Docu85742 - NetWorker Module For Microsoft 9.2 Adminstration Guide
Docu85742 - NetWorker Module For Microsoft 9.2 Adminstration Guide
Version 9.2
Administration Guide
302-003-854
REV 01
Copyright © 2007-2017 Dell Inc. or its subsidiaries. All rights reserved.
Dell believes the information in this publication is accurate as of its publication date. The information is subject to change without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS-IS.“ DELL MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND
WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. USE, COPYING, AND DISTRIBUTION OF ANY DELL SOFTWARE DESCRIBED
IN THIS PUBLICATION REQUIRES AN APPLICABLE SOFTWARE LICENSE.
Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property of their respective owners.
Published in the USA.
Dell EMC
Hopkinton, Massachusetts 01748-9103
1-508-435-1000 In North America 1-866-464-7381
www.DellEMC.com
Figures 7
Tables 9
Preface 11
Glossary 117
1 Revision history...........................................................................................................12
2 Style conventions........................................................................................................12
3 Types of supported backups....................................................................................... 21
4 Types of supported recoveries.................................................................................... 21
5 Support for backup and recovery .............................................................................. 22
6 NetWorker backup levels and corresponding NMM backup levels.............................. 23
7 NMM binaries and their description............................................................................ 23
8 GLR of Microsoft application backups........................................................................ 27
9 Pull-and push-directed recovery support ...................................................................29
10 Access privileges for backup and recovery................................................................. 30
11 Icons used in the NetWorker User for Microsoft GUI................................................. 40
12 User group privileges for NMM operations................................................................. 49
13 Privileges options for RDZ.......................................................................................... 53
14 Best practices for application backups....................................................................... 60
15 Configuration details for Data Domain and NetWorker .............................................. 66
16 System-only attributes that are not backed up ..........................................................85
17 Attributes retained after object is deleted.................................................................. 85
18 Parent and the child save sets.....................................................................................91
Note
This document was accurate at publication time. To ensure that you are using the
latest version of this document, go to the Support website at https://
support.emc.com.
Purpose
This guide contains information about using the NetWorker Module for Microsoft
(NMM) 9.2 software and is intended for use by system administrators during the
setup and maintenance of the product.
Note
Audience
This guide is part of the NMM documentation set and is intended for use by system
administrators during the setup and maintenance of the product. Readers should be
familiar with the following technologies used in backup and recovery operations:
l NetWorker software
l Microsoft Volume Shadow Copy Service (VSS) technology
l Microsoft Virtual Device Interface (VDI) technology (if using NMM to backup and
recover SQL Server VDI)
Revision history
The following table presents the revision history of this document.
Related documentation
The NMM documentation set includes the following publications:
l NetWorker Module for Microsoft Release Notes
l NetWorker Module for Microsoft Administration Guide
l NetWorker Module for Microsoft Installation Guide
l NetWorker Module for Microsoft for SQL and SharePoint VSS User Guide
l NetWorker Module for Microsoft for SQL VDI User Guide
l NetWorker Module for Microsoft for Exchange VSS User Guide
l NetWorker Module for Microsoft for Hyper-V VSS User Guide
l ItemPoint for Microsoft SQL Server User Guide
l ItemPoint for Microsoft Exchange Server User Guide
l ItemPoint for Microsoft SharePoint Server User Guide
l NetWorker documentation set
Special notice conventions that are used in this document
EMC uses the following conventions for special notices:
NOTICE
Note
Typographical conventions
EMC uses the following type style conventions in this document:
Italic Used for full titles of publications that are referenced in text
Monospace Used for:
l System code
l System output, such as an error message or script
l Pathnames, file names, prompts, and syntax
l Commands and options
You can use the following resources to find more information about this product,
obtain support, and provide feedback.
Where to find product documentation
l https://support.emc.com
l https://community.emc.com
Where to get support
The Support website at https://support.emc.com provides access to licensing
information, product documentation, advisories, and downloads, as well as how-to and
troubleshooting information. This information may enable you to resolve a product
issue before you contact Support.
To access a product specific Support page:
1. Go to https://support.emc.com/products.
2. In the Find a Product by Name box, type a product name, and then select the
product from the list that appears.
3. Click the following button:
Live chat
To participate in a live interactive chat with a support agent:
1. Go to https://support.emc.com.
2. Click Chat with a Support Agent.
Service requests
To obtain in-depth help from Support, submit a service request. To submit a service
request:
1. Go to https://support.emc.com.
2. Click Create a Service Request.
Note
To create a service request, you must have a valid support agreement. Contact a sales
representative for details about obtaining a valid support agreement or with questions
about an account.
Note
NMM VSS only supports Windows disk manager. Other volume manager software,
such as Veritas, is not supported.
details about how to perform BBB for Exchange Server and Hyper-V Server
respectively.
During BBB, the backup client analyzes the volume and backs up only the changed or
new blocks for a file since the previous backup. Using BBB instead of file-based
backup can reduce backup storage requirements and minimize the recovery point
objective (RPO) when backing up and restoring files.
BBB provides the following advantages over file-based backup:
l For BBB volume backups, BBB does not require a backup of all the files in the
volume. BBB copies the used blocks in the volume for level full or incremental
backups. Performing a file-by-file search and copy can be time consuming.
l During backup, BBB copies only those blocks that have changed since the last
backup, while file-based backup copies complete files that have changed within a
file. By copying only the changed blocks, BBB backups complete faster than file-
based backups.
l BBB provides backup in native VHDx or VHD format based on operating system
support. VHDx or VHD backup format has advantages such as instant backup
access, fast search, incremental forever, synthetic full, and granular level
recovery.
When using BBB for Exchange, consider the following:
l BBB is the only supported backup technology for NMM 9.0 and later.
l Select BBB when you configure a client resource, and select a Data Domain device
or an Advanced File Type Device (AFTD) as the target device, otherwise the
backup fails. Direct File Access (DFA) must be enabled for the target devices.
l Cloning for incremental backup is not supported on AFTD.
l When you use Data Domain, the resulting backup on the target device is a full
backup because NMM uses Data Domain virtual synthetics technology to create a
synthetic full backup.
l If the database moves to another node, an Exchange Server incremental backup is
promoted to BBB full.
l The backup is always VSS full backup regardless of the backup level that the
protection policy passed.
When using BBB with NMM Hyper-V, consider the following:
l BBB is the only supported backup technology for NMM 9.0 and later.
l BBB for Hyper-V does not use the BBB Change Block Tracking, but uses the
Microsoft Native Change Block Tracking for incremental backups.
l Select BBB when you configure a client resource, and select a Data Domain device
or an Advanced File Type Device (AFTD) as the target device, otherwise the
backup fails. Direct File Access (DFA) must be enabled for the target devices.
l Cloning for incremental backup is not supported on AFTD.
l When you use Data Domain, the resulting backup on target device is a full backup
because NMM uses Data Domain virtual synthetics technology to create a
synthetic full backup.
l The VSS backup level follows the NetWorker backup level.
BBB does not support the following:
l Encrypted, compressed, or deduplicated files.
NMM architecture
In NMM 8.2.x and earlier, NMM uses NetWorker client as the base, Replication
Manager APIs for application consistency snapshots, and PowerSnap for data
movement and snapshot lifecycle management.
In 9.0 and later releases, NMM uses the VSS Common Requester for all VSS
framework-related operations and all workflows. Data roll-over is performed using the
NetWorker Save for SQL Server (VSS) and SharePoint VSS, and the BBB framework
for Hyper-V and Exchange Server.
NMM 9.0 and later architecture has:
l Improved backup and recovery performances
l Reduced complexity in configuring backups
l Removed complex and time-consuming maintenance of different layers
l Removed restrictions on workflows for addition of new features
l Simplified backup and recovery logs
All NMM 8.2.x and earlier features are supported by the simplified NMM 9.0 and later
architecture and there are minimal changes to the graphical user interfaces.
The following diagrams show the architectural differences between NMM releases
earlier than 9.0 and NMM 9.0 and later.
NMM architecture 19
Overview of Product Features
Note
NMM does not support backup and recovery of Windows Server 2012 and later
deduplication volumes.
Types Description
Scheduled Scheduled backups are available for all Microsoft applications. The
backup NetWorker server backs up client data regularly through scheduled backups.
You can schedule a backup to start at any time.
Manual backup Manual, or ad-hoc, backups are available for Microsoft SQL Server when
using the VDI technology. You can start a manual backup at any time from
the command line or GUI. Manual backups from the NetWorker User for
Microsoft SQL Server GUI are always full backups. Manual backups from the
command line or the NMM Microsoft SQL Server Management Studio plugin
can be any level.
Types Description
Conventional The entire volume or database is recovered as a whole.
recovery
Granular level Granular level recovery (GLR) lets you recover specific items, such as files
recovery and folders. The "Granular level recovery" section provides more details.
Flat file The "NMM Support Tools for recovery" section provides details.
recovery
Bare metal The "Windows Bare Metal Recovery" chapter provides details.
recovery
Note
For all types of Exchange and Hyper-V Server backups and recoveries:
l The backup device must be AFTD or Data Domain, and must have client direct
access. You can then clone to other backup devices, such as tape or CloudBoost,
or even AFTD and Data Domain that have no direct client access.
l The recovery must be from AFTD, Data Domain, or CloudBoost and the client must
have a direct access. If the device, for example tape device is ineligible, you can
clone to AFTD, Data Domain, or CloudBoost and ensure that client-direct access is
possible before performing recovery.
For SharePoint Server and SQL Server VSS granular level recovery, the recovery
must be performed from AFTD, Data Domain, or CloudBoost device and the client
must have a direct access.
The following table lists the types of backups and restores that NMM supports for
different Microsoft applications.
Backup and Active SQL Server Exchange SharePoint Hyper-V SQL Server
recovery Directory (VSS) Server (VSS) Server (VSS) (VSS) (VDI)
types
Scheduled Yes Yes Yes Yes Yes Yes
backup
Note
The "Supported NetWorker server and client versions" section in the NetWorker
Module for Microsoft Release 9.2 Installation Guide provides the NMM support matrix
for NetWorker server and client versions. Refer to the individual NMM release
sections of the NetWorker Online Software Compatibility Matrix at http://
compatibilityguide.emc.com:8080/CompGuideApp/ for more specific details.
Note
NMM binaries
The following table lists the NMM binaries and their description.
Note
This binary cannot be used for adhoc backups from the client
side based Command Line Interface (CLI) backup.
NMM binaries 23
Overview of Product Features
nsrnmmhypervra.exe This binary is used to get save set information for a Hyper-V
Server. This binary is used during NMM Hyper-V client
configuration using the Client Backup Configuration wizard
and provides information on all virtual machines on a Hyper-V
host or cluster.
The save set list is displayed in Client Backup Configuration
wizard > Save set field.
nsrnmmexchra.exe This binary is used to get save set information for a Exchange
Server. This binary is used during NMM Exchange client
configuration using the Client Backup Configuration wizard
and provides information on the databases on the Exchange
Server or DAG.
The save set list is displayed in Client Backup Configuration
wizard > Save set field.
nsrnmsqlra.exe This binary is used to get save set information for a SQL
Server. This binary is used during NMM SQL Server client
configuration using the Client Backup Configuration wizard
and provides information on all available SQL instance and
database information.
The save set list is displayed in Client Backup Configuration
wizard > Save set field.
nsrsqlsv.exe This binary is used for SQL Server backup using VDI
technology, and is independent of the NMM backup save
binary for VSS based backup. This binary can be used for
adhoc backup of SQL Server using CLI.
nsrsqlrc.exe This binary is used for SQL Server backup using VDI
technology, and is independent of the NMM backup save
binary for VSS based backup. This binary can be used to
perform SQL data restore using CLI.
nwmssql.exe This binary is used by the NetWorker User for SQL Server GUI
for client initiated backups and recovery using VDI
technology.
Note
Note
The information in this section is not required for users who use NMM 8.2.x release
for SQL Server VDI or Active Directory backup and recovery and who upgrade to
NMM 9.0 or later.
l Select the Restore of NMM 8.2.x and Earlier Backups (VSS workflows) option
in the installer to install the required recovery GUI on your system. The NetWorker
Module for Microsoft Installation Guide provides information about this option.
l Use the Restore previous NMM release backups shortcut on the Start menu to
recover backups that were created with NMM 8.2.x releases. The application-
specific user guides provide information about this feature.
l Edit the client resources that were created with the NMM 8.2.x release before
performing the recovery. The "Scheduled Backup" chapter provides information
about editing a client resource and the bulk edit feature.
l Ensure that the Snapshot attribute of the NetWorker group that a client resource
belongs to is clear, or create a new group that does not have the snapshot option
selected.
Note
without having to recover the full backup. This feature reduces the space
requirements on local system storage and might reduce recovery time depending on
the size of data and target storage.
The following table provides the descriptions for GLR of SharePoint Server, Hyper-V
Server, Exchange Server, and SQL Server VSS.
Microsoft Description
application
GLR for To perform GLR for SharePoint, use the Granular level recovery tab in the
™
SharePoint NetWorker User for Microsoft GUI and the ItemPoint for SharePoint
software.
The GLR plug-in uses NetWorker Virtual File System (NWFS). This plug-in
exposes files from a list of save sets within a single full backup as a virtual
file system on an NMM client. The NetWorker Module for Microsoft for SQL
and SharePoint VSS User Guide provides specific details for SharePoint GLR.
GLR for Hyper- To perform GLR for Hyper-V Server, use the GLR option in the NetWorker
V User for Microsoft GUI. The GLR operation for Hyper-V is performed using
a Block Based Backup mount. The "Block Based Backup and Recovery"
chapter in the NetWorker Administration Guide provides information about
BBB, and the NetWorker Module for Microsoft for Hyper-V VSS User Guide
provides specific details for Hyper-V GLR.
GLR for To perform GLR for Exchange, use the Granular level recovery tab in the
Exchange NetWorker User for Microsoft GUI and the ItemPoint for Exchange
Server software.
The GLR operation for Exchange is performed using a Block Based Backup
mount. The "Block Based Backup and Recovery" chapter in the NetWorker
Administration Guide provides information about BBB, and the NetWorker
Module for Microsoft for Exchange VSS User Guide provides specific details
for Exchange GLR.
GLR for SQL To perform GLR for SQL Server, use the Table Restore tab in the NMM
Server SQL Studio Management plugin GUI and the ItemPoint for SQL Server
software.
The NetWorker Module for Microsoft for SQL VDI User Guide provides
information about SQL GLR.
Note
For example, the following figure displays the save sets that are written to the
tape.
Figure 3 Save sets that are written to the tape
2. Run the nsrclone command to clone the save sets on the tape device to an
AFTD or DD device. Ensure that these save sets are placed in the same group
policy as the original backup.
The NetWorker Administration Guide provides information on the nsrclone
command.
3. Perform GLR of the cloned save sets on the AFTD or DD device.
Directed recovery
The NetWorker Administration Guide provides details about directed recovery and
requirements.
There are two types of directed recovery:
l Pull-directed recovery—The control role and destination role are run on the same
computer. The control role that runs on the destination computer pulls the
recovery data to itself. Backup data from the source client is restored to the
destination client.
l Push-directed recovery—The control role can run on the source client or on a
different client. The control client computer pushes the backup data to the
destination client, which resides on a different computer from either the source
client or the control client.
The following table lists the pull-and push-directed recovery support that NMM
provides.
Hyper-V No No
For pull-directed recovery for the applications listed in the preceding table, you can
perform the following tasks:
l Run NMM recovery on the same server that the data is being backed up to but to
a different location.
l Specify the alternate server to recover to.
Note
You can perform a SQL Server directed recovery (flat file recovery) to either of the
following destinations:
l A different computer
l The original computer but a different location
The NetWorker Module for Microsoft for SQL and SharePoint VSS User Guide provides
details.
Note
When you perform a directed recovery of Exchange Server, ensure that the following
elements are the same for both the source and destination servers:
l The operating system and service packs
l Exchange Server 2010 version and its RU levels
l Exchange Server 2013 version and its CU levels
l To enable user access for NMM when User Access Control (UAC) is used, grant
the "Log on as a batch job" privilege to the remote user who performs NMM
operations. This act allows the user to log on with a privileged security token.
Perform the following steps to grant the "Log on as a batch job" privilege:
1. On the client, open the Local Security Policy (secpol.msc) on the client.
2. Click Local Policies > User Rights Assignment.
3. Ensure that the Windows user or associated group has the Log on as a batch
job privilege.
l The backup user is a part of the required Windows user groups on the application
hosts.
l The correct NetWorker user role is assigned to the backup user on the NetWorker
server. The following table describes the backup user, the required Windows user
groups on the application hosts, and the NetWorker user role.
The following table lists the access privileges for NMM backup and recovery.
l Domain Users
l Exchange Servers
l Remote Desktop Users
l Organization
Management
l Log on as Service
l Domain Users
l Remote Desktop Users
l Domain Users
l Remote Desktop Users
Note
Ensure that the Operate NetWorker privilege is set on the NetWorker server before
you perform federated backups because the Operate Networker privilege is required
to create additional backup and recovery jobs on remote hosts. The Operate
NetWorker privilege is a part of the Operators role.
group=group_name, domainsid=domain_id
Note
Block Based Backup (BBB) for Exchange Server and Hyper-V Server does not support
AES encryption.
l When you configure the client resources for VSS backups, in the Create Client
window, on the General tab, in the Directive field, select Encryption directive.
Complete this task for all applications for which AES encryption must be
implemented.
For example, in the following figure the Encryption directive is selected in the
Directive field when configuring the client resource for SQL VSS backup.
l The NetWorker Module for Microsoft for SQL VDI User Guide provides information
on how to implement AES encryption for a SQL VDI client resource.
l The Domain Name System that contains the names of all servers on the
network.
2. When you configure a client resource for solutions like Exchange, SharePoint,
and so on, specify the NETBIOS name for the client in the Aliases attribute.
Note
The NMM packaging support tools are unavailable for use with SQL Server VDI.
Using the mminfo command with NetWorker 8.2.3 or later server, NetWorker 9.2
client, and NMM 9.2 client
When you use a NetWorker server version 8.2.3 or later with version 9.2 of the
NetWorker and NMM clients, you can use the mminfo command to list and filter save
sets.
In the following example configuration, NMM has two virtual machines, vm1-windows7
and vm2-windows7. Each virtual machine has two virtual hard disks, and backups were
performed on December 13, 2015 and December 14, 2015.
To recover the virtual machine vm2-windows7 backups that were performed on
December 13:
1. Get the save sets of the applications that were backed up on December 13.
mminfo -v -q "savetime>12/13/2015,savetime<12/14/2015" -r name
APPLICATIONS:\Microsoft Hyper-V
APPLICATIONS:\Microsoft Hyper-V\Host Component
APPLICATIONS:\Microsoft Hyper-V\Host Component\ConfigFiles
APPLICATIONS:\Microsoft Hyper-V\vm1-windows7
APPLICATIONS:\Microsoft Hyper-V\vm1-windows7\9D8F71EF-1B49-4237-
BCFE-6179DB1323DB
APPLICATIONS:\Microsoft Hyper-V\vm1-
windows7\A3231C45-7AD2-4C9E-9E5C-0D3D36015FA2
APPLICATIONS:\Microsoft Hyper-V\vm1-windows7\ConfigFiles
APPLICATIONS:\Microsoft Hyper-V\vm2-windows7
APPLICATIONS:\Microsoft Hyper-V\vm2-windows7\0EB90A1E-4095-4DC8-
B85C-6CC210E80FBC
APPLICATIONS:\Microsoft Hyper-V\vm2-
windows7\5E499BC1-8737-4331-9445-5AE4CF63867D
APPLICATIONS:\Microsoft Hyper-V\vm2-windows7\ConfigFiles
2. Get the SSID of vm2-windows7 of December 13:
mminfo -v -q "savetime>12/13/2015,savetime<12/14/2015" -N
"APPLICATIONS:\Microsoft Hyper-V\vm2-windows7" -r ssid
3631036106
3. Restore client file indexes for the vm2-windows7 of December 13 using the
scanner command.
scanner -i -v -S 3631036106 \\pwsvr002\MyDev
Using the nsrnmmrc.exe command with NetWorker 9.2 server, NetWorker 9.2
client, and NMM 9.2 client
You can perform flat file recovery of a Hyper-V or Exchange Server backups by using
the nsrnmmrc.exe command at the command prompt.
1. Use the mminfo command to generate a list of save sets:
mminfo -avot -q client=<client_name>
Where <client_name> is the name of the client where the backup resides.
2. Review the output and locate the save set ID (SSID) of the backup you must
recover.
3. Type the following command with the SSID to generate the nsavetime for the
backup:
mminfo -q ssid=<SSID> -r "name(50),ssid,savetime,nsavetime"
4. Review the output and note the nsavetime value.
5. Use the nsrinfo command to obtain the index path for the save set item:
nsrinfo -n [nmm | nmm_bbb] -s <server name> -t <nsavetime> <client
name>
6. Use the nsrnmmrc.exe command to restore the backup:
nsrnmmrc.exe -s <server name> -c <client name> -A
NSR_BBB_TRANSPORT=<yes/no> -x <recovery_folder_path> -t <nsavetime>
"APPLICATIONS:\Microsoft <application_host>\<index_path>\\"
Where:
l The -x option is the directory for the flat file restore.
l NSR_BBB_TRANSPORT=Yes is the default option for Exchange Server and
Hyper-V Server.
The following examples display sample commands for Hyper-V and Exchange
Server:
l Hyper-V Server:
nsrnmmrc.exe -s vmmsrv -c fmpcluster.aqua.local -A
NSR_BBB_TRANSPORT=yes -x c:\recover -t 1474605441 "APPLICATIONS:
\Microsoft Hyper-V\vm1\\"
l Exchange Server:
nsrnmmrc.exe -s nsr_server -c jetsdag -A NSR_BBB_TRANSPORT=yes -
x c:\recover -t 1474585250 "APPLICATIONS:\Microsoft Exchange
2013\Mailbox Database 1\\"
Refer to the following knowledge base article for more information:
https://emcservice--c.na16.visual.force.com/apex/KB_How_To?
id=kA5j00000008VAJ
Note
NetWorker SQL Ad-hoc plugin support is unavailable for SQL Server 2005 (x86).
Recover view
All recoveries are performed from the Recover view by selecting the Recover icon
on the left of the NetWorker User for Microsoft GUI main page.
The following figure displays the Recover view.
Figure 5 Recover view of the NetWorker User for Microsoft GUI main page
The summary of selected items can also display exclusions, which are those items that
are not selected for recovery. This view can be helpful when many items are selected
for recovery.
Monitor view
Recovery and snapshot management operations can be monitored in the Monitor view
by selecting the Monitor icon on the left of the NetWorker User for Microsoft
GUI main page.
The following figure displays the Monitor view.
Figure 6 Monitor view of the NetWorker User for Microsoft GUI main page
Most messages that are displayed in the Monitor view are also written to log files. The
Troubleshooting chapter provides more information about log files. You can also copy
and paste text from the Monitor view to another application.
Display conventions
The NetWorker User for Microsoft GUI uses specific icons to identify various tasks
and operations.
The following table outlines the main conventions used in the NetWorker User for
Microsoft GUI.
Log files Displays the log files that contain backup and
recovery details.
Note
You can also click Options > Configure Options to connect to a NetWorker server.
Procedure
1. From the Start menu, open the NetWorker User for Microsoft GUI:
l If you have opened the NetWorker User for Microsoft GUI before, go to the
next step.
l If this is the first time you have opened the NetWorker User for Microsoft
GUI, the Change NetWorker Server dialog box appears. Continue to step 3.
2. From the Main toolbar, click NetWorker Server.
The Change NetWorker Server dialog box appears.
3. Click Update Server List to browse for NetWorker servers. The discovery
process might take a few minutes.
4. When the list is updated, perform one of the following tasks:
l Select a server. The selection appears in the Server field.
Display conventions 41
NMM Client Graphical User Interfaces
Specifying recovery browse times in the NetWorker User for Microsoft GUI
The NetWorker User for Microsoft GUI navigation tree displays backup items from the
specified date and earlier.
Procedure
1. Open the NetWorker User for Microsoft GUI.
2. On the application toolbar, click Browse.
3. Select the arrows to select the date and time, and then click OK.
Marked objects
This topic describes the meaning of marked objects.
l Unmarked—An unmarked item is one that is not selected for backup or restore.
An empty checkbox appears to the left of an unmarked item.
l Marked—A marked item is one that is selected for backup or restore. A check
mark appears in the checkbox to the left of an marked item.
l Partially marked—A partially marked item is one that has marked descendants, but
the item itself is not marked. A partially marked item is not backed up or restored.
A check mark appears in a gray checkbox to the left of a partially marked item.
6. Click OK.
The items for recovery, which are displayed in the navigation tree, are from the
selected browse time.
Display conventions 43
NMM Client Graphical User Interfaces
3.
To refresh the list of available NetWorker servers, select the icon next to
the Backup server name field.
The Change NetWorker Server dialog box appears.
4. Click the Update Server List to obtain the list of all available NetWorker
servers, and then select the preferred NetWorker server.
5. Click OK.
The server name appears in the Backup Server Name field.
NOTICE
You can also connect to a NetWorker server by clicking the NetWorker Server
icon on the Application toolbar.
6. Click Configure Recover Plug-in(s) to select the required recover plug-ins for
Microsoft applications.
The Configure Recover Plug-in(s) dialog box appears displaying all the
recover plug-ins in the Active Plug-in(s) field.
7. Move the recover plug-ins that are not required to the Disabled Plug-in(s)
field, and then click OK.
Only the recover plug-ins that are displayed under Active Plug-in(s) are listed
when Recover is clicked.
If a firewall exists between the NetWorker client and any NetWorker servers, ensure
that the firewall is configured to accept the port ranges typed in the Configure
Options dialog box.
The Configuring TCP Networks and Network Firewalls for NetWorker technical note
available on Online Support website provides more information on how to identify and
configure the required ports for NetWorker hosts that must communicate across a
packet filtering or stateful inspection firewall.
Procedure
1. Open the NetWorker User GUI.
2. From the Options menu, select Configure Options.
The Configure Options dialog box appears.
3. In the Service Ports field, type the range of available ports.
4. In the Connection Ports field, type the range of available ports.
5. Click OK.
Specifying a password
A password is used to protect items that are backed up with either PW1 password-
protection, or PW2 encryption and password-protection. PW1 and PW2 protection are
enabled on the NetWorker server with a local or global directive.
The NetWorker Administration Guide provides more information about PW1 and PW2
protection.
NOTICE
Changing the password does not change the password for files that have already been
backed up.
To recover PW1 or PW2 password-protected files, you must provide the password
that was in effect at the time of the backup.
Complete the following steps to configure NetWorker user group privileges manually.
Procedure
1. Open the NetWorker Administration GUI.
2. Click Server.
3. In the expanded left pane, click User Groups.
4. Right-click the appropriate user group, and then select Properties.
The Properties dialog box appears.
5. In the Users field, add the following values for the NMM client host. Type each
value on a separate line:
user=NMM_Exchange_backup_admin_user,host=NMM_client_host
user=system,host=NMM_client_host
6. Click OK.
7. Configure the user group privilege as described in the application-specific user
guides.
Restricted Datazone 51
Restricted Datazone
The RDZ resource is created either in the Server tab of the NetWorker Administration
GUI or through the nsradmin application. A privileged administrator creates RDZ
resources.
Recommendations
Follow these recommendations when you use the RDZ support in NMM:
l Create an additional device for the main datazone for client bootstrap and index
backup. This requirement is the same as RDZ backup and recovery of NetWorker
file systems.
l Provide system permission, not group permission if you have provided group
permission, do not provide system permission.
l A user in an RDZ does not require any additional permission to perform an
operation. The permission for a user in an RDZ and a main zone are the same for
NMM operations.
6. In the Privileges field, select the options that are listed in the following table,
and then click OK.
Recommendations 53
Restricted Datazone
Note
This requirement does not apply to SQL Server VDI and Active Directory.
l NetWorker server 8.2.3 and later use a different procedure to create client
resources than NetWorker server 9.2. Follow the procedure provided in the
Scheduled Backup chapter of each application user guide.
Note
The procedure used to create a client resource when using NetWorker server 8.2.3 or
later is different from the procedure used to create a client resource when using
NetWorker server 9.2. Keep the following considerations in mind if you are using
NetWorker server 8.2.3 or later and NMM 9.2:
l Configure a regular NetWorker backup group instead of configuring a data
protection policy. Do not enable the Snapshot option in the Group properties
page.
l Type nsrnmmsv.exe in the Backup Command field.
To create a client resource manually through the Client Properties dialog box, perform
the following steps:
Procedure
1. In the Administration window, click Protection.
2. In the expanded left pane, select Clients.
3. From the File menu, select New.
The Client Properties dialog box appears displaying the General tab, as shown
in the following figure.
Figure 10 Client Properties dialog box
4. In the Name field, type the Fully Qualified Domain Name (FQDN) of the client.
The client must be a fully qualified host to be a NetWorker client.
14. In the Application Information field, add parameters that are required for the
particular application.
15. In the Deduplication area, select the option for deduplication if Data Domain is
going to be used for data deduplication.
16. On the Globals (2 of 2) tab, use the settings and requirements as described in
the scheduled backup chapter for each application in the respective user guide.
17. Click OK.
Editing a client resource that was created with NMM 8.2.x after you
upgraded to NMM 9.0 and later
After you upgrade to NMM 9.0 and later, you must revise the existing client resource
to recover backups that were created with NMM 8.2.x. Make these changes for all
existing client resources.
Procedure
1. In the Administration window, click Protection.
2. Right-click Clients in the navigation tree or right-click the required client in the
Clients table.
3. Select Modify Client Properties.
4. In the Backup Command field, delete the nsrsnap_vss_save command and
type the nsrnmmsv.exe command. This change must be performed for all the
existing client resources.
5. For Hyper-V only: If the NSR_VSS_FULL_BACKUP variable is not specified in
the Application Information field, all Hyper-V VSS backups are automatically
performed as copy-type backups. To continue with this default behavior, you
must specify NSR_VSS_FULL_BACKUP=no in the Application Information
field. Not using NSR_VSS_FULL_BACKUP, or using
NSR_VSS_FULL_BACKUP=yes enables Hyper-V virtual machine backups.
6. Make other changes, if required.
7. Click OK.
Editing existing client resources through the NMC bulk edit feature
You can edit all the client resources at once with the bulk edit feature. The NMC bulk
edit feature must be used on a group of client resources that use the same backup
command and options. For example, you must use the bulk edit option for all the client
resources where the backup command uses the -D option.
Move an NMM client to a An NMM client should be protected by only one NetWorker
different NetWorker server server. Do not set up scheduled backups for an NMM client
on multiple NetWorker servers.
In case the NMM client is installed on a NetWorker server
other than the one set up for scheduled backups, you can
move the NMM client by completing the required steps:
Installation path for application Do not install application server program files on the same
server program volume as the application’s database files and the log files.
Enable SQL Server data If the SQL Server Writer service is disabled, perform the
recovery following steps to enable the recovery of all SQL data:
Perform a full backup l For the Exchange database that was recovered (not all
databases).
l For Exchange Server if an Exchange Service Pack was
installed.
When database names contain French and Spanish characters are not printed in the
French and Spanish Command Prompt on Windows.
characters, successful This is a Windows operating system issue.
backups of database are A backup fails when the output generated with the
possible when you type the nsrnmmsv.exe -? command is used for a French or
database name in the save set.
NOTICE
Client Data Domain Boost deduplication support is unavailable for Active Directory.
The NetWorker Data Domain Boost Integration Guide provides information about the
Data Domain server and NetWorker server setup and configuration, and is available at
http://support.emc.com.
Backup support
The Client Direct feature enables supported NetWorker clients to deduplicate their
backup data locally and to store it directly on a Data Domain device, thereby bypassing
the NetWorker storage node and reducing network bandwidth usage. Because
multiple clients with Client Direct backup support can share a device by using multiple
sessions, Client Direct can reduce the number of devices used, which reduces the
impact on the Data Domain system performance and maintenance.
Recovery support
If a supported Client Direct client has access to its NetWorker Data Domain storage
device, the client recovers data directly from the device, regardless of whether Client
Direct was used for the backup. Because Client Direct bypasses the storage node,
performance is improved.
If the Client Direct client cannot access the data, the recovery process reverts to the
traditional method that uses the storage node. The Data Domain system converts the
stored data to its original non-deduplicated state for the recovery.
Backup support 65
Data Deduplication with Data Domain
Feature Consideration
Optimized cloning No special procedures or considerations are
required for Data Domain optimized cloning by
NMM.
Client IO optimization (Data Domain Boost) The topic, Configuring client resources,
provides more information.
3. Click the General tab, and then ensure that the Client direct checkbox is
selected to use the client direct functionality.
Note
The Client Direct functionality is available only when you use a Data Domain
device or an AFTD device.
4. Click the Apps & Modules tab. In the Deduplication group, select the Data
Domain Backup checkbox.
The Client Properties page with the Apps & Modules tab appears, as shown
in the following figure.
5. Click the Globals (2 of 2) tab, provide the remote storage node name where
the Data Domain device is configured.
This name should be the only entry.
During the backup, the NMM client performs the following tasks:
l Contacts this storage node to obtain the Data Domain device credentials.
l Establishes a connection by using these credentials.
l Sends data directly to the Data Domain system.
6. Click OK.
7. (Optional) To verify that a backup is successful by typing the following
command:
mminfo -avot -s server_name -c client_name
where:
The same process applies for recovering data that was backed up using the client IO
feature.
Note
In a multihomed environment, NMM supports backup and recovery operations for the
following Microsoft applications:
l Using VSS technology:
n Exchange Server
n Hyper-V Server
n SharePoint Server
n SQL Server
l Using VDI technology:
n SQL Server
For cluster virtual clients, the connection from the NetWorker server is started on the
backup media production network, but the backup payload flows through the backup
network.
NOTICE
Do not use the Append these DNS suffixes (in order) attribute.
Note
If you are using the NetBIOS name, ensure that the NetBIOS over
TCP/IP attribute is enabled for the production NIC on the NetWorker
server.
b. Ensure that all NMM and dummy clients have the Storage Nodes attribute
on the Globals (2 of 2) tab in the properties of the client resource set to the
backup domain FQDN of the storage node that receives the client data.
The Client Properties page with the Globals (2 of 2) tab appears, as
shown in the following figure.
Figure 16 Globals (2 of 2) tab for multihomed client resource configuration
Note
Procedure
1. Start the NetWorker User for Microsoft GUI.
2. In the Browse tab, browse for the object under the root. The following figure
displays the Browse page and the example root level that is selected for the
object.
Figure 17 Browse tab
Note
If the path of an object contains special characters, ensure to use URL encode
in place of the special characters.
For example, OU=OU1 is added to the object path to specify the entire path of
the object.
5. Type the name of the object on the Name field.
6. Click Search to view the relevant indexes.
Improvement in NMM GUI browsing performance of Active Directory backups with large number of objects 81
Microsoft Active Directory Backup and Recovery
NOTICE
Note
When you use NetWorker server 8.2.3 or later with NMM 9.2, review the information
in the "Backup Groups and Schedules" chapter in the NetWorker Administration Guide.
NOTICE
Microsoft recommends that you have a secondary Active Directory server that can be
promoted to the primary Active Directory server if a disaster occurs.
If you do not have a secondary Active Directory server that can be promoted to the
primary Active Directory server, complete the steps in this section to recover from a
Active Directory server disaster.
Note
After starting an Active Directory recovery, view the Monitor page to verify the status
of the recovery.
lastLogoff sAMAccountType
l Attributes that are retained for a deleted object—The following table provides a
sample of attributes that are retained for an Active Directory object when it is
deleted and moved to the tombstone database.
Table 17 Attributes retained after object is deleted
mS-DS-CreatorSID securityIdentifier
These attributes are restored when deleted objects from the tombstone database
are restored. Objects that do not retain all their mandatory attributes cause a
constraint violation error during a restore operation.
For example, a published shared printer has mandatory attributes (printerName,
serverName, shortServerName, uNCName, and versionNumber), which are not
retained in the tombstone database.
l Object password attributes—An object’s password cannot be recovered. After
recovering an object with a password attribute, the Windows administrator must
reset the password.
l Moved or renamed objects—If objects are moved or renamed, but not deleted
from Active Directory, those objects cannot be restored even if they are
successfully backed up. Those objects are not stored in the deleted storage
database (tombstone) so they cannot be restored.
However, the attributes for these objects can be restored from the Context menu
of the Active Directory interface, which restores the objects with the specific
attribute sets.
l Attributes with null values—Attributes with null values are not backed up and
therefore are not recovered. For example, if the attribute Phone Number is empty
(null), the null Phone Number attribute is not backed up.
l Overview............................................................................................................90
l Concurrent cloning............................................................................................ 90
l Cloning with NMM..............................................................................................91
l Recovering cloned data with NMM.................................................................... 92
l Restriction on cloning BBB incremental backups that reside on AFTD or
CloudBoost.......................................................................................................100
Overview
A clone action creates a copy of one or more save sets. Cloning allows for secure
offsite storage, transfer of data from one location to another, and verification of
backups. You can configure a clone action to occur after a backup in a single
workflow. You can also use save set and query groups to define a specific list of save
sets to clone in a separate workflow.
You can perform manual, scripted cloning using the nsrclone command or set up
scheduled cloning by configuring data protection policies.
The simplification process has changed the NMM 9.0 cloning procedure from previous
releases. The "NMM architecture" section provides details about NMM 9.0 and later.
If you use NetWorker server 9.2 with NetWorker client and NMM 9.2, review the
information in the "Data Protection Policies" chapter and the "Backup Data
Management" chapter in the NetWorker Administration Guide to supplement the
information in this chapter.
l The Data Protection Policies chapter describes how you can schedule cloning by
configuring data protection policies.
l The Backup Data Management chapter describes how you can clone save sets
manually by using the nsrclone command.
If you use NetWorker server 8.2.3 with NetWorker client and NMM 9.2, review the
information in the "Backup Groups and Schedules" chapter and "Cloning" chapter in
the NetWorker Administration Guide to supplement the information in this chapter.
Review the following BBB restrictions for cloning and staging:
l Cloning is not supported for BBB incremental backup to an AFTD target.
l Only cloning of BBB full to AFTD is supported.
l NMM lacks save set consolidation. You may clone only every 38 backups, or you
must perform full backups based on your cloning needs.
l Staging is not supported for BBB backups.
Note
The Delete source save sets after clone completes option, which instructs
NetWorker to remove the source save set information from the client file index
and mark the save set as recyclable in the media database during a Server
expiration maintenance action, is not supported by Exchange Server and Hyper-V
Server BBB backups.
Concurrent cloning
NMM supports concurrent cloning. When concurrent cloning is configured, the clone
action runs in parallel with backup sessions. The clone job does not wait for the
backup action to complete, but starts when the backup process starts. As the save
session writes a save set to backup device, data gets written to the clone device.
To enable concurrent cloning, in the Policy Action Wizard, on the Specify the Action
Information page, select the Concurrent option. The following figure shows an
example.
Note
Cloning Exchange Server and Hyper-V Server BBB incremental backups to an AFTD
device is not supported.
The following table lists the save sets that are available for cloning Microsoft
applications. When you clone, include the parent and the child save sets.
Logs APPLICATIONS:\Microsoft
Exchange\db1\LogFiles
Logs Database1.ldf
where:
l NetWorker_server_name is the name of the NetWorker server host.
l NMM_client_name is the name of the NMM client host.
l group_name is the name of the group that contained the NMM client when
the backup occurred.
l date1 is at least one day before the date range of either the NMM original or
clone that is to be restored.
l date2 is at least one day after the date range of either the NMM original or
clone that is to be restored.
2. Edit the output.txt file, which resides in the same directory from which the
mminfo command is run.
3. If the output file contains the following message, the media database does not
contain NMM save sets for the specified client or query options:
mminfo: no matches found for the query
Make adjustments to the query options that you specify in the mminfo
command. If the query results are missing save sets, see the Save set media
database on page 97 section for information on locating and adding save sets
to the media database.
Note
Ensure that the new browse and retention dates for the save sets are far
enough in the future that the recovery has time to complete.
2. Repopulate the client file index on the NetWorker server with the save set
information:
where:
l date is a date after the completion of the latest save set that to be restored.
l client is the name of the NMM client.
Note
Ensure that the volume that contains the index backup is available for mounting.
3. Review the output in nsrck.txt for errors after the command has completed.
For example:
l If any of the following errors are reported:
n 19779:nsrck: Please run ``nsrck clientname''
n 9348:nsrck: The index recovery for ' clientname '
failed.
n 39078:nsrck: SYSTEM error: The operation completed
successfully.
Type the following command:
nsrck -L2client
where:
n ssid is the save set ID of the save set that is to be restored.
n device is the device containing the volume for the save set that is to be
restored.
Note
Ensure that the NMM software is closed on the NMM clients before you run
the scanner command. If the software is open while the scanner runs, the
scanner command might fail with ’Index error, flush Failed'.
l If browse and retention times that the scanner sets are not long enough for
recovery procedures to complete, for each save set, modify the browse
times of the existing save sets:
where:
n NetWorker_servername is the name of the NetWorker server.
n time2 is the new browse time.
n ssid is the save set value that is recorded for each save set, described in
Generating the media database list of the save sets on page 93.
Note
Ensure that the new browse dates for the save sets are far enough in the
future that the recovery has time to complete.
l Open the NetWorker User for Microsoft GUI and start the recovery.
Performing recovery on page 99 provides steps for recovery.
where:
l time1 is the required retention time.
l ssid is the save set value that is recorded for each save set.
2. Type the following command for each save set in the output file:
nsrmm -o notrecyclable -S ssid/cloneid
3. Repopulate the client file index with the save set information by typing the
following commands:
nsrck -L 7 -t MM/DD/YYYY client_name 1>nsrck.txt 2>&1
where:
l MM/DD/YYYY is a date after the completion of the latest save set that is
restored.
l client_name is the name of the NMM client.
4. Review the output in the nsrck.txt file for errors after the command has
completed.
For example:
Note
Ensure that the NMM software is closed on the NMM clients before you run
the scanner command. If the NMM software is open while the scanner runs,
the scanner command might fail with the following error:
5. If browse and retention times that the scanner sets are not a long enough for
recovery procedures to complete, for each save set, modify the browse times
for the existing save set:
nsrmm -s NetWorker_server_name -w time2 -S ssid
where:
l NetWorker_server_name is the name of the NetWorker server.
l time2 is the new browse time.
l ssid is the save set value that is recorded for each save set, decribed in the
topic Generating the media database list of the save sets on page 93.
Note
Ensure that the new browse dates for the save sets are far enough in the future
that the recovery has time to complete.
Determining the clone save sets that do not exist in the media database
If the NMM original or clone save sets that are required for a recovery operation are
no longer in the media database, you must scan the original or clone volumes to
regenerate the media and index database for these save sets. You can use the
scanner command to scan the volumes.
4. Open the scanner_output.txt file, which resides in the same directory from
which the scanner command was run. If the scanner_output.txt file
contains the following message:
scanner: SYSTEM error: Cannot start device_name: No such
file or directory
Check the device name that is specified in the scanner command for errors
and retry the scanner command with the correct device name.
2. Determine the ssids and save time of all save sets that are required to perform
the recovery, including all the dependent full and incremental save sets.
Note
The ssid values are used later in the procedure to scan the save sets back into
the media database. The save time values validate that the repopulation of the
client file index was successful.
Scanning required save sets into media database and client file index
Procedure
1. Type the scanner command to scan save sets:
scanner -i -S ssid device 1>scanneri.txt 2>&1
where:
l ssid is the ssid that is recorded for the save set.
l device is the device with media containing the save set.
Ensure that the NetWorker User software is closed on the NMM clients before
you run the scanner command. If the NMM software is open while the scanner
runs, the scanner command might fail with 'Index error, flush
Failed'.
where:
l exact_savetime is the savetime recorded from the scanner output.
l client is the name of the NMM client.
Performing recovery
The following procedure provides the general steps for performing an NMM recovery
for Exchange Server, SharePoint Server, Hyper-V Server, and SQL Server VSS. Some
applications might require additional steps or settings. The application-specific user
guides provide the full application-specific recovery procedures.
Note
For information on recovering SQL Server VDI backups, refer to the NetWorker Module
for Microsoft for SQL VDI User Guide.
Procedure
1. On the NMM client, start the NetWorker User for Microsoft program.
2. In the Client listbox, select the NMM client.
3. If the NMM client is part of a cluster, select the virtual client.
4. In the left pane, select Recover, and then select the appropriate application:
l Exchange
l Hyper-V
l SharePoint
l SQL Server (listed as System)
Performing recovery 99
Cloning Backup and Recovery
If the required backup version is not displayed, ensure that all the save sets are
scanned and are in a browsable state.
9. To ensure that the correct volume is selected:
a. Right-click one of the marked items.
b. Select Required Volumes.
Note
The Required Volumes dialog box correctly displays all volumes that are
needed for the currently browsed backup time, but if that backup is an
incremental one, volumes from dependent incrementals or the full backup
may not be displayed. To obtain an accurate list of required volumes for an
incremental backup, repeat this procedure for each backup of the database,
including the most recent full backup.
The full action log for the cloning action displays more detailed information:
6/17/2015 9:02:30 PM Save set 3263316649 is an incremental
Block Based Backup save set and will not be included for
cloning.
For policy-based cloning of BBB scenarios, you can adjust the action filters to filter
BBB incremental backups.
When configuring backups, it is best practice to set the backup level to incremental
for all days.
For an AFTD target, NMM automatically promotes the backup to full for the initial
backup or after 38 incremental backups. With such a best practice setting, you would
get a clone of the AFTD full backup only the first time an Exchange database or
Hyper-VM is backed up or every 39 backups. To create additional clones, schedule
more frequent full backups. You must be aware of the impact that running full backups
has on the backup window.
l Overview.......................................................................................................... 102
l System requirements........................................................................................102
l Protecting an environment before a disaster.................................................... 104
l BMR by using NetWorker and NMM................................................................ 105
l Backing up an Active Directory for BMR.......................................................... 106
l Performing BMR of an Active Directory........................................................... 106
Overview
Bare-metal recovery (BMR) is a technique in the field of data recovery and restoration
where the backed up data is available in a form that allows you to restore a system
from bare metal, that is, without any requirements as to previously installed software
or operating system.
Typically, the backed up data includes the necessary operating system, applications,
and data components to rebuild or restore the backed up system to an entirely
separate piece of hardware. The hardware receiving the restore should have a similar
configuration as that of the hardware that was the source of the backup.
The basic BMR is the process of bringing up a server after a disaster and ensuring that
the system recovers with the operating system, the applications, and the data as they
were at the time of the failure.
Restoring a server to the exact configuration that it had at the time of its destruction
can be a difficult task. When this restoration is performed to another hardware, it can
add to the complexity of the process and can be time-consuming. Windows BMR
solution provides a flexible and reliable method of restoring a server after a disaster.
System requirements
The following sections list requirements to perform Windows BMR. However, the
NetWorker Online Software Compatibility Matrix at http://compatibilityguide.emc.com:
8080/CompGuideApp/ provides the latest information about the system requirements
to perform Windows BMR by using NMM.
CPU requirements
Consider the following CPU requirements:
l The operating system architecture and the processor architecture must match.
l Basic Input/Output System (BIOS) or Unified Extensible Firmware Interface
(UEFI) must match.
l You can treat AMD or Intel processors as being the same if they follow the same
architecture. You can recover the operating system backup of an AMD x64
computer to an Intel x64 computer. The process is reversible.
l You can restore the backup of an x86 operating system version only to an x86
processor computer.
l You can restore the backup of an x64 operating system version only to an x64
processor computer.
l The disk or RAID drivers that are used in the old system must be compatible with
the disk or RAID controllers in the new system.
l For each critical disk on the BMR target system, the startup hard disk capacity on
the new system must be greater than or equal to the capacity on the old system.
BMR fails if the capacity is smaller by even a single byte.
l Windows BMR supports IDE, SATA, or SCSI hard disks. You can perform the
backup on one type of hard disk and recover on another type. For example, SAS to
SATA is supported.
l You must restore the backup to the same logical disk numbers as on the original
server. You cannot use different logical disk numbers on the target system to
recover the critical volumes such as the operating system volume.
l Ensure that the RAID setup on the destination computer does not interfere with
the disk order of the hard disks.
Note
NetWorker considers only system volume as a critical volume. If you have installed
a Microsoft application on a drive other than the system drive, the drive is not
considered as critical. On Windows Server 2008 R2, a volume is critical if a
Microsoft application has installed a Windows service on it, but on Windows
Server 2012, a volume that has a Windows application service installed is not
critical.
l To make a volume critical on Windows Server 2012, set the value of the HKLM
\System\CurrentControlSet\Control\SystemWriter
\ReportWin32ServicesNonSystemState registry key to 0. This ensures that
BMR includes the Microsoft application binaries, and the volume on which they are
installed is marked as critical.
2. If you use a NetWorker server earlier than 9.0.x, create a NetWorker group
without enabling the Snapshot option. Otherwise, create a policy.
3. Create a NetWorker client resource, and assign it to the group that you created
in step 2.
4. Configure the NetWorker client resource by typing ALL in the Save set field,
and clearing the Backup command and Application information fields.
5. Perform a backup.
Note
Specific information about how to backup and recover Microsoft applications in NMM
9.2 is provided in application-specific user guides.
NOTICE
For all the Microsoft applications, after performing Windows disaster recovery and
restarting the system, check all the disk and volume configurations. Usually, the disks
and volumes appear as on the original system.
However, it is possible, especially in BMR scenarios, that the volume or disk signatures
do not match the original ones, and the non-critical volumes or disks are offline and
not mounted. Use the Microsoft Disk Manager to bring the volumes and disks online,
and then restart the system for drive letter reassignments. Assign the same drive
letters that existed before the BMR. Non-critical volumes that the mount points
access might have a similar issue.
c. In the Name field, type the name for the client resource.
d. Click OK.
3. In the right panel, right-click the client resource and select Modify Client
Properties.
4. In the Client Properties dialog box:
a. On the General tab:
l In the Group list, select the group that you created in step 1.
l In the Save set field, type ALL.
b. On the Apps & Modules tab, ensure that the Backup command and
Application information fields are clear.
c. Specify other fields according to the requirements.
d. Click OK.
5. Perform the backup.
Ensure that the backup successfully completes.
Troubleshooting 107
Troubleshooting
Solution
Check the savegroup details for the failed save set. The savegroup details provide
an exact cause or a general error, which can indicate a client or server side issue.
The NetWorker Administration Guide provides information about viewing group
backup details. If the savegroup details do not provide enough information, check
the NMM client log and the other client logs.
Solution
1. Stop and restart the Microsoft VSS service.
2. Restart the Exchange Information store if it was running and was backed up.
Solution
Perform the appropriate tasks:
l Retype the save set correctly, or use the nsrnmmsv command to view all the
valid save sets for an application.
l If you use Exchange Server:
n Start the Exchange services.
n If Exchange services were already started, dismount and mount the
databases, and then start the savegroup.
l If you use SQL Server applications, bring the databases online.
VSS_E_MAXIMUM_NUMBER_OF_VOLUMES_REACHED
Problem
You can create no more than 64 shadow copies per volume. Because of this
limitation, the VSS_E_MAXIMUM_NUMBER_OF_VOLUMES_REACHED error occurs
when you try to create the 65th volume shadow copy. When the storage limit is
reached, older versions of the shadow copies are deleted and cannot be restored.
Solution
Ensure that the number of persistent shadow copies does not exceed 64 per
volume.
Solution
Perform the following workaround to ensure that the RDB is mounted:
1. Restart the Microsoft Exchange Information Store service.
2. Use the NMM and Exchange Management Shell to mount the RDB.
3. Close the NetWorker User for Microsoft GUI.
4. Restart the NetWorker User for Microsoft GUI.
5. Browse the RDB browsing to ensure that the RDB is mounted.
Solution
Complete the required steps before you start the RSG recovery. Perform the
same steps on both nodes of a cluster in a cluster continuous replication (CCR) or
a single copy cluster (SCC) cluster environment.
1. Install MAPI Collaboration Data Objects.
2. Provide RSG browsing permissions. This step ensures that the error message
does not appear, and the recovery is successful.
For example, run the following PowerShell command with appropriate
arguments:
get-mailboxserver Exchange_Server_name | Add-AdPermission -user
username -accessrights ExtendedRight -extendedrights Send-As,
Receive-As, ms-Exch-Store-Admin
3. Set the registry to disable IPv6.
4. Complete the following steps to fix RSG browsing issues in the registry:
a. Open the registry and go to HKLM\System\CurrentControlSet
\Services\Tcpip6\Parameters.
b. Edit or create the 32-bit DWORD value DisabledComponents, and specify
the value FFFFFFFF. The public folder must be present on the Exchange
Server for RSG browsing to succeed.
77108: nsrnmmsv
Problem
The following error message appears when you perform a passive node backup
with only a single passive node client configured for Exchange deduplication
backups in a CCR setup:
77108:nsrnmmsv:NMM .. Operation unit failed with error
'Traditional save returned error. saverc :-Possible cause:
1)Unsupported file system or 2)write-protected disc or 3)No
space on disc
Solution
Complete the required steps whenever you perform a passive node backup for
Exchange deduplication backups in a CCR setup.
1. Configure a virtual client in the same savegroup where the passive node is
configured.
2. Ensure that you do not schedule this virtual client for a backup in the same
group.
3. Enable deduplication settings for this virtual client. Although the client exists
in the same savegroup, it will not be part of the backup operation.
4. Ensure that a backup device is configured correctly for the client.
Solution
Perform both of the following tasks to resolve the error:
l Disable the firewall on the remote node.
l Configure both forward and reverse lookup zones correctly, and ensure that
name resolution works correctly for all DAG nodes.
Solution
Ignore the error message because the recovery is successful.
The system cannot find the file specified. Dismounting the SP GLR backup CBFS
error in cbfs_open_file()...
Problem
Error messages might appear in the NWFS log file and the Monitor window
during NWFS unmount or shutdown operations at the end of GLR activities.
These error messages could include the following text:
The system cannot find the file specified.
Dismounting the SP GLR backup CBFS error in
cbfs_open_file()
nwfs_cbfs_event_handlers::cbfs_close_file(): CBFS exception
Solution
Ignore these messages.
Format string save set name %S is valid cannot be rendered correctly. 63778:
nsrnmmsv: NMM .. ERROR NMM .. ERROR.. Writer
Problem
Intermittent backup failure is seen on the farm node where search services are
hosted. Backup fails and the following error message appears:
Format string save set name %S is valid cannot be rendered
correctly
This error is generally expected when search services or dependent services are
not running. However, it is sometimes seen when all
dependent services and search services are running.
Solution
Restart the search services to ensure a successful backup.
Solution
This message means that unless the restore is selected with the active log backup
option, a point-in-time can be changed only for a transaction log backup. Click OK
and make the required changes.
D:\views\nw\ntx64\fb_nmm24\nsr\vssclient\snapvsssave\ nsrnmmsv.h(202)
Problem
The following message appears in the nsrnmmsv.raw file and the NMM Event
Viewer when NMM starts a backup for SQL Server 2012:
D:\views\nw\ntx64\fb_nmm24\nsr\vssclient\snapvsssave\
nsrnmmsv.h(202)
Solution
Ignore the error message because the backup is successful.
Solution
Ignore the error messages because the recovery is successful.
The NMM client log files for VSS-based processes are located in the applogs folder,
for example, C:\Program Files\EMC NetWorker\nsr\applogs\.
The SharePoint search application related log files <search application
name>.xml and ssa_topology.xml are available at the following location: C:
\Program Files\EMC NetWorker\nsr\tmp\TopologyMetadata\.
Both the save and recover commands write to these files. The log files are cumulative
and text is appended to them with each run. The logging level of each log file is
controlled by the debug level set by the CLI attribute -D debug level.
VDI client log files
The NMM client log files for VDI-based processes are named as follows:
l nsrsqlsv.raw
l nsrsqlrc.raw
l xbsa.messages
The NMM client log files for VDI-based processes are also located in the applogs
folder, for example, C:\Program Files\EMC Legato\nsr\applogs\
This glossary contains terms related to the NetWorker Module for Microsoft. Many of
these terms are used in this manual.
active-passive cluster Type of cluster configuration where the data server runs on the active physical node,
and other nodes are passive nodes that maintain data updates and wait to take over if
the active node fails.
administrator Person who normally installs, configures, and maintains software on network
computers, and who adds users and defines user privileges.
Administrators group Microsoft Windows user group whose members have the rights and privileges of users
in other groups, plus the ability to create and manage the users and groups in the
domain.
advanced file type Disk storage device that uses a volume manager to enable multiple concurrent backup
device (AFTD) and recovery operations and dynamically extend available disk space.
application specific Program that is used in a directive to specify how a set of files or directories is to be
module (ASM) backed up or recovered. For example, compressasm is a NetWorker directive used to
compress files.
archive Process that backs up directories or files to an archive volume to free up disk space for
regular backups. Archived data is not recyclable. See groom
archive volume Volume used to store archive data. Archive data cannot be stored on a backup volume
or a clone volume.
auto media management Feature that enables the storage device controlled by the NetWorker server to
automatically label, mount, and overwrite a volume it considers unlabeled.
backup cycle Full or level 0 backup and all the subsequent incremental backups that are dependent
on that backup.
Backup Operators group Microsoft Windows user group whose members have the capability to log in to a domain
from a workstation or a server, whose data they may back up and restore. Backup
Operators can also shut down servers or workstations.
backup volume A volume used to store backup data. NetWorker backup data cannot be stored on an
archive volume or a clone volume.
BMR Windows Bare Metal Recovery, formerly known as Disaster Recovery. For more
information on BMR, refer to the Windows Bare Metal Recovery chapter in the
Networker Administration Guide.
bootstrap Save set that is essential for disaster recovery procedures. The bootstrap consists of
three components that reside on the NetWorker server: the media database, the
resource database, and a server index.
browse policy NetWorker policy that specifies the period of time during which backup entries are
retained in the client file index. Backups listed in the index are browsable and readily
accessible for recovery.
client Host on a network, such as a computer, workstation, or application server whose data
can be backed up and restored with the backup server software.
Client Direct Feature that enables clients to deduplicate backup data and send it directly to AFTD or
DD Boost storage devices, bypassing the NetWorker storage node. The storage node
manages the backup devices but does not handle the backup data.
client file index Database maintained by the NetWorker server that tracks every database object, file,
or file system backed up. The NetWorker server maintains a single index file for each
client computer. The tracking information is purged from the index after the browse
time of each backup expires.
Client resource NetWorker server resource that identifies the save sets to be backed up on a client.
The Client resource also specifies information about the backup, such as the schedule,
browse policy, and retention policy for the save sets.
clone 1. Duplicate copy of backed-up data, which is indexed and tracked by the NetWorker
server. Single save sets or entire volumes can be cloned.
2. Type of mirror that is specific to a storage array.
clone-controlled Creation of a replica of deduplicated data copied from one DD Boost device to another,
replication (CCR) which can be scheduled by the NMC clone feature and is indexed and tracked by the
NetWorker server.
clone volume Exact duplicate of a backup or archive volume. NetWorker software can index and track
four types of volumes (backup, archive, backup clone, and archive clone). Save sets of
these different types may not be intermixed on one volume. Clone volumes may be used
in exactly the same way as the original backup or archive volume.
cluster Group of linked virtual or physical hosts, each of which is identified as a node, with
shared storage that work together and represent themselves as a single host.
cluster client A NetWorker client within a cluster; this can be either a virtual client, or a NetWorker
Client resource that backs up the private data that belongs to one of the physical
nodes.
cluster nodes A group of linked virtual or physical hosts with shared storage in a cluster, which work
together and represent themselves as a single host called a virtual cluster host.
Cluster VSS Writer In a Windows Server 2012 or 2012 R2 cluster with virtual machine storage on CSV, the
Cluster VSS Writer reports components for backup for virtual machines that are owned
by nodes other than the proxy or local node.
command prompt Line on a screen, also known as shell prompt, where you type software commands.
common internet file Formerly known as Server Message Block (SMB). Message format used by Microsoft
system (CIFS) DOS and Windows to share files, directories, and devices.
Console application Console server user role whose members can configure features, except security
administrator features, in the Console sever application.
Console security Console server user role whose members can add Console users and assign them to
administrator Console roles.
conventional storage Storage library attached to the NetWorker server or storage node, used to store
backups or snapshot backups. Also known as secondary storage. See primary storage .
copy restore Create a copy of a database by restoring a SQL Server 7.0 or later database backup to
a new location or to a new database name. The copy restore type replaces the directed
recovery operation, which existed in versions of the NetWorker Module before release
3.0.
critical volume Any volume containing system state files or files for an installed service, including
volumes mounted as NTFS directories which contain such files. The volume where a
critical volume is mounted is also considered to be critical. This is required to perform
an offline restore, however maybe optional for this release depending upon the
difficulties of implementing this feature.
CSV Shadow Copy The VSS provider that performs the snapshot for virtual machines that are owned by
Provider nodes other than the proxy node in a Windows Server 2012 or 2012 R2 cluster with
virtual machine storage on CSV.
database 1. Collection of data arranged for ease and speed of update, search, and retrieval by
computer software.
2. Instance of a database management system (DBMS), which in a simple case might
be a single file containing many records, each of which contains the same set of
fields.
Data Domain device Logical storage device created on a Data Domain system, used to store deduplicated
NetWorker backups. Each device appears as a folder on the Data Domain system and
appears with a storage volume name in NMC. A Data Domain device is also known as a
DD Boost device.
data mover (DM) Client system or application, such as NetWorker software, that moves data during a
backup, recovery, snapshot, or migration operation. Also See proxy host.
datazone Group of clients, storage devices, and storage nodes that are administered by a
NetWorker server.
deduplication backup Type of backup in which redundant data blocks are identified and only unique blocks of
data are stored. When the deduplicated data is restored, the data is returned to its
original native format.
destination client Computer to which database files are restored in a directed recovery.
device 1. Storage folder or storage unit that can contain a backup volume. A device can be a
tape device, optical drive, autochanger, or disk connected to the server or storage
node.
2. General term that refers to storage hardware.
3. Access path to the physical drive, when dynamic drive sharing (DDS) is enabled.
DFS component 1. A namespace for files and DFS links, called a DFS root.
2. A connection to a shared file or folder, called a DFS child node.
See distributed File System (DFS)
directed recovery Method that recovers data that originated on one client host and re-creates it on a
different client host, known as the destination client.
directive Instruction that directs NetWorker software to take special actions on a given set of
files for a specified client during a backup or recovery operation. Directives are ignored
in manual (unscheduled) backups.
disaster recovery Restore and recovery of data and business operations in the event of hardware failure
or software corruption.
distributed File System Microsoft Windows add-on that creates a logical directory of shared directories that
(DFS) span multiple hosts across a network.
drive Hardware device through which media can be read or written to. See device.
dynamic drive sharing Feature that allows NetWorker software to recognize and use shared drives and when
(DDS) they are available.
failover cluster Windows high-availability clusters, also known as HA clusters or failover clusters, are
groups of computers that support server applications that can be reliably utilized with a
minimum of down-time. They operate by harnessing redundant computers in groups or
clusters that provide continued service when system components fail.
federated backup During federated backups, NMM detects the SQL Server preferred backup setting for
the Availability Group and performs the backup at the preferred node.
file system 1. Software interface used to save, retrieve, and manage files on storage media by
providing directory structures, data transfer methods, and file association.
2. Entire set of all files.
3. Method of storing files.
full backup Type of backup that backs up all data objects or files, including the transaction logs
contained in databases, regardless of when they last changed. See level.
granular recovery Granular recovery provides the ability to recover specific files in seconds from a single
backup. This dramatically reduces the recovery time and the footprint of the backup on
storage resources.
groom Process that removes the original files from a local disk after a successful archive
operation.
group One or more client computers that are configured to perform a backup together,
according to a single designated schedule or set of conditions.
high-availability system System of multiple computers configured as cluster nodes on a network that ensures
that the application services continue despite a hardware or software failure. Each
cluster node has its own IP address with private resources or disks that are available
only to that computer.
hostname Name or address of a physical or virtual host computer that is connected to a network.
Internationalization Process of adapting software to accept input and output of data in various languages
(I18N) and locales.
Java plug-in JVM that can be used by a web browser to run Java applets.
legacy method Use of special-case Microsoft APIs to back up and recover operating system
components, services, and applications.
level Backup configuration option that specifies how much data is saved during a scheduled
or manual backup:
l A full backup backs up all data objects or files, regardless of when they last
changed.
l An incremental backup backs up only data objects or files that have changed since
the previous backup.
library Hardware device that contains one or more removable media drives, as well as slots for
pieces of media, media access ports, and a robotic mechanism for moving pieces of
media between these components. Libraries automate media loading and mounting
functions during backup and recovery. The term library is synonymous with
autochanger, autoloader, carousel, datawheel, jukebox, and near-line storage.
library sharing Shared access of servers and storage nodes to the individual tape drives within a
library. The drives are statically assigned to hosts.
local cluster client NetWorker client that is not bound to a physical machine, but is instead managed by a
cluster manager. It is also referred to as a logical or virtual client.
localization (L10N) Translation and adaptation of software for the user language, time formats, and other
conventions of a specific locale.
manual backup Backup that a user performs from the client, also known as an unscheduled, on-
demand, or ad hoc backup.
media Physical storage, such as a disk file system or magnetic tape, to which backup data is
written. See volume.
media index Database that contains indexed entries of storage volume location and the life cycle
status of all data and volumes managed by the NetWorker server. Also known as media
database.
metadata document VSS Information stored in an XML document that is passed from the writer to the
requester. Metadata includes the Writer name, files, and components to back up, a list
of components to exclude from the backup, and the methods to use for recovery. See
shadow copy set .
mount To make a volume physically available for use, such as the placement of a removable
disk volume or tape into a drive for reading or writing.
mount host Host in a network that is used to mount storage array snapshot volumes to perform
snapshot restore and rollover operations.
multiplex To simultaneously write data from more than one save set to the same storage device.
named instance An installation of SQL Server that is given a name to differentiate it from other named
instances and from the default instance on the same computer. A named instance is
identified by the computer name and instance name.
NetWorker administrator NetWorker server user who may add, change, or delete NetWorker server users.
NetWorker application NetWorker server user who may operate NetWorker software, configure the
administrator NetWorker server, and create and modify NetWorker resources.
NetWorker Management Software program that is used to manage NetWorker servers and clients. The NMC
Console (NMC) server also provides reporting and monitoring capabilities for all NetWorker processes.
NetWorker security NetWorker server user who may add, change, or delete NetWorker server user groups.
administrator
NetWorker server Computer on a network that runs the NetWorker server software, contains the online
indexes, and provides backup and restore services to the clients and storage nodes on
the same network.
NetWorker Snapshot Technology that provides point-in-time snapshot copies of data. NetWorker software
Management (NSM) backs up data from the snapshot. This allows applications to continue to write data
during the backup operation, and ensures that open files are not omitted.
NetWorker User for SQL The graphical user interface for the NetWorker Module for Microsoft software. From
Server this interface you can initiate manual backups as well as recoveries.
NetWorker Windows A bootable image that contains NetWorker binaries and a wizard to control the
BMR image Windows BMR process.
non-critical volume A volume that contains files that are not part of the system state or an installed service.
notification Message sent to the NetWorker administrator about important NetWorker events.
offline backup Backup of database objects performed while the corresponding database or instance is
shut down and unavailable to users. Also known as a cold backup.
offline restore Automated restore that does not require the manual installation of an operating system.
A bare metal recovery (BMR) is an offline restore.
online backup Backup of database objects performed while the corresponding database or instance is
running and available to users. Also known as a hot backup.
online indexes Databases located on the NetWorker server that contain all the information pertaining
to the client backups (client file index) and backup volumes (media index).
online restore Restore operation that is performed from a NetWorker recover program. An online
restore requires that the computer has been booted from an installed operating system.
See also offline restore.
operator Person who performs day-to-day data storage tasks such as loading backup volumes
into storage devices, monitoring volume locations and server status, verifying backups,
and labeling volumes.
override A NetWorker feature that allows you to configure a different backup level for a specific
date listed in a Schedule resource.
parallelism Feature that enables a maximum number of concurrent streams of data during backup
or restore operations. For example, parallelism values can be set for the NetWorker
server, clients, pools, and groups.
physical cluster client Backup client that is bound to a physical host in the cluster and can have its own
resources (private or local).
point-in-time copy (PIT Fully usable copy of a defined collection of data, such as a consistent file system,
copy) database, or volume that contains an image of the data as it appeared at a specific point
in time. A PIT copy is also called a snapshot or shadow copy.
policy Set of defined rules for client backups that can be applied to multiple groups. Groups
have dataset, schedule, browse, and retention policies.
pool 1. NetWorker sorting feature that assigns specific backup data to be stored on
specified media volumes.
2. Collection of NetWorker backup volumes to which specific data has been backed
up.
primary storage Server storage subsystem, such as a disk array, that contains application data and any
persistent snapshots of data.
probe-based backup Type of scheduled backup, also known as an event-based backup, where the
NetWorker server initiates the backup only when specified conditions are met, as
determined by one or more probe settings.
provider Software component defined by Microsoft VSS, that plugs in to the VSS environment.
A provider, usually produced by a hardware vendor, enables a storage device to create
and manage snapshots.
proxy client Surrogate client that performs the NetWorker save operation for the client that
requests the backup. A proxy client is required to perform a serverless backup.
proxy host Surrogate host computer that performs backup or clone operations in place the
production host by using a snapshot copy of the production data. See mount host
quiesce State in which all writes to a disk are stopped and the file system cache is flushed.
Quiescing the database prior to creating the snapshot provides a transactionally
consistent image that can be remounted.
recover To restore data files from backup storage to a client and apply transaction (redo) logs
to the data to make it consistent with a given point-in-time.
recyclable save set Save set whose browse and retention policies have expired. Recyclable save sets are
removed from the media database.
recyclable volume Storage volume whose data has exceeded both its browse and retention policies and is
now available to be relabeled and reused.
Registry Microsoft Windows database that centralizes all Windows settings and provides
security and control of system, security, and user account settings.
requester A VSS-aware application that creates and destroys a shadow copy. NetWorker
software is a requester. See shadow copy
resource Software component whose configurable attributes define the operational properties of
the NetWorker server or its clients. Clients, devices, schedules, groups, and policies are
all NetWorker resources.
restore To retrieve individual data files from backup media and copy the files to a client without
applying transaction logs.
retention policy NetWorker setting that determines the minimum period of time that backup data is
retained on a storage volume and available for recovery. After this time is exceeded, the
data is eligible to be overwritten.
role Grant of user privileges to the Console. There are three roles: Console Application
Administrator, Console Security administrator, and the Console User. See user groups
roll forward To apply transactional logs to a recovered database to restore it to a state that is
consistent with a given point-in-time.
rollover Backup of a snapshot to conventional storage media, such as disk or tape. Previously
known as a live backup.
rollover-only backup Rollover whereupon the snapshot copy is deleted. Previously known as a serverless
backup, live backup, or nonpersistent backup.
save NetWorker command that backs up client files to backup media volumes and makes
data entries in the online index.
save set 1. Group of tiles or a file system copied to storage media by a backup or snapshot
rollover operation.
2. NetWorker media database record for a specific backup or rollover.
save set recover To recover data by specifying save sets rather than by browsing and selecting files or
directories.
save set status NetWorker attribute that indicates whether a save set is browsable, recoverable, or
recyclable. The save set status also indicates whether the save set was successfully
backed up.
save stream Data and save set information that is written to a storage volume during a backup. A
save stream originates from a single save set.
scanner NetWorker command used to read a backup volume when the online indexes are not
available.
scheduled backup Type of backup that is configured to start automatically at a specified time for a group
of one or more NetWorker clients. A scheduled backup generates a bootstrap save set.
secondary storage Storage media managed by a NetWorker server or storage node that stores
conventional or snapshot data. Configure a storage device on a NetWorker server or
storage node for each secondary storage.
service port Port used to listen for backup and recover requests from clients through a firewall.
shadow copy Temporary, point-in-time copy of a volume created using VSS technology. See VSS
(Volume Shadow Copy Service).
shadow copy set Complete roadmap of what was backed up at a single instant in time. The shadow copy
set contains information about the Writers, their components, metadata, and the
volumes. A backup components metadata document containing that information is
created and returned to the requester after the snapshot is complete. NetWorker uses
this document with the corresponding save set at recover time.
shadow copy technology Defined and standard coordination between business application, file system, and
backup application that allows a consistent copy of application and volume data to exist
for replication purposes.
skip Backup level in which designated files are not backed up. See level
snapshot Point-in-time, read-only copy of specific data files, volumes, or file systems on an
application host. Operations on the application host are momentarily suspended while
the snapshot is created on a proxy host. Also called a PiT copy, image, or shadow copy.
snapshot policy Sets of rules that control the life cycle of snapshots. These rule specify the frequency
of snapshot creation, how long snapshots are retained, and which snapshots will be
backed up to conventional storage media.
snapshot save set Group of files or other data included in a single snapshot. Previously called a snapset.
stage To move data from one storage medium to a less costly medium, and later removing the
data from its original location.
stand-alone device Storage device that contains a single drive for backing up data. Stand-alone devices
cannot automatically load backup volumes.
storage node Computer that manages physically attached storage devices or libraries, whose backup
operations are administered from the controlling NetWorker server. Typically a
“remote” storage node that resides on a host other than the NetWorker server.
stripes One or more streams of data that may be extracted in parallel from a database, and
written in parallel to multiple media devices, such as tape drives.
synthetic full backup Backup that combines a full backup and its subsequent incremental backups to form a
new full backup. Synthetic full backups are treated the same as ordinary full backups.
system state All files that belong to VSS Writers with a usage type of BootableSystemState or
SystemService. This is required to perform an offline restore.
transaction log Record of named database transactions or list of changed files in a database, stored in a
log file to execute quick restore and rollback transactions.
user 1. A NetWorker user who can back up and recover files from a computer.
2. A Console user who has standard access privileges to the Console server.
virtual cluster client NetWorker client that is not permanently bound to one physical host but is managed by
a cluster manager. It is also referred to as a logical cluster client or a virtual client.
Virtual Device Interface Third party backup applications use Virtual Device Interface (VDI) to communicate with
the SQL Server.
virtual server 1. Server, usually a web server, that shares resources with other virtual servers on the
same computer to provide low-cost hosting services.
2. In a cluster configuration, a set of two nodes, which are physical computers, and
virtual servers. Each node and virtual server has its own IP address and network
name. Each virtual server also owns a subset of shared cluster disks and is
responsible for starting cluster applications that can fail over from one cluster node
to another.
volume 1. Unit of physical storage medium, such as a disk or magnetic tape, to which backup
data is written.
2. Identifiable unit of data storage that may reside on one or more computer disks.
volume ID (volid) Internal identification that NetWorker software assigns to a backup volume.
volume mount point Disk volume that is added into the namespace of a host disk volume. This allows
multiple disk volumes to be linked into a single directory tree, and a single disk or
partition to be linked to more than one directory tree.
volume name Name that you assign to a backup volume when it is labeled.
VSS (Volume Shadow Microsoft technology that creates a point-in-time snapshot of a disk volume.
Copy Service) NetWorker software backs up data from the snapshot. This allows applications to
continue to write data during the backup operation, and ensures that open files are not
omitted
writer Database, system service, or application code that works with VSS to provide metadata
about what to back up and how to handle VSS components and applications during
backup and restore. See VSS (Volume Shadow Copy Service).