "Configuring storage" on page 110. Use the following procedures to balance system performance versus retention to suit your environment.
• •
"To configure global retention settings" on page 80 "Balancing backup performance and retention" on page 80
To configure global retention settings 1
Access the Setup Wizard Setup system retention and backup window characteristics step, or select Settings > Storage and Retention > Retention.
2
Select the desired Balance Retention and Backup Performance option. See the next section for a description of each option.
3
Click Next to save the settings and continue with the Setup Wizard, or click Close to exit without saving.
Balancing backup performance and retention You can tune system storage to fit the backup window and retention objectives of your environment by selecting from the following options.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 3: Getting Started
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
81
Performance/retention options
Description
Balance retention and backup performance (recommended setting)
This is the recommended setting for managing the ingest rate and retention on the system. With this setting, a predictive mechanism is used to dynamically alter the size of the landing zone based on the backup strategies selected.
Minimize backup window
Use this setting where backup window requirements are critical. With this setting, a landing zone (reserve area) is created which is large enough to hold the data set that is being protected. This guarantees the fastest ingest rate. However, to meet the landing zone requirements, older backups are more aggressively deleted.
Maximize retention
Use this setting where retention is critical. The data protection ingest rate is slower. The landing zone is kept to a minimum to ensure maximum retention.
Setup complete Once you have worked your way through the Setup Wizard and reach the Done step, the system is configured and ready to protect your environment. Click Finish to exit the wizard. After exiting the Setup Wizard, perform the following steps: 1
Check for any available updates and install as necessary. See "About system updates" on page 92 for details.
2
Start protecting clients. See the "Backups Overview" chapter to get started. See the "Advanced Configuration Options" chapter for additional setup options.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 3: Getting Started
82
Legacy Recovery-Series and UEB Administrator's Guide Chapter 3: Getting Started
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
83
Chapter 4: Advanced Configuration Options This chapter describes advanced configuration procedures. See the following topics for details:
• • • • •
"About licensing the system" on page 83
• • • • • • • • • • •
"Shutting down the Unitrends system" on page 93
"About network configuration" on page 84 "About configuring root passwords " on page 87 "About working with clients" on page 88 "About system updates" on page 92
"About remote system management" on page 95 "About credential management" on page 97 "About Active Directory authentication" on page 99 "About storage configuration" on page 103 "About device configuration" on page 119 "About retention control" on page 121 "About system notifications" on page 124 "About encryption" on page 128 "About security levels" on page 131 "About the Windows NTFS change journal" on page 135
About licensing the system The licensing component provides an interface for viewing and managing the system's license. Licensing procedures for physical systems differ from those for virtual (UEB) systems. Physical systems are shipped fully licensed. If you need to update a license, apply the license you receive from Unitrends as described in "To add or update a license" on page 83. Virtual systems are deployed without a license. After deploying the system to a virtual machine, you must register and license the system. Register the system as described in the applicable deployment guide (UEB Deployment Guide for Installable Software, UEB Deployment Guide for VMware, or UEB Deployment Guide for Hyper-V). Then apply the license you receive from Unitrends as described in "To add or update a license" on page 83.
To add or update a license Note: 1
Applying a license stops all running jobs.
Select Settings > System, Updates, and Licensing > License > Enter.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
84
2
Enter the License Key, Expiration Date, and Feature String exactly as they appear in the License Key email you received from Unitrends.
3
Click Confirm to apply the license.
About network configuration Use the Networks subsystem to enable the Unitrends system to communicate with other computers on the network. Configure the following:
• • • •
"Ethernet settings" on page 84 "DNS settings" on page 85 Hostname setting, see "About hostname settings" on page 62 "Hosts settings" on page 86
Ethernet settings The Unitrends system ships with a default IP address of 10.10.10.1 and a subnet mask of 255.255.255.0. It is necessary to change these Ethernet settings to communicate with the Unitrends system. Note:
After configuring the Unitrends system with a static IP, you may see DHCP requests coming from the system’s MAC address. This is because on some systems the motherboard has IPMI that shares eth0. If desired, you can reconfigure IPMI LAN to use a static IP. See KB 1245 for details.
To configure Ethernet settings 1
Select Settings > Clients, Networking, and Notifications > Networks > Ethernet.
2
Enter settings and click Confirm.
Review the following table for setting descriptions. New setting are effective immediately. Ethernet setting
Description
IP
Provide a new IP address for the Ethernet adapter (i.e., eth0 or eth1).
Netmask
Provide a new netmask in accordance to the Class of network configured. The default Class C subnet is 255.255.255.0.
Gateway
Provide a gateway to enable the system to connect to computers on other subnets.
Start Card on Boot
This option must be checked for the new network settings to be used when the system is rebooted.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
85
Ethernet setting
Description
Restore Settings if Not Stopped Within __ Minutes
Since the network settings are put into effect immediately upon hitting Confirm, the Restore Settings if Not Stopped Within __ Minutesshould be checked if you would like the network settings to revert to the previous configuration if the new settings could not be applied for any reason. This option is useful if the system is configured on the network and the network settings have to be changed remotely. It prevents being locked out of the Administrator Interface if the new network settings could not be configured.
Stop Restore of Previous Settings
Click to stop the restoration of settings.
Additional Review to confirm that the network adapter is configured for optimal performance in Information the environment. For example, if the network infrastructure has a 1GbE backbone, then ensure that the information displays as, Link: true Speed: 1000 Duplex: full
DNS settings DNS settings must be configured for the Unitrends system to connect to the Internet. In addition, DNS configuration allows the seamless resolution of fully qualified domain names (FQDN) for computers to short names, and vice versa.
DNS registration for Windows, Linux, and Mac clients Beginning in release 7.2, you can choose to add a Windows client to the backup system by entering a static IP address, or by relying on DNS to facilitate the connection. To use DNS, both the backup system and Windows agent must be running release 7.2 or higher. Releases 7.3 and higher support DNS for Linux and Mac clients. Both the backup system and Linux or Mac agent must be running release 7.3 or higher to use DNS. DNS-only registration is supported only for Windows, Linux, and Mac clients. Consider the following when registering clients by DNS:
•
If you do not enter a static IP, make sure that both the client and the backup system have DNS entries and that reverse lookup is configured.
• •
For clients that utilize DHCP for IP address assignment, DNS-only registration should be used. If you supply a static IP, the system attempts to connect using that address but will attempt DNS hostname lookup if the static IP connection fails.
To configure DNS settings 1
Select Settings > Clients, Networking, and Notifications > Networks > DNS.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
86
2
Enter the IP of the DNS server in the DNS Server Address field and click Add. Multiple DNS servers can be added in this manner.
3
If desired, change the precedence order of the DNS servers in the Current DNS Server Address Order area by dragging a DNS server IP address. The system connects to the DNS servers for name resolution in this order, starting with the address at the top.
4
Enter the domain for your environment in the DNS Domain field and click Add. Multiple domain names can be added in this manner. This allows short names on the network to be resolved with the provided domain name. If this information is not provided, all computer name resolution is performed using the fully qualified domain name (for example, computer.domain.com).
5
If desired, change the precedence order of the domain names in the Current DNS Domain Order area by dragging a domain name. This is the order in which the system will try to resolve the short and fully- qualified domain names.
6
Click Confirm to save your settings.
Hosts settings The Unitrends system’s hosts file contains the name and IP of each client it protects. When you add a client to the system, an entry is automatically created in the hosts file. If necessary, you can view and modify these hosts file entries using these procedures:
• • • •
"To view the Unitrends system hosts file" on page 86 "To modify a hosts file entry" on page 86 "To add a hosts file entry" on page 87 "To delete an entry from the hosts file" on page 87
To view the Unitrends system hosts file 1
Select Settings > Clients, Networking, and Notifications > Networks > Hosts.
2
The hostname, IP address, and fully qualified name are given for each hosts file entry. Note that the fully qualified name is optional.
3
Click Close to exit the Hosts page.
To modify a hosts file entry 1
Select Settings > Clients, Networking, and Notifications > Networks > Hosts.
2
Select the desired host entry row.
3
In the Modify Host area, change the Host Name, IP Address, Qualified Name, or Alias List as desired. Note that you cannot change the Host Name or Qualified Name of the Unitrends system itself.
4
Click Confirm to save your changes, or click Cancel to exit without saving.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
87
To add a hosts file entry 1
Select Settings > Clients, Networking, and Notifications > Networks > Hosts.
2
Click Add Another Host.
3
In the Add Host area, enter the machine’s Host Name and IP Address. If desired, enter a Qualified Name and Aliases (these are optional).
4
Click Confirm to save your changes, or click Cancel to exit without saving.
To delete an entry from the hosts file 1
Select Settings > Clients, Networking, and Notifications > Networks > Hosts.
2
Select the desired host entry row and drag it to the Delete Host icon.
3
Click Yes to confirm you wish to delete the entry, or click No to cancel.
About configuring root passwords The root user is granted superuser privileges and can perform all system administration tasks. The Unitrends system is configured with two distinct root user accounts:
•
Operating system root account, used to access the Unitrends console directly for initial network configuration, iSeries administration, and some bare metal tasks.
•
Unitrends Administrator Interface root account, used to access the system from any web browser.
Operating system root password configuration Op e ra tin g s y s te mro o tp a s s wo rd c o n fig u ra tio n
By default, the operating system root password is unitrends1. To change the root operating system password 1
Access the root password step in the Setup Wizard, or select Settings > System, Updates, and Licensing > OS Password.
2
Enter the current password in the Current OS Root Password field.
3
Enter the new root password into the New OS Root Password and Confirm New OS Root Password fields.
4
Click Next to save the settings and continue with the Setup Wizard, or click Confirm to save settings in the OS Password subsystem.
Administrator interface root password configuration Ad min is tra to rin te rfa c e ro o tp a s s wo rd c o n fig u ra tio n
By default, the Administrator Interface root password is unitrends1. It is highly recommended that you change this password from the default.
Auto-login feature Au to -lo g in fe a tu re
Your appliance has an auto-login feature. If you do not change the root Administrator Interface password, the system automatically logs in anyone with a browser and the system’s IP address.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
88
To update the root Administrator Interface password 1
Select Settings > Customers, Locations, and Users > Users > Root and check Change Password.
2
Enter the new password in the Password and Verify Password fields. The password can contain upper and lower case letters, numbers, and special characters with the exception of a space and an equal sign (“=”).
3
Click Confirm to save.
About working with clients This section describes additional client procedures. For instructions on registering a client to the backup system, see "About adding clients" on page 69. Use these procedures to manage the clients whose data you are protecting:
• • •
"To modify a client" on page 88 "To delete a client" on page 90 "To push agent updates to one client" on page 90
To modify a client Use this procedure to modify a client on the Unitrends appliance. Note that CIFS/NFS NAS clients cannot be modified using this procedure. Instead, see "To modify a CIFS/NFS client" on page 581. 1
Access the Setup Wizard add computers step, or select Settings > Clients, Networking, and Notifications > Clients.
2
Select the client.
3
Modify fields as desired and click Save.
Field definitions Field
Action
Computer Type
Select an operating system or environment from the list.
Authentication
Check the Establish trust box to associate trust credentials for the client. For information on trust credentials and using default credentials, see "Client trust credentials" on page 91 for details.
Computer Name
Name of the client. This name must be resolvable using DNS or the host table of the system. Note:
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
It is best not to rename a client because this can have undesirable results for replicating, vaulting, and archiving systems. For details, see "About renaming clients" on page 89.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
89
Field
Action
IP Address
Client’s IP address. If using DNS, you may leave this field empty. If not using DNS, this is a required field.
Administrative Username
Available only if the Create New Credential option is selected. Credentials provided must have local system administrator privileges or domain administrator privileges.
Password
Available only if the Create New Credential option is selected.
Domain
Available only if the Create New Credential option is selected. You must enter a domain if the computer has been setup in a Windows domain.
NDMP Client Option check boxes
Available only if NAS NDMP Client is selected as the Computer Type.
Enable this computer...
Check to enable the client for data protection; uncheck to disable.
Automatically create a backup schedule...
Check to create a file-level backup schedule for the client and execute it immediately.
All backups performed on this computer are to be replicated...
Check to replicate this client’s backups to an off-premise system for disaster recovery purposes. Applicable only if you have a replication system or Unitrends Cloud service.
All backups performed on this computer are to be encrypted
Check to encrypt all the data protected for this client using an AES-256 bit algorithm. Applicable only if the system is licensed for encryption and encryption has been configured (see "About encryption" on page 128 for details).
Advanced options
Check to set this client’s backups to high, medium, or low priority and to enable or disable SSL.
About renaming clients Although you can rename a client in the Unitrends system, it is best practice not to change the name of a client because this can have undesirable results for replicating, vaulting, and archiving systems. Instead, it is recommended that you add the client to the system as a new client with a new name using the procedure described in "About adding clients" on page 69. Before adding the new client, change the IP address of the existing client in the Unitrends system to avoid conflicts.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
90
When you have built up retention for the new client, you can delete the original client (and its associated backups). For details, see "To delete a client" on page 90. If it is necessary to rename a client, use the procedure "To modify a client" on page 88. You must save any backup schedules associated with this client after renaming it, or backup jobs for the client will not queue.
To delete a client Use this procedure to delete a client and its backups from the Unitrends appliance. Note that CIFS/NFS NAS clients cannot be deleted using this procedure. Instead, see "To delete a CIFS/NFS client" on page 582. WARNING! When a client is deleted, all associated backups of that client are also deleted. Please use caution before deleting a client. Note:
About master.ini configuration settings. Unitrends client configuration settings are saved in the master.ini file. Note that deleting the client from the Unitrends system also removes this file from the client and any customized settings you have added are lost. Be sure to save the client’s master.ini file before deleting if you think you may want to add the client to this or another Unitrends system and want to use these settings. After adding the client back to a system, replace the standard master.ini file with the one you have saved.
1
Access the Setup Wizard add computers step, or select Settings > Clients, Networking, and Notifications > Clients.
2
Select the client.
3
Click Delete this Computer. Note:
•
If a message displays indicating that this client is scheduled for backup, you must first remove the client from all schedules before deleting.
•
If you are using Windows Instant Recovery and you remove a virtual client while a virtual restore of that client is in progress, the deletion may not be instantaneous. The clean up takes time because the restore is shut down and the client is removed.
To push agent updates to one client If push updates are supported for the client, install updates as described here. For push update requirements, see "Requirements for pushing agent updates" on page 435. To push updates to multiple clients, see "To push install agent updates" on page 436. 1
Select Settings > Clients, Networking, and Notifications > Clients.
2
Select the desired client.
3
Click Upgrade Agent. Note that the Upgrade Agent option does not display if no upgrade is available for this client.
4
Upon clicking Upgrade Agent, updates are pushed to the client if these conditions are met:
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
91
• • •
Trust credentials are valid.
•
Updates are available for the client (client is not running the latest agent release).
No backup or restore job is currently in progress or scheduled to run soon for the client. Push update requirements have been met (see "Requirements for pushing agent updates" on page 435).
Client trust credentials Trust credentials are required for VMware and Cisco UCS protection, as well as to enable push installation of agent software and agent updates. Procedures in this section are for applying credentials at the client level. For centralized credential procedures, see "About credential management" on page 97. To delete trust credentials, see "To delete a credential" on page 99. To determine whether push installation is supported for your client, see "Agent push install requirements" on page 426 and "Requirements for pushing agent updates" on page 435. Use the following procedures to manage a client’s trust credentials:
• • •
"To create a new trust credential for a client" on page 91 "To apply default credentials to a client" on page 91 "To apply an existing trust credential to a client" on page 92
To create a new trust credential for a client Use this procedure to create a new credential and apply it to a client. 1
Select Settings > Clients, Networking, and Notifications > Clients.
2
Select the desired client.
3
Check the Establish trust box.
4
Click Create New Credential, and enter the following fields:
5
Field
Action
Administrative Username
User must have local system administrator privileges or domain administrator privileges.
Password
Password associated with the username you supplied.
Domain
If the Windows client has been added to a Windows domain, you must enter a domain. Otherwise, you may leave this field blank.
Click Save to create and apply the trust credential. The credential also displays in the Settings > Clients, Networking, and Notifications > Credential Management page.
To apply default credentials to a client Use this procedure to apply the existing default credential to a client. If no default credential exists, you can create one as described in "To create a new trust credential for a client" on page 91, then set the credential to default as described in "To set a default credential" on page 99.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
92
1
Select Settings > Clients, Networking, and Notifications > Clients.
2
Select the desired client.
3
Check the Establish trust box.
4
Check the Use default credentials box.
5
Click Save.
To apply an existing trust credential to a client Use this procedure to apply an existing non-default credential to a client. 1
Select Settings > Clients, Networking, and Notifications > Clients.
2
Select the desired client.
3
Check the Establish trust box.
4
In the Use Existing Credential list, select the desired credential. Note that if only one credential exists, you see the credential name rather than Use Existing Credential.
5
Click Save to apply the trust credential.
About system updates The updates interface provides a means for updating software on the system and for pushing agent updates to certain clients. This section describes system updates. For agent updates, see "Push installing agent updates" on page 435. It is recommended that you run the latest Unitrends version on your backup system. When updates are available, you see an alert on the front Status page. Before updating the system, note the following requirements:
•
When using an on-premise backup system that replicates to an off-premise target, the offpremise target system must first be upgraded.
•
If an on-premise backup system is being remotely managed by another Unitrends system, the managing system must first be upgraded.
• •
To install updates, the system must be running Linux CentOS Release 5 or CentOS Release 6.
• •
An active support contract is required to upgrade the system.
•
Do not upgrade a client’s agent software to a version newer than that of its backup system. Update the backup system prior to installing newer agents. The backup system version must be equal to, or newer than, that of its clients.
•
To update a physical appliance that cannot connect to the Internet, you can use an ISO image and follow the instructions in KB 2483.
If a restore is needed for a specific backup while a database migration is active, select the backup for migration to begin on the specific backup.
Updates to backup systems are compatible with older agent versions. Although it is recommended that you upgrade to the latest agent versions, the system will continue to function properly running older agents.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
93
• •
If you are running a pre-6.0 version, contact Support for assistance in upgrading. For more information about upgrading to the current version, see the Legacy Recovery-Series and UEB Upgrade Guide. You can also view the video tutorials Upgrading the Unitrends Appliance and Troubleshooting the Unitrends Appliance Upgrade.
To update the system 1
Select Settings > System, Updates, and Licensing > Updates.
2
Look at the message on the System Updates tab and do one of the following:
3
•
If you see the message The system is up to date, there are no updates to install. Click Exit to close and do not continue with these steps.
•
If you see the message There are "x" available updates, continue with these steps.
To see details on the software packages that are being updated, click Show Update Details. Packages can be selectively added or removed by dragging the packages to the right pane or the left pane respectively. Packages beginning with the word unitrends are required. It is highly recommended to install all available updates at all times.
4
Click Install to start updating software packages. If there are software updates (like the kernel package) that require a reboot, you receive a message to this effect once the updates have been installed. If you do not receive this message, a reboot is not necessary. During installation you see progress messages, such as installing 5 of 20. If updates seem to stall, or if you receive a message indicating that a package could not be installed, you may click Exit and then restart the update procedure.
5
After the installation, log out and refresh the browser before logging back in.
Shutting down the Unitrends system Typically, it should not be necessary to shut down your Unitrends system unless you need to:
• •
Reboot after installing an update Power down a physical appliance to perform maintenance
You can shut down from the Administrator Interface (UEB or Recovery-Series), from the hypervisor (UEB), or from the physical appliance itself. If it is necessary to shut down your system, Unitrends recommends shutting down from the Administrator Interface. Any jobs in progress when the system is shut down will fail. Scheduled jobs do not run while the system is shut down. Options for shutting down your Unitrends system:
• • •
"To shut down from the Administrator Interface" on page 93 "To shut down UEB from the hypervisor" on page 94 "To shut down from the physical appliance" on page 95
To shut down from the Administrator Interface This is the recommended method for shutting down your system. 1
If you have any attached archive media, shut it down before continuing with this procedure.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
94
2
Select the system in the Navigation pane.
3
Go to Settings > System, Updates, and Licensing Shutdown to see the Shutdown/Restart window.
4
If you see the message, Shutdown/Restart may be performed only..., you are trying to shut down a system from its managing system. You must log in to the individual system that you want to shut down.
5
Enter your OS Root password.
6
The Restart after shutdown checkbox defaults to checked. Leave this checked to restart the system automatically after it shuts down. Uncheck the box if you need the system to remain shut down, such as to perform maintenance.
7
Click Confirm.
8
Click OK when you see the message System is shutting down...
9
Click Logout to exit the system.
10 Log in after the system restarts. If you see the message Call was unsuccessful. . ., the restart is not complete. Try again in a few minutes. If you opted to shut down without restarting, you need to push the power button on the physical appliance or manually start the UEB VM from the hypervisor, before you can log back into the system.
To shut down UEB from the hypervisor Use this method only if you are unable to shut down the system through the Administrator Interface. The following instructions are based on the VMware vSphere Client. The procedure could vary with different hypervisors. 1
If you have any attached archive media, shut it down before continuing with this procedure.
2
Log in to the vSphere Client.
3
Go to Home > Inventory > Inventory to view your VMs.
4
Right click on the VM to which the UEB is deployed to see an options menu.
5
Hover over Power. Click Power Off.
To power on your UEB from the hypervisor Before logging back into the system through the Administrator Interface, you need to power on the VM to which it is deployed. 1
Log in to the vSphere Client.
2
Go to Home > Inventory > Inventory to view your VMs.
3
Right click on the VM to which the UEB is deployed to see an options menu.
4
Hover over Power. Click Power On.
5
After the UEB has been powered on, you can turn on any attached archive media that was shut down before you shut down the UEB.
6
Log in to the system through the Administrator Interface.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
95
To shut down from the physical appliance Use this method only if you are unable to shut down the system through the Administrator Interface. 1
Before you shut down the physical appliance, make sure that all attached archive media is shut down.
2
Press the power button on the physical appliance.
Note:
Before you can log back into the system, you must power on the appliance by pressing the power button.
To power on from the physical appliance 1
Press the power button on the physical appliance.
2
After the appliance has been powered on, you can power on any archive media that was shut down prior to shutting down the appliance.
3
Log in to the system through the Administrator Interface.
About remote system management Unitrends single-pane-of-glass interface gives you the ability to manage multiple backup systems and replication targets from one central location. In the following figure, the user is logged into the manager system called LucieUEB, and can administer another managed system called replication35.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
96
Proceed to "Granting privilege for remote management" to set up management of a remote system.
Granting privilege for remote management For a replication target or a management system to remotely manage a local backup system, the backup system has to explicitly grant privilege to the manager. This is done to secure a two-way handshake between the manager and the managed system. After granting remote management privilege to a system, you can administer nearly all actions on the managed system through a single pane of glass. There are a few exceptions. Log on locally to a system to perform the following functions:
• •
Manage and create customers, locations, and users. Change the local system password.
Certain other operations are restricted if the remote system is not the same version as the manager. It is a best practice to always have all Unitrends systems on the latest version. For details, see the following procedures:
•
"To grant the remote management privilege" on page 97
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
97
•
"To revoke the remote management privilege" on page 97
To grant the remote management privilege 1
On the local backup system (managed system), select the blue system icon in the Navigation pane.
2
Select Settings > System, Updates, and Licensing > Grid Management.
3
Select Allow Remote Management at the bottom left.
4
Enter the hostname of the replication target or manager system. Be sure to enter the hostname exactly as it appears in the hosts file on the target or manager system. To view a system’s hostname, select Settings > Clients, Networking, and Notifications > Networks > Hostname.
5
Click Confirm to grant the privilege.
6
On the replication target or manager system, refresh the view to display the managed system in the Navigation pane.
To revoke the remote management privilege 1
On the local backup system (managed system), select the blue system icon in the Navigation pane.
2
Select Settings > System, Updates, and Licensing > Grid Management.
3
Select Revoke Remote Management at the bottom right.
4
Enter the IP address of the manager system.
5
Click Confirm to revoke the privilege.
6
On the replication target or manager system, refresh the view to remove the system that is no longer managed from the Navigation pane.
About credential management Credentials are used to establish a trust relationship between the backup system and its clients. Once you apply a credential to a client, the backup system can only access the client using the associated administrative username and password. If the username and password are not valid, access is denied. Credentials can be set at either the client or instance level. Client-level credentials are used for agent push and backup operations. Instance-level credentials are used to perform a backup of a particular application instance, such as a virtual machine or an Oracle database. Credentials are required for VMware, Cisco UCS, NDMP, and Oracle protection; credentials are recommended for Windows clients, and optional for other client types.
• •
For details on creating client-level credentials, see "Client trust credentials" on page 91. For VMware, client-level credentials are required for the vCenter or ESX server, but instancelevel credentials are optional for individual VMs. See "Setting VM credentials for applicationaware protection" on page 637 for details on when to use instance-level credentials.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
98
•
For Cisco UCS, the Cisco UCS manager client must be registered to the backup system with administrative trust credentials. See "Adding Cisco UCS Manager clients to the Unitrends appliance" on page 687 for details.
•
For Oracle databases, instance-level credentials are required to perform backup operations. See "Oracle client and instance requirements" on page 550 for details.
•
For Windows clients, client-level credentials are required to push install agents and agent updates. For more on push installation, see "Push installing the Windows agents" on page 426.
Use the procedures in this section to manage both client-level and instance-level credentials from a centralized location. The Credential Management page displays each credential along with its associated clients, VMware instances, and/or Oracle instances. To collapse the view, click the arrow to the left of a credential. Perform the following tasks using the Credential Management page:
• •
"To create a new credential" on page 98
• •
"To set a default credential" on page 99
"To view or modify a credential" on page 98
"To delete a credential" on page 99
To create a new credential 1
Select Settings > Clients, Networking, and Notifications > Credential Management.
2
Click New Credential and enter the following fields: Field
Action
Credential Name
Name associated with the credential. This is optional.
Administrative Username
User must have local system administrator privileges or domain administrator privileges.
Password
Password associated with the username you supplied.
Confirm Password
Enter the password again to confirm.
Domain
Name of the Windows domain associated with this credential. This is optional.
3
Click Save New Credential.
4
The credential is created and automatically displays in the Credential Management screen.
To view or modify a credential 1
Select Settings > Clients, Networking, and Notifications > Credential Management.
2
Select the desired credential in the grid.
3
Click Edit Selected Credential and modify settings as desired. For a description of each field, see "To create a new credential".
4
Click Save Credential.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
99
To set a default credential Once a default credential is created, you can assign it to clients by checking the Use default credentials box on the Client page. Once you have set the default credential, you cannot change your selection. Instead, you must edit the default credential, or delete it to choose another as the default. 1
Select Settings > Clients, Networking, and Notifications > Credential Management.
2
Select the desired credential in the grid and click Edit Selected Credential, or create a new credential as described in "To create a new credential" on page 98.
3
Check the Set as Default box and click Save Credential.
To delete a credential 1
Select Settings > Clients, Networking, and Notifications > Credential Management.
2
Verify that there are no clients associated with the credential. A credential that is associated with a client cannot be deleted. If there is a client associated, remove the association on the Clients page by either unchecking the Establish Trust box or by associating a different credential. For details, see "Client trust credentials" on page 91.
3
Select the desired credential in the grid and click Delete Credential.
About Active Directory authentication This section describes the procedures used to implement Administrator Interface (AI) authentication using Active Directory (AD) domain credentials. Users can be set up as members of specified AD domains to access the Unitrends system without being added as users in that system itself. Note:
AD authentication is implemented at the AI and Apache component level. The Unitrends operating system is not joined to the AD domain.
The AD group to which a user belongs determines which features that user can view and utilize. Users are granted one of the following privilege levels: monitor, manage, administrator, or superuser. User actions are logged in the system and can be viewed in the Audit History report. For details, see "Audit History Report" on page 368. Perform these procedures to manage Active Directory authentication:
• • •
"To authenticate using Active Directory" on page 99 "To log in using AD authentication" on page 102 "To enable or disable Active Directory authentication" on page 102
To authenticate using Active Directory Note:
1
If are using the Active Directory user with navigation grouping, give the user Manage level privileges. For details, see "Navigation grouping" on page 45.
Create the following groups in your Active Directory domain:
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
100
Group
Description
Unitrends- Members of this group are granted superuser privileges. Superuser Unitrends- Members of this group or domain administrators are granted administrator Admin privileges. In addition to monitoring and managing systems, these users can add, edit, or delete customers or customer locations, and add, edit, or delete users. Because administrators can create customers and locations, they can also assign systems to different customers and locations in the navigational tree (using Settings > System, Updates, and Licensing > Grid Management). Unitrends- Members of this group are granted manage privileges. These users can view Manage statuses and reports, start backups, and perform other management tasks, such as adding or modifying clients and retention settings. They can also view running jobs or processes, but cannot create users or modify users, with the exception of modifying their own user account password. Unitrends- Members of this group are granted monitor privileges. These users are only able Monitor to view the status of operations, such as backups or replication, on the front Status page, and run reports. They cannot start backups or restores, view running jobs, or configure the system in any way, other than to modify their own user account password. Note:
2
You may name these groups to suit your environment. If you use your own names, be sure to enter these names when you configure AD authentication in the Unitrends system. User group names in your AD domain must match the names you enter in step 7 on the facing page.
Add users to the Unitrends domain groups as desired. Users who are not domain administrators must be assigned to a Unitrends group to log in to the AI using AD authentication. Note:
Add users to the groups only. Do not add groups. Nested grouping is not a Microsoft best practice and may cause undesirable results.
3
In the Unitrends AI, select the desired system in the Navigation pane.
4
Do one of the following: Note:
The backup system must be running release 7.2 or higher to use the DNS option. For older releases, you must add the AD server to the system’s host file.
•
Create a DNS entry for the AD server with reverse lookup configured, then skip to step 6 on the facing page.
•
Add the AD server to the Unitrends system’s host file as described in step 5 on the facing page.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
101
5
Add the Active Directory server to the Unitrends system’s host file as described below. If you’ve already added the server, verify that you have set the fields as described here. Modify settings as necessary. Select Settings > Clients, Networking, and Notifications > Networks > Hosts, click Add Another Host, enter Host Name, IP Address, and Qualified Name as described below, then click Confirm.
• •
The AD server is the machine where the Active Directory domain is located.
•
Example: for an AD server called SERVER_AD whose IP address is 192.168.111.75 and AD domain is company_domain.com, enter the following: SERVER_AD in the Host Name field. 192.168.111.75 in the IP Address field. company_domain.com in the Qualified Name field.
For Qualified Name, enter the active directory domain only. Do not include the server name.
IMPORTANT! This host entry must be added before continuing with this procedure. The host entry must be present before configuring the Unitrends system for AD authentication. 6
Select Settings > System, Updates, and Licensing > Active Directory.
7
Enter information as follows: Field
Action
Enable Active Check this box to start using AD authentication, or leave unchecked to start Directory using AD authentication at a later time. Authentication Use SSL
The Use SSL option is not supported.
Active Directory Server
Enter the hostname of the machine where the Active Directory Domain is located. If left blank, the system populates this field using the hosts file entry. If you are using DNS and did not add the AD server to the hosts file, be sure to enter the hostname here. This field is limited to 15 characters.
Active Directory Domain
Enter the name of the AD domain. Do not include the AD server name. For example, ad_domain.company_domain.com. This name must be present in the system’s host file or resolvable through DNS.
Active Directory IP
Enter the IP address of the AD server. This is optional.
Unitrends Superuser Group
Enter Unitrends-Superuser
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
102
8
Field
Action
Unitrends Administrator Group
Enter Unitrends-Admin.
Unitrends Manage Group
Enter Unitrends-Manage.
Unitrends Monitor Group
Enter Unitrends-Monitor.
Click Confirm to save, or click Cancel to exit without saving.
To log in using AD authentication This procedure assumes you have set up the Unitrends user account in Active Directory and have configured AD authentication as described in "To authenticate using Active Directory". 1
Connect to the Unitrends system by directing any browser to https:///recoveryconsole
2
Click the lock icon.
3
In the Enter your username field, enter the AD domain and user name in either of the following formats: ad_domain\ad_username or ad_username@ad_domain.company_domain For example, for user jsmith on AD domain accounting and company domain americanaccountants.com, enter: accounting\jsmith or [email protected]
4
In the Enter your password field, enter the password for this AD user.
5
Click Login.
To enable or disable Active Directory authentication 1
Select Settings > System, Updates, and Licensing > Active Directory.
2
Check the Enable Active Directory Authentication box to enable AD authentication, or uncheck this box to disable AD authentication.
3
Click Confirm to save.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
103
About storage configuration The Unitrends system is configured as a backup system, a replication system, or as both a backup and replication system if performing both roles. Note:
Rack-mounted systems sold before May 2011 and older desktop units do not support replication. Instead, legacy vaulting is used. In these systems, the installation type is backup system, vault system, or cross-vault if performing both roles. For a description of supported installation types by system, see "Installation types and replication" on page 282.
The system’s storage needs vary based on the role it plays in the environment. Use the storage interface to do the following:
• •
Optimize distribution of storage depending on the role of the system.
•
Protect a NAS share by mounting it directly on the Unitrends system. This eliminates the network latency associated with data transfer for NAS shares backed up as mounted devices on protected clients of the system.
•
Add backup or vaulting storage to Unitrends virtual (UEB) systems. Vaulting storage is only used for systems running the legacy vaulting feature. For replication, data is written to the backup storage area.
•
Optimize storage utilization by selecting an ingest rate strategy for the data being protected compared to the amount of retention on the system.
Add SAN or a NAS storage as rotational archiving targets using high speed interconnects, like Fibre Channel and 10Gb Ethernet.
The storage interface displays all storage targets that have been configured. For each target, details about the storage are given, including its usage, associated device, type, mount point, size, free space, and status (online or offline). See these topics for details:
• • • • •
"Storage types" on page 104 "Adding storage to the system" on page 105 "Configuring storage" on page 110 "Storage allocation and distribution" on page 117 "Balancing backup performance and retention" on page 118
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
104
Storage types Type
Description
Backup storage
This option applies to Unitrends virtual systems only. Backup storage can be increased by adding a virtual disk to the UEB virtual machine using the hypervisor. Note:
Although it is possible to attach external storage directly to the UEB VM, this is not recommended. If you must connect to external storage from the UEB virtual machine directly through network protocols (NFS, CIFS, or iSCSI), be sure to use a supported vendor from the list in KB 3350.
Once the storage is added in the hypervisor, go to the Unitrends system and either expand the existing backup device to include the new disk, or add a separate backup device. (See "Adding backup storage" on page 105 for details). Within the hypervisor, you can add internal disks to the UEB VM or, if you deployed your UEB to an attached SAN or NAS storage array, you can create datastores (VMware) or volumes (Hyper-V) from that array to add virtual disks (VMDK or VHDX) to the UEB VM. WARNING! It is strongly recommended that all UEB storage is either direct attached storage (DAS, internal to the hypervisor) or resides on one external storage array. If you configure storage across multiple storage arrays and one becomes unavailable, all backup data is corrupted, resulting in total data loss. You can leverage SAN or NAS storage to create datastores (VMware) or volumes (Hyper-V) by connecting the external array to the hypervisor host:
Vault storage
•
A SAN LUN on the array can be connected to the hypervisor host and exposed to UEB. You can then add the entire LUN to UEB or create virtual disks (VMDK or VHDX) on the LUN and expose these disks to UEB for added storage.
•
A NAS share can be connected to the hypervisor host over CIFS or NFS protocol to create virtual disks (VMDK or VHDX) for added storage.
This option applies to Unitrends virtual systems performing legacy vaulting only. Additional vault storage can be added to the virtual system in the following ways:
• •
A SAN iSCSI LUN can be used.
• •
An additional virtual disk can be added to the virtual system.
The hypervisor can connect to a SAN using iSCSI or Fibre Channel and expose the LUN as a Raw Device Mapping device.
A NFS NAS share can be leveraged. NAS shares configured with the CIFS protocol are not supported for legacy vaulting.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
105
Type
Description
Archive storage
This option applies to all physical and virtual systems that have been licensed for advanced archiving. Additional archive storage can be added in the following ways:
• • • •
A SAN iSCSI LUN can be used. A NAS share configured with the CIFS or NFS protocols can be leveraged. For virtual systems, an additional virtual disk can be added. Cloud storage using the Unitrends CloudHook.
NAS This option applies to all physical and virtual systems. A NAS share configured using protection the NFS or CIFS protocol can be mounted directly on the system and protected as a client. Protect VMs on a SAN
This option applies to Unitrends physical systems and UEB on VMware. This options is not available for UEB on Hyper-V. For VMware environments where datastores are hosted on a SAN, configure SAN storage so that data is backed up directly from the SAN to the backup system. For details, see "VMware SAN-direct backups" on page 650.
Adding storage to the system This section provides instructions for adding the following kinds of storage:
• • •
"Adding backup storage" on page 105 "Adding archive storage" on page 109 "Adding vault storage" on page 110
To protect VMs on a SAN, see "VMware SAN-direct backups" on page 650.
Adding backup storage These procedures apply to Unitrends virtual systems only. After initial deployment and setup, you can add more storage as needed. Add the storage via the host (added disk) or allocate space on an external storage array (SAN or NAS). Then use the existing backup device to include the new disk (recommended) or add a separate backup storage area. It is a best practice to add storage in the same manner as the initial backup storage you created during deployment. We recommend expanding storage for best performance, but you can also add a separate area of roughly the same size if necessary. See the following topics for details on adding backup storage:
• • • • •
"Recommendations for adding backup storage" on page 106 "Examples of expanding storage" on page 106 "Examples of adding storage" on page 107 "To expand a backup device" on page 107 "To add backup storage and create a new device" on page 108
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
106
Recommendations for adding backup storage Use these recommendations when setting up all UEB storage that you will add to the UEB appliance:
•
It is strongly recommended that all UEB storage is either direct attached storage (DAS, internal to the hypervisor) or resides on one external storage array.
WARNING! If you configure storage across multiple arrays and one becomes unavailable, all backup data is corrupted, resulting in total data loss.
•
It is recommended to use DAS, internal to the host, or leverage SAN or NAS storage by connecting the external array to the host.
– –
You can create VHD(X) or VMDK disks on storage internal to the host (DAS).
–
You can connect a NAS share to the host over the NFS protocol to create VHD(X) or VDMK disks.
You can connect a SAN LUN on the array to the host and expose it to the UEB. You can then add the entire LUN to UEB or create VHD(X) or VMDK disks on the LUN and expose the disks to the UEB.
•
Although it is possible to attach external storage directly to the UEB appliance, this is not recommended. If you must connect external storage to the UEB directly through network protocols (CIFS, NFS, iSCSI), make sure to use a supported vendor from the list in KB 3350.
•
Storage should be dedicated to the UEB VM and not shared by other virtual machines, applications, etc.
–
If using an external SAN or NAS storage array, the shares or LUNs used by the UEB VM should be dedicated to that UEB VM.
–
If the UEB VM is deployed on a host in a cluster configuration, the UEB VM should use a dedicated NAS share or SAN LUN.
•
For best performance with SAN storage, use a thickly provisioned LUN. For Hyper-V, use a fixed size VHD(X).
•
As you add storage, add resources to the UEB virtual machine, such as CPU and memory.
Examples of expanding storage If additional backup storage is needed, we recommend expanding your initial backup storage to include the newly allocated space. Note:
UEB appliance backup storage can only be expanded across new disks. To expand the existing backup storage you must add a new virtual disk. Expanding an existing disk or growing a SAN volume is not supported.
Once storage is expanded in the appliance's Administrator Interface (AI), the LVM treats the original disk and added disks as one larger data volume. Following are expanding storage examples. For instructions on expanding storage in the Unitrends AI, see "To expand a backup device" on page 107.
•
If expanding storage on DAS, add a new VHD(X) or VMDK using the same volume or datastore selected for the initial backup storage and then use the appliance's AI to expand existing storage to include the new disk.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
107
•
If expanding storage on a NAS connected to the host, add a new VHD(X) or VMDK to a share on the NAS and then use the appliance's AI to expand existing storage to include the new disk.
•
If expanding storage on a SAN connected to the host, addd a new (VHD(X) or VMDK to a LUN on the SAN and then use the appliance's AI to expand existing storage to include a new disk.
Examples of adding storage If expanding storage is not an option or you need to create a distinct storage area, you can add storage to your appliance. Storage added to the appliance (rather than expanded) is treated as a separate storage area. This approach allows you to set up backups to write to a user-specified device. We recommend adding storage in the same manner the initial backup storage was created. If an external NAS or SAN storage array was used, either directly or through the host, we recommend using the same storage array for all additional backup storage. If you must attach directly to the UEB VM rather than through the hypervisor, storage expansion through the Administrator Interface is not supported. Use the procedure "To add backup storage and create a new device" on page 108 instead. Note:
If you wish to use replication and deduplication, your backup storage devices must be at least 128GB.
Following are examples for adding a new storage device. For instructions on adding a storage device in the Unitrends AI, see "To add backup storage and create a new device" on page 108.
•
DAS or external storage attached to the host: Create a VHD(X) or VMDK on the DAS, NAS, or SAN storage array. In the Add Backup Storage dialog in the AI, click Create a separate storage area for an alternate backup device and select the type Added Disk. Select the disk you wish to add.
•
External storage attached to the UEB appliance:
–
Allocate additional space on the NAS. In the Add Backup Storage dialog in the AI, click Create a separate storage area for an alternate backup device and select the type NAS. Enter the IP address of the NAS and other required information.
–
Allocate additional storage space on the SAN. In the Add Backup Storage dialog in the AI, click Create a separate storage area for an alternate backup device and select the type iSCSI. Enter the IP address of the SAN and other required information.
To expand a backup device Expansion is supported on Unitrends Enterprise Backup deployments. If you must attach directly to the UEB VM rather than through the hypervisor, storage expansion through the Administrator Interface is not supported. Use the procedure "To add backup storage and create a new device" on page 108 instead. WARNING! Once you add a disk to the datastore and expand storage, that disk is added to a logical volume. The newly added disk and any existing disks are then treated as one disk by the system. You cannot remove the disk once it has been added. Removing a disk after expanding storage results in data loss and corruption.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
108
1
Verify that no backups are running. If backups are running, either cancel them or wait until they complete. If you attempt to add storage while backups are running, the Administrator Interface displays the following message: A storage expansion cannot take place while backups are queued or running.
2
Add storage in one of the following ways:
•
For direct attached storage (DAS), add a new VHD(X) or VMDK using the same volume or datastore selected for the initial backup storage.
•
For NAS storage connected to the host, add a new VHD(X) or VDMK to a share on the NAS and expose it to the hypervisor.
•
For SAN storage connected to the host, add a new VHD(X) or VMDK to a LUN on the SAN and expose it to the hypervisor.
•
For instructions on creating and adding a VMDK disk, see one of the following VMware documents:
– – – •
vSphere 5.1: Create a Virtual Disk in vSphere Client 5.1 vSphere 5.5: Create a Virtual Disk in vSphere Client 5.5 vSphere 6: Create a Virtual Disk in vSphere Client 6
For instructions on creating and adding a VHD(x) disk, see the following Microsoft documents:
– –
To create a virtual hard disk To add a hard disk to a virtual machine
3
In the Unitrends system, select Settings > Storage and Retention > Storage.
4
Click Add Backup Storage.
5
Choose Expand your backup device across added disks, then click Confirm.
• •
6
The Expand Storage page shows the current size of the default internal storage pool. If you have not yet added a datastore or volume, you may click Show Steps for Adding Additional Storage for detailed instructions. You must go to your hypervisor and add the datastore or volume before expanding storage.
Click Expand Storage. The system expands storage on the default device to include the disk you created on the datastore or volume. The default device is D2DBackups, unless you’ve configured a different one.
7
When storage expansion is complete, the current size of the storage pool is updated to reflect the expansion. 95% of the disk you added is allocated for backup/replication storage. 5% of the expanded storage, up to 2GB, is allocated for swap space.
8
Click Confirm to exit.
To add backup storage and create a new device Use this procedure to add storage and a new backup device. For best results, all backup devices
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
109
should be of similar size. (To add storage to an existing device, see "To expand a backup device" on page 107.) WARNING! It is strongly recommended that all UEB storage is either direct attached storage (DAS, internal to the hypervisor) or resides on one external storage array. If you configure storage across multiple storage arrays and one becomes unavailable, all backup data is corrupted, resulting in total data loss. 1
Select Settings > Storage and Retention > Storage.
2
Click Add Backup Storage.
3
Choose Create a separate storage area for an alternate backup device, then click Confirm.
4
Enter a name for the storage being configured in the Storage Name field. Note:
5
Storage connected using the NFS, CIFS, or iSCSI protocols must not contain spaces in the name.
Select the storage Type and continue to "Configuring storage" on page 110 Note:
If you have attached a NAS or SAN through the hypervisor, select the Added Disk type. UEB treats all storage attached through the hypervisor as internal storage.
Adding archive storage This procedure applies to Unitrends virtual and physical systems, and to Cloud storage. You can archive to a SAN iSCSI LUN, a NAS share, virtual disk (for UEB systems only), and Cloud storage. Note the following archive storage limitations:
•
For archive to NAS, each backup system must archive to a separate NAS share. Having more than one backup system archiving to a given NAS share is likely to cause data corruption.
•
For archive to iSCSI LUN, each backup system must archive to a separate LUN. Having more than one backup system archiving to a given iSCSI LUN is likely to cause data corruption.
To add archive storage 1
Select Settings > Storage and Retention > Storage.
2
Click Add Archive Storage.
3
Enter a name for the storage being configured in the Storage Name field. Note:
4
Storage connected using the NFS, CIFS, or iSCSI protocols must not contain spaces in the name.
Select the storage Type and continue to one of the following procedures:
•
"Configuring storage" on page 110 to configure iSCSI, Fibre Channel, NAS, or Added Disk storage. Note:
For archive to iSCSI LUN, it is recommended to not resize the LUN after it has been added to the backup appliance as the new size cannot be detected by the
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
110
backup appliance.
•
"Adding cloud archive storage to the Unitrends appliance" on page 229 to set up Cloud storage.
Adding vault storage This procedure applies to Unitrends virtual systems running the legacy vaulting feature only. For virtual systems configured for replication, vault storage is not needed as replicated data is written to backup storage. You can vault to a SAN iSCSI LUN, an NFS-configured NAS share, or to a virtual disk. Note:
NAS shares configured with the CIFS protocol cannot be used for legacy vault storage.
To add vault storage 1
Select Settings > Storage and Retention > Storage.
2
Click Add Vault Storage.
3
Enter a name for the storage being configured in the Storage Name field. Note:
4
Storage connected using the NFS, CIFS, or iSCSI protocols must not contain spaces in the name.
Select the storage Type and continue to "Configuring storage" on page 110 to configure iSCSI, NFS-configured NAS, or Added Disk (internal) storage.
Configuring storage This section provides instructions for configuring the backup system’s connection to added storage. The following protocols are supported:
• • • •
iSCSI, see "To configure iSCSI storage" on page 110. Fibre Channel, see "To configure Fibre Channel storage" on page 112. NAS, see "To configure CIFS and NFS NAS storage" on page 113. Internal, see "To configure added internal storage" on page 115.
To configure iSCSI storage For iSCSI storage, Unitrends requires an active iSCSI session at all times. Unitrends supports array failover scenarios that utilize iSCSI redirect technologies, but not MPIO or active/passive failover configurations. Use this procedure to configure iSCSI storage: 1
Add storage using one of these procedures: Note:
• •
Names for iSCSI storage must not contain spaces.
"To add backup storage and create a new device" on page 108 "Adding archive storage" on page 109 Note:
For archive to iSCSI LUN, it is recommended to not resize the LUN after it has
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
111
been added to the backup appliance as the new size cannot be detected by the backup appliance.
• •
"Adding vault storage" on page 110 "VMware SAN-direct backups" on page 650
2
If the iSCSI target is configured for CHAP authentication, you must set up CHAP in the Unitrends system. See "About CHAP authentication" on page 116.
3
Enter the IP address of the SAN storage array in the Host IP address field.
4
The default port used for iSCSI communication is 3260. If the LUN is configured to use a different port, enter it in the Port field.
5
Click Scan for List of Available Targets to retrieve a list of targets on the remote storage array, then choose one from the Select Target list. Note:
• • • 6
Verify that you can see the Unitrends appliance in your SAN manager. Verify that you have a LUN assigned to the Unitrends system with the correct permissions. Check with your Storage Administrator for more information.
Enter the appropriate Logical Unit Number using the LUN counter, or click Scan for List of Available LUNs and select one from the Select LUN list. Note:
7
8
If you do not see the LUN in the list, go to your SAN manager and check your LUN configuration by doing the following:
If you receive an error indicating CHAP authentication has failed, CHAP has been configured on the target and either CHAP has not been enabled in the Unitrends system, or the Unitrends CHAP credentials do not match those of the target.
Click Confirm.
• •
If you are adding backup storage, continue with this procedure to add the backup device.
•
To use this storage for legacy vaulting, select it as a target when adding the backup system to the vault. For details, see "Adding the backup system to the vault" on page 330. Note that replication uses regular backup storage. Vault storage is used for systems that use the legacy vaulting feature only.
To use this storage for archiving, select it as a target when running or scheduling archive jobs. See the "Archiving Overview" chapter for details.
On the Add Device page, enter a name for the new device in the Device Name field. This is the name that will be used whenever the device is selected. Device names must be unique and must not contain spaces.
9
Enter the amount of data that can be stored on the new device in the Capacity field. The Capacity field governs the amount of data that can be stored on the device. The system manages to the capacity limit set and will assure that the data on the device does not exceed the capacity limit. If the capacity chosen exceeds the system license OR if there is not enough space on the file system to accommodate the allocation, a message displays indicating the need to adjust the capacity limit. Options for Capacity settings are:
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
112
•
Standard Size - Use this to select from a list of values. Click the down arrow next to the device size and select the desired capacity.
•
Custom Size - If the desired size of the device is not populated in the standard size list, select this option to specify a capacity.
10 Enter a brief description for the device in the Description field. 11 In the Max Concurrent Backups field, enter the number of backups that can be run simultaneously on the system. The default value is three. The recommended range is three to ten, depending on network throughput, the number of devices defined, and the resources of the system. 12 Check these boxes as applicable:
• •
Online box to indicate that the device is online and ready for backups to be written.
•
Select Storage box to select external storage for virtual systems. Deduplication may be enabled on external devices using this feature.
Default box to make this the default device. The default device is used if no other device is specified.
Note:
The Pathname displays the location on the system where the backups are stored. This field cannot be edited.
13 Click Confirm to add the device. To store backups on this device, select it when running or scheduling backups. See the "Backups Overview" chapter for details.
To configure Fibre Channel storage For Fibre Channel storage, Unitrends requires a connection to an active LUN at all times. Unitrends supports array failover scenarios for active/active configurations only. Use this procedure to configure Fibre Channel storage: 1
Complete the steps in "To add archive storage" on page 109 or "VMware SAN-direct backups" on page 650.
2
Click Scan for List of Available Targets to retrieve the target LUNs exposed by the SAN.
3
Choose the desired target from the Select Target list.
4
Enter the Logical Unit Number using the LUN counter, or click Scan for List of Available LUNs and select one in the Select LUN list. Note:
If you do not see the LUN in the list, check the following:
•
Go to your SAN manager, check your LUN configuration, and verify that you can see the Unitrends appliance.
• • •
Verify that you have a LUN assigned to the Unitrends system with the correct permissions. You may need to reboot the Unitrends system to enable it to discover the storage device. Check with your Storage Administrator for more information.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
113
5
Click Confirm to complete the setup. Note:
To remove the LUN from Fibre Channel storage in the Unitrends system, you must go to the SAN manager and indicate that the SAN should not use the LUN anymore.
To configure CIFS and NFS NAS storage 1
Add storage using one of these procedures: Note:
• • • • 2
Names for NFS and CIFS storage must not contain spaces.
"To add backup storage and create a new device" on page 108 "To add archive storage" on page 109 "To add vault storage" on page 110 To protect a CIFS/NFS NAS as a client, see "To add a CIFS/NFS client" on page 580
If the NAS share is configured for authentication, provide the credentials in the Username, Password, and Verify Password fields.
• •
If domain credentials are being used, enter the user name as [email protected]. If authentication is not used, skip this step.
3
Enter the IP address or hostname of the NAS share in the Host field.
4
Select the desired file system type from the Protocol list. The NAS share can be connected using the NFS or CIFS protocol. Note:
For legacy vault storage, you must configure the NAS using the NFS protocol. The CIFS protocol is not supported for vault storage. The CIFS protocol can be used with the newer replication feature.
5
The Port field contains the default for the protocol selected. If the protocol uses a custom port, enter that port number.
6
Enter the full directory pathname of the NFS or CIFS share in the Share Name field. Do not use leading or ending slashes.
7
Click Confirm.
8
• •
If you are adding backup storage, continue with this procedure to add the backup device.
•
To use this storage for archiving, select it as a target when running or scheduling archive jobs. See the "Archiving Overview" chapter for details.
•
To use this storage for legacy vaulting, select it as a target when adding the backup system to the vault. For details, see "Adding the backup system to the vault" on page 330. Note that replication uses regular backup storage. Vault storage is used for systems that use the legacy vaulting feature only.
If you are protecting data stored on the CIFS/NFS NAS, schedule backups for the CIFS/NFS client as described in "NAS protection using CIFS/NFS" on page 579.
On the Add Device page, enter a name for the new device in the Device Name field. This is the name that will be used whenever the device is selected. Device names must be
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
114
unique and must not contain spaces. 9
Enter the amount of data that can be stored on the new device in the Capacity field. The Capacity field governs the amount of data that can be stored on the device. The system manages to the capacity limit set and will assure that the data on the device does not exceed the capacity limit. If the capacity chosen exceeds the system license OR if there is not enough space on the file system to accommodate the allocation, an error message is delivered indicating the need to adjust the capacity limit. Options for Capacity settings are:
•
Standard Size - Use this to select from a list of values. Click the down arrow next to the device size and select the desired capacity.
•
Custom Size - If the desired size of the device is not populated in the standard size list, select this option to specify a capacity.
10 Enter a brief description for the device in the Description field. 11 In the Max Concurrent Backups field, enter the number of backups that can be run simultaneously on the system. The default value is three. The recommended range is three to ten, depending on network throughput, the number of devices defined, and the resources of the system. 12 Check these boxes as applicable:
• •
Online box to indicate that the device is online and ready for backups to be written.
•
Select Storage box to select external storage for virtual systems. Deduplication may be enabled on external devices using this feature.
Default box to make this the default device. The default device is used if no other device is specified.
Note:
The Pathname displays the location on the system where the backups are stored. This field cannot be edited.
13 Click Confirm to add the device. To store backups on this device, select it when running or scheduling backups. See the "Backups Overview" chapter for details.
To modify CIFS credentials The CIFS password on the backup system must match the password set on the CIFS targets accessed by the Unitrends system. If they do not match, your storage might fail to mount upon reboot. Use this procedure to update the CIFS passwords on the Unitrends system any time you change these passwords on the CIFS targets. 1
Update the password on all CIFS targets accessed by the Unitrends system.
2
In the Unitrends system, select Settings > Storage and Retention > Storage.
3
In the list of storage items, click to select the CIFS storage device row. The Modify Backup Storage dialog opens.
4
Enter the updated Password and then enter it again in the Verify Password field.
5
Click Confirm to save.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
115
To configure added internal storage This option is only available for virtual systems. UEB treats all storage attached through the hypervisor as internal storage, whether this is direct attached storage (DAS, internal to the hypervisor) or storage that resides on an external array. 1
Add a disk to the datastore or volume used by the Unitrends Enterprise Backup VM. For instructions on creating and adding a VMDK disk, see one of the following VMware documents:
• •
vSphere 5.1: Create a Virtual Disk in vSphere Client 5.1 vSphere 5.5: Create a Virtual Disk in vSphere Client 5.5
For instructions on creating and adding a VHD(X) disk, see the following Microsoft documents:
• • 2
To create a virtual hard disk To add a hard disk to a virtual machine
Add storage of type Added Disk using one of these procedures:
• • •
"To add backup storage and create a new device" on page 108 "To add archive storage" on page 109 "To add vault storage" on page 110
3
Select a disk from the Select Added Disk list.
4
Click Confirm.
5
Check the I understand... box to indicate you are aware that any data on the selected disk will be deleted upon adding storage to the backup system.
6
Click Confirm.
7
• •
If you are adding backup storage, continue with this procedure to add the backup device.
•
To use this storage for legacy vaulting, select it as a target when adding the backup system to the vault. For details, see "Adding the backup system to the vault" on page 330. Note that replication uses regular backup storage. Vault storage is used for systems that use the legacy vaulting feature only.
To use this storage for archiving, select it as a target when running or scheduling archive jobs. See the "Archiving Overview" chapter for details.
On the Add Device page, enter a name for the new device in the Device Name field. This is the name that will be used whenever the device is selected. Device names must be unique and must not contain spaces.
8
Enter the amount of data that can be stored on the new device in the Capacity field. The Capacity field governs the amount of data that can be stored on the device. The system manages to the capacity limit set and will assure that the data on the device does not exceed the capacity limit. If the capacity chosen exceeds the system license OR if there is not enough space on the file system to accommodate the allocation, an error message is delivered indicating the need to adjust the capacity limit. Options for Capacity settings are:
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
116
9
•
Standard Size - Use this to select from a list of values. Click the down arrow next to the device size and select the desired capacity.
•
Custom Size - If the desired size of the device is not populated in the standard size list, select this option to specify a capacity.
Enter a brief description for the device in the Description field.
10 In the Max Concurrent Backups field, enter the number of backups that can be run simultaneously on the system. The default value is three. The recommended range is three to ten, depending on network throughput, the number of devices defined, and the resources of the system. 11 Check these boxes as applicable:
• •
Online box to indicate that the device is online and ready for backups to be written.
•
Select Storage box to select external storage for virtual systems. Deduplication may be enabled on external devices using this feature.
Default box to make this the default device. The default device is used if no other device is specified.
Note:
The Pathname displays the location on the system where the backups are stored. This field cannot be edited.
12 Click Confirm to add the device. To store backups on this device, select it when running or scheduling backups. See the "Backups Overview" chapter for details.
About CHAP authentication Unitrends supports the use of Challenge Handshake Authentication Protocol (CHAP) for iSCSI connections to external storage. Configure the Unitrends system to connect using CHAP authentication as described in "To configure iSCSI storage" on page 110. Consider the following limitations and requirements when implementing CHAP with the Unitrends system:
•
You can configure the iSCSI connection with CHAP before configuring CHAP on the target. Once the target is configured, CHAP authentication is enforced.
•
If CHAP has not been configured on the target, Unitrends detects this and gains access without CHAP authentication, even if CHAP has been enabled in the Unitrends system.
•
If CHAP has been configured on the storage target, you must enable CHAP authentication in the Unitrends system. If not, any attempt to add the target to or access the target from the Unitrends system fails.
•
A single CHAP username and password is used by the Unitrends system. Therefore, all of its CHAP-enabled iSCSI targets must be configured with this username and password.
•
CHAP is supported from the initiator (Unitrends system) to the target only. Mutual (bidirectional) CHAP is not supported.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
117
•
CHAP authentication occurs upon first log in to the target. Subsequent operations on the target succeed, without further authentication, for the duration of the iSCSI session or until the target sends a random challenge request.
See the following topics for details:
• • •
"To enable CHAP authentication" on page 117 "To modify CHAP credentials" on page 117 "To disable CHAP authentication" on page 117
To enable CHAP authentication 1
Configure CHAP authentication on all iSCSI targets accessed by the Unitrends system.
2
In the Unitrends system, select Settings > Storage and Retention > iSCSI CHAP Credentials.
3
Enter credentials in the Username, Password, and Verify Password fields, then click Save CHAP credentials. One set of credentials is used to access all iSCSI targets.
•
By default, Username contains the backup system’s iSCSI qualified name (IQN). It is required that the username and password on the initiator (backup system) match those defined on the targets. Modify the Username entry if necessary.
•
The password must be 12-16 characters in length.
To modify CHAP credentials 1
Update the password on all iSCSI targets accessed by the Unitrends system.
2
In the Unitrends system, select Settings > Storage and Retention > iSCSI CHAP Credentials.
3
Enter the updated Password and then enter it again in the Verify Password field.
Note:
The CHAPs password on the initiator (backup system) must match the password set on the iSCSI targets accessed by the Unitrends system. If they do not match, your storage might fail to mount upon reboot.
To disable CHAP authentication Note:
Be sure to disable CHAP on all iSCSI targets before disabling CHAP in the Unitrends system.
1
Disable CHAP authentication on all iSCSI targets.
2
In the Unitrends system, select Settings > Storage and Retention > iSCSI CHAP Credentials.
3
Click Clear CHAP Credentials.
Storage allocation and distribution Storage allocation and distribution can be optimized and configured based on the role the system plays in the data protection plan. Storage allocation can only be modified on systems that support instant recovery (see "Windows Instant Recovery" on page 451 and "Instant recovery for VMware"
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
118
on page 663 for details), or are configured with the legacy local backup system and vault installation type. For other systems, storage allocation cannot be modified.
To configure storage allocation 1
Select Settings > Storage and Retention > Storage Allocation.
2
In the Storage Allocation window, configure the distribution of the storage used for backups/replication, vaulting, and instant recovery as desired. To change the distribution of allocated storage, drag the edge of the pie to the desired size. Note:
3
For legacy systems configured as cross-vaults, the storage is equally distributed between Vaulting and Backup when the system is installed. If you reduce the Backup/Replication storage allocation to provide additional storage for Instant Recovery or Vaulting, older backups may be removed from the system to make room for the new storage allocation. The devices that are configured on the system are scaled down proportionally to accommodate the new allocation.
Click Confirm to apply the changes.
Balancing backup performance and retention Unitrends systems are designed to use all available storage for protecting data (see "Storage allocation and distribution" on page 117). As scheduled or immediate backups are performed, the oldest backups are deleted to ingest new backups. See "About retention control" on page 121 for details. You can tune system storage to fit the backup window and retention objectives of your environment by selecting from the following options. Option
Description
Balance This is the recommended setting for managing the ingest rate and retention on retention and the system. With this setting, a predictive mechanism is used to dynamically backup alter the size of the landing zone based on the backup strategies selected. performance (recommended setting) Minimize backup window
Use this setting where backup window requirements are critical. With this setting, a landing zone (reserve area) is created which is large enough to hold the data set that is being protected. This guarantees the fastest ingest rate. However, to meet the landing zone requirements, older backups are more aggressively deleted.
Maximize retention
Use this setting where retention is critical. The data protection ingest rate is slower. The landing zone is kept to a minimum to ensure maximum retention.
To balance backup performance and retention 1
Select Settings > Storage and Retention > Retention.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
119
2
Select the desired Balance Retention and Backup Performance option. See the table above for a description of each option.
3
Click Confirm to save.
About device configuration Devices are the target locations for data received from the protected servers, workstations, and virtual environments. By default, systems are configured with a single D2D device labeled D2DBackups. D2DBackups is configured to the maximum backup storage of the system, based on the identity of the system and the distribution of backup storage to instant recovery and legacy vaulting (see "Storage allocation and distribution" on page 117 for details). For UEB systems, D2DBackups is deployed with 138GB of storage space. Add backup storage as described in "Adding backup storage" on page 105 prior to adding a device. While storage in D2DBackups is adequate in many cases, you can change the amount of space allocated to this device. As well, additional D2D devices may be added to help better organize backups. The original D2DBackups storage is logically divided into multiple devices. For physical systems, the total amount of space allocated to all devices combined must be within the system license limits. Some reasons for creating additional D2D devices include:
• • • • •
Separating bare metal backups from file-level backups.
•
Separating source systems on replication targets. There are additional requirements and considerations when associating a device to a replication source. For details, see "(Optional) Add a logical device to associate with a source system" on page 285.
Keeping application backups organized together in a separate area. Organizing servers based on their sizes. Separating servers with different retention period requirements. Placing one client on a separate device so it will run at highest priority (not be queued behind other jobs on one device).
Though adding devices can provide a level of organization, it also adds a level of complexity. If too many devices exist, balancing space allocation between the devices can lead to purging issues and other problems. See the following topics for details:
• • •
"To add a device" on page 119 "To modify a device" on page 120 "To delete a device" on page 121
To add a device 1
Select Settings > Storage and Retention > Backup Devices.
2
Click Add Device.
3
Enter a name for the new device in the Device Name field. This is the name that will be used whenever the device is selected. Device names must be
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
120
unique and must not contain spaces. 4
Enter the amount of data that can be stored on the new device in the Capacity field. Notes:
•
If the device will be used to store replicated backups for an associated source system, its capacity must be at least 128GB.
•
If you have a physical appliance, all available storage is allocated to the default D2DBackups device. To split this storage into multiple devices, you must first decrease the D2DBackups capacity (see "To modify a device" on page 120). If you already have backups on the system, proceed with extreme caution . Decreasing D2DBackups capacity may cause existing backups to be purged.
The Capacity field governs the amount of data that can be stored on the device. The system assures that the data on the device does not exceed the capacity limit. If the capacity chosen exceeds the system license, OR if there is not enough space on the file system to accommodate the allocation, an error message is delivered indicating the need to adjust the capacity limit. Options for Capacity settings are:
•
Standard Size - Use this to select from a list of values. Click the down arrow next to the device size, and select the desired capacity.
•
Custom Size - If the desired size of the device is not populated in the standard size list, select this option to specify a capacity.
5
Enter a brief description for the device in the Description field.
6
In the Max Concurrent Backups field, enter the number of backups that can be run simultaneously on the system. The default value is three. The recommended range is three to ten, depending on network throughput, the number of devices defined, and the resources of the system.
7
Check these boxes as applicable:
• •
Online box to indicate that the device is online and ready for backups to be written.
•
Select Storage box to select external storage for virtual systems. Deduplication may be enabled on external devices using this feature.
Default box to make this the default device. The default device is used if no other device is specified.
Note:
8
The Pathname displays the location on the system where the backups are stored. This field cannot be edited.
Click Confirm to add the device.
To modify a device Be careful when decreasing the size of a device as this may cause data to be purged. Note the following before you modify the device:
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
121
Notes:
•
For replication devices, capacity must be at least 128GB. Decreasing the size to less than 128GB is not supported.
•
If you have a physical appliance, all available storage is allocated to the default D2DBackups device. To split this storage into multiple devices, you must first decrease the D2DBackups capacity. If you already have backups on the system, proceed with extreme caution . Decreasing D2DBackups capacity may cause existing backups to be purged.
1
Select Settings > Storage and Retention > Backup Devices.
2
Select the desired device.
3
Modify settings as desired. For details, see "To add a device".
4
Click Confirm to save the changes.
To delete a device WARNING! Once a device is deleted, any backups stored on that device are no longer accessible. The space occupied on the system may not be immediately available after a backup is deleted. Before data is removed, any referenced deduplicated data is migrated to other devices before the delete operation can complete. 1
Select Settings > Storage and Retention > Backup Devices.
2
Select the desired device.
3
Click Delete Device.
Note:
For replicating systems, you cannot delete a device that is associated to a source system. You must remove the association before the device can be deleted. Go to Replication > System Management, select the source, uncheck the Select Device if Replicating Source box, and click Confirm.
About retention control A data retention policy is determined by an organization's legal and business data retention requirements. You may need to keep data available for months or even years. How you achieve this may be a combination of on-system retention and archiving to removable media for longer term storage. Space on the system is self-managed based on the user settings for balancing ingest rate and retention (see "Balancing backup performance and retention" on page 118). When your system capacity is full, the oldest backups are purged to make room for newer ones. However, the Unitrends system will not purge the latest backups of any type for a given client, or any backups for a client that are put on legal hold. The greater the difference in the amount of total data protected and the system size, the greater the on-system retention. If the difference is small you will see less retention on the system. If you require many weeks of on-system retention, you must deploy a system of sufficient size. The retention control feature allows you to decide how long backups are retained on the system before being purged. Controlling the order in which backups are removed allows for more effective
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
122
management of available space, without affecting the manner in which general performance is balanced with retention. The Retention tool tracks backups as groups containing a master or full backup, along with any incrementals or differentials that followed. A master in a file-based backup group may be generated on-demand, by a scheduled backup, or synthesized by the system during an incremental forever process. No retention policy is set for newly added clients. With no retention policy set, backups for a client are kept as long as possible by a system until the system runs out of backup space, at which point the oldest backups are purged. Retention policies are set using the following controls. You must have Manage privileges or higher to change retention settings. See these topics for details on setting retention:
• •
"Retention control settings" on page 122 "To set or view retention goals and limits" on page 123
Retention control settings The following table describes the available retention control settings. Retention control
Description
Min Retention Goal (Days)
A notification mechanism to inform when the desired retention goals are not being met. Setting the minimum retention goal does not guarantee the retention of protected data for the defined period. As newer backups are performed (scheduled or immediate), older backups are purged to reclaim space on the system if necessary. If guaranteed minimum retention is needed, use legal hold. If the minimum retention goal is not met, a message displays on the Alerts Last 7 Days tab of the Status screen.
Max Retention Limit (Days)
Number of days backups are retained if space allows. Backups are deleted once the full has exceeded this limit. When a full backup exceeds its retention, the full and all associated incrementals and differentials are purged as well. If you set the maximum retention limit below the minimum limit, backups are deleted and the process cannot be stopped. Note:
The most current backup group for a client is never purged from the system regardless of the need for space.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
123
Retention control
Description
Legal Hold Unlike Min retention goal, Legal hold allows you to set a hard minimum limit on the (Days) number of days a backup will be held. The legal hold setting takes precedence over the Min and Max retention settings. Backups that are younger than the legal hold limit are not purged for any reason, including at the expense of new, incoming backups. For legal hold purposes, the age of a backup is only considered to be as old as the latest backup in a set, e.g., the last incremental before a new full. After passing the legal hold limit, the min retention goal and max retention limit settings take over for the purposes of retention. If legal hold is preventing new backups from occurring, a message displays on the Alerts Last 7 Days tab of the Status screen. Information about backups that have been placed on legal hold can be found in the Legal Hold report. See "Legal Hold Backups Report" on page 381 for details. Actual Retention (Days)
Indicates the number of days that the oldest full backup for the client, application, or virtual machine has been retained on the appliance.
To set or view retention goals and limits Notes:
•
Modifying a client’s or application’s retention settings on the Backup Retention page updates these settings on any computer-level backup schedules that have been created for the client or application(s).
•
Once you enter values on the Backup Retention page, you can no longer modify retention settings from the schedule itself. Instead, do this from the Backup Retention page.
•
To set retention for a replication target, switch to replication view before starting this procedure (see "Viewing replicated backups" on page 309).
1
Select Settings > Storage and Retention > Backup Retention.
2
Select the Unitrends system in the Navigation pane to see retention settings for all clients and databases. If desired, select an individual Navigation pane item to see only it and its sub-items retention settings.
3
On the Retention Settings pane, highlight individual machines or applications, and enter the desired number of days in the Min Retention Goal, the Max Retention Limit, and Legal Hold fields.
4
If a machine or application has a triangle beside it, expand to set goals and limits for any associated items. Entering the goal and limit for the main item on a tree and clicking Apply configures the same settings for all the sub-items. Otherwise, sub-items can be set individually.
5
Click Confirm to save the changes.
Legal hold example In the following diagram, a backup (B1) generated on March 21st, 2013, is set to Legal Hold for four days. There are subsequent differentials on the 22nd, 23rd, and 24th of March 2013. B1 is four days
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
124
old on March 25th, 2013, and there is a new master, B5. However, B1 cannot yet be purged because its purging would result in the purging of the entire backup group, including differentials B2, B3, and B4, which are less than four days old. When the most recent backup in the group (B4) is four days old on March 28th, the entire group reverts to using minimum and maximum retention settings and is eligible for purging. A new backup is added to a group as soon as it is queued, so a group is only as old as its most recent backup. For more information on backup groups, see "Backup groups" on page 145.
About system notifications The Unitrends system sends the following notifications:
• •
Alerts, which display on the Status page.
•
Traps, which are sent to notifications.unitrends.com. To send traps to your network management server, see "About SNMP trap notifications"
Email notifications, which are sent to the System Report Mailing List defined under Settings > Clients, Networking, and Notifications > Email Recipients.
For a description of each condition that generates a trap, see "SNMP trap conditions" on page 125. For each trap, an email or alert may also be sent, but be aware that many important messages are sent as alerts only. Be sure to monitor alerts from the Status page.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
125
About SNMP trap notifications The system can be configured to send system and application-specific alerts to a network management server using the SNMP protocol. This provides network administrators with the ability to quickly respond to hardware or software conditions that require action. Alerts are delivered as incoming trap messages to a network management application. The Administrator Interface remains the primary interface for managing a Unitrends system. Unitrends systems come configured with a default destination of notifications.unitrends.com. This enables Unitrends to service our customers with proactive resolution of problems, if and when they arise. For example, if a disk drive on the system is failing, a trap is received by the SNMP manager at notifications.unitrends.com, allowing Unitrends to pro-actively dispatch a warranty request on the failed component (if the support contract on the system is up-to-date). Through the use of the Unitrends SNMP agent and MIB, you can configure alerts to be sent to your own Remote Monitoring and Management (RMM) software. See the following topics for details:
• •
"To set up SNMP trap notifications" on page 125 "SNMP trap conditions" on page 125
To set up SNMP trap notifications 1
Select Settings > Clients, Networking, and Notifications > SNMP.
2
Select Add Entry to enter the destination address of the SNMP manager.
3
In the Destination field, enter the hostname or IP address for the trap destination. If the management server hostname is used, it must be resolvable either using the hosts file on the system or using DNS.
4
The default Community is public. Edit this entry if necessary.
5
Verify that Send traps to specified destination is checked.
6
Click Confirm to add the destination.
7
Click Test to trigger a test SNMP trap. The test trap is sent to all destinations that are enabled on the system.
8
If desired, click History to view all SNMP traps that have been triggered by the system.
9
Click Close to exit.
SNMP trap conditions The following tables describe the conditions that trigger traps on the Unitrends system, including trap data and the associated Object ID (OID) for each. The complete OID for a trap consists of a prefix followed by a specific trap number in the following format: .0.
The prefix begins with .1.3.6.1.4.1.21865, which expands to iso.org.dod.internet.private.enterprises.21865 in the MIB tree (21865 is the Unitrends enterprise
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
126
number), followed by 1 for the Unitrends product, then a designation to indicate the trap group (2.100) and finally, the trap number itself. Traps are generated for the conditions described in the table below. IPMI events are only available for physical Recovery-712 or greater systems. In addition, emails or alerts may be sent for these traps. Be aware that informational emails or alerts exist for which no trap is generated. These are not listed in the table. Note that for each trap condition, there are multiple messages that may be sent, depending on the exception encountered. If an alert or email is sent for all exceptions within the trap condition, yes displays in the table. If no alert or email is sent for any exception within the trap condition, no displays in the table. If an email or alert is sent for one or more exceptions but not all within the trap condition, some displays in the table. Trap condition
Trap type #
Description
Alert
Email
Clients state has changed
1
enterprises.21865.1.2.100.0.1
yes
some
PCI state has changed
3
enterprises.21865.1.2.100.0.3
yes
no
Process state has changed
5
enterprises.21865.1.2.100.0.5
some
some
Disk state has changed
6
enterprises.21865.1.2.100.0.6
some
some
CEP state has changed
7
enterprises.21865.1.2.100.0.7
yes
no
System state has changed
8
enterprises.21865.1.2.100.0.8
yes
some
Backup state has changed
10
enterprises.21865.1.2.100.0.10 some
some
Archiving state has changed
11
enterprises.21865.1.2.100.0.11 yes
no
Version information
12
enterprises.21865.1.2.100.0.12 some
no
Network status has changed
14
enterprises.21865.1.2.100.0.14 no
no
Disk health state has changed
15
enterprises.21865.1.2.100.0.15 some
no
IPMI Events
16
enterprises.21865.1.2.100.0.16 no
yes
Database state has changed
17
enterprises.21865.1.2.100.0.17 no
no
Test trap
99
enterprises.21865.1.2.100.0.99 no
no
The member variables (extra information carried in the trap) have a prefix of enterprises.21865.1.1 followed by the ID of the variable. All variables are sent with each trap. This information is useful when configuring the Notifications Manager to filter the traps for a desired set. The following table describes these variables and their values:
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
127
Data type
Object ID
Trap type, a generic description as given in the above table.
Text
enterprises.21865.1.1.1
The object affected, for example the client that is down; the process that is not running; the disk that failed.
Text
enterprises.21865.1.1.2
Message describing the state change in more detail.
Text
enterprises.21865.1.1.3
Severity: 1=fatal, 2=warning, 3=notice
Integer
enterprises.21865.1.1.4
Status: 0=clear/close, 1=raise/open
Integer
enterprises.21865.1.1.5
Sender Asset Tag: the asset tag from the system that sent the trap
Text
enterprises.21865.1.1.6
Sender License Identity: The hostname and ID of the system that sent the trap
Text
enterprises.21865.1.1.7
Sender System Identity: The Unitrends version and installation date of the system that sent the trap
Text
enterprises.21865.1.1.8
Sender Forum Identity: The root user's forum identity
Text
enterprises.21865.1.1.9
Variable description
SNMP agent In release 7.2 and higher, Unitrends offers an SNMP agent that can respond to SNMP get requests. When upgrading to 7.2 and higher, the agent is deployed in a disabled state. The SNMP agent can currently accept SNMP get requests to monitor CPU utilization, memory utilization, network utilization, disk I/O, disk usage, and various other server performance parameters. Unitrends specific data–including backup, schedule, replication, and configuration information–is also available, although the Unitrends interface remains the primary method of accessing this information. For a complete list of all SNMP get requests that the agent responds to, see KB 3054. The Unitrends SNMP agent supports SNMP gets with SNMP version 1, 2c, and 3. You can configure the SNMP V3 username and password from the command line as follows: /usr/bp/bin/cmc_snmpd script user create
The script defaults to authorization type MD5 and privacy/encryption of DES.
To enable the Unitrends SNMP agent 1
Download the Unitrends MIB by clicking the Download MIB button, and install it in your RMM environment. The file is also available at http:///snmp/. Note:
You will also need the Net-SNMP MIBs. These come standard in most RMM software. If you need them, they are available in the same location above.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
128
2
From the Unitrends interface, navigate to Settings > Clients, Networking, and Notifications > SNMP.
3
Under the SNMP Agent Information section at the top of the screen, click Modify Entry.
4
Under Community, enter the community name to use for this SNMP node.
5
Check Enabled? if it is not already checked.
6
Click Confirm. Note:
This opens UDP port 161 (SNMP) in the Unitrends system’s software firewall.
About encryption Unitrends Encryption technology offers IT administrators a solution for regulatory and corporate requirements to protect their employer’s data from unauthorized access and theft. All data remains encrypted until a request is made to restore the data. If the correct passphrases are in place, recovery proceeds without administrator involvement. The Unitrends solution offers and supports:
• • • • •
Encryption per client Ability to change passphrases Passphrase management tool to help administrators avoid losing passphrases Replication of encrypted data Archiving of encrypted data
Points to consider before turning on Encryption:
•
Encryption will degrade performance slightly for backups, replication, and restores. It should be done only if you really need to hide your data.
•
Make sure to keep the passphrase secure because if you forget the passphrase there is no way to recover it or restore any past backups.
•
In legacy vaulting systems, when you toggle encryption from on to off or vice versa, or when you change the passphrase, the next master backup for encrypted clients will have to replicate to the target system in whole - we cannot send only the changed blocks because toggling encryption and changing the key makes all the blocks look like they have changed. This is not the case in replicating systems since backups are decrypted before being scanned for changed blocks.
•
To enable software encryption, the system software license feature string must include ENC. Check the license feature string by navigating to Settings > System, Updates, and Licensing > License.
•
Once encryption has been enabled and configured for a client, that client’s subsequent backups are encrypted. Any backups stored on the system prior to configuring encryption remain unencrypted, as encryption is done during the backup process.
See the following topics for details:
•
"To configure encryption" on page 129
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
129
• • • • •
"To configure backups for encryption" on page 129 "To modify encryption settings" on page 130 "To restore the master key from CD" on page 130 "Archiving with encryption" on page 131 "Encryption limitations" on page 131
To configure encryption 1
Select Settings > System Monitoring > Encryption.
2
Enter a passphrase in the Passphrase and Verify Passphrase fields, and click Confirm. The passphrase can be a word, numbers, a sentence, or a combination of all. Once you create a passphrase you are logged in. This authenticates the user. The passphrase is saved in a master key file. All the passphrases you set are stored in the master key file in encrypted format. Any time you restart the Encryption Manager, you are asked to provide this passphrase.
3
To start the encryption process, change the Encryption State to On. There are two options for enabling the Encryption Manager, On (will be off after reboot) or On (will be turned on again after reboot). Note:
4
5
Burn the master key file to a CD by doing one of the following:
•
For UEB and Recovery-943 systems, click Backup to save the passphrase to the system’s baremetals share. Map the system’s baremetals share to a workstation that has a CD burner and burn the crypt_image.iso key file to a CD. (For details, see "To map the system baremetals share" on page 131.) If you have trouble writing to the CD, save the key file to a local share on the workstation and try again.
•
For other Recovery-Series systems, click Backup, insert a CD into the Recovery-Series system, then click Okay to write the key file to the CD.
Once the master key file has been copied over to CD, make sure to keep the CD in a safe place. The CD may be required in case of a system failure to restore the master key file. Note:
6
After a reboot (if not set to turn on automatically), or after a Disaster Recovery, all backups and restores of clients set for encryption will fail until you restart the Encryption Manager and log in again.
The master key is included as part of the appliance state backup for systems running version 7.0 or higher, or as part of the system state on systems running older versions. This information is included with any replication or legacy vaulting operation, and is copied to an archive device with any archive operation.
Proceed to "To configure backups for encryption" on page 129 to enable encryption for each client. (This step may not be necessary if configuring encryption on a replication target system.)
To configure backups for encryption Once the Encryption daemon has been started, turn on encryption for each client whose backups should be encrypted. Note that encryption is done during the backup. Once encryption is configured for a client, its subsequent backups are encrypted. Any existing backups for the client remain
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
130
unencrypted. 1
Select Settings > Clients, Networking, and Notifications > Clients.
2
Select the client whose backups you want to encrypt and check the All backups performed on this computer are to be encrypted box.
3
Click Setup to save the client settings. Once turned on for a client, all subsequent backups to a D2D device are encrypted. (Any existing backups remain unencrypted.)This applies to all:
• • • • •
Master backups
• • • •
Microsoft Exchange Information Store backups
Differential backups Incremental backups Selective backups Microsoft SQL database backups
Bare metal backups VMware backups Local directories on the system
If you enable encryption on a client before enabling encryption on the system, you receive an error message. If the Encryption Manager is not satisfied with a successful master passphrase, any subsequent backups or restores fails.
To modify encryption settings 1
Select Settings > System Monitoring > Encryption.
2
If desired, modify the Encryption State by selecting an option.
3
To change the passphrase, click Change and Yes to confirm. WARNING! If the Encryption Manager is running (backups, restores, or replication jobs are in progress), wait for those tasks to complete before changing the passphrase. If replicating, changing the passphrase can use a tremendous amount of bandwidth. Plan your passphrase change carefully.
4
Enter the passphrase in the Current Passphrase field, and the new phrase in the New Passphrase and Verify Passphrase fields, then click Confirm.
To determine whether a backup is encrypted 1
View backup details as described in "To view backup details" on page 149.
2
On the Backup Information page, check the Encryption category. Yes is encrypted, No is not encrypted.
To restore the master key from CD To restore the master key file from the CD, you will need to insert the CD in the CD ROM drive and copy the master key file (cryptoDaemonMasterKeys) to /var/lib/misc. At this point only backups up to the time that the CD was created can be restored. Note, the current passphrase is NOT stored on
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
131
the off-premise system or the archive drives. You are required to enter the current passphrase in the administrators interface to unlock the keys.
To map the system baremetals share 1
From a Windows workstation, launch Explorer.
2
Right-click Computer and select Map Network Drive.
3
In the Folder field, enter the system’s IP address and baremetals share, then click Finish. For example, to map IP 192.168.220.99, enter: \\192.168.220.99\baremetals. The system’s baremetals share is mapped to your workstation. Click the share to view the crypt_image.iso file.
Archiving with encryption Arc h iv in g with e n c ry p tio n
If you have configured your archive schedule or Archive Now job for encryption, data being archived from the system to the tape or disk will be in an encrypted format. The master key file is archived as a part of the state. During an archive restore, once the master key is restored the data can be successfully restored to the system in the encrypted state as long as the passphrase set at the time of archive is used. For more details, see the "Archiving Overview" chapter.
Encryption limitations En c ry p tio n limita tio n s
Encryption is not supported on Small Form Factors (SFF). If the passphrase is forgotten, there is no way to retrieve it. There will be no way to restore an encrypted backup in such a case. No encryption or decryption is performed on the client. No encryption or decryption is performed on a legacy vault system. (Replicated backups are encrypted on the target system using the target’s encryption key.) The following types of backups are not encrypted:
• • •
Legacy MS Exchange Information Store backups CEP brick level backups Any data stored on the system via Samba or NFS
About security levels By default, the security level on the system is set to No Security. This allows all ports to remain open. The administrator can choose the level of security desired on a particular system. Security levels can be set by selecting Settings > Clients, Networking, and Notifications > Ports and are categorized as:
• • • •
No Security Low Security Medium Security High Security
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
132
To access the system using medium security When using medium security, access the Administrator Interface by entering https:///recoveryconsole/ as the browser address. Access context-sensitive help by directing the browser to
https:///recoveryconsole/help/main_menu.html. Answer yes to any warning messages received.
To access the system using high security When high security is enabled, the system can only be accessed using a KVM or directly attached monitor, keyboard, and mouse for physical systems, or from the VM console for virtual systems. You have access to the system console only. There is no way to access the Administrator Interface to view functions (such as backups, archives, replication) or make changes to any system settings.
To disable high security 1
Connect to the system console.
•
For physical systems, connect using a KVM or directly attached monitor, keyboard, and mouse.
•
For Unitrends Enterprise Backup for Hyper-V, launch Hyper-V Manager, select the Unitrends VM, and click Connect.
•
For Unitrends Enterprise Backup for VMware, connect to the Unitrends VM using the VMware vSphere Client, VMware Player, or VMware Workstation.
2
In the Console Interface, enter 3 in the Please enter choice field.
3
On the Firewall Security Level screen, enter 1, 2, or 3 in the Please enter choice field to change security level to None, Low, or Medium.
Open ports and security levels The ports open for each security level are listed in the table below. Additionally, in the General Configuration section of the Settings interface (Settings > System, Updates, and Licensing > General Configuration > Configuration Options), there is a field named dataport_count. This field represents the number of TCP ports allowed to be opened for data transfer. This value includes the control value and four additional ports to determine the actual port numbers from which to select. When any level of security is enabled, the control value is 1745. The default number of additional ports added to 1745 is four. When configuring a firewall (using a security setting and a dataport count of five), ports 1745 through 1749 should be opened between the system and the clients the system protects. Note:
About replication and vaulting - Port 1 must be open during the initial configuration of replication or legacy vaulting. During replication or vaulting setup, if you configure a secure tunnel using OpenVPN (the recommended configuration), port 1194 is used for all communication between the source and target (or vault) systems. If you do not configure a secure tunnel using OpenVPN, ports 1743,1745 and 5432 are required for managing a system from the replication target or vault. Additionally, if you do not configure a secure tunnel using OpenVPN, port 80 is used for replication and port 22 for vaulting. The necessary ports must be open in the firewall for management of the system from the replication target or vault. For more details, see KB 3372.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
133
See these topics for open port details:
• • •
"Low security open ports" on page 133 "Medium security open ports" on page 134 "High security open ports" on page 135
Low security open ports The following table describes the ports that are open for the low security level: Low Security Level Open ports
Usage
1
Replication or legacy vaulting setup
22
Secure shell
80
HTTP web access
139
Samba share
161
SNMP
443
Secure HTTP web access
445
CIFS
873
Rsync
888
3ware web access
1194
OpenVPN
1743
Extended Internet daemon
1744
Extended Internet daemon
1745
Extended Internet daemon
1746
Extended Internet daemon
1747
Extended Internet daemon
1748
Extended Internet daemon
1749
Extended Internet daemon
2049
Network file system
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
134
Low Security Level Open ports
Usage
3260
iSCSI
4970
Postgres database access
5432
Postgres database access
5801
VNC (Java) access
5900
VNC access
5902
VNC access
6001
VNC HTTP web access
10000
NDMP
Medium security open ports The following table describes the ports that are open for the medium security level: Medium Security Level Open ports
Usage
1
Replication or legacy vaulting setup
22
Secure shell
139
Samba share
443
Secure HTTP web access
445
CIFS
1194
OpenVPN
1743
Extended Internet daemon
1745
Extended Internet daemon
1746
Extended Internet daemon
1747
Extended Internet daemon
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
135
Medium Security Level Open ports
Usage
1748
Extended Internet daemon
1749
Extended Internet daemon
4970
Postgres database access
5432
Postgres database access
3260
iSCSI
10000
NDMP
High security open ports The following table describes the ports that are open for the high security level: High Security Level Ports open
Usage
1743
Extended Internet daemon
1745
Extended Internet daemon
1746
Extended Internet daemon
1747
Extended Internet daemon
1748
Extended Internet daemon
1749
Extended Internet daemon
About the Windows NTFS change journal Today, customers with large numbers of files (typically in the millions) can experience very long incremental backup times. Two factors contributing to the delayed backup times include:
•
Factor 1 – The Windows agent scans all files/directories on the specified volumes to determine modification times. Files with modification times more recent than the last successful master are included in the incremental backup.
•
Factor 2 – The Windows agent also looks at the ‘archive’ property on each file whose modification time does not meet the first criteria. If the property is set, then the file is included in the backup.
Factor 1 accounts for a large percentage of the time spent performing the backup, while Factor 2 contributes more processing overhead from the mechanics of examining the file properties. In addition, Factor 2 helps to inflate the size of the backup by including files that do not meet the
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
136
modification criteria. Additionally, files with the archive property set should not automatically be included in incremental backups. Use of the change journal can eliminate much of the overhead contributed by these factors. The change journal is a record of all changes to any file(s) on a given volume. When a change journal is created, Windows begins to log changes immediately to that journal without requiring a reboot of the server. Windows logs all file changes on a given volume along with the nature and time of the change. During an incremental backup, the Unitrends agent queries the change journal to discover the changes made to files on the volume. It queries the data logged for each change to determine if the time of the change qualifies the data for back up. This is done by comparing the modified data to the time of the last successful master backup. Since journal records are kept only for changes to files or directories, determining which files to back up on a volume requires just a fraction of the time needed for the traditional volume scan. As the number of files on a volume increases, the benefit of using the change journal also increases. The change journal feature is transparent. There are no visible configuration or setting options on the backup system or on Unitrends local agent interface. By default, the agent prefers to use the change journal during incremental backups. If the journal cannot be used, the agent uses the volumescanning method to produce the list of files to back up. See the following topics for details:
• • • • • •
"Change journal operation for master backup" on page 136 "Change journal operation for incremental backup" on page 136 "Configuring the change journal" on page 137 "Change journal configurable file types" on page 138 "Change journal per volume" on page 138 "Change journals and remote mounts" on page 138
Change journal operation for master backup Ch a n g e jo u rn a lo p e ra tio n fo rma s te rb a c k u p
When a master backup is performed on the Unitrends agent, the system is scanned for an existing change journal on each volume. If a change journal does not exist on a volume, the agent creates one. If a journal does exist, the agent insures that the size of the journal meets the minimum size required by enlarging the journal if necessary. The minimum size required for a change journal is 500MB. After the journal creation/discovery is complete, the agent “registers” each journal by creating entries in the system’s registry. Subsequent incremental backups query these entries. The registry entries exist outside of the current Unitrends registry entries to insure that they are not removed following agent software updates or software removal. The agent records a registry entry for each volume containing a change journal. The registry entry contains the following:
• •
Unique ID given to the change journal Sequential number of the first entry in the journal
Change journal operation for incremental backup Ch a n g e jo u rn a lo p e ra tio n fo rin c re me n ta lb a c k u p
When an incremental backup is performed, the system is scanned for an existing change journal on each volume that it intends to back up. If a journal exists, the agent queries the registry for the
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
137
journal’s ID and starting sequence number. This information will have been entered there by a previous master backup. If the entries exist, then the agent performs the following checks:
•
A check to determine if the journal ID in the registry matches the ID of the volume’s current journal. If the IDs do not match, this indicates that the journal that existed during the master backup was deleted and that a new journal was created.
•
A check to determine if the starting sequence number in the registry matches that of the volume’s current journal. If these numbers do no match, this indicates that the journal was filled to capacity with entries and has ‘wrapped’ around to the beginning. In this case, there will be file modifications that were made to the volume that are not recorded in the journal.
If both these checks succeed, then the agent uses the change journal to determine which files to include in the backup. If one of these checks fails, the agent does not use the journal and reverts to the volume scanning method. In this case, the agent includes some information in the backup output to warn the user that a new master backup must be completed in order to use the journal for subsequent incremental backups.
Configuring the change journal Co n fig u rin g th e c h a n g e jo u rn a l
If use of the change journal is not desired, it can be disabled by modifying the following entry in the agent’s master.ini file. The file is located on the Windows client in the \PCBP directory (typically C:\PCBP). UseChangeJournal=False
The minimum change journal size maintained by the Unitrends’ agent is 500MB. This size is configurable by adding an entry into the agent’s master.ini file. The size should be indicated in MB. ChangeJournalSizeMB=500
The size of the change journal can be enlarged by creating the above entry and setting the value to a number larger than 500. WARNING! The Microsoft best practices for use of change journal recommends that, once created, the change journal size should not be reduced, nor should the change journal be deleted. Likewise, the Unitrends agent cannot guarantee successful backup and restore operations in an environment where the size of the change journal has been reduced. Please understand that reducing the size of the change journal may result in corrupt backup operations, possibly causing failure to restore. Each time that a master backup completes, the change journal for each volume is inspected and enlarged if the size indicated in the master.ini file is larger than the size of the actual journal. The change journal wrap condition causes a delay in the time it takes for incremental backups to complete. If incremental backups begin to take longer than expected, this may be a result of the change journal wrap condition. When backing up servers that are configured as domain controllers, the change journal wrap condition may occur more frequently. The change journal wrap condition is not an error and will not interfere with capturing a successful backup. However, because the system must do a full filesystem scan, this does increase the likelihood of a timeout occurring that fails the backup. In the event that the change journal wrap
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
138
condition occurs, expect to see the following message in the backup summary for the specific backup operation:
Change journal for volume C: appears to have wrapped since the last master backup and will not be used for this backup. This is not an error condition and does not interfere with the backup. If this server is a domain controller, then this condition is expected to occur more frequently. To enable use of the change journal for the next incremental backup, perform a master backup to resynchronize with the journal. If the change journal wrap condition occurs too frequently, you must enlarge the current journal size, as described below.
Change journal configurable file types Ch a n g e jo u rn a lc o n fig u ra b le file ty p e s
The change journal contains records of changes to files on a particular volume. There are two types of data changes that do not modify file content but are tracked by the journal:
•
Auxiliary Data Change – An operation adds a private data stream to a file or directory. An example might be a virus detector adding checksum information. As the virus detector modifies the item, the system generates change journal records. This type of file change indicates that the modifications did not change the application data.
•
Basic Information Change – A user has changed one or more file or directory attributes (i.e. readonly, hidden, system, archive, or sparse), or one or more time stamps.
When the agent encounters an ‘Auxiliary Data Change’ record, the default behavior is to ignore it and not include the file in the backup. When the agent encounters a ‘Basic Information Change’ record, the default behavior is to include the modified file in the backup. In both cases, if the default behavior is not the desired behavior, modify the master.ini file to override the existing settings: ChgJournalBackupAuxChg=1
Adding this entry forces the agent to include files in the backup when an ‘Auxiliary Data Change’ is found. ChgJournalBackupPropChg=0
Adding this entry forces the agent to ignore files whose only change was a property change.
Change journal per volume Ch a n g e jo u rn a lp e rv o lu me
Change journals are created and managed on a volume-by-volume basis. If a system contains multiple volumes and a subset of the volumes cannot support use of the change journal, the volumes are backed up using the volume scanning method. Volumes that support change journal are backed up using the change journal.
Change journals and remote mounts Ch a n g e jo u rn a ls a n d re mo te mo u n ts
Change journals can be created and accessed on local NTFS volumes only. If NTFS file systems are mounted from remote servers, the incremental backups that include the mounted volumes do not use the change journal for those volumes.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
139
For example: File Server ‘ServerA ‘shares ‘DirectoryA’ for anyone to mount. Workstation ‘UserA’ maps ‘DirectoryA’ as a local drive and then adds/change files. If an incremental backup of ‘ServerA’ is performed: ‘UserA’ changes to ‘DirectoryA’ will be seen and backed up using the change journal. If an incremental backup of ‘UserA’ is performed using the change journal: ‘UserA’ changes to ‘DirectoryA’ will not be backed up using the change journal.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
140
Legacy Recovery-Series and UEB Administrator's Guide Chapter 4: Advanced Configuration Options
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
141
Chapter 5: Backups Overview This chapter provides an overview of Unitrends backups. It identifies the types of data that Unitrends protects, introduces the different backup types, and explains how they are structured into groups by the system. It also explains how to use the Unitrends Administrator Interface (AI) to monitor jobs, view backups, and perform other backup procedures. To restore backups, see the "Restore Overview" chapter. This chapter contains the following topics:
•
"Types of data protected" on page 141
• • • • • •
"Backup types" on page 142 "Backup groups" on page 145 "Executing backups" on page 146 "Monitoring running backup jobs" on page 147 "Viewing backups" on page 148 "Working with the Backup Browser" on page 154
Types of data protected The following types of data can be protected with the Unitrends system:
• • • •
"Files" on page 141 "Applications" on page 141 "Operating systems" on page 142 "Virtual machine infrastructure" on page 142
Files The file system of a client or files stored on a CIFS/NFS NAS are protected by file-level backups. For an explanation of the different backup types used to protect files, see "Backup types" on page 142. For instructions on executing file-level backups, see the "File-level Backups" chapter.
Applications Applications are protected by backups that capture an application’s structure and data to ensure database consistency. See the following chapters for details about application backups:
• • • • •
"Microsoft SQL Protection" on page 489 "Microsoft Exchange Protection" on page 511 "Microsoft SharePoint Protection" on page 535 "Oracle Protection" on page 549 "Cisco UCS Protection" on page 679
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 5: Backups Overview
142
•
"NAS protection using NDMP" on page 570
For an explanation of the different backup types used to protect applications, see "Backup types" on page 142.
Operating systems Operating systems are protected by bare metal technology, and the protection procedures vary depending on the operating system. For details, see "Bare metal procedures by client operating system" on page 750.
Virtual machine infrastructure Unitrends supports backup of Hyper-V and VMware environments. For details, see the chapters "Hyper-V Protection" and "VMware Protection". For an explanation of the different backup types used to protect virtual environments, see "Backup types" on page 142.
Backup types Not all backup types are supported for all clients. For details on which types of backups can be run for particular clients, see the client-specific chapters listed under Applications and Virtual machine infrastructure. The following types of backups can be performed with the Unitrends system:
• • • • • •
"Full backup" on page 142 "Incremental backup" on page 143 "Differential backup" on page 143 "Synthetic backup" on page 144 "Selective backup" on page 145 "Bare metal backup" on page 145
Full backup F u lb a c k u p
A full backup of a client, also known as a master backup, captures all data selected for protection. For file-level backups, you can use selection lists to exclude unwanted data, and for Windows clients, you can also specify which files to include. For applications and virtual machine infrastructure, all data is included in a full backup.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 5: Backups Overview
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
143
Incremental backup In c re me n ta lb a c k u p
When an incremental backup is scheduled, the system checks the protected client in specified intervals of time and captures changes in the protected data since the last successful backup (of any type). The diagram below illustrates incremental backups for a client. In this example, the incremental runs once a day, but you can schedule incrementals more frequently if desired.
Differential backup Dife re n tia lb a c k u p
A differential backup captures changes in the protected data since the last successful full backup. The diagram below illustrates differential backups for a client. Each differential captures all changes in the protected data since the full backup on Day 1. For example, the differential on Day 4 captures all changes since the full backup on Day 1, including the changes that were already captured by the differentials on Day 2 and Day 3.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 5: Backups Overview
144
Synthetic backup Sy n th e tic b a c k u p
A synthetic backup is a full or differential backup that the Unitrends system synthesizes by superimposing the incremental backups on the last successful full backup. It then uses the synthesized backups to create recovery points. After the system creates a synthesized full backup, it uses this backup as a reference point when determining whether the client’s protected data has changed and a differential or incremental backup needs to be run. The Unitrends system uses the following factors to determine when to create a synthetic backup:
• • • •
Amount of data being protected on the backup system Number of days from the last full backup Number of incremental backups since the last full backup Load on the system
Synthetic backups are created only for file-level backups and backups of VMware and Hyper-V clients. Synthetic backups are system-side only and do not impact the clients or networks. The diagram below illustrates a synthetic backup. For additional information about synthetic backups, see KB 3560.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 5: Backups Overview
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
145
Selective backup Se le c tiv e b a c k u p
A selective backup is run independently of any full, differential, or incremental backup and captures only the client data that you have selected. Selective backups can be used only for file-level backups. For details, see "File-level Backups" on page 159.
Bare metal backup Ba re me ta lb a c k u p
For Windows clients, a bare metal backup may be used to capture the boot volume (usually the C: drive) allowing for rapid recovery in the event of a system or drive failure. Note that in Unitrends release 7.4 and higher, regular file-level backups contain this system information, eliminating the need for bare metal backups for many clients. For requirements and details, see "Windows Bare Metal Protection" on page 753. To protect the operating system for non-Windows clients, see "Bare metal procedures by client operating system" on page 750.
Backup groups To protect your data, you will likely use a combination of backup types. (For a discussion of the different backup types, see "Backup types" on page 142.) When you execute different types of backups for a client, the Unitrends system organizes them into backup groups. The system creates a group when you run a new full backup. Each subsequent differential and incremental backup forms a link in the chain of backups that constitute the group. Each link in the chain is necessary for performing point in time restores. When you execute a new full backup (or when the system creates a synthetic full backup), the system creates a new group associated with the full backup. (For information about restoring files from backups, see "Restore Overview" on page 341). The following diagrams illustrate backups groups:
• •
"Groups with full, differential, and incremental backups" on page 145 "Selective backup in relation to a group" on page 146
Groups with full, differential, and incremental backups The diagram below shows two backup groups containing full, differential, and incremental backups.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 5: Backups Overview
146
Selective backup in relation to a group Note:
Selective backups are supported only for file-level backups.
Selective backups exist independently of backup groups. The diagram below illustrates a backup group and selective backups for one client. Both a selective backup and an incremental backup ran on Day 3. On Day 5, a differential backup and a selective backup ran. However, only the incremental and the differential belong to the group associated with the full backup run on Day 1.
Executing backups For instructions on executing backups, see the following chapters:
• • • • • •
"File-level Backups" on page 159 "Microsoft SQL Protection" on page 489 "Microsoft Exchange Protection" on page 511 "Microsoft SharePoint Protection" on page 535 "Oracle Protection" on page 549 "Hyper-V Protection" on page 585
Legacy Recovery-Series and UEB Administrator's Guide Chapter 5: Backups Overview
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
147
• •
"VMware Protection" on page 629 "Cisco UCS Protection" on page 679
Monitoring running backup jobs To view and manage queued and running backup jobs 1
Select the backup system or client in the Navigation pane and click Status. Selecting the client displays only jobs run for that client. Selecting the backup system displays all queued and running jobs.
2
On the side of the Status page, click the Present blind. On the Present page, all queued and running backups for the selected system or client display. The following information is given for each job: Field
Description
ID
Backup ID
Client
The client for which the job is executing.
DB/VM
Shows the virtual machine or application instance, if applicable.
Job Type
The type of job.
Status
The real-time status of a task is displayed in the Status column.
Job Comment
Backup performance and progress can be monitored in the Job Comment column.
Successful This signifies that all the files have been backed up successfully. Note:
This may signify an incomplete backup. Files open at the time of backup or ones that do not have the right permissions do not get backed up. All the other files back up successfully. If less than 0.01% of the total number of files fail to backup, the status is reported as success.
Failed
This signifies that the backup failed. Click Detail for more information. If more than 0.01% of the total number of files fail to backup, the job is classified as failed.
Proc Aborted
This signifies an unexpected abort of the backup process. Click Detail for more information.
Canceled
This status is seen when a user terminates a backup process.
When a row is selected in the table, details concerning that job display near the bottom of the
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 5: Backups Overview
148
page. Details include the name of the job, the job ID, the job type, the client, the device, the status of the job, and the comment. At the bottom of the page are a set of controls: Control
Description
Auto Refresh
Check this box to refresh the page every n seconds, where n is the number entered.
Refresh Interval
The number of seconds between automatic refreshes if the Auto Refresh box is checked.
Advanced Options > Stop Tasker/Start Tasker
This button toggles starting and stopping the Tasker process, which manages jobs. If there are any modifications to the backup system’s configuration settings, Tasker must be stopped and re-started for changes to take effect. To access Tasker, click the Advanced Options checkbox.
Refresh Now
Click to manually refresh the page.
Suspend/Resume Select a job in the list and click this button to suspend an active job(s) or to resume a suspended job(s). Terminate
Click this button to terminate a selected job(s).
Close
Click to close this view and return to the previous screen.
Multi-job selection Use Shift + Click to select contiguous rows. Use Ctrl + Click to select non-contiguous row. For best results, disable auto-refresh before acting on multiple jobs. Once the action is complete, click Refresh Now or check Auto-Refresh to see job statuses.
Viewing backups To check the status of backups, you can view running jobs as described in "Monitoring running backup jobs" on page 147, or view completed jobs as described in these procedures:
• • • • • • •
To run a backup report, see "Backups Report" on page 369 "To view backups completed in the last 7 days" on page 149 "To view backups by month" on page 149 "To view backup details" on page 149 "To find files in backups" on page 150 "To browse the contents of a backup" on page 151 For replicated backups, see "Viewing replicated backups" on page 309.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 5: Backups Overview
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
149
Note:
If your backup system is replicating to a target, be sure you are not working in Replication View. This view displays replicated backups on the target system rather than ones stored on the local backup system.
To view backups completed in the last 7 days 1
Select the backup system in the Navigation pane and click Status. Note:
The blue server icon displays to the left of each backup system in the Navigation pane.
2
Select the Past (Historical Status) blind.
3
The System Status page displays a snapshot of backups for each protected client over the last 7 days. Failures are red, warnings yellow, and successes green. Hover over any square in the Backup: 7 Day Snapshot calendar for a backup summary of a given client and day.
4
Select the Backup: Last 7 Days tab below for a list of completed backup jobs.
• • •
Click any column head to change the sort order. To filter by client, select the client in the left Navigation pane. Double-click a backup to view additional details on the Backup Information page.
To view backups by month 1
Select a client in the Navigation pane and click Status. Note:
For virtual machines on 7.1 and higher, you can filter further by selecting a VM. To display VMs under the Hyper-V client or ESX server, click the gear icon at the bottom of the Navigation pane, check Show Virtual Machines in Navigation Tree, and click Confirm.
2
Select the Past (Historical Status) blind.
3
The center stage displays a snapshot of backups completed for this client during the current month. Failures are red, warnings yellow, and successes green.
• • 4
Hover over any square in the monthly calendar for a backup summary of a given day. Click the scroll arrows above to view another month.
Select the Backup: Month tab below for a list of completed backup jobs.
• •
Click any column head to change the sort order. Double-click a backup to view additional details on the Backup Information page. See "Backup Information page" on page 152 for more information.
To view backup details 1
Select a client in the Navigation pane and click Status. Note:
For virtual machines on 7.1 and higher, you can filter further by selecting a VM. To display VMs under the Hyper-V client or ESX server, click the gear icon at the bottom of the Navigation pane, check Show Virtual Machines in Navigation Tree, and click
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 5: Backups Overview
150
Confirm. 2
Select the Past (Historical Status) blind.
3
Under the Backup: Month or Backup: Last 7 Days tab, click the desired backup.
4
Details display on the Backup Information page.
• •
Click any column head to change the sort order. Double-click a backup to view additional details on the Backup Information page. See "Backup Information page" on page 152 for more information.
To find files in backups Use this procedure to search for files in a client’s file-level backup history. These files can be deleted, viewed, or restored. Note:
The Show Search Options feature is for file-level backups only. If you attempt to search for a file in an application or virtual machine backup, you receive a message that no files were found.
1
Click Status on the main menu.
2
Select a client in the Navigation pane and click Show Search Options above the calendar.
3
Enter search criteria. Search by name, date, size, or any combination.
•
Name – To search by name, check the Name box and enter text. For quickest search, include the entire path. Wildcards, such as “*” and “?”, can be used in the file name. An “*” represents any number of characters before or after the entered text. For example, *.doc returns all files ending with the .doc extension and auto* returns all files starting with auto. A “?” represents just one character. For example, if there are a number of files named file1, file2 through file12, file13,file? returns file1 through file9 and file?? returns all the files up to file13. Searches that fully spell out the path and file name can be executed quickly. The use of wildcards will increase the time required to return the results as the search must go through every file in the backup to locate the match.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 5: Backups Overview
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
151
IMPORTANT! If using wildcards, such as ‘\\’, ‘%’, ‘_’, ‘*’, ‘?’, and ‘\’, do NOT check the Regular Expression box. These characters are interpreted differently as regular expressions and do not yield the same search results.
•
Regular Expression – Check this box to search using regular expressions. (Do NOT check this box to search using regular wildcards.) Regular expressions are used to symbolically represent patterns that can occur in text. Like wildcards, certain characters have special meaning when specifying the text that can match the regular expression. The syntax of regular expressions is more complex and powerful than wildcards. This technique only needs to be used if wildcards are too limited to construct a sufficiently precise search pattern. Some good references about the use of regular expressions can be found in the online encyclopedia, Wikipedia.
• •
Ignore Case – Check this box to search for filenames regardless of case.
• •
Size (KB) – Check this box and enter a range in kilobytes to narrow the search by file size.
•
Exclude – Select to return all files other than ones that meet the search criteria you entered. Entered criteria is used to exclude files from search results.
Date – Check this box to search for files modified within a certain time frame. Calendar icons are provided to assist with date selection.
Include – Select to return files that meet the search criteria you entered. This is the default setting.
4
Click Search. Files matching the specified criteria display below on the Search: File Results tab.
5
Double-click a file to view more details.
• • • 6
To delete this backup and any associated dependent backups, click Delete Backup. To exit the Backup Information page, click Cancel. To restore, proceed to the next step.
To restore from this backup, click Restore Files and set restore options, then click Restore.
•
By default, the file you selected in step 5 above is the only item selected for restore. To add files, browse the File Selection List in the Restore from Backup of Client pane and select files, folders, and volumes to add. To expand a volume or folder, click the arrow to its left. Files and folders can be viewed in their default or short format by selecting the appropriate radio button next to File View.
• •
Click Show Advanced File Selection to select files by drag and drop. Change the File Exclusion options or the Advanced Execution options as desired. For details, see "Restore options" on page 348 and "Advanced Execution Options for restore" on page 351.
To browse the contents of a backup 1
Select a client or application in the Navigation pane.
2
Select Reports > Backups.
3
Locate the desired backup on the Backups Report. If necessary, select a new date range from the drop-down at the bottom of the page to display more backups.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 5: Backups Overview
152
4
Select the desired backup in the grid by clicking that row.
5
In the Report Entry window, click Details for a list of items contained in the backup.
6
Click Close to exit the Details window.
Backup Information page Items on the Backup Information page are described here. Note that some items display for specific application backups only. Category
Description
Application
Application version. For example, VMware, Hyper-V 2008 R2, SQL Server 2008, Exchange 2010, SharePoint 2010, or Oracle 11. Does not display for file-level backups.
Backup ID
Unique ID assigned to the backup.
BytesPerMinute
Average backup speed, in bytes per minute.
Certified
Indicates that this backup has been certified using ReliableDR, either successfully (Certification successful), with errors (Certification completed with errors), or with warnings (Certification completed with warnings). It does not display for non-certified backups.
Cluster
Applies to Hyper-V only. Indicates whether the VM is configured in a cluster.
Complete
Indicates whether the backup job completed.
Database
Displays for application backups only. The database or VM name that was backed up.
Date
Date and time the backup started.
Device
Device where the backup is stored. Default is D2DBackups.
DiskMetadata
Indicates whether metadata is contained in the backup. Metadata is required for Windows Instant Recovery and Windows Integrated Bare Metal Recovery.
System
Name of the backup system.
Elapsed Time
Duration of the backup job in hh:mm:ss format (hours, minutes, seconds).
ElapsedTimeRaw
Duration of the backup job, in seconds.
Encrypted
Indicates whether this backup is encrypted.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 5: Backups Overview
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
153
Category
Description
Files
Number of files contained in the backup.
FilesPerMinute
Average number of files backed up per minute.
GUID
Applies to Hyper-V only. Virtual machine ID.
Instance
Displays for application backups, except for Exchange and Oracle.
• • • •
For VMware, name of the vCenter or ESX server hosting the guest VM. For Hyper-V, name of the guest VM. For SQL, name of the client running the SQL server. For SharePoint, instance is Farm.
Instance ID
Displays for application backups only. ID associated with the instance.
Last
Indicates whether this is the most recent backup of this type for this client.
Name
Name of the client whose data was backed up.
Parent
Name of the associated parent backup.
Raw Command
Command issued by the backup system to run this job.
Replicated
Indicates whether this is a replicated backup stored on the replication target.
Result (Operation)
Status of the backup job: success, warning, or failure.
Result (Verify)
Status of the verify: success, failure, or none (if no verify was performed).
Size (MB)
Backup size, in megabytes.
SyncSize
For replicated backups only, size of the sync object. Indicates how much data was replicated.
Synthesized
Indicates whether this backup was synthesized. Synthetic backups are initiated automatically by the system. For clients protected with the incremental forever strategy, synthetic system-side masters and/or differentials are created periodically. Synthetic masters and differentials may also be created for archiving and legacy vaulting, as incrementals are not archived or vaulted directly. For more information, see KB 3560.
Template
Indicates whether this is a backup or VMware template.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 5: Backups Overview
154
Category
Description
Type
Backup type. File-level backup types include full/master, differential, incremental, selective, and bare metal. Application backup types vary by application. Application name is included in the backup type name (for example, Exchange Full).
Raw Output
Messages logged during backup.
Restore Files
Click to restore files. Applies to file-level backups and the following application backups: VMware, Hyper-V, and Oracle.
Restore Items
Applies to Exchange only. Click to restore items using Kroll.
Restore
Applies to application backups only. Click for non-granular restore of the backup. To restore the entire application to a specific point in time, use the main Restore menu instead. See "Executing a point-in-time restore" on page 346.
Delete Backup
Click to delete the backup and any associated dependent backups.
Cancel
Click to exit the Backup Information page.
Working with the Backup Browser Use the Backup Browser to view and manage backups already stored on a device. See the following topics for details about using the browser:
• • • • •
"About the Backup Browser" on page 154 "To view backups stored on a device" on page 155 "To customize the backup browser" on page 156 "To delete backups from a device" on page 156 "To set a legal hold on a backup" on page 156
About the Backup Browser Ab o u th e Ba c k u p Bro ws e r
The Backup Browser is split into two panes. The top pane displays backup devices, and the bottom pane displays information about the backups stored on the selected device.
Backup Devices pane You can view the following information about backup devices in the upper pane of the Backup Browser: Column
Description
Device Name
The name of the storage device.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 5: Backups Overview
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
155
Column
Description
Storage Name
The name of the backup storage on the device.
Online
Whether or not the storage device is online.
Default
Whether or not the device is default storage.
Size (GB)
The total capacity of the storage device.
Backup Concurrency
Maximum number of concurrent backups allowed for the device.
Backup Details pane You can view the following information about backups already stored on the selected device in the lower pane of the Backup Browser. Note:
For additional information about a particular backup, select its checkbox, then click Backup Information.
Column
Description
Client
The name of the client which the backup operation protects.
ID
The backup operation’s unique numeric identification.
Status
The status of the backup operation. Green indicates a successful backup, yellow indicates a backup completed with warnings, and red indicates a failed backup. Currently active backup operations are represented with an hourglass.
Database Displays for application backups only. The database or VM name that was backed up. Date
The date the job occurred.
Time
The time the job started.
Type
The type of backup operation. The type may include master, differential, incremental, bare metal, etc.
Size (MB)
The size of the backup operation in megabytes.
To view backups stored on a device 1
Select Settings > Storage and Retention > Backup Browser. The system’s backup devices display in the top pane. The default storage target is named Internal, but if other targets have been added, they also display. See "About storage configuration" on page 103.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 5: Backups Overview
156
Note:
2
By default, the Internal target includes the default device, D2DBackups. Devices may be modified in Settings > Storage and Retention > Backup Devices.
Select a backup device in the upper pane. All backups stored on that device display in the lower pane. If desired, click Refresh to update the list, or click Select Columns to customize the information displayed. See "To customize the backup browser".
3
To view finer detail for a particular backup, select its checkbox, then click Backup Information.
To customize the backup browser 4
Select Settings > Storage and Retention > Backup Browser.
5
Click Select Columns.
6
In the Column Chooser window, check or uncheck the columns as desired. Note:
7
By default, the lower pane of the Backup Browser displays all columns.
Click Confirm. The columns displayed in the lower pane automatically update to reflect your selections.
To delete backups from a device When you delete a backup, it is logically deleted and you can no longer access it. However, the amount of available storage will not immediately increase and might not increase at all. The backup’s physical blocks are removed when the system performs a periodic purge. For deduplicated systems, a given block might be referenced by several backups, and unless all of these backups are deleted, the block is not purged, and your available storage space does not increase. WARNING! This procedure permanently deletes backups from the system. Once you click Confirm, you cannot stop the process. Any selected backups and dependent backups are deleted from the system. For example, deleting a full backup deletes any associated incremental and differential backups in that group. If any backups that are set to legal hold are selected for deletion, a warning displays asking if you really want to delete those backups. An entry in the audit log is created any time a backup that was set to legal hold is deleted. 1
Select Settings > Storage and Retention > Backup Browser.
2
Select a backup device in the upper pane. All backups stored on that device display in the lower pane. If desired, click Refresh to update the list.
3
Choose one or more backups by checking the desired boxes. To select all, check the box in the title bar. Click again to deselect all.
4
Select Delete Backup, then click Yes.
To set a legal hold on a backup 1
Select Settings > Storage and Retention > Backup Browser.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 5: Backups Overview
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
157
2
Select a backup device in the upper pane. All backups stored on that device display in the lower pane. If desired, click Refresh to update the list.
3
Choose a backup by checking the desired box. Only one backup may be selected at a time when modifying legal hold settings.
4
Select Legal Hold Settings. For a selected backup, all backups in its group are displayed. For example, if you selected an incremental, all incrementals and their parent full are selected.
5
Do one of the following:
•
To set a legal hold on only the backups listed below, adjust the Legal Hold Settings For Individual Backups on the left.
•
To set overall retention and legal hold settings for a client, virtual machine, or database, adjust the Retention Settings for your client on the right. These are the same settings you can set in Settings > Storage and Retention > Backup Retention.
The settings that are in effect for the selected backups are highlighted. If legal hold is configured for the client and you set different legal hold settings for a backup of that client, the larger legal hold setting takes precedence. 6
Click Confirm.
Note:
Information about backups that have been placed on legal hold can be found in the Legal Hold report. See "Legal Hold Backups Report" on page 381 for details.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 5: Backups Overview
158
Legacy Recovery-Series and UEB Administrator's Guide Chapter 5: Backups Overview
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
159
Chapter 6: File-level Backups This chapter describes the procedures used to perform file-level backups of protected clients. Clients must be registered to the backup system before running these procedures. See "About adding clients" on page 69 for details. File-level backups protect a client’s file system, and in release 7.4 or higher, file-level backups can also protect the operating system of most Windows clients. (For details about protecting a Windows client’s operating system with file-level backups, see "Windows Bare Metal Protection" on page 753.) For descriptions of the procedures used to protect applications and virtual machine infrastructure, see the applicable chapters. Note:
If you have VMware or Hyper-V virtual machines, you can protect them using Unitrends VMware backups, Hyper-V backups, or by installing an agent and running Unitrends filelevel backups. To determine the protection strategy that works best for you, review "VMware Protection" on page 629 and "Hyper-V Protection" on page 585.
If you are a new user of the Unitrends backup system, it is recommended that you read the "Backups Overview" chapter before running the procedures described here. The overview chapter provides a detailed discussion of backup types, backup groups, and other key concepts referenced throughout this chapter. This chapter contains the following topics:
• • • • • • • •
"File-level backup types" on page 159 "File-level backup strategies" on page 160 "Grouping clients for file-level protection" on page 162 "Using selection lists" on page 162 "About executing file-level backups" on page 166 "Working with the computer backup subsystem" on page 167 "Working with the Enterprise backup subsystem" on page 176 "Working with client aliases" on page 198
File-level backup types The following types of file-level backups can be performed with the Unitrends system: Backup Type Full backup
Description Captures all selected data on the client. For file-level backups, you can use selection lists to exclude unwanted files (all systems) or include specified files (Windows and Linux only). Also called a master backup.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
160
Backup Type
Description
Incremental Checks the protected system in specified intervals of time and backs up changes backup in the protected data since the last successful backup (of any type). Any selection lists must match those applied to the previous full backup. Differential backup
Captures changes in the protected data since the date and time of the last successful full backup. You have the option to exclude unwanted files (all systems) or include specified files (Windows and Linux only). Any selection lists must match those applied to the previous full backup.
Selective backup
Used to back up selected volumes, directories and/or files on a client. You can include specified files, using wildcards if needed. Wildcards are not supported for Linux, Unix, and CIFS/NFS NAS clients. Selective backups do not belong to a backup group.
Synthetic backup
Full or differential backup that the system synthesizes by superimposing the incremental backups on the last full backup. Synthetic backups are system-side only and do not impact the client or networks.
For a more detailed discussion of these backup types, see "Backup types" on page 142.
File-level backup strategies Unitrends recommends using an incremental forever strategy for file-level backups. With this strategy, a full is run one time, followed by incrementals thereafter at the frequency that best suits your environment. The system then synthesizes fulls and differentials locally from the incrementals to ensure quick restores. These synthetic backups are also used for archiving and legacy vaulting, as incremental backups do not archive or vault directly. For more information on synthetic backups, see "Synthetic backup" on page 144 and KB 3560. Incremental forever is supported on Unitrends Enterprise Backup virtual systems as well as the Recovery-212 and later physical systems. The following clients can use the incremental forever backup strategy: Windows XP or later, VMware ESX(i) 5.0 or later (See "VMware Protection" on page 629), Hyper-V 2008 R2 or later (See "Hyper-V Protection" on page 585), and any supported Linux client. To use the incremental forever strategy, it is recommended that the backup system be on the latest release. Unitrends supports a variety of other strategy options, described here: Objective
Strategy
Your tolerance for data loss is measured in a day or more
Use incremental forever or a weekly full backup with daily differential backups.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
161
Objective
Strategy
Your tolerance for data loss is measured in minutes or hours
Use incremental forever or a weekly full backup with daily differential and hourly incremental backups.
Your backups need to complete within a few hours during the week but can run continuously on the weekend
Use incremental forever or a weekly full backup with daily differential backups.
You need to control when full backups run
If system resources are taxed and you would like to control when a full backup runs, use a weekly full backup with daily differential and/or incremental backups. Keep in mind that synthetic backups are system-side only and do not impact the client or networks.
Incremental forever backup strategy The diagram below illustrates an incremental forever backup strategy for a client. The strategy begins with a full backup and then runs incrementals at specified intervals of time. When the system determines that a new full backup is necessary, it synthesizes one by superimposing the incremental backups on the last full. A new backup group begins with the synthesized full backup.
Full with daily differentials backup strategy This diagram illustrates a strategy that uses weekly full backups with daily differentials. Because this strategy includes weekly full backups, the system creates a new backup group each week.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
162
Grouping clients for file-level protection Beginning in release 7.5, you can use the navigation grouping feature to run file-level backups for groups of clients. Grouping also increases ease of use by enabling you to manage clients as groups, rather than individually. See the following topics for details:
•
"Navigation grouping" on page 45 for a description of the feature, requirements, and setup procedures.
•
Procedures in "Working with the Enterprise backup subsystem" on page 176 to run backups of the groups you have created.
•
Procedures in "Archiving Overview" on page 201 and "Reports" on page 357, to archive or run reports at the group level.
Using selection lists If you do not want all data from a client to be included in its backups, you can use selection lists to specify which data the backups include or exclude by directory path, file name, and file type. You can use selection lists for all of a client’s backups by applying exclusion lists (all clients) and inclusion lists (Windows version 7.2 or higher and Linux version 8.0 or higher only) to full, differential, and incremental backups. You can also use the selective backup type, which does not belong to a backup group, to apply an inclusion list to an individual backup. (For an explanation of backup groups, see "Backup groups" on page 145.) See the following topics for details about using selection lists:
• • •
"When to use a selection list" on page 162 "Using selection lists with full, differential, and incremental backups" on page 165 "Using selection lists with the selective backup type" on page 166
For instructions on creating selection lists see the following:
• •
For individual clients, see "Working with the computer backup subsystem" on page 167. For multiple clients, see "Working with the Enterprise backup subsystem" on page 176.
When to use a selection list When running one-time or scheduled backups you can apply selection lists to explicitly exclude or include files.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
163
•
You can specify an exclude list for full, differential, and incremental backup types for all systems, using wildcards if necessary. (Note that wildcards are not supported for Linux, Unix, and CIFS/NFS NAS clients.)
•
You can specify an include list for full, differential, and incremental backup types for Windows (version 7.2 or higher) and Linux (version 8.0 or higher) clients only. Wildcards are not supported. For more information, see "Windows selection lists" on page 438 and "Linux selection lists" on page 714.
•
Use an include list for selective backup types, using wildcards if necessary. (Note that wildcards are not supported for Linux, Unix, and CIFS/NFS NAS clients.)
•
Selection lists do not apply to bare metal backups.
Additionally, some selection lists support selection patterns, also known as wildcards. The following table indicates when you can use an include or an exclude list, and indicates support for wildcards. Notes about Includes
Includes
Full Backup
Sometimes
For Windows (version 7.2 or higher) and Linux (version 8.0 or higher). Wildcards not supported.
YES
For all clients. Wildcards okay for most clients. Wildcards not supported for Linux, Unix, and CIFS/NFS NAS.
Differential Backup
Sometimes
For Windows (version 7.2 or higher) and Linux (version 8.0 or higher). Wildcards not supported.
YES
For all clients. Wildcards okay for most clients. Wildcards not supported for Linux, Unix, and CIFS/NFS NAS.
Incremental Backup
Sometimes
For Windows (version 7.2 or higher) and Linux (version 8.0 or higher). Wildcards not supported.
YES
For all clients. Wildcards okay for most clients. Wildcards not supported for Linux, Unix, and CIFS/NFS NAS.
Selective Backup
YES
Required. Wildcards okay.
Sometimes
Not supported for Computer selection lists. Supported for Enterprise selection lists.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Excludes
Notes about Excludes
Backup Type
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
164
Backup Type
Includes
Notes about Includes
Excludes
Notes about Excludes
Bare Metal Backup
NO
N/A
NO
N/A
Uses for selection lists Selection lists can be used to omit and include files in backups by directory path, file name, and file type. Here are some example uses for selection lists: Selection list type Exclude list - any client
Include list - any client
Example uses Create a one-time or scheduled full, differential, or incremental backup. Example uses:
•
If legal or audit requirements specify a monthly backup for all files and folders except for process documents, set up a full backup to run monthly that excludes process documents.
•
If company processes require full backups for all files except for training documentation and videos, create a full backup that excludes the folders and files of those types from the training department.
Create a one-time or scheduled selective backup. Backup contains only files that meet inclusion criteria. Does not impact backup group chain, since selective backups are stand-alone and not part of a group. Example uses:
•
Include only certain volumes or paths that have important data and do not need to run subsequent incremental or differential backups that contain only changes.
•
Backup only a few files or a certain type of file during a single instance. For example, your Finance department is changing spreadsheets for a quarterly audit and would like to back up those spreadsheets.
Full backup with exclusion list Exclusion lists are supported for full, incremental, and differential file-level backups for all client types. Wildcards are supported for most client types. Note that all incrementals and differentials associated with the full backup must have the same selection lists, and a new full must be run anytime the inclusion list is updated. The following graphic is an example of an exclusion list applied to a full backup. The backup captures only files on the C: drive that are not of the .tmp type because the E: drive and all .tmp files are excluded.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
165
Selective backup inclusion lists Inclusion lists are required for selective backups. Wildcards are supported for most client types. Selective backups are not included in backup groups, so it is not necessary to run a new full when the inclusion list is created or updated. The following graphic is an example of a selective backup and inclusion list. As specified, the backup contains only files on the C: drive of the .mp3 and .txt types.
Using selection lists with full, differential, and incremental backups Apply selection lists to full, differential, and incremental backups to specify which data a client’s backup groups will include (Windows and Linux only) or exclude (all clients). If no inclusion or exclusion is specified, a full backup includes all client files. It is important that your subsequent incremental or differential backups use the same selection lists so that data across all backups in the group is consistent throughout. When creating a schedule, the same lists are applied to all scheduled backups automatically. For recommendations about using selection lists, see "When to use a selection list" on page 162. Windows and Linux clients support inclusion lists for full, differential, and incremental backups. For more information see "Windows selection lists" on page 438 and "Linux selection lists" on page 714.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
166
Using selection lists with the selective backup type With the selective backup type, you can specify which data to include by directory path, file name, and file type. Wildcards are supported for most clients. Wildcards are not supported for Linux, Unix, and CIFS/NFS NAS clients. A selective backup does not belong to a backup group, so the inclusion list does not apply to any subsequent backups unless you schedule periodic selective backups using the same inclusion list. A backup strategy using only the selective backup types is not recommended because it would not capture only incremental changes in the protected data. The selective backup type is best used as a one time backup. For recommendations about when to use the selective backup type, see "When to use a selection list" on page 162.
About executing file-level backups Backups can be run immediately or scheduled to run at specified intervals from either the Computer backup subsystem or the Enterprise backup subsystem. Use the Computer backup subsystem if you are new to Unitrends or wish to execute the backup very quickly with little setup configuration for one client at a time. Use the Enterprise backup subsystem to utilize more advanced features, such as option lists, multi-client selection lists, and calendars, and to quickly add one or more clients to a schedule. For procedures, see "Working with the computer backup subsystem" on page 167 and "Working with the Enterprise backup subsystem" on page 176. Protected clients must be online and network communications between the clients and the backup system must be operational for backups to run.
Default exclusions from file-level backups By default, certain files and directories are excluded from file-level backups of Linux and Windows clients. For details, see the follow topics:
• •
"Default exclusions for file-level backups of Windows servers" on page 439 "Default exclusions from file-level backups of Linux clients" on page 714
Maximum file pathname lengths For some Unitrends agents, there is a maximum file pathname size limitation. File pathnames that exceed this limit are not included in the backup. Agents affected by this restriction and supported maximum file pathname lengths are noted in the following table. Unitrends agent Maximum file pathname length Windows
32 KB
Linux
4 KB
Solaris
1 KB
Mac OS X
1 KB
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
167
Working with the computer backup subsystem Use the Computer backup subsystem to run one-time backups or create backup schedules for one client computer. If you want to specify files to include or exclude, see "About computer selection lists" on page 171 before running the backup or creating a backup schedule. Note:
These procedures are for file-level backups only. To protect an application (such as SQL), a virtual machine, or a NDMP volume, see the applicable chapter in this Administrator’s Guide.
Computer backup procedures:
• • • •
"To run a one-time backup" on page 167 "To create a backup schedule" on page 168 "To view or modify a schedule" on page 170 "To delete a schedule" on page 171
To run a one-time backup Note:
Use this procedure to backup one client. To run an on-demand backup of multiple clients on a schedule, see "To execute an Enterprise backup schedule immediately" on page 196.
1
Select the desired client in the Navigation pane and click Backup.
2
On the 1-Time Backup tab, choose backup type Full, Differential, Incremental, Selective, or Bare Metal. See "Backup types" on page 142 for more information. Note:
3
In the Select Items area, select to backup one of the following:
• • 4
The bare metal backup type is supported only for Windows clients. These are not filelevel backups, but they are included in this procedure because Windows bare metal backups are executed and scheduled using the same interfaces as file-level backups. In Unitrends version 7.4 and later, you can use the integrated bare metal feature with regular file-level backups, rather than running bare metals. See "Windows Bare Metal Protection" on page 753.
All volumes (Protect all volumes) Selected volumes (Specify selected volumes and files)
If you selected to specify volumes and files and would like additional detail, see one of the following:
• •
To exclude files, see "About computer selection lists" on page 171.
•
To specify includes or a combination of includes and excludes for full, differential, and incremental backups of a Windows client, see "Windows selection lists" on page 438.
•
To specify includes or a combination of includes and excludes for full, differential, and incremental backups of a Linux client, see "Linux selection lists" on page 714.
To specify includes for the selective backup type, see "About computer selection lists" on page 171.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
168
5
If desired, check the Verify Backup box to perform an inline verification of the backup. If left unchecked, the backup is not verified.
6
If necessary, check Exclude System State to backup data only and not include OS protection. WARNING! It is highly recommended that you include system state in all file-level backups where client aliases are not being used. Restoring a backup that does not include the system state is likely to result in inconsistencies on the client and cause highly undesirable results. Notes:
•
About client aliases. If you are backing up an aliased client, see "Working with client aliases" on page 198 before deciding whether to include or exclude the system state.
•
About excluding system state without checking this box. If you exclude the system state using a selection list and do not check this box, the backup will run with a warning (yellow) indicating that the system state has not been included. If you check this box, no warning is issued.
•
About Windows clients. The system state is required for backups you wish to use for Windows Instant Recovery (WIR) or integrated bare metal recovery (BMR). For more information, see "System state backup and restore on Windows Server" on page 443.
7
If desired, select a backup device. Backups are written to the default device unless otherwise specified.
8
Click Backup to execute the job. To view the job, see "Monitoring running backup jobs" on page 147.
To create a backup schedule 1
Select the desired client in the Navigation pane and click Backup.
2
Select the Schedule Backup tab.
3
Enter a Schedule Name.
4
Verify that the Schedule enabled box is checked.
5
Enter a Schedule Description.
6
Choose the data to back up by selecting one of the following:
• • 7
Protect all volumes Specify selected volumes and files
If you selected to specify volumes and files and would like additional detail, see one of the following:
• •
To exclude files, see "About computer selection lists" on page 171. To specify includes for the selective backup type, see "About computer selection lists" on page 171.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
169
8
9
•
To specify includes or a combination of includes and excludes for full, differential, and incremental backups of a Windows client, see "Windows selection lists" on page 438.
•
To specify includes or a combination of includes and excludes for full, differential, and incremental backups of a Linux client, see "Linux selection lists" on page 714.
In the Schedule area, select a backup strategy from the list.
•
Choose from Incremental Forever, Full with Incrementals, Full with Differentials, or Custom.
•
For physical Windows clients only, check Perform Bare Metal Backup if desired to include hot bare metal backups in the schedule. In Unitrends version 7.4 and later, you can use the integrated bare metal feature with regular file-level backups, rather than running bare metals. See "Windows Bare Metal Protection" on page 753.
•
Backups for the selected strategy display below.
Do one of the following: For a non-custom strategy, define the frequency at which backups of each type will run using the fields below each backup. For a custom strategy, click the Calendar icon to define the frequency at which backups of each type will run. Do the following for each backup instance:
• •
Drag a backup icon onto the calendar. Drag onto today’s date or later. In the Add Backup window, define the backup type, start date, start time, recurrence, and description (optional), then click Confirm.
10 If desired, check Set Retention Settings and modify the minimum, maximum, and legal hold values.
•
If you have a client selected in the Navigation pane, settings apply to file-level backups run for this client.
•
If you have an application selected in the Navigation pane (such as SQL, Hyper-V, VMware, NDMP, or Exchange) these values apply to all selected VMs, databases, volumes, or instances included in this schedule. To set different values for each selected item, do not enter settings here. Instead, go to Settings > Storage and Retention > Backup Retention. See "About retention control" on page 121 for details.
•
Modifying retention settings here also updates values displayed on the Backup Retention page. Once you modify this setting in the schedule, you cannot change it again from the schedule itself. Instead, make changes from the Backup Retention page as described in "About retention control" on page 121.
•
See "About retention control" on page 121 for more information about these settings.
11 Click Advanced Settings and set additional options as desired. Field
Description
Verify Backup
Check Verify Backup to perform an inline verify of the backup. If left unchecked, the backup is not verified.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
170
Field
Description
Available Device
Select an Available Device to define the device where backups will be stored.
Mail Options tab
Backup Schedule and Failure reports are sent by default. To opt out of email reports, uncheck boxes on the Mail Options tab.
Exclude System State
Check Exclude System State to back up data only and not include OS protection. This option is used to back up data volumes. WARNING: It is highly recommended that you include system state in all file-level backups where client aliases are not being used. Restoring a backup that does not include the system state is likely to result in inconsistencies on the client and cause highly undesirable results. Notes:
•
About client aliases - If you are backing up an aliased client, see "Working with client aliases" on page 198 before deciding whether to include or exclude the system state.
•
About excluding system state without checking this box - If you exclude the system state using a selection list and do not check this box, the backup will run with a warning (yellow) indicating that the system state has not been included. If you check this box, no warning is issued.
•
About Windows clients - The system state is required for backups you wish to use for Windows Instant Recovery (WIR) or integrated bare metal recovery (BMR). For more information, see "System state backup and restore on Windows Server" on page 443.
12 Click Confirm to save the advanced settings you created. 13 Click Save to create the schedule.
To view or modify a schedule Schedules that are running cannot be modified. 1
Select the client protected by the schedule in the Navigation pane and click Backup.
2
Select the Schedule Backup tab.
3
Verify the desired schedule displays in the Schedule Name field. If not, select it.
4
Modify settings as desired. See "To create a backup schedule" on page 168 for details. Note:
If you created the schedule with a custom strategy, click on the Custom Strategy box, then double-click on the backup icon to update it. For example, if your custom strategy includes bare metal, double-click on the BareMetal icon to see a Modify Backup window where you can update the bare metal backup or delete it from the schedule.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
171
5
Click Save.
To delete a schedule 1
Running schedules cannot be deleted.
2
Select the client protected by the schedule in the Navigation pane and click Backup.
3
Select the Schedule Backup tab.
4
Verify the desired schedule displays in the Schedule Name field. If not, select it.
5
Click Delete Schedule, then Yes to confirm.
About computer selection lists Selection lists define items to include or exclude from the backup. Before running a one-time backup or setting up a schedule, you can choose to specify selected volumes and files using include and exclude selection lists. If you create a schedule with selection lists and there are already full backups on the system for its client, you must run new fulls before the schedule runs to ensure data consistency. To specify includes for full, differential, and incremental backups of Windows and Linux clients, see:
• •
"Windows selection lists" on page 438 "Linux selection lists" on page 714
Note:
Selection lists are not used for bare metal backups.
See the following table for a description of selection list types. For examples, see "Using selection lists" on page 162. Selection list type
Description
Include
Defines items to include in a file-level backup. Note the following:
Exclude
•
For the selective backup type - Supported for all clients. Include is required for selective backups.
•
For full, differential, and incremental backup types - Supported for Windows (agent 7.2 or higher) and Linux (agent 8.0 or higher).
Defines items to omit from a full, differential, or incremental backup. Additionally, an exclude list can be applied to define a subset of included files to omit. See "Additional considerations for Linux excludes " on page 714 if applying exclusions to a Linux client.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
172
Computer selection list procedures The following selection list procedures are described in this section: Note:
• • • •
To specify includes for full, differential, and incremental backups of Windows and Linux clients, additional considerations apply. See these topics for details: "Windows selection lists" on page 438 and "Linux selection lists" on page 714.
"To specify includes for the selective backup type" "To specify excludes" on page 172 "To add selection patterns to a Computer selection list" on page 173 "To remove selection patterns from a Computer selection list" on page 174
To specify includes for the selective backup type The include selection is required for selective backups. File-level includes and selection patterns are supported for selective backups. Wildcards are supported for most clients. Wildcards are not supported for Linux, Unix, and CIFS/NFS NAS clients. Note:
1
For more information, see "To add selection patterns to a Computer selection list" on page 173.
Do one of the following:
• •
Complete step 1 on page 167 - step 3 on page 167 in "To run a one-time backup". Complete step 1 on page 168 - step 6 on page 168 in "To create a backup schedule".
2
Click Create/Modify Include List.
3
Click Open Client-Specific File System Selection.
4
Browse through the folders and select the appropriate volumes, folders, or files.
5
Click Add to add your selection to the list. Repeat this process until you complete your include list. (Click on an item in the Selection List and click Remove if you want to remove a selection, or click Remove All if you want to remove all of your selections from the selection list, prior to clicking Confirm.)
6
When finished, click Confirm to save.
7
Do one of the following:
• •
Continue with step 5 on page 168 in "To run a one-time backup". Continue with step 8 on page 169 in "To create a backup schedule".
To specify excludes You can specify the folders and files to exclude from a one-time backup or scheduled backup. Wildcards are supported for most clients. Wildcards are not supported for Linux, Unix, and CIFS/NFS NAS clients. For more information, see "To add selection patterns to a Computer selection list" on page 173.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
173
•
The exclude selection is available for full, differential, and incremental backups for all clients. File-level excludes and selection patterns are supported. Wildcards are supported for most clients. Wildcards are not supported for Linux, Unix, and CIFS/NFS NAS clients.
• •
The exclude selection is not supported for selective backups. Selection lists are not used for bare metal backups.
Notes:
1
•
About Windows clients - To perform integrated bare metal recovery or Windows instant recovery, boot and critical system volumes must be included in the backup. Do not use selection lists unless you are sure these volumes will be included. See "Using selection lists with WIR and integrated BMR" on page 442 for details.
•
About active databases - It is recommended that all active databases be excluded from file-level backups. Only the active database needs to be excluded. All other files on the client can be backed up during the file-level backup. Run application-level backups to protect active databases. (See the "Microsoft Exchange Protection", "Microsoft SQL Protection", "Microsoft SharePoint Protection", and "Oracle Protection" chapters for details).
Do one of the following:
• •
Complete step 1 on page 167 - step 3 on page 167 in "To run a one-time backup". Complete step 1 on page 168-step 6 on page 168 in "To create a backup schedule".
2
Click Create/Modify Exclude List.
3
Enter a selection pattern or browse for files or folders.
4
To browse for files or folders, click Open Client-Specific File System Selection.
5
Browse through the folders and select the appropriate folders or files.
6
Click Add to add a Selection Pattern selected folders/files to the list. Wildcards are supported for most clients. Wildcards are not supported for Linux, Unix, and CIFS/NFS NAS clients.
7
Repeat this process until you complete your exclude list. (Click on an item in the Selection List and click Remove if you want to remove a selection, or click Remove All if you want to remove all of your selections from the selection list, prior to clicking Confirm.)
8
When finished, click Confirm to save.
9
Do one of the following:
• •
Continue with step 5 on page 168 in "To run a one-time backup". Continue with step 8 on page 169 in "To create a backup schedule".
To add selection patterns to a Computer selection list 1
Click on the client to view the desired selection list. For details, see:
• •
"To specify includes for the selective backup type" on page 172 "To specify excludes" on page 172
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
174
2
Enter the desired Selection Pattern and click Save to move it to the Selection List box.
•
For include selection lists, only files matching the defined pattern are included in the backup. Patterns can be used for the selective backup type only. See "Using wildcards in Computer selection lists" on page 174 for details. Note:
3
Selection patterns are not supported for include lists applied to full, differential, and incremental backups of Windows and Linux clients.
•
For exclude selection lists, files matching the defined pattern are excluded from the backup.
•
For excludes, wildcard symbols may be used in the selection pattern for most clients. (Wildcards are not supported for Linux, Unix, and CIFS/NFS NAS clients.) The * can be used to designate a group of unknown characters and the ? can be used for a single character substitution. For example, to add all .pst files to the list, type *.pst in the Selection Pattern box and click Add. See "Using wildcards in Computer selection lists" on page 174 for details.
Click Save.
To remove selection patterns from a Computer selection list 1
View the desired selection list. For details, see:
• • 2
"To specify includes for the selective backup type" on page 172 "To specify excludes" on page 172
Select the desired pattern in the Selection List box and click Remove. To remove all patterns, click Remove All.
3
Click Save.
Using wildcards in Computer selection lists Wildcards can be used in selection patterns to include or exclude files from certain backup types. See "To specify includes for the selective backup type" on page 172 and "To specify excludes" on page 172 for details. Wildcards are not supported for Linux, Unix, and CIFS/NFS NAS clients. The following table provides a reference of supported wildcard combinations and identifies the limitations associated with using wildcards in file names, paths, and other referenced items.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
175
Wild card
Inclusion list (for the selective backup type only)
Exclusion list (for any file-level backup type)
*
An example of how to include all files within specified path that match zero or more characters in the inclusion pattern
An example of how to exclude all files with zero or more characters that match exclusion pattern
C:/PCBP/Lists.dir/*.spr C:/PCBP/Lists.dir/profile*.spr
*.txt
Include all directories within specified path that match zero or more characters within the inclusion pattern.
An example of how to exclude directories with zero or more characters and their contents within a specified path that match the exclusion pattern.
C:/ProgramFiles/MSsqlserver/mssq* C:/windows/sys* Limitations:
Limitations:
*.txt should not be used to back up all txt files on the system. The full path must be provided.
*folder_abc should not be used to exclude all folders that match folder_abc on the system. The full path must be provided.
C:\*\*\abc.txt *
Multiple wildcard matches like the one shown above are not supported. Wildcards are not supported on Linux/Unix systems. Wildcards are not supported for CIFS/NFS NAS clients.
If an entire directory is excluded, the directory name will still appear in the backup; however, its contents will be empty. Multiple wildcard matches like the one shown below are not supported. C:\*\*\abc.txt
Wildcards are not supported for full, differential and incremental backup types for most client types.
Wildcards are not supported on Linux/Unix systems. Wildcards are not supported for CIFS/NFS NAS clients.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
176
Wild card
Inclusion list (for the selective backup type only)
Exclusion list (for any file-level backup type)
?
An example of how to include all files within specified path that match a single character within the inclusion pattern.
An example of how to exclude all files within specified path that matches a single character within exclusion pattern.
C:/Windows/Web/Wallpaper/a?.jpg
C:/PCBP/Lists.dir/pro_client?.spr
Limitations:
An example of how to exclude all directories and their contents within specified path that matches a single character within exclusion pattern.
When using the “?” wildcard for inclusions at the end of the file name, files that end with “.” will not be included.
C:/Programfiles/Case?/
For example, the file a..jpg will not be backed up.
Limitations:
An example of how to include all directories and their contents within specified path that matches a single character within the inclusion pattern.
If an entire directory is excluded, the directory name itself will still appear in the backup, however its contents will be empty.
C:/Programfiles/Case?/ *,?
An example of Inclusion lists that have multiple “?” wildcards and only one * wildcard C:/Log/??L*.logs
An example of Exclusion lists that have multiple “?” wildcards and only one * wildcard C:/?Log?/*.logs
Limitation: Directory and file level wildcard usage within an inclusion pattern are not supported. For example C:/Log*/*.log will not receive any data for backup.
Limitation: If an entire directory is excluded, the directory name itself will still appear in the backup, however its contents will be empty.
Working with the Enterprise backup subsystem Use the Enterprise backup subsystem to run one-time backups or create backup schedules for one or more client computers. The Enterprise backup subsystem supports additional backup options that are not available in the Computer backup subsystem. These procedures are for file-level backups only. To protect applications (such as SQL), virtual machines, or NDMP volumes, see the applicable chapter in this Administrator’s Guide. Notes:
•
Executing multiple backups concurrently results in greater aggregate transfer speeds than running the same backups one after another. For smaller backups, configure multiple client backups in the same schedule. The number of jobs that can run simultaneously is determined by the Max Concurrent Backups setting in Settings > Storage and Retention > Backup Devices. The default setting varies depending on
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
177
the appliance model. As you monitor system resource utilization, adjust this setting as needed. See "About the Windows NTFS change journal" on page 135.
•
If you create a schedule with new selection lists and there are already full backups on the system for its clients, you must run new fulls before the schedule runs to ensure data consistency. See "Backup groups and selection lists" on page 181.
Enterprise backup elements Enterprise backups are run using the following elements: Backup Elements
Description
Calendars
Calendars form the basis for backup schedules by defining backup strategies. Use this feature to create new calendars or to modify, delete, or copy existing ones. See "About calendars" on page 177.
Selection lists
Selection lists define the items to include or exclude from the backup. Default selection lists are provided. You can also create custom selection lists. See "About Enterprise selection lists" on page 181.
Options
With options, you can specify additional information, such as the type of verify to use and the target disk device, as well as run pre- and/or post-backup commands. Default options are provided. You can also create custom options. "About backup options" on page 187.
To set up calendars, selection lists, and options as necessary before executing or scheduling backups, refer to the following topics.
• • •
"About calendars" on page 177 "About Enterprise selection lists" on page 181 "About backup options" on page 187
About calendars Use calendars to select backup types and the frequency with which they run. You then associate the calendar with a schedule, where you choose the clients to protect. In this way, multiple clients can be protected on the same calendar and schedule. For easier administration, it is recommended that you create as few calendars as possible. Note:
After creating a calendar, a backup does not run until you associate the calendar with a schedule.
When creating calendars, consider the client operating systems you would like to protect and the backup strategy required for each client in your environment. If you have both Windows and Linux clients, for example, you may want to create one Windows calendar and one Linux calendar.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
178
A number of default calendars are provided. These calendars cannot be edited but can be copied and used as the basis for creating customized calendars. The gray lock icon on the Calendars page indicates that a calendar is read-only.
Calendar procedures The following calendar procedures are described in the remainder of this section:
• • • • • • •
"To create a calendar" on page 178 "To define the frequency of incremental backups" on page 179 "To create an hourly calendar" on page 179 "To view or modify a calendar" on page 180 "To delete a calendar" on page 180 "To copy a calendar" on page 180 "To see all schedules referencing a given calendar" on page 181
To create a calendar Note:
1
You should run new fulls after you create a schedule with new selection lists if there are already fulls on the system for clients on this schedule. See "Backup groups and selection lists" on page 181.
Select the backup system from the Navigation pane and click Backup. Note:
The blue system icon displays to the left of each backup system in the Navigation pane.
2
Select the Calendars tab.
3
Click New.
4
Enter a Calendar Name and Calendar Description.
5
Select an Operating System Family. For example, if the calendar will be used with Windows systems only, select Windows in the list.
6
7
Add backups by doing either of the following:
•
Click Show Strategy List, select the desired strategy, and click Apply. Instances of each backup type in the strategy display on the calendar.
•
Drag a backup icon onto the calendar. Drag onto today’s date or later.
In the Add Backup or Modify Backup window, define the backup type, start date, start time, recurrence, and description (optional), then click Confirm.
•
If you applied a backup strategy, open the Modify Backup window by double-clicking an instance on the calendar. Repeat for each backup type.
•
If you dragged an instance onto the calendar, the Add Backup window launches automatically. Repeat the process for each desired backup type.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
179
• 8
For additional information on scheduling incrementals, see "To define the frequency of incremental backups" on page 179.
Click Save to create the calendar.
To define the frequency of incremental backups 1
This procedure provides additional information regarding incremental calendars.
2
Create a calendar and drag the Incremental icon to the desired day. See "To create a calendar" on page 178 for details. The Add Backup window launches.
3
Select the Start Time for the backup to begin. Note:
4
Select the type of Recurrence interval (e.g., Hourly, Daily, Weekly, etc.).
• •
For hourly recurrence, select each of the desired hourly intervals. To run more frequently than per hour, check the Intra-Hourly Frequency box and enter the number of minutes between each incremental backup.
Note:
5
The up and down arrows will change only one part of the Start Time at a time (i.e., hour, minutes, AM/PM). Click on the appropriate part(s) of the time and enter the start time, or use the up and down arrows to set the start time.
Intra-hourly scheduling is only enabled when you select hourly frequency. Up to four quarter-hour (15-minute) increments may be scheduled per hour, but only if the start time for the schedule begins at the top of the hour. In other words, if the start time for an intra-hourly schedule is set to begin at 10 minutes past the hour, only three 15minute increments will be backed up in any given hour.
Click Confirm. Each instance of the incremental backup displays on the calendar.
6
Click Save to save changes to the calendar.
To create an hourly calendar Use this procedure to create a calendar running multiple backups during a single day (for example, differential backups every two hours). 1
Select the backup system in the Navigation pane and click Backup. Note:
The blue system icon displays to the left of each backup system in the Navigation pane.
2
Select the Calendars tab.
3
Click New.
4
Enter a Calendar Name and Calendar Description.
5
Select an Operating System Family. For example, if the calendar will be used with Windows systems only, select Windows in the list.
6
Select a day on the calendar to display an hourly view.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
180
7
Drag and drop backup types onto the hours when they should execute. Backup types may be the same or a variety of types.
8
Click Save to create the calendar.
To view or modify a calendar Note:
1
Read-only calendars cannot be modified. Create a copy of the calendar before modifying. See "To copy a calendar" on page 180.
Select the backup system in the Navigation pane and click Backup. Note:
2
The blue system icon displays to the left of each backup system in the Navigation pane.
Select the Calendars tab. Note:
If you see the screen that allows you to create a calendar instead of the calendar list, click Cancel and the calendar list displays.
3
Select a calendar in the list and click View/Modify.
4
Edit settings as desired and click Save. For details, see "To create a calendar" on page 178.
To delete a calendar Note: 1
Read-only calendars cannot be deleted.
Select the backup system in the Navigation pane and click Backup. Note: The blue system icon displays to the left of each backup system in the Navigation pane.
2
Select the Calendars tab. Note:
3
Select a calendar in the list and click Delete. Note:
4
If you see the screen that allows you to create a calendar instead of the calendar list, click Cancel and the calendar list displays.
If a message displays indicating that this calendar is being used by one or more schedules, you must first remove the calendar from all schedules before deleting. For details, see "To see all schedules referencing a given calendar" on page 181.
Click Yes to confirm that you want to delete the calendar.
To copy a calendar To use an existing calendar as a template: 1
Select the backup system in the Navigation pane and click Backup. NOTE: The blue system icon displays to the left of each backup system in the Navigation pane.
2
Select the Calendars tab.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
181
Note:
3
If you see the screen that allows you to create a calendar instead of the calendar list, click Cancel and the calendar list displays.
Select a calendar in the list and click Copy. A new calendar called Copy of displays in the list.
4
Select the copy in the list and click View/Modify.
5
Modify the calendar name and other settings as desired. For more information, see "To create a calendar" on page 178.
6
Click Save.
7
Select Rename to save the calendar with the new name.
To see all schedules referencing a given calendar 1
Select the backup system in the Navigation pane and click Backup. The blue system icon displays to the left of each backup system in the Navigation pane.
2
Select the Calendars tab. Note:
If you see the screen that allows you to create a calendar instead of the calendar list, click Cancel and the calendar list displays.
3
Select the calendar in the list and click View/Modify.
4
Click the clock icon to the right of the Calendar Name. A list of all schedules referencing this calendar displays.
About Enterprise selection lists Selection lists define items to include or exclude from the backup. Before running a backup or setting up a schedule, create or edit selection lists for the protected clients. An Enterprise selection list can be created for an individual client or can be applied to a group of clients. For example, an exclude selection list can be created and applied to all Windows clients. The list of files to exclude from the backup (such as .pst or .tmp files) is identified in the exclusion list. IMPORTANT! For Windows Clients - To perform integrated bare metal recovery or Windows instant recovery, boot and critical system volumes must be included in the backup. Do not use selection lists unless you are sure these volumes will be included. See "Using selection lists with WIR and integrated BMR" on page 442 for details.
Backup groups and selection lists If you create a schedule with new selection lists and there are already full backups on the system for its clients, you must run new fulls before the schedule runs to ensure data consistency.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
182
Exclude active databases from file-level backups It is recommended that all active databases be excluded from file-level backups. Run applicationlevel backups to protect active databases. (See the "Microsoft Exchange Protection", "Microsoft SQL Protection", "Microsoft SharePoint Protection", and "Oracle Protection" chapters for details). Only the active database needs to be excluded. All other files on the client can be backed up during the file-level backup.
Selective backups and include lists Inclusion lists are not supported for full, differential, and incremental backups of most client types. However, selective backups must have an associated include selection list. See the following table for a description of selection list types. For examples, see "Using selection lists" on page 162. Selection list type
Description
Include
Defines items to include in a file-level backup. Note the following:
Exclude
•
For the selective backup type - Supported for all clients. Include is required for selective backups.
•
For full, differential, and incremental backup types - Supported for Windows clients (agent 7.2 or higher) and Linux clients (agent 8.0 or higher).
Defines items to omit from a full, differential, or incremental backup. For selective backups, an include list must be defined. Additionally, an exclude list can be applied to define a subset of included files to omit. See "Exclusion lists for Linux clients" on page 714 if applying exclusions to a Linux client.
Any
Only available on the Enterprise > Backup > Schedule Backup tab. Used to include specified files when applied to the Inclusions column, or to exclude specified files when applied to the Exclusions column.
Enterprise selection list procedures The following selection list procedures are described in the remainder of this section:
• • • • • •
"To create a selection list" on page 183 "To view or modify a selection list" on page 184 "To delete a selection list" on page 184 "To see all schedules referencing a selection list" on page 185 "To add selection patterns to an Enterprise selection list" on page 185 "To remove selection patterns from an Enterprise selection list"
See these related procedures to apply selection lists:
•
"To apply a selection list or option to one client" on page 194
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
183
• •
"To apply a selection list or option to multiple clients" on page 195 "To apply a split selection list or option" on page 195
For more information about selection lists, specifying includes, and using combinations of includes and excludes for Windows clients, see "Windows selection lists" on page 438. For more information about selection lists, specifying includes, and using combinations of includes and excludes for Linux clients, see "Linux selection lists" on page 714.
To create a selection list 1
Select the backup system in the Navigation pane and click Backup.
2
Click the Selection Lists tab.
3
Click New.
4
Provide the following required information:
5
•
Selection List Name – Enter a unique name for the list. This is a required field.
•
Selection List Description – Provide a description for the selection list. This is a required field.
•
Select an Operating System Family to denote the client OS family to which this selection list can be associated. Options include Any, Windows, Linux, UNIX, NetWare, OES, iSeries, DOS, OS/2, or Other.
•
Assign a Selection List Type – Choose Include to include specified files, Exclude to omit specified files, or Any to be used as either an inclusion or an exclusion list.
Check optional boxes as desired: Field
Description
Temporary Files
To exclude all temporary files.
Read Mounts
To exclude all read-only mounted file systems on UNIX clients, including mounted CD-ROM drives. This option is highly recommended. If not checked, backup speed may be slower as a result of reading the contents of a mounted CD-ROM.
Net Mounts
To exclude all NFS mounted file systems on UNIX clients. It also excludes NFS file systems that are mounted while the backup is in progress.
All Mounts
To exclude all file systems other than root (/) on UNIX clients.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
184
Field
Description
Exclude System State
To back up data only and not include OS protection. This option is used to back up data volumes. WARNING! It is highly recommended that you include system state in all file-level backups where client aliases are not being used. Restoring a backup that does not include the system state is likely to result in inconsistencies on the client and cause highly undesirable results. Notes:
•
If you exclude the system state using a selection list and do not check this box, the backup will run with a warning (yellow) indicating that the system state has not been included. If you check this box, no warning is issued.
•
If you are backing up an aliased client, see "Working with client aliases" on page 198 before deciding whether to include or exclude the system state.
•
For Windows clients - The system state is required for backups you wish to use for Windows Instant Recovery (WIR) or integrated bare metal recovery (BMR). For more information, see "System state backup and restore on Windows Server" on page 443.
6
Add Selection Patterns as desired to specify the files to include or exclude. See "To add selection patterns to an Enterprise selection list" on page 185 for details.
7
Click Save.
To view or modify a selection list 1
Select the backup system in the Navigation pane and click Backup.
2
Click the Selection Lists tab to view the selection list. Note:
If you see the screen that allows you to create a selection instead of the selection list, click Cancel and the selection list displays.
3
Select the desired list and click View/Modify.
4
Modify information as desired and click Save. See "To create a selection list" on page 183 for details.
To delete a selection list 1
Select the backup system in the Navigation pane and click Backup.
2
Click the Selection Lists tab. Note:
If you see the screen that allows you to create a selection instead of the selection list, click Cancel and the selection list displays.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
185
3
Select the desired list and click Delete. Note:
4
If a message displays indicating that this list is being used by one or more schedules, you must first remove the list from all schedules before deleting. Click the clock icon to see the schedules referencing this list.
Click Yes to confirm the deletion.
To see all schedules referencing a selection list 1
Select the backup system in the Navigation pane and click Backup.
2
Click the Selection Lists tab. Note:
If you see the screen that allows you to create a selection instead of the selection list, click Cancel and the selection list displays.
3
Select the desired list and click View/Modify.
4
Click the clock icon to the right of the Selection List Name. A list of all schedules referencing this selection list displays.
To add selection patterns to an Enterprise selection list Note:
Selection patterns are not supported for includes that are applied to Windows or Linux full, differential, and incremental backups.
1
View the desired selection list. For details, see "To view or modify a selection list" on page 184.
2
Enter the desired Selection Pattern and click Add to move it to the Selection List box.
3
•
For include selection lists, files matching the defined pattern are the only ones included in the backup. Patterns can be used for the selective backup type only. See "Using wildcards in Enterprise selection lists" on page 186 for details.
•
For exclude selection lists, files matching the defined pattern are excluded from the backup.
•
For excludes, wildcard symbols may be used in the selection pattern for most clients. (Wildcards are not supported for Linux, Unix, and CIFS/NFS NAS clients.) The * can be used to designate a group of unknown characters and the ? can be used for a single character substitution. For example, to add all .pst files to the list, type *.pst in the Selection Pattern box and click Add. See "Using wildcards in Enterprise selection lists" on page 186 for details.
Click Save.
To remove selection patterns from an Enterprise selection list 1
View the desired selection list. For details, see "To view or modify a selection list" on page 184.
2
Select the desired pattern in the Selection List box click Remove. To remove all patterns, click Remove All.
3
Click Save.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
186
Using wildcards in Enterprise selection lists Wildcards can be used in selection patterns to include or exclude files from certain backup types. See "To create a selection list" on page 183 for details. Wildcards are not supported for Linux, Unix, and CIFS/NFS NAS clients. The following table provides a reference of supported wildcard combinations and identifies the limitations associated with using wildcards in file names, paths, and other referenced items. Wild card
Inclusion list (for the selective backup type only)
Exclusion list (for any file-level backup type)
*
An example of how to include all files within specified path that match zero or more characters in the inclusion pattern
An example of how to exclude all files with zero or more characters that match exclusion pattern
C:/PCBP/Lists.dir/*.spr C:/PCBP/Lists.dir/profile*.spr
*.txt
Include all directories within specified path that match zero or more characters within the inclusion pattern.
An example of how to exclude directories with zero or more characters and their contents within a specified path that match the exclusion pattern.
C:/ProgramFiles/MSsqlserver/mssq* C:/windows/sys*
*
Limitations:
Limitations:
*.txt should not be used to back up all txt files on the system. The full path must be provided.
*folder_abc should not be used to exclude all folders that match folder_abc on the system. The full path must be provided.
C:\*\*\abc.txt
If an entire directory is excluded, the directory name will still appear in the backup; however, its contents will be empty.
Multiple wildcard matches like the one shown above are not supported. Wildcards are not supported on Linux/Unix systems. Wildcards are not supported for CIFS/NFS NAS clients. Wildcards are not supported for other file-level backup types (full, incremental, differential).
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
Multiple wildcard matches like the one shown below are not supported. C:\*\*\abc.txt Wildcards are not supported on Linux, Unix, or CIFS/NFS NAS clients.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
187
Wild card
Inclusion list (for the selective backup type only)
Exclusion list (for any file-level backup type)
?
An example of how to include all files within specified path that match a single character within the inclusion pattern.
An example of how to exclude all files within specified path that matches a single character within exclusion pattern.
C:/Windows/Web/Wallpaper/a?.jpg
C:/PCBP/Lists.dir/pro_client?.spr
Limitations:
An example of how to exclude all directories and their contents within specified path that matches a single character within exclusion pattern.
When using the “?” wildcard for inclusions at the end of the file name, files that end with “.” will not be included.
C:/Programfiles/Case?/
For example, the file a..jpg will not be backed up.
Limitations:
An example of how to include all directories and their contents within specified path that matches a single character within the inclusion pattern.
If an entire directory is excluded, the directory name itself will still appear in the backup; however its contents will be empty.
C:/Programfiles/Case?/ *,?
An example of Inclusion lists that have multiple “?” wildcards and only one * wildcard C:/Log/??L*.logs
An example of Exclusion lists that have multiple “?” wildcards and only one * wildcard C:/?Log?/*.logs
Limitation: Directory and file level wildcard usage within an inclusion pattern are not supported. For example C:/Log*/*.log will not receive any data for backup.
Limitation: If an entire directory is excluded, the directory name itself will still appear in the backup; however its contents will be empty.
About backup options Options are not required, but can be used to configure additional backup settings. For example, you can use options to select the disk device and verify level used for a backup, or to run pre- or postbackup commands. Before running a backup or creating a schedule, set up the options needed for the clients you wish to protect. If no options are applied, backups are written to the default D2DBackups device, and an associated file-level verify is run for each backup job.
Backup option procedures The following backup option procedures are described in the remainder of this section:
• • •
"To create a backup option" on page 188 "To view or modify a backup option" on page 188 "To delete a backup option" on page 188
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
188
• • •
"To copy a backup option" on page 189 "To see all schedules referencing an option" on page 189 "Backup options New and View/Modify buttons" on page 189
To create a backup option 1
Select the backup system in the Navigation pane and click Backup. The blue system icon displays to the left of each backup system in the Navigation pane.
2
Click the Options tab. A list of existing options displays.
3
Click New at the bottom of the page.
4
Enter an Options Name and an Options Description.
5
Select an Operating System Family from the list. For example, if the options will be used with Windows systems only, select Windows in the list. Most options lists can be applied to any OS family. If you are using different disk devices or verify levels for specific operating systems, select the appropriate OS family.
6
From the Available Devices, choose a disk device to define the target device where backups will be written.
7
The remaining fields are optional. See "Backup options New and View/Modify buttons" on page 189 for details.
8
Click Save to create the backup option.
To view or modify a backup option 1
Select the backup system in the Navigation pane and click Backup. The blue system icon displays to the left of each backup system in the Navigation pane.
2
Click the Options tab. Note:
If you see the screen that allows you to create an option instead of the option list, click Cancel and the option list displays.
3
Select the option in the list and click View/Modify at the bottom of the page. See "Backup options New and View/Modify buttons" on page 189 for details.
4
Modify settings as desired and click Save. For a description of the settings, see "To create a backup option" on page 188.
To delete a backup option The blue system icon displays to the left of each backup system in the Navigation pane. Note:
Read-only options cannot be deleted.
1
Select the backup system in the Navigation pane and click Backup.
2
Select the Options tab.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
189
Note:
3
Select an option in the list and click Delete. Note:
4
If you see the screen that allows you to create an option instead of the option list, click Cancel and the option list displays.
If you see a message indicating that this option is being used by one or more schedules, you must first remove the option from all schedules before deleting. Click the clock icon to see which schedules reference this option.
Click Yes to confirm that you want to delete the option.
To copy a backup option Copy a backup option to use an existing option as a template. 1
Select the backup system in the Navigation pane and click Backup. The blue system icon displays to the left of each backup system in the Navigation pane.
2
Select the Options tab. See "Backup options New and View/Modify buttons" on page 189 for details. Note:
3
If you see the screen that allows you to create an option instead of the option list, click Cancel and the option list displays.
Select an option in the list and click Copy. A new option called Copy of displays in the list.
4
Select the copy in the list and click View/Modify.
5
Modify the option name and other settings as desired. For more information, see "To create a backup option" on page 188.
6
Click Save.
7
Select Rename to save the option with the new name.
To see all schedules referencing an option 1
Select the backup system in the Navigation pane and click Backup. The blue system icon displays to the left of each backup system in the Navigation pane.
2
Select the Options tab. See "Backup options New and View/Modify buttons" on page 189 for details. Note:
If you see the screen that allows you to create an option instead of the option list, click Cancel and the option list displays.
3
Select an option in the list and click View/Modify.
4
Click the clock icon to the right of the Options Name. A list of all schedules referencing this option displays.
Backup options New and View/Modify buttons The following fields display when the New or View/Modify buttons are clicked on the Backup
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
190
Options tab. Item
Description
Options Name
Enter a unique name for the option.
Clock icon [Show all scheduled references]
Click the clock icon to see the schedule references on the Schedules References window.
Options Description
Enter a description of the option.
Operating System Family
Operating system to which this option can be applied. If you will be using the option for multiple OS families, select Any. The system only allows the option to be applied to clients belonging to the OS family you select here. For example, if the options will be used with Windows systems only, select Windows in the list. Most options lists can be applied to any OS family. If you are using different disk devices or verify levels for specific operating systems, select the appropriate OS family.
Various Options Directory Depth
A value greater than zero will not back up files below n directories deep. (Zero, full depth, is the default.)
Read Locking Level
Select this toggle button to specify how read locking is performed on files prior to backing them up. Before a file is backed up, the backup attempts to get a read lock on the file, which allows the file to be read without any other process accessing the file. There are three read-locking states:
• •
None - No read locking.
•
Wait Forever - Wait Forever (enforced) read locking stops the backup until the lock can be set. This could potentially take forever.
Do Not Wait - Do Not Wait (not forced) read locking attempts to lock the file, but if the lock cannot be gained, continues to back up the file without the lock.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
191
Item
Description
Verify Level
Select one of the following:
• •
None – Do not verify the files in the backup.
•
Bit Level – Files exist and contents match. Compare, bit by bit, the contents of the files received by the backup system with the source files on the client. The verify runs once the backup completes, as a dependent task. A bit-level verify often fails when backing up C:\windows due to some Microsoft processes failing to update modification dates on logs and other files in this folder.
•
Inline – Run a file-level verify during the backup by creating and comparing rolling check sums on the client and backup system.
File Level – Files exist. Verify that the list of files sent by the client matches the list received by the backup system. The verify runs once the backup completes, as a dependent task.
Create Catalog Entry? [checkbox]
Check to create a catalog of files backed up and places it on the client. If space is limited on the client, this option can be unchecked.
Speed Option? [checkbox]
Check to enable the backup double-buffering scheme to increase the speed of the backup. This uses more backup system resources and might affect performance of other running processes.
Available Devices
Click the disk device to define the target device where backups are written.
Backup Description
Enter a description of the backups to which this option will be assigned.
PreBackup Commands
Use this field to specify commands or scripts to run before the backup (any system command or user script). For example, enter the command to shut down the database before a backup. The output from the command is directed to the backup summary.
Note: For Linux clients, running long pre-backup commands can cause backups to fail. To prevent this, adjust the timeouts in the client’s full .ini file as described in KB 3107. To specify a pre-backup command, enter the full path to the command in the PreBackup Commands field. For example, C:\Data\script.bat or /usr/jsmith/script.sh.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
192
Item
Description
Execute PreBackup Command on System [checkbox]
To run the pre-backup command from the Unitrends system, enter its full path and check the Execute Pre-Backup Command on System box. To run a command from the client, leave this box unchecked.
PostBackup Commands
Use this field to specify commands or scripts to run after the backup (any system command or user script). For example, enter the command to restart a database after a backup completes. The output from the command is directed to the backup summary.
Note: For Linux clients, running long post-backup commands can cause backups to fail. To prevent this, adjust the timeouts in the client’s full.ini file as described in KB 3107. To specify a post- backup command, enter the full path to the command in the Post-Backup Commands field. For example, C:\Data\script.bat or /usr/jsmith/script.sh. Execute PostBackup Commands on System [checkbox]
To run the command from the Unitrends system, enter its full path and check the Execute Post-Backup Command on System box. To run a command from the client, leave this box unchecked.
Save
Click to save your entries.
Cancel
Click to exit the Options tab without saving changes.
About Enterprise backup schedules Backup schedules can be thought of as groups of clients that are backed up in a pre-determined manner at a scheduled time. An Enterprise backup schedule ties a calendar to the clients you wish to protect. You then apply selection lists and options to clients in the schedule for more granular control. Before creating a schedule, set up any required selection lists and options. Scheduled backups form the foundation for continuous data protection. Once created, you can run the schedule on-demand (using the Run Now option within the Schedules tab), but this is not the recommended approach for ensuring thorough and consistent protection. Run backups on-demand when needed, but use schedules for regular backup operations.
About scheduling bare metal backups Note:
On Unitrends 7.4 and later systems, critical data used for Unitrends DR is included in regular file-level backups. You can perform integrated bare metal recovery without running bare metal backups. See "Windows Bare Metal Protection" on page 753 for details.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
193
Hot bare metal backups can be scheduled for Windows systems in the same manner as file-level backups. Selection lists are not supported. Backup options can be applied to designate the disk device, specify whether a catalog list is created, and to run pre- and post-backup commands. Other options do not apply. Hot bare metal backups should not be performed until the boot media has been created and tested successfully on each server where bare metal backups will be performed. See the "Windows Bare Metal Protection" chapter for details.
Enterprise backup procedures The following Enterprise backup procedures are described in the remainder of this section:
• • • •
"To create an Enterprise backup schedule" on page 193
• • • • • •
"To execute an Enterprise backup schedule immediately" on page 196
"To apply a selection list or option to one client" on page 194 "To apply a selection list or option to multiple clients" on page 195 "To apply a split selection list or option" on page 195
"To view or modify an Enterprise backup schedule" on page 196 "To view all schedules by month or day" on page 197 "To copy an Enterprise backup schedule" on page 197 "To enable or disable an Enterprise backup schedule" on page 197 "To delete an Enterprise backup schedule" on page 197
To create an Enterprise backup schedule 1
Select the backup system or navigation group in the Navigation pane and click Backup. The list of available clients is determined by what you select in this step:
• •
Select a navigation group to display only its clients. Select the backup system to display all clients that can be protected with file-level backups. The blue system icon displays to the left of each backup system in the Navigation pane.
2
Click the Schedule Backup tab.
3
Enter a unique Schedule Name and a Schedule Description.
4
Select a Calendar from the list. To view only the calendars for a given OS, click Filter by OS Family in the upper-right and select an operating system from the list.
5
Check boxes to select the clients you wish to protect.
• • • 6
You must select at least one client. To select all clients, check the gray box above the first client check-box. The backup system is listed as a client. Do not select it for backup.
Click Show Per-Client Selection and Option Lists in the bottom left of the screen.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
194
7
•
The Selection Lists area shows available include and exclude lists. To see only the lists for a given OS, click Filter by OS Family above and choose an OS.
•
The Option Lists area shows available backup options. To see only the options for a given OS, click Filter by OS Family above and choose an OS.
•
Hover over a list icon to see associated details, such as OS and list type.
Apply selection lists and option lists to clients as desired. For details, see the "To apply a selection list or option to one client" on page 194, "To apply a selection list or option to multiple clients" on page 195, and "To apply a split selection list or option" on page 195. Notes:
8
9
•
For selective backups, an include list is required. For hot bare metal, selection lists are not supported. For full, differential, and incremental backups, inclusion lists are supported for Windows (version 7.2 or higher) and Linux (version 8.0 or higher) clients, and exclusion lists may be used, but are optional. For details, see "About Enterprise selection lists" on page 181 and "About backup options" on page 187.
•
For Windows clients - To perform Windows instant recovery or integrated bare metal recovery, the boot disk and any critical system disks must be included in the backup. See "Using selection lists with WIR and integrated BMR" on page 442 for details.
Click Show Advanced Execution Options below the client grid and check the desired boxes.
•
Include All New Clients In This Schedule By Default to automatically add new clients to this schedule.
•
E-Mail Schedule Report to receive a summary showing backup results and performance for each client in the schedule. The report is mailed to the address or addresses specified in the Schedule Summary field on the Email Recipients Configuration page. You also have the option to receive a PDF attachment of the report to the email. See "About configuring notifications" on page 62 for details.
•
E-Mail Failure Report to receive a summary of all backup failures that occurred in the last hour. The report is mailed to the address or addresses specified in the Failure Reports field on the Email Recipients Configuration page. You also have the option to receive a PDF attachment of the report to the email. See "About configuring notifications" on page 62 for details.
Click Schedule to create the schedule and launch backups in accordance with the associated calendar.
To apply a selection list or option to one client IMPORTANT! For Windows clients, to perform integrated bare metal recovery or Windows instant recovery, boot and critical system volumes must be included in the backup. Do not use selection lists unless you are sure these volumes will be included. See "Using selection lists with WIR and integrated BMR" on page 442 for details.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
195
1
View the desired schedule. See "To view or modify an Enterprise backup schedule" on page 196 for details.
2
Click Show Per-Client Selection and Option Lists in the bottom left corner.
3
Click a selection list or option icon, drag it to the Inclusions, Exclusions, or Options field of the desired client, and release. The Default setting is replaced by the list. If nothing happens when you release the icon, verify the following:
4
•
You are hovering over the correct list type column. For example, an include cannot be applied to the Exclude column.
•
The list or option is defined for the OS of the client. For example, a Windows selection list cannot be applied to a Linux client.
•
The list or option supports a backup type on the calendar. For example, an exclude cannot be applied to a schedule whose calendar contains only selective backups.
Click Save.
To apply a selection list or option to multiple clients IMPORTANT! For Windows clients, to perform integrated bare metal recovery or Windows instant recovery, boot and critical system volumes must be included in the backup. Do not use selection lists unless you are sure these volumes will be included. See "Using selection lists with WIR and integrated BMR" on page 442 for details. 1
View the desired schedule. See "To view or modify an Enterprise backup schedule" on page 196 for details.
2
Click Show Per-Client Selection and Option Lists below the client grid.
3
Click a selection list or option icon, drag it to the Inclusions, Exclusions, or Options label at the top of the column, and release. The list is applied to all selected clients whose OS matches that of the list. If nothing happens when you release the icon, verify the following:
•
You are hovering over the correct list type column. For example, an include cannot be applied to the Exclude column.
•
The list or option is defined for the OS of the client. For example, a Windows selection list cannot be applied to a Linux client.
•
The list or option supports a backup type on the calendar. For example, an exclude cannot be applied to a schedule whose calendar contains only selective backups.
4
Click Save.
5
To apply a list to all selected clients, drag the list icon to the Inclusions, Exclusions, or Options label at the top of the column and release. The list is applied to all selected clients whose OS matches that of the list.
To apply a split selection list or option IMPORTANT! For Windows clients, to perform integrated bare metal recovery or Windows
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
196
instant recovery, boot and critical system volumes must be included in the backup. Do not use selection lists unless you are sure these volumes will be included. See "Using selection lists with WIR and integrated BMR" on page 442 for details. Use this procedure to apply different selection lists or options to each backup type defined in the schedule's calendar. For example, when creating a schedule that includes multiple backup types, such as a full and an incremental, use the split to apply one exclude list to the full and another to the incremental. 1
View the desired schedule. See "To view or modify an Enterprise backup schedule" on page 196 for details.
2
Click Show Per-Client Selection and Option Lists below the client grid.
3
Click the Split selection list or option icon, drag it to the desired Inclusions, Exclusions, or Options field or column, and release. The Create Split window launches.
4
Drag a selection or option lists icon to a backup type and release to apply. The list displays on the backup. Repeat to modify each backup type as desired.
5
Click Save.
6
Split displays in the client grid indicating the clients to which the split has been applied.
7
Click Save.
To execute an Enterprise backup schedule immediately 1
Select the backup system in the Navigation pane and click Backup. The blue system icon displays to the left of each backup system in the Navigation pane.
2
Click the Schedules tab.
3
Select the desired schedule in the list and click Run Now.
•
The schedule must be enabled to execute. A yellow light bulb to the left of the schedule name indicates the schedule is enabled.
•
All backups scheduled to run today are queued and execute as soon as possible. Select Status > Present to view queued and running jobs.
To view or modify an Enterprise backup schedule Active (running) schedules cannot be modified. 1
Select the backup system in the Navigation pane and click Backup. The blue system icon displays to the left of each backup system in the Navigation pane.
2
Click the Schedules tab.
3
Select the desired schedule in the list and click View/Modify.
4
Modify settings as desired and click Save. For details, see "To create an Enterprise backup schedule" on page 193.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
197
To view all schedules by month or day Use this procedure to look at all schedules in a consolidated view on a read-only calendar. 1
Select the backup system in the Navigation pane and click Status.
2
On the side of the Status page, click the Future blind.
3
The Schedules Calendar displays a monthly view of scheduled backups.
• • •
Click the arrows at the top of the page to scroll to another month. Hover over a colored backup instance to see details about the schedule. For a daily view, click a day to zoom in. Click the arrows at the top of the page to scroll to another day. To exit the day, click Return to Month View.
To copy an Enterprise backup schedule 1
Select the backup system in the Navigation pane and click Backup. The blue system icon displays to the left of each backup system in the Navigation pane.
2
Click the Schedules tab.
3
Select the desired schedule in the list and click Copy. A new schedule called Copy of displays in the list.
4
Select the copy in the list and click View/Modify.
5
Modify the schedule name and other settings as desired. For more information, see "To create an Enterprise backup schedule" on page 193.
6
Click Save.
7
Select Rename to save the schedule with the new name.
To enable or disable an Enterprise backup schedule A schedule must be enabled for its backups to execute. 1
Select the backup system in the Navigation pane and click Backup. The blue system icon displays to the left of each backup system in the Navigation pane.
2
Click the Schedules tab.
3
Select the desired schedule in the list and click Enable/Disable.
•
If the schedule was disabled, it is now enabled and you see a yellow light bulb to the left of the schedule name.
•
If the schedule was enabled, it is now disabled and you see a gray light bulb to the left of the schedule name.
To delete an Enterprise backup schedule 1
Select the backup system in the Navigation pane and click Backup. The blue system icon displays to the left of each backup system in the Navigation pane.
2
Click the Schedules tab.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
198
3
Select the desired schedule in the list and click Delete.
Working with client aliases You can create aliases for a single client in order to have multiple backup strategies. By adding multiple alias clients, you can configure separate and radically different schedules for the same client. Note:
Make sure you are using the 7.2 agent or higher when working with client aliases.
Using aliases, you can break apart large data stores, decreasing the time required to perform the backup, and reducing the network traffic caused by large backup transfers. This ability also allows you to see, at a glance, what the system is backing up because the data stores are broken apart, and you can view them separately. You can also have two or more fulls that you can run at different times. Normally, a full cannot get purged until a new full is created. Separating a large full into smaller fulls and letting them run at different times, increases the available space by allowing separate purging. There are special considerations when determining whether to include or exclude the system state when running a backup, creating a backup schedule, or creating a selection list. See "Note about excluding the system state for client aliases" on page 200 for more information. Use the following procedures to work with client aliases:
• • • •
"To create aliases for a single client" on page 198 "To create alias names from the host" on page 198 "To add the alias name as a client" on page 199 "To create selection lists" on page 199
To create aliases for a single client Before you start:
• •
Make sure that the client is running the 7.2 agent or higher. Ensure that the client has been added as a protected client to the Unitrends appliance.
Follow these steps to create aliases for a client: Step 1:
Create the alias name. See "To create alias names from the host" on page 198.
Step 2:
Add the alias name as a client. See "To add the alias name as a client" on page 199.
Step 3:
Create selection lists. See "To create selection lists" on page 199.
To create alias names from the host 1
Go to > Settings > Clients, Networking, and Notifications > Networks > Hosts.
2
Click on the client name in the table.
3
Type a name in the Alias Name field. Note:
Do not enter spaces in the name. You are limited to 15 characters. It is recommended that you write down the alias name so you can enter the exact name when you add it
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
199
as a new client. 4
Click Add. You see the alias name in the Alias List area. Note:
To remove an alias name from the Alias List area, click on the alias name and click Remove . To remove all alias names from the Alias List area, click Remove All.
5
Repeat to add more alias names, if necessary.
6
Click Confirm. You see a message that the host entry was successful or failed.
To add the alias name as a client 1
Go to Settings > Clients, Networking, and Notifications > Clients.
2
Click Add Client. You see the Add Client screen.
3
Select the Computer Type from the drop-down list.
4
Uncheck Establish trust in the Authentication area.
5
Uncheck Automatically create a backup schedule for this computer and apply it immediately in the Options area.
6
Enter one of your new alias names in the Computer Name field. Note:
There is no need to add an IP address, since this defaults to information from the host page.
7
Click Setup. You see a processing message, then a Reload Navigation window instructing you to refresh the system.
8
Click Yes, reload the System or No, reload the System later.
After you reload the system, the new alias name displays in the Navigation pane in the list of clients protected by the system.
To create selection lists Now that you have set up a client alias, you can differentiate the backups with selection lists. For example, you have a host that has large directories in a C: drive and a D: drive. You create a client alias of the host. You can now create a selection list to exclude drive C: from the client alias and another selection list to exclude drive D: from the host. This way, you have split the large directories between two different clients. At this point, you can create different full schedules for the host and the client alias and run backups separately. See "Note about excluding the system state for client aliases" on page 200 for information about excluding or excluding the system state when creating a selection list, running a backup, or creating a backup schedule. See these topics for more information:
• •
To exclude files, see "About computer selection lists" on page 171. To specify includes for the selective backup type, see "About computer selection lists" on page 171.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
200
•
To specify includes or a combination of includes and excludes for full, differential, and incremental backups of a Windows client, see "Windows selection lists" on page 438.
•
To specify includes or a combination of includes and excludes for full, differential, and incremental backups of a Linux client, see "Linux selection lists" on page 714.
Note about excluding the system state for client aliases When you run a backup, create a backup schedule, or create a selection list, you have the option to check an Exclude System State checkbox to back up data and not include OS protection. If you are backing up an aliased client, you must decide whether to include or exclude the system state. Keep the following in mind:
•
DO NOT EXCLUDE the system state on the client that contains the operating system volumes (this is typically the C: volume).
• •
For all other client aliases that do not include the OS volume, do NOT include the system state.
•
The restore fails if the system state is not included in the OS volume and if the system state is included in the client aliases that do not include the OS volume.
Only one client alias can include the system state.
IMPORTANT! For Windows clients, the backup must contain the boot disk and any other system critical volumes to use the integrated bare metal recovery and Windows instant recovery features. Be sure one of the aliased clients contains all of these disks to use these features.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 6: File-level Backups
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
201
Chapter 7: Archiving Overview The Unitrends archiving feature enables you to archive local and replicated backups to various archive media for long-term retention and off-site storage of your critical data. Archiving your data is not the same as backing it up. To protect a client, you begin with a full backup and then capture changes from the full in subsequent incremental and/or differential backups. Backups are stored on the Unitrends appliance. By contrast, archiving involves writing these backups to media that can be stored off-site for longer-term retention. When an archive job is run, set information describing the backup and metadata for the appliance is also written to the media. After running archives, in addition to restoring files, application data, and virtual machines from archives, you can also use archived data to perform bare metal recovery of a failed client and to perform disaster recovery of a backup system. This chapter explains how archiving works, introduces the various supported archive media, and explains key archiving concepts. This chapter contains the following topics:
• • • • • • • •
"Overview of the archiving process" on page 201 "Backups that can be archived" on page 202 "Types of archives" on page 202 "Managing space on archive media" on page 202 "Additional archiving considerations" on page 209 "Archive media types" on page 210 "Archive restore" on page 212 "Disaster recovery with archived data" on page 212
If you do not a need an overview and are ready to begin archiving, see one of these chapters on the media type you are using:
• • • •
"Archiving to Disk" on page 215 "Archiving to Network Storage" on page 221 "Archiving to the Cloud" on page 223 "Archiving to Tape" on page 235
Overview of the archiving process The archiving process begins with successful backups. When you perform an archive job, you select a date range or enter a custom date for the backups you would like to archive. You then select the clients and backup types to archive. If you select differential or incremental backup types, full backups are automatically selected because the full backup with which differentials and incrementals are associated must be present on the archive media in order for you to restore your
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 7: Archiving Overview
202
data. For details about backup types and backup groups, see the chapter "Backups Overview" on page 141. As your appliance runs archive jobs and uses space on your media, you must determine a media management strategy that works best for you. It will likely include a combination of storing the media offsite, acquiring new media, and rotating and reusing existing media by deleting older archive sets. You can delete these sets automatically by archiving with the purge and overwrite options. For details, see "Managing space on archive media" on page 202. If you need to restore the archived data, you must first restore from the archive media to the Unitrends appliance. You can then restore the data from the appliance to a registered client. For details, see "Archive restore" on page 212.
About archiving This section provides details about the types of data that can be archived, the different archiving procedures you can use, archiving considerations, and strategies for archiving. See the following topics for details:
• • • •
"Backups that can be archived" on page 202 "Types of archives" on page 202 "Managing space on archive media" on page 202 "Additional archiving considerations" on page 209
Backups that can be archived The following backups can be archived:
• • •
Local and replicated backups File-level, application, and virtual machine backups Bare metal backups
Types of archives You can archive your data by running on-demand archive jobs or creating archive schedules. The on-demand option enables you to run one-time archive jobs whenever you want to archive backups. Creating schedules automates the archiving process and frees you from having to run a one-time job each time you want to archive a backup. For instructions on running archives, see "Executing archive jobs" on page 256.
Managing space on archive media As your appliance runs archive jobs and uses space on your media, you must determine a media management strategy that works best for you. It will likely include a combination of storing the media offsite, acquiring new media, and rotating and reusing existing media by deleting sets that have exceeded their retention periods using the purge and overwrite options. This section explains how the archiving feature uses available space on archive media, discusses retention, explains the purge and overwrite options, and discusses options for creating space on
Legacy Recovery-Series and UEB Administrator's Guide Chapter 7: Archiving Overview
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
203
archive media. For management considerations specific to your selected archive media, see the applicable chapters. See the following topics for details:
• • • • • •
"Archive sets and retention" on page 203 "How archiving uses available space on media" on page 204 "Purge" on page 204 "Overwrite" on page 206 "Purge and overwrite comparison" on page 208 "Creating space on archive media" on page 209
Archive sets and retention When you run a one-time archive job or create a schedule, you can set a retention period for the archive set. Archive sets cannot be deleted with the purge and overwrite options until they have exceeded their retention periods. (For details, see "Purge" on page 204 and "Overwrite" on page 206.) However, if you prepare media that contains existing archive sets, they are deleted regardless of retention settings. For details about preparing media, see "Preparing archive media" on page 254. Retention settings for archive sets are impacted by backup groups (see "Backup groups" on page 145). Backup groups can be archived across multiple sets, and because backups must be restored as a group, the archived backup with the latest retention date determines the retention date for all sets containing backups belonging to the group. For example, if a set containing a full backup has a later retention date than the sets containing the differentials in the group, the retention setting for the set containing the full backup is applied to the sets containing the differentials. For more details, see "Purge" on page 204. You can view retention settings using the procedure described in . The figure below illustrates how retention settings display in the Administrator Interface of the Unitrends appliance.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 7: Archiving Overview
204
How archiving uses available space on media An archive job for which purge or overwrite has not been selected uses the available space on archive media and then fails when no more space is available. The resulting archive set contains a subset of the desired backups, and it is possible that these backups can be restored. Because the archiving feature appends backups to the media, a larger set of backups can be maintained on the media. However, you should develop a plan for rotating the media on a regular basis to reduce the risk of data loss. An archive job for which purge or overwrite has been selected fails if purging or overwrite cannot create adequate space for the job. No backups are written to the media and any existing sets are not impacted by the job. For details about the purge and overwrite options, see "Purge" and "Overwrite" on page 206.
Purge If there is no space available on the media, the purge option deletes archive sets that have exceeded their retention settings to create space for new sets. The recommended setting for retention is the interval between full backups. Sets that are still within their retention period are not purged, and nothing is purged if enough space is available for the new archive set. Jobs for which purge is selected fail if there is inadequate space and nothing can be purged or if purging cannot create enough space on the media. Once archives have been purged from the media, they can no longer be retrieved. Note:
Purge is not supported for tape archiving.
For more details about how purge works with retention settings, see the following topics:
•
"Purging an archive set that has exceeded its retention period" on page 205
Legacy Recovery-Series and UEB Administrator's Guide Chapter 7: Archiving Overview
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
205
• •
"Failed attempt to purge archive sets with current retention" on page 205 "Impact of a backup group on archive retention settings" on page 206
Purging an archive set that has exceeded its retention period The figure below illustrates how the purge option works. The archive media has a capacity of 110 GB, all of which is occupied by Archive Sets 1 and 2. The purge option has been selected for the current archive job. This job will write Set 3 to the media. Because no space is available on the media and Set 1 has exceeded its retention period, Set 1 is purged to make room for Set 3.
Failed attempt to purge archive sets with current retention The figure below illustrates a failed attempt to purge archive sets with current retention. The archive media has a capacity of 110 GB, all of which is occupied by Archive Sets 1 and 2. The purge option has been selected for the current archive job, which will attempt to write Set 3 to the media. No space is available, but neither of the sets can be purged because both have current retention. The archive job fails with no impact to existing sets on the media.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 7: Archiving Overview
206
Impact of a backup group on archive retention settings The archived backup with the latest retention date determines the retention date for all sets containing backups belonging to the group. For example, if a set containing a full backup has a later retention date than the sets containing the differentials in the group, the retention setting for the set containing the full backup is applied to the sets containing the differentials. Archive sets containing the differentials cannot be purged until the retention period for the set containing the full backup has expired. For information on backup groups, see "Backup groups" on page 145. The figure below illustrates the impact of a backup group on retention settings. Sets 2 and 3 have exceeded their retention. However, these sets cannot be purged. They contain backups belonging to the group associated with the full backup in Set 1. This set has not exceeded its retention. The archive job fails with no impact on the sets currently stored on the archive media.
Overwrite If all sets on the media have exceeded their retention, the overwrite option deletes them and replaces them with the new archive sets. Unlike purge, overwrite deletes the existing sets even if
Legacy Recovery-Series and UEB Administrator's Guide Chapter 7: Archiving Overview
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
207
there is enough space on the media for the new sets. Jobs with overwrite selected fail if either of the following is true:
• •
Any of the existing sets are still within the retention period. Overwriting the existing sets would not create enough space for the job.
See the following topics for more details about how the overwrite option works:
• •
"Successful archive job using the overwrite option" on page 207 "Failed archive job using the overwrite option" on page 207
Successful archive job using the overwrite option The figure below illustrates a successful archive job using the overwrite option. The archive media has a capacity of 200 GB, and only 110 GB are occupied by Sets 1 and 2. The current job is writing Set 3 to the media. Set 3 is 40 GB, so there is enough space on the media for the current job without deleting Sets 1 and 2. However, because overwrite has been selected for the job, all existing sets on the media are deleted when Set 3 is written. Unlike the purge option, the overwrite option deletes archive sets even when enough space is available for the current job.
Failed archive job using the overwrite option The figure below illustrates a failed attempt to run an archive job with the overwrite option. The archive media has a capacity of 200 GB, and only 110 GB are occupied by Sets 1 and 2. The current job is writing Set 3 to the media. Set 3 is 40 GB, so there is enough space on the media for the current job without deleting Sets 1 and 2. However, the job fails because overwrite has been selected and Set 2 has not exceeded its retention period. There is no impact on the archive media. A job with overwrite selected succeeds only if all sets in the media have exceeded their retention periods.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 7: Archiving Overview
208
Purge and overwrite comparison See the following table for a side-by-side comparison of the purge and overwrite options. For more details, see "Purge" on page 204 and "Overwrite" on page 206. Purge
Overwrite
•
If no space is available on the media, purge deletes archive sets that have exceeded their retention settings to create space for new sets.
•
If all sets on the media have exceeded their retention, overwrite deletes them and replaces them with the new sets.
•
Individual sets are purged only if their retention period has expired.
•
All sets on the media are overwritten only if all have exceeded their retention settings.
•
Sets are purged only if there is not enough space on the media for the archive job.
•
All sets are overwritten regardless of available space.
•
Sets are purged until there is enough space to complete the job.
•
Job fails and nothing is written to the media if purge cannot create adequate space for the entire job.
•
Job fails and nothing is written to the media if overwrite cannot create adequate space for the entire job.
•
Not supported for tape.
•
Supported for all media.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 7: Archiving Overview
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
209
Creating space on archive media If you need to create space on your archive media, use one or more of the options described in the table below to decrease your storage footprint. For recommendations for limiting the amount of space you are using on cloud archive storage, see "Reducing your storage footprint on the cloud" on page 233. For more about managing space on your archive media, see "Managing space on archive media" on page 202. Option
Description
Purge sets
Purging deletes sets with expired retention to create enough space for the current job. This option creates only enough space to complete the current job. For details, see "Purge" on page 204.
Overwrite sets
Overwrite deletes all sets on the media and replaces them with the sets in the current job. Overwrite occurs only if all sets on the media have exceeded their retention settings. For details, see "Overwrite" on page 206.
Delete all sets using the Prepare option
Preparing media deletes all sets regardless of retention settings. For instructions, see "Preparing archive media" on page 254.
Additional archiving considerations Note the following additional considerations when archiving data: Archiving consideration
Details
Backup must be successful or completed with warnings
Successful (green) backups and backups that ran with warnings (yellow) are eligible for archiving. Failed (red) backups are not archived.
Archive set selection must be correct
You must select at least one client and backup type or one local directory to create an archive set.
Storage space
To archive backups successfully, the media must have adequate storage space.
Note:
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Navigation groups do not display in the Clients to Archive list. If you wish to archive based on a navigation group, select the group in the Navigation pane to display only the clients in the selected group.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 7: Archiving Overview
210
Archiving consideration
Details
Space considerations and the Purge and Overwrite options
An archive job for which purge or overwrite has been selected fails if purging or overwriting cannot create adequate space for the job. When archiving without the overwrite or purge option and adequate space is not available, archives are appended to any existing archive sets until the media is full. For details, see "How archiving uses available space on media" on page 204.
System metadata included in the archive
Unitrends system metadata is archived in each set. In the event of a system failure, you can use this archived metadata to restore the Unitrends system configuration, schedules, and other settings. (You see System Metadata File listed under sets for backups and archives.) Note:
On tape archiving - Disaster recovery from tape archive is not supported.
File-level incrementals are not directly archived
For each client in an archive schedule, incrementals are synthesized into a differential. This synthesis only occurs for clients that are in an archive schedule. Synthesis does not run for on-demand archives, although on-demand jobs do contain synthetic differentials if the incremental/differential backup type is selected.
Only one copy of a backup can exist on the archive media.
If you attempt to archive a backup that has already been written to the media, it is not written to the media but other backups in the job are archived. The original backup remains intact with the original archive date.
Reserved directories
To ensure a successful archive, make sure that the following directory is available: /mnt.
Archive media types Unitrends supports archiving to disk, tape, external storage, and cloud storage. For considerations specific to each media type, see the applicable archiving chapters. Not all media types are supported for all Unitrends appliances. To determine which media your appliance supports, see the applicable document in the following list:
• •
UEB appliances: Unitrends Enterprise Backup Datasheet Recovery-Series appliances: Recovery-Series Appliance Family Data Sheet
See the following topics for an introduction to the different archive media types:
• • • •
"Archiving to disk devices" on page 211 "Archiving to tape devices" on page 211 "Archiving to network storage devices" on page 211 "Archiving to cloud storage" on page 212
Legacy Recovery-Series and UEB Administrator's Guide Chapter 7: Archiving Overview
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
211
Note:
You cannot archive to optical media (CD or DVD), but you can archive to a hard disk and then convert it to optical media.
Archiving to disk devices See the following topics for details about supported disk archiving devices:
• •
"Disk archiving unit" on page 211 "eSATA or USB device" on page 211
For more details about the supported disk devices and instructions for setting up archiving to disk, see "Archiving to Disk" on page 215.
Disk archiving unit The disk archiving unit, formerly known as the RXDA or recovery archive unit, is based on four eSATA-connected drives in a single enclosure. The disk archiving unit can be used with UEB on VMware and Unitrends Recovery-Series appliances. For a list of all supported appliances, see the documents listed under "Archive media types" on page 210. Features of the disk archiving unit include:
• •
Support for 3.5” SATA hard disk drives, up to 4TB Support for eSATA transfer speed up to 3Gbps
eSATA or USB device External docking units may be used to provide archiving capability for select Unitrends systems. A single disk is inserted into the docking unit and the docking unit is connected to the system using an eSATA or USB cable. Features of external docking units include:
• • • • •
Support for 3.5” SATA hard disk drives, up to 4TB Hot-swap capability for rapid multi HDDs access and exchange Support for eSATA transfer speeds up to 3Gbps Compact docking station design maximizes heat dissipation and exhaust The docking unit uses a 12V DC power adapter
Archiving to tape devices The archiving feature supports tape drives and autoloader systems (D2D2T). Because various tape drives and autoloaders behave in different ways, the Unitrends appliance is designed with configuration options that maintain compatibility across a range of products. Unitrends supports D2D2T archiving to tape from select Unitrends Recovery-Series appliances. For supported Recovery-Series appliances, see the Recovery-Series Appliance Family Data Sheet. For instructions on setting up tape archiving, see the chapter "Archiving to Tape" on page 235.
Archiving to network storage devices You can archive to the following storage devices with select Unitrends appliances:
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 7: Archiving Overview
212
• •
Storage Area Network (SAN) Network Applied Storage (NAS)
For a list of appliances that support archiving to external storage devices, see the documents listed under "Archive media types" on page 210. For instructions on archiving to these devices, see the chapter "Archiving to Network Storage" on page 221.
Archiving to cloud storage Archiving to cloud storage with Unitrends CloudHook™ is supported for 64-bit appliances running release 7.5 or higher. Archiving to the cloud offers the following:
•
Archiving of Unitrends backups to the large amounts of storage space available through Amazon S3, Google Cloud Storage, and Rackspace Cloud File.
• •
Availability of your data through redundant cloud storage.
•
In-flight deduplication.
Freedom from managing physical archive media.
For details and instructions on setting up cloud archiving, see "Archiving to the Cloud" on page 223.
Archive restore When you perform an archive restore, the archived data is restored to the backup system as a regular backup. After you restore an archive to the backup system, you can restore it to the client in the same manner used to restore other backups. For instructions, see "Restoring from archives" on page 272. The figure below illustrates the archive restore process. For the first step, you must restore the backup or individual files from the archive media to a Unitrends appliance to which the archive device is connected. You can then restore the backup or files to a client that is registered to the appliance.
Disaster recovery with archived data You can use archived data to perform bare metal recovery of clients and to perform disaster recovery of a Unitrends appliance.
Bare metal recovery from archived data To perform bare metal recovery using archived data, you must first restore the necessary bare metal or file-level backups to a Unitrends appliance. You can then use these backups to perform the
Legacy Recovery-Series and UEB Administrator's Guide Chapter 7: Archiving Overview
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
213
recovery. For details about bare metal recovery, see "Bare Metal Protection Overview" on page 749.
Disaster recovery from archived data System metadata for the Unitrends appliance is written to archive media during each archive job, and this data can be used for disaster recovery of the appliance. For instructions, see "System restore from archive" on page 407. Note:
Disaster recovery from tape archive is not supported.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 7: Archiving Overview
214
Legacy Recovery-Series and UEB Administrator's Guide Chapter 7: Archiving Overview
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
215
Chapter 8: Archiving to Disk This chapter discusses considerations specific to archiving to disk and provides instructions for setting up disk archiving. Before performing the procedures described in this chapter, it is recommended that you read "Archiving Overview" on page 201, which explains how archiving works and discusses concepts referenced throughout this chapter. The procedures in this chapter are specific to disk archiving. For procedures common to all archive media, such as viewing archives and managing archive schedules, see "Archiving Procedures" on page 253. The following topics are covered in this chapter:
• • •
"About archiving to disk" on page 215 "Steps for setting up archiving to disk" on page 218 "Managing disk archive media" on page 218
About archiving to disk When archiving to a single disk you can use the disk archiving unit (by placing only one disc in the unit, and leaving the other slots empty) or by using a USB or eSATA device. You can archive to multiple disks using the disk archiving unit. For details, see "Disk archiving unit" on page 215. See the following topics for additional disk archiving information:
• •
"Disk archiving unit" on page 215 "eSATA or USB device" on page 218
Disk archiving unit The disk archiving unit, formerly known as the RXDA or recovery archive unit, is based on four eSATA-connected drives in a single enclosure. The disk archiving unit can be used with UEB on VMware and the Unitrends physical appliance. See the following for more information about the disk archiving unit:
• • • •
"Benefits of using the disk archiving unit" on page 215 "Restrictions and limitations of the disk archiving unit" on page 216 "Connecting UEB on VMware to the disk archiving unit" on page 216 "Connecting a Unitrends physical appliance to the disk archiving unit" on page 217
Benefits of using the disk archiving unit Benefits of the disk archiving unit for a physical appliance include:
• •
Support for 3.5” SATA hard disk drives, up to 4TB Support for eSATA transfer speed up to 3Gbps
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 8: Archiving to Disk
216
Restrictions and limitations of the disk archiving unit While the disk archiving solution for a physical appliance offers many benefits, the following restrictions and limitations apply:
•
All drives within the disk archiving unit that are attached to a single system must have equal capacity. Drives may be of varying capacity if they are attached to different systems.
•
All drives within the disk archiving unit that are attached to a single system are treated as one logical volume. Data is written across all drives in the logical volume. Once you archive to a logical volume, these drives must be treated as a single entity. WARNING! Removing a drive from the logical volume corrupts archived data.
•
Data that has been archived on 3Ware cannot be restored via the disk archiving unit. WARNING! Be sure to unmount the disk archiving unit before detaching it from the backup system or before powering it off while attached to the system. Failure to unmount the unit properly may result in data corruption.
Connecting UEB on VMware to the disk archiving unit UEB on VMware archiving uses the SAS Controller 9211-4i, along with an external SAS bracket. You must purchase these parts to connect the disk archiving unit. For details on procuring these parts, see KB 3332. This section provides instructions for creating the ESXi passthrough for the disk archiving unit. Note: 1
Log onto the ESXi server through vSphere:
• • 2
You can only connect one virtual machine to a passthrough at a time.
Go to VMware, open the vSphere client, and connect to your host. On the Login window, enter the IP address / Name, User name, and Password, then click Login.
Configure the device for the passthrough:
• •
Click on the appropriate device from the list at the bottom of the window.
•
Click Configure Passthrough… in the top right corner. You see the Mark devices for passthrough window.
•
Check the box associated with the device (the LSI 2004 box) and click OK. You see a message to restart your computer.
Select Advanced Settings in the Hardware column. The Passthrough Configuration window lists all available passthrough devices.
If there is another controller that uses the same LSI chip set, you may see more than one in the list and you must determine the appropriate one to select. For more information, go to the VMware Knowledgebase. WARNING! Be sure to select the appropriate device or you could lose access to the ESXi server. 3
Restart your computer:
•
Shut down all virtual machines before you restart.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 8: Archiving to Disk
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
217
4
•
Right-click the Host IP in the upper left part of the window and select Enter Maintenance Mode. You see a message to confirm the maintenance mode.
• •
Click Yes to confirm maintenance mode.
Verify the passthrough:
• • • 5
Use your normal process to reboot.
Log back into vSphere. Click the Configuration tab. Click Advanced Settings under the Hardware column. Your device is listed in the main portion of the window.
Add the passthrough device to the virtual machine:
• •
Power down the virtual machine.
• • •
Click Add. You see the Add Hardware window.
•
Click Finish to complete the passthrough. You see a list of all devices on the Virtual Machine Properties window, including the device you added for the passthrough, such as “New PCI Device (adding).”
•
Click OK.
Right click on the virtual machine and click Edit Settings. You see the Virtual Machine Properties window.
Click on PCI Device in the selection window and click Next. Select the device from the drop-down list to specify the physical PCI/PCIe device for connection. A new window displays the device.
6
Reboot the virtual machine. Once complete, you are ready to archive.
7
View the device in Unitrends:
• •
Log in to Unitrends. Go to Archive > Media. The device you added is listed under Archive Media. See "To view connected media" on page 268 for more information.
Connecting a Unitrends physical appliance to the disk archiving unit The disk archiving unit has four eSATA ports that correspond to the four archive drive slots. To connect to the Unitrends physical appliance, the unit may be attached to a single backup system or to multiple systems simultaneously. This configuration allows archiving to occur from one or more systems. The disk archiving unit is attached to a backup system using an eSATA cable. If your backup appliance has a multi-port NIC(s), you can attach more than one archive drive to that appliance using multiple eSATA cables. Note that if you attach multiple drives to one Unitrends appliance, the backup system treats all attached archive drives as one logical volume, writing data across the entire set.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 8: Archiving to Disk
218
eSATA or USB device External docking units may be used to provide archiving capability for select Unitrends systems. A single disk device is inserted into the docking unit and the docking unit is connected to the system using an eSATA or USB cable. Features include:
• • • • •
Supports 3.5” SATA hard disk drives, up to 4TB Hot-swap capability for rapid multi HDDs access and exchange Supports eSATA transfer speed up to 3Gbps Compact docking station design maximizes heat dissipation and exhaust The docking unit uses a 12V DC power adapter
Note:
You can use USB drives on VMware UEB systems (see KB 3257 for details). You can use eSATA on all other systems and VMware UEB systems.
Additional considerations for USB devices Unitrends supports a variety of 2.0-compliant USB docking units. Note the following when archiving to a USB device:
• • •
The usable size of a given drive varies by disk size and dock type. For disks up to 2 TB, usable size is equal to actual disk size regardless of the dock type. For disks larger than 2 TB, usable size may not match the actual disk size. For details by dock type, see KB 3257.
Steps for setting up archiving to disk Follow the steps described here to set up disk archiving: Step 1:
Review the considerations for archiving with the "Disk archiving unit" on page 215 or a "eSATA or USB device" on page 218.
Step 2:
Develop a strategy for managing the space on your disks. For details, see "Managing space on archive media" on page 202.
Step 3:
Connect the disk archiving device to the Unitrends appliance from which you would like to archive. For details, see the instructions you received with the device. For additional information about connecting the disk archiving unit, see "Disk archiving unit" on page 215.
Step 4:
Prepare archive drives. For details, see "Preparing archive media" on page 254.
Step 5:
Run archives using the procedures described in "Executing archive jobs" on page 256.
Managing disk archive media These procedures assume that the archive device has been properly installed and is attached to the backup system so that the media is accessible for archiving. Once this is done, you can use the archive media subsystem to perform the following:
•
"To add a drive to a multi-drive system" on page 219
Legacy Recovery-Series and UEB Administrator's Guide Chapter 8: Archiving to Disk
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
219
•
"Removing archive drives for off-site storage" on page 219
To add a drive to a multi-drive system For multi-drive systems, archives are written across all available drives. It is important to keep this in mind when defining your archive strategy. If your archive set grows and you need to use additional drives, do one of the following:
•
Add one or more new drives to the existing set and prepare them as described in "Preparing archive media" on page 254. Preparing the drives creates a new logical volume but purges all data from the original drives. For example, you had been archiving to two drives. You add a third drive and prepare it. Subsequent archives are written across all three drives, but older archives that had been stored on the original two drives were deleted during the prepare operation.
•
Remove existing drives to retain archived data, then insert a new set of drives and prepare. For details, see "Removing archive drives for off-site storage" on page 219 and "Preparing archive media" on page 254.
Removing archive drives for off-site storage Use the procedures described in this section to remove drives for off-site storage. Before removing a drive, you must unmount it. See the following topics for instructions:
• •
"To unmount an archive drive" on page 219 "To remove archive drives for off-site storage" on page 219
To unmount an archive drive An archive must be unmounted before it is removed from an appliance for offsite storage. 1
Select Archive > Media. Connected media display in the Archive Media area.
2
Select the desired drive.
3
Click Unmount at the bottom of the screen. The color of the disk icon changes to red to indicate that the drive is no longer mounted.
To remove archive drives for off-site storage For multi-drive systems, archives are striped across all drives in the set, so be sure to store them together as all drives are needed to restore any archived data. 1
Verify that media is not mounted. See "To unmount an archive drive" on page 219 for details. WARNING! Pulling mounted drives can result in data loss and corruption.
2
Pull the drive and be sure it is labeled for easy identification.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 8: Archiving to Disk
220
Legacy Recovery-Series and UEB Administrator's Guide Chapter 8: Archiving to Disk
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
221
Chapter 9: Archiving to Network Storage This chapter describes how network storage can be used for archiving. Before setting up archiving to network storage, it is recommended that you read "Archiving Overview" on page 201. For details about archiving procedures, such as executing archive jobs and restoring archive sets, see "Archiving Procedures" on page 253. Archiving to network storage is supported for Unitrends Recovery-Series and UEB appliances that have been licensed for advanced archiving. The following devices are supported:
•
A CIFS or NFS-configured Network Attached Storage (NAS) share
• • •
A Storage Area Network (SAN) iSCSI LUN An added virtual disk (UEB systems only) Cloud storage using Unitrends CloudHook™
Note:
Setting up archiving to the cloud is different from setting up archiving to other network archive storage media. For instructions and special considerations, see the chapter "Archiving to the Cloud" on page 223.
Limitations of archiving to network storage Note the following limitations when archiving to network storage:
•
For archive to CIFS/NFS NAS, the backup system must be licensed with the advanced archiving (ADX) feature. Check for ADX in the license string under Settings > System, Updates, and Licensing > License.
•
For archive to CIFS/NFS NAS, each backup system must archive to a separate NAS share. Having more than one backup system archiving to a given NAS share is likely to cause data corruption.
•
For archive to iSCSI LUN, each backup system must archive to a separate LUN. Having more than one backup system archiving to a given iSCSI LUN is likely to cause data corruption.
•
For archive to iSCSI LUN, it is recommended to not resize the LUN after it has been added to the backup system as the new size cannot be detected by the backup appliance.
• • •
Archiving encrypted backups to ‘dumb’ storage is not supported. Archiving to added virtual disk is supported for UEB systems only. For details about archiving to cloud storage, see the chapter "Archiving to the Cloud" on page 223.
Steps for archiving to network storage This section provides an overview of the steps you must complete to configure a Unitrends appliance for archiving to network storage.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 9: Archiving to Network Storage
222
Note:
Setting up archiving to the cloud is different from setting up archiving to other network archive storage media. The steps listed here do not include all the steps necessary for archiving to the cloud. For instructions and special considerations, see the chapter "Archiving to the Cloud" on page 223.
Step 1:
Review the "Limitations of archiving to network storage" on page 221.
Step 2:
Develop a strategy for managing the space on your network storage. For details, see "Managing space on archive media" on page 202.
Step 3:
Add the archive storage device to the Unitrends appliance as described in "Adding archive storage" on page 109.
Step 4:
Run archives using the procedures described in "Executing archive jobs" on page 256.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 9: Archiving to Network Storage
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
223
Chapter 10: Archiving to the Cloud With the Unitrends CloudHook™ feature, you can archive your backups to cloud storage managed by a service provider. CloudHook provides all the benefits of Unitrends archiving while also freeing you from the burden of managing the physical archive media. This chapter discusses prerequisites and considerations for archiving to the cloud and provides instructions on using the CloudHook feature. Before setting up archiving to the cloud, it is recommended that you read "Archiving Overview" on page 201. Note:
This chapter describes procedures specific to cloud archiving. For procedures common to all archive media, such as viewing archives and managing archive schedules, see "Archiving Procedures" on page 253.
See the following topics for details about archiving to the cloud:
• • • • • • • • •
"About archiving to the cloud" on page 223 "Steps for archiving to the cloud" on page 226 "Creating a cloud storage account" on page 227 "Adding cloud archive storage to the Unitrends appliance" on page 229 "Archiving backups to the cloud" on page 231 "Managing cloud archive storage" on page 231 "Removing cloud archive sets" on page 232 "Reducing your storage footprint on the cloud" on page 233 "Restoring from cloud archives" on page 233
About archiving to the cloud With the Unitrends CloudHook™ feature, you can archive your backups to cloud storage managed by a service provider. When a cloud storage bucket or container is added to a Unitrends appliance, the appliance creates an S3QL file system on it and recognizes the storage bucket as external NAS storage to which it can archive local or replicated backups. Once backups are archived to the cloud, you can restore them to any Unitrends appliance that supports CloudHook. This feature simplifies the archiving process by eliminating the need for you to manage archive media in an offsite location and then retrieve it if you need to restore the archived data. Unitrends CloudHook offers the following:
•
Archiving of Unitrends backups to the large amounts of storage space available through Amazon S3, Google Cloud Storage, and Rackspace Cloud Files.
• • •
Availability of your data through redundant cloud storage. Freedom from managing physical archive media. Increased retention options helping you to satisfy internal policies and industry regulations.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 10: Archiving to the Cloud
224
• •
In-flight deduplication. Configurable encryption and compression options.
For more information, see:
• •
"Prerequisites and considerations for archiving to the cloud" on page 224 "Managing the amount of data you archive to the cloud" on page 225
Prerequisites and considerations for archiving to the cloud Review the following before setting up cloud archiving:
•
The backup system must be licensed with the advanced archiving (ADX) feature. Check for ADX in the license string under Settings > System, Updates, and Licensing > License.
•
CloudHook is supported on 64-bit Recovery-Series and UEB appliances running software version 7.5 or higher. It is not supported on 32-bit appliances.
• •
Local and replicated backups can be archived to the cloud.
•
For bucket and container names only the following characters are supported: upper and lowercase letters, numbers, dots, and dashes. Buckets and containers with names containing other characters cannot be added to a Unitrends appliance.
•
For Amazon S3 and Google Storage, you can use existing buckets and containers that follow the supported naming conventions identified above. However, we recommend that you create unique folders for your Unitrends data.
•
For Rack Space Cloud files, we recommend that you create new containers to use with the CloudHook feature.
•
Accounting and billing management for your cloud storage occur between you and the storage provider. You cannot manage your cloud storage account from the Administrator Interface of your Unitrends appliance, and Unitrends cannot answer questions about this account. You must contact your provider with any questions you have about your cloud storage account.
•
It is extremely important that you understand the amount of data you are archiving and the related charges from your cloud storage provider. To manage the amount of space you are using in cloud storage, you should develop a retention and purge strategy. See "Managing the amount of data you archive to the cloud" on page 225 for more information. For options for decreasing the amount of cloud storage you are using, see "Reducing your storage footprint on the cloud" on page 233.
•
A cloud storage bucket or container can receive backups from only one Unitrends appliance. Be sure to create a storage bucket or container for each appliance whose backups you want to archive to the cloud. It is recommended that you give each bucket or container a name that associates it with a particular appliance for easier management of your cloud storage.
•
For the restore, the cloud archive storage can be attached to any appliance that supports CloudHook. You do not have to restore to the original appliance. However, you must remove
To use the CloudHook feature, you must have an account with one of the following cloud storage providers: Amazon S3, Google Cloud Storage, or Rackspace Cloud Files. For details about creating an account and purchasing storage, see "Creating a cloud storage account" on page 227.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 10: Archiving to the Cloud
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
225
the archive storage from the original appliance before mounting it to a different appliance for the restore. For instructions, see "Managing cloud archive storage" on page 231.
•
Archiving to the cloud does not require any special network configurations. Before archiving to the cloud, you only need to add cloud archive storage. For details, see "Adding cloud archive storage to the Unitrends appliance" on page 229.
•
Archiving to the cloud is slower than archiving across local LANs. Actual speed depends on a number of factors, including memory and network bandwidth. We recommend that you test a small archive to determine the speed prior to sending larger archives to the cloud.
• • •
Amazon S3’s Reduced Redundancy Storage (RRS) option is not supported. Seeding to cloud storage is not supported. Using cloud archives for disaster recovery is not recommended because of bandwidth limitations.
Managing the amount of data you archive to the cloud Because cloud storage providers charge based on the amount of storage you use, it is extremely important that you monitor the amount of data that your Unitrends appliance archives to the cloud. When adding cloud archive storage to the appliance, you can specify a purging threshold to set the maximum amount of space for the archiving feature to use in the cloud storage bucket. (For instructions, see "Adding cloud archive storage to the Unitrends appliance" on page 229.) The figure below shows the box that displays when you add archive storage. The box next to Specify Purging Threshold is checked, and the purging threshold has been specified as 800GB.
In the example above, an archive job that would cause the cloud storage space used to exceed 800GB fails to run unless Overwrite or Purge is selected for the job. You can use the overwrite and purge settings to delete archive sets to free space for new jobs. Overwrite deletes all data currently residing on the archive storage and replaces it with the new archive set. Purge deletes only enough sets to create sufficient space for the new job to be archived without exceeding the specified purging threshold. Sets cannot be deleted unless they have exceeded their retention periods. For details about the overwrite and purge settings, see "Managing space on archive media" on page 202.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 10: Archiving to the Cloud
226
There are instances, however, when your archiving jobs can use slightly more storage space than the limit you have specified as the purging threshold. When you initiate an archive job, the appliance estimates the amount of space needed for the job, and certain factors can cause it to underestimate. To avoid unexpected charges from your cloud storage provider, it is highly recommended that you develop a policy for managing the amount of data that you archive to the cloud. You can monitor the amount of data in your cloud storage by selecting Settings > Storage and Retention > Storage in the Unitrends Administrator Interface. See the figure below for an example of how cloud storage displays in the Administrator Interface.
You can manage the amount of data on your cloud storage using retention settings and the archive purge and overwrite features. For details, see "Managing space on archive media" on page 202.
Steps for archiving to the cloud This section contains an overview of the steps used to set up cloud archiving. See the procedures referenced in each step for details. If you already have an account with a cloud service provider, you can skip the second step. Step 1:
Review the "Prerequisites and considerations for archiving to the cloud" on page 224.
Step 2:
Create a cloud storage account. For details, see "Creating a cloud storage account" on page 227.
Step 3:
Develop a policy for managing the amount of data you archive to the cloud. For details, see "Managing the amount of data you archive to the cloud" on page 225.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 10: Archiving to the Cloud
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
227
Step 4:
Add cloud archive storage. For instructions, see "Adding cloud archive storage to the Unitrends appliance" on page 229.
Step 5:
Archive backups to the cloud. For details, see "Archiving backups to the cloud" on page 231.
Creating a cloud storage account Before you can begin archiving to the cloud, you must create an account with one of the following cloud storage providers:
• • •
Amazon S3 Google Cloud Storage Rackspace Cloud Files
Considerations for creating a storage account and buckets or containers • For bucket and container names only the following characters are supported: upper and lowercase letters, numbers, dots, and dashes. Buckets and containers with names containing other characters cannot be added to a Unitrends appliance. Additional storage provider character restrictions may apply.
•
For Amazon S3 and Google Storage, you can use existing buckets and containers that follow the supported naming conventions identified above. However, we recommend that you create unique folders for your Unitrends data.
•
For Rack Space Cloud files, we recommend that you create new containers to use with the CloudHook feature.
•
A bucket or container can receive backups from only one Unitrends appliance. Be sure to create a storage bucket for each appliance whose backups you want to archive to the cloud. It is recommended that you give each bucket or container a name that associates it with a particular appliance for easy management of your cloud storage.
•
Some storage providers allow you to create folders within buckets, and when you add storage from these providers to a Unitrends appliance, you can add the bucket or specify a path to a folder.
•
The credentials for accessing the buckets or containers are not the same as the username and password used to access your storage provider account. For more details about these credentials, see the section on your storage provider below.
•
After creating an account and storage containers, you can add cloud archive storage to a Unitrends appliance. (For instructions, see "Adding cloud archive storage to the Unitrends appliance" on page 229). You can manage your cloud storage account only through the provider. You cannot manage this account through the Unitrends appliance.
•
Any questions about your cloud storage account should be directed to your cloud storage provider. Unitrends cannot answer questions about billing, credentials, or any other aspects of your cloud storage account.
See the following topics for information about creating accounts with the different storage providers:
•
"Creating an Amazon storage account" on page 228
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 10: Archiving to the Cloud
228
• •
"Creating a Google storage account" on page 228 "Creating a Rackspace storage account" on page 228
Creating an Amazon storage account Cre a tin g a n Ama z o n s to ra g e a c c o u n t
Amazon S3 is the online storage service offered by Amazon Web Services (AWS). To use Amazon S3, you must sign up for an AWS account. For details about Amazon S3 and instructions for creating an AWS account, see Amazon’s documentation at http://aws.amazon.com/s3/. Note:
Amazon’s Reduced Redundancy Storage (RRS) option is not supported.
After creating an account and storage buckets, you must enter the following storage bucket credentials when adding the cloud storage to your Unitrends appliance:
•
Access Key ID
•
Secret Access Key
These credentials are different from the username and password used to access your Amazon storage account. You can view the credentials here: https://awsportal.amazon.com/gp/aws/developer/account/index.html?ie=UTF8&action=access-key. If you cannot locate your credentials, contact your storage provider. Unitrends does not have access to this information. For instruction on adding cloud storage, see "Adding cloud archive storage to the Unitrends appliance" on page 229.
Creating a Google storage account Cre a tin g a Go o g le s to ra g e a c c o u n t
Google Cloud Storage is an online storage service offered by Google. For details about Google Cloud Storage and instructions for creating an account, see Google’s documentation at https://developers.google.com/storage/docs/overview. After creating an account and storage buckets, you must enter the following storage bucket credentials when adding the cloud storage to your Unitrends appliance:
• •
Access Key Secret
These credentials are different from the username and password used to access your Google storage account. You can locate your credentials using the Google Storage key management tool, which you can access from the legacy API menu titled “Interoperable Storage Access Keys.” See https://code.google.com/apis/console/#:storage:legacy. If you cannot locate your credentials, contact your storage provider. Unitrends does not have access to this information. For instruction on adding cloud storage, see "Adding cloud archive storage to the Unitrends appliance" on page 229.
Creating a Rackspace storage account Cre a tin g a Ra c k s p a c e s to ra g e a c c o u n t
Rackspace is a cloud storage provider that uses the OpenStack platform. CloudHook supports Rackspace Cloud Files storage. For details about Rackspace Cloud Files and instructions on creating an account, see Rackspace’s documentation at www.rackspace.com/cloud/files/.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 10: Archiving to the Cloud
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
229
After creating an account and storage containers, you must enter the following storage container credentials when adding the cloud storage to your Unitrends appliance:
• •
Username API Key
You can locate your API key using the account navigation menu. If you cannot locate your credentials, contact your storage provider. Unitrends does not have access to this information. For instruction on adding cloud storage, see "Adding cloud archive storage to the Unitrends appliance" on page 229.
Adding cloud archive storage to the Unitrends appliance You can add cloud archive storage to the Unitrends appliance after creating an account with a cloud storage provider (for instructions, see "Creating a cloud storage account" on page 227) and creating storage buckets or containers. However, before adding cloud archive storage, it is recommended that you create a policy for managing the amount of data you archive to the cloud. For details, see "Managing the amount of data you archive to the cloud" on page 225. You must enter the following account information when adding cloud storage to the appliance:
•
Credentials for the storage bucket or container that you are adding to the appliance Note:
• •
These are the credentials you use to access the particular bucket or container that you are adding to the appliance. These credentials are not the same as the username and password that you use to log in to your storage provider account. If you do not know these credentials, you must contact the storage provider. Unitrends does not have access to this information.
Name of the storage provider Name of the bucket or container that you are adding to the appliance
To add cloud storage to the Unitrends appliance Note:
A cloud storage bucket can receive backups from only one Unitrends appliance.
1
In the Unitrends appliance, select Settings > Storage and Retention > Storage.
2
Click Add Archive Storage in the lower part of the screen. The Add Archiving Storage window displays.
3
Enter a Storage Name. This does not have to match the name you have assigned to the bucket or container in your storage provider account.
4
Select Cloud in the drop-down menu under Type.
5
Select the name of your provider from the Storage Provider drop-down menu.
6
Enter the following credentials depending on your storage provider:
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 10: Archiving to the Cloud
230
Provider
Credentials
Amazon
Access Key ID Secret Access Key
Google
Access Key Secret
Rackspace Username API Key Note:
7
Enter a storage path for your bucket or container. For Amazon and Google, you have the option to enter a folder name (Rackspace does not support folders). The table below provides details. Note:
8
Be sure to enter the credentials you use to access the particular bucket or container that you are adding to the appliance. These credentials are not the same as the username and password that you use to access your storage provider account.
When using folders for Amazon and Google, they appear in the cloud provider menu as a filename prefix only, unless you specify the folder with a trailing '/' (e.g. mybucket/myfolder/). Then the data block files will appear in the cloud provider web menu underneath the folder.
Provider
Storage Path
Amazon
/()
Google
/()
Rackspace
auth.api.rackspacecloud.com/
Check the box next to Specify Purging Threshold and enter a number in GB to specify a maximum size limit for your cloud archive storage. If you do not specify a purging threshold, there is no limit on the amount of data that the appliance can archive to the cloud and your service provider will bill you accordingly. IMPORTANT! To avoid unexpected charges from your cloud storage provider, it is highly recommended that you develop a policy for managing the amount of data that you archive to the cloud and specify a purging threshold. For details, see "Managing the amount of data you archive to the cloud" on page 225.
9
Click Confirm to complete the setup and connect cloud storage as an archive media option. To view the cloud storage you added, select Archive > Media. The appliance may take a minute to scan for new media and you may need to click the scan icon.
10 You are ready to begin archiving backups to the cloud. Proceed to "Archiving backups to the cloud" on page 231.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 10: Archiving to the Cloud
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
231
Archiving backups to the cloud After you complete the "Steps for archiving to the cloud" on page 226, you can archive your backups to the cloud following the same procedures used to archive to other media. For instructions, see "Executing archive jobs" on page 256.
Managing cloud archive storage This section provides instructions for managing cloud archive storage that you have added to a Unitrends appliance (see "Adding cloud archive storage to the Unitrends appliance" on page 229). For more about managing archive media, see "Managing archive media" on page 268. For details, see the following topics:
• •
"To view cloud archive storage" on page 231
•
"To remove cloud archive storage" on page 232
"Modifying cloud archive storage" on page 231
To view cloud archive storage To view cloud archive storage that you have added to a Unitrends appliance, use the instructions described in "Managing archive media" on page 268.
Modifying cloud archive storage You can modify cloud archive storage using the procedure described below in "To modify cloud archive storage" on page 231. If necessary, you can change the bucket or container credentials, change the purging threshold, or disable the purging threshold option. Before changing the purging threshold, it is recommended that you read "About changing the purging threshold" on page 231.
About changing the purging threshold You can increase or decrease the purging threshold, and the changes are applied to all subsequent jobs that write archives to the bucket or container. For instructions, see "To modify cloud archive storage" below. If you increase the threshold, your storage provider will bill you for the additional storage space you are using. If you decrease the threshold and the new setting is less than the amount of space you are currently using on the cloud storage, archive sets are not immediately deleted. Sets that have exceeded their retention period can be purged during the next archive job, and if all sets have exceeded their retention, they can be overwritten during the next job. However, if sets cannot be purged or overwritten, they will continue to reside on the cloud storage even if they occupy an amount of space that is greater than your specified purging threshold. If you want to delete these sets, regardless of their retention settings, you can delete them manually by enabling the File Remove settings and using the Remove Archive sets option. For details, see "Removing cloud archive sets" on page 232. For descriptions of options for decreasing the amount of space used on your cloud storage, see "Reducing your storage footprint on the cloud" on page 233.
To modify cloud archive storage 1
Log in to the Unitrends appliance to which you have added the cloud archive storage you would like to modify.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 10: Archiving to the Cloud
232
2
Select Settings >Storage and Retention > Storage.
3
Uncheck the box under the column labeled Online? to take the storage offline. You cannot modify the storage if this box is checked.
4
Click on the row of the storage item you want to modify. You see the Modify Archiving Storage window.
5
Enter the desired changes, and click Confirm.
6
Check the box in the column labeled Online? to bring the storage back online. Note:
If you do not check this box after modifying the storage, you will not be able to archive to it.
To remove cloud archive storage 1
Log in to the Unitrends appliance from which you would like to remove the cloud archive storage.
2
Select Settings >Storage and Retention > Storage.
3
Click on the storage item you want to delete. You see the Modify Archiving Storage window.
4
Click Delete.
Removing cloud archive sets Removing an archive set removes the set information from the Unitrends appliance, and it can be imported again at any time. Removing a set does not delete it from the archive media. For details, see "Managing archive media" on page 268. However, for sets archived to the cloud, you can enable the Remove Files setting to delete sets from the cloud storage when you remove them from the appliance. If you enable this setting, the sets are deleted from the archive media when you remove them from the appliance and these sets cannot be retrieved. When the Remove Files setting is enabled, removing sets from the appliance deletes them from the cloud storage regardless of their retention settings. For instructions on enabling or disabling the Remove Files setting, use the procedure described below.
To enable or disable the Remove Files setting for cloud archives WARNING! If you enable this setting, sets are deleted from the cloud storage when you remove them from the Unitrends appliance. Sets are deleted even if they have not exceeded their retention settings. 1
In the Unitrends appliance from which you are archiving to cloud storage, select Settings > System, Updates, and Licensing > General Configuration (Advanced).
2
Select CloudHook in the Section column, and click the arrow to list the folder’s contents.
3
In the Name column, select RemoveFiles. The Modify Master Configuration Entry box displays.
4
In the Value field, enter 1 to enable the setting or 0 to disable it.
5
Click Confirm to save the setting.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 10: Archiving to the Cloud
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
233
Reducing your storage footprint on the cloud Because storage providers charge based on the amount of space used on cloud storage, Unitrends provides you with several options for decreasing the amount of data residing on your cloud storage. The table below describes these options. For more about managing space on your cloud archives, see "Managing the amount of data you archive to the cloud" on page 225. Option
Description
Decrease the purging threshold
This option decreases the amount of data the Unitrends appliance can archive to the storage bucket/container. However, it does not immediately delete archive sets. To reduce your storage footprint, use this option in conjunction with the other options discussed in this table. For instructions on decreasing the purging threshold, see "Managing cloud archive storage" on page 231.
Purge sets
Purge deletes sets that have expired retention to create enough space for the current job without exceeding the purging threshold. This option creates only enough space to complete the current job. For details, see "Purge" on page 204.
Overwrite Overwrite deletes all sets on the cloud storage and replaces them with the sets in the sets current job. Overwrite occurs only if all sets on the media have exceeded their retention settings. For details, see "Overwrite" on page 206.You can reduce your cloud storage footprint by decreasing the purging threshold, overwriting the existing data, and developing an archiving strategy based on the lower purging threshold. Delete sets manually using the Remove Sets option
For cloud storage, you can enable the Remove Files setting and then use the Remove Sets option to manually delete sets. This option deletes sets regardless of their retention settings. For details, see "Removing cloud archive sets" on page 232. You can reduce your cloud storage footprint by decreasing the purging threshold, manually deleting sets, and developing an archiving strategy based on the lower purging threshold.
Delete all sets using the Prepare option
Preparing media deletes all sets regardless of retention settings, but the S3QL file system remains on the media. For instructions, see "Preparing archive media" on page 254. You can reduce your cloud storage footprint by decreasing the purging threshold, preparing the cloud storage media, and developing an archiving strategy based on the lower purging threshold.
Restoring from cloud archives Once you have archived backups to the cloud, they are available for restore. You can view archive sets using the procedures described in "Viewing archives" on page 261. When you restore a backup from a cloud archive, it is restored to the appliance to which you have attached the cloud archive storage. You can then restore the backup or individual files to a client that is registered to the appliance. You can restore from cloud archives following the same procedure used to restore from other archive media. For instructions, see "Archive restore" on page 212 for complete details.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 10: Archiving to the Cloud
234
For the restore, the cloud archive storage can be attached to any appliance that supports CloudHook. You do not have to restore to the original appliance. However, you must remove the archive storage from the original appliance before mounting it to a different appliance for the restore. For instructions, see "To remove cloud archive storage" on page 232.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 10: Archiving to the Cloud
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
235
Chapter 11: Archiving to Tape The Unitrends archiving feature enables you to archive local or replicated backups to tape. This chapter discusses special considerations for archiving to tape. Before archiving to tape, it is recommended that you read the "Archiving Overview" on page 201. This chapter describes procedures specific to tape archiving. For procedures common to all archive media, such as viewing archives and managing archive schedules, see "Archiving Procedures" on page 253. See the following topics for details and instructions:
• • • • • • • •
"About archiving to tape" on page 235 "Steps for archiving to tape" on page 237 "Prerequisites and considerations for archiving to tape" on page 238 "Managing tape inventory" on page 239 "Scheduling strategies for tape archives" on page 244 "Archive to tape setup" on page 245 "Archiving backups to tape" on page 250 "Restoring from tape" on page 250
About archiving to tape You can archive your Unitrends backups to tape using a disk-to-disk-to-tape (D2D2T) system of your choice. Because various tape drives and autoloaders behave in different ways, the Unitrends system is designed with configuration options that maintain compatibility across a range of products. Before archiving with a D2D2T system, you must configure it for use with your Unitrends appliance. For instructions, see "Archive to tape setup" on page 245. An individual archive set can be written across multiple tapes, and when you restore from an archive, the Unitrends appliance must be able to access all tapes for a given set. To facilitate the restore process and the management of your tapes, the appliance uses as few tapes as possible when running multi-tape archive jobs. For more details about archiving to tape, see the following topics:
• • •
"Tape archive terminology" on page 235 "System-generated serial numbers" on page 236 "Tape barcodes" on page 237
Tape archive terminology The table below lists commonly used tape archiving terms. See the figures after the table for diagrams illustrating these terms.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 11: Archiving to Tape
236
Term
Description
Autoloader A device that has an internal tape changing mechanism as well as one or more drives, which can read from and write to magnetic tape media on more than one tape. This term is also used in Unitrends documentation in reference to autoloaders and tape libraries, which are used in the same way in the Unitrends D2D2T system. Slot
A numbered storage bay for a tape inside a tape autoloader/library.
Tape device
Either a tape drive or tape autoloader.
Tape drive
A device that reads from and writes to magnetic tape media. Only one tape is loaded into a drive at a time, and it takes several minutes to load each tape.
Volumes
Archive sets that might be contained within one tape or might span several tapes.
Figures illustrating tape archive terminology In this example, the tape in slot 8 is loaded into tape drive 1.
In this example, the volume (archive sets) resides on three tapes.
System-generated serial numbers The system generates serial numbers to identify tapes and writes the serial number onto the tape media. However, these serial numbers are not visible to users. If your tape device does not support
Legacy Recovery-Series and UEB Administrator's Guide Chapter 11: Archiving to Tape
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
237
barcode technology, you must manually locate tapes. Unitrends strongly recommends that you develop a labeling system for easy management of your tapes. When you label a tape, make sure to include the slot number the tape occupied when it was used for an archive job and other identifying information that will enable you to locate the tape.
Tape barcodes The tape barcode features allows you to view tape information, tape locations, and select target slots when archiving. On tape devices that support barcodes, the system recognizes the barcode as soon as you insert the tape into the library. This decreases your time to locate tapes (even tapes stored offsite) and improves archiving performance. Here are more details about the barcode feature:
•
This feature works only with tape devices (including autoloaders) that have barcode readers and tapes that have valid barcode labels. If your tape device does not have a barcode or a standard barcode format, you can still use your tape device, but you must develop a strategy for manually locating your tapes. (See "Managing tape inventory" on page 239.)
•
You can view barcode and/or tape location information in several places within the Archive section of the Unitrends appliance (if the tapes have readable barcodes). See "To view the tape library and tape locations" on page 239.
• •
You can designate the target slot location when performing an archive.
• •
Unitrends supports a mixed usage of tapes for barcodes, such as LT05 and LT06.
•
When performing a restore, if you have moved tapes with barcodes to different slots, the system reads the barcodes and determines the correct location of the tapes.
•
When you insert tapes into the tape library for import, the appliance scans the barcodes and identifies the slots that the tapes are occupying. It can also put together the unordered set of tapes in the slots. (For example, tapes were in slots 1, 2, 3, and 4 during the backup, removed, then inserted into slots 8, 9, 10, and 11. The system recognizes the barcodes regardless of the slot location.)
Barcode labels for tape media use Code 39 (sometimes called Code 3-of-9), which is a widely used industrial standard. There are three wide elements and six narrow elements for every nine elements.
If a barcode is available, the appliance automatically utilizes it during the restore process. No special procedures are required for the appliance to use a barcode during the restore process.
Steps for archiving to tape This section provides an overview of the steps you must complete to configure a Unitrends appliance for archiving to tape. Step 1:
Review "Prerequisites and considerations for archiving to tape" on page 238.
Step 2:
Develop a strategy for managing the space on your tapes. See "Managing space on archive media" on page 202 and "Use of space on archive tapes" on page 240.
Step 3:
Connect your tape archiving device to the Unitrends appliance and configure it to receive data from the appliance. For instructions, see "Archive to tape setup" on page 245.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 11: Archiving to Tape
238
Step 4:
Plan your tape archiving strategy. For recommendations, see "Scheduling strategies for tape archives" on page 244.
Step 5:
Run archives using the procedures in "Archiving backups to tape" on page 250.
Prerequisites and considerations for archiving to tape This section discusses prerequisites and considerations for archiving to tape. For details, see the following topics:
• •
"Tape archive prerequisites" on page 238 "Special considerations for archiving to tape" on page 238
Tape archive prerequisites Unitrends supports D2D2T archiving to tape from select Unitrends Recovery-Series appliances and UEB installable software deployments. Tape archive is not supported with UEB on Hyper-V and UEB on VMware appliances. For supported Recovery-Series systems, see the Recovery-Series Appliance Family Data Sheet. The following requirements must be met before setting up tape archiving on Recovery-Series systems: System
Requirement
Recovery-Series or UEB installable software appliance
The appliance must be licensed with the advanced archiving (ADX) feature. Check for ADX in the license string under Settings > System, Updates, and Licensing > License.
Tape device
• •
The tape device must be either SCSI, SAS, or Fibre Channel.
•
The tape or set of tapes must have adequate space to store the data being archived. If the archive does not fit, the job fails.
•
If using tape barcodes, your tape device must have a barcode reader and tapes must have valid barcode labels.
The tape device must be configured as described in "Configuring the tape archive device in the Unitrends system" on page 246.
Special considerations for archiving to tape Before running on-demand or scheduled archives, note these additional tape considerations: Tape Consideration
Description
Purge option
The archive purge option is not supported.
Compression option
If the tape device is configured for hardware compression, it is recommended that you run archives without compression. Since the appliance doesn’t have to compress the data, archives run more quickly.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 11: Archiving to Tape
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
239
Tape Consideration
Description
Encryption option
If the tape device is configured for encryption, archives are encrypted regardless of this setting.
For multi-tape archives
All tapes configured for the archive job are labeled as part of the archive and must be rotated as a set. All tapes must be available to restore data. See "Managing tape inventory" on page 239 for details.
Tape devices with barcodes
On tape devices that support barcodes, the system recognizes the barcode as soon as you insert the tape into the library. The system supports a mixed usage of tapes for barcodes.
Managing tape inventory When archiving to tape, it is very important that you managing your tape inventory carefully to ensure that your tapes have enough space for your archive sets and that the Unitrends appliance will be able to access all the tapes for a given archive set if you need to restore data from it. This section provides instructions for viewing your tape library, identifies considerations for managing your tape inventory, and explains how the Unitrends appliance uses the available space on your archive tapes. For details, see the following topics:
• • • •
"To view the tape library and tape locations" on page 239 "Requirements and considerations for managing your tape inventory" on page 240 "Use of space on archive tapes" on page 240 "Email report for tape archives" on page 243
To view the tape library and tape locations This procedure allows you to view the current status of tapes and, if applicable, the barcodes associated with the tapes. When archiving, this view allows you to find the slot locations for the tapes and also ensures that you have space. See "Tapes with barcodes" on page 245 for more information. Note:
If your tape device does not have a barcode, you must locate tapes manually. It is strongly recommended that you develop a labeling system for managing tapes that do not have barcodes.
1
Select Archive > Media. You see the connected media in the Archive Media center stage area.
2
If necessary, click re-scan for media.
3
Click the tape media line in the Archive Media center stage area. Notice that the Tape Library button at the bottom of the screen is enabled. Note:
4
If there are no tape libraries available, this button is disabled.
Click the Tape Library button. You see the Tape Library Information screen.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 11: Archiving to Tape
240
Field
Description
Status
Indicates if there is a tape in the drive (empty or full).
Slot
The slot number associated with the tape. Scroll down to see additional slots, if applicable.
Tape A check-mark or X indicates if the slot is full (contains a tape) or not. Hover over Available? the symbol for the description. Barcode
5
The barcode number associated with the tape slot. If there is no number, the corresponding tape does not have a barcode or the system could not read the barcode. Barcodes can be up to 99 digits. For lengthy numbers, you can hover over the barcode number area to see the full number.
Click Close when you are done.
Requirements and considerations for managing your tape inventory This section lists considerations for managing tape inventory. For more details, see "Use of space on archive tapes" on page 240.
•
The system uses only one tape drive at a time for archiving. You can connect more than one tape drive; however, the other tape drive or drives must be disabled. You can switch between them, as long as only one of them is active.
•
An individual archive set can be written across multiple tapes. For multi-tape archives, all tapes configured for the archive job must be present to restore data.
• •
All tapes configured for a given archive job must be rotated as a set.
•
It is strongly recommended that you develop a labeling system to help you manage tapes that do not have barcodes. Prior to pulling a tape without a barcode, note its slot number. When you pull a set of tapes, be sure to physically label each tape with the slot number and other identifying information for speedy recovery.
•
Prior to pulling a tape with a barcode, go to Archive > Media and click Tape Library at the bottom of the screen. You can view slot numbers, barcode numbers, and other information. When you pull a set of tapes with barcodes, the system automatically recognizes the barcodes when you insert the tapes back into the library. (See "To view the tape library and tape locations" on page 239.)
•
If your tapes have barcodes, there are no special procedures when performing a restore. The system automatically uses the barcode during the restore process. If you have moved tapes with barcodes to different slots, the system reads the barcodes and determines the correct location of the tapes.
To restore from tapes without barcodes, archive media must be loaded into the same slot position as when the archive was written.
Use of space on archive tapes When managing your tape inventory, it is important to understand how the Unitrends appliance uses the available space on your tapes. This section explains how the available space is used.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 11: Archiving to Tape
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
241
See the following topics for details:
• • •
"Archive tape status" on page 241 "Writing archive sets across multiple tapes" on page 241 "Examples of how the Unitrends appliance uses the available space on archive tapes" on page 242
Archive tape status Arc h iv e ta p e s ta tu s
The appliance stores status information for prepared tapes, and it uses this information to determine whether a tape is available for an archive job. The table below provides details. Tape status
Description
Empty
The tape does not contain any data, and its entire capacity is available for an archive job.
Occupied
The tape contains archived data, but some space is free and the tape can be used for a new archive job. Note:
Full
Limitations of the tape media prevent the appliance from displaying the amount of available space.
The tape is full and not available for archive jobs unless the existing data is overwritten.
Writing archive sets across multiple tapes Writn g a rc h iv e s e ts a c ro s s mu ltip le ta p e s
Consider the following for archive sets written to multiple tapes:
•
The status of an archive tape determines whether it can be used for an archive job. For details, see .
•
Multiple-tape jobs are written to as few tapes as possible to facilitate restores. For details, see "Examples of how the Unitrends appliance uses the available space on archive tapes" on page 242.
•
For the first tape used in a multi-tape archive job, the status can be either empty or occupied. For each subsequent tape, the appliance uses only tapes with status empty. For more details, see "Successful archive job written across multiple tapes" on page 242 and "Archive set written to as few tapes as possible" on page 243.
•
If there is not enough space on a tape for an entire archive set, the job uses the available space on the first tape in the specified range and then searches for subsequent tapes with status empty to complete the job. If there are not enough tapes available with this status, the job fails. However, although the job itself fails, some backups might be archived successfully and could be available for restore. For more details, see "Failed attempt to write an archive set across multiple tapes" on page 242.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 11: Archiving to Tape
242
Examples of how the Unitrends appliance uses the available space on archive tapes Ex a mp le s o fh o wth e Un itre n d s a p p lia n c e u s e s th e a v a ila b le s p a c e o n a rc h iv e ta p e s
This section contains figures to help you understand how available tape space is used during archive jobs. The figures specify how much space is available on tapes with status occupied; however, these numbers are included for explanatory purposes only. Due to limitations of tape media, the Unitrends appliance cannot display the amount of space available on an archive tape. See the following topics for details:
• • •
"Successful archive job written across multiple tapes" on page 242 "Failed attempt to write an archive set across multiple tapes" on page 242 "Archive set written to as few tapes as possible" on page 243
Successful archive job written across multiple tapes Su c c e s s fu la rc h iv e jo b write n a c ro s s mu ltip le ta p e s
This figure illustrates how an archive set with 100 GB of data is written across multiple tapes. The tape range for the job has been specified as 1 - 4. The job begins on Tape 1, which has a status of occupied and 40 GB of free space. The job uses this space, but it needs an additional 60 GB. This data would fit on Tape 2 or 3, both of which have status occupied. However, because all subsequent tapes used in a multi-tape job must have status empty, the appliance does not use Tape 2 or 3. Instead, it completes the job by writing the remaining 60 GB to Tape 4, which has the status empty.
Failed attempt to write an archive set across multiple tapes F a ile d a te mp to write a n a rc h iv e s e ta c ro s s mu ltip le ta p e s
This figure illustrates how an attempt to write a 75 GB set across multiple tapes could fail. The tape range for the job has been specified as 1 - 5. The job does not use Tape 1 because it has a status of full. Tape 2, with status occupied, has 50 GB available, so the job uses this space. To complete the job, the appliance must locate an additional 25 GB of usable space. Tapes 3 and 5 each have enough space to write the rest of the set, but the appliance cannot use them to complete the job because their status is occupied. The appliance searches for a tape with status empty, and because it cannot find one in the specified range, the job fails. However, because part of the job was written to Tape 2, the resulting archive set contains a subset of the desired backups, and it is possible that these backups can be restored.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 11: Archiving to Tape
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
243
Archive set written to as few tapes as possible Arc h iv e s e twrite n to a s fe wta p e s a s p o s s ib le
This figure illustrates how the Unitrends appliance uses as few tapes as possible to write a 75 GB archive set across multiple tapes. The tape range for the job has been specified as 1 - 10. The job does not use Tape 1 or 2 because both have a status of full. Tape 3, with status occupied, has 15 GB available, so the job uses this space. The remaining 60 GB is written to Tape 10, with status empty. The combined amount of free space on Tapes 4 - 9 is 60 GB, but if the appliance used this space for the job, it would need a total of seven tapes for the archive set. Because it uses Tape 10 instead, the job requires only two tapes for the entire archive set. To restore this archive set, only tapes 3 and 10 are required.
Email report for tape archives To facilitate management of your tape inventory, e-mail reports for tape archive jobs include details about the archive sets written to each tape. These reports contain the following information:
• • • • • • • • • • • • • •
Archive job number Start time for the job Comment indicating the number of archive sets that were successfully written to tape Indication of whether system metadata was written successfully Number of backups and total amount of data written in the job Number of local directories written in the job Name of the tape device used for the job Tape slot range selected for the job Slot number for each tape actually used for the job Barcode number for each tape used (if applicable) Status of the tape (for details about tape status, see "Archive tape status" on page 241) Numbers for the archive sets written to each tape Date when each set was written to the tape Retention status for each set
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 11: Archiving to Tape
244
Scheduling strategies for tape archives There are special scheduling considerations when archiving with tape. See the following topics for details:
• • • • • •
"Overwrite option" on page 244 "Test option" on page 244 "Single tape archives" on page 244 "Autoloader" on page 244 "Multiple tape drives" on page 245 "Tapes with barcodes" on page 245
Overwrite option In general, schedules with overwrite on and off can be used in staggered form to create new data sets and append to these sets. For more details, see the "Archiving Overview" on page 201. For example, the following schedule would result in a new data set each week:
•
Weekly, Monday, Last Backups, Overwrite true: copies weekend master backups to start of tape(s).
•
Weekly, other days, Last Backups, Overwrite false: appends weekday differentials to tape(s).
In this scenario, the tape(s) should be switched between completion of the Sunday job and the start of the Monday job. The retention period should be set to protect data throughout the rotation period. If four rotating sets of tapes are used, a 21-day retention setting would protect the media from the end of the Sunday job through the Monday job three weeks later, when that media is reused.
Test option When creating the schedule, use the archive Test option to estimate the amount of data that will fit on a tape or set of tapes. Keep in mind that this number is an estimate because compression on the drive and/or archive options, so determining exactly how much fits can be a matter of trial and error.
Single tape archives For single tape archives, using an overwrite scheme on the same tape each week is not recommended. At the start of the archive job that has overwrite set to true, no current archive data will exist as a result of the overwrite. Therefore, the schedules should be set up using either a date range with tapes switched out daily, or last backups with tapes switched out periodically as they fill up.
Autoloader An autoloader allows both larger backups and archived data sets through the use of tape spanning— writing an archive across multiple tapes—and may help automate rotation as well. As long as the autoloader holds enough tapes to maintain two sets of data, they can be used in a scheduled, rotating manner. In this scenario, four or more schedules (two+ pairs) are used:
•
Bi-Weekly (1), Monday, Last Backups, Overwrite true: copies weekend master backups to start of tape(s)
•
Bi-Weekly (1), other days, Last Backups, Overwrite false: appends weekday differentials to tape(s)
Legacy Recovery-Series and UEB Administrator's Guide Chapter 11: Archiving to Tape
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
245
•
Bi-Weekly (2), Monday, Last Backups, Overwrite true: copies weekend master backups to start of tape(s)
•
Bi-Weekly (2), other days, Last Backups, Overwrite false: appends weekday differentials to tape(s)
This set of schedules starts on a certain week and points to a certain set of slots, with the other set starting on another week and pointing to a different set of slots. (This can be extended to as many sets that fit in the autoloader.) If scheduled in this manner, you never have to touch the tapes unless they are to be taken off-site or stored securely. See "To configure an autoloader" on page 248 for more information.
Multiple tape drives You can connect more than one tape drive; however, the system only uses one tape drive at a time for archiving. The other tape drive or drives must be disabled. You can switch between them, as long as only one of them is active.
Tapes with barcodes The barcode feature works with tape devices that have barcode readers and tapes that have valid barcodes. The tape barcode feature allows you to view tape locations and barcode information, and to select target slots when archiving. See "Archive settings" on page 255 for more information about target slots.
Archive to tape setup This section describes the steps for setting up a tape-based archiving system. Once configured, these settings do not need to be modified unless the tape device is changed. For requirements, see "Requirements and considerations for managing your tape inventory" on page 240 before beginning these setup procedures:
Step 1:
Step 1:
"Connecting the tape archiving device" on page 245
Step 2:
"Configuring the tape archive device in the Unitrends system" on page 246
Connecting the tape archiving device Co n n e c tin g th e ta p e a rc h iv in g d e v ic e
Connect the tape drive or autoloader device to your Recovery-Series appliance. Note:
Even though you can connect multiple tape drives, the system only uses one tape drive at a time for archiving.
To connect a tape archiving device to a Unitrends Recovery-Series appliance 1
Connect the tape drive or autoloader to the Unitrends system using a SAS or LVD SCSI cable. If using a LVD SCSI cable, ensure that a SCSI bus terminator is installed on the tape device according to the vendor’s documentation.
2
Once connected, power on the tape device.
3
Once the tape device initializes, reboot the Unitrends system. This enables the appliance to discover the tape device.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 11: Archiving to Tape
246
Step 2:
Configuring the tape archive device in the Unitrends system Co n fig u rin g th e ta p e a rc h iv e d e v ic e in th e Un itre n d s s y s te m
This section discusses how to configure your tape archive devices a after they have been connected to the Recovery-Series appliance. Tape drives and autoloaders must be configured before you can begin archiving. If you are using an autoloader make sure you configure the tape device before the autoloader. After the tape archive devices are configured, you must prepare the archive media. The media can be prepared manually or automatically by the Unitrends appliance. See the following topics for information:
• • • •
"About preparing tapes" on page 246 "To configure a tape drive" on page 246 "To configure an autoloader" on page 248 "To prepare archive tapes" on page 249
About preparing tapes Ab o u tp re p a rin g ta p e s
Preparing tapes is a requirement for archiving to tape. Preparing the tape overwrites all existing data and reformats the tape for archiving with Unitrends. Tapes can be prepared automatically or manually. To automatically prepare tapes, set use_unlabeled_tapes to True (step 7 on the facing page in "To configure a tape drive"). All tapes within the selected range, are prepared before the first archive job. If this field is set to False, archiving does not write or prepare data to a tape that have not been prepared. Setting the field to False allows for greater protection of archive media containing non-Unitrends backups at the cost of having to manually prepare tapes before they can be used for archiving. The use_unlabled_tapes setting has no impact on tapes containing Unitrends backups. Use retention settings to prevent archive jobs from overwriting data on these tapes. For instructions on preparing tapes manually, see "To prepare archive tapes" on page 249.
Preparing tapes with autoloaders that do not have barcode readers If your autoloader does not read tape barcodes, and you have a combination of tapes with Unitrends and non-Unitrends data, it is recommended that you set use_unlabeled_tapes to False to thoroughly protect your non-Unitrends data. When an autoloader has a tape in the drive, it recognizes the slot from which that tape was loaded. Some autoloaders forget the tapes slot assignment if the autoloader is turned off with a tape still in the drive, or if there is an unexpected loss of power. An unload operation may then fail to return the tape to its proper slot, which may cause an incorrect assignment of the tape during archiving. For example, if you have 10 slots, and you set your Unitrends archiving range to 1-8; the sudden loss of power could cause slot 9 to placed in slot 4, and could result in the tape from slot 9 (now slot 4) being prepared and written over. If set to False, you must prepare tapes before archiving as described in "To prepare archive tapes" on page 249.
To configure a tape drive 1
In the Unitrends appliance, select Archive > Settings > Archive Media.
2
Under Configurable Archive Media, click to scan for media. Connected tape drives and autoloaders display. If the device does not display in the list, make certain the connections are secure, power cycle
Legacy Recovery-Series and UEB Administrator's Guide Chapter 11: Archiving to Tape
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
247
the device, and then reboot the appliance (Settings > System, Updates, and Licensing > Shutdown). 3
Select the tape device in the list of configurable devices.
4
Select is_available and set it to True. This allows the tape device to be used for archiving. Click Confirm.
5
If you have an autoloader, select parent_changer and select the desired autoloader from the drop down list. Click Confirm. This creates an association between the tape drive and the autoloader.
6
Select parent_changer_driveno and enter the drive number. Click Confirm. The drive number is usually 0, except in the case of an autoloader with multiple tape drives. Occasionally there may be a different number in a single drive system.
7
To automatically prepare tapes, select use_unlabeled_tapesand set it to True. If this field is set to False, the appliance does not automatically prepare any tapes and cannot use unprepared tapes for archiving. For more information, see "About preparing tapes" on page 246.
8
If desired, configure additional settings. The default settings are recommended, but if you wish to alter the settings, see the setting descriptions below. Se tin g d e s c rip tio n s
When restoring data, the blocksize and compression settings must match the setting at the time the tape was written. The settings with an * should only be changed before archiving to a new tape. Setting
Setting Description
hardware_read_blocksize*
Sets the blocksize of tape driver to use during tape read operations.
software_read_blocksize*
Sets the maximum size of data blocks to read from tape driver. The optimal value depends on the particular tape drive.
hardware_write_blocksize* Sets the blocksize of tape driver to use during tape write operations. software_write_blocksize*
Sets the size of the data blocks to write to the tape driver.
eject_before_unload
Determines whether or not this changer requires its tape drive (s) to be sent an unload command before it can put a tape back in its slot.
eject_wait_time
Required by some tape devices, this sets the number of seconds to wait between issuing an eject command and issuing an unload command to an autoloader.
max_ready_time
Sets the maximum number of seconds to wait for a tape drive to become ready after a tape is loaded. This is beneficial if your tape device takes a long time before it is ready.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 11: Archiving to Tape
248
9
Setting
Setting Description
hw_compression_ supported*
States whether (true) or not (false) the device supports hardware compression.
hw_compression*
States whether (true) or not (false) you want to use hardware compression on tape device.
max_command_time
Sets the maximum number of seconds to wait for tape commands to complete.
init_cmd
Required by some devices, enter a command(s) necessary to initialize the device.
rewind_cmd
Enter a command to rewind the tape.
space_to_next_cmd
Enter a command to space to next file on tape.
space_to_end_cmd
Enter a command to space to end of tape.
load_cmd
Enter a command to load tapes. (Most drives will not need this set.)
unload_cmd
Enter a command to unload/eject tapes.
set_blcoksize_cmd
Enter a command to set tape hardware blocksize.
Click Close once all settings are configured. Repeat these steps for all desired tape drives.
10 Continue with the following applicable procedures:
• •
If you have an autoloader, see "To configure an autoloader" on page 248.
•
If you are ready to archive and do not need to prepare archive tapes, see "Archiving backups to tape" on page 250
If you selected False in step 7 on the previous page above, see "To prepare archive tapes" on page 249
To configure an autoloader Before configuring an autoloader, you must configure your tape drive. For instructions, see "To configure a tape drive" on page 246. 1
In the Unitrends appliance, select Archive > Settings > Archive Media.
2
Under Configurable Archive Media, click to scan for media. Connected tape drives and autoloaders display. If the device does not display in the list, make certain the connections are secure, power cycle the device, and then reboot the appliance (Settings > System, Updates, and Licensing > Shutdown).
3
Select the autoloader in the list of configurable devices.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 11: Archiving to Tape
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
249
4
Select is_available and set it to True. This allows the autoloader to be used for archiving. Click Confirm.
5
Select available_slots and assign a slot range within the autoloader for the Unitrends system to access. This defines the tapes to which the archives are written. Click Confirm.
6
If desired, configure additional settings. The default settings are recommended but if you wish to alter the settings, see the table below: Setting
Setting Description
unload_quiesce_time
Determines the number of seconds to wait after an unload command completes, to allow a changer to quiesce and finish the unload operation in case it returns ready before it is actually finished.
switch_tapes_on_io_error
Decides whether or not to switch tapes upon an input/output error from the drive while attempting to write archive data. If True, archiving attempts to use the next tape; if False, the job fails.
max_command_time
Sets the maximum number of seconds to wait for tape commands to complete.
init_cmd
Enter a command(s) necessary to initialize the device.
7
Click Close once all settings are configured. Once a tape drive is associated to the changer, the tape drive and the autoloader display as a single device on the Archive Now or Archive Schedule page. Repeat these steps for all desired autoloaders.
8
Continue with the following applicable procedures:
•
If you selected, False in step 7 on page 247 of "To configure a tape drive", see "To prepare archive tapes" on page 249.
•
If you are ready to archive and do not need to prepare archive tapes, see "Archiving backups to tape" on page 250
To prepare archive tapes If use_unlabelled_tapes is set to False in Archive > Settings > Archive Media, tapes must be manually prepared using the following procedure before to archiving. For more information, see "About preparing tapes" on page 246. 1
In the Unitrends appliance, select Archive > Settings > Archive Media. The system checks for connected archive media. If necessary, click re-scan for media. Connected media display in the Archive Media area.
2
Select the tape device. If the device is an autoloader, enter the slots in which the tapes are inserted.
3
Enter a media label to describe the tapes.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 11: Archiving to Tape
250
4
Click Prepare. The system overwrites all existing data and formats the tapes with the Unitrends file system. Tapes are now ready for use.
5
Continue to "Archiving backups to tape" on page 250.
Archiving backups to tape After you have configured the tape device, you can write archives to your tapes using the same procedures for archiving with other media. For standalone tape drives, ensure there is a tape in the drive. For autoloaders, load tapes in the desired slots according to the manufacturer’s documentation. For instructions, see "Executing archive jobs" on page 256.
Restoring from tape Restoring from tape archive is similar to restoring from disk archive. The archive catalogs are stored in the appliance database. To successfully restore an archive from tape, be sure the tape drive’s read_blocksize and compression settings are the same as the write_blocksize and compression settings used when the tape was originally archived. If these settings are different, archiving may not be able to read any data from the tape. If the tapes are from another system or this system has been recently recovered from disaster, the catalogs can be imported from tape. To do this, insert the tape into the drive (or tapes into the autoloader) and import. Autoloader tapes can be imported without regard to order; the archiving system determines the correct order automatically. (If some tapes from the archive set to be imported/restored are missing or bad, data from other tapes is still available.) See "To import archive sets" on page 271. When performing a restore for tapes with barcodes, the system reads the barcodes and determines the correct location of the tapes. There are no special restore procedures for tapes that have barcodes.
To restore from tape Note:
When restoring from tape, you must restore the entire backup. You cannot restore a specific file from a tape archive.
1
Select Archive > Status.
2
Select a client or backup and restore as you would for disk.
3
For tapes with barcodes, click on Tape Details to see information about volume, tape device serial number, and barcode number. (The Tape Details button does not display for media that is not tape.)
4
The system automatically identifies the tape, loads it (if the tape is present in the autoloader), and informs you if the correct tape cannot be found for the specified archive.
5
Once the tape is identified, the restore starts.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 11: Archiving to Tape
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
251
6
For restore of an archive that originally spanned tapes, ensure that all spanned tapes are in the autoloader.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 11: Archiving to Tape
252
Legacy Recovery-Series and UEB Administrator's Guide Chapter 11: Archiving to Tape
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
253
Chapter 12: Archiving Procedures This chapter explains the settings and procedures used to archive data. Before performing the procedures described in this chapter, it is recommended that you read "Archiving Overview" on page 201, which explains how archiving works, provides recommendations for managing and creating space on archive media, and discusses concepts referenced throughout this chapter. It is also recommended that you read the chapter on your selected archive media. See the following topics for details:
•
"General steps for archiving backups" on page 253
• • • • • • • • •
"Preparing archive media" on page 254 "Archive settings" on page 255 "Executing archive jobs" on page 256 "Monitoring running archive jobs" on page 259 "Stopping and starting the archive process" on page 261 "Viewing archives" on page 261 "Managing archive schedules" on page 267 "Managing archive media" on page 268 "Restoring from archives" on page 272
General steps for archiving backups Follow the steps described here to use the archiving feature. Steps may vary depending on your chosen archive media. Step 1:
Review the "Additional archiving considerations" on page 209.
Step 2:
Select an archive media type. For details, see "Archive media types" on page 210.
Step 3:
Develop a strategy for managing the space on your archive media. See "Managing space on archive media" on page 202 and the applicable section in the chapter on your selected media type.
Step 4:
(Optional) Prepare archive media. For details, see "Preparing archive media" on page 254.
Step 5:
Set up archiving using the procedures described in one of the following chapters:
• • • •
"Archiving to Disk" on page 215 "Archiving to Network Storage" on page 221 "Archiving to the Cloud" on page 223 "Archiving to Tape" on page 235
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 12: Archiving Procedures
254
Step 6:
Review "Archive settings" on page 255.
Step 7:
Run archives using the procedures described in "Executing archive jobs" on page 256.
Preparing archive media If you would like to clear existing data from your archive media before you begin archiving Unitrends backups, you can reformat the media and delete all existing data using the procedure described in this section. For the disk archiving unit, eSATA, and USB archive devices, it is recommended that you prepare new drives before they are used for the first time. Once you have archived with the drives, you can prepare them again, if desired, to permanently delete all existing data. (For more details about archiving to disk devices, see "Archiving to Disk" on page 215.) The prepare operation is possible only if the media is unmounted. Before preparing media that contains data, be sure that you have another copy of the data or that you no longer need it. Once you prepare the media, its data cannot be retrieved. WARNING! This procedure permanently deletes any existing data and formats the drive.
To prepare archive media 1
Log in to the Unitrends system and select Archive > Media. Connected media display in the Archive Media area. For details, see "To view connected media" on page 268. To refresh, click re-scan for media.
2
Select the media in the Archive Media area. A Media Label field displays at the bottom of the screen.
3
Enter a media label for this drive or group of drives. Labels may be a maximum of 12 alphanumeric characters and may include an underscore. Use a descriptive labeling system so you can easily locate the drive(s) in the event that this data is required for a restore. For multi-drive disk-archiving systems, you may load one or more drives. Archives are written across all available drives. Once you archive to multiple drives, you must have all drives to restore data as the system treats them as a single logical volume. See "To add a drive to a multi-drive system" on page 219.
4
Click Prepare below. WARNING! This option should be used with extreme caution. Any existing data is permanently deleted from the media.
5
Click Yes to confirm that you wish to prepare the media.
6
The system permanently deletes any existing data and formats the media with the Unitrends file system. The light bulb icon changes from gray to yellow, indicating that the drive(s) is now ready for use.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 12: Archiving Procedures
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
255
Archive settings This section explains the various settings and options for your on-demand archives and archive schedules. The settings you choose determine which backups are archived, the attributes of the archives created in the current job, and how any existing archives on the media are handled. The following table provides details for the settings and options in the Archive Now and Schedule Archive tabs. Setting
Description
Date Range
Dates of the backups to be archived in this set. By default, the last successful backups of the chosen types and clients are archived.
Clients to Archive
Clients whose backups will be archived in this job.
Backup Types to Archive
Backup types included in this archive job.
Target of Archive
Archive media to which this set will be written. Click media. Choose a target from the list. Note:
Archive options
to scan for connected
If using a disk archiving unit with a single drive, it will show as eSATA when scanning for a target device.
Select the desired options.
Overwrite
Check this box to permanently delete all existing archives from the media before creating the new archive set. Nothing is overwritten unless all sets on the media have exceeded their retention settings. For details, see "Overwrite" on page 206.
Purge
Check this box to purge archive sets to create space for the current job. Only sets that have exceeded their retention period are purged. Nothing is purged if there is already sufficient space for all the backups in the job. For details, see "Purge" on page 204. Purge is not supported for tape media.
Email Report
Check this box to select an email report of the archive operations. If this is a schedule, the archive is included in the daily schedule report.
Compress
Check this box to compress backups when written to the archive.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 12: Archiving Procedures
256
Setting
Description
Encrypt
Check this box to encrypt the backups when written to the archive (if already encrypted, they are not encrypted again). This option is available only for systems that support encryption.
Seed
Check this box to run an archive to use for seeding a replication target or legacy vault. Seed archives are not equivalent to regular archives. Use only for seeding purposes. For details about seeding, see: RapidSeed for Replicating Systems or RapidSeed for Legacy Vaulting Systems.
Retention Period
The time period to retain this set (i.e., another archive job cannot write over or purge these archives).
Archive Local Directory Information
Check to archive files and/or folders on the local Unitrends system. Enter the desired directory by typing the full pathname or browsing, then click Add to move the directory to the Local Directory List. (You can also Remove or Remove All to move the directory or directories back.) The entire contents of selected directories are copied to the archive media.
Executing archive jobs You can archive your data by running on-demand archive jobs or creating archive schedules. The on-demand option enables you to run one-time archive jobs whenever you want to archive backups. Creating schedules automates the archiving process and frees you from having to run a one-time job each time you want to archive a backup. Before running archives, see the "Archiving Overview" on page 201 for a high-level explanation of archiving and review the "General steps for archiving backups" on page 253. For instructions, see the following topics:
• • • •
"Navigation pane selections for archiving" on page 256 "On-demand archive" on page 257 "Scheduling archives" on page 258 "Archiving replicated backups" on page 259
Navigation pane selections for archiving Depending on your selection in the Navigation pane, it is possible to archive by client or by individual VM or volume. If you select a Hyper-V server or an ESX server in the Navigation pane, you can select individual VMs to archive. Similarly, if you select an NDMP device in the Navigation pane, you can select individual volumes to archive. If you choose to archive by individual VM or volume, you can only archive backups for one client at a time. If you select any other type of client or the Unitrends appliance in the Navigation pane, you will be able to select what to archive at the client level only.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 12: Archiving Procedures
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
257
Note:
If you select an NDMP client when archiving by client, backups that fall in the specified date range and backup types will be archived for all volumes on the device.
On-demand archive This section provides instructions for performing a one-time archive. To run a one-time archive Notes:
•
For Tape device configuration - Be sure the tape device has been configured as described in "Archive to tape setup" on page 245 before running an archive. This is a one-time process, unless the tape device is changed.
•
For Replicated backups - If you are archiving replicated backups from the target, switch to replication view before performing this procedure. After connecting your archive media to the replication target, click the Gear icon at the bottom of the Navigation pane, check Show Replication View in the Navigation tree, and click Confirm. Then select the source in the Navigation pane. (See "Viewing replicated backups" on page 309 for more information.)
Follow this procedure to run a one-time archive: 1
Click Archive > Media to check media devices prior to archiving, if necessary.
2
Select the system or navigation group that you want to archive in the Navigation pane.
3
Click Archive > Archive Now.
4
Select the date range in the drop-down list in the Time Range to Archive field.
5
Check the boxes for the clients for which backups will be archived in the Clients to Archive list. Notes:
•
Individual VMs and NDMP volumes cannot be archived with additional clients. To archive individual VMs, select the ESX server or Hyper-V server in the Navigation pane. To archive individual NDMP volumes, select the NDMP device in the Navigation pane.
•
Groups do not display in the Clients to Archive list. If you wish to archive based on a navigation group, select the group in the Navigation pane. This displays only items in the navigation group in the Clients to Archive list.
6
Check the boxes for the backup types in the Backup Types to Archive list.
7
Select the archive media to which this set will be written in the Target of Archive area. If needed, click Scan Media to refresh the list of connected devices.
8
(Optional) Check the boxes in the Archive Options pane. (See "Archive settings" on page 255.)
9
For tapes, enter the number or numbers for the target slots in the Target Slots field.
10 Enter the time period to retain this set in the Retention Period area.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 12: Archiving Procedures
258
11 (Optional) Check the Archive Local Directory Information box to archive files and folders on the local Unitrends system. (See "Archive settings" on page 255 for more information.) 12 Click Test in the bottom right of the screen to see if the archive will fit on the selected media. 13 Click Archive to execute the job. 14 To view the job, see "Monitoring running archive jobs" on page 259.
Scheduling archives Scheduled archives allow you to archive data to removable media on a predetermined schedule. You can monitor and manage schedules and make modifications as your environment changes. To create an archive schedule If you are using new archive drives, it is recommended that you prepare them before running an archive schedule. See "Preparing archive media" on page 254 for details. If you are archiving replicated backups from the target, switch to replication view before performing this procedure. After connecting your archive media to the replication target, click the Gear icon at the bottom of the Navigation pane, check Show Replication View in the Navigation tree, and click Confirm. Then select the source int he Navigation pane. (See "Viewing replicated backups" on page 309 for more information.) 1
Select Archive > Schedule Archive.
2
Click New at the bottom of the screen.
3
Enter a Schedule Name and, if desired, a Schedule Description. See "Archive settings" on page 255 for details about the entries on this screen.
4
Choose a date range to archive by selecting a Date Range from the drop-down list.
5
Check boxes to select clients in the Clients to Archive list. Notes:
•
Individual VMs and NDMP volumes cannot be archived with additional clients. To archive individual VMs, select the ESX server or Hyper-V server in the Navigation pane. To archive individual NDMP volumes, select the NDMP device in the Navigation pane.
•
Navigation groups do not display in the Clients to Archive list. If you wish to archive based on a navigation group, select the group in the Navigation pane. This displays only items in the navigation group in the Clients to Archive list.
6
Check the boxes for the backup types in the Backup Types to Archive list.
7
Select the archive media to which this set will be written in the Target of Archive area. If needed, click Scan Media to refresh the list of media devices. Note:
If using a disk archiving unit with a single drive, it displays as eSATA when scanning for a target device.
8
(Optional) Check the boxes in the Archive Options pane.
9
For tapes, enter the number or numbers for the target slots in the Target Slots field.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 12: Archiving Procedures
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
259
10 Enter the time period to retain this set in the Retention Period area. 11 (Optional) Check the Archive Local Directory Information box to archive files and folders on the local Unitrends system. 12 Select Show Archive calendar (in the bottom left of the screen) to define the dates and times the schedule will run.
•
Drag and drop the Archive operation icon on the left onto the calendar or double-click on a day in the calendar. Select today’s date or later. The Add Archive window displays.
•
In the Add Archive window, modify Start Date, Start Time, and Recurrence settings as desired.
13 Click Save to save the schedule.
Archiving replicated backups You can archive replicated backups using the procedures described in "Executing archive jobs" on page 256 after enabling replication view. To enable replication view, click the Gear icon at the bottom of the Navigation pane, check Show Replication View in the Navigation tree, and click Confirm. Then select the source in the Navigation pane. When in Replication View, follow standard archive procedures.
Monitoring running archive jobs To view and manage queued and running archive jobs 1
Select the backup system, client, or navigation group in the Navigation pane and click Status. Selecting the client or navigation group displays only jobs run for that client or group. Selecting the backup system displays all queued and running jobs.
2
On the side of the Status page, click the Present blind. On the Present page, all queued and running jobs for the selected system, client, or group display. The following information is given for each archive job. Other running jobs display here as well. For details, see "Monitoring running backup jobs" on page 147 and "Monitoring running restore jobs" on page 355. Field
Description
ID
Archive ID
Client
The client for which the job is executing.
DB/VM
Shows the virtual machine or application instance, if applicable.
Job Type
The type of job.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 12: Archiving Procedures
260
Field
Description
Status
The real-time status of a task is displayed in the Status column, such as Active.
Job Comment
Archive performance and progress can be monitored in the Job Comment column. When the status is Active (an archive is running), you see the following messages in the Job Comment field:
• • • •
Processing archive job Checking archive media Compiling backup list Wrote #/# archives, #MB written For example: Wrote 2/19 archives, 4MB written. Since multiple backups can be processed simultaneously, the numbers you see may not be consecutive. For example, you may see Wrote 2/19 archives followed by Wrote 5/19 archives.
Successful This signifies that all the files have been archived successfully. IMPORTANT! This may signify an incomplete archive. (If less than 0.01% of the total number of files fail to archive, the status is reported as successful.) Failed
This signifies that the archive failed for some reason. Click Detail for more information. If more than 0.01% of the total number of files fail to backup, the job fails.
Proc Aborted
This signifies an unexpected abort of the backup process. Click Detail for more information.
Cancelled
This status displays when you terminate a backup process.
When a row is selected in the table, details concerning that job display near the bottom of the page. Details include the name of the job, the job ID, the job type, the client, the device, the status of the job, and the comment. At the bottom of the page are a set of controls: Control
Description
Auto Refresh
Check this box to refresh the page every n seconds, where n is the number entered.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 12: Archiving Procedures
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
261
Control
Description
Refresh Interval
The number of seconds between automatic refreshes if the Auto Refresh box is checked.
Advanced Options > Stop Tasker/Start Tasker
This button toggles starting and stopping the Tasker process, which manages jobs. If there are any modifications to the backup system’s configuration settings, Tasker must be stopped and re-started for changes to take effect. To access Tasker, click the Advanced Options checkbox.
Refresh Now
Click to manually refresh the page.
Suspend/ Resume
Select a job in the list and click this button to suspend an active job(s) or to resume a suspended job(s).
Terminate
Click this button to terminate a selected job(s).
Close
Click to close this view and return to the Past page.
Multi-job selection
Use Shift + Click to select contiguous rows. Use Ctrl + Click to select noncontiguous row. For best results, disable auto-refresh before acting on multiple jobs. Once the action is complete, click Refresh Now or check Auto-Refresh to see job statuses.
Stopping and starting the archive process Select Archive > Settings to view and change the status of the Archive process. This process should be running at all times to ensure the proper operation of archiving. If you stop the Archive process, your archive operations will not work. However, if for any reason you see problems in performing archive operations and the error message indicates that the Archive process may not be running, this feature allows you to easily restart it.
Viewing archives This section described considerations and procedures for viewing archives. You can use these procedures to determine which backups or files have been archived and to locate archived data before performing a restore. For details, see the following topics:
• •
"Archive search options and results" on page 261 "Procedures for viewing archives" on page 264
Archive search options and results Arc h iv e s e a rc h o p tio n s a n d re s u lts
When you are viewing or restoring archives, you can search the archive sets by date range or by using search options. These options are described in the following sections:
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 12: Archiving Procedures
262
• • •
"Date range options" on page 262 "Optional search selections" on page 262 "Archive restore status and search results" on page 263
Date range options When viewing archives, use the date range options in the top pane to filter the archive sets that display in the center stage area. Column
Description
Date Range
Use the drop-down menu to select a date range to display sets containing archives or backups that were created during the specified time range such as today or last week.
Based on
Select Date Archived or Backup Date to choose whether the date range is applied by backup date or archive date.
Optional search selections Click Show Search Options in the top pane and enter search criteria using any of the following options or a combination of them. Note:
The Show Search Options feature is for archived file-level backups only. If you attempt to search for a file in an application or virtual machine archive backup, you receive a message that no files were found.
Search Criteria
Description
Client to Search
Select the client from the Client to Search drop-down.
Maximum Files to Display
Enter a number to limit the maximum search results. A maximum of 5,000 files can be displayed. (Default is 10.)
Legacy Recovery-Series and UEB Administrator's Guide Chapter 12: Archiving Procedures
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
263
Search Criteria
Description
Name
Check the Name box and enter a full path and file name for searching. You can use wildcards such as “*” and “?” in the file name. (Using wildcards increases search time.)
•
“*” represents any number of characters before or after the entered names. For example, *.doc provides a list of all files ending with the .doc extension or auto* provides a list of all filenames starting with auto.
•
“?” represents just one character. For example, if there are a number of files named file1, file2 through file12, file13 then a file? will display file1 through file9 and a file?? will display all the files up to file13.
Note:
If using wildcards, such as ‘\\’, ‘%’, ‘_’, ‘*’, ‘?’, and ‘\’, do NOT check the Regular Expression box. These characters are interpreted differently as regular expressions and do not yield the same search results.
Regular Check this box to use regular expressions to symbolically represent patterns that Expression can occur in text. (Do NOT check this box to search using regular wildcards.) The syntax of regular expressions is more complex and powerful than wildcards. This technique only needs to be used if wildcards are too limited to construct a sufficiently precise search pattern. Some good references about the use of regular expressions can be found in the online encyclopedia, Wikipedia. Ignore Case
Check this box to search for file names regardless of case.
Date
Check this box and specify a date range to search for files within a certain time frame. Calendar icons are provided to assist with date selection.
Size (KB)
Check this box and enter a size range in kilobytes to narrow the search by file size.
Include or Exclude
Click Include to search for files meeting the specified search criteria.
Search
When you finish entering the search options, click Search.
Click Exclude to search for files that do NOT meet the specified search criteria.
Archive restore status and search results After you search for archive information, the center stage area contains the following information about the archived backup:
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 12: Archiving Procedures
264
Column
Description
Status icon
An icon representing the status of the archive operation. (If the operation is successful, the icon is a white check mark in a green circle. If the operation fails, the icon is a white X in a red circle.)
Compressed An icon representing whether the archive is compressed (a green check mark) or icon not compressed (a red X). Encryption icon
An icon representing whether or not the archive was encrypted.
Type
The type of backup operation – types might include master, differential, bare metal, or other types of backups.
Date/Time
Date and time at which the backup operation executed.
Elapsed
The elapsed time associated with the execution of the archive operation.
Size (MB)
The size, in megabytes, of the archived backup.
Files
The number of files associated with the archived backup.
DB/VM
Shows the virtual machine or application instance, if applicable.
Procedures for viewing archives Pro c e d u re s fo rv ie win g a rc h iv e s
Use the procedures described here to view archives. See the following topics for instructions:
• • • •
"To view all archive sets" on page 264 "To view archive information" on page 264 "To view specific archived files using search options" on page 265 "To view failed archive sets" on page 266
To view all archive sets You can view all archive sets in the Unitrends system. Archives run in the last 24 hours display. You can change the date range as desired. 1
Select the backup system in the Navigation pane.
2
Click Archive > Status. The archive sets with their associated clients and archived backups display in the center stage area in the Status tab.
To view archive information You can use filters to search for specific archive sets and information. 1
Select the backup system in the Navigation pane.
2
Click Archive > Status.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 12: Archiving Procedures
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
265
3
Use the date range options in the top pane to filter the archive sets that display in the center stage area.
4
Once you filter the results, the Status tab displays all archived sets meeting the criteria you entered. (Click on the Status tab, if necessary.) The information is arranged in the following way: Archive Level
Description
Archive set
The archive set displays first in the hierarchy, with the most recently created archived sets higher in the list. Within each archive set, the second-level nodes are the clients contained in the archive.
Backups for each client
Beneath that, the archived backups for each client display. If any system local directories are in the set, the second-level node is the backup system name followed by the local directories included in the archive set.
Archived Each row under the client or backup system in the archive status table represents backup an archived backup. Each archive set contains the system metadata file which can be used to restore the Unitrends system in the event of a disaster. The center stage area contains information about the archived backup. See "Archive restore status and search results" on page 263. 5
To view more details about each archive level, click on the appropriate row. You see the following: Archive Level
Description
Archive set
You see the Archive Set Information window with general information about the archive set, including clients whose backups are archived in the set, types of backups archived, the device to which the backups are archived, and options selected for the archive job. (See "To run a one-time archive" on page 257 for fieldlevel information.)
Client
There are no further details at the client level. (You see restore options only when you click this row.)
Archived You see the Archive Browse/Recovery window with details such as parent name, backup set number, size, and number of files. (To see the individual files in this archived backup, click Restore to system. Click on the arrows to open the tree and view the individual files. Click Cancel when you are finished.)
To view specific archived files using search options You can view individual files within the archive. Use search options to select the files you want to view. (This procedure is similar to viewing archived backups in "To view archive information" on page 264, except that this procedure allows you to view individual files based on search criteria for
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 12: Archiving Procedures
266
specific file types rather than files under a client.) 1
Click Archive > Status.
2
Click Show Search Options in the top pane and enter search criteria using any of the options or a combination. See for more information. The Show Search Options feature is for archived file-level backups only. If you attempt to search for a file in an application or virtual machine archive backup, you receive a message that no files were found.
3
Click Search. Details of the search results display in the center stage area (the summary portion of the screen) in the Search Results tab. (Click on the Status tab at any time to view the archive set information.) The search results return all files that meet the search criteria if you selected Include, or return all files that do NOT meet the search criteria if you selected Exclude. (If you selected to view files on a tape that has a barcode, your search results include a column with barcode information.) The center stage area contains the following information about the files. You can sort or resize the columns. Column
Description
Filename
The name of the file, including the directory path of the file.
Modified Date The date and time that the file was last modified.
4
Archive Date
The date and time of the archive.
Size (KB)
The size of the file.
Media Serial
The serial number of the archive media associated with the file.
Barcode
The barcode, if the archive media is a tape using the barcode feature.
To view file details, click on the file from the list in the bottom pane. The Archive Browse/Recovery screen displays information about the file, including a barcode if this is a tape archive using the barcode feature.
To view failed archive sets When viewing archive information, you see the archive sets in the Status tab on the Archive > Status screen. If there are failed sets, you see a Failed Sets tab. Click the Failed Sets tab to see information about the failed archives. The results in this tab are filtered depending on the search options you entered. You see the same column information that displays on the Status tab, except for the Status, Compressed, and Encryption fields. For details, see "To view all archive sets" on page 264.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 12: Archiving Procedures
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
267
Managing archive schedules Use the procedures described here to manage archive schedules. For instructions on creating an archive schedule, see "To create an archive schedule" on page 258. See the following topics for instructions:
• • •
"To view and manage existing schedules" on page 267 "To enable/disable an archive schedule" on page 267 "To delete an archive schedule" on page 268
To view and manage existing schedules If you are archiving replicated backups from the target, switch to replication view before performing this procedure. After connecting your archive media to the replication target, click the Gear icon at the bottom of the Navigation pane, check Show Replication View in the Navigation tree, and click Confirm. Then select the source in the Navigation pane. (See "Viewing replicated backups" on page 309 for more information.) Select Archive > Schedule Archive. On the Schedule Archive screen, existing schedules display with the following columns: Column
Description
Light bulb icon [enabled/disabled]
This icon displays in the first column. If the light bulb is yellow, the schedule is enabled. If the light bulb is gray, the schedule is disabled.
Schedule
The name of the archive schedule.
Description
A text description of the schedule.
Buttons
The following buttons are at the bottom of the screen.
New
Used to create a new schedule.
View/Modify
Used to view and/or modify a previously selected schedule (from the pane above these buttons).
Delete
Used to delete a previously selected schedule.
Enable/Disable
Causes the schedule to be enabled or disabled.
To enable/disable an archive schedule You can enable or disable an archive schedule. This is convenient if you want to stop an archive schedule without deleting it so you can enable it for use in the future. 1
Select Archive > Schedule Archive. On the Schedule Archive screen, existing schedules display.
2
Click the schedule you want to enable or disable.
3
Click Enable/Disable at the bottom of the screen. OR
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 12: Archiving Procedures
268
Drag the schedule and drop it onto the Enable/Disable button. The light bulb icon next to the schedule is yellow (enabled) or gray (disabled). You can enable or disable the schedule at any time.
To delete an archive schedule If an archive schedule is no longer required, you can delete the schedule. 1
Select Archive > Schedule Archive. On the Schedule Archive screen, existing schedules display.
2
Click the schedule you want to delete.
3
Click Delete at the bottom of the screen. OR Drag the schedule and drop it onto the Delete button. The schedule is deleted.
Managing archive media This section describes procedures used to manage media. See also the chapter on your selected media type for procedures specific to that media. For details about managing the space on your archive media, see "How archiving uses available space on media" on page 204.
• • •
"To view connected media" on page 268 "To mount or unmount media" on page 269 "Removing and importing archive sets" on page 269
To view connected media Before you perform an archive, confirm the type of media that is connected. This is also useful if you want to disconnect or reconnect archive media. Note:
1
You cannot archive to optical media (CD or DVD), but you can archive to a hard disk and then covert it to optical media.
Log in to the Unitrends system and select Archive > Media. The system checks for connected media. If necessary, click re-scan for media.
2
Connected media display in the Archive Media area. These details are given for each media instance: Column
Description
Light bulb icon [media not prepared or already initialized]
Gray indicates the media has not yet been prepared (see "Preparing archive media" on page 254). Yellow indicates it is initialized and ready for use.
Disk icon [mounted or not mounted]
Hover on the icon to see if this media is mounted or not mounted. For details, see "To mount or unmount media" on page 269.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 12: Archiving Procedures
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
269
3
Column
Description
Media Idle indicator
An indicator as to whether the media is idle (green check mark) or actively archiving or restoring (red X).
Name
The name of the archive media.
Label
The archive media label.
Activity
An indicator as to whether the media is idle or active.
Size (GB)
The total size of the media in GB.
Free (GB)
The available space on the media in GB.
Used (GB)
The used space on the media in GB. This is especially important to view when archiving to the cloud.
Serials
Media serial number(s). For multi-drive units, e.g., the disk archiving unit, this may be a series of up to four serial numbers.
If desired, click re-scan for media below to refresh the list.
To mount or unmount media The archive process automatically mounts, writes to, then unmounts the target media, so it is not necessary to mount or unmount manually to run an on-demand or scheduled archive job. If you need to mount or unmount manually, such as to view archive sets contained on a given media, use this procedure. Media must be unmounted before removing drives (see for details). Note:
1
If you are mounting media that contains archive sets that you removed from the database of the Unitrends appliance, you must import the sets before you can view them.
Log in to the Unitrends system and select Archive > Media. The system checks for connected media. If necessary, click re-scan for media.
2
Connected media display in the Archive Media area. See "To view connected media" on page 268 for details. At the bottom of the pane there are several buttons. These buttons become active or inactive depending upon the state of the media.
3
Select the desired media.
4
Click Mount or Unmount below. The disk icon changes indicating that the media is now mounted (green) or is no longer mounted (red).
Removing and importing archive sets When backups are archived, archive set information is saved to the Unitrends appliance and the archive media. Archived backups are written to the archive media only. Set information enables the
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 12: Archiving Procedures
270
Unitrends appliance to locate and identify archives that have been written to the media. This is especially helpful when performing an archive restore. Removing an archive set removes the set information from the Unitrends appliance. Removing this information does not delete the set from the archive media. It only removes the information from the Unitrends appliance. When a set is removed, you cannot view any information about it in the Administrator Interface. However, you can import the set information again at any time as long as the appliance can access the media. After the information is imported, you can view the archives and perform restores. Note:
For cloud archive storage only, you can configure a setting to delete sets from the archive media when removing them from the appliance. For details, see "Removing cloud archive sets" on page 232.
By contrast, purging, overwriting, and preparing media delete archive sets from the media, and once the sets are deleted, they cannot be retrieved. Purging, overwriting, and preparing the media are used to create space on the media for new archive sets, the removing option is used to remove set information from the Unitrends appliance. Details display in the Archive status screen for all archive sets, even after the media has been unmounted and disconnected from the archive device. However, it is not necessary to remove sets to prevent them from displaying in the Archive status screen. You can also filter your view by using the options on the Archive status screen. The following options assist with organization and viewing of archive sets:
• • •
Date range Client Maximum number of files to display
For more details about archive search options, see "Viewing archives" on page 261. Note:
If you remove a set, the appliance has no information about the set and you need to import the set to see its archives in the Archive status screen.
You can import an archive set to a different appliance if the set is not encrypted. If the archive set is encrypted, you can import it to a different appliance only as part of a disaster recovery because each system has a unique set of encryption keys. (For instructions, see "System restore from archive" on page 407.) See the following procedures to remove and import archive sets:
• •
"To remove an archive set" on page 270 "To import archive sets" on page 271
To remove an archive set 1
Go to Archive > Status.
2
Click the archive set that you want to remove. You see the Archive Set Information window.
3
Click the Remove set button. You see a message confirming the removal. This action removes the archive set status information but does not remove any data from the archive media.
4
Click Yes to remove the archive set.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 12: Archiving Procedures
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
271
To import archive sets 1
Make sure the media is mounted prior to performing the import process, if necessary.
2
Go to Archive > Media.
3
Click on the media.
4
Click the Sets button to see the Archive Media Sets window. You see the following fields: Field
Description
Description Describes the type of archive. For tape media, you see the message “Tape devices will be scanned upon import.” Date
The date and time of the archive.
Imported
A check-mark indicates that the archive sets are in the database. An X indicates that the archive sets have been removed and can be imported.
Force?
Tape only field. If a tape was prepared on this system, the system recognizes it through a system assigned asset tag. This is called a “known” tape. If you check this box, the system imports from all tapes (forces the import regardless of asset tag recognition). If you do NOT check this box, the system imports from known tapes only (tapes that the system recognizes). For example, if you enter 1–5, for slots 1, 2, 3, 4, and 5, but 3 is a new tape from another system, the system will not import tape 3 if it isn’t known.
Target Slots
Tape only field. Enter the slot numbers to indicate the slots associated with the tapes you want to import. You can enter a single slot number (1), a range (1-5), or multiple slot numbers (3, 4, 6.) If you do not enter a target slot, the system attempts to import from all slots. The system uses the barcode if there is a valid one.
5
Click Import to import the archive sets. Note:
The system imports all of the removed sets that are marked with an X in the Media Sets window. (If it’s detected that an archive set with a check-mark is not in the system, it is also imported from the archive media.)
You see a window with details about each archive set (date, time, and how it was archived), and if it was already in the system (had a check-mark) or was imported.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 12: Archiving Procedures
272
6
Click Okay.
7
Go to Archive > Status to see the archive set on the Status screen. The archive set displays by original archive date and time. Perform a search by date range or search options to locate the archive set, if needed.
8
Click on the archive set to see the Archive Set Information window. In the Status field, you see either “Import Success,” “Import in Progress,” or “Import Failed.”
9
On the Status screen, click on the archived data to see the Archive Browse Recovery window. The Imported field is true if the import was successful. There is a message at the bottom of the window stating Restore from an imported archive.
Restoring from archives This section describes procedures used for restoring data from archives. To restore from tape archives, follow the instructions provided in "Restoring from tape" on page 250. When you perform an archive restore, the archived data is restored to the backup system as a regular backup. After you restore an archive to the backup system, you can restore it to the client in the same manner used to restore other backups. For more details about the restore process, see "Archive restore" on page 212. For details on restoring a backup to a client, see "Restore Overview" on page 341. Archive sets are organized into a hierarchy consisting of archive set, backups for each client, and the archived backup level. When restoring, you can select the set, an individual client, or a particular backup. Each archive set contains the system metadata file which can be used to restore the Unitrends system in the event of a disaster. See the following for archive restore procedures:
• • • • •
"To restore an archive set" on page 272 "To restore a client archive" on page 273 "To restore an archived backup" on page 274 "To restore specific archived files based on search options" on page 275 "Restoring an archive set to a different Unitrends appliance" on page 275
To restore an archive set You can use filters to search for specific archive sets and information. For details, see "Viewing archives" on page 261. 1
Make sure the proper archive media is connected. (See "To view connected media" on page 268 for more information.)
2
Select the backup system in the Navigation pane.
3
Click Archive > Status.
4
Use the date range options in the top pane to filter the archive sets that display in the center stage area.
5
In the center stage area, click on the archive set that you want to restore.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 12: Archiving Procedures
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
273
6
Click Restore to system to see the Restore Archive window. You have the option to select:
• •
Available devices. Check and mount media.
7
Click Restore to system to restore all archives in this set. Once you select to restore the archive set, you see a message indicating the status of the restore.
8
Click Okay.
9
Go to Settings (on the main menu, not within the Archive tab) > System Monitoring > Jobs to view the status of the restore.
10 Once the archive is successfully restored to the backup system, go to Status and click the Backup: Last 7 Days tab. Click the row with your archive restore to see details about the restore in the Backup Information window. Notice this backup is listed as an Archive restore. Note:
You can select to restore the backup or delete the backup, as necessary. (The archive information remains on the archive media and is not removed after the restore.)
11 Go to Reports > Backups to see the list of backups, including your successful archive restores with the restore date and time listed. Click on the row to view more details, including an entry that this is an archive restore.
To restore a client archive You can use filters to search for a specific client archive. For details, see "Viewing archives" on page 261. 1
Make sure the proper archive media is connected. (See "To view connected media" on page 268 for more information.)
2
Select the backup system in the Navigation pane.
3
Click Archive > Status.
4
Use the date range options in the top pane to filter the archive sets that display in the center stage area.
5
In the center stage area, click on the client you want to restore. You see the Restore Archive window.
6
You can select:
• • •
The client you want to restore in the Restore Client drop-down box. Available devices. Check and mount media.
7
Click Restore to system to see the Restore Archive window. Once you select to restore the client, you see a message indicating the status of the restore.
8
Click Okay.
9
Go to Settings (on the main menu, not within the Archive tab) > System Monitoring > Jobs to view the status of the restore.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 12: Archiving Procedures
274
10 Once the archive is successfully restored to the backup system, go to Status and click the Backup: Last 7 Days tab. Click the row with your archive restore to see details about the restore in the Backup Information window. Notice this backup is listed as an Archive restore. Note:
You can select to restore the backup or delete the backup, as necessary. (The archive information remains on the archive media and is not removed after the restore.)
11 Go to Reports > Backups to see the list of backups, including your successful archive restores with the restore date and time listed. Click on the row to view more details, including an entry that this is an archive restore.
To restore an archived backup You can use filters to search for specific archive sets and information. For details, see "Viewing archives" on page 261. 1
Make sure the proper archive media is connected. (See "To view connected media" on page 268 for more information.)
2
Select the backup system in the Navigation pane.
3
Click Archive > Status.
4
Use the date range options in the top pane to filter the archive sets that display in the center stage area. Note:
Each archive set contains the system metadata file which can be used to restore the Unitrends system in the event of a disaster.
5
In the center stage area, click on archived backup you want to restore. You see the Restore Archive window with details such as set number, size, and number of files.
6
Click Restore to System to see the root of the backup in the center stage area. You can select the entire archived backup or specific files:
• •
Click on the box next to the root to restore the entire archived backup. Click on the arrows to open the tree and view the individual folders and files to specify individual files for restore.
7
Click Restore to system and you see a Restore Progress message indicating the restore is in progress, then a message indicating the status of the restore.
8
Go to Settings (on the main tab, not within the Archive tab) > System Monitoring > Jobs to view the status of the restore.
9
Once the archive is successfully restored to the backup system, go to Status and click the Backup: Last 7 Days tab. Click the row with your archive restore to see details about the restore in the Backup Information window. Notice this backup is listed as an Archive restore. Note:
You can select to restore the backup or delete the backup, as necessary. (The archive information remains on the archive media and is not removed after the restore.)
10 Go to Reports > Backups to see the list of backups, including your successful archive restores with the restore date and time listed. Click on the row to view more details.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 12: Archiving Procedures
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
275
To restore specific archived files based on search options You can restore individual files within the archive. Use search options to select the files you want to restore. For details, see "Viewing archives" on page 261. (This procedure is similar to restoring archived backups in "To restore an archive set" on page 272, except that this procedure allows you restore individual files instead of all files under a given client.) 1
Make sure the proper archive media is connected. (See "To view connected media" on page 268 for more information.)
2
Click Archive > Status.
3
Make sure Show Search Options is selected in the top pane and enter search criteria. See "Viewing archives" on page 261 for more information. Note:
The Show Search Options feature is for archived file-level backups only. If you attempt to search for a file in an application or virtual machine archive backup, you receive a message that no files were found.
4
Click Search. Results display on the Search Results tab.
5
To view file details, select the file from the list in the bottom pane. The Archive Browse/Recovery window displays information about the file in the Category and Entry columns, including the backup date and the archive date. You also see a barcode if this is a tape archive using the barcode feature.
6
To perform an archive restore, click Restore to System and you see a new window with the tree for the archive backup populated.
• • •
Click on the box next to the root to select the entire archived backup. Click on the arrows to open the tree and view the individual folders and files. Click on the boxes next to the files you want to restore.
7
Click Restore to system and you see a Restore Progress message window indicating that the restore is in progress.
8
Go to Settings (on the main tab, not within the Archive tab) > System Monitoring > Jobs to view the status of the restore.
9
Once the archive is successfully restored to the backup, go to Status and click the Backup tab. Click the row with your archive restore (with the date and time of the restore) to see details about the restore in the Backup Information window. (Click the refresh button if needed.) Notice this backup is listed as an Archive restore. You can select to restore the backup or delete the backup, as necessary. (The archive information remains on the archive media and is not removed after the restore.)
Restoring an archive set to a different Unitrends appliance You can restore an archive set to a different appliance if the set is not encrypted. You must first import the set information using the procedures described in "To import archive sets" on page 271. You can then perform a restore using the procedures described in "Restoring from archives" on page 272.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 12: Archiving Procedures
276
If the archive set is encrypted, you can restore it to a different appliance only as part of a disaster recovery because each system has a unique set of encryption keys. For instructions, see "System restore from archive" on page 407.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 12: Archiving Procedures
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
277
Chapter 13: Replication Procedures in this chapter are used to configure and manage Unitrends’ replication feature. See the following topics for details:
• • • • •
"About replication" on page 277
• • • • • • • • • •
"Installation types and replication" on page 282
"Replication features" on page 278 "Replication requirements" on page 279 "Replication limitations" on page 280 "Replication and legacy vaulting comparison" on page 280
"Replication setup" on page 283 "Configuring replication after the initial setup" on page 298 "Upgrading from legacy vaulting to replication" on page 303 "Navigating replicating systems" on page 307 "Working with the replication dashboard" on page 309 "Archiving replicated backups" on page 319 "Restoring replicated backups" on page 319 "Deleting replicated backups" on page 323 "Replication reports" on page 323
About replication Replication is the logical synchronization of backup data from one Unitrends system to another, in which the systems are connected by LAN or WAN. The originating system is referred to as the source, while the off-site system onto which the data is replicated is the target. Replication enables off-site storage of mission-critical data to protect against data loss in the event of a disaster. The source system is used to protect against loss of files, folders, and individual machines. The target system protects against loss of client data, as well as providing protection against the loss of the entire source system. Replicated backups look like their counterparts on the source system and are restored in the same way. The target system is configured for retention while in replication view, using the same procedure as any source system (see "About retention control" on page 121). For a given client, you may have more than one backup group on the target, unlike legacy vaulting in which only the most recent backup is stored. As with source systems, the amount of retention on the target is dependent on space available and retention settings.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 13: Replication
278
The target system can be deployed as a private cloud or as a multi-tenant cloud. The replication architecture ensures that the local source systems that replicate to a single target only have access to their data. This secure architecture is the basis of a multi-tenant architecture. The replication process is fully managed from the target or source system. Using the replication dashboard, you can immediately gauge the status of replication by viewing active, previously completed, and pending replication jobs. Unitrends’ replication leverages a secure tunnel based on the UDP protocol that creates a secure VPN tunnel and also provides resiliency to intermittent network failures via UDP knitting. If there is a network drop during replication, the process utilizes advanced checkpoint controls to proceed with replication at the time of failure. For details, see "About secure tunnels for Unitrends systems" on page 278. The initial transfer of data from the source system to the target can occur over the WAN. However, for large data sets it is recommended to use a disk seeding mechanism to transfer the initial data set. Even with deduplication minimizing the amount of data being transferred, transfer speed is primarily governed by the size of the network pipe between the source and target systems. Seeding is also recommended in cases where available bandwidth is used for servicing end users at specific times during the day and cannot be used for replication. Windows Instant Recovery is supported on the replication target system. See "Windows Instant Recovery" on page 451 for more information.
About secure tunnels for Unitrends systems The secure tunnel is used by Unitrends to create an optimized, secure, encrypted tunnel for multiple Unitrends systems. The secure tunnel offers a scalable solution for enabling multiple clients to connect to a single server process through a single UDP port. There are two typical cases for using the secure tunnel with Unitrends systems. The first is a replication scenario where there is a target system and one or more source backup systems. In this case, the secure tunnel is configured between the target and the source systems in order to facilitate both the replication of data and the management of the systems. The second is the case where two or more systems are managed by a designated management system. With this setup, you can then perform operations for all systems from one Unitrends system interface. The primary advantages of the secure tunnel are that it enables radically simpler firewall management (since only one port is needed between off-premise Unitrends systems) and that it enables much higher session availability because it can handle lower quality WAN lines that would typically result in session termination (through UDP-level ride-through of short-lived transient line failures).
Replication features Replication features include:
• • • •
Total data recovery from a site disaster. Replicated data stored as regular backups on the target system. Hot/hot restore of backups directly from the target system. Retention of older backups on the target system.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 13: Replication
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
279
• • • • • • •
Multiple source systems can replicate to one target system.
•
Detailed replication dashboard that displays active replication tasks, previously replicated tasks, and tasks in the queue for replication.
•
Source user account to access the target system and perform administration tasks specific to the given source system only. Target system view is filtered by source user to control access, especially important in environments where multiple systems are replicating to one target.
•
Windows Instant Recovery is supported on the replication target system. See "Windows Instant Recovery" on page 451 for more information.
Replication system can be used as a target for both replication and legacy vaulting operations. Block-level deduplication of data – only changed blocks are transferred over the Internet. Encrypted and secure connection between the source and target systems. Private cloud or multi-tenant cloud deployment. Data is encrypted using the target’s encryption key. Configurable policies for replication, such as the ability to select specific clients, applications, and databases to replicate, and configurable bandwidth throttling between source and target systems, and the ability to prioritize data queued for replication to ensure that more critical systems are replicated first.
Replication requirements This section describes system requirements that must be in place to utilize the replication feature.
Supported systems Replication is supported on select systems running Unitrends version 7.0 and higher. Replication is supported on all Recovery-Series appliances listed in the Recovery-Series Appliance Family Datasheet. For UEB systems, the appliance can be used as either a replication source or replication target. Cross-replication is not supported on UEB systems. Note:
Although replication is supported on 7.0 and 7.1.x systems, it is highly recommended that these systems be updated to the latest release to take advantage of significant performance enhancements. If you cannot upgrade, see KB 3174 for details about running replication on these older versions.
System requirements The following are required for replication:
•
The target system and any replicating source systems must be running Unitrends version 7.0 or higher. Upgrade these systems if necessary. Note that upgrading to the latest version is highly recommended to take advantage of significant performance enhancements. If your source and target are running version 7.0 or 7.1.x and you cannot upgrade, replication is supported. For 7.0/7.1.x setup procedures, see KB 3174.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 13: Replication
280
•
The target system must be configured with the replication target or local backup system and replication target installation type. For details, see "Installation types and replication" on page 282.
•
The target system must have at least 128GB of available backup storage space. UEB systems are deployed with 138 GB of backup storage space.
•
If configuring multiple backup devices, all must be roughly the same size. Having devices of varying size may result in replication failures.
•
For UEB systems, you must purchase a license and register the system before it can be used as a replication source or replication target.
•
Cross-replication can be performed only on physical systems. It is not supported on UEB systems.
•
If connecting the source and target directly using 10GbE fiber cable, both the source and target systems must be using the same NIC card model. Unitrends has switched from the HP NC522SFP Dual Port 10GbE Server Adapter to the Intel Ethernet Server Adapter X520-DA2 Dual Port 10GbE. Verify both systems are using the same model before setting up replication.
•
If you create a secure tunnel between the source and target systems using OpenVPN (the recommended configuration), port 1194 is used for all communication between the two systems. For details about ports, see "About security levels" on page 131 and KB 3372.
Replication limitations Note the following restrictions prior to configuring replication:
•
"Automatic disaster recovery from vault" on page 420 and "Granular restore from vault" on page 337 are not supported on the replication target system as replicated backups can be restored directly to clients or archive media.
•
Replication is not supported for legacy Exchange backups. Legacy Exchange backups are run by the Unitrends Windows 2000 agent to protect Exchange 2000 environments. For details, see "Legacy Exchange agent" on page 866. Replication of file-level backups for legacy Exchange clients is supported.
•
Restore of replicated Legacy SQL backups is supported during disaster recovery of the source system only. Restore of these backups is not supported outside of whole system disaster recovery.
•
Source systems can be configured for replication or legacy vaulting. A single source system cannot support both configurations. However, the replication target can receive both replicated and vaulted data from separate sources.
Replication and legacy vaulting comparison An overview of the primary differences between replication and legacy vaulting is given in the following table. Further details are provided in the sections that follow.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 13: Replication
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
281
Feature
Replication
Vaulting
Retention on target system
Yes
No
Deduplication
Yes
Yes
Encryption
Yes
Yes
Disaster Recovery supported
Yes
Yes
Granular Recovery supported
Yes, with hot/hot restore
Limited, backup must be present on both the source and the target
Hot/hot restore (backups directly restorable without Disaster Recovery)
Yes
No
Source user can log in on the target and browse backups
Yes
No
Reporting
Yes
Yes
See the following topics for details:
• • • •
"Retention" on page 281 "Deduplication" on page 281 "Encryption handling" on page 282 "Restore" on page 282
Retention With legacy vaulting, the most recent backups of a client are synchronized to the vault. When a new master or full backup is created, this backup is then vaulted, and the prior vaulted backup removed. With replication, previously replicated backups are retained on the target, as long as there is room on the system and the backups are within the retention and legal hold limits set on the target. See "About retention control" on page 121 for details. A system’s installation type governs how retention can be configured on a given system. For a description of each installation type, see "Installation types and replication" on page 282. Retention settings can be configured for the following installation types:
• • •
Local backup system to manage retention of backups run on the system. Replication target to manage retention of backups replicated to the system. Local backup system and replication target to manage retention of both backups run on and replicated to the system.
Retention settings cannot be configured for legacy vaults as vaulted data is not retained.
Deduplication Once the initial data set has been replicated to the target, only changed data blocks are transferred.
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 13: Replication
282
Deduplication works differently in replicating and vaulting systems.
•
In replication, the process connects to the target system and compares data in the backup to data on the target. This comparison runs on the source system. Once changed blocks are identified, they are replicated to the target. This keeps bandwidth utilization to a minimum as only changed blocks are sent through the encrypted connection.
•
In legacy vaulting, a process on the source compares backup data on the source and target to identify changes. Changes are written to a delta file that is sent to the vault, so that only changed blocks are received.
Encryption handling In replicating systems, backups that are encrypted on the source are encrypted on the target using the target system’s key. In-flight, the backup data is first decrypted via the transmission protocol, then before being saved on the target, is re-encrypted using the target’s key. If encryption is not configured on the target, replication of encrypted backups fails. For this reason, it is recommended that encryption be configured on the target system. Once encryption is configured, the target can receive both encrypted and non-encrypted backups from source systems for replication. In vaulting systems, encrypted backups remain encrypted as they were on the source system. To restore encrypted data from the vault, the source system’s encryption key must be used.
Restore Replicated data is stored on the target as a backup, equivalent to its source-side counterpart. Vaulted data is not backup data. Because of this fundamental difference, the manner in which data is restored differs significantly in replication and vault systems. To restore from a vault, you use a disaster recovery (DR) tool, through which you first restore the system state to a newly imaged system, then restore vaulted client backups, and finally restore these backups from the new system to the client. See "Disaster recovery from vault " on page 419 for details. To restore only a volume, directory, or file, you use the procedure "Granular restore from vault" on page 337. Replication is more flexible, enabling hot/hot restore of replicated data. With replication, you can perform whole system DR, or restore replicated backups directly to a client without first restoring the entire system. For details, see "Restoring replicated backups" on page 319.
Installation types and replication When a Unitrends system is deployed, as discussed in the "Getting Started" on page 55 chapter, it is configured with one of the following installation types:
• • •
Local backup system – Used to protect the physical and virtual infrastructure on-premise. Replication target – Used as a replication target for one or more backup systems. Local backup system and replication target – Used as a backup system for the local physical and virtual environment, and also serves as a replication target for another backup system(s).
Supported installation types by system are given in the following table.
Legacy Recovery-Series and UEB Administrator's Guide Chapter 13: Replication
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
283
Installation type Backup system
Replication target
Backup system & replication target
Unitrends Enterprise Backup
Yes
Yes
No
Recovery-212
Yes
Yes
No
All Recovery-Series models other than Recovery-212
Yes
Yes
Yes
System
Once the system’s installation type is set to replication target or local backup system and replication target, it can be configured to receive replicated data. The amount of data that can be replicated from backup systems to the target depends on various factors, namely:
• •
The rate at which data changes on the clients protected by the local backup systems. The bandwidth available between the source and target systems.
Replication setup Unitrends releases 7.2 and higher feature a Replication Wizard for quick and easy setup. The procedures described in this section are run using the wizard. Manual setup is still supported if you are running an earlier system or if you are familiar with the setup process and prefer to perform it from the WAN Settings or Secure Tunnel Settings page. For details on using these pages, see KB 3174. Replication between Unitrends systems can be set up in two ways, both of which can be performed through the wizard:
•
Standard replication where one system is the source that replicates to a second target system. In this case, the target system must be configured with the replication target or local backup system and replication target installation type to receive replicated data.
•
Cross-replication where the two systems replicate to each other. In this case, both systems must be configured with the replication target or local backup system and replication target installation type to receive replicated data.
Setup procedures differ for these configurations. Proceed to one of the following to setup the desired configuration:
• •
"Standard replication setup" on page 283 "Cross-replication setup" on page 290
Standard replication setup This section provides a high-level overview of the steps required to set up standard replication between a backup system and replication system. These procedures refer to the backup system as the source and replication system as the target. Replication setup requires you to access the Replication Wizard in both the source and target systems. The Administrator’s Guide divides the
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 13: Replication
284
replication setup into several parts that minimize the need for switching between the source and the target systems. Before beginning the setup process, perform the following: 1
See "Replication requirements" on page 279 to verify that all requirements have been met for the source and target systems.
2
Make sure you know the hostname and IP address for both the source and target systems. To view a system’s hostname in the Administrator Interface, select Settings > Clients, Networking, and Notifications > Networks > Hostname.
3
Make sure the IP addresses and ports in use on your network will not conflict with the default settings for the secure tunnel that you will create for optimized, secure communication between the source and target systems. The secure tunnel uses the following settings:
• •
Secure Tunnel IP: 172.17.3.0
•
Port: 1194
Netmask: 255.255.255.0
If the network settings conflict with your environment, you can change them when creating the secure tunnel as part of the setup process. IMPORTANT! Do not use this procedure for systems running version 7.0 or 7.1.x. Upgrade to the latest release or, if this is not possible, configure replication as described in KB 3174. Do not use this procedure for source systems that are configured for legacy vaulting. If your system is vaulting data, see "Upgrading from legacy vaulting to replication" on page 303. To set up standard replication between a source and target A high-level overview of the standard replication setup process is given here. Proceed to the sections that follow for detailed procedures associated with each high-level step. Note:
Use the Replication Wizard for easy setup. If you are familiar with setting up replication from the WAN Settings or Secure Tunnel settings page, this is still supported. For details on using these pages, see KB 3174
Step 1:
"Configure encryption on the replication target" on page 284
Step 2:
"(Optional) Add a logical device to associate with a source system" on page 285
Step 3:
"Configure the source system role and grant privilege to the target for remote management" on page 285
Step 4:
"Configure the target system role and create a secure tunnel" on page 286
Step 5:
"Configure the secure tunnel and add the source system to the target" on page 288
Step 6:
"Tune replication attributes on the source system" on page 288
Step 7:
" Configure clients and applications for replication" on page 289
Step 1:
Configure encryption on the replication target
Co n fig u re e n c ry p tio n o n th e re p lic a tio n ta rg e t
In replicating systems, backups that are encrypted on the source are encrypted on the target
Legacy Recovery-Series and UEB Administrator's Guide Chapter 13: Replication
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
285
using the target system's key. If encryption is not configured on the target, replication of encrypted backups fails. Once encryption is configured, the target can receive both encrypted and non-encrypted backups from source systems for replication. Step 2:
(Optional) Add a logical device to associate with a source system
Ad d a lo g ic a ld e v ic e to a s s o c ia te with a s o u rc e s y s te m
When setting up replication, adding a logical device is optional. If you do not add a logical device, replicated backups are stored on the default backup device. This works just fine, especially for targets with one replicating source system. For targets with multiple replicating sources, you can opt to associate sources with specific logical devices. You can associate each source with its own device, or associate multiple sources to a given device, grouping them as desired. If you do not define associations, replicated backups for all sources are stored together on the default device. Logical device considerations Before adding a logical device that will be associated to a source system, note the following requirements and considerations:
•
The device must support deduplication. Unitrends’ devices support deduplication by default. Note that if you have disabled deduplication, logical device association to a source is not supported.
•
The device must be at least 128 GB in size to be used for replicated backup storage. When associating a device to the source system, only devices that meet this size requirement display in the list.
•
Once a device is associated to a source, you can remove or modify the association at any time.
•
Upon removing the association, subsequent jobs are written to the default backup device. Jobs in progress are not impacted, they are written to the original device.
•
Upon modifying the association, subsequent jobs are written to the newly specified device. Jobs in progress are not impacted, they are written to the original device.
•
Upon changing the default device (designating another device as the new default), the new default is used for all sources for which an association is NOT defined. No change is made to sources that have been explicitly associated with a device.
•
Replicated backups remain on the device to which they were originally written. Modifying or removing an association does not migrate existing replicated backups.
To create a logical device for a replication source Add a logical device to the replication target as described in "To add a device" on page 119. You will associate the source to this device later in the replication setup procedure. test Step 3:
Configure the source system role and grant privilege to the target for remote management
Co n fig u re th e s o u rc e s y s te mro le a n d g ra n tp riv ile g e to th e ta rg e tfo re mo te ma n a g e me n t
In standard replication, one system acts as a source, and a second system acts as a target. For a target or a management system to remotely manage a local backup system, the backup system has to explicitly grant privilege to the manager. This is done to secure a two-way
200 Wheeler Road, Burlington, MA 01803 www.unitrends.com
Legacy Recovery-Series and UEB Administrator's Guide Chapter 13: Replication
286
handshake between the manager and the managed system. As part of the setup process, you will create a secure tunnel for optimized, secure communication between the source and target systems. For more details about remote management, see "Granting privilege for remote management" on page 96. For more details about secure tunnels, see "About replication" on page 277. Begin replication setup by configuring the role of the source system and granting privilege to the target for remote management. Note:
To use the Replication Wizard, it is best to connect to both the source and target systems in separate tabs in the same browser. The setup steps require that you switch from one system to the other at various points.
To configure the system role for the source 1
Verify that all requirements have been met for the source and target systems. See "Replication requirements" on page 279.
2
Open a browser and connect to the source system. Select Replication > Replication Wizard. On the welcome screen, click Next to begin replication setup.
3
The wizard asks how you would like to configure the system. Click Replication Source so it is highlighted. Click Next.
To grant the remote management privilege 4
The wizard asks you to select a target for the source system’s replicated backups. Perform one of the following:
•
If the target has not been added to the source system’s hosts file, select Add a New Target in the drop-down menu. Enter the hostname and IP address of the replication target in the specified fields. Be sure to enter the hostname exactly as it displays in the hosts file on the replication target system. Click Next.
•
If the replication target has already been added, select it in the drop-down menu. Click Next.
5
Check the box that reads I agree that target can manage my system. This allows the target system to manage the source system. Click Next to proceed with generating a secure tunnel certificate request.
6
Click Generate Request. This generates a certificate signing request file. Click Okay, and save the file