Commvault_Professional_Foundations_Course_Guide (1)
Commvault_Professional_Foundations_Course_Guide (1)
Services
Commvault®
Professional
Foundations
Student Guide
Copyright
Information in this document, including URL and other website references, represents the current view of Commvault
Systems, Inc. as of the date of publication and is subject to change without notice to you.
Descriptions or references to third party products, services or websites are provided only as a convenience to you and
should not be considered an endorsement by Commvault. Commvault makes no representations or warranties, express
or implied, as to any third-party products, services or websites.
The names of actual companies and products mentioned herein may be the trademarks of their respective owners.
Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos,
people, places, and events depicted herein are fictitious.
Complying with all applicable copyright laws is the responsibility of the user. This document is intended for distribution to
and use only by Commvault customers. Use or distribution of this document by any other persons is prohibited without the
express written permission of Commvault. Without limiting the rights under copyright, no part of this document may be
reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic,
mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of
Commvault Systems, Inc.
Commvault may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering
subject matter in this document. Except as expressly provided in any written license agreement from Commvault, this
document does not give you any license to Commvault’s intellectual property.
©1999-2021 Commvault Systems, Inc. All rights reserved. Commvault, Commvault and logo, the "C hexagon” logo,
Commvault Systems, Solving Forward, SIM, Singular Information Management, Commvault HyperScale, ScaleProtect,
Commvault OnePass, Commvault Galaxy, Unified Data Management, QiNetix, Quick Recovery, QR, CommNet, GridStor,
Vault Tracker, InnerVault, Quick Snap, QSnap, IntelliSnap, Recovery Director, CommServe, CommCell, APSS,
Commvault Edge, Commvault GO, Commvault Advantage, Commvault Complete, Commvault Activate, Commvault
Orchestrate, and CommValue are trademarks or registered trademarks of Commvault Systems, Inc. All other third party
brands, products, service names, trademarks, or registered service marks are the property of and used to identify the
products or services of their respective owners. All specifications are subject to change without notice.
Confidentiality
The descriptive materials and related information in the document contain information that is confidential and proprietary
to Commvault. This information is submitted with the express understanding that it will be held in strict confidence and will
not be disclosed, duplicated or used, in whole or in part, for any purpose other than evaluation purposes. All right, title
and intellectual property rights in and to the document is owned by Commvault. No rights are granted to you other than a
license to use the document for your personal use and information. You may not make a copy or derivative work of this
document. You may not sell, resell, sublicense, rent, loan or lease the document to another party, transfer or assign your
rights to use the document or otherwise exploit or use the Manual for any purpose other than for your personal use and
reference. The document is provided "AS IS" without a warranty of any kind and the information provided herein is subject
to change without notice.
Contents
Commvault® Professional Foundations................................................................................................................................... 8
Introduction.............................................................................................................................................................................. 9
Commvault® Professional Foundations Course............................................................................................................. 10
Course Overview ........................................................................................................................................................... 11
Education Advantage ..................................................................................................................................................... 12
Class Resources ............................................................................................................................................................ 13
Commvault Education Career Path ............................................................................................................................... 14
Commvault® On-Demand Learning ............................................................................................................................... 15
Education Services V11 Certification............................................................................................................................. 16
Cloud Resources ........................................................................................................................................................... 18
Module 1 – CommCell® Environment.................................................................................................................................... 19
CommCell® Overview ........................................................................................................................................................ 19
Commvault® Software Introduction ................................................................................................................................ 20
Content Store ................................................................................................................................................................. 23
Physical Architecture ..................................................................................................................................................... 24
Logical Architecture ....................................................................................................................................................... 27
Product Lines ..................................................................................................................................................................... 28
Protect, Activate, Orchestrate ........................................................................................................................................ 29
Commvault Command Center Console ......................................................................................................................... 30
Protect – Commvault Complete™ Backup and Recovery ............................................................................................. 32
Protect – Commvault Complete™ Backup and Recovery Functions ............................................................................ 33
Commvault Activate™ - Data Management .................................................................................................................. 34
Commvault Activate™ - Data Management Functions .................................................................................................. 35
Commvault® Disaster Recovery..................................................................................................................................... 36
Commvault® Disaster Recovery Functions .................................................................................................................... 37
Commvault Command Center™ Core Setup..................................................................................................................... 38
Download Commvault® Software ................................................................................................................................... 39
Guided setup .................................................................................................................................................................. 44
Commvault® Command Center Navigation ....................................................................................................................... 52
Navigation Overview ...................................................................................................................................................... 53
Navigating the Commvault Command Center ............................................................................................................... 54
Features............................................................................................................................................................................. 82
Features Overview ......................................................................................................................................................... 83
Commvault Command Center™ Customization .............................................................................................................. 103
Customize Views ......................................................................................................................................................... 104
Customize Navigation .................................................................................................................................................. 111
Customize Theme ........................................................................................................................................................ 114
Provide Feedback ........................................................................................................................................................ 126
INTRODUCTION
Course Overview
Education Advantage
The Commvault® Education Advantage product training portal contains a set of powerful tools to enable Commvault
customers and partners to better educate themselves on the use of the Commvault software suite. The portal includes:
Class Resources
Course manuals and activity guides are available for download for Instructor-Led Training (ILT) and Virtual Instructor-Led
Training (vILT) courses. It is recommended to download these documents the day prior to attending class to ensure the
latest document versions are being used.
Self-paced eLearning courses can be launched directly from the EA page. If an eLearning course is part of an ILT or vILT
course, it is a required prerequisite and should be viewed prior to attending class.
If an ILT or vILT class will be using the Commvault® Virtual Lab environment, a button will be used to launch the lab on
the first day of class.
Commvault® certification exams can be launched directly from the EA page. If you are automatically registered for an
exam as part of an ILT or vILT course, it will be available on the final day of class. There is no time limit on when the
exams need to be taken, but it is recommended to take them as soon as you feel you are ready.
Commvault On-Demand Learning is a convenient, flexible, and cost-effective training solution that gives you the tools to
keep a step ahead of your company’s digital transformation initiatives. You and your company will benefit by:
Commvault's Certification Program offers Professional-level, Engineer-level, and Expert-level certifications. This Program
provides certification based on a career path, and enables advancement based on an individual’s previous experience
and area of focus. It also distinguishes higher-level certifications such as Engineer and Expert from lower-level
certification as a verified proof of expertise.
Key Points
Certification is integrated with and managed through Commvault's online registration in the Education Advantage
Customer Portal.
Cost of certification registration is included in the associated training course.
Practice assessments are available at ea.commvault.com.
Students may take the online certification exam(s) any time after completing the course.
Although it is recommended to attend training prior to attempting an exam, it is not required.
CommCell Administration – user and group security, configuring administrative tasks, conducting data protection
and recovery operations, and CommCell monitoring.
Storage Administration – deduplication configuration, disk library settings, tape library settings, media
management handling, and snapshot administration.
CommCell Implementation – CommServe® server design, MediaAgent design and placement, indexing settings,
client and agent deployment, and CommCell maintenance.
Certification status as a Commvault Certified Professional requires passing the Commvault® Certified Professional Exam.
Engineer – this exam validates expertise in deploying medium and enterprise level CommCell® environments
with a focus on storage design, virtual environment protection, and application data protection strategies.
Certification status as a Commvault Certified Engineer requires certification as a Commvault Certified Professional and
passing the Advanced Infrastructure Design exam.
Certification status as a Commvault Certified Expert requires certification as both a Commvault Certified Professional and
Certified Engineer, and successful completion of Expert certification requirements. These Expert certification requirements
include attending the Expert class and passing the Expert Certification exam.
Cloud Resources
The site http://cloud.commvault.com provides additional resources to help you manage and maintain a Commvault®
installation.
Download Center section – lets you download service packs, hot fixes, and binaries for new installations.
Documentation section – provides a link to the documentation which is updated for each service pack
Forms and Store sections – allows new features and components like workflow or custom reports to be
downloaded and installed into an existing installation.
CommCell® Overview
Data management is only as valuable as the effective ability to access the data. High availability solutions including
clustering, replication, snapshots, and virtualization provide added value through quick recovery times and more frequent
recovery points. The complexity to manage all of these solutions, however, increases without a centralized management
system.
Cloud solutions enhance high availability and disaster recovery, but even though the platform is still sufficiently "new,"
there is a lack of standards on information management and protection.
Commvault® software overcomes the complexity in managing data protection and data access through its platform. The
industry's largest supported number of hardware vendors, cloud providers, and virtualization solutions are all managed
through Commvault's central platform improving data availability and recovery times.
Data protection and access, however, only tell a portion of the story. The ability to share data across all devices, including
mobile Bring Your Own Device (BYOD) devices and endpoint access from any system that uses native applications such
as Windows Explorer, Outlook, or standard web browsers, should be ubiquitous for end users. Commvault software
provides all these capabilities with intuitive end-user features.
Finally, for many organizations, especially those with hybrid data services with content in the data center, as well as
hosted or As a Service, compliance of managed data may be the most complex solution to implement, but it provides the
highest value. Intelligent legal holds, records management, analytics, eDiscovery, and data loss prevention are all
centrally managed through the Commvault® platform.
Data Access – Documents and messages are retrieved seamlessly from mobile devices, web pages, and native
application tools.
Storage – Data is protected and stored on disk, tape, and cloud storage locations. Advanced features such as
deduplication to disk and tape, job and object retention, and independent multiple copy management are used to
meet all Disaster Recovery (DR) and compliance requirements.
Indexing – A distributed self-protecting indexing structure maintains metadata information for all protected data.
Additionally, content indexing is used to provide detailed content searches for files and email.
Data Protection – File system and application agents are deployed to production systems to protect all major
operating systems and applications.
Administration – Administrative tasks are centrally managed through a single administrative interface. Tasks can
also be performed from mobile devices and web pages.
Management – All activity is centrally controlled and managed using a common code base. Whether using
traditional backups, replication, archiving, or snapshots to protect physical or virtual environments; the same core
technology is used to provide a solid and flexible management platform.
The Commvault® platform provides a fully integrated software suite guaranteeing flexibility in infrastructure, platform,
compute, and storage providers.
Content Store
The Commvault® platform structures all managed data in virtual containers using the Content Store. The content store is a
storage abstraction that allows for data that resides within it to be viewed as a single entity, no matter where that data is
otherwise stored.
Data in the Content Store is protected and retained in the 'storage layer.' Functionality, including deduplication, archiving,
hardware snapshot management, and FIPS certified encryption, securely protects data to disk, tape and cloud storage.
Protected data is replicated, mirrored, and synchronized to secondary storage devices for near instant access.
The 'indexing layer' of the Content Store maintains 'lightweight metadata' indices for object management and retrieval, as
well as 'content indices' for end user and compliance searches.
All protected data and indices are accessed through the 'security layer,' which features full role-based access control
security. Commvault security provides granular access control and distributed security roles, allowing users access only to
what they need and managers to assign permissions to their groups.
Access is granted to users to retrieve or restore data using web consoles, mobile devices and endpoint applications.
Compliance tools include content-based eDiscovery, Case Manager, Legal Hold, and data analytics. All data managed in
the Content Store is sharable through the 'security layer' and accessed from the Commvault Command CenterTM,
CommCell® console or any number of secure endpoints.
Physical Architecture
Commvault® software is deployed in a cell-like structure called a CommCell® environment. One or more cells can be
deployed to manage small to enterprise global environments. Consider the following advantages and disadvantages when
planning for a single cell or multi-cell structure.
Single CommCell Provides central management. If the central site hosting the CommServe server goes
environment offline, all data management activities will be disrupted.
Allows data to easily be restored
across all sites.
Multi-CommCell Provides full autonomy and Cross-site restore operations are more complicated if
environment resiliency. each site is its own CommCell structure.
The central component of a CommCell environment is the CommServe® server which coordinates, manages and monitors
all CommCell activity. Production data is protected by installing agents which directly communicate with the operating
system or application being protected. Any production server with an agent installed is referred to as a client. Data is
protected by transferring data through MediaAgents to storage, which can be disk, cloud or tape.
CommServe® Server
The CommServe® Server is the central management system within a CommCell® environment. All activity is coordinated
and managed by the CommServe server. The CommServe server runs on a Windows platform and maintains a Microsoft
SQL metadata database. This database contains all critical configuration information. It is important to note that
Commvault® software does not use a centralized catalog system like most other backup products. This means the
metadata database on the CommServe server will be considerably smaller than databases that contain catalog data. Due
to the small size of the database, an automated backup of the database is executed by default every morning at 10:00
AM.
MediaAgents
A MediaAgent moves data from production systems to protected storage during data protection jobs and moves data back
to production systems during recovery operations. It is a software module that can be installed on most operating
systems. All tasks are coordinated by the CommServe® server. MediaAgents are also used during auxiliary copy jobs
when data is copied from a source library to a destination library such as off-site Disaster Recovery (DR) copies.
There is a basic rule that all data must travel through a MediaAgent to reach its destination. One exception to this rule is
when conducting Network Data Management Protocol (NDMP) dumps directly to tape media. In this case the MediaAgent
is used to execute the NDMP dump and no data will travel through the MediaAgent. This rule is important to note as it will
affect MediaAgent placement.
Storage
Disk
A disk device is a logical container which is used to define one or more paths to storage called backup locations, or mount
paths. These paths are defined explicitly to the location of the storage and can be defined as a drive letter or a UNC path.
Within each mount path, writers are allocated, which defines the total number of concurrent streams for the mount path.
Tape
A tape unit or removable media library is a storage device where media can be added, removed and moved between
multiple units. The term removable media is used to specify various types of removable media supported by
Commvault® software including tape and USB disk drives, which can be moved between MediaAgents for data protection
and recovery operations.
Cloud
A cloud storage device is cost-effective storage that reduces the need to maintain hardware resources, such as tape or
disk storage devices. It also provides the ability to easily increase your storage capacity when required. Cloud storage
provides centralized data access, better failover capabilities and reduces the day-to-day storage administration tasks.
Logical Architecture
Commvault® software logically manages data by containerizing production data, moving the data through logical streams,
and managing protected data using plans.
Plans
The Commvault® software suite offers a wide range of features and options to provide great flexibility in configuring and
managing protected data. Protection capabilities such as standard backup, snapshots, archiving and replication can all be
incorporated in a single environment for a complete end-to-end data protection solution. No matter which methods are
used within a Commvault® environment, the concepts used to manage the data remain consistent.
Commvault® Education Services Page 27 of 439
V11 FR22 Commvault® Professional Foundations February 2021
Product Lines
Protect
Commvault® Backup & Recovery includes everything you need to conduct backup, recovery and archiving activities,
enable operational reporting and perform hardware snapshot management, all in one complete solution.
Disaster Recovery
Commvault® Disaster Recovery is end-to-end data syncing for faster disaster recovery, dev/test operations and workload
migration. This component allows you to provision, sync and validate your data in any environment for important IT needs
like Application Disaster Recovery testing, Dev/Test, and Workload Migration. This module is typically a separately
licensed module above the Commvault® Backup and Recovery.
Activate
Commvault® Activate is an insight toolset for utilizing your data in business, search, discovery and governance contexts.
Commvault Activate can help you overcome your data governance and compliance challenges. This module is typically a
separately licensed module above the Commvault Complete™ Data Protection.
By using out of the box configurations and streamlined procedures, you can automate common tasks including:
Backup & Recovery also provides management of applications like database and email servers that run in on-premises or in
the cloud. Backup & Recovery can manage a hybrid configuration that blends services like Microsoft Exchange and Microsoft
Office 365 and provides transport mechanisms to move users from one deployment to the other and back.
Backup & Recovery also provides protection of Software as a Service (SaaS) like SalesForce and Database as a Service
(DBaaS) like AWS RDS. Oracle Cloud Database, or Microsoft Azure SQL Database and provides mechanisms to move data
between the SaaS/DBaaS and on-premises systems.
Custom reports are available to identify standard data requests like Freedom of Information Act requests or GDPR data
redaction requests. These reports help find data on-premises servers, in backup storage, and in the cloud. The system
also integrates into a legal hold, case management, data retention, and redaction procedure allowing for complete
management of data requests from outside the organization.
Searching for redundant data provides a mechanism to reduce disk usage across a company if data is unnecessarily
replicated across multiple sites and backed up independently providing unneeded copies of the same data.
Activate provides a mechanism to report on multiple copies of the same data and management to reduce the overall disk
consumption to save resources and cost. Locating data replicas can also reduce risk of data loss in sites that do not have
strong security mechanisms as required at a central location. Remote data can be managed and referenced back to a
central site. This help prevent data loss through theft of unintended insecure copies at remote sites or on laptops.
The Commvault Activate™ product also includes a user interface to help manage requests, review requests, and provide
responses to requests in the form or web pages, workflows, and search configurations.
The settings section of Commvault Activate™ helps search for and index data that is not managed or protected with
Commvault Complete™.
The Inventory and Entity Managers allow you to define sources that are searched, but not protected, to provide
compliance and risk reporting. Note that data protection is not offered for these data elements.
A web server or application server is typically tied to a database server. Moving one of these servers to an alternate
location or replicating production into a dev/test environment must be done at the same time to prevent unlinking these
systems.
For workload migration, moving an application server to the cloud without moving the associated database to the cloud as
well results in a significant latency and performance issue for users.
Commvault Disaster Recovery provides workflows and integration of systems to replicate and migrate systems as a unit
rather than individual operating systems or virtual machines. Live Sync and Replication operations provide disaster
recovery features to keep production systems in sync with secondary or backup systems at an alternate on-premises data
center or in the cloud. As data changes on the production system, the changes are replicated to the secondary location
and applied to the standby (or live system) and failover/failback is supported through the user interface for manual or
automated disaster recovery.
Virtual machines can be copied and replicated individually or as a group to provide a disaster recovery copy at an
alternate site or cloud locations.
Databases can be replicated from clustered databases to single instance databases, as well as cloud database instances.
Monitoring is available for all of these features to provide risk analysis to see how long it would take to recover a given
system or group of systems (Recovery Time Objective), as well as failover and failback controls for manual and
automated disaster recovery through a common user interface.
It is highly recommended to consult with Commvault Professional Services to assist with any deployment. They can
provide help with the architecture, physical resources assessment, planning or deployment as required.
Deployment phases:
Planning
Downloading the Commvault® software
Installing the CommServe® server and executing post-install tasks
Installing the MediaAgents and executing post-install tasks
Configuring storage and deduplication
Configure solutions
Apply security
Commvault® offers several methods for obtaining the software installation media required for installing a
CommCell® environment. The Commvault software installation media is available for download from the Maintenance
Advantage website or from the Commvault Software Cloud Services download center.
The Commvault Maintenance Advantage website or Commvault Cloud website provides the latest version of the
Commvault installation media. By clicking Downloads & Packages, you can access the most current software installations
and service packs or select a previous version.
Resumable Download Manager – Based on the Bootstrapper download manager, this option is activated by
selecting the required files from the list and then selecting Launch Download Manager at the bottom of the
screen.
Bootstrapper Direct Download – This option reduces deployment time by selecting only the required
Commvault software components and download of installation media.
2. Click to download the media kits including the most recent service pack.
3. Click to download the hot fixes that were launched after the latest service pack.
1. Once the file is downloaded, extract the contents into a directory and run the Setup.exe as administrator.
2. This will launch the screens to install the CommCell®, MediaAgent, and optional agents to manage and protect
resources.
Guided setup
Once the web-based console component is installed in the environment and you logged into the Commvault Command
CenterTM for the first time, the Core Setup wizard is launched from the Guided setup section. This interface guides you
through the setup process, which is required by the applications available in the Commvault Command CenterTM.
Storage can be configured as a local disk, network disk, or cloud storage using the Add Storage
screen in the Core setup or Getting Started navigation link.
1. Open a supported web browser window and enter the URL - http://<CommServeServerName>/adminconsole.
2. Provide your login credentials.
9. Check the box to select the mount path for backup location.
10. Click the Save button to continue.
11. Slide to enable or disable the use of deduplication for the storage.
12. Enter path to folder for deduplication database.
13. Click for option to browser to volume for storing the deduplication database.
14. Click Save button to continue.
21. Click on Configure email to setup connection to Mail server. This is used for emailed reports and alerts.
Once the email server and storage locations / backup policies are set, the administrator should see the Overview
Dashboard when they first log into the Commvault Command CenterTM.
Navigation Overview
The Commvault Command CenterTM Console navigation is divided into four major sections.
The top section is the Guided setup and Dashboards which help with initial configuration and when you first log into the
system.
The Protect, Activate, and Disaster Recovery sections provide views of systems in the datacenter and in the cloud
based on how they are protected. Much of the activity that most users will focus on is within the Protect section—
unless you have specific needs for Activate or Orchestrate products.
The navigation menu can be customized using the Customize section under Manage to hide products or features
that are not being used.
The Jobs, Reports, and Monitoring section are day-to-day operational functions that a typical administrator uses
to check the health of systems and look at systems that need attention. The dashboard is a good place to get an
overview of daily system health. Clicking on a specific item in the dashboard will take you into the Monitoring or
Reports section to look a little deeper at why something is reporting that it needs attention on the dashboard.
The Storage, Manage, Developer tools, and Web console are system wide configuration and management
functions that are typically setup once and periodically reviewed or reconfigured as needed.
The Manage section includes security administration, as well as systems administration to help reconfigure a
CommCell® environment to adapt to a constantly changing corporate environment.
If you are looking for a specific section of the sidebar, use the Filter navigation box to type characters and sort the sidebar
content.
Guided Setup
The Guided setup window is used to configure or add features to the Commvault Command CenterTM products, which are
Protect, Activate and Disaster Recovery. To add a feature, select the appropriate product tab, and locate and click the
feature tile. If you need to learn more about the feature, click the link that opens the Commvault® Online documentation
and provides additional information.
4. If additional information is needed, click the link to open Commvault® Online documentation.
Dashboard
The dashboard view provides an overall view of the status of the CommCell® and client protection jobs. By default, the
view displays information about all clients. If needed, other specific dashboards can be accessed.
Use your mouse to hover over and identify active areas of the dashboard that can be expanded for additional information.
1. The Overview Dashboard provides summary information about protected servers, storage capacity, and health in
the CommCell environment.
2. Active links in the dashboard sections can be expanded with a mouse click to provide additional information.
2. A features subsection can be clicked to display servers or applications belonging to the feature.
Jobs
The Job view provides monitoring functionality for all active jobs within the CommCell® environment. The Jobs view
displays current running jobs by default. But it can also be used to see the job history of the last 24 hours or the last three
months. From this view, any job can be controlled to kill, suspend, resume and view the job logs.
A progress bar clearly indicates the progress of the job, while its Status column indicates if the job is still running, and if so
in which phase it is, or if it failed, is suspended or was killed.
Reports
The reports view can be expanded to display available reports as tiles. To generate any of the reports, simply click the tile
to generate up-to-date information. Most reports have a graphic view followed by a detailed table. Filters can be applied to
table sections. Table columns can also be selected to be displayed or deselected to be hidden, allowing to customize the
report to clearly identify the relevant information. Reports can also be scheduled and sent by email to an administrator or
a distribution list.
1. This section displays lists of CommCell® reports to run on-demand, schedule and send to email account.
Alerts
The alerts view displays all alerts that were triggered in the CommCell® environment. Displayed alerts can be filtered to a
specific severity level. The Alert info column provides a link to display additional information about the alert. Use the
checkbox to select one or many alerts. Use the Delete link to delete selected alerts. This link appears when at least one
box is checked.
Events
All Commvault® software related events are reported in the Events view. By default, 500 events are displayed, but the
event log can maintain up to 10,000 events or 7 days of events. Events can be filtered by severity level and can also
provide Job ID and Event ID links that can be clicked to display detailed information about the event or the job that
triggered it.
Storage
The storage section and subsections allow managing the CommCell® storage. Different storage types can be added. They
are as follows:
Disk - Direct-attached, SAN-based or NAS storage can be defined as Commvault® disk storage. Deduplication
can be enabled for this type of storage.
Cloud - Any supported cloud vendor storage can be defined as Commvault® cloud storage. Deduplication can be
enabled for this type of storage.
Tape - Removable tape storage units can be configured as Commvault® tape storage. This type of storage cannot
be deduplicated.
HyperScale - This type of storage when using Commvault HyperScaleTM appliance or HyperScale Reference
Architecture.
1. This section contains subsections for configuring storage in the CommCell® environment, also referred to as
backup locations.
2. Several types of storage can be defined; disk, cloud, tape and HyperScaleTM scale-out storage.
CommCell
The CommCell view provides tools to configure or control CommCell® level settings. The following are some of the
settings that can be configured:
Activity Control – Allows to easily enable/disable specific or all activities for a CommCell® environment
Email Settings – Allows configuring the connection information of the organization email server that is used to
relay emailed reports or alerts on behalf of Commvault® software.
Default Plans – Allows setting the default backup plan that is used for each solution.
Servers
The Servers view lists all servers on which Commvault® software is installed, regardless of the feature to which it belongs.
This provides a global view of which entities can be managed using the Actions button.
The client name of an entity can also be clicked to reach additional configuration options.
1. This section displays all servers that are part of the CommCell® environment.
Server Groups
The Server groups view displays all existing client computer groups. Click on the client computer group name to display
configuration options. The Actions button provides access to options such as deleting the group.
1. This section displays all server groups that are part of the CommCell® environment.
Companies
The companies section allows to create companies (also referred to as tenants) in a Managed Services Providers (MSP)
environment. Each company is logically isolated and tenant administrators of a company cannot access data nor
information from other companies. To create a new company, simply click the Add company link.
Plans
The Plans view displays and lets you manage all existing backup plans created in the CommCell® environment. A plan
can be modified by clicking its plan name or can be deleted by clicking the Actions button. A new plan can also be created
by using the Create plan link.
1. This section displays all backup plans created in the CommCell® environment.
Infrastructure
The Infrastructure view displays and lets you manage additional CommCell® components. The Hybrid file stores tile allows
to configure NFS ObjectStore server shares and publish them to users. The Arrays tile allows to configure storage array
communication allowing to use the IntelliSnap® feature when protecting clients with datasets hosted on the array. The
MediaAgent tile provides tools to deploy MediaAgents and configure their settings.
3. Click this tile to configure storage arrays that are protected using the IntelliSnap® feature.
5. Click this tile to configure Index Servers used by features such as Commvault ActivateTM.
Regions
The regions section allows to define regions used in an elastic plan. An elastic plan is used to protect geographically
scattered clients (i.e. roaming users’ laptops) by sending the data to the closest MediaAgent storage target. This greatly
simplifies management by preventing from having to create many plans based on storage location.
1. Expand Manage.
2. Provides licensing information, allows administrator to order additional licenses, or register the product.
3. This subsection is used to customize the Commvault Command CenterTM layout and colors.
4. This subsection provides access to additional configuration including Maintenance, Global filters, Operation
windows, Metrics Reporting and the SNMP connector.
5. This subsection is used to configure and manage network components such as network topologies and data
interface pairs.
Security
The security section allows a user to create and manage users, user groups, and domains that are used in security
associations. The security associations define access and permitted tasks on CommCell® entities that are assigned to
users.
From this section, the following security components can be configured:
CommCell users – Users created in Commvault software used for access to the console.
CommCell user groups – User groups created in Commvault software used in security association.
Roles – Set of access permissions and permitted tasks for users. This set of permissions is assigned to users
through a security association including the role.
Identity servers – Domains that are integrated to Commvault software to leverage domain user accounts and
user groups instead of CommCell users and groups. Also allows to integrate with third-party identity providers
such as Okta and ADFS.
Key management servers - Third-party key management servers managing hardware and/or software
encryption keys.
Credential manager - Stores all credentials required to access resources such a NAS or cloud storage.
2. The subsections allow to configure Users and Groups, add domains to leverage domain users and groups, and
define Roles to provide access to resources and tasks.
Replication
The replication section provides tools to synchronize virtual machines and file systems from a source system to a target
infrastructure, potentially in a remote site. The section is divided in tabs allowing to configure replication and failover
automation:
Replication Groups
The replication groups view lets you configure Commvault® Live Sync replication for groups of virtual machines. This
efficient method prevents the Commvault® administrator from having to configure replication pairs, one VM at a time. This
view displays configured groups and lets you add addition VM groups.
Failover Groups
Commvault® software implements disaster recovery orchestration for virtual machines. If a VM or a group of VMs suffer
from any type of disaster, Commvault® software provides mechanisms to failover the virtual machines to a secondary site.
This feature requires the implementation of Commvault® Live Sync. The Failover Groups view displays the configured
recovery groups and lets you add additional groups.
Storage
The Storage section allows configuration of recovery point stores on the destination site when replicating virtual machines
using Live Sync I/O. For each replication pair, application-consistent recovery points and updates are recorded in the
store, allowing to recover VMs when needed.
3. This section is used to configure virtual machine group failover using DR orchestration.
4. This section displays configured replication targets (stores) for Live Sync I/O replication pairs.
Recovery Targets
Commvault® software provides options to mount virtual machines from Commvault® storage, using Live Mount or virtual
labs. The backup administrator can set boundaries, for users mounting VMs, by using recovery targets policies. These
policies allow to define settings, such as where the VM is mounted (host), or its lifespan (retention). The Recovery targets
view displays existing policies and allows you to create more.
Features
Features Overview
Once the Core Setup is complete, you now begin to add and configure features. Features provide tools that let you
seamlessly perform day-to-day tasks such as: monitoring backup infrastructure, performing the backup and recovery of
laptops, desktop computers, servers and virtual machines, and protecting cloud applications such as Google and
Salesforce. Features are published to end-users or system administrators granularly using Commvault® software role-
based security.
Virtualization Feature
The Virtualization feature provides a simplified management interface for administrators to conduct day-to-day operations
to configure, protect and recover virtual machines using the Virtual Server Agent (VSA).
Use the Commvault Command Center's Virtualization dashboard to check the status of hypervisors, such as VMware® or
Hyper-V®. This view shows information specifically tailored for Virtualization jobs. From here you can check the number of
Hypervisors in your environment and the number of VMs protected. The virtualization dashboard also includes backup job
summaries with details such as how many jobs were completed, failed or killed.
As of Feature Release 22, the virtualization feature provides tools to manage virtual machine protection for the following
hypervisors:
Alibaba Cloud
Amazon
Citrix Xen
Docker
Google Cloud Platform
Huawei FusionCompute
Microsoft Azure
3. The feature uses the plan created during the Core setup by default.
13. Use the drop-down arrow to display a list of backup plans to associate with this VM Group.
Commvault® software provides the following features so that you can efficiently manage your data protection:
Job monitoring
Alerts
Events
Resource reports
During configuration, a backup plan can be created. Otherwise, the system uses the default plan. The plan defines
protection settings, such as the backup destination to receive data, as well as the retention of the data.
3. The feature uses the plan created during the Core setup by default.
6. Continue with default Backup Location or Click link to change the storage pool and set its retention.
8. The window during which backups can be modified by clicking the link.
11. The entire server is protected by default. Click Add to define custom contents.
12. There are no filters applied to backups by default. Click Add to filter specific files or folders for servers that will use
this plan. If you need to exclude a list of files across the organization, create and apply global filters at the
CommCell® or Server group level.
13. For Windows operating systems, System State is protected by default, but could be skipped or protected during
full backups only.
17. Enter fully qualified server name and click ‘+’ to add to list.
18. Enter a user account and password with permissions to install software on the servers.
20. If a reboot is required and this option is not engaged, then all software will not be installed on those servers.
Databases Feature
As of Feature Release 22, the Databases feature provides tools to manage databases protection for the following
vendors:
Oracle
Oracle RAC
Cassandra
DB2
Documentum
Greenplum
Microsoft SQL
SAP HANA
SAP MaxDB
Sybase
PostgreSQL
MySQL
Splunk
Cloud Databases
Once the Commvault Command CenterTM Core Setup is complete, the databases feature can be configured. Database
instances and subclients can be configured directly from the Commvault Command CenterTM.
During configuration, a backup plan can be created. Otherwise, the system uses the default plan. The plan dictates when
databases are backed up and where the data is stored. Additional backup plans can later be defined.
10. Click Add button to continue. A task is created to install the database agent to the defined server.
Laptop Feature
The laptop feature provides tools to manage end-users' laptop and desktop protection.
Once the Commvault Command CenterTM core setup is complete, the laptop feature can be configured. Clients and
subclients can be configured prior to the Commvault Command CenterTM configuration or configured directly from the
Commvault Command CenterTM. During configuration, some information must be provided, as follows:
2. To configure the Laptop feature, locate the Laptop tile and click it.
4. Use the drop-down menu to select a storage pool to receive the backup data.
11. Enter Users to protect by typing either the username, user group or email address.
12. Click on Save to continue. By default, an email will be sent to all selected.
13. Provide the FQDN name and display client name of the DMZ machine used as a gateway to receive laptop
backups.
Customize Views
To create the custom view, open the section from which it will be created, click to display options, and choose Create
view.
1. In any view where available, click the gear to open the display options | Create view.
2. Click Columns.
Once filters are no longer required, they can be cleared to return to the default view.
1. From the view, click the options button of the desired column.
2. Click Filter.
Customize Navigation
The Commvault Command CenterTM navigation is customized based on the type of users logged in. The following options
can be customized:
Navigation preferences – Defines which sidebar entities are visible for each type of users.
Initial landing - When users log into the Commvault Command CenterTM the main dashboard appears as the
default landing page. This landing page can be changed to another view.
5. For any type of users, select the landing page from the list.
Customize Theme
The Commvault Command CenterTM can be re-branded using your company's colors and logo. This gives a personalized
experience to your users. This option is also frequently used by Managed Services Provider (MSP) to provide their
personalized console to their Backup-as-a-Service clients. Several colors can be changed, such as the sidebar, the
header, the text, and icons. A company logo can also be added as well, using a standard image file (JPEG, JPG, PNG or
GIF). Even the login page can be customized by adding your own company's logo and set a background image.
To customize the Commvault Command CenterTM colors, expand the Manage | Customization sections and click the
Theme view. If you are unhappy with the changes, the default colors can be reverted by clicking the Reset to default
button.
1. From the Commvault Command CenterTM sidebar expand the Manage section and select Customization.
3. The Customization view is opened displaying all fields that can be modified.
26. Colors can be reverted to factory default at any time by clicking the reset button.
1. From the Commvault Command CenterTM sidebar expand the Manage section and select Customization.
4. Click on Select file to browse the system for corporate image background to add to the login screen.
6. The Commvault Command CenterTM login screen now displays the custom changes.
Provide Feedback
Feedback is an essential component of the Commvault Command CenterTM and Commvault's team is constantly updating
and improving the software. If you have enhancement suggestions on improving the Commvault Command CenterTM, we
strongly encourage you to provide feedback.
To provide feedback
4. Click Submit.
CommServe® Server
The CommServe® server is the central management system within a CommCell® environment. All activity is coordinated
and managed by the CommServe server. The CommServe system runs on a Windows® platform and maintains a
Microsoft® SQL metadata database. This database contains all configuration information. It is important to note that
Commvault® software does not use a centralized catalog system like most other backup products. This means the
metadata database on the CommServe server is considerably smaller than databases that contain catalog data.
Based on the size of an environment, the CommServe server must be scaled appropriately. For current scalability
guidelines, refer to the Commvault Online Documentation section, 'Hardware Specifications for the CommServe.'
For CommServe server high availability the following options are available:
The CommServe server can be clustered – This is recommended for larger environments where high
availability is critical.
The CommServe server can be virtualized – This is suitable for small to mid-size environments.
It is ABSOLUTELY CRITICAL that the CommServe database is properly protected. By default, every day at 10
AM, a CommServe DR backup job is conducted. This operation can be completely customized and set to run
multiple times a day if required.
All activity is conducted through the CommServe server. Therefore, it is important that communication between
the CommServe server and all CommCell® components is maintained.
During data protection jobs, the CommServe JobMgr process initiates job operations. The CVD process, which exists on
all CommCell components, provides communication with all resources. As each chunk of a job completes, it must be
registered in the CommServe database before the next chunk begins.
During auxiliary copy jobs, the JobMgr initiates the job and spawns the AuxCopyMgr process on the CommServe server.
This process is responsible for sending chunk information to the source MediaAgent and recording chunk updates from
the destination MediaAgent. In Commvault V11, a good portion of this workload is distributed to on demand services on
MediaAgents to assist in the workload. This offload is enabled using the 'use scalable resource allocation' setting in the
auxiliary copy configuration.
During data protection and auxiliary copy jobs, the CommServe server has a substantial responsibility. Consider this when
planning the resources for the CommServe server, especially in larger environments where hundreds of jobs will be
running in parallel.
CommServe® DR Backups
By default, every day at 10:00 AM, the CommServe DR backup process is executed. This process first exports the
CommServe SQL database to a local folder path. An export process then copies the folder's content to a user-defined
drive letter or UNC path. A backup phase subsequently backs up the DR Metadata to the first defined storage target. If a
secondary tape target is configured, a copy of the DR Metadata is sent offsite to a secondary location. Schedules and
export location are customizable in the DR Backup applet in the Maintenance section of the Commvault Command
Center™.
Additionally, a copy of the DR backup can be uploaded to Commvault® Cloud Services, which guarantees that an offline
copy exists and is accessible during recovery if a disaster was to occur.
Export
The Export process copies the content of the \CommServeDR folder to the user defined export location. A drive letter or
UNC path can be defined. The export location should NOT be on the local CommServe server. If a standby CommServe
server is available, define the export location to a share on the standby server.
By default, five metadata backups are retained in the export location. It is recommended to have enough disk space to
maintain one weeks' worth of DR exports and adjust the number of exports to the DR backup schedule frequency.
2. Click Maintenance.
2. Click Maintenance.
The free cloud service requires a Commvault Cloud Services account, which is created using the following URL:
http://cloud.commvault.com
2. Click Maintenance.
In order to improve the process, service pack 15 introduced the option to send a copy of the DR backup in its native
format to a cloud storage. This removes the requirement to use Media Explorer to index the chunks. The administrator
simply needs to connect to the cloud storage and download the DR backup copy.
Please note that the cloud storage must first be created before configuring DR backups.
2. Click Maintenance.
Backup Frequency
By default, the DR backup runs once a day at 10:00 AM. The time the backup runs can be modified, and the DR backup
can be scheduled to run multiple times a day.
Consider the following key points regarding the scheduling time and frequency of DR backups:
If tapes are being sent off-site daily prior to 10:00 AM then the default DR backup time is not adequate. Alter the
default schedule so the backup can complete, and DR tapes can be exported from the library prior to media being
sent off-site.
The DR Metadata is essential to recover protected data. If backups are conducted at night and auxiliary copies
are run during the day, consider setting up a second schedule after auxiliary copies complete.
MediaAgent
MediaAgents are the multifunction workhorses of a Commvault® software environment. They facilitate the transfer of data
from source to destination, hosts the deduplication database, metadata indexes, and run analytic engines.
For MediaAgent resource requirements and guidelines, refer to the Commvault Online Documentation.
Data Mover – moves data during data protection, data recovery, auxiliary copy, and content indexing jobs.
Deduplication Database (DDB) – hosts one or more deduplication databases on high speed solid state or PCI
storage.
Metadata indexes – hosts both V1 and V2 indexes on high speed dedicated disks.
Analytics – runs various analytics engines including data analytics, log monitoring, web analytics, and the
Exchange index for the new Exchange Mailbox agent.
Since all data moving to/from protected storage must move through a MediaAgent, resource provisioning for MediaAgent
hosts (e.g., CPU, memory, and bandwidth) must be adequate for both the volume and the concurrency of data movement
you expect it to handle.
A MediaAgent provides device control over media changers and removable media devices - and writers to disk devices.
This control defines the path upon which data moves to/from protected storage. In addition to normal device integrity
checks, the MediaAgent can validate the integrity of data stored on the media during a recovery operation and validate the
integrity of the data on the network during a data protection operation.
In the scenario where the MediaAgent component is co-located on the same host as the client agent, the exchange of
data is contained within the host. This is called a SAN MediaAgent configuration, or sometimes referred to as LAN-free
backups, and has its advantages of keeping data off potentially slower TCP/IP networks by using local higher
performance transmission devices (e.g., Fibre Channel, SCSI, etc.). On the other hand, a MediaAgent component located
on a host by itself can provide dedicated resources and facilitate exchange of data over longer distances using TCP/IP
(e.g., LAN, WAN, etc.).
The MediaAgent component also achieves additional functions other than moving data. First, the MediaAgent hosts the
index directory. Every protection job allowing granular recovery must be indexed. The MediaAgent oversees indexing the
jobs and keeping the indexing information in the index directory. If Commvault® deduplication is enabled on a disk or a
cloud library, the MediaAgent also hosts the deduplication database containing the deduplication information. Finally, if
Data Analytics is in use, it requires the Analytics Engine to be installed on the MediaAgent.
Deduplication Database
The Deduplication Database (DDB) maintains all signature records for a deduplication engine. During data protection
operations, signatures are generated on data blocks and sent to the DDB to determine if data blocks are duplicate or
unique. During data aging operations, the DDB is used to decrement signature counters for blocks from aged jobs and
subsequently prune signatures, and block records when the signature counter reaches zero. For these reasons, it is
critical that the DDB is located on high performance, locally attached solid state or PCI storage technology.
Metadata Indexes
Commvault® software uses a distributed indexing structure that provides for enterprise level scalability and automated
index management. This works by using the CommServe® database to only retain job-based metadata such as chunk
information, which keeps the database relatively small. Detailed index information, such as details of protected objects is
kept on the MediaAgent. The index location can maintain both V1 and V2 indexes. Ensure the index location is on high
speed dedicated disks.
Analytics
One or more analytics engines can be installed on a MediaAgent. The following provides a high-level overview of the
commonly used analytics engines:
Data analytics – provides a view into unstructured data within an environment. Some capabilities include:
o identifying old files and emails
o identifying multiple copies of large files
o removing unauthorized file types
Log monitoring – identifies and monitors any logs on client systems. The monitoring process is used to identify
specific log entries and set filters based on criteria defined within a monitoring policy.
Exchange index engine – maintains V2 metadata indexing information for the new Exchange Mailbox Agent. It is
recommended when using the Exchange index server that no other analytic engines are installed on the
MediaAgent hosting the index.
You need to protect a smaller remote site and want to keep a local copy of data for quick restore. However, you are
concerned about hardware costs for a MediaAgent.
Solution: Virtualize the remote site MediaAgent and keep a shorter retention for the local copy, producing a smaller
footprint. Then replicate the data using DASH Copy to the main data center physical MediaAgent where it can be kept for
a longer retention.
5. Type the name of the MediaAgent server and click the plus sign to add it to the list. Repeat for all MediaAgents
you need to install.
Storage Overview
Commvault® software logically addresses storage systems to allow virtually any storage target to be used. The three
primary target types are disk, cloud, and tape
Disk Storage
Dedicated disk storage is configured by clicking Add Storage and selecting Disk from the list. One or more
backup locations can be created/added to the disk storage. Backup Locations are configured as Shared Disk
Devices. The Shared Disk Device in a dedicated disk storage has only one Primary Sharing Folder.
Shared disk storage is a target with more than one Primary Sharing Folder configured on a Shared Disk Device.
This enables other MediaAgents access to the same shared volume resource. Common Internet File System
(CIFS) protocol is used to manage multiple MediaAgent access to the same directory. For UNIX hosted
MediaAgents, Network File System (NFS) protocol can be used. NFS shared disks appear to the MediaAgent as
local drives.
If using DAS or SAN, format mount paths (backup locations) using a 64KB block size.
If using DAS or SAN, try to create multiple backup locations (mount paths). For instance, if there are 10 mount
paths, and there is a maintenance job, such as a defrag job running on one, the mount path can be set to read-
only, leaving 90% of the storage available for backup jobs.
Share the disk storage if required.
The following explanations assume Commvault® deduplication is being used.
When using SAN storage, each building block should use a dedicated MediaAgent, DDB and Commvault® disk storage.
Although the backend disk storage in the SAN can reside on the same disk array, it should be configured in the
Commvault® software as two separate Commvault® disk storage; where Logical unit numbers (LUNs) are presented as
mount paths (backup locations) in dedicated targets for specific MediaAgents.
Once the operating system has access to the storage, the Commvault® disk storage can be created.
2. This window displays the disk storage currently configured in the CommCell® environment.
7. Select Local path for DAS and SAN targets or Network path for NAS targets.
2. This view displays the disk storage currently configured in the CommCell® environment.
3. Click the name of the disk storage for which you want to add a mount path.
Note that before sharing the backup locations, the credentials used to access the NAS storage must first be configured in
the Credential Manager applet.
To configure credentials
1. Expand Manage.
2. Click System.
4. Click Add.
8. Select the CommCell® security group which is allowed to manage the credential.
3. Click the name of the disk storage for which you want to share the backup locations (mount paths).
6. This view displays the paths accessing the disks. In this example, only one MediaAgent has access to the disk.
8. Select the MediaAgent with which the backup location (mount path) will be shared.
10. The second access path is added to the list. Repeat the same process to all other backup locations.
Cloud Storage
Using advanced features such as Commvault® deduplication can greatly reduce the bandwidth requirements of backing
up to cloud storage. However, in a disaster situation where a significant amount of data must be restored, bandwidth can
become a serious bottleneck.
Data transfers are achieved using secured channels (HTTPS) and are optionally encrypted to further secure the data sent
to the cloud.
10. Select a saved cloud credential set from the list. If it does not exist, click the plus sign to create it.
11. Type the name of the bucket to use to store backup data.
12. Depending on the cloud provider, you may have to define a storage class.
Deduplication
Deduplication Overview
In any modern data center, duplicate data exists on storage-based media, networks, and virtual servers. Some examples
include identical DLL files existing on different servers, or multiple users working on the same document—each user
modifies different blocks in the file while other blocks remain unchanged. Traditionally this redundant data is stored on
disk or tape, which requires a significant amount of space to protect. With Commvault® deduplication storage techniques,
a single copy of redundant data (and any subsequent references to the same data) is stored only once; reducing the
amount of space needed to save data and protecting against data loss.
Commvault deduplication provides two storage policies that are used to efficiently move large amounts of data:
Client-Side Deduplication is used to deduplicate block data before it leaves the client. From that point forward, only
changed blocks are sent over the network. This greatly reduces network bandwidth requirements after the first successful
full backup is complete.
Using the Deduplication Accelerate Streaming Hash (DASH) full backup reduces the time to perform synthetic full and
traditional full backup operations. The DASH full runs as a read-optimized synthetic full operation, which does not require
traditional full backups to be performed. Once the first full backup has completed, blocks that have changed are protected
during incremental or differential backups. A DASH full runs in place of a traditional full or synthetic full, does not require
movement of data, and updates the index files and Deduplication Database (DDB) when a full backup has completed.
The DASH Copy operations are optimized auxiliary copy jobs that require only modified blocks to be sent to a second disk
target. Because secondary copies do not require high bandwidth requirements, this is an ideal solution for sending off-site
copies to secondary disaster recovery facilities.
Although the Deduplication Database (DDB) checks signature hashes for deduplication purposes, it is not required during
restore operations. Instead the standard indexing methodology is used. This includes using the index directory and index
files written at the conclusion of the job. This resiliency ensures that deduplicated data is restored even during unforeseen
events, such as disaster recovery.
1. Production data is read from the source location and written into a memory buffer. This memory buffer is filled
based on the defined block size. Note that the block size is referred to as a data block with a default of 128KB.
2. A signature is then generated on the data block. The signature uniquely represents the bit makeup of the block.
3. The signature is compared in the DDB to determine if the data block already exists.
Deduplication data movement process high level overview
If partitioned deduplication is going to be implemented using two MediaAgents, it is recommended to use a shared disk
library with a Network-attached Storage (NAS) device. The NAS storage allows either MediaAgent to recover data even if
the other MediaAgent is not available.
The primary purpose for partitioned DDBs is to provide higher scalability. By balancing signatures between database
partitions, you can scale up the size of a single deduplication store. If you have two partitions, the size of the store
doubles – and having four partitions quadruples its size.
Using partitioned databases ensures resiliency. For instance, if one MediaAgent hosting a Deduplication Database (DDB)
goes offline, the other MediaAgent continues data protection jobs as the available DDB continues signature lookups.
However, with the loss of one database, all signatures previously managed by the off-line database would now be looked
up in the remaining online database. This causes existing signatures managed in the off-line database to be compared in
the online database, which results in the signatures being treated as unique, and additional data being written to the
library.
Enabling Deduplication
When configuring storage, you can enable deduplication with a simple click. The deduplicated storage can then be
selected in a plan, which means that all subclient protected by this plan will see their datasets stored in the same storage
and deduplicated against each other. When enabling deduplication, the location for the deduplication database partition
(DDB) must be defined. If more than one MediaAgent is sharing the storage unit (Network-attached storage or cloud),
multiple partitions (up to four) can be created, providing scalability.
Deduplication can be enabled for primary storage as well as secondary storage. When enabling deduplication on a
secondary copy, the data transfer leverages deduplication by sending only the new blocks. All existing blocks are simply
dropped from the source, avoiding unnecessary transmission of data.
6. From the list, select the MediaAgent with access to the storage.
7. Define the storage connectivity. Local is used with Direct-Attached or SAN-based storage, while Network is used
with Network-Attached storage (NAS).
8. Browse or type the path of the first storage mount path.
9. Enable deduplication using the slider.
10. Browse or type the path to the location to host the deduplication database.
11. Click Save.
Tape Storage
Configure the tape storage cleaning method to use. Software cleaning (Commvault) or hardware cleaning (tape
unit) can be used, but not both. A choice must be made.
Share the tape storage if required.
Create a barcode pattern for cleaning tapes and assign it to the Cleaning Media group (CommCell® Console).
If using multiple scratch media groups, create scratch groups and barcode patterns to use (CommCell® Console).
Validate drive speed (from the CommCell® Console) and document for future reference.
Standalone
Blind
Dedicated
Static Shared
Dynamic Shared
Virtual Tape Library (VTL)
USB Devices
Standalone
A standalone tape drive has no robotic media changer and no internal storage slots. Multiple standalone drives controlled
by the same MediaAgent can be pooled together to support multi-stream jobs or cascade of a single stream job without
having to respond to media handling requests. Media used by a Standalone tape target can be pre-stamped or new, and
will be prompted for, by backup or restore jobs as necessary.
Blind
A 'blind' tape target has no barcode reader and is supported by the Commvault® software maintaining the map/inventory
externally in the CommServe® server metadata.
Dedicated
A static configuration where the drives and media changer are connected to only one MediaAgent.
Static Shared
A static configuration where the drives and media changer are connected to only one of several MediaAgent hosts.
Example: In a target with four tape drives, one MediaAgent may have control of the media changer and two drives within
the target while another MediaAgent may have control over the other two tape drives. A drive connected to one
MediaAgent host is not accessible from the other MediaAgent hosts. Should the MediaAgent component having media
changer control fail, no further loading/unloading of media can occur until that MediaAgent is active again. Shared tape
storage in today's world of Storage Area Networks (SAN) are not common.
Dynamic Shared
In a Dynamic Shared tape storage, the drives and media changer are on a SAN and can be accessed by multiple
MediaAgent hosts. Drives not being used by one MediaAgent can be assigned to and used by another MediaAgent. If the
MediaAgent with control of the media changer fails, the control can be automatically passed to another MediaAgent. The
primary advantage of a Dynamic Drive tape target is the use of multiple MediaAgents for processing reads/writes.
Dynamic Drive capability is referred to as GridStor® Technology. GridStor technology is an option that enables load
balancing and failover of data protection jobs.
A Virtual Tape Library (VTL) is a disk-based target that emulates the traditional tape devices and formats, and can be
installed onto any disk space. Refer to the manufacturer's documentation to see if a disk-based storage subsystem
supports VTL emulation mode. Follow the manufacturer's instructions to create the virtual tape library and make sure that
the MediaAgent can detect the virtual arm changer and the drives created.
For some environments with remote office locations connected to a main data center with limited bandwidth such as
'fractional T1' or 'satellite,' USB backup devices may provide the best protection solution. PnP (Plug and Play) Disk
Libraries (USB devices) are configured and recognized by Commvault® software as standalone tape devices. This allows
data to be protected to USB devices using MediaAgents at remote locations, removed and sent to another location and
connected to a different MediaAgent where the data can be accessed and restored. Since the USB device is detected as
a tape device it is considered portable and any Windows MediaAgent within the CommCell® environment can recognize
the device and access/restore the data. This method can also be used for seeding stores when using Commvault
deduplication for remote office protection.
6. Configured and unconfigured hardware is displayed. Select the unconfigured tape storage and its drives
(recognizable by the red exclamation mark in a yellow circle).
MODULE 3 – SECURITY
Users Security
Companies
Companies are the first layer for security. A company is defined in the Manage section of the Commvault Command
Center™. A master administrator for that company can be defined to manage the operation of the CommCell®
environment for that company. The information needed to define a Company includes:
To create a company
To use role-based security, you must create a 'security association' between users or user groups, a role, and entities:
User(s) – defined by using a CommCell® user, an external domain user, a CommCell® user group, or an external
domain user group.
Role – A collection of permissions that defines the level of access granted to a user or a user group.
Entity – A CommCell® resource, such as a server, server group, plan, etc.
For instance, the separation of user/user group (who), role (permissions), and entity (what) allows a user or user group to
have different permissions depending on what their role is for a specific entity.
Example: A user requires backup and recovery permissions for a file server. The same user requires restore only
permissions for a mail server. The user is associated with the file server entity and assigned the backup and recovery
role. The same user is assigned to the mail server entity with the recovery role.
Users
CommCell® users are created to grant access to the Commvault Command CenterTM and CommCell® resources. During
initial installation, a built-in administrative account, called 'Admin,' is created. This account has all privileges to all
CommCell resources.
During the creation of a user, the password can be generated by the system. The user receives an email prompting him to
connect for the first time with the generated password. At this point, the system prompts the user to change it.
1. Expand Manage.
2. Click Security.
3. Click to manage CommCell® users.
Tip! When working with contractors, create accounts they can use to work in the environment, and once they leave,
disable the accounts.
Active Directory
Apple Directory Services
Oracle Directory
Open LDAP
LDAP Server
Note that SAML authentication is also supported.
1. Expand Manage.
2. Click on Security.
3. Click on Identity Servers.
4. Click Add.
Roles
A role is a consolidated set of permissions that is used when creating a security association. A role can be part of as
many security associations as needed to make managing permissions much easier, but each security association can
only have one role. A wide variety of associations are available to define user tasks, such as: ‘in-place recovery,’ ‘out-of-
place recovery,’ ‘tape media operation,’ ‘scheduling,’ VM operations,’ and ‘Content Search.’
Example: If User01 requires backup and restore permissions on server A and User02 requires backup and restore
permissions on server B, you can create a single role called ‘Backup and Restore’ with the appropriate permissions set.
This role can then be used on two different security associations, one for User01 and one for User02.
Create a Role
During the role creation process, you can create a security association with it. All of the users and user groups that are a
part of the security association inherit the permissions in the role.
1. Expand Manage.
2. Click on Security.
3. Click to manage roles.
5. Provide a name for the role Existing roles are displayed in the main window.
6. Select the required permissions.
7. Check/uncheck to enable/disable the role.
8. Click to create the role.
Edit a Role
To edit an existing role:
1. Expand Manage.
2. Click on Security.
3. Click to manage roles.
Delete a Role
To delete a role:
1. Expand Manage.
2. Click on Security.
Security Associations
To use role-based security you must create a security association between users or user groups, a role, and
CommCell® entities. The entity defines the object or group of objects on which the defined user or users can execute tasks
defined by the role. For instance, if a user needs to achieve tasks on a server, create the security association on the
server entity. If the user needs to execute tasks on several servers, a server group can be leveraged on which the security
association can be defined.
5. Search for the CommCell® user, CommCell® user group, domain user or domain user group.
6. Select the role from the list.
7. Click to add the security association.
8. Click to create the security association.
Network Topologies
Commvault® Server Event Manager, GxEvMgrS service, available on CommServe® server. 8401 TCP
GxCVD service dynamically uses free ports for communication during data protection and 1024 to TCP
data recovery jobs. 65535
Since multiple ports are used, especially dynamic ports, it makes it hard to protect a computer behind a firewall if no other
mechanism is in place. If this is the case, you would have to ask your network team to open ports 1024 to 65535 between
all clients in the DMZ and the internal servers. Because this scenario is not an effective solution, Commvault® software
has a set of network routes in place.
Automatic Tunneling
Since service pack 15, the network configuration is easier than ever. The Commvault® components communicate using
the traditional communication port and dynamic ports. If the system notices that the dynamic ports are blocked and
therefore unavailable, it automatically encapsulates data transfers through a tunnel port. There is no need to configure
any network topologies nor network routes in Commvault® software.
The only requirement is that the communication port (8400) and tunnel port (8403) are opened and accessible between
the components.
Network Topologies
Network topologies provide a simplified template to deploy network route configurations to CommCell® components.
There are three network topology groups to configure: One-Way, Two-Way, or Network Gateway. Once the simplified
topology is configured, advanced network route settings remain available at the client group and client levels to further
configure settings.
Servers
DMZ Servers
Servers
Infrastructure Machines
Servers
Infrastructure Machines
DMZ Gateways
The CommCell component that establishes connection attempts to communicate with other CommCell resources when
Commvault services start. Connection attempts and 'keep alive intervals' are set in the Options tab of the firewall settings.
8. Select the required computer groups for which the topology will be applied.
For example, a Windows 2019 file system uses Volume Shadow Service (VSS) to protect file data, so the Windows agent
has the option to enable VSS during backup operations. The agent then has a backup set defined. The backup set is a
complete representation of all data the agent is responsible to protect. Within the backup set, subclients are used to
define the actual data requiring protection. By default, a default subclient is used to define ALL data requiring protection
within the backup set.
Additional subclients can be created to define specific content requiring protection. When content is defined within the
user defined subclient, it automatically is excluded from the default subclient. An example for a custom subclient could be
defining a specific drive containing user data where VSS is initiated for the drive during backup jobs to ensure all open
files are protected.
Each component in the server navigation structure provides specific functionality to properly configure, manage and
protect production data. Each of these components has specific features and properties that are configured to provide a
comprehensive protection strategy.
Server — identifies the client system by CommCell® server name and Host name or IP address.
Agent — is installed on the server, or an access node, to protect specific data such as files, databases, emails or
virtual machines.
Instance — is used with specific agent types such as database application or hypervisors to define specific
configuration for an instance.
Backup Set — is a complete representation of all content the agent is responsible to protect.
Subclient — defines the actual data within the backup set that requires protection.
Security
Agents
Activity control
2. Click the actions button of the server and select Check readiness.
All licenses for the server must be first released to allow the deletion
Retiring a server is a destructive operation that purges the server's data on the next data aging
Consider releasing licenses instead of retiring a server if data needs to be preserved
3. Type Retire and click the Retire button to confirm retirement of the server.
4. The enable after delay button allows to re-enable activity after a time period, or a specific time.
Server Groups
Server Groups are used to group like servers to simplify CommCell® administration. Servers can be added to one or more
server groups.
Simplified navigation when locating servers within the Commvault Command CenterTM.
Configuring user group security to manage entire server groups.
Simplified activity control, such as enabling or disabling data protection or recovery for an entire group.
Assigning server groups when configuring reports and alerts automatically adds/removes clients when changes
are made to the group.
In addition to the manual association method, automatic association rules can also be used. This efficient method
automatically associates servers to a group based on a set of predefined rules. Many criteria can be used to define the
rules.
Activity Control
As with a server, activity can be controlled for an entire server group. This is useful when maintenance requires activity to
be disabled and later re-enabled on several computers at once.
4. The enable after a delay button allows to re-enable activity after a time period, or a specific time.
Agent Deployment
Push Install
From the Servers view | Add Server
The Commvault Command CenterTM is used to push the Commvault® software to servers. The following specific ports are
used to achieve the install:
3. Select the type of file server to configure. For a Windows or Linux server, select File server.
18. The details of the job are displayed, including the error description. In this example, the wrong hostname was
used.
Job monitoring
Alerts
Events
Resource reports
File archive and stubbing
Ransomware Protection
Filesystem synchronization between two similar systems
During configuration, a backup plan can be created. Otherwise, the system uses the default plan. The plan defines
protection settings, such as the storage targets to receive data, as well as the retention of the data.
Subclient Overview
Subclients are used to define data that is protected in a containerized format. Each subclient container manages specific
content within a backup set. Each backup set has one or more subclients.
Default Subclient
By default, most agents have a default subclient. The default subclient acts as a catch all for all data managed within
a backup set. This means the default subclient automatically detects and protects all data the agent is responsible to
protect. When custom subclients are defined, any data managed by the custom subclients is automatically excluded from
the default subclient. This is the concept of mutual exclusiveness of contents within a backup set. Data is mutually
exclusive to the subclient in which it is defined and data cannot be defined in multiple subclients within the backup set.
The concept of Commvault® software is to ‘Copy Once and Reuse Extensively (CORE).’ In other words, protect the data
to the storage target and use secondary copies to create additional copies of data. There are situations where protecting
data from the source location multiple times may be required. To accomplish this, you can create additional backup sets.
Administration | Servers | Agent | BackupSet | Subclient properties view | Content section | Edit
The contents of a default subclient, for most backup agents, is a \ (Windows-based) or / (Linux/Unix based). This
represents an auto-detection functionality that protects any newly added volumes. If the default subclient's content
is modified, the \ or / is removed and auto-detection is disabled. Do NOT modify the contents of the default
subclient. If only certain drives are to be protected, use the Filter tab to exclude the unwanted drives.
Add content by using the Browse button or manually entering it using the Add/Edit Paths button.
Use the Add Paths button to enter UNC paths to protect data on systems that do not have Commvault agents
installed. Then use the 'As user' button to enter a user account with proper permissions to read the data from the
shared location. This feature is only recommended when protecting small amounts of data
Commvault® Education Services Page 263 of 439
V11 FR22 Commvault® Professional Foundations February 2021
The option to 'Backup System State' is used to protect system state data for Windows servers. By default, the
default subclient automatically protects system state data. If required, a separate subclient can be defined to
specifically protect system state. Only one subclient within a backup is be designated to protect system state
data.
F:\Users
[A-L]* or *.pst.
The expression ** represents any folder structure. For instance, C:**\data\ means that any data, from the C: drive, in any
folder structure, is backed up.
7. You can also manually enter full paths or use wildcards and patterns.
8. Click to add it to the list.
9. This area displays the added content.
10. You can back up the Windows system state using the toggle switch.
Add Subclients
Key points for adding subclients:
When new subclients are added, the content defined in the new subclient is automatically removed from the
default subclient.
Content within a backup set cannot be defined in more than one subclient, except for VSA subclients.
Delete a Subclient
To delete a subclient
2. Click the server name for which you want to delete a subclient.
3. Click the ellipsis of the subclient you want to delete. This will open the options menu.
Filtering
Administration | Servers | Agent | BackupSet | Subclient | Content section | Edit
Filters are defined at subclient level to remove specific folders and objects that do not require protection.
Similar to defining content, wildcards and patterns are used to define exclusion filters and exceptions.
11. Click the plus sign to add the exception to the list.
Virtualization Overview
Virtualization has become the standard of data center consolidation whether on-premises or in the cloud. As the number
of virtual machines and the physical hosts they run on grows, a comprehensive protection strategy is required to ensure
proper protection. Commvault® software provides several protection methods for virtual environments on-premises and in
the cloud. These methods provide a comprehensive enterprise hybrid protection strategy.
There are four primary methods Commvault® software can use to protect virtual environments:
Depending on the hypervisor application being used and the virtual machine's operating system, different features and
capabilities are available. The VSA interfaces with the hypervisor's APIs and provides capabilities inherent to the
application. As hypervisor capabilities improve, the Commvault VSA agent is enhanced to take advantage of new
capabilities.
Page 278 of 439 Commvault® Education Services
V11 FR22 Commvault® Professional Foundations February 2021
Agent-Based Protection
Agent-based protection uses Commvault agents installed directly in the virtual machine. When an agent is installed in the
VM, it appears in the CommCell® console just like a regular client and the functionality is the same as an agent installed
on a physical host.
The main advantage with this configuration is that all the features available with Commvault agents are used to protect
data on the VM. For applications, using a Commvault agent provides complete application awareness of all data
protection operations including streaming log backups, granular item-based protection, archiving and content indexing.
SAN Transport Mode is used on a VSA access node with direct Fibre channel or iSCSI access to snapshot VMs in the
source storage location. This mode provides the advantage of avoiding network movement of VM data and eliminates
load on production ESX servers.
Virtual machines are backed up through the VSA and to the MediaAgent. If the VSA is installed on an access node
configured as a MediaAgent with direct access to storage, LAN-Free backups can be performed. For best performance,
Commvault recommends that the VSA have a dedicated HBA to access the VMDK files. If an iSCSI SAN is used, we
recommend a dedicated Network Interface Card on the VSA for access to the SAN.
NAS Transport Mode is used on a VSA access node with direct network access to the datastore NFS volume exports in
the source NAS filer. This mode provides the advantage of avoiding data movement of VM data through the production
ESX servers.
Virtual machines are backed up through the VSA and to the MediaAgent. In such scenario, the VSA access node is
typically installed directly on the physical MediaAgent. For best performance, Commvault recommends that the VSA have
a dedicated Network Interface Card for access to the NAS.
HotAdd Mode
HotAdd mode uses a virtual VSA in the VMware environment. This requires all data to be processed and moved through
the VSA access node on the ESX server. HotAdd mode has the advantage of not requiring a physical VSA access node
and does not require direct SAN access to storage. It works by 'hot adding' virtual disks to the VSA access node and
backing up the disks and configuration files to protected storage.
A common method of using HotAdd mode is to use Commvault deduplication with client-side deduplication, DASH Full
and incremental forever protection strategy. Using Change Block Tracking (CBT), only changed blocks within the virtual
disk have signatures generated and only unique block data are protected.
This mode is also useful when there is no physical connectivity between the physical VSA access node and the Datastore
storage preventing the use of SAN transport mode. Some examples of such scenarios are when using NFS Datastores or
using ESX hosts local disk storage to host Datastores.
NBD Mode
NBD mode uses a VSA access node installed on a physical host. The VSA connects to VMware and snapshots will be
moved from the ESX server over the network to the VSA access node. This method requires adequate network
resources. NBD mode is the simplest method to protect virtual machines.
Add a Hypervisor
Once the VSA software has been installed on all the access nodes, the hypervisor (also known as an instance) can be
configured. One or many hypervisors from any supported vendor can be added in a CommCell® environment using the
Hypervisors view of the Commvault Command CenterTM.
®
To add a VMware hypervisor:
5. Provide the host name to use to reach the hypervisor management server or host.
6. Provide a meaningful hypervisor name to display in the Commvault Command CenterTM console.
7. Provide a service account having administrative. privileges in the virtualization environment
8. Select the VSA access nodes to use from the list.
9. Click Save to add the hypervisor.
10. Click to add a VM group and define which virtual machines to protect…
11. …or click to use the default VM group which protects all virtual machines.
Subclient Filters
Subclient filters are used to filter virtual machines or virtual machine disks. This provides the necessary granularity when
using auto-discovery rules. For instance, a subclient can be defined to discover all VMs in a cluster, for which VMs not
requiring protection can be filtered out.
4. Locate the Content section and click Manage. You may need to scroll down the screen.
4. The view displays the history of backups, restores and Live Sync replications.
From the VM Group view – This initiates a backup for all the VMs defined in the VM Group/subclient.
From the virtual machine – This initiates a backup only for the selected virtual machine.
A manual backup can be initiated for a VSA subclient, also called VM group. This protects all the virtual machines defined
in the subclient. Use this method to re-conduct a backup job that has failed but is not suited for an on-demand protection
of a single VM.
Backup a VM Group
To run a VM group manual backup:
Backup a Single VM
A single virtual machine can be backed up manually using the Commvault Command CenterTM. Running this manual
backup does not affect any configured subclient.
Virtual machines must be backed up at least once before you can request a backup on demand.
An on-demand VM backup is always an incremental backup.
If a VM is included in multiple subclients, an on-demand backup is run for the subclient that performed the latest
backup of the VM.
Recover a Full VM
A virtual machine can be fully recovered in the same virtual environment, or a different environment accessible by a VSA
agent. The VM can be restore with the same name or can be renamed to avoid overriding the source virtual machine.
The Hyper-V host must be running on a Windows 2012 R2 server operating system
For Windows, the destination VM must be running on Windows 2008 R2 with Service Pack 1 or later
The destination VM must be powered on
Ensure the latest integration services are running on the destination VM
Enable Guest file services on the destination VM. If not enabled, the restore operation enables the services
Setup Requirements for VMware:
For Windows, the virtual machine must have the NTFS file system
Requires ESX 5.x, 6.0, 6.5
The virtual machine must be powered on
The latest release of VMware Tools must be installed and running
NOTE: Cloud virtual machines are configured as generic hypervisors and act as a source or target to the virtual server
agent. Conversion is automatically done when the destination hypervisor is selected during the restore process.
Database Protection
The Commvault Command CenterTM console is configured to protect a variety of databases that run on physical servers,
virtual machines, or cloud instances. Features like database snapshots, replication between two systems, database
snapshots, database cloning with data masking, and restore to a sequence number or time interval are supported across
a variety of database engines.
Database backups are performed the same way file system or virtual machines backups are executed. A subclient is
defined and backups are scheduled or run manually from the console. The key advantage to a Commvault database
backup feature is that scripting for a specific database or database type is not needed. With an easy to use Command
CenterTM console, administrators can define and perform backup procedures for a variety of databases without having to
create scripts, special functions, or specific processes and procedures.
Database protection can be done by installing a database agent on the client which is running the database or on a
MediaAgent that can connect to the database using the vendor supported database connections. The database agent can
connect to the database instance and copy the whole instance, the transaction logs, and individual tables.
7. Enter the IP address or server hostname and click the plus(+) sign. If needed, add additional server.
1. From the Databases screen, click on Add Instance to add a database instance.
2. From the Databases screen, click on Add Instance to add a database instance.
6. Click Add.
4. A notification confirms the execution of the job. Click the link for more details.
Database Recovery
Databases can be recovered using a variety of mechanisms but must be recovered back into a similar database.
5. A Database can be restored in place, in other words, over the production database (overwrite).
6. It can also be restored in another.
7. Database files can also be restored to disk.
8. If Out of place is selected, provide the instance in which to recover the database.
9. Provide a name for the restored database.
10. Provide a location for the database files and log files.
11. Select the recovery type to use.
12. Click Submit.
Plans
Plans Overview
The configuration of data protection is greatly simplified in the Commvault Command CenterTM. It is achieved by creating
a server protection plan, which consists of several configuration options easily set in a single wizard. Options included are
storage, retention, backup schedule (RPO), and offsite copy configuration.
Server plan – Used to define data protection settings for file system and application agents.
Exchange plan - Used to configure the Exchange Mailbox agent.
Data classification plan – Used to configure the indexing of the content of backup data (content indexing).
Derived Plans
When creating a plan, several options can be enabled as settings that can be overridden. This is used in conjunction with
the derived plan feature. For any configured plan, it is possible to use it as a base plan and create a derived plan from it.
The derived plan has all the same protection options by default, but overridable options can then be modified. When
modifying the base plan, changes are also applied to derived plans unless they are overridden.
Override must
Override optional
Override not allowed
Scenario: You have multiple servers for which protection requirements are similar except for one option, such as
the backup frequency. Every other requirement (i.e. retention, storage targets) are the same for all servers.
Solution: Create a base plan with all settings defined and set the RPO option to ‘Override must’. Use the plan as
a template from which administrators will create derived plans and set the backup frequency.
Microsoft® Windows
Unix/Linux
Mac OS
It protects virtual machines protected using the Virtual Server Agent (VSA).
It is also used to configure application agents except for the Exchange Mailbox agent, which is configured using an
Exchange plan.
Finally, if the file system, virtual machine or application requires protection using hardware snapshot, Commvault
IntelliSnap® can be configured under the snapshot section of the server plan.
10. It is recommended to create an additional offsite copy, such as tapes, cloud or remote site MediaAgent.
11. Set the frequency at which backups will be conducted.
12. Click the link to set the window during which backups are allowed to run
a. Full backup window – Defines the window during which full backup can run
b. Backup window – Defines the window during which any other type of backup can run (i.e. incremental,
differential, etc.)
17. Expand this section to define what gets backed up by the file system agents.
18. Select the operating system tab.
19. This section defines the files and folder to backup, which by default is the entire server.
20. Click to modify the content to protect.
21. This section defines files and folder to skip during backups.
22. Click to modify the exclusions.
23. Define when to back up the Windows system state.
30. Expand this section to configure the plan as a master for derivative plans.
31. Check to allow derivative plans to override options set by this master plan.
32. Define which options can/must be overridden.
33. Click Save to create the plan.
34. This window displays the plan options, which can be modified if needed.
35. Click to create a derivative plan if needed.
A secondary copy is used to synchronize protected data with a source copy. All valid data (jobs that completed
successfully) written to the source copy are copied to the secondary copy via an update process called an auxiliary copy
operation. This means that all full, incremental, differential, transaction log, or archive jobs from a source copy, are also
managed by the secondary copy. Secondary copies are useful when you want a consistent point-in-time copy at any point
within the cycle of all protected data available for restore. It is recommended to have at least one offsite secondary copy
to ensure full recovery of data, should a disaster occur.
Disk
Cloud
Tape
Although it is recommended to keep the default schedule to ensure the best synchronization possible between copies, it
can be modified if needed.
3. Locate the Secondary schedule section and click the schedule name.
Data Protection
Traditional Backups
Archiving
Snapshots
Replication
Block-Level Backups
Traditional Backups
Traditional backups to tape or disk protect data by backing up each object to protected storage. One advantage of using
traditional backups is that each item protected is a complete separate copy that is backed up to separate media. When
using tape media, the backup becomes portable.
Many modern backup solutions incorporate traditional backups to disk storage, which is then replicated to a Disaster
Recovery (DR) site. For example, Commvault deduplication and DASH Copy uses traditional backups with a scheduled
replication, where only changed blocks are transmitted to the DR location.
Traditional backups are usually slower than some modern protection technologies. Time-consuming backups can have a
negative effect on Service Level Agreements (SLAs). This performance bottleneck is more severe when millions of items,
such as large file repositories, require protection.
While there are positive and negative results of traditional backups, this method has been the most common and cost
effective because it's a reliable data protection solution.
Archiving
Data Archiving is not technically a data protection technology, but it can be used to improve SLAs. Archiving removes
infrequently accessed data from production disks and moves it to less expensive secondary storage. The archived data
can also be recalled by end users or Commvault® administrators.
Snapshots
Snapshots are logical point-in-time views of source volumes that are conducted almost instantaneously. This allows for
shortened RPOs since the snapshots can be conducted more frequently throughout the day. A snapshot is not truly
considered a DR protection strategy since the protected data is not physically moved to separate media.
Advanced snapshot technologies allow for data to be mirrored or vaulted to separate physical disks, which can be located
at off-site DR locations. Snapshot technologies are used to meet strict SLA requirements, but are considerably more
expensive to implement because dedicated hardware is required. Commvault's Continuous Data Replicator (CDR) is a
software-based snapshot and replication technology, which is a cost-effective alternative to hardware snapshots.
For supported hardware and CDR, IntelliSnap® technology is used to conduct and manage snapshots.
Illustration of snapshots
Replication
Replication technology is used to reproduce block or object changes from a source volume to a destination volume.
Replication methods use synchronous or asynchronous replication to synchronize source and destination volumes using a
one-to-one, one-to-many (fan out), or many-to-one (fan in) replication strategy. Production data is replicated providing fast
SLAs for high availability. Backup data or snapshot data is replicated providing a more complete DR solution.
If corruption occurs at the source, it may be replicated to the destination. Therefore, replication should be used along with
point-in-time snapshots.
Block-Level Backups
Block-level backups use a Commvault® driver and Volume Shadow Services (VSS) to quiesce and conduct a software
snapshot of a disk volume. A block-level backup protects data much quicker than traditional object-level backups. Indexes
can optionally be generated for granular recovery, or a live browse operation can be conducted to virtually mount the
volume to provide full or granular recovery. Block-level backups are recommended for volumes with many small files.
Index
Non-Index
Live Browse and Deferred Index-Based jobs
Index-Based Jobs
For many agents, Commvault® software provides granularity during restores. For example, you can use the file system
agent to recover a single deleted file without restoring the entire drive. To restore that single file, Commvault software has
a mechanism that indexes the backup jobs. The index contains the information about all objects that are protected in the
job, as well as the chunk information to locate the object in the library. A data protection job for such agents is referred to
as an index-based job.
Non-index-Based Agents
Some other agents, such as database agents, only support a full database recovery and do not rely on indexes. This is
referred to as non-index-based agents. But not all database agents are non-index based. For instance, the Oracle agent
offers granularity that requires the protection jobs to be indexed.
Live browse has the capability to allow some agents use a mechanism that mounts the backup from the library and
display its content in the console. An example of a Live Browse-based agents is the Virtual Server Agent (VSA) which will,
if configured as such, mount the VM from backups to recover granular files and folders in guest VMs.
Another option for some agents is to defer the creation of the index of a backup job. This is referred to as a deferred-index
job. An example is the IntelliSnap® snapshot; where the option to create an index can be deferred later. In this case, the
snapshot created during the backup job is mounted when scheduled and the index is generated. This is useful to
complete the backup quickly and defer the creation of the index out of peak hours.
Backup Types
Commvault® software provides the following backup types for protecting data:
Full
Incremental
Differential
Synthetic Full
DASH Full
Full
A full backup protects all data within a subclient each time it is run. This provides the most complete level of protection by
backing up all data every time the job runs. It also provides the fastest recovery time since all data is contained within a
single job.
NOTE: Full backups require the most storage space and take the longest time to complete.
Incremental
Incremental backups protect all data that has been added or modified since the last successful backup operation. Based
on the average incremental rate of change and growth, the incremental backups should remain consistent in size. An
incremental backup is considered a dependent operation, as it is dependent on previous incremental backups and the full
backup which started the cycle. For a full restore of data, the full and all incremental backups are required.
Differential
A differential job backs up all data that has been modified or added since the last full backup job. The first differential job
following a full backup just contains incremental changes since the full backup completed. As subsequent differential
backups are run, the backup size increases since all changed and added data is backed up in each differential. As the
cycle progresses and more differential backups are executed, they continually increase in size requiring more storage
until the next full backup runs. Restores are slower than a full, but faster than using incremental jobs since only the full
and most recent differential is required for a complete restore.
Another advantage of differential jobs is that modified data is being redundantly stored throughout the cycle as each
differential completes. This could potentially limit data loss if a differential job is lost or damaged.
Synthetic Full
A synthetic full backup synthesizes full backup operations by copying previously backed up data into a new full backup
job. It works by using the Image file from the most recent backup. The image file contains a list of all objects that existed
at the time the backup operation was run. The synthetic full uses the image to determine which objects require protection
and copies the objects from previous backup jobs into a new synthetic full backup. No data is backed up from the
production client, which can reduce the time required to generate the synthetic full backup as opposed to a traditional full
backup.
For synthetic full backups to work properly, an initial full must be run which provides the foundation in which the synthetic
full backups will be based on. Incremental backups must be run after the initial full and subsequent synthetic full to ensure
all required objects are in protected storage. When the synthetic full runs, it copies all required objects into a new
synthesized full backup, which will then become the foundation for the next synthetic full backup.
Synthetic full backups are useful for large volumes or Exchange mailbox backups where many objects require
protection or when the production client has very short operation windows.
Synthetic full backups work best on non-deduplicated disk storage. When using Commvault deduplication, use
DASH Full backups instead of traditional synthetic full backups.
Using Synthetic full backups on appliance-based deduplication devices can have a negative impact on
performance. In some cases, the performance can be slower than running regular full backups.
If using 3rd party deduplication solutions, test this option before implementing.
4. From the Backup window, select the subclient to run a manual backup for.
5. Click Select to continue.
Data Recovery
Data Recovery
When using the Commvault Command CenterTM, recovering data is accomplished from the client or subclient view. There
are several options available for restoring data depending on the agent type and the operating system.
Data can be restored in-place, which is on the same system, in the same location.
Data can be restored out-of-place, on the same server in an alternate location or on a different server.
Files can be restored in a remote location by providing a UNC path and the user who has access to the share.
Data can be overwritten if it already exists in the destination location.
6. Use the navigation pane to locate the folder containing the data to recover.
7. Select the files or folders to recover.
8. Files can be downloaded in your default download location or…
9. …or click to restore the files.
10. Select the client on which you want to restore the files.
11. Define if you want to recover the files/folders (Data) and/or their permissions (ACLs).
12. Check to do an in-place recovery, uncheck to recover elsewhere on the same server or any other server.
13. If restoring to another location, you can use alternate credentials.
14. If recovering to out of place location, browse to the desired location or type a path.
15. Click to initiate the restore.
Job Management
1. Click on Jobs.
2. Click the job ID number for the job.
1. Click on Jobs.
2. Click the Active jobs tab.
3. Check to select one or multiple jobs.
4. Change the job or jobs status by clicking it.
To re-submit a job
1. Click on Jobs.
2. Select the Job history tab.
3. Select the history range.
4. Click to include Commvault® software administrative jobs.
5. Click the Job Id of the desired job.
The Jobs view simplifies the scavenging of information from log files by concatenating it in a central window. Each section
has a header providing information on the server and log filename from which the entries were extracted.
1. Click on Jobs.
2. Select the Job history tab.
3. Select the history range.
4. For the job, click the Job Id.
5. From the job details view, click More actions | View logs.
6. Displays the server name and log filename from which entries are extracted.
7. Displays all lines extracted from the log file that are relevant to the job.
1. Click on Jobs.
2. Select the Job history tab.
3. Select the history range.
4. For the job, click the Job Id.
5. From the job details view, click More Actions | Send logs.
1. Click on Jobs.
2. Select the Active Jobs or Job history tab.
3. Click to open the column options.
4. Click Filter and click in the field to define filters.
5. Select the desired filters from the list.
6. Once filters are applied, the view is refreshed displaying only relevant information.
7. When no longer needed, click the gear icon and select Clear all filters.
If activity is disabled for a parent object in the Commvault Command CenterTM, activity is automatically disabled
for any child objects.
Activity can be disabled until manually enabled or set to automatically re-enable at a specific date and time.
If activity is enabled for a parent object, activity can be enabled or disabled for any child objects.
Activity that can be enabled or disabled CommCell Server Group Server Agent Subclient
If job activity is disabled at any level, it will automatically disable activity for any child objects. Activity cannot be overridden
at any child levels.
Example: A server group representing servers for a specific location is disabled for maintenance. By disabling activity at
the group level, all servers within the group are automatically disabled.
Example: A specific server has a maintenance window scheduled. By disabling the activity for that server, no operations
will run. All other servers within the group will operate normally.
3. Locate the Activity control section under the Configuration tab and disable activity.
2. Select a delay in hours or click Custom to set a specific date and time.
Blackout Windows
Blackout windows allow the Commvault® administrator to designate periods in which operations do not run. These rules
can be set at the CommCell® environment or at the server plan level. For example, if the plan backup window prevents
backups from 1 p.m. to 6 p.m., no backups will run between 1 p.m. to 6 p.m. for all clients covered by that protection plan.
7. Highlight in blue the hours during which operations are prevented from running.
Full backup window – Define when full backups are allowed to run
Backup window – Defines when other backup types are allowed to run (i.e. incremental, differential, etc.)
4. Highlight in blue, the time period during which backups are allowed to run.
MODULE 6 - MONITORING
Views
Dashboards
Monitoring is traditionally done daily to view the status and condition of a CommCell® environment. The Dashboard is
used as a starting point to monitor the CommCell® environment. It shows key information for a component or aggregation
of components. The dashboard provides an overall status view of the CommCell® environment and client protection jobs.
By default, the view displays information about all clients of all features. If needed, other specific feature dashboards can
be accessed.
Use your mouse to hover over and identify active areas of the dashboard that can be expanded for additional information.
1. The Overview Dashboard provides summary information about protected servers, storage capacity, and health in
the CommCell® environment.
2. Active links in the dashboard sections can be expanded with a mouse click to provide additional information.
Jobs View
The Job view provides monitoring functionality for all active jobs within the CommCell® environment. The Jobs view
displays current running jobs by default. But it can also be used to see the job history of the last 24 hours or the last three
months. From this view, any job can be controlled to kill, suspend, resume and view the job logs.
A progress bar clearly indicates the progress of the job, while its Status column indicates if the job is still running, and if so
in which phase it is, or if it failed, is suspended or was killed.
Event View
All Commvault® software related events are reported in the Events view. By default, 500 events are displayed, but the
event log can maintain up to 10,000 events or 7 days of events. Events can be filtered by severity level and can also
provide Job ID and Event ID links that can be clicked to display detailed information about the event or the job that
triggered it.
Alerts
Alerts View
The Commvault Command CenterTM provides several pre-configured alerts, which monitor the health of
CommCell® components and activities. Additional alerts definitions can also be created. Once triggered, it appears in the
Triggered alerts view, where detailed information can be accessed by clicking the information link. Keeping a close eye on
alerts ensures that issues are addressed as soon as they arise.
Once a triggered alert is no longer required, it can be deleted. The view can be filtered by severity, and the search box
can be used to find an alert.
Triggered Alerts
To manage triggered alerts:
To manage alerts:
10. Click to define the notification recipients when the alert is triggered.
8. Type a username, user group, or email address in the search field and add the recipient.
Reports
Reports View
An administrator can quickly import, customize, and share reports for their installation. Reports are available in the
Commvault Command CenterTM, as well as the Web Console for non-administrative user to consume report content. In
addition to these, you can download a wide variety of reports from Commvault® store for monitoring, trend analysis, and
various statistical information. This set of tools allows an organization to ensure the proper functioning of the environment,
to control its growth, and to optimize its performance.
Reports, such as web reports, PDF reports, or email reports, can be scheduled on a regular basis. New reports can be
downloaded from the Commvault Store or customized to pull data from the CommCell® Database or other external
sources using the Report Editor.
1. Click Reports.
2. The number indicates reports requiring to be updated.
3. Use the search for report by name.
4. Run a report by clicking the icon.
The Reports navigation page shows reports that are installed on this CommCell® environment. An administrator can add
more reports by visiting the Commvault Store and downloading new reports.
Downloading Reports
To download a report from the store:
1. Click Reports.
2. Click Actions to select options.
3. Select Connect to store from the list.
Scheduling a Report
Once a report is downloaded and installed it can be scheduled to be published to a web page or sent via email.
To schedule a report:
1. Click Reports.
2. Click on report icon to run the report.
1. Click Reports.
2. Click on Actions to display the list and select View schedules.
Health Reports
Health Reports are designed to assist with the overall system health of a CommCell®. This report is not designed to be a
daily tool but a weekly, monthly, or quarterly tool. The Health Report shows four different reports; critical issues, issues
that need attention, things that are working well, and general information about the CommCell® environment. Each
window pane includes a section that describes the issue at the top and recommended fixes to help resolve the issue.
Support
• CommCell ID (CCID)
• Incident Classification
The incident classification is key is used to route the service ticket to the right support team within Commvault. The better
classification that can be defined at the creation of the service ticket, the higher probability of a quicker resolution of the
issue.
Open the Create a Support Incident and view the Active Incidents or Resolved Incidents.
Click on the Incident Number or Incident title to view more detail on an incident.
Click on the “Create a Support Incident” on the home screen and fill out the information relating to your problem or issue.
THANK YOU