Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
148 views

Data Domain® DD Integration

Data Domain® DD Integration

Uploaded by

Rizwan Khan
Copyright
© © All Rights Reserved
0% found this document useful (0 votes)
148 views

Data Domain® DD Integration

Data Domain® DD Integration

Uploaded by

Rizwan Khan
Copyright
© © All Rights Reserved
You are on page 1/ 205

EMC® NetWorker®

Version 9.1

EMC® Data Domain Boost Integration Guide


®

302-003-258
REV 01
Copyright © 2001-2016 Dell Inc. or its subsidiaries. All rights reserved.

Published December 2016

Dell believes the information in this publication is accurate as of its publication date. The information is subject to change without notice.

THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS-IS.“ DELL MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND
WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. USE, COPYING, AND DISTRIBUTION OF ANY DELL SOFTWARE DESCRIBED
IN THIS PUBLICATION REQUIRES AN APPLICABLE SOFTWARE LICENSE.

Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property of their respective owners.
Published in the USA.

EMC Corporation
Hopkinton, Massachusetts 01748-9103
1-508-435-1000 In North America 1-866-464-7381
www.EMC.com

2 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


CONTENTS

Figures 7

Tables 9

Preface 11

Chapter 1 DD Boost Features and Environment 15


DD Boost integration features.....................................................................16
DD Boost and data deduplication....................................................16
Data Domain Cloud Tier..................................................................16
Data Domain High Availability support............................................ 17
Client Direct data handling............................................................. 17
DD Boost device storage................................................................ 17
DD Boost Synthetic Full backups................................................... 18
DD Boost in-flight encryption......................................................... 18
DD Boost clone operations............................................................. 18
NMC management of DD Boost operations....................................19
Feature not supported by the integration.......................................19
Data Domain network environment............................................................. 19
FC and IP network connectivity..................................................... 19
Data Domain storage system..........................................................19
NetWorker client........................................................................... 20
NetWorker Server......................................................................... 20
NMC Server.................................................................................. 20
NetWorker storage node............................................................... 20
NetWorker application modules..................................................... 20
Licensing in Data Domain systems.............................................................. 20
Traditional licensing for Data Domain systems............................... 21

Chapter 2 Planning and Practices 23


DD Boost storage characteristics............................................................... 24
DD Boost storage structures and limits..........................................24
DD Boost volume sharing...............................................................25
DD Boost performance.................................................................. 25
Memory requirements for DD Boost.............................................. 25
Devices in mixed device environments...........................................25
DD Boost devices and media pools................................................ 26
Reclaiming expired storage space..................................................26
Removing a DD Boost device......................................................... 26
DD Boost devices on Extended Retention systems........................26
Data Domain Cloud Tier system requirements............................................ 27
Network requirements................................................................................28
Ethernet IP support....................................................................... 28
FC support.....................................................................................28
Firewall requirements.................................................................... 34
Deduplication efficiency............................................................................. 35

EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide 3


CONTENTS

Retention periods.......................................................................... 35
Types of data backed up................................................................36
Change rate...................................................................................36
Frequency of full backups..............................................................36
Host naming guidelines...............................................................................36
Example name formats.................................................................. 37
IP addresses.................................................................................. 37
Example topologies.....................................................................................38
Client Direct deduplication environment........................................ 38
Disaster recovery environment...................................................... 39
Cascaded replication environment..................................................41
Shared datazones environment..................................................... 42
Dedicated storage node environment............................................ 43

Chapter 3 Software Configuration 45


DD Boost and Cloud Tier configuration road map....................................... 46
Configuring DDVE system settings............................................................. 46
Configuring DD Boost on the Data Domain system..................................... 46
Configuring the Data Domain system for DD Boost or Cloud Tier by
using the Data Domain System Manager........................................47
Configuring the Data Domain system for DD Boost by using the CLI
...................................................................................................... 49
Configuring SMT on the Data Domain system.............................................51
Configuring DD Cloud Tier devices............................................................. 52
Adding DD Cloud Tier storage to a Data Domain System............... 53
Import the cloud certificate........................................................... 54
Create the cloud profile and the cloud unit.................................... 55
Create the data movement schedule............................................. 56
Configuring a Highly Available Data Domain system................................... 58
Configuring NetWorker for DD Boost devices............................................ 60
DD Boost device performance considerations................................ 61
Configuring DD Boost devices with the wizard...............................61
Configuring NetWorker for Cloud Tier devices........................................... 70
Configuring NetWorker devices for DD Cloud Tier.........................70
Configuring a Cloud Tier device manually...................................... 79
Configuring clients to back up to DD Boost devices................................... 83
Configuring a backup client with the wizard.................................. 83
Configuring a backup client with NMC property windows............. 84
Manually creating or modifying NetWorker resources for DD Boost........... 87
Configuring DD Boost devices manually.........................................87
Deactivating and removing DD Boost devices.............................................96
Converting a device to read-only...................................................96
Disabling a device.......................................................................... 96
Deleting an AFTD or DD Boost device............................................97

Chapter 4 Data Protection Policies 99


Performing clone and replicate operations................................................ 100
Overview of data protection policies......................................................... 100
Default data protection policies................................................................. 101
Strategies for traditional backups............................................................. 103
Road map for configuring a new data protection policy................103
Creating a policy.......................................................................... 104
Creating a workflow in a new policy............................................. 105
Protection groups for traditional backups.................................... 107

4 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


CONTENTS

Supported actions in traditional backup workflows...................... 109


Actions sequences in traditional backup workflows.......................110
Visual representation of workflows...............................................127
Cloning with Data Domain (DD Boost)...................................................... 128
Clone formats...............................................................................128
CCR requirements........................................................................129
Cloning by pools........................................................................... 130
DD Boost clone and replication support.................................................... 130
Clone formats.............................................................................. 130
Native Data Domain replication considerations............................. 131
Data Domain Automated Multi-streaming (AMS)...................................... 131
Configuring the Data Domain CCR environment........................................132
Strategies for cloning................................................................................133
Road map for configuring a new cloning data protection policy....134
Road map to add a clone workflow to an existing policy............... 147
Clone reports............................................................................................ 156
Monitoring the status of Cloud Tier save sets........................................... 157
Cloning with nsrclone................................................................................158
Staging data from DD Cloud Tier devices..................................................158

Chapter 5 Restoring Data 163


Restoring DD Boost deduplicated data......................................................164
Restore requirements for deduplicated data................................ 164
Data recover from DD Cloud Tier devices.....................................164
Supported NetWorker restore procedures................................... 164
Restoring by Client Direct over IP from an FC-enabled device..................165
Disaster recovery...................................................................................... 165
Causes of disaster........................................................................166
Potential losses............................................................................ 166
Disaster recovery requirements................................................... 166
Disaster recovery scenarios......................................................... 166
Bootstrap recovery from a DD Cloud Tier device..........................167

Chapter 6 Monitoring, Reporting, and Troubleshooting 169


Monitoring Data Domain events, statistics, and logs................................. 170
Viewing the statistics, logs, and alerts..........................................170
Viewing backup statistics in NMC................................................ 172
Viewing backup alerts (SNMP traps) in NMC...............................172
Configuring SNMP for an NMC managed Data Domain system.... 172
Generating reports.................................................................................... 174
Configuring a report..................................................................... 174
Types of backup reports...............................................................175
Data Domain statistic reports....................................................... 177
Advanced reporting...................................................................... 177
Replacing a failed or old storage node....................................................... 177
Troubleshooting........................................................................................ 179
Data Domain system log files........................................................180
Troubleshooting DD Cloud Tier data movement issues..................181
Too many streams........................................................................ 183
Name resolution issues.................................................................183
Network connection issues.......................................................... 184
Device access errors.................................................................... 184
Backup fails for older NetWorker application modules................. 185
Multiple recovery fails on AIX clients with less than 2 GB RAM....185

EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide 5


CONTENTS

Backing up streams from NetWorker to Apollo DD is rejected......185

Appendix A DD Boost Conversion and Upgrade 187


Upgrading from legacy DD Boost configurations.......................................188
Converting DD Boost devices from IP to FC connectivity......................... 188
Redirecting backups from other devices to DD Boost............................... 188
Migrating data into Data Domain systems................................................. 189
Migration versus native Data Domain replication..........................190
Migration methods....................................................................... 190
Migrating legacy save sets to DD Boost devices........................... 191
Migration scenarios...................................................................................192
Migration to DD Boost from conventional tape or AFTD...............192
Migration to DD Boost from deduplicated VTL or AFTD storage.. 194

Glossary 197

Index 203

6 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


FIGURES

1 DD Cloud Tier solution ................................................................................................16


2 Client Direct backup versus traditional storage node backup......................................38
3 CCR for disaster recovery.......................................................................................... 40
4 CCR cascaded to multiple Data Domain systems........................................................ 42
5 Data Domain system shared across two NetWorker datazones.................................. 43
6 Single datazone with dedicated storage nodes and one high-bandwidth link.............. 44
7 Daily data movement schedule................................................................................... 58
8 Weekly data movement schedule............................................................................... 58
9 Monthly data movement schedule.............................................................................. 58
10 Select the Device Type page...................................................................................... 62
11 Data Domain Preconfiguration Checklist page............................................................62
12 Specify the Data Domain Configuration Options page................................................ 64
13 Select the Folders to use as Devices page..................................................................65
14 Configure Pool Information page................................................................................ 66
15 Select Storage Nodes page........................................................................................ 67
16 Select SNMP Monitoring Options page...................................................................... 68
17 Review the Device Configuration Settings page......................................................... 69
18 Device Configuration Results page............................................................................. 69
19 Data Domain System window..................................................................................... 70
20 Select the Device Type page....................................................................................... 71
21 DD Cloud Tier Configuration Options page................................................................. 72
22 Select the Folders to use as DD Cloud Tier Device page............................................. 74
23 Configure a Pool for the DD Cloud Tier Device page...................................................75
24 Select the Storage Nodes for the DD Cloud Tier Device page.................................... 76
25 Configure the Data Domain Management Policy page................................................ 77
26 Review the Device Configuration page....................................................................... 78
27 Check results page..................................................................................................... 78
28 Device window with a DD Cloud Tier device............................................................... 79
29 Example of the General tab configuration properties for a Cloud Tier device.............. 81
30 Example of the device name and the access information for a DD Boost device.........90
31 Data Protection Policy...............................................................................................101
32 Platinum policy configuration.................................................................................... 102
33 Gold policy configuration...........................................................................................102
34 Silver policy configuration......................................................................................... 102
35 Bronze policy configuration.......................................................................................103
36 Data protection policy example................................................................................. 104
37 All possible workflow actions for a traditional backup................................................ 110
38 Workflow path from a traditional backup action.........................................................110
39 Visual representation of a workflow...........................................................................127
40 Workflow path from a clone action............................................................................140
41 Visual representation of a clone workflow................................................................. 146
42 Example of a policy with separate workflows for backup and cloning........................ 147
43 mminfo output for Cloud Tier save set ..................................................................... 157
44 Status of Cloud Tier save sets in NMC...................................................................... 157
45 NetWorker Administration window displaying DD Boost devices................................171
46 Data Domain alerts to monitor................................................................................... 173
47 Report configuration................................................................................................. 175
48 Migration from conventional storage to DD Boost devices on a different storage node
..................................................................................................................................193
49 Migration from conventional storage to DD Boost devices on the same storage node
..................................................................................................................................194
50 Migration from VTL to DD Boost devices on a different storage node.......................195
51 Migration from VTL to DD Boost devices on the same storage node.........................195

EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide 7


FIGURES

8 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


TABLES

1 Revision history........................................................................................................... 11
2 Style conventions........................................................................................................13
3 Firewall ports for DD Boost.........................................................................................34
4 Schedule icons........................................................................................................... 111
5 Schedule icons...........................................................................................................114
6 Schedule icons...........................................................................................................118
7 Schedule icons.......................................................................................................... 123
8 Save set criteria........................................................................................................ 136
9 Schedule icons.......................................................................................................... 142
10 Save set criteria........................................................................................................ 149
11 Schedule icons.......................................................................................................... 153
12 Staging criteria options............................................................................................. 159
13 Data Domain report configuration parameters ..........................................................174
14 Data Domain basic reports ........................................................................................176
15 Data Domain statistics drill-down report....................................................................177

EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide 9


TABLES

10 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Preface

As part of an effort to improve its product lines, EMC periodically releases revisions of
its software and hardware. Therefore, some functions that are described in this
document might not be supported by all versions of the software or hardware
currently in use. The product release notes provide the most up-to-date information
on product features.
Contact your EMC technical support professional if a product does not function
correctly or does not function as described in this document.

Note

This document was accurate at publication time. Go to EMC Online Support (https://
support.emc.com) to ensure that you are using the latest version of this document.

Purpose
This document provides planning, practices, and configuration information for the use
of the DD Boost devices within an EMC NetWorker backup and storage management
environment.
Audience
This document is intended for system administrators. Readers of this document must
be familiar with the following tasks:
l Identifying the different hardware and software components that make up the
NetWorker datazone.
l Following procedures to configure storage management operations.
l Following guidelines to locate problems and implement solutions.
Revision history
The following table presents the revision history of this document.

Table 1 Revision history

Revision Date Description


01 December 22, 2016 First release of this document for EMC
NetWorker 9.1.

Related documentation
The NetWorker documentation set includes the following publications, available on
EMC Online Support:
l EMC NetWorker Online Software Compatibility Matrix
Provides a list of client, server, and storage node operating systems supported by
the EMC information protection software versions. You can access the matrix at
http://compatibilityguide.emc.com:8080/CompGuideApp/.
l EMC NetWorker Administration Guide
Describes how to configure and maintain the NetWorker software.
l EMC NetWorker Network Data Management Protocol (NDMP) User Guide
Describes how to use the NetWorker software to provide data protection for
NDMP filers.

EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide 11


Preface

l EMC NetWorker Cluster Integration Guide


Contains information related to configuring NetWorker software on cluster servers
and clients.
l EMC NetWorker Installation Guide
Provides information on how to install, uninstall, and update the NetWorker
software for clients, storage nodes, and servers on all supported operating
systems.
l EMC NetWorker Updating from a Previous Release Guide
Describes how to update the NetWorker software from a previously installed
release.
l EMC NetWorker Release Notes
Contains information on new features and changes, fixed problems, known
limitations, environment and system requirements for the latest NetWorker
software release.
l EMC NetWorker Command Reference Guide
Provides reference information for NetWorker commands and options.
l EMC NetWorker Data Domain Boost Integration Guide
Provides planning and configuration information on the use of Data Domain
devices for data deduplication backup and storage in a NetWorker environment.
l EMC NetWorker Performance Optimization Planning Guide
Contains basic performance tuning information for NetWorker.
l EMC NetWorker Server Disaster Recovery and Availability Best Practices Guide
Describes how to design, plan for, and perform a step-by-step NetWorker disaster
recovery.
l EMC NetWorker Snapshot Management Integration Guide
Describes the ability to catalog and manage snapshot copies of production data
that are created by using mirror technologies on EMC storage arrays.
l EMC NetWorker Snapshot Management for NAS Devices Integration Guide
Describes how to catalog and manage snapshot copies of production data that are
created by using replication technologies on NAS devices.
l EMC NetWorker Security Configuration Guide
Provides an overview of security configuration settings available in NetWorker,
secure deployment, and physical security controls needed to ensure the secure
operation of the product.
l EMC NetWorker VMware Integration Guide
Provides planning and configuration information on the use of VMware in a
NetWorker environment.
l EMC NetWorker Error Message Guide
Provides information on common NetWorker error messages.
l EMC NetWorker Licensing Guide
Provides information about licensing NetWorker products and features.
l EMC NetWorker REST API Getting Started Guide
Describes how to configure and use the NetWorker REST API to create
programmatic interfaces to the NetWorker server.
l EMC NetWorker REST API Reference Guide
Provides the NetWorker REST API specification used to create programmatic
interfaces to the NetWorker server.
l EMC NetWorker 9.1 with EMC CloudBoost 2.1 Integration Guide
Describes the integration of NetWorker with CloudBoost.

12 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Preface

l EMC NetWorker Management Console Online Help


Describes the day-to-day administration tasks performed in the NetWorker
Management Console and the NetWorker Administration window. To view the
online help, click Help in the main menu.
l EMC NetWorker User Online Help
Describes how to use the NetWorker User program, which is the Windows client
interface, to connect to a NetWorker server to back up, recover, archive, and
retrieve files over a network.
l EMC Data Domain Boost Compatibility Guide
Provides compatibility information for EMC and third party applications, and Fibre
Channel hardware solutions, that interoperate with EMC Data Domain Boost (DD
Boost) technology.
Special notice conventions that are used in this document
EMC uses the following conventions for special notices:

NOTICE

Identifies content that warns of potential business or data loss.

Note

Contains information that is incidental, but not essential, to the topic.

Typographical conventions
EMC uses the following type style conventions in this document:

Table 2 Style conventions

Bold Used for names of interface elements, such as names of buttons,


fields, tab names, and menu paths (what the user specifically selects
or clicks)

Italic Used for full titles of publications that are referenced in text
Monospace Used for:
l System code
l System output, such as an error message or script
l Pathnames, file names, prompts, and syntax
l Commands and options

Monospace italic Used for variables


Monospace bold Used for user input

[] Square brackets enclose optional values

| Vertical bar indicates alternate selections - the bar means “or”

{} Braces enclose content that the user must specify, such as x or y or


z

... Ellipses indicate non-essential information that is omitted from the


example

Where to get help


EMC support, product, and licensing information can be obtained as follows:

EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide 13


Preface

Product information
For documentation, release notes, software updates, or information about EMC
products, go to EMC Online Support at https://support.emc.com.
Technical support
Go to EMC Online Support and click Service Center. Several options for contacting
EMC Technical Support appear on the site. Note that to open a service request, you
must have a valid support agreement. Contact your EMC sales representative for
details about obtaining a valid support agreement or with questions about your
account.
Online communities
Go to the EMC Community Network at https://community.emc.com for peer
contacts, conversations, and content on product support and solutions. Interactively
engage online with customers, partners, and certified professionals for all EMC
products.
Your comments
Your suggestions help to improve the accuracy, organization, and overall quality of the
user publications. Send your opinions of this document to
DPAD.Doc.Feedback@emc.com.

14 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


CHAPTER 1
DD Boost Features and Environment

This chapter includes the following topics:

l DD Boost integration features............................................................................ 16


l Data Domain network environment.....................................................................19
l Licensing in Data Domain systems..................................................................... 20

DD Boost Features and Environment 15


DD Boost Features and Environment

DD Boost integration features


The EMC® NetWorker® integration with EMC Data Domain® systems uses DD Boost
deduplication devices, which offer the following integration features.

DD Boost and data deduplication


NetWorker client software uses DD Boost components to integrate with DD Boost
logical storage devices on Data Domain systems, and perform data deduplication
backups. Data deduplication is a type of data compression that removes duplicate
information to dramatically reduce the amount of backup data sent to the storage
devices. The reduction in data that is sent to the devices reduces the bandwidth that
is required for the data transport.
DD Boost can run up to 60 concurrent sessions or save streams on each DD Boost
device for backup and recovery. This high concurrence reduces the number of
required devices and reduces the impact on the performance and maintenance of the
Data Domain system. The resulting performance gain provides an advantage over
conventional advanced file type device (AFTD) or virtual tape library (VTL) interfaces
that do not handle these high session rates.
During recovery to a NetWorker client, the Data Domain system converts the stored
data to its original non-deduplicated state.

Data Domain Cloud Tier


The Data Domain Cloud Tier (DD Cloud Tier) is a long term data retention solution that
enables the movement of data from an Data Domain Active Tier (DD Active Tier)
device to a DD Cloud Tier device, and then to an external Cloud Provider.
The NetWorker integration with the DD Cloud Tier provides a Data Protection
Administrator with the ability to perform the following functions:
l Ability to clone data from a DD Active Tier device to a DD Cloud Tier device.
l Track individual client data that is stored in the cloud or on-premise.
l Recover data to a client from the cloud, including FLR/GLR recoveries.
NetWorker supports the following Cloud services, for long term retention in this
release: Amazon web services (AWS), EMC® Elastic Cloud Storage™ (ECS™), and
Microsoft® Azure®
The following diagram provides an overview of the DD Cloud Tier solution.
Figure 1 DD Cloud Tier solution

16 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


DD Boost Features and Environment

Data Domain High Availability support


NetWorker 9.1 supports highly available Data Domain systems.
To configure alerts for the following Data Domain high availability events, during Data
Domain device setup, select the following options from the Device Configuration
Wizard > SNMP Monitoring Options page:
l HA Setup Degraded
l HA Setup Offline
l HA Setup Out-of-Sync
When a highly available Data Domain system fails over to its standby highly available
Data Domain system, NMC displays event messages. All in-progress NetWorker
operations including backup, clone, and recover operations are unaffected, except for
a temporary freeze of operations for a few minutes. However, during unusually long
freezes, for example over ten minutes, some NetWorker operations might fail but are
automatically retried. Some failed NetWorker operations might require a manual
restart.
If interrupted by a failover NFS, VTL, and CIFS jobs fail. You must configure
NetWorker policies to restart or resume the failed jobs. You can manually restart the
failed jobs as soon as the failover completes. The failed jobs will not restart or resume
on their own.

Note

To view events in NMC, clear all alerts on the Data Domain system. For example, in
the Data Domain UI, select Alerts > Current Alerts > Select All > Clear.

Client Direct data handling


The Client Direct feature enables clients that have a direct network or a DD Boost
over Fibre Channel (DFC) connection to the Data Domain system to send and receive
data directly to Data Domain AFTD and DD Boost devices. Client Direct supports
multiple concurrent backup and restore operations that bypass the NetWorker storage
node, which eliminates a potential bottleneck. The storage node manages the devices
that the clients use but does not handle the backup data. Client Direct was previously
known as Direct File Access (DFA).
When the connection is available, NetWorker enables Client Direct by default and also
uses Client Direct to recover duplicated backups that NetWorker had performed with
a storage node.

DD Boost device storage


A Data Domain system stores deduplicated NetWorker backup data on DD Boost
storage devices on the Data Domain system. The NetWorker server, storage nodes,
and Client Direct clients can all access the DD Boost devices. The DD Boost devices
appear as folders that reside in storage unit (SU) partitions.

Secure multi-tenancy
NetWorker supports DD Boost devices in secure multi-tenancy (SMT) storage on
Data Domain systems. SMT enables service providers to isolate tenant users on a Data
Domain system. A global storage administrator assigns or creates a tenant unit (TU)
for each tenant user. Tenant users, for example, backup administrators, must use a DD

Data Domain High Availability support 17


DD Boost Features and Environment

Boost username and password to create the secure storage units (SUs) that the DD
Boost devices use to store data.

Retention tier storage


The Data Domain Extended Retention software option extends the Data Domain
storage structure with internal tiers, for long-term retention of deduplicated backup
data.
Use Data Domain operations to migrate the data from the active tier to the retention
tier. The archive tier does not require additional capacity licensing.
This model of a Data Domain system can support mixed environments that may
include DD Boost devices, VTL, and CIFS or NFS AFTD disk configurations. On an
Extended Retention-enabled Data Domain system, the NetWorker software interacts
with the active tier only and is not aware of any migration activity between the internal
storage tiers.

DD Boost Synthetic Full backups


The NetWorker Synthetic Full backup feature is an efficient way to create full backups
by combining existing full and incremental backups. This feature integrates the
NetWorker Synthetic Full backup feature and the Data Domain virtual-synthetics
feature. NetWorker creates the Synthetic full backups directly on the DD Boost
devices. Both the NetWorker software and the Data Domain system are configured by
default to enable DD Boost synthetic full backups.
The EMC NetWorker Administration Guide provides more details about the Synthetic
Full feature.

DD Boost in-flight encryption


NetWorker enables DD Boost clients to have in-flight data encryption with a Data
Domain system that uses DDOS 5.5 or later over a WAN connection. To use this
feature, configure the Data Domain system to use medium- or high-strength TLS
encryption. The configuration is transparent to NetWorker.
The Data Domain documentation provides more information about DD Boost in-flight
encryption.

DD Boost clone operations


Create a clone of backup data that is stored on DD Boost devices, and then copy the
clone data to remote offsite storage for added protection and efficient disaster
recovery. To use the NetWorker clone feature, add a clone action to a workflow in a
data protection policy. The clone action generates information that NetWorker stores
in the client file index and media database to enable data recovery. The retention
policy assigned to the clone action defines the length of time that NetWorker retains
this data. All data movement for NetWorker clone operations must use Fibre Channel
(DFC) or IP network connectivity.
There are two types of clone operations:
l NetWorker clone-controlled replication (CCR or enhanced cloning) operations,
which replicates data from a DD Boost device to another DD Boost device at a
different location. CCR preserves the deduplicated data format and minimizes
bandwidth usage between the Data Domain systems.

18 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


DD Boost Features and Environment

l Clone to native format operations, which clone data from DD Boost storage to
conventional storage media, for example, disk or tape. This operation reverts the
data to the native non-deduplicated format, to enable recovery from a
conventional disk device or tape device.

NMC management of DD Boost operations


Use NMC to efficiently configure, monitor, and generate reports for DD Boost
devices. The NMC server and the NetWorker server must have network access to
each managed Data Domain system.
The NMC Device Configuration Wizard simplifies the configuration of DD Boost
storage devices, backup clients, storage pools, volume label operations, and save set
clone operations.

Feature not supported by the integration


Native Data Domain directory replication (MTree replication) does not fully support
DD Boost devices, which are rendered as read-only directories. Native Data Domain
replication considerations on page 131 provides details.

Data Domain network environment


A NetWorker with Data Domain network environment can include the following
components.

FC and IP network connectivity


DD Boost devices support data transport over Fibre Channel (FC) and Ethernet IP
(IPv6 and IPv4) network connections for backup and recovery operations with Data
Domain systems.
NetWorker supports DD Boost devices on IPv6 networks and Data Domain systems
support IPv6 network usage with DHCP, DNS, and DDNS internet services. The EMC
Data Domain Operating System Administration Guide provides configuration details.
When you use DFC for data transport, review the following information:
l The NetWorker server also requires IP connections to communicate with all the
hosts that are involved in DD Boost operations and for data transport during
recovery and clone-controlled replication operations.
l Client Direct backup with DFC is not supported for 32-bit Linux NetWorker clients
that are installed on 64-bit Linux systems. The backup reverts to a storage node
backup.
l For DFC to work the encryption strength for the client "*" on the DD OS, set the
option to None. By default the setting is set to High.

Data Domain storage system


A Data Domain system can store deduplicated backup or clone data on DD Boost
devices, and supports mixed environments that may include DD Boost devices, VTLs,
and CIFS or NFS AFTD disk configurations. The Data Domain system may require
additional licenses for the DD Boost functionality.
The EMC NetWorker Online Software Compatibility Matrix provides compatibility
information.

NMC management of DD Boost operations 19


DD Boost Features and Environment

NetWorker client
A NetWorker client is a supported host whose data requires protection. The
NetWorker client software includes an integrated DD Boost plugin. The NMC server,
NetWorker server, and NetWorker storage nodes are also NetWorker clients.
NetWorker clients that use Client Direct deduplication must have direct network
access to the Data Domain system, which stores the data. NetWorker enables Client
Direct by default in the properties of the Client resource.
Client Direct with FC connectivity to DD Boost devices requires NetWorker client 8.1
or later.
The EMC NetWorker Online Software Compatibility Matrix provides information on
supported releases.

NetWorker Server
The NetWorker Server is a collection of processes and programs that are installed on
a host that performs NetWorker services. The NetWorker Server also acts as a
storage node and can control multiple remote storage nodes.

NMC Server
The NetWorker Management Console (NMC) server or Console server is a Java-based
web application and database server. The NMC Server manages all NetWorker
Servers and Clients. The NMC Server also provides reporting and monitoring
capabilities for all NetWorker Servers and Clients in the environment. NMC Server
relies on the NetWorker Authentication Service for user account authentication.

NetWorker storage node


NetWorker storage nodes manage DD Boost and other storage devices. When a client
does not use Client Direct, the NetWorker storage node deduplicates the backup data,
then sends the deduplicated data to the DD Boost devices.
Install the same version, including the service pack of the NetWorker storage node
software on each host in the datazone that stores backup or clone data on DD Boost
devices.

NetWorker application modules


NetWorker supports Client Direct deduplication backup and recovery on clients with
supported NetWorker application modules, for example, NetWorker Module for
Databases and Applications (NMDA), NetWorker Module for Microsoft Applications
(NMM), and NetWorker Module for SAP (NMSAP). The clients must have direct
network access or Fibre Channel access to the Data Domain system. The release
notes for the application module provide details.

Licensing in Data Domain systems


There are three types of licensing models that enable the NetWorker server to
interact with a Data Domain system:
l The EMC Licensing Solution with capacity entitlement, introduced in NetWorker
9.0, which uses an EMC License Server and a license file.

20 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


DD Boost Features and Environment

l Traditional Licensing, which uses individual enabler codes to license features.


NetWorker requires only a single enabler to support multiple interfaces and
multiple network identities for Data Domain systems.
l Capacity Licensing from NetWorker 8.2.x and previous releases, which licenses
the datazone by using capacity-based enabler codes.
The EMC NetWorker Licensing Guide provides licensing details.

Traditional licensing for Data Domain systems


If you use traditional licensing, a new installation of the NetWorker server software
enables you to evaluate all the features for 30 days, including the Data Domain
features, without the use of an enabler (license key). To extend this evaluation period
by 15 additional days, type the word grace in the Auth code field of the NetWorker
server evaluation license before the end of the 90-day period. After the evaluation
period ends, you cannot perform a backup unless you install permanent license enabler
codes.

Data Domain licenses


Enable either the Data Domain system or the Data Domain system with Extended
Retention software by using the following licenses for DD Boost operations:
l DDBOOST license
l REPLICATION license, if you use CCR
To enable Cloud Tier, obtain a CLOUDTIER-CAPACITY license.
To generate a list of the enabled licenses on the Data Domain system, type the
license show command. The output displays DDBOOST when a DD Boost license is
installed, and REPLICATION when a replication license is installed. Configuring the
Data Domain system for DD Boost by using the CLI on page 49 provides details.
For license inquiries, go to the Data Domain portal for service and support at https://
support.emc.com.

Traditional licensing for Data Domain systems 21


DD Boost Features and Environment

22 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


CHAPTER 2
Planning and Practices

This chapter includes the following topics:

l DD Boost storage characteristics.......................................................................24


l Data Domain Cloud Tier system requirements.................................................... 27
l Network requirements....................................................................................... 28
l Deduplication efficiency.....................................................................................35
l Host naming guidelines...................................................................................... 36
l Example topologies............................................................................................ 38

Planning and Practices 23


Planning and Practices

DD Boost storage characteristics


NetWorker integrates with Data Domain systems by storing backup data on DD Boost
devices.
The EMC NetWorker Online Software Compatibility Matrix provides information about
supported releases.

DD Boost storage structures and limits


DD Boost devices use a folder structure on the Data Domain system that has the
following characteristics:
l The Data Domain storage consists of separate logical partitions called storage
units (SUs) or managed trees (MTrees).
l By default, the NetWorker Device Configuration Wizard creates one SU for each
NetWorker datazone. The wizard names the SU after the short hostname of the
NetWorker server.
l You can define up to 99 active SUs on a Data Domain system.
l DD Boost devices appears as subfolders within the SU folder.
l You can associate each DD Boost device with only one NetWorker storage volume.
However, a single NetWorker volume can share multiple DD Boost devices, which
in some environments can improve performance.
l You must use DD Boost credentials to create the SUs and the DD Boost devices,
and to enable secure multi-tenancy (SMT) access to the DD Boost devices.
l Avoid changing the user of a device; the new user will not have permission to the
files and directories created by the previous user and cannot re-label the volume;
create a device for the new user.
l For SMT, NetWorker supports up to 512 DD Boost devices on each SU. Otherwise,
there is no limit on the number of DD Boost devices that you can create. For best
performance, use fewer devices and more backup sessions on each device.
l Data Domain MTree quotas manage the usable capacity of SUs. When an MTree
reaches the defined quota, any running DD Boost backup operation terminates.

SMT structure
For SMT storage, a global storage administrator isolates DD Boost users, for example
backup administrators, by assigning them to tenant units (TUs). A TU cannot span
Data Domain systems. You can assign a DD Boost user to only one TU, but you can
assign multiple DD Boost users to the same TU. Each DD Boost user can create SUs
within the assigned TU only. Security is enforced at the TU level by the DD Boost user
assignment on the Data Domain system, and at the SU level by the DD Boost
credentials.
For example:
Tenant 1: bob, tu1, su1
Tenant 2: joe, tu2, su2
Tenant 3: sue, tu2, su3

24 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Planning and Practices

DD Boost volume sharing


Multiple DD Boost devices, specified by different names or aliases, can concurrently
share a single NetWorker storage volume.
Each DD Boost device operates with a single NetWorker storage volume and you must
specify each device by the device access pathname.
l Each DD Boost device operates with a single NetWorker storage volume and you
must specify each device by its device access pathname.
l You can create multiple devices with the same device access pathname, provided
that you assign each device a different name, as an alias. You can use the different
device aliases, for example, to manage different client hosts that share the same
volume.
Configuring a DD Boost device manually on page 89 provides details on device
access information.

DD Boost performance
DD Boost devices use multiple concurrent nsrmmd (media mover) processes per
device and each nsrmmd process uses multiple concurrent save sessions (streams or
threads). This reduces the performance and maintenance impacts on the Data Domain
system.
Balance the session load among the available DD Boost devices so that new sessions
attach to devices with the least load. To enable best performance, you can adjust the
Target Sessions, Max Sessions, and Max nsrmmd Count attributes assigned to the
Device resource on the NetWorker server.
Configuring a DD Boost device manually on page 89 provides details on session
settings.
The Data Domain documentation provides additional details on save sessions and
performance.

Memory requirements for DD Boost


The physical memory requirement for a NetWorker storage node and a Client Direct
client depends on the peak usage of the DD Boost devices.
Ensure the following memory requirements:
l A storage node host that manages DD Boost devices with other typical devices
and typical services must have a minimum of 8 GB of RAM.
l A DD Boost client requires a minimum of 4 GB of RAM at the time of backup to
ensure the best performance for Client Direct backups.

Devices in mixed device environments


A Data Domain system can support mixed NetWorker environments, which can include
DD Boost devices, VTLs, and CIFS or NFS AFTD disk configurations. Each different
storage environment must use a different interface connection. Use a NIC for IP data
transport and an FC port for SAN data transport. You can use the NetWorker clone
process over an IP connection to migrate legacy data that is stored in these traditional
storage environments to DD Boost devices.

DD Boost volume sharing 25


Planning and Practices

DD Boost devices and media pools


Use media pools to send client backups or clones of the backup data to specific
storage devices. You must configure pools for DD Boost devices with the following
important consideration.
A pool that contains the DD Boost devices must not contain any other type of storage
media and must not contain devices on more than one Data Domain system.
This practice ensures an optimal backup window and deduplication ratio with the least
amount of interference. When you store each backup on a single Data Domain system,
you simplify recovery and Data Domain file replication.
Periodically review and remove unused pools that are no longer relevant to the storage
environment.

Reclaiming expired storage space


When a backup on a Data Domain system reaches the retention expiry date, all
references to the data become invalid. However, unlike conventional storage systems,
the Data Domain system does not immediately free up disk space on the device
because other existing backups or other clients may continue to have deduplication
references to the same data.
For example, the deletion of 1 GB of data, even of unique data from a NetWorker
perspective, does not mean that 1 GB of space is immediately available on the Data
Domain system.
The DD OS filesys show space or df command shows the data that is eligible for
deletion under the Cleanable GiB column.
The Data Domain system periodically reviews deduplication references and storage
space and performs a cleanup. By default, these cleanups occur weekly.

Note

If a DD Boost device becomes full during a backup, the backup immediately fails. The
device does not pause or wait for space to become available.

The DD OS filesys clean command describes all the available options that you
can use to reclaim and recycle expired NetWorker save sets and other redundant or
expired data.

Removing a DD Boost device


You must use special procedures to remove DD Boost devices.
Deleting an AFTD or DD Boost device on page 97 provides details.

DD Boost devices on Extended Retention systems


You can use SU folders or MTrees and DD Boost devices on Data Domain Extended
Retention systems, similar to those on standard Data Domain systems, with the
considerations described in this section.
The Data Domain documentation provides details on Data Domain Extended Retention
features.

26 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Planning and Practices

Active and extended retention tier structure


On Data Domain Extended Retention systems, you can store data in two tiers of SUs,
an active tier and an extended retention tier.
Data Domain places all incoming data first in the active file system tier, which is for
short-term data storage and is similar to standard Data Domain systems. You can use
the active tier for client backups, provided that you apply appropriate data movement
and data retention policies. It is recommended that you create separate SUs for
backup operations. You can move data from the active tier to the archive tier, based
on data movement policies that you apply at the SU level.
DD OS supports up to 14 active and 99 defined SUs with the Extended Retention
software feature. NetWorker does not limit the number of DD Boost devices that you
can create on the system.

Data movement between tiers


Each SU has a single data movement policy that applies to all the devices that the SU
manages within the corresponding NetWorker datazone.
You can create a Data Domain SU data movement policy to specify when the data
moves from devices in the active tier to devices in the archive tier. Typically, you
would not move data to the archive tier for less than 30 days retention. The policy and
movements are internal to the Data Domain Extended Retention system, and the
NetWorker software has no awareness of the operations.
You can assign alternative data movement policies to the client data by using
additional SUs, created by NMC or nsradmin, for moving data from one tier to
another. For example, you can store data to different archive DD Boost devices in
separate SUs with different archive policies. Also, you can move data within the same
Data Domain Extended Retention system by using CCR.
To use CCR on the same Data Domain system that includes the Extended Retention
software feature, you must replicate between two different SUs. You can apply
different retention policies to manage the data efficiently.

Data Domain Cloud Tier system requirements


Data Domain systems that support the Extended Retention Tier and Data Domain
Virtual Edition (DDVE) support Cloud Tier.
To use Data Domain Cloud Tier with a DDVE, ensure that the appliance meets the
following minimum requirements:
l 16 TB DDVE
n DD OS 6.0
n DDVE— 4 CPUs, 32 GB memory, 200 GB Active Tier disk, 500 GB Cloud Tier
disk
l 64 TB DDVE
n DD OS 6.0
n DDVE— 8 CPUs, 60 GB memory, 200 GB Active Tier disk, 500 GB Cloud Tier
disk
l 96 TB DDVE

Data Domain Cloud Tier system requirements 27


Planning and Practices

n DD OS 6.0
n DDVE— 8 CPUs, 80 GB memory, 200 GB Active Tier disk, 500 GB Cloud Tier
disk

Network requirements
DD Boost devices support data transport over both Ethernet IP networks and FC SAN
environments for both data backup and data recovery operations.
The NetWorker server requires Ethernet IP connections to control all hosts involved in
the DD Boost operations.

Ethernet IP support
DD Boost devices do not distinguish between different TCP/IP network types (LAN,
WAN, or MAN) and can successfully operate in a network where packet loss is strictly
0% and latency is less than 20ms. Variations of IP network connections can improve
data throughput, depending on the Data Domain system model.
EMC recommends a minimum of two separate IP network connections to the Data
Domain system. One is used for administration and the other is used for data backup.
Aggregated multiple connections can further improve data throughput for the Data
Domain system. For example, you can use multiple 1 GbE connections for dedicated
storage nodes and storage devices. Connections for 10 GbE are also available and you
can use these instead of or with 1 GbE links.
You can configure two basic IP interfaces:
l Dedicated 1 GbE data connection from the storage node directly to the Data
Domain system. This connection provides a private, high-bandwidth data
connection and avoids the latency and complexity of a shared IP connection. You
also require a separate conventional IP connection for administration and
NetWorker Console access.
The EMC Data Domain Operating System Administration Guide provides details on
network support.
l Two or more NICs on the Data Domain system with 1 GbE or 10 GbE connections,
which are aggregated together by using the Data Domain ifgroup command.
This grouping provides increased data capacity and can improve resiliency. The
Data Domain system provides automatic Advanced Load Balancing and Link
Failover for NIC connections.

Note

Do not use aggregated connections for replication operations.

The EMC Data DomainBoost for Open Storage Administration Guide describes the
benefits, limitations, and examples of using ifgroups, which apply to NetWorker.

FC support
NetWorker supports data backup and recovery operations to DD Boost devices over
Fibre Channel (DFC or FC) connections, which are configured as a SAN, as follows:
l The NetWorker storage nodes and all Client Direct clients must have FC SAN
network access to the Data Domain systems that have FC-enabled DD Boost
devices.

28 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Planning and Practices

l The environment must have an Ethernet IP network. The NetWorker server uses
IP connections to communicate with the clients, storage nodes, and the Data
Domain system. DD Boost devices that are involved in CCR operations must have
IP connectivity for the data transport.
l FC-enabled NetWorker clients must run on a supported Windows, Linux, HP-UX,
AIX, or Solaris operating system. HP-UX systems must minimum versions of
NetWorker 8.2 SP3 or NetWorker 9.0 clients and storage nodes. AIX systems
must use NetWorker 9.0 clients and storage nodes. Supported Solaris versions on
a client are Solaris 10 and 11 on SPARC with x86 architectures. Solaris uses SCSI
generic device driver, sgen. The sgen driver is included in the Solaris installation.
The EMC NetWorker Online Software Compatibility Matrix and the EMC Data Domain
Boost Compatibility Guide provide details.

Note

On AIX, DD Boost-over-FC requires a device driver. The AIX Installation Chapter in


the EMC NetWorker Installation Guide provides more details.
l The NetWorker clients and NetWorker storage nodes must run NetWorker 8.1 or
later software.
l All hosts that use FC must have an HBA card with at least 4 Gbps bandwidth
capacity and must devote an initiator port on each card to FC for DD Boost
devices. You should configure Access groups. The EMC DD OS Administration Guide
provides details.
l FC-enabled DD Boost devices support Client Direct backup and restore over FC,
provided that you have enabled the clients with FC connections and settings.
l Data Domain systems support the coexistence of FC-enabled DD Boost devices
together with VTL devices on the same Data Domain system. However, the FC-
enabled DD Boost devices must not share an initiator with VTL devices on the
same Data Domain system.
l CCR is supported between FC-enabled DD Boost devices provided that there is IP
connectivity between the Data Domain systems. CCR is not supported over a Fibre
Channel network.
You can convert an existing DD Boost device from IP to FC connectivity and settings
without losing the stored data. You can restore the data to FC-enabled Client Direct
clients through their FC connection, and to IP-only clients through the storage node.
Converting DD Boost devices from IP to FC connectivity on page 188 provides
details.
The NetWorker server can migrate legacy backup data stored on a VTL or tape device
to an FC-enabled DD Boost device. You can create a clone pool for this migration.
Considerations for migrating legacy save sets provides details.
The EMC NetWorker Online Software Compatibility Matrix provides the latest details of
supported versions.

Configuring DD Boost-over-FC Service


Before you begin
In order to support the DD Boost-over-FC service, it is necessary to install supported
Fibre Channel Target HBAs into the system. (See also the EMC Data Domain Operating
System Command Reference Guide and Administration Guide for information about
scsitarget as a related command that may be helpful in managing the SCSI target
subsystem.)

FC support 29
Planning and Practices

Note

l Windows, Linux, HP-UX, AIX, and Solaris client environments are supported.
l Beginning with DD Boost 3.3 and DD OS 6.0, you do not need a device driver; you
can enable DD Boost-over-FC by creating a ddboost fc group; see Step 3 in the
following procedure.
l To enable DD Boost-over-FC on clients running AIX, you can also install the AIX
DDdfc device driver.

Ensure that the client's HBA ports and the Data Domain system's endpoints are
defined and that appropriate zoning has been done if you are connecting through a
Fibre Channel switch.
Procedure
1. Enable the DD Boost-over-FC service:
# ddboost option set fc enabled
2. Optional: set the DFC-server-name:
# ddboost fc dfc-server-name set <server-name>

Alternatively, accept the default, which has the format DFC-<base


hostname>. The hostname cannot be the fully-qualified domain name.
A valid DFC server name consists of one or more of the following characters:
l lower-case letters (“a”–“z”)
l upper-case letters (“A”–“Z”)
l digits (“0”–“9”)
l underscore (“_”)
l dash (“–”)

Note

The dot or period character (“.”) is not valid within a dfc-server-name; this
precludes using the fully qualified domain name of a Data Domain system as its
dfc-server-name.

Note

Similar to IP hostnames, the dfc-server-name is not case-sensitive. Multiple


Data Domain sytems accessible by the same clients using DDBoost-over-FC
should be configured without case-sensitive dfc-server-name.

3. Create a SCSI target access group:


# ddboost fc group create <group-name>

Example:
# ddboost fc group create lab_group
4. To display the available list of scsitarget endpoints, enter:
# scsitarget endpoint show list
Endpoint System Address Transport Enabled Status
------------- -------------- ------------ ------- ------
endpoint-fc-0 6a FibreChannel Yes Online

30 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Planning and Practices

endpoint-fc-1 6b FibreChannel Yes Online


------------- -------------- ------------ ------- ------
5. Indicate which endpoints to include in the group:
# ddboost fc group add <group-name> device-set
count count endpoint endpoint-list [disk <disk-name>]

Note

The disk option in the previous example is optional and supported only if the
client is AIX.

Example:
# ddboost fc group add lab_group device-set count 8 endpoint 6a
6. Verify that initiators are present. To view a list of initiators seen by the Data
Domain system:
# scsitarget initiator show list
7. Add initiators to the SCSI target access group:
# ddboost fc group add group-name initiator initiator-spec

Example:
# ddboost fc group add lab_group initiator
"initiator-15,initiator-16"

Sizing DD Boost-over FC Device-Set


The Data Domain system advertises one or more “DFC devices” of type Processor,
which the DD Boost Library uses to communicate with the DD Boost-over-FC service.
On the Data Domain system, access to these DFC devices is granted to one or more
initiators by adding the initiator(s) to a ddboost-type scsitarget access group:
# ddboost fc group add lab_group initiator "initiator-15,initiator-16"

The number of DFC devices advertised to the initiator is controlled by configuring the
device-set of the scsitarget access group:
# ddboost fc group modify lab_group device-set count 4

The maximum number of supported DFC devices per Data Domain system is 64. You
can have the same devices in multiple groups, but each group is limited to 64 devices.

Note

AIX DFC drivers support 128 devices; however, if the you use the disk option with
the ddboost fc add command, this limitation is removed.

Because the DFC client sees each path to the Data Domain system as a separate
device, more paths and more DFC devices mean better performance for constrained
clients such as AIX, Windows, and Solaris.
So, how many DFC devices should be advertised to initiators on a given backup
server? The answer depends upon several factors:
1. Is the backup server queue-depth constrained?
Windows platforms are considered “queue-depth constrained,” because the
Windows SCSI Pass-Through Interface mechanism will only conduct 1 SCSI
request at a time through each of its generic SCSI devices. This impacts the
performance of the DD Boost-over FC solution, if multiple connections (e.g.
backup jobs) are trying to use the same generic SCSI device. So, for Windows
platforms running more than one job, it is useful to advertise multiple DFC devices.

FC support 31
Planning and Practices

Contrast this with the behavior of the Linux SCSI Generic driver, which imposes
no such restriction. Linux is not considered “queue-depth constrained,” so it is
sufficient to simply advertise one DFC device to initiators on Linux systems.
2. Number of physical paths between backup server and Data Domain system
For each advertised DFC device, the backup server operating system will create n
generic SCSI devices, one for each physical path through which the backup server
OS can access the device.
For example, if:
l Backup server has 2 initiator HBA ports (A and B)
l Data Domain System has 2 FC target endpoints (C and D)
l Fibre Channel Fabric zoning is configured such that both initiator HBA ports
can access both FC target endpoints
then the backup server OS will see each device through four physical paths:
A -> C
A -> D
B -> C
B -> D
and will create 4 generic SCSI devices for each advertised DFC device.
For a Windows backup server (with its queue-depth=1 limitation), this allows up to
4 simultaneous SCSI requests to the Data Domain system, even with only one DFC
device advertised.

Sizing Calculation
The following calculation may be used to determine the number of DFC devices to
advertise on the Data Domain system and to the initiators on a given media server.
EMC recommends that the same number of DFC devices be advertised to all initiators
on the same media server.
The following calculation may be used to determine the number of DFC devices to
advertise on the Data Domain system and to the initiators on a given backup server.
EMC recommends that the same number of DFC devices be advertised to all initiators
on the same storage nodes.
On the Data Domain System
The Data Domain system imposes a limit on the number of simultaneous requests to a
single DFC SCSI device. Because of this limit, the number of devices advertised needs
to be tuned depending on the maximum number of simultaneous jobs to the system at
any given time. In general, the larger the number of jobs expected from media servers
using DD Boost over FC, the higher the number of devices advertised.
The Data Domain system imposes a limit on the number of simultaneous requests to a
single DFC SCSI device. Because of this limit, the number of devices advertised needs
to be tuned depending on the maximum number of simultaneous jobs to the system at
any given time. In general, the larger the number of jobs expected from storage nodes
using DD Boost over FC, the higher the number of devices advertised.
Let J be the maximum number of simultaneous jobs running using DFC, to the Data
Domain System at any given time.
Let C be the maximum number of connections per job:
l 3 for Data Domain Extended Retention Systems
l 1 for other types Data Domain systems
Calculate:

32 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Planning and Practices

l Maximum simultaneous connections to the DD system, using DFC, from ALL media
servers:
n S=J*C
n DFC Device Count D = minimum(64, 2*(S/128)), round up
n All DFC access groups must be configured with “D” devices.
l Maximum simultaneous connections to the DD system, using DFC, from ALL
storage nodes:
n S=J*C
n DFC Device Count D = minimum(64, 2*(S/128)), round up
n All DFC access groups must be configured with “D” devices.
Example:
Assume:
l 8 media/master servers, single Data Domain systems, each server running a
maximum of 50 jobs at any given time.
l 8 storage nodes, single Data Domain systems, each server running a maximum of
50 jobs at any given time.
l Here, J = 8 * 50 = 400, C = 1 (single Data Domain system), S = J * C = 400, D = 2
* 400 / 128 = 6.25, round up to 7.
l Therefore, all DFC groups on the Data Domain system must be configured with 7
devices.
Assume:
l 8 media servers, DD Extended Retention systems, each server running a maximum
of 30 jobs at any given time.
l 8 storage nodes, DD Extended Retention systems, each server running a maximum
of 30 jobs at any given time.
l Here, J = 8 * 30 = 240, C = 3 (DD Extended Retention system), S = J * C = 720, D
= 2 * 720 / 128 = 11.25, round up to 12.
l Therefore, all DFC groups on the DD system must be configured with 12 devices.
Linux
The number of DFC devices advertised on the Data Domain system using the
calculations listed above in On the Data Domain System is sufficient for Linux backup
servers. No additional configuration is required. Linux storage nodes are not queue-
depth constrained, so many connections can share the same DFC generic SCSI device
with no performance impact.
Windows
The Data Domain server path management logic spreads out connections across
available logical paths (Initiator, Target Endpoint, DFC Device). We want to configure
enough DFC devices such that each connection uses its own generic SCSI device
(logical path) on the backup server, with a max DFC device count of 64.
Let X = the number of DFC devices configured on the Data Domain system (from On
the Data Domain System). Let P = number of physical paths between backup server
and Data Domain system. Let J = maximum number of simultaneous jobs, and let C =
maximum number of connections per job:
– 3 for DD Extended Retention systems – 1 for other types of Data Domain systems
Calculate:

FC support 33
Planning and Practices

l Maximum simultaneous connections from storage node S = J * C, DFC device


count D = minimum((S/P), X), round up, up to a maximum of 64.
Note that if the value of D is greater than X, then it is sufficient to configure D
devices, but only for the access group(s) with Windows clients.
Examples:
Assume:
l 4 physical paths between the storage node and Data Domain system, 30 maximum
jobs, DD Extended Retention system
l In this case, X = 25, P = 4, J = 30, and C = 3
l Maximum simultaneous connections from backup server S = (J * C) = 90
l DFC device count D = (90/4, 25) = 25
So, the Data Domain system should be configured to advertise 25 devices to each
initiator on the storage node.
Assume:
l 2 physical paths between the backup server and Data Domain system, 50
maximum jobs, single Data Domain system
l In this case, X=18, P = 2, J = 40, C = 1
l Maximum simultaneous connections from backup server S = (J * C) = 40
l DFC device count D = max(40/2, 18) = 20
So, the Data Domain system should be configured to advertise 20 devices to each
initiator on the storage node.
Note that since the value of D (20) is greater than the value of X (18), it is sufficient
to configure two devices only for the DFC access group with Windows clients.

Firewall requirements
Regardless of the network connections that are used, communication through a
firewall requires the use of specific ports and specific protocols to perform backup,
monitoring, and replication operations across sites.
The following table lists the required firewall ports, which you must open between the
Data Domain system, the NetWorker server, and the NMC server.

Table 3 Firewall ports for DD Boost

Port Protocol Purpose Source Destination


111 TCP/UDP Portmapper l All DD Boost clients l Data Domain backup
target
l DD Replication
Source l Data Domain
Replication target

161 TCP For the l NMC Server l Data Domain backup


NMC target
server to
query for
l Data domain
alerts and Replication target
statistics

34 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Planning and Practices

Table 3 Firewall ports for DD Boost (continued)

Port Protocol Purpose Source Destination


162 TCP SNMPTRA l NMC Server l Data Domain backup
P for the target
NMC
server to
l Data Domain
monitor Replication target
status and
events

2049 TCP NFS l DD Boost Clients l Data Domain backup


target

2049 TCP DDBoost l NMC Server l Data Domain


Replication target

2051 TCP Replication l DD Replication l Data Domain


Source Replication target

The Data Domain system provides functionality to review the network configuration
and network capabilities and provides SSH Telnet to help diagnose issues.

Deduplication efficiency
The deduplication ratio measures the efficiency of reduction in storage space that
results from the data deduplication and compression technology. Ratios of 20:1 are
broadly achievable and reductions of even 5:1 are extremely valuable.
Several factors can contribute to the deduplication ratio:
l Retention periods
l Types of data backed up
l Change rates
l Frequency of full backups
l Use of encryption and compression
For the best use of storage space, consider the factors in the following sections, along
with the periodic clearing of expired storage space, and the removal of unused pools.

Retention periods
The deduplication ratio increases with longer data retention periods. The longer you
retain the stored save sets, the greater the chance that identical data will exist on the
storage that NetWorker uses to deduplicate each subsequent backup, and the greater
is the efficiency of the storage usage.
When you define longer retention periods, the data remains on the Data Domain
device for a longer period of time. This enables NetWorker to use the retained data to
deduplicate subsequent backups, and results in a more efficient use of storage.

Deduplication efficiency 35
Planning and Practices

Types of data backed up


Some types of data, for example, text documents, slide presentations, spreadsheets,
email, source code, and most database types, contain redundant data and are good
deduplication candidates.
Some other types of data, for example, audio, video, and scanned images already
consist of compressed data. Typically, the first full deduplication backup of these data
types yields low reductions, but subsequent backups generally produce high
deduplication ratios if the data has a low change rate.

Change rate
Data with a low change rate changes little between backups, produces high
deduplication ratios, and is a good candidate for deduplication. Deduplication removes
data that is already in storage and only stores new data.
When a new save set is deduplicated, the number of unique blocks within the save set
can vary widely depending on the data type, and often there is little that can be
deduplicated. Yet because the Data Domain system compresses the data blocks, there
is typically a 2:1 to 3:1 (50%–75%) data reduction.
The storage savings increase with each subsequent backup of the save set because a
deduplication backup writes to disk only the data blocks that are unique to the backup.
In conventional business operations, the data change rate is typically low and unique
data may represent only 1%–2% of the data present in each additional backup set.
The remainder of the backup is deduplicated against the data already stored on the
system.

Frequency of full backups


Frequent full backups result in high deduplication ratios, but also increase the data
processing operations on the NetWorker storage node or Client Direct client. For
example, compare daily full deduplication backups with weekly full and added daily
incremental deduplication backups. Both of these schedules require essentially the
same amount of storage space and the same network bandwidth between the storage
node and the Data Domain system. The backups send only unique data to storage,
even for full backups.
A daily full backup schedule sends a greater amount of data from the client to the
storage node for processing than the weekly full with daily incremental schedule.

Host naming guidelines


The network environment has an impact on hostname resolution methods and you
must follow the manufacturer recommendations. Use the local hosts file to help
diagnose and resolve naming issues. You can use the net hosts add command on
the Data Domain system to add hosts to the /etc/hosts file.
Use the following guidelines to create consistent, easy-to-identify hostnames that
improve the configuration, report generation, and troubleshooting experience in the
DD Boost environment:
l Create names that are unique across all NetWorker datazones. Use names that
identify the network role, for example, administration, backup, cloning, or
production. A name can also include a location or a server name.

36 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Planning and Practices

l Use a single hostname that is associated with each NIC, IP, or FC interface within
the same NetWorker datazone.
l Names can include abbreviations for the source or the target to quickly identify
whether the network connections are correct. For example, add an abbreviation of
the storage node hostname in the Data Domain name and an abbreviation of the
Data Domain hostname in the storage node name. Include the names in the Data
Domain /etc/hosts file.
l Specify all aliases, such as long and short names and IP addresses, for the
NetWorker server and the storage nodes in their respective Client resources.
Specify the aliases in the Aliases attribute on the Globals (1 of 2) tab of a Client
resource.
l Test to ensure that you can consistently resolve all hostnames in the network from
multiple locations in both directions. For example, ensure that you can resolve the
short name to IP address, long name to IP address, IP address to short name, and
IP address to long name.
l In general, use short, easy-to-identify, descriptive names instead of IP addresses
or fully qualified name strings for devices and storage nodes. Long names may not
fit into some views. The following examples include a long name and a short name:
NWDD365-1.burloak.lab.mycorp.com:/NWDZ_Dr1
NWDD365-1:/NWDZ_Dr1
l Except for hostnames, use standard alphanumeric characters, including dot (.),
hyphen (-), and underscore (_), with no spaces and no special characters.
Hostnames may not use underscores (_).
l Use consistent formats, in terms of text field length and text case, and include
leading zeros in numbers, with a maximum of 50 characters.
l Avoid the use of dates in names where the dates could change or become
meaningless in the future.

Example name formats


The following examples provide some name formats.

DD Boost devices
Format: Data_Domain_system_name-device_name
For example: dd-tenendo-device01

Folders on Data Domain system


Create DD Boost device names that refer to the NetWorker storage node and indicate
whether you use them for either backup or clone operations.
Format: storage_node_name-operation-device_name
For example: dzburl-back-dd01

Volume labels for Data Domain


Format: media_type-label_number
For example: ddmedia-001

IP addresses
Avoid IP addresses because numbers are more difficult to identify and troubleshoot
than descriptive names. However, there are exceptions:

Example name formats 37


Planning and Practices

l The Data Domain system requires the use of IP addresses to interface with an
ifgroup for Advanced Load Balancing and Link Failover features.
l For CCRs, the hosts file on the source Data Domain system must list the IP
address of the target Data Domain system. Otherwise, the CCR will use the same
network access that the backup and restore operations use.
The Data Domain documentation provides details.

Example topologies
This section provides some examples of how you can deploy the Data Domain
integration in NetWorker backup environments. EMC recommends that you use two
interfaces in Ethernet IP networks, 1 GbE for administration and 10 GbE for data. For
FC environments, use IP interfaces for administration and clone operations, and a SAN
interface for backup operations. Use the following examples to plan your environment.

Client Direct deduplication environment


Client Direct functionality is enabled by default in the Client resource and NetWorker
tries to use Client Direct for data backup or recovery operations. If the client does not
have a direct network connection to the Data Domain system, then these operations
automatically use the traditional storage node workflow.
Client Direct data handling on page 17 describes the Client Direct feature, which
leverages client DSP software to send deduplicated data directly from a client to a
Data Domain system and bypass the storage node.
The following figure shows an example Client Direct environment.
Figure 2 Client Direct backup versus traditional storage node backup

Client Direct deduplication provides the following advantages:

38 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Planning and Practices

l Deduplication on the client host dramatically reduces the bandwidth that is


required for the backup data transfer.
l You can share a single storage volume among multiple DD Boost devices and
among multiple backup hosts and storage nodes. You can improve performance
and maintainability by configuring multiple hosts and multiple sessions for each
device, instead of creating multiple devices.
l Client Direct deduplication offers an alternative to an environment that uses
dedicated NetWorker storage nodes, as described in Dedicated storage node
environment on page 43. The dedicated storage node environment requires
additional licensing and configuration, and the backup clients or the applications on
the clients may not support a dedicated storage node.

Disaster recovery environment


To perform a disaster recovery you can use CCR to copy individual save sets or
complete volumes from one Data Domain system to another at a geographically
distant location. Each cloned replication, or optimized clone, is a complete and
independent copy of the source deduplicated data. NetWorker policies manage both
the source or primary data and the clone or secondary data. For additional protection,
NetWorker can clone some or all the stored data from the secondary system to tape
storage.
You must configure, enable, and manage both the primary and secondary Data Domain
systems within a single NetWorker datazone. Configure target devices on the
secondary Data Domain system. You can use either a single storage node or separate
storage nodes for the local and remote Data Domain system within the datazone.

Note

NetWorker does not support CCR across datazones or to Data Domain devices that
are not managed by NetWorker.

The following figure illustrates an example of a disaster recovery environment. The


NetWorker server requires two Data Domain Storage System Enablers, one for the
primary Data Domain system and one for the remote secondary Data Domain system.
DD in the figure signifies Data Domain. The following actions occur in this example:

Disaster recovery environment 39


Planning and Practices

Figure 3 CCR for disaster recovery

1. The NetWorker server starts the backup of the client groups within the datazone.
2. Two storage nodes in the datazone write the backup data to media pools, which
target specific DD Boost devices on the primary system. The pool that is
associated with the data protection policy defines which storage devices receive
the data.
3. The storage nodes communicate with the primary Data Domain system over a
dedicated 10 GbE network connection, and store deduplicated backup data on the
devices.

Note

An ifgroup configuration of 1 GbE or 10 GbE NICs on the Data Domain system


enables multiple storage nodes to use the same network identity. This bandwidth
aggregation can improve performance for DD Boost devices. The Data Domain
documentation provides details.

4. You can use CCR to store optimized clone copies of backups from the primary
Data Domain system over a network to a geographically distant secondary Data
Domain system for disaster recovery.
5. An additional option enables a further clone to conventional disk or conventional
tape media. A NetWorker storage node, which is attached to the secondary Data
Domain system, creates an additional NetWorker clone copy of the data for one of
the backup groups, which NetWorker stores on conventional media. NetWorker

40 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Planning and Practices

reverts the data in this copy to the native non-deduplicated format, which is
necessary for storage on conventional media.

Cascaded replication environment


A variation of the disaster recovery environment is the cascaded replication
environment. Once a deduplicated backup completes successfully, you can use the
backup to create multiple clone copies in other locations, either simultaneously from
the original deduplicated backup or in sequence from a CCR copy. Each clone
replication is a complete and independent copy of the source backup. NetWorker does
not limit the number of cascaded clone copies that you can create, provided that the
source save set for each clone successfully completes.
As with the previous example, configure, enable, and manage each Data Domain
system in a cascaded environment within a single NetWorker datazone. Configure
target devices on the Data Domain systems that receive the clone copies.
The figure in this section illustrates an example of a cascaded replication environment
with three separate Data Domain systems at three different sites.
l The first site is the primary backup location and is the production site.
l The second site is a local site with good communication links to the production
site, typically within the same geographic location as the first site.
l The third site serves as the disaster recovery site, which is located at a
geographically distant location. Communication to this more distant site is subject
to greater restrictions on bandwidth and latency. This distant site could be in a
different country or 250 kilometers (150 miles) or more distant from either of the
other two sites.

Note

The NetWorker server requires three Data Domain Storage System Enablers, one
for each Data Domain system. DR in the figure signifies disaster recovery.

This example environment operates as follows.


1. The NetWorker server starts the backup of production site client groups within its
datazone.
2. The production site storage node assigns the backup data to media pools, which
uses specific DD Boost devices on the primary Data Domain system.
3. The storage node communicates with the primary Data Domain system over
dedicated 10 GbE network connection, and stores deduplicated backup data on
devices DD Device 01 and DD Device 02.
4. After the backup completes successfully, you can use CCR to store optimized
clone copies of the backups, which reside on the primary Data Domain system,
over the network to Data Domain systems at a local secondary site. You can create
these clone copies by using one of the following methods:
l Sequential method—NetWorker performs only one clone operation at a time, in
sequence. This method allows the production system to continue to function
without the need to create additional clones for a distant site.
For example, NetWorker uses the original backup on the primary Data Domain
system to create an optimized clone copy on a local secondary Data Domain
system. Once this process completes, NetWorker uses this copy to create an
additional optimized clone copy on the geographically distant Data Domain
system.
Data paths 1a and 1b in the following figure represent this method.

Cascaded replication environment 41


Planning and Practices

l Concurrent method—NetWorker may be able to perform the clone operations


simultaneously. This method impacts the production system and requires more
replication bandwidth.

Note

The concurrent method depends on many factors, and you would must validate
and test the performance at the individual sites.

For example, NetWorker uses the original backup on the primary Data Domain
system as the source to create simultaneous clones on two target Data Domain
systems.
Data paths 2a and 2b in the following figure represent this method.
Figure 4 CCR cascaded to multiple Data Domain systems

Shared datazones environment


You can store backups from two separate datazones on a single Data Domain system.
In this configuration, consider dividing the stream counts and the memory resources
to manage the two datazones as separate entities. Do not let one datazone impact the
performance of the other datazone. The total number of streams and devices cannot
exceed the total capacity of the Data Domain system.
The figure in this section illustrates a dedicated 10 GbE network connection shared by
three storage nodes in two NetWorker datazones. Two storage nodes belong to the
DZ-A datazone, and one storage node belongs to the DZ-B datazone.
1. The two NetWorker servers begin the backups within their respective datazones.

42 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Planning and Practices

2. The three storage nodes write the deduplicated backup data to DD Boost storage
devices on the Data Domain system over the 10GbE connection. The pool that is
associated with the data protection policy defines which storage devices receive
the data.

Note

You cannot share a DD Boost device across datazones.

3. You can perform an additional backup to tape storage operation, either directly
from a storage node or by a NetWorker clone operation from the Data Domain
system.
Figure 5 Data Domain system shared across two NetWorker datazones

Dedicated storage node environment


NetWorker supports deduplication backups for high-volume clients that are also a
dedicated storage node. For example, you can configure a client host that runs
NetWorker Module for Databases and Applications (NMDA) as a dedicated storage
node.
This environment can coexist with data protection policy configurations that use
shared NetWorker storage nodes in the same datazone. However, because this is a
private network, the connection and the devices that the storage node uses are not
available to other NetWorker clients.

Dedicated storage node environment 43


Planning and Practices

Note

The Client Direct (DFA) feature can provide similar benefits without the need for
storage node licenses.

The figure in this section illustrates a mixed environment of shared and dedicated
storage nodes.
1. The NetWorker server starts a backup of file system and module data on a
dedicated storage node.
2. The storage nodes write the deduplicated backup data to the DD Boost storage
devices on the Data Domain system. The pool that is associated with the data
protection policy defines which storage devices receive the data.

Note

An ifgroup configuration of 1 GbE or 10 GbE NICs on the Data Domain system


enables multiple storage nodes to use the same identify on an IP network. This
aggregation of bandwidth can improve performance for DD Boost devices. The
Data Domain documentation provides details.

3. A high-volume storage node uses an additional dedicated 10 GbE direct


connection.
EMC NetWorker Online Software Compatibility Matrix provides information on
NetWorker application modules compatible with Data Domain systems.
Figure 6 Single datazone with dedicated storage nodes and one high-bandwidth link

44 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


CHAPTER 3
Software Configuration

This chapter includes the following topics:

l DD Boost and Cloud Tier configuration road map...............................................46


l Configuring DDVE system settings.................................................................... 46
l Configuring DD Boost on the Data Domain system............................................ 46
l Configuring SMT on the Data Domain system.................................................... 51
l Configuring DD Cloud Tier devices.....................................................................52
l Configuring a Highly Available Data Domain system...........................................58
l Configuring NetWorker for DD Boost devices....................................................60
l Configuring NetWorker for Cloud Tier devices...................................................70
l Configuring clients to back up to DD Boost devices........................................... 83
l Manually creating or modifying NetWorker resources for DD Boost...................87
l Deactivating and removing DD Boost devices.................................................... 96

Software Configuration 45
Software Configuration

DD Boost and Cloud Tier configuration road map


Plan the DD Boost and Cloud Tier configurations with a high-level road map that
outlines the sequence of basic configuration tasks that you must perform.
1. For DDVE only, configure the DDVE settings.
Configuring DDVE system settings on page 46
2. Configure the Data Domain system to support DD Boost.
Configuring the Data Domain system provides details.
(Optional) For mutli-tenant environments, configure SMT.
Configuring SMT on the Data Domain system on page 51 provides details.
3. Configure NetWorker devices for use with the Data Domain system by using either
Properties window or the Device Configuration Wizard.
Configuring NetWorker for DD Boost devices provides details.
4. Configure NetWorker devices for the Cloud Tier devices by using the Device
Configuration Wizard.
Configuring NetWorker devices for DD Cloud Tier on page 70 provides details.
5. Configure NetWorker clients to back up to the Data Domain system.
Configuring clients to back up to DD Boost devices provides details.

Configuring DDVE system settings


After you deploy the Data Domain Virtual Edition (DDVE) appliance and configure the
network settings, perform the following steps.
Procedure
1. Log in to the vSphere web client.
2. Right-click the virtual machine and select Shutdown Guest OS.
3. Right-click the virtual machine, select Edit Settings, and set the configuration
options.
The following settings apply to a DDVE with a 16 TB configuration. Adjust the
setting to meet the supported DDVE requirements.

a. Set the CPU value to a minimum of 4.


b. Set the Memory value to a minimum of 32 GB.
c. Add one disk drive with a minimum of 200 GB for the Active Tier.
d. (Optional) Add one disk drive with a minimum size of 500 GB for the Cloud
Tier.
e. Click OK.
4. Right-click the virtual machine and select Power On.

Configuring DD Boost on the Data Domain system


Use the Data Domain System Manager or the CLI to configure DD Boost on the Data
Domain system.

46 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Software Configuration

Configuring the Data Domain system for DD Boost or Cloud Tier by using the
Data Domain System Manager
Use the Data Domain System Manager to configure the Data Domain system for DD
Boost and Cloud Tier.
Before you begin
Deploy the Data Domain system, create a new disk for the storage unit, and complete
the network configuration.
Procedure
1. Use a web browser to log in to the EMC Data Domain System Manager as the
sysadmin user.
2. In the left navigation pane, select Hardware > Storage.
3. In the Active Tier section, click Configure.
4. In the Addable Storage table, select the device, which stores backup data,
click Add to Tier, and then click Save

Note

If a device does not appear in the Addable Storage table, add a new disk to the
virtual machine.

The device appears in the Active Tier table.


5. (Optional) To configure a Cloud Tier device, perform the following steps:
a. In the Cloud Tier section, click Configure.

b. In the Addable Storage table, select the device that stores Cloud data.

Note

If a device does not appear in the Addable Storage table, add a new disk to
the virtual machine.

c. Click Add to Tier, and then click Next.


The Configure Cloud Tier wizard appears.
d. Click Start Assessment.
e. Review the Assessment results, and then click Next.
f. Click Yes.
The device appears in the Cloud Tier table.
6. In the left navigation pane, select Data Management > File System, and then
click the Create button that is located to the left of the file system table.
7. Select the device from the Active Tier table and then click Next.
8. (Optional) To configure a file system for a Cloud Tier device, perform the
following steps:
a. Select the device from the Cloud Tier table.
The Enable Cloud Tier option appears and the option is enabled.

Configuring the Data Domain system for DD Boost or Cloud Tier by using the Data Domain System Manager 47
Software Configuration

b. In the New Passphrase and Confirm Passphrase fields, specify the


passphrase for the Cloud Tier device.
c. Click Next.
9. Review the Summary report and click Next.
10. Click Finish.
11. After the wizard configures the file system and enables the file system feature,
click Close.
12. In the left navigation pane, select Protocols > DD Boost.
13. On the Settings tab that is located near the top of the page, perform the
following tasks:
a. Ensure that the DD Boost Status is Enabled.
b. Add the FQDN of the NetWorker server to the Allowed Clients table:
a. Click the + (Add) button that is located above the table and to the right.
b. In the Client field, specify the fully qualified domain name (FQDN) of the
host.
c. In the Authentication mode list, select None.
d. In the Encryption Strength list, select None.
e. Click OK.

Note

By default, all clients (*) are allowed to access DD Boost.

c. If it does not exist, add the DD Boost user to the Users with DD Boost
Access table:
a. Click the + (Add) button that is located above the table and to the right.
b. In the User list, select an existing local user, or select Create a new
Local User and then create a user account.
c. Click Add, and then click Close.

14. To create a storage unit for the appliance, perform the following steps on the
Storage Units tab, which is located along to top:
a. Click the + (Add) button that is located above the table and to the right.
b. In the Name field, specify a descriptive name for the storage unit.
c. In the User field, select the DD Boost user.
d. Click Create.
The Storage Unit table provides information about the new storage unit,
including the full path.
15. In the left navigation pane:
a. Select Protocols > NFS.
b. Ensure that the NFS Status option that is located above the Exports tab is
set to Enabled.
16. To configure an export for the file system that contains the storage unit,
perform the following tasks

48 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Software Configuration

a. Click Create.
b. In the Directory path field, specify the full directory path for storage unit
that you created.
c. In the Clients table, select the NetWorker server, if the NetWorker server
does not appear, and then click the + (Add) button. In the Client field,
specify the FQDN of the NetWorker server, and then click OK.
d. Click OK, and then click Close.

Configuring the Data Domain system for DD Boost by using the CLI
Enable the Data Domain system for storage operations with DD Boost devices by using
the Data Domain CLI to complete the following steps.
The EMC Data Domain Boost for OpenStorage Administration Guide provides details.
Procedure
1. Log in to the Data Domain system console as the sysadmin user.
2. Use the license add command to add the OPENSTORAGE license key, the
DD Boost license, and optionally, to enable CCR, the Replication license key:
license add license_key

3. To verify that the file system and the NFS protocol is running, type the
following commands:
filesys status

nfs status

If the services are not running, type the following commands:

filesys enable
nfs enable

Note

For DD Boost functionality, you must enable NFS services on the Data Domain
system, even if you do not configure users or shares are configured. You do not
need to enable NFS on the NetWorker server, NetWorker storage nodes, or
NetWorker clients.

4. To verify the installed version of DD OS, type the following command:


system show version

5. To create one or more new user accounts, type the following command :
user add username password password [role role]

For example: user add ddboost password mypassword


6. To assign the new users as DD Boost users, type the following command:

ddboost user assign username-list

where username-list is a comma separated list of usernames.

For example:

ddboost user assign bob, joe, sue

Configuring the Data Domain system for DD Boost by using the CLI 49
Software Configuration

Note

To unassign one of more users from the DD Boost user list, type the following
command:

ddboost user unassign username-list

7. To restart the DataDomain service and apply the system modifications, type the
following commands:
ddboost disable

ddboost enable

8. To configure the system to receive and generate SNMP traps, type the
following command.
snmp add ro-community community_name

snmp enable

snmp add trap-host hostname[:port]

where community_name is typically “public”, which allows all users to monitor


events.

SNMP traps enable users to monitor backup events captured by SNMP traps.
9. To configure Distributed Segment Processing (DSP), type the following
commands:
a. To enable DSP, type: ddboost option set distributed-segment-
processing enabled

b. To confirm that DSP is enabled, type: ddboost option show.


NetWorker storage nodes and NetWorker clients require DSP to support
deduplication operations.
10. (Optional) To enable Fibre Channel (FC) connectivity on DD Boost devices, use
the ddboost fc command to obtain the DD Boost over FC (DFC) server
name:
ddboost fc dfc-server-name show

Note

You will specify the DFC server name in the NetWorker device configuration
procedure. FC-enabled clients can back up only to FC-enabled devices. IP-
enabled clients can back up only to IP-enabled devices.

For example, in the following output, the DFC server name is dd-tenendo:
ddboost fc dfc-server-name show

DDBoost dfc-server-name: dd-tenendo

Configure clients to use "DFC-dd-tenendo" for DDBoost FC

50 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Software Configuration

Note

Do not use the "DFC-" prefix on the DFC server name, as suggested in the
output of the ddboost fc dfc-server-name show command. This prefix
is intended for use with other vendors only and will cause NetWorker
communications to the DFC server to fail.

11. To create DD Boost devices and the Data Domain SU folders that contain the
devices, use the NetWorker Device Configuration Wizard.

Configuring SMT on the Data Domain system


Enable the Data Domain system for SMT by using the Data Domain CLI to complete
the following steps.

Note

DDVE does not support SMT.

Procedure
1. Log in to the Data Domain system console with a user account that has the
Global Storage Administrator role.
2. Use the user add command to create one or more new user account, and
assign the none role to the user:
user add username password password [role role]

For example, to create three SMT user accounts named bob, joe and sue, type
the following commands:

user add bob password mypwbob role none

user add joe password mypwjoe role none

user add sue password mypwsue role none


3. To enable SMT, type the following command:
smt enable

4. To create one or more tenant units (TU), type the following command:
smt tenant-unit create tu-name

For example, to create a two TUs named tu1 and tu2, type:

smt tenant-unit create tu1

smt tenant-unit create tu2


5. To assign a default TU to the DD Boost user, type the following command:
ddboost user option set username default-tenant-unit tu-name

Note

A DD Boost user can have only one default TU, but multiple DD Boost users can
share the same default TU.

For example, to assign TU tu1 to DD Boost users bob, type:

Configuring SMT on the Data Domain system 51


Software Configuration

ddboost user option set bob default-tenant-unit tu1

To assign TU tu2 to DD Boost users joe and sue, type the following commands:

ddboost user option set joe default-tenant-unit tu2

ddboost user option set sue default-tenant-unit tu2

Because you assign a default TU to each DD Boost user, NetWorker


automatically associates any storage unit (SU) created by a DD Boost user to
their default TU. NetWorker does not expose the TUs.
l (Optional) To unassign a DD Boost user from its default TU, or to reassign
the user to a different default TU, type the following command:

ddboost user option reset username [default-tenant-unit]

Note

Avoid changing the owners of DD Boost SUs. A new owner cannot use the
DD Boost devices from a previous owner. Create a device for the new owner
instead.
l (Optional) To list the DD Boost users and their default TUs, or the DD Boost
users within a specific default TU, type the following command:

ddboost user show [default-tenant-unit tenant-unit]

Note

You can use the CLI to review tenant space usage and the performance data
at both the TU and SU levels. As the global storage administrator, you can
enable tenants to use the Data Domain CLI to review the space usage and
the performance data of their TU and SUs. The Data Domain documentation
provides details.

Configuring DD Cloud Tier devices


Before you can configure NetWorker to use the DD Cloud Tier devce, you must
configure the DD Cloud Tier device on the Data Domain system or DDVE. You cannot
use a DD Cloud Tier device as a backup target. A DD Cloud Tier device can only
contain a cloned copy of save set data that resides on a DD Active Tier device.
Review the following high-level road map that outlines the sequence of basic
configuration tasks that you must perform on the Data Domain system or DDVE:
1. Allocate storage for the DD Cloud Tier device on the Data Domain system.
Adding DD Cloud Tier storage to a Data Domain System on page 53 provides
details.
2. Import the Cloud Service Provider certificate.
Import the cloud certificate on page 54 provides details.
3. Create the cloud profile and cloud unit.
Create the cloud profile and the cloud unit on page 55 provides details.

52 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Software Configuration

Adding DD Cloud Tier storage to a Data Domain System


Use the DD System Manager or the CLI to add a DD Cloud Tier storage to an existing
Data Domain system. You must configure the DD Cloud Tier storage on the same Data
Domain storage unit as the DD Active Tier.

Adding a DD Cloud Tier storage to the Data Domain system by using the CLI
Before you begin
On a DDVE, add new storage to the virtual machine for the Cloud Tier.
Procedure
1. Log in to the Data Domain system console as the sysadmin user.
2. To enable the Cloud Tier feature, type the following command:
cloud enable

3. At the Do you want to enable encryption? prompt, type Yes.


4. At the New Passphrase prompt, type a passphrase for Cloud Tier encryption.
5. At the Confirm Passphrase prompt, type a passphrase for Cloud Tier
encryption.
6. To configure the Cloud Tier device, type one of the following commands:
l Data Domain system—storage add tier cloud enclosures number
where number is the device number.
l DDVE—storage add tier cloud device
where device is the name of the device, for example dev4.

Adding a DD Cloud Tier by using Data Domain System Manager


Perform the following steps to add DD Cloud Tier storage to an existing Data Domain
system.
Before you begin
The DD Cloud Tier feature requires a Cloud Tier Capacity license.
Procedure
1. Use a web browser to log in to the EMC Data Domain System Manager as the
sysadmin user.
2. In the left navigation pane, select Hardware > Storage.
3. Click Configure, located above the Cloud Tier table.
4. From the Addable Tier table:
a. Select an available disk.
b. Click Add to Tier.
c. Click Next.

Note

If a device does not appear in the Addable Storage table, add a new disk to the
virtual machine.

The Configure Cloud Tier wizard appears.

Adding DD Cloud Tier storage to a Data Domain System 53


Software Configuration

5. Click Start Assessment.


6. Review the assessment results, and then click Next.
7. Click Yes.
The device appears in the Cloud Tier table.

Import the cloud certificate


Obtain the cloud certificate from the Cloud Service Provider and use DD System
Manager or the CLI to import the certificate on the Data Domain system or DDVE.

Importing cloud certificates by using the CLI


Perform the following steps to import the cloud certificate onto the Data Domain
system or DDVE.
Procedure
1. On a host that has network access to the Data Domain System or DDVE
download the PEM certificate files from the Cloud Service Provider.
2. Copy the PEM files to the certificates directory on the Data Domain System or
DDVE.
For example, use the SCP application or ftp. The certificates directory is
located in /ddvar/certificates (DDVE).
3. Log in to the Data Domain console as the sysadmin user.
4. Import the certificate by typing the following command:
adminaccess certificate import ca application cloud file
pem_file_name

Importing cloud certificates by using the DD System Manager


Perform the following steps to import the cloud certificate onto the Data Domain
system or DDVE.
Perform the following steps from a host that had network access to the Data Domain
system or DDVE.
Procedure
1. Download the PEM certificate files from the Cloud Service Provider.
2. On the host that contains the PEM files, use a web browser to log in to the DD
System Manager with the sysadmin user account.
3. On the left navigation pane, select Data Management > File System.
4. On the Cloud Units tab, click Manage Certificates, and then click Add.
5. On the Add CA Certificate for Cloud window, click Choose File, select the CA
PEM file, and then click Open.
6. Click Add.
7. Click OK.
8. Click Close.

54 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Software Configuration

Create the cloud profile and the cloud unit


Create the cloud profile and the cloud unit on the Data Domain system or DDVE by
using the CLI or the DD System Manager.

Creating the Cloud Profile and Cloud Unit by using the CLI
Data Domain supports a maximum of 2 Cloud Units.
Perform the following steps on the Data Domain system or DDVE to create the Cloud
Profile and Cloud Unit.
Procedure
1. Log in to the Data Domain system or DDVE as the sysadmin user.
2. Type the following command to create the Cloud Profile:
cloud profile add profile_name
where profile_name is a descriptive name for the profile.

3. At the Enter provider name prompt, type the name of the provider:
l EMC Elastic Cloud Storage (ECS)—ecs
l Virtustream Cloud Storage—virtustream
l Amazon Web Services S3—aws
4. For the Virtustream Storage Cloud provider only, at the Enter Storage Class
prompt, type the storage class.
5. For the Virtustream Storage Cloud and Amazon Web Service S3 providers only,
at the Enter Storage Region prompt, type the storage region.
6. At the Enter the access key prompt, type the cloud provider access key.
7. At the Enter the secret key prompt, type the cloud provider secret key.
8. For EMC Elastic Cloud Storage (ECS) only, at the Enter the endpoint prompt,
type the load balancer endpoint address for the cloud provider.
For example: http://172.21.21.10:9020
9. At the Do you want to enter proxy details prompt, press Enter to accept the
default value, no.
10. Type the following command to add a new Cloud Unit:
cloud unit add unit_name profile profile_name
where:
l unit_name is a descriptive name for the Cloud Unit, for example cloud-
unit-1.
l profile_name is the name of the cloud profile that you created.

For example:

sysadmin@localhost#cloud unit add cloud-unit-1 profile ecs_profile


Cloud unit 'cloud-unit-1'created successfully.

Creating the Cloud Profile and Cloud Unit by using Data Domain System Manager
Data Domain supports a maximum of 2 Cloud Units.
Perform the following steps to create the Cloud Profile and Cloud Unit.

Create the cloud profile and the cloud unit 55


Software Configuration

Procedure
1. Use a web browser to log in to the EMC Data Domain System Manager as the
sysadmin user.
2. In the left navigation pane, select Data Management > File System.
3. On the Cloud Units tab, click Add.
4. In the Name field, provide a descriptive name for the Cloud Unit.

5. In the Cloud Provider list, select the cloud provider.


6. For the Virtustream Storage Cloud provider only, in the Storage Class field,
type the storage class.
7. For the Virtustream Storage Cloud and Amazon Web Service S3 providers only,
in the Storage Region field, type the storage region.
8. In the Access key field, specify the cloud provider access key.
9. In the Secret key field, specify the cloud provider secret key.
10. For EMC Elastic Cloud Storage (ECS) only, in the Endpoint field, specify the
load balancer endpoint address for the cloud provider.
11. Click OK.
Results
The Cloud Units page displays information about the Cloud Unit, and the status of the
unit is Enabled.

Create the data movement schedule


The data movement schedule determines the frequency in which data moves from the
DD Cloud Tier device to the cloud provider.
Before you configure the data movement operation to the cloud for long term storage,
consider the day of the week, time of day, and frequency in which you will schedule
the movement operation. The data movement command moves all data that is
available on the DD Cloud Tier device to the Cloud provider. Ensure that you define a
frequency that allows you to move the data over a period of time that does not impact
your network. Define a day of the week and time when network bandwidth and the
cost of moving the data is low.
Create the data movement schedule on the Data Domain system or DDVE by using the
CLI or the Data Domain System Manager.

Creating a data movement schedule by using the CLI


Use the data-movement command to create a schedule for data movement from the
DD Cloud Tier device to the cloud provider.
Procedure
1. Log in to the Data Domain system or DDVE as the sysadmin user.
2. To create the data movement schedule, type:
data-movement schedule set to-tier cloud days "day_of_week" time
"hh:mm" [every n wks]
where:
l day_of_week is the day of the week in which to run the data movement
operation. For example, Thursday.

56 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Software Configuration

l hh:mm is the time in hours and minutes in which to run the data movement
operation. For example, to start the data movement operation at 11 pm, type
23:00.
l [every n wks] is option and defines the frequency in which to run the data
movement operation. For example, to run the data movement operation bi-
monthly, type every 2 weeks. If you do not use this option, the data
movement operation runs weekly.

For example, to schedule the data movement operation to run every two weeks
at 11 pm on a Thursday, type:

data-movement schedule set to-tier cloud days "Thursday" time


"23:00" every 2 wks

Output similar to the following appears:


Data-movement schedule has been set.
Data-movement is scheduled to run on day(s) "thu" at
"23:00" hrs every "2" week(s).
3. To display the data movement schedule, type
data-movement schedule show

Output similar to the following appears:


Data-movement is scheduled to run on day(s) "thu" at
"23:00" hrs every "2" week(s).

Creating a data movement schedule by using Data Domain System Manager


Perform the following steps to create a data movement schedule on the Data Domain
system or DDVE.
Perform the following steps from a host that had network access to the Data Domain
system or DDVE.
Procedure
1. Use a web browser to log in to the EMC Data Domain System Manager as the
sysadmin user.
2. In left navigation pane, select Data Management > File System.
3. Click Settings, and then select the Data Movement tab.
4. In the Throttle section, leave the default value of 100%.
The Data Domain Operating System Command Reference Guide provides more
information about data movement throttling.
5. In the Schedule section, from the Frequency list, select one of the following
options:
l Daily—From each At box, select the hour, minute, and AM or PM. The
following figure provides an en example of a schedule that runs daily at 11
P.M.

Create the data movement schedule 57


Software Configuration

Figure 7 Daily data movement schedule

l Weekly—Configure the schedule by performing the following steps:


a. In the Every field, type the number of weeks in which to run the
schedule. For example, to run the movement operation bi-monthly, type
2.
b. From each At box, select the hour, minute, and AM or PM.
c. In the On field, select the day of the week in which to run the schedule.
The following figure provides an example of a bi-monthly movement
schedule that occurs every Saturday at 8 P.M.
Figure 8 Weekly data movement schedule

l Monthly—From each At box, select the hour, minute, and AM or PM. In the
On field, perform one of the following steps:
a. To schedule the movement to occur on a specific date in the month,
leave the default selection Dates, and then select the day of the month
on which to schedule the movement.
b. To schedule the movement to occur on the last day of every month,
select Last Day of the Month.
The following figure provides an example of a movement schedule that
occurs on the last day of each month.
Figure 9 Monthly data movement schedule

6. Click OK.

Configuring a Highly Available Data Domain system


NetWorker 9.1 supports highly available Data Domain systems.

58 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Software Configuration

When a highly available Data Domain system fails over to its standby node, NMC
generates an HA Setup Degraded event. If there is an ambiguity in time between the
Active Node and the Standby Node, NMC generates the HA Setup Out-of-Sync
event.
All in-progress NetWorker operations including backup, clone, and recover operations
are unaffected, except for a temporary freeze of operations for a few minutes.
However, during unusually long freezes of ten minutes or more, some NetWorker
operations might fail and are automatically retried. Some failed NetWorker operations
might require a manual restart.
If interrupted by a failover the following processes fail, NFS, VTL, and CIFS jobs. To
restart or resume NFS, VTL, and CIFS failed jobs, you must configure NetWorker
policies to restart the failed jobs. Restart the failed jobs as soon as the failover
completes, however you must manually restart the jobs. The failed jobs will not restart
or resume on their own.

Note

To view events in NMC, clear all alerts on the Data Domain system. For example, in
the Data Domain UI, select Alerts > Current Alerts > Select All > Clear.

For each node in the cluster, perform the following tasks.


Procedure
1. Log in to the NMC GUI as an administrator of the NetWorker server.
2.
Click the Enterprise button on the taskbar.
3. In the left navigation pane:
a. Right-click Enterprise.
b. Select New > Host.
The Add New Host wizard appears.
4. In the Create Host page:
a. Depending on the node in the cluster, specify the following:
l For the highly available Data Domain system, specify the floating IP.
l For node 1, specify the hostname with the correct community string.
l For node 2, specify the hostname with the correct community string.

b. Click Next.
5. In the Select Host Type page:
a. Select DataDomain.
b. Click Next.
6. In the Manage DataDomain page:
a. Review the configuration details.
b. Click Next.
c. Leave the Capture Events option selected.
7. (Optional) In the Configure SNMP Monitoring page, perform the following
steps:

Configuring a Highly Available Data Domain system 59


Software Configuration

a. In the SNMP Community String field, type the name of the SNMP
community string.

Note

If you do not know the name of the community, leave this field blank.

b. With the Receive SNMP trap events option selected, specify the SNMP
Process port that is used by the Data Domain system and select the events
in which to monitor. Use the Reset to defaults option to reset the events in
which to monitor back to the default settings.

Note

The default SNMP process port is 162.

c. Click Next.
SNMP monitoring enables NMC to display the Data Domain system status
and to list the backup and the recovery events. The monitoring feature also
provides a launcher link for the Data Domain interface.
d. Click Finish.
8. Configure alerts for Data Domain High Availability events:
a. Click the Devices button on the taskbar.
b. In the left navigation pane, right-click Data Domain Systems and select
New Device Wizard.
c. Open the SNMP Monitoring Options page and select the following options:
l HA Setup Degraded
l HA Setup Offline
l HA Setup Out-of-Sync

Configuring NetWorker for DD Boost devices


After you configure a Data Domain system for the DD Boost environment, you can
configure the NetWorker resources for devices, media pools, volume labels, clients,
and groups that will use the DD Boost devices. Keep the following NetWorker
considerations in mind:
l Each DD Boost device appears as a folder on the Data Domain system. A unique
NetWorker volume label identifies each device and associates the device with a
pool.
l NetWorker uses the pools to direct the backups or clones of backups to specific
local or remote devices.
l NetWorker uses Data Protection policy resources to specify the backup and
cloning schedules for member clients. EMC recommends that you create policies
that are dedicated solely to DD Boost backups.
l VMware Backup Appliance does not support the SMT feature. The EMC
NetWorker VMware Integration Guide provides details.

60 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Software Configuration

DD Boost device performance considerations


NetWorker does not limit the number of DD Boost devices that you can create. The
number of required devices depends on device usage for backup and restore
operations.
Increasing the number of DD Boost devices can impact Data Domain performance and
maintenance. Typically, if you do not need multiple concurrent sessions or streams for
recovery, then you can configure the device Target Sessions and Max Sessions
settings for multiple concurrent backup sessions. Avoid the removal of DD Boost
devices.

Configuring DD Boost devices with the wizard


Use the Device configuration wizard to create or modify Data Domain devices, and to
define the Data Domain system on the NetWorker server.
Procedure
1. Log in to the NMC GUI as an administrator of the NetWorker server.
2.
Click the Enterprise button on the taskbar.
3. Highlight a host in the navigation tree, right-click NetWorker and select
Launch Application. The NetWorker Administration window appears.
4.
Click the Devices button on the taskbar.
5. In the left navigation pane, right-click Data Domain Systems and select New
Device Wizard.

Note

To modify completed wizard pages, click the links in the steps panel. The
number of steps may vary according to the type of configuration chosen.

6. In the Select the Device Type page, select the Data Domain device type, and
then click Next.
The following figure provides an example of the Select the Device Type page.

DD Boost device performance considerations 61


Software Configuration

Figure 10 Select the Device Type page

7. In the Data Domain Preconfiguration Checklist page, review the


requirements, and then click Next.
The following figure provides an example of the Data Domain Preconfiguration
Checklist page.
Figure 11 Data Domain Preconfiguration Checklist page

8. In the Specify the Data Domain Configuration Options page, configure the
following fields:
a. In the Data Domain System section, select one of the following options:
l To use a Data Domain system on which you have previously created
devices or configured as a managed host, select Use an existing Data
Domain System, and then select the host.

62 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Software Configuration

l To use a new Data Domain system, select Add a new Data Domain
System, and then type the FQDN or IP address of the Data Domain
system or DDVE.

Note

If you use DFC connectivity, Do not use the "DFC-" prefix on the DFC server
name, as suggested in the output of the ddboost fc dfc-server-name
show command. This prefix is intended for use with other vendors only and
will cause NetWorker communications to the DFC server to fail.

b. In the DD Boost Credentials section, type the username for the DD Boost
user in the DD Boost Username field and the password for the account in
the DD Boost Password field.
c. In the Secure Multi-Tenancy section, to use only DD Boost devices in
secure Storage Units (SUs), select Configure Secure Multi-Tenancy
(SMT), and then perform one of the following tasks:
l To use an existing storage unit (SU), select Use an existing secure
storage unit, and then select the SU.
l To create a SU, select Create a new secure storage unit, and then
specify the name of the SU.

Note

SMT restricts access of each SU to one owner according to the provided DD


Boost credentials.

d. (Optional) In the DD Management Credentials section, configure the


management credentials that are required to perform VMware Instant
Access and FLR recoveries:
l To not specify the management credentials, leave the default selection
Don't configure Management Credentials now.
l To instruct NetWorker to use the ddboost user credentials that you
specified in the DD Boost Credentials section, select Use the DDBoost
Credentials from above.
l To specify a different sysadmin user, select Enter Management
Credentials, and then specify the username and password of a sysadmin
user.

e. In the Configuration Method field, select Browse and Select, and then
click Next.

Note

If you do not configure the SMT option, the wizard will create an SU for you
on the Data Domain system, and name the SU after the shortname of the
NetWorker server.

The following figure provides an example of the Specify the Data Domain
Configuration Options page.

Configuring DD Boost devices with the wizard 63


Software Configuration

Figure 12 Specify the Data Domain Configuration Options page

9. In the Select Folders to use as Devices page, to create a DD Boost device,


perform the following steps:
a. Select the Data Domain system, and then click New Folder.
A new folder appears in the navigation tree. This folder is the new device.

Note

The navigation tree does not show the SU folder under the Data Domain
system folder. However, the SU folder is verifiable in the final Review
Configurations Settings wizard page. The wizard names the SU folder after
the short hostname of the NetWorker server and places the devices that you
create into this SU folder.

b. Type a name for the new folder, and then select the checkbox next to the
folder or device name.
The Device table displays the full NetWorker device name, the storage
pathname, and details about the device.

Note

The device name refers to the subfolder created within the SU. The folder
path must not contain other folders deeper than these device folders.

c. (Optional) To rename a DD Boost device as it appears in NMC, select the


device in the table, and type a new name in the NetWorker Device Name
field. Do not use special characters other than dot (.) and underscore (_).
The Storage Path field remains unchanged.

64 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Software Configuration

Note

Implicit in the SU folder pathname on the Data Domain system is the hidden
mount point folders/data/col1. Do not modify this folder structure, which
all NetWorker server hosts use. The final wizard page, Review
Configurations Settings, shows the complete location.
The /backup folder stores NFS service data and the clients that are
configured for NFS access also have the ability to view, change, and delete
the /data/col1 directory that contains the DD Boost devices. If you use
NFS devices, you can avoid the risk of potential interference by using
alternative path names.

d. Click Next.
The following figure provides an example of the Select the Folders to use
as Devices page.
Figure 13 Select the Folders to use as Devices page

10. On the Configure Pool Information page, perform the following steps:
a. Select Configure Media Pools for Devices.
b. In the Pool Type section, select the type of data to send to the Data Domain
device, either Backup for backups or Backup Clone for cloning or staging
operation.
c. In the Pool section, select Create and use a new Pool to create a pool to
receive the data, or select Use an existing Pool to select a pool that exists
on NetWorker server.
NetWorker provides a preconfigured Data Domain pool that you can select,
named Data Domain Default.

d. Leave the Label and Mount device after creation option selected.
e. Click Next.

Configuring DD Boost devices with the wizard 65


Software Configuration

f. (Optional) To use fibre channel (FC), select Enable Fibre Channel for this
device, and then in the Fibre Channel Host Name field, specify the IP
address or host name of the FC host.
The following figure provides as example of the Configure Pool Information
page.
Figure 14 Configure Pool Information page

11. On the Select Storage Nodes page, perform the following steps:
a. In the Storage Node Options section, specify the storage node that will
manage the device.
l To use an existing storage node on the NetWorker server, select Use an
existing storage node.
l To use a new storage node, select Create a new storage node, and then
type the hostname of a storage node host. If the new Storage Node is
also a Dedicated Storage Node, select Dedicated Storage Node.

b. (Optional) To enable FC data transport for this device, perform the following
steps:
l Select Enable Fibre Channel.
l In the Fibre Channel Host Name field, type the hostname that the Data
Domain system uses to identify itself for FC operations. By default, this
hostname is the same name used for IP operations, but the hostnames
can be different. The hostname must match the Server Name displayed
on the Data Domain system in the Data Management > DD Boost >
Fibre Channel tab of the Data Domain Enterprise Manager. The name
is case-sensitive.

66 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Software Configuration

Note

All NetWorker clients that use an FC-enabled DD Boost device must be


enabled for FC in the Data Domain Interface field.

c. Click Next.
The following figure provides an example of the Select Storage Nodes page.
Figure 15 Select Storage Nodes page

12. In the Select SNMP Monitoring Options page perform the following steps:
a. In the Data Domain SNMP Community String field, type the name of the
SNMP community string.

Note

If you do not know the name of the community, then clear the Gather
Usage Information selection.

b. With the Receive SNMP trap events option selected, specify the SNMP
Process port used by the Data Domain system and select the events in
which to monitor. Use the Reset to defaults option to reset the events in
which to monitor back to the default settings.

Note

The default SNMP process port is 162.

c. Click Next.
SNMP monitoring enables NMC to display the Data Domain system status and
to list the backup and the recovery events. The monitoring feature also provides

Configuring DD Boost devices with the wizard 67


Software Configuration

a launcher link for the Data Domain interface. The following figure provides an
example of the Select SNMP Monitoring Options page.
Figure 16 Select SNMP Monitoring Options page

13. On the Review the Device Configuration Settings page, review the
configuration information and then click Configure.

Note

The name that is listed as the SU is really the pathname for the device folder.
The format is: SU/device_name, where SU is the short hostname of the
NetWorker server.

The following figure provides an example of the Review the Device


Configuration Settings page.

68 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Software Configuration

Figure 17 Review the Device Configuration Settings page

NetWorker configures, mounts, and labels the DD Boost device for the specified
pool.
14. On the Device Configuration Results page, review the information, and then
click Finish.
The following figure provides an example of the Device Configuration Results
page.
Figure 18 Device Configuration Results page

Results
After the wizard successfully creates the device, the following changes appear in
NMC:
l The Data Domain Systems window displays the new Data Domain device and the
name of the volume. The following figure provides an example of the Data Domain
System window with the new Data Domain device.

Configuring DD Boost devices with the wizard 69


Software Configuration

Figure 19 Data Domain System window

l If you configured a device for a Data Domain system that does not have previously
configured NetWorker devices, NetWorker adds the Data Domain system as a
managed host. The NMC Enterprise window provides you details about the Data
Domain system.

Configuring NetWorker for Cloud Tier devices


To configure Cloud Tier devices, use the Device Configuration Wizard (DCW) or
create and configure the devices manually. It is recommended that you use DCW to
create Cloud Tier devices.

Configuring NetWorker devices for DD Cloud Tier


Use the Device Configuration Wizard to configure NetWorker devices for the DD
Cloud Tier devices.
Before you begin
The Data Domain devices that contains the source backup data must reside on the
same mtree as the DD Cloud Tier device that will store the clone data. The storage
node that manages the Data Domain devices must be a NetWorker 9.1 storage node.

Note

NetWorker uses an app-based policy to clone data to a DD Cloud Tier device. If a non-
app-based policy exists on the mtree where the DD Cloud Tier device resides,
NetWorker will delete the non-app-based policy and create an app-based policy during
the label operation.

Procedure
1. Log in to the NMC GUI as an administrator of the NetWorker server.
2.
Click the Enterprise button on the taskbar.
3. Highlight a host in the navigation tree, right-click NetWorker and select
Launch Application. The NetWorker Administration window appears.
4.
Click the Devices button on the taskbar.
5. In the left navigation pane, right-click Data Domain Systems and select New
Device Wizard.

70 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Software Configuration

Note

To modify completed wizard pages, click the links in the steps panel. The
number of steps may vary according to the type of configuration chosen.

6. In the Select the Device Type page, select the DD Cloud Tier device type, and
then click Next.
The following figure provides an example of the Select the Device Type page.
Figure 20 Select the Device Type page

7. In the DD Cloud Tier Configuration Options page, perform the following steps:
a. From the Select an existing Data Domain list, select the Data Domain host.
b. In the DD Boost Credentials section, type the username for the DD Boost
user in the DD Boost Username field and the password for the account in
the DD Boost Password field.
c. In the Secure Multi-Tenancy section, to use only DD Boost devices in
secure Storage Units (SUs), select Configure Secure Multi-Tenancy
(SMT), and then perform one of the following tasks:
l To use an existing storage unit (SU), select Use an existing secure
storage unit, and then select the SU.
l To create a SU, select Create a new secure storage unit, and then
specify the name of the SU.

Note

SMT restricts access of each SU to one owner according to the provided DD


Boost credentials.

d. In the Configuration Method field, select Browse and Select, and then
click Next.

Configuring NetWorker devices for DD Cloud Tier 71


Software Configuration

Note

If you do not configure the SMT option, the wizard will create an SU for you
on the Data Domain system, and name the SU after the shortname of the
NetWorker server.

The following figure provides an example of the DD Cloud Tier Configuration


Options page.
Figure 21 DD Cloud Tier Configuration Options page

8. In the Select the Folders to use as DD Cloud Tier Device page, configure a
device in the same mtree as the Data Domain backup device:
a. Select the Data Domain system, and then click New Folder.
A new folder appears in the navigation tree. This folder is the new device.

Note

The navigation tree does not show the SU folder under the Data Domain
system folder. However, the SU folder is verifiable in the final Review
Configurations Settings wizard page. The wizard names the SU folder after
the short hostname of the NetWorker server and places the devices that you
create into this SU folder.

b. Type a name for the new folder, and then select the checkbox next to the
folder or device name.
The Device table displays the full NetWorker device name, the storage
pathname, and details about the device.

72 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Software Configuration

Note

The device name refers to the subfolder created within the SU. The folder
path must not contain other folders deeper than these device folders.

c. (Optional) To rename a DD Cloud Tier device as it appears in NMC:


a. Select the device in the table.
b. Type a new name in the NetWorker Device Name field.
c. Do not use special characters other than dot (.) and underscore (_).
d. The Storage Path field remains unchanged.

Note

Implicit in the SU folder pathname on the Data Domain system is the hidden
mount point folders/data/col1. Do not modify this folder structure, which
all NetWorker server hosts use. The final wizard page, Review
Configurations Settings, shows the complete location.
The /backup folder stores NFS service data and the clients that are
configured for NFS access also have the ability to view, change, and delete
the /data/col1 directory that contains the DD Boost devices. If you use
NFS devices, you can avoid the risk of potential interference by using
alternative path names.

d. Click Next.
The following figure provides an example of the Select the Folders to use as
DD Cloud Tier Device page.

Configuring NetWorker devices for DD Cloud Tier 73


Software Configuration

Figure 22 Select the Folders to use as DD Cloud Tier Device page

9. In the Configure a Pool for the DD Cloud Tier Device page, perform the
following steps:
a. Select Configure Media Pools for Devices.
b. In the Pool section, perform either of the following steps:

Note

The pool that you select or create must contain only Cloud Tier devices.
NMC lists pools of the type Backup Clone that contain only DD Cloud Tier
devices.

c. Leave the Label and Mount device after creation option selected.
d. Click Next.
The following figure provides an example of theConfigure a Pool for the DD
Cloud Tier Device page.

74 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Software Configuration

Figure 23 Configure a Pool for the DD Cloud Tier Device page

10. In the Select the Storage Nodes for the DD Cloud Tier Device page, perform
the following steps:
a. In the Storage Node Options section, select the storage node that manages
the device.
l To use an existing storage node on the NetWorker server, select Use an
existing storage node.
l To use a new storage node:
a. Select Create a new storage node.
b. Type the hostname of a storage node host.
c. If the new Storage Node is also a Dedicated Storage Node, select
Dedicated Storage Node.

b. Click Next.
The following figure provides an example of the Select the Storage Nodes for
the DD Cloud Tier Device page.

Configuring NetWorker devices for DD Cloud Tier 75


Software Configuration

Figure 24 Select the Storage Nodes for the DD Cloud Tier Device page

11. In the Configure the Data Domain Management Policy page, perform the
following steps:
a. In the Data Domain Host field, specify the host name of the Data Domain
system.
b. In the Admin User field, specify the username for a Data Domain user that
has admin access. For example, sysadmin.
c. In the Admin Password field, specify the password of the management
user.
d. In the Port field, specify the management port. By default, the port is 3009.
e. In the CA Certificate field, click Pull Certificate.
The Device wizard contacts the Data Domain system and displays the
certificate in the Certificate field.

The Management Certificates window appears.


f. From the Select Certificate list, select the certificate.
g. In the Certificate Details field, review the certificate, and if the certificate
is correct, click I Trust.
The CA Certificate field on the Configure the Data Domain Management
Policy window displays the certificate.
h. In the Cloud Unit Name field, specify the name of the cloud unit that you
created on the Data Domain system.

Note

To view a list of cloud units that are configured on a Data Domain system,
from the Data Domain CLI, type cloud unit list.

i. Click Next.

76 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Software Configuration

j. On the confirmation window, review the details, and then click OK.
The following figure provides an example of the Configure the Data Domain
Management Policy page.
Figure 25 Configure the Data Domain Management Policy page

12. In the Review the Device Configuration page, review the settings and click
Configure.
The following figure provides an example of the Review the Device
Configuration page.

Configuring NetWorker devices for DD Cloud Tier 77


Software Configuration

Figure 26 Review the Device Configuration page

13. In the Check results page:


a. Review whether the devices were successfully completed or any messages.
b. Click Finish.
c. To go back, click Back to the appropriate wizard step.
The following figure provides an example of the Check results page.
Figure 27 Check results page

78 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Software Configuration

14. In the Review the Device Configuration page, review the settings and click
Configure.
15. In the Check results page:
a. Review whether the devices were successfully completed or any messages.
b. Click Finish.
c. To go back, click Back to the appropriate wizard step.
Results
The Device Configuration wizard performs the following tasks:
l Deletes existing time-based policies on the Data Domain system.
l Creates the app-based policy on the Data Domain system during the device label
operation.
l Creates the new NetWorker device for the DD Cloud Tier device.
The following figure provides a example of the Data Domain devices window with a DD
Cloud Tier device.
Figure 28 Device window with a DD Cloud Tier device

Configuring a Cloud Tier device manually


It is recommended that you use the Device Configuration Wizard to add a Cloud Tier
device to the NetWorker datazone. You can modify the Device resource that the
wizard creates to modify the devices, and perform the tasks in the following sections.
Before you begin
Create the device folder on the Data Domain Storage Unit (SU).
To create a new Cloud Tier device, complete the following steps in the Devices
window.
Procedure
1. In the left navigation pane, right-click Data Domain systems, select
Properties, and then in the Access section, specify the following information:
a. In the Data Domain Host field, specify the host name of the Data Domain
system.
b. In the Admin User field, specify the username for a Data Domain user that
has admin access. For example, sysadmin.

Configuring a Cloud Tier device manually 79


Software Configuration

c. In the Admin Password field, specify the password of the management


user.
d. In the Port field, specify the management port. By default, the port is 3009.
e. In the Cloud Unit Name field, specify the name of the cloud unit that you
created on the Data Domain system.

Note

To view a list of cloud units that are configured on a Data Domain system,
from the Data Domain CLI, type cloud unit list.

f. In the Management Certificate field, paste the management certificate,


from the Data Domain system.
g. Click OK.
NetWorker updates the Data Domain resource but does not validate the values
with the Data Domain system to ensure accuracy.
2. In the left navigation pane, right-click Devices, and then and select New Device
Properties.
3. On the General tab, identify the Cloud Tier device by typing its name and
access information:

Note

Multiple devices can share a single volume. Configuring volume sharing on


multiple devices provides details.

a. In the Name field, type a name for the Cloud Tier device.
For example:

ct_1

If you configure the device on a separate storage node host that is not the
NetWorker server host, it is a remote device. Specify the Name field in the
following format:

rd=remote_storagenode_hostname:device_name

For example:
rd=dzone1_sn2:ct_1

b. In the Device access information field, type the Data Domain hostname
followed by a colon and the path to the device folder.
If you are configuring a device with secure multi-tenancy (SMT) protection,
the device folder must reside in a password-protected tenant unit on the
Data Domain.
Use the following format:
DD_hostname:/DD_storage_unit_name/device_name
where, as a best practice, DD_storage_unit_name is the NetWorker server
name, and device_name is a name for the device, which appears as a folder.
For example, the following figure uses the following name:
ddr1:/dzone1/ct_1
80 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Software Configuration

NetWorker does not limit the number device folders that you can create, but
the Device access information field accepts one device folder only. Do not
create any folders within a device folder.

Note

Implicit in this pathname is the hidden mount point folder /data/col1. Do


not modify this folder structure, which all NetWorker servers use.

c. From the Media type list, select DD Cloud Tier.


The following figure provides an example of the General tab for a Cloud Tier
device.
Figure 29 Example of the General tab configuration properties for a Cloud Tier device

4. On the Configuration tab, in the Save Sessions area, in the Remote user and
Password fields, type the DD Boost username and password, respectively.
You can only define one DD Boost (OST) user. All NetWorker storage nodes and
servers that access the Data Domain system must use the same username and
password.

Configuring a Cloud Tier device manually 81


Software Configuration

Note

Avoid changing the user of an existing device with a labeled volume. The new
user will not have write permission to the files and directories that are created
by the previous user and cannot re-label the volume. Create a device for the
new user.

5. To save the device settings click OK.


The NetWorker Administration window displays the Data Domain system and
details of the Cloud Tier device.

(Optional) Creating a Cloud Tier device pool


NetWorker provides you with a preconfigured media pool named DD Cloud Tier Clone
that you can use for Cloud Tier devices. Optionally, you can create a new clone pool
for Cloud Tier devices.
Procedure
1. In the Administration window, click Media.
2. In the left pane, select Media Pools.
3. From the File menu, select New.
4. On the General tab, perform the following configuration tasks:
a. In the Name field, specify a descriptive name for the pool.
b. From the Pool type list, select Backup Clone.
If a pool other than Backup Clone is used for a DD Cloud Tier device, the
following error message appears when you attempt to label the device:

Pool <pool name> is of type 'Backup. A DD Cloud Tier device


must belong to a pool of type 'Backup Clone'.

c. From the Label template list, select DD Cloud Tier Default Clone.
5. On the Selection Criteria tab, perform the following configuration tasks:
a. (Optional) To restrict the devices associated with the pool, from the Device
box, select the Cloud Tier devices.

Note

Select devices that reside on the same mtree as the Data Domain devices
that contain the source backup data.

b. From the Media type required drop down, select DD Cloud Tier.
6. Click OK.

82 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Software Configuration

Labeling and mounting Cloud Tier devices


It is recommended that you use the Device Configuration Wizard to create a Data
Domain device, which automatically labels and mounts the device. The following
procedure describes the alternative manual method.

Note

NetWorker uses an app-based policy to clone data to a DD Cloud Tier device. If a non-
app-based policy exists on the mtree where the DD Cloud Tier device resides,
NetWorker will delete the non-app-based policy and create an app-based policy during
the label operation.

Procedure
1. In the NetWorker Administration window, click Devices.
2. In the left navigation pane, select Data Domain Systems.
3. In the right pane, right-click the Cloud Tier device, and click Label.
4. On the Label window, from the Pools list, select the Cloud Tier clone pool to
associate with this device.
A label for the selected pool appears in the Volume Label field. This label will
become the volume name for the device.
5. Select Mount After Labeling and click OK.
The Devices window displays the device and the associated volume name.

Configuring clients to back up to DD Boost devices


You can create client resources to define backup data by using the Client
Configuration wizard or manually. EMC recommends that you use the Client
Configuration wizard to create client resources.

Configuring a backup client with the wizard


Use the NetWorker Client Configuration wizard to create and modify NetWorker
backup clients.
Before you begin
If the client is to use a Client Direct backup, which is the default configuration, ensure
that the client has access to the same network connectivity (IP or FC) that the target
DD Boost devices use.

Note

Mac OS X clients only support the IP protocol.

Note

If you want to redirect existing client backups to new DD Boost devices, Redirecting
backups from other devices to DD Boost provides details.
The details for the settings referred to in this simplified wizard procedure are found in
the next procedure Configuring a backup client with NMC property windows.

Configuring clients to back up to DD Boost devices 83


Software Configuration

Procedure
1. Use NMC to connect to the NetWorker server, and then click Protection.
2. In the left navigation pane, right-click Clients and select Client Backup
Configuration > New.
3. Complete the fields on the following wizard pages:
l Show the Client Name.
l Specify the Backup Configuration Type.
l Specify the Backup Options:
n In the Deduplication settings, select Data Domain Backup, if applicable.
This setting ensures that the client backs up only to DD Boost devices if
the pool used also contains other types of devices such as AFTDs. It is
best not to have mixed devices in pools.
n Set Target Pool to a pool associated with DD Boost devices.
An alternative way to configure a client to use a pool is to specify the
client or its group in the Data Source field of the Pool resource. Creating
pools to target DD Boost devices provides details.

Note

Current versions of NetWorker application modules support backup to


DD Boost devices. Some earlier versions of modules do not support the
client fields for Data Domain backup and Pool. In these cases, do not set
these fields. Backup fails for older NetWorker application modules on
page 185 provides details.
l Select Files to Back Up.
l Select the Client Properties.
l Select the Backup Group.
l Specify the Storage Node Options.
4. Complete the wizard.

Configuring a backup client with NMC property windows


EMC recommends that you use the Client Configuration wizard to create and modify
NetWorker clients. The following procedure describes how to manually create a Client
resource.
Before you begin
If the client is to use a Client Direct backup, which is the default configuration, ensure
that the client has access to the same network connectivity (IP or FC) that the target
DD Boost devices use.

Note

Mac OS X clients only support the IP protocol.

The EMC NetWorker Administration Guide provides details on NetWorker Client


resource configurations.
You can complete the following steps to configure a NetWorker client for scheduled
backups to a DD Boost device.

84 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Software Configuration

Procedure
1. Use NMC to connect to the NetWorker server and click Protection.
2. In the left navigation pane, select Clients:
l To create a Client resource, from the File menu, select New.
l To edit an existing Client resource, select the client name from the list in the
right panel, and from the File menu, select Properties.
a. On the General tab, in the Name field, type the hostname for the client and,
optionally, type a comment in the Comment field.
b. Optional, select Block based backup.
c. In the Save Sets field, click the Browse button to open the Choose
Directory window. Browse to and select the volumes or individual file
systems that you want to back up. When finished selecting, click OK.
Type each item on a separate line. For example:
E:\
F:\
To back up all client data, type All in the Save Sets field.

Note

For Microsoft Windows systems, back up the SYSTEM or Volume Shadow


Copy Service (VSS) SYSTEM on a periodic basis to prepare for disaster
recovery of the client system.
The EMC NetWorker Administration Guide provides details for this step.

3. On the General tab, in the Backup area, complete the following steps:
a. To enable deduplicated backup data from this client to bypass the
NetWorker storage node and be sent directly to the Data Domain system,
select Client Direct. Review the following requirements:
l Ensure that you have not selected the Checkpoint restart field. If
selected, backups revert to traditional storage node backups.
l Ensure that the client interface configuration, whether FC or IP, matches
the DD Boost device interface configuration. If the interfaces do not
match, then the storage node performs the backup and restore
operations.
l Ensure that you have configured the Data Domain system to use the DD
Boost devices. Configuring the Data Domain system for DD Boost by
using the CLI on page 49 provides details.
l Ensure that you have configured the NetWorker Device resource for the
Data Domain system with a Remote User field that specifies a DD Boost
username. Configuring a DD Boost device manually on page 89
provides details.

Note

Client Direct access from a Linux host to a Data Domain system requires
a glibc 2.3.4 or later library on the Linux system.

Configuring a backup client with NMC property windows 85


Software Configuration

b. (Optional) In the Protection group list field, select the group in which to add
the Client resource. If you have not created the protection group, you can
create one later and add the client to the group.
4. On the Apps & Modules tab, perform the following tasks:
a. In the Deduplication area, select Data Domain backup. This ensures that
NetWorker backs up the client data only to DD Boost devices, even if the
selected pool contains DD Boost and other types of devices. It is best not to
include different device types in a single pool.

Note

Current versions of NetWorker application modules support backup to DD


Boost devices. Some of the earlier module versions do not support the client
fields for Data Domain backup and Pool. In this case, do not set these
fields. Backup fails for older NetWorker application modules on page 185
provides details.

b. In the Data Domain Interface field, select the type of connectivity the client
uses for DD Boost devices:
l Select IP for TCP/IP connectivity only.
Do not select IP if the Enable fibre channel attribute is enabled on the
Configuration tab of the DD Boost Device resource. This conflict in
settings could cause backups to fail and restores to operate only through
the storage node.
l Select Fibre Channel for FC connectivity only.
You cannot select the FC-only setting when you create a Client resource
for the NetWorker server resource because the NetWorker server
requires IP connectivity to send control information to the hosts within
the datazone.
l Select Fibre Channel for FC connectivity only.
You cannot select the FC-only setting when you create a Client resource
for the NetWorker server resource because the NetWorker server
requires IP connectivity to send control information to the hosts within
the datazone.
l To enable both FC and IP connectivity to the devices, select Any.
If the NetWorker server contains multiple definitions of this Client
resource, any changes to this field propagate to the other instances of
the client.

c. To redirect an NDMP client from a tape backup to a DD Boost backup,


change the Backup fields as follows:
a. Select the NDMP option.
b. In the Backup Command field, type the following command:

nsrndmp -T backup_type -M

where backup_type is dump, tar, or vbb.


The -M option specifies a backup with the Data Service Agent (DSA)
option.
The EMC NetWorker Administration Guide provides details on the
nsrndmp command.

86 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Software Configuration

5. On the Globals (2 of 2) tab, in the Configuration area, configure the following


settings:
a. In the Storage Nodes field, type the hostnames of the remote storage
nodes that receive the client backup data.
b. In the Recover Storage Nodes field, type the hostnames of the storage
nodes that you use to restore the client data.
c. (Optional), In the Backup target disks field, specify an ordered list of AFTD
and Data Domain disk devices that will receive data for this client. When you
specify a value in this attribute, NetWorker ignores the values that you
specify in the Storage nodes attribute. This attribute does not apply to the
client resource of the NetWorker server, and applies to each instance of the
client resource. You can specify devices that are local or remote to the
NetWorker server.
6. When you have completed the client configuration, click OK.
The NetWorker server window shows a check mark in the Scheduled backup
column of clients that are enabled for scheduled backup.

Manually creating or modifying NetWorker resources for DD


Boost
EMC recommends that you use the Device Configuration Wizard, which is part of the
NetWorker Administration GUI, to create and modify DD Boost devices. The wizard
also enables you to create and modify volume labels and the storage pools for DD
Boost devices.
The following section describes how to modify a DD Boost device after the wizard
creates the device, how to add a Data Domain system as a managed host, and how to
create or modify DD Boost pools and label templates.

Configuring DD Boost devices manually


EMC recommends that you use the Device Configuration Wizard to manually add a
Data Domain system to the NetWorker datazone. and create DD Boost devices. You
can modify the Device resource that the wizard creates to modify the devices, and
perform the tasks in the following sections.

Adding a managed Data Domain system to NMC


Procedure
1. Log in to the NMC GUI as an administrator of the NetWorker server.
2.
Click the Enterprise button on the taskbar.
3. In the left navigation pane:
a. Right-click Enterprise.
b. Select New > Host.
The Add New Host wizard appears.
4. In the Create Host page:
a. Specify the FQDN of the Data Domain system or DDVE.

Manually creating or modifying NetWorker resources for DD Boost 87


Software Configuration

Note

For a Highly Available Data Domain system, specify the floating IP or


hostname of the Data Domain system.

b. Click Next.
5. In the Select Host Type page:
a. Select DataDomain.
b. Click Next.
6. In the Manage DataDomain page:
a. Review the configuration details.
b. Click Next.
c. Leave the Capture Events option selected.
7. (Optional) In the Configure SNMP Monitoring page, perform the following
steps:
a. In the SNMP Community String field, type the name of the SNMP
community string.

Note

If you do not know the name of the community, leave this field blank.

b. With the Receive SNMP trap events option selected, specify the SNMP
Process port used by the Data Domain system and select the events in
which to monitor. Use the Reset to defaults option to reset the events in
which to monitor back to the default settings.

Note

The default SNMP process port is 162.

c. Click Next.
SNMP monitoring enables NMC to display the Data Domain system status
and to list the backup and the recovery events. The monitoring feature also
provides a launcher link for the Data Domain interface.
8. Click Finish.
Results
The Data Domain system or DDVE appears in the Enterprise window.

Adding a host Data Domain system to NMC Enterprise view


Use the Add New Host Wizard to manually add a Data Domain system to the
NetWorker datazone.
NetWorker lists the Data Domain systems as a host in the NMC Enterprise view. This
view shows the Data Domain system status and the backup and recovery events that
were performed by NetWorker managed by NMC. The Enterprise view also provides a
live link to launch the Data Domain Enterprise Manager GUI. To manually add a Data
Domain system to the NMC Enterprise view, perform the following steps:

88 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Software Configuration

Procedure
1. From the File menu, select New > Host to run the Add New Host wizard.
2. Complete the wizard screens:
l Type the Data Domain hostname.
l Select Data Domain.
l Select Capture Events.
l Type the name of the SNMP community where NMC will retrieve Data
Domain status information. By default, NMC uses the value configured on
the Data Domain system with the snmp add ro-community command.
l Type a value for the SNMP Process Port. By default, NMC uses the value
that is configured on the Data Domain system with the snmp add trap-
hosthostname[:port] command. This configuration must agree with the
firewall configuration on the Data Domain system.
l Select the SNMP Traps that you want to monitor.

Configuring a DD Boost device manually


EMC recommends that you create a DD Boost device by using the Device
Configuration Wizard. A DD Boost device appears as a folder on the Data Domain
system. You associate each DD Boost device with a single NetWorker volume by
labeling a device for a NetWorker pool.

Note

If you manually create a device with this procedure, NMC lists the device but this
procedure does not create a corresponding device folder on the Data Domain system.
If you try to label and mount such a device, an error appears.

To modify a DD Boost device complete the following steps:


Procedure
1. Use NMC to connect to the NetWorker server. In the Administration window,
click the Devices view.
2. In the folder tree, expand Data Domain Systems and select the Data Domain
system that stores the save sets.
3. In the right panel, right-click the name of the device that you want to modify,
and then select Properties.
4. On the General tab, identify the DD Boost device by typing its name and access
information:

Note

Multiple devices can share a single volume. Configuring volume sharing on


multiple devices provides details.

a. In the Name field, type a name for the Data Domain device.
For example:
dd_1
Configuring a DD Boost device manually on page 89 uses the following
example values:

Configuring DD Boost devices manually 89


Software Configuration

l NetWorker server short hostname = dzone1


l NetWorker remote storage node hostname = dzone1_sn2
l Data Domain hostname = ddr1
l DD Boost device name = dd_1

If you configure the device on a separate storage node host that is not the
NetWorker server host as shown in Configuring a DD Boost device manually
on page 89, it is a remote device. Specify the Name field in the following
format:
rd=remote_storagenode_hostname:device_name
For example:
rd=dzone1_sn2:dd_1

b. In the Device access information field, type the Data Domain hostname
followed by a colon and the path to the device folder.
If you are configuring a device with secure multi-tenancy (SMT) protection,
the device folder must reside in a password-protected tenant unit on the
Data Domain. Configuring the Data Domain system for DD Boost by using
the CLI on page 49 provides details.
Use the following format:
DD_hostname:/DD_storage_unit_name/device_name
where, as a best practice, DD_storage_unit_name is the short hostname of
the NetWorker server and device_name is a name for the device, which
appears as a folder.
For example, the following figure uses the following name:
ddr1:/dzone1/dd_1
NetWorker does not limit the number device folders that you can create, but
the Device access information field accepts one device folder only. Do not
create any folders within a device folder.

Note

Implicit in this pathname is the hidden mount point folder /data/col1. Do


not modify this folder structure, which all NetWorker servers use.

Figure 30 Example of the device name and the access information for a DD Boost
device

90 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Software Configuration

c. In the Media type field, select Data Domain from the list.
5. On the Configuration tab, in the Save Sessions area, set the number of
concurrent save sessions (streams) and the number of nsrmmd (media storage)
processes that the device can handle:
l In the Target sessions field, specify the number of save sessions that a
nsrmmd process on the device handles before another device on the Data
Domain host takes the additional sessions. If another device is not available,
then another nsrmmd process on the same device takes the additional
sessions. Use this setting to balance the sessions load among nsrmmd
processes.
EMC recommends that you set this field to a low value. The default value is
20. The maximum value is 60.
l In the Max sessions field, specify the maximum number of save sessions
that the device can handle. At the maximum limit, if no additional devices are
available on the host, then another available Data Domain system takes the
additional sessions. If no other Data Domain hosts are available, then the
system retries the save sessions until a nsrmmd process become available.
The default value is 60. The maximum value is 60.

Note

The Max sessions setting does not apply to concurrent recovery sessions.
l In the Max nsrmmd count field, specify the maximum number of nsrmmd
processes that can run on the device. Use this setting to balance the
nsrmmd load among devices.
If you enabled Dynamic nsrmmds on the storage node, NetWorker
automatically adjusts this value by using the formula max/target +4, with the
default value being 14. Otherwise, the default value is 4.
To modify this value, first adjust the two sessions fields, apply and monitor
the effects, and then tweak the Max nsrmmd count value.

Note

NetWorker reserves at least one nsrmmd process for restore and clone
operations.

6. In the Remote user and Password fields, type the DD Boost username and
password, respectively.
You can only define one DD Boost (OST) user. All NetWorker storage nodes and
servers that access the Data Domain system must use the same username and
password.

Note

Avoid changing the user of an existing device with a labeled volume. The new
user will not have write permission to the files and directories that are created
by the previous user and cannot re-label the volume. Create a device for the
new user.

7. If you want the DD Boost device to use FC connectivity, complete the following
steps:

Configuring DD Boost devices manually 91


Software Configuration

a. Select the Enable fibre channel field.


b. In the Fibre Channel Host Name field, type the hostname that the Data
Domain system uses to identify itself for FC operations. By default, this
hostname is the same name used for IP operations, but the hostnames can
be different. The hostname must match the Server Name displayed on the
Data Domain system in the Data Management > DD Boost > Fibre Channel
tab of the Data Domain Enterprise Manager. The name is case-sensitive.

Note

All NetWorker clients that use an FC-enabled DD Boost device must be


enabled for FC in the Data Domain Interface field.

8. To save the device settings click OK.


The NetWorker Administration window displays the Data Domain system and
details of the device.

9. Ensure that the device is associated with a NetWorker storage volume before
you try to use the device. Otherwise, an error appears. Labeling and mounting
devices on the storage node provides the procedure.

Configuring volume sharing on multiple devices


You can concurrently mount and share a single NetWorker storage volume with
multiple DD Boost devices, to provide greater flexibility and performance gains.
l A volume that you simultaneously mounted on both an IP-enabled DD Boost device
and an FC-enabled DD Boost device provides greater flexibility. Clients, including
Client Direct clients, can back up and restore their data on the same volume over
either IP or FC networks. Restoring by Client Direct over IP from an FC-enabled
device provides details on a volume sharing solution for restore operations.
l You can create multiple devices for shared volumes on the same storage node or
on separate storage nodes.
l For clients that are not Client Direct clients, a shared volume can improve
bandwidth for backup or restore operations to a DD Boost device because
NetWorker can use the storage node that is closest to the requesting client.

Note

In some environments however, concurrent read or write operations to a volume


from multiple storage nodes or Client Direct clients can result in disk thrashing
that impairs performance.

You must create each device separately, with a different name, and you must
correctly specify the path to the storage volume location.
For example, to create three devices, one on the NetWorker server host named
dzone1 that uses local devices and two remote devices (rd) on storage nodes
dzone1_sb2 and dzone1_sn3, specify the name of each device in Name field of each
device as follows:

dd_1a

rd=dzone1_sn2:dd_1b

rd=dzone1_sn3:dd_1c

92 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Software Configuration

The Device access information field would specify the same single directory as a
valid complete path for each alias.
For example, for a directory named dd_1 on the Data Domain storage host named ddr1,
specify the correct pathname:
l If the storage node uses an automounter, you can specify the following pathname:
/net/ddr1/dzone1/dd_1
l If the storage node uses an explicit system mount point, you can specify one of
the following pathnames:
/mnt/ddr1/dzone1/dd_1

/mnt/dzone1/dd_1

Creating a volume label template for DD Boost devices


When you use the Device Configuration Wizard, the wizard automatically creates a
label template for the volumes that a new device will use.

Note

The Device Configuration Wizard automatically creates a label template for the
volumes, and this procedure does not apply if you use the wizard.

Each DD Boost device is associated with a single volume. The label template that is
assigned to the pool determines the volume name. NetWorker mounts each volume in
a DD Boost device. A label template provides a DD Boost device with a volume name
and numbering to all storage volumes that belong to the same pool.
A label template defines the components of a volume label, which includes the volume
name, a separator, and volume number. All the volumes in the same pool will have the
same label name, for example, dd_myvol, but different volume numbers, for example, .
001.003.
For example, a Data Domain system may have three devices, each of which is
mounted with a storage volume (Volume Name). If each device/volume is associated
with the same pool, the volume names would be as follows:
l dd_myvol.001
l dd_myvol.002
l dd_myvol.003
To create a label template, perform the following steps:
Procedure
1. In the NetWorker Administration window, click Media.
2. In the browser tree, select Label Templates, and from the File menu, click
New.
The Create Label Template window appears.
3. In the Name and Comment fields, type a name and description for the label
template. The label will associate a storage pool to a device.
4. In the Fields field, type the components of the label. Place each label
component on a separate line. The template must include at least one volume
number range component. NetWorker applies the label template to the volumes
mounted on DD Boost devices in a Data Domain system.
For example:

Configuring DD Boost devices manually 93


Software Configuration

dd_myvol
001-999

5. Select a Separator, and click OK.


6. In the Next field, specify the next volume label in the sequence to be applied
during the next label and mount operation, for example, dd_myvol.001.
7. Click OK.

Creating pools to target DD Boost devices


Typically, use the Device Configuration Wizard, which automatically creates a media
pool. The following procedure describes the alternative manual method that uses the
NMC property windows.
Each NetWorker client stores data to a media or target pool. This pool is used to direct
the data from backup clients, or the data from storage volumes for clone operations,
to the storage devices that are members of the pool.
Each DD Boost device is associated with a storage volume label when it is mounted.
The Volume Name value of the storage volume implicitly associates the device with
the specified pool.

Note

Dynamic Drive sharing (DDS) is not supported for DD Boost devices.

Complete the following steps to manually create a pool for Data Domain backups:
Procedure
1. Ensure that the devices that you assign to the pool were created in NetWorker.
2. Ensure that a label template has been created for the pool. Creating a volume
label template for DD Boost devices on page 93 provides details.
3. From the NetWorker Administration window, click Media.
4. In the left navigation pane, select Media Pools, and from the File menu, select
New to open the Create Media Pool window with the Basic tab selected.
5. In the Name field, type a name for each pool. Create names that clearly indicate
whether the pool is for a Data Domain backup or a Data Domain clone operation.
For example:
DDsite1
DDCLsite2
A pool name that starts with DD would be a Data Domain pool, and a pool name
that starts with DDCL would be a Data Domain clone pool. The pool name can
also include the physical location where NetWorker stores the backup data.
These conventions make the name easier to use for scripting and reporting.

6. (Optional) In the Comment field, type a description of the pool.


7. Select Enabled.
8. Select the Pool type:
l To use the pool for backups, select Backup.
l To use the pool for clone copies, select Backup Clone.

94 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Software Configuration

Note

You cannot modify the Pool type value after you create the device.

9. In the Label Template field, select a label template to associate with the pool.
You can later apply the pool to DD Boost devices. Labeling and mounting
devices on the Data Domain device on page 95 provides details.

10. On the Selection Criteria tab, under Target Devices, select all the DD Boost
devices that this pool may use for storage. The pool may store data on any of
these devices. Use the following practices:
l Select only DD Boost devices for the pool. Do not mix DD Boost devices with
other types of storage devices. If you modify a pool in this step, ensure that
the pool excludes all devices that are not DD Boost devices.
l Select only DD Boost devices that reside on the same Data Domain system.
To add DD Boost devices that reside on other Data Domain systems, first
save the pool configuration, and then modify the pool and add the DD Boost
devices.
l Do not select devices that reside on more than one Data Domain system.
Backups from a single NetWorker client can target any of these Data
Domain systems. This behavior impairs the backup window and deduplication
ratio.

Note

Backups from a single NetWorker client can target any of these Data Domain
systems. This behavior impairs the backup window and deduplication ratio.

11. Under Media type required, if you intend to use the pool for a Data Domain
backup only, set this field to Data Domain. This setting ensures that only Data
Domain devices use this pool.

Note

EMC recommends that you do not include different media types in a single pool.
Backup fails for older NetWorker application modules on page 185 provides
further details.

12. Click OK.


The EMC NetWorker Administration Guide provides details on media pools.

Labeling and mounting devices on the Data Domain device


EMC recommends that you use the Device Configuration Wizard to create a Data
Domain device, which automatically labels and mounts the device. The following
procedure describes the alternative manual method that uses the NMC property
windows.
Before you can use a device you must label and mount the device.
Procedure
1. In the NetWorker Administration window, click Devices.
2. In the left navigation pane, select Data Domain Systems.

Configuring DD Boost devices manually 95


Software Configuration

3. In the right panel, right-click the device you want to label and select Label.
4. In the Label window and Pools list box, select a pool to associate with the
device.
A label for the selected pool appears in the Volume Label field. This label will
become the volume name for the device.
5. Select Mount After Labeling and click OK.
The Devices window displays the device and the associated volume name.

Deactivating and removing DD Boost devices


To prevent NetWorker from using the DD Boost device, use one of the following
procedures to deactivate a DD Boost device.

Converting a device to read-only


When you convert a device to read-only mode NetWorker cannot use of the device for
backup operations. You can continue to use the device for read operations, for
example, restore operations and as the read device for clone operations.
Procedure
1. Use NMC to connect to the NetWorker server, click the Devices view and
select the Data Domain Systems folder in the navigation tree.
2. In the Devices table, right-click the device you want to convert to read-only
and select Unmount.
3. Right-click this unmounted device, and select Modify Device Properties.
4. On the General tab, select Read Only and click OK.
5. Right-click the device, and select Mount.

Disabling a device
When you disable a device, NetWorker does not use the device for backup, recovery
or clone operations. You can reenable the device to restore old data retained on the
device.
Procedure
1. Use NMC to connect to the NetWorker server, click the Devices view and
select the Data Domain Systems folder in the left navigation pane.
2. In the Data Domain Systems table, right-click the device you want to disable
and select Unmount.
3. Right-click the device, and select Enable/Disable.
4. Confirm that the Enabled column of the table contains No, which indicates that
you have disabled the device.

96 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


Software Configuration

Deleting an AFTD or DD Boost device


The procedure to delete an AFTD or DD Boost device includes an option that will erase
the data on the volume, denoted by the access path, that stores the device’s data.
You can erase the volume only if no other device in the system shares the volume.
Procedure
1. Use NMC to connect to the NetWorker server and select Devices. Click Device
in the left navigation pane.
2. In the Devices table, right-click the device that you want to remove, and then
select Delete.
A confirmation window appears.

3. Specify the required setting in the confirmation window:


l To delete the device from the NetWorker configuration without erasing the
data on the device, click Yes.
l To delete the device and erase the data on the device and volume access
path, select Permanently erase all data and remove media and index
information for any selected AFTDs or Data Domain devices, and then
click Yes.

Note

If another device shares the volume that you want to erase, then an error
message displays the name of the other device. Before you can erase the
volume, you must delete all other devices that share the volume until the last
one remaining.

4. If you did not unmount the device or did not remove the device from all the Pool
resource configurations, then a confirmation window appears, which provides
these details. To confirm the device unmount, the removal of the device from
the pool, and the deletion of the device, click Yes.

Deleting an AFTD or DD Boost device 97


Software Configuration

98 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide


CHAPTER 4
Data Protection Policies

This chapter includes the following topics:

l Performing clone and replicate operations........................................................100


l Overview of data protection policies................................................................ 100
l Default data protection policies.........................................................................101
l Strategies for traditional backups..................................................................... 103
l Cloning with Data Domain (DD Boost).............................................................. 128
l DD Boost clone and replication support............................................................ 130
l Data Domain Automated Multi-streaming (AMS).............................................. 131
l Configuring the Data Domain CCR environment............................................... 132
l Strategies for cloning....................................................................................... 133
l Clone reports....................................................................................................156
l Monitoring the status of Cloud Tier save sets...................................................157
l Cloning with nsrclone....................................................................................... 158
l Staging data from DD Cloud Tier devices......................................................... 158

Data Protection Policies 99


Data Protection Policies

Performing clone and replicate operations


Data Protection policies provide you with the ability to backup data, which you can
then clone and replicate.

Overview of data protection policies


Data protection policy is a concept that provides you with the ability to design a data
protection solution for the environment at the data level instead of at the host level.
With a data protection policy, each client in the environment is a backup object and
not simply a host.
Data protection policies enable you to back up and manage data in a variety of
environments, as well as to perform system maintenance tasks on the NetWorker
server.
A data protection policy solution encompasses the configuration of the following key
NetWorker resources:
Policies
Policies provide you with the ability to develop a service-catalogue approach to the
configuration of a NetWorker datazone. Policies enable you to manage all data
protection tasks and the data protection lifecycle from a central location.
Policies provide an organizational container for the workflows, actions, and groups
that support and define the backup, clone, management, and system maintenance
actions that you want to perform.
Workflows
Workflows define the start time for a series of actions, the frequency in which the
actions run, the order of actions in a sequence, and the protection group to which the
workflow applies.
A workflow can be as simple as a single action that applies to a finite list of Client
resources, or a complex chain of actions that apply to a dynamically changing list of
resources. In a workflow, some actions can be set to occur sequentially, and others
can occur concurrently.
You can create multiple workflows in a single policy. However, each workflow can
belong to only one policy. When you add multiple workflows to the same policy, you
can logically group data protection activities with similar service level provisions
together, to provide easier configuration, access, and task execution.
Protection groups
Protection groups define a set of static or dynamic Client resources or save sets to
which a workflow applies. There are also dedicated protection groups for backups in a
VMware environment or for snapshot backups on a NAS device. Review the following
information about protection groups:
l Create one protection group for each workflow. Each group can be assigned to
only one workflow.
l You can add the same Client resources and save sets to more than one group at a
time.
l You can create the group before you create the workflow, or you can create the
group after you create the workflow and then assign the group to the workflow
later.

100 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Data Protection Policies

Actions
Actions are the key resources in a workflow for a data protection policy and define a
specific task, for example, a backup, clone, or snapshot. NetWorker uses a work list to
define the task. A work list is composed of one or several work items. Work items
include client resources, virtual machines, save sets, or tags. You can chain multiple
actions together to occur sequentially or concurrently in a workflow. All chained
actions use the same work list.
When you configure an action, you define the days on which to perform the action, as
well as other settings specific to the action. For example, you can specify a destination
pool, a retention period, and a target storage node for the backup action, which can
differ from the subsequent action that clones the data.
You can create multiple actions for a single workflow. However, each action applies to
a single workflow and policy.
The following figure provides a high level overview of the components that make up a
data protection policy in a datazone.
Figure 31 Data Protection Policy

Default data protection policies


NetWorker provides you with preconfigured data protection policy resources that you
can use immediately to protect your environment, modify to suit your environment, or
use an example to create new resource configurations. To use these policy resources,
you must add clients to the appropriate group resource.

Note

NetWorker also includes a preconfigured Server Protection policy to protect the


NetWorker and NMC server databases. The section "Server Protection policy and
workflows" provides more information.

Each protection policy provides an example of the EMC best practices that you should
follow when you design your data protection solution:
l Separate file system backups from application database backups, to provide ease
of access at recovery time.
l Stagger the start times for file system backup from the application database
backups, to prevent disk contention on the target hosts.
The default data protection policy resources mimic the requirements of a service
provider, with different policies that are designed to provide protection based on
service level agreements.

Default data protection policies 101


Data Protection Policies

Platinum policy
The Platinum policy provides you with an example of a data protection policy for an
environment that contains EMC storage arrays or appliances and requires backup data
redundancy. The policy contains one workflow with two actions, a snapshot backup
action, followed by a clone action.
Figure 32 Platinum policy configuration

Gold policy
The Gold policy provides an example of a data protection policy for an environment
that contains virtual machines and requires backup data redundancy. The policy
contains two workflows, one to protect Hyper-V hosts and one to protect VMware
hosts. Each workflow contains a backup action followed by a clone action.
Figure 33 Gold policy configuration

Silver policy
The Silver policy provides an example of a data protection policy for an environment
that contains non-virtualized machines and requires backup data redundancy. The
policy contains two workflows, one to protect hosts file systems and one to protect
database applications. Each workflow contains a backup action followed by a clone
action.
Figure 34 Silver policy configuration

Bronze policy
The Bronze policy provides an example of a data protection policy for an environment
that contains non-virtualized machines. The policy contains two workflows, one to
protect hosts file systems and one to protect database applications. Each workflow
contains a backup action.

102 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Data Protection Policies

Figure 35 Bronze policy configuration

Strategies for traditional backups


The primary considerations for a traditional backup strategy are the groups of Client
resources, the workflows that define the series of actions that are associated with the
backup, and the schedule for the backup.

Road map for configuring a new data protection policy


Procedure
1. Create a policy.
When you create a policy, you specify the name and notification settings for the
policy.
2. Within the policy, create a workflow for each data type.
For example, create one workflow to protect file system data and one workflow
to protect application data. When you create a workflow, you specify the name
of the workflow, the time to start the workflow, notification settings for the
workflow, and the protection group to which the workflow applies.
3. Create a protection group.
The type of group that you create depends on the types of clients and data that
you want to protect. The actions that appear for a group depend on the group
type.
4. Create one or more actions for the workflow.
5. To define the backup data that you want to protect, configure Client resources,
and then assign the client resources to a protection group.

The following figure illustrates a policy with two different workflows. Workflow 1
performs a probe and then a backup of the Client resources in Client group 1, and then
clones the save sets from the backups. Workflow 2 performs a backup of the Client
resources in Dynamic client group 1, and then clones the save sets from the backups.

Strategies for traditional backups 103


Data Protection Policies

Figure 36 Data protection policy example

Creating a policy
Procedure
1. On the Administration window, click Protection.
2. In the expanded left pane, right-click Policies, and then select New.
The Create Policy dialog box appears.
3. On the General tab, in the Name field type a name for the policy.
The maximum number of characters for the policy name is 128.

Note

After you create a policy, the Name attribute is read-only.

4. In the Comment box, type a description for the policy.


5. From the Send Notifications list, select whether to send notifications for the
policy:
l To avoid sending notifications, select Never.
l To send notifications with information about each successful and failed
workflow and action after all the actions in the policy complete, select On
Completion.
l To send a notification with information about each failed workflow and
action after all the actions in the policy complete, select On Failure.
6. In the Send notification attribute when you select the On Completion or On
failure option, the Command box appears. Use this box to configure how

104 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Data Protection Policies

NetWorker sends the notifications. You can use the nsrlog action to write the
notifications to a log file or configure an email notification.
The default notification action is to log the information to the
policy_notifications.log file. The policy_notifications.log file
is located in the /nsr/logs directory on Linux and the C:\Program Files
\EMC NetWorker\nsr\logs folder on Windows, by default. You can use the
smtpmail application on Windows or the default mailer program on Linux to
send email messages.
For example:
l To log notifications to a file named policy_notifications.log, type
the following command:

nsrlog -f policy_notifications.log
l On Linux, to send a notification email, type the following command:

mail -s subject recipient


l For NetWorker Virtual Edition (NVE), to send a notification email, type the
following command:
/usr/sbin/sendmail -v recipient_email "subject_text"
l On Windows, to send a notification email, type the following command:

smtpmail -s subject -h mailserver recipient1@mailserver


recipient2@mailserver...

where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the
smtpmail program assumes that the message contains a correctly
formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to
relay the SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the
notification. Multiple email recipients are separated by a space.

7. To specify the Restricted Data Zone (RDZ) for the policy, select the Restricted
Data Zones tab, and then select the RDZ from the list.
8. Click OK.
After you finish
Create the workflows and actions for the policy.

Creating a workflow in a new policy


A policy must contain one or more workflows.
Procedure
1. In the left pane of the Protection window, expand Policies, and then select the
policy that you created.
2. In the right pane of the Protection window, select Create a new workflow.
3. In the Name field, type the name of the workflow.
The maximum number of allowed characters for the Name field is 64.

Creating a workflow in a new policy 105


Data Protection Policies

4. In the Comment box, type a description for the workflow. The maximum
number of allowed characters for the Comment field is 128.
5. From the Send Notifications list, select how to send notifications for the
workflow:
l To use the notification configuration that is defined in the policy resource to
determine when to send the notification, select Set at policy level.
l To send notifications with information about each successful and failed
workflow and action, after all the actions in the workflow complete, select
On Completion.
l To send notifications with information about each failed workflow and
action, after all the actions in the workflow complete, select On Failure.
6. In the Send notification attribute when you select the On Completion or On
failure option, the Command box appears. Use this box to configure how
NetWorker sends the notifications. You can use the nsrlog action to write the
notifications to a log file or configure an email notification.
The default notification action is to log the information to the
policy_notifications.log file. The policy_notifications.log file
is located in the /nsr/logs directory on Linux and the C:\Program Files
\EMC NetWorker\nsr\logs folder on Windows, by default. You can use the
smtpmail application on Windows or the default mailer program on Linux to
send email messages.
For example:
l To log notifications to a file named policy_notifications.log, type
the following command:

nsrlog -f policy_notifications.log
l On Linux, to send a notification email, type the following command:

mail -s subject recipient


l For NetWorker Virtual Edition (NVE), to send a notification email, type the
following command:

/usr/sbin/sendmail -v recipient_email "subject_text"


l On Windows, type the following command:

smtpmail -s subject -h mailserver recipient1@mailserver


recipient2@mailserver...

where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the
smtpmail program assumes that the message contains a correctly
formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to
relay the SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the
notification. Multiple email recipients are separated by a space.

7. In the Running group box, define when and how often the workflow runs.
a. To ensure that the actions contained in the workflow run when the policy or
workflow is started, in the Enabled box, leave the option selected. To

106 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Data Protection Policies

prevent the actions in the workflow from running when the policy or
workflow that contains the action is started, clear this option.
b. To ensure that the workflow starts at the time that is specified in the Start
time attribute, on the days that are defined in the action resource, in the
AutoStart Enabled box, leave the option selected. To prevent the workflow
from running at the time that is specified in the Start time attribute, clear
this option.
c. To define the time to start the actions in the workflow, in the Start Time
attribute, use the spin boxes.
The default value is 9:00 P.M.

d. To define how frequently to repeat the actions that are defined in the
workflow over a 24 hour period, In the Interval attribute, use the spin boxes.
The default value is 24 hours, or once a day. When you select a value that is
less than 24 hours, the Interval End attribute appears. To define the last
time to start a workflow in a defined interval period, use the spin boxes.

e. To define the duration of time in which NetWorker can manually or


automatically restart a failed or canceled workflow, in the Restart Window
attribute, use the spin boxes.
If the restart window has elapsed, NetWorker considers the restart as a new
run of the workflow. NetWorker calculates the restart window from the start
of the last incomplete workflow. The default value is 24 hours.

For example, when you set the Start Time to 7:00 PM, the Interval to 1 hour,
and the Interval end time to 11:00 P.M., then the workflow automatically starts
every hour beginning at 7:00 P.M. and the last start time is 11:00 PM.
8. To create the workflow, click OK.
After you finish
Create the actions that will occur in the workflow, and then assign a group to the
workflow. If a workflow does not contain a group, a policy does not perform any
actions.

Protection groups for traditional backups


Create protection groups for traditional backups, which identifies the Client resources
to back up.
You can create two types of protection groups for a traditional backup:
l Basic client group—Defines a static list of Client resources to back up.
l Dynamic client group—Specifies a dynamic list of Client resources to back up. A
dynamic client group automatically generates a list of Client resources that use
client tag which matches the client tag that is specified for the group.
Create multiple groups to perform different types of backups for different Client
resources, or to perform backups on different schedules. For example:
l Create one group for backups of clients in the Accounting department, and
another group for backups of clients in the Marketing department.
l Create one group for file system backups and one group for backups of Microsoft
Exchange data with the NetWorker Module for Microsoft.
l Create one group for a workflow with backups actions that start at 11 p.m., and
another group for a workflow with backup actions that start at 2 a.m.

Protection groups for traditional backups 107


Data Protection Policies

Note

A Client resource can belong to more than one group.

Creating a client group


Basic client groups define a static list of Client resources for a traditional backup,
check connectivity, or probe action.
Before you begin
Create the Client resources for the data to include in a protection group.
Procedure
1. In the Administration window, click Protection.
2. In the expanded left pane, right-click Groups, and then select New.
The Create Group dialog box appears, starting with the General tab.
3. In the Name attribute, type a name for the group.
The maximum number of characters for the group name is 64.

Note

After you create a group, the Name attribute is read-only.

4. From the Group Type list, leave the default selection of Clients.
5. In the Comment field, type a description of the group.
6. Select the workflow in which to assign the group from the Policy-Workflow
list.

Note

You can also assign the group to a workflow when you create or edit a
workflow.

7. (Optional) On the Restricted Datazones tab, to specify the Restricted


Datazone (RDZ) for the group, select the RDZ from the list.
8. Click OK.
After you finish
Create Client resources. The Client Configuration wizard and General tab on the
Client Properties dialog box properties page provide you with the ability to assign
clients to a protection group.

Creating a dynamic client group


Dynamic client groups prevent you from having to edit group settings when you add
Client resources to the NetWorker datazone. You can configure a dynamic group to
include all the clients on the NetWorker server or you can configure the dynamic
group to perform a query that generates a list of clients that is based on a matching
tag value. A tag is a string attribute that you define in a Client resource. When an
action starts in a workflow that is a member of a tagged dynamic protection group,
the policy engine dynamically generates a list of Client resources that match the tag
attribute value.
Use dynamic client groups to specify a dynamic list of Client resources for a traditional
backup, probe, check connectivity, or server backup action.

108 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Data Protection Policies

Procedure
1. In the Administration window, click Protection.
2. In the expanded left pane, right-click Groups, and then select New.
The Create Group dialog box appears, starting with the General tab.
3. In the Name attribute, type a name for the group.
The maximum number of characters for the group name is 64.

Note

After you create a group, the Name attribute is read-only.

4. From the Group Type list, select Dynamic Clients.


5. In the Comment field, type a description of the group.
6. Select the workflow in which to assign the group from the Policy-Workflow
list.

Note

You can also assign the group to a workflow when you create or edit a
workflow.

7. (Optional) On the Restricted Datazones tab, to specify the Restricted


Datazone (RDZ) for the group, select the RDZ from the list.
8. Click OK.
After you finish
Create Client resources. The Client Configuration wizard and General tab on the
Client Properties dialog box properties page provide you with the ability to assign
clients to a protection group and define one or more tags.

Supported actions in traditional backup workflows


Traditional backup workflows can optionally include a probe or check connectivity
action before the backup, and a clone action either concurrently with or after the
backup.
Probe
A probe action runs a user-defined script on a NetWorker client before the start of a
backup. A user-defined script is any program that passes a return code. If the return
code is 0 (zero), then a client backup is required. If the return code is 1, then a client
backup is not required.
Only a backup action can follow a probe action.
Check connectivity
A check connectivity action tests connectivity between clients and the NetWorker
server before a probe or backup action occurs. If the connectivity test fails, then the
backup does not occur on the client.
Traditional backup
A traditional backup is a scheduled backup of the save sets defined for the Client
resources in the assigned group. You must specify the destination storage node,
destination pool, the schedule (period and activity), and the retention period for the
backup.

Supported actions in traditional backup workflows 109


Data Protection Policies

Clone
A clone action creates a copy of one or more save sets. Cloning allows for secure
offsite storage, transfer of data from one location to another, and verification of
backups.
You can configure a clone action to occur after a backup in a single workflow, or
simultaneously with a backup action in a single workflow. You can also use save set
and query groups to define a specific list of save sets to clone, in a separate workflow.

Actions sequences in traditional backup workflows


Workflows enable you to chain together multiple actions and run them sequentially or
concurrently.
A workflow for a traditional backup can optionally include a probe or check
connectivity action before the backup, and a clone action either concurrently with or
after the backup.
The following sections provide details on supported actions that can follow the lead
action and other actions in a workflow.
All possible workflow actions for a traditional backup
The following figure illustrates the possible workflow actions that are associated with
a traditional backup.
Figure 37 All possible workflow actions for a traditional backup

Workflow path from a traditional backup action


The only action that can follow a traditional backup is a clone action.
Figure 38 Workflow path from a traditional backup action

Creating a check connectivity action


A check connectivity action tests connectivity between clients and the NetWorker
server, usually before another action such as a backup occurs.
Before you begin
Create the policy and workflow that contain the action. The check connectivity action
should be the first action in the workflow.
Procedure
1. In the expanded left pane, select the workflow, and then perform one of the
following tasks in the right pane to start the Policy Action wizard:
l If this is the first action in the workflow, select Create a new action.
l If the workflow has other actions, right-click an empty area of the Actions
pane, and then select New.

110 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Data Protection Policies

The Specify the Action Information page appears.


2. In the Name field, type the name of the action.
The maximum number of characters for the action name is 64.
3. In the Comment field, type a description for the action.
4. To ensure that the action runs when the policy or workflow that contains the
action is started, in the Enabled box, select the option. To prevent the action
from running when the policy or workflow that contains the action is started,
clear this option.

Note

When you clear the Enabled option, any action that occurs after a disabled
action will not start, even if the succeeding options are enabled.

5. From the Action Type list, select Check Connectivity.


6. When you create the action as part of the workflow configuration, the workflow
appears automatically in the Workflow box and the box is grayed out.
7. Specify the order of the action in relation to other actions in the workflow:
l If the action is part of a sequence of actions in a workflow path, select the
action that should precede this action from the Previous box.
l If the action should run concurrently with an action, select the concurrent
action from the Previous box, and then select the Concurrent checkbox.
8. Select whether to use a weekly or monthly schedule for the action:
l To specify a schedule for each day of the week, select Weekly by day.
l To specify a schedule for each day of the month, select Monthly by day.
9. Click the icon on each day to specify whether to check connectivity with the
client.
The following table provides details on the icons.

Table 4 Schedule icons

Icon Label Description


Execute Check connectivity on this
day.

Skip Do not check connectivity on


this day.

To check connectivity every day, select Execute from the list, and then click
Make All.

10. Click Next.


The Specify the Connectivity Options page appears.
11. Select the success criteria for the action:
l To specify that the connectivity check is successful only if successful
connectivity is achieved with all clients in the assigned group, select the
Succeed only after all clients succeed checkbox.

Actions sequences in traditional backup workflows 111


Data Protection Policies

l To specify that the connectivity check is successful if connectivity is


achieved with one or more clients in the assigned group, clear the checkbox.
12. Click Next.
The Specify the Advanced Options page appears.
13. (Optional) Configure advanced options and schedule overrides.

Note

Although the Retries, Retry Delay, Inactivity Timeout, or the Send


Notification options appear, the Check Connectivity action does not support
these options and ignores the values.

14. In the Parallelism field, specify the maximum number of concurrent operations
for the action.

Note

The Parallelism value should not exceed 25.

15. From the Failure Impact list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the current action if there is a failure with one of the jobs, but
continue with subsequent actions in the workflow, select Abort action.

Note

The Abort action option only applies to probe actions, and the backup
actions for the Traditional and Snapshot action types.
l To abort the entire workflow if there is a failure with one of the jobs in the
action, select Abort workflow.

Note

If any of the actions fail in the workflow, the workflow status does not appear
as interrupted or cancelled. NetWorker reports the workflow status as failed.

16. From the Soft Limit list, specify the amount of time after the action starts to
stop the initiation of new activities. The default value of 0 (zero) indicates no
limit.
17. From the Hard Limit list, specify the amount of time after the action starts to
begin terminating activities. The default value of 0 (zero) indicates no limit.
18. Optional, in Start Time specify the time to start the action.
Use the spin boxes to set the hour and minute values, and select one of the
following options from the drop-down list:
l Disabled—Do not enforce an action start time. The action will start at the
time defined by the workflow.
l Absolute—Start the action at the time specified by the values in the spin
boxes.
l Relative—Start the action after the period of time defined in the spin boxes
has elapsed after the start of the workflow.

112 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Data Protection Policies

19. Optional, configure overrides for the task that is scheduled on a specific day.
To change the month on which to schedule the override, use the navigation
buttons and the month list box. To change the year, use the spin boxes. You can
set an override in the following ways:
l Select the day in the calendar, which changes the action task for the
specific day.
l Use the action task list to select the task, then perform one of the following
steps:
n To define an override that occurs on a specific day of the week, every
week, select Specified day, then use the drop downs. Click Add Rules
based override.
n To perform the action task on the last day of the calendar month, select
Last day of the month. Click Add Rules based override.
n In the Override field, type an override.

Note

To remove an override, delete the entry from the Override field.

20. Click Next.


The Action Configuration Summary page appears.
21. Review the settings that you specified for the action, and then click Configure.
After you finish
(Optional) Create one of the following actions to automatically occur after the check
connectivity action:
l Probe
l Traditional backup

Note

This option is not available for NAS snapshot backups.


l Snapshot backup

Creating a probe action


A probe action runs a user-defined script on a NetWorker client before the start of a
backup. A user-defined script is any program that passes a return code. If the return
code is 0 (zero), then a client backup is required. If the return code is 1, then a client
backup is not required.
Before you begin
l Create the Probe resource script on the clients that use the probe. Create a client
Probe resource on the NetWorker server, and then associate the client Probe
resource with the Client resource on the NetWorker server.
l Create the policy and workflow that contain the action.
l (Optional) Create a check connectivity action to precede the probe action in the
workflow. A check connectivity action is the only supported action that can
precede a probe action in a workflow.

Actions sequences in traditional backup workflows 113


Data Protection Policies

Procedure
1. In the expanded left pane, select the workflow, and then perform one of the
following tasks in the right pane to start the Policy Action wizard:
l If this is the first action in the workflow, select Create a new action.
l If the workflow has other actions, right-click an empty area of the Actions
pane, and then select New.
The Specify the Action Information page appears.
2. In the Name field, type the name of the action.
The maximum number of characters for the action name is 64.
3. In the Comment field, type a description for the action.
4. To ensure that the action runs when the policy or workflow that contains the
action is started, in the Enabled box, select the option. To prevent the action
from running when the policy or workflow that contains the action is started,
clear this option.

Note

When you clear the Enabled option, any action that occurs after a disabled
action will not start, even if the succeeding options are enabled.

5. From the Action Type list, select Probe.

6. When you create the action as part of the workflow configuration, the workflow
appears automatically in the Workflow box and the box is grayed out.
7. Specify the order of the action in relation to other actions in the workflow:
l If the action is part of a sequence of actions in a workflow path, select the
action that should precede this action from the Previous box.
l If the action should run concurrently with an action, select the concurrent
action from the Previous box, and then select the Concurrent checkbox.
8. Select whether to use a weekly or monthly schedule for the action:
l To specify a schedule for each day of the week, select Weekly by day.
l To specify a schedule for each day of the month, select Monthly by day.
9. Click the icon on each day to specify whether to probe the client.
The following table provides details on the icons.

Table 5 Schedule icons

Icon Label Description


Execute Perform the probe on this
day.

Skip Do not perform a probe on


this day.

To perform a probe every day, select Execute from the list, and then click
Make All.

114 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Data Protection Policies

10. Click Next.


The Specify the Probe Options page appears.
11. Choose whether to start the subsequent backup action only after all probes
succeed by selecting or clearing the Start backup only after all probes
succeed checkbox:
l To start the backup only if all the probes associated with Client resources in
the assigned group succeed, select the checkbox.
l To start the backup if any one of the probes are associated with a Client
resource in the assigned group succeed, clear the checkbox.
12. Click Next.
The Specify the Advanced Options page appears.
13. In the Retries box, specify the number of times that NetWorker should retry a
failed probe or backup action, before NetWorker considers the action as failed.
When the Retries value is 0, NetWorker will not retry a failed backup or probe
action.

Note

The Retries option only applies to probe actions, and the backup actions for the
Traditional and Snapshot action types. When you specify a value for this option
in other actions, NetWorker ignores the values.

14. In the Retry Delay field, specify a delay in seconds to wait before retrying a
failed backup or probe action. When the Retry Delay value is 0, NetWorker
retries the failed backup or probe action immediately.

Note

The Retry Delay option only applies to probe actions, and the backup actions
for the Traditional and Snapshot action types. When you specify a value for this
option in other actions, NetWorker ignores the values.

15. In the Inactivity Timeout field, specify the maximum number of minutes that a
job run by an action is allowed to fail to communicate back to the server.
If the job fails to respond within the timeout value, the server considers the job
a failure. If a job fails, NetWorker retries the job immediately. This ensures that
no time is lost due to failures.
Increase the timeout value if a backup consistently aborts due to inactivity.
Inactivity timeouts may occur for backups of large save sets, backups of save
sets with large sparse files, and incremental backups of many small static files.

Note

The Inactivity Timeout option only applies to probe actions, and the backup
actions for the Traditional and Snapshot action types. When you specify a value
for this option in other actions, NetWorker ignores the values.

16. In the Parallelism field, specify the maximum number of concurrent operations
for the action.

Actions sequences in traditional backup workflows 115


Data Protection Policies

Note

The Parallelism value should not exceed 25.

17. From the Failure Impact list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the current action if there is a failure with one of the jobs, but
continue with subsequent actions in the workflow, select Abort action.

Note

The Abort action option only applies to probe actions, and the backup
actions for the Traditional and Snapshot action types.
l To abort the entire workflow if there is a failure with one of the jobs in the
action, select Abort workflow.

Note

If any of the actions fail in the workflow, the workflow status does not appear
as interrupted or cancelled. NetWorker reports the workflow status as failed.

18. Leave the default selections for the Notification group box. NetWorker does not
support notifications for probe actions and ignores the values that are defined
in the attributes.
19. From the Soft Limit list, specify the amount of time after the action starts to
stop the initiation of new activities. The default value of 0 (zero) indicates no
limit.
20. From the Hard Limit list, specify the amount of time after the action starts to
begin terminating activities. The default value of 0 (zero) indicates no limit.
21. Optional, in Start Time specify the time to start the action.
Use the spin boxes to set the hour and minute values, and select one of the
following options from the drop-down list:
l Disabled—Do not enforce an action start time. The action will start at the
time defined by the workflow.
l Absolute—Start the action at the time specified by the values in the spin
boxes.
l Relative—Start the action after the period of time defined in the spin boxes
has elapsed after the start of the workflow.

22. Optional, configure overrides for the task that is scheduled on a specific day.
To change the month on which to schedule the override, use the navigation
buttons and the month list box. To change the year, use the spin boxes. You can
set an override in the following ways:
l Select the day in the calendar, which changes the action task for the
specific day.
l Use the action task list to select the task, then perform one of the following
steps:

116 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Data Protection Policies

n To define an override that occurs on a specific day of the week, every


week, select Specified day, then use the drop downs. Click Add Rules
based override.
n To perform the action task on the last day of the calendar month, select
Last day of the month. Click Add Rules based override.
n In the Override field, type an override.

Note

To remove an override, delete the entry from the Override field.

23. Click Next.


The Action Configuration Summary page appears.
24. Review the settings that you specified for the action, and then click Configure.

Creating a traditional backup action


A traditional backup is a scheduled backup of the save sets defined for the Client
resources in the assigned group for the workflow.
Before you begin
l Create the policy and workflow that contain the action.
l Optional, create actions to precede the backup action in the workflow. Supported
actions that can precede a backup include:
n Probe
n Check connectivity
Procedure
1. In the expanded left pane, select the workflow, and then perform one of the
following tasks in the right pane to start the Policy Action wizard:
l If this is the first action in the workflow, select Create a new action.
l If the workflow has other actions, right-click an empty area of the Actions
pane, and then select New.
The Specify the Action Information page appears.
2. In the Name field, type the name of the action.
The maximum number of characters for the action name is 64.
3. In the Comment field, type a description for the action.
4. To ensure that the action runs when the policy or workflow that contains the
action is started, in the Enabled box, select the option. To prevent the action
from running when the policy or workflow that contains the action is started,
clear this option.

Note

When you clear the Enabled option, any action that occurs after a disabled
action will not start, even if the succeeding options are enabled.

5. From the Action Type list, select Backup.


6. From the secondary action list, select the backup type, for example,
Traditional.

Actions sequences in traditional backup workflows 117


Data Protection Policies

7. When you create the action as part of the workflow configuration, the workflow
appears automatically in the Workflow box and the box is grayed out.
8. Specify the order of the action in relation to other actions in the workflow:
l If the action is part of a sequence of actions in a workflow path, select the
action that should precede this action from the Previous box.
l If the action should run concurrently with an action, select the concurrent
action from the Previous box, and then select the Concurrent checkbox.
9. Select whether to use a weekly or monthly schedule for the action:
l To specify a schedule for each day of the week, select Weekly by day.
l To specify a schedule for each day of the month, select Monthly by day.
10. Click the icon on each day to specify the backup level to perform.
The following table provides details about the backup level that each icon
represents.

Table 6 Schedule icons

Icon Label Description

Full Perform a full backup on this


day. Full backups include all
files, regardless of whether
the files changed.

Incr Perform an incremental


backup on this day.
Incremental backups include
files that have changed since
the last backup of any type
(full or incremental).

Cumulative Incr Perform a cumulative


incremental backup.
Cumulative incremental
backups include files that
have changed since the last
full backup.

Logs Only Perform a backup of only


database transaction logs.

Incremental Synthetic Perform an incremental


Full synthetic backup on this day.
An incremental synthetic full
backup includes all data that
changed since the last full
backup and subsequent
incremental backups to create
a synthetic full backup.

Skip Do not perform a backup on


this day.

To perform the same type of backup on each day, select the backup type from
the list and click Make All.

118 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Data Protection Policies

11. Click Next.


The Specify the Backup Options page appears.
12. From the Destination storage node box, select the storage node that contains
the devices on which to store the backup data.
13. From the Destination pool box, select a pool that contains the devices on
which to store the backup data.
14. From the Retention boxes, specify the amount of time to retain the backup
data.
After the retention period expires, the save set is removed from the client file
index and marked as recyclable in the media database during an expiration
server maintenance task.

15. From the Client Override Behavior box, specify how NetWorker uses certain
client configuration attributes that perform the same function as attributes in
the Action resource.
l Client Can Override—The values in the Client resource for Schedule, Pool,
Retention policy, and the Storage Node attributes take precedence over
the values that are defined in the equivalent Action resource attributes.
l Client Can Not Override —The values in the Action resource for the
Schedule, Destination Pool, Destination Storage Node, and the
Retention attributes take precedence over the values that are defined in the
equivalent Client resource attributes.
l Legacy Backup Rules—This value only appears in actions that are created
by the migration process. The updating process sets the Client Override
Behavior for the migrated backup actions to Legacy Backup Rules.

16. Click Next.


The Specify the Advanced Options page appears.
17. In the Retries box, specify the number of times that NetWorker should retry a
failed probe or backup action, before NetWorker considers the action as failed.
When the Retries value is 0, NetWorker will not retry a failed backup or probe
action.

Note

The Retries option only applies to probe actions, and the backup actions for the
Traditional and Snapshot action types. When you specify a value for this option
in other actions, NetWorker ignores the values.

18. In the Retry Delay field, specify a delay in seconds to wait before retrying a
failed backup or probe action. When the Retry Delay value is 0, NetWorker
retries the failed backup or probe action immediately.

Note

The Retry Delay option only applies to probe actions, and the backup actions
for the Traditional and Snapshot action types. When you specify a value for this
option in other actions, NetWorker ignores the values.

19. In the Inactivity Timeout field, specify the maximum number of minutes that a
job run by an action is allowed to fail to communicate back to the server.

Actions sequences in traditional backup workflows 119


Data Protection Policies

If the job fails to respond within the timeout value, the server considers the job
a failure. If a job fails, NetWorker retries the job immediately. This ensures that
no time is lost due to failures.
Increase the timeout value if a backup consistently aborts due to inactivity.
Inactivity timeouts may occur for backups of large save sets, backups of save
sets with large sparse files, and incremental backups of many small static files.

Note

The Inactivity Timeout option only applies to probe actions, and the backup
actions for the Traditional and Snapshot action types. When you specify a value
for this option in other actions, NetWorker ignores the values.

20. In the Parallelism field, specify the maximum number of concurrent operations
for the action.

Note

The Parallelism value should not exceed 25.

21. From the Failure Impact list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the current action if there is a failure with one of the jobs, but
continue with subsequent actions in the workflow, select Abort action.

Note

The Abort action option only applies to probe actions, and the backup
actions for the Traditional and Snapshot action types.
l To abort the entire workflow if there is a failure with one of the jobs in the
action, select Abort workflow.

Note

If any of the actions fail in the workflow, the workflow status does not appear
as interrupted or cancelled. NetWorker reports the workflow status as failed.

22. From the Soft Limit list, specify the amount of time after the action starts to
stop the initiation of new activities. The default value of 0 (zero) indicates no
limit.
23. From the Hard Limit list, specify the amount of time after the action starts to
begin terminating activities. The default value of 0 (zero) indicates no limit.
24. Optional, in Start Time specify the time to start the action.
Use the spin boxes to set the hour and minute values, and select one of the
following options from the drop-down list:
l Disabled—Do not enforce an action start time. The action will start at the
time defined by the workflow.
l Absolute—Start the action at the time specified by the values in the spin
boxes.
l Relative—Start the action after the period of time defined in the spin boxes
has elapsed after the start of the workflow.

120 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Data Protection Policies

25. Optional, configure overrides for the task that is scheduled on a specific day.
To change the month on which to schedule the override, use the navigation
buttons and the month list box. To change the year, use the spin boxes. You can
set an override in the following ways:
l Select the day in the calendar, which changes the action task for the
specific day.
l Use the action task list to select the task, then perform one of the following
steps:
n To define an override that occurs on a specific day of the week, every
week, select Specified day, then use the drop downs. Click Add Rules
based override.
n To perform the action task on the last day of the calendar month, select
Last day of the month. Click Add Rules based override.
n In the Override field, type an override.

Note

To remove an override, delete the entry from the Override field.

26. From the Send Notifications list box, select whether to send notifications for
the action:
l Select Set at policy level to use the notification configuration that is
defined in the Policy resource to send the notification.
l Select On Completion to send a notification on completion of the action.
l Select On Failure to send a notification only if the action fails to complete.

27. In the Send notification attribute when you select the On Completion or On
failure option, the Command box appears. Use this box to configure how
NetWorker sends the notifications. You can use the nsrlog action to write the
notifications to a log file or configure an email notification.
The default notification action is to log the information to the
policy_notifications.log file. The policy_notifications.log file
is located in the /nsr/logs directory on Linux and the C:\Program Files
\EMC NetWorker\nsr\logs folder on Windows, by default. You can use the
smtpmail application on Windows or the default mailer program on Linux to
send email messages.
For example:
l To log notifications to a file named policy_notifications.log, type
the following command:

nsrlog -f policy_notifications.log
l On Linux, to send a notification email, type the following command:

mail -s subject recipient


l On Window, to send a notification email, type the following command:

smtpmail -s subject -h mailserver recipient1@mailserver


recipient2@mailserver...

where:

Actions sequences in traditional backup workflows 121


Data Protection Policies

n -s subject—Includes a standard email header with the message and


specifies the subject text for that header. Without this option, the
smtpmail program assumes that the message contains a correctly
formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to
relay the SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the
notification. Multiple email recipients are separated by a space.

28. Click Next.


The Action Configuration Summary page appears.
29. Review the settings that you specified for the action, and then click Configure.
After you finish
(Optional) Create a clone action to automatically clone the save sets after the backup.
A clone action is the only supported action after a backup action in a workflow.

Creating a clone action


A clone action creates a copy of one or more save sets. Cloning allows for secure
offsite storage, the transfer of data from one location to another, and the verification
of backups.
Before you begin
When cloning to or from a Cloud Tier device, the source and destination devices must
reside on the same mtree.
Procedure
1. In the expanded left pane, select the workflow, and then perform one of the
following tasks in the right pane to start the Policy Action wizard:
l If this is the first action in the workflow, select Create a new action.
l If the workflow has other actions, right-click an empty area of the Actions
pane, and then select New.
The Specify the Action Information page appears.
2. In the Name field, type the name of the action.
The maximum number of characters for the action name is 64.
3. In the Comment field, type a description for the action.
4. To ensure that the action runs when the policy or workflow that contains the
action is started, in the Enabled box, select the option. To prevent the action
from running when the policy or workflow that contains the action is started,
clear this option.

Note

When you clear the Enabled option, any action that occurs after a disabled
action will not start, even if the succeeding options are enabled.

5. From the Action Type list, select Clone.


6. When you create the action as part of the workflow configuration, the workflow
appears automatically in the Workflow box and the box is grayed out.

122 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Data Protection Policies

7. Specify the order of the action in relation to other actions in the workflow:
l If the action is part of a sequence of actions in a workflow path, select the
action that should precede this action from the Previous box.
l If the action should run concurrently with an action, select the concurrent
action from the Previous box, and then select the Concurrent checkbox.
8. Select whether to use a weekly or monthly schedule for the action:
l To specify a schedule for each day of the week, select Weekly by day.
l To specify a schedule for each day of the month, select Monthly by day.
9. Click the icon on each day to specify whether to perform cloning.
The following table provides details on the icons.

Table 7 Schedule icons

Icon Label Description


Execute Perform cloning on this day.

Skip Do not perform cloning on


this day.

To perform cloning every day, select Execute from the list and click Make All.

10. Click Next.


The Specify the Clone Options page appears.
11. In the Data Movement group box, define the volumes and devices for the
source data and the clone data.
a. From the Source Storage Node list, select the storage node host that
contains the save set data in which to clone.
b. From the Destination Storage Node list, select the storage node host on
which to store the cloned save sets.

Note

To clone to a DD Cloud Tier device, the source and destination storage node
devices must reside on the same mtree.

c. In the Delete source save sets after clone completes, select the option to
instruct NetWorker to move the data from the source volume to the
destination volume after clone operation completes. This is equivalent to
staging the save sets.
d. From the Destination pool list, select a clone pool.
To clone to a DD Cloud Tier device, select a Cloud Tier pool.

e. From the Retention list, specify the amount of time to retain the cloned
save sets.
After the retention period expires, the save sets are marked as recyclable
during an expiration server maintenance task.

Actions sequences in traditional backup workflows 123


Data Protection Policies

12. In the Filters group box, define the criteria that NetWorker uses to create the
list of eligible save sets to clone. The eligible save sets must match the
requirements that are defined in each filter. NetWorker provides the following
filter options:
a. Time filter—Use the Time section to define the time range in which
NetWorker should inspect, when searching for eligible save sets to clone in
the media database. Use the spin boxes to specify the start of the time
range and the end of the time range. The Time filter list includes three
options, which define how NetWorker determines save set eligibility, based
on the time criteria:
l Do Not Filter—NetWorker inspects the save sets in the media database
to create a clone save set list that meets the filter criteria.
l Accept—The clone save set list includes save sets whose save time is
within the time range that is specified by the spin boxes and meet all the
other defined filter criteria.
l Reject—The clone save set list does not include save sets whose save
time is within the time range that is specified by the spin boxes and meet
all the other defined filter criteria.
b. Save Set filter—Use the Save Set section to instruct NetWorker to include
or exclude ProtectPoint and Snapshot save sets, when searching for eligible
save sets to clone in the media database. The Save Set filter list includes
three options, which define how NetWorker determines save set eligibility,
based on the save set criteria:
l Do Not Filter—NetWorker inspects the save sets in the media database
to create a clone save set list that meets the filter criteria.
l Accept—The clone save set list includes eligible ProtectPoint or
Snapshot save sets, when you also enable the ProtectPoint or Snapshot
checkboxes.
l Reject—The clone save set list does not include eligible ProtectPoint
and Snapshot save sets when you also enable the ProtectPoint and
Snapshot checkboxes.
c. Clients filter—Use the Client section to define a list of clients to include or
exclude, when NetWorker searches for eligible save sets to clone in the
media database. The Client list includes three options, which define how
NetWorker determines save set eligibility, based on the client criteria:
l Do Not Filter—NetWorker inspects save sets that are associated with
the clients in the media database, to create a clone save set list that
meets the filter criteria.
l Accept—The clone save set list includes eligible save sets for the
selected clients.
l Reject—The clone save set list does not include eligible save sets for the
selected clients.
d. Levels filter—Use the Levels section to define a list of backup levels to
include or exclude, when NetWorker searches for eligible save sets to clone
in the media database. The Levels filter list includes three options, which
define how NetWorker determines save set eligibility, based on the level
criteria:
l Do Not Filter—NetWorker inspects save sets regardless of level in the
media database, to create a clone save set list that meets all the filter
criteria.

124 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Data Protection Policies

l Accept—The clone save set list includes eligible save sets with the
selected backup levels.
l Reject—The clone save set list does not include eligible save sets with
the selected backup levels.

13. Click Next.


The Specify the Advanced Options page appears.
14. Configure advanced options, including notifications and schedule overrides.

Note

Although the Retries, Retry Delay, or the Inactivity Timeout options appear,
the clone action does not support these options and ignores the values.

15. In the Parallelism field, specify the maximum number of concurrent operations
for the action.

Note

The Parallelism value should not exceed 25.

16. From the Failure Impact list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the current action if there is a failure with one of the jobs, but
continue with subsequent actions in the workflow, select Abort action.

Note

The Abort action option only applies to probe actions, and the backup
actions for the Traditional and Snapshot action types.
l To abort the entire workflow if there is a failure with one of the jobs in the
action, select Abort workflow.

Note

If any of the actions fail in the workflow, the workflow status does not appear
as interrupted or cancelled. NetWorker reports the workflow status as failed.

17. From the Send Notifications list box, select whether to send notifications for
the action:
l Select Set at policy level to use the notification configuration that is
defined in the Policy resource to send the notification.
l Select On Completion to send a notification on completion of the action.
l Select On Failure to send a notification only if the action fails to complete.

18. In the Send notification attribute when you select the On Completion or On
failure option, the Command box appears. Use this box to configure how
NetWorker sends the notifications. You can use the nsrlog action to write the
notifications to a log file or configure an email notification.
The default notification action is to log the information to the
policy_notifications.log file. The policy_notifications.log file

Actions sequences in traditional backup workflows 125


Data Protection Policies

is located in the /nsr/logs directory on Linux and the C:\Program Files


\EMC NetWorker\nsr\logs folder on Windows, by default. You can use the
smtpmail application on Windows or the default mailer program on Linux to
send email messages.
For example:
l To log notifications to a file named policy_notifications.log, type
the following command:

nsrlog -f policy_notifications.log
l On Linux, to send a notification email, type the following command:

mail -s subject recipient


l On Window, to send a notification email, type the following command:

smtpmail -s subject -h mailserver recipient1@mailserver


recipient2@mailserver...

where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the
smtpmail program assumes that the message contains a correctly
formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to
relay the SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the
notification. Multiple email recipients are separated by a space.

19. From the Soft Limit list, specify the amount of time after the action starts to
stop the initiation of new activities. The default value of 0 (zero) indicates no
limit.
20. From the Hard Limit list, specify the amount of time after the action starts to
begin terminating activities. The default value of 0 (zero) indicates no limit.
21. Optional, in Start Time specify the time to start the action.
Use the spin boxes to set the hour and minute values, and select one of the
following options from the drop-down list:
l Disabled—Do not enforce an action start time. The action will start at the
time defined by the workflow.
l Absolute—Start the action at the time specified by the values in the spin
boxes.
l Relative—Start the action after the period of time defined in the spin boxes
has elapsed after the start of the workflow.

22. Optional, configure overrides for the task that is scheduled on a specific day.
To change the month on which to schedule the override, use the navigation
buttons and the month list box. To change the year, use the spin boxes. You can
set an override in the following ways:
l Select the day in the calendar, which changes the action task for the
specific day.
l Use the action task list to select the task, then perform one of the following
steps:

126 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Data Protection Policies

n To define an override that occurs on a specific day of the week, every


week, select Specified day, then use the drop downs. Click Add Rules
based override.
n To perform the action task on the last day of the calendar month, select
Last day of the month. Click Add Rules based override.
n In the Override field, type an override.

Note

To remove an override, delete the entry from the Override field.

23. Click Next.


The Action Configuration Summary page appears.
24. Review the settings that you specified for the action, and then click Configure.
After you finish
(Optional) Create a clone action to automatically clone the save sets again after this
clone action. Another clone action is the only supported action after a clone action in a
workflow.

Note

To clone data from a Cloud Tier device, the destination storage node must contain
DDBoost devices that reside on the same mtree as the Cloud Tier device.

Visual representation of workflows


When you create actions for a workflow, a map provides a visual representation of the
actions in the second right pane of the Protection window of the Administration
interface.
The following figure illustrates the visual representation of a sample workflow for a
traditional backup.
Figure 39 Visual representation of a workflow

The oval icon at the beginning of the visual representation specifies the group to
which the workflow applies, the rounded rectangle icons identify actions, and the
parallelogram icons identify the destination pool for the action.
l Adjust the display of the visual representation by right-clicking and selecting one
of the following options:
n Zoom In—Use to increase the size of the visual representation.
n Zoom Out—Use to decrease the size of the visual representation.
n Zoom Area—Use to limit the display to a single section of the visual
representation.
n Fit Content—Use to fit the visual representation to the window area.
n Reset—Use to reset the visual representation to the default settings.

Visual representation of workflows 127


Data Protection Policies

n Overview—To view a separate dialog box with a high-level view of the visual
representation and a legend of the icons.
l View and edit the properties for the group, action, or destination pool by right-
clicking the icon for the item and selecting Properties.
l Create a group, action, or destination pool by right-clicking the icon for the item
and selecting New.

Cloning with Data Domain (DD Boost)


As with other NetWorker devices, you can use Data Domain device types to perform
clone operations. You can clone single save sets or the entire Data Domain volume
from a Data Domain device. You can also use the Data Domain device as the target
device, to receive cloned data.
Cloning works differently for deduplication devices. You can perform clone-controlled
replication (CCR), or optimized cloning of data, from one Data Domain system to
another. Or you can clone data from a Data Domain device to tape or to any other
device type.

Clone formats
Yo can clone data that is stored on a Data Domain device in one of two formats, which
depend on the target media device:
l CCR format
l Regular clone format

Clone-controlled replication format


When you clone data to a target Data Domain device, typically at a remote location,
the data retains the deduplication format. This format is known as clone-controlled
replication (CCR), or as an optimized clone.
CCR uses the native Data Domain replication feature to copy data from one Data
Domain system to another.
CCR uses a special Data Domain API and differs from standard directory level
replication, which is also supported. The clone is created quickly and uses low
bandwidth and low storage capacity.
You can use a clone that is created in this format for data recovery or to create
further copies, for example, to traditional disk or tape storage. This method results in
minimal impact on production or primary backup and recovery operations.
Immediate cloning
NetWorker supports immediate cloning with CCR. Immediate cloning means that you
can clone each save set when the backup completes instead of waiting until the
backup completes for all save sets in the action. Cloning operations can complete
sooner because they can now run in parallel instead of sequentially. Performance gains
are most noticeable when there are many backup save sets in the backup queue or
when there are many save sets of different sizes.
You can set up immediate cloning by specifying the clone action as concurrent to the
previous backup action in a policy workflow.

128 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Data Protection Policies

Regular clone format


When you clone the data on the Data Domain device to a traditional disk or tape, the
clone process reverts the data to the native non-deduplicated format, known as
"regular clone" format.
NetWorker requires the data on traditional disk or tape to be in regular clone format to
ensure that the data is completely recoverable, without the need of a Data Domain
system.
The process that takes data that has been deduplicated and then reverts it to normal
or regular data is called rehydration.

CCR requirements
Before you use CCR to clone data, ensure that following requirements are met.
1. Ensure that both the source and target storage nodes are clients of the same
NetWorker server.
2. Ensure that the Data Domain systems are properly licensed, including a replication
license, which is required to create optimized clones.
3. Ensure that the Client resource for the NetWorker server and both storage nodes
specify all of the host identifiers in the Aliases attribute.
l Fully-qualified domain name
l Short name
l Aliases
l IP address

Note

If you use an nsrclone command to perform an optimized clone from a host


that is not the NetWorker server, then you must specify the primary hostname
of the NetWorker server by using the -S option. The primary hostname of the
NetWorker server is the name that appears in the NMC Enterprise view.
Otherwise, a regular clone might be produced instead of an optimized clone.

4. Ensure that a target pool, for example, newclonepool, has been created for Backup
Clone type with the Media type required attribute set to Data Domain.
With this setting, if a Data Domain device is not available for a clone operation in
the specified target pool, then NMC displays a "Media waiting" message.
5. Ensure that the source Data Domain device is mounted and available on the source
storage node.
If the source device is not mounted, then NetWorker will perform a regular, non-
deduplicated clone. However, if the specified target pool is of Backup Clone type
with the Media type required attribute set to Data Domain a non-deduplicated
clone will not be performed.
6. Ensure that the target Data Domain device is labeled for a clone pool, and mounted
on the target storage node. The pool selected for the device label operation, for
example, newclonepool, must be of Backup Clone pool type.
7. Verify that the target clone pool, for example, newclonepool, is properly specified
or selected:
l For CLI clone operations, use the nsrclone -b newclonepool command.

CCR requirements 129


Data Protection Policies

l For the clone action, in the Destination pool attribute of the Action resource,
select newclonepool.
l For clones of entire volumes, Cloning by pools provides details.

Cloning by pools
To copy save sets from Data Domain storage to a Data Domain device, you must
specify a pool. This pool is known as a "clone pool." A clone pool must be assigned to a
device on the target Data Domain system, where it will be available for use.
There are two main purposes for a clone pool:
l To copy existing deduplicated VTL or CIFS/NFS AFTD save sets to a Data Domain
device.
l To copy the existing save sets from one Data Domain device to another Data
Domain device, typically at a remote location for disaster recovery purposes.

DD Boost clone and replication support


For additional data protection, you can use the NetWorker clone feature to copy save
sets on a DD Boost device to a different location. A clone is a complete and
independent copy of the data that you can use for data recovery or to create
additional clones. You can clone single save sets or the entire volume of a DD Boost
device. A clone retains the original NetWorker browse and retention policies by
default.
You can configure clones to run immediately after each save set completes, or you can
configure clones to run in an independently defined maintenance window after the
entire policy completes in the main backup window.

Clone formats
The type of NetWorker clone you produce depends on the type of storage media you
use for the clone. NetWorker will use either CCR when cloning to DD Boost devices or
a normal clone when cloning to conventional storage media.

CCR format
When NetWorker clones data from a source DD Boost device to a target DD Boost
device, usually at a geographically distant location, the operation uses CCR, also
known as optimized clone or DD format clone. CCR is a fast process that uses low
bandwidth, multiple parallel sessions, and low storage capacity. You can use CCR
clones for data recovery or to create additional copies with minimal impact on the
primary operations of production, backup, or recovery.
CCR operations use only IP connectivity between DD Boost devices on separate Data
Domain systems, whether you have configured the participating devices for FC or IP.
For CCR operations on the same Data Domain system, EMC recommends that you
replicate the data between two different SUs (MTrees), so you can apply different
retention policies and manage the data independently. When you perform CCR
operations to disks that reside within the same Data Domain system, CCR uses fast
copy operation.
During the CCR process, the storage node reviews the incoming clone for data that
NetWorker has already stored on the target DD Boost device. The storage node stores
only unique data that does not exist on the device.

130 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Data Protection Policies

Normal clone format


When NetWorker clones data from a DD Boost device to conventional media, for
example, or tape, the data reverts to the non-deduplicated format. This procedure
creates a normal clone. The normal clone format is necessary for the data on
conventional disk or tape storage to be fully recoverable, for example, for disaster
recovery, without the need of a Data Domain system.

Native Data Domain replication considerations


EMC recommends that you do not use native Data Domain replication operations to
clone data. Native replication is normally used to copy deduplicated data stored in
CIFS, NFS, or VTL formats from one Data Domain system to another for disaster
recovery purposes. Native replication clones data independently of NetWorker and DD
Boost, and the NetWorker software cannot track or control native replication
operations.
An exception would be to seed a new Data Domain system by collection replication to
assist the migration of existing data. Migration versus native Data Domain replication
on page 190 provides details.

Note

If you use Data Domain replication for non-DD Boost directories on the same system,
ensure that the system and the network has enough capacity to enable NetWorker
CCR operation with DD Boost devices.

Before you use native Data Domain replication with DD Boost devices review the
following information:
l Directory replication ( MTree replication) does not support DD Boost devices.
l Collection replication, which is the replication of the entire stored contents of a
Data Domain system, renders DD Boost devices as read-only. This operation will
replicate all DD Boost devices and the stored data onto a target Data Domain
system. You cannot use the replicated DD Boost data for other replication
operations, such as NetWorker CCR.

Note

When you perform a collection replication of a Data Domain system, the


NetWorker software is not aware of any DD Boost devices on that system.
Additional procedures, tests, and qualifications are required to configure
NetWorker to detect the devices and enable data recovery of the replicated DD
Boost data. Contact EMC Professional services for assistance.

Data Domain Automated Multi-streaming (AMS)


The AMS feature improves cloning performance for large savesets when you use high
bandwidth networks. Previously when you replicated savesets between two Data
Domain devices on different machines, the replication process used to take longer in
NetWorker. AMS significantly speeds up replication between DDRs by splitting up
large files (files whose sizes are roughly greater than 3.5 GB) into multiple smaller 2
GB slices, replicating the slices individually, and finally re-creating the original large file
on the destination DDR using those slices.

Native Data Domain replication considerations 131


Data Protection Policies

NetWorker 8.2.3 and NetWorker 9.0.1 and later features enhancements for clone-
controlled replication (CCR), also known as DD to DD Managed File Replication. Also,
enhancements to load balancing so that the load (save sets to clone) is spread evenly
across the multi-threaded nsrclone process were implemented.
By default the AMS feature is disabled. You can turn on the feature by changing the
command to ams_enabled=yes An example of how you can enable AMS is below:

racdd098:/nsr/debug # cat nsrcloneconfig


max_total_dd_streams=256
ams_enabled=yes
ams_slice_size_factor=31
ams_preferred_slice_count=0
ams_min_concurrent_slice_count=1
ams_max_concurrent_slice_count=20
max_threads_per_client=256
ams_force_multithreaded=yes

Note

Both Data Domains should be connected through a 10GB network.

Configuring the Data Domain CCR environment


This section describes how to configure the network environment for CCR
Before you begin
l To use Data Domain encryption, global compression, or low-bandwidth
optimization, enable these configurations on both the source and target Data
Domain systems.

Note

If any of these configurations do not match on both the source and target Data
Domain systems, clone operations will fail.

The EMC Data Domain Operating System Administration Guide provides details on
these settings.
l On the NetWorker server and both storage nodes, configure the Client resource
Aliases field on the Globals 1 of 2 tab with a list of all the names and aliases in use
for the CCR. Include the fully qualified name, short name, aliases, and IP address.
l Select or create a target pool for the CCR, configured for Backup Clone type with
the Media Type Required field set to Data Domain.
If a DD Boost device that is targeted by the pool is not available during a CCR, and
the media type required specifies Data Domain, then NMC displays a Media
Waiting message.

Note

Do not use the Default Clone Pool. You cannot change the Media type required
setting.

Complete the following steps to configure the network environment for CCR:
Procedure
1. Ensure that you have enabled valid licenses to the Data Domain systems that
you will use for CCR operations, including a Replication license.

132 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Data Protection Policies

2. Ensure that the source and destination storage nodes are within the same
datazone. A single NetWorker server must manage the clone operations and
maintain the retention policies for all cloned copies. The server also monitors
and reports on the storage operations.
3. Ensure Ethernet IP connectivity between the source and destination Data
Domain systems. CCR occurs only over TCP/IP connectivity. If a DD Boost
device participating in the CCR also has an FC connection, ensure IP access to
the DD Boost device.
4. Ensure that you map the Data Domain FC server name to the IP address, if the
Domain FC and IP hostnames differ.

Note

Do not use connections with ifgroup links for clone operations.

Data Domain FC and IP hostnames are the same by default but they can be
different. If they are different you must map the host Data Domain FC server
name to its own IP address as follows:

a. Open the Data Domain Enterprise Manager, and navigate to the Data
Management > DD Boost. The Data Domain Server Name appears on the
Fibre Channel tab.
Alternatively, type the following command:

ddboost fc dfc-server-name show

b. Associate this server name to the IP address in the /etc/hosts file with
the following command:
net hosts add fc_server_name IP_address

For example, if the Data Domain system has the IP address 10.99.99.99 and
the IP hostname dd555-5.lss.mcm.com, and the DFC server name is dd-
tenendo, then type the following command:

net hosts add dd-tenendo 10.99.99.99

5. Mount the source DD Boost device on the source storage node.


6. Mount the target DD Boost device on the target storage node. The pool for the
device must specify Backup Clone pool type.
7. Ensure that the target clone pool is properly specified for the clone method you
use. Clone save sets will be written to this pool. You may need to use multiple or
mixed approaches for control and flexibility.
The following example use myccrpool as the name of a clone pool you created:
l For CLI clone operations, you would use the command nsrclone -b
myccrpool.

Strategies for cloning


Scheduled cloning occurs through configuration of data protection policies. You can
configure cloning to occur concurrently or after a backup, as part of a single workflow.
The decision of whether to clone data immediately after a backup or as a separate

Strategies for cloning 133


Data Protection Policies

workflow depends on specific circumstances, such as the amount of resources that


are required for the backup and recovery time objective.
You can use a clone action in one of the following ways:
l After a backup action in a backup workflow.
l In a separate workflow.
l As the head action in workflow that uses a Query or Save set protection group.

Note

The Backup Data Management chapter describes how you can clone save sets
manually by using the nsrclone command.

The EMC NetWorker Cloning Integration Guide provides details on scheduling


considerations for cloning.

Road map for configuring a new cloning data protection policy


This road map provides a high level overview of how to configure a new policy for
clone operations.
Before you begin
Configure the backup policy to back up the data that is cloned.
Procedure
1. Create a group to define the data to clone.

2. Create a policy. When you create a policy, you specify the name and notification
settings for the policy.
3. Within the policy, create a workflow. When you create a workflow, you specify
the name of the workflow, the schedule for running the workflow, notification
settings for the workflow, and the protection group to which the workflow
applies.
4. Create one or more clone actions for the workflow.

Protection groups for a cloning workflow


You can use two types of protection groups to clone save sets in a workflow that are
separate from backup workflows. The type of protection group that you use depends
on the way that you plan to configure the workflow.
Use a save set group or a query group to specify a list of save sets if cloning occurs as
the head action in a cloning workflow:
l Save set group—Use a save set group in clone-only workflows where you want to
clone a specific list of save sets. Save set groups are similar to the manual clone
operations in NetWorker 8.2.x and earlier.
l Query group—Use a query group in clone-only workflows where you want to clone
save sets on an ongoing basis, based on the save set criteria that you define.
Query groups are similar to the scheduled clone operations in NetWorker 8.2.x and
earlier.

134 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Data Protection Policies

Note

To clone save sets in a backup workflow, use basic client group or a dynamic client
group. Strategies for traditional backups provides detailed information about how to
create clone actions in a traditional backup workflow.

Create multiple protection groups to perform cloning in different ways as part of


separate workflows, or to perform cloning for different save sets on different
schedules. For example:
l Create a basic client group for a workflow that performs a traditional backup of
the a client file system followed by cloning of the save sets that result from the
backup.
l Create a query group that identifies full save sets in the last two days to clone.

Creating a save set group


A save set group defines a static list of save sets for cloning or for snapshot index
generation.
Before you begin
Determine the save set ID or clone ID (ssid/clonid) of the save sets for the group by
using the Administration > Media user interface or the mminfo command.
Procedure
1. In the Administration window, click Protection.
2. In the expanded left pane, right-click Groups, and then select New.
The Create Group dialog box appears, starting with the General tab.
3. In the Name box, type a name for the group.
4. From the Group Type list, select Save Set ID List.
5. In the Comment box, type a description of the group.
6. (Optional) To associate the group with a workflow, from the Workflow (Policy)
list, select the workflow .
You can also assign the group to a workflow when you create or edit a
workflow.
7. In the Clone specific save sets (save set ID/clone ID) box, type the save set
ID/clone ID (ssid/clonid) identifiers.
To specify multiple entries, type each value on a separate line.
8. To specify the Restricted Data Zone (RDZ) for the group, select the Restricted
Data Zones tab, and then select the RDZ from the list.
9. Click OK.

Creating a query group


A query group defines a list of save sets for cloning or snapshot index generation,
based on a list of save set criteria.
Procedure
1. In the Administration window, click Protection.
2. In the expanded left pane, right-click Groups, and then select New.
The Create Group dialog box appears, starting with the General tab.

Road map for configuring a new cloning data protection policy 135
Data Protection Policies

3. In the Name box, type a name for the group.


4. From the Group Type list, select Save Set Query.
5. In the Comment box, type a description of the group.
6. (Optional) To associate the group with a workflow, from the Workflow (Policy)
list, select the workflow.
You can also assign the group to a workflow when you create or edit a
workflow.
7. Specify one or more of the save set criteria in the following table.

Note

When you specify more than one save set criteria, the list of save sets only
includes save sets that match all the specified criteria.

Table 8 Save set criteria

Criteria Description
Date and time range Specify the start date and time range for the save sets.

To specify the current date and time as the end date for the
range, select Up to now.

To specify a different date and time as the end date for the
range, select Up to, and then select the date and time from
the lists.

Backup level In the Filter save sets by level section, next to the backup
level for the save set, select the checkbox:
l full
l cumulative incr
l logs
l incremental
l manual

Limit the number of clones Specify the number for the limit in the Limit number of
clones list. The clone limit is the maximum number of clone
instances that can be created for the save set.

Note

The default is set to 0, and cannot be changed for NAS or


Block.

Client Next to one or more client resources that are associated with
the save set in the Client list, select the checkbox.

Policy Next to the policy used to generate the save set in the Policy
list, select the checkbox.

Workflow Next to the workflow used to generate the save set in the
Workflow list, select the checkbox.

136 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Data Protection Policies

Table 8 Save set criteria (continued)

Criteria Description
Action Next to the action used to generate the save set in the
Action list, select the checkbox.
Group Next to the group associated with the save set in the Group
list, select the checkbox.

Pools Next to the media pool on which the save set is stored in the
Pools list, select the checkbox.

Note

You cannot select Pools for NAS.

Name In the Filter save sets by name box, specify the name of
the save set.

Note

You cannot use wildcards to specify the save set name.

If you specify multiple criteria, the save set must match all the criteria to belong
to the group.

8. To specify the Restricted Data Zone (RDZ) for the group, select the Restricted
Data Zones tab, and then select the RDZ from the list.
9. Click OK.

Creating a policy
Procedure
1. On the Administration window, click Protection.
2. In the expanded left pane, right-click Policies, and then select New.
The Create Policy dialog box appears.
3. On the General tab, in the Name field type a name for the policy.
The maximum number of characters for the policy name is 128.

Note

After you create a policy, the Name attribute is read-only.

4. In the Comment box, type a description for the policy.


5. From the Send Notifications list, select whether to send notifications for the
policy:
l To avoid sending notifications, select Never.
l To send notifications with information about each successful and failed
workflow and action after all the actions in the policy complete, select On
Completion.
l To send a notification with information about each failed workflow and
action after all the actions in the policy complete, select On Failure.

Road map for configuring a new cloning data protection policy 137
Data Protection Policies

6. In the Send notification attribute when you select the On Completion or On


failure option, the Command box appears. Use this box to configure how
NetWorker sends the notifications. You can use the nsrlog action to write the
notifications to a log file or configure an email notification.
The default notification action is to log the information to the
policy_notifications.log file. The policy_notifications.log file
is located in the /nsr/logs directory on Linux and the C:\Program Files
\EMC NetWorker\nsr\logs folder on Windows, by default. You can use the
smtpmail application on Windows or the default mailer program on Linux to
send email messages.
For example:
l To log notifications to a file named policy_notifications.log, type
the following command:

nsrlog -f policy_notifications.log
l On Linux, to send a notification email, type the following command:

mail -s subject recipient


l For NetWorker Virtual Edition (NVE), to send a notification email, type the
following command:

/usr/sbin/sendmail -v recipient_email "subject_text"


l On Windows, to send a notification email, type the following command:

smtpmail -s subject -h mailserver recipient1@mailserver


recipient2@mailserver...

where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the
smtpmail program assumes that the message contains a correctly
formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to
relay the SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the
notification. Multiple email recipients are separated by a space.

7. To specify the Restricted Data Zone (RDZ) for the policy, select the Restricted
Data Zones tab, and then select the RDZ from the list.
8. Click OK.
After you finish
Create the workflows and actions for the policy.

Creating a workflow in a new policy


A policy must contain one or more workflows.
Procedure
1. In the left pane of the Protection window, expand Policies, and then select the
policy that you created.
2. In the right pane of the Protection window, select Create a new workflow.

138 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Data Protection Policies

3. In the Name field, type the name of the workflow.


The maximum number of allowed characters for the Name field is 64.
4. In the Comment box, type a description for the workflow. The maximum
number of allowed characters for the Comment field is 128.
5. From the Send Notifications list, select how to send notifications for the
workflow:
l To use the notification configuration that is defined in the policy resource to
determine when to send the notification, select Set at policy level.
l To send notifications with information about each successful and failed
workflow and action, after all the actions in the workflow complete, select
On Completion.
l To send notifications with information about each failed workflow and
action, after all the actions in the workflow complete, select On Failure.
6. In the Send notification attribute when you select the On Completion or On
failure option, the Command box appears. Use this box to configure how
NetWorker sends the notifications. You can use the nsrlog action to write the
notifications to a log file or configure an email notification.
The default notification action is to log the information to the
policy_notifications.log file. The policy_notifications.log file
is located in the /nsr/logs directory on Linux and the C:\Program Files
\EMC NetWorker\nsr\logs folder on Windows, by default. You can use the
smtpmail application on Windows or the default mailer program on Linux to
send email messages.
For example:
l To log notifications to a file named policy_notifications.log, type
the following command:

nsrlog -f policy_notifications.log
l On Linux, to send a notification email, type the following command:

mail -s subject recipient


l For NetWorker Virtual Edition (NVE), to send a notification email, type the
following command:

/usr/sbin/sendmail -v recipient_email "subject_text"


l On Windows, type the following command:

smtpmail -s subject -h mailserver recipient1@mailserver


recipient2@mailserver...

where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the
smtpmail program assumes that the message contains a correctly
formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to
relay the SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the
notification. Multiple email recipients are separated by a space.

Road map for configuring a new cloning data protection policy 139
Data Protection Policies

7. In the Running group box, define when and how often the workflow runs.
a. To ensure that the actions contained in the workflow run when the policy or
workflow is started, in the Enabled box, leave the option selected. To
prevent the actions in the workflow from running when the policy or
workflow that contains the action is started, clear this option.
b. To ensure that the workflow starts at the time that is specified in the Start
time attribute, on the days that are defined in the action resource, in the
AutoStart Enabled box, leave the option selected. To prevent the workflow
from running at the time that is specified in the Start time attribute, clear
this option.
c. To define the time to start the actions in the workflow, in the Start Time
attribute, use the spin boxes.
The default value is 9:00 P.M.

d. To define how frequently to repeat the actions that are defined in the
workflow over a 24 hour period, In the Interval attribute, use the spin boxes.
The default value is 24 hours, or once a day. When you select a value that is
less than 24 hours, the Interval End attribute appears. To define the last
time to start a workflow in a defined interval period, use the spin boxes.

e. To define the duration of time in which NetWorker can manually or


automatically restart a failed or canceled workflow, in the Restart Window
attribute, use the spin boxes.
If the restart window has elapsed, NetWorker considers the restart as a new
run of the workflow. NetWorker calculates the restart window from the start
of the last incomplete workflow. The default value is 24 hours.

For example, when you set the Start Time to 7:00 PM, the Interval to 1 hour,
and the Interval end time to 11:00 P.M., then the workflow automatically starts
every hour beginning at 7:00 P.M. and the last start time is 11:00 PM.
8. To create the workflow, click OK.
After you finish
Create the actions that will occur in the workflow, and then assign a group to the
workflow. If a workflow does not contain a group, a policy does not perform any
actions.

Workflows for scheduled cloning


A workflow can contain one or more clone actions.
Supported workflow path from a clone action
Another clone action is the only supported action after a clone action.
Figure 40 Workflow path from a clone action

140 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Data Protection Policies

Creating a clone action


A clone action creates a copy of one or more save sets. Cloning allows for secure
offsite storage, the transfer of data from one location to another, and the verification
of backups.
Before you begin
When cloning to or from a Cloud Tier device, the source and destination devices must
reside on the same mtree.
Procedure
1. In the expanded left pane, select the workflow, and then perform one of the
following tasks in the right pane to start the Policy Action wizard:
l If this is the first action in the workflow, select Create a new action.
l If the workflow has other actions, right-click an empty area of the Actions
pane, and then select New.
The Specify the Action Information page appears.
2. In the Name field, type the name of the action.
The maximum number of characters for the action name is 64.
3. In the Comment field, type a description for the action.
4. To ensure that the action runs when the policy or workflow that contains the
action is started, in the Enabled box, select the option. To prevent the action
from running when the policy or workflow that contains the action is started,
clear this option.

Note

When you clear the Enabled option, any action that occurs after a disabled
action will not start, even if the succeeding options are enabled.

5. From the Action Type list, select Clone.


6. When you create the action as part of the workflow configuration, the workflow
appears automatically in the Workflow box and the box is grayed out.
7. Specify the order of the action in relation to other actions in the workflow:
l If the action is part of a sequence of actions in a workflow path, select the
action that should precede this action from the Previous box.
l If the action should run concurrently with an action, select the concurrent
action from the Previous box, and then select the Concurrent checkbox.
8. Select whether to use a weekly or monthly schedule for the action:
l To specify a schedule for each day of the week, select Weekly by day.
l To specify a schedule for each day of the month, select Monthly by day.
9. Click the icon on each day to specify whether to perform cloning.
The following table provides details on the icons.

Road map for configuring a new cloning data protection policy 141
Data Protection Policies

Table 9 Schedule icons

Icon Label Description


Execute Perform cloning on this day.

Skip Do not perform cloning on


this day.

To perform cloning every day, select Execute from the list and click Make All.

10. Click Next.


The Specify the Clone Options page appears.
11. In the Data Movement group box, define the volumes and devices for the
source data and the clone data.
a. From the Source Storage Node list, select the storage node host that
contains the save set data in which to clone.
b. From the Destination Storage Node list, select the storage node host on
which to store the cloned save sets.

Note

To clone to a DD Cloud Tier device, the source and destination storage node
devices must reside on the same mtree.

c. In the Delete source save sets after clone completes, select the option to
instruct NetWorker to move the data from the source volume to the
destination volume after clone operation completes. This is equivalent to
staging the save sets.
d. From the Destination pool list, select a clone pool.
To clone to a DD Cloud Tier device, select a Cloud Tier pool.

e. From the Retention list, specify the amount of time to retain the cloned
save sets.
After the retention period expires, the save sets are marked as recyclable
during an expiration server maintenance task.
12. In the Filters group box, define the criteria that NetWorker uses to create the
list of eligible save sets to clone. The eligible save sets must match the
requirements that are defined in each filter. NetWorker provides the following
filter options:
a. Time filter—Use the Time section to define the time range in which
NetWorker should inspect, when searching for eligible save sets to clone in
the media database. Use the spin boxes to specify the start of the time
range and the end of the time range. The Time filter list includes three
options, which define how NetWorker determines save set eligibility, based
on the time criteria:
l Do Not Filter—NetWorker inspects the save sets in the media database
to create a clone save set list that meets the filter criteria.

142 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Data Protection Policies

l Accept—The clone save set list includes save sets whose save time is
within the time range that is specified by the spin boxes and meet all the
other defined filter criteria.
l Reject—The clone save set list does not include save sets whose save
time is within the time range that is specified by the spin boxes and meet
all the other defined filter criteria.
b. Save Set filter—Use the Save Set section to instruct NetWorker to include
or exclude ProtectPoint and Snapshot save sets, when searching for eligible
save sets to clone in the media database. The Save Set filter list includes
three options, which define how NetWorker determines save set eligibility,
based on the save set criteria:
l Do Not Filter—NetWorker inspects the save sets in the media database
to create a clone save set list that meets the filter criteria.
l Accept—The clone save set list includes eligible ProtectPoint or
Snapshot save sets, when you also enable the ProtectPoint or Snapshot
checkboxes.
l Reject—The clone save set list does not include eligible ProtectPoint
and Snapshot save sets when you also enable the ProtectPoint and
Snapshot checkboxes.
c. Clients filter—Use the Client section to define a list of clients to include or
exclude, when NetWorker searches for eligible save sets to clone in the
media database. The Client list includes three options, which define how
NetWorker determines save set eligibility, based on the client criteria:
l Do Not Filter—NetWorker inspects save sets that are associated with
the clients in the media database, to create a clone save set list that
meets the filter criteria.
l Accept—The clone save set list includes eligible save sets for the
selected clients.
l Reject—The clone save set list does not include eligible save sets for the
selected clients.
d. Levels filter—Use the Levels section to define a list of backup levels to
include or exclude, when NetWorker searches for eligible save sets to clone
in the media database. The Levels filter list includes three options, which
define how NetWorker determines save set eligibility, based on the level
criteria:
l Do Not Filter—NetWorker inspects save sets regardless of level in the
media database, to create a clone save set list that meets all the filter
criteria.
l Accept—The clone save set list includes eligible save sets with the
selected backup levels.
l Reject—The clone save set list does not include eligible save sets with
the selected backup levels.

13. Click Next.


The Specify the Advanced Options page appears.
14. Configure advanced options, including notifications and schedule overrides.

Road map for configuring a new cloning data protection policy 143
Data Protection Policies

Note

Although the Retries, Retry Delay, or the Inactivity Timeout options appear,
the clone action does not support these options and ignores the values.

15. In the Parallelism field, specify the maximum number of concurrent operations
for the action.

Note

The Parallelism value should not exceed 25.

16. From the Failure Impact list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the current action if there is a failure with one of the jobs, but
continue with subsequent actions in the workflow, select Abort action.

Note

The Abort action option only applies to probe actions, and the backup
actions for the Traditional and Snapshot action types.
l To abort the entire workflow if there is a failure with one of the jobs in the
action, select Abort workflow.

Note

If any of the actions fail in the workflow, the workflow status does not appear
as interrupted or cancelled. NetWorker reports the workflow status as failed.

17. From the Send Notifications list box, select whether to send notifications for
the action:
l Select Set at policy level to use the notification configuration that is
defined in the Policy resource to send the notification.
l Select On Completion to send a notification on completion of the action.
l Select On Failure to send a notification only if the action fails to complete.

18. In the Send notification attribute when you select the On Completion or On
failure option, the Command box appears. Use this box to configure how
NetWorker sends the notifications. You can use the nsrlog action to write the
notifications to a log file or configure an email notification.
The default notification action is to log the information to the
policy_notifications.log file. The policy_notifications.log file
is located in the /nsr/logs directory on Linux and the C:\Program Files
\EMC NetWorker\nsr\logs folder on Windows, by default. You can use the
smtpmail application on Windows or the default mailer program on Linux to
send email messages.
For example:
l To log notifications to a file named policy_notifications.log, type
the following command:

nsrlog -f policy_notifications.log

144 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Data Protection Policies

l On Linux, to send a notification email, type the following command:

mail -s subject recipient


l On Window, to send a notification email, type the following command:

smtpmail -s subject -h mailserver recipient1@mailserver


recipient2@mailserver...

where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the
smtpmail program assumes that the message contains a correctly
formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to
relay the SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the
notification. Multiple email recipients are separated by a space.

19. From the Soft Limit list, specify the amount of time after the action starts to
stop the initiation of new activities. The default value of 0 (zero) indicates no
limit.
20. From the Hard Limit list, specify the amount of time after the action starts to
begin terminating activities. The default value of 0 (zero) indicates no limit.
21. Optional, in Start Time specify the time to start the action.
Use the spin boxes to set the hour and minute values, and select one of the
following options from the drop-down list:
l Disabled—Do not enforce an action start time. The action will start at the
time defined by the workflow.
l Absolute—Start the action at the time specified by the values in the spin
boxes.
l Relative—Start the action after the period of time defined in the spin boxes
has elapsed after the start of the workflow.

22. Optional, configure overrides for the task that is scheduled on a specific day.
To change the month on which to schedule the override, use the navigation
buttons and the month list box. To change the year, use the spin boxes. You can
set an override in the following ways:
l Select the day in the calendar, which changes the action task for the
specific day.
l Use the action task list to select the task, then perform one of the following
steps:
n To define an override that occurs on a specific day of the week, every
week, select Specified day, then use the drop downs. Click Add Rules
based override.
n To perform the action task on the last day of the calendar month, select
Last day of the month. Click Add Rules based override.
n In the Override field, type an override.

Road map for configuring a new cloning data protection policy 145
Data Protection Policies

Note

To remove an override, delete the entry from the Override field.

23. Click Next.


The Action Configuration Summary page appears.
24. Review the settings that you specified for the action, and then click Configure.
After you finish
(Optional) Create a clone action to automatically clone the save sets again after this
clone action. Another clone action is the only supported action after a clone action in a
workflow.

Note

To clone data from a Cloud Tier device, the destination storage node must contain
DDBoost devices that reside on the same mtree as the Cloud Tier device.

Visual representation of a clone workflow


When you create actions for a workflow, a map provides a visual representation of the
actions in the second right pane of the Protection window of the Administration
interface.
The following figure illustrates the visual representation of a clone workflow.
Figure 41 Visual representation of a clone workflow

The oval icon at the beginning of the visual representation specifies the group to
which the workflow applies, the rounded rectangle icons identify actions, and the
parallelogram icons identify the destination pool for the action.
You can work directly in the visual representation of a workflow to perform the
following tasks:
l Adjust the display of the visual representation by right-clicking and selecting one
of the following options:
n Zoom In—Use to increase the size of the visual representation.
n Zoom Out—Use to decrease the size of the visual representation.
n Zoom Area—Use to limit the display to a single section of the visual
representation.
n Fit Content—Use to fit the visual representation to the window area.
n Reset—Use to reset the visual representation to the default settings.
n Overview—To view a separate dialog box with a high-level view of the visual
representation and a legend of the icons.
l View and edit the properties for the group, action, or destination pool by right-
clicking the icon for the item and selecting Properties.
l Create a group, action, or destination pool by right-clicking the icon for the item
and selecting New.

146 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Data Protection Policies

Road map to add a clone workflow to an existing policy


This road map provides a high level overview of how to create a clone workflow and
add the workflow to an existing backup policy.
Before you begin
Configure the backup policy to back up the data that is cloned.
Procedure
1. Create a query or save set group to define the data to clone.
2. Add the new group to an existing policy.
3. Create a workflow in the existing policy.
4. Create one or more clone actions for the workflow.

Example: Creating a policy that has a separate workflow for cloning


The following figure provides a high level overview of the configuration of a policy that
contains two workflows, one for backups and one to clone a list of save sets.
Figure 42 Example of a policy with separate workflows for backup and cloning

Note

The amount of data and length of time that is required to complete the backup can
impact the ability to clone data when the backup and clone workflows are in the same
policy. For example, if the clone action starts before the backup action completes,
there might not be any data yet to clone, or in other cases, only the save sets that
completed at the start time of the workflow is taken into account. In both cases,
NetWorker marks the Clone Workflow as successful, but there is no guarantee that all
the data from the backup workflow was cloned.

Road map to add a clone workflow to an existing policy 147


Data Protection Policies

Protection groups for a cloning workflow


You can use two types of protection groups to clone save sets in a workflow that are
separate from backup workflows. The type of protection group that you use depends
on the way that you plan to configure the workflow.
Use a save set group or a query group to specify a list of save sets if cloning occurs as
the head action in a cloning workflow:
l Save set group—Use a save set group in clone-only workflows where you want to
clone a specific list of save sets. Save set groups are similar to the manual clone
operations in NetWorker 8.2.x and earlier.
l Query group—Use a query group in clone-only workflows where you want to clone
save sets on an ongoing basis, based on the save set criteria that you define.
Query groups are similar to the scheduled clone operations in NetWorker 8.2.x and
earlier.

Note

To clone save sets in a backup workflow, use basic client group or a dynamic client
group. Strategies for traditional backups provides detailed information about how to
create clone actions in a traditional backup workflow.

Create multiple protection groups to perform cloning in different ways as part of


separate workflows, or to perform cloning for different save sets on different
schedules. For example:
l Create a basic client group for a workflow that performs a traditional backup of
the a client file system followed by cloning of the save sets that result from the
backup.
l Create a query group that identifies full save sets in the last two days to clone.

Creating a save set group


A save set group defines a static list of save sets for cloning or for snapshot index
generation.
Before you begin
Determine the save set ID or clone ID (ssid/clonid) of the save sets for the group by
using the Administration > Media user interface or the mminfo command.
Procedure
1. In the Administration window, click Protection.
2. In the expanded left pane, right-click Groups, and then select New.
The Create Group dialog box appears, starting with the General tab.
3. In the Name box, type a name for the group.
4. From the Group Type list, select Save Set ID List.
5. In the Comment box, type a description of the group.
6. (Optional) To associate the group with a workflow, from the Workflow (Policy)
list, select the workflow .
You can also assign the group to a workflow when you create or edit a
workflow.
7. In the Clone specific save sets (save set ID/clone ID) box, type the save set
ID/clone ID (ssid/clonid) identifiers.

148 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Data Protection Policies

To specify multiple entries, type each value on a separate line.


8. To specify the Restricted Data Zone (RDZ) for the group, select the Restricted
Data Zones tab, and then select the RDZ from the list.
9. Click OK.

Creating a query group


A query group defines a list of save sets for cloning or snapshot index generation,
based on a list of save set criteria.
Procedure
1. In the Administration window, click Protection.
2. In the expanded left pane, right-click Groups, and then select New.
The Create Group dialog box appears, starting with the General tab.
3. In the Name box, type a name for the group.
4. From the Group Type list, select Save Set Query.
5. In the Comment box, type a description of the group.
6. (Optional) To associate the group with a workflow, from the Workflow (Policy)
list, select the workflow.
You can also assign the group to a workflow when you create or edit a
workflow.
7. Specify one or more of the save set criteria in the following table.

Note

When you specify more than one save set criteria, the list of save sets only
includes save sets that match all the specified criteria.

Table 10 Save set criteria

Criteria Description
Date and time range Specify the start date and time range for the save sets.

To specify the current date and time as the end date for the
range, select Up to now.

To specify a different date and time as the end date for the
range, select Up to, and then select the date and time from
the lists.

Backup level In the Filter save sets by level section, next to the backup
level for the save set, select the checkbox:
l full
l cumulative incr
l logs
l incremental
l manual

Road map to add a clone workflow to an existing policy 149


Data Protection Policies

Table 10 Save set criteria (continued)

Criteria Description
Limit the number of clones Specify the number for the limit in the Limit number of
clones list. The clone limit is the maximum number of clone
instances that can be created for the save set.

Note

The default is set to 0, and cannot be changed for NAS or


Block.

Client Next to one or more client resources that are associated with
the save set in the Client list, select the checkbox.

Policy Next to the policy used to generate the save set in the Policy
list, select the checkbox.

Workflow Next to the workflow used to generate the save set in the
Workflow list, select the checkbox.
Action Next to the action used to generate the save set in the
Action list, select the checkbox.
Group Next to the group associated with the save set in the Group
list, select the checkbox.

Pools Next to the media pool on which the save set is stored in the
Pools list, select the checkbox.

Note

You cannot select Pools for NAS.

Name In the Filter save sets by name box, specify the name of
the save set.

Note

You cannot use wildcards to specify the save set name.

If you specify multiple criteria, the save set must match all the criteria to belong
to the group.

8. To specify the Restricted Data Zone (RDZ) for the group, select the Restricted
Data Zones tab, and then select the RDZ from the list.
9. Click OK.

Editing an existing policy to create a workflow and clone action


Use the Policies window to create a workflow and create the clone action.
Procedure
1. In the Administration window, click Protection.
2. In the expanded left pane, expand Policies, and then select the existing policy.
3. In the right pane, right-click in the workflow section and select New, and select
Properties.

150 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Data Protection Policies

The New Workflow dialog box appears.


4. In the Name field, type the name of the workflow.
The maximum number of allowed characters for the Name field is 64.
5. In the Comment box, type a description for the workflow. The maximum
number of allowed characters for the Comment field is 128.
6. From the Send Notifications list, select how to send notifications for the
workflow:
l To use the notification configuration that is defined in the policy resource to
determine when to send the notification, select Set at policy level.
l To send notifications with information about each successful and failed
workflow and action, after all the actions in the workflow complete, select
On Completion.
l To send notifications with information about each failed workflow and
action, after all the actions in the workflow complete, select On Failure.
7. In the Send notification attribute when you select the On Completion or On
failure option, the Command box appears. Use this box to configure how
NetWorker sends the notifications. You can use the nsrlog action to write the
notifications to a log file or configure an email notification.
The default notification action is to log the information to the
policy_notifications.log file. The policy_notifications.log file
is located in the /nsr/logs directory on Linux and the C:\Program Files
\EMC NetWorker\nsr\logs folder on Windows, by default. You can use the
smtpmail application on Windows or the default mailer program on Linux to
send email messages.
For example:
l To log notifications to a file named policy_notifications.log, type
the following command:

nsrlog -f policy_notifications.log
l On Linux, to send a notification email, type the following command:

mail -s subject recipient


l On Windows, to send a notification email, type the following command:

smtpmail -s subject -h mailserver recipient1@mailserver


recipient2@mailserver...

where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the
smtpmail program assumes that the message contains a correctly
formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to
relay the SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the
notification. Multiple email recipients are separated by a space.

8. In the Running group box, define when and how often the workflow runs.
a. To ensure that the actions contained in the workflow run when the policy or
workflow is started, in the Enabled box, leave the option selected. To

Road map to add a clone workflow to an existing policy 151


Data Protection Policies

prevent the actions in the workflow from running when the policy or
workflow that contains the action is started, clear this option.
b. To ensure that the workflow starts at the time that is specified in the Start
time attribute, on the days that are defined in the action resource, in the
AutoStart Enabled box, leave the option selected. To prevent the workflow
from running at the time that is specified in the Start time attribute, clear
this option.
c. To define the time to start the actions in the workflow, in the Start Time
attribute, use the spin boxes.
The default value is 9:00 P.M.

d. To define how frequently to repeat the actions that are defined in the
workflow over a 24 hour period, In the Interval attribute, use the spin boxes.
The default value is 24 hours, or once a day. When you select a value that is
less than 24 hours, the Interval End attribute appears. To define the last
time to start a workflow in a defined interval period, use the spin boxes.

e. To define the duration of time in which NetWorker can manually or


automatically restart a failed or canceled workflow, in the Restart Window
attribute, use the spin boxes.
If the restart window has elapsed, NetWorker considers the restart as a new
run of the workflow. NetWorker calculates the restart window from the start
of the last incomplete workflow. The default value is 24 hours.

For example, when you set the Start Time to 7:00 PM, the Interval to 1 hour,
and the Interval end time to 11:00 P.M., then the workflow automatically starts
every hour beginning at 7:00 P.M. and the last start time is 11:00 PM.
9. In the Groups group box, specify the protection group to which the workflow
applies.
To use a group, select a protection group from the Groups list. To create a
protection group, click the + button that is located to the right of the Groups
list.
10. Click Add.
The Policy Action Wizard appears.
11. In the Name field, type the name of the action.
The maximum number of characters for the action name is 64.
12. In the Comment field, type a description for the action.
13. To ensure that the action runs when the policy or workflow that contains the
action is started, in the Enabled box, select the option. To prevent the action
from running when the policy or workflow that contains the action is started,
clear this option.

Note

When you clear the Enabled option, any action that occurs after a disabled
action will not start, even if the succeeding options are enabled.

14. From the Action type list, select Clone.


15. Specify the order of the action in relation to other actions in the workflow:

152 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Data Protection Policies

l If the action is part of a sequence of actions in a workflow path, select the


action that should precede this action from the Previous box.
l If the action should run concurrently with an action, select the concurrent
action from the Previous box, and then select the Concurrent checkbox.
16. Select whether to use a weekly or monthly schedule for the action:
l To specify a schedule for each day of the week, select Weekly by day.
l To specify a schedule for each day of the month, select Monthly by day.
17. Click the icon on each day to specify whether to perform cloning.
The following table provides details on the icons.

Table 11 Schedule icons

Icon Label Description


Execute Perform cloning on this day.

Skip Do not perform cloning on


this day.

To perform cloning every day, select Execute from the list and click Make All.

18. Click Next.


The Specify the Clone Options page appears.
19. In the Data Movement group box, define the volumes and devices to which
NetWorker sends the clone data.
a. From the Destination Storage Node list, select the storage node with the
devices on which to store the cloned save sets.
b. In the Delete source save sets after clone completes, select the option to
instruct NetWorker to move the data from the source volume to the
destination volume after clone operation completes. This is equivalent to
staging the save sets.
c. From the Destination Pool list, select the target media pool for the cloned
save sets.
d. From the Retention list, specify the amount of time to retain the cloned
save sets.
After the retention period expires, the save sets are marked as recyclable
during an expiration server maintenance task.
20. In the Filters group box, define the criteria that NetWorker uses to create the
list of eligible save sets to clone. The eligible save sets must match the
requirements that are defined in each filter. NetWorker provides the following
filter options:
a. Time filter—Use the Time section to define the time range in which
NetWorker should inspect, when searching for eligible save sets to clone in
the media database. Use the spin boxes to specify the start of the time
range and the end of the time range. The Time filter list includes three
options, which define how NetWorker determines save set eligibility, based
on the time criteria:

Road map to add a clone workflow to an existing policy 153


Data Protection Policies

l Do Not Filter—NetWorker inspects the save sets in the media database


to create a clone save set list that meets the filter criteria.
l Accept—The clone save set list includes save sets whose save time is
within the time range that is specified by the spin boxes and meet all the
other defined filter criteria.
l Reject—The clone save set list does not include save sets whose save
time is within the time range that is specified by the spin boxes and meet
all the other defined filter criteria.
b. Save Set filter—Use the Save Set section to instruct NetWorker to include
or exclude ProtectPoint and Snapshot save sets, when searching for eligible
save sets to clone in the media database. The Save Set filter list includes
three options, which define how NetWorker determines save set eligibility,
based on the save set criteria:
l Do Not Filter—NetWorker inspects the save sets in the media database
to create a clone save set list that meets the filter criteria.
l Accept—The clone save set list includes eligible ProtectPoint or
Snapshot save sets, when you also enable the ProtectPoint or Snapshot
checkboxes.
l Reject—The clone save set list does not include eligible ProtectPoint
and Snapshot save sets when you also enable the ProtectPoint and
Snapshot checkboxes.
c. Clients filter—Use the Client section to define a list of clients to include or
exclude, when NetWorker searches for eligible save sets to clone in the
media database. The Client list includes three options, which define how
NetWorker determines save set eligibility, based on the client criteria:
l Do Not Filter—NetWorker inspects save sets that are associated with
the clients in the media database, to create a clone save set list that
meets the filter criteria.
l Accept—The clone save set list includes eligible save sets for the
selected clients.
l Reject—The clone save set list does not include eligible save sets for the
selected clients.
d. Levels filter—Use the Levels section to define a list of backup levels to
include or exclude, when NetWorker searches for eligible save sets to clone
in the media database. The Levels filter list includes three options, which
define how NetWorker determines save set eligibility, based on the level
criteria:
l Do Not Filter—NetWorker inspects save sets regardless of level in the
media database, to create a clone save set list that meets all the filter
criteria.
l Accept—The clone save set list includes eligible save sets with the
selected backup levels.
l Reject—The clone save set list does not include eligible save sets with
the selected backup levels.

21. Click Next.


The Specify the Advanced Options page appears.
22. Configure advanced options, including notifications and schedule overrides.

154 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Data Protection Policies

Note

Although the Retries, Retry Delay, or the Inactivity Timeout options appear,
the clone action does not support these options, and ignores the values.

23. In the Parallelism field, specify the maximum number of concurrent operations
for the action.

Note

The Parallelism value should not exceed 25.

24. From the Failure Impact list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the current action if there is a failure with one of the jobs, but
continue with subsequent actions in the workflow, select Abort action.

Note

The Abort action option only applies to probe actions, and the backup
actions for the Traditional and Snapshot action types.
l To abort the entire workflow if there is a failure with one of the jobs in the
action, select Abort workflow.

Note

If any of the actions fail in the workflow, the workflow status does not appear
as interrupted or cancelled. NetWorker reports the workflow status as failed.

25. From the Send Notifications list box, select whether to send notifications for
the action:
l Select Set at policy level to use the notification configuration that is
defined in the Policy resource to send the notification.
l Select On Completion to send a notification on completion of the action.
l Select On Failure to send a notification only if the action fails to complete.

26. In the Send notification attribute when you select the On Completion or On
failure option, the Command box appears. Use this box to configure how
NetWorker sends the notifications. You can use the nsrlog action to write the
notifications to a log file or configure an email notification.
The default notification action is to log the information to the
policy_notifications.log file. The policy_notifications.log file
is located in the /nsr/logs directory on Linux and the C:\Program Files
\EMC NetWorker\nsr\logs folder on Windows, by default. You can use the
smtpmail application on Windows or the default mailer program on Linux to
send email messages.
For example:
l To log notifications to a file named policy_notifications.log, type
the following command:

nsrlog -f policy_notifications.log

Road map to add a clone workflow to an existing policy 155


Data Protection Policies

l On Linux, to send a notification email, type the following command:

mail -s subject recipient


l On Window, to send a notification email, type the following command:

smtpmail -s subject -h mailserver recipient1@mailserver


recipient2@mailserver...

where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the
smtpmail program assumes that the message contains a correctly
formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to
relay the SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the
notification. Multiple email recipients are separated by a space.

27. From the Soft Limit list, specify the amount of time after the action starts to
stop the initiation of new activities. The default value of 0 (zero) indicates no
limit.
28. From the Hard Limit list, specify the amount of time after the action starts to
begin terminating activities. The default value of 0 (zero) indicates no limit.
29. Optional, configure overrides for the task that is scheduled on a specific day.
To change the month on which to schedule the override, use the navigation
buttons and the month list box. To change the year, use the spin boxes. You can
set an override in the following ways:
l Select the day in the calendar, which changes the action task for the
specific day.
l Use the action task list to select the task, then perform one of the following
steps:
n To define an override that occurs on a specific day of the week, every
week, select Specified day, then use the drop downs. Click Add Rules
based override.
n To perform the action task on the last day of the calendar month, select
Last day of the month. Click Add Rules based override.
n In the Override field, type an override.

Note

To remove an override, delete the entry from the Override field.

30. Click Next.


The Action Configuration Summary page appears.
31. Review the settings that you specified for the action, and then click Configure.

Clone reports
You can use the NMC Reports view to access reports of NetWorker clone operations
on a Data Domain system. Generating reports on page 174 provides details.

156 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Data Protection Policies

Monitoring the status of Cloud Tier save sets


The clone flag (clflags) attribute of a save set displays the status of a save set on a
Cloud Tier device. A T flag appears in the clflags attribute for a save set that resides
on a Cloud Tier device and does not yet reside in the public cloud. The T flag does not
appear after the save set is successfully cloned to the public cloud. Use the mminfo
command and the NMC save sets window to determine the status of save sets on a
Cloud Tier device.
Using mminfo to review the status of a save set cloned to a Cloud Tier device
Use the mminfo command to display the clone flag status of a save set from a
command prompt.
For example, to display the status of a Cloud Tier save set on all Cloud Tier volumes,
type the following command:

mminfo -av -r ssid,cloneid,volume,sumsize,name,clflags

The following figure provides an example of the mminfo output for a save set that
resides on a Cloud Tier device and does not yet reside in the public cloud.
Figure 43 mminfo output for Cloud Tier save set

Using NMC to review the status of a save set cloned to a Cloud Tier device
Use the Save set window to review the status of save set on a Cloud Tier device. A T
flag appears in the Save Set Flags column for a save set that resides on a Cloud Tier
device but does not yet reside in the public cloud.
To review the status of a save set on a Cloud Tier device, perform the following steps:
1. Connect to the NetWorker server by using NMC, and then on the Administration
window, click Media.
2. On the left navigation pane, select Save Sets.
3. Click the Save Set List tab.
4. (Optional) From the View menu, select Choose Table Columns, and then select
Save Set Flags.
Figure 44 Status of Cloud Tier save sets in NMC

The Save Set Flags column displays a T for a save set that resides on a Cloud Tier
device but does not yet reside in the public cloud.

Monitoring the status of Cloud Tier save sets 157


Data Protection Policies

Cloning with nsrclone


Use the nsrclone command to configure detailed CCR operations that you can
launch by either running the nsrclone command manually or by scheduling a task on
the operating system or an external scheduler that runs the nsrclone command.
This method is best for larger environments where flexibility and control of conditions
are necessary. Some examples are as follows:
l Start clone job B, which clones to tape storage, if and only if clone job A, which
performs CCR, has successfully completed.
l Clone only specific save sets to specified storage nodes or specified devices.
l Perform a CCR from a host other than the NetWorker server or a NetWorker
storage node. This command must specify the NetWorker server by its primary
hostname. Use the hostname listed in the NMC Enterprise view. Otherwise, the
CCR operation may produce normal clones instead.
Scripted solutions require additional knowledge and have external dependencies, such
as operating systems and scripting tools, that are beyond the scope of this guide.
The EMC NetWorker Administration Guide and the EMC NetWorker Command Reference
Guide provide more details. EMC Professional Services can also provide assistance.

Staging data from DD Cloud Tier devices


NetWorker supports staging, or moving data to a DD Cloud Tier device from a Data
Domain device. NetWorker does not support staging data from a DD Cloud Tier
device.
Before you begin
The DD Cloud Tier device that receives the staged data must reside on the same
storage unit at the Data Domain device.
Perform the following steps to stage all the data from a Data Domain device to a DD
Cloud Tier device.

Note

The EMC NetWorker Administration Guide provides detailed information about staging.

Procedure
1. In the Administration window, click Devices.
2. In the left navigation pane, select Staging.
3. From the File menu, select New.
The Create Staging dialog box appears, starting with the General tab.
4. In the Name box, type a name for the staging policy.
5. In the Comment attribute, type a description for the staging policy.
6. In the Enabled attribute, select Yes to enable the staging policy or No to
disable the staging policy.
When you select Yes, NetWorker automatically starts the staging policy, based
on the configuration settings that you define.
7. In the Devices attribute, select the check boxes next to each source device
from which you want to stage data.

158 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Data Protection Policies

You can assign multiple devices to a single staging policy. However, you cannot
assign a single device to multiple staging policies.
8. In the Destination pool attribute, select a DD Cloud Tier pool. For example, DD
Cloud Tier Default Clone.
9. In the Configuration group box, specify the criteria that starts the staging
policy.
The following table summarizes the available criteria that you can define for the
staging policy.

Table 12 Staging criteria options

Option Configuration steps

High water mark (%) Use these options to start the stage policy based on the amount
of used disk space on the file system partition on the source
Low water mark (%) device. You must define a value higher than the value defined in
the Low water mark (%) attribute.

High water mark (%)—Defines the upper used disk


space limit. When the percentage of used disk space reaches the
value that is defined in the High water
mark (%) attribute, NetWorker starts the stage operation to
move save sets from the
source disk.

Low water mark (%)—Defines the lower used disk space


limit. When the
percentage of used disk space reaches the value that is defined
in the
Lower water mark (%) attribute, NetWorker stops moving
save
sets from the source disk.

Note

When staging and backup operations occur concurrently on the


source disk device, NetWorker does not accurately display the
disk volume usage total in the Written column in output of the
mminfo -mv command or in the Used column on the Media
window of the NetWorker Administration application.

Save set selection Use this option to rank the order in which NetWorker stages the
save sets, based on save set size or age. Available values include:
l largest save set—Stage the save sets in order of largest
save set size to smallest save set size.
l oldest save set —Stage the save sets in order of oldest
save set to most recent save set.
l smallest save set—Stage the save sets in order of
smallest save set size to largest save set size.
l youngest save set—Stage the save sets in order of most
recent save set to least recent save set.

Staging data from DD Cloud Tier devices 159


Data Protection Policies

Table 12 Staging criteria options (continued)

Option Configuration steps

Max storage period Use this option to start the stage operation based on the amount
of time that a save set has resided on the volume.
Max storage period
unit Max storage period—Defines the number of hours or days
that a save set can
reside on a volume before the stage process considers the save
eligible to move to a
different volume.

Max storage period unit—Defines the unit of measurement


for the value in the
Max storage period attribute. Available values are
Hours and Days
The maximum storage period setting is used along with the file
system check
interval. Once the maximum storage period is reached, staging
does not begin until
the next file system check.

Recover space Use this option to determine when the stage operation removes
operation interval the successfully staged save set from the source volume.

Recover space unit Recover space interval—Defines the frequency in which


NetWorker starts of the
recover space operation, which removes successfully stage data
from the source
volume.

Recover space interval—Defines the unit of measurement


for the value in the
Recover space interval attribute. Available values are Hours
and Days.

File system check interval Use this option to define when NetWorker automatically starts
the staging process.

File System Check Interval—Defines the frequency in


which NetWorker starts the staging process. At every file system
check interval, if
either the high water mark or the maximum storage period has
been reached, then
staging begins.

File system check unit—Defines the unit of measurement for


the value in the
File System Check Interval attribute. Available values are
Hours and Days.

10. Optionally, to start the staging process immediately:


a. Select the Operations tab.

160 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Data Protection Policies

b. From the Start Now list, select the component of the staging process to
perform immediately, for all source devices that are assigned to the staging
policy:
l Recover space—To recover space for save sets with no entries in the
media database and to delete all recycled save sets.
l Select Check file system—To check the file system and stage eligible
sage set data to a destination volume.
l Select Stage all save sets—To stage all save sets to a volume in the
destination pool.
After the staging operation is complete, this option returns to the default
setting (blank).

11. Click OK.

Staging data from DD Cloud Tier devices 161


Data Protection Policies

162 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
CHAPTER 5
Restoring Data

This chapter includes the following topics:

l Restoring DD Boost deduplicated data............................................................. 164


l Restoring by Client Direct over IP from an FC-enabled device......................... 165
l Disaster recovery..............................................................................................165

Restoring Data 163


Restoring Data

Restoring DD Boost deduplicated data


You restore deduplicated data from DD Boost devices in the same way as you would
restore non-deduplicated data. Each backup consists of two components that reside
in different places:
l Deduplicated client backup data resides on the DD Boost devices on the Data
Domain system.
l Backup metadata, which specifies how long you want to retain the data and allows
you to browse the backups for recovery, resides in the media database and the
client file indexes on the NetWorker server.

Restore requirements for deduplicated data


The requirements for the restore of deduplicated data from DD Boost devices are as
follows:
l All the deduplicated data must be available on the Data Domain system. The
retention periods for the backups must not have expired.
l Both the Data Domain system and the NetWorker storage node must be online
during the restore of deduplicated data.

Data recover from DD Cloud Tier devices


Data recoveries from a DD Cloud Tier device requires a mounted Data Domain device
on the same storage unit as the DD Cloud Tier device.
When you recover file system data from a DD Cloud Tier device, the recovery process
clones the data from the DD Cloud Tier device to a Data Domain device, and then
recovers the data from the Data Domain device. NetWorker removes the clone data
from the Data Domain device 7 days later.
Before you perform a VMware or BBB recovery of data that resides on a DD Cloud
Tier device, review the following information:
l Recovering a full VMware backup from a DD Cloud Tier device is supported.
l Performing a VMware FLR recovery from a DD Cloud Tier device is not supported.
To perform a FLR recovery of data that resides only on a DD Cloud Tier device,
clone the data to a Data Domain device, and then recover the data from the Data
Domain device.
l Performing a Blocked-Based Backup (BBB) FLR recovery from a DD Cloud Tier
device is supported.
The EMC NetWorker VMware Integration Guide describes how to perform VMware
recoveries and the EMC NetWorker Administration Guide describes how to perform
BBB recoveries.

Supported NetWorker restore procedures


The data restore procedures are the same as for non-deduplicated NetWorker
backups:
l You can use NetWorker to browse the client file index to select files or save sets
to recover.
l You can perform directed restores for supported NetWorker clients and
NetWorker storage nodes.

164 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Restoring Data

l You can try to restore expired backup data by using the NetWorker scanner
program to reconstruct a media index from the surviving metadata.
The EMC NetWorker Administration Guide provides procedures for data recovery.

Note
For a Linux client which has 2 GB of memory (RAM), EMC recommends that you
recover only up to a maximum of 3500 files at a time. If you attempt to recover more
than this limit, an error message similar to the following appears:

readv from DD failed for read size 262144: Reading from a file failed
recover: Reading from a file failed [5001] ([31587] [140129876305664]
ddp_read() failed Offset 0, BytesToRead 262144, BytesRead 0 Err: 5001-Unable
to allocate file ddcl buffers rec_create: out of memory.

Restoring by Client Direct over IP from an FC-enabled


device
You can use Client Direct over an IP network to restore data from a volume that you
have mounted on an FC-enabled DD Boost device. Share the volume with an IP-
enabled device as follows.
Procedure
1. Create an IP-enabled DD Boost device on which to mount the volume, but
associate this device with a different storage node than the one that manages
the FC-enabled DD Boost device.
The storage node that you use for the IP restore must not have an FC-enabled
DD Boost device available to the volume.
Configuring DD Boost devices with the wizard on page 61 provides details.

2. Configure the devices to share the volume.


Configuring volume sharing on multiple devices on page 92 provides details.

3. Modify the Client resource for the client that will receive the restored data.
l Configure this client for Client Direct and IP connectivity.
l On the Globals (2 of 2) tab, in the Recovery storage nodes field, specify
the storage node that you associated to the IP-enabled DD Boost device.

Note

This option is now only available in the Diagnostic Mode view.

Configuring a backup client with NMC property windows provides details.


4. Mount the volume on the new IP-enabled DD Boost device and perform the
restore by using the new IP-restore Client resource.

Disaster recovery
In this guide, a disaster is any loss of data in which the computing environment
required to restore that data is not available. Disaster recovery is necessary when

Restoring by Client Direct over IP from an FC-enabled device 165


Restoring Data

ordinary data recovery procedures are not sufficient to recover the computing
environment and its data to normal day-to-day operations.

Causes of disaster
A disaster can result from any of the following situations:
l Debilitating hardware or software failures
l Computer viruses that corrupt the computing system
l Infrastructure interruptions, inconsistencies, or loss of services, such as problems
with communications or the network connections that result in damage to the
computing environment

Potential losses
Disaster recovery of the primary site must cover the potential loss of any or all the
following systems at the primary site:
l The Data Domain server that stores the deduplicated client backups
l The NetWorker storage node that stores the deduplication metadata for the
backups
l The NetWorker server that stores the metadata for the backups in the media
database and client file indexes

Disaster recovery requirements


A complete disaster recovery environment provides a secondary site with systems
that copy all the information involved in each completed backup at the primary site.
You can configure the two sites to provide disaster recovery for each other, with each
serving as both a primary and secondary site with different datazones for different
clients.
Disaster recovery requires the maintenance of the following systems:
l Data Domain system with deduplicated client data cloned from the primary Data
Domain system
l Disaster recovery NetWorker storage node with deduplication metadata cloned
from the primary NetWorker storage node
l Disaster recovery NetWorker server with metadata cloned from the primary
NetWorker server
Disaster recovery environment on page 39 shows an example of a simple disaster
recovery environment.

Disaster recovery scenarios


The procedures you use to recover from a disaster will vary depending on the
circumstances, which could include the following factors:
l The deployment of the disaster recovery environment
l Which systems the disaster has affected
l The time required to successfully recover from the disaster
The EMC NetWorker Disaster Recovery Guide provides details.

166 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Restoring Data

Bootstrap recovery from a DD Cloud Tier device


NetWorker does not support recovering a bootstrap backup from a DD Cloud Tier
device directly.
To recover data from a bootstrap backup that resides on a DD Cloud Tier device, you
must clone the data from the DD Cloud Tier device to a Data Domain device that is on
the same Data Domain system and storage unit as the DD Cloud Tier device.
The EMC NetWorker Administration Guide provides detailed information about how to
perform a disaster recovery of a NetWorker server when the bootstrap resides on a
DD Cloud Tier device.

Bootstrap recovery from a DD Cloud Tier device 167


Restoring Data

168 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
CHAPTER 6
Monitoring, Reporting, and Troubleshooting

This chapter includes the following topics:

l Monitoring Data Domain events, statistics, and logs.........................................170


l Generating reports............................................................................................174
l Replacing a failed or old storage node...............................................................177
l Troubleshooting................................................................................................ 179

Monitoring, Reporting, and Troubleshooting 169


Monitoring, Reporting, and Troubleshooting

Monitoring Data Domain events, statistics, and logs


NMC provides several ways to view for the backup statistics, the logs, and the alerts
for connected Data Domain systems.

Viewing the statistics, logs, and alerts


When you use NMC to connect to the NetWorker server, the NetWorker
Administration window provides a comprehensive view of the backup status, log, and
alerts for connected Data Domain systems.

Note

In some logs and notifications, the Administration window lists Client Direct operations
variously as direct file assess (DFA), direct file save, or DIRECT_FILE operations.

Procedure
1. Ensure that you have configured SNMP for the Data Domain system.
Configuring SNMP for an NMC managed Data Domain system on page 172
provides details.

2. In the Administration window, click the Devices view.


3. In the folder tree, select Data Domain Systems, and perform one of the
following operations:
l Right-click a Data Domain system and select Properties to view system
information, including the identity (name, hosts, model, OS version, serial
number), configuration, and SNMP community string, access credentials,
capacity status information, save stream status information, and system
details.
l To view backup information select a Data Domain system, as shown in the
following figure:

170 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Monitoring, Reporting, and Troubleshooting

Figure 45 NetWorker Administration window displaying DD Boost devices

n The Devices area shows device and usage information, including the
following:
– Pre-Compression—Indicates the amount of space that the backup
would have used if the data had not been deduplicated and
compressed. NetWorker tracks this value as the size of backups.
– Compression (Reduction)—Represents the data compression with
the pre-compression and post-compression used values. Data
compression is calculated with:
[(1 - Post-comp Used) ÷ Pre-Compression] x 100%
– /backup: post-comp—Indicates three values: the total capacity of the
Data Domain system, the amount of disk space already in use, and the
amount of space available.
– /ddvar—Indicates the amount of log file space that is in use on the
Data Domain file system.
n The Status area lists connectivity usage.
n The Log table shows a chronological list of events that occur during
NetWorker server operations.
n The Alerts table lists messages for operational issues that can require
administrative attention. Data Domain-specific alerts are available only if
SNMP traps are configured.

Note

To delete individual messages from the Alerts table, open the NMC
Events view, select the messages, right-click, and select Dismiss.

Viewing the statistics, logs, and alerts 171


Monitoring, Reporting, and Troubleshooting

Viewing backup statistics in NMC


You can view the storage statistics for backups on a connected Data Domain system
in NMC.
In the NMC Enterprise view, select a Data Domain host. A table shows the storage
statistics for the selected system.

Viewing backup alerts (SNMP traps) in NMC


Alerts are messages for operational issues that can require administrative attention.
You can view backup alerts on a connected Data Domain system in NMC.
Procedure
1. Configure SNMP for the Data Domain system.
Configuring SNMP for Data Domain provides details.

2. In NMC, select the Events view.


A table lists the backup alerts (SNMP traps) in chronological order.

Note

The same alert messages also appear in the NetWorker Alerts table.

Deleting individual messages from NMC Events and NetWorker Alerts


You can delete individual messages from the NetWorker Alerts and NMC Events tables
by removing the messages from the NMC Events table. The two views show the same
messages.
Procedure
1. In NMC, select the Events view.
2. Select the messages you want to remove from the Events table.
3. Right-click and select Dismiss.
NSM deletes the selected messages.

Configuring SNMP for an NMC managed Data Domain system


You can configure NMC to monitor Data Domain alerts (SNMP traps) when you add a
Data Domain system to the NMC Enterprise, or you can update an existing Data
Domain system that is managed by the NMC server. Provided that you have viewing
privileges, the NMC Enterprise view lists the Data Domain systems as network hosts.
Adding a host Data Domain system to NMC Enterprise view describes how to add a
Data Domain system to the NMC Enterprise view.
Procedure
1. Enable SNMP on the Data Domain system and configure the system to send
traps to the NMC server. Configuring the Data Domain system for DD Boost
provides details.
2. In the NMC Enterprise view left panel, right-click the Data Domain system that
you want to monitor and select Properties.

172 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Monitoring, Reporting, and Troubleshooting

3. In the Properties window, on the Manage Data Domain tab, ensure that
Capture Events is enabled.
If you do not select the Capture Events checkbox, NMC monitors the status of
the DD Boost devices but will not monitor Data Domain SNMP traps that are
required to monitor events.

4. On the Configure SNMP monitoring tab, type a value for SNMP Community
String. The typical setting is public, which allows all users to monitor events.
The following figure shows an example.
5. Type a value for the port that the Data Domain system uses for SNMP traps in
the SNMP Process Port attribute. Firewall requirements provides details.
6. Select the SNMP traps that you want to monitor in the SNMP Traps section.
Some traps are pre-selected. The following figure shows an example for Data
Domain 5 alerts. Other versions may differ.
Figure 46 Data Domain alerts to monitor

7. Click OK.

Configuring SNMP for an NMC managed Data Domain system 173


Monitoring, Reporting, and Troubleshooting

Generating reports
Use the NMC Reports view to create statistical reports of NetWorker with Data
Domain backup, recovery, and cloning activities.

Configuring a report
You can configure and display a Data Domain report for backup or clone in NMC.
Procedure
1. In the NetWorker Management Console window, click Reports.
2. Expand the Reports folder, expand the Legacy Reports folder, and then the
Data Domain Statistics folder. Select the report that you want to view.

Note

There are three types of reports: summary, statement, and details.

The Configure tab for the selected report type appears in the right panel.

3. In the Configure tab, customize the items that you want to include in the
report. Select the item parameters and click the Remove (‹), Add (›), Remove
All («), or Add All (») buttons as required.
If you do not specify Save Time values, the report displays all the available data.
The following table lists details of report configuration parameters. The specific
parameters available depend on the type of report selected.
The following figure shows an example report configuration.

4. To display the report, select the View Report tab.

Table 13 Data Domain report configuration parameters

Parameter Description Options


Server Name Selects managed hosts within Selected server names
the enterprise.

Group Name Selects one or more groups. Selected group names

Client Name Selects one or more clients. Selected client names

Note

Monthly report does not


include the Client Name
parameter.

Save Set Name Selects one or more save Selected save set names
sets. Values are case-
sensitive and you cannot use
wild cards.

174 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Monitoring, Reporting, and Troubleshooting

Table 13 Data Domain report configuration parameters (continued)

Parameter Description Options

Note

Monthly report does not


include the Save Set Name
parameter.

Save Time Limits the report to a Save time (within a range)


specified time range.

The date/time format


available depends on the
language locale of the
operating system.

Figure 47 Report configuration

Types of backup reports


Backup reports are available in various formats. Most are basic reports. The Backup
Summary and Monthly Client Statement are drill-down reports:
l Basic reports on page 176 describes details of basic reports.
l Drill-down reports describes details of drill-down reports.
l Advanced reporting on page 177 describes advanced reporting functionality with
the optional EMC Data Protection Advisor (DPA).
l For clone operations, there is no specific report. You can query and list the copies
of save sets in the NetWorker Administration, Media view, under Save Sets.

Types of backup reports 175


Monitoring, Reporting, and Troubleshooting

Basic reports
A basic report collects statistics for a specific datazone component, a time span, or a
field. You can modify the scope of a report by adjusting the parameters on the
Configure tab in NMC.
The following table describes the basic reports available for Data Domain statistics.

Table 14 Data Domain basic reports

Report name Purpose


Client Summary For all or specified clients, displays the following statistics:
l Amount of data—The amount of the data that NetWorker
would have moved by using a conventional backup
(protected data).
l Target size—Size of the data after deduplication has
taken place on the Data Domain system (stored data).
l Deduplication ratio—Percentage of savings by using Data
Domain deduplication.
l Number of save sets—The number of save sets in the
backup.
l Number of files—The number of files in the backup.

Save Set Summary For all or specified save sets, displays deduplication statistics
on the following items:
l Amount of data—The amount of the data that NetWorker
would have moved by using a conventional backup.
l Target size—Size of the data after deduplication has
taken place on the Data Domain system.
l Deduplication ratio—Percentage of disk space savings by
using deduplication.
l Number of save sets—The number of save sets in the
backup.
l Number of files—The number of files in the save set.

Save Set Details Displays details about each save set, including backup duration
and the following statistics:
l Save Set ID
l Save time
l Backup level
l Save Set size—Protected data size
l Target size—Size of the data after deduplication has
taken place on the Data Domain system (stored data size).
l Deduplication ratio—Percentage of savings by using
deduplication.
l Number of files—The number of files in the save set.

Monthly Summary Displays statistics on a month-to-month basis.

176 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Monitoring, Reporting, and Troubleshooting

Table 14 Data Domain basic reports (continued)

Report name Purpose


Daily Summary Displays statistics on a day-to-day basis.

Drill-down reports
A drill-down report consists of multiple basic reports, connected as layers and all
configured with the same parameters that the top layer uses.
You can run reports for groups, clients, or save sets. You can modify the scope of a
report by adjusting the parameters on the Configure tab in NMC.
The following table lists the drill-down reports available for Data Domain statistics.

Table 15 Data Domain statistics drill-down report

Report name Purpose Sequence


Backup Summary Reports backup statistics over 1. Client Summary
a period, including a client
summary. 2. Save Set Summary
3. Save Set Details

Monthly Client Statement Reports backup statistics of 1. Client Summary


individual clients on a month-
to-month and day-to-day 2. Monthly Summary
bases, down to individual save 3. Daily Summary
sets details.
4. Save Set Details

Data Domain statistic reports


Use the Data Domain gstclreport command with a specified format to generate a
specific Data Domain statistics report.
The Data Domain product documentation provides details.

Advanced reporting
NMC provides reports for only the recent backup history in a specific datazone. The
optional EMC DPA software can provide extended reports of backups, trends, and
analysis for one or multiple datazones, including reports of Data Domain systems. DPA
is best for larger environments where you require additional analysis with forecasts
and trends.

Replacing a failed or old storage node


Before you begin
Before you begin, ensure the following requirements are met:
l The replacement storage node has access to the original Data Domain system.

Data Domain statistic reports 177


Monitoring, Reporting, and Troubleshooting

l The NetWorker server software is the same version as the original.


l The NetWorker server has all the same indexes and the same media database
entries as before the disruption.
If a storage node fails or if you replace a storage node, you can recover the data
stored on the associated DD Boost devices on the replacement storage node or on a
different storage node. The success of the recovery depends on the state of the
devices at the time of the loss:
l If the storage volumes were unmounted when the disruption occurred, the
structure and integrity of the data remains intact and you can expect a complete
recovery.
l If the volumes were mounted but not reading or writing data during the disruption,
then complete recovery is still likely.
l If the devices were reading or writing at the time of the disruption, then data loss
or data corruption is more likely to have occurred, and you cannot assure complete
recovery.
If the volume structure of the devices is intact, then the NetWorker server can
continue to perform its operations with the existing devices, with minimal impact.
If the replacement storage node has a different name or if you use the NetWorker
server as the storage node, then you must re-create the devices in NetWorker as
follows:
Procedure
1. Use NMC to connect to the NetWorker server. In the NetWorker
Administration window, select the Devices view, and then select Devices in
the left navigation pane.
2. For each affected original remote storage node-based DD Boost device, right-
click the device, select Properties. Record the following information:
l On the General tab:
n Name
n Device Access Information
l On the Operations tab:
n Volume Name
n Volume Pool
3. Remove the original DD Boost devices from the NetWorker application. The
device folders will continue to exist on the Data Domain system:
a. In the Devices view, from the Devices tree, right-click and unmount each
affected device. Mounted devices have a Volume Name.
b. In the Media view, from the Media Pool tree, right-click each affected
media pool (Volume Pool), select Properties, and on the Selection Criteria
tab, remove each affected device from the Target Devices list.
c. In the Devices view, Devices tree, right-click and delete each affected
device.
4. Re-create the devices on the NetWorker application associated with a
replacement storage node:
a. In the Devices view, right-click the Data Domain systems tree and then run
the New Device Wizard.

178 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Monitoring, Reporting, and Troubleshooting

b. Specify the Data Domain system and DD Boost (OST) credentials to gain
access the system.
c. On the Select Folders to use as Devices page, select the DD Boost devices
(device folders) associated with the failed storage node.
When you leave this page, a message notifies you that NetWorker had
previously associated the devices with a different storage node. Confirm the
selection.

d. On the Configure Pool Information page, specify the media pool for the
devices and cancel the Label and Mount selection. You must manually
mount the devices on the new storage node later in this procedure.

NOTICE

If you enable Label and Mount at this point, NetWorker relabels the volume
and you lose all the data. You cannot undo this action.

e. On the Select the Storage Nodes page, select a storage node to handle the
new devices by doing one of the following.
l Select an existing storage node.
l Create a replacement storage node.
l Use the NetWorker server’s storage node.
The storage node must be running on the correct network and its
hostname must be resolvable by DNS.

f. Complete the wizard.


5. Manually mount each new device:
a. In the NMC window for the NetWorker server, click Devices.
b. In the navigation tree, select the Data Domain system.
c. In the right panel, right-click each device you want to mount, and select
Mount.
The device mounts on the storage node and will use the label associated with
the pool you have specified.

6. Review the NMC log for any error messages.


Results
If this procedure does not report any errors, then the device and the volume are
available for use. Backup and recovery operations may require further configuration
depending on the original settings and the purpose of the device recovery.

Troubleshooting
The following sections will help you identify and resolve common issues of
configuration and operation.

Troubleshooting 179
Monitoring, Reporting, and Troubleshooting

Data Domain system log files


This section provides a list of log files that can assist you in troubleshooting issues
that occur when performing operations with Data Domain devices and DD Cloud Tier
devices.
Support Bundles
The Data Domain system provides a mechanism to create a Support Bundle, which is a
zipped file that contains a number of log files that Support uses to troubleshoot
issues.
You can create a Support Bundle by using DDEM or from the system console:
l DDEM—Browse to Maintenance > Support > Support Bundles > Generate
Support Bundle. To download the bundle, click the GZ file, and then select Save.
l CLI—Log in to the Data Domain system console as the sysadmin user, and then
type the following command:

support bundle create default

Output similar to the following appears:


Compressing files...
Bundle created...
sysadmin@bu-dd3# support bundle list
File Upload Size Time Created
Status (KiB)
--------------------------------------- ------ -----
------------------------
bu-dd3-support-bundle-1130095714.tar.gz 68440 Wed Nov 30
09:57:14 2016
--------------------------------------- ------ -----
------------------------
Core dumps
The Data Domain system generates core dump files that provide detailed information
about process crashes.
To display a list of core dumps on the Data Domain system, log in to the Data Domain
system console as the sysadmin user, and then type the following command: support
coredump list

Accessing Support Bundles and core dumps from a remote host


Use an NFS client to access Support Bundles and core dump files from a remote host,
and to transfer the files to a remote host.
Perform the following steps to access the Support Bundle or core dumps by using an
NFS client:
1. On the Data Domain system:
a. To enable NFS, type: enable NFS
b. To provide NFS clients access to the Data Domain system, type: nfs add /
ddvar *
2. On the NFS client:
a. Create a local folder, by typing: mkdir/nfsshare

180 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Monitoring, Reporting, and Troubleshooting

b. Mount the NFS share on the Data Domain system to the nfsshare folder by
typing: sudo mount data_domain_system:/ddvar/nfsshare
where data_domain_system is the hostname or IP address of the Data Domain
system.
c. Change to the directory /nfsshare/support
d. Type the ls command to display a list of Support Bundles on the Data Domain
system.
e. Use the cp command to copy the files from the /nfsshare/support
directory to a location on the NFS client.

Troubleshooting DD Cloud Tier data movement issues


Data moves from the DD Cloud Tier to the Cloud Provider at the date and time defined
by the data movement policy on the Data Domain system, or when a user manually
runs the data movement command. You cannot move data from a DD Active Tier
device to the Cloud Provider, you can only move data that you cloned to a DD Cloud
Tier device.
When data resides on a DD Cloud Tier device, NetWorker updates the clflags
attribute for save set with a T (in transit) flag. NetWorker clears the T flag within 30
of the completion of the data movement operation, and the data is on the Cloud
Service Provider.
To view the status of a save set, use the mminfo command.
For example, the following output displays a list of save sets that reside on two
volumes:
l DDVEbushdev111.001 contains backup data on a Data Domain device
l nw_w2k8_c.ddctdefault.001 contains a clone copy of the save sets on the
DDVEbushdev111.001. The data movement operation has not started on these save
set yet, or the data movement operation is in progress but the data has not
completely moved to the Cloud Provider.
mminfo -q"savetime>11/27/2016" -
r"volume,savetime,totalsize,level,name,ssid,clflags"

volume date total lvl name ssid clflg


DDVEbushdev111.001 11/28/2016 4 full <1>E:\dd 4198279169
DDVEbushdev111.001 11/28/2016 4 full <2>E:\dd 4215056363
DDVEbushdev111.001 11/28/2016 4 full <3>E:\dd 4231833564
DDVEbushdev111.001 11/28/2016 6768 full E:\dd 4181501966
nw_w2k8_c.ddctdefault.001 11/28/2016 4 full <1>E:\dd 4198279169
T
nw_w2k8_c.ddctdefault.001 11/28/2016 4 full <2>E:\dd 4215056363
T
nw_w2k8_c.ddctdefault.001 11/28/2016 4 full <3>E:\dd 4231833564
T
nw_w2k8_c.ddctdefault.001 11/28/2016 6768 full E:\dd 4181501966
T

To determine when the data will move from the DD Cloud Tier device or troubleshoot
why the data movement operation has not completed, perform the following steps as
the sysadmin user on the Data Domain system:
1. Determine the data movement schedule, by typing the following command:

Troubleshooting DD Cloud Tier data movement issues 181


Monitoring, Reporting, and Troubleshooting

data-movement schedule show

For example, output similar to the following appears:

Mtree Target(Tier/Unit Name) Policy Value


------------------- ---------------------- -----------
-------
/data/col1/data01 Cloud/common_ecs app-managed enabled
/data/col1/networker Cloud/common_ecs app-managed enabled
------------------- ---------------------- ----------- -------

Note

Each mtree can have only one data movement policy.

2. Determine when the status of the last data movement operation, by typing the
following command:

data-movement status
3. Determine the data movement schedule, by typing the following command:
data-movement policy show

Output similar to the following appears:


Data-momvement is scheduled to run on day(s) "thu" at
"23:00" hrs every "2" week(s).
4. Manually start a data movement operation, by typing the following command:

data-movement start mtreesmtree-list

For example, to start the operation on mtree /data/col1/networker, type:

data-movement start trees /data/col1/networker


Data-movement started
5. Display real-time status of a data movement operation, by typing the following
command:

data-movement watch

The following output displays the status of a data movement operation that
successfully moves 4 files:
Data-movement: phase 1 of 3 (copying)
100% complete; time: phase 0:02:20, total 0:02:31
Copied (post-comp): None, (pre-comp): 6.63 KiB,
Files copied: 4, Files verified: 0, Files installed: 0
Data-movement: phase 2 of 3 (verifying)
100% complete; time: phase 0:00:02, total 0:02:41
Copied (post-comp): None, (pre-comp): 6.63 KiB,
Files copied: 4, Files verified: 0, Files installed: 0
Data-movement: phase 3 of 3 (installing files)
100% complete; time: phase 0:00:31, total 0:03:21
Copied (post-comp): None, (pre-comp): 6.63 KiB,
Files copied: 4, Files verified: 0, Files installed: 0
Data-movement was started on Nov 28 2016 15:08 and completed

182 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Monitoring, Reporting, and Troubleshooting

on Nov 28 2016 15:11


Copied (post-comp): None, (pre-comp): 6.63 KiB,
Files copied: 4, Files verified: 4, Files installed: 4

Note

If the data-movement watch command displays the following line: Files


copied: 0, Files verified: 0, Files installed: 0., then the
operation did not move any files. This can happen for one of the following reasons:
l The DD Cloud Tier devices does not contain data that is eligible for movement.
In this case, confirm that you cloned data to the DD Cloud Tier device.
l Cloud connectivity issues or other issues exist.

6. Display system alerts that might indicate why a data movement operation failed to
copy files, by typing the following command:

alert show current

Data Domain system log files on page 180 provide more information about the logs
files to review to troubleshoot error messages.

Too many streams


NetWorker 9.1 provides queries the underlying Data Domain to determine the
maximum number of data streams the Data Domain system supports and throttles the
maximum client sessions and streams to prevent performance degradation on the Data
Domain system.
When a NetWorker client requests a session to perform a save, recover, or proxy
cloning (NetWorker Clone Controlled Replication) operation on a Data Domain system,
the NetWorker server will reject the request if the total number of active data
sessions on the Data Domain system exceeds the maximum number of supported
streams.
When the NetWorker server rejects the session request, error messages similar to the
following appear in the daemon.raw file on the NetWorker server:
l Too many save streams (number) on DDR DD_hostname since that
would cause the device to exceed the maximum DDR write
stream counts (max_number).
l Too many proxy recover streams (number) on DDR DD_hostname
since that would cause the device to exceed the maximum DDR
repl read stream counts (max_number)
l current_read_stream (%d) reach max_read_stream %d for DDR
DD_hostname
l Too many recover streams (number) on DDR DD_hostname' since
that would cause the device to exceed the maximum DDR read
stream counts (max_number)
The NetWorker client will retry the request up to the number of times that is defined
by the Retries value of the Action resource. The time in between each retry is
determined by the value defined in the Retry Delay attribute of the Action resource.

Name resolution issues


If connectivity issues are present, ensure that the network names are valid and
consistent for the NetWorker server, the storage nodes, and the Data Domain

Too many streams 183


Monitoring, Reporting, and Troubleshooting

systems. Use the same names that are consistent with the NetWorker software
configuration.
Validate connections from the Data Domain system and the NetWorker server, and
from the NetWorker server to the Data Domain system by using IP addresses and the
network names. If you use aliases or short names in the configuration, then verify the
aliases and short names. To validate connections, use one of the following methods:
l On the NetWorker server and storage nodes, use the nslookup command to
verify that network names resolve to the correct IP address.
l On the Data Domain system, use the net hosts command.
Host naming guidelines provides suggestions for names.
Correct improper names by amending DNS entries or by populating the local hosts
files.

Network connection issues


You can test the network connections for a Data Domain system by using the net
lookup command through an SSH Telnet session, which requires administrator or
system administrator permissions.
The Data Domain system can also show the current network configuration by using
the net show and the other network related commands, available through the Data
Domain interface. Log in and go to the specific Data Domain system. Then select the
Hardware > Network tabs to access the commands.
EMC recommends that you diagram and verify all relevant network connections. A
typical Data Domain network configuration provides a minimum of two network
connections, one dedicated to administration and the other to backup data only. You
can make effective use of 10 GbE connectivity or the use of multiple backup
connections that you can aggregate or team together by using the ifgroup
command on the Data Domain system.
Network requirements on page 28 provides suggestions for network connections.

Device access errors


The following error messages can occur when NMC cannot connect to a DD Boost
device.

Volume unavailable error


This message appears when the Data Domain file system becomes inaccessible or
disabled, and then you reenable the file system. For example, for service or testing,
you could leave the devices in an unmounted state. Backup operations for the devices
will not start and an error message similar to the following appears in the Log pane in
the Administration window, and the daemon.raw file:

Waiting for 1 writeable volume(s) to backup pool

To resolve this issue, perform the following steps to mount and enable the device:
1. In the NetWorker Administration window, click the Devices view.
2. In the Devices table, right-click and select Mount for any unmounted DD Boost
device.

184 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Monitoring, Reporting, and Troubleshooting

3. To enable the device, in the Enabled column, right-click the device and select
Enable/Disable.

NFS service errors


You must enable Data Domain NFS service for the NetWorker software to access DD
Boost devices. Without NFS, an error message similar to the following appears,
typically when NetWorker tries to label a device:

Failed to contact the Data Domain system. Host could be unreachable,


or username/password could be incorrect. Do you wish to configure
manually?
The user has insufficient privilege

Configuring the Data Domain system for DD Boost describes how to enable NFS
access.

Backup fails for older NetWorker application modules


Some older NetWorker application modules do not support the NetWorker Client
resource fields for Data Domain Backup and Target Pool or Pool and you must not use
these fields for DD Boost backups. The Data Domain Backup field ensures that
backups use only DD Boost devices, even if the configured pool contains other device
types, although pools with mixed devices is not a good practice.
The EMC NetWorker Administration Guide provides details on how to configure a pool
to target DD Boost devices only.
The release notes for the specific NetWorker application modules provide details on
supported Data Domain configurations.

Multiple recovery fails on AIX clients with less than 2 GB RAM


For NetWorker clients on AIX systems with less than 2 GB of RAM, a recovery that
uses four or more parallel recovery save stream IDs might fail with an error message
similar to the following:

93124:recover: readv from DD failed for read size 262144: Reading


from a file failed ([5001] memory no longer available)

To avoid this error, export the following environment variable on the client shell.

LDR_CNTRL=MAXDATA=0x70000000

Backing up streams from NetWorker to Apollo DD is rejected


Issue
When you perform a backup of 1024 streams from a NetWorker server to Apollo DD,
the backup succeeds. However, if you run three NetWorker servers simultaneously
with 3000+ save sets, the system is unable to reach the 1885 write streams limit on
Apollo DD. Approximately 1600 write streams start on Apollo DD from the three
NetWorker servers, and the system displays connection rejection messages in the
ddfs.info log file on Apollo DD.
Workaround
To resolve this issue, ensure that you are in SE Mode, then change the attribute
NFS_TOTAL_CONNS_PERCENT from the default 50 to 100.

Backup fails for older NetWorker application modules 185


Monitoring, Reporting, and Troubleshooting

reg set system.NFS_TOTAL_CONNS_PERCENT = 100

186 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
APPENDIX A
DD Boost Conversion and Upgrade

This appendix includes the following topics:

l Upgrading from legacy DD Boost configurations.............................................. 188


l Converting DD Boost devices from IP to FC connectivity.................................188
l Redirecting backups from other devices to DD Boost.......................................188
l Migrating data into Data Domain systems.........................................................189
l Migration scenarios.......................................................................................... 192

DD Boost Conversion and Upgrade 187


DD Boost Conversion and Upgrade

Upgrading from legacy DD Boost configurations


NetWorker 8.0 and later provides both write and read functionality on all upgraded
and new DD Boost devices. Earlier releases had separate read-only DD Boost mirror
devices for restore operations. The NetWorker 8.0 and later upgrade removes legacy
read-only DD Boost mirror devices.

Note

After an upgrade to NetWorker 8.0 or later from an earlier release that used read-only
devices, do not revert to the earlier release. If you revert, DD Boost devices created
by NetWorker 8.0 or later will be unavailable and the legacy devices will require manual
reconstruction.

Converting DD Boost devices from IP to FC connectivity


After you have met the FC support requirements, you can convert existing DD Boost
devices that use Ethernet IP connections to use FC connections deployed as a SAN.
No data is lost by the conversion and full DD Boost features are retained, including
Client Direct operations for backup and restore.
Plan your device conversion with the following high-level road map that outlines the
sequence of basic tasks that you must perform.
Procedure
1. Ensure that you meet all FC support requirements.
FC support provides details.

2. Configure the Fibre Channel Options of the DD Boost devices.


Configuring DD Boost devices with NMC property windows provides details.

3. Configure the Data Domain Interface field of the NetWorker clients for FC.
Configuring a backup client with NMC property windows provides details.

Redirecting backups from other devices to DD Boost


You can redirect the backups of existing NetWorker clients that do not use DD Boost
devices to use new DD Boost devices.
To redirect the backups, configure the Pool resource to use DD Boost devices, as
described in the following procedure.
After you redirect backups to DD Boost devices, ensure that you perform a full backup
of the data. This practice avoids a dependency on the last full backup in the legacy
storage environment and the potential need to restore from two different
environments. To perform a full backup after you configure a DD Boost Pool resource,
perform one of the following options:
l Configure the redirection of the backups to a DD Boost device at a time when the
next scheduled backup for the client data will be a full backup.
l Configure the redirection, and then change the backup schedule to accommodate
an initial full backup.

188 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
DD Boost Conversion and Upgrade

Complete the following steps to redirect data from existing scheduled client backups
to use storage on DD Boost devices.
Procedure
1. Ensure that the required network connection, hostname resolutions, and
licenses are available and ready to use. The following sections provide details:
l Licensing in Data Domain systems
l Host naming guidelines
l Network requirements on page 28

2. Configure the Data Domain system for use with NetWorker. Configuring the
Data Domain system for DD Boost provides details.
3. If you plan to migrate existing save sets to the new DD Boost devices, migrate
the save sets before scheduled redirected backups begin. Migration will “seed”
the Data Domain system and help to reduce the bandwidth requirements for
future backups. Considerations for migrating legacy save sets provides details.
4. Use the NMC Device Configuration wizard to perform the following tasks:
a. Select or create DD Boost devices on the Data Domain system.
b. Select or create a Pool resource that is configured to send the save sets to
DD Boost devices.

Note

The wizard creates and configures a pool for the Data Domain system that
uses only DD Boost devices.

c. Select or create a NetWorker storage node on which to label and mount the
new devices.
d. Complete the wizard pages.
Configuring DD Boost devices with the wizard on page 61 provides details.
5. Test the backup environment to ensure that the new configuration operates
correctly and that existing backups, that will not use DD Boost devices,
continue to run as expected. For backups to new devices, test a restore from
those devices.
6. Start the redirection with a full backup to the new devices. This practice avoids
a dependency on the last full backup stored with the legacy storage
environment and the potential need to restore from two different environments.
7. Monitor backup performance, and adjust the backup schedule to optimize the
configuration for maximum throughput or additional clients. Monitoring Data
Domain events, statistics, and logs on page 170 provides details.

Migrating data into Data Domain systems


When you successfully redirect client backups to the DD Boost devices, the existing
save sets that are stored on the legacy devices or file systems become redundant. You
can retain the legacy stored data until the data expires, or you can migrate the legacy
data to the new devices.
The decision to retain or migrate the legacy data depends on the requirements that
will differ between sites, clients, and backup types. For example, you may want to

Migrating data into Data Domain systems 189


DD Boost Conversion and Upgrade

retain most of the legacy data and migrate only the backups of sensitive and high-
priority clients or certain backup types.
Review the following information to help you decide to either retain or migrate the
existing save sets as follows:
l Retain the existing save sets on the legacy storage system until they expire:
n Provides the easiest way to make the transition; no migration is necessary.
n Requires you to maintain the legacy storage for the life of the legacy data.
n Requires that you maintain legacy storage environment, to perform recoveries
of data on the legacy devices.
n Provides features for storage, recovery, and clone operations that will differ
between the legacy data and the new data.
l Migrate the existing save sets to the new DD Boost devices, which provides the
following advantages:
n Frees storage on the legacy storage system for removal or use by other clients.
n Allows you to “seed” the new devices with the legacy client data. Seeding
ensures that subsequent client backups will be deduplicated against the legacy
data. This practice reduces the bandwidth and time required for the first
backup window with the new devices.
n Offers more flexible storage features for storage, recovery, and cloning, for
example, multiple concurrent operations.
n Maintains the NetWorker browse and retention policies and ensures that
NetWorker manages all save sets.

Migration versus native Data Domain replication


EMC recommend that you do not use the native Data Domain replication feature to
migrate data from one Data Domain system to another. NetWorker cannot track,
manage, or recover legacy save sets that Data Domain replicates.
You can use the Data Domain replication feature to seed a new system to migrate the
data. For example, you can perform native Data Domain replication over a local
connection to quickly seed a new target Data Domain system, which you can then
physically send to a distant location. Although NetWorker cannot immediately manage
or restore the seeded data, this practice has advantages. The seeded data reduces the
otherwise heavy bandwidth that is required for a data migration by using a NetWorker
clone operation, or if you will not perform a migration, for the initial full backups to the
target system. This practice can be especially effective if the remote location has
limited network bandwidth.

Migration methods
Data migration is a one-time NetWorker clone operation which you can customize to
different device types and time periods. You can include all the data in the migration or
you can select a limited amount of data from a specific timeframe or a specific backup
type, for example, weekly full backups.
The details of the migration procedure depend on the method that you use and the
granularity of the data that you want to migrate:
l To perform a NetWorker scheduled clone operation, refer to Migrating legacy save
sets to DD Boost devices.

190 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
DD Boost Conversion and Upgrade

l To run a NetWorker nsrclone script from a command line, refer to the EMC
NetWorker Administration Guide for details.
l To perform a NetWorker staging (data movement) operation to move data from an
AFTD, refer to the EMC NetWorker Administration Guide for details.

Migrating legacy save sets to DD Boost devices


After you choose a migration scenario, you can migrate the existing save sets to DD
Boost devices. Part of this procedure requires that you create a special clone pool and
configure a clone task.
Before you begin
Perform migrations before the scheduled NetWorker client backups begin using the
new devices. Migration will seed the Data Domain system and help to reduce the
bandwidth requirements for future backups.
Procedure
1. Decide which migration scenario you need. Migration scenarios provides details.
2. Plan the migration schedule to ensure that sufficient DD Boost devices and
bandwidth are available and that there will be minimal impact to the usual
backup window.

Note

When you migrate existing deduplicated VTL or CIFS/NFS AFTD save sets, the
deduplication software reverts the save sets to their native non-deduplicated
format. The storage node then reads and stores the save sets in deduplicated
format on the new DD Boost devices. This reversion process occurs for both
Data Domain and non-Data Domain storage.

3. Create a clone pool for the DD Boost devices to be used for the migration:
l In the Data Source field, select groups for the migration.
Typically, you will migrate the same groups that you selected for the
redirection of backups. Redirecting backups from other devices to DD Boost
on page 188 provides details.
l In the Target Devices field, select the DD Boost devices to store the
migrated data.
Creating pools to target DD Boost devices on page 94 provides details.
4. Configure a clone task with the Write Clone Data to Pool field selected for the
clone pool.
Road map for configuring a new cloning data protection policy on page 134
provides details on the scheduled clone option.

5. Run the clone action, either according to its schedule or by manual start.
To amnually start the clone action, right-click on the workflow that contains the
clone action, and select Start.
6. After the clone operation completes, verify that the cloned data appears on the
target devices.
DD Boost Conversion and Upgrade on page 187 provides details on the
verification of NetWorker operations.

Migrating legacy save sets to DD Boost devices 191


DD Boost Conversion and Upgrade

7. After you have verified the cloned save sets, remove the original save sets as
required.
8. If you remove the original save sets, remove unused devices and pools as
required. You cannot delete a pool until you delete or relabel in other pools all
the volumes that belong to that pool.
9. Monitor the Data Domain system to ensure that adequate storage capacity is
available. Monitor a complete backup cycle of all clients, including save set
expirations.
DD Boost Conversion and Upgrade on page 187 provides details.

Migration scenarios
This section offers some typical migration scenarios to help you migrate existing
backup data from legacy devices or file systems to DD Boost devices. The best
scenario for your situation will depend on the storage environment configuration and
the available capacities and bandwidth.

Migration to DD Boost from conventional tape or AFTD


In these first two migration scenarios, you have added a Data Domain system to the
existing NetWorker storage environment. You want to migrate and deduplicate the
current legacy data, stored on tape or conventional disk, to DD Boost devices on the
new system. The reason for this migration could be that you want to remove the old
tape or disk system or free up space on the old system for other clients.
The number of client migrations that you will perform depends on whether you want
to seed the devices for future backups or migrate all the legacy save sets. EMC
recommends that you seed some of the data, because the new Data Domain system
contains no data. If you migrate the data for one client to seed the DD Boost devices
and some of the same data exists on other clients, then migrating the data for the
additional clients has diminishing seed value.
There are two scenarios for this type of migration. In the first case, you create the DD
Boost devices on a new storage node. In the second case, you create the devices on
the existing storage node.

Migration to new devices on a different storage node


The figure in this section illustrates a scenario where the storage node named Cassie
stored backups of the client named Olive on tape or conventional disk. You want to
migrate these backups to a different storage node named Eric for storage on the Data
Domain system.
In this scenario, you use the IP network to transfer the data from the original storage
node Cassie to the new storage node Eric. The time that is required for the transfer
depends on the capacity and bandwidth available on the IP network, regardless of the
fact that the tape library is on a SAN. If restore operations must use the IP network
during the transfer, then it takes additional bandwidth to ensure that the data transfer
does not impact these operations.

192 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
DD Boost Conversion and Upgrade

Figure 48 Migration from conventional storage to DD Boost devices on a different storage node

Migration to new devices on the same storage node


You can eliminate data migration over the IP network between storage nodes by
migrating data between devices on the same storage node. The figure in this section
illustrates a scenario where you migrate data to DD Boost devices that were created
on the original storage node named Cassie. During the migration, the storage node
reads the data that is stored on tape or conventional disk and sends the deduplicated
data to the Data Domain system for storage.
Although this scenario appears to be an ideal solution that avoids IP network
restrictions, consider the following factors:
l The existing storage node is likely to be older and already at or near capacity. This
situation limits the number of devices that you can add and the amount of data
that you can transfer during backup operations.
l The existing storage node is not likely to have extra network connections available.
If you need the legacy connections for backup and restore operations, this
situation leaves limited bandwidth available for the additional DD Boost format.
l The network connection is less likely to have the recommended 10 GB capacity to
maximize throughout from the storage node to the DD Boost devices.
l Although you use the same storage node for the same backup clients, change the
device allocations and the pools. These changes can add confusion and result in
configuration errors.
There are also advantages to this scenario. For smaller sites, to avoid network
restrictions you can migrate the data to new devices on the same storage node. This
scenario could also be an option for larger sites where you want to reuse multiple
storage nodes or reconfigure the storage nodes to share one or more Data Domain
systems. You can configure a storage node for data migration to seed the DD Boost
devices as an interim step.

Migration to DD Boost from conventional tape or AFTD 193


DD Boost Conversion and Upgrade

Figure 49 Migration from conventional storage to DD Boost devices on the same storage node

Migration to DD Boost from deduplicated VTL or AFTD storage


In the following two migration scenarios, you are already using an existing Data
Domain system for VTL or CIFS/NFS AFTD deduplication storage. You want to
migrate the stored data to new DD Boost devices on this same Data Domain system.
Because the data is already present on the Data Domain system, you do not need to
migrate the data to seed the DD Boost devices. The global deduplication format
ensures that NetWorker does not resend data that exists on the Data Domain system.
These migration scenarios offer multiple concurrent operations for storage and
recovery and more flexible storage options for cloning.
Although these migration scenarios use the same Data Domain system, change the
pools and the device allocations to redirect the backups to the DD Boost devices.
Copy or clone the save sets to migrate the data.
When you migrate existing deduplicated VTL or CIFS/NFS AFTD save sets, the
process initially reverts the save sets to their native non-deduplicated format. The
storage node then reads and concurrently stores the save sets in a deduplicated
format on the new DD Boost devices. Data that exists in a deduplicated format on the
Data Domain system is not deduplicated again. During the migration, only the
metadata for the save sets are unique.

Migration to new devices on a different storage node


The figure in this section illustrates a legacy scenario where the storage node Cassie
stored backup data from the client named Olive in VTL format over a SAN connection.
You want to migrate this data to the new DD Boost devices on a different storage
node named Dove.
This migration uses the SAN and the IP networks in two separate stages. First, the
original storage node Cassie reads the non-deduplicated data provided by the Data
Domain system over the SAN connection. Then the new storage node Dove reads this
data and concurrently stores only unique data, in this case only the storage metadata,
across the IP network to the Data Domain system. The limiting factor is the speed of
the transfer across the IP network.

194 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
DD Boost Conversion and Upgrade

Figure 50 Migration from VTL to DD Boost devices on a different storage node

Migration to new devices on the same storage node


The figure in this section illustrates a scenario where you want to migrate legacy
backup data from the client named OLIVE to new DD Boost devices on the original
storage node named CASSIE. The existing storage node configuration is for VTL
storage on a SAN. You have added the configuration for the new DD Boost devices
that use the IP network.
Because this migration is between devices on the same storage node, this scenario
fully uses the speed of the existing SAN connection. The storage node CASSIE reads
non-deduplicated data over the SAN and concurrently stores only unique data, in this
case only the storage metadata, across the IP network to the Data Domain system.
Figure 51 Migration from VTL to DD Boost devices on the same storage node

Migration to DD Boost from deduplicated VTL or AFTD storage 195


DD Boost Conversion and Upgrade

196 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
GLOSSARY

This glossary contains definitions for terms used in this guide.

administrator Person who normally installs, configures, and maintains software on network
computers, and who adds users and defines user privileges.

advanced file type Disk storage device that uses a volume manager to enable multiple concurrent backup
device (AFTD) and recovery operations and dynamically extend available disk space.

attribute Name or value property of a resource.

authorization code Unique code that in combination with an associated enabler code unlocks the software
for permanent use on a specific host computer. See license key.

backup 1. Duplicate of database or application data, or an entire computer system, stored


separately from the original, which can be used to recover the original if it is lost or
damaged.
2. Operation that saves data to a volume for use as a backup.

bootstrap Save set that is essential for disaster recovery procedures. The bootstrap consists of
three components that reside on the NetWorker server: the media database, the
resource database, and a server index.

client Host on a network, such as a computer, workstation, or application server whose data
can be backed up and restored with the backup server software.

Client Direct Feature that enables clients to deduplicate backup data and send it directly to AFTD or
DD Boost storage devices, bypassing the NetWorker storage node. The storage node
manages the backup devices but does not handle the backup data.

client file index Database maintained by the NetWorker server that tracks every database object, file,
or file system backed up. The NetWorker server maintains a single index file for each
client computer. The tracking information is purged from the index after the browse
time of each backup expires.

Client resource NetWorker server resource that identifies the save sets to be backed up on a client.
The Client resource also specifies information about the backup, such as the schedule,
browse policy, and retention policy for the save sets.

EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide 197
Glossary

clone 1. Duplicate copy of backed-up data, which is indexed and tracked by the NetWorker
server. Single save sets or entire volumes can be cloned.
2. Type of mirror that is specific to a storage array.

clone-controlled Creation of a replica of deduplicated data copied from one DD Boost device to another,
replication (CCR) which can be scheduled by the NMC clone feature and is indexed and tracked by the
NetWorker server.

database 1. Collection of data arranged for ease and speed of update, search, and retrieval by
computer software.
2. Instance of a database management system (DBMS), which in a simple case might
be a single file containing many records, each of which contains the same set of
fields.

datazone Group of clients, storage devices, and storage nodes that are administered by a
NetWorker server.

DD Boost Optimized library and communication framework with a special Data Domain API that
allows the backup software to define and interact with storage devices on the Data
Domain system.

DD Boost device Logical storage device created on a Data Domain system that is used to store
deduplicated NetWorker backups. Each device appears as a folder on the Data Domain
system and is listed with a storage volume name in NMC.

DD OS Data Domain operating system.

deduplication Process used to compress redundant data.

deduplication backup Type of backup in which redundant data blocks are identified and only unique blocks of
data are stored. When the deduplicated data is restored, the data is returned to its
original native format.

deduplication ratio Reduction in storage space required to store data as a result of deduplication
technology, usually combined with data compression, for example, a 20:1 space
reduction.

device 1. Storage folder or storage unit that can contain a backup volume. A device can be a
tape device, optical drive, autochanger, or disk connected to the server or storage
node.
2. General term that refers to storage hardware.
3. Access path to the physical drive, when dynamic drive sharing (DDS) is enabled.

disaster recovery Restore and recovery of data and business operations in the event of hardware failure
or software corruption.

distributed segment Part of the DD Boost interface, which enables data deduplication to be performed on a
processing (DSP) host before the data is sent to the Data Domain system for storage.

198 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Glossary

enabler code Unique code that activates the software:


l Evaluation enablers or temporary enablers expire after a fixed period of time.
l Base enablers unlock the basic features for software.
l Add-on enablers unlock additional features or products, for example, library
support.
See license key.

group One or more client computers that are configured to perform a backup together,
according to a single designated schedule or set of conditions.

host Computer on a network.

hostname Name or address of a physical or virtual host computer that is connected to a network.

ifgroup A private network configured on the Data Domain system consisting of multiple network
interfaces logically designated as a single group IP address. The ifgroup provides
dynamic load balancing, fault tolerance within the group, and better network bandwidth
usage than traditional network aggregation.

label Electronic header on a volume used for identification by a backup application.

license key Combination of an enabler code and authorization code for a specific product release to
permanently enable its use. Also called an activation key.

managed application Program that can be monitored or administered, or both from the Console server.

media Physical storage, such as a disk file system or magnetic tape, to which backup data is
written. See volume.

media index Database that contains indexed entries of storage volume location and the life cycle
status of all data and volumes managed by the NetWorker server. Also known as media
database.

EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide 199
Glossary

metadata Hash information that identifies stored sub-file information for deduplication, and is
required to revert deduplicated client backup data to the regular nondeduplicated
format.

MTree Shortened from "managed tree," also referred to as storage units, logical partition of
the namespace in a Data Domain file system that can be used to group a set of files for
management purposes. MTrees are normally associated with a single NetWorker
datazone.

NetWorker Management Software program that is used to manage NetWorker servers and clients. The NMC
Console (NMC) server also provides reporting and monitoring capabilities for all NetWorker processes.

NetWorker server Computer on a network that runs the NetWorker server software, contains the online
indexes, and provides backup and restore services to the clients and storage nodes on
the same network.

notification Message sent to the NetWorker administrator about important NetWorker events.

online indexes Databases located on the NetWorker server that contain all the information pertaining
to the client backups (client file index) and backup volumes (media index).

optimized clone See clone-controlled replication (CCR)

pathname Set of instructions to the operating system for accessing a file:


l An absolute pathname indicates how to find a file by starting from the root directory
and working down the directory tree.
l A relative pathname indicates how to find a file by starting from the current
location.

policy Set of defined rules for client backups that can be applied to multiple groups. Groups
have dataset, schedule, browse, and retention policies.

pool 1. NetWorker sorting feature that assigns specific backup data to be stored on
specified media volumes.
2. Collection of NetWorker backup volumes to which specific data has been backed
up.

recover To restore data files from backup storage to a client and apply transaction (redo) logs
to the data to make it consistent with a given point-in-time.

200 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Glossary

remote device 1. Storage device that is attached to a storage node that is separate from the
NetWorker server.
2. Storage device at an offsite location that stores a copy of data from a primary
storage device for disaster recovery.

replication Process of creating an exact copy of an object or data. This is different than NetWorker
cloning. See clone

resource Software component whose configurable attributes define the operational properties of
the NetWorker server or its clients. Clients, devices, schedules, groups, and policies are
all NetWorker resources.

resource database NetWorker database of information about each configured resource.

restore To retrieve individual data files from backup media and copy the files to a client without
applying transaction logs.

retention policy NetWorker setting that determines the minimum period of time that backup data is
retained on a storage volume and available for recovery. After this time is exceeded, the
data is eligible to be overwritten.

retrieve To locate and recover archived files and directories.

save NetWorker command that backs up client files to backup media volumes and makes
data entries in the online index.

save set 1. Group of tiles or a file system copied to storage media by a backup or snapshot
rollover operation.
2. NetWorker media database record for a specific backup or rollover.

save set ID (ssid) Internal identification number assigned to a save set.

save stream Data and save set information that is written to a storage volume during a backup. A
save stream originates from a single save set.

scheduled backup Type of backup that is configured to start automatically at a specified time for a group
of one or more NetWorker clients. A scheduled backup generates a bootstrap save set.

storage device See device.

storage node Computer that manages physically attached storage devices or libraries, whose backup
operations are administered from the controlling NetWorker server. Typically a
“remote” storage node that resides on a host other than the NetWorker server.

storage unit (SU) Logical unit of disk storage on a Data Domain system that is associated with a
NetWorker datazone.

trap Setting in an SNMP event management system to report errors or status messages.

EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide 201
Glossary

virtual tape library (VTL) Software emulation of a physical tape library storage system.

volume 1. Unit of physical storage medium, such as a disk or magnetic tape, to which backup
data is written.
2. Identifiable unit of data storage that may reside on one or more computer disks.

volume name Name that you assign to a backup volume when it is labeled.

202 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
INDEX

A device:non-wizard configuration 89
Add New Host Wizard; wizard:Add New Host 88 device:removal 26
authorization code 21 direct file access (DFA) 17
disaster recovery configuation 39
distributed segment processing 16, 49
B DPA advanced reports; reports:advanced 177
backup failure:older NetWorker application modules 185 dynamic drive sharing 94
bootstrap 84
E
C Ethernet; Fibre Channel 19
CCR.See clone-controlled replication 18 evaluation period 21
CIFS formats; NFS formats; AFTD disk configurations
25, 191
Client Direct:configuration 84 F
Client Direct:description 17 FC conversion from IP 188
client:non-wizard configuration 84 Fibre Channel support 28
clone-controlled replication:cascade configuration; filesys clean command 26
cascaded replication configuraiton 41 filesys show space command 26
clone-controlled replication:feature 18 firewall requirements 34
clone-controlled replication:for disaster recovery 39 full device 26
clone-controlled replication:process; optimized clone
130 I
clone:feature 130 ifgroup:multiple storage nodes 39, 43
clone:native non-deduplicated 131 ifgroup:NIC usage 28
clone:operations 18
clone:requirements 132
clone:to native format 18 L
configuring:Data Domain for NetWorker 49 label:template 93
configuring:NetWorker for Data Domain 60 license requirements 21

D M
daily summary report 176 max nsrmmd count 89
Data Domain backup storage 24 max sessions 89
Data Domain Extended Retention 26 migration:legacy save sets; legacy save sets migration
Data Domain:backup attribute 83, 84, 188 191
Data Domain:replication 190 migration:scenarios 192
Data Domain:replication; replication, Data Domain 131 migration:tape to local devices 193
Data Domain:Retention Lock not supported; migration:tape to remote devices 192
compression not supported 19 migration:VTL to local devices 195
Data Domain:server 19 migration:VTL to remote devices 194
DD Boost credentials 49 monitoring:backup operations 170
DD Boost devices:creating 61 monitoring:backup statistics 172
DD Boost devices:creation by property windows 87 monitoring:devices 172
DD Boost:enabling 49 mounting a device; device:mounting 95
DD Boost:feature 16 MTree 24
DD Boost:structure 17
deduplication:feature 16 N
deduplication:ratio 35
naming guidelines 36
Device Configuration Wizard; wizard:device
native non-deduplicated format 191
configuration; device:creating 61
NDMP deduplication backup 84
device:deactivate 96
net hosts add command 36
device:delete; device:erase data; volume,erase 97
network connectivity 28
device:disable 96
device:identity 89

EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide 203
Index

NetWorker Management Console <em Emphasis>See storage unit:maximum on Data Domain 24


<Default Para Font>Console;NMC <em storage unit:structure 24
Emphasis>See <Default Para Font>Console 20 synthetic full backup 18
NetWorker Management Console:description 19
NetWorker:application modules 20
NetWorker:backup reports 177
T
NetWorker:client 20 target:devices 94
NetWorker:storage node 20 target:sessions 89
NFS service errors; label:device error 185 tenant unit 49
NFS services 49, 61 throughput, maximize 28
NIC connections 28 troubleshooting:connectivity issues 183
normal clone; clone:normal 131 troubleshooting:device access errors 184
nsrclone:command 132 troubleshooting:IP addresses 37
nsrclone:script; clone:nsrclone 158 troubleshooting:network connections 184
troubleshooting:network issues 184
troubleshooting:no writable volume 184
O
openstorage license 49
optimized clone 18
V
version requirements 19
virtual tape library 25, 191
P volume name 93
parallel cloning 18 Volume Shadow Copy Service 84
pool:associated with device 93 volume sharing 25
pool:configuration 84
pool:removing 26
W
wizard:Client Configuration; client:configuration wizard
R 83
recover:deduplicated data 164
recover:disaster 165
redirect backups; backup:redirect 188
remote device 89
replication license 49
reports:basic 176
reports:configuring 174
reports:drill-down 177
reports:reviewing 175

S
Save Set Details: NetWorker Backup Statistics Report
176
Save Set Summary 176
Save Set Summary: NetWorker Backup Statistics
Report 176
secure multi-tenancy 17, 24, 49, 61
seed:as a data migration step 193
seed:before redirected backups begin 188, 191
seed:by native Data Domain replication 190
seed:diminishing value of 192
seed:not required on existing system 194
sessions; save streams 25
shared datazones; multiple datazones; clone-controlled
replication:shared datazones 42
short names, preferred over long names 36
snmp: traps 49, 88
snmp:add ro-community command 88
snmp:add trap-host command 88
statistics, monthly backup report 176
storage node; memory requirement, storage node 25
storage node:dedicated 43
storage node:replace 177
storage space, cleaning; cleaning storage space 26

204 EMC NetWorker 9.1 EMC Data Domain Boost Integration Guide
Copyright © 2015 EMC Corporation. All rights reserved. Published in USA.

EMC believes the information in this publication is accurate as of its publication date. The information is
subject to change without notice.
The information in this publication is provided as is. EMC Corporation makes no representations or
warranties of any kind with respect to the information in this publication, and specifically disclaims
implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution
of any EMC software described in this publication requires an applicable software license.
EMC², EMC, and the EMC logo are registered trademarks or trademarks of EMC Corporation in the
United States and other countries.
All other trademarks used herein are the property of their respective owners.
For the most up-to-date regulatory document for your product line, go to EMC Online Support
(https://support.emc.com).

You might also like