Udp Solutions Guide PDF
Udp Solutions Guide PDF
www.arcserve.com/support
Contents 5
Review the Prerequisite ...................................................................................................................................... 82
Add a License ...................................................................................................................................................... 83
Remove a License ................................................................................................................................................ 84
Verify the License ................................................................................................................................................ 84
UDP Workstation Free................................................................................................................................................ 85
How to Migrate the Console to a New Machine ........................................................................................................ 87
Contents 7
Delete Nodes from the Console ........................................................................................................................ 185
Deploy Agent to Nodes ..................................................................................................................................... 186
Perform Preflight Checks for Your Backup Jobs ................................................................................................ 187
How to Add and Manage Node Groups ................................................................................................................... 200
Review the Prerequisites .................................................................................................................................. 201
Add Node Groups .............................................................................................................................................. 201
Modify Node Groups ......................................................................................................................................... 202
Delete Node Groups .......................................................................................................................................... 203
Add a Storage Array ................................................................................................................................................. 204
Find Array and Data IP of the SVM Storage Array for the Arcserve UDP Console ............................................ 206
How to Add and Manage a Site ................................................................................................................................ 208
Specify the Site Name ....................................................................................................................................... 209
Share the Registration Instruction .................................................................................................................... 210
Verify and Add the Site ..................................................................................................................................... 210
Modify the Console URL .................................................................................................................................... 211
Modify the Site .................................................................................................................................................. 211
Delete a Site ...................................................................................................................................................... 212
Set up a Proxy Server for the Gateway .................................................................................................................... 213
Contents 9
View the Email Settings ..................................................................................................................................... 384
How to Protect Virtual Standby Machines ............................................................................................................... 385
Review the Prerequisites and Considerations................................................................................................... 386
Power On Virtual Standby Machines ................................................................................................................ 387
Protect Virtual Standby Machines After it is Powered On ................................................................................ 391
Verify the Virtual Standby Machine is Protected .............................................................................................. 392
How to Replicate Data Between Data Stores Managed from a UDP Console ......................................................... 392
Review the Prerequisites and Considerations................................................................................................... 393
Create a Backup Task ........................................................................................................................................ 393
Add a Replicate Task to the Plan ....................................................................................................................... 394
(Optional) Perform a Manual Replication ......................................................................................................... 396
Verify the Plan ................................................................................................................................................... 397
How to Replicate Data Between Data Stores Managed From Different UDP Consoles ........................................... 397
Review the Prerequisites .................................................................................................................................. 400
Create a User Account for the Source Console ................................................................................................. 400
Create a Plan to Define the Destination Data Store.......................................................................................... 401
Map the Plan to the User Account .................................................................................................................... 403
Send the Plan and User Account Details to the Source Administrator ............................................................. 405
Receive the Plan and User Account Details from the Destination Administrator ............................................. 405
Create a Replication Plan to Send Data to the Destination Console ................................................................. 405
Verify the Data is Replicated ............................................................................................................................. 410
Applying Best Practices ..................................................................................................................................... 410
How to Perform an Offline Data Replication Using RPS Jumpstart .......................................................................... 412
Review the Prerequisites .................................................................................................................................. 414
Create a Temporary Data Store on an External Device ..................................................................................... 415
Replicate Source Data to the Temporary Data Store ........................................................................................ 416
Delete the Temporary Data Store from the Source Console ............................................................................ 417
Send the External Device to the Destination Location ...................................................................................... 417
Receive the External Device .............................................................................................................................. 417
Import the Temporary Data Store from the External Device ............................................................................ 418
Create a Destination Data Store ....................................................................................................................... 418
Replicate Data from the Temporary Data Store to the Destination Data Store ............................................... 419
Verify that the Data is Replicated ..................................................................................................................... 419
(Optional) Set the Concurrent Node Count for RPS Jumpstart ......................................................................... 420
How to Create a Copy Recovery Points Plan ............................................................................................................ 420
Review the Prerequisites and Considerations................................................................................................... 421
Create a Plan with a Backup Task...................................................................................................................... 421
Add a Copy Recovery Points Task to the Plan ................................................................................................... 435
Verify the Plan ................................................................................................................................................... 437
How to Create a File Copy Plan ................................................................................................................................ 438
Review the Prerequisites and Considerations................................................................................................... 439
Create a Plan with a Backup Task...................................................................................................................... 439
Contents 11
Specify the File Copy Information to Restore ................................................................................................... 557
Restore the File Copy Content .......................................................................................................................... 566
Verify that Content was Restored ..................................................................................................................... 567
How to Restore Files/Folders ................................................................................................................................... 569
Review the Restore Prerequisites and Considerations ..................................................................................... 570
How File Level Restores Work ........................................................................................................................... 571
Files Skipped During Restore ............................................................................................................................. 572
Specify the File/Folder Information to Restore................................................................................................. 574
Restore the File/Folder ..................................................................................................................................... 586
Verify that the File/Folder was Restored .......................................................................................................... 587
How to Restore a Virtual Machine ........................................................................................................................... 588
Review the Restore Prerequisites and Considerations ..................................................................................... 590
Specify the Virtual Machine Information to Restore ........................................................................................ 591
Restore the Virtual Machine ............................................................................................................................. 603
Verify that the Virtual Machine was Restored .................................................................................................. 604
How to Use Exchange Granular Restore (GRT) Utility .............................................................................................. 604
Introduction ...................................................................................................................................................... 605
Review the Prerequisites and Considerations................................................................................................... 606
How to Restore Microsoft Exchange Data Using Exchange Granular Restore (GRT) Utility ............................. 607
How to Restore a Microsoft Exchange Application .................................................................................................. 611
Review the Restore Prerequisites and Considerations ..................................................................................... 612
Specify the Microsoft Exchange Information to Restore .................................................................................. 613
Restore the Microsoft Exchange Application .................................................................................................... 618
Verify that the Microsoft Exchange Application was Restored ......................................................................... 619
How to Restore Exchange Data on a VMware Virtual Machine ............................................................................... 620
How to Restore a Microsoft SQL Server Application ................................................................................................ 620
Review the Restore Prerequisites and Considerations ..................................................................................... 622
Specify the Microsoft SQL Server Information to Restore ................................................................................ 624
Restore the Microsoft SQL Server Application .................................................................................................. 629
Verify that the Microsoft SQL Server Application was Restored ...................................................................... 630
How to Restore an Oracle Database ........................................................................................................................ 630
Review the Prerequisites and Considerations................................................................................................... 632
Restore the Server Parameter File .................................................................................................................... 632
Restore the Parameter File ............................................................................................................................... 633
Restore the Archived Redo Logs ....................................................................................................................... 634
Restore the Tablespaces or Data Files .............................................................................................................. 634
Restore System, or Undo Tablespaces or Data Files ......................................................................................... 635
Restore All Tablespaces and Data Files ............................................................................................................. 637
Restore Control Files ......................................................................................................................................... 638
Restore the Entire Database (Tablespaces and Control Files) .......................................................................... 640
Recover the Oracle Database Using Bare Metal Recovery ............................................................................... 641
How to Perform a File-Level Recovery on Linux Nodes ........................................................................................... 642
Contents 13
How to Restore Microsoft Clustered Nodes and Shared Disks ................................................................................ 762
Review the Prerequisites .................................................................................................................................. 763
Restore Files of a Cluster Shared Disk ............................................................................................................... 764
Restore a Specific Node in a Cluster ................................................................................................................. 764
Restore a Corrupted Cluster Shared Disk .......................................................................................................... 765
Restore the Entire Clustered Nodes and Shared Disk ....................................................................................... 765
How to Restore an Active Directory ......................................................................................................................... 767
Review the Restore Prerequisites and Considerations ..................................................................................... 768
Restore an Active Directory .............................................................................................................................. 769
Verify that the Active Directory was Restored .................................................................................................. 772
Contents 15
RAM Utilization reaches 99% When Backup Jobs are Submitted to VM .......................................................... 967
Virtual Standby Related............................................................................................................................................ 967
Arcserve UDP Reports Related ................................................................................................................................. 972
How to Display Charts to View Arcserve UDP Reports ..................................................................................... 973
Appendix C: How to apply different version of VDDK other than the built-in Version
(6.0.1) in Arcserve UDP 989
Appendix D: How to Migrate Arcserve D2D r16.5 Backup Data of Two Servers Having
Same Host Name to RPS Data Store 991
Contents 17
Chapter 1: Features and Enhancements
This section explains the features or enhancements provided in each release of
<ARCSERVE UDP>.
This section provides information about new features, enhancements, support, and
dropped features.
■ New Features (see page 20)
■ Feature Enhancements (see page 24)
■ Linux Agent Enhancements (see page 27)
■ Database and Platform Support (see page 28)
■ Security and Third-party Enhancements (see page 29)
New Features
Important! Access to new features of Arcserve UDP depends on the type of licensing
that one owns. Some of the features are only available in Arcserve UDP Advanced
Edition, or require Arcserve UDP Premium Edition. You can verify the details in the
license guide or visit Arcserve website to contact the Arcserve Sales team of your region.
■ Hardware snapshot support: Apart from the software snapshots, Arcserve UDP
lets you create hardware snapshots for generating your backup sessions. You
can enable hardware snapshots for VMware virtual machine and physical
machine backups. For Hyper-V servers, Arcserve UDP provides transportable
snapshot backup. For VMware, iSCSI and NFS are supported.
■ Hardware Snapshot for agentless backup of VMware VMs: When the Flex
Clone license is not available for use, then following features will be
automatically available for use to support Hardware Snapshot:
– For NFS 3 on Data on tap 8.2.3 or later and 8.3.1 or later: VMware VMs can
use the NFS client of the specified version to create a Hardware Snapshot
for backup, if the Flex Clone is not licensed. Microsoft NFS client must be
installed and configured on the backup proxy server.
– For 7 mode appliance hosting iSCSI luns: VMware VMs can support the
Hardware Snapshot feature using the LUN clone mechanism, if the Flex
Clone is not licensed.
– For C Mode appliance hosting iSCSI luns: VMware VMs can support the
Hardware Snapshot feature using the Snap Restore mechanism, if the Flex
Clone is not licensed.
■ CLI Support on Windows Core Servers, Test Automation, OEM Integration:
Arcserve UDP supports submitting backup and restore jobs from the command
line.
■ Role-based Administration: Role-based Administration (RBAC) allows users to
use UDP Console by different roles. Each role can have its own permissions. A
super administrator role can create customized roles and permissions. RBAC
grants Arcserve UDP the capability of different level of security check for
different roles.
■ WAN/NAT connectivity support from Console: Arcserve UDP enhances the
protection of servers that are behind NAT firewall and run the Console in public
cloud. The Console uses the gateway to communicate with servers that are in a
client network.
– Gateway supports proxy setting: Arcserve UDP supports setting up a proxy
server on the gateway installation machine. Gateway will use this proxy
setting to communicate with its registered Console. The proxy server
settings such as IP address, port, username, and password can be changed
from the command line using GatewayTool.exe that is located in the
following path:
<Installation Path>\Arcserve\Unified Data Protection\Management\BIN
– Gateway upgrade: The Gateway automatically upgrades to the same
version as its registered Console. After the Console is upgraded, the
Console automatically starts the Gateway upgrade.
– Replication between sites: Arcserve UDP lets you configure cross-site
replication in single plan by setting up proxy and NAT in a Replicate task.
– Plan is associated with a Site: Arcserve UDP associates a plan with a site.
When you configure a plan, you can add nodes that belong to a site. Only
the Replicate task lets you configure a cross-site replication by selecting
remote sites. You can switch sites from the Resources view and see the
plans related to that site.
■ Configuration Wizard: The wizard provides an easy workflow to set up
Arcserve UDP. Using this wizard, you can create a plan to protect different
kinds of servers including physical and virtual machines, Windows and Linux
machines.
■ On-demand replication job: Arcserve UDP lets you start a manual replication
from the Console. On the Console, you can click Replicate Now from the
context menu of Nodes, and select the replication source and target. The
Replicate Now option replicates pending sessions to the target RPS.
■ On-demand merge job: Arcserve UDP lets you start a manual merge job to
manage recovery points. On the Console, you can click Merge Now from the
context menu of Nodes to start an on-demand merge job. You can configure
retention settings when submitting the on-demand merge job.
■ On-demand File Copy job: Arcserve UDP lets you start a manual File Copy job
from the Console. Use the manual File Copy option to submit any missed or
new File Copy job. You can run the File Copy job either from the Nodes view or
Plans view.
■ On-demand File Archive job: Arcserve UDP lets you start a manual File Archive
job from the Console. Use the manual File Archive option to submit a File
Archive job on demand. You can run the File Archive job either from the Nodes
view or Plans view.
■ New Arcserve UDP Exchange Granular Restore Utility: The new Arcserve UDP
Exchange Granular Restore Utility (AEGR) is a convenient and easy-to-use utility
for Exchange GRT. The AEGR utility provides better performance for Exchange
granular items (including mail, calendar, task, note, contact, public folder)
restore.
– Support for agentless backup from Hyper-V.
– Support for Microsoft Exchange 2016.
– Japanese search support for Subject, From, and To by using the Extended
search option.
– The utility will be automatically configured to match different languages
during the installation.
■ Granular restore for SharePoint: Arcserve UDP supports granularity restore for
SharePoint by documentation. The following objects are supported:
– Farm
– Farm without configuration
– Application Service
– Web Application
– Content Database
– Site Collection
– Site
– Document Library / List
– Folder / File / List Item
■ File Archive: Arcserve UDP has introduced a File Archive task that copies the
file to a destination and deletes the files from the source location.
– The File Archive job now runs on an RPS.
– The File Archive job is not dependent on a catalog job. The catalog job runs
as a part of the File Archive job for the selected file archive source.
– After the files are archived, Arcserve UDP launches another job to delete
the source files.
– Arcserve UDP supports File Archive from a deduplication data store and
non-deduplication data store.
– With the new SDK (Version 2.2.0) implementation, File Archive now
supports Azure Zone-redundant Storage (ZRS).
– File Archive now supports Pre-flight check (PFC).
– New and improved File Archive Filters UI.
– File Archive now receives alerts from agents and RPS.
■ Copy to Tape: Arcserve UDP integrates with tape and lets you create a plan to
migrate the recovery points to a tape.
■ Automatically collect diagnostic information: Arcserve UDP provides the
option to automatically collect the diagnostic information such as system and
application logs and stores them at a single location. You can reference these
logs when you contact the Arcserve Support team.
Feature Enhancements
Important! For details on Feature Enhancements in Arcserve UDP 6.0 Update 1, see
Update 1 Feature Enhancements.
■ Fully Qualified Domain Name (FQDN) support: Arcserve UDP supports adding
nodes and RPS using FQDN. The Console uses the configured FQDN of the
agent and RPS to communicate with the agent and RPS. This allows the
Console, agent, and RPS to be in different domains and still communicate with
each other. Agents and the Backup Proxy Server connect to the RPS using the
FQDN. This feature is useful if the backup destination for agents is a data store
in a remote destination. (For example, the data store is in an MSP
environment.)
■ File Copy: Arcserve UDP now supports file copy from a deduplication data
store, non-deduplication data store, and replication data store (both
deduplication and non-deduplication).
– The file copy job now runs on an RPS.
– The file copy job is not dependent on a catalog job. The catalog job runs as
a part of the file copy job for the selected file copy source.
– The file copy task also includes advanced scheduling options.
– With the new SDK (Version 2.2.0) implementation, File Copy now supports
Azure Zone-redundant Storage (ZRS).
– File Copy now supports Pre-flight check (PFC).
– New and improved File Copy Filters UI.
– File Copy now receives alerts from agents and RPS.
■ Reboot not required for Windows Agent: After the installation of Arcserve
UDP Agent (Windows), you do not have to reboot the machine.
■ Allow more jobs when a data store is in the degraded state: When a data
store is in the degraded state (read-only mode), the backup job and
replication-in job will not be able to run, but all other jobs can run as long as
they can be triggered either manually or automatically (by scheduling). The
following jobs can be run in the degraded state:
– File system catalog job (on-demand from Find Files / Folders to Restore UI)
– File copy, File archive, File copy purge job
– File copy restore job
– File copy purge job
– File / Folder restore job
– Merge job
– Deletion job
– Exchange GRT catalog job (on-demand from Restore Exchange Mail UI)
– Exchange mail restore job
– Copy recovery point job
– Mount to recovery point
– Jump start job
– Replication job (replication out only)
– BMR job
– VM recovery job
– Instant VM job
– AD recovery job
■ Allow more jobs when a plan is paused: When a plan is paused, Arcserve UDP
allow other jobs that can be triggered manually. The following jobs can be
triggered manually:
– Manual backup job
– Manual replication job
– Manual merge job
– Deletion job
– On-demand file system catalog job
– On-demand Exchange GRT catalog job
– File / folder restore job
– Exchange mail restore job
– File copy restore job
– BMR job
– VM recovery job
– Instant VM job
– AD recovery job
– Jump start job
■ Configure Purge or disk reclamation job: Arcserve UDP allows to configure
purge or disk reclamation jobs to run in parallel with other regular jobs.
■ VMware VIX API is not required for Host-Based Agentless backup: Arcserve
UDP now uses vSphere Webservice API to perform any operation such as PFC,
Application log purge, and interacting with guest OS of the VM. The installation
of VMware VIX is not required.
■ Command Line Data Integrity Tool for Deduplication Data Store
(as_gddmgr.exe) enhancements: The following enhancements are made in this
release:
– Displays the impacted recovery points if the tool detects corrupted data
blocks.
– Added a new option RebuildHashWithIndexPath to regenerate the hash
database by scanning index and reference files. This option regenerates
the hash database if the data store is not present on any RPS.
■ sudo authentication support for Linux agents: Arcserve UDP allows sudo users
to add Linux nodes and run backup jobs.
■ File-level restore for Linux virtual machines: Arcserve UDP allows file-level
restore from a host-based agentless backup session of Linux virtual machines.
■ Improved BMR capabilities for Arcserve UDP Linux Agents: The following new
capabilities are added to Arcserve UDP Linux agents:
– Instant BMR: Arcserve UDP can instantly recover a complete physical or
virtual Linux machine. The supported Linux virtual machines are VMware
vSphere, Xen, and Kernel-based Virtual Machine (KVM).
– Support for UEFI Systems: Arcserve UDP can perform BMR for Linux
source nodes that need the UEFI boot method.
Introduction
Arcserve Unified Data Protection is a comprehensive solution to protect complex IT
environments. The solution protects your data residing in various types of nodes such as
Windows, Linux, and virtual machines on VMware ESX servers or Microsoft Hyper-V
servers. You can back up data to either a local machine or a recovery point server. A
recovery point server is a central server where backups from multiple sources are
stored.
Arcserve UDP replicates backup data that is saved as recovery points from one server to
another recovery point server. You can also create virtual machines from the backup
data that can act as standby machines when the source node fails. The standby virtual
machine is created by converting recovery points to VMware ESX or Microsoft Hyper-V
virtual machine format.
The Arcserve UDP solution provides integration with Arcserve High Availability. After
you create scenarios in Arcserve High Availability, you can manage and monitor your
scenarios and perform operations like adding or deleting destination machines.
The following diagram illustrates the major functions that Arcserve UDP lets you
perform.
The following diagram illustrates the high-level steps that you need to perform to
protect data.
Arcserve UDP provides the following two features that allow you to start the virtual
machine from recovery points:
■ Instant Virtual Machine (IVM): Creates a virtual machine instantly from a recovery
point. The advantage of an Instant virtual machine is that it provides an immediate
access to data and applications present in the Arcserve UDP backup sessions. An
Instant virtual machine eliminates the downtime associated with a traditional
restore or conversion of the backup session to a physical or virtual machine.
For more details on Instant Virtual Machine, see How to Create and Manage an
Instant Virtual Machine (see page 497).
■ Virtual Standby Machine (VSB): Converts the recovery points to virtual machine
formats and prepares a snapshot to easily recover your data when needed. This
feature provides the high availability capability also and ensures that the virtual
machine can take over immediately when the source machine fails. The standby
virtual machine is created by converting the recovery points to any VMware or a
Hyper-V virtual machine format.
For more details on Virtual Standby, see How to Create a Virtual Standby Plan (see
page 342).
To determine which feature works best, you need to consider your RTO (Recovery Time
Objective) and scenario. The following table provides the comparison between the IVM
and VSB features:
FEATURES IVM VSB
Power standby Yes Yes, ONLY if a VSB task was added to the
VMs from the (no conversion needed) backup plan. For example, Advance planning
latest recovery required)
point
Requires Not required Required, it is necessary to add a VSB task to
backup time the plan that is used to back up the source
processing machine.
VM Boot time A slower process (up to Same time as any other VM on the same
30%) due to I/O hypervisor.
redirection.
Disk space Minimal storage space Yes, storage space is consumed on the
requirements to host child disk or destination hypervisor where VSB standby
store changes when VM is maintained.
running a VM. Requires storage space equal to or greater
than the size of the source machine.
Persisting data The virtual disk of the The virtual disk or disks of the VSB VM
and migrating IVM refers to the data already contain most of the recent data
VM to blocks in the recovery from the corresponding recovery point.
production point from which the Since I/O redirection does not occur (which
VM was started. is the same as the IVM), the performance of
Therefore, when the the VSB VM is the same as regular VMs
IVM accesses data where there is no dependency on the RPS or
blocks within its virtual recovery point (compared to the IVM
disk the data is actually scenario).
requested from RPS
(this process is
transparent to the
user). Such I/O
redirection introduces
some additional
performance footprint.
If you plan to use IVM
in production then we
recommend to make
IVM persistent and
hydrate the virtual
machine virtual disk
with the actual data.
Hydration of the IVM
can be achieved by
copying/replicating the
VM.
Depending on the type
of Hypervisor used in
your production
environment, to persist
the IVM data you can
use VMware Storage
vMotion or Hyper-V
VM replication to copy
the IVM where the data
becomes permanent.
What To Do Next?
1. Review the Prerequisites and Considerations (see page 40)
2. Decide the Installation Type (see page 40)
3. Install Arcserve UDP Using the Setup Wizard (see page 41)
4. Install Arcserve UDP Using the Command Line (see page 44)
5. Install Arcserve UDP Using the Unified Installer (see page 49)
6. Verify the Installation (see page 50)
7. (Optional) Communication Ports Used (see page 51)
8. (Optional) How the Installation Process Affects Operating Systems (see page 61)
Prerequisites
■ Review the Arcserve UDP Release Notes 6.0. The Release Notes contains a
description of system requirements, supported operating systems, and a list of
issues known to exist with this release.
■ Verify that your systems meet the software and hardware requirements necessary
to install Arcserve UDP components.
■ Verify that your Windows account has administrator privileges or any other equal
privileges to install software on the systems where you plan to install Arcserve UDP
components.
■ Verify that you have the user names and passwords of the systems where you are
installing Arcserve UDP components.
■ Review the Compatibility Matrix which provides the supported operating systems,
databases, and browsers.
Considerations
Before the installation, you should determine how to set up your Arcserve UDP
installation:
■ The system where you want to install the Console.
■ The nodes that you want to protect.
■ The number of recovery point servers that would serve as backup destinations.
■ The number of replica servers that would replicate recovery point servers.
Install Arcserve Unified Data Protection on a server from where you can manage
protected nodes and other Arcserve Unified Data Protection components.
■ Without this driver installed, Arcserve UDP Agent (Windows) cannot perform a
local backup.
■ With this driver installed, you would still need to have a valid Arcserve UDP
Agent (Windows) license to perform a local backup.
■ This driver is not required if this agent is used as Virtual Standby monitor or
host-based VM backup proxy server.
Note: You can install this driver at any time after the installation is complete by
running the InstallDriver.bat utility from the following location:
<Arcserve UDP install folder>\Engine\BIN\DRIVER
6. Click Next.
The Destination Folder dialog opens.
7. Specify the folder where you want to install Arcserve Unified Data Protection and
click Next.
The Configuration dialog opens.
8. On the Configuration dialog, specify the following information:
a. Select the protocol.
Note: For a secure communication, select the HTTPS protocol. To use the SSL
protocol for a hostname that contains an underscore (_) character, you must
manually run the following batch file before using the UDP Agent or Console:
UDP Agent: INSTALLDIR \Engine\BIN\changeToHttps.bat
UDP Console: INSTALLDIR \Management\BIN\changeToHttps.bat
b. Enter the port number for the agent, if applicable. Typically, the port number is
8014.
c. Enter the port number for the Console, if applicable. Typically, the port number
is 8015.
d. Enter the Windows Administrator name and password.
e. Specify if you want to display the Arcserve UDP agent monitor for all users or
only the current user.
9. Click Next.
The Database Settings dialog opens.
10. On the Database Settings dialog, click the Database drop-down list to choose a
database type. You can specify one of the following:
■ Microsoft SQL Server 2014 Express (included)
■ Microsoft SQL Server
Important! When you have more than 500 nodes to manage from the Console,
make sure that you select Microsoft SQLServer and not SQLExpress.
After you specify a database, the required options for the specified database are
displayed on the Database Settings dialog. Provide database settings details for one
of the databases that you select.
Microsoft SQL Server 2014 Express (included):
On the Database Settings dialog, complete the following:
a. Specify the location where you want to install Microsoft SQL Server 2014
Express. You can accept the default path or specify an alternative path.
b. Specify the location where you want to install the data file for the Arcserve
Unified Data Protection default database. You can accept the default path or
specify an alternative path.
Note: Microsoft SQL Server 2014 Express does not support remote
communication. Therefore, install the default database and the data file on the
computer where you are installing the application.
Microsoft SQL Server Databases
On the Database Settings dialog, complete the following:
a. SQL Server Type: Specify the type of communication that the application
should use to communicate with the SQL Server database.
Local: Specify Local when the application and SQL Server are installed on
the same computer.
Remote: Specify Remote when the application and SQL Server are installed
on different computers.
b. SQL Server Name: If the SQL Server Type is Remote, specify the remote SQL
Server name. If the SQL Server is local, select the server from the drop-down
list.
c. Security: Specify the type of credentials that you want to use to authenticate
SQL Server.
Use Windows Security: Authenticates using your Windows credentials.
Use SQL Server Security: Authenticates using SQL Server credentials. Enter
the Login ID and Password to access the SQL Server account.
Example:
Arcserve_Unified_Data_Protection.exe -s -a -q -Products:Agent -User:administrator -Password:test
3. Configure the silent installation using the following syntax and arguments:
Important: If the parameters include any of the following special characters,
enclose the parameters in quotes:
■ <space>
■ &()[]{}^=;!'+,`~
For example: If the password is abc^*123, the input should be
-Password:"abc^*123".
-s
Runs the executable file package in the silent mode.
-a
Specifies additional command line options.
-q
Installs the application in the silent mode.
-Products:<ProductList>
(Optional) Specifies the components to install silently. If you do not specify a
value for this argument, the silent installation process installs all components.
You can specify the following components:
Agent: Installs the Data Protection Agent component.
RPS: Installs the Recovery Point Server component.
Console: Installs the Console component.
All: Installs all the components of Arcserve UDP.
Example:
For Install Data Protection Agent:
-Products:Agent
For Install Data Protection Agent, Recovery Point Server and Data Protection
Console:
-Products:Agent,RPS,Console
-User:<UserName>
Specifies the user name that you want to use to install and run the application.
Note: The user name is of the administrator or an account with administrative
privileges.
-Password:<Password>
Specifies the password of the user name.
-Https:<HTTPS>
(Optional) Specifies the communication protocol. The options are 0 and 1. Use
0 for http and 1 for https.
Default: 0
Example:
-https:1
-Path:<INSTALLDIR>
(Optional) Specifies the target installation path of Data Protection Agent.
Example:
-Path:C:\Program Files\Arcserve\Unified Data Protection
Note: If the value for INSTALLDIR contains a space, enclose the path with
quotation marks. Additionally, the path cannot end with a backslash character.
-ConsolePort:<Port Number>
(Optional) Specifies the communication port number for the Console.
Default: 8015
Example:
-ConsolePort:8015
Note: Use this option when you want to install the Console.
-AgentPort:<Port Number>
(Optional) Specifies the communication port number to access Arcserve UDP
Agent.
Default: 8014
Example:
-AgentPort:8014
Note: Use this option when you want to install the Arcserve UDP Agent.
-Driver:<DRIVER>
(Optional) Specifies whether to install Arcserve UDP Agent change tracking
driver. The options are 0 and 1.
0: Does not install the driver
1: Installs the driver
Default:1
Example:
-driver:1
-MonitorFlag:<MONITORFLAG>
(Optional) Specifies the Arcserve UDP Agent monitor display to users. The
options are 0 and 1.
0: Displays the agent monitor to all users.
1: Displays the agent monitor only to the current user.
Default: 0.
Example:
-MonitorFlag:0
Note: Use this option while upgrading to a new version. Verify that you set the
value to 1 or stop the service before starting the upgrade process. This helps
ensure that the installation does not fail.
-SummaryPath:<SUMMARYPATH>
(Optional) Specifies the target path to generate the summary file of the
installation.
Example:
-SummaryPath:C:\Result
Note: If the value for SUMMARYPATH contains a space, enclose the path with
quotation marks. Additionally, the path cannot end with a backslash character.
-AutoReboot:<AUTOREBOOT>
(Optional) Let Setup reboot the machine after installation if the installation
requires a reboot. The options are 0 and 1.
0: Does not reboot the machine.
1: Reboots the machine if the installation requires a reboot.
Default: 0
Example:
-AutoReboot:1
Note: If the installation does not require a reboot, Setup will not reboot the
machine even if this parameter is set to 1.
When Arcserve UDP is successfully installed, you can centrally manage and monitor
nodes, recovery point servers, virtual machines in VMware vCenter or ESX servers or
Microsoft Hyper-V servers, replica servers, and Arcserve Unified Data Protection
reports. You can also install Arcserve Backup and Arcserve Replication and High
Availability.
Installs Arcserve Replication and High Availability. Wnen coupled with Arcserve
UDP, you can protect and manage RHA servers from the Arcserve UDP Console.
The Product Download dialog opens.
8. Click Download.
The product begins to download in a zip format. You can check the download status
on the progress bar. You can also pause and resume the download. Depending on
the bandwidth and the number of components for download, this may take a while.
Until the download is complete, the Next button is inactive.
9. When the download completes, click Next.
The Installation Method dialog opens.
10. Select one of the installation types.
Express Installation
Installs the components using the default configuration. Click View Default
Configuration and Components to see the components that are installed.
Advanced Installation
Lets you install each component separately.
11. Click Next.
The Account Configuration dialog opens.
12. Specify the user name and password and click Install.
The installation begins. You can see the progress on the dialog. On completion of
the installation, close the wizard.
You have successfully installed Arcserve UDP and you are ready to back up your
Windows machine.
Ports listed are required for backup and other jobs when you have a LAN environment.
*Port sharing is supported for replication jobs. All data on different ports can be
forwarded to port 8014 (default port for the UDP Server, can be modified during
installation). When a replication job runs between two recovery point servers across
WAN, only port 8014 is required to be open.
Similarly, for remote replications, the Remote administrator needs to open or forward
port 8014 (for data replication) and port 8015 (default port for the UDP console, can be
modified during installation) for local recovery point servers to get the assigned
replication plan.
This section provides information about ports used in UDP Console and UDP Recovery
Point Server (RPS):
■ UDP Console (see page 51)
■ UDP Recovery Point Server (RPS) (see page 54)
■ UDP Windows Agent (see page 57)
UDP Console
The following table lists the ports used by Arcserve UDP Console:
8030 TCP UDP tomcat8.e Intern Default port internally used by UDP
Console xe al Console Management Service.
Note: The port could not be
customized and can be ignored for
the firewall setting. If 8030 is
occupied by other programs, UDP
setup program will dynamically
assign another available port.
18007 TCP TOMCAT tomcat8.e Intern
xe al Internally
Used by
Tomcat
Managem
ent
Service.
Note: This
port can
only be
changed
by
modifying
TOMCAT
configurati
on files.
This port
can be
ignored for
the
firewall
setting.
The following table lists the ports used by Arcserve UDP Recovery Point Server (RPS):
8016 TCP UDP tomcat8.e Interna Internally used by UDP RPS Web
xe l Services to communicate with the UDP
RPS Port Sharing Service on the same
server.
Note: The port could not be
customized and can be ignored for the
firewall setting.
5000-5 TCP UDP GDDServe Externa This port range is reserved for UDP
060 r.exe l RPS Deduplication Data Store Service.
One UDP RPS Deduplication data store
will use 3 free ports start from 5000. It
is needed when data store with
Deduplication enabled for backup or
restore. If you use RPS as the
replication target only, you don’t need
to open them in the firewall
configuration.
Note: You can customize the port
range in Registry by changing:
■ HKEY_L
OCAL_
MACHI
NE\SOF
TWARE
\Arcser
ve\Unifi
ed Data
Protecti
on\Engi
ne\Dat
aStore
■ Key
Name:
PortRan
geForG
DD
■ Type:
Reg_SZ
■ Default
Value:
5000-5
060
Only data store created after registry
changes will use the newly changed
port range.
18005 TCP TOMCA tomcat8.e Interna To shutdown Tomcat used by the UDP
T xe l RPS or Agent.
Note: This port can only be changed by
modifying TOMCAT configuration files.
This port can be ignored for the
firewall setting
445 TCP Externa Used by SMB service of Windows OS.
l The port is used when the RPS host the
data store on a local disk. The data
store exposes the shared folder as the
backup destination for the UDP Agent
to back up data.
The following table lists the ports used by Arcserve UDP Windows Agent:
This section provides information about ports used in Linux Backup Server (see page 58)
and Linux Nodes protected by Linux Backup Server remotely (see page 60).
The following table lists the ports used by Linux Backup Server:
8014 TCP UDP java Externa Both incoming and outgoing. Default
Linux l HTTP/HTTPS communication port to visit
UDP Agent for Linux.
Note: You can modify the default
communication port when you install the
UDP components.
18005 TCP UDP java Interna Used by Tomcat. Ignore this port for the
Linux l firewall setting.
Note: This port can only be changed by
modifying TOMCAT configuration files.
22 TCP SSH sshd Externa UDP Linux 3rd party dependency. Default
servic l for SSH service, however, you can change
e this port. This port is required for both
incoming and outgoing communications.
8016 TCP UDP d2ddss Externa Incoming, used for Instant VM or Instant
Linux l BMR data service. Only required if user
wants to use the Instant VM or Instant
BMR feature.
111 TCP Port rpcbind Externa UDP Linux 3rd party dependency. Default
mapp l for port mapper. Only required when
er running Linux Instant VM from agentless
backup recovery point to the vSphere ESX
server.
2049 TCP NFS nfsd Externa UDP Linux 3rd party dependency. Default
server l for NFS server. Only required when running
Linux Instant VM from agentless backup
recovery point to the vSphere ESX server.
Dyna TCP NFS rpc.mou Externa UDP Linux 3rd party dependency. See
mic moun ntd l rpc.mountd’s man page for how to make it
port t listen to fixed port. Only required when run
servic Linux Instant VM from agentless backup
e recovery point to the vSphere ESX server.
The following table lists the ports used by Linux Nodes Protected by Linux Backup Server
Remotely:
This section provides information about the ports used for Hyper-V host (see page 60).
Hyper-V host
Arcserve UDP installs binary files that are developed by third parties, other Arcserve
products, and Arcserve UDP that are not signed. The following table describes these
binary files:
Binary Name Source
httpd.exe Apache
libapr-1.dll Apache
libapriconv-1.dll Apache
libaprutil-1.dll Apache
libeay32.dll Apache
libhttpd.dll Apache
msvcm80.dll Apache
openssl.exe Apache
pcre.dll Apache
rotatelogs.exe Apache
ssleay32.dll Apache
msvcm80.dll Apache
libbind9.dll bind
libdns.dll bind
libeay32.dll bind
Arcserve UDP installs binary files that are developed by third parties, other Arcserve
products, and Arcserve UDP that contain incorrect file version information. The
following table describes these binary files:
Binary Name Source
openssl.exe Apache
pcre.dll Apache
libbind9.dll bind
libdns.dll bind
libisc.dll bind
libisccfg.dll bind
liblwres.dll bind
libxml2.dll bind
win_nsupdate.exe bind
libcurl.dll VMware
libexpat.dll VMware
liblber.dll VMware
libldap.dll VMware
libldap_r.dll VMware
libldap_r.dll VMware
libldap_r.dll VMware
libxml2.dll VMware
ssoclient.dll VMware
vddkReporter.exe VMware
zlib1.dll VMware
zlib10.dll zlib
sqlite3.exe sqlite
AsyncClient.net.dll Axcient
doclib.dll Axcient
docxlib.dll Axcient
DspchConnector.dll Axcient
esr.exe Axcient
esrdf.dll Axcient
esrsdll.dll Axcient
eswrapper.dll Axcient
html2text.dll Axcient
licensemanager.dll Axcient
mhdll.dll Axcient
orcmn.dll Axcient
pdflib.dll Axcient
pptlib.dll Axcient
pptxlib.dll Axcient
protection.dll Axcient
pstgen.dll Axcient
resources.dll Axcient
rtf2html.dll Axcient
rtflib.dll Axcient
uicommon.dll Axcient
xlslib.dll Axcient
xlsxlib.dll Axcient
openssl.exe Apache
pcre.dll Apache
AxShockwaveFlashObjects.dll Adobe
sqljdbc_auth.dll Oracle
UpdateData.exe Arcserve licensing
decora-sse.dll Oracle
fxplugins.dll Oracle
glass.dll Oracle
glib-lite.dll Oracle
gstreamer-lite.dll Oracle
javafx-font.dll Oracle
javafx-iio.dll Oracle
jfxmedia.dll Oracle
jfxwebkit.dll Oracle
libxml2.dll Oracle
libxslt.dll Oracle
prism-d3d.dll Oracle
sqljdbc_auth.dll Oracle
WSVJIVPC.DLL Microsoft
YAMLXM8B.DLL Microsoft
DTSWizard.exe Microsoft
dtutil.exe Microsoft
ScenarioEngine.exe Microsoft
EZP2PDKI.EXE Microsoft
J1SLFTQZ.EXE Microsoft
JCSRC-OA.EXE Microsoft
QJ0LIMQA.EXE Microsoft
LANDINGPAGE.EXE Microsoft
rdbgsetup.exe Microsoft
OSQL.EXE Microsoft
SQLdiag.exe Microsoft
SqlLogShip.exe Microsoft
sqlwriter.exe Microsoft
bcp.exe Microsoft
SQLCMD.EXE Microsoft
BackupToUrl.exe Microsoft
DatabaseMail.exe Microsoft
DCEXEC.EXE Microsoft
SQLAGENT.EXE Microsoft
SQLIOSIM.EXE Microsoft
sqlmaint.exe Microsoft
sqlservr.exe Microsoft
sqlstubss.exe Microsoft
xpadsi.exe Microsoft
cl.exe Microsoft
link.exe Microsoft
javacpl.exe Oracle
javaws.exe Oracle
jp2launcher.exe Oracle
ssvagent.exe Oracle
vddkReporter.exe VMware
vdiskmanager.exe VMware
vmware-mount.exe VMware
Note: All updates that are released for Arcserve UDP are cumulative. As a result, each
update also includes all previously released updates to ensure that your computer is
always up-to-date. The Help About dialog displays the update level that is installed on a
computer. If necessary, you can use this information to build another server with the
same configuration/patch level.
■ Staging Server
Specifies that updates are downloaded from the staging server.
Note: If required, you can create a staging server. For more information, see
How to Create a Staging Server (see page 73).
If you specify more than one staging server, the first listed server is designated
as the primary staging server. Arcserve UDP initially attempts to connect to the
primary staging server. If the first listed server is not available, then the next
listed server becomes the primary staging server. The same sequence is
continued until the last listed server becomes the primary staging server. (The
Staging Server list is limited to the maximum of 5 servers).
– You can use the Move Up and Move Down buttons to change the staging
server sequence.
– You can use the Delete button to remove a server from this listing.
– You can use the Add Server button to add a new server to this listing.
When you click the Add Server button, the Staging Server dialog opens,
allowing you to specify the name of the added staging server.
When you select the staging server as your download server, then:
■ If the specified staging server has any update, then the Arcserve UDP
Console can get update from this staging server.
■ If the specified staging server has no update, then the Arcserve UDP
Console is unable to download update from this staging server. The log
displays the following message:
No new update available.
Note: You cannot download Arcserve UDP updates from a staging server if
HTTPS is enabled on it for web communication.
■ Proxy Settings
Note: This Proxy Server option is only available when you select the Arcserve
Server as the download server.
Select Proxy Settings to specify if you want the Arcserve UDP updates to be
downloaded via a proxy server. A proxy server acts as an intermediary between
your download server (staging or client) and the Arcserve server to ensure
security, increased performance, and administrative control. This serves as the
connection to the Arcserve server from which your download server gets the
updates.
When you select this option the Proxy Settings dialog opens.
Staging server is a node on which the Arcserve UDP Agent or Console is installed. Once
this node finishes downloading updates from arcserve download server, it can work as a
staging server to provide updates for others.
You can add a staging server manually, consider the following notes:
■ For other nodes, to download updates from staging server you need to specify the
server name and http port. By default, console is 8015 and agent is 8014.
■ To work as a staging server, the node must use ‘http’ protocol, ‘https’ is not
supported.
■ Arcserve UDP console can only download updates from console staging server.
■ Arcserve UDP agent can download updates from the console or agent staging
server.
4. Click Install.
Installation of Arcserve UDP updates starts.
2. Configure the silent installation using the following syntax and arguments:
UpdateExeFile
Specifies to run the self-extracting executable file.
s
Specifies to run the self-extracting executable file using the silent mode.
v
Specifies any additional arguments for update installation.
Additional Arguments
/s
Specifies to run the update installation using the silent mode.
/AutoReboot
Specifies to perform an automatic reboot after the update is installed. If a
reboot is required to complete the update, the machine will reboot
automatically without any notification.
Examples
■ To install an update using the silent mode and reboot automatically after
completion, use the following command:
"<UpdateExeFile>" /s /v"/s /AutoReboot"
■ To install an update using the silent mode and not reboot automatically after
completion, use the following command:
"<UpdateExeFile>" /s /v"/s"
Standard Uninstall
You can uninstall the following components.
■ Arcserve UDP Console
■ Arcserve UDP Recovery Point Server
■ Arcserve UDP Agent
Silent Uninstall
A silent uninstallation eliminates the need for user interaction while performing
uninstall.
Important!
1. The Arcserve licensing is shared by all Arcserve products. Ensure that you do not
have any other Arcserve product installed on your machine or else you may lose the
licensing for all Arcserve products installed on that machine.
2. If the components are removed, any programs that are installed after Arcserve UDP
Agent (Windows) and depend on these components may not function properly.
If you want to manually remove these components, perform the following steps:
Remove Microsoft Visual C++ and Microsoft SQL Server Express manually
1. Access the standard Add or Remove Programs application located in the Windows
Control Panel (Control Panel, Programs and Features, Remove Programs).
2. Select Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.30501 and then click
Uninstall.
3. Select Microsoft Visual C++ 2013 Redistributable (x64) - 12.0.30501 and then click
Uninstall.
4. Select Microsoft SQL Server 2014 (64-bit) and then click Uninstall.
5. To remove only the Arcserve UDP database, select "ARCSERVE_APP" and click
Uninstall.
Each new user of the application (member server) is granted an active license from the
license pool on a first-come, first-served basis until the total number of available
licenses is exhausted. If all the active licenses are already in use and you want to license
a new server, you have to manually release a license from one of the licensed servers
and then apply that license to the new server.
For all scenarios, when there are no licenses available, you will get an error message in
the Activity Log.
You can easily remove license rights to allow other member servers to gain license
privileges. From the Console, you can access the License Management dialog and view
the active license counts for each component. You can also manage which licenses are
applied to which servers.
You can use Arcserve UDP for a trial period. At the end of the trial period, if you have
not obtained a license, Arcserve UDP will automatically revert to a No Charge Edition
(NCE) with limited capabilities.
Note: Fore more information on the licensing of Arcserve products, see Arcserve
Licensing User Help.
What To Do Next?
■ Review the Prerequisite (see page 82)
■ Add a License (see page 83)
■ Remove a License (see page 84)
■ Verify the License (see page 84)
Add a License
Arcserve UDP protects only the licensed nodes. If there are enough licenses, then the
licenses are automatically applied to the nodes. If you do not want to protect any node,
you can release the license from that node and use that license to protect any other
node.
Remove a License
If you do not want to protect any node, you can release the license from that node. You
can use the released license to protect any other node.
Note: If you are using a trial version, then at the end of the trial period, if you have not
obtained a license, Arcserve UDP will automatically revert to a No Charge Edition (NCE)
with limited capabilities.
Highlights:
■ After the trial period expires, the Workstation Edition (trial period edition)
automatically reverts to the NCE.
■ Your NCE nodes can still be managed from the Arcserve UDP Console.
■ Provides a very simple key-based upgrade path to the full Arcserve UDP
"Workstation Edition."
■ You can perform backup to a local disk, or to a shared folder, or to any other
supported destination that is not an RPS without requiring a license key.
■ Using NCE, you cannot select an RPS as the backup destination. As a result, you will
lose the ability to leverage the Global Deduplication feature, which dramatically
reduces the amount of data actually transferred during backup cycles. This feature
is available after upgrading to the full Workstation Edition.
■ Live Chat capabilities are unavailable, but you can use Online community based
support for questions or to resolve issues.
Q. What will happen if a Recovery Point Server (RPS) is selected as the destination
for an NCE node?
A. You can still select an RPS as your backup destination under certain
conditions. If your Arcserve UDP environment has license counts available, they
will be consumed on a need-basis.
Q. Does NCE work for server-class operating systems such as Windows 2012?
A. No. NCE is only for use on desktops and laptops running on any of the
supported Windows client operating system (such as Windows 7, 8, or 8.1). You
should check the Compatibility Matrix to view a list of all supported operating
systems.
The Arcserve UDP Version 6.0 GA build supports upgrade and backward support per the
following rules:
Those environment is required to upgrade to Arcserve UDP 5.0 with Update 2 or above
Update version completely prior to upgrade to Arcserve UDP 6.0 finally.
■ For Windows, Arcserve UDP Version 6.0 supports upgrade from Arcserve UDP
Version 5.0 with Update 4, Update 3, or Update 2.
Note: For other previous versions of Arcserve UDP, such as Arcserve UDP Version
5.0 GA or Update 1, you have to manually upgrade to Arcserve UDP Version 5.0
Update 2 or higher Update versions first. Then you can upgrade to Arcserve UDP
Version 6.0.
■ For Linux, Arcserve UDP Version 6.0 supports upgrade from Arcserve UDP Version
5.0 with Update 4, Update 3, or Update 2 and Arcserve D2D for Linux r16.5.
■ Arcserve UDP Version 6.0 does not support upgrade from Arcserve D2D R16.5,
Arcserve Central Protection Management R16.5, Arcserve Central Host-Based VM
Backup R16.5, Arcserve Central Reporting R16.5, Arcserve Central Virtual Standby
R16.5 for Windows.
Note: For such environments, you have to manually upgrade to Arcserve UDP
Version 5.0 Update 2 or higher Update versions first. Then you can upgrade to
Arcserve UDP Version 6.0.
■ The Arcserve UDP Version 6.0 GA build does not support upgrade from Arcserve
UDP Version 6.0 CV builds.
Upgrade the Arcserve UDP Appliance that performs as Arcserve UDPConsole and RPS
■ Upgrade this Arcserve UDP Appliance, then follow up the upgrade sequence (see
page 94) described to upgrade the environment.
■ Complete the upgrading on the Arcserve UDP Appliance. For details, refer to the
How to Upgrade Arcserve UDP from v5 to v6 on the Appliance section in the
Arcserve Unified Data protection Appliance Online Help.
Upgrade the Arcserve UDP Appliance that performs as Arcserve UDP RPS only
■ Upgrade the complete productive environment. For details, refer to the upgrade
sequence (see page 94)
■ Complete upgrade on the Arcserve UDP Appliance. For details, refer to How to
Upgrade Arcserve UDP from v5 to v6 on the Appliance section in the Arcserve
Unified Data protection Appliance Online Help.
Upgrade Steps When Two or More Arcserve UDP Appliances Are Used in the Environment
■ Upgrade the whole productive environment. For details, refer to the upgrade
sequence (see page 94) (available in the Upgrading to Arcserve UDP Version 6.0
section of Solutions Guide v6.0) described in the Arcserve UDP solution guide.
■ Complete the upgrade on the Arcserve UDP Appliance. For details, refer to the How
to Upgrade Arcserve UDP from v5 to v6 on the Appliance section in the Arcserve
Unified Data protection Appliance Online Help.
■ If you see warning as displayed below when you add an Appliance as RPS from
Arcserve UDP Console after upgrade, refer to the Backing Up a UDP Appliance from
Another Appliance Reports Duplicated Nodes topic in the Troubleshooting section
of Arcserve Unified Data Protection Appliance Online Help.
Upgrade the Arcserve UDP Linux Agent on the Arcserve UDP Appliance
■ First, upgrade the Arcserve UDP Console which manages the Linux Backup Server
environment;
■ Then, upgrade the Linux Backup Server on the Arcserve UDP Appliance. For details,
refer to the Arcserve Unified Data Protection Agent for Linux Online Help.
We recommend upgrading all components to Arcserve UDP Version 6.0 in the entire
environment so that new features in Arcserve UDP Version 6.0 can work properly. The
existing backup plans are not impacted if the upgrade does not complete for all the
components at the same time.
Backward Compatibility Support Arcserve UDP Version 5.0 Update 4, Update 3, and
Update 2
Backward Compatibility Support for Windows RPS / Agent (or agentless backup proxy)
■ Arcserve UDP Version 6.0 Console support recovery point servers (RPS) and Agents
(or agentless backup proxies) of the previous versions for backup if the plan does
not change after an upgrade.
■ Arcserve UDP Version 6.0 Console and RPS support previous versions of Agents (or
agentless backup proxies) for backup if the plan does not change after an upgrade.
■ Arcserve UDP Version 6.0 Console supports adding a previous version of RPS server,
but the RPS is automatically upgraded to Arcserve UDP Version 6.0 when it is added
(no reboot required after the auto-upgrade).
■ Arcserve UDP Version 6.0 Console supports adding a previous version of Agent (or
agentless backup proxy) without automatically upgrading the Agent.
■ However, when a plan is modified and saved, the Agents (or agentless backup
proxies) associated is automatically upgraded (no reboot required after the
auto-upgrade).
■ And when a node is being updated, the Agent (or agentless backup proxy) is
automatically upgraded (no reboot required after the auto-upgrade).
■ After upgrading the Console, the existing plans continue to run on the previous
versions of RPS, which is managed by this Console.
■ If you create a new plan, you cannot specify the previous version of the RPS,
which is already managed by this Console, as the destination until the RPS is
upgraded.
■ If you modify an old plan, the plan cannot be saved if the destination is a
previous version of the RPS, which is managed by this Console, until the RPS is
upgraded.
■ Replication is supported from Arcserve UDP Version 5.0 Update 3 or Update 4 to
Arcserve UDP Version 6.0 target RPS
■ However, If you replicate from Arcserve UDP Version 5.0 GM, Update 1, or
Update 2 to Arcserve UDP Version 6.0 target RPS, the replication jobs fail.
■ Replication is not supported from Arcserve UDP Version 6.0 to any lower
version target RPS, including Arcserve UDP Version 5.0 GM, Update 1, Update
2, Update 3, or Update 4
■ Virtual Standby backward compatibility policy:
■ VSB Monitor version should be similar to the Agent version, if the backup
destination is a shared folder.
■ VSB Monitor version should be similar to the RPS version, if the backup
destination is RPS.
Note: Per the replication backward support policy, always upgrade the target RPS
before the source RPS.
Upgrade Consideration
■ Arcserve UDP Version 6.0 hardware requirement must be met. For more
information on the detailed hardware requirement, see the System Information in
Release Notes v6.0.
3. On the Customer site, upgrade the previous Arcserve UDP Console to Arcserve UDP
Version 6.0.
Notes:
■ If the node has only the Console installed, upgrade the Console. You do not
have to stop any running jobs to upgrade the Console.
■ If the node has Console and RPS installed, and there are jobs running on the
RPS, stop the data store of the RPS to cancel the running jobs first. Then,
upgrade the Console.
■ For more information on how to upgrade the Console, see Install Arcserve
Unified Data Protection Using the Setup Wizard (see page 41) or Install
Arcserve UDP Using the Unified Installer (see page 49).
4. On the Customer site, upgrade the previous Arcserve UDP Replication target RPS to
Arcserve UDP Version 6.0.
Notes:
■ Arcserve UDP Version 6.0 support replication from Arcserve UDP Version 5.0
Update 3 or Update 4 source RPS to Arcserve UDP Version 6.0 target RPS.
When the plan includes multiple replication tasks, upgrade the last replication
target RPS at first.
■ Replication is not supported from Arcserve UDP Version 6.0 source RPS to a
lower version of the target RPS, including Arcserve UDP Version 5.0 GA, Update
1, Update 2, Update 3, and Update 4.
■ For more information on how to upgrade the RPS, see Install/Upgrade
Recovery Point Server (see page 254).
5. On the Customer site, upgrade the previous Replication Source RPS to Arcserve UDP
Version 6.0.
Note: For more information on how to upgrade the RPS, see Install/Upgrade
Recovery Point Server (see page 254).
6. On the Customer site, upgrade the previous Proxy and Agents to Arcserve UDP
Version 6.0.
Notes:
■ For more information on how to upgrade the upgrade Windows agentless
proxy and agent, see Deploy Agent to Nodes (see page 186).
■ For more information on how to upgrade the Linux Backup Server, see How to
Upgrade Arcserve UDP Agent (Linux) (..\..\HTML\Agent Online Help
Linux\udpl_how_to_upgrade_d2d_linux.htm).
7. On the Customer site, upgrade the previous VSB Monitor to Arcserve UDP Version
6.0.
Note: For more information on how to upgrade the VSB Monitor, see Install
Arcserve Unified Data Protection Using the Setup Wizard (see page 41) or Install
Arcserve UDP Using the Unified Installer (see page 49).
4. Click Next.
5. Select the components that you want to download.
6. After the components are downloaded, select the installation method to upgrade
the selected components.
Express Installation
Express Installation is recommend when you plan to install all the components
with their default configuration on the same machine. For example, besides
upgrading Arcserve UDP Version 5.0 on the same machine, the Express
Installation mode installs Arcserve Backup r17 and Arcserve High Availability
r16.5 sp5 at the same time, if the Arcserve High Availability option is selected.
Notes:
■ You must meet all the prerequisites for the upgrade. For example, .Net 3.5 is
required for Arcserve Backup. Follow the instructions displayed on the Installer
until all the prerequisites are met.
■ You must meet the Compatibility Matrix requirement.
■ The Express Installation method installs the components per the default
configurations, such as path, protocol, port, and Database. When you upgrade
using the Express Installation method, the same configuration is used as in the
previous release.
Advance Installation
Advance Installation is recommend when you plan to install or upgrade the
each component separately on the same machine. Click the Install button to
upgrade or install each component separately.
Note: To upgrade Arcserve UDP Agent (Linux) using the Unified Installer, download
the images by referring the links shared at the end of the Installer. After copying the
images to the Linux Backup Server, follow steps mentioned in How to Upgrade
Arcserve UDP Agent (Linux) (..\..\HTML\Agent Online Help
Linux\udpl_how_to_upgrade_d2d_linux.htm).
You have successfully upgraded Arcserve UDP using the Unified Installer.
Note: For more upgrade details, see How to Upgrade to Arcserve UDP 6.0 from a
Previous Release (see page 94).
Upgrade Consideration
■ Arcserve UDP Version 6.0 hardware requirement must be met. For more
information on the detailed hardware requirement, see the System Information in
Release Notes v6.0.
Follow these steps to upgrade and enable the Copy to Tape feature:
1. Upgrade to Arcserve Backup r17.0 from a previous release or install Arcserve
Backup r17.0 with the Install Arcserve Backup Web Service option enabled.
Note: For more information on installing and upgrading Arcserve Backup, see the
Arcserve Backup r17.0 Implementation Guide.
After the upgrade is complete, perform the following tasks:
■ Check if the job engine has started in the Arcserve Backup manager.
■ In Windows Services Console, verify that Arcserve Backup Web Service is in the
running status.
How to Migrate from UDP 5.0 Remote Virtual Standby using RHA to
UDP 6.0 Integrated Remote Virtual Standby with RPS Replication
In Arcserve UDP Version 6.0, Virtual Standby from Arcserve HA nodes is not supported.
However, you can configure the remote Virtual Standby (VSB) with RPS replication.
Follow these steps to configure the remote Virtual Standby using the RPS Replication
feature:
1. Before upgrading, stop the RHA scenario for remote VSB in RHA Manager.
2. Upgrade the Console and RPS to Arcserve UDP Version 6.0.
3. After upgrading, create a data store on the source RPS.
4. Use the RPS Jumpstart feature to migrate the older sessions that are backed up to a
shared folder in the previous release to the newly created data store on the source
RPS.
5. Modify the existing backup plan on the source RPS to change the backup
destination from the shared folder to the data store on the source RPS.
6. Add a Replication task and set the remote RPS as the destination.
7. Add a Virtual Standby task to the same plan with the proper hypervisor and
monitor settings.
8. Deploy the modified plan.
Note: If the plan deployment fail, follow the instructions on the error dialog to
upgrade VDDK and re-deploy the plan.
9. Confirm the VSB conversion job is successful and VM successfully starts on the
target hypervisor.
10. Delete the old VSB plan from the remote RPS Console.
How to Migrate the Backend Database and Upgrade from Arcserve UDP
5.0 with SQL 2005 to Arcserve UDP 6.0
In Arcserve UDP Version 6.0, SQL Server 2005 is not supported. Before you upgrade,
back up the older database. You can plan the data migration before or after the
upgrade. Select one of the following solution that suits best for your migration plan:
Migrate Arcserve UDP 5.0 with SQL Server 2005 to Arcserve UDP 6.0 with Supported
SQL Server Before Upgrade (see page 104)
Migrate Arcserve UDP 5.0 with SQL Server 2005 to Arcserve UDP 6.0 with SQL Server
Express Edition After Upgrade (see page 110)
Migrate Arcserve UDP 5.0 with SQL Server 2005 to Arcserve UDP 6.0 with Supported SQL
Server Before Upgrade
Before you upgrade to Arcserve UDP Version 6.0, you can migrate the database to a
supported database.
Migration Consideration
Ensure that jobs are not running in the Arcserve UDP 5.0 environment. Stop the data
store, if required.
Follow these steps to migrate Arcserve UDP 5.0 with SQL Server 2005 to Arcserve UDP
6.0 before the upgrade:
1. Stop the Arcserve Console Management Service.
b. On the Back Up Database dialog, configure the backup destination, and click
OK.
3. Migrate the backed up older database data to the newly installed SQL Server.
Restore the database that you have backed up in the previous step to the newly
installed Arcserve UDP Database SQL server. Check the Compatibility Matrix to
select the supported Database version.
a. From the SQL Management Studio, right-click the database and click Restore
Database.
b. Verify the Source - Device is same as the previous backup destination and add
the backed up database file.
c. Click OK.
4. Start Arcserve UDP Management Service in Windows Services Console.
5. Connect to the restored database in Arcserve UDP Version 5.0 Console.
a. Log in to the Arcserve UDP Version 5.0 Console.
Migrate Arcserve UDP 5.0 with SQL Server 2005 to Arcserve UDP 6.0 with SQL Server
Express Edition After Upgrade
After you upgrade to Arcserve UDP Version 6.0, you can migrate the database to the
supported database.
Migration Consideration
Ensure that jobs are not running in the Arcserve UDP 5.0 environment. Stop the data
store, if required.
Follow these steps to migrate Arcserve UDP 5.0 with SQL Server 2005 to Arcserve UDP
6.0 after the upgrade:
1. Stop the Arcserve Console Management Service.
b. On the Back Up Database dialog, configure the backup destination, and click
OK.
8. Migrate the backed up old database data to the new installed default Arcserve UDP
database.
Restore the backend database that you have backed up in Step 2 to the newly
installed Arcserve UDP database.
a. Right click the database, and select Restore Database.
b. In the Restore Database dialog, verify the Source - Device is the same previous
backup destination and add the backed up database file.
c. Click OK.
9. Configure database connection in Console.
a. Open the command prompt window and navigate to the Arcserve UDP
installation path:
C:\Program Files\Arcserve\Unified Data Protection\Management\BIN
b. Start the process using the following Command Line syntax:
DBConfig.exe –c "C:\Program Files\Arcserve\Unified Data
Protection\Management\Tomcat\JRE\bin" localhost\arcserve_app
Note: The arcserve_app is the default Arcserve UDP Version 6.0 database
instance name.
c. In the same path, start the process using the following Command Line syntax:
migrate_udpv5_to_udpv6.bat
If the gateway is unavailable for auto update, you can manually upgrade the gateway
later.
Tabs
Lets you navigate to the various functions of Arcserve UDP.
Panes
When you navigate to each tab, the displayed screen is divided into the following
panes. Each pane is used to perform related actions.
Left Pane
Lets you navigate to various functions and operations. The result of each click is
displayed in the center pane.
Center Pane
Lets you perform most of the actions in this pane such as adding, deleting, and
modifying. This pane also displays the result and status of each activity such as
jobs, plans, and reports. Most of your actions are performed on this pane. The
information displayed on this page is mostly the result of the options that you
selected in the left pane.
Right Pane
Displays a summary of the items you selected on the center pane. For example,
on the Jobs tab, if you selected a job from the center pane, then a brief
summary of the job such as job monitor (if there is a running job) and job
details like source node name, task, destination Recovery Point Server, and
destination data store is displayed in the right pane.
Tabs
The Arcserve UDP solution provides the following tabs to perform data protection
functions:
■ dashboard
■ resources
■ jobs
■ reports
■ log
■ settings
■ high availability
dashboard
The dashboard tab lets you view graphical representation of the latest backup status
and data storage of the last seven days. Using the dashboard tab, you can perform the
following action:
■ Customize the position of the four graphs. Place the mouse over the name of any of
the four options, and you can drag one graph to other location on the screen.
■ Click one of the two options available for every screen if you want to refresh or
maximize a screen. Click Refresh icons in any of the four screens to get the latest
data size. Click Maximize icon of a screen to view only that screen in the dashboard.
■ View the last backup status of nodes or plans according to the filters you select in
the chart in the Last Backup Status.
You can view the graphs for the following options on the dashboard tab:
Last Backup Status
Last Backup Status refers to the latest backup status and provides you multiple
filters to view the status. Based on your selection from the filter option, you can
view the last backup status. For example, select All Nodes to see the last backup
status of all nodes or select any plan to see the last backup status of the nodes
protected by this plan. When you select All Nodes, you can see the status as
Successful, Failed, No Backups, Canceled, and Missed.
■ Successful indicates that the nodes are successfully backed up.
■ Failed indicates that the last backup is not successful.
■ No Backups indicate that the nodes do not have any plan associated with it.
■ Canceled indicates that the last backup was stopped.
■ Missed indicates that the last backup was not performed as scheduled.
When you click each slice (the status) from the pie chart, the resources page opens
and the associated nodes are displayed. For example, if you click No Backups from
the pie chart, the resources page opens. The resources page displays the nodes that
do not have any plan. Also, the No Backups filter is preselected on the resources
page.
Raw Data and Actual Data Storage
The graph refers to the raw data and actual data storage. You can click Raw Data or
Actual Data Storage to hide or view information about any of the two options. You
can hover to the point to see the detail data size information using the tooltip.
Raw data
Refers to the original data that Arcserve UDP gets from source.
Actual Data
Refers to the data size that is saved on the disk after being compressed or
deduplicated by Arcserve UDP.
Note: The Actual Data does not include the nodes that are marked for Purge
(where disk reclamation has not yet happened).
Restorable Data and Actual Data Storage
The graph refers to the data that you can restore and the actual data storage. You
can click Restorable Data or Actual Data Storage to hide or view information about
any of the two options. You can hover to the point to see the detailed data size
information using the tooltip.
Restorable Data
Refers to the actual data that can be restored.
Actual Data Storage
The graph displays information about the actual data storage. You can click Actual
Data Storage to hide or view information about the actual data storage. You can
hover to the point to see the detail data size information using the tooltip.
resources
The resources tab lets you manage the Arcserve UDP resources: Nodes, Destinations,
Virtual Standby, and Plans. Use this tab to add resources to Arcserve UDP such as nodes
that you want to protect or recovery point servers for backup. You also use this tab to
create plans and tasks for backup, virtual standby, and replication.
Note: Only the resources tab on the Console has site-awareness. The other tabs on the
Console display consolidated data for all the sites. For more information on Sites, see
How to Add and Manage a Site (see page 208).
Node Management
The node management view lets you manage all the nodes and apply filters to refine the
node search. When you select specific node in center pane, you can see the status and
recent events about the node in right pane. You can apply various filters from the center
pane. You can create node groups on the left pane to group specific nodes.
When you select a node from the center pane, the node status and recent events are
displayed in the right pane.
You can perform operations on nodes by clicking the Actions drop-down menu from the
center pane. Such operations that you can perform through Actions in center pane is
applied to all source nodes. Such operations that you can perform through Actions in
the right pane is only applied to the node that you select in the center pane.
Destination Management
The destination management view lets you manage the destination recovery point
servers. When you select a server from the center pane, its recent events are displayed
in the right pane. When you select a data store, its status and settings are displayed in
the right pane.
Plan Management
The plan management view lets you manage all your plans. You can create, modify,
delete, deploy, pause, and resume plans from this view.
Infrastructure Management
The infrastructure management view lets you manage storage arrays, instant virtual
machines, and remote sites.
jobs
The jobs tab displays the status of the jobs for a specific period. You can apply filters to
categorize the results or you can group the jobs by plan.
When a job is in progress, the right pane displays the job monitor that displays the
progress of the job. Click Job Details on the right pane to open the job monitor. You can
see the job monitors only if the job is in progress.
reports
The report tab displays a list of reports that you can generate. You can apply filters to
your reports to get specific reports. The reports are generated in CSV, PDF, or HTML
formats. For more information about these reports, see How to Generate Arcserve UDP
Reports.
log
The log tab displays all activity logs for the protected nodes, destination servers, data
stores, and plans. You can view logs and apply various filters such as severity, specific
node, logs generated from the machine, job IDs, and log content.
You can search the activity logs using a combination of the available filters or one of the
following options:
■ Select Severity types to view all the logs related to the selected type.
■ Enter other details, such as Node Name, Job ID, and so on and click Search.
settings
The settings tab lets you configure certain preferences such as which email server to
use, set up administrator user ID and password, and define the default node
deployment path.
For more information about the settings tab, see How to Configure Arcserve UDP.
high availability
The high availability tab lets you manage and control arcserve High Availability
functions.
When a job is running, from the right pane, expand Recent Events and click the Detail
button to open the status monitors and display more detailed information about the
current running job.
You can click the Cancel button to stop the current job.
Note: When you change the protocol to HTTPS, a warning displays in the web browser.
The warning appears because of a self-signed security certificate that prompts you to
ignore the warning and proceed or add that certificate to the browser to prevent the
warning from reappearing.
Note: To update the communication protocol used by the Arcserve UDP Recovery Point
Server and the Arcserve UDP Agent to communicate with the Arcserve UDP Console,
you must update the node directly from the Console.
Configure Database
The Database Configuration page lets you enter details about the database. The
database configuration requires details about SQL Server, number of connections, and
authentication mode.
Note: You can re-create the database before configuring. Delete the Arcserve UDP
database using the procedure described in Re-create the Arcserve UDP Database (see
page 135), and then configure the database.
To configure, complete the following fields on the configuration pane, and click Save.
SQL Server Machine Name
Specify the name of the server that hosts the SQL Server instance.
SQL Server Instance
Specify the name of the SQL Server instance.
SQL Server port
Specify the port number for this instance or enable the Auto detect option.
1025 to 65535 is the range of options for the port number.
Auto detect
Selecting the check box lets the application find the port number.
Authentication
Select one of the Authentication Modes from the following options:
Windows Authentication Mode: Default mode.
(Optional) Test: Click Test to verify that the application can communicate with
the Microsoft SQL Server instance.
SQL Server and Windows Authentication Mode: Select the option and enter
the User Name and Password fields.
Database Connection Pool values
For Maximum and Minimum Connections, enter a value from 1 to 99.
The Database Server configuration is set.
Use Reset to clear all of the specified values and load the original data.
For various reasons, you may want to re-create the Arcserve UDP database. For
example, your current database consumes more than 10 GB of data. To re-create the
database, first you need to delete the existing Arcserve UDP database and then
configure a new database to replace the deleted database. The procedure applies to
Microsoft SQL Server and Microsoft SQL Server Express Edition databases.
Important! When you delete the Arcserve UDP database, all current data is lost.
3. On the Delete Object dialog, click the Close existing connections option, and then
click OK.
The existing Arcserve UDP database is deleted.
4. Configure the new database. For more information, see Configure Database (see
page 134).
The Arcserve UDP solution re-creates the database. The name of the database
instance is ARCSERVE_APP.
7. Select the nodes that you want to run for synchronization and click OK.
Configure SRM
The SRM Configuration page lets you configure an SRM schedule for nodes that defines
when and how often to collect SRM data. SRM (Storage Resource Management) is a
functionality that collects information about the following data:
■ Hardware, software, and application data for Microsoft SQL Server and Microsoft
Exchange Server implementations.
■ Performance Key Indicators (PKI) data from nodes.
5. Click Save.
The schedule for SRM is applied.
Note: Do not click Save, if you want to collect the SRM data immediately.
6. (Optional) To run the process immediately, click Run Now.
The Node dialog is displayed with the list of nodes available for synchronization.
Select the nodes that you want to run for synchronization, and click OK.
To enable the configuration, click the Enable option to specify the type of repeating
method that you want and a scheduled time for the node discovery to begin.
You can specify the following parameters to configure your discovery schedule:
■ Every number of days: Lets you repeat this method on the number of days that are
specified. (Default)
■ Every selected day of the week: Lets you repeat this method on the days that are
specified. Monday, Tuesday, Wednesday, Thursday, and Friday are the default days
of the week.
■ Every selected day of the month: Lets you repeat this method on the specified day
of the month. 1 is the default option for the day of the month.
■ Scheduled Time: Lets you specify the time when the discovery runs according to the
repeat schedule.
■ Node Discovery List>Add: Select from where you want to add nodes from. Then
specify the credentials as required.
Note: Optionally, click Run Now to run the discovery instantly.
Notes:
■ As a prerequisite, install Adobe Flash Player ActiveX (version 10.0 or higher) on
the machine where you have installed the Console to send any
graphic-included report in an email.
■ As a prerequisite, install Microsoft .NET Framework (version 2.0 or higher) on
the machine where you have installed the Console for the Report Chart export
feature to export images in a report successfully.
Service
Select email services from the available options.
Email Server
Specify the host name of the SMTP server that you can use to send email alerts.
Port
Specify the port number related to the Email server.
Requires Authentication
Select check box to enter credentials.
Use SSL/Send STARTTLS/Use HTML Format
Select the desired option to specify requirements.
Enable Proxy Settings
Select check box to enter Proxy Server and Authentication details.
Test Email
Click to verify the details that you enter in the Email Settings section.
Send Email Alerts
Select Discovered Nodes to configure Active Directory nodes that you can find
using the Discover feature available for Nodes under the resources tab.
When you select the Arcserve Server as the download server, the Proxy Settings dialog
opens.
Update Configuration
The Update Configuration page lets you set Download Server and Update schedule for
configuring updates. You can provide details about Arcserve Server proxy settings or
Staging server for Download Server.
Provide the details on type of Update Server and Update Schedule. Update Server is
either Arcserve Server or Staging Server.
Enter the details for install path, protocol, and port, and click Save.
You have already created a user account and a plan for a source Console. To identify and
manage replicated data, assign the plan to the user account.
Note: You can assign more than one plan to a user account but two different accounts
cannot share a plan. However, we recommend assigning a single plan to a user account
so that you can easily identify and manage the replicated data.
The user account is mapped to the plan created for the source Console.
You can use Edit to modify the user configuration or Delete to remove the user account
from the list.
User Management
The User Management page lets you log in to the User Management Console (Identity
Service Console) from Arcserve UDP Console. The Arcserve UDP User Management
Console manages user identities and controls the access to features using the
role-based access control.
You have successfully accessed the Arcserve UDP User Management Console.
Alternatively, you can also log in to the Identity Service Console by entering the address
in the following format in a new window:
</session-config>
120 indicates the timeout duration for the Console is 120 minutes.
4. Save the web.xml file.
Important! If you are replicating from a shared folder to a data store selected on
Recovery Point Server, see How to Perform an Offline Data Replication Using RPS
Jumpstart (see page 412).
Create a Data Store to Replicate Data from an Arcserve r16.5 Recovery Point
To replicate data from an existing Arcserve r16.5 D2D recovery point, you first create a
data store from the Console where the data will be replicated.
Important! Arcserve does not collect any personal or business critical information such
as node name, IP address, login credentials, domain name, and network names.
If you have not registered the Console, you will receive the following notification in the
Messages tab of the Console.
Your copy of Arcserve Unified Data Protection has not been registered in the Arcserve
Product Improvement Program. Register.
If you want to update the email address, you have to register again. To register again,
follow the same process as described in this topic.
You can create a plan to protect your physical nodes such as Windows and Linux nodes,
and virtual machines such as VMware and Hyper-V.
Using RBAC, you can assign varied level of security to each role.
You have successfully accessed the Arcserve UDP User Management Console.
Alternatively, you can also log in to the Identity Service Console by entering the address
in the following format in a new window:
The user password can be changed from Windows User Control. When you update the
password of a user, the user must log in to the Identity Service Console using the latest
password. The role of the user is retained.
Pre-defined Roles
The function of a pre-defined role is to provide a reference for some typical role
definition. Each role has a predefined set of permissions assigned.
For the admin role, all the options in the permission are selected. An admin role can
access all the functions of Arcserve UDP.
Click the permission for the Backup role and the following selected permissions are
pre-defined:
The admin role has the complete flexibility to clear the selected permissions or select a
new permission. When you click Update, the newly added permission become the
default permission for the backup role. You can also rename the role.
For the Monitor role, the dashboard job monitor and log/report permission are
preselected.
■ Monitor jobs
■ Access logs
■ Perform restore
If you assign the Restore role to one user, the user can log in and will have the
corresponding authority. For example, if a user has the Restore role, then if a node is
backed up successfully, you can Create an Instant VM or Restore to go to the next
activity.
For the RHA_Admin role, the RHA administration permission has access for the high
availability function.
You can assign the available (pre-defined) roles or self-defined roles to any local user or
domain users.
Note: Only a Super-administrator (an administrator who installs Arcserve UDP) can
assign the administrator role to other users. Administrators can assign only
non-administrator roles to other users.
2. Click Roles.
The Roles page opens and lists all the available roles.
Note: Some permissions work only when the related permissions are also selected. For
example, if you want to configure a role for managing Virtual standby, then you need to
select the permission to manage Virtual standby and select the view node permission to
ensure that the role can function normally.
Troubleshooting
The following list provides the possible errors you may encounter with the User
Management Console and possible resolutions to such errors:
■ Symptom
Failed to log in to the User Management Console
Solution
Verify that you have logged in as an administrator. Non-administrator users do not
have permission to access the User Management Console. Verify that the username
and password are correct.
■ Symptom
Authentication failure: User fails to log in to the Console
Solution
Verify whether the user is assigned any role. If a user is not assigned any role, that
user cannot log in to the Arcserve UDP Console.
■ Symptom
User Management Console page time out.
Solution
The login retaining time for the User Management page is 15 minutes. If the
Console does not detect any operation on the page for 15 minutes, then the user is
automatically logged out.
You can add nodes by manually specifying the node details, discovering from an active
directory, or importing from a file and hypervisors.
What To Do Next?
■ Review the Prerequisites (see page 168)
■ Add Nodes (see page 169)
■ Discover Nodes (see page 172)
■ Import Nodes (see page 173)
■ Import Nodes from a File (see page 174)
■ Import Nodes from a vCenter/ESX Server (see page 175)
■ Import Nodes from a Hyper-V Server (see page 176)
Add Nodes
When you have the IP address or name of a node or set of nodes, you can add them to
the Console by specifying their details manually. You can add the following types of
nodes:
■ Windows: Windows source nodes that you want to protect. Arcserve UDP Agent
(Windows) is installed on this node.
■ Linux: Linux source nodes that you want to protect. Arcserve UDP Agent (Linux) is
installed on the Linux Backup Server and not on the Linux source nodes.
■ Linux Backup Server: Linux server that manages Linux source nodes. Arcserve UDP
Agent (Linux) is installed on this server.
Notes:
■ For Linux, on selecting SSH Key Authentication, you do not need to enter
username and password details. For more information about configuring
the SSH Key, see Configure the Private Key and Public Key Authentication.
■ Before adding a Linux node, you must add a Linux Backup server that
manages the Linux nodes.
■ You can log in to the Linux Backup Server from the Arcserve UDP Console
only when you perform a restore.
Adding Linux Backup Server Node
The following dialog appears when you add Linux Backup Server node from the
Backup: Agent-Based Linux task:
Discover Nodes
To add nodes that are in an active directory, you can first discover the nodes by
providing the active directory details and then adding the nodes to the Console.
Troubleshooting: The Specified Domain Either Does not Exist or Could not be Contacted
Symptom
When adding nodes by discovering from an Active Directory, I get the following error
message:
"The specified domain either does not exist or could not be contacted. Verify that the Console server can access
the domain controller through the network."
Solution
First verify the connectivity between the Arcserve UDP and domain controller. If the
connectivity is okay, use the following command with "dsgetdc" argument to test if
Windows can locate the domain controller from the domain name:
nltest.exe
If the command fails, then there may be a DNS problem in your environment.
Note: You should run the above command on the UDP machine. For more details,
please refer to the following article from Microsoft.
https://support.microsoft.com/en-us/kb/247811
Import Nodes
Arcserve Unified Data Protection lets you add multiple physical and virtual nodes by
using the import method. Depending on the requirement, you can use one of the
following import methods:
■ Import Nodes from a File (see page 174)
■ Import Nodes from a vCenter/ESX Server (see page 175)
■ Import Nodes from a Hyper-V Server (see page 176)
When you have multiple physical nodes to add, you import all the nodes at once to the
Console. You can import nodes that you have saved using the Export option.
Using this import method, you can import virtual machine nodes from the ESX or
vCenter server. This option lists all the virtual machines that are detected on the
specified server, even if they are already being managed in Arcserve Unified Data
Protection.
Using this import method you can import the virtual machine nodes from the Microsoft
Hyper-V servers.
Additional administrative account refers to those accounts that are not default
administrators. Such accounts are also referred as non-built-in administrative accounts.
To import virtual machine from a Hyper-V host, you can either use the built-in
administrator account of the Hyper-V host, or a domain account which is in the local
administrators group of the Hyper-V host, or a non-built-in administrative user.
The user with additional administrative account can use the procedures to disable UAC
remote access.
Notes:
■ This procedure is not similar to disabling UAC. Using this procedure you can disable
some of the functionalities of UAC.
■ Considering that remote Windows Management Instrumentation (WMI) technology
is used for import, ensure that WMI is not blocked by firewall.
3. From the Edit menu, click New and then click DWORD (32-bit) Value.
4. Specify LocalAccountTokenFilterPolicy as the name for the new entry and then
press Enter.
5. Right-click LocalAccountTokenFilterPolicy and then click Modify.
6. Specify 1 in the Value data field and then click OK.
7. Exit the Registry Editor.
For more information about Windows behavior, see Microsoft documentation.
What To Do Next?
■ Review the Prerequisites (see page 178)
■ Update Hypervisor Information (see page 178)
■ Specify the Hypervisor (see page 179)
■ Update VM Information (see page 180)
■ Update Nodes (see page 181)
■ Export Node (see page 184)
■ Synchronize Data (see page 185)
■ Delete Nodes from the Console (see page 185)
■ Deploy Agent to Nodes (see page 186)
■ Perform Preflight Checks for Your Backup Jobs (see page 187)
The following examples describe when you can specify the hypervisor information:
■ You have a Host-Based Agentless Backup plan to protect the VMs of ESX or Hyper-V
Server. The plan uses the Hypervisor license to protect the VM. Now you install the
UDP Agent in a VM of the specified Hypervisor and create an Agent-Based plan to
protect the VM. Typically the plan uses extra license to protect the VM. If you
specify the hypervisor for the VM, the plan uses the license of the Hypervisor.
■ You have an Agent-Based Linux Plan to protect the Linux VM Agent nodes. If you
specify the hypervisor for the VM, all the VMs on the same Hypervisor share the
Hypervisor license.
Update VM Information
Using Arcserve UDP, you can update some of the properties of the VM nodes from their
hypervisors. You can trigger the update manually or automatically. The following
properties of the VM nodes are updated and synchronized with their corresponding
VMs in the hypervisor:
■ Node Name
■ VM Name
■ OS
The auto update feature is triggered automatically when you perform the following
actions:
■ Open the resource tab on the Console.
■ Send a scheduled report.
Note: Even if you trigger multiple automatic updates, only one automatic update runs at
a time. The remaining automatic updates are put in a queue.
Update Nodes
You can update information that is related to the existing nodes. You can update the
node anytime. Some of the situations when you need to update a node are as follows:
■ A new product is installed on the node after the node was registered with Arcserve
UDP.
■ The user name or password of the node was updated after the node was registered
with Arcserve UDP.
Note: If a node acts as both recovery point server and agent, and you change the
credentials or protocol of that node, then update the node from the Destinations:
Recovery Point Server page. The plan will automatically deploy to the agent after you
update the recovery point server. If you update the node from the Nodes: All Nodes
page, then the plans involving those nodes are not deployed successfully. To deploy the
plan, update the node from the Destinations: Recovery Point Server page again.
An additional administrative account refers to those accounts that are not using default
administrators. Such accounts are also referred as non-built-in administrative accounts.
The Update Node and Preflight Check (PFC) functions use the account specified in
Update Node to connect to a virtual machine and perform related checks.
Note: You should use either the built-in administrator or built-in domain administrator
account when performing the Update Node function. If necessary, you can use a
non-built-in administrator, but before doing so you should verify that the account you
are using has the required administrator permissions.
c. If you experience any problem, you can modify the User Account Control (UAC)
configurations in the Local Security Policy by changing the UAC settings at
secpol.msc -> Local Policies -> Security Options. (Secpol.msc is Microsoft's
security policy editor).
Note: Do not attempt to disable the UAC in the User Account Control Settings
dialog box that opens from the control panel.
For more information about changing the UAC configuration settings, see the
corresponding Microsoft documentation.
3. For Hyper-V VMs, the additional administrator account must have similar
permissions as mentioned in Import Virtual Machine Using Additional
Administrative Account (see page 177).
Export Node
You can export the nodes as a ZIP (.zip) file. When required, you can import the ZIP file
to retain the nodes. For example, exporting the nodes before upgrades or rebooting
helps you import the same set of nodes.
You can export only such nodes that have valid credentials and are running the
Windows operating system.
Synchronize Data
Synchronizing data keeps the data that are in different databases consistent and
up-to-date.
Note: You can deploy Arcserve UDP agents to multiple nodes. At one time, you can run
only 16 deploy tasks. If there are more than 16 tasks, other tasks remain in pending
status and run only when some of the default 16 deploy tasks complete. To modify the
maximum task count, update the following registry key:
deployMaxThreadCount
Note: You can cancel an agent deployment if it is scheduled for a later time. To cancel
an agent deployment, select the agent and click Actions, Cancel Agent Deployment.
The following table describes the checks that PFC performs for VMware VM:
Item Description
Changed Block Tracking A feature to tracks disk sectors that are on a virtual
(CBT) machine which has changed. This helps minimize the
size of the backups.
This item verifies that CBT is enabled.
VMware Tools This item verifies that the VMware tools are installed on
each virtual machine.
Disk This item verifies the disks of the virtual machine.
Power State This item verifies that the virtual machine is powered
on.
Data Consistency This item verifies if Application consistent snapshot can
be taken for the VM.
The following table describes the checks that PFC performs for Hyper-V VM:
Item Description
Item Description
Integration Services This item verifies that the Hyper-V integration services
are installed and enabled on each virtual machine.
Without the integration services, Arcserve UDP cannot
complete the following actions:
■ Execute pre/post
command and
application log purge
actions.
■ Perform
application-consistent
backup.
Integration services contain several services. The
Arcserve UDP solution checks the statuses of the
following two services:
■ Hyper-V Data Exchange
Service: Required for
collecting the VM info,
executing the pre- or
post-commands and the
application log purge
actions.
■ Hyper-V Volume Shadow
Copy Requestor:
Required for the
application-consistent
backup.
Power State This item verifies that the virtual machine is powered
on. A Suspended warning is shown when the VM is in
the status other than powered on and power off, like
the Saved status.
The Arcserve UDP solution cannot run the pre/post
commands and the application log purge actions when
the VM is not in the Powered On status.
In addition, Arcserve UDP cannot perform the
application-consistent backup when VM is in the
Suspended status.
Disk This item verifies if unsupported disk is attached to the
VM.
Data Consistency This item verifies if Application consistent snapshot can
be taken for the VM.
The following tables describe the solutions to help you resolve errors and warnings from
your Preflight Check results for VMware VMs:
VMware Tools
Status Message Solution
Disk
Status Message Solution
Power State
Status Message Solution
Data Consistency
Status Message Solution
Warning Not verified because the Provide the built-in local administrator
application failed to access the or domain administrator credentials to
virtual machine. Verify that the log in to the virtual machine guest
user credentials are correct and operating system. Also, verify that the
have administrative privileges. VMware Tools inside the virtual
machine are update-to-date and
running. For virtual machines in ESXi
4.x, VIX needs to be installed on the
Console machine.
Due to a VMware limitation, backup is
supported only on VMs running on an
ESX server that has a paid license.
Backup is not supported on an ESXi
server with a free license.
Note: Data Consistency check is
supported on Windows Server 2003
and later.
Warning Unable to verify whether Refer to the Power State column
data-consistent backup is
possible because the virtual
machine is not powered on.
Warning VMware does not support Create an agent-based backup plan in
application-consistent quiescing Arcserve UDP or use Arcserve UDP
if the guest OS has storage Agent (Windows) to back up the
spaces enabled. File-level Microsoft SQL Server and Microsoft
recovery is supported only for Exchange Server data.
those volumes that do not have
storage spaces enabled. (Full
VM recovery is supported
through Recover VM).
In some cases, the VMware VSS writer does not create application consistent snapshots
on some virtual machines (VM). As a result, the backed up data may not be in an
application-consistent state.
Verify Prerequisites:
Affected Features:
If any of the requirements are not met, the session data remains crash consistent. As a
result, the following features are affected:
■ Backed up data that includes application data of a VM, such as SQL, Exchange, and
SharePoint, may remain in a crash consistent state.
■ Catalog job may fail.
The following tables describe the solutions to help you resolve errors and warnings from
your Preflight Check results for Hyper-V VMs:
Hyper-V Credentials
Status Message Solution
Error Failed to access the ■ Verify if the Hyper-V server is running
ADMIN$ share of the
Hyper-V server or does ■ Verify if the network of Hyper-V server is
not have the proper connectable.
credentials. ■ Verify if the ADMIN$ share of Hyper-V
Server is enabled.
■ Provide administrator rights of Hyper-V
when importing VM from it.
Integration Services
Status Message Solution
Warning Not installed, running, Install/Upgrade/Enable the integration
operational. services.
Notes:
■ For Windows VM, if the integration
services are installed, verify if the
following two required services are
running in the VM: Hyper-V Data
Exchange Service and Hyper-V Volume
Shadow Copy Requestor. Also verify, if
there are errors of Hyper-V services in the
event log of VM.
■ For Linux VM, verify the latest integration
services are installed, and Key-Value Pair
and Live virtual machine backup features
are available on the specific Linux VM. For
more information on Linux-integrated
services on Hyper-V VM, see the
Microsoft KB article.
Warning Not responding Restart the integration services in the guest
OS of the VM.
Power State
Status Message Solution
Disk
Status Message Solution
Warning Failed to get the virtual Verify if the virtual machine exists on the
machine by instance Hyper-V server.
UUID.
Data Consistency
Status Message Solution
In some cases, the Hyper-V VSS writer does not create application consistent snapshots
on some virtual machines (VM). As a result, the backed up data may not be in an
application-consistent state.
Verify Prerequisites:
Verify Considerations:
Affected Features:
If any of the requirements are not met, the session data is crash consistent. As a result,
the following features are affected:
■ Backed up data that includes application data of a VM, such as SQL, Exchange, and
SharePoint, may remain in a crash consistent state.
■ Catalog job may fail.
The following diagram illustrates how you can add and manage the node groups:
– Hyper-V Groups: Displays the nodes that you add using the Importing from
Hyper-V option.
– VM Backup Proxy Groups: Displays Agentless nodes that are protected by
Backup, Host-based Agentless task
– Global Dashboard Groups: Displays all the arcserve Backup branch primary
server under the GDB server. The Global Dashboard group is added when you
add one arcserve Backup Global Dashboard server into the Console and
perform a Full arcserve Backup synchronization for the added GDB server.
What To Do Next?
■ Review the Prerequisites (see page 201)
■ Add Node Groups (see page 201)
■ Modify Node Groups (see page 202)
■ Delete Node Groups (see page 203)
Note: The Modify and Delete options are enabled only when you have added a group.
Note: The process of deleting the node groups does not delete individual nodes from
the Console.
Adding a storage array is required for VMware host-based agentless backup only. You
can add a standalone array, Cluster, or vFiler to the Console.
Find Array and Data IP of the SVM Storage Array for the Arcserve UDP Console
This section describes how to find Array and Data IP when the NetApp Storage array is
running in the cDOT(clustered) mode.
5. Filter the storage virtual machine by the SVM that you have identified.
6. Find out which interface has the Management Access IP address and the Data
protocol access IP address, and provide them at Add Storage Array in the UDP
Console.
■ Get Management Access IP address:
■ Locate the Interface that has the option Yes under the Management
Access column.
■ From the interface, select the IP address available under IP
Address/WWPN.
■ Get Data Protocol Access IP address:
■ Locate the Interface that has the option iSCSI or NFS under the Data
Protocol column.
■ For the ISCSI or NFS interface, select the respective IP address available
under IP Address/WWPN.
Note: The ESXi server must use the same Data protocol access IP address for read
and write to the NetApp storage array for iSCSI or NFS.
Important! If the recovery points are in a remote site, then to restore data, the Console
must connect to the remote site using a VPN connection.
The following diagram shows the connection between local and sites.
After you add a site, you can modify, update, or delete sites from the Console. Also, you
can manage the remote nodes from the Console.
When the remote administrator installs Arcserve Remote Management Gateway and
successfully provides the gateway authorization code, a green check mark is displayed
beside the site name on the Console.
Delete a Site
You can delete a site that you do not want to manage. Before deleting a site, all nodes
and node discovery filters related to this site must be deleted first.
3. Clear the authentication check box if the proxy does not support credentials.
On the Type field, 0 indicates browser settings and 1 indicates other settings.
Note: If you want to change any of the proxy settings such as port, server IP
address, or type, you can change from regedit.
What To Do Next?
1. Review the Prerequisites (see page 218)
2. Add a Recovery Point Server (see page 219)
3. (Optional) Deploy the Recovery Point Server (see page 221)
4. Add a Data Store (see page 222)
5. Verify the Destination (see page 233)
Now, the recovery point server is deployed. You can add data stores after the recovery
point server is added.
Note: The RPS components are installed with the Arcserve UDP installation.
5. Modify the deployment settings, and click OK to deploy the recovery point server
on the selected node.
The recovery point server deployment starts. You can view the deployment
progress on the right pane.
Enable Deduplication
Specifies that deduplication is enabled for this data store. Arcserve UDP
supports both types of deduplication: Source-side deduplication and Global
deduplication. Source-side deduplication prevents duplicate data blocks to
move across network from a particular agent. Global deduplication eliminates
duplicate data across all client machines based on the volume cluster level.
Deduplication Block Size
Defines the deduplication block size. The options are 4 KB, 8 KB, 16 KB, and
32 KB. The deduplication block size also impacts the Deduplication capacity
estimation. For example, if you change the default 4 KB to 8 KB, the
Deduplication capacity estimations double. Increasing the deduplication
block size can decrease the deduplication percentage.
Hash Destination is on a Solid State Drive (SSD)
Specifies if the hash folder is on a solid state drive.
Note: Configure the hash destination on local SSD, if the Hash destination
is on a Solid State Drive(SSD) option is enabled
Compression Type
Specifies whether to use the standard compression type.
Compression is often selected to decrease the usage of the disk space, but
also has an inverse impact on your backup speed due to the increased CPU
usage. Based on your requirement, you can select one of the three
available options.
Note: For more information, see Compression Type (see page 993).
Enable Encryption
Specifies that encryption settings are enabled. When you select this option, you
must specify and confirm the encryption password.
Data encryption is the translation of data into a form that is unintelligible
without a deciphering mechanism. The Arcserve Unified Data Protection
solution uses secure, AES (Advanced Encryption Standard) encryption
algorithms to achieve maximum security and privacy of your data. For data
stores, encryption or No encryption is supported. For Encryption, only AES-256
is available.
Concurrent Active Nodes
Specifies the maximum concurrent jobs on the data store.
No Limit: The default means that all jobs in this Data Store are started
immediately.
Limit to: Refers to a value from 1 to 9999. The value indicates the number
of jobs that can concurrently run. If the running jobs meet the number,
another job is placed in to the queue and job can only start when one of
the running job completes. The completed job could mean a finished,
canceled, or a failed job.
The number applies to the Job Types but not to the Server nodes. For
example, number 5 indicates that five backup jobs are running. Any job
scheduled after five backup jobs waits in the queue, but you can submit
another job such as File System Catalog.
Note: Limit to number only impacts the replication outbound job, not the
replication inbound job. Limit to number does not impact the Restore or
BMR jobs. Such jobs are not placed in a queue.
The data store is created and gets displayed on the center pane. Click the data store to
view the details in the right pane.
The data store displays different status depending on the task performed by the data
store. When you select a data store from the resources tab, the data store status is
displayed on the right pane
■ Stopped: The data store is inactive. You cannot submit any job in this state.
■ Starting: The data store is starting. When the data store is getting started, the
progress is displayed on the Console.
■ Running: The data store is active. You can submit jobs in this state.
■ Stopping: The data store is stopping. When the data store is stopping, the progress
is displayed on the Console.
■ Modifying: The data store is getting updated with the new data. When the data
store is getting modified, the progress is displayed on the Console.
■ Deleting: The data store is getting deleted. When the data store is getting deleted,
the progress is displayed on the Console.
■ Out of Service: The data store is not functioning properly. You cannot submit any
jobs in this state. Stop the data store and verify the reason for this behavior. The
following cases can result in the Out of Service status of a data store:
– The data store backup destination cannot be accessed.
– The configurations in registry or file are corrupted.
– The GDD index or data role has internal errors.
– The GDD index or data role process is manually stopped.
■ Restore Only: In the Restore Only state, any jobs that require to write data to the
data store does not run. Jobs such as backup, replication (in) job, jumpstart (in),
data migration job. All others jobs run, which require to read data from the data
store. The data store status changes to Restore Only in the following conditions:
– When the hash role process is manually stopped.
– When the hash path volume capacity or the assigned hash memory reaches its
maximum limit.
Important! When the status of the data store is Restore only (Degraded State) or Out of
service (Bad State), the data store does not function properly. You must stop the data
store and verify the root cause for the status. For example, the problem may be the data
deduplication volume has reached its maximum. After you resolve the root cause, start
the data store and resubmit the backup job.
Windows Authentication
Specifies that the Windows authentication is used to log in to the Arcserve
Backup server.
Note: The Windows user must be registered in Arcserve Backup first using
Arcserve Backup User Profile Manager.
Arcserve Backup Authentication
Specifies that the Arcserve Backup authentication is used to log in to the
Arcserve Backup server.
Username and Password
Specifies the user name and its password that helps you log in to the node.
Note: Use one of the following formats for the user name: Computer name,
domain name/username, or username.
Port
Specifies the port number that is used to connect to the Arcserve Backup
server.
Note: Arcserve UDP uses the port number to connect to both the servers, the
Arcserve Backup Primary server and the Member server in the Arcserve Backup
domain.
5. Click Save.
The Arcserve Backup Server is added to the Console.
After adding the Arcserve Backup Server to the Console, you can navigate to resources,
Destination, Arcserve Backup Servers and check detailed information of the tape
media.
The available options are Amazon S3, Amazon S3-compatible, Windows Azure, Windows
Azure-compatible, Fujitsu Cloud (Windows Azure), and Eucalyptus-Walrus.
Instead of Amazon S3, if for Storage Service you select the Amazon S3 -Compatible or
Windows Azure - Compatible option, then you need to enter details for Storage
Endpoint.
Storage Endpoint
Specifies the Vendor service URL. For example, http://[server name]:Port No
Notes:
■ Using Eucalyptus-Walrus as your file copy cloud vendor, you cannot copy files
whose path length is greater than 170 characters.
■ For S3 Compatible/S3 sub-vendors, who use the V3/V2 authentication type to
get certified with Arcserve CCI, it works fine as the default Signer type override
flag is set to True. But, sub-vendors using the V4 authentication need to change
the flag to False in the AmazonPlugin.properties file and restart services.
SIGNER_OVERRIDE=false
■ To support HGST cloud for Amazon-S3 Compatible, you have to change the
following AmazonPlugin.property:
SET_STORAGECLASS_HEADER=false
This property helps to skip the storage header. As a result, using this property if
you add a File Copy / File Archive task with Amazon as the Cloud destination, by
default the storage header is skipped.
The AmazonPlugin.properties file is located at the following location:
C:\Program Files\Arcserve\Unified Data Protection\Engine\BIN\CCI\Config
The configuration options for each cloud vendor are similar (with some different
terminology), and any differences are described.
Bucket Name
All files and folders moved or copied to the cloud vendor are stored and
organized in your buckets (or containers). Buckets are like a container for your
files and are used to group and organize objects together. Every object stored
at the cloud vendor is placed in a bucket.
(For this field, Amazon S3 and Eucalyptus-Walrus use Bucket Name. Windows
Azure and Fujitsu Cloud (Windows Azure) use Container).
Note: For the remainder of this step, all references to Buckets can also be
applied to Containers unless specified.
Enable Reduced Redundancy Storage
For Amazon S3 only, this option lets you select to enable Reduced Redundancy
Storage (RRS). RRS is a storage option within Amazon S3 that helps you reduce
cost by storing non-critical, reproducible data at lower levels of redundancy
than Amazon S3’s standard storage. Both the standard and reduced
redundancy storage options store data in multiple facilities and on multiple
devices, but with RRS the data is replicated fewer times, so the cost is less. You
should expect the same latency and throughput using either the Amazon S3
standard storage or RRS. By default this option is not selected (Amazon S3 uses
the standard storage option).
5. Click OK.
The cloud account is added to the Console.
Note: If you have configured File Copy and File Archive in previous version of Arcserve
UDP and now you upgrade to Arcserve UDP Version 6.0, then for File Archive, Arcserve
UDP creates a new cloud bucket suffixed with -fa. File Copy uses the same bucket as in
the previous version.
You can also run on-demand merge jobs for multiple nodes to create more space on a
data store.
What To Do Next?
■ Review Prerequisites (see page 234)
■ Modify a Data Store (see page 235)
■ Delete a Data Store from the Console (see page 243)
■ Stop a Data Store (see page 244)
■ Start a Data Store (see page 245)
■ Browse Recovery Points in a Data Store (see page 246)
■ Delete Node Data from a Data Store (see page 248)
■ Run a Manual or On-demand Merge Job (see page 249)
■ Troubleshooting: How to Use a Data Store When the Backup Destination Folder is
Full (see page 250)
5. Click Modify.
The Modify a Data Store page is displayed.
6. Update the required fields and click Save.
Data Store Name
Defines the name of the data store.
Recovery Point Server
Defines the recovery point server where the data store is created. The recovery
point server is already added by default.
Backup Destination Folder
Defines the location of the folder where the data store is created. Click Browse
to select the destination folder.
Note: For non-deduplication and deduplication data store, the backup
destination path should be an empty folder.
Enable Deduplication
Specifies that deduplication is enabled for this data store. Arcserve UDP
supports both types of deduplication: Source-side deduplication and Global
deduplication. Source-side deduplication prevents duplicate data blocks to
move across network from a particular agent. Global deduplication eliminates
duplicate data across all client machines based on the volume cluster level.
Deduplication Block Size
Defines the deduplication block size. The options are 4 KB, 8 KB, 16 KB, and
32 KB. The deduplication block size also impacts the Deduplication capacity
estimation. For example, if you change the default 4 KB to 8 KB, the
Deduplication capacity estimations double. Increasing the deduplication
block size can decrease the deduplication percentage.
Hash Destination is on a Solid State Drive (SSD)
Specifies if the hash folder is on a solid state drive.
Note: Configure the hash destination on local SSD, if the Hash destination
is on a Solid State Drive(SSD) option is enabled
Compression Type
Specifies whether to use the standard compression type.
Compression is often selected to decrease the usage of the disk space, but
also has an inverse impact on your backup speed due to the increased CPU
usage. Based on your requirement, you can select one of the three
available options.
Note: For more information, see Compression Type (see page 993).
Enable Encryption
Specifies that encryption settings are enabled. When you select this option, you
must specify and confirm the encryption password.
Data encryption is the translation of data into a form that is unintelligible
without a deciphering mechanism. The Arcserve Unified Data Protection
solution uses secure, AES (Advanced Encryption Standard) encryption
algorithms to achieve maximum security and privacy of your data. For data
stores, encryption or No encryption is supported. For Encryption, only AES-256
is available.
Concurrent Active Nodes
Specifies the maximum concurrent jobs on the data store.
No Limit: The default means that all jobs in this Data Store are started
immediately.
Limit to: Refers to a value from 1 to 9999. The value indicates the number
of jobs that can concurrently run. If the running jobs meet the number,
another job is placed in to the queue and job can only start when one of
the running job completes. The completed job could mean a finished,
canceled, or a failed job.
The number applies to the Job Types but not to the Server nodes. For
example, number 5 indicates that five backup jobs are running. Any job
scheduled after five backup jobs waits in the queue, but you can submit
another job such as File System Catalog.
Note: Limit to number only impacts the replication outbound job, not the
replication inbound job. Limit to number does not impact the Restore or
BMR jobs. Such jobs are not placed in a queue.
A data store has default threshold setup in the system and physical memory. To free up
space or replace the existing disk with a bigger disk, you can modify the default
threshold manually. In a deduplication data store, the threshold monitors the memory
allocated to the hash destination and the disk space allocated for the backup
destination folder, index destination, and data destination. For a nondeduplication data
store, the threshold monitors the storage space only of the backup destination folder.
All the five items that the thresholds monitors have two types of values: warning
threshold and error threshold.
Note: You can view the error and warning messages from the log tab in the Console.
The log tab display errors or warning statuses related to data store threshold. The
following diagrams displays the different types of errors or warnings for specific folders:
If the threshold value is less than 1, then the value is percentage or the value unit is MB.
For example, for backup destination folder, WarnPathThreshold"="0.03" leads to the
following report status:
■ Report warning status if the volume free size is less than volume size 3%
■ Report error status if the volume free size less than 100MB.
Note: If the threshold is reached, you can release the space manually. The updated
status is available in 15 minutes.
When a deduplication data store is changed, only the hash path destination can be
changed to an empty folder. Arcserve UDP regenerates the hash path for the new data
store. This process is useful when the hash folder runs out of space and all the jobs get
canceled. You can change the data store and provide a new hash destination folder.
When you create a deduplication data store, you specify whether the hash destination is
on a Solid State Drive (SSD mode) or the hard disk drive (RAM mode). If you configured
hard disk as the hash destination, you need more memory to process hash keys. As a
result when your backup size grows, all your memory may get exhausted. In that case,
you can add an SSD to back up more data. Similarly if you had configured an SSD as the
hash destination, you need less memory to process hash keys. However, if you are
moving to a higher memory machine, you might want to switch to the RAM mode for a
faster hash processing.
To switch the hash destination from a RAM to SSD or SSD to a RAM, Arcserve UDP lets
you modify an existing data store and change the mode as required.
You can modify an existing data store even when it is running but the data store restarts
after you save the change.
Changing from the RAM to SSD Mode
When you switch from the RAM to SSD mode, you would need less memory. So,
Arcserve UDP automatically decreases the minimum value of "Hash Memory
Allocation". However, you can manually change Hash Memory Allocation. For this case,
you change the hash destination folders to SSD. When you change the hash destination,
Arcserve UDP automatically copies the hash files to the new location on SSD.
Changing from the SSD to RAM Mode
When you switch from the SSD to RAM mode, the RAM should be large enough to
accommodate the current hash database. For example, before the change, the data
store created 30 GB of hash files on SSD. Now after the change, you should allocate at
least a 30 GB memory for hash files. If the RAM is not enough, the switch fails. In this
case, Arcserve UDP automatically increases the following two parameters:
■ Minimum value of Hash Memory Allocation
■ Hash Memory Allocation
For this case, you change the hash destination folders to the hard disk drive. When you
change the hash destination, Arcserve UDP automatically copies the hash files to the
new location on hard disk drive.
In Arcserve UDP Version 5.0, the folder was shared with the hostname (for example,
<hostname>\sharename). As a result, when the remote server could access only the RPS
with FQDN (Fully qualified domain name), it could not access the RPS with hostname,
and the jobs failed.
Now, the data store folder can be shared with FQDN or IP address. This allows the
remote server to access the data store.
To achieve this, update the Recovery Point Server on the Console to FQDN or IP address,
and create new data store.
Note: For an existing database, stop the data store and import it again. You can
overwrite the data store instead of deleting it. Then, re-deploy the plans that use the
data store.
Notes:
■ You can import the deleted data store, when required.
■ To delete a data store that is linked to plans, first delete the plan that is linked to
the data store.
Notes:
■ If you stop a data store, all the jobs running, including the jobs waiting in
queue, on that data store are canceled.
■ If you stop a data store while a replication job is in progress, then on restarting
the data store, the replication job starts from the same point at which you
stopped the data store.
■ If you stop the data store while a replication job (for example, Job-10) is in
progress, and by that time two more backup jobs complete (for example,
Job-11, Job-12), then when you restart the data store, the replication jobs
complete in a sequence (Job-10, Job-11, Job-12, respectively).
Note: To start a deduplication data store, depending on the Hash size, the hash data
takes time to load from the hard disk to memory. On the right pane, the progress of the
data store is displayed in percentage.
You can also browse the recovery points from the Shared Folders view.
To delete a node from a data store, see Delete Node Data From a Data Store (see
page 248).
The purge job is initiated and the node data is deleted from the data source. You can
see the status of purge job from Recent Events and logs.
Note: For merge job, when a replication task is configured and you run an on-demand
merge job from the source data store, the job does not check whether the sessions are
replicated or not. As a result, the merged sessions cannot be replicated to target data
store and you end up replicating more data. For example, consider there are five
sessions, s1, s2, s3, s4, and s5 respectively. s1 and s2 are replicated. Now, you run an
on-demand merge job on the source side and retain two session. s4 and s5 are retained.
s4 is a full session. So, when the next replication job starts, the job needs to replicate a
full session.
Troubleshooting: How to Use a Data Store When One or Multiple folders are Full
Symptom:
How do I continue to use the data store when one of the following folders is full:
■ Data store backup destination
■ Deduplication index
■ Hash
■ Data
Solution:
You can stop the data store, copy the corresponding folder into a large volume, then
specify the new path to import data store (see page 253), and overwrite the existing one
to continue using it.
Note: Verify that before copying the folder, you stop the data store. During copy, ensure
that all files are copied to the destination folders, without skipping any files.
Warning! Skipping any files may result into data corruption.
What To Do Next?
■ Review the Prerequisites (see page 251)
■ Update a Recovery Point Server (see page 251)
■ Delete a Recovery Point Server from the Console (see page 252)
■ Import a Data Store (see page 253)
■ Install/Upgrade Recovery Point Server (see page 254)
Note: If a node acts as both recovery point server and agent, and you change the
credentials or protocol of that node, then update the node from the Destinations:
Recovery Point Server page. The plan will automatically deploy to the agent after you
update the recovery point server. If you update the node from the Nodes: All Nodes
page, then the plans involving those nodes are not deployed successfully. To deploy the
plan, update the node from the Destinations: Recovery Point Server page again.
Note: When you remove a recovery point server, the associated data stores are not
deleted. A recovery point server that is used in any plan cannot be deleted.
You have successfully deleted the Arcserve Backup Server from the Console.
The following table displays the list of follow-up tasks that you can add after Task 1:
Task 1 Follow-up Tasks
Backup: Agent-Based Windows ■ Replicate
■ Virtual Standby
■ Copy Recovery Points
■ File Copy
■ Replicate to a remotely-managed RPS
■ File Archive
■ Copy to Tape
Backup: Host-Based Agentless ■ Replicate
■ Virtual Standby
■ Copy Recovery Points
■ Replicate to a remotely-managed RPS
■ Copy to Tape
Backup: Agent-Based Linux ■ Replicate
■ Replicate to a remotely-managed RPS
■ Copy to Tape
Replicate data from a remote RPS ■ Virtual Standby
■ Replicate
The following diagram illustrates how different tasks form a backup plan. The diagram
also shows parameters that you can define in each task.
You can also back up an Oracle database. Before you create a plan to back up an Oracle
database, review the following prerequisites:
■ Prerequisite to back up an Oracle database (see page 261)
To backup Microsoft clustered nodes and shared disks, review the following
prerequisites:
■ Review the Prerequisites to Back Up Microsoft Clustered Nodes and Shared Disks
(see page 263)
What To Do Next?
1. Review the Prerequisites and Considerations (see page 261)
2. Create a Backup Plan (see page 265)
3. (Optional) Perform a Manual Backup (see page 280)
4. Verify the Backup (see page 281)
To back up an Oracle database with consistent data, ensure that the ARCHIVELOG mode
is enabled to archive the Redo logs.
STARTUP MOUNT;
By default, archive logs is written to the flash recovery area. If you do not want
to write archive logs to the flash recovery area, you can set the
LOG_ARCHIVE_DEST_n parameter to the location where you want to write
archive logs.
SQL>ALTRE SYSTEM SET
LOG_ARCHIVE_DEST_1='LOCATION=e:\app\administrator\oradata\<oracle_database_name>\arch'
SCOPE= BOTH;
System altered.
If you want to perform a BMR for a disaster recovery, ensure that you have selected the
system volumes and the volumes which includes all the oracle installation files.
Review the Prerequisites to Back Up Microsoft Clustered Nodes and Shared Disks
Review the following prerequisite steps when backing up Microsoft Clustered Nodes
and Shared Disks:
■ Install the Arcserve UDP Agent on all the clustered nodes.
■ Add all agents or nodes into the same backup plan.
■ Review the Compatibility Matrix which provides the supported operating systems,
databases, and browsers.
Note: The shared disks will be backed up along with the agent which owns the shares
disks. If the shared disk is moved from Node A to Node B during a failover, then for the
next backup job on Node B, the disk will be backed up as a full disk even though the job
itself appears as an incremental. After another failover if the shared disk moves back to
Node A, even then the disk will be backed up as a full disk even though the job itself
appears as an incremental.
How to enable Log Truncations when SQL Database is in Full Recovery Mode
Symptom
When the database is in the Full mode and a full database backup is performed, the SQL
truncation log cannot be truncated.
Solution
To resolve this problem, add two registry values to enable Arcserve UDP run the
BACKUP LOG command to back up the transaction log. This command marks the space,
which is already written to database file, as reusable.
The Source page lets you specify the source nodes that you want to protect. You can
select more than one node in a plan. If you have not added any nodes to the Console,
you can add nodes when you create or modify a plan from the Source page. You can
also save a plan without adding any source nodes. The plan gets deployed only after you
add source nodes.
The destination is a location where you store the backup data. You must at least specify
the destination to save the plan.
b. Select a data store. The list displays all data stores that are created at the
specified recovery point server.
c. Provide a session password.
Note: The session password is optional when the backup destination is an
unencrypted RPS data store.
d. Confirm the session password.
3. If you have selected Local disk or shared folder, then provide the following details:
a. Provide the full path of the local or network destination. For the network
destination, specify the credentials with the write access.
b. Select the encryption algorithm. For more information, see Encryption Settings
(see page 995).
c. Optionally, provide an encryption password.
d. Confirm the encryption password.
e. Select a type of compression. For more information, see Compression Type
(see page 993).
Note: If you store the data to a local disk or shared folder, you cannot replicate the
data to another recovery point server. Replication is supported only if you store the
data to a recovery point server.
The Schedule page lets you define a schedule for Backup, Merge, and Throttle functions
to repeat at specific intervals. After you define a schedule, the jobs run automatically
per the schedule. You can add multiple schedules and can provide retention settings.
A Backup Schedule refers to regular schedule that is repeated multiple times a day
based on the number of hours or minutes you select. Besides the regular schedule, a
backup schedule also provides options to add daily, weekly, and monthly schedules.
Note: For more information on scheduling and retention settings, see Understanding
Advanced Scheduling and Retention (see page 273).
4. Specify the recovery points retention settings for Custom, Daily, Weekly, and
Monthly schedule.
These options are enabled if you have added the corresponding backup schedule. If
you modify the retention settings on this page, the changes are reflected on the
Backup Schedule dialog.
5. Specify the catalog details.
Catalogs let you generate file system catalog. The File System catalog is required to
perform faster and easier search. If you select the catalog check boxes, the catalogs
are enabled depending on the type of backup that you have specified. Clear the
check box to disable generating the catalog.
The scheduling option lets you specify a Custom schedule or a Daily / Weekly / Monthly
schedule, or both the schedules. In the Custom schedule, you can configure the backup
schedule for each day of the week and you can add up to four backup schedules each
day. You can select a specific day of a week and create a time window to define when to
run backup and at what frequency.
Supported
Schedule Job Comments
Backup Backup job Define time windows to run backup jobs.
Define time windows to control the backup
Backup throttling Backup job speed.
Merge Merge job Define when to run merge jobs.
Daily schedule Backup job Define when to run daily backup jobs.
Weekly schedule Backup job Define when to run weekly backup jobs.
Monthly schedule Backup job Define when to run monthly backup jobs.
You can also specify the retention settings for the recovery points.
Note: Retention settings must be set within each plan to control how data for the nodes
assigned to that plan are retained at the target data store.
Schedules for Daily / Weekly / Monthly backups are independent to the Custom
schedule, and each other. You can configure only to run Daily backup, Weekly backup or
Monthly backup, without configuring the Custom schedule.
Backup Job Schedule
You can add four time windows per day in your backup schedule. A valid time
window is from 12:00 AM until 11:59 PM. You cannot specify a time window such
as 6:00 PM to 6:00 AM. In such cases, you have to manually specify two different
time windows.
For each time window, the start time is inclusive, and the end time is exclusive. For
example, you have configured to run Incremental Backup every one hour between
6:00 AM and 9:00 AM and the backup will start at 6:00 AM. This means the backup
will run at 6:00 AM, 7:00 AM, 8:00 AM, but NOT 9:00 AM.
Note: If you want to run the backup job repeatedly until the end of day, set the
schedule until 12:00 AM. For example, to run backup job every 15 minutes for the
entire day, set the schedule from 12:00 AM to 12:00 AM, every 15 minutes.
Backup Throttle Schedule
Backup throttle schedule lets you control the backup throughput speed, which in
turn controls the resource usage (disk I/O, CPU, network bandwidth) of the server
being backed up. This is useful if you do not want to affect the server performance
during business hours. You can add four time windows per day in your backup
throttle schedule. For each time window, you can specify a value, in MB per minute.
This value will be used to control the backup throughput. Valid values are from 1
MB/minutes to 99999 MB/minutes.
If a backup job extends its specified time, then the throttle limit will adjust
according to the specified time window. For example, you have defined the backup
throttle limit as 500 MB/minute from 8:00 AM to 8:00 PM, and 2500 MB/minute
from 8:00 PM to 10:00 PM. If a backup job starts at 7:00 PM and it runs for three
hours, then, from 7:00 PM to 8:00 PM the throttle limit will be 500 MB/minute and
from 8:00 PM to 10:00 PM the throttle limit will be 2500 MB/minute.
If you do not define any backup schedule and backup throughput schedule, the
backup will run as fast as it can.
Merge Schedule
Lets you merge recovery points based on the provided schedule.
The Advanced tab lets you specify some advanced settings for the backup job. The
advanced settings include providing truncate log settings, providing the location of any
scripts, and email settings.
User Name
Lets you specify the user who is authorized to run a script.
Password
Lets you specify the password of the user who is authorized to run the script.
Run a command before backup is started
Lets you run a script before the backup job starts. Specify the complete path
where the script is stored. Click On exit code and specify the exit code for Run
Job or Fail Job. Run Job indicates that the backup job will continue when the
script returns the exit code. Fail Job indicates that the backup job will stop
when the script returns the exit code.
Run a command after snapshot is taken
Lets you run a script after the backup snapshot is taken. Specify the complete
path where the script is stored.
Run a command after backup is over
Lets you run a script after the backup job is completed. Specify the complete
path where the script is stored.
Enable Email Alerts
Lets you enable email alerts. You can configure email settings and can specify
the types of alerts that you want to receive in an email. When you select this
option, the following options are enabled for your selection.
Email Settings
Lets you configure the email settings. Click Email Settings and configure
the email server and proxy server details. For more information about how
to configure Email Settings, refer to Email and Alert Configuration (see
page 141).
Job Alerts
Lets you select the types of job emails you want to receive.
The backup plan is created and automatically deployed to the source node. The backup
runs per the schedule that you have configured in the Schedule tab. You can also
perform a manual backup at any time.
3. Select the nodes that you want to backup and that has a plan assigned to it.
4. On the center pane, click Actions, Backup Now.
The Run a backup now dialog opens.
5. Select a backup type and optionally provide a name for the backup job.
6. Click OK.
The backup job runs.
Note: You can log in to the Linux Backup Server from the Arcserve UDP Console only
when you perform a restore.
What To Do Next?
1. Review the Prerequisites and Considerations (see page 282)
2. Create a Backup Plan (see page 283)
3. (Optional) Perform a Manual Backup (see page 300)
4. Verify the Backup (see page 300)
5. Troubleshooting (see page 301)
The Source page lets you specify the source nodes that you want to protect. You can
select more than one nodes in a plan. If you have not added any nodes to the Console,
you can add nodes from the Source page. You can save a plan without adding any
source nodes but the plan will not be deployed unless you add any nodes.
3. (Optional) Click Add to add a new Linux Backup Server to the list.
4. Click Add Nodes and select one of the following options:
Select Nodes to Protect
Opens the Select Nodes to Protect dialog and you can select the nodes from
the displayed list. Select this option if you have already added the nodes to the
Console.
Adding Linux Nodes
Opens the Add Nodes to Arcserve UDP Console dialog. Select this option if you
have not added the nodes and you want to manually add the nodes to protect.
5. Select the nodes from the Available Nodes column and click the Add all nodes or
Add selected nodes button.
The selected nodes are displayed in the Selected Nodes column.
The destination is a location where you store the backup data. You must at least specify
the destination to save the plan.
Note: Some versions of Data Domain NAS do not support the file locking
mechanism of NFS. As a result, such NFS share cannot be used as a backup
destination. For more information about this issue, see Compatibility Issues
with Arcserve UDP Agent (Linux) in the Release Notes.
■ If you have selected CIFS share, then type the Backup Destination detail in the
following format:
//hostname/share_folder
c. Select an algorithm from the Encryption Algorithm drop-down list and type the
encryption password, if necessary.
d. Select the type of encryption algorithm that you want to use for backups.
Data encryption is the translation of data into a form that is unintelligible
without a deciphering mechanism. The Arcserve UDP Agent (Linux) data
protection solution uses secure, AES (Advanced Encryption Standard)
encryption algorithms to achieve the maximum security and privacy of your
specified data.
For available format options of Encryption, see Encryption Settings (see
page 995).
■ A full backup and all its related incremental backups must use the same
encryption algorithm.
■ If the encryption algorithm for an incremental backup has changed, you
must perform a full backup.
For example, if you change the algorithm format and then you run an
incremental backup, then the backup type automatically converts to a full
backup.
e. When an encryption algorithm is selected, you must provide (and confirm) an
encryption password.
■ The encryption password is limited to a maximum of 23 characters.
■ A full backup and all its related incremental backups use the same
password to encrypt data.
4. If you have selected Arcserve UDP Recovery Point Server as Destination Type,
provide the following details:
a. Select a recovery point server.
b. Select a data store. The list displays all data stores that are created at the
specified recovery point server.
c. Provide a session password. The session password is optional when the backup
destination is an unencrypted RPS data store.
d. Confirm the session password.
The Schedule page lets you define a backup schedule to repeat at specific intervals.
After you define a schedule, the jobs run automatically per the schedule. You can add
multiple schedules and provide retention settings. If Local disk or shared folder is the
backup destination, the default value is a custom incremental backup at every 10:00
PM. If RPS server is the backup destination, the default value is a daily Incremental
backup at every 10:00 PM.
6. Specify the recovery points retention settings for Custom, Daily, Weekly, and
Monthly schedule.
These options are enabled if you have added the corresponding backup schedule. If
you modify the retention settings on this page, the changes are reflected on the
Backup Schedule dialog.
A recovery set is a storage setting where a group of recovery points backed-up over a
specified period is stored as one set. A recovery set includes a series of backups, starting
with a full backup, and then followed by a number of incremental, verify, or full
backups. You can specify the number of recovery sets to retain.
The Recovery Set Settings ensures periodic maintenance of recovery sets. When the
specified limit is exceeded, the oldest recovery set is deleted. The following values
define the default, minimum, and maximum recovery sets in Arcserve UDP Agent
(Linux):
Default: 2
Minimum: 1
Note: If you want to delete a recovery set to save backup storage space, reduce the
number of retained sets and Backup Server automatically deletes the oldest recovery
set. Do not attempt to delete the recovery set manually.
Example Set 1:
■ Full
■ Incremental
■ Incremental
■ Verify
■ Incremental
Example Set 2:
■ Full
■ Incremental
■ Full
■ Incremental
A full backup is required to start a new recovery set. The backup that starts the set will
be automatically converted to a full backup, even if there is no full backup configured or
scheduled to be performed at that time. After the recovery set setting is changed (for
example, changing the recovery set starting point from the first backup of Monday to
the first backup of Thursday), the starting point of existing recovery sets will not be
changed.
Note: An incomplete recovery set is not counted when calculating an existing recovery
set. A recovery set is considered complete only when the starting backup of the next
recovery set is created.
With the above configuration, an incremental backup will run at 6:00 AM and 6:00 PM
every day. The first recovery set is created when the first backup (must be a full backup)
is taken. Then the first full backup is marked as the starting backup of the recovery set.
When the backup scheduled at 6:00 AM on Friday is run, it will be converted to a full
backup and marked as the starting backup of the recovery set.
Note: If you want to run the backup job repeatedly until the end of day, set the
schedule until 12:00 AM. For example, to run backup job every 15 minutes for the entire
day, set the schedule from 12:00 AM to 12:00 AM, every 15 minutes.
The Advanced tab lets you specify some advanced settings for the backup job. The
advanced settings include providing the backup throughput and pre/post script settings.
Note: For more information about creating the pre/post scripts, see Manage
Pre/Post Scripts for Automation (see page 297).
4. Click Enable Email Alerts to specify the Email Settings and select job alerts..
Applicable only when the backup destination is Arcserve Recovery Point Server.
5. Click Save.
The changes are saved.
The backup plan is created and automatically deployed to the source node. The backup
runs per the schedule that you have configured in the Schedule tab. You can also
perform a manual backup at any time.
Pre/Post scripts let you run your own business logic at specific stages of a running job.
You can specify when to run your scripts in Pre/Post Script Settings of the Backup
Wizard and the Restore Wizard in the Console. The scripts can be run on the Backup
Server depending on your setting.
Managing the pre/post script is a two part process, consisting of creating the pre/post
script and placing the script in the prepost folder.
restore.bmr
Identifies the job as a bare-metal recovery (bmr). This is a restore job.
restore.file
Identifies the job as a file-level restore. This is a restore job.
D2D_SESSIONLOCATION
Identifies the location where the recovery points are stored.
D2D_PREPOST_OUTPUT
Identifies a temp file. The content of the first line of the temp file is displayed in
the activity log.
D2D_JOBSTAGE
Identifies the stage of the job. The following values identify the D2D_JOBSTAGE
variable:
pre-job-server
Identifies the script that runs on the Backup Server before the job starts.
post-job-server
Identifies the script that runs on the Backup Server after the job
completes.
pre-job-target
Identifies the script that runs on the target machine before the job starts.
post-job-target
Identifies the script that runs on the target machine after the job
completes.
pre-snapshot
Identifies the script that runs on the target machine before capturing the
snapshot.
post-snapshot
Identifies the script that runs on the target machine after capturing the
snapshot.
D2D_TARGETVOLUME
Identifies the volume that is backed up during a backup job. This variable is
applicable for pre/post snapshot scripts for a backup job.
D2D_JOBRESULT
Identifies the result for a post job script. The following values identify the
D2D_JOBRESULT variable:
success
Identifies the result as successful.
fail
Identifies the result as unsuccessful.
D2DSVR_HOME
Identifies the folder where Backup Server is installed. This variable is applicable
for the scripts that run on the Backup Server.
Note: For all scripts, a return value of zero indicates success and a nonzero return value
indicates failure.
All the pre/post scripts for a Backup Server are centrally managed from the prepost
folder at the following location:
/opt/Arcserve/d2dserver/usr/prepost
The pre/post scripts are successfully created and placed in the prepost folder.
Troubleshooting
Job Status, Job History, and Activity Log are Not Visible
Symptom
I cannot see the job status, job history, and activity log for Linux nodes in Arcserve UDP
Console.
Solution
Linux Backup Server is unable to connect to Arcserve UDP using the hostname.
The job status, job history, and activity log are visible.
You can also back up Oracle databases, SQL and Exchange Servers. To back up Oracle
databases, you have to ensure specific prerequisites (To back up SQL Server and
Exchange Server, there are no prerequisites required). Review the following
prerequisites to perform an application consistent backup of an Oracle database:
■ Prerequisite to create an application consistent backup of an Oracle database (see
page 305)
The following diagram illustrates the process to protect host-based virtual machine
nodes.
What To Do Next?
1. Review the Prerequisites and Considerations (see page 303)
2. Create a Host-Based Backup Plan (see page 307)
3. (Optional) Perform a Manual Backup (see page 333)
4. Verify the Plan (see page 334)
5. Troubleshooting (see page 335)
■ To be able to perform a database level restore (for Exchange and SQL Server) or
granular level restore (Exchange) after a backup, the following prerequisites must
be met:
– The VM must support the application consistent backup. For more information
on application consistent backup, see How to Create Application Consistent
Snapshots for VMware (see page 194) or How to Create Application Consistent
Snapshots for Hyper-V (see page 198).
– For VMware VM, the VMware Tools snapshot quiescing method must be used
in the backup plan.
– For Hyper-V VM, Arcserve UDP needs to automatically deploy an utility into the
guest OS of VM to gather the application metadata during a backup. The guest
OS of the VM needs to be accessed from either the backup proxy server or
Hyper-V host using a network. At the same time, the VM node must be
updated with proper administrative credentials in the node list view of
Arcserve UDP Console. For some reasons, if the guest OS of the VM cannot be
accessed from the backup proxy server and Hyper-V host both, follow these
steps to manually install the utility in the guest OS of VM:
a. Log in to the backup proxy server and navigate to the following folder:
<Arcserve UDP installation path>\Engine\BIN (Example, C:\Program
Files\Arcserve\Unified Data Protection\Engine\BIN)
b. Locate the executable file VMICService_32.exe or VMICService_64.exe.
c. Copy the executable file to any a folder inside the guest OS of the VM. (If it
is a 32-bit OS, copy VMICService_32.exe, otherwise copy
VMICService_64.exe).
For example, you can create an ISO image by including this executable file
and mount it to the DVD device of the VM.
d. Log in to the guest OS of the VM and run VMICService_32.exe -install or
VMICService_64.exe -install.
■ Install the server component and create Data Stores if you want to store the backup
data in the recovery point server.
■ Review the prerequisites to back up an Oracle database (see page 305).
■ Review the Compatibility Matrix which provides the supported operating systems,
databases, and browsers.
For more information on configuring the VSS hardware provider, contact your
hardware provider vendor.
■ The Hyper-V server and the proxy server must have a similar operating system
version.
■ If Hyper-V server belong to a cluster, the proxy server should not be part of the
Hyper-V cluster.
For VMware
■ Arcserve UDP supports NetApp iSCSI and NetApp NFS LUNs.
■ To create a hardware snapshot for VMware, add the storage array to the
Console. For more information on adding a storage array, see Add a Storage
Array (see page 204).
■ To use the hardware snapshot, Flexclone license is mandatory for Netapp
storage arrays running with data ONTAP operating in 7-Mode and Cluster
mode.
Review the Prerequisites to Perform Application Consistent Backup for Oracle Database
To back up an Oracle database with consistent data, ensure that the ARCHIVELOG mode
is enabled to archive the Redo logs.
STARTUP MOUNT;
By default, archive logs is written to the flash recovery area. If you do not want
to write archive logs to the flash recovery area, you can set the
LOG_ARCHIVE_DEST_n parameter to the location where you want to write
archive logs.
SQL>ALTRE SYSTEM SET
LOG_ARCHIVE_DEST_1='LOCATION=e:\app\administrator\oradata\<oracle_database_name>\arch'
SCOPE= BOTH;
System altered.
The Source page lets you specify the source nodes that you want to protect. You can
select more than one node in a plan. If you have not added any nodes to the Console,
you can add nodes when you create or modify a plan from the Source page. You can
save a plan without adding any source nodes. The plan gets deployed only after you add
source nodes.
You do not have to add the port number and protocol. The port number and
protocol are configured on the settings tab of the Console.
Note: When you modify a plan by changing the Backup Proxy but the nodes
included in the plan have jobs running, the plan deployment fail. Follow these steps
to change proxy of a plan:
a. Pause the plan.
b. Wait until all the nodes in the plan complete the running backup jobs. (Or,
you can cancel the running jobs).
c. Change the proxy of the plan and save it.
d. Resume the plan.
2. Click Add Nodes to add the nodes that you want to backup.
a. Select one of the following options to add nodes and select one of the
following options:
Select Nodes to Protect
Opens the Select Nodes to Protect dialog and you can select the nodes
from the displayed list. Select this option if you have already added the
nodes to the Console.
Importing from Hyper-V
Opens the Add Nodes to Arcserve UDP Console dialog. Select this option if
you have not added the nodes and you want to import the nodes from a
Hyper-V server.
Importing from vCenter/ESX
Opens the Add Nodes to Arcserve UDP Console dialog. Select this option if
you have not added the nodes and you want to import the nodes from a
vCenter/ESX server.
b. (Optional) Select a filter from the Groups drop-down list to filter nodes. Enter
keywords to further filter your nodes.
c. Select the nodes from the Available Nodes area and click the Add all nodes
(>>) or Add selected nodes (>) icon.
The selected nodes are displayed on the Selected Nodes area.
3. (Optional) Select one of the following quiescing methods for VMware. These
options are applicable for VMware only.
VMware Tools
Indicates that Arcserve UDP uses the VMware tools for quiescing the virtual
machine. If you have used the Microsoft VSS inside VM option in the previous
backup job, the first consequent backup job with this option requires the
credentials to access the virtual machine. This is because Arcserve UDP
removes necessary tools from the VM. In addition, VMware Tools needs to be
installed and update to date in the VM.
Microsoft VSS inside VM
Indicates that Arcserve UDP uses Microsoft VSS in the guest OS for
quiescing the virtual machine. It is applicable only for virtual machines with
Windows guest OS. VMware tools must be installed in the guest OS and the
tools must be updated. For VM which resides ESXi 4.x, VIX must be installed on
proxy machine. When you use this option, the virtual machine must be
powered on and it must be updated with the built-in administrator credentials.
For more information on updating a node, see Update Nodes (see page 181).
Note: The snapshot provided by VMware using this option may not be
application consistent. In other words, the backup generated using this option
may not be an application-consistent backup. The workaround is to use
VMware Tools snapshot quiescing method, along with disabling the VSS writers
MSSearch Service Writer and Shadow Copy Optimization Writer in guest OS of
VM before this problem gets fixed.
Take snapshot without guest quiescence if quiescence snapshot fails
Indicates that, when backup job fails to take the snapshot with quiescence
option, Arcserve UDP will continue the backup job by taking a snapshot without
quiescing the virtual machine.
Notes:
■ The Microsoft VSS inside VM option does not support the application database
level and granular level of restore.
■ Both the quiescing methods are not applicable when the virtual machine is
powered off. If a backup job is initiated when the virtual machine is powered
off, the backup job ignores both the quiescing methods.
■ For both the quiescing methods, if the backup job cannot continue for any
reason (for example, the credentials are incorrect), Arcserve UDP fails the
backup job. For more information about the backup job failure, see the
troubleshooting (see page 335) topic.
4. (Optional) Select one of the transport methods for VMware. These options are
applicable for VMware.
Let VMware select the best available method
Indicates that VMware selects the data transfer option. You do not have to
manually set any data transfer option.
Set method priorities for this plan
Indicates that you can select the data transfer option and set the priority for
each option. Use the arrow button to prioritize the transport mode.
■ HOTADD transport mode (see page 996)
■ NBD transport mode (see page 996)
■ NBDSSL transport mode (see page 996)
■ SAN transport mode (see page 997)
Note: If you have specified the transport mode in both the Console and registry key,
then the priority set from the Console overrides the priority set in the registry key.
For more information on setting the priority using the registry key, see Define a
Transport Mode for Host-Based Agentless Backup and Restore.
5. (Optional) Select Hyper-V snapshot method. These options are applicable for
Hyper-V only.
VM must be backed up using snapshots generated by Microsoft VSS method
Indicates that Arcserve UDP uses the native snapshot methods of Microsoft -
online and offline for the backup job. This is the default option. When this
checkbox is not selected and when both Microsoft online and offline methods
are not available, the backup job uses the Arcserve UDP method to back up the
virtual machine.
If the Microsoft offline method is used for backup and the virtual machine is
required to be in a Saved state, select the VM may be placed into "Saved"
state before snapshot is taken check box also. If you do not select this check
box, the backup job fails.
Online backup is the recommended backup method because it supports the
application consistent backup without the downtime of the virtual machine.
The virtual machine is accessible during the backup. The online backup method
must satisfy some prerequisites such as integration services must be installed
and running. If any of the prerequisites are not satisfied, then only the offline
backup method is used.
The Microsoft offline backup method has two approaches - save state approach
and checkpoint approach. If the Hyper-V host has the Windows 2012R2
operating system with KB 2919355 or later, then the checkpoint approach is
used; else the save state approach is used.
The major difference between these two approaches is that the save state
approach requires the virtual machine to be inaccessible for a short time. The
virtual machine must be placed into a saved state for a few minutes while
taking the snapshot.
Apart from the Microsoft native snapshot methods, Arcserve UDP has its own
snapshot method that can be used when the Microsoft native snapshot
methods are not available.
Note: Both Microsoft offline method and Arcserve UDP method are
crash-consistent backup methods. Both the methods cannot guarantee data
integrity. The main difference between the methods is that the Microsoft
offline method can be compared to the state that VM has been powered off
abruptly whereas the Arcserve UDP method can be compared to the state that
Hyper-V host has been powered off abruptly.
VM may be placed into "Saved" state before snapshot is taken
Indicates that the virtual machine is placed in the Saved state, if required,
before taking the VSS snapshot. Select this option when the virtual machine
does not support the online backup. If the virtual machine supports the online
backup, then even on enabling this option the virtual machine will not be in the
Saved state.
6. (Optional) Select the snapshot separation option for Hyper-V. This option is
applicable for Hyper-V only.
Backup each VM individually using separate snapshot
Indicates that when you select this option Arcserve UDP captures separate
snapshot for each virtual machine that is specified in the current plan.
However, it increases the workload of the Hyper-V host when multiple
snapshots are captured. If you do not select this option, Arcserve UDP captures
one VSS snapshot for all the virtual machines if the backup jobs start at the
same time. It is recommended to disable this option.
For more information about the separate snapshot state of a virtual machine,
see the troubleshooting (see page 340) topic.
Define a Transport Mode in the Registry for Host-Based Agentless Backup and Restore
You can define transport mode (transfer data) for UDP agent as proxy that executes
host-based agentless backup or restore job for virtual machines residing on VMware ESX
server. By default, host-based agentless backup and restore uses a mode that lets
host-based agentless backup and restore to optimize the performance (increase the
speed) of the data transfer. However, when you want to specify a particular transport
mode for backup or restore, configure the registry key described in this topic.
Note: For backup, the transport mode defined in plan takes precedence over what is
defined in registry.
Host-based VM backup can execute backups using the following transport modes:
■ HOTADD transport mode (see page 996)
■ NBD transport mode (see page 996)
■ NBDSSL transport mode (see page 996)
■ SAN transport mode (see page 997)
Follow these steps to define the transport mode at the proxy server level (applicable
for both backup and restore):
1. Log in to the Arcserve UDP Agent (Windows) backup proxy server.
2. Open Windows Registry Editor and browse to the following key:
[HKEY_LOCAL_MACHINE\SOFTWARE\Arcserve\Unified Data Protection\Engine]
The transport mode is defined and is used the next time when the job runs.
Note: To restore thin Virtual Machine Disks (VMDK), the non-advanced transport (LAN
transport mode) mode is used by default. To enable the advanced transport mode for
thin VMDK, update the registry key as shown in the following example:
a. Open Windows Registry Editor and browse to the following key:
[HKEY_LOCAL_MACHINE\SOFTWARE\Arcserve\Unified Data
Protection\Engine]
b. Create a key named AFRestoreDll.
c. Create a string value named EnforceTransportForRecovery within the
AFRestoreDll key.
d. Specify the transport mode that you want to use during the recovery job. (For
example: "san:nbd:nbdssl")
Example
[HKEY_LOCAL_MACHINE\SOFTWARE\Arcserve\Unified Data Protection\Engine\AFRestoreDll]
"EnforceTransportForRecovery"="san:hotadd:nbd:nbdssl"
Follow these steps to define the transport mode at the VM level (applicable for
backup only):
1. Log in to the Arcserve UDP Agent (Windows) backup proxy server for the virtual
machines.
2. Open Windows Registry Editor and browse to the following key:
[HKEY_LOCAL_MACHINE\SOFTWARE\Arcserve\Unified Data
Protection\Engine\AFBackupDll\{VM-InstanceUUID}
6. Right-click EnforceTransport and click Modify on the pop-up menu to open the Edit
String dialog.
7. In the Value Data field, specify the transport mode that you want to use during the
backup job. Specify one of the following values:
hotadd
HOTADD transport mode
nbd
NBD transport mode
nbdssl
NBDSSL transport mode
san
SAN transport mode
8. Click OK to apply the value and close the Edit String dialog.
The transport mode is defined and is used the next time when the job runs.
The destination is a location where you store the backup data. You must at least specify
the destination to save the plan.
The Schedule page lets you define a schedule for Backup, Merge, and Throttle functions
to repeat at specific intervals. After you define a schedule, the jobs run automatically
per the schedule. You can add multiple schedules and provide retention settings.
A Backup Schedule refers to regular schedule that is repeated multiple times daily based
on the number of hours or minutes you select. Besides the regular schedule, a backup
schedule also provides options to add daily, weekly, and monthly schedules.
Note: For more information on scheduling and retention settings, see Understanding
Advanced Scheduling and Retention (see page 273).
4. Specify the recovery points retention settings for Custom, Daily, Weekly, and
Monthly schedule.
These options are enabled if you have added the corresponding backup schedule. If
you modify the retention settings on this page, the changes are reflected on the
Backup Schedule dialog.
5. Specify the catalog details.
Catalogs let you generate the file system catalog. The File System catalog is
required to perform faster and easier search. The catalogs are enabled depending
on the type of backup that you have specified.
6. (Optional) Select one of the backup options in Recovery Point Check.
This option lets you detect data corruption issues by verifying the file system of the
volumes. When the backup job completes, Arcserve UDP mounts the recovery point
and runs the chkdsk Windows command. If the chkdsk command detects an error,
the next backup job is converted to a Verify backup job. This option is applicable for
both VMware and Hyper-V virtual machines with the Windows guest OS. Review
the following considerations before enabling this option:
■ The following types of volume are not supported and they are skipped by
Recovery Point Check:
■ The volume whose file system type is not NTFS
■ The volume whose type is striped with parity
■ The volume that is in that storage pool
■ The chkdsk command cannot detect all file system problems. The recovery
point check may pass but the recovery point can still be corrupted.
■ Depending on the size of the file system of the guest OS, the chkdsk command
may take a longer time to run. The chkdsk uses a large amount of system
memory on the Backup Proxy server and affects the performance of the proxy
server. This result in the backup job taking a longer time to complete. In the
worst case, the system memory of the Backup Proxy server may get exhausted
and the server may become non-responsive, especially when there are
numerous concurrent backup jobs or huge volumes are being checked. Check
recovery point itself can monitor the system memory usage and, if the memory
usage reaches to a threshold, check recovery point will suspend itself for some
time and release some the system memory. However, as a best practice,
disable this option unless it is necessary or you have a powerful Backup Proxy
server. Alternatively, you can distribute the load to multiple proxy servers by
creating multiple plans and specifying different proxy serves in each of the
plan.
■ If the backup is crash consistent, there are high chances that chkdsk will detect
problems (due to the nature of a crash consistent backup). As a best practice,
do not enable this option for a crash consistent backup.
■ If you want to enable the Recovery Point Check option but you do not want the
next backup job to be converted to a Verify backup job, create a DWORD value
named CheckRecoveryPointIgnoreError in the registry of the proxy server and
set the DWORD value to 1. Create the DWORD value at the following location:
KEY_LOCAL_MACHINE\SOFTWARE\Arcserve\Unified Data
Protection\Engine\AFBackupDll
The DWORD is applicable for all the backup jobs that are running on the
current proxy server. If you want to control the behavior of a specific virtual
machine, you can set the value at the following location:
HKEY_LOCAL_MACHINE\SOFTWARE\Arcserve\Unified Data
Protection\Engine\AFBackupDll\<VM GUID>.
Note: If you add the registry key in both the VM and proxy level registry, then
the setting in the VM level registry will have the priority over the setting in the
Proxy level registry.
■ If you want to fail the backup job after the Recovery Point Check detects
problem (so that you can be aware of data problem promptly), create a
DWORD value named CheckRecoveryPointDontFailJob in the registry of the
proxy server and set the DWORD value to 0. Create the DWORD value at the
following location:
HKEY_LOCAL_MACHINE\SOFTWARE\Arcserve\Unified Data
Protection\Engine\AFBackupDll
The DWORD is applicable for all the backup jobs that are running on the
current proxy server. If you want to control the behavior of a specific virtual
machine, you can set the value at the following location:
HKEY_LOCAL_MACHINE\SOFTWARE\Arcserve\Unified Data
Protection\Engine\AFBackupDll\<VM GUID>.
Note: If you add the registry key in both the VM and proxy level registry, then
the setting in the VM level registry will have the priority over the setting in the
Proxy level registry.
The scheduling option lets you specify a Custom schedule or a Daily / Weekly / Monthly
schedule, or both the schedules. In the Custom schedule, you can configure the backup
schedule for each day of the week and you can add up to four backup schedules each
day. You can select a specific day of a week and create a time window to define when to
run backup and at what frequency.
Supported
Schedule Job Comments
Backup Backup job Define time windows to run backup jobs.
Define time windows to control the backup
Backup throttling Backup job speed.
Merge Merge job Define when to run merge jobs.
Daily schedule Backup job Define when to run daily backup jobs.
Weekly schedule Backup job Define when to run weekly backup jobs.
Monthly schedule Backup job Define when to run monthly backup jobs.
You can also specify the retention settings for the recovery points.
Note: Retention settings must be set within each plan to control how data for the nodes
assigned to that plan are retained at the target data store.
Schedules for Daily / Weekly / Monthly backups are independent to the Custom
schedule, and each other. You can configure only to run Daily backup, Weekly backup or
Monthly backup, without configuring the Custom schedule.
Backup Job Schedule
You can add four time windows per day in your backup schedule. A valid time
window is from 12:00 AM until 11:59 PM. You cannot specify a time window such
as 6:00 PM to 6:00 AM. In such cases, you have to manually specify two different
time windows.
For each time window, the start time is inclusive, and the end time is exclusive. For
example, you have configured to run Incremental Backup every one hour between
6:00 AM and 9:00 AM and the backup will start at 6:00 AM. This means the backup
will run at 6:00 AM, 7:00 AM, 8:00 AM, but NOT 9:00 AM.
Note: If you want to run the backup job repeatedly until the end of day, set the
schedule until 12:00 AM. For example, to run backup job every 15 minutes for the
entire day, set the schedule from 12:00 AM to 12:00 AM, every 15 minutes.
Backup Throttle Schedule
Backup throttle schedule lets you control the backup throughput speed, which in
turn controls the resource usage (disk I/O, CPU, network bandwidth) of the server
being backed up. This is useful if you do not want to affect the server performance
during business hours. You can add four time windows per day in your backup
throttle schedule. For each time window, you can specify a value, in MB per minute.
This value will be used to control the backup throughput. Valid values are from 1
MB/minutes to 99999 MB/minutes.
If a backup job extends its specified time, then the throttle limit will adjust
according to the specified time window. For example, you have defined the backup
throttle limit as 500 MB/minute from 8:00 AM to 8:00 PM, and 2500 MB/minute
from 8:00 PM to 10:00 PM. If a backup job starts at 7:00 PM and it runs for three
hours, then, from 7:00 PM to 8:00 PM the throttle limit will be 500 MB/minute and
from 8:00 PM to 10:00 PM the throttle limit will be 2500 MB/minute.
If you do not define any backup schedule and backup throughput schedule, the
backup will run as fast as it can.
Merge Schedule
Lets you merge recovery points based on the provided schedule.
The Advanced tab lets you specify some advanced settings for the backup job. The
advanced settings include providing snapshot type for backup, truncate log settings,
providing the location of any scripts, and email settings. Review the prerequisites before
you select the hardware snapshot type.
2. Click Save.
Note: When you select a node as a backup source or backup proxy, Arcserve UDP
checks whether the agent is installed on the node and if it is the latest version.
Arcserve UDP then displays a verification dialog that lists all the nodes that either
have an outdated version of the agent or does not have the agent installed. To
install/upgrade the agent on these nodes, select the installation method and click
Save.
The changes are saved and a green checkmark is displayed next to the task name.
The plan page closes.
Note: If you have to add another task, you must select the plan from the resources
tab and modify the plan. To modify the plan, click the plan from the center pane.
The plan opens and you can modify it.
The plan is automatically deployed to the source virtual machine node.
The host-based agentless backup plan for the virtual machine is created. The backup
runs per the schedule that you have configured in the Schedule tab. You can also
perform a manual backup at any time.
Run Script Command and Log Truncation with Additional Administrator Account
Additional administrator account refers to those accounts that are not default
administrators. The following two accounts are involved when you run the commands
or scripts:
1. Account set by Update Node
2. Account set on the Advanced tab of a Plan
VMware and Hyper-V virtual machines have separate conditions to use the additional
administrator accounts.
If both accounts are set, use the first account to log in to the virtual machine (vSphere
SDK is used to communicate with virtual machine, so that the network access is not
required between proxy server and virtual machine). Then use the second account to
run the command or script in the virtual machine.
If either of the account is not set, use the available account to log in to the virtual
machine and run the command or script.
If you use any additional administrator account (non-built-in administrator account), the
procedure is different.
You need only one account for Hyper-V virtual machines. If both accounts are set, use
the second account (set on the Advanced tab of a plan) to connect to the virtual
machine and launch the command or script. Windows Management Instrumentation
(WMI) is used to communicate with the virtual machine, so that the network access is
required between proxy server and virtual machine.
If either of the account is not set, use the available administrator account to connect to
the virtual machine and launch the command or script.
Also, verify if WMI is allowed by firewall on the guest VM. If not enabled, follow these
steps:
3. Login to the guest VM.
4. Open the Control panel.
5. Open the Windows Firewall.
6. Click Allow an app or feature through Windows Firewall.
7. Enable Windows Management Instrumentation(WMI).
8. Click OK.
You can define a limit to the quantity of backup jobs that run concurrently. This
capability lets you optimize the performance of the host-based VM backup proxy server
in your backup environment. By default, Host-Based VM Backup can run up to four
VMware VM backup jobs and ten Hyper-V VM backup jobs concurrently. In
environments that contain many virtual machines that are associated with a proxy
server, a high quantity of concurrent backups can have an adverse effect on network
and backup performance.
Note: When the quantity of concurrent jobs exceeds the defined limit, the jobs that
exceed the limit enter a job queue.
Note: If the maximum number of concurrent VMware backup jobs exceeds the ESX
server connection limit, communication failure can occur between the ESX server and
the backup proxy, and the file system of the ESX server data store can remain locked. In
such cases, restart the ESX server or migrate the locked virtual machine to another data
store to unlock the VM. For more details, refer to the VMware document
http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=display
KC&externalId=1022543 (VMware KB:1022543).
HyperVMaxJobNum
Note: Both the keys are already created and the default value is 4 and 10,
respectively.
4. Right-click VMMaxJobNum or HyperVMaxJobNum and click Modify on the pop-up
menu.
The Edit String dialog opens.
5. In the Value Data field, specify the quantity of backup jobs that you want to allow to
run concurrently.
■ Minimum limit--1
■ Maximum limit--none.
■ Default--10 for Hyper-V and 4 for VMware
6. Click OK.
The limit is defined.
3. Select the nodes that you want to backup and that has a plan assigned to it.
4. On the center pane, click Actions, Backup Now.
The Run a backup now dialog opens.
5. Select a backup type and optionally provide a name for the backup job.
6. Click OK.
The backup job runs.
Troubleshooting
This section contains the following topics:
■ Incremental Backup Converts to Verify Backup or the Backup Size Increases in
Hyper-V (see page 335)
■ Host-based Backup Fails for Hyper-V VM That Has a Special Differencing Disk
Configuration (see page 337)
■ The backup job fails for a VMware virtual machine (see page 338)
■ The backup job is complete but the VM is in the Backing up status (see page 340)
■ Disable Rescan of Host Bus Adapters When the Source and Proxy are in Different
VMware ESX Servers (see page 341)
Incremental Backup Converts to Verify Backup or the Backup Size Increases in Hyper-V
Valid on Hyper-V VM
Symptom
■ I have performed an incremental change in a Hyper-V virtual machine. When I
perform an incremental backup, the entire virtual machine is backed up instead of
backing up only the changed data.
■ I have a proxy server with Arcserve UDP Version 6.0 that backs up a virtual machine
from one Hyper-V host (example HOST1). I have another proxy server with an older
version of Arcserve UDP that backs up a virtual machine from the same Hyper-V
host (HOST1). In such cases, the CBT is inactive and the Incremental jobs do not run.
The Incremental backup converts to the Verify backup.
Solution
The root causes of above symptoms can be one of the following reasons:
■ The loss of change block tracking (CBT) data. The following circumstances will result
in CBT data loss:
– The Hyper-V host crashes or is powered off abnormally.
– The CBT service is stopped or the service abnormally quits.
– The CBT service did not complete its work while the Hyper-V host was shutting
down.
■ Different versions of CBT in the Hyper-V server and the proxy server.
Example: Consider you have two Arcserve UDP environments, one is Arcserve UDP
Version 5 and another is Arcserve UDP Version 6.0. These two Arcserve UDP
environments back up different VMs in the same Hyper-V server. The Arcserve UDP
Version 6.0 environment automatically detects the older version of CBT in the
Hyper-V server and upgrades it to the latest version. In such cases, the Arcserve
UDP Version 5 environment converts the remaining scheduled incremental backup
to a full backup.
If Arcserve UDP detects different CBT versions, the Activity Log displays a warning
message.
The solution is to upgrade all the proxy servers that protects virtual machines from one
Hyper-V host to the same version of Arcserve UDP.
Host-based Backup Fails for Hyper-V VM That Has a Special Differencing Disk Configuration
Symptom
If a differencing disk is configured in a Hyper-V virtual machine, the backup job for that
virtual machine fails. It displays the following error message in the activity log:
The following error message is displayed in the backup job log file under C:\Program
Files\Arcserve\Unified Data Protection\Engine\Logs,
The problem occurs only when the virtual machine has the following differencing disk
configurations. All the configurations must apply.
■ The virtual machine has one regular virtual hard disk (Fixed size or Dynamically
expanding) Disk1 that is attached to one IDE or SCSI controller of the virtual
machine.
■ The virtual machine has one differencing virtual hard disk (Disk2) that is also
attached to one IDE or SCSI controller of the virtual machine.
■ The parent disk of Disk2 is specified to Disk1.
Solution
Symptom
When I back up a VMware virtual machine, the backup job fails with either of the
following error messages in the activity log:
Abort backup because backup job has been configured to use the "Microsoft VSS
inside VM" snapshot method. However, only the "VMware Tools" snapshot method is
applicable because Host-based VM Backup failed to deploy the necessary tools into
the VM.
Or
Abort backup because backup job has been configured to use the "VMware Tools"
snapshot method. However, only the "Microsoft VSS inside the VM" snapshot method
is applicable because Host-based VM Backup failed to undeploy tools from inside VM.
Solution
The first error can occur because of multiple reasons. You have selected the Microsoft
VSS inside VM option but:
■ You did not update the VM with the required credentials
■ The credentials are not correct
■ VMware Tools are not installed or updated.
In this case, Arcserve UDP cannot deploy necessary tools to the virtual machine to use
the new snapshot method.
To resolve this error, update the virtual machine with correct credentials. Verify that
VMware Tools are updated and running in the virtual machine. After the verification,
resubmit the backup job.
Solution
The second error may occur in the following scenario. You have used the Microsoft VSS
inside VM option in the previous backup jobs. Now, you want to use the VMware Tools
option but the credentials of the virtual machine have changed (for example, you have
changed the password of the guest OS but you did not update the virtual machine node
in Console), or VMware Tools is not running for some reason. In such cases, Arcserve
UDP cannot undeploy the tools (which were deployed by the previous backup job) from
the virtual machine to use the new snapshot method.
To resolve this error, perform one of the following steps:
■ Update the virtual machine with correct credentials. Verify that VMware Tools are
updated and running in the virtual machine guest OS. After the verification,
resubmit the backup job.
Symptom
In Hyper-V 2012 or later, the virtual machine stays in the Backing up status although the
agent-less host-based backup job of this virtual machine has already finished. I cannot
perform some operations such as power-on or power-off the virtual machine during
that time in the Hyper-V manager. If the virtual machine is a Hyper-V cluster, I cannot
perform live migration for it. In addition, if another backup job for this VM starts at the
same time, the backup job fails with the following error:
The Hyper-V VSS writer has encountered an error when processing this virtual machine.
Solution
If the backup jobs start at the same time or at times closer to each other, Arcserve UDP
takes one VSS snapshot for all virtual machines instead of taking one VSS snapshot for
each virtual machine. This avoids unnecessary workload to the Hyper-V host. After the
VSS snapshot is taken, all the virtual machines inside this VSS snapshot instance are
locked (in the Backing up status). Arcserve UDP cannot release the snapshot until all
backup jobs are finished, even if the backup job of a virtual machine is already
completed.
The VSS snapshot has a limitation. Only one snapshot can be taken for a virtual machine
at a time. If another backup job of the same virtual machine starts at this time, it fails
and provides the error message. This error does not happen in Hyper-V 2008R2 because
Hyper-V 2008R2 has a different VSS snapshot mechanism.
While the virtual machine is locked, you can still use the guest OS. The lock has no
impact on the usage or availability of the guest OS. However, to avoid this situation, you
can perform either of the following tasks:
■ Enable the Hyper-V Snapshot Separation option on the resource tab of the
agent-less host-based backup. Then, Arcserve UDP takes a separate snapshot for
each virtual machine specified in the plan. The virtual machine is released after the
backup is complete.
■ Use different plans to protect virtual machines that have different storage sizes.
Include the virtual machines with similar storage size in one plan. It will ensure that
the backup jobs take a similar amount of time to complete. Also, set different
schedules different plans.
Symptom
When the source node and the proxy server are in different VMware ESX servers, and I
run an Incremental backup, my backup takes a longer time to run. I also receive multiple
rescan messages. I want to disable the rescanning of all host bus adapter (hba) of other
VMware ESX servers during Incremental backups.
Solution
You can disable the scan by creating a registry key in the proxy server and assigning a
value to it.
Note: The virtual standby task runs only if the backup task creates a valid recovery point
snapshot. If the backup task fails, then the virtual standby task is skipped.
What To Do Next?
1. Review the Prerequisites and Considerations (see page 342)
2. Create a Plan with a Backup Task (see page 343)
3. Add a Virtual Standby Task to the Plan (see page 357)
4. (Optional) Run the Virtual Standby Job Manually (see page 369)
5. Pause and Resume the Heartbeat (see page 370)
6. Pause and Resume the Virtual Standby Job (see page 371)
7. Verify the Plan (see page 372)
8. Applying Best Practices (see page 373)
You can create a virtual standby machine from an agent-based Windows backup,
host-based agentless backup. You can also create a virtual standby machine from data
that are replicated using the Replicate task. The following procedure is an example to
create agent-based Windows backup.
Notes:
For more information on host-based agentless backup, see How to Create a
Host-Based Virtual Machine Backup Plan.
For more information on replicating a backup data, see How to Create a Recovery
Point Server Replication Plan.
Virtual standby support the source machine boot from UEFI firmware with below
limitations
Virtualization Type – VMware
The VMware VDDK 6.0.1 is packaged in Arcserve UDP 6.0. With the ability
of VDDK 6.0.1, Arcserve UDP 6.0 could mount a VMDK file whose format is
GPT. As a result, virtual standby supports source machine boot from UEFI
to VMware for Arcserve UDP 6.0.
Virtualization Type - Hyper-V
Due to a Hyper-V limitation which does not support a virtual machine that
uses the Unified Extensible Firmware Interface (UEFI), virtual standby
cannot support the UEFI system. Therefore, when you deploy a virtual
standby task whose standby destination is Hyper-V server to a UEFI
system, deployment fails. This is applicable when the Hyper-V server is
2008, 2008 r2, or 2012.
If the destination Hyper-V server is 2012 r2 and the source node is a UEFI
system, and is one of the following operating systems, it will be supported:
– Windows Server 2012
– Windows Server 2012 R2
– Windows 8 (64-bit)
– Windows 8.1 (64-bit)
If you have created plans earlier, those plans are displayed on the center pane.
3. On the center pane, click Add a Plan.
Add a Plan opens.
4. Enter a plan name.
5. (Optional) Select Pause this plan check box.
The plan will not run until you clear the check box to resume the plan.
Note: If a plan is paused, then any in-progress job is not paused but all
corresponding scheduled jobs associated with that plan are paused. However, you
can manually run a job. For example, backup job and replication job for a node can
be run manually even if the respective plan is paused. If there is a following task to
the on-demand (manual) job, it will not run. For example, there is a replication task
after an on-demand backup job, the replication job will not run for the on-demand
backup job. You need to manually run the replication job. When you resume the
plan, the pending jobs will not resume immediately. After you resume the plan, the
pending jobs will run from the next scheduled time.
6. From the Task Type drop-down list, select Backup, Agent-Based Windows.
The Source page lets you specify the source nodes that you want to protect. You can
select more than one node in a plan. If you have not added any nodes to the Console,
you can add nodes when you create or modify a plan from the Source page. You can
also save a plan without adding any source nodes. The plan gets deployed only after you
add source nodes.
The destination is a location where you store the backup data. You must at least specify
the destination to save the plan.
The Schedule page lets you define a schedule for Backup, Merge, and Throttle functions
to repeat at specific intervals. After you define a schedule, the jobs run automatically
per the schedule. You can add multiple schedules and can provide retention settings.
A Backup Schedule refers to regular schedule that is repeated multiple times a day
based on the number of hours or minutes you select. Besides the regular schedule, a
backup schedule also provides options to add daily, weekly, and monthly schedules.
Note: For more information on scheduling and retention settings, see Understanding
Advanced Scheduling and Retention (see page 273).
4. Specify the recovery points retention settings for Custom, Daily, Weekly, and
Monthly schedule.
These options are enabled if you have added the corresponding backup schedule. If
you modify the retention settings on this page, the changes are reflected on the
Backup Schedule dialog.
5. Specify the catalog details.
Catalogs let you generate the File System catalog. The File System catalog is
required to perform faster and better search. If you select the catalog check boxes,
the catalogs are enabled depending on the type of backup that you have specified.
Clear the check box to disable generating the catalog.
The scheduling option lets you specify a Custom schedule or a Daily / Weekly / Monthly
schedule, or both the schedules. In the Custom schedule, you can configure the backup
schedule for each day of the week and you can add up to four backup schedules each
day. You can select a specific day of a week and create a time window to define when to
run backup and at what frequency.
Supported
Schedule Job Comments
Backup Backup job Define time windows to run backup jobs.
Define time windows to control the backup
Backup throttling Backup job speed.
Merge Merge job Define when to run merge jobs.
Daily schedule Backup job Define when to run daily backup jobs.
Weekly schedule Backup job Define when to run weekly backup jobs.
Monthly schedule Backup job Define when to run monthly backup jobs.
You can also specify the retention settings for the recovery points.
Note: Retention settings must be set within each plan to control how data for the nodes
assigned to that plan are retained at the target data store.
Schedules for Daily / Weekly / Monthly backups are independent to the Custom
schedule, and each other. You can configure only to run Daily backup, Weekly backup or
Monthly backup, without configuring the Custom schedule.
Backup Job Schedule
You can add four time windows per day in your backup schedule. A valid time
window is from 12:00 AM until 11:59 PM. You cannot specify a time window such
as 6:00 PM to 6:00 AM. In such cases, you have to manually specify two different
time windows.
For each time window, the start time is inclusive, and the end time is exclusive. For
example, you have configured to run Incremental Backup every one hour between
6:00 AM and 9:00 AM and the backup will start at 6:00 AM. This means the backup
will run at 6:00 AM, 7:00 AM, 8:00 AM, but NOT 9:00 AM.
Note: If you want to run the backup job repeatedly until the end of day, set the
schedule until 12:00 AM. For example, to run backup job every 15 minutes for the
entire day, set the schedule from 12:00 AM to 12:00 AM, every 15 minutes.
Backup Throttle Schedule
Backup throttle schedule lets you control the backup throughput speed, which in
turn controls the resource usage (disk I/O, CPU, network bandwidth) of the server
being backed up. This is useful if you do not want to affect the server performance
during business hours. You can add four time windows per day in your backup
throttle schedule. For each time window, you can specify a value, in MB per minute.
This value will be used to control the backup throughput. Valid values are from 1
MB/minutes to 99999 MB/minutes.
If a backup job extends its specified time, then the throttle limit will adjust
according to the specified time window. For example, you have defined the backup
throttle limit as 500 MB/minute from 8:00 AM to 8:00 PM, and 2500 MB/minute
from 8:00 PM to 10:00 PM. If a backup job starts at 7:00 PM and it runs for three
hours, then, from 7:00 PM to 8:00 PM the throttle limit will be 500 MB/minute and
from 8:00 PM to 10:00 PM the throttle limit will be 2500 MB/minute.
If you do not define any backup schedule and backup throughput schedule, the
backup will run as fast as it can.
Merge Schedule
Lets you merge recovery points based on the provided schedule.
The Advanced tab lets you specify some advanced settings for the backup job. The
advanced settings include providing truncate log settings, providing the location of any
scripts, and email settings.
The backup plan is created and automatically deployed to the source node. The backup
runs per the schedule that you have configured in the Schedule tab. You can also
perform a manual backup at any time.
Notes:
■ Virtual standby cannot automatically power on recovery point snapshots taken
from host-based virtual machine nodes, nodes replicated from a remote recovery
point server, and the Source of the Virtual Standby task is the one replicated to a
different Site. You have to manually power on recovery point snapshots for such
nodes.
■ If you pause the plan, the Virtual Standby job will not start. When you resume the
plan again, the Virtual Standby job is not resumed automatically. You have to
manually run another backup job to start the Virtual Standby job. Also, if the plan is
paused the Pause/Resume Virtual Standby option will not be available. If you do not
want the virtual machine to start automatically after the plan is paused, then you
have to manually pause the heartbeat for the nodes.
Password
Specify the password for the user name that is required to log in to the
VMware system.
Protocol
Specify HTTP or HTTPS as the protocol that you want to use for communication
between the source Arcserve UDP agent and the monitoring server.
Port
Specify the port that you want to use for data transfer between the source
server and the monitoring server.
ESX Node
The values in this field vary based on the value specified in the ESX
Host/vCenter field:
ESX Server systems
When you specify an ESX Server system in the ESX Host/vCenter field, this
field displays the host name of the ESX Server system.
vCenter Server systems
When you specify a vCenter Server system the ESX Host/vCenter field, this
field lets you specify (from a drop-down list) the ESX Server system that
you want to associate with this plan.
Monitor
Specify the host name of the server that you want to monitor the status of the
source server.
Notes:
■ The monitor server can be any physical computer or virtual machine
provided that the server is not the backup source.
■ The monitor server does not need to be configured if the nodes are
replicated from a remote recovery point server or the Source of the Virtual
Standby task is the one replicated to a different Site.
User Name
Specify the user name that is required to log in to the monitoring system.
Password
Specify the password for the user name that is required to log in to the
monitoring system.
Protocol
Specify HTTP or HTTPS as the protocol that you want to use for communication
between the Arcserve UDP and the ESX Server system (monitoring server).
Port
Specify the port that you want to use for data transfer between the Arcserve
UDP and the ESX Server system (monitoring server).
Use monitor server as proxy for data transfer
Specify this option to let the monitor server copy the conversion data from the
Arcserve UDP agent node to the ESX Server data store. With this option
enabled, the virtual standby feature transfers the conversion data from the
agent node to the ESX Server data store using the fibre channel
communication, which is faster than using the LAN communication to transfer
data. Only the write operation for the conversion happens over the fibre
channel. The read operation happens over the LAN.
Note: The Use monitor server as proxy for data transfer option is enabled by
default. You can disable this option to allow the Arcserve UDP agent node to
copy the conversion data directly to the data store on the ESX Server system.
Virtualization Type - Hyper-V
HyperV Host Name
Specify the host name of the Hyper-V system.
User Name
Specify the user name that is required to log in to the Hyper-V system.
Note: The account that you specify must be an administrative account or an
account with administrative privileges on the Hyper-V system.
Password
Specify the password for the User Name that is required to log in to the
Hyper-V system.
Protocol
Specify HTTP or HTTPS as the protocol that you want to use for communication
between the Arcserve UDP server and the Hyper-V Server system (monitoring
server).
Port
Specify the port that you want to use for data transfer between the Arcserve
UDP server and the Hyper-V Server system (monitoring server).
5. Click the Virtual Machine tab and enter the details for the VM Basic Settings, VM
DataStore for VMware, VM path for Hyper-V, and VM Network.
VMware Systems:
Apply the following Virtual Machine options to VMware systems:
VM Name Prefix
Specify the prefix that you want to add to the display name for the virtual
machine on the ESX Server system.
Default value: UDPVM_
Resource Pool
Specify the name of resource pool where standby virtual machine is to be
grouped.
CPU Count
Specify the minimum and maximum CPU count supported by the standby
virtual machine.
Memory
Specify the total amount of RAM in MB to be allocated for the standby virtual
machine.
Note: The amount of RAM specified must be a multiple of two.
Recovery Point Snapshots
Specify the number of recovery point snapshots (recovery points) for the
standby virtual machine. The maximum number of recovery point snapshots
count is 29 for VMware virtualization servers.
All virtual disks share the same datastore
Select this option to copy all of the disks related to the virtual machine to one
data store.
Clear the check box to copy the disk-related information for the virtual machine
to the corresponding data store. Specify the location where you want to store
the conversion data.
Network
Lets you define the NICs, virtual networks, and paths that the ESX Server
system uses to communicate with the virtual machines.
Note: The VMware SR-IOV passthrough and Flexible network adapter is not
supported.
VM Network
Lets you define the NICs, virtual networks, and paths that the Hyper-V server
uses to communicate with the virtual machines. Specify one of the following
options and complete the required fields.
Same number of network adapters as source at last backup
Select this option to define how to map the virtual NIC to the virtual network.
Specify this option when the virtual machine contains virtual NICs and a virtual
network.
Clear the check box to define the name of the virtual network that you want
the NIC to use to communicate.
6. Click the Advanced tab and provide the following details:
Automatically start the Virtual Machine
Specify if you want to start the virtual machine automatically.
Note: This option is unavailable for host-based virtual machine nodes and
nodes replicated from a remote recovery point server and the Source of the
Virtual Standby task is the one replicated to a different Site.
Timeout
Specify the time that the monitor server must wait for a heartbeat before it
powers on a recovery point snapshot.
Frequency
Specify the frequency that the source server communicates heartbeats to the
monitor server.
Example: The Timeout value specified is 60. The Frequency value specified is 10.
The source server will communicate heartbeats in 10-second intervals. If the
monitoring server does not detect a heartbeat within 60 seconds of the last
heartbeat that was detected, the monitor server powers on a virtual machine using
the latest recovery point snapshot.
Enable Email Alerts
Lets you receive email alerts depending on the settings that you provide. When
you select this option, further categories of email alerts are enabled for your
selection.
■ Missing heartbeat for source machine--Virtual standby sends alert
notifications when the monitor server does not detect a heartbeat from the
source server.
Note: For nodes from Replicate from a remote Recovery Point Server or if the
source of the Virtual Standby task is the one that is replicated to a different
site, this option is not available.
■ VM powered on for source machine configured with auto power ON--Virtual
Standby sends alert notifications when it powers on a virtual machine that was
configured to power on automatically when a heartbeat is not detected.
Note: For nodes from Replicate from a remote Recovery Point Server or if the
source of the Virtual Standby task is the one that is replicated to a different
site, this option is not available. This option is unavailable for host-based virtual
machine nodes also.
You have successfully created and deployed the virtual standby plan.
While powering on virtual machines, virtual standby determines the quantity of NICs
(network interface cards) to power on based on whether the standby virtual machine
network is configured. The following table illustrates how virtual standby determines
the quantity of NICs that are required to power on standby virtual machines:
Values Defined in the Plan The Power on the standby The Power on the standby
for VM Network virtual machine with virtual machine with
customized network customized network
configurations option is configurations option is
not specified specified
The values defined are the Virtual standby powers on Virtual standby powers on
same as the source the quantity on NICs the quantity NICs based on
machine. defined for the source the larger of the following
machine as of the last values:
backup job.
■ The quantity defined
under custom network
configuration.
■ The quantity of NICs
defined for the source
machine as of the last
backup job.
The values defined are Virtual standby powers on Virtual standby powers on
custom values. the quantity of custom the quantity NICs based on
networks that are defined the larger of the following
in the plan. values:
■ The quantity defined
under custom network
configuration.
■ The quantity of NICs
defined for the custom
policy.
The following dialog (Edit Virtual Standby task of Modify a Plan) in the Virtual Standby
task consist of custom configurations for NICs to power on:
The following dialog (Standby VM - <host_name>) illustrates the location where you
specify the Power on the standby virtual machine with customized network
configurations option:
You can power on the Standby VM with customized network settings. You can configure
the following network settings on the standby VM:
■ Specify the virtual network and NIC (Network Interface Card), and TCP/IP settings
for each network adapter from the Network Adapter Settings tab.
■ Update the DNS servers to redirect clients from the source computer to the virtual
standby virtual machines based on the TCP/IP settings from the DNS Update
Settings tab.
The following diagram displays the Network Adapter Settings tab of Standby VM
Network Configuration:
When you submit the backup job, the password for the backup is stored on the Arcserve
UDP Agent (Windows) node that you are protecting. The Arcserve UDP solution then
replicates the recovery points to a remote recovery point server. The converter on the
remote server then converts the replicated data to virtual machine data and stores the
data on the remote destination. However, the converter cannot convert the replicated
recovery points because the backup passwords reside on the Arcserve UDP Agent
(Windows) node.
To ensure that the converter can convert the replicated recovery points, virtual standby
lets you specify backup passwords for the data that the converter can use to convert the
data.
4. Perform the following tasks in the Set Backup Passwords dialog for one or more
nodes:
– Add--Click Add to add one or more backup passwords to the selected nodes.
– Delete--Click Delete to delete one or more backup passwords from the
selected nodes.
Note: For multiple nodes, you can override the current backup passwords for
multiple nodes by selecting the Override the current backup passwords for the
selected nodes check box.
5. Click Save.
The dialog closes and the backup passwords are set for the selected remote nodes.
3. Select the nodes that you want to backup and that has a plan assigned to it.
4. On the center pane, click Actions, Backup Now.
The Run a backup now dialog opens.
5. Select the backup type and provide a name for the backup job.
6. Click OK.
The backup job runs.
The virtual standby job runs immediately after the backup job is over.
When you pause virtual standby jobs (conversion jobs), the pause operation does not
pause the conversion job that is currently in progress. The pause operation applies to
only the job that is expected to run at the end of the next backup job. As a result, the
next conversion job does not start until you explicitly resume the (paused) conversion
job.
If you resume virtual standby for nodes and if there are multiple backup sessions
without recovery point snapshot, you will get a dialog to select the smart copy option. If
you click Yes, virtual standby will convert the combined session into a single recovery
point snapshot. If you click No, virtual standby will convert each session individually
Antivirus software can interfere with the smooth running of virtual standby process by
either temporarily blocking access to files or by quarantining or deleting files that are
incorrectly classified as suspicious or dangerous. You can configure most antivirus
software to exclude particular processes, files, or folders so that you can skip scanning
certain data. It is important to configure your antivirus software properly so that it does
not interfere with backup and restore operations, or any other types of processes.
In a Hyper-V server, the antivirus software corrupts the VM configuration file. The
Hyper-V server changes the VM state to 'save' mode and the VM becomes corrupted
and useless. In such cases, you have to delete the VM and and perform a full conversion
to create a new VM.
To avoid the VM from entering the save mode, exclude the following processes, folders,
and files from the antivirus scanning:
■ Process list
– C:\Program Files\Arcserve\Unified Data
Protection\Engine\TOMCAT\bin\tomcat7.exe
– C:\Program Files\Arcserve\Unified Data Protection\Engine\TOMCAT\JRE\bin
■ java.exe
■ java-rmi.exe
■ javaw.exe
■ keytool.exe
■ rmid.exe
■ rmiregistry.exe
To ensure that the local and remote virtual standby works properly and to avoid the VM
from entering the save mode, exclude the following files that targets Hyper-V virtual
machines and Hyper-V processes:
■ Virtual machine configuration files directory:
– (Default) C:\ProgramData\Microsoft\Windows\Hyper-V
– Arcserve UDP Virtual Standby virtual machine configuration files directory
■ Virtual machine virtual hard disk files directory:
– (Default) C:\Users\Public\Documents\Hyper-V\Virtual Hard Disks
– Arcserve UDP Virtual Standby virtual machine virtual hard disk files directory
The following diagram illustrates the process to view the virtual standby settings from
the monitor server:
What To Do Next?
■ Review the Prerequisites and Considerations (see page 376)
■ Log in to Monitor Servers (see page 376)
■ Understanding the Virtual Standby Summary Screen (see page 377)
■ View Activity Log (see page 380)
■ View Virtual Standby Settings (see page 380)
■ View the Email Settings (see page 384)
Note: If a new browser window does not open, verify that the pop-up options for
your browser allow all pop-ups or pop-ups only for this website.
6. Click the Virtual Standby tab.
The Virtual Standby page opens.
The Servers list on the Virtual Standby Summary screen displays a list of source servers
that a monitoring server is protecting. The list sort servers by their current status. For
example, All, Action Required, Source Running are some of the status.
The Virtual Standby Summary screen displays information about the virtual machines
that are protecting source servers.
Virtual standby lets you monitor the status of in-progress virtual conversion jobs. In
addition, virtual standby lets you view the summary about the virtual conversion data
and the virtual machines that are protecting your Arcserve UDP Agent (Windows) source
servers.
The Virtual Standby screen displays a list of the most recent recovery point snapshots.
The list box displays the date and time the backup of the Arcserve UDP Agent (Windows)
source nodes when completed.
From the list of recovery point snapshots list, you can power on virtual machines. For
more information, see Power On Virtual Standby Machines from Recovery Point
Snapshots (see page 387).
Note: If the Virtual Standby destination is a VMware ESX server, the maximum number
of recovery point snapshots that are displayed is 29. If the Virtual Standby destination is
a Microsoft Hyper-V server, the maximum number of recovery point snapshots that are
displayed is 24.
Note: The Activity Log (activity.log) is stored in the following directory on the node
where Arcserve UDP Agent (Windows) is installed:
■ Port--Identifies the port used for data transfer between the arcserve
Central Virtual Standby server and the ESX Server system (monitoring
server).
■ Use monitor server as proxy for data transfer--Identifies that the monitor
server copies the conversion data from the arcserve UDP Agent source
server to the ESX Server data store.
Note: The Use monitor server as proxy for data transfer option is enabled
by default. You can disable this option to allow the arcserve UDP Agent
source server to copy the conversion data directly to the ESX Server data
store.
■ Hyper-V Systems:
The following options apply to Hyper-V systems:
■ Virtualization type--Hyper-V.
■ Hyper-V Host Name--Identifies the host name of the Hyper-V system.
■ User Name--Identifies the user name that is required to log in to the
Hyper-V system.
■ Password--Identifies that a password for User Name is required to log in to
the Hyper-V system.
■ Port--Identifies the port used for data transfer between the source server
and the monitoring server.
Virtual Machine Options
VMware Systems:
■ VM Name Prefix--Identifies the prefix added to the display name for the
virtual machine on the ESX Server system.
Default: UDPVM_
■ VM Resource Pool--Identifies the name of resource pool where the
standby virtual machine is grouped.
■ Datastore--Identifies the location where you want to store the conversion
data.
■ Specify one datastore for all virtual disks--Indicates that the application
copies all of the disks related to the virtual machine to one data store.
■ Specify a datastore for each virtual disk--Indicates that the application
copies disk-related information for the virtual machine to the
corresponding data store.
■ Networks--Identifies the NICs, virtual networks, and paths that the ESX
Server system uses to communicate with the virtual machines.
Same number of network adapters as source at last backup--Identifies the
virtual NICs that are mapped to the virtual network. This option is specified
when the virtual machine contains virtual NICs and a virtual network.
Custom--Identifies the name of the virtual network that you want the NIC
to use to communicate.
■ CPU Count--Identifies the minimum and maximum CPU count supported
by the standby virtual machine.
■ Memory--Identifies the total amount of RAM in MB allocated for the
standby virtual machine.
■ Recovery Point Snapshot--Specify the number of recovery points for the
standby virtual machine. The maximum number of recovery points is 24 for
Hyper-V virtualization servers
Hyper-V Systems:
■ VM Name Prefix--Identifies the prefix added to the display name for the
virtual machine on the Hyper-V system.
Default: UDPVM_
■ Path--Identifies the location on the Hyper-V Server where the conversion
data is stored.
■ Networks--Identifies the NICs, virtual networks, and paths that the
Hyper-V server uses to communicate with the virtual machines.
■ CPU Count--Identifies the minimum and maximum CPU count supported
by the standby virtual machine.
■ Memory--Identifies the total amount of RAM in MB allocated to the
standby virtual machine.
■ Recovery Point Snapshot--Specify the number of recovery points for the
standby virtual machine. The maximum number of recovery points is 24 for
Hyper-V virtualization servers.
Stand-in Settings
Recovery:
■ Manually start the Virtual Machine--Indicates that the virtual machines
are powered on and provisioned manually when the source server fails or
stops communicating.
The following diagram illustrates the process to protect virtual standby machines:
What To Do Next?
■ Review the Prerequisites and Considerations (see page 386)
■ Power On Virtual Standby Machines (see page 387)
■ Protect Virtual Standby Machines After Power On (see page 391)
■ Verify the Virtual Standby Machine Is Protected (see page 392)
Virtual standby can be configured to power on virtual standby machines from recovery
point snapshots automatically when the monitoring server does not detect a heartbeat
from the source server. Optionally, you can power on virtual standby machines from
recovery point snapshots manually in the event a source server fails, an emergency
occurs, or you want to offline a source node for maintenance.
Note: The following steps describe how to power on virtual standby machines from
recovery point snapshots manually. For information about how to allow Virtual Standby
to power on Recovery Point Snapshots automatically, see Add a Virtual Standby Task to
the Plan.
Note: After the virtual machine is powered on, you can be prompted to restart the
computer one or more times. This behavior occurs because VMware installs VMware
Tools on the virtual machine or Windows Hyper-V installs Integration Services on the
virtual machine.
After you power on virtual standby machines from recovery point snapshots, you may
need to complete the following tasks:
■ Activate the Windows operating system that is running on the virtual machine.
■ Start Arcserve UDP Agent (Windows) on the virtual machine.
■ Update Arcserve UDP with the host name, IP address, and the login credentials for
the virtual machine.
■ Assign the node to a plan.
Note: This task is required only when you want to create recovery point snapshots for
the virtual machine that was powered on.
When you want to power-on Virtual Standby virtual machines manually, the best
practice is to power on the virtual machines from the Standby VM dialog of Arcserve
UDP server. For more information, see Power on Virtual Standby Virtual Machines from
Recovery Point Snapshots (see page 387). However, if you want to start the Virtual
Standby virtual machines from the Hyper-V server, you can do so using Hyper-V
Manager.
Note: The Hyper-V Manager lets you access the recovery point snapshots that virtual
standby created to protect the node. You should not delete the snapshots. When you
delete the snapshots, the relationship between the data contained in the snapshots
becomes inconsistent the next time a Virtual Standby job runs. With inconsistent data,
you cannot power on Virtual Standby virtual machines properly.
c. Click Apply.
d. In the Virtual Machines list, right-click the virtual machine that you want to
power on and click Start on the pop-up menu.
The virtual standby machine is powered on.
If necessary, you can back up the virtual machines and create recovery point snapshots
after you power on the virtual machine.
When you want to power-on virtual standby machines manually, the best practice is to
power on the virtual machines from the Standby VM dialog of Arcserve UDP. For more
information, see Power on Virtual Standby Virtual Machines from Recovery Point
Snapshots (see page 387). However, if you want to start the virtual standby machines
from the ESX Server or the vCenter Server system, you can do so using VMware vSphere
Client.
Note: The VMware vSphere Client lets you access the recovery point snapshots that
virtual standby created to protect the node. You should not delete the snapshots. When
you delete the snapshots, the relationship between the data contained in the snapshots
becomes inconsistent the next time a virtual standby runs. With inconsistent data, you
cannot power on virtual standby machines properly.
To power on the virtual machine using the latest snapshot: Click the Getting Started tab
and then click Power on the virtual machine located on the bottom the screen.
If necessary, you can back up the virtual machines and create recovery point snapshots
after you power on the virtual machine.
Note: Arcserve UDP lets you automatically resynchronize the plans to the managed
Arcserve UDP Agent (Windows) nodes on a weekly basis. This mechanism lets Arcserve
UDP restart the backup jobs on the virtual standby machines by redeploying the plan
that was in effect on the Arcserve UDP Agent (Windows) node to the virtual standby
machine. The plan deployment process behaves in this manner because the source
node and the virtual standby machine have the same host name, which lets Arcserve
UDP resynchronize the plan. The only limitation to this behavior is Arcserve UDP and the
virtual standby machine must be able to communicate with each other through the
network. After Arcserve UDP resynchronizes and deploys the plan to the virtual standby
machine, you then resume the Virtual Standby job on the virtual standby machine. For
more information, see Pause and Resume Virtual Standby Jobs (see page 371).
If the replication job fails for some reasons (such as network problem), then the failed
replication job resumes first before transferring any new session. The replication job
resumes from the break point of the last failed replication job.
What To Do Next?
1. Review the Prerequisites and Considerations (see page 393)
2. Create a Plan with a Backup Task (see page 393)
3. Add a Replicate Task to the Plan (see page 394)
4. (Optional) Perform a Manual Replication (see page 396)
5. Verify the Plan (see page 397)
How to back up Linux nodes, see How to Create a Linux Backup Plan (see page 281).
Notes:
■ For merge job: When a replication task is configured and you run an
on-demand merge job from the source data store, the job does not check
whether the sessions are replicated or not. As a result, the merged sessions
cannot be replicated to target data store and you end up replicating more data.
For example, consider there are five sessions, s1, s2, s3, s4, and s5 respectively.
s1 and s2 are replicated. Now, you run an on-demand merge job on the source
side and retain two session. s4 and s5 are retained. s4 is a full session. So, when
the next replication job starts, the job needs to replicate a full session.
■ For purge job: When a replication task is configured and if you run purge job on
the target data store, then the next replication job replicates all sessions to
target data store.
3. Click the Destination tab and enter the recovery point server details and retry
schedule details.
4. Click the Schedule tab and add Replication Job Schedule, Replication Throttle
Schedule, Merge Schedule, and Retention Settings.
Note: The replication throttle quota is averagely shared by all the replication jobs
started from all the nodes of a current plan.
3. Select the nodes that you want to backup and that has a plan assigned to it.
4. On the center pane, click Actions, Replicate Now.
The Replicate node dialog opens.
5. Select the Source RPS and Target RPS for the job.
6. Click OK.
The replication job runs.
As the administrator of the source Console, create a plan to replicate data to the
destination data store. While you create the plan, connect to the destination server and
select the plan that is assigned to you by the destination administrator.
The following diagram illustrates how to replicate data to another data store that is
managed from a different Console:
What To Do Next?
1. Review the Prerequisites (see page 400)
2. Create a User Account for the Source Console (see page 400)
3. Create a Plan to define the Destination Data Store (see page 401)
4. Map the Plan to the User Account (see page 146)
5. Send the Plan and User Account Details to the Source Administrator (see page 405)
6. Receive the Plan and User Account Details from the Destination Administrator (see
page 405)
7. Create a Replication Plan to Send Data to the destination Console (see page 405)
8. Verify the Data is Replicated (see page 410)
Administrator—Destination Console
■ Verify that you have installed Arcserve UDP on the destination server.
■ Verify that you have full privileges to create Windows user accounts on the
destination server.
To identify and manage the replicated data on the destination server, create a Windows
user account. If you are managing more than one source Console, then create a user
account for each source Console.
The source Console administrator uses this account details to connect to the destination
server.
To create a user account in a Windows operating system, use the User Accounts section
in Windows Control Panel. For more information about creating user accounts in
Microsoft Windows, see Microsoft documentation.
The source data is replicated to this destination data store. To define this destination
data store, you create a plan. The plan lets you define the destination data store and the
merge schedule.
6. Click the Destination tab and specify the recovery point server and the data store.
7. (Optional) Select the Server is behind NAT router checkbox and provide the server
address and port number.
8. Click the Schedule tab.
13. Click the Advanced tab and provide the following details.
Enable Email Alerts
Lets you enable email alerts. You can configure email settings and can specify
the types of alerts that you want to receive in an email. When you select this
option, the following options are enabled for your selection.
Email Settings
Lets you configure the email settings. Click Email Settings and configure
the email server and proxy server details.
Job Alerts
Lets you select the types of job alerts that you want to receive.
14. Click Save.
The changes are saved and the plan is created.
The replication plan is successfully created. You can also add Replicate tasks and Virtual
Standby tasks to the plan.
You have already created a user account and a plan for a source Console. To identify and
manage replicated data, assign the plan to the user account.
Note: You can assign more than one plan to a user account but two different accounts
cannot share a plan. However, we recommend assigning a single plan to a user account
so that you can easily identify and manage the replicated data.
The user account is mapped to the plan created for the source Console.
You can use Edit to modify the user configuration or Delete to remove the user account
from the list.
Send the Plan and User Account Details to the Source Administrator
Destination Administrator
After the plan is associated with the user account, send the plan and user account
details to the source administrator. The source administrator uses these details to
connect to the destination Console.
Receive the Plan and User Account Details from the Destination Administrator
Source Administrator
To replicate data to the source Console, you need the destination server, plan, and user
account details from the destination administrator. You receive the details from the
destination administrator. Understand the details and get your questions clarified from
the destination administrator before you start creating replication plans.
To replicate your backup data to the destination recovery point server that is managed
from a different console, create a replication plan. This replication plan includes a
backup task and a remotely managed replication task. In the replication task, specify the
remote server and plan details and connect to the remote server. If the connection is
successful, you can select the plan that the destination administrator created for you.
4. Enter a plan name and select one of the following backup tasks and create the task:
■ Backup: Agent-Based Windows
■ Backup: Host-Based Agentless
■ Backup: Agent-Based Linux
Note: For more information about creating a backup task, see the following topics:
■ How to Create a Windows Backup Plan (see page 260)
■ How to Create a Host-Based Virtual Machine Backup Plan (see page 302)
■ How to Create Linux Backup Plan (see page 281)
5. On the left pane, click Add a Task.
A new task is added to the left pane.
6. From the Task Type drop-down list, select Replicate to a remotely-managed RPS.
The Replicate task is added and the Source page opens. For the Source tab, the
destination of the backup task (for example, Backup: Agent-Based Windows) is the
source for the Replicate to a remotely-managed RPS task.
Remote Console
Specify the IP address of the destination Console. The destination administrator
provides you the destination Console address.
Username
Specify the username created by the destination administrator. The destination
administrator provides you the username.
Password
Specify the password created by the destination administrator. The destination
administrator provides you the password.
Port
Specify the port number of the destination Console. The destination
administrator provides you the port number of the destination Console.
Protocol
Specify the protocol used by the destination administrator to connect to the
destination Console.
Enable Proxy
Select the checkbox to enable the proxy server selection.
Proxy Server
Specify the address of the proxy server.
Port
Specify the port number of the proxy server.
Proxy server requires authentication
Select the checkbox to enable the authentication fields for the proxy server.
Username
Specify the username to connect to the proxy server.
Password
Specify the password to authenticate the proxy server connection.
Connect
Verifies the connection between the source Console and the destination
Console. If the connection is successful, then you can see the plan name in the
Plan field. This plan name is assigned to this Console by the destination
administrator.
Plan
Specify the plan that the destination administrator has created for you. If there
are multiple plans in the list, then contact the destination administrator to
know the correct plan.
Start retry
Reruns the replication job after the specified time if there is a failure. Enter a
value from 1 to 60 and the time is defined in minutes.
Retry
Specify the number of retries that you want to perform if there is a job failure.
After the number of retries is over, the replication job will run only at the next
scheduled time. Enter a value from 1 to 99.
8. Click the Schedule tab and provide the replication job schedule and replication
throttle schedule.
Replication Job Schedule
Specify the date and time to start the replication jobs. You can edit or delete a
replication job schedule.
Replication Throttle Schedule
Specify the maximum speed (Mbps) at which the replication is done. You can
throttle the replication speed to reduce the CPU or network usage. For a
replication job, the jobs tab displays the average Read and Write speed of the
job in progress and the configured throttle speed limit.
You can edit or delete a replication throttle schedule.
9. Click Save.
The plan is saved and runs per the schedule.
You have successfully created and automatically deployed a replication plan. When the
plan runs, the data gets replicated from the source location to the destination data
location over a network.
Note: After the replication process is complete, the replicated node details are
automatically added to the destination Console.
You have successfully replicated data between two data stores managed from different
UDP Consoles.
After data is replicated, you can verify whether the replication is successful.
You have successfully replicated data between two data stores managed from different
UDP Consoles.
Replication over WAN related settings are saved at the following registry key:
The following list displays the Registry key and their default value:
■ "WAN_EnableAutoTunning"=dword:00000001
■ "WAN_ChunkSizeByte"=dword:00001000
■ "WAN_NumberofStreams"=dword:00000005
■ "WAN_MultiStreamsMaxCacheSize"=dword:01000000
■ "WAN_SendCommandFragDataMerged"=dword:00000001
■ "WAN_RTT_Threshold"=dword:00000032
WAN_NumberofStreams
Specifies the number of streams that needs to be created on WAN, when the
latency is more than the WAN_RTT_Threshhold number. The default stream
number is 5. The stream range is from 1 to 10.
WAN_RTT_Threshold
When RTT is greater than WAN_RTT_Threshold, multiple sockets are created. The
unit of WAN_RTT_Threshold is millisecond (ms). The default value is 50 millisecond.
The range is limited from 20 ms to 600 ms.
WAN_MultiStreamsMaxCacheSize
Specifies that the memory size will be allocated when the multi-stream is enabled.
This memory buffer will be used to cached received fragged memory. The range is
from 16MB to 64MB. Default value is 16MB. If the value is zero, the value will be set
to 64MB. The unit of this value is BYTE.
WAN_SendCommandFragDataMerged
Specifies that if the value is not zero, the communication library groups small files
and send them in one chunk. If the value is zero, then small files are sent
individually. The default value is one.
Notes:
■ In a replication job, the socket connection number may not be consistent with the
WAN_NumberofStreams registry.
Replication job from non-GDD to non-GDD
When RTT is more than WAN_RTT_Threshold, the socket connection number is
equal to WAN_NumberofStreams.
Replication job from non-GDD to GDD or GDD to GDD
There are four types of connections. Only the data block connection works with
the multi-stream feature. So, when RTT is more than WAN_RTT_Threshold, the
total socket connection is 3+WAN_NumberofStreams.
■ Replication job detects the network status to determine whether the
communication is on WAN or not. If the network status is weak, LAN may be
accepted as WAN.
RPS Jumpstart is an offline replication method that uses an external storage device such
as a USB flash drive to replicate a data store. This replication is between two data stores
that are managed from different UDP Consoles. For example, consider a service provider
that offers its replication services to multiple customers. The customer replicates the
data to a storage device and sends the storage device to the service provider. The
service provider replicates data from the storage device to the destination server. Both
the service provider and the customer must have Arcserve UDP that is installed at their
locations.
The offline replication requires both the administrators (the Source and Destination
administrators) to complete the following steps at their respective location.
Important! If you are replicating from a shared folder to a data store selected on
Recovery Point Server, see How to Migrate Arcserve r16.5 Recovery Points to Arcserve
UDP (see page 150).
Source Administrator
1. Replicate the source data store to an external device.
2. Send the external device to the destination location.
Destination Administrator
1. Receive the external device.
2. Replicate the source data store from the external device to the destination recovery
point server.
The following diagram illustrates how to perform an offline data replication using RPS
Jumpstart.
What To Do Next?
■ Review the Prerequisites (see page 414)
■ Create a Temporary Data Store on an External Device (see page 415)
■ Replicate Source Data to the Temporary Data Store (see page 416)
■ Delete the Temporary Data Store from the Source Console (see page 417)
■ Send the External Device to the Destination Location (see page 417)
■ Receive the External Device (see page 417)
■ Import the Temporary Data from the External Device (see page 418)
■ Create a Destination Data Store (see page 418)
■ Replicate Data from the Temporary Data Store to the Destination Data Store (see
page 419)
■ Verify that the Data is Replicated (see page 419)
■ (Optional) Set the Concurrent Node Count for RPS Jumpstart (see page 420)
Administrator—Source Console
■ Verify that you have created the source data store.
■ Verify that you have at least completed one backup on a data store.
■ (Optional) Verify that you have configured the concurrent node count for RPS
Jumpstart. For more information about configuring the concurrent node count, see
Set the Concurrent Node Count for RPS Jumpstart (see page 420).
Administrator—Destination Console
■ Verify that there is enough available space for replication.
■ Verify that you have the required privileges on the external device.
To import data from an existing data store to an external device, you first create a
temporary data store on the external device. To create the temporary data store,
connect the external device to the computer.
After creating the temporary data store on the external device, you can replicate the
source data to the external device using RPS Jumpstart.
Note: Before you begin the RPS Jumpstart process, pause the related plan. Pausing the
plan ensures that any scheduled replication job does not start when the Jumpstart
process is in progress.
To maintain data integrity on the external device, delete the temporary data store from
the UDP Console before removing the external device.
Note: Deleting the temporary data store from the source UDP Console does not delete
the data store files from the external device.
After you remove the external device, send the device to the destination location.
Receive the external device that includes source data. Now, connect this external device
to the destination server.
Before you can replicate the source data to the destination data store, import the
temporary data store to the destination recovery point server.
To replicate data from the temporary data store, first create a destination data store.
Note: You can also use an existing data store as a destination data store.
Replicate Data from the Temporary Data Store to the Destination Data Store
After you create the destination data store, replicate data from the temporary data
store to the destination data store. After data is replicated to the destination data store,
you can delete the temporary data store.
After data is replicated, you can verify whether the replication is successful.
When you start an RPS jumpstart job, the concurrent node value for data store is not set
initially. To specify the concurrent node count, create a key and manually add a DWORD
to set the count.
3. Create a key in the Engine directory and name the key as RPS Jumpstart.
4. Add the following DWORD in the RPS Jumpstart key:
JumpStartConCurrencyCount
You can add only one Copy Recovery Points task in a plan.
What To Do Next?
■ Review the Prerequisites and Considerations (see page 421)
■ Create a Plan with a Backup Task (see page 421)
■ Add a Copy Recovery Points Task to the Plan (see page 435)
■ Verify the Plan (see page 437)
The backup task performs a backup of the source nodes and stores the data to the
specified destination. Copy Recovery Points is supported for both Agent-based Windows
and Host-based agentless backup. The following procedure explains the steps to create
the agent-based Windows backup task. You cannot perform copy recovery point for a
non-Windows VM.
Note: For more information on host-based agentless backup, see How to Create a
Host-Based Virtual Machine Backup Plan.
The Source page lets you specify the source nodes that you want to protect. You can
select more than one node in a plan. If you have not added any nodes to the Console,
you can add nodes when you create or modify a plan from the Source page. You can
also save a plan without adding any source nodes. The plan gets deployed only after you
add source nodes.
The destination is a location where you store the backup data. You must at least specify
the destination to save the plan.
The Schedule page lets you define a schedule for Backup, Merge, and Throttle functions
to repeat at specific intervals. After you define a schedule, the jobs run automatically
per the schedule. You can add multiple schedules and can provide retention settings.
A Backup Schedule refers to regular schedule that is repeated multiple times a day
based on the number of hours or minutes you select. Besides the regular schedule, a
backup schedule also provides options to add daily, weekly, and monthly schedules.
Note: For more information on scheduling and retention settings, see Understanding
Advanced Scheduling and Retention (see page 273).
4. Specify the recovery points retention settings for Custom, Daily, Weekly, and
Monthly schedule.
These options are enabled if you have added the corresponding backup schedule. If
you modify the retention settings on this page, the changes are reflected on the
Backup Schedule dialog.
5. Specify the catalog details.
Catalogs let you generate the File System catalog. The File System catalog is
required to perform faster and better search. If you select the catalog check boxes,
the catalogs are enabled depending on the type of backup that you have specified.
Clear the check box to disable generating the catalog.
The scheduling option lets you specify a Custom schedule or a Daily / Weekly / Monthly
schedule, or both the schedules. In the Custom schedule, you can configure the backup
schedule for each day of the week and you can add up to four backup schedules each
day. You can select a specific day of a week and create a time window to define when to
run backup and at what frequency.
Supported
Schedule Job Comments
Backup Backup job Define time windows to run backup jobs.
Define time windows to control the backup
Backup throttling Backup job speed.
Merge Merge job Define when to run merge jobs.
Daily schedule Backup job Define when to run daily backup jobs.
Weekly schedule Backup job Define when to run weekly backup jobs.
Monthly schedule Backup job Define when to run monthly backup jobs.
You can also specify the retention settings for the recovery points.
Note: Retention settings must be set within each plan to control how data for the nodes
assigned to that plan are retained at the target data store.
Schedules for Daily / Weekly / Monthly backups are independent to the Custom
schedule, and each other. You can configure only to run Daily backup, Weekly backup or
Monthly backup, without configuring the Custom schedule.
Backup Job Schedule
You can add four time windows per day in your backup schedule. A valid time
window is from 12:00 AM until 11:59 PM. You cannot specify a time window such
as 6:00 PM to 6:00 AM. In such cases, you have to manually specify two different
time windows.
For each time window, the start time is inclusive, and the end time is exclusive. For
example, you have configured to run Incremental Backup every one hour between
6:00 AM and 9:00 AM and the backup will start at 6:00 AM. This means the backup
will run at 6:00 AM, 7:00 AM, 8:00 AM, but NOT 9:00 AM.
Note: If you want to run the backup job repeatedly until the end of day, set the
schedule until 12:00 AM. For example, to run backup job every 15 minutes for the
entire day, set the schedule from 12:00 AM to 12:00 AM, every 15 minutes.
Backup Throttle Schedule
Backup throttle schedule lets you control the backup throughput speed, which in
turn controls the resource usage (disk I/O, CPU, network bandwidth) of the server
being backed up. This is useful if you do not want to affect the server performance
during business hours. You can add four time windows per day in your backup
throttle schedule. For each time window, you can specify a value, in MB per minute.
This value will be used to control the backup throughput. Valid values are from 1
MB/minutes to 99999 MB/minutes.
If a backup job extends its specified time, then the throttle limit will adjust
according to the specified time window. For example, you have defined the backup
throttle limit as 500 MB/minute from 8:00 AM to 8:00 PM, and 2500 MB/minute
from 8:00 PM to 10:00 PM. If a backup job starts at 7:00 PM and it runs for three
hours, then, from 7:00 PM to 8:00 PM the throttle limit will be 500 MB/minute and
from 8:00 PM to 10:00 PM the throttle limit will be 2500 MB/minute.
If you do not define any backup schedule and backup throughput schedule, the
backup will run as fast as it can.
Merge Schedule
Lets you merge recovery points based on the provided schedule.
The Advanced tab lets you specify some advanced settings for the backup job. The
advanced settings include providing truncate log settings, providing the location of any
scripts, and email settings.
The backup plan is created and automatically deployed to the source node. The backup
runs per the schedule that you have configured in the Schedule tab. You can also
perform a manual backup at any time.
Note: If a backup job is in progress and you pause the plan, the backup job will get over
and the copy recovery points job will not start. When you resume the plan again, the
copy recovery points job is not resumed automatically. You have to manually run
another backup job to start the copy recovery points job.
Destination
Specifies the destination where you want to keep the copy recovery points.
This destination can only be a shared folder. It cannot be a recovery point
server.
Specify the number of Copy Recovery Points to keep
Specifies the number of recovery points copy that you want to retain. When
the number exceeds, the oldest recovery point is merged until the specified
number of recovery points copy is remained.
Default: 1
Maximum: 1440
Compression
Specifies to select a compression level for the recovery point copies.
Compression is typically performed to decrease your disk space usage, but also
has an inverse impact on your backup speed due to the increased CPU usage.
The available options are:
No Compression - Compression is not performed. Files are pure VHD. This
option has the lowest CPU usage (fastest speed), but also has the highest disk
space usage for your backup image.
No Compression - VHD - Compression is not performed. Files are converted to
.vhd format directly, without the need for manual operations. This option has
the lowest CPU usage (fastest speed), but also has the highest disk space usage
for your backup image.
Standard Compression - Some compression is performed. This option provides
a good balance between CPU usage and disk space usage. This setting is the
default setting.
Maximum Compression - Maximum compression is performed. This option
provides the highest CPU usage (lowest speed), but also has the lowest disk
space usage for your backup image.
Note: If your backup image contains uncompressible data (such as JPG images
or ZIP files), additional storage space can be allocated to handle such data. As a
result, if you select any compression option and you have uncompressible data
in your backup, it can actually result in an increase in your disk space usage.
Encryption Algorithm
Specifies the type of encryption algorithm that is used for the recovery point
copies. The available format options are No Encryption, AES-128, AES-192, and
AES-256.
Encryption Password
Specifies to provide an encryption password that will be used to encrypt the
destination session. When you restore from the copy recovery points, you must
provide this password to confirm your authentication.
You have successfully created and deployed the copy recovery points plan.
File Copy can be used for copying critical data to secondary locations and can also be
used as an archiving solution.
What To Do Next?
■ Review the Prerequisites (see page 489)
■ Create a Plan with a Backup Task (see page 490)
■ Add a File Copy Task to the Plan (see page 453)
■ (Optional) Perform a Manual File Copy (see page 462)
■ Verify the Plan (see page 462)
Considerations:
■ The following table provides the limit on the file name length for a file copy job. The
files exceeding the limits are skipped.
Destination Limit
Network Share 240
Cloud 245
■ If the File Copy is running from a replicated session and the Replicate source has
multiple backup sessions, then the File Copy job runs for each session separately.
For example, if there are five backup sessions in the backup destination and you
add a Replicate task, then the Replicate task replicates all the sessions in a single
job. Now, if you add a File Copy task and the File Copy source is the Replicate
destination, then five File Copy job runs to replicate each session.
The backup task performs a backup of the source nodes and stores the data to the
specified destination. File Copy is supported only for the Agent-based Windows backup.
The following procedure explains the steps to create the agent-based Windows backup
task.
The Source page lets you specify the source nodes that you want to protect. You can
select more than one node in a plan. If you have not added any nodes to the Console,
you can add nodes when you create or modify a plan from the Source page. You can
also save a plan without adding any source nodes. The plan gets deployed only after you
add source nodes.
The destination is a location where you store the backup data. You must at least specify
the destination to save the plan.
The Schedule page lets you define a schedule for Backup, Merge, and Throttle functions
to repeat at specific intervals. After you define a schedule, the jobs run automatically
per the schedule. You can add multiple schedules and can provide retention settings.
A Backup Schedule refers to regular schedule that is repeated multiple times a day
based on the number of hours or minutes you select. Besides the regular schedule, a
backup schedule also provides options to add daily, weekly, and monthly schedules.
Note: For more information on scheduling and retention settings, see Understanding
Advanced Scheduling and Retention (see page 273).
4. Specify the recovery points retention settings for Custom, Daily, Weekly, and
Monthly schedule.
These options are enabled if you have added the corresponding backup schedule. If
you modify the retention settings on this page, the changes are reflected on the
Backup Schedule dialog.
5. Specify the catalog details.
Catalogs let you generate the File System catalog. The File System catalog is
required to perform faster and better search. If you select the catalog check boxes,
the catalogs are enabled depending on the type of backup that you have specified.
Clear the check box to disable generating the catalog.
The scheduling option lets you specify a Custom schedule or a Daily / Weekly / Monthly
schedule, or both the schedules. In the Custom schedule, you can configure the backup
schedule for each day of the week and you can add up to four backup schedules each
day. You can select a specific day of a week and create a time window to define when to
run backup and at what frequency.
Supported
Schedule Job Comments
Backup Backup job Define time windows to run backup jobs.
Define time windows to control the backup
Backup throttling Backup job speed.
Merge Merge job Define when to run merge jobs.
Daily schedule Backup job Define when to run daily backup jobs.
Weekly schedule Backup job Define when to run weekly backup jobs.
Monthly schedule Backup job Define when to run monthly backup jobs.
You can also specify the retention settings for the recovery points.
Note: Retention settings must be set within each plan to control how data for the nodes
assigned to that plan are retained at the target data store.
Schedules for Daily / Weekly / Monthly backups are independent to the Custom
schedule, and each other. You can configure only to run Daily backup, Weekly backup or
Monthly backup, without configuring the Custom schedule.
Backup Job Schedule
You can add four time windows per day in your backup schedule. A valid time
window is from 12:00 AM until 11:59 PM. You cannot specify a time window such
as 6:00 PM to 6:00 AM. In such cases, you have to manually specify two different
time windows.
For each time window, the start time is inclusive, and the end time is exclusive. For
example, you have configured to run Incremental Backup every one hour between
6:00 AM and 9:00 AM and the backup will start at 6:00 AM. This means the backup
will run at 6:00 AM, 7:00 AM, 8:00 AM, but NOT 9:00 AM.
Note: If you want to run the backup job repeatedly until the end of day, set the
schedule until 12:00 AM. For example, to run backup job every 15 minutes for the
entire day, set the schedule from 12:00 AM to 12:00 AM, every 15 minutes.
Backup Throttle Schedule
Backup throttle schedule lets you control the backup throughput speed, which in
turn controls the resource usage (disk I/O, CPU, network bandwidth) of the server
being backed up. This is useful if you do not want to affect the server performance
during business hours. You can add four time windows per day in your backup
throttle schedule. For each time window, you can specify a value, in MB per minute.
This value will be used to control the backup throughput. Valid values are from 1
MB/minutes to 99999 MB/minutes.
If a backup job extends its specified time, then the throttle limit will adjust
according to the specified time window. For example, you have defined the backup
throttle limit as 500 MB/minute from 8:00 AM to 8:00 PM, and 2500 MB/minute
from 8:00 PM to 10:00 PM. If a backup job starts at 7:00 PM and it runs for three
hours, then, from 7:00 PM to 8:00 PM the throttle limit will be 500 MB/minute and
from 8:00 PM to 10:00 PM the throttle limit will be 2500 MB/minute.
If you do not define any backup schedule and backup throughput schedule, the
backup will run as fast as it can.
Merge Schedule
Lets you merge recovery points based on the provided schedule.
The Advanced tab lets you specify some advanced settings for the backup job. The
advanced settings include providing truncate log settings, providing the location of any
scripts, and email settings.
The backup plan is created and automatically deployed to the source node. The backup
runs per the schedule that you have configured in the Schedule tab. You can also
perform a manual backup at any time.
Pre-flight Check for File Copy Nodes: You can also perform Pre-flight Check (PFC) for file
copy. Only those node that are added for file copy are eligible for PFC. To perform PFC
for file copy, right-click the node from All Nodes and select Filecopy Preflight check.
Note: If a backup job is in progress and you pause the plan, the backup job will get over
and the file copy job will not start. When you resume the plan again, the file copy job is
not resumed automatically. You have to manually run another backup job to start the
file copy job.
5. Specify the path of the source folder that you want to copy.
6. Click Add a Filter.
The filter is added below the Add a Filter button. You can add multiple filters and
can also remove the filters. For more information, see Add File Copy Filters (see
page 460).
7. Select the filter from the list and click OK.
The Add a File Source dialog closes.
8. Click the Destination tab and specify the destination details.
Destination Type
Specifies that the destination types is a network share or a cloud storage. For
either destination option, if the connection to the specified destination is lost
or broken, Arcserve UDP makes several attempts to continue the file copy job.
If these reattempts are not successful, a makeup job is then performed from
the point where the failure occurred. In addition, the activity log is updated
with a corresponding error message and an email notification is sent (if
configured).
Network Share
Specifies that the destination is a shared folder. When selected, lets you specify
the full path of the location where you want to move or copy the source
files/folders.
Destination Folder
Specifies the destination where the copied files are stored. The destination can
be any local volume or folder or a file share accessible by any uniform naming
convention (UNC) path. This field is available when you select Network Share as
the destination type. You can also browse the destination folder.
Cloud Storage
Specifies that the copied files are stored in a cloud environment. Arcserve UDP
currently supports file copying to multiple cloud vendors, such as Amazon S3
(Simple Storage Service), Amazon S3-compatible, Windows Azure, Windows
Azure-compatible, Fujitsu Cloud (Windows Azure), and Eucalyptus-Walrus.
These cloud vendors are publicly available web services which let you safely
and securely store and retrieve any amount of data, at any time, from
anywhere on the Web.
Note: To eliminate any potential clock skew error when attempting to connect
to the cloud, verify that your machine has the correct time zone set and the
clock is in sync with the global time. Always check the time of your machine
against the GMT time. If the time of your machine is not synchronized with the
correct global clock time (within 5 to 10 minutes), your cloud connection may
not work. If necessary, reset the correct time for your machine and rerun your
file copy job.
Storage Device
Select the device type from the drop down list.
Cloud Storage
Select the cloud storage path from the drop-down list. The drop-down list is
available if you have specified your cloud storage details. If you are specifying
the cloud storage account for the first time, click Add to add your cloud
account. When you select Cloud Storage from the next time, the account will
be displayed in the Cloud Storage drop-down list.
Note: For more information on adding a cloud account, see Add a Cloud
Account (see page 229).
Compression
Specifies the type of compression that is used for the File Copy jobs.
Compression is performed to decrease your storage space at the File Copy
destination, but also has an inverse impact on your file copy speed due to the
increased CPU usage.
Note: For a compressed File Copy job, the Activity log displays only the
uncompressed size.
The available options are:
Standard Compression
Some compression is performed. This option provides a good balance
between CPU usage and storage space requirement. This is the default
setting.
Maximum Compression
Maximum compression is performed. This option provides the highest CPU
usage (lowest speed), but also has the lowest storage space requirement
for your file copy.
Enable Encryption
Specifies to use encryption for file copying.
Data encryption is the translation of data into a form that is unintelligible
without a deciphering mechanism. Arcserve UDP data protection uses secure,
AES-256 (Advanced Encryption Standard) encryption algorithms to achieve
maximum security and privacy of your specified data. When an encryption is
selected, you must provide (and confirm) an encryption password.
Note: When you modify a file copy task, the Encryption or Compression cannot be
modified.
File Retention
Retains the files in the file copy destination if the specified criteria is met.
File created within the last
Specifies the amount of time (years, months, days) that the stored data is
retained at the destination location. At the end of the specified retention
time period, the stored data is purged from the destination.
Important! At the end of the specified retention time when the data is
purged from the destination, all of this purged data is no longer stored or
saved.
Note: The Retention Time purge process is only triggered if the File Copy
Schedule option is enabled.
File version less than
Specifies the number of copies retained and stored at the destination
location. After this number is exceeded, the earliest (oldest) version will be
discarded. This cycle of discarding the oldest stored version repeats as
newer versions are added to the destination, allowing you to always
maintain the specified number of stored versions.
For example, if your specified File Versions retention count is set to 5 and
you perform five file copies at times t1, t2, t3, t4, and t5, these file copies
become the five file copy versions retained and available to recover. After
the sixth file copy is performed (new version is saved), Arcserve UDP will
remove the t1 copy and the five available versions to recover are now t2,
t3, t4, t5, and t6.
By default, the number of copies retained at the destination location
before discarding is 15.
9. Click the Schedule tab and specify the file copy schedule.
If a file copy job runs beyond the end time, the job will continue to run until it is
complete. The next file copy job does not run until the previous file copy job is
complete even if a scheduled job overlaps the running job.
The File Copy job runs as specified in the schedule.
10. Click Save.
The changes are saved and the file copy task is automatically deployed to the node.
Filter Category
There are three categories of filters available: File Type, File Name, and Folder
Name. The Filter Variable and Filter Value field changes depending on Filter
category.
Filter Variable
If the Filter Category is File Type, the Filter Variable options are is and is not. If
the Filter Category is File Name or Folder Name, the Filter Variable options are
contains or does not contain.
You can specify multiple filters within the same file copy request. You can
specify the same Filter Category but different Filter Variable.
Note: When the Filter Variable conflict for the same Filter Category, the is not
or does not contain variable is always a higher priority and is enforced.
Filter Value
The filter value lets you limit the information that is file copied by selecting only
the parameter information that you specify, such as .txt files.
Arcserve UDP supports the use of wildcard characters to help select multiple
objects to file copy with a single request. A wildcard character is a special
character that can be used as a substitute to represent either a single character
or a string of text.
The wildcard characters asterisk and question mark are supported in the Value
field. If you do not know the complete file/folder pattern value, you can
simplify the results of the filter by specifying a wildcard character.
– "*" - Use the asterisk to substitute zero or more characters in the value.
– "?" - Use the question mark to substitute a single character in the value.
For example, you can enter *.txt to exclude all files with a .txt extension if you
do not know the specific file name. You can provide as much of the file name as
you know, then use wildcards to fill in the blanks.
Note: When you select File Type as the filter type, a drop-down list of
predefined filters for many commonly used files is available (MS-Office files,
Image files, Executable files, Temp files, etc.). After choosing any of the
predefined filters, you can still append or modify the corresponding values.
When you run a manual File Copy, the File Copy job runs only for the first backup
session, which is qualified for a File Copy. (Backup sessions qualify for File Copy per the
backup schedule and if the sessions are in a queue. For example, if you specify to run
File Copy for every second backup, then every second backup only is qualified for File
Copy, not all the backups are qualified for File Copy.) After the File Copy is complete, the
first session is removed and the second session in line becomes the first session. For
example, if there are three backup sessions (S1, S2, S3 respectively) and you run a
manual File Copy, then the File Copy job runs only for S1. The File Copy job does not run
for S2 and S3. When you run the manual File Copy job again, S2 is copied.
File Copy can be run manually from the Nodes view and Plans view by clicking Actions
menu or context menu.
Follow these steps to run the File Copy manually from the Nodes view:
1. From the Console, click the resources tab.
2. From the left pane, navigate to Nodes, and click All Nodes.
Nodes are displayed in the center pane.
3. Select the nodes for a File Copy job. The nodes must have a File Copy plan assigned
to it.
4. On the center pane, click Actions, File copy Now.
The Run File copy now dialog opens.
5. Click OK.
The File Copy job runs.
File Archive allows you to safely and securely delete the source data after it has been
copied to an off-site or secondary storage repository.
What To Do Next?
■ Review the Prerequisites (see page 489)
■ Create a Plan with a Backup Task (see page 490)
■ Add a File Archive Task to the Plan (see page 478)
■ Verify the Plan (see page 462)
The backup task performs a backup of the source nodes and stores the data to the
specified destination. File Archive is supported only for the Agent-based Windows
backup. The following procedure explains the steps to create the agent-based Windows
backup task.
The Source page lets you specify the source nodes that you want to protect. You can
select more than one node in a plan. If you have not added any nodes to the Console,
you can add nodes when you create or modify a plan from the Source page. You can
also save a plan without adding any source nodes. The plan gets deployed only after you
add source nodes.
The destination is a location where you store the backup data. You must at least specify
the destination to save the plan.
The Schedule page lets you define a schedule for Backup, Merge, and Throttle functions
to repeat at specific intervals. After you define a schedule, the jobs run automatically
per the schedule. You can add multiple schedules and can provide retention settings.
A Backup Schedule refers to regular schedule that is repeated multiple times a day
based on the number of hours or minutes you select. Besides the regular schedule, a
backup schedule also provides options to add daily, weekly, and monthly schedules.
Note: For more information on scheduling and retention settings, see Understanding
Advanced Scheduling and Retention (see page 273).
4. Specify the recovery points retention settings for Custom, Daily, Weekly, and
Monthly schedule.
These options are enabled if you have added the corresponding backup schedule. If
you modify the retention settings on this page, the changes are reflected on the
Backup Schedule dialog.
5. Specify the catalog details.
Catalogs let you generate the File System catalog. The File System catalog is
required to perform faster and better search. If you select the catalog check boxes,
the catalogs are enabled depending on the type of backup that you have specified.
Clear the check box to disable generating the catalog.
The scheduling option lets you specify a Custom schedule or a Daily / Weekly / Monthly
schedule, or both the schedules. In the Custom schedule, you can configure the backup
schedule for each day of the week and you can add up to four backup schedules each
day. You can select a specific day of a week and create a time window to define when to
run backup and at what frequency.
Supported
Schedule Job Comments
Backup Backup job Define time windows to run backup jobs.
Define time windows to control the backup
Backup throttling Backup job speed.
Merge Merge job Define when to run merge jobs.
Daily schedule Backup job Define when to run daily backup jobs.
Weekly schedule Backup job Define when to run weekly backup jobs.
Monthly schedule Backup job Define when to run monthly backup jobs.
You can also specify the retention settings for the recovery points.
Note: Retention settings must be set within each plan to control how data for the nodes
assigned to that plan are retained at the target data store.
Schedules for Daily / Weekly / Monthly backups are independent to the Custom
schedule, and each other. You can configure only to run Daily backup, Weekly backup or
Monthly backup, without configuring the Custom schedule.
Backup Job Schedule
You can add four time windows per day in your backup schedule. A valid time
window is from 12:00 AM until 11:59 PM. You cannot specify a time window such
as 6:00 PM to 6:00 AM. In such cases, you have to manually specify two different
time windows.
For each time window, the start time is inclusive, and the end time is exclusive. For
example, you have configured to run Incremental Backup every one hour between
6:00 AM and 9:00 AM and the backup will start at 6:00 AM. This means the backup
will run at 6:00 AM, 7:00 AM, 8:00 AM, but NOT 9:00 AM.
Note: If you want to run the backup job repeatedly until the end of day, set the
schedule until 12:00 AM. For example, to run backup job every 15 minutes for the
entire day, set the schedule from 12:00 AM to 12:00 AM, every 15 minutes.
Backup Throttle Schedule
Backup throttle schedule lets you control the backup throughput speed, which in
turn controls the resource usage (disk I/O, CPU, network bandwidth) of the server
being backed up. This is useful if you do not want to affect the server performance
during business hours. You can add four time windows per day in your backup
throttle schedule. For each time window, you can specify a value, in MB per minute.
This value will be used to control the backup throughput. Valid values are from 1
MB/minutes to 99999 MB/minutes.
If a backup job extends its specified time, then the throttle limit will adjust
according to the specified time window. For example, you have defined the backup
throttle limit as 500 MB/minute from 8:00 AM to 8:00 PM, and 2500 MB/minute
from 8:00 PM to 10:00 PM. If a backup job starts at 7:00 PM and it runs for three
hours, then, from 7:00 PM to 8:00 PM the throttle limit will be 500 MB/minute and
from 8:00 PM to 10:00 PM the throttle limit will be 2500 MB/minute.
If you do not define any backup schedule and backup throughput schedule, the
backup will run as fast as it can.
Merge Schedule
Lets you merge recovery points based on the provided schedule.
The Advanced tab lets you specify some advanced settings for the backup job. The
advanced settings include providing truncate log settings, providing the location of any
scripts, and email settings.
The backup plan is created and automatically deployed to the source node. The backup
runs per the schedule that you have configured in the Schedule tab. You can also
perform a manual backup at any time.
Note: If a backup job is in progress and you pause the plan, the backup job will get over
and the file archive job will not start. When you resume the plan again, the file archive
job is not resumed automatically. You have to manually run another backup job to start
the file archive job.
For files copied using File Archive, Arcserve UDP leaves a stub file with the "UDP.txt"
extension. For more information on updating the stub file, see Update Stub Files (see
page 486).
5. Specify the file path of the source path that you want to copy.
6. Specify the File Size Filter and File Age Filter.
Destination Type
Specifies that the destination types is a network share or cloud storage. For
either destination option, if the connection to the specified destination is lost
or broken, Arcserve UDP makes several attempts to continue the file archive
job. If these reattempts are not successful, a makeup job is then performed
from the point where the failure occurred. In addition, the activity log is
updated with a corresponding error message and an email notification is sent
(if configured).
Network Share
Specifies that the destination is a shared folder. When selected, lets you specify
the full path of the location where you want to move the source files/folders.
Destination Folder
Specifies the destination where the archived files are stored. The destination
can be any local volume or folder or a file share accessible by any uniform
naming convention (UNC) path. This field is available when you select Network
Share or Volume on a Protected Node as the destination type. You can also
browse the destination folder.
Cloud Storage
Specifies that the copied files are stored in a cloud environment. Arcserve UDP
currently supports file copying to multiple cloud vendors, such as Amazon S3
(Simple Storage Service), Amazon S3-compatible, Windows Azure, Windows
Azure-compatible, Fujitsu Cloud (Windows Azure), and Eucalyptus-Walrus.
These cloud vendors are publicly available web services which let you safely
and securely store and retrieve any amount of data, at any time, from
anywhere on the Web.
Note: To eliminate any potential clock skew error when attempting to connect
to the cloud, verify that your machine has the correct time zone set and the
clock is in sync with the global time. Always check the time of your machine
against the GMT time. If the time of your machine is not synchronized with the
correct global clock time (within 5 to 10 minutes), your cloud connection may
not work. If necessary, reset the correct time for your machine and rerun your
file copy job.
Storage Device
Select the device type from the drop down list.
Cloud Storage
Select the cloud storage path from the drop-down list. The drop-down list is
available if you have specified your cloud storage details. If you are specifying
the cloud storage account for the first time, click Add to add your cloud
account. When you select Cloud Storage from the next time, the account will
be displayed in the Cloud Storage drop-down list.
Note: For more information on adding a cloud account, see Add a Cloud
Account (see page 229).
Compression
Specifies the type of compression that is used for the File Archive jobs.
Compression is performed to decrease your storage space at the File Archive
destination, but also has an inverse impact on your file archive speed due to
the increased CPU usage.
Note: For a compressed File Archive job, the Activity log displays only the
uncompressed size.
The available options are:
Standard Compression
Some compression is performed. This option provides a good balance
between CPU usage and storage space requirement. This is the default
setting.
Maximum Compression
Maximum compression is performed. This option provides the highest CPU
usage (lowest speed), but also has the lowest storage space requirement
for your file copy.
Enable Encryption
Specifies to use encryption for file archiving.
Data encryption is the translation of data into a form that is unintelligible
without a deciphering mechanism. Arcserve UDP data protection uses secure,
AES-256 (Advanced Encryption Standard) encryption algorithms to achieve
maximum security and privacy of your specified data. When an encryption is
selected, you must provide (and confirm) an encryption password.
Retention Time
Specifies the amount of time (years, months, days) that the stored data is
retained at the destination location. At the end of the specified retention time
period, the stored data is purged from the destination.
The retention time calculations are based upon a month being 30 days and a
year being 365 days. For example: If you specify a retention time of 2 years, 2
months, and 5 days, then the total retention time for your file copied data is
795 days (365 + 365 + 30 + 30 + 5).
Important! At the end of the specified retention time when the data is purged
from the destination, all of this moved data is no longer stored or saved.
Note: The Retention Time purge process is only triggered if the File Copy
Schedule option is enabled.
File version less than
This setting only applies to copied data that is retained (not copied data
that is moved).
The changes are saved and the file archive task is automatically deployed to the node.
Filter Type
There are two types of filters: Include and Exclude.
An Include filter copies only those objects from the file copy source that match
the specified value.
An Exclude filter copies all objects from the file copy source except those that
match the specified value.
You can specify multiple filters within the same file copy request by separating
each filter value with a comma.
– If you specify multiple Include filters, the data is included in the file copy if
any one of those Include filters matches.
– If you specify multiple Exclude filters, the data is excluded from the file
copy if any one of those Exclude filters matches.
– You can mix both Include and Exclude filters in the same file copy request.
Note: When the specified parameters of Exclude and Include filters conflict, the
Exclude filter is always a higher priority and is enforced. An Include filter can
never file copy an object that was also Excluded.
For example, if you specify Files not modified in 180 days, then Arcserve UDP
automatically copies all files that meet this criteria (have not been modified during
the last 180 days).
Important! If you specify both File Size and File Age filters (or multiple File Age filters),
then only the files which meet all of the specified filter parameters are copied. Files
which do not meet any one of these specified parameters are not copied.
For files copied using the File Archive, Arcserve UDP leaves a stub file with the "UDP.txt"
extension. The stub file contains information about the destination where the files were
moved and some additional information. If a file is restored to the original location and
then gets moved again to the specified destination, then the stub file is updated with
this move information. If necessary, these file copy stub files can be safely disabled or
deleted without any negative impact. (Existing stub files are not deleted when the
registry key is changed to no longer create stub files).
You can change the default text by adding a configuration entry. Add the following XML
tag entry in the FileCopyDebugSetting.xml file from the
$UDPHome\Engine\Configuration directory:
</ArchiveStubFileText>
<HKLM>
<AFArchiveDLL>
</AFArchiveDLL>
</HKLM>
If you want to disable the stub file creation, add the following XML tag entry in the
FileCopyDebugSetting.xml file from the $UDPHome\Engine\Configuration directory:
<CreateStubFile>0</CreateStubFile>
Example: The FileCopyDebugSetting.xml file would look like
<?xml version="1.0" encoding="UTF-8"?>
<HKLM>
<AFArchiveDLL>
<CreateStubFile>0</CreateStubFile>
</AFArchiveDLL>
</HKLM>
Note: If you disable or delete the file copy stub files, you can no longer track the status
and location of moved files.
File Archive can be run manually from the Nodes view and Plans view by clicking Actions
menu or context menu.
Follow these steps to run the File Archive manually from the Nodes view:
1. From the Console, click the resources tab.
2. From the left pane, navigate to Nodes, and click All Nodes.
Nodes are displayed in the center pane.
3. Select the nodes for a File Archive job. The nodes must have a File Archive plan
assigned to it.
4. On the center pane, click Actions, File archive Now.
The Run File archive now dialog opens.
5. Click OK.
The File Archive job runs.
■ Reduce Storage Cost - Helps you to reclaim storage capacity by migrating older or
infrequently accessed data from your primary systems to more cost-effective
archival storage locations.
■ Maintain Multiple File Versions - Helps you to roll back to previous versions of
backed-up files (if necessary) or maintain multiple versions of the same files at
different destinations.
Supported Scenarios
■ If the Destination of Task 1 is Arcserve UDP Recovery Point Server, install the client
agent on the RPS node.
■ For Agent-based plan with Destination as Local/Remote share, install the client
agent on all the Arcserve UDP agent nodes.
■ For Host-Based Agentless plan, install the client agent on the Arcserve UDP Proxy
Node.
What To Do Next?
■ Review the Prerequisites (see page 489)
■ Create a Plan with a Backup Task (see page 490)
■ Add a Copy to Tape Plan (see page 490)
■ Verify the Plan (see page 462)
How to back up Linux nodes, see How to Create a Linux Backup Plan (see page 281).
■ Replicating a backup data to a remote destination, see How to Replicate Data
Between Data Stores Managed from Different UDP Consoles.
When the Arcserve Backup group is renamed in the Arcserve Backup server, you must
modify the Copy to Tape in an Arcserve UDP plan to link the new group name. You must
also specify the new media pool to retain tapes. The Copy to Tape task is already
changed to the new group name and so it cannot use the original media pool, which is
associated with the old group name.
The destination is a tape media group in your Arcserve Backup Server. You must add the
Arcserve Backup Server to Console before you create this task.
“DisplayASBUFSDGroup = 0”
When the value is 0, the ASBU FSD group is not displayed.
“DisplayASBUFSDGroup = 1”
When the value is 1, the ASBU FSD group is displayed.
The list of the media group is queried from Arcserve Backup Server. It is
corresponding to the device group list in the Arcserve Backup Server.
Multiplexing
Select the check box to enable multiplexing. Specify the maximum number of
streams that can write to a tape at the same time. The default number of
streams is 4 and the supported range is from 2 through 32.
Encryption
Specifies to use encryption for copy to tape.
Enabling encryption ensures that data is encrypted on tape. When an
encryption is selected, you must provide (and confirm) an encryption
password.
Compression
Enabling compression ensures that the data is compressed on tape.
2. Verify the Media Group Details for the selected Arcserve Backup server and media
group.
3. Click the Schedule tab.
The Schedule page opens.
You can specify the schedule to start your copy to tape job. You can also decide the
media retention policy and tape usage mode.
The following list shows the default retention time for Append to Existing Tape:
■ Daily - 7 days
■ Weekly - 5 weeks
■ Monthly - 12 months
Seven daily recovery points are copied to the same tape, five weekly recovery
points are copied to the same tape, and 12 monthly recovery points are copied
to the same tape.
Copy to Separate Tapes
Indicates that recovery points of each day are copied to a separate tape. For
example, if you have specified the retention time for daily backup as 7, then
recovery points from Day 1 are copied to Tape 1, recovery point from Day 2 are
copied to Tape 2, recovery points from Day 3 are copied to Tape 3, and so on.
The recovery points from Day 1 is retained for 7 days. On Day 8, the recovery
points are copied to Tape 1 because the retention policy is expired for Day 1
recovery points.
The following list shows the default retention time for Copy to Separate Tapes:
■ Daily - 7 days
■ Weekly - 5 weeks
■ Monthly - 12 months
Each of the seven daily recovery points are copied to separate tapes, each of
the five weekly recovery points are copied to separate tapes, and each of the
12 monthly recovery points are copied to separate tapes.
7. Click the Advanced tab.
The Advanced page opens.
The advanced settings lets you configure some additional settings for the copy to tape
task.
1. Specify the following details.
Media Eject
Specifies that the media is ejected from the drive after the job finishes. This
helps prevent any other job from overwriting information on this media.
Backup Verification
Specifies that Arcserve Backup verifies the reliability of the backup by checking
the header of each file for readability. This option does not apply to
multiplexed backups.
Run a command before a copy to tape job is started
Lets you run a script before the backup job starts. Specify the path where the
script is stored. Click On exit code and specify the exit code for Run Job or Fail
Job. Run Job indicates that the backup job will continue when the script returns
the exit code. Fail Job indicates that the backup job will stop when the script
returns the exit code.
Run a command after a copy to tape job is over
Lets you run a script after the backup job is completed. Specify the path where
the script is stored.
Username for commands
Lets you specify username to run the script.
Password for commands
Lets you specify the password to run the script.
Enable Email Alerts
Lets you enable email alerts. You can configure email settings and can specify
the types of alerts that you want to receive in an email. When you select this
option, the following options are enabled for your selection.
Email Settings
Lets you configure the email settings. Click Email Settings and configure
the email server and proxy server details.
Job Alerts
Lets you select the types of job emails you want to receive.
2. Click Save.
The changes are saved and a green checkmark is displayed next to the task name.
The plan page closes.
The copy to tape task is created and it runs per the schedule.
Important! After you copy the recovery points to a tape, you cannot restore the data in
tape from Arcserve UDP Console. You have to restore the data from Arcserve Backup
Manager. For more information on restoring the tape data, see Backing Up and
Recovering D2D/UDP Data in Arcserve Backup Administrator Guide.
You can choose VMware vCenter/ESX(i) server or Windows Hyper-V server as the
hypervisor.
Note: Machine can boot up. NIC(s) are configured according to the user input on UI.
Consideration
■ The Migrate InstantVM between nodes feature is not supported when an Instant
VM is started in a Hyper-V cluster.
■ When you create an Instant VM from a Linux agent backup, the settings of a virtual
machine created by Instant VM cannot be modified using a vSphere client. You
must use the vSphere web client to modify the virtual machine settings.
■ If the number of NFS datastore reaches the maximum number of NFS mounts on an
ESXi/ESX host and you create an Instant VM, then Arcserve UDP fails to create the
NFS datastore. To increase the maximum number of NFS mounts on the ESXi/ESX
host, see the VMware KB article.
■ If recovery point is from agentless backup, and destination hypervisor is vsphere
ESX/VC, the NFS server is required on the Linux Backup Server machine.
■ If target hypervisor is MS Hyper-V, command net must be available on the Linux
Backup Server. This command may be installed by samba client packages.
You can configure and create an Instant VM from the Instant VM wizard. There are
three ways to open the Instant VM wizard:
■ From the Node Management
■ From the Destination Management: Recovery Point Server
■ From the Destination Management: Shared Folder
The Select a Recovery Point page displays the location of the recovery point and lets you
select a recovery point. The recovery point can be in a shared location or in a data store
in RPS.
The Console automatically recognizes the location of the recovery point and pre-selects
the Location Type, Recovery Point Server, and Data Store or Network Share Folder
fields.
Expand the Date list, select the required recovery point from the list, and click Next.
Note: If you create an Instant Virtual Machine from the Node management view, then
only those Recovery Point Servers are listed that are in the same Site as the source
node. If you want to create an Instant Virtual Machine from the Recovery Point Server
managed from a different Site, then navigate to that Site and open the Wizard from the
Destination management view.
Select a VM Location
Specify the location of the virtual machine where you want to create the Instant VM.
You can specify either VMware or a Microsoft Hyper-V virtual machine.
Additional administrative account refers to those accounts that are not default
administrators. Such accounts are also referred as non-built-in administrative accounts.
To import virtual machine from a Hyper-V host, you can either use the built-in
administrator account of the Hyper-V host, or a domain account which is in the local
administrators group of the Hyper-V host, or a non-built-in administrative user.
The user with additional administrative account can use the procedures to disable UAC
remote access.
Notes:
■ This procedure is not similar to disabling UAC. Using this procedure, you can
disable some of the functionalities of UAC.
■ Considering that remote Windows Management Instrumentation (WMI)
technology is used for import, ensure that WMI is not blocked by the firewall.
3. From the Edit menu, click New, and then click DWORD (32-bit) Value.
4. Specify LocalAccountTokenFilterPolicy as the name for the new entry and then press
Enter.
5. Right-click LocalAccountTokenFilterPolicy and then click Modify.
6. Specify 1 in the Value data field and then click OK.
7. Exit the Registry Editor.
For more information about the Windows behavior, see the Microsoft documentation.
The recovery server hosts the core module of the Instant VM. The default recovery
server is the RPS. You can also assign a node as a recovery server.
For Linux backup sessions, the recovery server is a Linux Backup Server.
You can manually install Network File System (NFS) on a Windows Server using the
Server Manager.
Specify the details for the Instant VM. The options may vary depending on the
hypervisor.
You can add multiple network adapters. After adding a network adapter, you
can edit and delete the network adapter from the Actions column.
b. Specify the Virtual Network, Adapter Type, and TCP/IP Settings. If you want to
specify the IP address of the Instant VM, you can click Add an Address and
select the address you want to configure.
5. Update DNS.
Note: This feature is only available for Windows Instant VM.
a. Click the Update DNS button to specify DNS details.
Note: You can specify the Update DNS detail information if you have specified
an IP address and DNS address in the Network Adapter and the source machine
is in a domain.
b. Click Add a DNS Address to add a DNS update record. Click Remove to remove
DNS update record. Click Up and Down button to adjust the sequence of the
records.
c. Select a DNS Address and an IP Address from the drop-down list and then click
OK.
d. Specify the Time to Live (TTL).
e. Specify the DNS Authentication.
For Microsoft DNS Server, enter the username and password. For Bind Server,
you need to specify the full path, including the file name of the key file in the
Recovery Server.
6. Change the Instant Virtual Machine hostname.
a. Click the Change Host Name checkbox to update the hostname of the Instant
Virtual Machine.
b. Specify a New Host Name for the Instant Virtual Machine. If the source
machine is in a domain, provide the User Account and password.
Note: If the source machine is in a domain, the account should have the permission
to change the hostname in domain.
To create the Instant VM, submit the Instant VM job. After the job is complete, you can
see the Instant VM in resources, Infrastructure, Instant Virtual Machine.
Note: The Console displays only those Instant VM that are created from the recovery
points managed from the selected Site.
You can start or stop an Instant VM after it is created. The start or stop button displays
depending on the status of the VM.
You can delete any Instant VM that you do not require anymore.
You can change a Linux Instant Virtual machine (IVM) to an Independent virtual machine
(VM). You need to use VMware Storage vMotion to convert the IVM into an
independent VM.
Notes:
■ To continue you need a menu item that is available only after the IVM has run into
“Ready to use” job phase.
■ The menu item is unavailable if the recovery point is agentless backup, and the
target hypervisor is vSphere ESX/VC
2. From the Job Status tab, select the IVM job, right click for context menu.
3. Select Resume auto recovery.
The IVM job is moved to Job History after the process finishes successfully.
To migrate the Linux Instant Virtual Machine to a physical machine, refer to the How to
Perform a Migration BMR for Linux Machines section in the Agent for Linux User Guide.
Console (For example, in public network), Site 1 (For example, in a private network) and
Site 2 (For example, in another private network) can be in different network segments.
Site 1 and Site 2 are managed by console through the gateway.
The diagram gives an example to illustrate this feature of UDP, which is just a reference
because the real environment that you are using may not be similar to the one
described here. The example aims to replicate data from Site 1 source RPS to Site 2
destination RPS. Gateway in Site 1 and Site 2 can connect to the Console through the
proxy or NAT. The proxy and NAT should be properly configured.
Description of diagram:
■ Proxy1 or NAT1 has both public interface and private interface. For example: IP-1 as
public IP is in the same segment with console and IP-2 as private IP is in the same
segment with Site1. In the network setting of Gateway1 machine, default gateway
is set to private IP of Proxy1 or NAT1.
■ Proxy2 and NAT2 also have the same setting with Proxy1/NAT1, besides that NAT2
needs extra configuration of a port redirection rule so that from the public network
one can access the private service by this mapping. In this example, that is the
source RPS through which NAT2 port redirection can connect to destination RPS.
■ With windows server 2012R2 OS, both windows GUI and command could set port
direction for NAT. Here is an example command, which means: input this address
from source RPS web explorer https or http://<NAT2 IP-1>:<port number=8855>,
and it will redirect to destination RPS https or http://<destination RPS
IP=192.168.30.102>:8014, then you can execute the replication cross site.
netsh interface portproxy add v4tov4 listenport=8855
connectaddress="192.168.30.102" connectport=8014 protocol=tcp
6. Configure the other tabs such as Schedule and Advanced and save the plan.
7. When the job runs, verify the monitor and log status for backup, replication (out)
and replication (in).
You can use the hardware snapshot for an agent-based backup (Windows physical
machines) and host-based agentless backup (VMware and Hyper-V).
What To Do Next
■ Use Hardware Snapshot for VMware Agentless Backup (see page 517)
■ Use Hardware Snapshot for Hyper-V Agentless Backup (see page 523)
■ Use Hardware Snapshot for Agent-based Backup (see page 524)
■ Verify the Backup has Used Hardware Snapshot (see page 525)
NetApp in 7-mode
If the NetApp storage system operates in the 7-mode, it is not mandatory to install any
additional licenses to use hardware snapshots. However, we recommend that you have
the FlexClone license installed.
NetApp in Cluster-mode
If the NetApp storage system operates in the Cluster mode (C-mode), you must have a
FlexClone or SnapRestore license installed to use hardware snapshots.
The following flowchart explains the conditions applied to hardware snapshot for
NetApp iSCSI/FC VMware:
In a traditional LUN clone, sometimes the backup snapshot cannot be deleted during
cleanup operations. Typically, a LUN exists as a file in the filesystem. So, a snapshot
captures the file. When you create a LUN clone, another file gets created in the
filesystem. So, the next snapshot captures the original file and the duplicate file. When
multiple snapshots are captured, the LUN clone becomes a part of the snapshot chain.
Now, if you delete a snapshot, the snapshot does not get deleted because it refers to a
LUN clone which is, in turn, backed by another snapshot. In such cases, you cannot
delete a snapshots until you delete the LUN clone and all the snapshots that reference
that LUN clone. As a result, your retention policy for scheduled snapshots may be
disrupted.
To avoid this situation, install the FlexClone license on your NetApp storage system and
Arcserve UDP will use the FlexClone technology for LUN cloning.
When you use the SnapRestore license, restoring LUNs take a longer time depending on
the size of the LUN and the environment. This is because deleting a snapshot takes a
longer time as the snapshot is busy restoring LUN, which takes a longer time. Arcserve
UDP does not have a mechanism to monitor the progress of restoring LUN. So, Arcserve
UDP uses the retry mechanism for deleting the snapshot.
For example, if the retry count is five, UDP agent will try for five times to send
the snapshot delete command to the NetApp storage array. After retrying five
times to send the snapshot delete command, if snapshot still exists, then you
have to manually delete the snapshot and also, increase the retry count to the
appropriate value so that next backup will not have this problem. This registry
key is used in combination with the DeleteRetryTimeoutInMins key.
Default value: 30
Type: REG_SZ
Arcserve UDP supports hardware snapshot for NFS Version 3.0 version Data Stores. To
use the hardware snapshot, the backup proxy must have the Microsoft NFS client
installed and configured.
The following table displays the NFS versions that VMware VM and Arcserve UDP
support. Ensure that you have the correct NFS version with the corresponding VMware
version.
VMware Versions NFS Versions NFS Versions that NFS Versions that
that VMware Arcserve UDP Arcserve UDP Support
Support Support for Hardware for Hardware Snapshot
Snapshot for for Windows NFS Client
FlexClone
VMware 6.0 and Supports NFS Supports NFS 3.0 and Supports NFS 3.0 only
higher 3.0 and 4.1 4.1 and should meet the
prerequisites
VMware versions Supports NFS Supports NFS 3.0 Supports NFS 3.0 only
older than 6.0 3.0 only and should meet the
prerequisites
Follow these steps to manually install the Microsoft NFS client on a Windows server.
1. Log in to the Windows server.
2. Open the Server Manager and click Manage.
3. Click Add Roles and Features.
4. On the Before you begin dialog, click Next.
5. On the Select installation type dialog, select Role-based or feature-based
installation, and then click Next.
6. On the Select destination server dialog, if you are installing to the local server, click
Next. Otherwise, select a server from the Server Pool list.
7. On the Select server roles dialog, click Next.
8. On the Select features dialog, scroll down the list of available features and select
the Client for NFS check box.
9. Click Next.
10. On the Confirm installation selections dialog, review your selections and then click
Install.
11. After the installation completes, review the results and then click Close.
■ The Hyper-V server and the proxy server must have a similar operating system
version.
■ If the Hyper-V server belongs to a cluster, the proxy server should not be a part
of the Hyper-V cluster.
2. Log in to the Console and create a plan for backup.
Note: For more information on creating an agentless backup plan, see How to
Create a Host-based Agentless Backup Plan (see page 302).
3. Verify that you have selected the Use hardware snapshot wherever possible option
in the Advanced tab.
4. Save the plan and submit the backup job.
Review the log messages to ensure that the backup has used the hardware snapshot.
The following diagram illustrates the process to restore from a recovery point:
During a block-level backup, each backed up file is made up of a collection of blocks that
define that particular file. A catalog file is created containing a list of the backed up files,
along with the individual blocks that were used for each file and the available recovery
points for these files. When you need to restore a particular file, you can search your
backup and select the file you want to restore and the recovery point you want to
restore from. Then Arcserve UDP collects the version of the blocks that were used for
the recovery point of the specified file, and reassembles and restores the file.
Note: You can also perform a restore without a catalog file from a catalog-less backup
recovery point.
The following flow diagram shows the process of how Arcserve UDP restores a specific
file:
While performing a restore by Arcserve UDP Agent (Windows) some files may be
skipped intentionally.
The files and folders in the following table are skipped during a restore if the following
two conditions exist:
■ Files are skipped when such files exist before the restore and the conflict option is
"skip existing files".
■ Files and folders listed in the following table are skipped because they are an
important component for Windows or Arcserve UDP Agent (Windows).
The following files and folders are skipped only when you restore to the original
location.
All Folder specified inAll Folder contains a cached dll file which is
value record under:files/folders( used for System File Checker (SFC) and
HKLM\Software\Mic recursively) contents of the system dll cache directory
rosoft\Windows are rebuilt by using SFC.
NT\CurrentVersion\
WinLogon\SfcDllCac
he
%SystemRoot%\SYST
EM32\dllCache
Root folder of MSCS\* Used for Microsoft Cluster Server.
quorum_device
%SystemRoot%\SYST perf?00?.dat Performance data used by the Windows
EM32\ performance counter.
perf?00?.bak
Use the Browse Recovery Points option to restore from a recovery point. When you
select a recovery date, and then specify the time, all the associated recovery points for
that duration are displayed. You can then browse and select the backup content
(including applications) to be restored.
8. Click Next.
The Restore Options dialog Opens.
After you specify a recovery point and content to restore, define the copy options for
the selected recovery point.
2. Specify the Resolving Conflicts option that Arcserve UDP performs if conflicts are
encountered during the restore process.
The available options are:
Overwrite existing files
Overwrites (replaces) any existing files, which are at the restore destination. All
objects are restored from the backup files regardless of their current presence
on your computer.
Replace active files
Replaces any active files upon reboot. If during the restore attempt Arcserve
UDP Agent (Windows) discovers that the existing file is currently in use or being
accessed, it will not immediately replace that file, but instead to avoid any
problems will delay the replacement of the active files until the next time the
machine is rebooted. (The restore occurs immediately, but the replacement of
any active files is done during the next reboot).
This option is only available if you select the Overwrite existing files option.
Note: If you do not select this option, any active file is skipped from the
restore.
Rename files
Creates a new file if the file name already exists. Selecting this option copies
the source file to the destination with the same filename but a different
extension. Data is then restored to the new file.
Skip existing files
Skips over and not overwrite (replace) any existing files that are located at the
restore destination. Only objects that are not currently existing on your
machine are restored from the backup files.
Default: Skip existing files.
4. If necessary, specify the Backup Encryption Password, when the data you are trying
to restore is encrypted.
A password is not required if you are attempting to restore from the same Arcserve
UDP Agent (Windows) computer from where the encrypted backup was performed.
However, if you are attempting to restore from a different Arcserve UDP Agent
(Windows) computer, a password is required.
Note: A clock icon with a lock symbol indicates the recovery point contains
encrypted information and may require a password for restore.
5. Click Next.
The Restore Summary dialog opens.
The following diagram illustrates the process to restore from a file copy:
During a File Copy, each backed up file is made up of a collection of blocks that define
the particular file. A catalog file is created for every version of the backed up file, along
with the individual blocks that were used for these files. When you need to restore a
particular file, you can browse and select the file you want to restore and the file copy
versions you want to restore from. Then Arcserve UDP collects the version of the blocks
that were used for the file copy of the specified file, which reassembles and restores the
file.
The following flow diagram shows the process of how Arcserve UDP restores a specific
file.
Use the Browse File Copies option to restore from a file copy. This restore method
allows you to browse the file copied data and specify exactly which file you want to
restore.
3. If necessary, you can click Add to browse to an alternate location where your file
copy images are stored.
The Destination dialog opens displaying the available alternate destination options.
Note: The following procedure only applies if you are restoring a file/folder from a file
copy or file archive cloud location.
The available options are Amazon S3, Amazon S3-compatible, Windows Azure, Windows
Azure-compatible, Fujitsu Cloud (Windows Azure), and Eucalyptus-Walrus. (Amazon S3
is the default vendor).
Note: If you are using Eucalyptus-Walrus as your file copy cloud vendor, you will not be
able to copy files whose entire path length is greater than 170 characters.
The configuration options for each cloud vendor are similar (with some different
terminology), and any differences are described.
1. From the Browse File Copies option or the Find Files/Folders to Restore option,
click Add.
The Destination dialog opens.
2. Select Cloud and click Browse.
The Cloud Configuration dialog opens.
3. Enter the following details:
Storage Name
Specifies the name of the cloud storage. This name will be added to Console for
identifying the cloud account. Each cloud account must have a unique storage
name.
Storage Service
Select of the service from the drop-down list. The configuration option varies
depending on the storage service that is selected.
Access Key ID/Account Name/Query ID
Identifies the user who is requesting access this location.
(For this field, Amazon S3 uses Access Key ID, Windows Azure and Fujitsu Cloud
(Windows Azure) use Account Name, and Eucalyptus-Walrus uses Query ID).
Secret Access Key/Secret Key
Because your Access Key is not encrypted, this Secret Access Key is a password
that is used to verify the authenticity of the request to access this location.
Important! This Secret Access Key is crucial for maintaining the security of your
accounts. You should keep your keys and your account credentials in a secure
location. Do not embed your Secret Access Key in a web page or other publicly
accessible source code and do not transmit it over insecure channels.
(For this field, Amazon S3 uses Secret Access Key. Windows Azure, Fujitsu Cloud
(Windows Azure), and Eucalyptus-Walrus use Secret Key).
Proxy Settings
Specifies the proxy server settings. Select Connect using a proxy server to
enable this option. If you select this option, you must also include the IP
address (or machine name) of the proxy server and the corresponding port
number that is used by the proxy server for internet connections. You can also
select this option if your proxy server requires authentication. You then must
provide the corresponding authentication information (Domain
Name\Username and Password) that is required to use the proxy server.
(Proxy capability is not available for Eucalyptus-Walrus).
Bucket Name
All files and folders moved or copied to the cloud vendor are stored and
organized in your buckets (or containers). Buckets are like a container for your
files and are used to group and organize objects together. Every object stored
at the cloud vendor is placed in a bucket.
(For this field, Amazon S3 and Eucalyptus-Walrus use Bucket Name. Windows
Azure and Fujitsu Cloud (Windows Azure) use Container).
Note: For the remainder of this step, all references to Buckets can also be
applied to Containers unless specified.
Enable Reduced Redundancy Storage
For Amazon S3 only, this option lets you select to enable Reduced Redundancy
Storage (RRS). RRS is a storage option within Amazon S3 that helps you reduce
cost by storing non-critical, reproducible data at lower levels of redundancy
than Amazon S3’s standard storage. Both the standard and reduced
redundancy storage options store data in multiple facilities and on multiple
devices, but with RRS the data is replicated fewer times, so the cost is less. You
should expect the same latency and throughput using either the Amazon S3
standard storage or RRS. By default this option is not selected (Amazon S3 uses
the standard storage option).
4. Click Test Connection to verify the connection to the specified cloud location.
5. Click OK.
The cloud account is added to the Console.
After you specify the file copy information to restore, define the copy options for the
selected file copy and content.
With this option selected, the entire root directory path for the files/folders
(including the volume name) is recreated to the destination folder. If the
files/folders to be restored are from the same volume name, then the
destination root directory path does not include that volume name. However, if
the files/folders to be restored are from different volume names, then the
destination root directory path does include the volume name.
For example, if during the backup you captured the files
"C:\Folder1\SubFolder2\A.txt", "C:\Folder1\SubFolder2\B.txt", and also
E:\Folder3\SubFolder4\C.txt" and during the restore you specified to the
restore destination as "D:\Restore".
■ If you select to restore just the "A.txt" file, the destination for the restored
file will be "D:\Restore\ Folder1\SubFolder2\A.txt" (the entire root
directory without the volume name will be recreated).
■ If you select to restore both the "A.txt" and "C.txt" files, the destination for
the restored files will be "D:\Restore\C\Folder1\SubFolder2\A.txt" and
"D:\Restore\E\Folder3\SubFolder4\C.txt" (the entire root directory with
the volume name will be recreated).
4. Specify the encryption password in File Copy Encryption Password.
5. Click Next.
The Restore Summary dialog opens.
During a File Copy, each backed up file is made up of a collection of blocks that define
the particular file. A catalog file is created for every version of the backed up file, along
with the individual blocks that were used for these files. When you need to restore a
particular file, you can browse and select the file you want to restore and the file copy
versions you want to restore from. Then Arcserve UDP collects the version of the blocks
that were used for the file copy of the specified file, which reassembles and restores the
file.
The following flow diagram shows the process of how Arcserve UDP restores a specific
file.
Use the Browse File Copies option to restore from a file copy. This restore method
allows you to browse the file copied data and specify exactly which file you want to
restore.
3. If necessary, you can click Add to browse to an alternate location where your file
copy images are stored.
The Destination dialog opens displaying the available alternate destination options.
Note: The following procedure only applies if you are restoring a file/folder from a file
copy or file archive cloud location.
The available options are Amazon S3, Amazon S3-compatible, Windows Azure, Windows
Azure-compatible, Fujitsu Cloud (Windows Azure), and Eucalyptus-Walrus. (Amazon S3
is the default vendor).
Note: If you are using Eucalyptus-Walrus as your file copy cloud vendor, you will not be
able to copy files whose entire path length is greater than 170 characters.
The configuration options for each cloud vendor are similar (with some different
terminology), and any differences are described.
1. From the Browse File Copies option or the Find Files/Folders to Restore option,
click Add.
The Destination dialog opens.
2. Select Cloud and click Browse.
The Cloud Configuration dialog opens.
3. Enter the following details:
Storage Name
Specifies the name of the cloud storage. This name will be added to Console for
identifying the cloud account. Each cloud account must have a unique storage
name.
Storage Service
Select of the service from the drop-down list. The configuration option varies
depending on the storage service that is selected.
Access Key ID/Account Name/Query ID
Identifies the user who is requesting access this location.
(For this field, Amazon S3 uses Access Key ID, Windows Azure and Fujitsu Cloud
(Windows Azure) use Account Name, and Eucalyptus-Walrus uses Query ID).
Secret Access Key/Secret Key
Because your Access Key is not encrypted, this Secret Access Key is a password
that is used to verify the authenticity of the request to access this location.
Important! This Secret Access Key is crucial for maintaining the security of your
accounts. You should keep your keys and your account credentials in a secure
location. Do not embed your Secret Access Key in a web page or other publicly
accessible source code and do not transmit it over insecure channels.
(For this field, Amazon S3 uses Secret Access Key. Windows Azure, Fujitsu Cloud
(Windows Azure), and Eucalyptus-Walrus use Secret Key).
Proxy Settings
Specifies the proxy server settings. Select Connect using a proxy server to
enable this option. If you select this option, you must also include the IP
address (or machine name) of the proxy server and the corresponding port
number that is used by the proxy server for internet connections. You can also
select this option if your proxy server requires authentication. You then must
provide the corresponding authentication information (Domain
Name\Username and Password) that is required to use the proxy server.
(Proxy capability is not available for Eucalyptus-Walrus).
Bucket Name
All files and folders moved or copied to the cloud vendor are stored and
organized in your buckets (or containers). Buckets are like a container for your
files and are used to group and organize objects together. Every object stored
at the cloud vendor is placed in a bucket.
(For this field, Amazon S3 and Eucalyptus-Walrus use Bucket Name. Windows
Azure and Fujitsu Cloud (Windows Azure) use Container).
Note: For the remainder of this step, all references to Buckets can also be
applied to Containers unless specified.
Enable Reduced Redundancy Storage
For Amazon S3 only, this option lets you select to enable Reduced Redundancy
Storage (RRS). RRS is a storage option within Amazon S3 that helps you reduce
cost by storing non-critical, reproducible data at lower levels of redundancy
than Amazon S3’s standard storage. Both the standard and reduced
redundancy storage options store data in multiple facilities and on multiple
devices, but with RRS the data is replicated fewer times, so the cost is less. You
should expect the same latency and throughput using either the Amazon S3
standard storage or RRS. By default this option is not selected (Amazon S3 uses
the standard storage option).
4. Click Test Connection to verify the connection to the specified cloud location.
5. Click OK.
The cloud account is added to the Console.
After you specify the file copy information to restore, define the copy options for the
selected file copy and content.
With this option selected, the entire root directory path for the files/folders
(including the volume name) is recreated to the destination folder. If the
files/folders to be restored are from the same volume name, then the
destination root directory path does not include that volume name. However, if
the files/folders to be restored are from different volume names, then the
destination root directory path does include the volume name.
For example, if during the backup you captured the files
"C:\Folder1\SubFolder2\A.txt", "C:\Folder1\SubFolder2\B.txt", and also
E:\Folder3\SubFolder4\C.txt" and during the restore you specified to the
restore destination as "D:\Restore".
■ If you select to restore just the "A.txt" file, the destination for the restored
file will be "D:\Restore\ Folder1\SubFolder2\A.txt" (the entire root
directory without the volume name will be recreated).
■ If you select to restore both the "A.txt" and "C.txt" files, the destination for
the restored files will be "D:\Restore\C\Folder1\SubFolder2\A.txt" and
"D:\Restore\E\Folder3\SubFolder4\C.txt" (the entire root directory with
the volume name will be recreated).
4. Specify the encryption password in File Copy Encryption Password.
5. Click Next.
The Restore Summary dialog opens.
Note: When you specify your backup settings, you have an option to create a file catalog
during backup. This file catalog lets you browse the backup sessions faster during
restore. If you choose not to create the catalog during backup, it can still be created at a
later time.
The following flow diagram shows the process of how Arcserve UDP restores a specific
file.
The files and folders in the following table are skipped during a restore if the following
two conditions exist:
■ Files are skipped when such files exist before the restore and the conflict option is
"skip existing files".
■ Files and folders listed in the following table are skipped because they are an
important component for Windows or Arcserve UDP Agent (Windows).
The following files and folders are skipped only when you restore to the original
location.
All Folder specified inAll Folder contains a cached dll file which is
value record under:files/folders( used for System File Checker (SFC) and
HKLM\Software\Mic recursively) contents of the system dll cache directory
rosoft\Windows are rebuilt by using SFC.
NT\CurrentVersion\
WinLogon\SfcDllCac
he
%SystemRoot%\SYST
EM32\dllCache
Root folder of MSCS\* Used for Microsoft Cluster Server.
quorum_device
%SystemRoot%\SYST perf?00?.dat Performance data used by the Windows
EM32\ performance counter.
perf?00?.bak
Use the Find Files/Folders option to restore files and folders. This restore method
allows you to specify exactly which file or folder you want to restore.
3. Select File Copy Location checkbox and click Change to change the location to the
destination where your file copy images are stored.
The Destination dialog opens and you can select Local or network drive or Cloud.
Note: By default, the Backup Location and File Copy Location fields display the
corresponding path used for the most recent backup/file copy destinations.
■ If you select Local or network drive, you can either specify a location or browse
to the location where your file copy images are stored.
■ You can click green arrow validate icon to verify proper access to the source
location.
■ If you select Cloud, you can either specify a cloud location or click the
Configure button to display the Cloud Configuration dialog. For more
information, see Specify Cloud Configuration for Restore (see page 580).
Regardless of whether you selected to restore from Local or network drive or
from Cloud, when you change the destination to an alternate location a pop-up
dialog will appear, asking if you want to perform a new catalog synchronization
or read from the existing catalog.
4. Select the Backup Location checkbox and click Change to change the Backup
Location.
The Source dialog opens where you can select the backup location.
Note: The following procedure only applies if you are restoring a file/folder from a file
copy cloud location.
From the Browse File Copies option or the Find Files/Folders to Restore option, click
the Configure button to display the Cloud Configuration dialog.
Enable Proxy
If you select this option, you must also include the IP address (or machine
name) of the proxy server and the corresponding port number that is used
by the proxy server for internet connections. You can also select this
option if your proxy server requires authentication. You then must provide
the corresponding authentication information (Username and Password)
that is required to use the proxy server.
(Proxy capability is not available for Eucalyptus-Walrus).
After you specify the backup or file copy location, search for the file or folder name to
restore. If a file has multiple file copy versions, all versions are listed and sorted by date
(with the most recent listed first).
After you specify the file or folder to restore, define the restore options for the selected
file or folder.
With this option selected, the entire root directory path for the files/folders
(including the volume name) is recreated to the destination folder. If the
files/folders to be restored are from the same volume name, then the
destination root directory path does not include that volume name. However, if
the files/folders to be restored are from different volume names, then the
destination root directory path does include the volume name.
For example, if during the backup you captured the files
"C:\Folder1\SubFolder2\A.txt", "C:\Folder1\SubFolder2\B.txt", and also
E:\Folder3\SubFolder4\C.txt" and during the restore you specified to the
restore destination as "D:\Restore".
■ If you select to restore just the "A.txt" file, the destination for the restored
file will be "D:\Restore\ Folder1\SubFolder2\A.txt" (the entire root
directory without the volume name will be recreated).
■ If you select to restore both the "A.txt" and "C.txt" files, the destination for
the restored files will be "D:\Restore\C\Folder1\SubFolder2\A.txt" and
"D:\Restore\E\Folder3\SubFolder4\C.txt" (the entire root directory with
the volume name will be recreated).
4. The Encryption Password for file copy destination is loaded automatically. If you
select an alternate destination for the restore, you will need to enter the password
manually.
5. Click Next.
The Restore Summary dialog opens.
■ If the summary information is incorrect, click Previous and go back to the applicable
dialog to change the incorrect setting.
■ If the summary information is correct, click Finish to launch the restore process.
The specified file/folder is restored.
The following diagram illustrates the process to restore from a virtual machine:
Use the Recover VM option to restore a virtual machine that you previously backed up.
This method quickly and consistently creates a virtual machine from an Arcserve UDP
recovery point on an ESX or Hyper-V server. The recovered virtual machine can then
simply be started to complete the recovery process.
The virtual machine and the recovery point to restore are specified.
After you specify the virtual machine and the recovery point to restore, define the
restore options for the selected virtual machine image.
2. Specify the Resolving Conflicts options that Arcserve UDP will perform if conflicts
are encountered during the restore process
Overwrite existing Virtual Machine
This option is to specify whether or not to overwrite the existing virtual
machine. By default, this overwrite option is not selected.
The available option is whether or not to overwrite the existing virtual
machine. By default, this overwrite option is not selected.
Note: For the Overwrite existing Virtual Machine option, an "existing virtual
machine" is defined as a VM which has the same VM name and resides in the
same ESXi host. If there is a VM which has the same VM name but resides in a
different ESXi host (which is under the same vCenter), this overwrite option will
not work. In this case, a VM recovery will fail because a VM with the same
name (including the ESXi host) does not exist, and therefore cannot be
overwritten. This failure is to avoid mistakenly overwrite a VM. To work around
this, you need to either rename the existing VM or use the "Restore to
alternative location" option and specify a different VM name.
■ If you select this option, the restore process overwrites (replaces) any
existing images of this virtual machine that are at the specified restore
destination. The virtual machine image is restored from the backup files
regardless of its current presence on your restore destination.
■ If you do not select this option, and if you restore to the original location,
the VM recovery job will fail if the VM still exists on the original location;
and if you restore to alternative location, the restore process creates a
separate image of this virtual machine and the restore process does not
overwrite any existing images that are at the specified restore destination.
Generate new Virtual Machine instance UUID
This option is to specify whether to generate a new instance UUID for the
restored VM or keep the original instance UUID. For Hyper-V VM, this option is
selected and grayed out because Arcserve UDP always uses new instance UUID
for restored Hyper-V VM.
Note: If you do not select this option, then the original instance UUID will be
set to the restored VM. However, in case the destination vCenter/ESXi already
has a VM with the same instance UUID, new UUID will be used instead and a
warning message is displayed in the activity log of VM recovery job.
3. Specify the Post Recovery option.
Select whether power is applied to the virtual machine at the end of the restore
process. By default, this option is not selected.
During the Recover VM configuration process, you are required to select the option of
where you want to restore the virtual machine to. The available selections are Restore
to the Original Location and Restore to an Alternative Location.
This procedure explains how to restore a virtual machine to the original location.
■ For Hyper-V the Set the credentials for the source Hyper-V Server dialog is
displayed.
Password
Specifies the corresponding password for the User Name.
3. Click OK.
The Restore Summary dialog opens.
During the Restore VM configuration process, specify where the recovered virtual
machine is stored. The available selections are Restore to the Original Location and
Restore to an Alternative Location.
■ For Hyper-V, the Restore Options dialog expands to display additional restore
to alternative options.
If you select the Specify a virtual disk path for each virtual disk option, the
following dialog appears:
Protocol
Specifies the protocol that you want to use for communication with the
destination server. The available selections are HTTP and HTTPS.
Default: HTTPS.
Note: VMware Virtual Disk Development Kit (VDDK) 6.0.1 is in-built with
Arcserve UDP 6.0 but VDDK 6.0.1 does not support HTTP. Make sure to select
HTTPS, unless you manually replace the built-in VDDK 6.0.1 with another
version of VDDK.
Port Number
Specifies the port that you want to use for data transfer between the source
server and the destination.
Default: 443.
■ For Hyper-V, enter the following fields:
Hyper-V Server
Displays the host name or IP address for the destination Hyper-V Server
system.
Username
Specifies the user name that has access rights to log in to the Hyper-V server
where you plan to restore the virtual machine. For Hyper-V cluster VM, specify
the domain account that has administrative privilege of the cluster.
Password
Specifies the corresponding password for the User Name.
Add virtual machine to the cluster
Select the option if you want to add the virtual machine that Arcserve UDP
restores, into the cluster. Consider the following options:
■ If you provide the cluster node name as the Hyper-V server name, the
check box is disabled and checked by default. As a result, the virtual
machine is automatically added into the cluster.
■ If you provide the host name of a Hyper-V server that is part of the cluster
the check box is enabled and you can select to add the virtual machine into
the cluster.
■ If you provide the host name of a standalone Hyper-V server that is not
part of the cluster the check box is disabled and unchecked.
3. When the vCenter/ESX Server Information or Hyper-V Server Information is
specified, click the Connect to this vCenter/ESX Server button or click the Connect
to this Hyper-V Server button.
If the alternative server access credential information is correct, the VM Settings
fields become enabled.
VM DataStore
Specify the destination VM DataStore for the virtual machine recovery or each
virtual disk within the virtual machine.
A virtual machine can have multiple virtual disks and you can specify a different
data store for each virtual disk.
For example:
■ Disk0 can be restored to Datastore1.
■ Disk1 can be restored to Datastore1.
■ Disk2 can be restored to Datastore2.
Important! For VM DataStore, this field only populates if the user has full
VMware system administrator permissions. If the user does not have proper
administrator permissions, Arcserve UDP Agent (Windows) will not continue
the restore process after you connect to the vCenter/ESX Server.
Disk Datastore
Specifies the data store (on ESX server) for each of the virtual disks of the VM
respectively. The default data store of the VM disk file for the ESX server is
shown by default. To assign the virtual disk type, you can select one of the
following options: Thin, Thick Lazy Zeroed, or Thick Eager Zeroed.
Network
Specifies the vSphere Standard Switch/vSphere Distributed Switch
configuration details.
■ For Hyper-V, enter the following fields.
VM Name
Specifies the virtual machine name that you are restoring.
VM Path
Specifies the destination path (on Hyper-V server) where to save the Hyper-V
VM configuration file. The default folder of the VM configuration file for the
Hyper-V server is shown by default. You can modify the path directly in the
field or click Browse to select one.
Note: If you are restoring the virtual machine into Hyper-V cluster and you
want the virtual machine to migrate among the cluster nodes, specify the
cluster shared volume (CSV) for both- the VM path and the virtual disk path.
Specify the same virtual disk path for all virtual disks
Specify one path (on Hyper-V server) where to save all virtual disks of the VM
together. The default folder of the VM disk file for the Hyper-V server is shown
by default. You can modify the path directly in the field or click Browse to
select one.
Note: If you are restoring the virtual machine into Hyper-V cluster and you
want the virtual machine to migrate among the cluster nodes, specify the
cluster shared volume (CSV) for both- the VM path and the virtual disk path.
On the Restore Summary dialog, review the displayed information to verify that all the
restore options and settings are correct.
Introduction
The Exchange Granular Restore utility is used to restore Microsoft Exchange email and
non-email objects. The utility includes the injection capability for items, such as emails,
from offline databases (*.EDB) and log files to the original live Exchange databases, as
well as granular data extraction to Personal Storage File (.pst) files.
Note: For more details on the supported specifications, functionalities, and other
features, see the Exchange Granular Restore user guide (esr.pdf), located at:
http://documentation.arcserve.com/Arcserve-UDP/Available/V6/ENU/Bookshelf_Files/
PDF/udp_esr_guide.pdf
More information:
More information:
How to Restore Microsoft Exchange Data Using Exchange Granular Restore (GRT) Utility
(see page 607)
How to Restore Microsoft Exchange Data Using Exchange Granular Restore (GRT) Utility
Before you begin, review the prerequisites and considerations (see page 606).
Perform the following tasks to restore Microsoft Exchange mailbox items, using the
Exchange Granular Restore utility:
1. From the Arcserve UDP Agent console, select the Mount Recovery Point task
(recommended) or restore the Exchange database to the local drive. The Mount
Recovery Point dialog opens.
2. Select the recovery point date and click Mount for the volume(s) that contain
Exchange Database and logs.
Note: If the server that is running the restore job is not the Exchange or HBBU
proxy, click Change to select the appropriate Recovery Point Server, Data Store, and
Exchange Server.
3. Select the drive letter to mount the volume and click OK.
4. Launch the Exchange Granular Restore utility from one of the following locations:
Start > All Programs > Arcserve > Unified Data Protection > Arcserve UDP Exchange
Granular Restore
or
X:\Program Files\Arcserve\Unified Data Protection\Engine\Exchange GRT\esr.exe
A dialog appears to specify the path for the database and log files.
5. Specify the path to the mounted volume and click Open.
Notes:
■ For more details on the supported specifications, features, user options and
limitations, see the Exchange Granular Restore user guide (esr.pdf), located at:
%ProgramFiles%\Arcserve\Unified Data Protection\Engine\Exchange GRT or
http://documentation.arcserve.com/Arcserve-UDP/Available/V6/ENU/Bookshe
lf_Files/PDF/udp_esr_guide.pdf
■ By default, the utility uses the current user who is logged in to Windows to
establish the connection. If the current user does not have permissions to
impersonate the selected user, an error message appears in the Details pane.
If an error is reported, the recommended action to take is to log in to the
machine with an account that has impersonation rights for the selected user or
the account of the selected user.
7. When the restore job completes, dismount the volume that was used for the
recovery.
To dismount the volume, from the Arcserve UDP Agent console, click Mount
Recovery Point and then click Dismount.
Mailbox Database Level (Microsoft Exchange 2007, 2010, 2013, and 2016)
Specifies if you want to restore a specific Mailbox Database, you can perform a
restore at this level.
Mailbox Level (Microsoft Exchange 2007, 2010, 2013, and 2016)
Defines if you want to restore a specific Mailbox or mail object.
Verify that the following prerequisites exist before performing a Microsoft Exchange
restore:
Database-level restore
■ The target machine has the same name and the same version of Microsoft
Exchange installed.
■ The target database has the same database name and the same storage group
name (Microsoft Exchange 200X) and be a part of the same Microsoft Exchange
organization.
Granular-level restore
■ To restore Microsoft Exchange data, use the Exchange Granular Restore utility.
Use the Browse Recovery Points option to restore from a recovery point. When you
select a recovery date, all the associated recovery points for that date are displayed. You
can then browse and select the Microsoft Exchange database to be restored.
3. Select the recovery point (date and time) and then select the Microsoft Exchange
database to be restored.
The corresponding marker box becomes filled (green) to indicate that the database
has been selected for the restore.
Note: If you do not want the transaction log files to be applied after the restore,
you must manually delete it before the restore is performed. For more information
about manually deleting transaction log files, refer to the Microsoft Exchange
Server documentation.
4. Click Next.
The Restore Options dialog opens.
After you specify a recovery point and content to restore, define the copy options for
the selected recovery point.
■ If the summary information is not correct, click Previous and go back to the
applicable dialog to change the incorrect setting.
■ If the summary information is correct, click Next and then Finish to launch the
restore process.
The Microsoft Exchange Application is restored.
If you select to restore the Microsoft Exchange database to Dump File only location
then Arcserve UDP Agent (Windows) will restore the Microsoft Exchange database
and logs to a specified location.
2. Verify if the Microsoft Exchange Application was restored and check if the database
is mounted and is accessible.
The Microsoft Exchange Application is restored successfully.
The following diagram illustrates the process to restore a Microsoft SQL Server
Application:
When you specify to restore a Microsoft SQL Server application to an alternate location,
you can either restore it to an alternate location on the same machine or on a different
machine.
Prior to performing an Arcserve UDP Agent (Windows) restore of a Microsoft SQL Server
application to an alternate location, you should consider the following:
If alternate location is on the same machine
For this option, you can either restore a database to a new location (with the
same name) or restore with a new name (to the same location):
■ Same Name - New Location
For example, if Database A is installed in the current SQL Server at "C:\DB_A"
and has been backed up. You can use this option and specify "Alternate File
Location" to restore Database A to an alternate location such as
"D:\Alternate_A.
After the database has been restored, the database file located at the new
location "D:\Alternate_A" will then be used.
Important! During restore, if you change the database location but retain the
database name, then the previous database will be deleted after the restore is
complete. The restored database file will be pointed to the new location.
When you restore to an alternate location, the Instance Name section is
unavailable because the Instance Name should always be the same and cannot
be changed. As a result, you cannot restore a database to an alternate instance
that is currently located on the same MS SQL Server.
■ Same Location - New Name
For example, if you have two databases (Database A and Database B) installed
in the current SQL Server and both have been backed up. You can use this
option and specify "New database Name" to restore Database A to same
location as Database A_New.
After the databases have been restored, this location will now have three
databases (Database A, Database B, and Database A_New).
If alternate location is on the different machine
■ The SQL Server installation path must be the same as the path that existed
when the backup was performed.
For example, if the backup of the SQL Server is installed at "C:\SQLServer", then
the SQL Server on the new Arcserve UDP Agent (Windows) server must also be
installed at C:\SQLServer.
■ The same instance name for the database that existed when the backup was
performed must be installed on Arcserve UDP Agent (Windows) server,
otherwise the database associated with that instance will be skipped from the
restore.
For example, if the backup of the SQL Server contained "Instance_1" with
Database A and Database B and "Instance_2" with Database C, but the
Arcserve UDP Agent (Windows) server only has "Instance_1". After the restore
is complete, Database A and Database B will be restored, but Database C will
not be restored.
■ The SQL Server version on the Arcserve UDP Agent (Windows) server must be
backwards compatible to the version of the SQL Server used during the backup
session.
For example, you can restore a SQL Server 2005 machine to a SQL Server 2008
machine; however, you cannot restore a SQL Server 2008 machine to a SQL
Server 2005 machine.
■ Restoring a database of 64-bit instance to 32-bit instance is not supported.
When restoring a Microsoft SQL Server 2012/2014 database that is part of an AlwaysOn
Availability Group (AAG), there are some considerations that you should be aware of.
If the MS SQL database is part of the MS SQL 2012/2014 AlwaysOn Availability
Group (AAG), and restoring to the original location fails, perform the following
tasks:
1. Remove the database to be restored away from the Availability Group. For
more information, see
http://msdn.microsoft.com/en-us/library/hh213326.aspx.
2. Share the backup session to Arcserve UDP Agent (Windows) on every
Availability Group node and then restore the session by Arcserve UDP Agent
(Windows) on every Availability Group node.
3. Add the database back to an Availability Group. For more information, see
http://msdn.microsoft.com/en-us/library/hh213078.aspx.
Use the Browse Recovery Points option to restore from a recovery point. When you
select a recovery date, all the associated recovery points for that date are displayed. You
can then browse and select the Microsoft SQL Server database to be restored.
Note: If you do not want the transaction log files to be applied after the restore,
you must manually delete it before the restore is performed. For more information
about manually deleting transaction log files, refer to the Microsoft SQL Server
documentation.
5. Click Next.
The Restore Options dialog opens.
After you specify a recovery point and content to restore, define the copy options for
the selected recovery point.
Backups can be copied to network locations and they can be used by multiple
SQL Server instances. You can perform a multiple database restore
(simultaneously) from the instance level. From this listing, you can select the
database instance and specify a new database name and alternate location to
restore the database to. In addition, you can also browse to the alternate
location where the database will be restored to.
■ If the summary information is not correct, click Previous and go back to the
applicable dialog to change the incorrect setting.
■ If the summary information is correct, click Finish to launch the restore
process.
The Microsoft SQL Server Application is restored.
3. Shut down the database or the Oracle instance before you begin the restore
process:
SQL> SHUTDOWN IMMEDIATE;
3. Change the state of the database to mount, or nomount, or shutdown before you
restore the tablespaces or datafiles.
SQL> STARTUP MOUNT;
■ To recover a data file, enter the following command at the SQL*Plus prompt
screen:
SQL> RECOVER DATAFILE 'path';
Oracle checks for the archive redo log files that it needs to apply and displays
the names of the files in a sequence.
9. Enter AUTO in the SQL*Plus prompt screen to apply the files.
Oracle applies the log files to restore the data files. After Oracle finishes applying
the redo log file, it displays the following messages:
Applying suggested logfile
Log applied
After each log is applied, Oracle continues to apply the next redo log file until the
recovery is complete.
10. Enter the following command to bring the tablespace online:
SQL> ALTER TABLESPACE "tablespace_name" ONLINE;
3. Change the state of the database to mount, or nomount, or shutdown before you
restore the tablespaces or datafiles.
SQL> STARTUP MOUNT;
■ To recover a data file, enter the following command at the SQL*Plus prompt
screen:
SQL> RECOVER DATAFILE 'path';
Oracle checks for the archive redo log files that it needs to apply and displays
the names of the files in a sequence.
9. Enter AUTO in the SQL*Plus prompt screen to apply the files.
Oracle applies the log files to restore the data files. After Oracle finishes applying
the redo log file, it displays the following messages:
Applying suggested logfile
Log applied
After each log is applied, Oracle continues to apply the next redo log file until the
recovery is complete.
10. Enter the following command to bring the tablespace online:
SQL> ALTER TABLESPACE "tablespace_name" ONLINE;
3. Change the state of the database to mount, or nomount, or shutdown before you
restore the tablespaces or datafiles.
SQL> STARTUP MOUNT;
Oracle checks for the archive redo log files that it needs to apply and displays the
names of the files in a sequence.
9. Enter AUTO in the SQL*Plus prompt screen to apply the files.
Oracle applies the log files to restore the data files. After Oracle finishes applying
the redo log file, it displays the following messages:
Applying suggested logfile
Log applied
After each log is applied, Oracle continues to apply the next redo log file until the
recovery is complete.
Note: If Oracle displays an error indicating that the log file cannot be opened, the
log file may not be available. In such cases, perform the incomplete media recovery
to recover the database again. After all the log files are applied, the database
recovery is complete. For more information about incomplete media recovery, see
the Oracle documentation.
10. Enter the following command to bring the database online:
SQL> ALTER DATABASE OPEN;
Note: If you perform an incomplete media recovery, enter the following command to
change the database to the open state:
3. Change the state of the database to nomount or shutdown before you restore the
control files.
SQL> STARTUP NOMOUNT;
9. Enter the RECOVER command with the USING BACKUP CONTROLFILE clause.
SQL> RECOVER DATABASE USING BACKUP CONTROLFILE
10. (Optional) Specify the UNTIL CANCEL clause to perform an incomplete recovery.
SQL> RECOVER DATABASE USING BACKUP CONTROLFILE UNTIL CANCEL
13. (Optional) Enter the following command to see the names of all of the member of a
group:
SQL>SELECT * FROM V$LOGFILE;
Example: After applying the prompted archived logs, you may see the following
messages:
ORA-00279: change 55636 generated at 24/06/2014 16:59:47 needed for thread 1
14. Specify the full path of the online redo log file and press Enter.
Example: E:\app\Administrator\oradata\orcl\redo01.log
Note: You have to specify the full path multiple times until you get the correct log.
The following messages are displayed:
Log applied
15. Open the database with the RESETLOGS clause after completing the recovery
process.
SQL> ALTER DATABASE OPEN RESETLOGS;
3. Change the state of the database to nomount, or shutdown before you restore the
tablespaces or datafiles.
SQL> STARTUP NOMOUNT;
11. (Optional) Enter the following command to see the names of all of the member of a
group:
SQL>SELECT * FROM V$LOGFILE;
Example: After applying the prompted archived logs, you may see the following
messages:
ORA-00279: change 55636 generated at 24/06/2014 16:59:47 needed for thread 1
12. Specify the full path of the online redo log file and press Enter.
Example: E:\app\Administrator\oradata\orcl\redo01.log
Note: You have to specify the full path multiple times until you get the correct log.
The following messages are displayed:
Log applied
13. Open the database with the RESETLOGS clause after completing the recovery
process.
SQL> ALTER DATABASE OPEN RESETLOGS;
5. Perform one of the following steps depending on the status of the Oracle instance:
■ If the status is Shutdown, then start and open the instance.
SQL> STARTUP;
(Optional) Recover Data from the iSCSI Volume to the Target Machine
If you have stored your data in an iSCSI target volume, you can connect to the iSCSI
volume and recover data. The iSCSI volume lets you manage data and transfer data over
a network.
Verify that you have the latest release of the iSCSI-initiator software installed on your
Backup Server. The initiator software on RHEL systems is packaged as iscsi-initiator-utils.
The initiator software on SLES systems is packaged as open-iscsi.
You can see a block device in the /dev directory of the Backup Server.
You can see an additional device named /dev/sd<x> on the Backup Server.
For example, consider the name of the device is /dev/sdc. This device name is used
to create a partition and a file system in the following steps.
8. Mount the iSCSI volume using the following commands:
# mkdir /iscsi
Note: When you specify the session location in the Restore Wizard, you need to
select Local and enter the path /iscsi.
Example: <path>/iscsi
9. (Optional) Add the following record to the /etc/fstab file so that the iSCSI volume
automatically connects with the Backup Server after you restart the server.
/dev/sdc1 /iscsi ext3 _netdev 0 0
The Backup Server can now connect to the iSCSI volume and can recover data from the
iSCSI volume.
Note: If you have selected Source local as your backup destination, the Backup Server
cannot connect to the Source local directly. To access the Source local, you have to
perform additional configurations.
Now, Source local behaves as an NFS backup storage location and you can restore files
from the share.
3. Select a session from the Session Location drop-down list, if you want to restore
another session, and enter the full path of the share.
For example, consider the Session Location as NFS share, xxx.xxx.xxx.xxx as the IP
address of the NFS share, and the folder name is Data. You would enter
xxx.xxx.xxx.xxx:/Data as the NFS share location.
Note: If the backed up data is stored in Source local, then you must first convert the
source node to an NFS server, and then share the session location.
4. Click Connect.
All the nodes that have been backed up to this location get listed in the Machine
drop-down list.
5. Select the node that you want to restore from the Machine drop-down list.
All the recovery points of the selected node get listed.
6. Apply the date filter to display the recovery points that are generated between the
specified date and click Search.
Default: Recent two weeks.
All the recovery points available between the specified dates are displayed.
7. Select the recovery point that you want to restore and click Add. If the recovery
point is encrypted, enter the encryption password to restore data.
The Browse-<node name> dialog opens.
8. Select the files and folders that you want to restore and click OK.
Note: If you try to locate a file or folder using the Search field, ensure that you
select the highest folder in the hierarchy. The search is conducted on all the child
folders of the selected folder.
The Browse-<node name> dialog closes and you return to the Recovery Points
page. The selected files and folders are listed under Files/Folders to be restored.
9. Click Next.
The Target Machine page opens.
4. Click Next.
The Advanced page opens.
■ To restore to a new node, follow these steps:
1. Select Restore to alternative location on the Target Machine page.
Note: For more information about creating the pre/post scripts, see Manage
Pre/Post Scripts for Automation.
4. Click Next.
The Summary page opens.
Pre/Post scripts let you run your own business logic at specific stages of a running job.
You can specify when to run your scripts in Pre/Post Script Settings of the Backup
Wizard and the Restore Wizard in the UI. The scripts can be run on the Backup Server
depending on your setting.
Managing the pre/post script is a two part process, consisting of creating the pre/post
script and placing the script in the prepost folder.
D2D_JOBID
Identifies the job ID. Job ID is a number provided to the job when you run the
job. If you run the same job again, you get a new job number.
D2D_TARGETNODE
Identifies the node that is being backed up or restored.
D2D_JOBTYPE
Identifies the type of the running job. The following values identify the
D2D_JOBTYPE variable:
backup.full
Identifies the job as a full backup.
backup.incremental
Identifies the job as an incremental backup.
backup.verify
Identifies the job as a verify backup.
restore.bmr
Identifies the job as a bare-metal recovery (BMR). This is a restore job.
restore.file
Identifies the job as a file-level restore. This is a restore job.
D2D_SESSIONLOCATION
Identifies the location where the recovery points are stored.
D2D_PREPOST_OUTPUT
Identifies a temp file. The content of the first line of the temp file is displayed in
the activity log.
D2D_JOBSTAGE
Identifies the stage of the job. The following values identify the D2D_JOBSTAGE
variable:
pre-job-server
Identifies the script that runs on the Backup Server before the job starts.
post-job-server
Identifies the script that runs on the Backup Server after the job
completes.
pre-job-target
Identifies the script that runs on the target machine before the job starts.
post-job-target
Identifies the script that runs on the target machine after the job
completes.
pre-snapshot
Identifies the script that runs on the target machine before capturing the
snapshot.
post-snapshot
Identifies the script that runs on the target machine after capturing the
snapshot.
D2D_TARGETVOLUME
Identifies the volume that is backed up during a backup job. This variable is
applicable for pre/post snapshot scripts for a backup job.
D2D_JOBRESULT
Identifies the result for a post job script. The following values identify the
D2D_JOBRESULT variable:
success
Identifies the result as successful.
fail
Identifies the result as unsuccessful.
D2DSVR_HOME
Identifies the folder where Backup Server is installed. This variable is applicable
for the scripts that run on the Backup Server.
Note: For all scripts, a return value of zero indicates success and a nonzero return value
indicates failure.
All the pre/post scripts for a Backup Server are centrally managed from the prepost
folder at the following location:
/opt/Arcserve/d2dserver/usr/prepost
The pre/post scripts are successfully created and placed in the prepost folder.
3. Select a either CIFS share or RPS server from the Session Location drop-down list.
Note: You cannot select NFS share or Local for restoring host-based agentless
backup sessions.
4. Follow one of the following steps depending on your session location:
For CIFS share
a. Specify the full path of the CIFS share and click Connect.
b. Specify the username and password to connect to the CIFS share and click OK.
All the machines are listed in the Machine drop-down list and an RPS button
appears beside Machine.
c. Select the machine from the drop-down list and click RPS.
The Recovery Point Server Information dialog opens.
d. Provide the RPS details and click Yes.
The dialog Recovery Point Server Information closes. All the recovery points
from the selected machine are displayed below the Date Filter option.
For RPS server
e. Select RPS server and click Add.
The Recovery Point Server Information dialog opens.
f. Provide the RPS details and click Load
g. Select the data store from the drop-down list and click Yes.
The Recovery Point Server Information dialog closes and you see the wizard.
h. Click Connect.
All the machines are listed in the Machine drop-down list.
i. Select the machine from the drop-down list.
All the recovery points from the selected machine are displayed below the
Date Filter option.
5. Apply the date filter to display the recovery points that are generated between the
specified date and click Search.
Default: Recent two weeks.
All the recovery points available between the specified dates are displayed.
6. Select the recovery point that you want to restore and click Add. If the recovery
point is encrypted, enter the encryption password to restore data.
The Browse-<node name> dialog opens.
Important! If you see the warning message, "The files/folders are displayed under
device file. Click for more information." on the Console, refer the following Note for
resolution.
Note: For some complex disk layout, the file system is shown by the device file. The
change in the file system display behavior does not affect the function of
host-based Linux VM file-level restore. You can browse the file system under the
device file. Also, you can use the search function to search specific file or directory.
7. Select the files and folders that you want to restore and click OK.
Note: If you try to locate a file or folder using the Search field, ensure that you
select the highest folder in the hierarchy. The search is conducted on all the child
folders of the selected folder.
The Browse-<node name> dialog closes and you return to the Recovery Points
page. The selected files and folders are listed under Files/Folders to be restored.
8. Click Next.
The Target Machine page opens.
4. Click Next.
The Advanced page opens.
■ To restore to a new node, follow these steps:
1. Select Restore to alternative location on the Target Machine page.
Note: For more information about creating the pre/post scripts, see Manage
Pre/Post Scripts for Automation.
4. Click Next.
The Summary page opens.
Pre/Post scripts let you run your own business logic at specific stages of a running job.
You can specify when to run your scripts in Pre/Post Script Settings of the Backup
Wizard and the Restore Wizard in the UI. The scripts can be run on the Backup Server
depending on your setting.
Managing the pre/post script is a two part process, consisting of creating the pre/post
script and placing the script in the prepost folder.
D2D_JOBID
Identifies the job ID. Job ID is a number provided to the job when you run the
job. If you run the same job again, you get a new job number.
D2D_TARGETNODE
Identifies the node that is being backed up or restored.
D2D_JOBTYPE
Identifies the type of the running job. The following values identify the
D2D_JOBTYPE variable:
backup.full
Identifies the job as a full backup.
backup.incremental
Identifies the job as an incremental backup.
backup.verify
Identifies the job as a verify backup.
restore.bmr
Identifies the job as a bare-metal recovery (BMR). This is a restore job.
restore.file
Identifies the job as a file-level restore. This is a restore job.
D2D_SESSIONLOCATION
Identifies the location where the recovery points are stored.
D2D_PREPOST_OUTPUT
Identifies a temp file. The content of the first line of the temp file is displayed in
the activity log.
D2D_JOBSTAGE
Identifies the stage of the job. The following values identify the D2D_JOBSTAGE
variable:
pre-job-server
Identifies the script that runs on the Backup Server before the job starts.
post-job-server
Identifies the script that runs on the Backup Server after the job
completes.
pre-job-target
Identifies the script that runs on the target machine before the job starts.
post-job-target
Identifies the script that runs on the target machine after the job
completes.
pre-snapshot
Identifies the script that runs on the target machine before capturing the
snapshot.
post-snapshot
Identifies the script that runs on the target machine after capturing the
snapshot.
D2D_TARGETVOLUME
Identifies the volume that is backed up during a backup job. This variable is
applicable for pre/post snapshot scripts for a backup job.
D2D_JOBRESULT
Identifies the result for a post job script. The following values identify the
D2D_JOBRESULT variable:
success
Identifies the result as successful.
fail
Identifies the result as unsuccessful.
D2DSVR_HOME
Identifies the folder where Backup Server is installed. This variable is applicable
for the scripts that run on the Backup Server.
Note: For all scripts, a return value of zero indicates success and a nonzero return value
indicates failure.
All the pre/post scripts for a Backup Server are centrally managed from the prepost
folder at the following location:
/opt/Arcserve/d2dserver/usr/prepost
The pre/post scripts are successfully created and placed in the prepost folder.
A complete BMR is possible because when you back up data, the backup also captures
information related to the operating system, installed applications, drivers, and so on.
You can perform a BMR using the IP address or the Media Access Control (MAC) address
of the target machine. If you boot the target machine using the Arcserve UDP Agent
(Linux) Live CD, you can get the IP address of the target machine.
Note: The Network Interface Card (NIC) name depends on your hardware. For
example, the typical NIC names are eth0 or em0.
4. To configure the static IP of the target machine using the CentOS-based Live CD,
follow these steps:
a. Open a terminal window on the target machine by clicking Applications, System
Tools, Terminal.
b. Run the following commands:
sudo ifconfig <NIC name> <static IP address> netmask <netmask>
Important! Maintain a record of this IP address as it is used in the Restore Wizard when
you have to specify the target machine details.
Important! When you integrate the iSCSI volume with the target machine, you will lose
all the existing data from the iSCSI volume.
You can see a block device in the /dev directory of the target node.
9. Run the following command to obtain the new device name:
#fdisk –l
You can see an additional device named /dev/sd<x> on the target node.
(Optional) Recover Data from the iSCSI Volume to the Target Machine
If you have stored your data in an iSCSI target volume, you can connect to the iSCSI
volume and recover data. The iSCSI volume lets you manage data and transfer data over
a network.
You can see a block device in the /dev directory of the target node.
9. Run the following command to obtain the new device name:
#fdisk –l
You can see an additional device named /dev/sd<x> on the target node.
For example, consider the name of the device is /dev/sdc. This device name is used
to create a partition and a file system in the following steps.
Note: When you specify the session location in the Restore Wizard, you need to
select Local and enter the path /iscsi.
Example: <path>/iscsi
The target machine can now connect to the iSCSI volume and can recover data from the
iSCSI volume.
2. Verify the server from the Backup Server drop-down list in the Backup Server page.
You cannot select any option from the Backup Server drop-down list.
3. Click Next.
The Recovery Points page of the Restore Wizard - BMR opens.
Important! To perform a BMR from a recovery point, the root volume and the boot
volume must be present in the recovery point.
2. Click Connect.
All the nodes that have been backed up to this location get listed in the Machine
drop-down list.
3. Select the node that you want to restore from the Machine drop-down list.
All the recovery points of the selected node get listed.
4. Apply the date filter to display the recovery points that are generated between the
specified date and click Search.
Default: Recent two weeks.
All the recovery points available between the specified dates are displayed.
5. Select the recovery point that you want to restore and click Next.
The Target Machine page opens.
Static IP
Manually configures the IP address. If you select this option, then enter the IP
Address, Subnet Mask, and Default Gateway of the target machine.
Important! Ensure that the Static IP is not used by any other machines on the
network during the restore process.
4. (Optional) Select the Enable instant BMR option so that you can use the target
machine instantly.
When you enable this option, Arcserve UDP Agent (Linux) first recovers all the
necessary data that is required to start the machine. The remaining data are
recovered after the target machine is started. The network connection must be
constantly available during instant BMR.
Example: If you have 100-GB data and you want to perform a BMR and you do not
select this option, first all 100-GB data will be recovered and then you can use the
target machine. However, only around 1-GB data is required to start the machine.
When you enable this option, first the required 1-GB data is recovered so that you
can start and use the machine. After the machine is started, the remaining 99-GB
data is automatically recovered.
Note: The necessary data that is required to start the machine depends on the
operating system configuration. You can also pause or resume the auto recovery of
data if the Do not recover data automatically after machine is started option is not
selected.
5. (Optional) Select the Do not recover data automatically when machine is started
option to stop the automatic recovery of data when the target machine is started.
When you select the Enable instant BMR option, the default behavior is to recover
the necessary data first and start the machine. After the machine starts, the
remaining data gets recovered automatically. If you update any source data during
the recovery, then by selecting this option, the data will be recovered until the
point before they are updated.
6. Click Next.
The Advanced page opens.
Note: For more information about creating the pre/post scripts, see Manage
Pre/Post Scripts for Automation.
3. (Optional) Click Show More Settings to display more settings for BMR.
4. (Optional) Reset the password for the specified user name for the recovered target
machine.
5. (Optional) Enter the full path of the backup storage location of the recovery points
in Recover Point Local Access.
6. (Optional) Enter the full name of the disk in the Disks field to exclude those disks on
the target machine from participating in the recovery process.
7. (Optional) Select Enable Wake-on-LAN if you are performing Preboot Execution
Environment (PXE) BMR.
Note: The Enable Wake-on-LAN option is applicable only for physical machines.
Ensure whether you have enabled the Wake-on-LAN settings in the BIOS settings of
your physical machine.
8. (Optional) Select the Reboot option to automatically restart the target node after
the BMR is complete.
9. Click Next.
The Summary page opens.
Pre/Post scripts let you run your own business logic at specific stages of a running job.
You can specify when to run your scripts in Pre/Post Script Settings of the Backup
Wizard and the Restore Wizard in the UI. The scripts can be run on the Backup Server
depending on your setting.
Managing the pre/post script is a two part process, consisting of creating the pre/post
script and placing the script in the prepost folder.
restore.bmr
Identifies the job as a bare-metal recovery (BMR). This is a restore job.
restore.file
Identifies the job as a file-level restore. This is a restore job.
D2D_SESSIONLOCATION
Identifies the location where the recovery points are stored.
D2D_PREPOST_OUTPUT
Identifies a temp file. The content of the first line of the temp file is displayed in
the activity log.
D2D_JOBSTAGE
Identifies the stage of the job. The following values identify the D2D_JOBSTAGE
variable:
pre-job-server
Identifies the script that runs on the Backup Server before the job starts.
post-job-server
Identifies the script that runs on the Backup Server after the job
completes.
pre-job-target
Identifies the script that runs on the target machine before the job starts.
post-job-target
Identifies the script that runs on the target machine after the job
completes.
pre-snapshot
Identifies the script that runs on the target machine before capturing the
snapshot.
post-snapshot
Identifies the script that runs on the target machine after capturing the
snapshot.
D2D_TARGETVOLUME
Identifies the volume that is backed up during a backup job. This variable is
applicable for pre/post snapshot scripts for a backup job.
D2D_JOBRESULT
Identifies the result for a post job script. The following values identify the
D2D_JOBRESULT variable:
success
Identifies the result as successful.
fail
Identifies the result as unsuccessful.
D2DSVR_HOME
Identifies the folder where Backup Server is installed. This variable is applicable
for the scripts that run on the Backup Server.
Note: For all scripts, a return value of zero indicates success and a nonzero return value
indicates failure.
All the pre/post scripts for a Backup Server are centrally managed from the prepost
folder at the following location:
/opt/Arcserve/d2dserver/usr/prepost
The pre/post scripts are successfully created and placed in the prepost folder.
The following topics are optional configuration settings that you may have to perform
after a BMR:
Configure X Windows
When you perform a BMR across a dissimilar hardware, X Windows of the restored
OS does not function properly and the target node displays an error dialog. The
error dialog appears because the display configuration has changed. To resolve this
error, follow the instructions in the error dialog to configure the graphic card. After
that, you can see the X Windows and the desktop UI.
servername
#hostname -f
servername.domainname.com
When the target machine successfully restarts after the BMR, you can extend the
data volume.
Raw partition volume
For example, a 2-GB disk in the session is restored to a 16-GB disk named
/dev/sdb with only one partition. The /dev/sdb1 raw partition is directly
mounted on the /data directory.
This example is used to explain the procedure of extending Raw partition
volume.
Follow these steps:
1. Check the status of the /dev/sdb1 volume.
# df –h /dev/sdb1
3. Resize /dev/sdb1 to occupy the entire disk space using the fdisk command.
To perform this operation, first delete your existing partition and then recreate
it with the same start sector number. The same start sector number is
responsible for avoiding the data loss.
# fdisk -u /dev/sdb
Selected partition 1
Command action
e extended
The partition changes to the same start sector number as the original partition
and the end sector number is 33554431.
4. Resize the volume using resize2fs command. If necessary, first run the e2fsck
command.
# e2fsck -f /dev/sdb1
# resize2fs /dev/sdb1
5. Mount the volume to the mount point and check the volume status again.
# mount /dev/sdb1 /data
# df –h /dev/sdb1
LV Name /dev/VGTest/LVTest
VG Name VGTest
LV UUID udoBIx-XKBS-1Wky-3FVQ-mxMf-FayO-tpfPl8
LV Status available
# open 1
LV Size 7.88 GB
Current LE 2018
Segments 1
Allocation inherit
---Segments---
Type linear
The physical volume is /dev/sdc1, the volume group is VGTest, and the logical
volume is /dev/VGTest/LVTest or /dev/mapper/VGTest-LVTest.
2. Umount the /dev/mapper/VGTest-LVTest volume.
# umount /lvm
3. Disable the volume group in which the /dev/sdc1 physical volume is located.
# vgchange -a n VGTest
4. Create a partition to occupy the unused disk space using the fdisk command.
# fdisk -u /dev/sdc
Command action
e extended
9. Resize the volume using the resize2fs command. If necessary, first run the
e2fsck command.
# e2fsck -f /dev/mapper/VGTest-LVTest
# resize2fs /dev/mapper/VGTest-LVTest
10. Mount the volume to the mount point and check the volume status again.
# mount /dev/mapper/VGTest-LVTest /lvm
# lvdisplay -m /dev/mapper/VGTest-LVTest
---Logical volume---
LV Name /dev/VGTest/LVTest
VG Name VGTest
LV UUID GTP0a1-kUL7-WUL8-bpbM-9eTR-SVzl-WgA11h
LV Status available
# open 0
LV Size 15.88 GB
Current LE 4066
Segments 2
Allocation inherit
Type linear
Type linear
Note: You can perform Migration BMR with an agent-based backup only. An agentlesss
backup does not support Migration BMR.
You can perform a BMR using the IP address or the Media Access Control (MAC) address
of the target machine. If you boot the target machine using the Arcserve UDP Agent
(Linux) Live CD, you can get the IP address of the target machine.
When the actual machine is ready, you can perform a migration BMR from the
temporary machine to the actual machine.
Note: For more information on performing a BMR, see How to Perform a Bare Metal
Recovery (BMR) for Linux Machines.
The temporary machine is recovered using the BMR, with the instant BMR option
enabled. You can use the temporary machine until the actual machine is ready.
The following diagram illustrates the process for how to perform a BMR using a backup:
■ Dynamic disks are restored at the disk level only. If your data is backed up to a local
volume on a dynamic disk, you cannot to restore this dynamic disk during BMR. In
this scenario, to restore during BMR you must perform one of the following tasks
and then perform BMR from the copied Recovery Point:
– Back up to a volume on another drive.
– Back up to a remote share.
– Copy a recovery point to another location.
Note: If you perform BMR with multiple dynamic disks, the BMR may fail because of
some unexpected errors (such as fail to boot, unrecognized dynamic volumes, and
so on). If this occurs, you should restore only the system disk using BMR, and then
after the machine reboot you can restore the other dynamic volumes on a normal
environment.
■ (Optional) Review the BMR Reference Information. For more information, see the
following topics:
– How Bare Metal Recovery Works (see page 722)
– Operating Systems that Support UEFI/BIOS Conversion (see page 723)
– Managing the BMR Operations Menu (see page 724)
The Bare Metal Recovery process is initiated and the initial BMR wizard screen is
displayed.
The BMR wizard screen allows you to select the type of BMR you want to perform:
■ Restore from an Arcserve UDP backup
Use this option to perform a restore from either a backup destination folder or
a data store.
This option lets you recover data that was backed up using Arcserve UDP Agent
(Windows). This option is used in connection with backup sessions performed
with Arcserve UDP Agent (Windows) or with the Arcserve UDP host-based VM
backup application.
If you select this option, continue this procedure from here.
■ Recover from a virtual machine
Use this option to perform a virtual-to-physical (V2P) restore from a virtual
standby VM. Virtual-to-physical (V2P) is a term that refers to the migration of
an operating system (OS), application programs and data from a virtual
machine or disk partition to a computer's main hard disk. The target can be a
single computer or multiple computers.
5. From the Select a Recovery Point wizard screen, click Browse and select either
Browse from network/local path or select Browse from Recovery Point Server.
a. If you select Browse from network/local path, select the machine (or volume)
which contains recovery points for your backup image.
Arcserve UDP Agent (Windows) lets you recover from any local drive or from a
network share.
■ If you recover from a local backup, the BMR wizard automatically detects
and displays all volumes containing recovery points.
■ If you recover from a remote share, browse to the remote location where
the recovery points are stored. If there are multiple machines containing
recovery points, all machines are displayed.
You may also need access information (User Name and Password) for the
remote machine.
Note: The network must be up and running to browse to remote recovery
points. If necessary, you can check/refresh your network configuration
information or you can load any missing drivers from the Utilities menu.
■ If the BMR module cannot detect any local destination volume, the Select
a Folder dialog automatically displays. Provide the remote share where the
backups are residing.
■ If you are restoring from an iSCSI destination, the BMR module may not
detect this destination and you need to perform the following:
1. Click Utilities, select Run from the pop-up menu, type cmd, and then
click OK.
2. In the command prompt window, use the following Windows iSCSI
commands to set up iSCSI connections:
> net start msiscsi
> iSCSICLI QAddTargetPortal <TargetPortalAddress>
> iSCSICLI QLoginTarget <TargetName > [CHAP username] [CHAP
password]
Note: CHAP = Challenge-Handshake Authentication Protocol
For more information about Windows iSCSI command line options, see
http://www.microsoft.com/en-us/download/details.aspx?id=6408.
Note: Extra steps may be needed depending on the iSCSI target software
being used. For more information, see the manual of the iSCSI target
software.
3. From the BMR screen the disks/volumes connected through the iSCSI
disk should be displayed. The iSCSI disk can now be used as the source
volume or the backup destination volume.
Note: BMR does not support the case where the OS is installed on an iSCSI
disk. Only data disks are supported.
b. If you select Browse the Recovery Point Server, the Select Agent dialog
displays. Provide the Recovery Point Server Host Name, User Name,
Password, Port, and Protocol. Click Connect.
6. Select the folder or Agent Name under Data Store where the recovery points for
your backup are stored and click OK.
The BMR wizard screen now displays the following information:
■ Machine name (in the upper left pane).
■ Related backup information (in the upper right pane).
■ All the corresponding recovery points (in the lower left pane).
Note: For supported operating systems, you can perform a BMR from a backup
performed on a UEFI machine to a BIOS-compatible machine and from a BIOS
machine to a UEFI-compatible machine. See Operating Systems that Support
UEFI/BIOS Conversion (see page 723) for a complete listing of firmware conversion
supported systems.
■ For operating systems that do not support firmware conversion, to
perform BMR for a UEFI system, you must boot the computer in UEFI
mode. BMR does not support restoring a computer with different
firmware. To verify that the boot firmware is UEFI and not BIOS, click
Utilities, About.
■ For operating systems that do support firmware conversion, after you
select a recovery point, if it is detected that the source machine is not the
same firmware as your system, you will be asked if you want to convert
UEFI to a BIOS-compatible system or BIOS to UEFI-compatible system.
Note: The Arcserve UDP Version 5.0 Update 2 only supports BMR to a smaller disk
when the sessions are backed up from Arcserve UDP Version 5.0 Update 2. See the
field Minimum Size Required for the destination disk size. BMR to a smaller disk is
only supported in Advanced Mode.
Notes:
If you are restoring from a Arcserve UDP Recovery Point Server, you are asked to
provide a session password.
If your machine is a Domain Controller, Arcserve UDP Agent (Windows) supports a
nonauthoritative restore of the active directory (AD) database file during BMR. (It
does not support restoring MSCS clusters).
8. Verify the recovery point that you want to restore and click Next.
A BMR wizard screen is displayed with the available recovery mode options.
The Express Mode requires minimal interaction during the recovery process.
The Summary of Disk Restore Settings screen opens, displaying a summary of the
volumes that are going to be restored.
Note: On the bottom of restore summary window, the drive letters listed in
Destination Volume column are automatically generated from the Windows
Preinstallation Environment (WinPE). They can be different from the drive letters
listed in Source Volume column. However, the data is still restored to proper
volume even if drive letters are different.
2. After you have verified that the summary information is correct, click OK.
The restore process starts. The BMR wizard screen displays the restore status for
each volume.
■ Depending upon the size of the volume being restored, this operation can take
some time.
■ During this process you are restoring, block-by-block whatever you had backed
up for that recovery point and creating a replica of the source machine on the
target machine.
3. From the Utilities menu, you can access the BMR Activity Log and you can use the
Save option to save the Activity Log.
By default, the Activity Log is saved to the following location:
X:\windows\system32\dr\log.
Note: To avoid getting a Windows-generated error, do not save the Activity Log on
your desktop or create a folder on your desktop using the Save As option from the
BMR Activity Log window.
4. If you are restoring to dissimilar hardware (the SCSI/FC adapter which used to
connect hard drives could have been changed) and no compatible driver is detected
in your original system, a "driver injection" page is displayed to allow you to provide
drivers for these devices.
You can browse and select drivers to inject to the recovered system so that even if
you are recovering to a machine with dissimilar hardware, you can still bring back
the machine after BMR.
5. When the BMR process is completed, a confirmation notification is displayed.
The Advanced Mode option lets you customize the recovery process.
Important! A red X icon displaying for a source volume in the lower pane indicates
that this volume contains system information and has not been assigned (mapped)
to the target volume. This system information volume from the source disk must be
assigned to the target disk and restored during BMR or the reboot fails.
You can create volumes to a smaller disk based on the suggested Minimum disk
space required. In the example, the original size of the volume is 81568 MB. When
you create the volume on the target disk, the suggested minimum size is 22752 MB.
In this case, you can create the original volume with a size of 22752 MB.
Note: If you perform BMR and you restore the system volume to a disk which is not
configured as the boot disk, it will fail to boot the machine after BMR is completed.
Ensure that you are restoring the system volume to a properly configured boot disk.
Note: When restoring to another disk/volume, the capacity of new disk/volume can
be the same size, larger than original disk/volume, or smaller than the original
disk/volume. In addition, volume resizing is not for dynamic disks.
2. If the current disk information you are seeing does not appear correct, you can
access the Utilities menu and check for missing drivers.
3. If necessary, on the target disk/volume pane you can click the Operations
drop-down menu to display the available options. For more information about
these options, see Managing the BMR Operations Menu (see page 724).
4. Click on each target volume and from the pop-up menu, select the Map Volume
From option to assign a source volume to this target volume.
The Select a Basic Source Volume dialog opens.
5. From Select a Basic Source Volume dialog, click the drop-down menu and select the
available source volume to assign to the selected target volume. Click OK.
■ On the target volume, a checkmark icon is displayed, indicating that this target
volume has been mapped to.
■ On the source volume, the red X icon changes to a green icon, indicating that
this source volume has been assigned to a target volume.
6. When you are sure all volumes that you want to restore and all volumes containing
system information are assigned to a target volume, click Next.
The Submit Disk Changes screen opens, displaying a summary of the selected
operations. For each new volume being created, the corresponding information is
displayed.
7. When you have verified the summary information is correct, click Submit. (If the
information is not correct, click Cancel).
Note: All operations to the hard drive do not take effect until you submit it.
On the target machine, the new volumes are created and mapped to the
corresponding source machine.
9. After you have verified that the summary information is correct, click OK.
The restore process starts. The BMR wizard screen displays the restore status for
each volume.
■ Depending upon the size of the volume being restored, this operation can take
some time.
■ During this process you are restoring, block-by-block whatever you had backed
up for that recovery point and creating a replica of the source machine on the
target machine.
10. From the Utilities menu, you can access the BMR Activity Log and you can use the
Save option to save the Activity Log.
By default, the Activity Log is saved to the following location:
X:\windows\system32\dr\log.
Note: To avoid getting a Windows-generated error, do not save the Activity Log on
your desktop or create a folder on your desktop using the Save As option from the
BMR Activity Log window.
11. If you are restoring to dissimilar hardware (the SCSI/FC adapter which used to
connect hard drives could have been changed) and no compatible driver is detected
in your original system, a "driver injection" page is displayed to allow you to provide
drivers for these devices.
You can browse and select drivers to inject to the recovered system so that even if
you are recovering to a machine with dissimilar hardware, you can still bring back
the machine after BMR.
12. When the BMR process is completed, a confirmation notification is displayed.
Bare Metal Recovery is the process of restoring a computer system from "bare metal"
by reinstalling the operating system and software applications, and then restoring the
data and settings. The most common reasons for performing a bare metal recovery are
because your hard drive either fails or becomes full and you want to upgrade (migrate)
to a larger drive or migrate to newer hardware. Bare metal recovery is possible because
during the block-level backup process, Arcserve UDP Agent (Windows) captures not only
the data, but also all information related to the operating system, installed applications,
configuration settings, necessary drivers, and so on. All relevant information that is
necessary to perform a complete rebuild of the computer system from "bare metal" is
backed up into a series of blocks and stored on the backup location.
Note: Dynamic disks are restored at disk level only. If your data is backed up to a volume
on a dynamic disk, you will not be able to restore this dynamic disk (including all its
volumes) during BMR.
When you perform a bare metal recovery, the Arcserve UDP Agent (Windows) boot disk
is used to initialize the new computer system and allow the bare metal recovery process
to begin. When the bare metal recovery is started, Arcserve UDP Agent (Windows) will
prompt you to select or provide a valid location to retrieve these backed up blocks from,
as well as the recovery point to be restored. You may also be prompted to provide valid
drivers for the new computer system if needed. When this connection and configuration
information is provided, Arcserve UDP Agent (Windows) begins to pull the specified
backup image from the backup location and restore all backed up blocks to the new
computer system (empty blocks will not be restored). After the bare metal recovery
image is fully restored to the new computer system, the machine will be back to the
state that it was in when the last backup was performed, and Arcserve UDP Agent
(Windows) backups will be able to continue as scheduled. (After completion of the BMR,
the first backup will be a Verify Backup).
If it is detected that the operating system of your source machine is not the same
firmware as your system, you will be asked if you want to convert UEFI to a
BIOS-compatible system or BIOS to UEFI-compatible system. The following table lists
each operating system and the type of conversion supported.
Windows 10 x86 No No
Windows 10 x64 Yes Yes
Windows Server 2012 R2 x64 Yes Yes
The BMR Operations menu consists of the following three types of operations:
■ Disk Specific Operations
■ Volume/Partition Specific Operations
■ BMR Specific Operations
Disk Specific Operations:
To perform disk specific operations, select the disk header and click Operations.
Clean Disk
This operation is used to clean all partitions of a disk and is:
■ An alternate method to delete all volumes of a disk. With the Clean Disk
operation, you do not have to delete each volume one by one.
■ Used to delete the non-Windows partitions. Due to a VDS limitation, the
non-Windows partition cannot be deleted from the UI, but you can use this
operation to clean them all.
Note: During BMR, when the destination disk has non-Windows partitions or
OEM partitions, you cannot select this partition and delete it from the BMR UI.
Usually this would occur if you ever installed Linux/Unix on the destination
disk. To resolve this issue, perform one of the following tasks:
■ Select the disk header on the BMR UI, click Operations, and use the Clean
Disk operation to erase all partitions on the disk.
■ Open a command prompt and type Diskpart to open the Diskpart
command console. Then type "select disk x" , where 'x' is the disk number
and "clean" to erase all partitions on the disk.
Convert to MBR
This operation is used to convert a disk to MBR (Master Boot Record). It is
available only when the selected disk is a GPT (GUID Partition Table) disk and
there are no volumes on this disk.
Convert to GPT
This operation is used to convert a disk to GPT. It is available only when the
selected disk is an MBR disk and there are no volumes on this disk.
Convert to Basic
This operation is used to convert a disk to Basic. It is available only when the
selected disk is a Dynamic disk and there are no volumes on this disk.
Convert to Dynamic
This operation is used to convert a disk to Dynamic Disk. It is available only
when the selected disk is a Basic disk.
Online Disk
This operation is used to bring a disk online. It is available only when the
selected disk is in the offline status.
Disk Properties
This operation is used to view detailed disk properties. It is always available and
when you select this operation, a Disk Properties dialog appears.
Volume/Partition Specific Operations:
To perform volume/partition operations, select the disk body area and click
Operations. From this menu, you can create new partitions to correspond to the
disk partitions on the source volume.
Create Primary Partition
This operation is used to create a partition on a basic disk. It is available only
when the selected area is an unallocated disk space.
Create Logical Partition
This operation is used to create a logical partition on a basic MBR disk. It is
available only when the selected area is an extended partition.
Create Extended Partition
This operation is used to create an extended partition on a basic MBR disk. It is
available only when the disk is an MBR disk and the selected area is an
unallocated disk space.
Create System Reserved Partition
This operation is used to create the System Reserved Partition on a BIOS
firmware system and builds a mapping relationship with the source EFI System
Partition. It is only available when you restore a UEFI system to a BIOS system.
Note: If you previously converted from UEFI to a BIOS-compatible system, use
the Create System Reserved Partition operation for destination disk resizing.
Commit
This operation is always available. All of the operations are cached in memory
and they do not modify the target disks until you select the Commit operation.
Reset
This operation is always available. The Reset operation is used to relinquish your
operations and restore the disk layout to the default status. This operation cleans
all of the cached operations. Reset means to reload the source and target disk
layout information from the configure file and current OS, and discard any user
changed disk layout information.
During BMR, Arcserve UDP Agent (Windows) will install drivers for critical unknown
devices. If the device already has a driver installed, Arcserve UDP Agent (Windows) will
not update that driver again. For some devices, Windows 7PE may have the drivers for
them, but these drivers may not be the best ones and this can cause the BMR to run too
slow.
■ Change the device operating mode from "AHCI" (Advanced Host Controller
Interface) to Compatibility mode. (Compatibility mode provides a better
throughput).
If the problem persists, use Live Chat to contact Arcserve support. Live Chat lets you
optimize intelligent conversation between you and the Technical Support team, allowing
you to address your concerns and questions immediately, while still maintaining access
to the product.
After BMR, dynamic volumes are not recognized by the operating system
To remedy this problem, when you perform BMR with multiple dynamic disks, do not
perform any pre-BMR disk operations such as cleaning, deleting volume, and so on.
If the problem persists, use Live Chat to contact Arcserve support. Live Chat lets you
optimize intelligent conversation between you and the Technical Support team, allowing
you to address your concerns and questions immediately, while still maintaining access
to the product.
If you performed BMR to a Hyper-V machine consisting of more than one disk
connected to an Integrated Drive Electronics (IDE) controller and if the server does not
reboot, perform the following troubleshooting procedure:
1. Verify that the disk that contains the system volume is the master disk.
The Hyper-V BIOS searches for the system volume on the master disk (disk 1) which
is connected to the master channel. If the system volume is not located on the
master disk, the VM will not reboot.
Note: Verify that the disk that contains the system volume is connected to an IDE
controller. Hyper-V cannot boot from a SCSI disk.
2. If necessary, modify the Hyper-V settings, to connect the disk that contains the
system volume to the IDE master channel and reboot the VM again.
If the problem persists, use Live Chat to contact Arcserve support. Live Chat lets you
optimize intelligent conversation between you and the Technical Support team, allowing
you to address your concerns and questions immediately, while still maintaining access
to the product.
If you performed BMR to a VMware machine consisting of more than one disk
connected to an Integrated Drive Electronics (IDE) controller or a SCSI adapter and the
server does not reboot, perform the following troubleshooting procedure:
1. Verify that the disk that contains the system volume is the master disk.
The VMware BIOS searches for the system volume on the Master disk (disk 0) which
is connected the master channel. If the system volume is not on the Master disk,
the VM does not reboot.
2. If necessary, modify the VMware settings, to connect the disk that contains the
system volume to the IDE master channel and reboot the VM again.
3. If the disk is a SCSI disk, verify the disk which contains boot volume is the first disk
which connects to the SCSI adapter. If not, assign the boot disk from the VMware
BIOS.
4. Verify the disk which contains boot volume is in the previous eight disks, because
the VMware BIOS only detect eight disks during the boot. If there are more than
seven disks ahead the disk which contains system volumes connected to the SCSI
adapter, the VM cannot boot.
If the problem persists, use Live Chat to contact Arcserve support. Live Chat lets you
optimize intelligent conversation between you and the Technical Support team, allowing
you to address your concerns and questions immediately, while still maintaining access
to the product.
Symptom
When the source machine is an Active Directory server performing a BMR to a physical
machine with different hardware or to a virtual machine on a hyper-v server, the server
does not boot and a blue screen displays with the following message:
STOP: c00002e2 Directory Services could not start because of the following error: a
device attached to the system is not functioning. Error status: 0xc0000001.
Solution
Reboot the system to the BMR PE environment, rename all *.log files in the
C:\Windows\NTDS folder, and restart the system. For example, rename the file edb.log
to edb.log.old and restart the system.
If the problem persists, use Live Chat to contact Arcserve support. Live Chat lets you
optimize intelligent conversation between you and the Technical Support team, allowing
you to address your concerns and questions immediately, while still maintaining access
to the product.
Only one BMR job is supported when restoring from same RPS server for the same node
(Agent backup or Host-Based Backup). This is controlled by the job monitor on the RPS
server.
If the machine where the BMR job is running is shut down or rebooted unexpectedly,
the job monitor at the RPS server side will wait 10 minutes and then time out. During
this time you cannot start another BMR for the same node from the same RPS server.
If you abort the BMR from the BMR UI, this problem does not exist.
If the problem persists, use Live Chat to contact Arcserve support. Live Chat lets you
optimize intelligent conversation between you and the Technical Support team, allowing
you to address your concerns and questions immediately, while still maintaining access
to the product.
To perform a BMR from a virtual machine, use one of the following ways:
■ Connect to the ESX server directly using the IP address
■ Add the correct DNS setting in your BMR machine and resolve the hostname to the
IP address
Complete the following tasks to perform a BMR using a virtual standby VM or Instant
VM:
1. Review the BMR Prerequisites and Considerations (see page 731)
2. Define BMR Options (see page 733)
■ Recover Using a Hyper-V Virtual Standby VM or Instant VM (see page 735)
■ Recover Using a VMware Virtual Standby VM or Instant VM (see page 740)
■ Perform BMR in Express Mode (see page 745)
■ Perform BMR in Advanced Mode (see page 748)
3. Verify that the BMR was Successful (see page 753)
4. BMR Reference Information (see page 721)
5. Troubleshooting BMR Issues (see page 727)
The Bare Metal Recovery process is initiated and the initial BMR wizard screen is
displayed.
The BMR wizard screen allows you to select the type of BMR you want to perform:
■ Restore from an Arcserve Unified Data Protection backup
Use this option to perform a restore from either a backup destination folder or
a data store.
This option lets you recover data that was backed up using Arcserve UDP Agent
(Windows). This option is used in connection with backup sessions performed
with Arcserve UDP Agent (Windows) or with the Arcserve UDP host-based VM
backup application.
For more information, see How to Perform a Bare Metal Recovery Using a
Backup in the online help.
■ Recover from a Virtual Standby VM
Use this option to perform a virtual-to-physical (V2P) restore from a virtual
standby VM or Instant VM. Virtual-to-physical (V2P) is a term that refers to the
migration of an operating system (OS), application programs and data from a
virtual machine or disk partition to a computer's main hard disk. The target can
be a single computer or multiple computers.
Arcserve UDP Agent (Windows) provides the capability to perform Bare Metal Recovery
for virtual-to-physical (V2P) machines. This feature lets you perform virtual-to-physical
recovery from the latest state of a standby or instant virtual machine and helps you
reduce the loss of your production machine.
2. Click Next.
The Select a virtual machine snapshot screen is displayed, with the Hyper-V
Authentication dialog, prompting you for Hyper-V server details.
4. Select the virtual machine that contains the recovery point snapshots for your
backup image.
The backup sessions (recovery point snapshots) for the selected virtual machine are
displayed.
5. Select the virtual machine backup session (recovery point snapshot) that you want
to recover.
The corresponding details for the selected recovery point snapshot (virtual machine
name, backup session name, backed up volumes) are displayed in the right pane.
In addition to selecting one of the listed recovery points, you also have the option
to select the Current State or the Latest State recovery point.
– If the virtual machine that you are recovering from is powered on, the Current
State recovery point is displayed.
Note: If the virtual machine is powered on, then any data changes in the
virtual machine after the BMR process started will not be recovered.
– If the virtual machine that you are recovering from is powered off, the Latest
State recovery point is displayed.
6. Verify this is the recovery point that you want to restore and click Next.
A BMR wizard screen is displayed with the available recovery mode options.
The Arcserve UDP Agent (Windows) provides the capability to perform Bare Metal
Recovery for virtual-to-physical (V2P) machines. This feature lets you perform
virtual-to-physical recovery from the latest state of a standby virtual machine and helps
you reduce the loss of your production machine.
2. Click Next.
The Select a Recovery Point screen is displayed with the ESX/VC Credentials dialog.
4. Select the virtual machine which contains recovery points for your backup image.
The backup sessions (recovery point snapshots) for the selected virtual machine are
displayed.
5. Select the virtual machine backup session (recovery point snapshots) that you want
to recover.
The corresponding details for the selected recovery point snapshot (virtual machine
name, backup session name, backed up volumes, backed up dynamic disks) are
displayed in the right pane.
In addition to selecting one of the listed recovery points, you also have the option
to select the Current State or the Latest State recovery point.
– If the virtual machine that you are recovering from is powered on, the Current
State recovery point is displayed.
Note: If the virtual machine is powered on, then any data changes in the
virtual machine after the BMR process started will not be recovered.
– If the virtual machine that you are recovering from is powered off, the Latest
State recovery point is displayed.
6. Verify this is the recovery point that you want to restore and click Next.
A BMR wizard screen is displayed with the available recovery mode options.
The Express Mode requires minimal interaction during the recovery process.
The Summary of Disk Restore Settings screen opens, displaying a summary of the
volumes that are going to be restored.
Note: On the bottom of restore summary window, the drive letters listed in
Destination Volume column are automatically generated from the Windows
Preinstallation Environment (WinPE). They can be different from the drive letters
listed in Source Volume column. However, the data is still restored to proper
volume even if drive letters are different.
2. After you have verified that the summary information is correct, click OK.
The restore process starts. The BMR wizard screen displays the restore status for
each volume.
■ Depending upon the size of the volume being restored, this operation can take
some time.
■ During this process you are restoring, block-by-block whatever you had backed
up for that recovery point and creating a replica of the source machine on the
target machine.
■ By default, the option to reboot your system automatically after recovery is
selected. If necessary, you can clear this option and you can reboot manually at
a later time.
Important: If you are performing an authoritative restore of an active directory
after a BMR, you must uncheck the option Automatically reboot your system
after recovery and for more information, see How to Perform an Authoritative
Restore of an Active Directory after a BMR.
■ If necessary, you can select Do not start Agent service automatically after
reboot.
■ If necessary, you can cancel or abort the operation at any time.
3. From the Utilities menu, you can access the BMR Activity Log and you can use the
Save option to save the Activity Log.
By default, the Activity Log is saved to the following location:
X:\windows\system32\dr\log.
Note: To avoid getting a Windows-generated error, do not save the Activity Log on
your desktop or create a folder on your desktop using the Save As option from the
BMR Activity Log window.
4. If you are restoring to dissimilar hardware (the SCSI/FC adapter which used to
connect hard drives could have been changed) and no compatible driver is detected
in your original system, a "driver injection" page is displayed to allow you to provide
drivers for these devices.
You can browse and select drivers to inject to the recovered system so that even if
you are recovering to a machine with dissimilar hardware, you can still bring back
the machine after BMR.
5. When the BMR process is completed, a confirmation notification is displayed.
Important! A red X icon displaying for a source volume in the lower pane indicates
that this volume contains system information and has not been assigned (mapped)
to the target volume. This system information volume from the source disk must be
assigned to the target disk and restored during BMR or the reboot fails.
Note: If you perform BMR and you restore the system volume to a disk which is not
configured as the boot disk, it will fail to boot the machine after BMR is completed.
Ensure that you are restoring the system volume to a properly configured boot disk.
Note: When restoring to another disk/volume, the capacity of new disk/volume
must be the same size or larger than original disk/volume. In addition, disk resizing
is for basic disks only, and not for dynamic disks.
2. If the current disk information you are seeing does not appear correct, you can
access the Utilities menu and check for missing drivers.
3. If necessary, on the target disk/volume pane you can click the Operations
drop-down menu to display the available options. For more information about
these options, see Managing the BMR Operations Menu (see page 724).
4. Click on each target volume and from the pop-up menu, select the Map Volume
From option to assign a source volume to this target volume.
The Select a Basic Source Volume dialog opens.
5. From Select a Basic Source Volume dialog, click the drop-down menu and select the
available source volume to assign to the selected target volume. Click OK.
■ On the target volume, a checkmark icon is displayed, indicating that this target
volume has been mapped to.
■ On the source volume, the red X icon changes to a green icon, indicating that
this source volume has been assigned to a target volume.
6. When you are sure all volumes that you want to restore and all volumes containing
system information are assigned to a target volume, click Next.
The Submit Disk Changes screen opens, displaying a summary of the selected
operations. For each new volume being created, the corresponding information is
displayed.
7. When you have verified the summary information is correct, click Submit. (If the
information is not correct, click Cancel).
Note: All operations to the hard drive do not take effect until you submit it.
On the target machine, the new volumes are created and mapped to the
corresponding source machine.
8. When the changes are completed, click OK.
The Summary of Disk Restore Settings screen opens, displaying a summary of the
volumes that are going to be restored.
Note: On the bottom of restore summary window, the drive letters listed in
"Destination Volume" column are automatically generated from the Windows
Preinstallation Environment (WinPE). They can be different from the drive letters
listed in "Source Volume" column. However, the data is still restored to proper
volume even if drive letters are different.
9. After you have verified that the summary information is correct, click OK.
The restore process starts. The BMR wizard screen displays the restore status for
each volume.
■ Depending upon the size of the volume being restored, this operation can take
some time.
■ During this process you are restoring, block-by-block whatever you had backed
up for that recovery point and creating a replica of the source machine on the
target machine.
■ By default, the option to reboot your system automatically after recovery is
selected. If necessary, you can clear this option and you can reboot manually at
a later time.
Important: If you are performing an authoritative restore of an active directory
after a BMR, you must uncheck the option Automatically reboot your system
after recovery and for more information, see How to Perform an Authoritative
Restore of an Active Directory after a BMR.
■ If necessary, you can select Do not start Agent service automatically after
reboot.
■ If necessary, you can cancel or abort the operation at any time.
10. From the Utilities menu, you can access the BMR Activity Log and you can use the
Save option to save the Activity Log.
By default, the Activity Log is saved to the following location:
X:\windows\system32\dr\log.
Note: To avoid getting a Windows-generated error, do not save the Activity Log on
your desktop or create a folder on your desktop using the Save As option from the
BMR Activity Log window.
11. If you are restoring to dissimilar hardware (the SCSI/FC adapter which used to
connect hard drives could have been changed) and no compatible driver is detected
in your original system, a "driver injection" page is displayed to allow you to provide
drivers for these devices.
You can browse and select drivers to inject to the recovered system so that even if
you are recovering to a machine with dissimilar hardware, you can still bring back
the machine after BMR.
12. When the BMR process is completed, a confirmation notification is displayed.
Bare Metal Recovery is the process of restoring a computer system from "bare metal"
by reinstalling the operating system and software applications, and then restoring the
data and settings. The most common reasons for performing a bare metal recovery are
because your hard drive either fails or becomes full and you want to upgrade (migrate)
to a larger drive or migrate to newer hardware. Bare metal recovery is possible because
during the block-level backup process, Arcserve UDP Agent (Windows) captures not only
the data, but also all information related to the operating system, installed applications,
configuration settings, necessary drivers, and so on. All relevant information that is
necessary to perform a complete rebuild of the computer system from "bare metal" is
backed up into a series of blocks and stored on the backup location.
Note: Dynamic disks are restored at disk level only. If your data is backed up to a volume
on a dynamic disk, you will not be able to restore this dynamic disk (including all its
volumes) during BMR.
When you perform a bare metal recovery, the Arcserve UDP Agent (Windows) boot disk
is used to initialize the new computer system and allow the bare metal recovery process
to begin. When the bare metal recovery is started, Arcserve UDP Agent (Windows) will
prompt you to select or provide a valid location to retrieve these backed up blocks from,
as well as the recovery point to be restored. You may also be prompted to provide valid
drivers for the new computer system if needed. When this connection and configuration
information is provided, Arcserve UDP Agent (Windows) begins to pull the specified
backup image from the backup location and restore all backed up blocks to the new
computer system (empty blocks will not be restored). After the bare metal recovery
image is fully restored to the new computer system, the machine will be back to the
state that it was in when the last backup was performed, and Arcserve UDP Agent
(Windows) backups will be able to continue as scheduled. (After completion of the BMR,
the first backup will be a Verify Backup).
If it is detected that the operating system of your source machine is not the same
firmware as your system, you will be asked if you want to convert UEFI to a
BIOS-compatible system or BIOS to UEFI-compatible system. The following table lists
each operating system and the type of conversion supported.
Windows 10 x86 No No
Windows 10 x64 Yes Yes
Windows Server 2012 R2 x64 Yes Yes
The BMR Operations menu consists of the following three types of operations:
■ Disk Specific Operations
■ Volume/Partition Specific Operations
■ BMR Specific Operations
Disk Specific Operations:
To perform disk specific operations, select the disk header and click Operations.
Clean Disk
This operation is used to clean all partitions of a disk and is:
■ An alternate method to delete all volumes of a disk. With the Clean Disk
operation, you do not have to delete each volume one by one.
■ Used to delete the non-Windows partitions. Due to a VDS limitation, the
non-Windows partition cannot be deleted from the UI, but you can use this
operation to clean them all.
Note: During BMR, when the destination disk has non-Windows partitions or
OEM partitions, you cannot select this partition and delete it from the BMR UI.
Usually this would occur if you ever installed Linux/Unix on the destination
disk. To resolve this issue, perform one of the following tasks:
■ Select the disk header on the BMR UI, click Operations, and use the Clean
Disk operation to erase all partitions on the disk.
■ Open a command prompt and type Diskpart to open the Diskpart
command console. Then type "select disk x" , where 'x' is the disk number
and "clean" to erase all partitions on the disk.
Convert to MBR
This operation is used to convert a disk to MBR (Master Boot Record). It is
available only when the selected disk is a GPT (GUID Partition Table) disk and
there are no volumes on this disk.
Convert to GPT
This operation is used to convert a disk to GPT. It is available only when the
selected disk is an MBR disk and there are no volumes on this disk.
Convert to Basic
This operation is used to convert a disk to Basic. It is available only when the
selected disk is a Dynamic disk and there are no volumes on this disk.
Convert to Dynamic
This operation is used to convert a disk to Dynamic Disk. It is available only
when the selected disk is a Basic disk.
Online Disk
This operation is used to bring a disk online. It is available only when the
selected disk is in the offline status.
Disk Properties
This operation is used to view detailed disk properties. It is always available and
when you select this operation, a Disk Properties dialog appears.
Volume/Partition Specific Operations:
To perform volume/partition operations, select the disk body area and click
Operations. From this menu, you can create new partitions to correspond to the
disk partitions on the source volume.
Create Primary Partition
This operation is used to create a partition on a basic disk. It is available only
when the selected area is an unallocated disk space.
Create Logical Partition
This operation is used to create a logical partition on a basic MBR disk. It is
available only when the selected area is an extended partition.
Create Extended Partition
This operation is used to create an extended partition on a basic MBR disk. It is
available only when the disk is an MBR disk and the selected area is an
unallocated disk space.
Create System Reserved Partition
This operation is used to create the System Reserved Partition on a BIOS
firmware system and builds a mapping relationship with the source EFI System
Partition. It is only available when you restore a UEFI system to a BIOS system.
Note: If you previously converted from UEFI to a BIOS-compatible system, use
the Create System Reserved Partition operation for destination disk resizing.
Commit
This operation is always available. All of the operations are cached in memory
and they do not modify the target disks until you select the Commit operation.
Reset
This operation is always available. The Reset operation is used to relinquish your
operations and restore the disk layout to the default status. This operation cleans
all of the cached operations. Reset means to reload the source and target disk
layout information from the configure file and current OS, and discard any user
changed disk layout information.
During BMR, Arcserve UDP Agent (Windows) will install drivers for critical unknown
devices. If the device already has a driver installed, Arcserve UDP Agent (Windows) will
not update that driver again. For some devices, Windows 7PE may have the drivers for
them, but these drivers may not be the best ones and this can cause the BMR to run too
slow.
■ Change the device operating mode from "AHCI" (Advanced Host Controller
Interface) to Compatibility mode. (Compatibility mode provides a better
throughput).
If the problem persists, use Live Chat to contact Arcserve support. Live Chat lets you
optimize intelligent conversation between you and the Technical Support team, allowing
you to address your concerns and questions immediately, while still maintaining access
to the product.
After BMR, dynamic volumes are not recognized by the operating system
To remedy this problem, when you perform BMR with multiple dynamic disks, do not
perform any pre-BMR disk operations such as cleaning, deleting volume, and so on.
If the problem persists, use Live Chat to contact Arcserve support. Live Chat lets you
optimize intelligent conversation between you and the Technical Support team, allowing
you to address your concerns and questions immediately, while still maintaining access
to the product.
If you performed BMR to a Hyper-V machine consisting of more than one disk
connected to an Integrated Drive Electronics (IDE) controller and if the server does not
reboot, perform the following troubleshooting procedure:
1. Verify that the disk that contains the system volume is the master disk.
The Hyper-V BIOS searches for the system volume on the master disk (disk 1) which
is connected to the master channel. If the system volume is not located on the
master disk, the VM will not reboot.
Note: Verify that the disk that contains the system volume is connected to an IDE
controller. Hyper-V cannot boot from a SCSI disk.
2. If necessary, modify the Hyper-V settings, to connect the disk that contains the
system volume to the IDE master channel and reboot the VM again.
If the problem persists, use Live Chat to contact Arcserve support. Live Chat lets you
optimize intelligent conversation between you and the Technical Support team, allowing
you to address your concerns and questions immediately, while still maintaining access
to the product.
If you performed BMR to a VMware machine consisting of more than one disk
connected to an Integrated Drive Electronics (IDE) controller or a SCSI adapter and the
server does not reboot, perform the following troubleshooting procedure:
1. Verify that the disk that contains the system volume is the master disk.
The VMware BIOS searches for the system volume on the Master disk (disk 0) which
is connected the master channel. If the system volume is not on the Master disk,
the VM does not reboot.
2. If necessary, modify the VMware settings, to connect the disk that contains the
system volume to the IDE master channel and reboot the VM again.
3. If the disk is a SCSI disk, verify the disk which contains boot volume is the first disk
which connects to the SCSI adapter. If not, assign the boot disk from the VMware
BIOS.
4. Verify the disk which contains boot volume is in the previous eight disks, because
the VMware BIOS only detect eight disks during the boot. If there are more than
seven disks ahead the disk which contains system volumes connected to the SCSI
adapter, the VM cannot boot.
If the problem persists, use Live Chat to contact Arcserve support. Live Chat lets you
optimize intelligent conversation between you and the Technical Support team, allowing
you to address your concerns and questions immediately, while still maintaining access
to the product.
Symptom
When the source machine is an Active Directory server performing a BMR to a physical
machine with different hardware or to a virtual machine on a hyper-v server, the server
does not boot and a blue screen displays with the following message:
STOP: c00002e2 Directory Services could not start because of the following error: a
device attached to the system is not functioning. Error status: 0xc0000001.
Solution
Reboot the system to the BMR PE environment, rename all *.log files in the
C:\Windows\NTDS folder, and restart the system. For example, rename the file edb.log
to edb.log.old and restart the system.
If the problem persists, use Live Chat to contact Arcserve support. Live Chat lets you
optimize intelligent conversation between you and the Technical Support team, allowing
you to address your concerns and questions immediately, while still maintaining access
to the product.
Only one BMR job is supported when restoring from same RPS server for the same node
(Agent backup or Host-Based Backup). This is controlled by the job monitor on the RPS
server.
If the machine where the BMR job is running is shut down or rebooted unexpectedly,
the job monitor at the RPS server side will wait 10 minutes and then time out. During
this time you cannot start another BMR for the same node from the same RPS server.
If you abort the BMR from the BMR UI, this problem does not exist.
If the problem persists, use Live Chat to contact Arcserve support. Live Chat lets you
optimize intelligent conversation between you and the Technical Support team, allowing
you to address your concerns and questions immediately, while still maintaining access
to the product.
The following diagram illustrates the process to restore clustered nodes and shared
disks:
Follow these steps to restore Microsoft clustered nodes and shared disks:
■ Review the Prerequisites (see page 763)
■ Restore Files of a Cluster Shared Disk (see page 764)
■ Restore a Specific Node in a Cluster (see page 764)
■ Restore a Corrupted Cluster Shared Disk (see page 765)
■ Restore the Entire Clustered Nodes and Shared Disk (see page 765)
Note: After a failover happens, you have to browse the recovery point of a different
agent to find out the desired recovery point.
Note: For quorum disks, rebuild the disk using the cluster management console instead
of recovering it using the Restore Wizard in Arcserve UDP Agent (Windows).
Note: Verify that you have completed the prerequisites and backed up Active Directory
volumes.
a. From the calendar, select Backup date for the Active Directory that you want to
restore.
b. From the Time range, select Backup time.
c. From the Restore Active Directory screen, select Backup Job Type and Backup
Job Name.
d. From the Name section, select an Active Directory backup session to restore.
4. Click Next.
5. Select the following options to further define the objects, path, and attributes to
restore:
a. From the Object column, select the name of an object. The paths related to the
selected object are displayed.
b. From the Path column, select a path. The attributes related to the selected
path are displayed.
Note: You can use the search icon to browse for the path.
c. From the Attribute column, select one or more attributes.
6. Click Next.
The Restore Options screen is displayed.
7. From the Restore Options, select the following objects according to your
requirement:
a. If the selected object was renamed after backup, click the "Restore with
original name of Renamed Objects" option to restore the renamed object.
Note: If you do not select this option, the object will not be restored.
b. If the selected object was moved to another container after backup, click the
"Restore to original location of Moved Objects" option to restore the moved
object.
Note: If you do not select this option, the object will not be restored.
c. If the selected object was deleted permanently after backup, click the "Restore
with the new object ID of Deleted Objects" option to restore the permanently
deleted object.
Note: Using this option helps you keep the restored object with the new object
ID.
8. Click Next.
The Restore Summary screen is displayed
9. Review the details and perform one of the following action:
■ Click Previous, if you want to modify the details.
■ Click Finish to run restore.
A status message is displayed to inform you when the Restore job is completed. If the
restore is unsuccessful, view the logs and try again.
Note: The Active Directory utility is installed automatically with the Active Directory.
Based on how the data store folder resides on the source machine, you can follow one
of the methods to back up deduplication data stores.
The following diagram illustrates how to back up deduplication data stores to a tape.
What To Do Next?
■ Review the Prerequisites (see page 775)
■ Data Store Folders are Remote to the Backup Server (see page 776)
■ Data Store Folders are Local to the Backup Server on a Single Volume (see
page 778)
■ Data Store Folders are Local to the Backup Server on Multiple Volumes (see
page 779)
■ Make sure that you have a valid Arcserve Backup Open File Agent license.
Note: When data store folders reside on a single volume, a single backup session is
created on the Arcserve Tape media. Similarly, when data store folders reside on
multiple volumes, then as many multiple sessions are created on the Arcserve Tape
media.
Data Store Folders are Local to the Backup Server on a Single Volume
When the deduplication data store folders are on the same machine as the Arcserve
Backup server and reside on a single volume, then use this method to back up
deduplication data stores to a tape.
Note: When data store folders reside on a single volume, a single backup session is
created on the Arcserve Tape media. Similarly, when data store folders reside on
multiple volumes, then as many multiple sessions are created on the Arcserve Tape
media.
Data Store Folders are Local to the Backup Server on Multiple Volumes
When the deduplication data store folders are on the same machine as the Arcserve
Backup server but reside on multiple volumes, then use this method to back up
deduplication data stores to a tape.
The following diagram illustrates how to restore AN Arcserve deduplication data store
from a tape:
What To Do Next?
1. Review the Prerequisites (see page 781)
2. Restore From a Tape Media to an Alternate Location (see page 781)
3. Import Restored Data Store to the RPS (see page 782)
After the restore is successful, you can then import the restored data store to the RPS
using Arcserve UDP.
After the restore job is complete, the Arcserve UDP data store files will be displayed at
the location that you specified.
Refer the following items to help you use the PowerShell interface:
■ Update the PowerShell execution policy to allow the scripts to run. For example,
update the execution policy to Set-ExecutionPolicy RemoteSigned.
Note: For more information about changing the execution policy, see the Microsoft
website. https://technet.microsoft.com/en-us/library/ee176961.aspx.
■ Run the following PowerShell command to get the detailed help messages and
examples for the scripts:
Get-Help 'C:\Program Files\Arcserve\Unified Data
Protection\Management\PowerCLI\UDPPowerCLI.ps1' -full
SYNTAX 2
UDPPowerCLI.ps1 -Command <Backup> [-UDPConsoleServerName <String>]
[-UDPConsoleProtocol <{http|https}>] [-UDPConsolePort <int>]
[-UDPConsoleUserName [<String>]] [-UDPConsolePassword <String>]
[-UDPConsolePasswordFile <String>] [-UDPConsoleDomainName <String>]
-planName <String> -nodeName <String> [-backupJobType <String>] [-jobDescription
<String>] [-waitJobFinish <String String>] [-timeOut <int>] [-agentBasedJob
<{true|false} String>] [-backupScheduleType <String>] [<CommonParameters>]
SYNTAX 3
UDPPowerCLI.ps1 -Command <Restore> [-UDPConsoleServerName <String>]
[-UDPConsoleProtocol <String>] [-UDPConsolePort <int>] [-UDPConsoleUserName
<String>] [-UDPConsolePassword <String>] [-UDPConsolePasswordFile <String>]
[-UDPConsoleDomainName <String>] [-UDPAgentServerName <String>]
[-UDPAgentProtocol <String>] [-UDPAgentPort <int>] [-UDPAgentUserName
<String>] [-UDPAgentPassword <String>] [-UDPAgentPasswordFile <String>]
[-UDPAgentDomainName <String>] [-RestoreDirectoryPath <String>]
[-RestoreFilePath <String>] [-BackupSessionNumber <int>] [-VmName <String>]
-RestoreDestination <String> [-RestoreDestinationUserName <String>]
[-RestoreDestinationPassword <String>] [-CreateRootFolder <String>]
[-ChangeFileName <String>] [-ReplaceActiveFilesFlag <String>] [-OverwriteExistFiles
<String>] [<CommonParameters>]
SYNTAX 4
UDPPowerCLI.ps1 -command <RecoverVM> [-UDPConsoleServerName <String>]
[-UDPConsoleProtocol <String>] [-UDPConsolePort <int>] [-UDPConsoleUserName
<String>] [-UDPConsolePassword <String>] [-UDPConsolePasswordFile <String>]
[-UDPConsoleDomainName <String>] [-UDPAgentServerName <String>]
[-UDPAgentProtocol <String>] [-UDPAgentPort <int>] [-UDPAgentUserName
<String>] [-UDPAgentPassword <String>] [-UDPAgentDomainName <String>]
[-UDPAgentPasswordFile <String>] [-BackupSessionNumber <int>]
-RecoverVmName <String> [-OverwriteExistingVM <String>] [-PoweronVM <String>]
[<CommonParameters>]
DESCRIPTION
A utility to connect to the Arcserve UDP Console service, and submit backup and
restore jobs.
PARAMETERS
-Command <String>
Specifies the command that is used. Currently, the following strings are supported:
– CreatePswFile
– Backup
– Restore
– RecoverVM
Required? true
Position? named
Default value
Accept pipeline input? false
Accept wildcard characters? false
-UDPConsoleServerName <String>
Specifies the DNS name of the UDP server (the server where you have installed the
Console) to which you want to connect. If this value is not specified, then the
cmdlet uses the default value, the DNS name of the local machine.
Required? false
Position? named
Default value $env:COMPUTERNAME
Accept pipeline input? false
Accept wildcard characters? false
-UDPConsolePort <int>
Specifies the port number you want to use for the connection. If this value is not
specified, then the cmdlet uses the default value, 8015.
Required? false
Position? named
Default value 8015
Accept pipeline input? false
Accept wildcard characters? false
-UDPConsoleProtocol <String>
Specifies the protocol on the server that you want to use for the connection. The
protocol can be either http or https. If this value is not specified, then the cmdlet
uses the default value, http.
Required? false
Position? named
Default value http
Accept pipeline input? false
Required? false
Position? named
Default value $env:COMPUTERNAME
Accept pipeline input? false
Accept wildcard characters? false
-UDPAgentProtocol <String>
Specifies the internet protocol that you want to use to connect to the UDP agent
server. It can be either http or https. If this value is not specified, then the cmdlet
uses the default value, http.
Required? false
Position? named
Default value http
Accept pipeline input? false
Accept wildcard characters? false
-UDPAgentPort <int>
Specifies the port number that you want to use to connect to the UDP agent server.
If this value is not specified, then the cmdlet uses the default value, 8014.
Required? false
Position? named
Default value 8014
Accept pipeline input? false
Accept wildcard characters? false
-UDPAgentUserName <String>
Specifies the user name that you want to use to connect to the UDP agent server. If
the user name is not specified, then the cmdlet uses the user name currently used
to log into the system.
Required? false
Position? named
Default value $env:UserName
Accept pipeline input? false
Accept wildcard characters? false
-UDPAgentPassword <String>
Specifies the password that you want to use to connect to the UDP agent server.
Required? false
Position? named
Default value
Accept pipeline input? false
Accept wildcard characters? false
-UDPAgentPasswordFile <String>
Specifies the UDP agent password file that you want to use to connect to the UDP
agent server.
Required? false
Position? named
Default value
Accept pipeline input? false
Accept wildcard characters? false
-UDPAgentDomainName <String>
Specifies the domain name where the specified UDP agent user is located.
Required? false
Position? named
Default value
Accept pipeline input? false
Accept wildcard characters? false
-NodeName <String>
Specifies the name of node that you want to back up.
Required? true
Position? named
Default value
Accept pipeline input? false
Accept wildcard characters? false
-RestoreFilePath <String>
Specifies the file that you want to restore.
Required? false
Position? named
Default value
Accept pipeline input? false
Accept wildcard characters? false
-RestoreDirectoryPath <String>
Specifies the directory that you want to restore.
Required? false
Position? named
Default value
Accept pipeline input? false
Accept wildcard characters? false
-BackupSessionNumber <int>
Specifies the session number to use for the restore job.
Required? false
Position? named
Default value
Accept pipeline input? false
Accept wildcard characters? false
-VmName <String>
Specifies the name of a virtual machine for restoring file or directory from its
backup session.
Required? false
Position? named
Default value
Accept pipeline input? false
Accept wildcard characters? false
-RestoreDestination <String>
Specifies the directory path where the files will be restored.
Required? false
Position? named
Default value
Accept pipeline input? false
Accept wildcard characters? false
-RestoreDestinationUserName <String>
Specifies the user name of the destination machine where you want to restore
data. The user name belong to the user who can log in to the destination machine.
Required? false
Position? named
Default value
Accept pipeline input? false
Accept wildcard characters? false
-RestoreDestinationPassword <String>
Specifies the password that you will use to log into the destination machine.
Required? false
Position? named
Default value
Accept pipeline input? false
Accept wildcard characters? false
-CreateRootFolder <String>
Specifies that if a root directory structure exists in the captured backup image,
Arcserve UDP recreates that same root directory structure on the restore
destination path. When this option is not selected, the file or folder is restored
directly to the destination folder. You can use any one of the following strings:
– True
– False
Required? false
Position? named
Default value False
Accept pipeline input? false
Accept wildcard characters? false
-ChangeFileName <String>
Creates a new file if the file name already exists. Selecting this option copies the
source file to the destination with the same filename but a different extension. Data
is then restored to the new file. You can use any one of the following strings:
– True
– False
Required? false
Position? named
Default value False
Accept pipeline input? false
Accept wildcard characters? false
-ReplaceActiveFilesFlag <String>
Replaces any active files after reboot. If during the restore attempt Arcserve UDP
Agent (Windows) discovers that the existing file is currently in use or being
accessed, it will not immediately replace that file, but instead, to avoid any
problems, will delay the replacement of the active files until the next time the
machine is rebooted. (The restore occurs immediately, but the replacement of any
active files is done during the next reboot). This option is only available when the
OverwriteExistingFiles parameter is True. You can use any one of the following
strings:
– True
– False
Required? false
Position? named
Default value False
Accept pipeline input? false
Accept wildcard characters? false
-OverwriteExistingFiles <String>
Overwrites (replaces) any existing files, which are at the restore destination. All
objects are restored from the backup files regardless of their current presence on
your computer. You can use any one of the following strings:
– True
– False
Required? false
Position? named
Default value False
Accept pipeline input? false
Accept wildcard characters? false
-UDPConsoleDomainName <String>
Specifies name of domain where the specified user is located. If this value is not
specified, then the cmdlet uses the domain name of local machine; or the DNS
name of local machine if it is not in a domain.
Required? false
Position? named
Default value
Accept pipeline input? false
Accept wildcard characters? false
-PlanName <String>
Specifies the plan name that defines the backup job setting.
Required? true
Position? named
Default value
Accept pipeline input? false
Accept wildcard characters? false
-BackupJobType <String>
Specifies the type of the backup job. One of the following values can be used: Full
(indicates a Full backup), Incr (indicates an Incremental backup), or Rsyn (indicates a
Resync backup). If you do not provide any value, then the cmdlet uses the default
value, Incr. The following strings are supported:
– Full
– Incr
– Rsyn
Required? false
Position? named
Default value Incr
Accept pipeline input? false
Accept wildcard characters? false
-JobDescription <String>
Specifies the description for the backup job.
Required? true
Position? named
Default value PowerCLIJo
Accept pipeline input? false
Accept wildcard characters? false
-RecoverVmName <String>
Specifies the name of the virtual machine that you want to recover.
Required? true
Position? named
Default value
Accept pipeline input? false
Accept wildcard characters? false
-OverwriteExistingVM <String>
Specifies that if the value is true, the restore job overwrites the existing virtual
machine. The default value is false. You can use any one of the following strings:
– True
– False
Required? false
Position? named
Default value False
Accept pipeline input? false
Accept wildcard characters? false
-PoweronVM <String>
Specifies that if the value is true, the virtual machine is powered on after it is
recovered. The default value is false. You can use any one of the following strings:
– True
– False
Required? false
Position? named
Default value False
Accept pipeline input? false
Accept wildcard characters? false
-waitJobFinish <{true|false} String>
Specifies that if the value is true, the command waits for further instructions until
the backup job is complete. The default value is false. You can use any one of the
following strings:
– True
– False
Required? false
Position? named
Default value False
Accept pipeline input? false
Accept wildcard characters? false
-timeOut <int>
Specifies the maximum waiting time (in seconds) for the backup job to complete.
Required? false
Position? named
Default value 600
Accept pipeline input? false
Accept wildcard characters? false
-agentBasedJob <String String>
Specifies that if true then for two nodes with the same node name, the cmdlet lets
the node that has the agent-based task to submit the backup job. The default value
is False. You can use any one of the following strings:
– True
– False
Required? false
Position? named
Default value False
Accept pipeline input? false
Accept wildcard characters? false
-backupScheduleType <String>
Specifies the repeat schedule for the backup job. The following strings are
supported:
– Daily
– Weekly
– Monthly
Required? false
Position? named
Default value
Accept pipeline input? false
Accept wildcard characters? false
<CommonParameters>
This cmdlet supports the common parameters such as Verbose, Debug,
ErrorAction, ErrorVariable, WarningAction, WarningVariable, OutBuffer, and
OutVariable. For more information, see about_CommonParameters.
INPUTS
OUTPUTS
– 0 or 1
If job is successfully submitted successfully, the command returns 0; otherwise
returns 1.
PowerShell Examples
Example 1
C:\PS>UDPPowerCLI.ps1 -Command CreatePswFile -password myPlainPassword
-passwordFile myPasswordFile
Description
The command encrypts plain passwords that are present in the password file.
Example 2
C:\PS>UDPPowerCLI.ps1 -Command Backup -UDPConsoleUserName myUsr
-UDPConsolePassword myPsw -PlanName myPlan
Description
On the local server, the command connects to the UDP Console service with
HTTP protocol over port 8015, and then submits an Incremental backup job for
the plan named myplan.
Example 3
C:\PS>UDPPowerCLI.ps1 -Command Backup -UDPConsoleUserName myUsr
-UDPConsolePasswordFile myUDPPasswordFile -NodeName myNodeName
Description
On the local server, the command connects to the UDP Console service with
HTTP protocol over port 8015, and then submits an Incremental backup job for
the node named myNodeName.
Example 4
C:\PS>UDPPowerCLI.ps1 -Command Backup -UDPConsoleServerName myServer
-UDPConsoleProtocol https -UDPConsolePort 8018 -UDPConsoleUserName myUsr
-UDPConsolePassword myPsw -UDPConsoleDomainName myDomain -PlanName
myPlan -BackupJobType Full -JobDescription myJob
Description
The command connects to the UDP Console service on the server named
myServer with HTTPS protocol over port 8018, and then submits a Full backup
job for the plan named myPlan, and set the job description as myJob.
Example 5
C:\PS>UDPPowerCLI.ps1 -Command Backup -UDPAgentServerName
yourUDPAgentServer -UDPAgentPasswordFile myUDPAgentPasswordFile -
jobType Incr
Description
The command connects to the UDP agent service on the server named
yourUDPAgentServer with HTTP protocol over port 8014, and then submits an
Incremental backup job for yourUDPAgentServer.
Example 6
C:\PS>UDPPowerCLI.ps1 -Cmd Backup -Svr myServer -Ptc https -Prt 8018 -Usr
myUsr -Psw myPsw -Dmn myDomain -Pln myPlan -Jbt Full -Jbd myJob
Description
The command shortens the Parameter name.
Example 7
C:\PS>UDPPowerCLI.ps1 -Command restore -UDPAgentServerName
yourUDPAgentServer -UDPAgentPasswordFile myUDPAgentPasswordFile
-RestoreDirectoryPath 'c:\Test' -BackupSessionNumber 1
Description
The command connects to the server named yourUDPAgentServer using the
user name of the environment, the default HTTP protocol, and port 8014. It
verifies the backup session number is 1 from the yourUDPAgentServer backup
configuration and then restores the directory to the original location, with the
restore option selected as Overwrite existing files.
Example 8
C:\PS>UDPPowerCLI.ps1 -Command restore -UDPAgentServerName
yourUDPAgentServer -UDPAgentUserName UDPAgentUsername
-UDPAgentPasswordFile myUDPAgentPasswordFile -UDPAgentProtocol 'https'
-UDPAgentPort 8018 -UDPAgentDomainName UDPAgentdomainName
-BackupSessionNumber 1 -RestoreFilePath 'C:\1.txt' -RestoreDestination 'C:\restore'
-RestoreDestinationUserName remoteAccessUser -RestoreDestinationPassword
remoteAccessPsw -CreateBaseFolder 'true'
Description
The command connects to the server named yourUDPAgentServer using the
HTTPS protocol and port 8018. It verifies the backup session number is 1 from
the yourUDPAgentServer backup configuration and then restores the 1.txt file
to an alternate location, with the restore option selected as Overwrite existing
file and create root directory.
Example 9
C:\PS>UDPPowerCLI.ps1 -Command restore -UDPAgentServerName
yourUDPAgentServer -UDPAgentPasswordFile myUDPAgentPasswordFile
-RestoreDirectoryPath 'c:\Test' -BackupSessionNumber 1 -RestoreDestination
'C:\restore' -RestoreDestinationUserName remoteAccessUser
-RestoreDestinationPassword remoteAccessPsw -servername yourUDPServer
-vmname sourceVMName -UDPConsolePasswordFile myUDPPasswordFile
-domainname yourUDPDomainName -OverwriteExistFiles 'true' -CreateRootFolder
'true'
Description
Example 10
C:\PS>UDPPowerCLI.ps1 -Command RecoverVM -UDPAgentServerName
yourUDPAgentServer -UDPAgentPasswordFile myUDPAgentPasswordFile
-BackupSessionNumber 1 -UDPConsoleServerName yourUDPServer
-recovervmname sourceVMName -UDPConsolePasswordFile myUDPPasswordFile
-UDPConsoleDomainName yourUDPDomainName -OverwriteExistingVM 'true'
-PoweronVM 'true'
Description
The command connects to the server named yourUDPAgentServer using the
user name of the environment, the default HTTP protocol, and port 8014. Then,
it connects to the UDP server using the default port 8015 and protocol HTTP to
check the backup session number is 1. Lastly, it recovers the VM to the original
location, with the recover VM option selected as Overwrite existing vm and
power on vm after recovered.
Example 11
C:\PS>UDPPowerCLI.ps1 -Command Backup -UDPAgentServerName myServer
-UDPAgentPassword myPassword -UDPAgentDomainName myDomainName
-UDPAgentUserName myPassword -backupJobType 'incremental'
-backupScheduleType 'weekly' -jobDescription 'PowerCLIJob'
Description
The command submits daily, weekly, or monthly backup job on the UDP Agent.
Example 12
C:\PS>UDPPowerCLI.ps1 -Command Backup -UDPConsoleServerName myServer
-UDPConsolePasswordFile myPasswordFile -UDPConsoleDomainName
myDomainName -nodeName myNodeName -UDPConsoleUserName myAdmin
-backupJobType 'incremental' -jobDescription 'PowerCLIJob' –waitJobFinish 'true'
-timeout 600 -agentBasedJob 'true'
Description
The command submits the backup job and sets the timeout in seconds to wait
for the job to complete.
Environmental Considerations
Installation Consideration
For Domain Controller and DNS servers, as long as the Domain service and DNS service
work properly after they are booted by Instance VM, you can back up the selected
volumes.
Note: If the SharePoint Farm topology is changed, new servers are added to perform
load-balance improvement for SharePoint. You must add the new servers immediately
to the same plan.
8. On the Source tab, add all the nodes that are in the SharePoint Farm environment.
You can manually start the backup job by clicking Backup Now. The backup job on all
SharePoint Farm nodes start. The data is saved to the same data store.
6. Click Next.
7. Specify a location on VMware vSphere or Microsoft Hyper-V to host the instant VM.
For example: Hypervisor Type is VMware vSphere.
8. Click Next.
9. Specify a machine to run instant VM.
22. Select the component that you want to restore for Farm and then click Next.
For example: Back up Web Applications SharePoint – 80. Expand node Microsoft
SharePoint Foundation Web Application and select the component SharePoint – 80
Back up Access Services. Expand node Shared Services Applications under Shared
Services and select the component Access Services 2010
.
28. After the Farm backup job completes, log in to the machine that is Web-Front-End
Servers for the original SharePoint Environment.
29. Open Central Administration, click Backup and Restore, and select the Restore from
a backup link.
30. Provide the Shared Folder on Backup Directory Location field, and click Refresh.
Note: Shared folder is already created in one of the previous steps.
31. Select the backup instance from the history list and click the Next button.
32. Select the configuration and content in the farm to restore, and then click Next.
For example, select all Farm component or SharePoint Services component or Web
Applications component.
The page displays various options for the selected service and content
configuration.
33. Choose whether you want to:
■ Restore content and configuration settings or Restore only configuration
settings
■ Overwrite configuration or create new in restore options.
34. Click the Start Restore button to begin the restore process.
After the restore job is completed, the selected components in Farm are restored.
The content database is now associated with its original web application.
7. Click Add to select the database file that you want to attach.
8. If the mounted volume is Z, select the database data file location as "Z:\Program
Files\Microsoft SQL Server\MSSQL12.MSSQLSERVER\MSSQL\DATA".
9. Select the file named "WSS_Content.mdf" and click OK.
Note: "WSS_Content.mdf" is the default database data file name for SharePoint
Web Application. If you want to restore another database which is created by a new
web application, use the related database data file name.
10. Click the Attach As column to type the database name (Example,
"WSS_Content_Backup") and click OK.
Note: Before you restore a content database, make sure the name of the database
does not exist in any other web application.
11. Log in to the machine which is Web-Front-End Servers in SharePoint Server Farm.
12. Open Central Administration and click Backup and Restore heading.
13. Click the Recover Data from an Unattached Content Database link, and provide the
SQL Server name and database name for the unattached database, and use
Windows authentication.
14. Select the Browse content option and click the Next button.
Note: SQL Server name is the name of database servers used by SharePoint Server
Farm, Database name is the name of the newly attached database.
15. Choose whether to back up the site collection or export the selected site and list.
Note: By default, if the database is unattached content database, then the site
collection URL still includes the central administration web application port number.
b. Select the site collection and provide the file location for the backup
package.
c. Select Overwrite existing file.
Identity: Specifies the URL location to which the Site Collection is restored. (For
example, http://www.contoso.com)
Path: Specifies a valid path of the backup location.(Example,
C:\backup\sitecollection.bak)
GradualDelete: Specifies that the site collection being overwritten with the
Force parameter should be gradually deleted over time by a timer job, instead
of deleting all at once. It reduces the impact on SharePoint 2010 Products and
SQL Server performance.
DatabaseName: Specifies the SQL Server content database where the site
collection data will be stored.
DatabaseServer: Specifies the name of the SQL Server containing the content
database specified by the DatabaseName parameter.
Restore a Site
b. Select the site and provide the file location for the export package.
Example: The name of site to be restored is TestSite1 and the URL is
/TestSite1/.
c. Select the options for security and versions (by default All Versions).
d. Click the Start Export button to begin the export, then the site is exported
to a file.
■ Use PowerShell commands
Click SharePoint Management Shell to launch the console.
a. $database = Get-SPContentDatabase -ConnectAsUnattachedDatabase
-DatabaseName xxxx -DatabaseServer xxxx
ConnectAsUnattachedDatabase: Specifies that only unattached databases in
the farm are returned.
DatabaseName: Specifies the name of the content database.
DatabaseServer: Specifies the name of the host server for the content
database specified in the DatabaseName parameter.
For more details, see the article from Microsoft.
b. Setting object to export
$ExportObject = New-Object Microsoft.SharePoint.Deployment.SPExportObject
$ExportObject.Type =
[Microsoft.SharePoint.Deployment.SPDeploymentObjectType]::Web
$ExportObject.Url = $SiteUrl
$SiteUrl: Specifies the URL location to which the site will be backed up.
c. Configuring Export Settings
$ExportSettings = New-Object
Microsoft.SharePoint.Deployment.SPExportSettings
$ExportSettings.UnattachedContentDatabase = $database
$ExportSettings.SiteUrl = $CAUrl
$CAUrl: Specifies Central Administration Site Url.
$ExportSettings.FileLocation = $ExportPath
$ExportSettings.LogFilePath = $ExportPath
$ExportPath: Specifies the path to save the backup file (for example,
C:\backup).
$ExportSettings.BaseFileName = $ExportFile
$ExportFile: Specifies the filename of the backup file (for example, site.cmp).
$ExportSettings.IncludeVersions =
[Microsoft.SharePoint.Deployment.SPIncludeVersions]::All
$ExportSettings.ExportMethod =
[Microsoft.SharePoint.Deployment.SPExportMethodType]::ExportAll
$ExportSettings.IncludeVersions =
[Microsoft.SharePoint.Deployment.SPIncludeVersions]::All
$ExportSettings.ExportObjects.Add($ExportObject)
$ExportSettings.Validate()
$ExportJob = New-Object
Microsoft.SharePoint.Deployment.SPExport($ExportSettings)
Back up the site to a file.
$ExportJob.Run()
For more details, see the article from Microsoft.
2. Click SharePoint Management Shell to launch the console.
3. Use PowerShell commands to restore the site to the origin location or the new
location.
Import-SPWeb -Identity xxxx -Path xxxx -IncludeUserSecurity:$true
-UpdateVersions:xxxx
Identity: Specifies the URL or GUID of the Web to import into. for example,
http://www.contoso.com.
Path: Specifies the name of the import file. for example, C:\backup\site.cmp’
IncludeUserSecurity: Preserves the user security settings except for SPLists that
have broken inheritance and item level permissions set.
UpdateVersions: Indicates how to resolve situations where a file version to be
imported to a site already exists in that site. You can select one of the following
options:
Add: Adds the file as a new version.
Overwrite: Overwrites the current file and all of its versions (delete then
insert).
Ignore: Ignores the file if it exists on the destination. The new file is not
added.
The default value is Add.
For more details, see the article from Microsoft.
b. Select the site and the list and provide the file location for the export
package.
Example: The name of list/library to be restored is NewList1 and the URL is
/TestSite1/NewList1.
c. Select options for security and versions (by default All Versions).
$ExportSettings.ExportMethod =
[Microsoft.SharePoint.Deployment.SPExportMethodType]::ExportAll
$ExportSettings.IncludeVersions =
[Microsoft.SharePoint.Deployment.SPIncludeVersions]::All
$ExportSettings.ExportObjects.Add($ExportObject)
$ExportSettings.Validate()
$ExportJob = New-Object
Microsoft.SharePoint.Deployment.SPExport($ExportSettings)
d. Back up the list or library to a file.
$ExportJob.Run()
For more details, see the article from Microsoft.
2. Click SharePoint Management Shell to launch the console.
3. Use PowerShell commands to restore the list or library to the origin location or the
new location.
Import-SPWeb -Identity xxxx -Path xxxx -IncludeUserSecurity:$true
-UpdateVersions:xxxx
Identity: Specifies the URL or GUID of the Web to import into. For example,
http://www.contoso.com
Path: Specifies the name of the import file. For example, C:\backup\list.cmp’
IncludeUserSecurity: Preserves the user security settings except for SPLists that
have broken inheritance and item level permissions set.
UpdateVersions: Indicates how to resolve situations where a file version to be
imported to a site already exists in that site. You can select one of the following
options:
Add: Adds the file as a new version.
Overwrite: Overwrites the current file and all of its versions (delete then insert)
Ignore: Ignores the file if it exists on the destination. The new file will not be
added.
The default value is Add.
For more details, see the article from Microsoft.
Restore a File
4. Select the specific version for the file and click Restore.
For example, restore the specific version 1.1 for the file.
4. Ensure the Virtual Machine radio button is selected and click Next.
5. Select the physical NIC that you need to use to connect the virtual switch to other
physical resources on the network and click Next.
6. Assign a Network Label to the virtual switch, and a VLAN ID if necessary, and click
Next.
7. Verify that your virtual switch settings are correct, and click Finish.
When you return to the Networking Configuration tab, you can see that the new
Virtual Switch is added.
3. Click New virtual network, select the type "Private", and then click Add.
4. Type a name for the private virtual network, and click OK.
The new virtual network is added.
Notes:
■ As a prerequisite, install Adobe Flash Player ActiveX (version 10.0 or higher) on
the machine where you have installed the Console to send any
graphic-included report in an email.
■ As a prerequisite, install Microsoft .NET Framework (version 2.0 or higher) on
the machine where you have installed the Console for the Report Chart export
feature to export images in a report successfully.
■ You cannot install Adobe Flash Player in Windows Server 2012 and 2012 R2. To
generate report chart, install Desktop Experience feature in Windows Server
2012 or 2012 R2.
The following image displays the two types of Filters/Actions available on a report page:
Filters
Global and local options contain filters where you can enter data to set report viewing
options. The available options for global filters are similar for all the reports. The
available options for local filters vary for different reports.
Actions
Generate a Report
You can generate predefined reports from the reports tab. You can generate the reports
in the PDF, CSV, and HTML formats.
4. From the drop-down list of the Save button, click CSV, PDF, or HTML.
Note: Large images or more data in a report page may hide some of the options,
including the Save button. To view these options, click the Extend button.
Schedule Emails
Using Arcserve UDP, you can create a schedule to send reports by email to specified
recipients.
Note: Before creating a schedule to send an email, configure the email settings. For
more information about how to configure, see Configure Email and Alert.
You can create a schedule (see page 862), and edit the schedule (see page 864).
Create Schedule
You can add new schedule for the emails report. These report emails are automatically
updated, generated, and sent as scheduled. You can customize the schedule of the
report email messages. The application lets you define the email contents, the reports
to attach, to whom to send the reports, and the date and time to send the report. The
selected reports display detailed information in table format within the email.
Edit Schedule
Using Arcserve UDP, you can update a schedule that you added using Create Schedule
(see page 862).
Note: Before using the Send Report by Email option, configure the Email settings. For
more information about how to configure, see Configure Email and Alert.
Customize Raw Data Size in Managed Capacity Report for Host-based Agentless VM Backup
You can configure the following registries at the proxy level or VM level:
CountNtfsVolumeSize (Arcserve UDP v6), GetVMGuestVolumeUsedSize (Arcserve
UDP v6 Update 1 and later)
Specifies whether to count the used space of all volumes of a VM.
ReportZeroIfHavingNonNtfsVolume
Specifies whether to show 0 if non-NTFS volumes exist. It is ignored if
CountNtfsVolumeSize/GetVMGuestVolumeUsedSize is set to 0.
BackupZeroBlock
Specifies whether to write all-zero data blocks to the backup destination. It is
ignored if CountNtfsVolumeSize/GetVMGuestVolumeUsedSize is set to 1.
■ If CountNtfsVolumeSize/GetVMGuestVolumeUsedSize and
ReportZeroIfHavingNonNtfsVolume are set with the value 1 and the guest OS of
the VM has at least one non-NTFS volume, zero is reported in the Raw Data Size of
Managed Capacity Report for the VM.
Note: BackupZeroBlock is ignored in this case.
Example
A VM has one thin-provision virtual disk with the provisioned size 1000 GB. The size of
the virtual disk’s VMDK file is 800 GB, among which 200 GB data blocks are all-zero data
blocks. In the guest OS of this VM, there are 2 NTFS volumes whose used space are 100
GB and 200 GB respectively, and 1 FAT32 volume with the used space as 1 GB.
The specified control service is added below the Control Services and Scenarios heading
in the left pane. To modify or delete a control service, select the Control Service and
right-click to see the options. You can also select the Control Service in the center pane
and click Actions to modify or delete a Control Service. Or, right-click the control service
in the navigation pane
Note: Expand the control service to see scenarios, groups, and other details.
Manage HA Licenses
Using Arcserve UDP, you can manage Arcserve High Availability licenses from the
Console. If you already have the Arcserve High Availability Control Service license, you
can select the Control and register the license.
Manage Scenarios
Arcserve UDP lets you manage your existing HA scenarios and you can create Full
System scenarios. You can also create scenario groups to organize your scenarios. The
following sections describe how to manage HA scenarios:
■ Manage Scenario Group (see page 871)
■ Create Full System Scenarios (see page 872)
■ Manage Scenarios (see page 874)
■ Edit Scenarios (see page 875)
■ Manage Scenario Hosts (see page 877)
■ Operations on Scenarios (see page 878)
■ BMR and Reverse Replication (see page 880)
■ Monitor Scenarios (see page 881)
Arcserve UDP lets you manage groups in a control service. You can add, rename, delete,
flag, and post comments for a group.
12. Select the data store to store the virtual machine. Optionally, select Allocated and
commit space on demand (Using Dynamic Disk). The generated VM uses thin
provision for its virtual disk if you select this option.
13. Click Next.
The Scenario Properties dialog opens.
14. Expand the properties and modify as desired and then click Next. For more
information, see the Arcserve Replication and High Availability Administrator Guide.
The Master and Replica Properties dialog opens.
15. Review the master and replica properties and then click Click to edit physical
network mappings.
The High Availability Network Adapter Mapping dialog opens.
Note: When there is only one virtual network adapter in both the master and
replica servers, they are mapped automatically.
16. Perform the following steps:
Replica Network Adapter
Click to choose the adapter to map to the adapter listed in the Master Network
Adapter column.
Apply master adapter information
(Default) Select if the Master Adapter is in the DHCP mode.
Customize adapter information
Select to enable the IP, Gateways, DNS Servers, and WINS Servers setting. Add
or remove IP address, Gateways, DNS Servers, and WINS servers as required.
17. Click OK to close the Network Adapter Mappings dialog and then click Next to
continue.
The Switchover Properties dialog opens.
18. Expand the Network Traffic Redirection and other properties to verify the values
and then click Next.
The Switchover and Reverse Replication Initiation dialog opens.
19. Specify the switchover type. For full system scenarios, the reverse replication is
manual.
20. Click Next.
Wait while the Scenario Verification process completes and opens the Scenario
Verification dialog.
If the Scenario Verification process lists any errors, you must resolve them to
continue. If any warnings are listed, you should also resolve them to successfully
continue. After making changes, click Retry to repeat verification.
21. Click Next.
Manage Scenarios
When you select a managed control service from the left pane, all scenarios in the
control service are displayed in the center pane. The scenarios are listed with its type,
state, product, mode. The statistics of RPO/RTO, master spool usage and
synchronization progress are also listed here. You can perform various operations such
as delete, rename, flag, or comment by selecting a scenario.
Edit Scenarios
Arcserve UDP lets you edit scenario properties when the scenario in the stopped state.
You can insert, rename, or delete hosts or modify the topology of a scenario.
To edit network adapter mapping for High Availability or Assured Recovery, perform
the following steps:
1. Select the replica host from the scenario.
2. Click the Properties tab and select Host properties from the drop-down list.
3. Expand Virtual Machine and Virtual Machine Setting.
4. Click Click to edit physical network mappings for either the High Availability
Network Adapter Mapping or Assured Recovery Network Adapter Mapping
property.
The High Availability Network Adapter Mapping dialog opens.
5. Select the replica network adapters to map the master network adapter.
You can customize the adapter information of the replica adapter by including the
IP address, gateway, DNS servers and WINS servers.
6. Click Okay.
The mappings are modified and saved.
Operations on Scenarios
Switchover (or failover) is the process of changing roles between the Master
and Replica. This means, making the Master server the standby server, and the
Replica server the active server.
Recover Active Server
When the switchover process did not complete properly, you could manually
select the server that acts as the active server through a process called Recover
Active Server.
Suspend Is Alive Check
Suspend the Is Alive check that verifies that the active server is operational.
You can manually suspend/resume Is Alive checking for a running HA scenario.
Replica Integrating Testing
The Assured Recovery option enables you to perform a full transparent test of
the recoverability of your data on the Replica server. The Replica server that is
tested is the one that would take over the production server if it is down. The
Assured Recovery option is a true test of the actual server, applications and
actions that will be required in the event the Replica server will have to switch,
become the Active server, and carry out its functions.
Start/Stop VM
Use this operation to start or stop a virtual machine from its latest system
status or from a bookmark. You can start or stop a virtual machine after you
create a scenario and synchronize the master and replica. Use this feature
when the scenario is not running. This feature is available for Full System DR
and HA scenarios. The Start/Stop is a toggle menu item.
Suspend Replication
Suspend replication updates on the Replica host in order to perform system
maintenance or some other form of processing that does not modify the
replicated data there. Changes continue to be recorded for update on the
suspended Replica, but are not actually transferred until replication is resumed.
You cannot suspend replication during synchronization.
Delete all VM resources
When you run a full system scenario, some temporary resources are created
such as disk files, snapshots, and other files. This operation lets you delete
these resources and is available when the scenario is not running.
Restore Data
Recover lost or corrupted Master data from any Replica by activating a
synchronization process in the reverse direction.
Set Rewind Bookmark
Arcserve UDP lets you process BMR and reverse replication for your full system
scenarios.
Monitor Scenarios
Arcserve UDP lets you monitor high availability scenarios by providing various statistics
and reports.
Remote Installation
Arcserve UDP lets you deploy the RHA engine from a managed control service to the
remote hosts. You could also manage the installation and verification from the host list.
Note: Move the mouse on the status to get the details if the installation fails.
Note: For Linux backup servers, the Collect Diagnostic Data option is available only from
the <Site_name> Nodes: Linux Backup Server Groups view.
On successful completion of the job, you will see the data in the shared folder. The
name of the zip file is suffixed with the current timestamp.
-pass <arg> usrPass (If export path is a remote share, user password to access it)
-user <arg> usrName (If export path is a remote share, user name to access it)
You can find the diagnostic information zip file in the remote share.
When you log in to the FTP using ftp://supportftp.arcserve.com, you see the Home
folder. If you create a ticket in Arcserve Zendesk, a sub-folder is created with the ticket
number within the Home folder. For example, if you create a ticket having the ticket
number Ticket-30, a sub-folder named Ticket-30 is created in the Home folder.
ftp://supportftp.arcserve.com/<Arcserve_Zendesk_ID>/Ticket-30
Password: Arc$3rv3
Folder: Ticket-30
Note: For Japanese users, the password is the requester’s email address without the
domain name. For example, if registered email address is [email protected], the password
is abc.
When the ticket is resolved, the FTP server receives a notification. A FTP folder
corresponding to a ticket is available for one month and later gets deleted permanently.
■ Product installation files, hot fixes, and published fixes uploaded are deleted
immediately after the ticket closure. These files are not retained for 30 days as you
can upload them again.
■ Operating system ISOs and Executables of third-party tools uploaded to FTP are
deleted after the closure.
■ In case of a follow-up ticket created for a closed ticket, if support requires logs from
the previous ticket, rename the Ticket-<old ticket number> folder to Ticket-<new
ticket number>.
Follow these steps to upload any files to the Arcserve website using FTP:
1. Either the ticket requester (user) or Arcserve Support agent logs in to Arcserve
Zendesk site and creates a support ticket.
The Arcserve Support agent or the ticket requester selects the check box in the
support ticket and updates the ticket.
An FTP link is automatically generated for the FTP Home folder. The permission is
set exclusively for the requester who opened the ticket.
For example, the following folder is your FTP folder:
ftp://supportftp.arcserve.com/<Arcserve_Zendesk_ID>/<Ticket_number>
2. Once the FTP link is created, Arcserve Zendesk sends an email with the FTP link
along with the login credentials to the ticket requester (user) automatically.
3. The user logs in to the FTP link and uploads the files.
Note: If you face an issue with the FTP access, send an email to
[email protected].
You have successfully completed the process of uploading files to Arcserve FTP
server.
3. Run the following command to learn how to run the batch file:
arcserveAgentSupportInternal.bat -help
BaseOperation loadDefaultValue
3. Run the following command to learn how to run the batch file:
arcserveConsoleSupportInternal.bat -help
BaseOperation loadDefaultValue
Symptom
Arcserve UDP cannot communicate with Windows nodes.
Solution
The following table describe reasons why Arcserve UDP cannot communicate with
Windows nodes and the corresponding corrective action:
Cause Corrective Action
The network was unavailable or unstable Verify that the network is available and
when applying plans. stable, and then try again.
Arcserve UDP can ping the remote node
and remote node can ping back Arcserve
UDP.
The network Admin$ share of the remote Verify the network Admin$ of the remote
node was not available when Arcserve node is available and then try again.
UDP tried to communicate with the node.
The Arcserve UDP Agent (Windows) node Verify that the CPU on the remote
could not handle the load when Arcserve Arcserve UDP Agent (Windows) node is in
UDP tried to communicate with the node. a normal state and then try again.
The Arcserve UDP Agent (Windows) Verify that the Arcserve UDP Agent
service on the remote node was not (Windows) service on the remote node is
running when Arcserve UDP tried to running and then try again.
communicate with the node.
Used a wrong protocol or port to Use the right protocol or port to
communicate with the node. add/update the remote node in the
Arcserve UDP node view.
The Arcserve UDP Agent (Windows) Restart the Arcserve UDP Agent
service was not communicating properly. (Windows) service on the remote node
and then try again.
Symptom
When you configure Gmail accounts, you do not receive email alerts. When you try to
configure the Gmail account for email alerts and click “Send A Test Email”, you receive
one of the following error messages:
or
Solution
1. Provide the correct credentials and try again.
2. Google security blocks Emails from the Gmail account configured outside Google.
To avoid, in the link below modify settings by selecting “Turn ON” to use Access for
less secure apps:
https://www.google.com/settings/security/lesssecureapps
Arcserve UDP Cannot Communicate with the Arcserve UDP Linux Backup Server on Remote Nodes
Symptom
Arcserve UDP cannot communicate with the Arcserve UDP Linux Backup Server on
remote nodes.
Solution
The following table describe reasons why Arcserve UDP cannot communicate with the
Arcserve UDP Linux Backup Server on remote nodes and the corresponding corrective
action:
Cause Corrective Action
The network was unavailable or unstable Verify that the network is available and
when Arcserve UDP tried to communicate stable, and then try again.
with the Linux Backup Server node. Arcserve UDP can ping the remote Linux
Backup Server node and the remote Linux
Backup Server node can ping back
Arcserve UDP.
The Arcserve UDP Linux Backup Server Verify that the CPU on the remote
node could not handle the load when Arcserve UDP Linux Backup Server node is
Arcserve UDP tried to communicate with in a normal state and then try again.
the node.
The Arcserve UDP Linux Backup Server Verify that the Arcserve UDP Linux Backup
service on the remote node was not Server service on the remote node is
running when Arcserve UDP tried to running and then try again.
communicate with the node.
The Arcserve UDP Linux Backup Server Restart the Arcserve UDP Linux Backup
service was not communicating properly. Server service on the remote node and
then try again.
Arcserve UDP Cannot Communicate with the Arcserve UDP Recovery Point Server on Remote Nodes
Symptom
Arcserve UDP cannot communicate with the Arcserve UDP Recovery Point Server on
remote nodes.
Solution
The following table describes reasons why Arcserve UDP cannot communicate with the
Arcserve UDP Recovery Point Server on remote nodes and the corresponding corrective
action:
Cause Corrective Action
The network was unavailable or unstable Verify that the network is available and
when Arcserve UDP tried to communicate stable, and then try again.
with the Recovery Point Server node. Arcserve UDP can ping the remote
Recovery Point Server node and the
remote Recovery Point Server node can
ping back Arcserve UDP.
The network Admin$ share of Arcserve Verify the network Admin$ of Recovery
UDP Recovery Point Server node was not Point Server node is available and then try
available when Arcserve UDP tried to again.
communicate with the node.
The Arcserve UDP Recovery Point Server Verify that the CPU on the remote
node could not handle the load when Recovery Point Server node is in a normal
Arcserve UDP tried to communicate with state and then try again.
the server.
The Arcserve UDP Agent Service, Arcserve Verify that the Arcserve UDP Agent
UDP RPS Data Store Service, or Arcserve Service, Arcserve UDP RPS Data Store
UDP RPS Port Sharing Service on the Service, and Arcserve UDP RPS Port
remote node were not running when Sharing Service on the remote node is
Arcserve UDP tried to communicate with running and then try again.
the node.
Used a wrong protocol or port to Use the right protocol or port to
communicate with the Recovery Point add/update the Recovery Point Server
Server node. node in the Arcserve UDP destination
node view.
The Arcserve UDP Agent Service, Arcserve Restart the Arcserve UDP Agent Service,
UDP RPS Data Store Service, or Arcserve Arcserve UDP RPS Data Store Service, and
UDP RPS Port Sharing Service was not Arcserve UDP RPS Port Sharing Service on
communicating properly. the remote node and then try again.
Arcserve UDP Cannot Communicate with the Arcserve Backup Server on Remote Nodes
Symptom
Arcserve UDP cannot communicate with the Arcserve Backup Server on remote nodes.
Solution
The following table describe reasons why Arcserve UDP cannot communicate with the
Arcserve Backup Server on remote nodes and the corresponding corrective action:
Cause Corrective Action
The network was unavailable or unstable Verify that the network is available and
when Arcserve UDP tried to communicate stable, and then try again.
with the Arcserve Backup Server node. Arcserve UDP can ping the remote
Arcserve Backup Server node and the
remote Arcserve Backup Server node can
ping back Arcserve UDP.
The Arcserve Backup Server node could Verify that the CPU on the remote
not handle the load when Arcserve UDP Arcserve Backup Server node is in a
tried to communicate with the node. normal state and then try again.
The Arcserve Backup Server related Verify that the Arcserve Backup Server on
service on the remote node was not the remote node is running and then try
running when Arcserve UDP tried to again.
communicate with the node.
Used a wrong protocol or port to Use the right protocol or port to
communicate with the <cab> Server node. add/update the Arcserve Backup Server in
the Arcserve UDP destination node view.
The Arcserve Backup Server related Restart the Arcserve Backup Server related
service was not communicating properly. service on the remote node and then try
again.
Symptom
Arcserve UDP cannot communicate with the remote site.
Solution
The following table describe reasons why Arcserve UDP cannot communicate with the
remote site and the corresponding corrective action:
Cause Corrective Action
The network is unavailable or unstable. Verify that the network is available and
stable, and then try again.
Arcserve UDP is reinstalled and the Register the remote site to Arcserve UDP.
remote site is not registered to Arcserve
UDP.
The host name or IP address of Arcserve Register the remote site to Arcserve UDP.
UDP has changed and the remote site is
not registered to Arcserve UDP.
The host name or IP address of the Register the remote site to Arcserve UDP.
remote site has changed and the remote
site is not registered to Arcserve UDP.
Symptom
I installed the console and RPS server on the same machine. The backup was working
fine but after I changed the hostname/IP address of the console, the backup job fails.
Solution
This problem occurs when you have plans assigned to nodes and then you modify the
hostname/IP address of this machine.
To resolve this issue, manually update agent nodes and run the backup job again.
You forgot to add the encryption password for the File Copy destination.
Solution
Failed to Perform Backup of a Virtual Disk. System error=[The device is not ready(21)]
Symptom
When a network error occurs or a Hyper-V server is rebooted while the backup is in
progress, the activity log specifies that the error can be a network error or a file system
error.
Solution
Restart the backup job again after the Hyper-V server restarts.
Symptom
A backup job failed with the following error message in the activity logs:
Reconfiguration for backup cannot be performed in the current state. Shut down the virtual machine and attempt to
run backup job again. (The virtual machine can be powered on during or after the taking snapshot phase).
Solution
Set the registry values to not reconfigure disk.enableUUID.
Applies at the proxy level and all the VMware VMs are impacted.
1. Log in to the Backup proxy server.
2. Open the registry editor and locate the following key:
HKEY_LOCAL_MACHINE\SOFTWARE\Arcserve\Unified Data Protection\Engine\AFBackupDll
Note: Replace <VM-InstanceUUID> with the UUID value of the virtual machine
which this setting applies for. You can find the value in the URL of the virtual
machine that is used when connected to the Arcserve UDP Agent.
6. Add a DWORD value with name DoNotReconfigDiskUUID and specify 1 as its
value.
Be aware of the following points:
■ The VM level takes precedence if both VM and proxy level registries are
configured.
■ If the registry does not exist, the registry value implies 0, that is, you have to
reconfigure disk.enableUUID.
■ If you specified not to reconfigure the disk.EnableUUID parameter, the backed
up data may not be in a consistent state.
For more information about this issue, see the VMware Knowledge Base article.
Symptom
I have two consoles, Console A and Console B. I add a recovery point server (RPS) to
Console A and create a plan for the RPS. Then I add the RPS to Console B. Now this RPS
is managed by Console B. But when i update the agent node from Console A that is
backed up to the RPS, I get the following error:
Unable to apply 'backup settings' to node. (Failed to find the Arcserve UDP Recovery Point Server plan on this
server.)
Solution
To avoid this error, follow these steps:
1. Select the plan from Console A,
2. From the center pane, click Actions, and then select Deploy Now.
The plan gets redeployed and the backup settings are applied to the node.
Symptom
The full, incremental, and verify backup jobs fail. The following message appears in the
Arcserve UDP Activity Log:
Solution
Due to a VMware limitation, virtual machines running on ESXi servers with a free license
cannot be backed up. To protect these VMs, apply a purchased license.
Plan Deployment Fails after Changing Password of Agentless Backup Proxy Machine
Symptom
If the Console and the proxy server are different machines, then after changing the
password of the proxy machine, the plan redeployment fails. The error message says
credentials are not correct.
Solution
Follow these steps to resolve the issue:
1. From the node view in Console, update the proxy server with new credentials.
a. From the left pane, navigate to Nodes and click All Nodes.
b. Right-click the node and select Update to update the proxy server.
2. If the RPS and proxy server are the same machine, update the RPS with new
credentials.
a. From the left pane, navigate to Destinations and click Recovery Point Servers.
b. Right-click the RPS from the center pane and select Update.
3. Restart Arcserve UDP Agent Service in the proxy machine.
4. Redeploy the plan.
If Arcserve UDP Agent (Windows) nodes are not removed from the Arcserve UDP UI
before uninstalling the Arcserve UDP console, the settings will be disabled when
opening the agent UI on those Arcserve UDP Agent (Windows) nodes.
Symptom
The Arcserve UDP Agent (Windows) node is not notified that the Arcserve UDP Console
is uninstalled. It assumes it is managed.
Solution
If the problem persists, use Live Chat to contact Arcserve support. Live Chat lets you
optimize intelligent conversation between you and the Technical Support team, allowing
you to address your concerns and questions immediately, while still maintaining access
to the product.
Pause and Resume Fails when Agent Is Not Connected to the Network
Symptom
If the agent is not connected to the network and I try to pause a plan, the plan is not
paused. Similarly, if the agent is not connected to the network and I try to resume a
plan, the plan is not resumed.
Solution
You can resolve this issue by manually updating the node from the Console.
Symptom 1:
The Arcserve UDP Agent Service on Arcserve UDP Agent systems runs slowly. You can
detect other symptoms such as:
■ The Arcserve UDP Agent Service stops responding or occupies 100 percent of the
CPU resources.
■ Arcserve UDP Agent nodes perform poorly or cannot communicate with the web
service.
Solution 1:
In various environmental configurations, you can discover that the Arcserve UDP Agent
Service occupies too much CPU time, or the response is slow. By default, Tomcat is
configured to allocate a limited amount of memory to the nodes, which may not be
suitable for your environment. To verify this problem, review the following log files:
<D2D_home>\TOMCAT\logs\casad2dwebsvc-stdout.*.log
<D2D_home>\TOMCAT\logs\casad2dwebsvc-stder.*.log
<D2D_home>\TOMCAT\logs\catalina.*.log
<D2D_home>\TOMCAT\logs\localhost.*.log
java.lang.OutOfMemoryError
Note: You may need to increase the value of -XX:MaxPermSize to suit your
environment.
■ If the message in the log file is one of the following:
java.lang.OutOfMemoryError: Java heap space
java.lang.OutOfMemoryError: GC overhead limit exceeded
Symptom 2
Solution 2
When you configure the MAX value as 20 or less than 20 for concurrent backups, do the
following:
1. Increase the value of the following DWORD:
JvmMx=256
When you configure the MAX value as more than 20 but less than 50 for concurrent
backups, do the following:
3. Increase the value of the following DWORD:
JvmMx=512
Symptom
The Copy to Tape job did not run for some media error and you want to rerun the job.
Solution
You can control the number of retry jobs and the time interval of retry jobs for the Copy
to Tape task using the following two registry keys. Both the registry keys are in the
machine where you have installed Arcserve Backup Server:
NumberOfRetryCopyToTapeJob
If one Copy to Tape job fails, Arcserve UDP retries the failed job. The retry number
is configured using the NumberOfRetryCopyToTapeJob registry key. But if the
to-copy node or recovery point information is changed in the job, Arcserve UDP
resets the accumulated failed number as 0. It means once the to-copy node or
recovery point information is changed in the job, the Copy to Tape job can be run
without being limited by the retry number. Also, if Arcserve Backup web service is
restarted, Arcserve UDP resets the accumulated failed number as 0.
The registry key is located in the Arcserve Backup Server at the following location:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\ComputerAssociates\CA
ARCServe Backup\WebServiceInfo\NumberOfRetryCopyToTapeJob
Type is DWORD.
Default: 1
TimeIntervalOfRetryCopyToTapeJob
Controls the time interval of retry for the failed Copy to Tape job. This registry key is
used in association with NumberOfRetryCopyToTapeJob.
The registry key is located in the Arcserve Backup Server at the following location:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\ComputerAssociates\CA
ARCServe Backup\WebServiceInfo\TimeIntervalOfRetryCopyToTapeJob
Type is DWORD.
Default: 1 hour
Instant VM Related
This section includes the following troubleshooting topics related to Instant Virtual
Machine:
■ Failed to Create an Instant VM in VMware Due to Duplicate NFS Datastore Name
(see page 910)
■ Failed to Create an Instant VM with Windows 2008 as the Recovery Server for
VMware or Windows 2008 R2 Hyper-V Server (see page 911)
■ Instant VM Job Fails Due to Windows NFS Service Error (see page 911)
■ Instant VM File Folder cannot be Accessed or Deleted even with Administrator
Privilege (see page 912)
■ Instant Virtual Machine Fails to Boot in Hyper-V After Restarting the Recovery
Server (see page 912)
■ Failed to Create VMware NFS Datastore and Displayed Unable to Resolve Hostname
Error (see page 912)
■ Fail to Deploy Integration service to Guest VM in Hyper-V (see page 914)
Symptom
The reason for this error could be that an NFS datastore with the same name already
exist and it is not removed, or the vCenter/Host still has references of the NFS datastore
in its records. However, when you log into the host directly you see an NFS datastore.
This datastore is most likely marked as inactive and greyed out.
Solution
To resolve this issue, log in to the ESX host and remove the NFS datastore.
Restart the management agents on that ESX host using the following command:
/sbin/services.sh restart
For more information on working on the ESX host, see the VMware documentation.
Failed to Create an Instant VM with Windows 2008 R2 as the Recovery Server for VMware or Windows 2008
R2 Hyper-V Server
Symptom
The instant VM creation fails and the following error is seen in the job activity log:
Windows cannot verify the digital signature for this file. A recent hardware or
software change might have installed a file that is signed incorrectly or damaged, or
that might be malicious software from an unknown source.
Solution
This Instant VM fails to get created because the driver of the Instant VM is signed with a
secured digital certificate that cannot be supported on Windows 2008 R2, until you
apply a patch from Microsoft.
Apply the Microsoft patch 3033929 and try to create Instant VM again.
Symptom
When the Instant VM Recovery Server has Arcserve UDP Agent and Arcserve Backup
both installed, then when you create an Instant VM to VMware ESX(i) server, the
Window NFS service does not start and the Instant VM job fails.
Solution
The reason the Windows NFS service fails to start because the default port number of
the Windows NFS service is 111 and it is used by Arcserve Backup service Remote
Procedure Call Server.
To resolve this issue, change the default port number of the Arcserve Backup service
Remote Procedure Call Server to another port and try to create the Instant VM again.
For more information on changing the default port, see Modify the Ports Configuration
File and Primary Server and Member Server Communication Ports in Arcserve Backup
documentation.
Instant VM File Folder cannot be Accessed or Deleted even with Administrator Privilege.
Symptom
The Instant VM file folder cannot be accessed or deleted due to the error "Require
Administrator permission" even if the user has administrator privilege.
Solution
This is a problem of NFS. You need to remove the NFS share first, and then you can
delete the folder. Use the following command line to delete the folder:
nfsshare /delete [nfs share name]
Instant Virtual Machine Fails to Boot in Hyper-V After Restarting the Recovery Server
Symptom
When I start the Instant Virtual Machine (IVM), and then restart the Hyper-V recovery
server, the IVM fails to boot.
Solution
To resolve this boot failure, restart the IVM.
Failed to Create VMware NFS Datastore and Displayed Unable to Resolve Hostname Error
Symptom
Instant VM creation fails and displays the following error message:
Example
Solution
The reason for this error is that the ESX server lists all the NFS datastore when you
create InstantVM NFS datastore, even when some datastore are no longer available. For
example, the NFS datastore created by host2 still exists even if host2 is not available
because the machine was deleted. So the ESX server cannot resolve the host name.
To resolve this issue, delete the unavailable datastore from the ESX server.
1. Log in to the ESX server using SSH.
2. Type the following command:
esxcfg-nas –l
The same error is displayed in the command line.
Error performing operation: Unable to resolve hostname 'host2'.
3. Add a mapping in the /etc/hosts file of the ESX server to resolve this issue.
<IP address> <hostname>
Note: The IP address should be reachable.
Example: 10.57.X.X host2
4. List all the NFS datastore using the following command:
esxcfg-nas –l
Note: For more information on this issue, see the VMware KB article.
When backing up a virtual machine that has the application (SQL or Exchange) installed,
the recovery point does not include the writer information and the activity log of the
backup job displays the following warning message:
Solution
This issues happens often when the Windows Management Instrumentation (WMI) is
disabled by firewall on the guest VM. To resolve this issue, use the following steps:
1. Login to the guest VM.
2. Open Control panel.
3. Open windows Firewall.
4. Click Allow an app or feature through Windows Firewall.
5. Enable Windows Management Instrumentation(WMI).
6. Click OK.
Symptom
Failed to connect to the Hyper-V host [Target Hyper-V ServerName]. Verify if the address
of the host is correct or the credential is valid.
Solution
Incorrect configuration for Hyper-V server connection information may cause this issue.
For more details, refer to Configure the Hyper-V server connection information for
Instant VM in the Arcserve UDP V6.0 Agent for Linux User Guide.
Backup Destination Settings Disable when Opening the Linux Agent UI (see page 915)
Job Status, Job History, and Activity Log are Not Visible (see page 301)
If the Linux Backup Server is not removed from the Arcserve UDP Console before
uninstalling the Console, the backup destination settings will be disabled when opening
the Backup Server UI.
Symptom
The Backup Server is not notified that the Arcserve UDP Console is uninstalled. The
Backup Server assumes that it is still managed by the Console.
Solution
# /opt/Arcserve/d2dserver/bin/d2dreg --release
The Backup Server is released from the Console and now you can change the backup
settings from the Backup Server UI.
If the problem persists, use Live Chat to contact Arcserve support. Live Chat lets you
optimize intelligent conversation between you and the Technical Support team, allowing
you to address your concerns and questions immediately, while still maintaining access
to the product.
Job Status, Job History, and Activity Log are Not Visible
Symptom
I cannot see the job status, job history, and activity log for Linux nodes in Arcserve UDP
Console.
Solution
Linux Backup Server is unable to connect to Arcserve UDP using the hostname.
The job status, job history, and activity log are visible.
Restore Related
This section includes the following troubleshooting topics related to restore:
Database Unable to Mount while Restoring the Microsoft Exchange Database (see
page 917)
The From Field Does Not Display Correctly for Emails Sent by Users Having "On Behalf
Of" Permissions for a Shared Mailbox (see page 919)
Symptom
Due to a limitation from Microsoft, file data on the NTFS Deduplication volumes of a
Windows 2012 R2 system cannot be read from a Windows 2012 system. As a result, if
the UDP agent on a Windows 2012 system is being used restore a VM with guest
Windows 2012 R2 OS and containing NTFS deduplication volumes, the following
problem may occur. The problem occurs only during a file-level or mount recovery point
restore operation.
■ The file or directory is corrupted and unreadable.
Solution
When this problem occurs, start the restore process from a UDP agent installed on a
Windows 2012 R2 system.
Symptom
When I restore a Microsoft Exchange database, the database is unable to mount. The
required logs are missing or the transaction logs are not contiguous. There are event
errors such as 454, 455 and 2006 in the event log.
The following two reasons could cause the database mount failure:
Reason 1: The Purge Exchange log option is enabled in the UDP settings and this setting
deletes the transaction logs after every backup. Then user try to restore previous
session after several backup which purge log operation occur.
Reason 2: Users have manually deleted the transaction logs or the logs are deleted by
other programs such as an antivirus software.
Solution
Solution 1: If you have enabled the Purge Exchange log option and the transaction logs
are not contiguous, then restore all the sessions one by one, starting from the latest
session, until the session fails to restore. If the latest session fails to restore, then try
Solution 2.
Solution 2: If Solution 1 does not work, use Solution 2. This solution resolves both the
issues.
For example, you want to restore the Test database from Session 1. The following steps
use the database name as Test.
1. Log in to the Exchange server on which the database is located.
2. Delete all the files (such as *.edb, *.log, *.jrs, *.chk) from the database folder.
3. Mount the database to create an empty database.
Mount-Database –Identity Test
The From Field Does Not Display Correctly for Emails Sent by Users Having "On Behalf Of" Permissions for a
Shared Mailbox
Symptom
When I restore Exchange mails, if the email is sent by a user having the "on behalf of"
privilege for a shared mailbox, after restore, the "From" information is not displayed
correctly. The "From" field displays only the <host sender> name.
Solution
0xFF07_enable=1
Symptom:
When I create a data store, sometimes the following message appears even though I
specify a new data store name:
This name is already being used by another data store on the server. Please specify a different data store name.
Solution:
This happens when you have an existing data store but for some reason, the data store
UUID at the registry is corrupt. You can delete the data store from GUI, but the name
remains in the recovery point server registry.
Symptom
I notice that a data store switched to the Restore Only mode, and does not allow me to
back up any data.
Solution
When a disk that is used by a data store runs out of disk space, the data store switches
to the Restore Only mode. In this mode, you can perform restore, but you cannot back
up data to the data store. Also, when the specified memory allocation is utilized
completely, you either increase the memory allocation or you change the data store
from memory mode to SSD mode. Even in such cases, the data store switches to the
Restore Only mode.
To resolve such issues, move the data store to a larger disk by importing the data store.
First copy the folders where the disk is full to a larger disk with more free space and
then import the data store from the console.
The Import Data Store feature lets you add a data store to the recovery point server.
You can import any existing data store to a recovery point server. The data stores that
you have deleted earlier from a recovery point server are available to import.
After authenticating the Backup Destination folder, the Import a Data Store page
displays the details of the data store.
6. Modify the details, if necessary, and click Save.
If you have copied folder of Data Destination, Index Destination, and Hash
Destination for Deduplication data store, change the folder path.
Note: You cannot enable or disable the encryption option for an existing data store.
The data store is added to the recovery point server and displayed at the Destinations:
Recovery Point Servers dialog. Now the data store is available for backups.
Symptom
There is a plan with a backup task or replication task and the destination is Recovery
Point Server (RPS). The RPS is of older version and the Console is the latest version.
When I create, modify, re-deploy, pause, or resume a plan and there are one or more
older versions of RPS, the following error is displayed:
The version of destination Recovery Point Server ‘rps1’is lower than the version of
current console. To continue, you need to upgrade and update the Recovery Point
Server.
Solution
This error occurs when your plan uses an older version of RPS. To resolve this error,
upgrade the RPS that is used in the plan. If you upgrade the RPS manually (outside the
Console), do not forget to update the RPS on the Console.
Upgrade the RPS in the following order of preference:
Replicate to a remotely managed RPS (RPS3) > Replicate task (RPS2) > Backup task
(RPS1)
At first, upgrade RPS3, then upgrade RPS2. At last, upgrade RPS1.
Symptom
When I add a data store in remote site, I get the following error message:
Solution
The error occurs because the same resource (node, RPS server, ASBU server, Hyper-V
server, ESX server, proxy server) is already present in another site. To resolve this error,
delete the resource from all sites, then add the resource only in one site.
How to enable Log Truncations when SQL Database is in Full Recovery Mode
Symptom
When the database is in the Full mode and a full database backup is performed, the SQL
truncation log cannot be truncated.
Solution
To resolve this problem, add two registry values to enable Arcserve UDP run the
BACKUP LOG command to back up the transaction log. This command marks the space,
which is already written to database file, as reusable.
Browse Recovery Points Does Not Show Available Recovery Points When RPS Configured with FQDN
Symptom
When the RPS is not in a domain you configure the FQDN (by adding the DNS Suffix) in
the UDP Console, the Browse recovery Points do not show accurate result. Even though
you back up some sessions to RPS, the recovery point number is shown as zero.
The reason is, when the RPS is not in a domain, the RPS cannot identify itself using the
FQDN.
Solution
To resolve this issue, add the DNS suffix to the RPS host.
Symptom
Sometimes when you add or update nodes, you get the following error:
Access denied. The account may not have Administrator privileges or the account is a
non-built-in administrator account and UAC is turned on.
Solution
The error occurs in the following scenarios:
■ You have logged in as a local user or domain user, who is not in the local
administrators group of the node to add or update node.
■ You have logged in as a user who is in the local administrator groups of the node
but has a non-built-in administrator account of the node to add or update node.
To resolve this issue, follow these steps:
1. Add the local or domain user to the local administrator groups of that node.
2. Disable the UAC of that node.
Follow these steps to disable the UAC:
a. Click Start, type regedit in the Search programs and files field, and then press
Enter.
b. The Windows Registry Editor opens.
c. Note: You may need to provide administrative credentials to open Windows
Registry Editor.
d. Locate and click the following registry key:
e. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Polici
es\System
f. From the Edit menu, click New, and then click DWORD (32-bit) Value.
g. Specify LocalAccountTokenFilterPolicy as the name for the new entry and then
press Enter.
h. Right-click LocalAccountTokenFilterPolicy and then click Modify.
i. Specify 1 in the Value data field and then click OK.
j. Exit the Registry Editor.
Notes:
– This procedure is not similar to disabling the UAC. Using this procedure,
you can disable some of the functionalities of UAC.
Symptom
When the RPS has a heavy load, the OS takes a longer time to attach the mounted
volume and the mount recovery points fail. You get the following message in the
Activity logs:
Mounting the volume takes longer time than expected (2 minutes), this may happen
when your server is under heavy load. Please try again when the server load is less
heavy or check the troubleshooting in online documentation to increase the time out
value.
Solution
To resolve this issue, increase the timeout value.
"WaitDeviceReadyTimeoutS"=dword:00000078
Default: 120 seconds
2. Change the timeout value to a higher value.
For example, change the timeout value to 600 seconds (10 minutes)
Symptom
If the gateway installation user name is changed or the password is expired, you get
following error during the plan deployment:
Failed to impersonate the user who installed Arcserve Remote Management Gateway
using the stored credentials. Please check if the credentials are still valid and redeploy.
Solution
To resolve this issue, update the gateway account user name or password.
How to Update the Gateway when the Gateway Proxy Credentials are Changed
Symptom
When the proxy server credentials are changed, the connection to the gateway is
broken. You get the following error message while trying to connect to the gateway:
Cannot connect to the gateway site proxy. Please check the status of the site and
make sure that gateway is running.
Solution
To resolve this issue, update the parameters in GatewayTool.exe setproxy.
Similarly, you can change other settings such as Proxy Type, IP address, and Port
number in setproxy.
If you see the Failed to restart the gateway service, please restart it manually message
in the command prompt window, follow these steps:
a. Run services.msc to look for Arcserve remote management gateway service
and then restart the remote management gateway service.
b. If the remote service stops after you restart, use the Task Manager to end the
tomcat8.exe task manually.
c. Refresh services.msc and restart Arcserve remote management gateway
service.
Symptom
Unable to log in to the Arcserve UDP Console. The Console displays the following
messages even after five minutes of logging in:
Solution
To resolve this issue, open the Windows Service Console and restart the Arcserve UDP
Console service, Arcserve UDP Management Service.
■ Disable Rescan of Host Bus Adapters when the Source and Proxy are in Different
VMware ESX Servers (see page 341)
■ Disable the Consecutive Snapshot Creation in VMware VM for a Backup (see
page 964)
■ Agentless Host-based Backup crashes when using Windows 2003 R2 64-bit as
Backup Proxy (see page 965)
■ When Restored from a Higher Version of ESXi host to a Lower version ESXi host, VM
gets stuck at booting stage (see page 966)
If you do not have the appropriate permissions, the backup job for a host-based virtual
machines and virtual standby job fails.
To avoid this issue, verify that you have the appropriate permissions. If you are a
vCenter user, you do not need an Administrator permission at the vCenter Server level
but you must have an Administrator permission at the Datacenter level. In addition, you
must have the following permissions at the vCenter Server level:
■ Global, DisableMethods and EnableMethods
■ Global, License
For more information on the permission, see Permissions for Host-based Agentless
Backup and Virtual Standby at vCenter Server Level (see page 934).
Permissions for Host-based Agentless Backup and Virtual Standby at vCenter Server Level
When you configure vCenter to manage virtual machines, generally you set up users or
groups with vCenter administrator privileges. This approach helps to ensure that the
vCenter accounts have unrestricted access to vCenter functionality and tasks.
Optionally, you can create vCenter users and groups that can be used to facilitate only
backup operations or only backup and restore operations.
Important! The following steps assume that you are familiar with how to configure
vCenter users, groups, roles, and permissions. Consult the vCenter documentation as
needed.
■ Expand Virtual machine and Provisioning, and specify the following privileges:
– Allow read-only disk access
– Allow virtual machine download
■ Expand Virtual machine and specify the following privileges:
– vSphere 4: Expand State and specify Create Snapshot and Remove
snapshot.
– vSphere 5: Expand Snapshot management, expand State and then specify
Create Snapshot and Remove snapshot.
■ Expand Global and specify the following privileges:
– Disable methods
– Enable methods
– Licenses
Go to Step 6.
5. To allow the role to facilitate backup and restore operations, specify the following
privileges:
■ Expand Datastore and specify the following privileges:
– Allocate space
– Browse datastore
– Low level file operations
■ Expand Virtual machine and Configuration, and specify the following privileges:
– Add existing disk
– Add new disk
– Add or Remove device
– Advanced
– Change CPU count
– Change resource
– Disk change tracking
– Disk Lease
– Host USB device
– Memory
– Modify device setting
– Raw device
– Reload from path
– Remove disk
– Rename
– Reset guest information
– Settings
– Swapfile placement
– Upgrade virtual hardware
■ Expand Virtual machine and Guest Operations, and specify the following
privileges:
– Guest Operation Modifications
– Guest Operation Program Execution
– Guest Operation Queries (vSphere 5)
■ Expand Virtual Machine and Interaction, and specify the following privileges:
– Power off
– Power on
■ Expand Virtual machine and Inventory, and specify the following privileges:
– Create new
– Register
– Remove
– Unregister
■ Expand Virtual machine and Provisioning, and specify the following privileges:
– Allow disk access
– Allow read-only disk access
– Allow virtual machine download
■ Expand Virtual Machine and specify the following privileges:
– vSphere 4: Expand State and specify Create snapshot, Remove snapshot,
and Revert to snapshot.
– vSphere 5: Expand Snapshot management, expand State, and then specify
Create snapshot, Remove snapshot, and Revert to snapshot.
6. Click OK to create the role.
7. Open the Assign Permissions dialog, to assign the newly created role to users,
groups, or both.
8. From the Users and Groups list, select the custom user that you want to use for
backups and restores.
From the Assigned Role drop-down list, specify the role that you want to apply to
the users or groups.
Click OK to apply the role to the users or groups.
Convert Incremental Backup to a Verify Backup Because the Virtual Machine Snapshots Either Changed
from the Last Backup Job or Needs Consolidation
Symptom
The Incremental Backups for VMware virtual machines are converted to Verify Backups.
The activity log states the following message:
“Convert Incremental Backup to a Verify Backup because the virtual machine snapshots
either changed from the last backup job or needs consolidation.”
Solution
Use the VMware vSphere Client to consolidate the virtual machine snapshots. For more
details about consolidating snapshots, click on the following VMware Knowledge Base
article:
http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=display
KC&externalId=2003638
Note: Consolidating the snapshots for a virtual machine can fail due to locked files. If the
backup job uses the HOTADD transport mode, then verify that the backup proxy virtual
machine settings on the ESXi server does not contain the hot added hard disks. Then
consolidate the virtual machine snapshots.
Agentless Host-based Backup for Hyper-V VM Fails after Upgrading Arcserve UDP
Symptom
After upgrading Arcserve UDP from Version 5.0 Update 2 or before to the latest version,
the agentless host-based backup has started failing with the following error message:
The backup job is cancelled. For a VSS snapshot, the Hyper-V VSS writer needs to save
the virtual machine and this is not applied in the current plan. To restart the backup
job, change the Hyper-V Snapshot Method setting in the plan. For details on how to
set Hyper-V Snapshot Method in a plan, see the product documentation.
The agent-less host-based backup was working before the upgrade.
Solution
In Arcserve UDP Version 5.0 Update 2 or before, when the virtual does not support the
online backup method, the default behavior is to adopt the offline backup method. The
offline backup method saves the virtual machine while taking a snapshot. In the Saved
state, the virtual machine is inaccessible. However, critical virtual machines need to be
accessible all the time.
In Version 5.0 Update 3 and later versions, if the virtual machine needs to be placed into
the Saved state, the default behavior is to cancel the backup job to avoid any downtime
of the virtual machine. If you do not want the backup job to get cancelled, change the
Hyper-V Snapshot Method option in the plan. For more details about the Hyper-V
Snapshot Method option in the plan, see How to Create a Host-Based Virtual Machine
Backup Plan.
You can also refer the Arcserve KB article for more details on this issue.
Symptom
Arcserve UDP agentless backups may fail when you attempt to back up a virtual
machine in VMware ESXi 6.0 and if the Change Block Tracking (CBT) function is enabled.
This is a known issue of VMware. When the backup fails, the following two behaviors
can occur:
■ Arcserve UDP may not connect to the CBT function of the ESXi host. As a result,
Arcserve UDP cannot receive the used or changed data block information from the
virtual machine.
■ Arcserve UDP may fail to capture the quiesced snapshots of the virtual machine.
(This can occur every time Arcserve UDP captures a snapshot or when you manually
capture a snapshot in the vSphere client.)
Solution
VMware has resolved this issue in their latest build, ESXi 6.0 Build 2715440. You can
install the ESXi600-201505001 patch to resolve this issue. For more information about
downloading and installing the patch, see the VMware KB article.
If you cannot apply the patch, you can resolve the issue by making the following
changes in the registry key:
"BackupEntireDiskOnCBTBitmapFailure"=dword:00000001
6. Save the registry key.
Note: If you add the registry key in both the VM and proxy level registry, then the
setting in the VM level registry will have the priority over the setting in the Proxy level
registry.
Failed to Create a Snapshot for Hyper-V Virtual Machines When Multiple Jobs are Running
Symptom
When running multiple jobs, the snapshot creation for Hyper-V CSV virtual machine
takes too much time and then fails. It fails even after multiple tries. The following
message is displayed in the activity log of the respective virtual machine.
The creation of snapshot is in progress, and only one snapshot creation operation can be in progress at one time.
Solution
This may happen because you can only run one snapshot creation at a time.
To solve the issue, you can either increase the number of tries or increase the retry time
interval. You can also increase the number of concurrent jobs that you can run.
Note: The default retry value is 3 and the default time interval value is 10 minutes.
To increase the number of retry, perform the following steps on the cluster nodes:
1. Open the Windows registry.
2. Navigate to HKLM\SOFTWARE\Arcserve\Unified Data Protection\Engine.
3. Create a key named as VSSWrap.
4. Right-click VSSWrap, select New, and then select DWORD (32-bit) value and specify
the name as VssAsynchMaxRetryTimes.
5. Specify the value as required.
To increase the time interval between each retry, perform the following steps on the
cluster nodes:
1. Open the Windows registry.
2. Navigate to HKLM\SOFTWARE\Arcserve\Unified Data Protection\Engine.
3. Create a key named as VSSWrap.
4. Right-click VSSWrap, select New, and then select DWORD (32-bit) value and specify
the name as VssAsynchRetryInterval.
5. Specify the value as required.
To increase the number of concurrent jobs, perform the following steps on the proxy
server:
1. Open the Windows registry.
2. Navigate to HKLM\SOFTWARE\Arcserve\Unified Data Protection\Engine.
3. Right-click HyperVMaxJobNum, select Modify, and specify the value as required.
Symptom
To back up data, host-based backup job does not use the HotAdd Transport Mode even
when it is available. This happens when the source virtual machine is imported to
Arcserve UDP Console from an ESX host (instead from the vCenter server) and the ESX
host is managed by a vCenter server.
Solution
To resolve this error, perform one of the following tasks:
■ Delete that virtual machine node from Arcserve UDP Console. Import the node
again from the vCenter server that manages the ESX host.
■ Disconnect the ESX from the vCenter server.
HotAdd Transport Mode does not Work when Attempting to Back Up a VMware VM
Symptom
The HotAdd transport mode is not supported for this VM and as a result the backup is
failing over to the NBDSSL (encrypted network block device) mode. (Backup job is
running slow). The backup of a VMware VM is not using HotAdd Transport. For more
details about HotAdd transport, see
http://pubs.vmware.com/vsphere-60/index.jsp?topic=%2Fcom.vmware.vddk.pg.doc%2
FvddkDataStruct.5.5.html
1 MB 256 GB
2 MB 512 GB
4 MB 1024 GB
8 MB 2048 GB
■ In vSphere 5.1 and older, the maximum supported VMDK size is 1.98 TB.
■ The disks that are to be HotAdd must be SCSI. IDE drives are not compatible with
HotAdd.
■ VMware Tools must be installed and up-to-date on the VM and the backup proxy.
■ Datastore needs sufficient space for a VM snapshot.
■ HotAdd may fail if any disk was created with a newer hardware version than the VM
being backed up. For example, if a disk was moved from a hardware version 8 VM
to a hardware version 7 VM. To resolve this problem, upgrade the hardware version
of the VM.
■ HotAdd may fail if any disk was created with a newer hardware version than the VM
being backed up. For example, if a disk was moved from a hardware version 8 VM
to a hardware version 7 VM. To resolve, upgrade the hardware version of the VM.
■ A single SCSI controller can have a maximum of 15 disks attached. To run multiple
concurrent jobs with more than 15 disks, you need to add more SCSI controllers to
your backup proxy machine.
■ In case of standalone ESX connection (ESX server is not managed by vCenter), you
can only HotAdd disks of VMs which are located on the same ESX as the backup
proxy machine.
■ HotAdd may fail if you are trying to back up the VM through the ESX added as a
standalone server into UDP but actually being managed by vCenter.
■ Hot Add may fail if the VM you are trying to back up and the proxy server are in
different clusters.
Solution
Host-based Agentless Backup or Restore Job Uses NBD or NBDSSL Transport Mode even when SAN Mode
is Possible
Symptom
Although SAN transport mode is possible, agentless backup or restore job still uses NBD
or NBDSSL transport mode.
Solution
The following prerequisites must be completed to utilize the SAN transport mode by
agentless backup and restore jobs. For more information, see the VMware KB article.
■ The proxy machine must be a physical machine (cannot be a virtual machine).
■ The proxy machine must be connected to the SAN LUN in which the VM resides.
■ On the proxy machine, SAN Policy of the SAN disk must be configured to OnlineAll.
To configure the disk, do the following:
1. Log in to the backup proxy system using an account with administrative
privileges.
2. Open Windows Command Line.
3. From the command line, type the following commands
a. Type "diskpart" and then press Enter.
b. Type "SAN" and then press Enter.
The current SAN policy displays.
c. Type "SAN POLICY=OnlineAll" and then press Enter.
■ If you want to perform a VM recovery by SAN transport mode, SAN disk must be
configured to be writable.
To clear the readonly flag, do the following:
1. Log in to the backup proxy system using an account with administrative
privileges.
2. Open Windows Command Line.
3. From the command line, type the following commands
a. Type "diskpart" and then press Enter.
b. Type "list disk" and then press Enter.
The disks list displays.
c. Type "select disk xxx" and then press Enter to select the SAN disk that gets
be configured to be writable.
d. Type "attribute disk clear readonly" and then press Enter.
■ SAN transport mode offers the best performance on thick disks but the worst
performance on thin disks. So, the VM recovery uses NBD or NBDSSL transport
mode for thick disks by default. If you want to use SAN transport mode even for
thin disks, you can add a string value EnforceTransportForRecovery with value SAN
under HKLM\SOFTWARE\Arcserve\Unified Data Protection\Engine\AFRestoreDll
(create the key AFRestoreDll if it doesn’t exist).
■ When taking snapshot during backup, additional files are generated. So that certain
free space is needed in storage device where VM’s VMDK files reside. SAN transport
mode needs more free space comparing with NBD/NBDSSL transport mode. So that
make sure that there is enough free space in SAN LUN if you want to use SAN
transport mode.
Recovery Operations Fail When Recovering Data Using the HOTADD or SAN Transport Mode
Symptom
Recovery operations fail when recovering data using the HOTADD or SAN transport
mode. The following message appears in the Activity Log:
Solution
Recovery operations fail using the HOTADD transport mode or SAN transport mode
when the disk settings are not configured properly.
Press Enter.
4. Type SAN and then press Enter.
The current SAN policy displays.
5. Type the following command:
SAN POLICY = OnlineAll
Press Enter.
The SAN policy is configured as do not automatically mount SAN hosted volumes.
6. To clear the read-only attribute of the specific SAN disk, select the disk from the
disk list and type the following command:
attribute disk clear readonly
Press Enter
7. Type exit and then press Enter.
If the job fails again, mount the HOTADD disks manually using disk management on the
proxy system.
Symptom
Sometimes the scheduled incremental or full backup job fails for Hyper-V virtual
machines and the following errors are displayed in the event viewer on Hyper-V host:
■ DM operation add for the virtual machine <vm name> failed with error: Ran out of
memory (0x8007000E) (Virtual machine ID <vm ID>)
■ Could not create backup checkpoint for virtual machine <vm name>: This operation
returned because the timeout period expired. (0x800705B4). (Virtual machine ID
<vm ID>)
■ Could not create backup checkpoint for virtual machine <vm name>: Element not
found. (0x80070490). (Virtual machine ID <vm ID>)
■ VSS writers inside virtual machine <vm name> failed to perform BackupComplete to
its shadow copy (VSS snapshot) set: A function call was made when the object was
in an incorrect state for that function (0x80042301). (Virtual machine ID)
■ The Hyper-V VSS writer has encountered an error when processing this virtual
machine. (For more information about Hyper-V VSS writer errors, refer to the
product documentation).
Solution 1
The resolution is to increase the RAM size on the Hyper-V server and then resubmit the
backup job.
Solution 2
If the VSS writer inside the virtual machine does not work properly, then the backup job
fails. To resolve the issue, check the event log of both Hyper-V host and the virtual
machine. Check the VSS warnings and errors, and take appropriate actions.
Hyper-V VSS NTDS Writer Fails While Taking the VSS snapshot in the VM
Symptom
In a Domain Controller VM, if the AutoMount feature is not enabled, the VSS NTDS
writer fails while taking the VSS snapshot in the VM. As a result, the Hyper-V VSS writer
fails to take the VSS snapshot on the Hyper-V host.
The Hyper-V HBBU backup job fails with the following activity log:
The Hyper-V VSS writer has encountered an error when processing this virtual machine. (For more information
about Hyper-V VSS writer errors, refer to the product documentation).
Solution
Enable the AutoMount feature in the VM.
Symptom
The MAC addresses of virtual machines are not retained after recovering virtual
machines.
Solution
MAC addresses are not retained during recovery, to prevent duplicates. To retain MAC
address information, set the following registry key on the proxy server:
Key Value: 1
Symptom
The following reasons are responsible for the backup failure:
■ One or more volumes on the Hyper-V host is not formatted with NTFS/Refs.
■ One or more volumes on the Hyper-V host has less than 100 MB of free space.
■ Excessive disk activity during the time of the backup.
Solution
Resolve the environmental issues and perform the backup again.
Symptom
The virtual machine recovery fails and the following error message is displayed in the
logs:
Unable to open vmdk file (file name with .vmdk). VMware reported the following error: You
do not have access rights to this file. For more information, see the restore debug log. If
necessary contact arcserve support.
Solution
The reason could be that the SSL authentication is disabled on the ESX host. To resolve
this issue, use one of the following methods:
Symptom 1
For example, you have 2 virtual machines VM1 and VM2 with the same UUID (which is
called Instance UUID for VMware, and VM UUID for Hyper-V) in the ESXi hosts which are
managed by different vCenter VC1 and VC2. You import VM1 into console and it shows
up in the node list view of console. Later on, you import VM2 into console. In the node
list view VM1 is overwritten by VM2 (in other words, VM2 is added but VM1 is gone).
Symptom 2
VM node’s information in the Hypervisor column changes back and forth while auto
discovery is running.
For example, you have 2 virtual machines VM1 and VM2 with the same UUID (which is
called Instance UUID for VMware, and VM UUID for Hyper-V) in the ESXi hosts which are
managed by different vCenter VC1 and VC2. You import VM1 into console. And you also
import at least one VM from the vCenter VC2 so that both VC1 and VC2 are added into
the Node Discovery List (you can check the list at Node Discovery Configuration page
which is at Settings tab). While node discovery runs, it firstly connects to VC1 and
detects VM1 by the UUID, so that Hypervisor column is updated with information of
VC1. But later on, when it connects to VC2, it detects the VM2 by the same UUID, so
that Hypervisor column is updated with information of VC2.
Solution
Arcserve UDP uses VM’s UUID (which is called Instance UUID for VMware, and VM UUID
for Hyper-V) to identify a VM node. Although it is very rare that VMs have duplicated
UUID, problematic behaviors may happen in Arcserve UDP in such case.
To solve the problems, refer the following steps to manually change the UUID of the VM
(applicable for VMware VM only). After you have manually changed the UUID of the
VM, delete the original VM from the Arcserve UDP Console and re-import the VM.
1. Open the following URL:
https://<vCenter host name>/mob/
2. Log in as an administrator.
3. Search “content” in the NAME column, and click the link in the VALUE column in the
same row.
4. Search “rootFolder” in NAME column, and click the link in the VALUE column in the
same row.
5. Search “childEntity” in NAME column. In the VALUE column in the same row, find
the Datacenter in which the VM reside and click on its link.
6. Search “vmFolder” in NAME column, and click the link in the VALUE column in the
same row.
7. Search “childEntity” in NAME column. In VALUE column in the same row, click on
“more…” to expand the VM list. Search the VM you are looking for and click the
link.
8. Search ReconfigVM_Task in the Methods table, and click the link.
9. In the new browser opened, remove all contents in the VALUE field, and type the
following code:
<spec>
<instanceUuid>2499952a-6c85-480e-b7df-4cbd2137eb69</instanceUuid>
</spec>
Note: The 2499952a-6c85-480e-b7df-4cbd2137eb69 string mentioned above is a
sample UUID. You should replace it with the UUID that you want to apply.
10. Click on Invoke Method link to apply the new UUID.
11. To verify that new UUID is applied, close the newly opened browser and go back to
the page where you did step 8.
12. Search “config” in NAME column and click on the link in the VALUE column in the
same row.
13. Search “instanceUuid” in NAME column. The UUID of the VM is shown in the VALUE
column in the same row.
File System Catalog Job Fails or Recovery Point Check Fails for Host-Based Agentless Backup
Symptom
■ File system catalog job fails for host-based agentless backup recovery points
■ Recovery Point Check fails during host-based agentless backup job and the next
Incremental backup gets converted to a Verify backup.
Solution
This may be caused by a known issue of VMware (see the VMware KB article). When you
quiesce a VMware VM, the snapshot contains corrupted data. The backup reads data
from the snapshot and the data that is backed up also becomes corrupted.
Note: This problem occurs with all VMware ESXi versions and on a VM with guest OS
running Windows 2008 R2 SP1 and Windows 2012. Arcserve UDP cannot detect the data
corruption problem because VMware does not return an error in such cases. You may
not be aware of the problem until you try to restore data.
You can follow the Arcserve KB article to check whether the problem is caused by this
VMware known issue. The workaround recommended by VMware is to disable the VSS
writers, such as MSSearch Service Writer (ignore it, if not installed) and Shadow Copy
Optimization Writer (typically present in every Windows VM), in guest OS of VM. You
can manually disable the writers per the VMware KB article.
Arcserve UDP also provides a simple way to disable the writers, if VMware Tools
snapshot quiescing method is used. Follow these steps to disable the writers.
At Proxy Server level (applicable for VMs protected by this proxy server)
1. Log in to the proxy server.
2. Open the registry key from the following location:
[HKEY_LOCAL_MACHINE\SOFTWARE\Arcserve\Unified Data
Protection\Engine\AFBackupDll]
3. Create a Multiple-String value with the name DisableSpecificVSSwriters.
4. Enter the names of the VSS writer that is expected to be disabled (each writer name
occupies one line).
5. Save the registry key.
At VM level
6. Log in to the proxy server.
7. Open the registry key from the following location:
[HKEY_LOCAL_MACHINE\SOFTWARE\Arcserve\Unified Data
Protection\Engine\AFBackupDll\<vm instance uuid>]
8. Create a Multiple-String value with the name DisableSpecificVSSwriters.
9. Enter the names of the VSS writer that is expected to be disabled (each writer name
occupies one line).
10. Save the registry key.
Notes:
■ If you add the registry key in the VM and proxy level registry both, then the setting
in the VM level registry will have the priority over the setting in the Proxy level
registry.
■ This registry setting works only when the VMware Tools snapshot quiescing method
is used in the backup plan.
■ If you have ever configured writers manually in the guest OS of the VM per the
VMware KB article, your configuration will be overwritten.
■ The name of the writer is case sensitive and must be an exact match as shown in
the output of “vssadmin list writers”.
■ If you want to enable all writers again, do not delete the registry value
DisableSpecificVSSwriters. Instead, retain the registry value but remove the content
within the registry. If DisableSpecificVSSwriters does not exist, Arcserve UDP
assumes that nothing needs to be changed in terms of enabling or disabling VSS
writers.
Incremental Backup Converts to Verify Backup or the Backup Size Increases in Hyper-V
Valid on Hyper-V VM
Symptom
■ I have performed an incremental change in a Hyper-V virtual machine. When I
perform an incremental backup, the entire virtual machine is backed up instead of
backing up only the changed data.
■ I have a proxy server with Arcserve UDP Version 6.0 that backs up a virtual machine
from one Hyper-V host (example HOST1). I have another proxy server with an older
version of Arcserve UDP that backs up a virtual machine from the same Hyper-V
host (HOST1). In such cases, the CBT is inactive and the Incremental jobs do not run.
The Incremental backup converts to the Verify backup.
Solution
The root causes of above symptoms can be one of the following reasons:
■ The loss of change block tracking (CBT) data. The following circumstances will result
in CBT data loss:
– The Hyper-V host crashes or is powered off abnormally.
– The CBT service is stopped or the service abnormally quits.
– The CBT service did not complete its work while the Hyper-V host was shutting
down.
■ Different versions of CBT in the Hyper-V server and the proxy server.
Example: Consider you have two Arcserve UDP environments, one is Arcserve UDP
Version 5 and another is Arcserve UDP Version 6.0. These two Arcserve UDP
environments back up different VMs in the same Hyper-V server. The Arcserve UDP
Version 6.0 environment automatically detects the older version of CBT in the
Hyper-V server and upgrades it to the latest version. In such cases, the Arcserve
UDP Version 5 environment converts the remaining scheduled incremental backup
to a full backup.
If Arcserve UDP detects different CBT versions, the Activity Log displays a warning
message.
The solution is to upgrade all the proxy servers that protects virtual machines from one
Hyper-V host to the same version of Arcserve UDP.
Host-based Backup Fails for Hyper-V VM That Has a Special Differencing Disk Configuration
Symptom
If a differencing disk is configured in a Hyper-V virtual machine, the backup job for that
virtual machine fails. It displays the following error message in the activity log:
The following error message is displayed in the backup job log file under C:\Program
Files\Arcserve\Unified Data Protection\Engine\Logs,
The problem occurs only when the virtual machine has the following differencing disk
configurations. All the configurations must apply.
■ The virtual machine has one regular virtual hard disk (Fixed size or Dynamically
expanding) Disk1 that is attached to one IDE or SCSI controller of the virtual
machine.
■ The virtual machine has one differencing virtual hard disk (Disk2) that is also
attached to one IDE or SCSI controller of the virtual machine.
■ The parent disk of Disk2 is specified to Disk1.
Solution
Symptom
When I back up a VMware virtual machine, the backup job fails with either of the
following error messages in the activity log:
Abort backup because backup job has been configured to use the "Microsoft VSS
inside VM" snapshot method. However, only the "VMware Tools" snapshot method is
applicable because Host-based VM Backup failed to deploy the necessary tools into
the VM.
Or
Abort backup because backup job has been configured to use the "VMware Tools"
snapshot method. However, only the "Microsoft VSS inside the VM" snapshot method
is applicable because Host-based VM Backup failed to undeploy tools from inside VM.
Solution
The first error can occur because of multiple reasons. You have selected the Microsoft
VSS inside VM option but:
■ You did not update the VM with the required credentials
■ The credentials are not correct
■ VMware Tools are not installed or updated.
In this case, Arcserve UDP cannot deploy necessary tools to the virtual machine to use
the new snapshot method.
To resolve this error, update the virtual machine with correct credentials. Verify that
VMware Tools are updated and running in the virtual machine. After the verification,
resubmit the backup job.
Solution
The second error may occur in the following scenario. You have used the Microsoft VSS
inside VM option in the previous backup jobs. Now, you want to use the VMware Tools
option but the credentials of the virtual machine have changed (for example, you have
changed the password of the guest OS but you did not update the virtual machine node
in Console), or VMware Tools is not running for some reason. In such cases, Arcserve
UDP cannot undeploy the tools (which were deployed by the previous backup job) from
the virtual machine to use the new snapshot method.
To resolve this error, perform one of the following steps:
■ Update the virtual machine with correct credentials. Verify that VMware Tools are
updated and running in the virtual machine guest OS. After the verification,
resubmit the backup job.
Symptom
In Hyper-V 2012 or later, the virtual machine stays in the Backing up status although the
agent-less host-based backup job of this virtual machine has already finished. I cannot
perform some operations such as power-on or power-off the virtual machine during
that time in the Hyper-V manager. If the virtual machine is a Hyper-V cluster, I cannot
perform live migration for it. In addition, if another backup job for this VM starts at the
same time, the backup job fails with the following error:
The Hyper-V VSS writer has encountered an error when processing this virtual machine.
Solution
If the backup jobs start at the same time or at times closer to each other, Arcserve UDP
takes one VSS snapshot for all virtual machines instead of taking one VSS snapshot for
each virtual machine. This avoids unnecessary workload to the Hyper-V host. After the
VSS snapshot is taken, all the virtual machines inside this VSS snapshot instance are
locked (in the Backing up status). Arcserve UDP cannot release the snapshot until all
backup jobs are finished, even if the backup job of a virtual machine is already
completed.
The VSS snapshot has a limitation. Only one snapshot can be taken for a virtual machine
at a time. If another backup job of the same virtual machine starts at this time, it fails
and provides the error message. This error does not happen in Hyper-V 2008R2 because
Hyper-V 2008R2 has a different VSS snapshot mechanism.
While the virtual machine is locked, you can still use the guest OS. The lock has no
impact on the usage or availability of the guest OS. However, to avoid this situation, you
can perform either of the following tasks:
■ Enable the Hyper-V Snapshot Separation option on the resource tab of the
agent-less host-based backup. Then, Arcserve UDP takes a separate snapshot for
each virtual machine specified in the plan. The virtual machine is released after the
backup is complete.
■ Use different plans to protect virtual machines that have different storage sizes.
Include the virtual machines with similar storage size in one plan. It will ensure that
the backup jobs take a similar amount of time to complete. Also, set different
schedules different plans.
Symptom
When the source node and the proxy server are in different VMware ESX servers, and I
run an Incremental backup, my backup takes a longer time to run. I also receive multiple
rescan messages. I want to disable the rescanning of all host bus adapter (hba) of other
VMware ESX servers during Incremental backups.
Solution
You can disable the scan by creating a registry key in the proxy server and assigning a
value to it.
In the previous version of Arcserve UDP, when multiple VMware VM backup jobs start
at the same time, the jobs create snapshots on the ESX host in parallel to jobs.
Sometimes such parallel snapshot creation operations increase the disk I/O on the ESX
host. To avoid such situation, by default Arcserve UDP Version 6.0 serialize the snapshot
creation operation when the jobs are running on the same proxy server and the
snapshot creation operation is for the same ESX host. In other words, the snapshot
creation operation occurs one after another and ideally there is only one snapshot
created at a time. But this is not applicable if the backup jobs are running on different
proxy servers, or the backup jobs are for different ESX hosts.
To avoid a situation where the snapshot creation of one job hangs (or takes very long
time) and the next jobs are blocked, the next job will wait for the previous snapshot
creation operation for at most five minutes. After five minutes, the next snapshot
creation process starts.
You can disable the behavior of waiting for five minutes by following these steps:
1. Log in to the proxy server.
2. Open the registry key from the following location:
[HKEY_LOCAL_MACHINE\SOFTWARE\Arcserve\Unified Data
Protection\Engine\AFBackupDll]
3. Create a DWORD value with the name CreateSnapshotSequentially.
4. Set the value to 0.
In addition, you can also change the default timeout value (five minutes) by following
these steps:
5. Log in to the proxy server.
6. Open the registry key from the following location:
[HKEY_LOCAL_MACHINE\SOFTWARE\Arcserve\Unified Data
Protection\Engine\AFBackupDll]
7. Create a DWORD value with the name CreateSnapshotTimeout.
8. Set the value with a number.
The unit is in seconds.
Agentless Host-based Backup crashes when using Windows 2003 R2 64-bit as Backup
Proxy
Agentless Host-based Backup for VMware VM crashes when using Windows 2003 R2
64-bit as backup proxy.
Symptom
When Windows 2003 R2 64-bit machine is used as the backup proxy server to protect
VMware VM, sometimes backup job may crash. You can see error messages as following
in the backup job debug log file:
[2016/01/21 10:18:11:316 00 03820 03336 ] [VDDKLOG] VixDiskLib: VixDiskLib_OpenEx: Open a disk.
{AFBackend.exe::AFBackupVirtual.dll(1746.0)}
[2016/01/21 10:18:11:316 00 03820 03336 ] [VDDKLOG] VixDiskLibVim: VixDiskLibVim_GetNfcTicket:
Get NFC ticket for [datastore1 (3)] VMname/VMware_1.vmdk. {AFBackend.exe::AFBackupVirtual.dll(1746.0)}
[2016/01/21 10:19:11:691 00 03820 03336 ] [VDDKLOG] VixDiskLibVim: Error 18000 (listener error
GVmomiFaultInvalidResponse). {AFBackend.exe::AFBackupVirtual.dll(1746.0)}
[2016/01/21 10:19:11:691 00 03820 03336 ] [VDDKLOG] VixDiskLibVim: Login failure. Callback error
18000 at 2439. {AFBackend.exe::AFBackupVirtual.dll(1746.0)}
[2016/01/21 10:19:11:691 00 03820 03336 ] [VDDKLOG] VixDiskLibVim: Failed to find the VM. Error
18000 at 2511. {AFBackend.exe::AFBackupVirtual.dll(1746.0)}
Solution
In Arcserve UDP Version 6.0, VMWare VDDK 6.0.1 is built in. But VDDK 6.0.1 does not
officially support Windows 2003 R2. As a workaround, you can use one of the following
options:
■ Switch to use a proxy that is officially supported by VDDK 6.0.1. For example, proxy
with Windows 2008 R2, Windows 2012 or Windows 2012 R2.
■ Replace built-in VDDK 6.0.1 by VDDK 5.5.5, which is also supported by UDP 6.0. For
details on how to replace VDDK, refer to How to apply different version of VDDK
other than the built-in Version (6.0.1) in Arcserve UDP (see page 989)
When Restored from a Higher Version of ESXi host to a Lower version ESXi host, VM gets stuck at booting
stage
When restored from a higher version of ESXi host to a lower version ESXi host, VM gets
stuck at booting stage after it is powered on.
Symptom
Restore a VM from a higher version ESXi host to a low version ESXi host, power on the
VM. The VM gets stuck at the booting stage.
Solution
The guest OS version of this VM may not be supported by the lower version ESXi. As a
workaround, you can use one of the following options:
■ Restore the VM to a ESXi which supports that guest OS version or
■ Upgrade the existing ESXi host to the suitable version.
For example, a Windows Server 2012 R2 VM is backed up from an ESXi 5.5 and restored
to ESXi 5.0 update 1. As ESXi 5.0 starts to support Windows Server 2012 R2 guest OS
after Update 2, this issue may occur.
You need to upgrade ESXi 5.0 Update 1 to Update 2 so that Windows Server 2012 R2
guest OS is supported. As a workaround, you can change the guest OS version of
restored VM to the version that is supported by the current version of ESXi (in above
example, change to Windows Sever 2008 R2”).
Symptom
During backup of VMs that are part of 2012 Hyper-V cluster RAM utilization gradually
increases and reaches to 99% on CSV owner Hyper-V host. As a result, Virtual Machines
and Hyper-V host stop working during backup.
Solution
To fix this problem, download and apply hotfix provided by Microsoft on all the Hyper-V
host from the following link:
https://support.microsoft.com/en-in/kb/2878635
Add Permission for VDDK at vCenter Server Level (see page 934)
Virtual Standby Jobs Fail Due to Internal Errors (see page 968)
Virtual Standby Jobs Fail Using the HotAdd Transport Mode (see page 970)
Symptom:
The following message appears when the power on Virtual Standby virtual machine
operation fails:
Solution:
The above behavior can occur on virtual machines that contain SCSI and IDE devices. If
this problem occurs, examine how disks are configured on your virtual machine and
verify that the boot sequence of the recovered virtual machine is the same as the source
virtual machine. If the boot sequence is different, update the BIOS on the recovered
virtual machine to match that of the source.
Symptom 1:
Virtual standby jobs fail. One of the following messages appears in the Activity Log:
Unknown Error.
Solution 1:
To correct this problem, consider the following solutions:
■ Conversion operations can fail when there is not enough free disk space on the data
store that is specified in the Virtual Standby policy. VDDK returns the message
because the VDDK API (currently) does not support the capability to detect the
amount of free disk space on the data store. To correct this problem, free the
amount of disk space on the original data store that is required to complete the
operation and then resubmit the job.
■ Network disturbance and high network traffic can cause the conversion operations
to fail. To correct this problem, verify that source node and the ESX Server system
or the vCenter Server system can communicate with each other though the
network, and then resubmit the job.
■ Multiple concurrent connections consisting of backup or recover VM jobs to the ESX
Server system or the vCenter Server system, which includes vSphere SDK
connections through the VMware vSphere Client, can cause the jobs to fail. To
correct this problem, close all unnecessary connections and then resubmit the job.
This problem is the result of a VMware VDDK connection limitation. The following
Network File Copy (NFC) protocol limits apply:
– ESXi 5: Limited by a transfer buffer for all NFC connections and enforced by the
host; the sum of all NFC connection buffers to an ESXi host cannot exceed
32MB. 52 connections through vCenter Server which includes the per-host
limit.
Note: Connections cannot be shared across disks. The maximum limits do not apply
to SAN or HotAdd connections. If the NFC client fails to shut down properly,
connections can remain open for ten minutes.
■ Examine the Tasks and Events sections of the VMware vSphere Client log to
discover internal errors for the specific virtual machine. Correct the internal errors
and then resubmit the job.
Example: Another application or operation is using the VMDK file. To correct this
problem, release the file and then resubmit the job.
Symptom 2:
Virtual standby jobs fail. One of the following messages appears in the Activity Log:
Solution 2:
This problem can occur when:
■ VDDK did not process a snapshot properly.
■ VDDK did not delete a snapshot manually or internal to the virtual machine.
■ To correct this problem, resubmit the job. If the job fails again, delete the recovered
virtual machine and resubmit the job.
Symptom:
Recovery operations fail when recovering data using the HotAdd transport mode. The
following message appears in the Activity Log:
Unknown Error.
Solution:
Recovery operations fail using the HotAdd transport mode when the disk settings are
not configured properly.
Press Enter.
Type SAN and then press Enter.
The current SAN policy displays.
3. Type the following command:
SAN POLICY = OnlineAll
Press Enter.
The SAN policy is configured as do not automatically mount SAN hosted volumes.
4. To clear the read only attribute of the specific SAN disk, select the disk from the disk
list and type the following command:
attribute disk clear readonly
Press Enter
5. Type exit and then press Enter.
The disk is configured and you can resubmit the job. If the job fails again, mount the
HotAdd disks manually using disk management on the proxy system.
Symptom:
The following message appears in the Activity Log:
Solution:
Virtual Standby jobs fail when:
■ The Virtual Standby web service is unable to retrieve information about the virtual
machine from the Hyper-V system. Communication problems between the Arcserve
UDP and the Hyper-V system occur when the required Hyper-V services are not
running on the Hyper-V system.
Solution: Verify that all of the required Hyper-V services are running on the Hyper-V
system.
■ The Hyper-V system does not contain sufficient amount of free disk space that is
required to create the Virtual Standby virtual machine or to create a snapshot of
the Virtual Standby virtual machine.
Solution: Consider reconfiguring the Hyper-V system to allow sufficient free disk
space in the system volume.
How to Display Charts to View Arcserve UDP Reports (see page 973)
You can install .NET Framework and Desktop Experience using the same procedure.
■ Click Add Features from the pop-up that appears notifying you to add more
features before you can install Desktop Experience.
8. Click Next.
9. From the Confirm Installation Selections screen, click Install.
You have completed the installation of .NET Framework and Desktop Experience.
You can view the selected option as Enabled under respective Status.
Important! Even after implementing the three prerequisites, if charts are not displayed
using Print/Email/Save options, then verify if the Registry Editor has FCImgExportDll.
Navigate to the following path to verify the dll:
Data deduplication is technology that eliminates duplicate copies of the same data,
thereby reducing storage space. In an organization, there could be various reasons for
duplicate data such as a specific email attachment forwarded to multiple users. When
you back up this data, you end up saving multiple copies of the same data on the backup
storage media.
Data deduplication eliminates redundant data and saves only one instance of the data.
All other instances are replaced with a reference to that instance. This method can
considerably reduce the storage space that is required to store backup data.
For example, there could be a same 10 MB file that 100 users have stored in their local
systems. When you back up all these local systems or nodes, you would need 1000 MB
of storage space. With Data Deduplication, you can reduce the storage space to
approximately 10 MB because only one instance of the file is stored on the disk. The
remaining 99 instances refer to that one instance.
When a backup is triggered, the deduplication process on the agent first splits data into
blocks and assigns a unique hash key or value to each block. The hash values are then
sent to the recovery point server. At the recovery point server, these hash values are
compared with the existing hash values and the duplicate hashes are filtered out. The
comparison results are then sent back to the agent. Based on this duplicate hash
information, the agent sends the unique data blocks to the recovery point server for
backup. The new hash values of these data blocks are also inserted to its existing hash
list on the recovery point server.
When there are multiple agents, the deduplication process remains the same, however,
duplicate data from multiple agents are filtered out. This eliminates any duplication of
data even from multiple agents.
The following are the benefits of using a Data Deduplication in Arcserve UDP
■ Faster Full Backup
■ Faster Merge Job
■ Global Deduplication Support
■ Optimized Replication
• If it is not duplicated with the existing hash key, it is written to disk. But the
new hash key would not be inserted into hash database because hash database is
full. As a result, the consequent data blocks could not compare against these new
hash keys.
If you enable encryption, the Arcserve UDP Agent (Windows) consumes the CPU
resource to encrypt the data. As encryption is applied only to the unique data, the CPU
resource needed for encryption could be minimum where the deduplication percentage
is high.
■ With no compression and deduplication, the CPU usage is less for the compression
task and the data stored is in the non-compressed format.
■ With standard compression and deduplication, the CPU usage is optimal for the
compression task and the data stored is in a compressed format and the
requirement for storage space is less.
■ With maximum compression and deduplication, CPU usage is maximum for the
compression task and the data stored is 2-3% more and the requirement for
storage space is less.
Deduplication Limitations
You cannot modify compression type, Encryption Setting, and Deduplication Block Size
once you create a deduplication data store.
The command line tool (as_gddmgr.exe) lets you check data integrity at recovery point
level and data store level for deduplication data stores.
You can use this tool to regenerate a hash database in case of a hash database failure.
You can also use this tool to query and manage the backend purge and disk reclamation
for deduplication data stores.
The output of the command is displayed on the Windows command console. The tool
also generates a log file in the “Logs” folder. For example,
as_gddmgr_2014-9-4_11-14-22-655.log is a log file that contains all details.
Location:
You can find as_gddmgr.exe in the "Bin" folder of the UDP installation path.
Syntax:
as_gddmgr.exe
-Scan ChecksumUDPSession <data store name> -Node [<All> |<UDP agent node name>]
-RecoveryPoint [<All>|<recovery point number>] [-Password < data store password >]
[-LogLevel <n>]
-Scan VerifyData <data store name> [-Password <data store password>] [-LogLevel <n>]
-Scan VerifyAll <data store name > [-Password < data store password >] [-LogLevel <n>]
-Scan RebuildHash <data store name> [-NewHashPath <new hash path>] [-LogLevel <n>]
LogLevel <n>
Specifies the log level number.
VerifyRefCount
Scans index files and reference files to verify reference count recorded in the
hash database. Before you specify this option, manually stop the deduplication
data store.
VerifyData
Scans data files and then regenerates the hash keys by comparing this with the
reference file. Before you specify this option, manually stop the deduplication
data store.
VerifyAll
Performs both the VerifyRefCount and VerifyData operations. Before you
specify this option, manually stop the deduplication data store.
RebuildHash
Specify data store name and then regenerate the hash database by scanning
index and reference files. Before you specify this option, manually stop the
deduplication data store.
RebuildHashWithIndexPath
Specify the deduplication index path and then regenerate the hash database by
scanning index and reference files. The option is used only when the data store
is not present on any recovery point servers.
Start
Enables running the purge and disk reclamation in parallel with other regular
Arcserve UDP jobs. Running purge in parallel may cause throughput
degradation of regular Arcserve UDP jobs.
Stop
Disables running the purge and disk reclamation in parallel with other regular
Arcserve UDP jobs.
Status
Queries the status of purge or disk reclamation.
StartToReclaim
Enables running the purge and disk reclamation in parallel with other regular
Arcserve UDP jobs. It skips the real purge phase, which finds out the obsolete
data block, and then directly start disk reclamation phase, which free up the
disk space. The side effect of this option is that it might degrade the efficiency
of the disk reclamation because the real purge might find out more obsolete
data blocks in the data files, but the disk reclaim does not wait for the real
purge phase to complete. In addition, running purge in parallel might cause the
throughput degradation of regular Arcserve UDP jobs.
Note: Be aware that the following options might run for a long time because the
operation scans many files in the deduplication data store.
■ VerifyRefCount
■ VerifyData
■ VerifyAll
■ RebuildHash
■ RebuildHashWithIndexPath
Examples:
If you want to use VDDK 5.5.5 instead of VDDK 6.0.1, follow these steps:
1. Download VDDK 5.5.5 from the VMware website.
2. Extract all files into a temporary folder.
Appendix C: How to apply different version of VDDK other than the built-in Version (6.0.1) in Arcserve UDP 989
Deduplication Limitations
3. From the following path, take a backup of the original bin folder by renaming it
(example, bin_org):
<Arcserve UDP installation path>\Engine\BIN\VDDK\BIN\VDDK64
For example, C:\Program Files\Arcserve\Unified Data
Protection\Engine\BIN\VDDK\BIN\VDDK64
4. Copy the bin folder from the temporary folder to <Arcserve UDP installation
path>\Engine\BIN\VDDK\BIN\VDDK64.
Note: Only VDDK 6.0.1 and 5.5.5 are certified by Arcserve on top of Arcserve UDP
Version 6.0. Other versions of VDDK are not guaranteed to work with Arcserve UDP
Version 6.0.
If you want to perform Virtual Standby or Instant VM after applying different version
of VDDK, follow these steps:
1. Run the following command to check the state of the service.
sc query vstor2-mntapi20-shared
Note: If the state of service is running, go to Step 2. If the specified service does not
exist, go to Step 5 directly.
2. Run the following command to stop the service.
sc stop vstor2-mntapi20-shared
3. Run the following command to delete the service.
sc delete vstor2-mntapi20-shared
4. Run the following command to check if the service has been deleted successfully.
sc query vstor2-mntapi20-shared
Note: If the state of service is STOP_PENDING, restart the machine.
5. Delete the vstor2-mntapi20-shared.sys file from the following location:
C:\Windows\SysWOW64\drivers
6. Navigate to the BIN folder.
<INSTALLDIR>\Engine\BIN
7. Run the following command:
ArcDrvInstall.exe -i
"INSTALLDIR\Engine\BIN\VDDK\BIN\VDDK64\bin\AMD64\vstor2-mntapi20-shared.sy
s" -l <log file path> -p <product id>
Example: ArcDrvInstall.exe -i "C:\Program Files\Arcserve\Unified Data
Protection\Engine\BIN\VDDK\BIN\VDDK64\bin\AMD64\vstor2-mntapi20-shared.sy
s" -l log.txt -p 2
Appendix D: How to Migrate Arcserve D2D r16.5 Backup Data of Two Servers Having Same Host Name to RPS Data Store 991
Appendix E: Arcserve UDP Terms and Definitions
Agent-Based Backup
An Agent-Based backup is a method to back up data using an agent component. The
agent is installed on the source node.
Compression
Related Topics:
Compression is used for backups. Compression is often selected to decrease disk space
usage, but also has an inverse impact on your backup speed due to the increased CPU
usage.
Notes:
■ If your backup image contains uncompressible data (such as JPG images, ZIP files,
and so on), you may need to allocate additional storage space to handle such data.
As a result, if you select any compression option and have uncompressible data in
your backup, it could result in an increase in disk space usage.
configuration
A tab on the Arcserve UDP Console to define configuration parameters such as email
alerts, database settings, and installation preferences.
dashboard
A tab on the Arcserve UDP Console that lets you view the last Backup status and storage
status. You can view the the latest Actual, Raw and Restorable Data storage.
Data Store
A data store is a physical storage area on a disk. You can create a data store on any
Windows system where the recovery point server is installed. Data stores can be local or
on a remote share that the Windows system can access.
Destination
Destination is a computer or server where you store backup data. A destination can be a
local folder on the protected node, a remote shared folder, or a Recovery Point Server
(RPS).
Discovered Nodes
Discovered nodes are physical or virtual systems that are added to the Arcserve UDP
Console by discovering them from active directory or vCenter/ESX server, importing
from a file, or manually adding them using its IP address.
Encryption
The Arcserve UDP solution provides encryption feature for data.
When the backup destination is a recovery point server, the available encryptions are
No Encryption and Encrypt data with AES-256. You can set this to create a data store.
When the backup destination is the local or remote share, the available encrypt format
options are No Encryption, AES-128, AES-192, and AES-256. You can set the option while
creating a plan to backup to local or share folder, or set this from backup setting for
standalone Arcserve UDP Agent.
Encryption settings
a. Select the type of encryption algorithm that you want to use for backups.
Data encryption is the translation of data into a form that is unintelligible
without a deciphering mechanism. The Arcserve UDP solution uses secure, AES
(Advanced Encryption Standard) encryption algorithms to achieve maximum
security and privacy of your specified data.
b. When an encryption algorithm is selected, provide (and confirm) an encryption
password.
■ The encryption password is limited to a maximum of 23 characters.
■ A full backup and all its related incremental and verify backups must use
same password to encrypt data.
■ If the encryption password for an incremental or verify backup is changed,
a full backup must be performed. This means after changing encryption
password, the first backup will be full, despite the original backup type.
For example, if you change the encryption password and submit a customized
incremental or verify backup manually, it automatically converts to a full
backup.
Note: This option is available only for the local or remote share destinations.
You cannot disable the encryption setting if the Arcserve UDP agent is backed
up to data store.
c. The Arcserve UDP solution has encryption password and session password.
■ The encryption password is required for data store.
■ The session password is required for node.
■ If the data store is encrypted, then session password is mandatory. If the
data store is not encrypted, the session password is optional.
A password is not required when you are attempting to restore to the
computer from which the backup was performed. However, when you attempt
to restore to a different computer, a password is required.
Job
A job is an Arcserve UDP action to back up, restore, create virtual standby, or replicate
nodes.
jobs
A tab on the Arcserve UDP Console that lets you monitor the status of all jobs such as
backup, replication, and restore. The details include jobs, task types, node IDs, recovery
points, and plan names.
Nodes
A node is a physical or virtual system that Arcserve UDP protects. Arcserve UDP can
protect physical nodes and virtual machines in a vCenter/ESX or Microsoft Hyper-V
server.
Plan
A plan is a group of tasks to manage backup, replication, and creation of virtual standby
machines. A plan consists of a single or multiple tasks. Tasks are a set of activities to
define the source, destination, schedule, and advanced parameters.
Protected Nodes
Protected nodes are the nodes that have scheduled backup plans to back up data on
regular intervals.
Recent Event
Recent Events are the jobs that are still running or jobs that were recently completed.
Recovery Point
A recovery point is a point in time backup snapshot of a node. A recovery point is
created when you back up a node. Recovery points are stored on the backup
destination.
Replicate
Replicate is a task that duplicates the recovery points from one server to another server.
Resources
resources is a tab on the Arcserve UDP Console. From the resources tab, you can
manage source nodes, destinations, and plans.
Systems
Systems are all type of nodes, devices, and virtual machines that can be managed by
Arcserve UDP. This includes physical, virtual, Linux, and standby virtual machines.
Tasks
A task is a set of activities to define various parameters to back up, replicate, and create
virtual standby machines. These parameters include source, destination, schedule, and
some advanced parameters. Each task is associated with a plan. You can have more than
one task in a plan.
Unprotected nodes
Unprotected nodes are the nodes that are added to Arcserve UDP but a plan is not
assigned. When a plan is not assigned, you cannot back up data and the node remains
unprotected.