Revinetix Data Protection Appliance USER GUIDE

Data Protection Appliance User Guide
Revinetix
Data Protection
Appliance
USER GUIDE
3/28/2011
Data Protection Appliance User Guide
Table of Contents
Section 1 Revinetix Data Protection Overview ........................................................................... 1
Product Description .................................................................................................................. 1
Key Features .............................................................................................................................. 2
Installation and Setup ................................................................................................................... 3
Unpacking Components ............................................................................................................ 3
Removing and Inserting Disk Drives ....................................................................................... 3
Installation into a Standard 19-inch Rack System .................................................................. 4
Cabling .................................................................................................................................... 5
Network.................................................................................................................................. 5
Keyboard, Video, Mouse ....................................................................................................... 5
Power ..................................................................................................................................... 6
Initial Configuration Login Screen ........................................................................................... 6
Section 2 Administration Console ................................................................................................ 9
Login ........................................................................................................................................... 9
License Agreement .................................................................................................................. 10
Section 3 Quickstart .................................................................................................................... 11
Starting the Quickstart Wizard .............................................................................................. 11
Configuring System Settings Using Quickstart ..................................................................... 11
Time Zone ............................................................................................................................ 13
Date....................................................................................................................................... 14
Password .............................................................................................................................. 15
Network................................................................................................................................ 16
Interfaces ............................................................................................................................. 17
DNS ....................................................................................................................................... 19
Certificate ............................................................................................................................. 20
Confirm................................................................................................................................. 22
Reboot .................................................................................................................................. 23
Section 4 Revinetix Management Console ................................................................................ 25
Overview .................................................................................................................................. 25
Revinetix Management Console ......................................................................................... 25
Actions .................................................................................................................................. 26
PAGE I
Data Protection Appliance User Guide
Filters ................................................................................................................................... 26
Refresh ................................................................................................................................. 28
Menu Tabs ............................................................................................................................ 28
Columns and Sorting ........................................................................................................... 29
Paging ................................................................................................................................... 29
Additional Tools .................................................................................................................. 30
Activating Changes .................................................................................................................. 30
Viewing Notices ....................................................................................................................... 30
Section 5 Server ........................................................................................................................... 33
Active Jobs Sub Tab ................................................................................................................. 33
Importing Jobs Sub Tab .......................................................................................................... 38
Deduping Jobs Sub Tab ........................................................................................................... 39
Scheduled Jobs Sub Tab .......................................................................................................... 41
Recent Jobs Sub Tab ................................................................................................................ 42
Director Status Sub Tab .......................................................................................................... 43
Storage Sub Tab ....................................................................................................................... 44
Reports Sub Tab ...................................................................................................................... 45
Advanced Sub Tab ................................................................................................................... 46
Administration Settings ...................................................................................................... 46
Global Settings ..................................................................................................................... 48
Section 6 Clients .......................................................................................................................... 52
Client..................................................................................................................................... 52
Summary Sub Tab ................................................................................................................... 52
Summary Sub Tab Columns................................................................................................ 53
Summary Sub Tab Additional Actions ............................................................................... 56
New ....................................................................................................................................... 57
Edit........................................................................................................................................ 57
Manual Backup .................................................................................................................... 57
Browse and Restore ............................................................................................................ 57
Search ................................................................................................................................... 59
Download Config ................................................................................................................. 59
Properties............................................................................................................................. 60
PAGE II
Data Protection Appliance User Guide
Advanced .............................................................................................................................. 60
Edit Sub Tab ............................................................................................................................. 61
File Set .................................................................................................................................. 62
Name..................................................................................................................................... 62
Description........................................................................................................................... 63
Password .............................................................................................................................. 63
Client Networking ............................................................................................................... 63
Backup .................................................................................................................................. 63
Schedule ............................................................................................................................... 63
Priority ................................................................................................................................. 65
File Set .................................................................................................................................. 65
VSS ........................................................................................................................................ 66
Matchers............................................................................................................................... 69
Browsing for “Starting Point” Folders ............................................................................... 72
Browsing for Files and Folders Used to Define “Matchers” ............................................. 73
Deduplication....................................................................................................................... 75
Archiving .............................................................................................................................. 75
Notifications......................................................................................................................... 75
Appliance Networking ........................................................................................................ 75
Job Recycling ........................................................................................................................ 76
Error Recovery .................................................................................................................... 76
Other Actions ....................................................................................................................... 76
Edit Clients Options ............................................................................................................. 77
Creating a Client Configuration .......................................................................................... 77
Deleting a Client Configuration .......................................................................................... 78
Filtering the Clients Edit List .............................................................................................. 78
Shared File Sets Sub Tab ......................................................................................................... 79
Editing Shared File Sets ...................................................................................................... 81
Showing File Set Clients ...................................................................................................... 81
Deleting a Shared File Set ................................................................................................... 81
Software Sub Tab..................................................................................................................... 82
Active Directory Sub Tab ........................................................................................................ 82
PAGE III
Data Protection Appliance User Guide
Deploying the Revinetix Backup Agent ............................................................................. 83
Backing Up Active Directory Components ........................................................................ 89
Troubleshooting .................................................................................................................. 89
Schedules Sub Tab ................................................................................................................... 90
Creating a New Schedule .................................................................................................... 91
Creating a Run ..................................................................................................................... 92
Time Selection Options ....................................................................................................... 93
Day Selection Options ......................................................................................................... 93
Month Selection Options ..................................................................................................... 95
Saving the Run ..................................................................................................................... 96
Editing a Schedule ............................................................................................................... 97
Showing Schedule Clients ................................................................................................... 98
Deleting a Schedule ............................................................................................................. 98
Backup Level Considerations ............................................................................................. 98
Usage Sub Tab .......................................................................................................................... 99
Section 7 Jobs ............................................................................................................................. 103
History Sub Tab ..................................................................................................................... 103
Message Logs ..................................................................................................................... 106
Show Client Properties ..................................................................................................... 106
Browse and Restore .......................................................................................................... 106
Restore ............................................................................................................................... 109
Delete.................................................................................................................................. 110
(Re)Import ......................................................................................................................... 110
Deduplicate ........................................................................................................................ 110
Properties........................................................................................................................... 111
Settings Sub Tab .................................................................................................................... 112
Unreferenced Data Sub Tab .................................................................................................. 113
Section 8 Archive ....................................................................................................................... 115
Libraries Sub Tab .................................................................................................................. 115
Selecting the Archive Library ........................................................................................... 115
Viewing the Archive Library............................................................................................. 116
Manage Archive Disk Screen ............................................................................................ 117
PAGE IV
Data Protection Appliance User Guide
Viewing Archived Jobs ...................................................................................................... 119
Using New Archive Disks .................................................................................................. 122
Scanning for Devices ......................................................................................................... 122
Formatting the Disk .......................................................................................................... 123
Testing the Archive Disk ................................................................................................... 123
Archiving Jobs .................................................................................................................... 125
Multiple-Disk Archives...................................................................................................... 129
History Sub Tab ..................................................................................................................... 130
Settings Sub Tab .................................................................................................................... 132
Encryption Sub Tab ............................................................................................................... 133
Media Inventory Sub Tab...................................................................................................... 134
New Mirror Sub Tab .............................................................................................................. 135
Remote Mirrors Sub Tab....................................................................................................... 136
Remote Settings Sub Tab ...................................................................................................... 138
Remote Repositories Sub Tab .............................................................................................. 139
Section 9 Replication................................................................................................................. 141
Configuring Replication ........................................................................................................ 141
Configuring the Secondary Appliance ............................................................................. 142
Configuring the Primary Appliance ................................................................................. 148
Advanced Replication Port Management ........................................................................ 152
Connection Options (optional) ......................................................................................... 153
Starting and Monitoring Replication ....................................................................................... 154
Starting Replication........................................................................................................... 154
Seeding Progress ............................................................................................................... 154
Replication Status .............................................................................................................. 156
Errors during Setup and Configuration ........................................................................... 157
Section 10 System ..................................................................................................................... 159
Status Sub Tab ....................................................................................................................... 159
RAID Sub Tab ......................................................................................................................... 160
Getting Started ................................................................................................................... 160
Identifying a Failed Disk Drive ......................................................................................... 161
Restoring Array Functionality .......................................................................................... 161
PAGE V
Data Protection Appliance User Guide
Logically Remove the Degraded Disk .............................................................................. 161
Replace the Disk ................................................................................................................ 163
Rebuild the Array .............................................................................................................. 163
Rescan the System ............................................................................................................. 164
Reformat the New Drive ................................................................................................... 164
Command Button Actions ................................................................................................. 164
Array Notification Events ................................................................................................. 165
Status Values ...................................................................................................................... 167
Settings Sub Tab .................................................................................................................... 167
Active Directory ................................................................................................................. 168
Certificate ........................................................................................................................... 169
Configuration ..................................................................................................................... 170
Devices ............................................................................................................................... 171
Disk ..................................................................................................................................... 172
DNS ..................................................................................................................................... 173
Email ................................................................................................................................... 174
Firewall .............................................................................................................................. 175
Host Name .......................................................................................................................... 176
Licenses .............................................................................................................................. 177
NAS ..................................................................................................................................... 177
Adding a New Share .......................................................................................................... 179
SMB Protocol ..................................................................................................................... 180
NFS Protocol ...................................................................................................................... 185
Networking ........................................................................................................................ 188
Notifications....................................................................................................................... 189
Password ............................................................................................................................ 193
Reboot ................................................................................................................................ 194
Routes ................................................................................................................................. 195
SNMP .................................................................................................................................. 196
Time .................................................................................................................................... 197
Update ................................................................................................................................ 198
Section 11 Support .................................................................................................................... 201
PAGE VI
Data Protection Appliance User Guide
Portal Sub Tab ....................................................................................................................... 201
Diagnostics Sub Tab .............................................................................................................. 203
Diagnostic Log Viewer ...................................................................................................... 203
Remote Secure Shell Access (SSH) ................................................................................... 204
Secure Revinetix Support Tunnel .................................................................................... 204
Run...................................................................................................................................... 204
Submit Support Request ................................................................................................... 204
Section 12 Client Software Installation and Configuration.................................................... 205
Downloading Client Software ............................................................................................... 205
Installing Client Software and Configuration Files ............................................................. 205
Installing on Linux, Solaris, and FreeBSD ........................................................................ 206
Installing on Windows ...................................................................................................... 207
Additional Notes ................................................................................................................ 209
Configuring the Revinetix Agent ...................................................................................... 214
Removing the Agent .......................................................................................................... 218
Installing on Mac OS X ....................................................................................................... 219
Installing on NetWare ....................................................................................................... 220
Exchange Server Backups ..................................................................................................... 222
Exchange 2003 on Windows 2003 ............................................................................... 223
Exchange 2007 on Windows 2003 ............................................................................... 224
Exchange 2007 on Windows 2008 ............................................................................... 226
Exchange 2010 ................................................................................................................. 229
Exchange Message Level Backups................................................................................ 230
MSSQL Backups ..................................................................................................................... 235
Setting the SQL Server Backup ......................................................................................... 235
How SQL Restores ............................................................................................................. 236
Database Restores ............................................................................................................. 237
Section 13 Bare Metal Backup and Restore (BMR) ................................................................ 239
Performing a Backup ............................................................................................................. 240
Restoring a Bare Metal Backup ............................................................................................ 244
Section 14 System State Restore .............................................................................................. 245
Restoring Active Directory Domain Controllers ................................................................. 246
PAGE VII
Data Protection Appliance User Guide
Performing a Non-Authoritative Restore ............................................................................ 246
Performing an Authoritative Restore .................................................................................. 249
Verifying a Restored Domain Controller ............................................................................. 250
Technical Specifications............................................................................................................ 251
Physical Specifications .......................................................................................................... 251
Power Specifications ............................................................................................................. 251
Other Specifications .............................................................................................................. 252
POSIX Regular Expressions ...................................................................................................... 253
Regular Expression Details ................................................................................................... 253
Bracket Expressions .............................................................................................................. 255
Regular Expression Escapes ................................................................................................. 257
Regular Expression Matching Rules .................................................................................... 259
Acknowledgements ................................................................................................................... 263
License Agreement .................................................................................................................... 265
Revinetix Contact Information ................................................................................................. 275
PAGE VIII
Data Protection Appliance User Guide
Section 1
Revinetix Data Protection Overview
Thank you for purchasing the leading data protection solution for the small
and medium enterprise (SME) organizations. Through our turnkey appliances
and fully integrated data protection software, RevOS®, Revinetix brings
enterprise-caliber data protection to organizations like yours—helping you
meet all of the challenges of data storage, backup, recovery, and archiving.
This manual will help you install, configure, and maintain your Revinetix Data
Protection Appliance.
Product Description
Revinetix technology has been built from “best-of-breed” hardware coupled
with internally developed software. This combination enables Revinetix to
provide a superior data protection solution to the marketplace. The
appliances run Linux—an enterprise-level operating system. While our
company utilizes leading hardware components for our appliances, the
essence of our data protection solution is in our innovative data protection
software.
The Revinetix family of data protection offerings provides a cost-effective
Disk2Disk2Disk® data protection solution for your organization, with up to
70TB or more of RAID 5- RAID 6 protected data storage and backup. After
installation and setup, using and operating your data protection solution is
largely automatic, requiring little or no user intervention.
Revinetix Data Protection Overview
PAGE 1
Data Protection Appliance User Guide
Key Features
 Turnkey solution with fully integrated components
 Unmatched backup and recovery application software
 Innovative Disk2Disk2Disk backup technology
 Data deduplication for maximum storage capability
 Backup Agent for Microsoft Exchange and SQL Server
 Basic NAS (network-attached storage) support
 Fully automated backups and rapid systems recovery
 Automatic job archiving to removable disk drives
 Instant file restoration with point-and-click interface
 Decreased data backup window requirements
 Network backup and restore with Web-based administration
 Internal scheduler for automated backup job execution
 Scheduled multiple backup jobs run simultaneously
 Prioritized backup job scheduling
 Bare Metal Backup and Restore
 Automated reporting via e-mail
Revinetix Data Protection Overview
PAGE 2
Data Protection Appliance User Guide
Installation and Setup
This section will guide you through the process of unpacking and installing the hardware
components of your Revinetix Data Protection Appliance.
Unpacking Components
Unpack the Revinetix Data Protection Appliance components onto a level surface. Use the
packing slip to verify that all contents are present. If your package included rack-mounting
rails, handle them with care; the internal rail can slip easily from the outer rail. If anything
is missing, contact Revinetix, Inc.
Removing and Inserting Disk Drives
The Revinetix Data Protection Appliance should be delivered with the hard drives
packaged separately from the appliance chassis. If you will be lifting the Revinetix Data
Protection Appliance into a rack system, we recommended that you wait to insert the
drives until the chassis is installed in the rack. Without the drives, the chassis is lighter and
easier to lift and manage. We strongly recommend this if you are installing the appliance by
yourself.
The following images and instructions may assist you in removing or inserting the disk
drives:
Figure 0-1: Disk drive front
Installation and Setup
PAGE 3
Data Protection Appliance User Guide
Remove each drive by sliding the crescent-shaped button to the right. The hinge will pop
out, and you can pull on it to slide the drive and attached sled, out of the Revinetix Data
Protection Appliance.
Figure 0-2: Disk drive with open hinge
Insert each drive by sliding it into the empty bay. The hinge should be open as the drive
slides back.
Close the hinge to lock the drive into the bay.
Installation into a Standard 19-inch Rack System
Only qualified technicians should attempt to install rack components, including the
Revinetix Data Protection appliance. Instructions to install components into your particular
rack system are beyond the scope of this guide. Refer to the instructions that came with the
rack mounting equipment suitable for your system. Your rack system may require special
tools; however, the Revinetix Data Protection appliance does not require additional tools
for installation.
Installation and Setup
PAGE 4
Data Protection Appliance User Guide
Cabling
The ports and cable connections on the appliance are illustrated in the following figure:
1 Keyboard (purple)
5. COM port 1 (turquoise)
2. PS/2 mouse (green)
6. VGA port (blue)
3. Back panel USB 1
7. Gigabit LAN 1 (eth 0)
4. Back panel USB 2
8. Gigabit LAN 2 (eth 1)
Figure 0-3: Port and cable connection key
Network
Attach an Ethernet cable to the back of the Revinetix Data Protection appliance at either of
the RJ45 1000MB/s interfaces (eth 0 or eth 1), and then connect the other end to a fast
network with access to all of the computers that may need to use the appliance. However,
as you decide how to connect the appliance to your network, it is important that you stay
behind any existing firewall.
A second 1000MB/s interface is also available to access the appliance. This is useful for
backing up a separate network or possibly for administration purposes. You can connect a
cable from this interface to the desired network, whether it is separate from the first
interface or a dedicated administration network.
Keyboard, Video, Mouse
For initial configuration, you will need a keyboard and monitor; a mouse is optional. If your
rack system has a KVM switch, use the same cabling as with other components to connect
the Revinetix Data Protection Appliance to the switch. Otherwise, connect the keyboard,
monitor, and mouse cabling directly to the appliance. The appliance must have a keyboard
and/or KVM switch connected to it to boot properly.
Installation and Setup
PAGE 5
Data Protection Appliance User Guide
Power
Connect the power using approved electrical cabling for your rack system. If your Revinetix
Data Protection Appliance is configured with redundant power supplies, make sure that
you connect power to both.
The power button is located in the front panel on most 1U, 2U, and 3U systems. Larger
systems, such as 4U and above, may have the power button located in the back of the unit.
When you press the power button, the system will start booting.
Initial Configuration Login Screen
Once your Revinetix Data Protection Appliance is operational, the Login screen will appear:
Figure 0-4: Initial login screen
Log in using the following username and password:


Username: admin
Password: rvxd2d2d
Note: Use the Tab key to navigate these configuration screens.
After you log in, the Initial Configuration screen will appear.
Select Configure Network Devices, and then press Enter.
Installation and Setup
PAGE 6
Data Protection Appliance User Guide
The Edit Network screen will appear:
Figure 0-5: Edit Network screen
To enter the information on the Edit Network screen:
1. Enter a short name and a domain name for the appliance on your network.
2. Select DHCP or static configuration. If you want to use a static IP address, enter an IP
address and netmask.
3. Enter a client ID.
4. Enter a default gateway.
5. Tab down to Submit and press Enter.
Installation and Setup
PAGE 7
Data Protection Appliance User Guide
The Initial Configuration screen now displays the IP address assigned to the Revinetix
Data Protection Appliance. If you assigned a static address to the device, you will need to
reboot the appliance to display the correct address.
Figure 0-6: Initial Configuration screen with IP address
After you complete the above steps, connect to the Revinetix Data Protection Appliance
through a Web browser on any computer in the network using the displayed address, and
then proceed with setup and client configuration.
Installation and Setup
PAGE 8
Data Protection Appliance User Guide
Section 2
Administration Console
This section gives an overview of the Web interface used to administer the Revinetix Data
Protection Appliance. You will use the Web interface to go through the initial configuration
of the appliance.
The administration interface keeps track of your current session and will “time out”
sessions after a certain period of inactivity. Some Web pages may generate errors after a
period of inactivity if the session information has been deleted. If this occurs, simply restart
the operation that you were using from the appropriate menu. We recommend that you use
only one browser window at a time for making modifications; using multiple browser
windows in the same session will cause system confusion.
You must log in each time you access the administration console.
Note: Do not use the Back button to return to a previous menu option.
(Instead, click the option in the menu.) Also, we recommend that you enable
cookies on your browser.
Login
Your login screen will be similar to the following:
Figure 2-1: Login screen
Log in using the following defaults:


Username: admin
Password: rvxd2d2d
Administration Console
PAGE 9
Data Protection Appliance User Guide
We recommend that, after you log in this first time (and view the license agreement), you
use the Quickstart wizard to change the password to something that only you will know.
(See “Configuring System Settings Using Quickstart” on page 11.)
License Agreement
After you log in for the first time, the screen will display the Revinetix license agreement:
Figure 2-2: License Agreement screen
The full text of the license agreement is also listed in the section “License Agreement,” on
page 253.
Read the license agreement, and then click Accept to accept the agreement and begin using
your Revinetix Data Protection Appliance.
After you accept the license agreement, the Quickstart screen will appear. You can go
through the Quickstart steps now, or you can bypass them by closing the screen (by
clicking Dismiss). You can access the Quickstart again at any time through the Help options
in the upper-right corner of the screen.
For more information about the Quickstart steps, see “Configuring System Settings Using
Quickstart” on page 11.
Administration Console
PAGE 10
Data Protection Appliance User Guide
Section 3
Quickstart
The Quickstart wizard will take you through the steps for modifying the basic system
settings required to customize your Revinetix Appliance.
Starting the Quickstart Wizard
When you first log in to the Revinetix administration console, after you read and accept the
license agreement, the Quickstart wizard starts automatically.
You can also start the Quickstart wizard at any other time, by clicking Help in the upperright corner of the screen and then selecting Quickstart from the drop-down menu.
Configuring System Settings Using Quickstart
This section describes the settings that you can make using the Quickstart wizard.
As you go through the Quickstart wizard and make settings, most of the screens will
include the following buttons:
Figure 3-1: Submit, Reset, and Skip buttons
Note: The buttons described in this section also appear and perform similar
functions on many other configuration screens in the Revinetix Management
Console interface.
Quickstart
PAGE 11
Data Protection Appliance User Guide
To make settings and navigate through the wizard, click the buttons as follows:
Button
Purpose
Submit
Apply your changes on that screen and move on to the new screen.
(Changes won’t actually be applied to your system until you confirm
them on the Confirm screen later.)
Reset
Change the settings on that screen back to their original values.
Skip
Make no changes on that screen and move on to the next screen.
Note: You can also use the mouse to navigate directly to the sections listed in
the left panel.
The following buttons also appear on Quickstart wizard screens:
Figure 3-2: Dismiss and Reload buttons
Use these buttons as follows:
Button
Purpose
Dismiss
Exit the Quickstart wizard without making any changes.
Reload
Start this session of the Quickstart wizard over again, on the first
screen with the original settings. (This applies to any changes that
you have not already confirmed on the Confirm screen.)
Quickstart
PAGE 12
Data Protection Appliance User Guide
Time Zone
Use the Time Zone screen to specify the geographic time zone for the Revinetix Data
Protection Appliance local clock.
Figure 3-3: Time Zone screen
Backup schedules are defined and executed with respect to the time zone specified by this
setting. The factory default time (America/Denver) corresponds to the U.S. Mountain time
zone recognizing daylight saving time. If you are located outside this time zone, use the
Time Zone drop-down list to select your time zone setting.
Quickstart
PAGE 13
Data Protection Appliance User Guide
Date
Use the Date screen to view an up-to-the-minute display of the system’s current time and
date.
Figure 3-4: Date screen
Make sure the values are correct. If they are not, modify any incorrect settings and then
click Submit.
Note: Your settings (especially for time of day) can be approximate at this
time. After initial setup, you can set up time synchronization service with an
NTP server in order to maintain a far more accurate time base. You can do
this using the Time setting under the Settings sub tab of the System tab.
(See “Time” on page 13.)
Quickstart
PAGE 14
Data Protection Appliance User Guide
Password
Use the Password screen to change the password from the default. If you don’t want or
need to change the password, you can skip this step.
Figure 3-5: Password screen
As noted on the screen, the password is case-sensitive and can be any combination of
alphanumeric characters and punctuation marks. The minimum password length is one
character, but we recommend a password longer than six characters, using upper- and
lower-case letters with digits and punctuation characters. Use a password that won’t be
easily guessed.
Note: You can only change the password using the Quickstart wizard during
the first initial setup. After you set the password the first time, to change the
password you must use the Password setting on the System > Settings
screen.
Submitting a new password will change both the Web interface “admin”
password and the system’s (console) “root” password.
Quickstart
PAGE 15
Data Protection Appliance User Guide
Network
Use the Network screen to configure your appliance for networking.
Figure 3-6: Network screen
Setting
Description
Short Name
The name that the rest of your network will use to refer to the
Revinetix Data Protection Appliance. The hostname can contain
only alphanumeric characters a hyphen; the hyphen cannot be the
first or last character.
Domain Name
The name of your network domain. The same characters are valid
for the domain name as for the hostname. You may not have two or
more periods in the name without other valid characters between
the periods. For example: backup1 is a valid hostname, and
your-domain.com is a valid domain name, but -minus is not a valid
hostname.
Default Gateway
The default IP address for non-local network communications. You
don’t need to enter the gateway if the appliance will be using the
Dynamic Host Configuration Protocol (DHCP).
Quickstart
PAGE 16
Data Protection Appliance User Guide
Interfaces
Use the Interfaces screen to enter network interface configuration settings.
Figure 3-7: Interfaces screen
In this step, the most critical aspects of your Revinetix Data Protection Appliance network
interfaces are defined. The Interfaces screen provides information and configuration for
each network interface on your Revinetix Appliance.
Setting
Description
Name
The name of the interface for the given row.
Mbps
The maximum throughput in megabits per second that the interface
will support.
Link
The link status of the interface. True indicates a connection
detected; false indicates no connection detected.
Quickstart
PAGE 17
Data Protection Appliance User Guide
Setting
Description
Enabled
If the Enabled check box is checked, the interface will be turned on
and configured with an IP address when the appliance launches. If
the Enabled check box is not checked, the relevant interface will
not be used by the system.
On appliances with two interfaces, you must enable at least one
interface. We recommend that you enable the interface with the
highest speed. Enabling the second interface will give your
appliance a second way to communicate with other network
devices. This is useful if you want to dedicate the faster interface to
backups and the slower interface to management access. If all
interfaces are disabled, the only access to the appliance will be
through the console.
Configuration
There are two methods of assigning an IP address to the Revinetix
Appliance, via DHCP or manually.
In order to use DHCP, a DHCP server must be present on your
network.
If you select the Use Static option, you must enter an IP address and
subnet mask for the interface. If you do not know what values to
specify, contact your system administrator or IT professional.
Selecting the Use DHCP option allows the Revinetix Appliance to
query the DHCP server for its network parameters.
Note: We strongly recommend that you configure the
Revinetix Appliance with a static IP address. The appliance is
shipped with both interfaces set to use DHCP as a
convenience during initial setup.
Address
This field is required if you select the Use Static option under
Configuration. Set this field to the appliance's IP address.
Netmask
This field is required if you select the Use Static option under
Configuration. Set this field to the netmask used by the interface’s
attached network.
Client ID
This field is optional if you select the Use DHCP option under
Configuration. Set this field to the appliance’s IP address. If you
specify a name in the Client ID field, your Revinetix Appliance will
request the specified ID from the DHCP server. The Client ID field is
typically set to the appliance’s hostname without the domain
extensions.
Quickstart
PAGE 18
Data Protection Appliance User Guide
DNS
If you selected static IP configuration for your network interfaces (on the Interfaces
screen), use the DNS screen to manually configure the Domain Name Service (DNS) for
your network interface.
Figure 3-8: DNS screen
Specify your domain name and up to three IP addresses for your domain servers.
If you selected DHCP configuration, data from the DHCP server will override information in
these fields.
For further details, contact your system administrator or IT professional.
Quickstart
PAGE 19
Data Protection Appliance User Guide
Certificate
Use the Certificate screen to create a self-signed SSL (Secure Sockets Layer) certificate and
enable secure communications with the appliance.
Figure 3-9: Certificate screen
The Revinetix Appliance uses a certificate to authenticate itself to your Web browser. Most
Web browsers expect the certificate’s Common Name to match the Hostname that you set
on the Network screen earlier.
Customize the other fields to ensure that they easily identify your specific Revinetix
Appliance. Your Web browser uses this certificate when it connects via SSL. You can initiate
an SSL connection by using the URL prefix https:// instead of http://. One advantage of
using https:// over http:// is that all communication between your Web browser and the
Revinetix Appliance is then encrypted.
Quickstart
PAGE 20
Data Protection Appliance User Guide
Setting
Description
Common Name
(CN)
The appliance’s fully qualified host name (for example,
backup.samplecompany.com). Do not use asterisks (*) or question
marks as part of the Common Name.
Organizational
Unit (OU)
Used to differentiate between organizational divisions. A “doing
business as” (DBA) entry is acceptable, or “Secure Services
Department” is commonly used. Do not abbreviate.
Organization (O)
The legal name under which your organization is registered. Do not
abbreviate.
City or Locality
(L)
The city where your organization resides. This field is required for
organizations registered at the local level only. Do not abbreviate.
State or Province
(ST)
The complete name of the state or province where your
organization is located.
Country (C)
The two-character ISO-format country code (for example, US for the
United States, CA for Canada, or GB for Great Britain).
Quickstart
PAGE 21
Data Protection Appliance User Guide
Confirm
Use the Confirm screen to inspect the settings that you have made using the Quickstart
wizard, and then to apply the settings to your appliance.
Figure 3-10: Confirm screen
As you review the settings, you can click the Customization links on the left as needed to
return to earlier screens to edit settings.
To apply your settings to your Revinetix Appliance, click Commit. (As before, you can click
Dismiss to exit the Quickstart wizard, or Reload to revert to your original settings and
start over.)
Note: Remember, once you click Commit, your settings would be the new
default settings if you were to run the Quickstart wizard again and click
Reload.
Quickstart
PAGE 22
Data Protection Appliance User Guide
Reboot
Use the Reboot screen to reboot the appliance after you have committed your changes.
Figure 3-11: Reboot screen
Click Reboot to start the appliance (or click Dismiss to exit the Quickstart wizard without
rebooting).
Quickstart
PAGE 23
Data Protection Appliance User Guide
Section 4
Revinetix Management Console
Revinetix has chosen the open source backup program Bacula® as the basis of the
Disk2Disk2Disk backup solution. The Bacula backup program is in use worldwide and
under active development. Revinetix is dedicated to providing you with the latest features
and bug fixes for Bacula. For more information on the Bacula backup program, please visit
their Web site at http://www.bacula.org.
Bacula is a moderately complicated system. To simplify the use of the Bacula system,
Revinetix has provided an easy-to-use view and management interface to the functionality
Bacula provides.
Overview
Before you configure your Revinetix Appliance, you need to become familiar with a few
concepts. These concepts will give you a basic understanding of how the Revinetix
Appliance works and how to configure it.
Revinetix Management Console
Here is a first look at the Revinetix Management Console.
Figure 4-1: Revinetix Management Console
Revinetix Management Console
PAGE 25
Data Protection Appliance User Guide
Actions
A new Actions menu is located in the upper-left corner of the screen. Actions is a dropdown menu that offers a set of tools or actions to be performed for the current page. An
action can also be performed on a selected set of data.
Note: The selections in the Actions menu vary according to the combination of menu tabs
and sub tabs selected, as well as to the specific entries selected on the screen.
In the Actions menu example below, some of the menu options (Edit and Download
Config) do not apply to the selection on the screen:
Figure 4-2: Actions menu
Note: You can also access the Actions menu by right-clicking the screen
entry that you want to apply the action to.
Filters
Just to the right of the Actions menu is the Filters menu. Filters can be applied throughout
most of the user interface, wherever tables of information are displayed. The available
filters will change based on the tab or page that you are viewing.
To enable filtering, from the Filters drop-down menu, check the Show Filters check box:
Figure 4-3: Filters
(Or, you can simply click the Filters button to toggle filtering on and off.)
Revinetix Management Console
PAGE 26
Data Protection Appliance User Guide
For example, if you enabled filtering on the Clients > Summary screen, the following line
would appear at the top of the list of clients (just below the sub tabs):
Figure 4-4: Filtering example: Clients > Summary screen
This example shows two types of filters:


The Status filter is a drop-down menu, on which you check the check boxes in order
to show only clients with one or more particular status types. (By default, all status
types are checked, so that status filtering occurs only when you uncheck one or more
check boxes.)
The other filters (Name, Address, and so on) are text-based filters, where you
would type in the name or other information that you want to match, in one or more
columns. Filter entries are not case-sensitive, and partial filter entries can be used—
for example, all names beginning with “d” or “da.”
Another example is from the Jobs > History screen:
Figure 4-5: Filtering example: Jobs > History screen
In this example, note the following:



For numerical values (such as Id and Errors), you can enter either individual
numbers or a range of numbers. For example, “100–110” would list all jobs with job
IDs numbered from 100 to 110.
You can click some buttons (or use their drop-down menus) to toggle through some
attributes. For example, if you click the Archived Don’t Care button multiple times,
it will change to Archived Is Set, then to Archived Is Not Set, and then back to the
original setting, indicating whether or not to filter based on the Archived attribute.
You can filter job entries based on when they started, when they are scheduled to
run, and when they finished. For each of these attributes, you can enter start and/or
end dates, either manually or by clicking the calendar icon.
Whatever filters you set, the respective screen will list only the items that meet all of the
filter criteria. For example, in the Jobs > History example, if you entered values in the Id
and Client Name fields and toggled the archiving button to Archived Is Set (and didn’t
change any other of the filters shown), the screen would display only archived jobs for the
named client in the specified range of job IDs.
Note: Whether or not Show Filters is checked, filtering applies until you
either remove the filtering qualifications or click Reset Filters in the Filters
drop-down menu.
Revinetix Management Console
PAGE 27
Data Protection Appliance User Guide
Refresh
To refresh the page that you are viewing, click the Refresh button to the right of the Filters
menu. You can also use the Refresh drop-down menu to adjust how frequently the display
will refresh (including “manually,” which means that the display will not refresh
automatically).
Figure 4-6: Refresh menu
Because of the new application design, refreshing the browser effectively restarts the
management console session.
Menu Tabs
The tab menu system helps simplify navigation from one area of the Revinetix user
interface to another.
The interface has two rows of tabs:


The top row tabs are a high-level division of the user interface, with the following
options: Server, Clients, Jobs, Archive, Replication, System, and Support.
The bottom row tabs (or sub tabs) provide quick access to the configuration
sections. The sub tabs vary according to which top tab is selected. For example,
Figure 5-1: Active Jobs sub tab shows the Active Jobs sub tab and several other
sub tabs that appear when the Server tab is selected. If you selected the Clients tab,
different sub tabs would appear.
The combination of tabs and sub tabs selected determines the screen content displayed
below the tabs. For example, the screen content shown in Error! Reference source not
ound. is for the combination of the Server tab and the Active Jobs sub tab.
When this documentation refers to the combination of tabs and sub tabs selected, the tab
and sub tab will be separated by the “ > ” symbol. For example, in Figure 5-1: Active Jobs
sub tab, the screen that appears when the Server tab and the Active Jobs sub tab are
selected will be referred to as the Server > Active Jobs screen.
Revinetix Management Console
PAGE 28
Data Protection Appliance User Guide
Columns and Sorting
Page content is highly customizable. You can select which column to sort the screen on by
clicking the column heading. In the example below, columns are assorted by the Name
column, in ascending order. You could click the Name column heading to change the sort
order to descending, or you could click a different column heading to sort by that column
instead.
Figure 4-7: Columns
You can also change column widths, and you can reorder columns by dragging-anddropping them into the desired order.
By clicking the drop-down menu attached to each column heading, you can also:



Change the column’s sort order to ascending or descending (another method to do
this)
Add columns to or remove columns from the view. Not all columns are visible by
default.
Group screen entries according to the items in the selected column—for example,
you can group by clients or by backup level.
Figure 4-8: Columns menu
Paging
Paging is another new feature in the user interface. You can move from page to page using
the navigation buttons (or typing the page number) at the bottom of the window. The
default number of records displayed on each page is 25; you can change this number in the
Page Size text box.
Figure 4-9: Page controls
Revinetix Management Console
PAGE 29
Data Protection Appliance User Guide
Additional Tools
Three more useful tools are located at the bottom of the screen:




A status bar indicating the amount of used disk space and free space disk space
A messages area where notifications may appear (View Notices)
The RAID status indicator and link
Replication Status Indicator (green when active, red when inactive)
Activating Changes
Whenever you modify the current configuration, the Activate Configuration button in the
upper-right corner of the Web page will become active, indicating that the modified data is
not yet known to the Revinetix Appliance:
Figure 4-10: Activate Configuration button
Note: The Revinetix Appliance allows most configuration changes to be made
at any time by pressing Activate Configuration. However, when adding new
clients, all currently running backups must finish before the new clients will
be registered. Shortly after pressing Activate Configuration, a dialog will
acknowledge that changes have been made.
To save and activate the modified configuration, click either the Activate Configuration
button or the banner in the View Notices window.
Note: Any unsaved changes will be saved automatically 30 minutes after the
last modification. Changes to existing clients take place immediately. New
client additions are recognized after any running jobs are completed.
Once the modified configuration is saved, a restart of the backup daemons is scheduled.
The restart will not take place until it is safe to do so. Any jobs that are running or waiting
may cause the restart to be postponed until the jobs are completed, as restarting the
backup daemons will clear these active jobs. Therefore, you may not be able to use the
modified configuration for some time.
Viewing Notices
The View Notices button also appears, in the lower-right corner of the screen, next to the
RAID button when modifications are made or when something on the appliance requires
user action:
Figure 4-11: View Notices button
Revinetix Management Console
PAGE 30
Data Protection Appliance User Guide
When you click View Notices, notification banners are displayed in a separate window. In
the case of the modified configuration, the banner indicates that you need to save the
configuration:
Figure 4-12: Save Modified Backup Configuration banner
Other banner messages displayed when you click View Notices typically indicate that some
action is required—for example, a catalog needs to be updated, or disk space is almost full.
Banners may also display useful information. In most cases, when you click on the banner,
you will be taken to the specific page on which to address the issue.
Revinetix Management Console
PAGE 31
Data Protection Appliance User Guide
Section 5
Server
This section documents the Server tab, which has the following sub tabs:









Active Jobs
Importing Jobs
Deduping Jobs
Scheduled Jobs
Recent Jobs
Director Status
Storage
Reports
Advanced
These sub tabs are described under the respective headings in this section.
Note: If you are running replication, some of the sub tabs listed above do not
appear on the management console for the secondary appliance.
Whenever you modify your configuration, remember to save your
modifications; see “Activating Changes” on page 30.
Active Jobs Sub Tab
The Active Jobs sub tab shows jobs that are currently running or waiting to execute:
Figure 5-1: Active Jobs sub tab
Server
PAGE 33
Data Protection Appliance User Guide
The default Active Jobs sub tab screen has the following columns:
Column
Description
Status
Whether the job is running or waiting. Some Status examples are
listed below. Common reasons for waiting:
 Execution—The job is waiting for running jobs to finish.
 Higher priority job—The job is waiting for higher priority
jobs to finish.
 Max Client Jobs—The client for which this job will run is
currently running another job.
Waiting For Start Time:
Waiting For File Daemon
Server
A backup started, erred out and
was rescheduled because it has
“retry on error” set in the client
configuration. The client may be
down (Which will eventually
cause an error) or the client
could be up and something else
caused the job to error out
(network, os issue, etc).
The appliance cannot talk to the
agent and is waiting for it to
come on line. Once the
connection times out the job will
error out and either fail or
reschedule (and go to wait for
start time). It's likely the client
computer is down, the agent is
not running, or there is a firewall
blocking access. If none of those
are true then restarting the
agent (on the server) may help.
PAGE 34
Data Protection Appliance User Guide
Column
Description
Waiting for Storage Daemon
Usually only seen when more
than one job for a particular
agent is running. Only one
job/client is allowed to run at a
time, so only one job should be
running and the rest should be
Waiting for Storage Resource.
Waiting for storage daemon
means either the storage
daemon is not running
(appliance is out of space) or
bacula is hung up and backup
daemons need to be
restarted (Server > Director
Status > Actions > Restart
Backup Service).
Waiting for Storage Resource
Another backup is running on
the same client. If storage
daemon does think jobs are
running but director does not, or
vice versa, then Bacula is
confused and needs to be
restarted (on server and
appliance).
Waiting for Mount
Waiting Max Priority
Server
A reboot is needed after a
configuration is loaded. This
error can appear if the reboot
does not happen after uploading
a configuration.
There are jobs with a higher
priority in queue that need to
finish in order for this backup to
run.
PAGE 35
Data Protection Appliance User Guide
Column
Description
Waiting for Client Resources
It looks like that message relates
to the Max Concurrent Jobs
setting. So, for instance, if set to
6 (and there are 6 jobs running)
only one job per client will run
at a time and only 6 total will
run at time. If you'd like to
change that number you can do
so in Server > Advanced but that
likely will not go into effect
immediately.)
Type
Backup or restore job.
Level
The backup level:
 Full—Saves all files specified for the client, whether or not
they have been modified since the last backup.
 Differential—Saves all files that have been modified since the
last full backup.
 Incremental—Saves any file that has been modified since any
previous successful backup (full, differential, or incremental)
of that file.
Job Id
A job ID number.
Priority
The job priority. Lower numbered jobs are executed first. Jobs with
a priority greater than 500 are executed when no other higher
priority jobs are running.
Client
The name of the client that the job belongs to.
Note: These are the default columns under the Active Jobs sub tab. On this
screen and many others, you can change which columns appear, the order in
which they appear, and the sort order; see “Columns and Sorting” on page 29.
Server
PAGE 36
Data Protection Appliance User Guide
To open a contextual drop-down menu from which you can view message logs or cancel
active jobs, either:


Select the job and click Actions in the upper-left corner, or
Right-click the job.
Figure 5-2: Active Jobs contextual menu
Note: You can also access the Actions menu the same way for many other
sub tabs in the Revinetix Appliance, although the contextual menu options
will vary by sub tab.
To view the details for the active job, select Message Logs from the Actions menu.
Figure 5-3: Job message log example
To refresh the message log screen (for the active job), click Reload in the lower left-corner.
To close the window, click OK.
To cancel an active job, select Cancel from the Actions menu, and then click Yes or No to
confirm.
After you cancel an active job, a Cancel Job Results message will confirm that the job was
canceled. If a canceled job does not clear from the Active Jobs Sub Tab, see “Director Status
Sub Tab” for troubleshooting assistance.
Server
PAGE 37
Data Protection Appliance User Guide
Importing Jobs Sub Tab
The Importing Jobs sub tab lists all backup jobs that have finished and are being imported
into the catalog. The file catalog allows access to individual files in each backup.
Figure 5-4: Importing Jobs sub tab
The screen lists jobs that are pending, the job currently being imported, and jobs that were
mostly recently imported.
You cannot access individual files to browse or restore them until the job associated with
the file is completely imported.
Server
PAGE 38
Data Protection Appliance User Guide
Deduping Jobs Sub Tab
Currently, Revinetix offers a post-process deduplication feature. This requires a backup
job's data to occupy space on your RAID while deduplication occurs. Deduplication occurs
by reading the backup job data and copying unique files to a repository that is also on the
RAID, while duplicate files are simply referenced and not copied. During this time, both the
original backup job data and repository copies of unique files are on the RAID. In the worst
case, (if a backup job consists entirely of unique files), free space equal to the backup job's
size is required for the repository copies. Consequently, prior to running a backup job
which will be deduplicated, the amount of free space required to backup and deduplicate
may be as much as double the size of the data to be backed up. When deduplication
completes, the original backup job data is then deleted from the RAID.
Given these requirements, RevOS checks the following before deduplicating a backup job
on the RAID:
1. There must be at least 1.5 gigabytes free space on the RAID, and
2. There must be more free space on the RAID than the size of the backup job. For example,
if a 100 GB backup job completes, then RevOS requires at least 100 GB of free space to
begin the deduplication process.
If your appliance is nearing its full capacity, you can try these suggestions to allow
successful deduplication:
1. Stagger the full jobs of large clients. The time between each job should account for its
backup, importing, and deduplication time, plus a buffer. For example, if you have 3 clients
that each take 30 minutes to backup, import and deduplicate, then schedule the full
backups at least 45-60 minutes apart. The length of time it takes to backup and deduplicate
varies with the size and number of files.
2. If a single client's full backup is too large and will not deduplicate, then we recommend
you break the client into two or more separate clients, each with a non-overlapping file set
that roughly has a balanced amount of data. For example, if you have a client "SRV" with 1
TB of data on C: and 1 TB of data on D:, create a SRV-A client with C:/ in its file set, and a
SRV-B client with D:/ in its file set. Stagger these clients' schedules as above. Separating the
data in this manner would require a minimum of 2 TBs of free space instead of 4 TBs.
The Deduping Jobs sub tab lists backup jobs that have been deduped (deduplicated),
meaning that only one copy of a given file is kept in the backup.
Server
PAGE 39
Data Protection Appliance User Guide
Figure 5-5: Deduping Jobs sub tab
The screen lists jobs that are pending, the job currently being deduped, and jobs that were
most recently deduped.
Server
PAGE 40
Data Protection Appliance User Guide
Scheduled Jobs Sub Tab
The Revinetix Appliance uses a schedule to determine when a given client will be backed
up. You can define as many schedules as you need. There are no restrictions on how many
clients can use a specific schedule. For more information on configuring the schedules on
your Revinetix Appliance, see “Schedules Sub Tab” on page 90.
The Scheduled Jobs sub tab lists all jobs scheduled to run within the next 24 hours.
Figure 5-6: Scheduled Jobs sub tab
Server
PAGE 41
Data Protection Appliance User Guide
Recent Jobs Sub Tab
The Recent Jobs sub tab displays a summary of the last several jobs that have completed
execution.
Figure 5-7: Recent Jobs sub tab
If a job terminated with an error, the job summary will be highlighted in red, making
identification easy. You can consult the message logs or the system-generated e-mail for
the specific cause of the error.
Server
PAGE 42
Data Protection Appliance User Guide
Director Status Sub Tab
The Director Status sub tab displays details about the RVX-Backup kernel version. The tab
also shows when the backup daemons were last started and how many jobs have run since
then.
Figure 5-8: Director Status sub tab
The Actions menu from this page contains a Restart Backup Service option.
Figure 5-9: Restart Backup Service
This can be a helpful option if the backups seem to be locked up or frozen or if the
appliance is just acting strangely or even if you just need to stop all backups immediately.
Keep in mind that this will cause all running, importing, and deduping jobs to stop. If you
select this option, you will be prompted whether to continue.
Server
PAGE 43
Data Protection Appliance User Guide
Storage Sub Tab
The Storage sub tab displays information about your UCAR (unique content-addressable
repository) garbage collection system.
Figure 5-10: Storage sub tab
For clients using deduplication, the UCAR system runs a garbage collection process every
day to find and purge any garbage. Some ways that data can become unreferenced
“garbage” are when clients are deleted without their jobs being purged, or when old jobs
weren’t removed completely. It is recommended to run garbage collection after deleting
jobs to insure the data is cleared completely. This is similar to jobs with unreferenced data;
see “Unreferenced Data Sub Tab” on page 113.
Starting with 3.1 RevOS, garbage collection will not occur if jobs are currently being
deduped. The Progress bar for the Garbage Collection process will say deferred in this case.
The garbage collection will be deferred for up to 12 hours before it gives up, and will be
retried at its regular time. One exception is if the system is running low on space the
Garbage Collection will proceed whether there are jobs deduplicating or not.
Server
PAGE 44
Data Protection Appliance User Guide
The Storage screen has three settings:
Setting
Description
Garbage Collection
To start garbage collection manually, click Start.
Garbage Collection
Time of Day
To change the time of day that garbage collection runs
automatically, click Edit, set the hour and minute (using a
24-hour clock), and then click OK.
Verify UCAR
To verify the UCAR integrity, click Start. If you want to cancel
the process, click Stop. This will systematically read all the
files in the UCAR and verify their computed signature
matches the recorded one. If not, the file is quarantined. The
verify process is extremely I/O intensive and can take weeks
to run to completion on systems with a lot of data. Use only
when directed by Revinetix Support.
Reports Sub Tab
The Reports sub tab displays daily and weekly summary reports.
Figure 5-11: Reports sub tab
Server
PAGE 45
Data Protection Appliance User Guide
The Daily Report Preview section is a simple summary of the results for the jobs run for
the day.
The Weekly Report Preview section is a simple summary of the results for the jobs run
for the week.
You can change the day and time that each report is sent.
Advanced Sub Tab
The Advanced sub tab lets you reset to factory defaults, create an NAS (network-attached
storage) backup client, and change some global settings if needed:
Figure 5-12: Advanced sub tab
Administration Settings
There are two settings in the Administration pane: Reset to Factory Defaults and Create
NAS Backup Client.
Server
PAGE 46
Data Protection Appliance User Guide
Reset to Factory Defaults
Clicking Reset will cause the Revinetix Appliance to delete all existing client configurations,
catalogs, and backup data volumes. This brings the Backup System close to its original outof-the-box state.
The appliance configuration files will not be removed—that is, network settings will still be
configured, and you will still be able to access the appliance. Also, any information on the
archive disk will not be removed. The archive disk will need to be formatted to clear any
data.
Warning: This action will remove all backup clients, added schedules,
databases, and backup data currently stored on disk. There will be no way to
retrieve any saved data once this operation is complete.
You will be prompted to confirm this action. Click Yes to continue or No to cancel.
Create NAS Backup Client
To create an NAS backup client, click Create. A results window will appear; click OK to
close the window.
Then, either:


Server
Click View Notices, which will open another window, and then click the orange
banner, or
Click Activate Configuration in the upper-right corner of the screen to complete
the creation.
PAGE 47
Data Protection Appliance User Guide
Figure 5-13: Confirming creation of NAS backup client
Global Settings
The Global Settings page provides an interface to some of the advanced settings used by the
backup system’s backup program. In most cases, the settings on this page should not
require any changes.
After you make any changes, click Apply to save your changes.
Director
Setting
Description
Maximum Concurrent
Jobs
The maximum number of backup jobs the system will
attempt to perform at the same time. Too many overall
system throughput will slow down increasing backup
window, too few and the backup window will increase due to
ineffective utilization. Users may need to experiment to find
out what a good value for their data set is.
Server
PAGE 48
Data Protection Appliance User Guide
Listening TCP Port
The TCP port that the Backup System Director binds to. The
default is 9101. This port has been registered, so conflicts
with another application are unlikely. If you encounter a port
conflict in your environment, you can change the port
specification.
Note: If you change a port to one that is already in
use, errors will occur.
Storage Daemon
Connection Timeout
How long the Backup System Director should continue
attempting to contact the Storage Daemon to start a job.
After this period of time, the Backup System Director will
cancel the job. The default is 30 seconds.
File Daemon
Connection Timeout
How long the backup system should continue attempting to
contact a client to start a job. After this period of time, the
backup system will cancel the job. The default is 30 seconds.
File Daemon
Setting
Description
Listening TCP Port
The TCP port that the Backup System Director binds to. The
default is 9102. This port has been registered, so conflicts
with another application are unlikely. If you encounter a
conflict in the network environment, you can change the port
specification.
Note: If you change this parameter, you will need to
add each client back in and download each client’s
configuration file again. You can also edit each client’s
configuration file by changing the line that reads
FD Port = 9102 to indicate the new port number. If
you change a port to one already in use, errors will
occur.
Server
PAGE 49
Data Protection Appliance User Guide
Heartbeat Interval
This setting defines an interval of time. For each heartbeat
that the client agent receives from the Storage daemon, it
will forward it to the Director. In addition, if no heartbeat has
been received from the Storage daemon and thus forwarded
the File daemon will send a heartbeat signal to the Director
and to the Storage daemon to keep the channels active. The
default interval is zero which disables the heartbeat. This
setting only affects the client agent running on the appliance
itself.
This feature is particularly useful if you have a router that
does not follow Internet standards and times out an inactive
connection after a short duration.
Server
PAGE 50
Data Protection Appliance User Guide
Storage Daemon
Setting
Description
Listening TCP Port
The TCP port that the Backup System Storage Daemon binds
to. The default is 9103. This port has been registered, so
conflicts with another application are unlikely. If you
encounter a port conflict in your network environment, you
can change the port specification.
Note: If you change a port to one that is already in
use, errors will occur.
Maximum Concurrent
Jobs
The maximum number of backup jobs that the backup
storage system will accept simultaneously. This number
should be equal to or greater than the Maximum Concurrent
Jobs for the Director.
Listening (Bind To)
Address
The IP Address that the Backup System Storage daemon will
bind to. Normally the Backup System Storage daemon will
bind to all addresses present on your Revinetix Appliance. To
limit the daemon to one of the two network interfaces, select
the IP address of the appropriate network interface.
Server
PAGE 51
Data Protection Appliance User Guide
Section 6
Clients
This section documents the Clients tab, which has the following sub tabs:







Summary
Edit
Shared File Sets
Software
Active Directory
Schedules
Usage
These sub tabs are described under the respective headings in this section.
Note: Whenever you modify your configuration, remember to save your
modifications; see “Activating Changes” on page 30.
Client
The Revinetix Appliance defines a client as a set of files and directories on an individual
networked computer file system that requires backup service. Each physical machine can
have many sets of files and directories and therefore can be referred to by many client
entries. While there are no hard limits to the number of clients that you can add to the
system, there are practical limits to the number of clients
Note: As a general rule, the capacity of your Revinetix Appliance should be
approximately double the total amount of client hard disk space. Following
this rule will ensure that you have reasonable space for newly modified data
after each client has been completely backed up.
Summary Sub Tab
When you click the Summary sub tab, the screen displays a list of client configurations
currently known to the Revinetix Appliance. On a new installation, the Summary tab will be
similar to the following:
Clients
PAGE 52
Data Protection Appliance User Guide
Figure 6-1: Summary sub tab (after setup)
Each row represents a separate client configuration with various configuration fields
shown in their respective columns. Any client can have one or more configuration entry, as
long as every client configuration has a name (displayed in the Name column) uniquely
identifying it from all other client configurations.
Having more than one configuration entry for a given client is useful if you want to have
different sets of directories or files on the same machine backed up by different schedules.
For example, if you have a server that contains users’ home directories and mail files, you
may want to back up the mail files every day but back up the users’ home directories only
once a week. The schedules of these backups should never overlap, as two clients running
on one agent can cause errors and agent hang-ups. It is preferred to schedule the backups
on separate days to minimize risk of overlap.
On a newly installed system, there will be one client configuration named “Myself.” This is a
special configuration entry for the backup appliance itself. It provides housekeeping for
backing up the catalog of files that the backup system maintains. This includes the
configuration settings for clients, schedules, replication, etc. The “Myself” client will
automatically be archived as a hidden file whenever archiving is done.
Summary Sub Tab Columns
The default Summary sub tab screen has the following columns:
Clients
PAGE 53
Data Protection Appliance User Guide
Column
Description
Status
A status key indicating the current state of the client. A client’s
status key may change often during the initial configuration as the
appliance may take a few moments to recognize and communicate
with each new client.
The status symbols are described in the next table below.
Name
The name of the client configuration. The name identifies each
configuration entry uniquely from all other client configurations.
Version
The agent version, found within square brackets. 2.4.4[X.X.X.X]
Address
The address of the client specified by the client’s Internet name or
IP address. This field defaults to the client configuration name.
When the Name field isn’t the same as the client’s name, make sure
that this field validly identifies the client by the client’s Internet
name or IP address.
When the Address field doesn’t properly identify a client, the
Status field will show the “client cannot be resolved” symbol (the
blue question-mark icon), indicating that the address cannot be
resolved.
Schedule
The backup schedule. The predefined default schedules are daily,
weekly, monthly, and quarterly. You can also select any other
defined schedule, or you can select None (which means that you not
use scheduled backups).
OS
The operating system running on the client. Knowing which
operating system a client is running is helpful—the information is
used to generate default settings for the client that can be modified
through the client’s Edit interface. Operating system information is
also used to provide a link to the appropriate client software to be
downloaded.
Priority
The priority of this client configuration relative to other client
configurations when the Backup System is processing multiple
client configuration jobs concurrently. The priority can range from
1 to 999; lower-numbered priority jobs are performed first.
Job priorities 1 to 500 are nonexclusive—jobs will be submitted in
priority order and will run concurrently, up to the number allowed
by the Maximum Concurrent Jobs setting (see “Global Settings” on
page 48).
Job priorities 501 to 999 are exclusive—no jobs of priority 501 to
999 will run until all jobs of less than priority 501 are done. For
priorities in the range 501 to 999, only jobs of exactly the same
priority will run, unless a job in the priority range 1 to 500 is
executed while a job in the range 501 to 999 is already running.
Clients
PAGE 54
Data Protection Appliance User Guide
Column
Description
Email
The e-mail address, if any, to which e-mails will be sent regarding
jobs for the associated client configuration entry.
Active Jobs
Identifies clients currently running a job. The column shows the
status of active jobs for this entry, including information such as the
count of files backed up so far. If a job is shown here but no active
jobs are running, see “Director Status Sub Tab” for troubleshooting.
If a client is backed up on multiple appliances and a job is running
on one of them, the Active Jobs data will appear on each appliance.
This is because the job data comes from the client, not the
appliance. The actual job data will only be saved on the appliance
that ran the backup.
Full
The retention period for full backup jobs, after which the files will
be automatically deleted and the storage space can be “recycled.” An
infinity symbol in this column indicates that the job is not scheduled
for deletion.
Diff
The retention period for differential backup jobs.
Incr
The retention period for incremental backup jobs.
AA
Whether automatic archiving is enabled on files saved by backup
jobs for this entry.
Retries
The number of times that a backup should be attempted for a failed
job before abandoning the job.
Note: These are the default columns under the Summary sub tab. On this
screen and many others, you can change which columns appear, the order in
which they appear, and the sort order; see “Columns and Sorting” on page 29.
The following symbols are used in the Status column to indicate the client status:
Symbol
Status
The client is running the backup agent, and communication with the backup
agent is functional.
The name given for the address of the client cannot be resolved. Check the DNS
settings of the backup appliance and ensure that the given address is present
in the DNS server’s database or try using static IP address rather than
hostname.
Clients
PAGE 55
Data Protection Appliance User Guide
Symbol
Status
The client is down or unreachable. If this status is displayed and the client can
be reached by standard network protocols, the client may be behind a firewall
that is blocking the TCP port that the backup agent uses.
TCP ports 9101, 9102, and 9103 must be open in order for the backup agent to
function properly.
The client is reachable, but the backup agent is not running.
The backup agent is running, but the backup appliance cannot successfully
communicate with the backup agent.
Note: This is mostly due to an authentication problem. Make sure that the
client password on the Edit Client page and in the client’s configuration file are
the same. If you change the client’s configuration file, make sure that you
restart the backup agent on the client.
It is also worth making sure that there is no firewall or antivirus software
blocking communication and also that the correct software version for the OS
is installed (for example, 64bit software on 32bit OS could cause this issue).
The client is not known to the system, or the system hasn’t yet attempted to
contact the client.
This status is normal for a brief period after the appliance has been restarted.
This status is also normal after a client has been added but the configuration
hasn’t been saved, or if the “configuration update pending” message is
displayed at the top of the backup pages.
Note that client status information is polled periodically rather than being updated
immediately. This means that it may take a minute or two after a client’s status changes for
the change to be indicated on the screen.
Note: You can use filters to limit the number of clients listed, in order to help
you find specific clients. See “Filters” on page 26.
Summary Sub Tab Additional Actions
On the Summary sub tab page, to open a contextual drop-down menu from which you can
perform additional actions, either:


Clients
Select the client and click Actions in the upper-left corner, or
Right-click the client.
PAGE 56
Data Protection Appliance User Guide
The drop-down menu contains the following options:
Figure 6-2: Client contextual menu
The available actions are outlined in the following sections.
Note: Each entry on the Summary sub tab has a check box on the left side of
the screen. If you check the check boxes for one or more entries, the actions
that you select from the Actions menu will, if possible, apply to all selected
entries.
New
This action creates a new client configuration. The interface is the same as when you create
a new client from the Edit sub tab; see “Edit Sub Tab” on page 61.
Edit
This action edits an existing client configuration. The interface is the same as when you edit
a client from the Edit sub tab; see “Edit Sub Tab” on page 61.
Manual Backup
This action performs a backup for the client. When prompted, select the backup level—full,
differential, or incremental—and then click OK (or Cancel to cancel the action).
Note: For more information on backup levels (full, differential, and
incremental), see “Backup” on page 63.
Browse and Restore
This action opens a file browser from which you can select folders and files to be restored.
Clients
PAGE 57
Data Protection Appliance User Guide
Figure 6-3: Browse and Restore window
The Last Full and Subsequent Backups option displays: the most recent Full backup and
any Incremental or Differential backups since the full backup.
All Backup Jobs will display all backups on the RAID for this client.
Selecting Backup Jobs Within Range will display jobs on the RAID from a specific date to a
specific date.
Once you have selected the method, click the Submit button.
For further information, see “Browse and Restore” on page 106.
Clients
PAGE 58
Data Protection Appliance User Guide
Search
This action lets you search for a file when one specific client is selected. If no clients or
multiple clients are selected, this option is greyed out. When you select Search, in the
window that appears, enter the filename and then click Search. The results displayed will
be similar to the following:
Figure 6-4: Search window
Once a file is found, you can choose to restore it by clicking the check box to the left of the
file/s and then scrolling down and choosing ‘Add’ to add it to the list. Once all desired files
have been added they can be restored using the View/Restore button. See “Restore” on
page 109 for more information on restoring.
You can use regular expressions to help in the search. For information on this, click the
Regular Expressions link, or see 0, “POSIX Regular Expressions” on page 253.
Download Config
This action lets you download a client configuration file for the associated client to the
computer running the Web browser. You can then manually install the downloaded file
onto the client computer.
Clients
PAGE 59
Data Protection Appliance User Guide
Properties
This action displays a properties screen for the associated client. Using the tabs on the
screen, you can view the client’s+





Real-time status
Basic configuration
Advanced configuration
Storage utilization
Backup failures
Advanced
This action opens a submenu with options to:



Clients
Set the debug level (Typically used by Revinetix Support for troubleshooting issues.)
Dedupe the client’s backups. This will dedup all backups on a client, which can take
considerable time and CPU usage depending on the amount of data stored for that
client.
Import (or reimport) the client’s backups
PAGE 60
Data Protection Appliance User Guide
Edit Sub Tab
When you click the Edit sub tab, the screen displays the interface for editing client
configurations:
Figure 6-5: Edit sub tab
All of the clients on the system (except for Myself) are listed in the left column. (Myself is a
preconfigured client, and you cannot edit the settings for client Myself.)
Clients
PAGE 61
Data Protection Appliance User Guide
File Set
The Revinetix Appliance determines which files to backup using a file set for each client.
Each file set has a number of attributes, which allow you to specify how the set is handled.
File sets can be exclusive to a client, or they can be shared.
The first time you click the Edit sub tab on a new installation, no clients will be listed
(because you haven’t created any). To create your first client (so that you can view the Edit
sub tab settings):
1. On the Edit Clients line, click New.
2. On the New Client screen, type the client name and an optional description, and
then select the client operating system.
3. Click OK.
Note: For more detailed instructions on creating clients, see “Creating a
Client Configuration” on page 77.
When clients are listed on the screen, you can use the check boxes to select one or more
clients, and then you can edit the settings for the selected clients.
If you select multiple clients, all settings that the clients have in common will be displayed.
Any settings that are different among the selected clients (including check boxes) will be
displayed with angle brackets (< >). When you save any changes that you make, only new
shared settings (without angle brackets) will be modified for the clients.
When you edit any setting on the screen, a blue triangle
setting, indicating that a change (“delta”) has occurred.
will appear next to the changed
After you complete any configuration changes, click Apply to apply your settings, or click
Reset to return to the original settings (or to the settings most recently applied). Also
Activate Configuration to confirm all changes made.
The settings on the screen are documented in the following sections.
Name
The Name setting corresponds to the name of the client. The name is set when you create
the client; you cannot change it.
Clients
PAGE 62
Data Protection Appliance User Guide
Description
The Description setting is optional, and can be used to help further identify the client.
Client descriptions can include any character except double-quotes ( " ).
Password
The system-generated client password is used to authenticate the Revinetix Appliance and
the client software installed on each client. This password will be entered automatically
into the client’s configuration file. Each client uses its client password to authenticate the
backup appliance each time a backup or restore is performed. (The password is not
entered manually by the user.)
If you check the Auto Generate Password check box, when you save the client, the current
password will be discarded and replaced with a random password string. Be sure to
update the agent (on the server) with the new password if it has been changed on the
client.
Client Networking
The Client Networking pane has two settings:


The Address setting should be either the client’s IP address or the client’s DNS
name. The default setting is the value used for the Name field. If the Name value is
not a valid DNS name, enter a valid DNS name or an IP address into the Address
field.
The Port setting is the TCP port that the Revinetix Data Protection Appliance uses to
communicate with the client. Normally you don’t need to change this port. However,
if, for instance, you want to run multiple agents with different privilege levels on the
same client, each agent will require a different port setting. The default value is
9102.
Backup
The Backup pane has three settings: Schedule, Priority, and File Set.
Schedule
The Schedule setting specifies when backups will run for the client, and at what backup
level (full, differential, or incremental). There are four predefined schedules. You can edit
these default schedules or add your own schedules; see “Schedules Sub Tab” on page 90.
Clients
PAGE 63
Data Protection Appliance User Guide
The four predefined schedules are:
Backup Schedule
Default Description
Quarterly
Performs:
 A full backup on the first day of January, April, July, and
October
 A differential backup on the first day of every other month
 An incremental backup on all other days
Monthly
Performs:
 A full backup on the first Sunday of every month
 A differential backup on each subsequent Sunday of the
month
 An incremental backup on all other days
Weekly
Performs:
 A full backup on every Sunday
 An incremental backup on every other day of the week
Daily
Performs a full backup every day
Note: Use this schedule sparingly, because it could quickly
use up your available backup space.
You can also set Schedule to None, meaning to never automatically back up the client. You
can then back up the client manually at any time. This is useful for computers, such as
laptops, whose presence on the network is not guaranteed. For information on performing
manual backups, see “
Manual Backup” on page 57.
The backup levels (full, differential, and incremental) are summarized in the following
table:
Backup Level
Definition
Full
Saves all files specified for the client, whether or not the files have
been modified since the last backup.
Differential
Saves all files that have been modified since the last successful full
backup.
Incremental
Saves any file that has changed since any previous successful
backup of that file.
Note: For more information on backup levels, see “Backup Level
Considerations” on page 98.
Clients
PAGE 64
Data Protection Appliance User Guide
Priority
The Priority setting specifies the priority of this client configuration relative to other client
configurations when the Backup System is processing multiple client configuration jobs
concurrently. The priority can range from 1 to 999; lower-numbered priority jobs are
performed first.
Job priorities 1 to 500 are nonexclusive—jobs will be submitted in priority order and will
run concurrently, up to the number allowed by the Maximum Concurrent Jobs setting (see
“Global Settings” on page 48).
Job priorities 501 to 999 are exclusive—no jobs of priority 501 to 999 will run until all jobs
of less than priority 501 are done. For priorities in the range 501 to 999, only jobs of
exactly the same priority will run, unless a job in the priority range 1 to 500 is executed
while a job in the range 501 to 999 is already running.
File Set
The File Set setting specifies what directories or files to back up. Each file set has a name
and is defined for a specific operating system. The default file set for your client depends on
the operating system. For example, by default, Windows clients will back up “C:/”, and
Linux and Mac clients will back up “/”.
Using the File Set drop-down list, you can select a default File Set based on the operating
system, or you can customize your own file-set (by selecting the file-set having the name of
the client).
Clients
PAGE 65
Data Protection Appliance User Guide
Whichever file-set you select, you can then click the Edit icon
according to your needs. This opens the File Set Editor window:
to edit the file-set
Figure 6-6: File Set Editor window
The File Set Editor window includes the following options:
Option
Description
VSS
To let the agent back up open files, check the check box.
No Full on
Change
Indicates whether a full backup should be forced after the File Set
configuration is changed for clients that are sharing it. If the check
box is checked, the client will try to run the next scheduled or
manual job without reverting to a full backup.
Override ClientConfigured Plugin Settings
Used to override the plug-in configuration. When the new control
group is unselected, the override is not in effect, and all plug-in
configurations are controlled through RVXConfig.
VSS
Full Volume Shadow Service (VSS) support—A new VSS client plug-in now supports application
writers as well as the previously supported in-use files. This complete implementation of the
Microsoft standard is the foundation for many new features and functionality, and it will continue
to provide for greater extensibility in future releases.
Clients
PAGE 66
Data Protection Appliance User Guide
Please review the RevOS Migration Guide 3.4 for more information on the new features
included with VSS support. You can find this document by going to your Support > Portal
Tab. Documentation will be at the bottom of this page.
The VSS feature is controlled through a client’s file-set; simply check or uncheck the VSS
check box to turn VSS backup on or off as shown above (Figure 6-6).
By default, most application “writers” that are discovered on a client will be backed up
during a backup that has VSS enabled. The following exceptions apply:



The Microsoft SQL Server writer is never used. The SQL plug-in provided by
Revinetix has a richer feature set and is the preferred method for backing up and
restoring SQL data-bases.
System writers will be backed up if the “system state” backup option is explicitly
configured to be enabled on the client. If it is not enabled, all system writers will be
ignored during backup.
The Microsoft Exchange Server writer is only used on Exchange 2010 clients when
“Exchange Database” backups are explicitly configured using the plug-in override
controls.
You can also exclude writers from backup by explicitly specifying them as an exclusion in
the file set.
Add a “matcher” to an existing “starting directories and files” specification. Select the
Exclude option and add a “Plug-in Config”.
For each VSS writer that you want to exclude from being backed up, add it to the “matching
pat-terns” dialog.
The format of the entries must be “VSS:/name of writer” where name of writer is the exact
name of the VSS writer itself. (You can use the vssadmin tool provided by Microsoft to list
all writers avail-able on a particular system.)
Clients
PAGE 67
Data Protection Appliance User Guide
If you click Browse Client, you can browse the writers available on the client and select a
writer to add to the list.
When you check the Override Client-Configured Plug-in Settings check box this will
override whatever settings are made in RVXConfig, affecting only clients using this file-set.
Backup jobs run on any clients using the file-set will include Exchange Mailbox and
Exchange Database backups if the required plug-ins are installed, but not SQL Server or
System State backups. This is true regardless of how the plug-ins are configured on the
clients themselves (through RVXConfig).
The Starting Directories and Files area shows what directories will be included in the
backup. To add new directories, click New. To delete or edit an existing directory
specification, click Delete or Edit, respectively.
If you click New, a window similar to the following will appear:
Figure 6-7: List of Directories to Backup window
Enter the directories in the upper area of the window. You can select the various default
options in the lower area by checking the check boxes or using the drop-down menus.
Clients
PAGE 68
Data Protection Appliance User Guide
Matchers
Matchers are used for including and/or excluding files or folders from a given backup file
set. Below are several examples of how to configure Matchers for different purposes.
Matchers may be created when editing a file set. Below the List of directories to backup,
click the New button in the blue bar.
Hints and helps:



Please note the use of the Linux style forward slash "/".
Be aware that the order of the matchers is important. For instance, it will fail, if you
first exclude everything and then try to include a certain folder.
Matchers may be used for any file system, the examples below are written as if for
Windows but could easily be converted to Mac or Linux or Netware.
Example 1 - this will backup the entire C:/ but will exclude any file with a .mp3 extension.
List of directories to backup: C:/
Matcher 1: Exclude, Case Ignore, Wild File: *.mp3
Example 2 - this will backup everything under /departments and exclude only the /my
music folders.
List of directories to backup: D:/departments
Matcher 1: Exclude, Case Ignore, Wild Directory: D:/*/my music
Example 3 - this will backup everything at the /departments level and for each user, the
/my documents folder and all its contents. Everything else will be excluded.
List of directories to backup: D:/departments
Matcher 1: Include, Case Ignore, Wild Directory: D:/departments/users/*/my documents
Matcher 2: Exclude, Case Ignore, Wild Directory: D:/departments/users/*/*
Example 4 - a more complex combination similar to all of the above. Mac users may
recognize these paths, the "C:" was added just for the example.
This will backup each users Desktop and Documents folder. The sub folder Microsoft User
Data will be excluded. Any files with .mp3 or .exe or .avi extensions will be excluded. All
other directories under the starting point are excluded.
This one requires a bit more explaining. Obviously we have our starting directory and we
are excluding three different file types. What is not clear, is the fact that the path in Matcher
2 is a sub-directory to a path in Matcher 3. In other words, we are preemptively excluding
Clients
PAGE 69
Data Protection Appliance User Guide
/Microsoft User Data which is a sub-directory of the included /Documents directory. We
then exclude everything else.
List of directories to backup: C:/volumes/docs/staff_data
Matcher 1: Exclude, Case Ignore, Wild File: *.mp3;*.exe;*.avi
Matcher 2: Exclude, Case Ignore, Wild Directory: C:/*/Microsoft User Data
Matcher 3: Include, Case Ignore, Wild Any: C:/volumes/docs/staff_data/*/Desktop;
C:/volumes/docs/staff_data/*/Documents
Matcher 4: Exclude, Case Ignore, Wild Directory: C:/volumes/docs/staff_data/*/*
If using Regular Expressions the *'s should change to .*'s
Matchers can be highly useful to trim down your backups and save space on your
appliance. However, they may be a little tricky to get right on the first try. If these examples
do not help your scenario or you have other questions, feel free to contact Revinetix
Support for help. If you can describe exactly what you want, we should be able to help you
create the Matcher sets to make it happen.
Clients
PAGE 70
Data Protection Appliance User Guide
To include or exclude specific areas from backups, click New. A new Matcher area will
appear in the lower part of the window:
Figure 6-8: Matchers to include or exclude specific areas


Please note the use of the Linux style forward slash "/".
Be aware that the order of the matchers is important. For instance, it will fail if you
first exclude everything and then try to include a certain folder.
To toggle between inclusion and exclusion, click Include and Exclude.
To set case sensitivity, click the Ignore or Sensitive button. (The button name being
displayed indicates the current state of case sensitivity.)
To define what you want to include or exclude, click Add. Then, using the drop-down menu,
select from any of the options to define a wild card directory or file. You can also define
regular expressions for directory or file matching. You can have any number of “matchers.”
Note: For information on regular expressions, see 0, “POSIX Regular
Expressions,” on page 253.
Clients
PAGE 71
Data Protection Appliance User Guide
Browsing for “Starting Point” Folders
To use the file browser to find folders and files for backup and add them to the client’s fileset:
1. Navigate through Clients > Edit to the file-set’s Starting Directories and Files entry
that you want to edit. (If no entries exist, click New to create an entry.)
Figure 6-9: Starting Directories and Files
The list of directories to be backed up will appear, along with the Browse Client button
which enables you to browse the client’s file system.
Figure 6-10: Browse Client button
2. Click Browse Client and use the file browser to select a folder to add to the list.
Note: In some cases, such as when you are editing file-sets from multiple
clients or editing shared file-sets, you may be prompted to identify, from the
available clients, the single client that you want to browse.
As you browse a client, keep in mind that you must select the folder by clicking it in the
Entry List pane. The selection will then appear in the Selection area at the bottom of the
screen.
Figure 6-11: File Selection
Clients
PAGE 72
Data Protection Appliance User Guide
After you accept your selection in the file browser, the selection will be added to the list of
directories to be backed up for the current file set.
Figure 6-12: List of Directories to Backup
Browsing for Files and Folders Used to Define “Matchers”
To use the file browser to find folders and files and specify them as wildcard or regular
expression “matchers” for the client’s file set:
1. Navigate to a file-set’s Starting Directories and Files entry that you want to edit. (If
no entries exist, click New to create an entry.)
Figure 6-13: Starting Directories and Files' Edit button
2. Find an existing matcher that you want to edit, or click New to create a new matcher.
Click Add and select the type of matcher condition that you want to add.
Figure 6-14: Matcher Conditions
The current list of patterns for the selected condition will appear along with the Browse
Client button that enables you to browse the client’s file system.
Clients
PAGE 73
Data Protection Appliance User Guide
3. Click Browse Client and use the file browser to select a folder or file to add to the
list.
Figure 6-15: Browse Client
Note: In some cases, such as when you are editing file-sets from multiple
clients, you may be prompted to identify the single client that you want to
browse.
As you browse a client, keep in mind that you must select the folder by clicking it in the
Entry List pane. The selection will then appear in the Selection area at the bottom of the
screen.
Figure 6-16: Selection
4. After you accept your selection in the file browser, the selection will be added to the
list of patterns for the selected condition.
Figure 6-17: List of Patterns
Clients
PAGE 74
Data Protection Appliance User Guide
5. You can also further modify the new pattern by editing the text in the text area as
needed.
Figure 6-18: Editing text
Deduplication
To enable deduplication, so that the system will keep only one copy of each duplicate file,
check the Enable check box. For more information on deduplication, see “Deduping Jobs
Sub Tab”.
Archiving
To enable local or remote archiving, check the respective Enable check box. Do not use
deduplication if remote archiving is enabled.
Notifications
You can set up emails to be sent to you in System > Settings (see Notifications on page 189)
for all clients on the appliance, so it is recommended that you use this area only if there is
another contact, besides this global recipient, for this specific Client.
If you want this contact to receive e-mails about all backup activity, type your e-mail
address in the Email box. You can include multiple addresses separated with commas. If
you want this contact to receive the e-mails only when errors occur, check the Email Only
on Error check box.
Appliance Networking
From the Interface drop-down menu, select the network interface for your appliance.
If you select NAT (network address translation), in the NAT Address box, type the NAT
address.
Clients
PAGE 75
Data Protection Appliance User Guide
Job Recycling
Specify the job recycling settings for your backup levels (full, differential, and
incremental)—that is, how long to keep a backup job before the appliance will
automatically “recycle” the disk storage space by deleting the job from the RAID.
If you don’t check the check box for a backup level, those backups will not be recycled but
will be kept forever (or until they are manually deleted).
For each backup level that will be recycled, specify the number, and the use the drop-down
list to select the unit (years, quarters, months, weeks, and so on).
Note: The month option reflects 30 days, not the number of days in the current calendar
month. If you wish to reflect a 31 day month, it is recommended to set the recycling
schedule to 31 days rather than 1 month.
It is recommended that, at the absolute minimum, your recycling matches the Schedule of
your backups (for instance, Fulls recycle after 1 week if the Client is on a weekly schedule).
This can, or course, be set for longer but if a job recycles before it is replaced it can cause
issues with your space and the timing of your jobs.
Error Recovery
The Error Recovery pane has two settings:
Setting
Description
Rerun Failed
Whether to rerun failed backup jobs
Recover Entries
How many times to retry the backup job, and at what interval
Other Actions
The Other Actions pane has two settings:
Setting
Description
Run Before
Backup
Use this to run a script you have set up before the backups for this
client run. The script is not saved on the appliance, rather it is
hosted on the server that needs to use it and the path to its location
is stored here.
Clients
PAGE 76
Data Protection Appliance User Guide
Setting
Description
Run After Backup Use this to run a script you have set up after the backups for this
client run. The script is not saved on the appliance, rather it is
hosted on the server that needs to use it and the path to its location
is stored here.
Edit Clients Options
You can use the options on the Edit Clients line to




Create a client configuration
Delete a client configuration
Filter the list of displayed clients
View and change the default configuration settings
Figure 6-19: Edit Clients Options
These options are described in the following sections.
Creating a Client Configuration
To create a new client configuration, on the Edit Clients line, click New.
The New Client dialog box will appear:
Figure 6-20: New Client dialog
Clients
PAGE 77
Data Protection Appliance User Guide
Specify the following:
Setting
Description
Name
The name of the new client configuration. (The name can’t be
changed once the client has been created.)
Description
An optional description of the client configuration.
Operating
System
Select from the drop-down list.
Set as Default OS
Check this check box if you want your operating system selection to
be the new default for your appliance.
Then press OK. The new client will then be listed on the Clients Edit screen.
Deleting a Client Configuration
To delete one or more client configurations, check the check boxes for the respective
clients, and then click Delete on the Edit Clients line.
Then, on the Confirm Client Delete dialog box, to purge the client’s backup data, check the
Purge Backup Data check box.
Note: If you do not purge the backup data with the client, there will be orphaned jobs left
on the appliance. Without a client to refer to, the appliance will never know when to delete
this information, as retention settings (recycling) is set at the client level, so the data will
remain indefinitely. This can cause issues and take up appliance processing power. You
will see “cannot find client” errors in the server.xml logs (Support > Diagnostics).
Then click Yes to purge the client.
Filtering the Clients Edit List
You can use the Filter drop-down list on the Edit Clients line to display only clients on the
Clients Edit tab that


Are selected (check boxes checked), and/or
Have been changed (since the last you activated the configuration).
Figure 6-21: Client Filter
Clients
PAGE 78
Data Protection Appliance User Guide
Viewing or Modifying the Client Defaults
To view the default client configuration (which will apply whenever you create a new
client), click Defaults on the Edit Clients line.
If you want to modify the default client configuration, after you make your changes, click
Apply.
When you have finished viewing or modifying your client defaults, click Defaults again.
Shared File Sets Sub Tab
When you click the Shared File Sets sub tab, the screen displays current file-set
configurations that can be shared by one or more client configurations.
Figure 6-22: Shared File Sets sub tab
After you edit the settings for a shareable File Set, all client configurations sharing that File
Set configuration will then perform backups using the modified File Set settings.
By default, the Shared File Set sub tab screen has the following columns:
Column
Definition
Name
The name of the shared file set.
OS
The operating system associated with the file set.
Clients
PAGE 79
Data Protection Appliance User Guide
Column
Definition
Clients
The number of clients sharing the file set configuration. The number
will vary as client configurations are changed to and from other file
set configurations. In order for the shareable file set to be deleted,
the number of clients must be zero.
No Full on
Change
Whether a full backup should be forced after the file set
configuration is changed. If a check mark appears, the client will try
to run the next scheduled or manual job without reverting to a full
backup.
Volume Shadow
Copy
Whether the given sharable File Set configuration will employ
volume shadow copy capabilities when available for the particular
client’s operating system.
Starting
Directories
Files
The beginning backup point for clients sharing a given File Set
and configuration.
On the Shared File Sets sub tab, to open a contextual drop-down menu from which you can
perform additional actions, either:


Select the file set and click Actions in the upper-left corner, or
Right-click the file set.
The drop-down menu contains the following options:
Figure 6-23: Shared File Sets contextual menu
The available actions are outlined in the following sections.
Clients
PAGE 80
Data Protection Appliance User Guide
Editing Shared File Sets
As mentioned earlier, the Shared File sets sub tab displays your current file-set
configurations.
Note: To create a new shared file set, click New. On the New File Set dialog
that appears, enter the name and select the operating system for the shared
file set, and then click OK. Then continue with the instructions below for
editing the file set.
To edit a shared file set, select the file set, and then select Edit from the Actions menu. The
File Set Editor dialog will appear:
Figure 6-24: File Set Editor
This is the same dialog box that you edited for individual client file sets; see “File Set” on
page 65.
Showing File Set Clients
To view a list of clients using a shared file set, select the file set, and then select Show
Clients from the Actions menu.
Deleting a Shared File Set
To delete a shared file set, make sure no clients are associated with the file set, select the
file set, and then select Delete from the Actions menu. When prompted to confirm, click
Yes.
Clients
PAGE 81
Data Protection Appliance User Guide
Software Sub Tab
The Software sub tab contains links that you can use to download client software to the
host computer that the Revinetix software is running on. The Software tab will contain the
same OS version as what the appliance is running. To make sure the appliance is on the
most up-to-date OS version, see “Portal Sub Tab”.
Figure 6-25: Software sub tab
For information on downloading client software, see Section 12, “Client Software
Installation and Configuration” on page 205.
Active Directory Sub Tab
Once the appliance has been added to the Active Directory, a list of clients in the Active
Directory will be displayed.
Figure 6-26: Active Directory sub tab
Clients
PAGE 82
Data Protection Appliance User Guide
Select the clients that you want to install the appliance on.
You can also assign default settings to single or multiple clients by:
1. Creating the default in the Clients Edit tab, using the Defaults button.
2. Selecting the client that you want to inherit those default settings.
3. After you make your selections, click the Create Clients link in the lower-left corner
of the screen.
4. Also, remember to click Activate Configuration to activate your changes.
Deploying the Revinetix Backup Agent
1. Copy the rvx-backup-client-[version].msi file (this .msi file can be downloaded from
the Support > Portal) to a shared location on the network that all target machines
will have access to. If you are going to apply any mst transformation files, copy them
as well.
2. From the Group Policy Management console, create a new group policy.
Figure 6-27: Creating a new Group Policy
3. Enter a name for the new group policy.
Clients
PAGE 83
Data Protection Appliance User Guide
Figure 6-28: Naming the Group Policy
4. Right-click the newly created group policy, and then select Edit.
Figure 6-29: Editing the new Group Policy
5. Under Computer Configuration > Software Settings, right-click Software
Installation and then select New > Package.
Figure 6-30: New > Package
Clients
PAGE 84
Data Protection Appliance User Guide
6. Select the rvx-backup-client-[version].msi file that you previously copied to a server
share.
7. Select Assigned for normal installation, or Advanced to apply a mst transformation
file and then click OK.
8. If applying a transformation file such as rvx-backup-client-NoFirewallChange.mst, click
the Modifications tab, and then add the desired mst files.
The screen should now appear similar to the following:
Figure 6-31: Finished Group Policy Editor
9. Close the Group Policy Object Editor (but not the Group Policy Management
console)
10. To change the security address for the group policy object (because you will apply it
to computer objects and not users), delete Authenticated Users, and then add
Domain Computers.
Clients
PAGE 85
Data Protection Appliance User Guide
Figure 6-32: Adding Domain Computers
11. Drag-and-drop the newly created group policy object into a container to create a
link. In the example below, the group policy object named Revinetix Backup Agent is
being linked to the top of the domain. The policy that deploys the .NET framework
must also be in the container.
Figure 6-33: Creating a link
12. To link the group policy object, click OK.
Clients
PAGE 86
Data Protection Appliance User Guide
Figure 6-34: Linking the GPO
13. Now, to ensure that the .NET framework is installed before the Revinetix Backup
Agent, select the container that contains the Revinetix Backup Agent, and order the
group policy object links such that the priority for the .NET framework group policy
object is greater than the priority for the Revinetix Backup Agent.
Figure 6-35: Prioritizing the GPO links
Clients
PAGE 87
Data Protection Appliance User Guide
Software installations are only applied when the machine reboots. When the machine
reboots, during the startup process before the login screen, you should see the following
messages:


“Installing managed software Microsoft NET Framework 2.0”
“Installing managed software Revinetix Backup Agent”
Note: The first message will appear only if the NET framework had not been
deployed previously.
You would use the same process for the 64-bit .NET framework and Revinetix Backup
Agent. WMI filtering could be used to only deploy correct software on 32- and 64-bit
machines.
Clients
PAGE 88
Data Protection Appliance User Guide
Backing Up Active Directory Components
By default, a system’s Active Directory components are backed up as part of a “system
state” backup. After you have installed the client on the Active Directory server (domain
controller), complete these steps to enable “system state” backups:
1. Run RVXConfig on the server and navigate to the Service Control tab panel.
2. Make sure that the Enable System State Backup checkbox is checked.
Figure 6-36: Enabling System State Backup
Note: You can also select any other needed plug-in overrides.
3. Click OK or Apply to commit any changes made. System state backups are now enabled
for the Revinetix client running on the Active Directory server.
Note that a client’s configuration to enable/disable “system state” backups is also subject to
over-ride using the new plug-in controls.
For information on restoring Active Directory components from a backup, see “Restoring
Active Directory Domain Controllers” on page 246.
Troubleshooting




Clients
Make sure that the target machine is properly communicating with Active Directory.
From a command prompt, run netdiag and make sure that there are no issues
related to DNS or Active Directory, and that all of the reported values are expected
values. You can find netdiag on the Windows XP installation CD under Support >
Tools; for other platforms, you can download netdiag from www.microsoft.com.
If you want to check whether the group policy object will be applied without
rebooting the target machine, from the command prompt, run gpupdate /force. The
output should provide information about needing to reboot to install software.
Make sure that the target machine is a member of the container that contains the
group policy objects.
Check the event log.
PAGE 89
Data Protection Appliance User Guide
Schedules Sub Tab
When you click the Schedules sub tab, the screen displays the backup schedules that have
been configured:
Figure 6-37: Schedules sub tab
Schedules settings are used on the Clients > Edit screen to determine when to run backup
jobs, and at what level (full, differential, or incremental); see “Schedule” on page 63.
The Schedules sub tab has the following columns:
Column
Description
Name
The name of the schedule.
Description
An optional description of the schedule.
Clients
The number of clients that use the schedule. (You cannot delete a
schedule if one or more clients are using it.)
Summary
A summary of the runs in the schedule.
Clients
PAGE 90
Data Protection Appliance User Guide
On the Schedules sub tab, to open a contextual drop-down menu from which you can
perform additional actions, either:


Select the file set and click Actions in the upper-left corner, or
Right-click the file set.
The drop-down menu contains the following options:
Figure 6-38: Schedules contextual menu
The available actions are outlined in the following sections.
Creating a New Schedule
To create a new schedule, on the Actions menu, select New.
The Schedule window will appear:
Figure 6-39: Schedule window
Clients
PAGE 91
Data Protection Appliance User Guide
Give the schedule a name and an optional description.
Then, in the Runs pane, you will create one or more “runs” which determine when backups
will run in this schedule. For each run, you will specify the backup level (full, incremental,
or differential), as well as the times and days for each run.
Creating a Run
To create a run, click New. The Create Run window will appear:
Figure 6-40: Create Run window
In the Options pane, select the backup level (full, differential, or incremental).
Then, in the Scheduling pane, you will set up when the backups will run.
Clients
PAGE 92
Data Protection Appliance User Guide
The options that appear on the screen depend on your selection on the left side. For
example:


If you select Hourly, no additional options will appear—the backups will run every
hour (at 12:00, 1:00, and so on).
If you select Daily, the Time Selection pane appears, and you then specify at what
time to start the backups each day.
These options are further outlined in the following sections.
Time Selection Options
The Time Selection pane appears for all scheduling options except Hourly:
Figure 6-41: Time Selection
Use it to specify at what time of day the backups will start. If you schedule daily backups,
the backups will run at that time every day; for other options (weekly, monthly, yearly), the
backup will run at that time on whatever days are specified.
Note: In addition to AM and PM, you can select 24 HR to use a 24-hour clock.
Day Selection Options
The Day Selection pane appears (in addition to the Time Selection pane) for weekly,
monthly, and yearly scheduling. For weekly scheduling, the Day Selection pane is limited:
Figure 6-42: Day Selection (weekly scheduling)
Use it to specify the day of the week on which to run the backup.
Clients
PAGE 93
Data Protection Appliance User Guide
For monthly scheduling, the full Day Selection pane appears:
Figure 6-43: Day Selection (monthly scheduling)
Use it to specify either:


The day of the week on which to run the backup, or
The day of the month on which to run the backup.
For example, based on examples in the two figures above, the backups will run on Sundays
or on the first day of the month, respectively.
For weekly or monthly selections, the backups will run on the specified days every month.
If you set up yearly scheduling (below), the backups will run only in the specified months.)
If you specify the day of the week (with monthly scheduling), you can also specify to run
backups only on specific weeks in the month. For example, in the figure below, backups will
run on the first Sunday of the month.
Figure 6-44: Day Selection (monthly scheduling, on specific weeks)
You can schedule for up to five weeks in a month. If the given weekday doesn’t occur in the
fifth week of a month (for example, if there is no fifth Sunday), that particular backup will
not run.
In the Day Selection and Month Selection panes, you can schedule days, weeks, or months
individually, or you can schedule a range of consecutive days, weeks, or months.
Clients
PAGE 94
Data Protection Appliance User Guide
For example, in the figure below, backups would run on the first and second Sundays and
the first and second Mondays in the month.
Figure 6-45: Schedule ranges
For nonconsecutive ranges, you would create multiple runs. For example, if you want to run
backups every Monday, Wednesday, and Friday, you would create three runs, one for each
of the three weekdays.
Month Selection Options
The Month Selection pane appears (with all other panes) for yearly scheduling:
Figure 6-46: Month Selection
Use it to specify in which months to run the backup. In those months, the backup will run at
the time and on the days that you specified in the other panes.
You can also specify a range of consecutive months—for example, January to March. For
nonconsecutive months, create a separate run for each month.
Clients
PAGE 95
Data Protection Appliance User Guide
Saving the Run
To save the run, click OK. The runs that you have created for the schedule will be listed:
Figure 6-47: Saved runs
In the example above, for the schedule Test_Schedule, two runs have been created:


A full backup on the first day of every month at 12:00 a.m.
An incremental backup every Sunday at 1:00 a.m.
Note: As a matter of strategy, note here that the incremental backup is not
scheduled at the same time as the full backup. This is so that, when the first
day of the month occurs on a Sunday, the two backups will not interfere with
each other.
To create additional runs, click New.
To save the backup schedule, click OK.
Clients
PAGE 96
Data Protection Appliance User Guide
Editing a Schedule
To edit an existing schedule, select the schedule and then, on the Actions menu, select
New.
The Schedule window will appear:
Figure 6-48: Quarterly backup schedule
The schedule shown above is the default Quarterly schedule. As a review of the concepts of
schedule definition, this schedule performs the following backups in the Quarterly backup
schedule, using the defined runs described in the following table:
Backup Performed
Defined Runs
A full backup at 1:00 a.m. on the first day of
January, April, July, and October
Four full backups, one on the first day (01)
of each named, nonconsecutive month, at
1:00 a.m.
A differential backup at 1:30 a.m. on the first Four differential backups, one on the first
day of each of the other months
day (01) of each month in the four listed
ranges of consecutive months, at 1:30 a.m.
An incremental backup at 2:00 a.m. on all
other days (besides the first day of the
month)
Clients
An incremental backup on each day except
the first (range 02–31) of every month, at
2:00 a.m.
PAGE 97
Data Protection Appliance User Guide
You can also open the other default schedules (Daily, Weekly, and Monthly) to examine
how they are defined. These examples should help you in planning and implementing your
own custom backup schedules.
To edit a run in a schedule, select the run, and then click Edit.
The Edit Run screen that appears works the same as the Create Run screen. (See
Creating a Run on page 92.) After you finish your edits on the Edit Run screen, click OK,
and then click OK on the Schedules screen to save your changes.
Showing Schedule Clients
To display a list of clients that are using a schedule, select the schedule and then select
Show Clients from the Actions menu.
Deleting a Schedule
To delete a schedule, select the schedule, and then select Delete from the Actions menu.
When prompted to confirm, click Yes
You can only delete schedules with no (zero) clients.
Backup Level Considerations
The backup levels (full, differential, and incremental) are summarized in the following
table:
Backup Level
Definition
Full
Saves all files specified for the client, whether or not the files have
been modified since the last backup.
Differential
Saves all files that have been modified since the last successful full
backup.
If a previous full backup (or a “suitable” full backup) cannot be
found, then the differential backup will be upgraded to a full
backup.
Incremental
Saves any file that has changed since any previous successful
backup of that file.
If a previous full backup (or a “suitable” full backup) cannot be
found, then the incremental backup will be upgraded to a full
backup.
Clients
PAGE 98
Data Protection Appliance User Guide
If a full backup cannot be found, the backup system will search for a “suitable” full backup
with the following attributes:


The same client name.
The same file-set definition.
Note: Any change to the client’s file-set definition, such as adding or deleting
a file in the section for included files or excluded files or directories,
constitutes a different file-set definition.



For a differential backup job, the earlier backup job was a full backup.
For an incremental backup job, the earlier backup job was a full, differential, or
incremental backup.
The earlier backup job terminated normally (that is, it did not fail and was not
canceled).
If the above conditions are not all met, then the differential or incremental backup job will
be upgraded to a full backup job.
For a differential or incremental backup, the files that are backed up are determined by
comparing the start time of the previous backup job against the time that each file was last
modified; files modified after the backup start time will be backed up. The time on the
client should be synchronized as closely as possible to the time on your Revinetix
Appliance to be sure that all modified files are backed up.
Usage Sub Tab
When you click the Usage sub tab, the screen displays a summary of the disk space used to
store backed up files on your Revinetix Appliance:
Figure 6-49: Usage sub tab
Clients
PAGE 99
Data Protection Appliance User Guide
If deduplication has been enabled for this configuration, this area shows the space used
after duplicate copies of saved files have been recognized and the extra storage space for
these duplicate files has been freed.
The following numbers, which apply to all clients, are displayed at the top of the window:
Statistic
Definition
Global Shared Bytes
The number of bytes used to store files that are duplicated
on one or more clients
Global Shared Files
The number of files that are duplicated on one or more
clients
Global Unique Bytes
The number of bytes used to store files for which there is
only one occurrence among all jobs/clients
Global Unique Files
The number of files for which there is only one occurrence
among all jobs/clients
Then, for each client, the following statistics are listed:
Statistic
Definition
Name
The name of the client
Client Pre-Dedupe Size
The number of bytes backed up from the client before
deduplication
Client Exclusive Size
The number of bytes for files backed up only once on this
and all clients
Inter-Client Shared Size
The size of data on this client that was also found on one or
more other clients
Intra-Client Shared Size
The size of data on this client that was found more than once
only on the same client
Legacy Data Size
The number of bytes stored without deduplication (with
deduplication disabled, or on pre-dedupliation client
versions)
Meta Data Size
The total number of bytes used for file attribute information,
bookkeeping, and inlined files
Client Inline Size
The number of bytes used to store data directly as metadata,
bypassing the deduplication process
Client Exclusive Size
(%)
The client’s percentage of the number of bytes saved for files
backed up only once across all clients
Clients
PAGE 100
Data Protection Appliance User Guide
Statistic
Definition
Intra-Client Shared Size
(%)
This client’s share of intra-client shared size out of all (intraand inter-) shared data
Inter-Client Shared Size
(%)
This client’s share of inter-client shared size out of all (intraand inter-) shared data
Clients
PAGE 101
Data Protection Appliance User Guide
Section 7
Jobs
Use the Jobs tab to view information about, and interact with, backup and restore jobs.
The Jobs tab has the following sub tabs:



History
Settings
Unreferenced Data
These sub tabs are described under the respective headings in this section.
Note: Whenever you modify your configuration, remember to save your
modifications; see “Activating Changes” on page 30.
History Sub Tab
Every time a backup or restore job is run information about the job is recorded. You can
view a summary of job information by selecting the History sub tab:
Figure 7-1: History sub tab
Jobs
PAGE 103
Data Protection Appliance User Guide
The default History sub tab has the following columns:
Column
Description
Job ID
A unique identifier for every job.
Status
The job status:
Completed
Completed with errors
Error terminated or fatal error
Canceled
Errors
The number of job errors
Archived
A check mark indicates that a job has been archived. If the archive
disk is formatted, the job will be lost even if the Archived column
appears with a check mark.
Client
The name of the client that the job belongs to.
Type
The job type:
Backup
Restore
Level
The job level:
Full backup
Differential backup
Incremental backup
BMR
A check mark indicates that the job is a Bare Metal Backup and
Restore job.
De-duped
A check mark indicates that the job has been “deduped” and that no
duplicate files exist.
Started Date
The date and time that the job started.
Duration
The length of time taken to complete the job.
Throughput
The average speed of the job. Job speed is dependent on multiple
factors, including processor speed, file sizes, and network conditions.
Jobs
PAGE 104
Data Protection Appliance User Guide
Column
Description
File Count
The number of files backed up or restored by the job.
Read Bytes
The number of bytes read from the client disk.
Saved Bytes
The number of bytes saved to the appliance.
Compression
The compression factor (percentage).
Restorable
A check mark indicates that the job has restorable data. Jobs not
imported may be restorable, but not yet browsable.
Note: You can use filters to limit the number of jobs listed, to help you find
specific jobs. See “Filters” on page 26.
On the History sub tab, to open a contextual drop-down menu from which you can perform
additional actions, either:


Select the job and click Actions in the upper-left corner, or
Right-click the job.
The drop-down menu contains the following options:
Figure 7-2: History contextual menu
The available actions are outlined in the following sections.
Note: Each entry on the History sub tab has a check box on the left side of
the screen. If you check the check boxes for one or more entries, the actions
that you select from the Actions menu will, if possible, apply to all selected
entries.
Jobs
PAGE 105
Data Protection Appliance User Guide
Message Logs
The message log displays a detailed summary of logs generated by the backup jobs. This
summary includes details on start time, duration, total files, and total files saved. It also
includes any error messages and warnings generated by the backup job. This log should be
reviewed frequently to ensure that no errors occur in the backup.
Figure 7-3: Message log example
To close the window, click OK in the lower-left corner.
Show Client Properties
This action displays a properties screen for the client that is associated with the job. Using
the tabs on the screen, you can view the client’s





Real-time status of files being backed up on the client.
Basic configuration
Advanced configuration
Storage utilization
Backup failures
Browse and Restore
This action lets you restore some or all of the files from the selected backup. This action
uses the new file browser interface to select the files to restore, as well as to (optionally)
select a different location on a different client to restore the files to.
Note: You can only restore from backup jobs for which a check mark appears
in the Restorable column.
Jobs
PAGE 106
Data Protection Appliance User Guide
When you select Browse and Restore, the file browser screen that appears is similar to
the following:
Figure 7-4: Browse and Restore
On the sample Browse and Restore screen shown above, in the Restore Client panel at
the top, you specify which client to restore the files to. The default selection is the client for
the backup job. If you are restoring to a different client, you also specify the path on that
client to relocate the restored files to (using a separate browser window, if you want). On
the default client, files are restored to the location that they were backed up from.
Then, in the browser panel, you specify which folders and/or files from the backup job to
restore:



Jobs
The Current Folder panel lists the folder currently selected (highlighted) in the
browser interface below (under Folders). You can use the icon to move to the
root of the current folder tree, or the icon to move up one level in the directory
tree. You can also use the drop-down list to view and select previous Current
Folder listings from this restore session.
To navigate the folder views, click the folders in the Navigation Tree pane (below,
on the left). The contents of the selected (highlighted) folder in the Navigation Tree
pane are displayed in the Entry List pane (on the right).
Then, you will check the check boxes to specify which files and folders to restore.
When a folder’s check box is checked, all folders and files contained in that folder
are checked. If you subsequently uncheck a check box at a lower level, the parent
folders will no longer be checked (but check boxes in other paths are unaffected).
PAGE 107
Data Protection Appliance User Guide
In the example in Error! Reference source not found.:



Client Myself was the client for the backup job, so the files will be restored to the
same location (and cannot be relocated).
The selected (highlighted) folder, events, contains one file, sample.conf. The check
mark for the file means that it will be restored, and the check mark for the events
folder means that its entire contents (one file, in this case) will be restored. (Other
folders in the example are also selected.)
Note that the acpi folder is not checked; a check mark would indicate that the
folder’s entire contents are selected, which is not the case here. The same is true for
the etc folder and the root ( / ) folder higher in the tree. Also, the folders with partial
selections are dimmed in the browser interface).
To browse and restore:
1. In the Restore Client panel, use the Restore to This Client drop-down list to select
which client to restore to. By default, the restore client is set to either the client that
is being restored or the client that the backup originated from, depending on how
the restore was initiated. You can change the restore client by selecting a different
client in the Restore to This Client drop-list. Only clients that are currently online
and available are shown in the list.
If you are restoring to the same client, skip to step 4.
2. If you are restoring to a different client, in the Relocate to This Path box, click
Browse to specify the path on the selected client to relocate the restored files to.
The browsing interface for the relocate path is similar to the interface for selecting
files shown in Error! Reference source not found..
Figure 7-5: Browsing folders
Jobs
PAGE 108
Data Protection Appliance User Guide
Use the browsing interface to select the folder to use as the starting point for the
relocated restored files. The contents of the selected (highlighted) folder on the left
will be displayed on the right and listed in the Current Folder text box. The File
Selection field will show you what location you have chosen.
3. After selecting the location to restore the files to you’ll be taken back to the previous
window.
4. Click Restore to restore the files.
Restore
This action provides a quick interface for restoring all of the files from the selected backup.
Note: You can only restore from backup jobs for which a check mark appears
in the Restorable column.
Figure 7-6: Restore screen
By default, the files will be restored to the location and the client that they were backed up
from.
If you want to relocate the restored files to a different location (especially if you restore to a
different client), in the Relocate Restored Files To box, type the new location.
If you want to restore the files to a different client, use the Restore to Client drop-down list
to select the client.
Then click Restore to restore the files.
Jobs
PAGE 109
Data Protection Appliance User Guide
Delete
This action will delete the selected jobs from the list. A confirmation prompt will appear.
(Re)Import
If you suspect that the selected backup missed importing files, use the (re)import feature.
Any missing files will be imported and filed correctly.
To reimport the selected job, select (Re)Import from the Actions menu. A confirmation
prompt will appear:
Figure 7-7: Jobs Re(Import) screen
Click Yes to reimport the job.
Deduplicate
This action will have the appliance automatically store only one copy of an unchanged file
at a time, even if the same file is backed up several times.
Note: In order to deduplicate a backup job, deduplication must be enabled on
the job’s client. (See “Deduplication” under “Edit Sub Tab”)
Jobs
PAGE 110
Data Protection Appliance User Guide
A confirmation prompt will appear:
Figure 7-8: Deduplicate confirmation screen
Click Yes to deduplicate the job.
Properties
This action displays a Properties screen for the job, with tabs that display:



Job information
Deduplication statistics (if the job has been deduped)
Information about any backup failures (files that could not be backed up)
Figure 7-9: Properties screen
To close the screen, click OK in the lower-left corner.
Jobs
PAGE 111
Data Protection Appliance User Guide
Settings Sub Tab
The Settings sub tab lets you enable global job setting management and define
management options.
Figure 7-10: Setting sub tab
The Automatic Job Management Settings page has the following settings:
Setting
Description
Enable Automatic Job
Management
Enables the system to automatically delete jobs after their
retention periods are exceeded. Retention periods are set on
a per-client basis using the Edit sub tab on the Client tab;
see
Job Recycling” on page 76. The default setting is “enabled”
(checked).
Enable Automatic
Deletion of Orphaned
Jobs
Enables the system to automatically delete any jobs with
deleted clients. The default setting is “disabled” (unchecked).
This will cause all jobs that no longer have their associated
clients to be deleted when the appliance checks for these
factors periodically.
Enable Automatic
Deletion of Erred Jobs
Enables to the system to automatically delete any
unsuccessful jobs. The default setting is “disabled”
(unchecked). Note that erred jobs can be a source of hidden
used space, even if the job says 0 bytes were saved. It is
recommended to delete erred jobs unless they are part of
troubleshooting an issue with Revinetix Support.
Jobs
PAGE 112
Data Protection Appliance User Guide
Setting
Description
Job Retention Policy
Select a job retention policy from the drop-down list. By
default, jobs are automatically deleted if a job’s backup level
(full or differential/incremental) has been selected for
recycling and the retention period for the level has been
exceeded. See
Job Recycling” on page 76. Job retention periods are set on a
per-client basis.
Note: The non-default policy is named Preserve
Single Job Set. This setting is recommended if you
want the system to save an old job until a more recent
full backup exists. The appliance will save the most
recent full and all subsequent differentials and
incrementals until a new full is successfully backed
up.
Job Schedules
When enabled, all clients will be backed up according to their
schedules. When disabled, no schedules are used and only
manual backups will be performed. All scheduled backups
are effectively turned off. The default setting is Enabled.
Click Submit to apply your settings, or click Reset to return to the previously applied
settings.
Unreferenced Data Sub Tab
The Unreferenced Data sub tab lists data that should have been deleted after you deleted
a job, but the deletion left behind files. These unreferenced data files take up disk space and
should be deleted, especially if you suspect that you are running out of disk space. Or, you
can attempt to reimport unreferenced data files that may have been misfiled or lost in the
system.
Jobs
PAGE 113
Data Protection Appliance User Guide
Figure 7-11: Unreferenced Data sub tab
To update the display by manually scanning the database for any orphaned files, click Scan
for Unreferenced Volumes at the bottom of the list.
To remove the unreferenced data, select the files individually, or click Select All. Then click
Delete Selected Volumes. The selected volumes will then be listed separately:
Figure 7-12: Confirm deletion of volumes
To delete the selected volumes, click Confirm Deletion of Volumes.
To attempt to reimport unreferenced data files, select the files (on the main Unreferenced
Data sub tab screen), and then click Attempt Import Selected Volumes. The selected
volumes will then be listed separately:
Figure 7-13: Confirm reimporting volumes
To attempt to reimport the selected volumes, click Confirm Import Attempt of Volumes.
Jobs
PAGE 114
Data Protection Appliance User Guide
Section 8
Archive
This section documents the Archive tab, which has the following sub tabs:









Libraries
History
Settings
Encryption
Media Inventory
New Mirror
Remote Mirrors
Remote Settings
Remote Repositories
These sub tabs are described under the respective headings in this section.
Note: If you are running replication, some of the sub tabs listed above will
not appear on the management console for the secondary appliance.
Whenever you modify your configuration, remember to save your
modifications; see “Activating Changes” on page 30.
Libraries Sub Tab
Use the Libraries sub tab to manage the archive media on your system.
Figure 8-1: Libraries sub tab
Selecting the Archive Library
The screen that you will see lists the archive libraries on your system. In the example
shown in Error! Reference source not found., the first button lists the built-in archive
ard disks. The second button is for an external USB drive or series of drives.
Click the button for the library that you want to view.
Archive
PAGE 115
Data Protection Appliance User Guide
Viewing the Archive Library
After you select a library to view, a screen similar to the following will appear:
Figure 8-2: Archive Libraries
For each disk in the library, a graphic similar to the following appears:
Figure 8-3: Library information
This graphic contains:

A green check mark indicating that use of the archive library is allowed. If you click
the check mark, it becomes a red X, which disallows use of the archive library. Click
the red X to toggle back to the green check mark.
Note: This is useful when switching archive disks during an archive process.



The amount of total disk space and available (free) disk space. The Total Space and
Available Space numbers listed along the bottom of the screen reflect the total of
all installed disk drives.
The disk model information.
The Manage Disk icon (the disk drive icon, on the right), which you click to view the
Manage Archive Disk screen documented in the next section,
Manage Archive Disk Screen.”
Note: The screen shown in Error! Reference source not found. is the
creen that you will use to archive backup jobs, using the Archive Jobs or
Archive Clients button. That process will be documented later, in the section
“Archiving Jobs” on page 125.
Archive
PAGE 116
Data Protection Appliance User Guide
Manage Archive Disk Screen
When you click the disk drive icon shown in Error! Reference source not found., a
anage Archive Disk screen similar to the following will appear:
Figure 8-4: Manage Archive Disk screen
The top section of the screen lists information about the archive disk.
In the next section of the screen you can specify the disk location and enter optional disk
label and disk information.
The Disk Location setting is an arbitrary location description that you can add for each
disk, which is used to track where different archive disks are located.
This setting uses a drop-down menu to select locations. To add a location to this menu, type
the location name in the text box to the right of the Add New Location button at the
bottom of the screen, and then click Add New Location.
To apply the information that you enter in this section, click Update Disk Info.
Archive
PAGE 117
Data Protection Appliance User Guide
The bottom part of the screen has the following buttons:
Button
Description
Manage
Encryption
Settings
To manage your encryption settings, click Manage Encryption
Settings. The screen that appears is the same screen as on the
Encryption sub tab; see “Encryption Sub Tab”
Add New
Location
Add a new location for the Disk Location setting above. Enter the
text into the box, and then click this button.
Library View
Return to the archive library view described in the previous section,
Viewing the Archive Library” on page 116.
Prepare Disk for
Removal
Prepares the archive disk for removal from the Revinetix backup
appliance (or for drives connected via USB).
Once the Scan for Devices button appears, it is safe to remove the
disk media.
Note: Always use this button when removing any disk
media; data corruption or data loss may occur if drives are
not removed properly.
View Archived
Jobs
Lists all of the backup jobs that have been archived to that archive
disk. See the next section, “Viewing Archived Jobs.”
Refresh
Refreshes the screen content.
Format Disk
Formats the disk and initializes it for archive use. You will be
prompted for confirmation; click Yes to continue, or click No to
cancel.
Warning: When you format a disk, all existing data on the
disk is lost.
Recover
Database
Archive
Recovers the database for the archive disk. As the screen warns, the
process may take some time, and the disk won’t be available for
archive operations until the recovery is complete. Click Yes to
continue, or click No to cancel.
PAGE 118
Data Protection Appliance User Guide
Viewing Archived Jobs
When you click View Archived Jobs on the Manage Archive Disk screen, the screen
expands to present a list of the backup jobs that have been archived to that archive disk.
Figure 8-5: Viewing archived jobs
This list of jobs is similar to the Jobs History screen; see “History Sub Tab” on page 103.
You can sort by a particular column (for most columns) by clicking the column heading
(which will then be highlighted). In the case of the Started column, click either the uparrow or the down-arrow to sort in ascending or descending order, respectively.
To view information about a specific job, click the
icon in the Info column.
You can customize the job list by applying the following filters (at the top of the archived
files section):
Filter
Description
Status
The job status—successful or erred
Archived
Whether the job was archived
Client
The client for the job
Type
Backup or restore
Level
Full, differential, or incremental
Archive
PAGE 119
Data Protection Appliance User Guide
Filter
Description
Date
How recently the job was performed —last 24 hours, last seven
days, last 30 days, and so on
Each filter field is a drop-down list of options; the default selection is blank (not filtered by
that field). After you have set one or more filters, apply them by clicking Apply Filter; then
only the items that meet your filter criteria will be listed. To clear the filters, click Clear
Filter.
The Action column on the far right has two icons for each job entry:
Icon
Purpose
(Browse)
View the individual files for the job.
(Restore)
Restore the files for the job.
The file browser is a type of interactive restore process: you can choose exactly what you
want to restore. Through the file browser you may select all files by checking the top
directories and folders in the file structure or by clicking on those directories you can
explore the file structure and select only those files you wish to restore.
Note: When browsing a Windows Client, the interactive browse session shows the
Windows Client's drive designators as subdirectories of a directory labeled /. For example,
the C: drive would appear as /C:/.
When browsing an Incremental job, only directories modified since the last backup will be
displayed with attributes. If a directory is displayed without attributes, then it leads to
another directory that has been modified.
Restore. To select a file or directory for restoration, simply check the Add checkbox next to
the file or directory name and press the Apply button. If a directory is added, all its files and
subdirectories are automatically chosen as well. If a directory has only some of its files or
subdirectories marked for restore, a + sign will appear next to the Add checkbox for that
directory. If a subdirectory has had all of its contents marked for restoration, the checkbox
will be checked and the directory name will appear in bold.
If the Relocate Restored Files To text box is left blank, selected files will be restored to
their original location. If you wish to restore the files to another location, enter the desired
directory path in the text box.
Archive
PAGE 120
Data Protection Appliance User Guide
To restore files to another client, change the client in the Restore to Client option menu. If
the client you are browsing is a Microsoft Windows client, the client you select to restore to
must also be a Microsoft Windows client. There are no restrictions for restoring files from a
Unix based client to a client of any other Unix flavor.
Note: The Apply button must be used to register the relocation directory. If
you enter a value in the text box and click on a directory link to continue
browsing, the relocation directory will be lost.
Each component of the Directory Path at the top of the page is a selectable
link that accesses the directory selected. You may use this feature instead of
repeatedly pressing the
button.
After all desired files and directories have been selected for restoration, press the Restore
button.
When files are restored to a different location or a different client, they are restored with
their entire path. For example:
Original file path: C:/Program Files/file123
Restore to location: C:/Temp
The file will be found in: C:/Temp/C:/Program Files/file123
If you restore directly from the archive, the record of the restore will be on the archive
drive, not on the appliance. If you import the job back onto the RAID before restoring, the
restore record will also be on the RAID.
Note: Restore jobs are done asynchronously with respect to the UI. A
summary of the request will be presented and the actual restore may have to
wait for existing backup jobs to finish. You can check the check boxes in the
list to select one or more jobs. You can then use the following buttons:
Button
Description
Purge All Selected Jobs
Clean up selected jobs from the disk. Jobs are never
automatically removed from the archive disk; they are
removed by purging them (or by formatting the disk).
Purge All Erred Jobs
Clean up any erred jobs that may have been copied to the
archive disk. This can help free up disk space.
Archive
PAGE 121
Data Protection Appliance User Guide
Button
Description
Import Selected Archive Move archived jobs back onto the appliance.
Jobs
Archived BMR (bare metal restore) jobs must be reimported
before they can be restored. After you confirm the BMR
import, you will see the Archive in Progress page, except
that the text “Importing Archive Jobs” will be displayed at the
top. When the progress bars are full, the job is complete and
available to restore.
Using New Archive Disks
After you remove an archive disk, the Archive Libraries screen similar to the following
will appear, showing an empty disk bay:
Figure 8-6: An indication of empty archive bay
To prepare for use any new disks that you have inserted, complete the instructions in the
following sections.
Scanning for Devices
To scan the system for any new archive disks, click Scan for Devices. The screen will
display information for any new disks that are found. This always needs to be done with a
new drive before archiving will resume.
Note: The system will scan all available disk bays regardless of which drive
bay is associated with the Scan for Disk button.
If the disk you have selected for archiving has not been used before it will show as a
Foreign Disk which will need to be associated with the appliance.
Archive
PAGE 122
Data Protection Appliance User Guide
Figure 8-7: A Foreign Disk
Formatting the Disk
To format the new disk and initialize it for archiving, click the disk drive icon
to get to
the Manage Disk area. Next, click Format Disk. A confirmation prompt similar to the
following will appear:
Figure 8-8: Disk formatting confirmation
To format the disk, click Yes.
Testing the Archive Disk
To verify that disks are suitable for archive, all new disks must be tested. This applies to:


Disks that have not been used for archiving
Disks that may have been used for archive but have undergone other formatting or
alterations from an outside source
Archive
PAGE 123
Data Protection Appliance User Guide
A Non Archive Disk label
will appear over the graphical representation of the disk.
Clicking this icon will bring you to a message similar to the following:
Figure 8-9: New (non-archive)disk information
To test the disk (which will clear this message), choose from the Select Test section. There
are three testing options:
Option
Description
Standard Test
Reads and writes on many of the disk sectors; will usually detect
errors.
Note: This test takes about 45 minutes to complete, and is the
recommended test.
Quick Test
Less thorough, but will satisfy the testing requirement; may not find
errors, but the disk will be ready for archiving.
This test takes about 20 minutes to complete.
Full Test
Tests every sector of the disk; will find any errors that exist.
This test takes about a minute for every gigabyte of disk capacity.
Select the testing option, and then click Test and Initialize.
Archive
PAGE 124
Data Protection Appliance User Guide
A Confirm Test and Initialize window similar to the following will appear:
Figure 8-10: Disk Info and Testing window
Click Yes to continue or No to go back.
Once the disk has been formatted and tested, it is ready for use as an archive disk.
Archiving Jobs
Use the Archive Jobs button to manually copy backup jobs onto an archive disk for off-site
storage. See “Archiving” under “Edit Sub Tab” for more information on automatic
archiving.
Figure 8-11: Archive Jobs button
This screen has buttons for two archiving options:
Button
Description
Archive Jobs
Use to select individual backup jobs for archiving.
Archive Clients
Use to archive all of the backup jobs for each of the selected clients.
Archive
PAGE 125
Data Protection Appliance User Guide
Note: The instructions for archiving jobs and archiving clients are very similar.
The instructions below walk through archiving jobs.
When you click Archive Jobs, a screen similar to the following will appear:
Figure 8-12: Jobs on the RAID available for archiving
This screen lists all of the successful backup jobs that are available to archive. The list does
not include any jobs that have already been archived to the current archive disk. Jobs listed
with a diskette symbol
in the Arch (archive) column have been archived to different
archive disks..
To view information about a backup job, you can click the
icon in the Info column. On
the screen that appears, on the Job Messages line, you can click the
icon to view job
messages.
Select (check the check boxes for) the jobs that you want to archive, and then click Archive
Selected Jobs To in order to archive the jobs to the appliance listed.
Note: About 4 GB of disk space is reserved for building the catalog used to
track all the files present in the selected jobs.
Archive
PAGE 126
Data Protection Appliance User Guide
The screen that appears lists your selected jobs:
Figure 8-13: Selected jobs to Archive
The screen has the following options:
Option
Description
Mark Media as Check this check box to indicate that the associated media should be
Archive
treated as an unappendable (READ ONLY) archive by the Revinetix
Data Protection Appliance. No additional archiving can be done
after this setting is enabled. The drive will need to be formatted to
use it as an active archive in the future.
Modify Selection
Click this button to go back to the previous screen to change your
selection of jobs to archive.
Confirm
Click this button to confirm and start the archive operation.
Cancel
Click this button to cancel the archive operation.
Note: If the total size of the selected backup jobs exceeds the capacity of the
archive disk, the archiving process will still begin. When the disk fills, the
archiving process will stop, and you will be prompted to insert new media
(needs appendable media). Once a new archive disk is inserted, the archiving
process will continue.
The archive disk will generally show that one or two GB are still free, even
though it complains that the disk is full. This is normal as enough empty
space needs to be left on the drive to allow the appliance to access it.
Archive
PAGE 127
Data Protection Appliance User Guide
After the archive begins, the Archive in Progress screen displays an archive operation in
progress:
Figure 8-14: The Archive Process
Two progress bars are displayed:



The first bar indicates the percentage complete of the entire archival process.
The second bar indicates the percentage complete of the current operation.
The above figure represents a completed archive job. The listed “Archiving Jobs to
Disk” and progress bar will remain until “Clear Archive Process” is selected, which
will then allow manual archiving of jobs and clients.
During and after the archive, the following buttons appear:
Button
Description
Refresh
Click this button to refresh the screen display.
Cancel Archive
Process
While the archive is in progress, click this button to issue a cancel
request, which will terminate the copy at the end of the current
operation.
Note: The current operation may take some time to
complete before the cancel request is recognized.
Clear Notice
Archive
If the system encounters an error during the archive process that
terminates the archive copy process, click this button to dismiss the
error and return the device to a state where it can be managed.
PAGE 128
Data Protection Appliance User Guide
Button
Description
Clear Archive
Process
After the archive completes, click this button to clear the progress
bars from the screen. Until the progress bars are cleared, the
manual archive buttons will not be accessible.
Multiple-Disk Archives
An archive set can span multiple disks, allowing for large archive sets of many jobs. While
archiving such a set, the attached archive disks will run out of free space. When the last
archive disk fills, you will be prompted that appendable media is required.
Note: You may also be set up to receive media request e-mail notifications
when appendable media is required. This can be configured on the System >
Settings screen; see “Notifications” on page 189.
To continue archiving the job, you need to replace a currently attached disk with a new
disk. To do so:
1. Click the Libraries sub tab and click the button for the library that you are using.
(See “Selecting the Archive Library” on page 115.)
2. Click the Manage Disk icon (the disk drive icon) on the disk that is full (that is, the
icon that shows zero free space). (See “Viewing the Archive Library” on page 116.)
3. On the Manage Archive Disk screen, click Prepare Disk for Removal. (See “
Manage Archive Disk Screen” on page 117.)
4. When this is completed, the view should change back to the Libraries view. You can
then safely remove the full archive disk and replace it with a new one.
5. Click Scan for Devices for the appliance to recognize the new disk, which can take a
few moments. New drives MUST be scanned in, even if there is an archive in
progress when the disk is filled and needs to be replaced with a fresh disk. If the
new disk does not appear immediately, click the Refresh button to check again. (See
“Scanning for Devices” on page 122.)
6. If the disk has never been used by the appliance before, it will require a test and
format. You can test and format the drive while an archive is requesting appendable
media, and then use it immediately to continue the archive. (See “Formatting the
Disk” on page 117 and “Testing the Archive Disk” on page 117.)
7. If the disk you have selected for archiving has not been used before it will show as a
Foreign Disk which will need to be associated with the appliance.
Archive
PAGE 129
Data Protection Appliance User Guide
Figure 8-7: A Foreign Disk
Formatting the Disk
8. When the drive is ready, click the green check mark on the bay/drive graphic, and
then click the red X when it appears. The green check box will then reappear, and
the appliance will be allowed to continue archiving onto this new disk.
History Sub Tab
Use the History sub tab to view past archive jobs. This can help you determine whether an
archive completed and which client jobs were archived:
Figure 8-15: History sub tab
You can use the check boxes and the drop-down list at the top of the display to also




List jobs that have been purged or that erred
Show the media for the jobs
Sort the list by time instead of by name
Show only specific clients
Archive
PAGE 130
Data Protection Appliance User Guide
To apply your selections, click Redisplay.
The name of each archive set is a link that you can click for a more detailed view of the
archive job:
Figure 8-16: Archive set screen
The message at the top of the display indicates the status of the archive catalog. The screen
lists the following information:



The archive name
The archive jobs
The archive media information
If the status message indicates that the media volume containing the archive catalog is
present (green check under Archive > Status) and the catalog is online, you can click a job’s
Browse button to view the job’s browse interface. From this interface, you can select files
and/or folders to restore to the client that you select.
Archive
PAGE 131
Data Protection Appliance User Guide
Settings Sub Tab
Use the Settings sub tab to manage automatic archiving and archive locations:
Figure 8-17: Settings sub tab
Use the Enter Global Archive Settings section to manage auto archiving settings:
Setting
Description
Auto Archiving
To enable automatic archiving, check the Enable check box, and
then click Submit.
To disable automatic archiving, uncheck the Enable check box, and
then click Submit.
When this feature is disabled, no automatic archiving will take
place, even if it is enabled on the client level.
Auto Archiving Use the drop-down list to select the automatic archiving
Destination
destination—either the local archive disk or attached USB drives—
and then click Submit.
Use the Manage Locations settings to create and edit locations that can be assigned to the
archive media:
Archive
PAGE 132
Data Protection Appliance User Guide
Setting
Description
Locations
This list shows all of your locations.
Change Selected To change the name of an existing location, select the location in the
Location
Locations list, type the new name in the Change Selected Location
box, and then click Submit.
New Location
To add a new location, type the name of the new location in the New
Location box, and then click Submit.
Encryption Sub Tab
Revinetix uses AES-256 bit encryption. The data is encrypted with large keys, and the
password is used to unlock the keys.
Use the Encryption sub tab to manage archive password settings:
Figure 8-18: Encryption sub tab
Each archive disk is encrypted using the current password. The appliance maintains a
complete history of all the passwords used and what disks they were applied to. You
should download an encrypted copy of the password database periodically to ensure a
backup of these passwords is maintained.
To change the archive password, first make sure that the old password is typed in the
Current Archive Password box.
Then type the new password in the New Archive Password and Confirm New Password
boxes, and then click one of these buttons:
Button
Purpose
Change Password Changes the current archive password. All disks formatted with
encryption from this point forward will use this password.
Archive
PAGE 133
Data Protection Appliance User Guide
Button
Purpose
Download
Passwords
Must supply the current archive password as well as an additional
password (with confirmation entry) to encrypt the master
password file list and download the list into a file. The additional
password is used to encrypt the downloaded file, and is needed to
decrypt it when it is uploaded.
Upload
Passwords
Uploads a saved master passwords list file. The current archive
password needs to be supplied as well as the password used when
downloading the master list. To specify the password file location,
type the path, or click Browse.
You will be prompted whether to change the encryption password used for subsequent
archive disks. Click Change or Don’t Change.
Note: You cannot change an archive disk’s encryption password without
reformatting it. When reformatted, the archive disk’s encryption password
changes to the current encryption password.
When the Encrypt All New Media check box is checked, all new media that you add will be
encrypted, by default. If you change this setting, click Change Settings to apply the change.
Media Inventory Sub Tab
Use the Media Inventory sub tab to display all of your known archive media:
Figure 8-19: Media Inventory sub tab
The Media Inventory sub tab has the following columns:
Column
Description
Type
The media type—fixed disk or USB drives.
Name
The name assigned to the media.
Status
An icon indicating whether the media is locked or can be appended.
A border around the icon indicates that the media is available (can
be appended).
Library
The local archive disks or USB drives.
Archive
PAGE 134
Data Protection Appliance User Guide
Column
Description
Location
An optional label describing the location of the media.
Used
How much disk space is being used by the archived data.
Capacity
The total usable capacity of the media.
New Mirror Sub Tab
Use the New Mirror sub tab to establish a new Remote Mirror connection.
Figure 8-20: New Mirror sub tab
The Remote Mirror section of the Backup menu allows a user to create a mirror image of
the appliance and client configuration files and backup data. The remote archive is
designed to be a disaster-recovery feature, and is not meant to be used for everyday
restorations. This feature will only work if more than one Revinetix Appliance is available
over a network connection.
To add a remote mirror, type the remote appliance identifier in the Host text box. You can
use either the name or the address of any other appliance in your network. Change the
Port settings only if you have configured your network differently.
By default, the Revinetix Data Protection Appliance will use SSL over the standard 443
https: port. We recommend that you use SSL to protect communications between the
appliance and its mirror.
However, if your Revinetix Data Protection Appliances are communicating via a secure
private network, you can uncheck the Secure (SSL) check box and change the Port (Web)
setting to 80. You will not be prompted to confirm any certificate fingerprint. Backup data
transfer is always secured by the SSH protocol.
Archive
PAGE 135
Data Protection Appliance User Guide
To continue, click the Validate Connection button. The Add Remote Confirm
Fingerprint screen will appear:
Figure 8-21: Add Remote Confirm Fingerprint screen
Type the password for the remote appliance, and then click Add.
Remote Mirrors Sub Tab
Use the Remote Mirrors sub tab to manage any Remote Mirrors you have set up.
Figure 8-22: Remote Mirrors sub tab
All remote mirrors that you add are displayed on the Remote Mirrors screen. For each
mirror, the port information, model number and software version are also displayed. The
host name displayed is a link that you can click to view more detailed information about
the host and any client info that it contains.
Archive
PAGE 136
Data Protection Appliance User Guide
Port status is indicated by the badge and key icons next to each port number. If the icon is
green, then a good connection is established and the remote archiving will be successful.
If the icon is not green, then the connection is not good and must be re-established. There
may also be a security threat, in which case you should verify the fingerprints and the
security of the network.
After you verify the fingerprints and network security, to attempt a connection, click Retest Network. If the connection is successful, the green icon color will return.
If the connection is still unsuccessful, the mirror host may be reporting a conflicting
fingerprint. The two fingerprints will be listed in the Display Remote Host screen and you
will have the option to replace one or the other. You may also need to upload the client
fingerprint to the remote host in order to restore the connection.
If the connection is still not resolved, click the host name or address to verify host
information and make sure that the host is online. The Display Remote Host screen that
appears also shows client information, including the client name and the amount of data
stored for that client. After you click the Restore All button at the bottom of the screen, you
will be prompted to confirm the restoration process.
As mentioned earlier, the remote archive is designed as a disaster recovery solution. If all
data on an appliance has been deleted, or if the appliance was replaced and data needed to
be restored, use this restore feature from the remote mirror. If you confirm the Restore All
command, the remote host will copy all appliance and client configuration files and backup
data contained in its repository back to the original location (or the replacement
appliance), effectively restoring the appliance to the state that it was in when the last
Remote Archive synchronization occurred.
Note: Any information or changes recorded on the appliance after the last
remote synchronization will not be recorded in the remote mirror and will
be lost in the event of a remote restore.
Only data that has changed for the client from the last synchronization will be copied—for
example, a new backup job that was recorded, or an old job that was deleted. The remote
host will make itself into a “mirror” image of the selected clients on the appliance.
These jobs can be canceled at any time; however, if you click Cancel after the copying has
begun, then part of the data will remain on the remote mirror.
Archive
PAGE 137
Data Protection Appliance User Guide
Remote Settings Sub Tab
Use the Remote Settings sub tab to manage remote archiving.
Figure 8-23: Remote Settings sub tab
Settings:
Setting
Description
Remote
Synchronization
Enabled
To enable or disable remote synchronization, check or uncheck this
check box.
Start Time
Specify when the synchronization will start. You can change this to a
time convenient for your schedule.
Force Sync Stop
To force the synchronization to stop at a set time (instead of
continuing until complete), check this check box and set the Stop
Time below. This setting is useful in situations where
synchronization could interfere with network performance.
Stop Time
Specify when the synchronization will stop, if the Force Sync Stop
check box is checked.
Note: If the synchronization was not complete when it was
stopped, when synchronization starts again, it will resume
from the point where it was stopped.
Archive
PAGE 138
Data Protection Appliance User Guide
Setting
Description
Maximum
Concurrent
Copies
Specify how many remote mirror sites to send data to at the same
time if more than one remote mirrored archive exists.
Maximum
BW Override
Specify the maximum amount of network bandwidth to use for
synchronizing, in units of kilobytes per second. For example, if you
type 64, data will be sent using up to 64 kilobytes per second of the
network capacity, regardless of the total available capacity.
Use Compression
To use data compression, check this check box.
To save your settings, click Save Settings. To return the screen to the original (last saved)
settings, click Reset.
Remote Repositories Sub Tab
Use the Remote Repositories sub tab to view information about any data that your system
is storing as a mirror for another system. An appliance can be a mirror for another system
and a functional appliance of its own concurrently:
Figure 8-24: Remote Repositories sub tab
Each line in the list has the following buttons:
Button
Description
Purge
Removes all data from the repository (your system). You will be
prompted to confirm the action.
Note: After data is purged, it cannot be retrieved; it can only
be re-created by synchronization.
Archive
PAGE 139
Data Protection Appliance User Guide
Button
Description
Revoke
Revokes access to your appliance. You will be prompted to confirm
the action. To restore access, you must retest the connection from
the client appliance and clear the fingerprint exchange as explained
above in “Remote Mirrors Sub Tab” on page 136.
When an appliance has been replaced, add the remote mirror as explained above. Then, on
the machine designated as the mirror, view its local repositories. Check the Unify check
box. Using the drop-down menus, select the original and replacement appliances, and then
click the Unify button. This action will cause the original data to be copied to the
replacement repository. From the replacement appliance, client information will now be
displayed, and you can use the Restore All button to fully restore data.
Archive
PAGE 140
Data Protection Appliance User Guide
Section 9
Replication
The Replication feature lets you create a redundant failover device for your existing
Revinetix Data Protection Appliance using a second Revinetix Data Protection Appliance.
When you enable replication, you dedicate the entire RAID on the subsidiary appliance to
be an exact copy of the RAID on the primary appliance.
The Replication tab has the following sub tabs:


Status
Mode/Options
Note: A third sub tab (Pending Jobs) appears after replication has been
configured on the appliance.
Whenever you modify your configuration, remember to save your
modifications; see “Activating Changes” on page 31.
In order to use replication, you need:


Two Revinetix Appliances that you will configure as the primary and secondary
appliances. Both appliances must be running the exact same version of RevOS that
supports Revinetix Enhanced Replication (currently 3.4.0.x).
(Optional) A license obtained from Revinetix in order to enable the byte-level
replication feature. Byte-Level Replication will further optimize the transfer of
backup file data by computing deltas to send to the secondary appliance. Without
Byte-Level Replication enabled, the data is simply copied in its entirety from one
appliance to the other.
Configuring Replication
When initially configuring appliances for replication, all of the jobs on the Primary
appliance will automatically be identified on the Secondary and copied over to it if they are
missing. Depending on the number of jobs and the amount of data they contain, this could
be a lengthy process. Therefore, it is highly recommended that both the Primary and
Secondary appliances first be connected using a high-bandwidth connection.
Replication
PAGE 141
Data Protection Appliance User Guide
After this initial job copying (known as "seeding") is complete, if the Byte Level Replication
feature is enabled, the Secondary appliance may be moved to its desired location and safely
use a lower bandwidth connection between the appliances. Anything less than a gigE or
100Mbit connection should use Byte-Level Replication. There are options (described later
during configuration steps) that can help expedite this process if an exceptionally large
amount of data needs to be seeded and/or if a high band-width connection is unavailable.
Setup Overview
The setup process will consist of four phases:
1. Optional: Enter license for Byte Level Replication on Primary appliance if Byte Level
Replication has been purchased.
2. Configure the Secondary appliance for Replication
3. Configure the Primary appliance for Replication
4. Start replication and monitor progress
Note: Only certain Revinetix-approved hardware is capable of performing
Byte Level Replication Feature.
Replication Setup Guide
Entering Licenses for Byte Level Replication Feature
Note: You may skip this step if you have a high speed connection between
each appliance and do not require the Byte Level Replication Feature.
To enable Byte Level Replication, each appliance will require a license, which can be
obtained or may be included you’re your new appliance. Navigate to the licenses panel by
clicking on the "System" tab, then the "Settings" sub tab and finally the button labeled
"Licenses." Enter the license key in the "Enter Feature Key" field and click Submit. Confirm
that an entry "RVXBLR Revinetix Byte Level Delta Replication" appears in the "Enabled
Features" section.
Configuring the Secondary Appliance
Though it may seem out of order, the configuration process is easier when the Secondary
appliance is configured first, then the Primary appliance. However, once you become
accustomed to configuring appliances for replication, you can configure them in either
order successfully.
Replication
PAGE 142
Data Protection Appliance User Guide
Log into the Secondary appliance and click on the "Replication" tab, then click the
"Mode/Options" sub tab.
Figure 9-1: Mode/Options sub tab (Secondary)
Click the "Secondary" radio button to switch modes, the following confirmation dialog will
be displayed:
Figure 9-2: Change Replication Role Confirmation
Note: A common cause of problems when adding licenses is the inclusion of
extra, unintended white space characters before or after the key text.
Replication
PAGE 143
Data Protection Appliance User Guide
Confirm the switch to Secondary replication mode by clicking the "Yes" button; the
following options will be displayed:
Figure 9-3: Secondary appliance options
Both the Primary and Secondary appliances need to share a security key. You can generate
a new key on the Secondary appliance which will then be used when setting up the Primary
appliance. Click the "Generate new key" check box to indicate that you'd like to generate a
new key.
Replication
PAGE 144
Data Protection Appliance User Guide
Figure 9-4: Generate new key
Note: The new key will have to be manually transferred to the replication
partner whenever it is changed.
Next, enter the network address of the appliance you will be using as the Primary appliance
into the "Address" field. You can use either a system name (which must be resolvable via
DNS) or an IP address as shown in the example:
Figure 9-5: Remote Appliance Information
Note: You can also enter an optional description of the remote appliance you
will be using as the Primary replication appliance.
The value in the "Appliance Port" field should be left at its default value (2300) unless you
have a specific reason (firewalls, security, etc.) to change it. If you need to change it, click
the down-arrow to expand the box labeled “Advanced” and access the port setting.
Note: If the value in the Appliance Port field is changed, it will be necessary
to change the Primary’s port to the same value.
At this point you have entered enough information to make a connection to the Primary
appliance. Click the "Apply" button at the bottom of the panel.
Replication
PAGE 145
Data Protection Appliance User Guide
While the Primary appliance is being contacted, the UI panel will temporarily become
disabled. This is normal and it may remain this way for up to a minute or more. Once the
Primary appliance has replied, the UI panel will again become active and the authentication
key and remote (Primary) appliance GUID fields will be populated as shown below.
Figure 9-6: Configured Secondary
Note: The actual text shown in the authentication key, address, and remote
GUID fields will be unique to your appliance(s) and will NOT match the
example shown above.
The "Configuration Status" section at the bottom of the panel will keep you informed of any
errors that may occur. During the initial setup process, it is normal for the first appliance
being set up to receive an error like the one shown in the example above. This condition will
be resolved once the Primary appliance has been configured!
Replication
PAGE 146
Data Protection Appliance User Guide
If you encounter any errors other than the "Connection refused" error shown above, please
consult the "Errors During Setup and Configuration" section of this chapter for more
information.
Now that the Secondary appliance has the GUID of the Primary appliance the Enable
Replication check box should be enabled.
Now click the Enable Replication check box to enable replication.
Figure 9-7: Enable Replication checked
Press the Apply button again.
This completes the basic configuration of the Secondary appliance.
Note: The same error described previously (as shown in Figure 10-6) will
appear again.
Replication
PAGE 147
Data Protection Appliance User Guide
Configuring the Primary Appliance
Log into the Primary appliance and click on the Replication tab, the Mode/Options sub
tab, and select the Primary radio button. After clicking Yes on the subsequent
confirmation dialog, the options for the Primary appliance will appear.
Figure 9-8: Primary appliances options
Replication
PAGE 148
Data Protection Appliance User Guide
Next, make sure the Enable Replication check box is NOT checked while setting up the
connection to the Secondary appliance (you will come back here later to turn on the
replication process once the connection to the Secondary has been confirmed).
Figure 9-9: Leave 'Enable Replication' unchecked
Using the exact same authentication key that was generated when configuring the
Secondary appliance enter the key text into the Key field.
Figure 9-10: Copying over the Authentication Key
Enter the network address of the Secondary appliance (the one you already set up) into the
Address field. As with the Secondary configuration, you can also specify an optional
description of the appliance you have designated as the Secondary appliance.
Figure 9-11: Secondary Appliance's Information
Note: The most accurate method to transfer the key is to copy/paste the text
from the Secondary appliance's "Key" field directly into the Primary's "Key"
field. This makes it easier to ensure that the text is identical on both
appliances.
Replication
PAGE 149
Data Protection Appliance User Guide
As indicated at the beginning of this chapter, there is an option which will speed up the
initial seeding process considerably. Expand the box labeled Bandwidth Management to
display the bandwidth management options. Next, ensure that the Enable Byte Level
Delta Compression check box is NOT selected (click the check box to toggle it if
necessary).
Figure 9-12: Bandwidth Management
Although this form of compression is one of the key aspects to the enhanced performance
of byte level replication over low bandwidth connections, it is unnecessary during the
initial seeding process. In fact, it will slow down the seeding process since the overhead to
calculate delta data is far greater than the benefit it could provide at this first stage of
replication.
IMPORTANT: Once initial seeding is complete, you will need to return to the
Primary appliance's band-width management options and turn delta
compression on by selecting the Enable Byte Level Delta Compression
check box and clicking the Apply button at the bottom of the panel. THIS IS
ESSENTIAL TO REALIZING THE FULL POTENTIAL OF BYTE LEVEL REPLICATION! See the section entitled Starting and Monitoring Replication
below for more information on when to do this.
Replication
PAGE 150
Data Protection Appliance User Guide
You are now ready to complete the Primary's connection configuration. Click on the Apply
button at the bottom of the panel. After a short delay, the UI panels should become reenabled and the GUID of the remote (Secondary) appliance, as well as the version of RevOS
that it is running, should appear in the GUID and Version fields respectively.
Figure 9-13: Remote Appliance Information
If an error appears in a pop-up or in the "Configuration Status" area at the bottom of the
panel, and/or you do not see the GUID and Version fields populated as shown above,
please refer to the last section of this chapter, Errors During Setup and Configuration, for
more information.
There are some additional, optional controls that you have over the replication process and
they are described below. You can adjust these settings at any time and do not have to deal
with them at this point in the configuration process. However, it would be a good idea to
read through and become familiar with what is available. You can then decide whether to
set them up now or continue with starting the replication process.
Replication
PAGE 151
Data Protection Appliance User Guide
Advanced Replication Port Management
These settings can generally be left unchanged. However if you are replicating over the
internet by using port forwarding and NAT on the local and remote firewall this section of
settings gives you the flexibility to change the ports as required by your firewall setup.
Web Services SSL — Check to enable use of the SSL protocol for appliance recognition,
defaults to on.
Web Services Port — TCP port used to contact remote appliance via web services for
appliance recognition.
If port forwarding is not enabled on a firewall in between the two appliances this value
must be 443 if SSL is enabled, or 80 if SSL is disabled. If your firewall will translate some
other port to the remote appliance’s port 80 or 443 this value can be changed to said port.
Appliance Port — TCP port used by the Revinetix replication service, this value and the
corresponding value on the remote appliance need to match. The default value is 2300.
Bandwidth Management (optional)
The settings in this section allow you to tailor the effect of replication on your network.
Enable Byte Level Delta Compression — Toggle on/off the process of calculating and
using only the changes in job data when replicating jobs to the Secondary appliance. This
feature requires a Feature license code. Contact your Revinetix Sales Representative if you
require this functionality for replication over limited bandwidth connections.
Enable Bandwidth Limiting — Toggle on/off the bandwidth limiting feature. By default,
the replication process will utilize as much network bandwidth between the Primary and
Secondary appliances as it can. You can limit the bandwidth available to replication by
using the Bandwidth Management controls. The controls and their function are described
below.
Limit (KB/s) — The maximum number of kilobytes per second that replication will use
when transferring data from the primary appliance to the secondary appliance, when
bandwidth limiting is enabled. For example, to use only 256 KBps, enter “256”. These
values may be adjusted and depends on your internet bandwidth speeds.
Specify Window for Limiting — Toggle on/off the ability to specify a start/stop time (per
day) within which to limit replication bandwidth
Replication
PAGE 152
Data Protection Appliance User Guide
Note: The following options are only available on the Primary appliance,
though they control all communication between the Primary and Secondary
appliances.
Start Time — Hour and minute of the day to start limiting replication bandwidth
End Time — Hour and minute of the day to stop limiting replication bandwidth
Limit Bandwidth Over Weekend Days — Toggle on/off whether to use the specified
limiting on Saturday and Sunday ("off" is the default meaning all available bandwidth is
used over the weekend)
Connection Options (optional)
Some additional options are available to control the replication process. These options are
described below:
Encryption - specify whether or not to encrypt data being sent between the Primary and
Secondary appliances, possible values are:


None - data is NOT encrypted, this is default and should not be necessary if you are
replicating over a secure LAN or VPN.
AES-256 - data is encrypted using the Advanced Encryption Standard 256-bit block
cipher
After changing any of the options described above you must click Apply in order for the
options to take effect!
Replication
PAGE 153
Data Protection Appliance User Guide
Starting and Monitoring Replication
Starting Replication
Back on the Primary appliance's replication options panel, find the Replication Mode
group and click the Enable Byte Level Replication check box
Figure 9-14: Enabling Byte Level Replication
Next, click Apply at the bottom of the options panel to submit the change and start
replication!
Seeding Progress
Once replication starts the initial seeding process will begin immediately. Generally, the
number of completed, error-free jobs on both the Primary and Secondary appliances
should be the same when the Primary appliance has been replicated successfully to the
Secondary. It is possible that the counts may be off due to erred jobs, or when new jobs
have been created on the Primary appliance and are actively being replicated to the
Secondary.
With that in mind, use the Jobs group of the replication status panel to judge the overall
state of replication between the two appliances.
The job count on the Primary appliance indicates how many jobs CAN be replicated.
Figure 9-15: Job count on Primary Appliance
The job count on the Secondary appliance indicates how many jobs HAVE BEEN replicated.
Figure 9-16: Job Count on Secondary Appliance
Replication
PAGE 154
Data Protection Appliance User Guide
Therefore, there are two main conditions to look for:


Job counts are equal (or nearly equal) - indicates that the Primary appliance has
been fully (or nearly so if counts are close) replicated to the Secondary appliance
Job count is greater on the Primary - indicates that there are jobs that have NOT YET
been replicated to the Secondary appliance
To judge when seeding is complete, monitor the job counts on both appliances. When they
are (nearly) equal and the connection status on both appliances are idle, try selecting
Actions > Reconcile Secondary on the Primary appliance. If no additional replicate-able
jobs result from reconciling the secondary, seeding can be considered complete!
If Byte Level Replication Feature has been purchased- at this point, enable byte level delta
compression as described in the previous section during Primary appliance configuration,
and relocate the Secondary appliance to its final destination.
Replication
PAGE 155
Data Protection Appliance User Guide
Replication Status
There are some additional panels that provide more detailed information on the replication
process. On both the Primary and Secondary appliances, there is a general status panel
available by clicking the Replication tab and then the Status sub tab.
Figure 9-17: Status sub tab
This panel provides an overview on the state of the connection between the two
appliances, and information on the data being processed and transferred as a result of the
replication procedure.
Replication
PAGE 156
Data Protection Appliance User Guide
There are more statuses available that are specific to the Primary and Secondary roles:
On the Primary appliance, the Replicated Jobs panel shows information relating to the
jobs that have been replicated to the Secondary:
Figure 9-18: Replicated Jobs
On the Secondary appliance, the Pending Jobs panel provides information on the jobs that
have been identified as needing to be transferred to the Secondary and the jobs on which
they are dependent.
Figure 9-19: Pending Jobs
Errors during Setup and Configuration
If an error occurs during setup and configuration of the Primary or Secondary appliances, it
will be dis-played in either a pop-up message box or within the "Configuration Status" area
at the bottom of the options UI panel.
Figure 9-20: Configuration Error
Replication
PAGE 157
Data Protection Appliance User Guide
Although unlikely, some errors that you might encounter are as follows:




"...could not contact appliance..." - Check that the address and port are correct and
that network connectivity is available, use the Test Connection button to test any
changes and click the Apply button once corrections have been made.
"...connection refused..." - Check that the appliance you are connecting to has been
enabled for replication.
"...password mismatch..." - Check that the authentication key specified in the "Key"
field matches EXACTLY between the two appliances, correct the key text and click
the Apply button once the keys have been adjusted to match.
"...version mismatch..." - Check that both appliances are running the same version
of RevOS, all four version values must be the same, e.g. 3.3.0.19 will NOT be
considered a match with 3.3.0.23.
If you need to restart setup and configuration of the Primary and/or Secondary
appliance(s) for any reason, click the Clear button at the bottom of the options panel and
confirm the operation by clicking the Yes button on the subsequent dialog. Once the Clear
Operation has completed and the UI has been re-enabled, return to the beginning of the
Primary/Secondary configuration section and repeat the steps for configuration. If you
continue to experience problems, please contact Revinetix Customer Support.
Replication
PAGE 158
Data Protection Appliance User Guide
Section 10
System
This section documents the System tab, which has the following sub tabs:



Status
RAID
Settings
These sub tabs are described under the respective headings in this section.
Status Sub Tab
The Status sub tab displays a screen containing a variety of information about the current
conditions of the Revinetix backup appliance. This screen is particularly useful for
determining the Revinetix software version and appliance model type. It is also useful for
monitoring disk temperatures and other system related information.
Figure 10-1: Status sub tab
System
PAGE 159
Data Protection Appliance User Guide
RAID Sub Tab
The RAID (Redundant Array of Inexpensive Disks) management module provides a simple
graphical way to manage the appliance’s RAID arrays that are present on the system. The
RAID system does not require any user intervention under normal operating conditions. In
the event of a hard drive failure, use this interface to replace the failed drive and repair the
RAID array.
Getting Started
The System > RAID screen appears similar to the following:
Figure 10-2: RAID sub tab
Note: You can also access the System > RAID screen directly by clicking the
RAID icon in the lower-right corner of the Revinetix Management console
screen.
The bay configuration and status section shows the logical setup and status of the bays as a
table. The table lists the bays and their format, the storage capacity for the bays, and the
status for the bays.
The Alarms section shows a list of recently logged messages regarding the status of the
individual RAID arrays. For a complete list of the events and their explanations, see “
Array Notification Events” on page 165.
If an array and its constituent drives are operational, the background color of the drive
bays is green.
If any of the RAID arrays has problems, the background color of the drives is red, and a red
banner (such as the one below) is displayed on the View Notices screen. Also, the little
Revinetix Circle-r logo in the lower right will be red. Any notice will cause the banner
behind the View Notices button to turn more burgundy-red.:
System
PAGE 160
Data Protection Appliance User Guide
Figure 10-3: Red View Notices
Identifying a Failed Disk Drive
When the system detects a failed disk drive in one of the redundant arrays, the failed disk
drive will be marked with a
symbol. Once a disk and its associated array have been
marked, the first step is to attempt a rebuild. If the rebuild fails, it is likely the failed drive
needs to be replaced to restore fault tolerance. Contact Revinetix Support to confirm this.
Once the new drive has been installed, the associated array will need to be rebuilt.
Note: If the disk drive was removed or taken off-line accidentally, you only
need to rebuild the degraded array. See “Rebuild the Array” on page 163.
Restoring Array Functionality
Once you have identified a failed disk drive, complete the steps in the following sections to
replace the drive and restore the array to full functionality.
Logically Remove the Degraded Disk
While RAID drives are hot-swappable, to logically remove the disk drive, click the blue
button associated with the failed disk’s drive bay, and then click Offline. (Archive drives
must always be prepared for removal.)
Figure 10-4: The Offline button (disk 2 has been selected)
When prompted to confirm the Offline action:


System
Click Yes to remove the selected disk (taking it off-line), or
Click No to cancel the operation.
PAGE 161
Data Protection Appliance User Guide
Once the disk is logically removed, you can no longer select the bay (unless you click the
Rescan button).
System
PAGE 162
Data Protection Appliance User Guide
Replace the Disk
Physically remove the bad drive and replace it with a good drive of equal (or greater)
capacity. You can obtain a tested and supported replacement disk from your Revinetix
dealer or reseller.
Please understand that while you may also purchase these drives on your own, we cannot
honor the warranty when this is done and you will need to contact the manufacturer to
replace any drives purchased somewhere other than a Revinetix dealer or reseller.
Here is a list of currently tested and supported Hard Drives:
To remove the disk, slide the button on the drive bay to the right, which releases a small
lever. Pull back on the level until the disk and the mounting sled are released, and then
slide the disk out of the appliance.
Insert the new disk and sled into the drive bay until the disk is almost entirely inserted. You
should feel a small amount of resistance. Then press the lever to finish inserting and
locking the sled into place.
Note: Do not remove two or more array disks at one time, or else data loss
will occur and you will need to restore the data from an archive.
Rebuild the Array
Once you have installed and scanned the new disk, you can initiate rebuilding the degraded
array. Select the button of the replacement disk, along with the button(s) of any other
disk(s) in the degraded array, and then click the Rebuild button.
System
PAGE 163
Data Protection Appliance User Guide
Figure 10-5: Rebuilding an array
The system will begin to rebuild the unit, and the background of the array disks will
become yellow. The rebuilding status is displayed with green slices filling up the symbol
and the “status” changes to “Rebuilding” tracking % completion. When the symbol is
covered with green slices, the rebuilding process is complete, and the background colors
are reset to green.
Note: The rebuild process may take approximately two hours per terabyte.
During this time, the system is fully operational but may exhibit reduced
performance. The busier the appliance is with other processes while the
RAID is rebuilding, the slower everything will process. To maximize rebuild
speed, contact Revinetix Support to stop certain services. While these
services are stopped, backup jobs will not run. This is recommended for very
large arrays.
Rescan the System
You can scan the RAID for new drives by clicking Rescan. The system will recognize any
new drives, including the one just replaced. If the new drive appears to have data stored on
it, you may need to reformat the new drive before it can be used for rebuilding the array:
Reformat the New Drive
This step may be necessary only if the new drive appeared to have been used before to
store non-redundant data. If reformatting is necessary, the system will enable the
Reformat button and prevent you from rebuilding the array with this drive until the disk
has been reformatted. Reformatting will cause some basic information on the disk to be
erased and any previously stored data to be lost. Reformatting should only take a few
seconds. Once the drive is reformatted, it can be used for rebuilding a degraded array.
Command Button Actions
The actions of the command buttons in the displays are summarized in the following table:
System
PAGE 164
Data Protection Appliance User Guide
Button
Description
Refresh
Refreshes the drive information.
Rescan
Scans the disks for physical changes and updates the display
presentation.
Clear Alarms
Clears all alarms.
Rebuild
Rebuilds the array using the selected disk.
Offline
Takes the disks in the selected bays offline, readying them for
physical removal.
Reformat
Makes a disk in a RAID bay or an archive bay usable for that bay’s
function by erasing data on that disk.
Note: This is a high-risk action. Be careful not to reformat a
disk that you had used to save data on unless you no longer
need the data.
Verify
Initiates an array verification.
Stop Verify
Stops the array verification.
Array Notification Events
The following table explains the most common messages than can appear in the Alarms box
on the RAID status page. These messages will be preceded by the time when the event
occurred, the bays of the disks involved, and the severity (or importance) of the message.
Note: In terminology, a “port” is equivalent to a physical disk, and a “unit” is
equivalent to an array.
Message
Description
Drive error
An error was encountered with the disk in the specified bay.
Incomplete unit
detected
Incomplete unit detected disks to bring it on-line.
Rebuild failed
An attempt to rebuild an array has failed.
Array degraded
The system has stopped using a disk in the specified array and has
started using the redundant information to retrieve data.
Verify failed
An attempt to verify the redundant information in an array has
failed; the disk drive that contained erroneous data is given.
Initialization finished
The system has finished creating the redundant information on a
new array or on an array that was not cleanly shut down.
System
PAGE 165
Data Protection Appliance User Guide
Message
Description
Initialization started
The system has started creating the redundant information on a
new array or on an array that was not cleanly shut down.
Rebuild finished
The system has finished rebuilding a replaced disk with information
from the other disks in the specified array.
Rebuild started
The system has started rebuilding a replaced disk with information
from the other disks in the specified array.
Verify complete
A verification process has finished on the specified array.
Verify started
A verification process has been started on the specified array
Soft reset occurred
The disk has been reset without powering down.
Array degraded
The specified array has been degraded and should be replaced.
Controller error
The disk controller of the specified disk has issued an error.
Logical array deleted
The specified logical array has been deleted.
Sector repair occurred
Sector repair occurred A sector on the specified disk had reported
an error and has been repaired.
Encountered bad sector
during rebuild
During a disk rebuild a bad sector was found.
Replacement drive is
too small
The drive used as a replacement is smaller than the one it is
intended to replace.
Verify error
An error has been found during verification of the specified disk.
Drive not supported
The specified drive is not supported by the Revinetix Data
Protection Appliance.
Unclean shutdown
detected
If the Revinetix Appliance is not properly shut down, the system
does not have time to stop the RAID controllers. This will cause the
system to reinitialize the RAID arrays. This initialization process
preserves the data on the array, but can cause performance
degradation while the initialization is in progress. Turning the
power off, pressing the Reset button, or losing power to the box are
common ways to cause an unclean shutdown
System
PAGE 166
Data Protection Appliance User Guide
Status Values
The following table describes the messages displayed in the bay configuration and status
section.
Message
Description
Degraded
When the label is applied to an array, the array is compensating
for a failed or missing disk by recalculating data from the remaining
disks.
When the label is applied to a disk, the system has detected a
fault with the disk and is no longer using the disk to retrieve
information.
Initializing
The system is calculating the redundant data used to recover
information in the event of a disk failure or loss.
Rebuilding
The system is recalculating the information of one or more disk
drives in an array, usually as a result of a disk drive replacement
process.
Unused
There is no disk in the drive bay.
Verifying
The system is recalculating the redundant data and comparing it to
the data on disk to ensure the integrity of the entire array.
Settings Sub Tab
The Settings sub tab contains many configuration options for your Revinetix Appliance.
Figure 10-6: Setting sub tab
System
PAGE 167
Data Protection Appliance User Guide
System settings are listed alphabetically. Select an item to configure by clicking on the
corresponding icon.
Active Directory
When you click Active Directory, a screen similar to the following will appear:
Figure 10-7: Active Directory Membership screen
In the Search For box, type the name of your domain controller and then click Find. If the
appliance finds the domain the information will populate in the Domain Information
section. If this information is correct then click Join. When prompted, type your username
and password, and then click OK.
System
PAGE 168
Data Protection Appliance User Guide
Once you are connected to the Active Directory, you will have access to view the entire list
of computers on your network domain. See “Active Directory Sub Tab” on page 74.
Certificate
When you click Certificate, a screen similar to the following will appear:
Figure 10-8: Certificate screen
Use the Certificate configuration screen to enable interface operation in an encrypted
mode, in which data passed between the authorized user and the system cannot be
intercepted easily. Enter the appropriate information in the text boxes. This information
forms the distinguished name for the certificate and should be customized for your
installation. Browsers typically expect the Common Name to be the Internet name of the
appliance.
After you enter the information, click Submit.
System
PAGE 169
Data Protection Appliance User Guide
Configuration
When you click Configuration, a screen similar to the following will appear:
Figure 10-9: Configuration screen
You can use this screen to save and restore appliance configuration files, using the Save
Configuration and Restore Configuration buttons, respectively.
Note: Restore Configuration will only restore client configurations; it will
not restore backup data.
The screen also contains a Reset Configuration button, which you can use to remove all
saved configurations, client data, and network settings from the appliance. When you click
Reset Configuration, a confirmation prompt will appear.
Note: Reset Configuration does not remove data from the archive disk. You
should format the archive disk to clear any data.
System
PAGE 170
Data Protection Appliance User Guide
Devices
When you click Devices, a screen similar to the following will appear:
Figure 10-10: Devices Screen
Use this screen to configure the appliance network interfaces. For each interface, specify:



Whether the interface is enabled (active on startup)
Whether the device uses an IP address from a Dynamic Host Configuration Protocol
(DHCP) server or a static IP address
The speed and duplex settings
If you want to use a static IP address, enter the IP Address and Netmask values in the
Static Settings panel. Entering a Client ID value in the DCHP Settings panel is optional.
The Client ID value is sent to DHCP servers when the appliance is started, and it can help
the server(s) configure the appliance’s network settings. Configuring multiple network
devices to be on the same subnet is not supported.
To apply your changes, click Submit.
System
PAGE 171
Data Protection Appliance User Guide
Disk
When you click Disk, a screen similar to the following will appear:
Figure 10-11: Disk screen
Use this page to specify when disk space and disk temperature notifications are sent.
For more information about notifications, including configuring how the disk space alerts
are handled, see “Notifications” on page 189.
To apply your changes, click Submit.
System
PAGE 172
Data Protection Appliance User Guide
DNS
When you click DNS, a screen similar to the following will appear:
Figure 10-12: DNS Screen
A Domain Name System (DNS) server translates between host names (such as
www.revinetix.com) and IP addresses (such as 63.230.20.99). When given only a short
name (such as www) to translate, the appliance’s domain name (if any) is used to constrain
the search within this one domain. You can override this domain name by specifying a
domain name in the Search Domains field. You can specify additional domains to widen
the search to more domains. Enter the IP address of your network’s primary DNS server in
the DNS Servers field.
To apply your changes, click Submit.
System
PAGE 173
Data Protection Appliance User Guide
Email
When you click Email, a screen similar to the following will appear:
Figure 10-13: Email Screen
This screen contains the following settings:
Setting
Description
From Address
Displayed in the From section when an e-mail notification is
sent. This is a required field and can be any address, valid or
not. Example: notice@backup.com
Send Email To
The e-mail address that is to receive the notification; can
include a comma-separated list of multiple addresses.
Email Server
Assigns an e-mail server to use to send notifications. By
default the appliance will use ‘localhost’ to send the e-mail
message directly from the appliance, or you can use an
existing e-mail server.
Email Server User Name The e-mail user account name on the e-mail server (if you
are not using localhost).
Password for Email
Server
The password for the e-mail user account (if you are not
using localhost).
To save the configuration, either:


Click Submit, or
Click Send Test Email (which also sends a test e-mail using the saved
configuration).
System
PAGE 174
Data Protection Appliance User Guide
Firewall
When you click Firewall, a screen similar to the following will appear:
Figure 10-14: Firewall screens
Use the Firewall Configuration page to enable or disable the firewall on either of the
network interfaces. If you enable a firewall on an interface, you must choose which services
to allow.
Regardless of any interface-based firewall settings, the following ports will always be open:






All outgoing TCP connections.
Incoming TCP ports 9101 and 9103—These ports are used by the backup service.
ICMP—PING will be enabled on all network interfaces.
UDP port 53—DNS service will be enabled on all interfaces.
UDP ports 67 and 68—DHCP service will be enabled on all interfaces.
UDP port 123—NTP service will be enabled on all interfaces.
If you want to back up a client outside the firewall, allow outbound connections to the
client on port 9102 and inbound connections to the appliance on port 9103.
To apply your changes, click Submit.
System
PAGE 175
Data Protection Appliance User Guide
Host Name
When you click Host Name, a screen similar to the following will appear:
Figure 10-15: Host Name screen
The short name for an appliance serves to uniquely identify the appliance within the
specified domain. The short name can be comprised of a maximum of 63 alphanumeric
characters and hyphens ( - ). Neither the first nor last character can be a hyphen.
The domain name can be one or more short name-like sequences of characters that are
separated by periods ( . ). Two periods cannot be together without other valid characters
between them.
The host name of an appliance is a combination of its short name and domain name,
separated by a period. In the example in Error! Reference source not found., the
esulting host name is test1u.slc.revinetix.com.
To apply your changes, click Submit.
System
PAGE 176
Data Protection Appliance User Guide
Licenses
When you click Licenses, a screen similar to the following will appear:
Figure 10-16: Licenses screen
Licensing for all Revinetix data protection solutions—which includes the RevOS application
running on Sentio Pro and Sentio HD appliances—is based on the net capacity of the
product you have purchased. The “net capacity” of each offering equates to the total raw
capacity minus the capacity allocations needed for standard RAID 5 configurations and
archiving.
For example, if you purchase the Sentio Pro 2-2400, your capacity license of 2.4 TB will be
derived from 3.2 TB of raw capacity minus 400 GB for a RAID 5 setting, and minus 400 GB
for archiving.
If you wish to upgrade your capacity license, you may not simply buy higher capacity hard
drives and install them in your appliance. This course of action will void any warranties
associated with your purchase. Instead, you must contact your Revinetix dealer and
purchase a capacity license upgrade. This license upgrade includes a Revinetix–approved
installation and configuration process.
For details concerning Revinetix capacity licenses, upgrades, and warranty offerings, please
refer to the official Revinetix price list available from your Revinetix Reseller.
NAS
When you click NAS, a screen similar to the following will appear:
System
PAGE 177
Data Protection Appliance User Guide
Figure 10-17: NAS screen
NAS (network-attached storage) is a provision of disk space via commonly used network
file sharing protocols. This disk space can be shared by many client computers using one or
both of the following protocols:


The SMB (Server Message Block) protocol is commonly used to provide shared
network access to files for computers running Microsoft Windows.
The NFS (Network File System) protocol provides the same service to computers
running many of the Unix-variant operating systems, such as AIX, Linux, and Solaris.
Use the NAS screen to manage folders and network file sharing protocols and to control
firewall interaction with the NAS space.
In the example in Error! Reference source not found., a share named Test1 already exists
n the network. The share has been allocated 4 KB of disk storage space, and it has not been
configured for either the NFS protocol (which is disabled) or the SMB protocol (which is
enabled).
As you configure protocols and shares (using the procedures that follow) this screen will
change to indicate your current NAS status. For example, in the following figure, the NFS
protocol is disabled (“off”) and the SMB protocol is enabled (“on”), as indicated in the top
row (note the red and green color coding). Currently these protocols are both unavailable (
“no”) for the Staff share and available (“yes”) for the Test1 share. However, the Test1 share
is still shaded red for the NFS protocol (which is disabled).
Figure 10-18: Share status example
Note: As noted on the screen, you should make sure that your firewall is
configured properly for any services that are enabled. Clicking the Firewall
link will take you to the Firewall setup screen; see “
Firewall” on page 175.
System
PAGE 178
Data Protection Appliance User Guide
Adding a New Share
To create a new share, on the main NAS screen, click the Folder link. A screen similar to the
following will appear:
Figure 10-19: Enter folder name
You should choose a folder name that meaningfully represents what this folder and
possible subfolders will be used for. Remember that it will be possible to share this folder
with one or more people on one or more client computers using one or more network file
sharing protocols. An example folder name would be “Staff.”
In the Enter Folder Name box, type the name for the new share, and then click Register. A
screen similar to the following will appear:
Figure 10-20: Configure a new share
From this screen you can unregister the specified folder, create the space for the folder or
delete it if it already exists, and change the folder’s service availability.
System
PAGE 179
Data Protection Appliance User Guide
If space for the folder does not already exist, click Create to create the folder and move
towards sharing it. The screen will then appear similar to the following:
Figure 10-21: Configuring disk space for a new share
This screen gives you the additional options to delete the space that you created, check
your disk usage, and change which local user or group owns the folder.
This screen also indicates the service availability of the NFS and SMB file sharing protocols
for the share. In the example in the figure, the NFSno and SMBno links indicate that neither
protocol is currently available. (If the respective protocols were available, the links would
be labeled NFSyes and SMByes.)
To configure the file sharing protocols and make them available:


For the SMB protocol (for computers running Microsoft Windows), continue with
the next section, “SMB Protocol.”
For the NFS protocol (for computers running Unix-variant operating systems, such
as AIX, Linux, and Solaris), see “NFS Protocol” on page 185.
SMB Protocol
This section documents the SMB (Server Message Block) protocol, which is commonly used
to provide shared network access to files for computers running Microsoft Windows.
Enabling the SMB Protocol
The first task for using the SMB protocol is to enable the protocol on the appliance. This
task also includes configuring global SMB protocol settings and creating SMB users.
When you enable or disable the SMB protocol, the setting will apply immediately, as well as
whenever the appliance starts up, until you change the setting.
System
PAGE 180
Data Protection Appliance User Guide
To enable the SMB protocol on the appliance, on the main NAS setup screen, click the link
labeled SMB (off) (the links indicate the current status):
Figure 10-22: Main NAS setup screen
A screen similar to the following will appear:
Figure 10-23: SMB protocol configuration screen
At the top of the screen, under Current Status, click Enable to enable the SMB protocol.
(Or, if SMB is already enabled, click Disable to disable the protocol.) The browser will then
return to the previous screen.
System
PAGE 181
Data Protection Appliance User Guide
You can use the Global Settings panel on this screen to configure the overall service
behavior for any folders shared via SMB in the global settings. The settings are in five
categories:
Settings
Description
Security Mode
Use to specify whether users need to log on to the server in order to
connect to the share.
Workgroup/
Server String
Use to specify the workgroup that the appliance should log in to, as
well as what will be displayed to users in addition to the appliance
name.
Map to Guest
Use to specify whether to allow guest logins.
Hidden Files
Use to configure what file types, if any, will be hidden files that
won’t normally be seen on the remote clients. For each file type
listed, you can use the drop-down list to select Unset, Hide, or
Show.
Filename
Mangling
Use to configure filename case and format settings.
To save your global settings, click Set.
This screen also includes an Account Management link at the bottom for creating and
managing SMB users. When you click this link, a screen similar to the following will appear:
Figure 10-24: Account Management screen
There are no predefined users, but the screen in Error! Reference source not found. is
hown with one user named User1.
You can use the following buttons on the screen to create and manage users (select users
by checking the respective check boxes):
Button
Description
Add
Adds a new account with the specified name (minimum three
characters) and password (minimum four characters)
System
PAGE 182
Data Protection Appliance User Guide
Button
Description
Password
Changes the password for the selected users
Enable
Enables the selected users
Disable
Disables the selected users
Remove
Removes the selected users
When you have finished managing users, close the screen.
Making SMB Available on the Folder
To make the SMB protocol available on the folder, either:


On the main NAS setup screen (see Error! Reference source not found.), click the
o link in the SMB column for the respective folder, or
On the disk share configuration screen (see Error! Reference source not found.),
n the Service Available row, click the SMBno link.
Note: Remember, the “no” links indicate the current status of the folder
(before you make these changes).
A screen similar to the following will appear:
Figure 10-25: SMB file share configuration
From this screen, you can configure various remote access capabilities specific to the
named folder.
System
PAGE 183
Data Protection Appliance User Guide
For security purposes, new folders are created with no access rights. You will need to
enable various configuration settings in order for the folder to actually be usable:
Option
Description
Folder
The folder for sharing. (You cannot edit this setting here.)
Share Name
The share name, which defaults to the share name. Share names
should be 12 characters or less.
MS-DOS Volume
Name
The MS-DOS volume name for the share.
Comment
Arbitrary notes regarding the share.
Available
When checked, allows access to the folder. This setting is
configurable in case you need to quickly disable that folder’s
availability without necessarily removing the folder or disabling the
SMB protocol service.
Note: Whether the Available setting is checked determines
whether the SMB protocol is listed as available (“yes”) or not
(“no”) on the main NAS screen and other related screens.
Browsable
When checked, allows the folder to be browsed.
Writable
When checked, allows the folder to be written to (although at first
you may want to leave the check box unchecked in order for the
folder to be read-only).
Guest OK
When checked, allows guest access to the folder.
Next, use the Users section of the screen to configure what authenticated users can do with
the folder:
Figure 10-26: Configuring SMB users
This screen lists the defined SMB users from whom you can configure the users for the
share, using the Valid, Assigned, and Administrators options:


In the Valid selection list, select one or more users who will then all be able to
access the folder share. In the example in Error! Reference source not found.,
ser1 and User3 are selected. (To select multiple users, hold down the Ctrl key while
you click individual users.)
Use the Assigned drop-down list to select which user (if any) to assign as the owner
of files created by valid users. (If no user is selected as owner, users will own their
own files.)
System
PAGE 184
Data Protection Appliance User Guide
Valid users who are not assigned as owners won’t be able to make any changes to
this top level folder, but only to any subfolders that the valid user does own. To
change this, click the Owning User link, and then on the disk share configuration
screen (shown in Error! Reference source not found.), change the local user to
atch the valid user. (Be sure to click Change User so that the change will take
effect.)

Use the Administrators selection list to select one or more users as administrators.
You can use the Hidden Files section to configure what file types, if any, will be hidden files
that won’t normally be seen on the remote clients. For each file type listed, you can use the
drop-down list to select Unset, Hide, or Show.
To save these new configuration settings and return to the main NAS screen, click Set.
NFS Protocol
This section documents the NFS (Network File System) protocol, which is commonly used
to provide shared network access to files for computers running many of the Unix-variant
operating systems, such as AIX, Linux, and Solaris.
Enabling the NFS Protocol
The first task for using the NFS protocol is to enable the protocol on the appliance. This
task also includes configuring NFS clients.
When you enable or disable the NFS protocol, the setting will apply immediately, as well as
whenever the appliance starts up, until you change the setting.
To enable the NFS protocol on the appliance, on the main NAS setup screen, click the link
labeled NFS (off) (the links indicate the current status):
Figure 10-27: Main NAS setup screen
System
PAGE 185
Data Protection Appliance User Guide
A screen similar to the following will appear:
Figure 10-28: Enabling the NFS protocol
To enable the NFS protocol, click Enable. (Or, if NFS is already enabled, click Disable to
disable the protocol.) The browser will then return to the previous screen.
Making NFS Available on the Folder
To make the NFS protocol available on the folder, either:


On the main NAS setup screen (see Error! Reference source not found.), click the
o link in the NFS column for the respective folder, or
On the disk share configuration screen (see Error! Reference source not found.),
n the Service Available row, click the NFSno link.
Note: Remember, the “no” links indicate the current status of the folder
(before you make these changes).
A screen similar to the following will appear:
Figure 10-29: NFS file share configuration
In the General Settings panel, check the Available check box to allow access to the folder.
You can also enter arbitrary folder notes in the Comment box.
System
PAGE 186
Data Protection Appliance User Guide
In the Client Specific Access section, you can make the following settings for the folder:
Setting
Description
Client
The client that the setting applies to. You can uses asterisks ( * ) as
wildcard characters to match the setting to multiple clients.
R/W
When checked, enables write access as well as read access to the
client for the export.
Async
When checked, improves performance at the cost of possible data
loss or corruption on unclean server restarts.
Any-port
When checked, allows NFS requests from any Internet port
number—not just less than 1024.
Root
When checked, allows remote superuser.
Anon
When checked, treats all users anonymously.
UID
When Anon is checked, user ID for the anonymous user.
GID
When Anon is checked, group ID for the anonymous user.
To add additional client lines to the table, click Add Client. Or, to remove the selected
(checked) client lines, click Remove Client.
To save these new configuration settings and return to the main NAS screen, click Set.
System
PAGE 187
Data Protection Appliance User Guide
Networking
When you click Networking, a screen similar to the following will appear:
Figure 10-30: Networking screen
This screen provides a summary of the current networking configurations.
You can click the Configure DNS, Configure Network Devices, or Configure Firewall link
to go to the respective DNS, Devices, or Firewall screen under System > Settings.
System
PAGE 188
Data Protection Appliance User Guide
Notifications
When you click Notifications, a screen similar to the following will appear:
Figure 10-31: Notifications screen
Use this screen to specify how notifications are processed.
Notifications can be sent to you through SNMP (Simple Network Management Protocol) or
by e-mail.
To configure SNMP settings, click any of the SNMP links on the screen. The SNMP setup
screen will then appear; see “SNMP” on page 190.
To configure e-mail settings, click any of the Email To links on the screen. The Email setup
screen will then appear; see “Email” on page 174.
After you configure the SNMP and/or e-mail settings, you can then use the Notifications
screen to configure specific notification types:
System
PAGE 189
Data Protection Appliance User Guide
Figure 10-32: Configuring Notifications settings
For each check box that is checked, you will receive an SNMP or e-mail notification when
the event occurs or the set threshold is exceeded. All notifications are logged to the system
log.
Some of the anticipated System Alerts notifications are summarized in the following table:
Notification Type
Description
Disk Over Temp
Sent whenever the disk temperature exceeds the threshold
set on the Disk setup screen (see “
Disk” on page 172).
Hardware Sensor
Sent whenever any temperature, voltage, or fan speed is out
of spec
S.M.A.R.T Failure
Sent whenever an S.M.A.R.T (Self-Monitoring, Analysis, and
Reporting Technology) event occurs.
System
PAGE 190
Data Protection Appliance User Guide
Notification Type
Description
System Settings
Changed
Sent whenever any settings in the control panel are changed.
Disk Storage Utilization
Sent when the percentage of disk space remaining reaches
the low or critical levels defined on the Disk setup screen
(see “Disk” on page 172).
RAID Alarm
Sent when an alert is show in the alarm list under System >
RAID.
Some of the anticipated Replication notifications are summarized in the following table:
Notification Type
Description
Replication Summary
Report
A summary of replication progress.
Replication Failure
Sent whenever a replication failure occurs.
Some of the anticipated Backup/Restore Alerts notifications are summarized in the
following table:
Notification Type
Description
Job Failed
Sent whenever a backup or restore job fails.
Weekly Job Summary
A summary of all backup and restore jobs during the
previous week; sent early Sunday morning
Archive Completion
Sent whenever an archive is completed.
Client State Change
Sent whenever a backup client becomes reachable or
unreachable.
Media Request
Sent when the archive drive needs a new (empty) disk.
Daily Job Summary
A listing of all jobs completed during the day and whether
they were successful; sent daily.
Lack of Job Progress
Sent when a job has been running for some time without
sending any data or visiting new files.
Job Successful
Sent whenever a backup or restore job completes
successfully.
To apply your changes, click Submit.
Error! Reference source not found. and Error! Reference source not found. show
amples of weekly and daily summary reports:
System
PAGE 191
Data Protection Appliance User Guide
Figure 10-33: Weekly summary report example
Figure 10-34: Daily summary report example
System
PAGE 192
Data Protection Appliance User Guide
Password
When you click Password, a screen similar to the following will appear:
Figure 10-35: Password screen
Use this screen to change the password, which is used for appliance configuration, to log
onto the appliance. In the respective boxes, type the existing password, then enter and reenter the new password.
The password is case-sensitive and can be any combination of alphanumeric characters
and punctuation marks. The minimum password length is one character, but we
recommend a password longer than six characters, using upper- and lower-case letters
with digits and punctuation characters. Use a password that won’t be easily guessed.
Should the password become lost or otherwise forgotten, the only way to reset the root
(and admin) password is from direct keyboard access to the console. Here's how:
1. Reboot the system. DO NOT just kill the power. Try to reboot by pressing Alt + Ctrl
+ Del. If that still fails, try the reset button.
2. When it is powering back on, interrupt the boot loader (which waits for 3 seconds)
by pressing any key
o If you are unable to interrupt the boot loader in time, press Ctrl-Alt-Delete, or
the Reset button on the chassis and try again
3. Change boot options to boot to Single User mode
o Highlight "Revinetix Current (VGA)", using the Up or Down arrow keys if
necessary
o Press 'e'
o Highlight the kernel... line, using the Up or Down arrow keys if necessary
System
PAGE 193
Data Protection Appliance User Guide
Press 'e'
o Press 'End' key, press 'Space' key, type the number "1", press 'Enter' key,
press 'b' key (ensure the CAPS LOCK key is not on, as 'B' does not work)
4. This should boot to a command prompt, run the linux command to change your
password
o Type "passwd" and press 'Enter'
o Follow the on-screen instructions to enter and re-enter the new password
o Type "reboot" and press 'Enter'
5. The system should boot normally and you may login with the new password
o
To apply your changes, click Submit.
Reboot
When you click Reboot, a screen similar to the following will appear:
Figure 10-36: Reboot screen
Use this screen to reboot or shut down the appliance. Information on any pending or active
jobs will be displayed for your review prior to the reboot or shutdown. You will be
prompted to confirm the action before the reboot/shutdown is applied.
System
PAGE 194
Data Protection Appliance User Guide
Routes
When you click Routes, a screen similar to the following will appear:
Figure 10-37: Routes screen
Use this screen to manually add and delete routing table information.
The routing table keeps information about paths to other networked nodes. Each route
entry consists of a device, a target/mask combination, the VIA address (or next hop), and
an optional metric. The default route is displayed as 0.0.0.0 / 0.
You can use this screen to add, delete, or edit routes.
Adding Routes
To enter route information, use the text boxes and list box at the bottom of the table on the
screen. Click Add to add the new route to the table.
Only valid routes can be added to the routing table.
Editing Routes
You can edit the route for any row that has an Edit button. Rows without an Edit button
are permanent and cannot be edited.
To edit a route, click the corresponding Edit button:
System
PAGE 195
Data Protection Appliance User Guide
Figure 10-38: Editing a route
When you have finished editing the route, click Change. Or, click Cancel to discard your
changes.
Only valid route information can be included in the routing table.
Deleting Routes
You can delete the route for any row that has a Delete button. Rows without a Delete
button are permanent and cannot be deleted.
To delete a route, click the corresponding Delete button.
SNMP
When you click SNMP, a screen similar to the following will appear:
Figure 10-39: SNMP screen
Use this screen to configure the SNMP (Simple Network Management Protocol) target
address and to download the Revinetix MIB (management information base) file.
The screen contains the following settings:
System
PAGE 196
Data Protection Appliance User Guide
Setting
Description
SNMP Trap
Target Address
The address where the SNMP management console sends traps. The
address can be a name or a numerical address.
Port
The port used on the SNMP management console. The default port
is 162.
Before changing the Port setting, consult the documentation for
your SNMP management software.
Community
The community string used. The default is public.
Before changing the Community setting, consult the documentation
for your SNMP management software.
After you configure the screen settings, click the Download MIB link to download the MIB
file into the SNMP management console.
Also, you can click Send Test Traps to verify that traps are being sent correctly.
To apply your changes, click Submit.
Time
When you click Time, a screen similar to the following will appear:
Figure 10-40: Time screen
System
PAGE 197
Data Protection Appliance User Guide
You can use this screen to set the appliance time manually or to specify a Network Time
Protocol (NTP) server that will synchronize the time.
To use an NTP server, select NTP Server, type the server’s IP address in the NTP Server
Address text box, and click Query Server to verify the address.
To configure the appliance time manually, select Manual Time Configuration, configure
the New Time and New Date settings, and then click Change Time to update the time on
the appliance.
For both the manual and NTP server settings, use the Time Zone drop-down menu to
select the time zone. Backup schedules are defined and executed with respect to the
selected time zone.
To apply your changes, click Submit.
You can verify the time settings on the appliance by going to System > Status.
Update
When you click Update, a screen similar to the following will appear:
Figure 10-41: Update screen
The Update screen is typically used only for updating RevOS, the Revinetix operating
system.
Browse to the file location, select the file, and then click OK. Information for the file that
you selected will be displayed on a screen similar to the following:
System
PAGE 198
Data Protection Appliance User Guide
Figure 10-42: Update information and confirmation screen
To review the license agreement for the update file, click View License Agreement. The
agreement text will be displayed. Read the license agreement, and then click I Agree to
continue.
After you view the License Agreement, you will be prompted to restart the appliance:
Figure 10-43: Update reboot confirmation screen
Click Reboot to continue.
After upgrading the appliance RevOS version, it is strongly recommended to update the
software on the clients as well. See “Section 6 Clients” under “Software Sub Tab” for more
information on updating clients.
System
PAGE 199
Data Protection Appliance User Guide
Section 11
Support
This section documents the Support tab, which has the following sub tabs:


Portal
Diagnostics
These sub tabs are described under the respective headings in this section.
Portal Sub Tab
The Support > Portal screen appears similar to the following:
Figure 11-1: Portal screen
The top part of the screen indicates the status of automatic checks for notifications and
messages. If automatic checks are enabled, your appliance will check for updates every day
at the specified time.
Support
PAGE 201
Data Protection Appliance User Guide
To enable or disable automatic checks, click Change Settings. A screen similar to the
following will appear:
Figure 11-2: Support update settings
Then check (to enable) or uncheck (to disable) the Automatically Check for Updates
check box. If you enable automatic updates, you can also configure the update time.
If you want to use a proxy to check updates, check the Enable Proxy Settings check box
and specify the host and port number.
Note: As noted on the screen, if you are not using a proxy, make sure that
outgoing TCP port 443 to the Web site update.revinetix.com is open on your
network’s firewall.
To apply any changes that you make on this screen, click OK.
Besides receiving automatic updates of new downloads for you to install, you can also click
Check Now to check for updates manually at any time. The screen lists when the most
recent check and update occurred.
Support
PAGE 202
Data Protection Appliance User Guide
The remainder of the portal screen lists your appliance model, version, serial number, and
release type information. It also contains information in the following categories:
Category
Description
What’s New?
Information on recent product updates, with links to update
documentation.
Software
The latest available release version for your appliance, and the version
that is running on your appliance.
Support
Contact information, telephone support hours and observed holidays.
Note: As a convenience, if you click the Support e-mail link,
your e-mail message will automatically include your appliance
model and serial number.
Documentation
Links to current Revinetix documentation, knowledge base and
instructional videos.
Diagnostics Sub Tab
The Diagnostics sub tab contains, most importantly, the interface to open a Support Tunnel
should our Support team request it. It also contains the appliance logs, which can be
viewed on the appliance or downloaded to your desktop. There is also an alternate area to
run commands in lieu of the network console.
Diagnostic Log Viewer
The Diagnostic Log Viewer creates log files for the activity that runs on the system.
To view or down the diagnostic log files, use the drop-down menu to select the log file.
Then:


To view the log file on the screen, click View Log.
To download the log file, click Download Log, and then specify the file destination.
The formatting of the downloaded logs is not user-friendly; it is recommended to
view the logs on the appliance.
Note: To view log files specific to a backup job, use the Actions menu on the
Jobs > History screen. (See “Message Logs” on page 96.)
Support
PAGE 203
Data Protection Appliance User Guide
Remote Secure Shell Access (SSH)
Enabling this will allow SSH access from your LAN if necessary, and is required for
Revinetix Support to remotely diagnose and fix problems using the Support Tunnel. If this
shows ‘Start Sshd’ then clicking it will enable and the button will show ‘Stop Sshd’.
Secure Revinetix Support Tunnel
Use this setting only when Revinetix Support recommends opening a support tunnel. They
will assign you a tunnel number to connect to. To start the support tunnel, click Start
Remote Tunnel.
Run
As an alternative to using the console, you can use this box to enter commands to run on
the appliance. Type the command into the text box, and then click Execute. If the command
is successful, a new text box will appear and display the execution results. This area should
not be used unless directed by Revinetix Support Personnel.
Submit Support Request
If you are having problems that you cannot resolve, this is one way for you to submit a
request for help. Fill in your contact information and enter a description of the problem; if
you want, click the Send Configuration Files check box. Then click Submit.
Support
PAGE 204
Data Protection Appliance User Guide
Section 12
Client Software Installation and
Configuration
The Revinetix Appliance includes software to set up data backups for many OSes, as
indicated in Clients > Software. Below are instructions on installing and configuring this
software.
Downloading Client Software
Using a Web browser on the client, go to the Clients > Software screen. (See “Software
Sub Tab” on page 74.) Select the client software to download. You may need to copy the
software to the client by other means, such as SCP, FTP, or command line Web tools.
Note: If your client is not remotely accessible and does not have a Web
browser or command line Web tools, you may need to use FTP to download
the client and configuration files. If so, simply download both files and then
upload them to an available FTP server.
The configuration file has a password (found under Clients > Edit or in the
RvxConfig) that will allow privileged access to the client; the password
should not be made available unprotected, and you should remove it
immediately after you successfully download to the client.
Installing Client Software and Configuration Files
The headings in this section explain how to install client software and client configuration
files for each operating system type:




“Installing on Linux, Solaris, and FreeBSD” below
“Installing on Windows” on page 213
“Installing on Mac OS X” on page 224
Installing on NetWare” on page 220
Client Software Installation and Configuration
PAGE 205
Data Protection Appliance User Guide
Installing on Linux, Solaris, and FreeBSD
The following table lists the names of the software client files:
Operating System
Client Filename
Linux/x86
rvx-backup-client-3.4.0.31.i386.Linux.tar
Linux/x86_64
rvx-backup-client-3.4.0.31.amd64.Linux.tar
Solaris/Sparc
rvx-backup-client-1.5.3.22.sparc.SunOS.tar
Solaris/x86
rvx-backup-client-3.0.0.1.x86.SunOS.tar
FreeBSD
rvx-backup-client-1.4.0.i386.FreeBSD.tar
SCO OpenServer
rvx-backup-client-1.5.3.1.i386.sco.tar
AIX
rvx-backup-client-3.0.0.1.powerpc.AIX.tar
Note: As software client files are updated, the client filenames may change to
reflect new versions. (The files that you download will have the current
filenames.)
After you have downloaded the appropriate rvx-backup-client installer file to your client,
install the software as follows:
1. Open a root shell.
2. Enter the following commands:
root# cd /tmp
root# tar xf /path/to/rvx-backup-client-3.4.0.31.XXXX.YYYY.tar
root# cd rvx-backup-client-3.4.0.31.XXXX.YYYY
root# bash ./install.sh
For your specific client, for the 3.4.0.31.XXXX.YYYY strings in these commands,
substitute the corresponding client-specific information from your client’s operating
system filename.
For example, for the Solaris/Sparc operating system, you would enter the following
commands:
root# cd /tmp
root# tar xf /path/to/rvx-backup-client-1.5.3.22.sparc.SunOS.tar
root# cd rvx-backup-client-1.5.3.22.sparc.SunOS
root# bash ./install.sh
Note: Remember, your file version information may be different from what is
shown in the table, due to updates in the downloaded software. Be sure to
include the most current commands, based on the files that you downloaded.
Client Software Installation and Configuration
PAGE 206
Data Protection Appliance User Guide
Then, to download the client configuration file:
1. Go to the Clients > Summary screen.
2. Select the client that you want to download the configuration file from (by checking
the check box or clicking anywhere on the row).
3. Right-click the client or open the Actions menu, and then select Download Config.
4. Save the bacula-fd.conf configuration file in the directory /usr/rvx/etc.
After you save the client configuration file, start the backup client manually by issuing the
following command:
root# /etc/init.d/rvx-backup start
Installing on Windows
The Revinetix Windows backup agent includes support for SQL Server 2005 and 2008,
Exchange 2003, Exchange 2007 and Exchange 2010. We generally recommend that you
install the latest service packs for both the operating system and the server applications. If
you have any questions, contact Revinetix Support.
Prerequisites




Visual C++ Runtime Libraries
.NET 2.0 framework
Windows installer 3.0
Exchange or SQL Server agent support is done through plugins and requires a
Revinetix Appliance with RevOS 2.4 or higher. You will need to install the plugin
during the initial install of the agent software.
Note: If the Visual C++ Runtime Libraries, .NET 2.0 framework, and/or
Windows installer 3.0 are not detected, you may be prompted to
automatically install them.
Vista Notes
Vista clients should be installed only by the Administrator. In other words, only an account
with full administrator rights will be able to successfully install the client on a Windows
Vista machine.
Client Software Installation and Configuration
PAGE 207
Data Protection Appliance User Guide
Installing the Client
To run the Revinetix Backup Agent Setup wizard:
1. In Windows Explorer, double-click the rvx-backup-client-3.4.X.X-net.exe file (for 32-bit
clients) or the rvx-backup-client-3.4.X.X-x64-net.exe file (for 64-bit clients).
Note: The X.X variables represent parts of the file version number. Just make
sure that you have downloaded the latest available versions of the file from
Revinetix.
2. If the prerequisite programs listed in “Prerequisites” on page 201 are not installed,
you will be prompted to install them. Click Install to install the components listed,
or click Cancel to exit the installation.
3. On the welcome screen that appears, click Next.
Two license agreement screens will then appear, one after the other.
4. On each license agreement screen, check the I Accept the Terms in the License
Agreement check box, and then click Next.
By default, the Revinetix Backup Agent check box will be checked.
If you are installing on an Exchange Server, the Exchange Database Plugin or
Exchange Mailbox Level Plugin options may be available. See “Exchange Server
Backups” for more information.
If you are installing on a SQL Server, an additional options, MsSql Database Backup
Plugin will be listed. However, the two Exchange Server options shown in Error!
eference source not found. will not be available.
5. Select your installation options, and then click Next.
6. On the screen that appears, click Install to start the installation.
7. Click Run.
The next screen that appears reminds you that your client needs to already be
configured on the Revinetix Appliance. If you have not already done so, configure
your client before continuing.
8. Click Next.
9. Select the installation method (manual or automatic), and then click Next.

If you selected the manual method, a screen will then appear, on which you
can specify the appliance address, appliance password, and client name.
Client Software Installation and Configuration
PAGE 208
Data Protection Appliance User Guide

If you selected the automatic method, the screen will display a list of the
appliances detected on your network. Select your appliance from the list, and
then click Next. Then, on the screen that appears, type the administrator
password.
10. Click Next.
11. On the screen that appears, select the client that you are installing the configuration
file from, and then click Next.
The system will download the configuration file and save it to the Program
Files/RVX-Backup directory.
12. To exit the wizard, click Finish.
Additional Notes
Mapping Drives
You can include mapped drives for backup. If a host cannot connect directly to the
appliance, you can map the host’s drives to a backup client, allowing the mapped drive to
be backed up.
Note: When you are using mapped drives, the backup agent should be run
with a service account and not as the Local System account.
Backing Up Network Shares on Windows
Network shares can be backed up by the agent running as a service. However, you must
change the service to run using a network authenticated account instead of the default
Local System account.
To change the account, use the Configure Revinetix Backup tool’s Service Control tab, (or
Control Panel > Administrative Tools > Services > Revinetix Backup and Restore
Agent > Log On tab). Change the Run Service as: (or Log on as:) value from “Local System
Account” to the network authenticated account by selecting Other account: (or This
account:) and entering the account name and password. The account should also have
sufficient privileges to access all local files as well, such as by granting the account
membership in the host’s BUILTIN\Administrators group.
When you edit a client’s file set to include a network share to back up, you must specify
each share using the format //?/UNC/server/sharename.
Client Software Installation and Configuration
PAGE 209
Data Protection Appliance User Guide
Open Files
For systems running Windows versions prior to XP, we suggest using Open File Manager™
from St. Bernard Software Inc. to back up open files. Running Open File Manager™ (OFM)
on Windows or Novell Client Systems will allow open files to be backed up and later
restored if necessary. One OFM license is required for each client machine it is to be used
on.
To install OFM, log in to an administrative account on the client system. Insert the OFM
installation CD (or double-click the downloaded installation file) and run the standard
installation process. When the installation is complete, you will need to reboot the system
in order for the software to run.
Once OFM is running, it will allow backups of the client system to be performed, including
open files. To confirm that OFM is running, you can check the system processes on the
client system or you can simply run a backup and examine the RT Appliance log file to
make sure that there were no warning messages about open files. OFM will continue to run,
allowing backups to take place according to the ongoing schedule set for the particular
client.
OFM can be administered from a single Windows workstation. The OFM Server component
can be installed, initiated, stopped, and removed using the Control Component loaded on
any system. For more detailed information, see the Open File Manager documentation
included with the installation kit.
SQL Server 2005 and 2008 Notes
SQL Server 2005 and 2008 databases can be backed up on either 32-bit or 64-bit platforms.
Add the client via the Web interface, and follow the instructions below for agent
installation.
Functionally, support for both versions is identical and there are no changes to either the
agent's user interface or the procedures used to backup and restore databases through the
appliance's web UI.
The new agent relies on the SQL Server 2005 or 2008 SMOs (SQL Management Objects).
Revinetix Agent version 3.4.0.50 and earlier require the SQL Server 2005 SMOs. Agent
versions 3.4.0.51 and later require the SQL server 2008 SMOs.
Therefore, unless you have the SQL Server 2005 or 2008 SMOs installed, you will need to
update your SMOs with the provided redistributables from Microsoft. If you are not sure
which version of the SMOs you have installed, go ahead and run the redistributable
installers. Even if you already have the correct version, running the installers will not cause
a problem.
Client Software Installation and Configuration
PAGE 210
Data Protection Appliance User Guide
Please note that even though the new agent requires SQL Server SMOs, it is able to work
with BOTH SQL Server 2005 and SQL Server 2008 database engines. This is compatibility
that Microsoft added to these versions of the SQL Server SMOs. That is why our new client
requires them to be installed in order to access both versions of SQL Server.
Upgrading involves the following two-step process:
NOTE: for all installers, choose the one that matches your computer's
architecture, 32-bit or 64-bit.
1) Run the redistributable installers (there are two of them). Redistributables referenced
here can be found at:
http://www.microsoft.com/downloads/en/details.aspx?FamilyID=df0ba5aa-b4bd4705-aa0a-b477ba72a9cb&displaylang=en
A. First, run the SQL Server Native Client installer...
sqlncli.msi (32-bit architecture)
sqlncli_x64.msi (64-bit architecture)
B. Second, run the SQL Server 2005 SP3 SMO installer...
SQLServer2005_XMO.msi (32-bit architecture)
SQLServer2005_XMO_x64.msi (64-bit architecture)
2) Run the installer for the updated Revinetix Backup Agent (version 3.1.0.44 or later):
C. rvx-backup-client-3.1.0.44.Win32.exe (32-bit architecture)
D. rvx-backup-client-3.1.0.44.Win32.x64.exe (64-bit architecture)
After upgrading is complete, run RVXConfig and use the "SQL Backup" tab to set up and
configure your SQL databases. If you are still getting errors when trying to view the "SQL
Backup" tab, or are having other problems with your SQL Server 2008 support through our
new agent, please contact Customer Support.
SQL Support Matrix:
SQL Version
SQL Server 2000 (32-bit) MSDE SP41
SQL Server 2000 (32-bit) Workgroup SP41
SQL Server 2000 (32-Bit) Standard SP41,4
SQL Server 2000 (32-Bit) Developer SP41,4
SQL Server 2000 (32-Bit) Enterprise SP41,4
SQL Server 2000 (32-bit, IA64) Evaluation4,5
SQL Server 2000 (64-Bit) IA64 Developer SP43,4,5
SQL Server 2000 (64-Bit) IA64 Enterprise SP43,4,5
SQL Server 2000 (32-Bit) Personal SP4
SQL Server 2005 (32-Bit) Express SP21
SQL Server 2005 (32-Bit) Express SP21 Advanced1
Client Software Installation and Configuration
In Scope of
Support
NO
NO
NO
NO
NO
NO
NO
NO
NO
YES
YES
PAGE 211
Data Protection Appliance User Guide
SQL Server 2005 (32-Bit) Workgroup SP21
SQL Server 2005 (32-Bit) Standard SP21
SQL Server 2005 (32-Bit) Developer SP21
SQL Server 2005 (32-Bit) Enterprise SP21
SQL Server 2005 (32-bit, IA64, X64) Evaluation SP2
SQL Server 2005 IA64 (64-bit) Developer SP2
SQL Server 2005 IA64 (64-bit) Standard SP2
SQL Server 2005 IA64 (64-bit) Enterprise SP2
SQL Server 2005 X64 (64-bit) Developer SP2
SQL Server 2005 X64 (64-bit) Standard SP2
SQL Server 2005 X64 (64-bit) Enterprise SP2
SQL Server 2008 Express1
SQL Server 2008 Express with Tools
SQL Server 2008 Express with Advanced Services1
SQL Server 2008 Workgroup1
SQL Server 2008 Web1
SQL Server 2008 Standard1
SQL Server 2008 Developer1
SQL Server 2008 Enterprise1
SQL Server 2008 x64 (64-bit) Express
SQL Server 2008 x64 (64-bit) Express with Tools
SQL Server 2008 x64 (64-bit) Express with Advanced Services
YES
YES
YES
YES
TBD
TBD
TBD
TBD
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
SQL Server 2008 x64 (64-bit) Workgroup
SQL Server 2008 x64 (64-bit) Web
SQL Server 2008 x64 (64-bit) Standard
SQL Server 2008 x64 (64-bit) Developer
SQL Server 2008 x64 (64-bit) Enterprise
SQL Server 2008 IA64 (64-bit) Developer
SQL Server 2008 IA64 (64-bit) Enterprise
SQL Server 2008 (32-bit, x64 and IA64) Evaluation
SQL Server 2008 R2 Express1
SQL Server 2008 R2 Express with Tools
SQL Server 2008 R2 Express with Advanced Services1
SQL Server 2008 R2 Workgroup1
SQL Server 2008 R2 Web1
SQL Server 2008 R2 Standard1,2
SQL Server 2008 R2 Developer1,2
SQL Server 2008 R2 Enterprise1,2
SQL Server 2008 R2 Evaluation2
YES
YES
YES
YES
YES
TBD
TBD
TBD
YES
YES
YES
YES
YES
YES
YES
YES
YES
Client Software Installation and Configuration
PAGE 212
Data Protection Appliance User Guide
SQL Server 2008 R2 Datacenter
SQL Server 2008 R2 x64 (64-bit) Express
SQL Server 2008 R2 x64 (64-bit) Express with Tools
SQL Server 2008 R2 x64 (64-bit) Express with Advanced Services
SQL Server 2008 R2 x64 (64-bit) Workgroup
SQL Server 2008 R2 x64 (64-bit) Web
SQL Server 2008 R2 x64 (64-bit) Standard2
SQL Server 2008 R2 x64 (64-bit) Developer2
SQL Server 2008 R2 x64 (64-bit) Enterprise2
SQL Server 2008 R2 x64 (64-bit) Evaluation2
SQL Server 2008 R2 x64 (64-bit) Datacenter
SQL Server 2008 R2 IA64 (64-bit) Developer2
SQL Server 2008 R2 IA64 (64-bit) Enterprise2
SQL Server 2008 R2 IA64 (64-bit) Evaluation2
SQL Server 2008 R2 IA64 (64-bit) Datacenter
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
TBD
TBD
TBD
TBD
Other Notes and Recommendations:
The client may be started from either the RVXConfig tool or the Services window.
Note: If you make any changes to the client configuration via the RVXConfig
window while the client is running, you must restart the client before
changes take effect.
Exchange 2007 and 2010 Notes
For Exchange 2007 and 2010, you must install two clients:


A 64-bit client to back up the Exchange database files. Give the client a name such as
“Ex07Data.” Create the client selecting MS Windows/x64 as the client operating
system, and edit the client to use TCP port 9202.
A 32-bit client to back up the e-mail at the mailbox and message level. Give the client
a name such as “Ex07Mailboxes.” Create the client selecting MS Windows as the
client operating system.
MAPI client libraries are not included in the base installation of Exchange 2007. To enable
the message level backups, you will be required to download and install the Microsoft
ExchangeMapiCdo.exe file. You can easily find it by searching www.microsoft.com or the
Internet.
See “Exchange Server Backups” for more information.
Client Software Installation and Configuration
PAGE 213
Data Protection Appliance User Guide
Configuring the Revinetix Agent
You can use the Revinetix Agent Configuration (RVXConfig) program to configure the
Service Control, Exchange Database Backup, Exchange Mailbox Backup, and SQL
Backup tabs.
Service Control Tab
The Service Control tab controls how the Bacula service runs. The default account type is
the local system account, but you can change it to run as a user account. Running as a user
account is usually required for the Exchange agent to run properly. The Service Control
tab is the same for all Windows agents.
Figure 12-1: Service Control tab
To capture your system station information, check the Enable System State Backup check
box. Client settings, such as setting the location to save the “.bkf” file, should be configured
here in the Service Control Tab. However, each client’s File Set can enable or disable the
entire System State feature so that some clients use it and others don’t.
Client Software Installation and Configuration
PAGE 214
Data Protection Appliance User Guide
Exchange Database Backup Tab
See “Exchange Server Backups” for more information on configuring Exchange backups. On
an Exchange server, you can use the Exchange Database Backup tab to enable or disable
the online backup (enabled by default). You can also choose to truncate the Exchange logs
after the backup, though by default Exchange logs are truncated after full backups only.
The following setting is to truncate after incremental and differential backups, which is not
recommended:
Figure 12-2: Exchange Database Backup tab
Client Software Installation and Configuration
PAGE 215
Data Protection Appliance User Guide
Exchange Mailbox Backup Tab
On an Exchange server, you can use the Exchange Mailbox Backup tab to enable message
level backup. This tab also displays the Message Store(s) and server name to be backed up,
and indicates whether the permissions are OK for the account. Also, mailboxes in the
message store can be displayed. Finally, you can select the restore method (overwrite, skip,
or duplicate) if a message already exists.
Figure 12-3: Exchange Mailbox Backup tab
Client Software Installation and Configuration
PAGE 216
Data Protection Appliance User Guide
SQL Backup Tab
On an SQL Server you can use the SQL Backup tab to enable or disable the SQL backup
(enabled by default).
Figure 12-4: SQL Backup tab
The screen displays a list of databases found on the server. By default, all databases, except
the tempdb database, are selected for backup. To explicitly include or exclude a database
for backup, check the check box in the Include or Exclude column, respectively.
Client Software Installation and Configuration
PAGE 217
Data Protection Appliance User Guide
Removing the Agent
While a new agent will install on top of an old agent, we recommend that all uninstall
operations be done through the Windows Add/Remove Programs tool. Also, note that
uninstalling may not delete the RVX-Backup folder from the Program Files directory.
Normally, newer versions of the agent may simply be installed right "on top" of previous
versions. However, if problems arise it may be a good idea to completely uninstall the old
software and then install the newer version. Here are the general steps to thoroughly
uninstall the software:




stop the service(s)
o this can easily be done via the Services window or via the RVXConfig tool
uninstall the software via the Add/Remove Programs or Programs and Features
tools
o the software should be listed as "Revinetix Backup Agent"
delete the "C:\Program Files\RVX Backup" and/or the "C:\Program Files (x86)\RVX
Backup" folder(s)
delete Revinetix registry keys from the following locations:
o \HKEY_LOCAL_MACHINE\SOFTWARE\Revinetix
o or
o \HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Revinetix
o or both, depending whether or not you have a 64 bit system with multiple
agents installed.
Having accomplished the above, you should now be able to reinstall the agent.
Client Software Installation and Configuration
PAGE 218
Data Protection Appliance User Guide
Installing on Mac OS X
The Revinetix Backup Client supports Apple Macintosh systems running Mac OS 10.3
(Panther) or later. The Mac OS X agent installs a universal binary that supports both the
PowerPC® and Intel hardware.
To install Mac OS X clients, you will install the client configuration file first, and then the
client software. (If you installed the client software first and then the configuration file, you
would then need to restart the Mac system in order for the client service to find the client
configuration.)
To download the client configuration file:
1. From the /usr directory, create the directory /rvx/etc/.
2. On the Revinetix Management Console, go to the Clients > Summary screen.
3. Select the client that you want to download the configuration file from (by checking
the check box or clicking anywhere on the row).
In order for you to download the configuration file, the client needs to be
communicating with the backup agent (as indicated by a green check mark in the
Status column).
4. Right-click the client or open the Actions menu, and then select Download Config.
5. Save the bacula-fd.conf configuration file in the /usr/rvx/etc/ folder.
Then, to install the client software:
1. To start the client install process, double-click the icon for the file rti-backup-clientX.X.X.X.MacOSX.mpkg.
2. An introduction screen will be shown.
3. Click Continue. A Read Me screen will follow.
4. Read the screen to understand what the installer does, and then click Continue. You
will then be directed to a License screen.
5. Click Continue, and then, on the next screen that appears, click Agree (to the license
agreement).
6. Select your system drive to install the software on, and then click Continue.
7. Click Install. If you are prompted, click Continue Installation.
8. Click Close on the finishing screen. If prompted to do so, restart the computer.
Client Software Installation and Configuration
PAGE 219
Data Protection Appliance User Guide
Installing on NetWare
After you have downloaded the appropriate rvx-backup-client installer file to your client,
install the software as follows:
1. Create the directory SYS:\system\revinetix.
2. Unzip the rvx-backup-client-3.0.4-090218.i386.Netware.zip file and copy its contents
into the new \system\revinetix folder.
Note: As software client files are updated, the client filename that you enter
may be different to reflect the file version that you downloaded.
Then, to download the client configuration file:
1. Go to the Clients > Summary screen.
2. Select the client that you want to download the configuration file from (by checking
the check box or clicking anywhere on the row).
In order for you to download the configuration file, the client needs to be
communicating with the backup agent (as indicated by a green check mark in the
Status column).
3. Right-click the client or open the Actions menu, and then select Download Config.
4. Save the bacula-fd.conf configuration file in the \system\revinetix folder.
After you save the client configuration file, start the service by running the following
command:
SYS:\system\revinetix\revinetix
Client Software Installation and Configuration
PAGE 220
Data Protection Appliance User Guide
The Netware client also has a migration feature that can be used to work with migration
software such as the CaminoSoft MSHSM solution. Follow these simplified steps for
enabling the migration feature:
1. Add the -m option to the baculafd client start command in the revinetix.ncf file. For
example:
Load Address Space=Bacula sys:rvx\baculafd.nlm -m -c sys:rvx\bacula-fd.conf
2. Create a run.ncf command script on the Novell server, and save it in the
SYS:\system\revinetix directory. The client’s Run Before option in its configuration on
the appliance must point to the script. The script should be similar to the following:
SYS:\MSHSM\MSSTUBSV SAVE PATH SYS: FILE
SYS:/STUBS/STUBSAVESAV FLAG /L /NODISP
delay 120
SYS:/MSHSM/MSSTUBSV SAVE PATH SYS: FILE
TEST:/STUBS/TESTSAV.SAV FLAG /L /NODISP
Note: NetWare does not actually support command output redirection. The
user must check the server console log screen to see the output. Some NLMs
cannot be multiply loaded. The delay value in the example command script
needs to be long enough (measured in seconds) for the first instance of
MSSTUBSV to complete before the command runs again on another volume.
Client Software Installation and Configuration
PAGE 221
Data Protection Appliance User Guide
Exchange Server Backups
The Revinetix Appliance supports backups for many versions of Exchange and the
instructions for configuring these backups are included below.
Exchange Support Matrix:
Client Software Installation and Configuration
PAGE 222
Data Protection Appliance User Guide
Exchange 2003 on Windows 2003
1. Add the client to the Revinetix Appliance. It may be useful to give a descriptive name
to your client. Be sure to select the appropriate Operating System.
2. Install the client software. The client software can be downloaded from the Clients >
Software tab. Be sure to install the appropriate agent, ie. 64-bit agent for a 64-bit OS
and the 32-bit agent for a 32-bit OS.
3. Configure the agent. In order for the mailbox level backup to succeed, perform the
following.
Note: Be sure that VSS is not enabled for this client. Edit the clients file set
and make sure the VSS option is not checked.
A simplified set of permissions for the account running the service are as follows (with
DOMAIN=your domain, below):
1) Create a domain user (such as "RvxBackup") with a User Mailbox.
2) Add the user to the group on your Exchange server: BUILTIN\Administrators
*) My Computer > Manage > Local Users and Groups > Groups > Administrators
> Add to Group... > DOMAIN\RvxBackup
3) Add the user to the domain group: DOMAIN\Exchange Domain Servers
4a) On the Exchange server > Configure Revinetix Backup > Run as
Administrator > Service Control > Stop
4b) Run Service As: > (x) Other Account: "DOMAIN\RvxBackup" > Password: ***
> Confirm Password: *** > Start
Other Notes and Recommendations:
The client may be started from either the RVXConfig tool or the Services window.
Verify that your Exchange client has a green check mark in the Client > Summary tab. You
may test the new client by running a manual backup.
After a possible system state backup, the MBXBackup is performed at the beginning, you
may see this working by viewing the properties of a running job.
Revinetix strongly encourages the use of a Weekly schedule for an Exchange client. Please
do not run a schedule that mixes differential and incremental backups.
Though allowed, Revinetix does not recommend truncating the logs after incremental or
differential backups. By default we truncate the logs only after a full database level (ESE)
backup.
Client Software Installation and Configuration
PAGE 223
Data Protection Appliance User Guide
To verify that Exchange has been backed up, either browse the job(s) in the Jobs > History
or browse the client from the Clients > Summary tab. You may see the default C:/ directory
and also a new EXCHANGE:/ directory. Both directories can be browsed.
The EXCHANGE/ directory contains an ESEBackup and/or an MBXBackup directory. The
ESEBackup directory contains the Exchange or mailbox databases. The MBXBackup
directory contains the individual mailboxes with their data and e-mail messages.
Note: If you make any changes to the client configuration via the RVXConfig
window while the client is running, you must restart the client before
changes take effect.
Exchange 2007 on Windows 2003
Exchange 2007 requires creating two clients on the Revinetix Appliance: one 64-bit client
to backup the Exchange database files, and one 32-bit client to backup the email at the
mailbox and message level. The two clients must communicate with the Exchange server
over different ports. Follow these instructions:
1. Add one client with a name like Ex07Data. Create the client selecting MS
Windows/x64 as the Client OS. Edit this client to use TCP port 9202.
2. Add another client with a name like Ex07Mailboxes. Create this client selecting
MS Windows as the client OS.
3. Install the client software. The client software can be downloaded from the
Clients > Software tab. Be sure to install the 64-bit agent for the Ex07Data client
AND the 32-bit agent for the Ex07Mailbox client.
4. Install the MAPI client libraries.
5. MAPI client libraries are not included in the base installation of Exchange 2007.
To enable the message level backups you will be required to download and
install the Microsoft file ExchangeMapiCdo.exe. It is simple to find by searching
http://www.microsoft.com or the Internet.
6. Configure the 32-bit agent. This is the agent that will run the mailbox level
backup.
Note: Be sure that VSS is not enabled for this client. Edit the clients file set
and make sure the VSS option is not checked.
Client Software Installation and Configuration
PAGE 224
Data Protection Appliance User Guide
A simplified set of permissions for the account running the Revinetix backup service on
Exchange 2007 are as follows (with DOMAIN=your domain, below):
1. Create a domain user (such as "RvxBackup") with a User Mailbox (easiest using
Exchange Management Console).
2. Add the user to the group on the Exchange server: BUILTIN\Administrators
*) My Computer > Manage > Local Users and Groups > Groups > Administrators
> Add to Group... > DOMAIN\RvxBackup
3. Add the user to the domain group: DOMAIN\Exchange Organization
Administrators
4. On the Exchange server > Revinetix Backup Agent (the 32-bit client with
unqualified name, not 64-bit) > Configure Revinetix Backup > Run as
Administrator > Service Control > Stop
5. Run Service As: > (x) Other Account: "DOMAIN\RvxBackup" > Password: *** >
Confirm Password: *** > Start
Note: You may also need to ensure that the Microsoft Exchange System
Attendant is started.
Other Notes and Recommendations:
The client may be started from either the RVXConfig tool or the Services window.
Verify that your Exchange client has a green check mark in the Client > Summary tab. You
may test the new client by running a manual backup.
Revinetix strongly encourages the use of a Weekly schedule for an Exchange client. Please
do not run a schedule that mixes differential and incremental backups.
Though allowed, Revinetix does not recommend truncating the logs after incremental or
differential backups. By default we truncate the logs only after a full database level (ESE)
backup.
To verify that Exchange has been backed up, either browse the job(s) in the Jobs > History
or browse the client from the Clients > Summary tab. You may see the default C:/ directory
and also a new EXCHANGE:/ directory. Both directories can be browsed.
The EXCHANGE/ directory contains an ESEBackup and/or an MBXBackup directory. The
ESEBackup directory contains the Exchange or mailbox databases. The MBXBackup
directory contains the individual mailboxes with their data and e-mail messages.
Note: If you make any changes to the client configuration via the RVXConfig
window while the client is running, you must restart the client before
changes take effect.
Client Software Installation and Configuration
PAGE 225
Data Protection Appliance User Guide
Exchange 2007 on Windows 2008
Exchange 2007 requires creating two clients on the Revinetix Appliance: one 64-bit client
to backup the Exchange database files, and one 32-bit client to backup the email at the
mailbox and message level. The two clients must communicate with the Exchange server
over different ports. Follow these instructions:
1. Add one client with a name like Ex07Data. Create the client selecting MS
Windows/x64 as the Client OS. Edit this client to use TCP port 9202.
2. Add another client with a name like Ex07Mailboxes. Create this client selecting
MS Windows as the client OS.
3. Install the client software. The client software can be downloaded from the
Clients > Software tab. Be sure to install the 64-bit agent for the Ex07Data client
AND the 32-bit agent for the Ex07Mailbox client.
4. Install the MAPI client libraries.
5. MAPI client libraries are not included in the base installation of Exchange 2007.
To enable the message level backups you will be required to download and
install the Microsoft file ExchangeMapiCdo.exe. It is simple to find by searching
http://www.microsoft.com or the Internet.
6. Configure the 32-bit agent. This is the agent that will run the mailbox level
backup.
Note: Be sure that VSS is not enabled for this client. Edit the clients file set
and make sure the VSS option is not checked.
A simplified set of permissions for the account running the Revinetix backup service on
Exchange 2007 are as follows (with DOMAIN=your domain, below):
1. Create a domain user (such as "RvxBackup") with a User Mailbox (easiest using
Exchange Management Console).
2. Add the user to the group on the Exchange server: BUILTIN\Administrators
*) My Computer > Manage > Local Users and Groups > Groups > Administrators
> Add to Group... > DOMAIN\RvxBackup
3. Add the user to the domain group: DOMAIN\Exchange Organization
Administrators
4. On the Exchange server > Revinetix Backup Agent (the 32-bit client with
unqualified name, not 64-bit) > Configure Revinetix Backup > Run as
Administrator > Service Control > Stop
5. Run Service As: > (x) Other Account: "DOMAIN\RvxBackup" > Password: *** >
Confirm Password: *** > Start
6. In addition to considerations for setting up Exchange 2007 for backup, when
running on Server 2008, IPv6 must be disabled using the following procedure.
This only applies if the Exchange server host is not also a domain controller.
Client Software Installation and Configuration
PAGE 226
Data Protection Appliance User Guide
The goal will be to enable access to Exchange's MAPI interface when running
Exchange 2007 server on Server 2008. Exchange's MAPI interface is used by
programs such as Revinetix Exchange Mailbox Backup to access and restore
mailbox data.
The problem is due to some Exchange services not registering to listen on ports
in the IPv6 stack, but only on IPv4. We found a related issue involving Outlook
Anywhere documented at
http://msexchangeteam.com/archive/2008/06/20/449053.aspx. Using those
instructions relevant to our backup scenario, we found a pretty simple fix:
1 Notepad > Run as Administrator
2 File > Open > "C:\Windows\System32\drivers\etc\" > [All Files] >
"hosts" > Open
3 Comment out the line "::1 localhost"
4 Add the following two lines:
<IPv4 address> <hostname of the computer>
<IPv4 address> <FQDN of the computer>
An example might look like:
127.0.0.1 localhost
#::1 localhost
10.10.10.4 exchange-server
10.10.10.4 exchange-server.your-domain.com
Other Notes and Recommendations:
The client may be started from either the RVXConfig tool or the Services window.
Verify that your Exchange client has a green check mark in the Client > Summary tab. You
may test the new client by running a manual backup.
Revinetix strongly encourages the use of a Weekly schedule for an Exchange client. Please
do not run a schedule that mixes differential and incremental backups.
Though allowed, Revinetix does not recommend truncating the logs after incremental or
differential backups. By default we truncate the logs only after a full database level (ESE)
backup.
To verify that Exchange has been backed up, either browse the job(s) in the Job History or
browse the client from the Client Summary. You may see the default C:/ directory and also
a new EXCHANGE:/ directory. Both directories can be browsed.
Client Software Installation and Configuration
PAGE 227
Data Protection Appliance User Guide
The EXCHANGE/ directory contains an ESEBackup and/or an MBXBackup directory. The
ESEBackup directory contains the Exchange or mailbox databases. The MBXBackup
directory contains the individual mailboxes with their data and e-mail messages.
Note: If you make any changes to the client configuration via the RVXConfig
window while the client is running, you must restart the client before
changes take effect.
Client Software Installation and Configuration
PAGE 228
Data Protection Appliance User Guide
Exchange 2010
Please review the RevOS Migration Guide 3.4 for more information on the new features
included with Exchange 2010 support. You can find this document by going to your
Support > Portal Tab. Documentation will be at the bottom of this page.
Exchange 2010 backs up through the VSS plug-in. After you have installed the new client on
the server and configured it in the RevOS Management Console, complete these steps to
enable Exchange 2010 database backups:
1. Edit the client‘s file-set and make sure that the VSS check box is checked .
Figure 12-5: Enabling VSS
2. Check the Override Client-Configured Plus-in Settings checkbox to enable plug-in
over-rides
3. Check the Exchange Database check box to enable Exchange database backups
4. Click OK to accept your changes, and then activate the new configuration. Your
Exchange Server 2010 client is now configured for database backups.
Make sure that you have the latest updates installed on your Exchange server before any
backups are performed. Version 14.0.702.1 (Update Rollup 4) is the minimum update level
that you need to have installed.
We highly recommend that you disable circular logging for all Exchange 2010 databases
that you intend to back up. The VSS writer that is used to back up or restore the databases
will not support differential or incremental backups if circular logging is enabled.
Client Software Installation and Configuration
PAGE 229
Data Protection Appliance User Guide
The Exchange MBX (mailbox) plug-in has been updated to support message-level backups
on Exchange 2010. Therefore, you can configure mailbox/message level backups the same
way that you did for Exchange 2003/2007.
For information on restoring Exchange 2010 databases from a backup, see “Restoring
Exchange 2010” on page 223.
Exchange Message Level Backups
When you select a mailbox database for backup through the Exchange Mailbox Backup
tab panel in RVXConfig, a list of available mailboxes appears
Figure 12-6: Mailboxes in Mailbox Database
Simply select the mailboxes that you want to back up, and unselect the ones that you do not
want to back up.
Backing up extremely large mailbox databases can take a long time, which can cause
scheduling issues or conflicts with other backup jobs. In order to minimize this possibility,
you can optimize your mailbox database backups by setting a time range to determine
which modified messages will be backed up
Client Software Installation and Configuration
PAGE 230
Data Protection Appliance User Guide
If you select a time period other than “Anytime,” only messages modified within the
specified timeframe will be backed up when you run a full backup. Incremental and
differential backups will be unaffected.
Messages are considered “modified” if they have been received, read for the first time,
deleted, for-warded, flagged, had a category set, and so on. In general, anytime an email
message is “used” in any way, it is considered “modified” since its properties have most
likely changed.
Keep in mind that all clients will honor these settings, regardless of how the clients’ filesets may be configured.
Restoring Messages Only
Note: If an entire Exchange server or a user’s mailbox has been completely
lost or deleted, it must be re-created with the same name as the original
before trying to restore any message.
Follow these steps to restore an entire mailbox, a subfolder, or a specific message:
1. Browse the client from the Client Summary list or browse a specific job in the Job
History.
2. In the Restore File Browser, click the EXCHANGE:/ directory to browse it. At least
two directories should be visible: ESEBackup/ and MBXBackup/. ESEBackup
contains storage groups and stores. MBXBackup contains the individual mailboxes
to be browsed to find specific messages.
3. Top-level folders differ slightly between Exchange 2003 and Exchange 2007, but the
mailboxes and subfolders and message can be found easily by browsing into them.
4. Restoring a single message mailbox is the same as restoring regular files. Check the
box to the left of the message you want, and click the Restore button. To restore all
the messages in a folder, select the folder and click Restore.
The restore options in the RVXConfig window control how existing message are handled
during a restore.
Restore Option
Description
Skip
Skips restoring any messages that already exist.
Duplicate
Restores the message as it was backed up, and leaves the existing
message alone.
Overwrite
Restores the message as it was backed up, and removes the existing
message.
Client Software Installation and Configuration
PAGE 231
Data Protection Appliance User Guide
Restoring an Entire Database
Note: If a store has been completely lost or deleted, it must be re-created
using the same path and name before trying to restore it.
If an entire Exchange server has been lost, it must be rebuilt and named
exactly the same as the original.
Follow these instructions for restoring an entire Exchange database:
1. Right-click the store name, and select Properties. Ensure the option allowing the
database to be overwritten by a restore is checked.
2. Dismount the Exchange database to be restored. Right-click the store name in the
System Manager, and select the Dismount Store option. Make sure the properties
option to allow the database to be overwritten is selected.
3. Browse the client from the Client Summary list or browse a specific job in the Job
History.
4. In the Restore File browser, click the EXCHANGE:/ directory to browse it.
5. Click the checkbox to the left of the ESEBackup directory. Click the Restore button.
Note: You can also browse further into the ESEBackup directory and select a
specific file to restore.
Restoring Exchange 2010
Exchange 2010 restore support is handled through the VSS feature implementation.
Therefore, the restore process is similar to that used for restoring any data backed up by a
VSS writer. This section will focus on the specific task of restoring Exchange 2010
databases.
When restoring an Exchange 2010 database, you can restore the files either:


To the same location (the same client, and the same path on the file system); this is
known as an “in-place” restore. This means that you will most likely be attempting
to restore the databases over ones that are mounted and currently in use.
To an alternate location (client and file path) that you specify; this is known as an
“out-of-place” restore. It is your responsibility to then take further actions to
implement the re-store databases. For instance, you would need to explicitly locate
and handle recovery of data from the restored databases if you want to bring the
recovered data back online. This will not be done for you as part of the restore
functionality.
Client Software Installation and Configuration
PAGE 232
Data Protection Appliance User Guide
For an “in-place” restore, you must restore the entire Exchange 2010 database. For an “outof-place” restore, you can select individual folders within the Exchange 2010 database to
restore.
Before you restore an Exchange 2010 database, make sure that you edit the properties
setting on the Exchange Management Console, and check the This Database Can Be
Overwritten by a Restore check box.
Figure 12-7: Editing properties in Exchange Management Console
To restore Exchange 2010 databases:
1. Browse specific jobs from the Jobs > History screen, and clients from the Clients > Summary screen. Select the database, and then click Browse and Restore.
2. Specify the databases to be restored.
To restore all Exchange 2010 databases, browse to the VSS folder, and then select the
Microsoft Exchange Writer folder.
Client Software Installation and Configuration
PAGE 233
Data Protection Appliance User Guide
Figure 12-8: Selecting Microsoft Exchange Writer folder
Note: Remember, for an “in-place” restore, you must restore all databases.
To restore one or more specific databases, browse to the Microsoft Exchange Writer folder,
and then select the database folder.
Figure 12-9: Selecting multiple database folders
3. If you are doing an “out-of-place” restore, in the Restore Client panel, specify the client
and/or the path to restore to.
4. Click Restore.
Client Software Installation and Configuration
PAGE 234
Data Protection Appliance User Guide
5. When the restore completes, for an “out-of-place” restore, browse to the restored files
location. You can then copy or move the database files to the valid Database File and Log
Folder paths.
When Exchange 2010 databases are restored, the following data is saved to the restore
location:



Database file (*.edb)
Transaction log file (*.log)
Checkpoint file (*.chk)
Collectively, these files define a database in Exchange 2010.
MSSQL Backups
Setting the SQL Server Backup
1. Start the client from the Start menu, the Services window, or the RVXConfig window.
2. Verify that your Microsoft SQL Server client has a green check mark in the Client
Summary screen on the Revinetix Data Protection Appliance, indicating a good
connection for backups. You may test the new client by running a manual backup.
3. Apply a backup schedule to the Microsoft SQL client. Database backups equate to
Revinetix full backups, database differential backups to Revinetix differential
backups, and transaction log backups to Revinetix incremental backups. For “simple
recovery” model databases, incremental backups automatically get turned into
differential backups, and for the “master” database that only supports database
backups, both incremental and differential backups are automatically upgraded to
full backups. Any backup schedule can be applied to an MSSQL client.
4. To check that this Windows computer has properly found the MSSQL agent, browse
the Client Summary page for the specific computer. Under the Real-time Status
section for the client summary is a “Plug-ins” header where recognized plug-ins will
be listed. When the MSSQL agent has been properly installed on this computer, the
“Plug-ins” header will show “mssql1.0.0”.
5. The log of job messages for computers having had the MSSQL agent installed on it
will now include entries prefaced with the text “MSSQL”. These lines indicate the
installation of the agent, the job status in so far as the backups of Microsoft SQL
databases are concerned, and any problems the agent encountered.
6. Verify MSSQL databases have been backed up by browsing a recent backup job, or
by browsing the client from the Client Summary page. You should see the MSSQL/
directory along with any other directories you have backed up.
Client Software Installation and Configuration
PAGE 235
Data Protection Appliance User Guide
7. Any databases that get backed up will create of a “MSSQL:” folder entry in the
Restore File browser web pages. In this folder will be a sub-folder for each SQL
server instance on that computer. An unnamed – or default – server instance will
appear with the text “<default>”. Within each instance folder will be a folder for
every backed-up database found within the instance. Within each database folder,
will be a file entry for every full, differential, or incremental backup.
Note: Please make sure that your SQL server is up to date with the most
recent SMOs and Service Packs.
If you experience any of the following errors in your SQL client’s Message Log please
contact Revinetix Support.


“Error enumerating sql databases: Could not load file or assembly”
“Can't get configuration for backup of database 'XXX' on DEFAULT server instance”
How SQL Restores
Restore paths are determined as follows (in this order):
Look for registry keys (on the SQL Server client) that define custom default paths for
database/log files:


HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft
Server\MSSQL.x\MSSQLServer\DefaultData
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft
Server\MSSQL.x\MSSQLServer\DefaultLog
SQL
SQL
Note: ("MSSQL.x" is the instance ID where "x" the ordinal used to uniquely
identify the instance)
If both of these keys are found, databases will be restored to the paths that they define.
SQL users can modify these paths through the SQL Server Management Studio by editing an
instance's 'Database Settings' properties:
These keys can be deleted manually or by specifying empty (blank) paths in the GUI. This
removes the custom paths for the instance.
Look for registry key (on the SQL Server client) that defines the data root path for the SQL
Server instance:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft SQL
Server\MSSQL.x\Setup\SQLDataRoot
Client Software Installation and Configuration
PAGE 236
Data Protection Appliance User Guide
Note: ("MSSQL.x" is the instance ID where "x" the ordinal used to uniquely
identify the instance)
If the key is found, databases will be restored to the path that it defines. This path is
determined at the time of installation and is not directly editable by the user!
If none of the above paths are found, no relocation is specified. Restore operations will
attempt to use the original path from which the database was backed up.
Database Restores
Our database restore technology functions like a roll-back to the last database backup. The
technology does not currently automatically perform a last minute tail log backup to
potentially restore the “full-recovery” model database to the very latest state. If the
database(s) that you wish to restore has become completely inaccessible due to something
catastrophic; such as permanent hard disk failure, a last-minute tail log backup would not
be possible in any case.
The following steps generally apply to all databases. The major exception to this is the
“master” database which has to be restored alone (no other databases may be restored
during the same job) and requires that the SQL server first be running in “single-user”
mode. (See Microsoft’s documentation for details on restarting the SQL server in this
mode.)
1. Identify the valid backups of your databases that you wish to use for restoration.
Using your web browser, go to the appliance web interface for client restores. Select
the database backups that you want to restore from as per the normal procedure for
file restores. If you have differential and/or incremental backups of the databases
that you want to restore, they will need to be selected along with the full backups for
the same restore job in order to be used.
Note: Do not click Restore yet.
2. If any of the databases to be restored currently exist on the Windows SQL Server
computer, they must be deleted or renamed. Using Microsoft SQL Server
Management Studio, select any database from the Object Explorer that you are
about to restore, click the right mouse button, select the Delete option to bring up a
Delete Object window, and click OK. Repeat for each database as appropriate.
3. Click Restore to start the restore. If no error messages are presented, the restoration
is complete.
4. If you are interested in confirming what has taken place, when the job is finished,
inspect the job log for any messages generated from the operation. If the SQL agent
encountered any problems, these will be shown along with the normal notices of the
start and finish of the SQL agent's handling of the restore job. These messages are
prefaced with the text “MSSQL:”.
Client Software Installation and Configuration
PAGE 237
Data Protection Appliance User Guide
Section 13
Bare Metal Backup and Restore (BMR)
The BMR feature allows an entire hard disk drive to be copied. It can then be restored from
a bare metal backup image. You must create a backup image of each client before it can be
restored. To create a bare metal image, follow these steps.
The Revinetix Appliance comes with a BMR CD. Insert the CD into the client machine for
which you wish to create the bare metal image. Restart the client so that it boots to CD.
Refer to the manufacturer’s BIOS information on how to boot your system from the CD if
the system doesn’t boot from CD by default. The BMR graphical user interface will load up.
Figure 13-1: BMR user interface
Select Backup or Restore and you will be led through the appropriate steps.
Note: Clicking the blue
at the top right of the screen to open a drop-down
menu appears. This should only be used if directed to do so by Revinetix
Support. By clicking on the Support Tunnel option you will be prompted for a
port number that can be used to create a secure shell support tunnel. By
clicking on the View Logs option you will be shown the logs recorded by the
BMR software. By clicking on the Open Shell option you will open a command
shell that can be used to run instructions in the command line Linux
environment. Click any of the options again to turn off or close the service
selected.
Most of the steps are the same for either Backup or Restore. The main difference is the
direction that data is traveling, i.e. backup from the client to the appliance or restore from
the appliance to the client.
Bare Metal Backup and Restore (BMR)
PAGE 239
Data Protection Appliance User Guide
Performing a Backup
Choose Backup to create the bare metal image of the client.
Figure 13-2: BMR Network Configuration screen
The software verifies the network connection between the client and the appliance. If a
good connection is not detected, you will be prompted to enter network settings. Click Next
to continue.
Figure14- 3: Appliance selection screen.
Any appliance visible over the network will be listed in the window. Select the appliance
you want to use for the backup. If an appliance is not listed, you can search for it by clicking
the Search icon.
Bare Metal Backup and Restore (BMR)
PAGE 240
Data Protection Appliance User Guide
If the Revinetix Data Protection Appliance is not on the same network segment as the
client, it will not be automatically detected. Click the Add Appliance icon. You will be
prompted for the IP address or DNS name of the appliance. If a connection is established
with the Revinetix Data Protection Appliance, it will be added to the list displayed.
When an appliance is selected, the following login prompt appears:
Figure 13-3: Password login prompt
Enter the password for the selected appliance, and click Ok. Click Next to continue.
Figure 13-4: Client selection screen
The list of clients known to the appliance is displayed. Choose the backup client you are
currently working with. Click Next to continue.
Bare Metal Backup and Restore (BMR)
PAGE 241
Data Protection Appliance User Guide
Figure 13-5: Disk and partition selection screen
All hard drives and partitions found on the client will be listed and for each one you may
choose the type of copy you would like to perform

A Deep Copy starts at the beginning of the drive and goes to the end. It copies every
sector of the disk. Deep copy supports all file systems.

A Quick Copy looks only at the data and copies only the data as it exists in the file
structure. Quick copy is only supported on well-known file systems such as FAT16,
FAT32, NTFS and EXT2,3. If any problems occur, the software will stop the quick
copy and begin a deep copy.

The Copy Individual Partitions option allows you to specify the level of copy for
each partition on the drive.
You also have the option to Skip any particular drive or partition: no copying will be done
on the drive. Click Next to continue.
Bare Metal Backup and Restore (BMR)
PAGE 242
Data Protection Appliance User Guide
Figure 13-6: Client configuration change warning
Any appropriate warnings will be shown. Click Next to continue.
Figure 13-7: Backup start confirmation
You can enter any arbitrary text in the Optional Job Description text box. This
information will be available on the appliance, and is displayed while browsing available
jobs during a restore. A summary of operations to be performed is displayed. Verify the
information shown, if anything is incorrect click Prev. If everything is correct, click Backup
and the process will begin.
Bare Metal Backup and Restore (BMR)
PAGE 243
Data Protection Appliance User Guide
Figure 13-8: Backup progress screen
The Performing Backup screen allows you to monitor the progress of the backup or restore
jobs. A progress bar for each disk or partition will display.
Restoring a Bare Metal Backup
Boot using the BMR CD. When performing a restore, the initial network settings and
appliance detection steps are the same. You will be prompted to choose which client you
want and which BMR job you want to restore. Once a job has been selected, a list of the
partitions and options for restore will be displayed. Select the volumes you want to restore,
and use the buttons at the bottom of the screen to begin the job.
Note: Only one bare metal restore procedure can occur at any given time.
Note: Bare metal jobs are shown in the Job History page. BMR jobs are
archived as part of automatic archiving if that feature is enabled in Clients >
Edit for that client. BMR jobs differ from regular backup jobs in that they
cannot be browsed or restored from the web interface. An archived BMR job
must be copied back onto the appliance RAID in order to be restored. To copy
a BMR job back onto the appliance RAID, select the BMR job from the list of
archived jobs and click the Import Selected Archive Jobs button.
Bare Metal Backup and Restore (BMR)
PAGE 244
Data Protection Appliance User Guide
Section 14
System State Restore
Restoring a computer’s system state restores the computer’s registry, COM+ class database,
boot and system files, and so on from a system state backup. A system state backup is
performed when you select the VSS and System State options.
For an Active Directory server, the system state also includes the Active Directory domain
controllers. You can also restore the domain controllers separately from the rest of the
system state writers; see “Restoring Active Directory Domain Controllers” on page 246.
When you select a backup job and select Browse and Restore, the file browser for the
backup job will appear (Figure 41):
Note: When you restore the system state to a computer, it is important that
you restore the entire folder of system state writers, and not individual
writers. Also, you must restore the system state to the specific computer that
it was backed up from (or, at least, to a computer with the exact same
configuration as the backed-up computer).
In the Navigation Screen pane, expand the VSS folder and select the System State folder.
This will restore all of the folders under the System State folder, as required.
Note: If you attempt to check or uncheck individual folders on the Entry List
pane (on the right side), you will see a warning about unexpected results
from a partial system state restore. Make sure that you check the System
State folder and that you leave the other folder selections unchanged (all
subfolders checked).
Then click Restore on the file browser screen. The system state will be restored to the
client computer.
Note: Once you have started a system state restore, you must not interrupt it
in any way. This includes canceling the restore job. Any interruptions have
the potential to leave the system in an unbootable/unusable state.
System State Restore
PAGE 245
Data Protection Appliance User Guide
Restoring Active Directory Domain Controllers
When you restore Active Directory domain controllers from a backup, you restore the
C:\WINDOWS\NTDS and C:\WINDOWS\SYSVOL folders and their contents on the server.
Before restoring, however, you need to decide which type of restore you need to do: nonauthoritative or authoritative.
The most common type, non-authoritative, restores the domain controller to its state at the
time of the backup. The replication services are then allowed to overwrite/update the
restored data using the controller’s replication partners as a source. Use this type of restore
for most situations that resulted in data loss or corruption.
Authoritative restores are an extension to non‑authoritative restores, with some important
key differences:




Restored data will be tagged as “new” and will not be overwritten by data from
replication partners.
Since restored data is considered to be the latest version, it will overwrite older
versions on the replication partners.
New Active Directory objects that were created after the backup was taken will not
be overwritten.
The stand-alone tool ntdsutil.exe is required to complete the restore operation.
This type of restore is usually used when human error is involved, or for any reason that
individual objects have been deleted/altered and need to be restored to all domain
controllers.
You should be aware of the specific reason that you are performing an authoritative
restore, and the ramifications of the procedure. This is an advanced technique and should
only be attempted by experienced administrators who understand what is involved.
The following links provide further technical details on the restoration of NTDS (Active
Directory) and SYSVOL folders:


http://technet.microsoft.com/en-us/library/bb727048.aspx
http://technet.microsoft.com/en-us/library/bb727062.aspx
Performing a Non-Authoritative Restore
In order to restore the domain controllers, you will perform a safe boot on the server and
put it into Directory Services Restore Mode. You will then restore the NTDS and SYSVOL
folders to the server, either restoring them directly from the backup (an “in-place” restore)
or copying them from an alternate location that you restored them to (an “out-of-place”
restore).
System State Restore
PAGE 246
Data Protection Appliance User Guide
For conciseness, in this procedure you put the server into Directory Services Restore Mode
first, which you can do in all cases. However, if you are relocating files to an alternate
location during the restore, you do not need to put the server into Directory Services
Restore Mode until you are ready to actually copy the files from the alternate location to
the server.
To restore Active Directory domain controllers non-authoritatively:
1. On the Active Directory server that you will restore files to, select Run from the Windows
Start menu, type msconfig, and then click OK.
Figure 14-1: Typing 'msconfig' in Run
2. In the System Configuration dialog box, click the Boot tab. Then, under Boot Options,
check the Safe Boot check box and select the Active Directory Repair option. Then click OK.
Figure 14-2: Checking options in System Configuration
System State Restore
PAGE 247
Data Protection Appliance User Guide
3. When prompted to restart the machine, click Restart.
4. After the computer restarts, log in to Active Directory. Because you are using safe mode,
you can’t use the Domain Administrator account; use the local administrator account instead. The computer is now in Directory Services Restore Mode. While the computer is in
this mode, make sure that the firewall is turned off so that the client can communicate with
the appliance.
5. On the Revinetix Management Console, select the Active Directory backup job that you
want to restore, and then click Browse and Restore.
6. In the browser, in the Navigation Tree pane under the VSS folder, select System State.
Then, in the Entry List pane, select the FRS Writer and NTDS folders:
Note: Selecting FRS Writer restores the SYSVOL folder, and selecting NTDS re-stores the
NTDS folder.
7. If you want to restore the files to an alternate location (an “out-of-place” restore), in the
Relocate to This Path box, specify the relocate path (either by typing the path, or by clicking
Browse Client and then browsing to the path).
For example, if you specify the path C:\AdRestore, the NTDS and SYSVOL folders will be
copied to C:\AdRestore\C\Windows\NTDS and C:\AdRestore\C\Windows\SYSVOL,
respectively.
8. Click Restore.
The files will then be copied either directly to the NTDS and SYSVOL folders in C:\Windows
on the server, or to the relocation path that you specified in step 7.
Note: Selecting FRS Writer restores the SYSVOL folder, and selecting NTDS restores the
NTDS folder.
9. If you specified a relocation path in step 7, use Windows Explorer on the server to copy
the relocated NTDS and SYSVOL folders to C:\Windows\NTDS and C:\Windows\SYSVOL,
respectively.
10. After the files are copied, run msconfig again and clear the Safe Boot check box, and
then click OK. (Remember to turn the firewall back on.)
After the computer restarts, you should be able to log in using the Domain Administrator
account; you can verify this by checking services such as Microsoft Exchange or Microsoft
SharePoint.
System State Restore
PAGE 248
Data Protection Appliance User Guide
Performing an Authoritative Restore
Before you attempt this type of restore, please read through this section carefully to
familiarize yourself with the process. It will consist of the following high-level actions:



Restoring FRS Writer and NTDS writers to an alternate (temporary) location
Copying Active Directory objects from the alternate location to the “live” location on
the domain controller
Copying SYSVOL files from the alternate location to the “live” location on the domain
controller
To restore Active Directory domain controllers authoritatively:
1. Follow the procedure for a non-authoritative restore, as described in the previous
section, with these modifications:


In step 7, you must specify an alternate location.
After step 8, stop and return here to step 2. (Do not follow steps 9 and 10 in the
earlier procedure.)
2. Open a command prompt (as administrator) and type ntdsutil, and then press Enter.
3. At the ntdsutil: prompt, type ‘authoritative restore’, and then press Enter.
4. Issue the appropriate commands for the Active Directory objects that you want to
restore. For example, to restore the entire Active Directory, you would type restore
database, and then press Enter. For more information on restoring particular objects
within Active Directory, refer to the following:
http://technet.microsoft.com/en-us/library/cc732211(WS.10).aspx
5. When you are finished issuing restore commands, type quit, and then press Enter.
6. Restart the domain controller in normal mode (not DSRM).
7. Wait for the domain controller to fully reboot and for the SYSVOL share to be published.
(It may take a few minutes before the SYSVOL share and its subfolders appear, indicating
that publishing is complete.)
8. Copy the folders/files that you need to restore from the alternate SYSVOL location to the
original location on the domain controller. The overwritten folders/files will immediately
be replicated out to the other domain controllers.
9. Delete the folders/files that you restored to the alternate (temporary) location; they are
no longer needed.
System State Restore
PAGE 249
Data Protection Appliance User Guide
Verifying a Restored Domain Controller
After the restore is completed, you need to be in “normal” mode (not Directory Services
Restore Mode) to perform the verification checks. Reboot into “normal” mode, if necessary,
before proceeding.
When you restart the server normally, Active Directory Domain Services (AD DS) and
Active Directory Certificate Services (AD CS) automatically detect that they have been
recovered from a backup. They perform an integrity check and index the database again.
After you log on to the system, browse AD DS and verify that the following conditions are
met:

All of the user objects and group objects that were present in the directory at the
time of the backup are restored.
After a non-authoritative restore, the replication service updates the objects that you restore with any changes that have been made to them since the time that the backup was
taken.
After an authoritative restore, the objects that you restore will not be updated (or modified
in any way), since they will be considered to be the latest version of those objects.





Files that were members of an FRS replica set and certificates that were issued by
AD CS are present.
The Windows Time service (W32time) is synchronized correctly.
The NETLOGON and SYSVOL folders are properly shared.
The Preferred DNS server address is configured correctly.
Host (A) and service (SRV) resource records are registered correctly in Domain
Name System (DNS).
System State Restore
PAGE 250
Data Protection Appliance User Guide
Technical Specifications
Physical Specifications
Dimensions and weight (approximate, fully populated)
Model
Width
Depth
Height
Weight
(inches) (inches) (inches) (pounds)
Sentio 1U Pro
19
26
1.75
45
Sentio 2U Pro
19
27
3.5
54
Sentio 2U HD
19
27
3.5
65
Sentio 3U HD
19
27
5.25
82
Sentio 4U HD
19
26.5
7
117
Sentio 8U HD
19
27
14
155
Power Specifications
Wattage, voltage, frequency
Model
Wattage
Input Voltage
Frequency
Number of
Power Cables
Sentio 1U Pro
400W
100 ~ 240 VAC
50 ~ 60 Hz
1
Sentio 2U Pro
500W
105 ~ 264 VAC
47 ~ 63 Hz
2
Sentio 2U HD
500W
105 ~ 264 VAC
47 ~ 63 Hz
2
Sentio 3U HD
800W
100 ~ 240 VAC
47 ~ 63 Hz
3
Sentio 4U HD
950 W
100 ~ 240 VAC
47 ~ 63 Hz
3
Sentio 8U HD
1350
(4x500)
120 ~ 240 VAC
50 ~ 60 Hz
4
Technical Specifications
PAGE 251
Data Protection Appliance User Guide
Other Specifications
Interfaces and other hardware
Model
Ethernet
Number of
SATA HDDs
Sentio 1U Pro
10/100/1000 (×2)
4
Sentio 2U Pro
10/100/1000 (×2)
8
Sentio 2U HD
10/100/1000 (×2)
12
Sentio 3U HD
10/100/1000 (×2)
16
Sentio 4U HD
10/100/1000 (×2)
24
Sentio 8U HD
10/100/1000 (x2)
40
All units support PS/2 mouse and keyboard, as well as standard VGA monitor.
Technical Specifications
PAGE 252
Data Protection Appliance User Guide
POSIX Regular Expressions
A regular expression is a character sequence that is an abbreviated definition of a set of
strings (a regular set). A string is said to match a regular expression if it is a member of the
regular set described by the regular expression. Pattern characters match string characters
exactly unless they are special characters in the regular expression language. A regular
expression is allowed to match anywhere within a string, unless the regular expression is
explicitly anchored to the beginning or end of the string.
Some examples:
“abc” matches “abc”
“abc” matches “^a”
“abc” matches “(b|d)”
“abc” does not match “^(b|c)”
Regular Expression Details
A regular expression is defined as one or more branches, separated by |. It matches
anything that matches one of the branches.
A branch is zero or more quantified atoms or constraints, concatenated. It matches a match
for the first, followed by a match for the second, etc.; an empty branch matches the empty
string.
A quantified atom is an atom possibly followed by a single quantifier. Without a quantifier,
it matches a match for the atom. With a quantifier, it can match some number of matches of
the atom. An atom can be any of the possibilities shown in Table B-1 on page 254. The
possible quantifiers and their meanings are shown in Table B-2 on page 255.
A constraint matches an empty string, but matches only when specific conditions are met. A
constraint can be used where an atom could be used, except it may not be followed by a
quantifier. The simple constraints are shown in Table B-6 on page 259; more constraints
are described later.
Atom
Description
(re)
(where re is any regular expression) matches a match for re, with the
match noted for possible reporting
POSIX Regular Expressions
POSIX Regular Expressions
PAGE 253
Data Protection Appliance User Guide
Atom
Description
(?:re)
as above, but the match is not noted for reporting (a “non-capturing” set of
parentheses)
.
[chars]
a bracket expression, matching any one of the chars (see “Bracket
Expressions” on page 255 for more details)
\k
(where k is a non-alphanumeric character) matches that character taken as
an ordinary character—e.g., \\ matches a backslash character
\c
where c is alphanumeric (possibly followed by other characters) is an
escape; see “Regular Expression Escapes” on page 257
{
when followed by a character other than a digit, matches the left-brace
character {; when followed by a digit, it is the beginning of a bound (see
below)
x
where x is a single character with no other significance, matches that
character
Table B-1: Regular expression atoms
A regular expression may not end with \.
Note: To write a pattern constant that contains a backslash, you must write
two backslashes in the regular expression.
Quantifier
Matches
*
a sequence of 0 or more matches of the atom
+
a sequence of 1 or more matches of the atom
?
a sequence of 0 or 1 matches of the atom
{m}
a sequence of exactly m matches of the atom
{m,}
a sequence of m or more matches of the atom
{m,n}
a sequence of m through n (inclusive) matches of the atom; m may not
exceed n
*?
non-greedy version of *
+?
non-greedy version of +
??
non-greedy version of ?
{m}?
non-greedy version of {m}
{m,}?
non-greedy version of {m,}
POSIX Regular Expressions
POSIX Regular Expressions
PAGE 254
Data Protection Appliance User Guide
Quantifier
Matches
{m,n}?
non-greedy version of {m,n}
Table B-2: Regular expression quantifiers
The forms using {...} are known as bounds. The numbers m and n within a bound are
unsigned decimal integers with permissible values from 0 to 255 inclusive.
Non-greedy quantifiers match the same possibilities as their corresponding normal
(greedy) counterparts, but prefer the smallest number rather than the largest number of
matches. See “Regular Expression Matching Rules” on page 259 for more details.
Note: A quantifier cannot immediately follow another quantifier. A quantifier
cannot begin an expression or subexpression or follow ^ or |.
Constraint
Description
^
matches at the beginning of the string
?
matches at the end of the string
(?=re)
positive lookahead matches at any point where a substring matching re
begins
(?!re)
positive lookahead matches at any point where no substring matching re
begins
Table B-3: Regular expression constraints
Lookahead constraints may not contain back references (see “Regular Expression Escapes”
on page 257), and all parentheses within them are considered non-capturing.
Bracket Expressions
A bracket expression is a list of characters enclosed in []. It normally matches any single
character from the list (but see below). If the list begins with ^, it matches any single
character not from the rest of the list. If two characters in the list are separated by -, this is
shorthand for the full range of characters between those two (inclusive) in the collating
sequence—e.g., [0-9] in ASCII matches any decimal digit. It is illegal for two ranges to share
an endpoint—e.g., a-c-e.
POSIX Regular Expressions
POSIX Regular Expressions
PAGE 255
Data Protection Appliance User Guide
To include a literal ] in the list, make it the first character (following a possible ^). To
include a literal -, make it the first or last character, or the second endpoint of a range. To
use a literal - as the first endpoint of a range, enclose it in [. and .] to make it a collating
element (see below). With the exception of these characters, some combinations using [
(see next paragraphs), and escapes, all other special characters lose their special
significance within a bracket expression.
Within a bracket expression, a collating element (a character, a multiple-character
sequence that collates as if it were a single character, or a collating-sequence name for
either) enclosed in [. and .] stands for the sequence of characters of that collating element.
The sequence is a single element of the bracket expression's list. A bracket expression
containing a multiple-character collating element can thus match more than one character
(e.g., if the collating sequence includes a ch collating element), then the real expression
[[.ch.]]*c matches the first five characters of chchcc.
Note: Currently there are no multi-character collating elements. This
information describes possible future behavior.
Within a bracket expression, a collating element enclosed in [= and =] is an equivalence
class, standing for the sequences of characters of all collating elements equivalent to that
one, including itself. (If there are no other equivalent collating elements, the treatment is as
if the enclosing delimiters were [. and .].) For example, if o and ^ are the members of an
equivalence class, then [[=o=]], [[=^=]], and [o^] are all synonymous. An equivalence class
may not be an endpoint of a range.
Within a bracket expression, the name of a character class enclosed in [: and :] stands for
the list of all characters belonging to that class. Standard character class names are: alnum,
alpha, blank, cntrl, digit, graph, lower, print, punct, space, upper, and xdigit. These stand for the
character classes defined in ctype. A locale may provide others. A character class may not
be used as an endpoint of a range.
There are two special cases of bracket expressions. The bracket expressions [[:<:]] and
[[:>:]] are constraints, matching empty strings at the beginning and end of a word,
respectively. A word is defined as a sequence of word characters that is neither preceded
nor followed by word characters. A word character is an alnum character (as defined by
ctype) or an underscore. This is an extension, compatible with but not specified by POSIX
1003.2, and should be used with caution in software intended to be portable to other
systems. The constraint escapes described below are usually preferable (they are no more
standard, but are certainly easier to type).
POSIX Regular Expressions
POSIX Regular Expressions
PAGE 256
Data Protection Appliance User Guide
Regular Expression Escapes
Escapes are special sequences beginning with \ followed by an alphanumeric character.
Escapes come in several varieties: character entry, class shorthands, constraint escapes,
and back references. A \ followed by an alphanumeric character but not constituting a valid
escape is illegal.
Character-entry escapes exist to make it easier to specify non-printing and otherwise
inconvenient characters in regular expressions. They are shown in Table B-4 below.
Class-shorthand escapes provide shorthands for certain commonly-used character classes.
They are shown in Table B-5 on page 258.
A constraint escape is a constraint, matching the empty string if specific conditions are met,
written as an escape. They are shown in Table B-6 on page 249.
A back reference (\n) matches the same string matched by the previous parenthesized
subexpression specified by the number n (see Table B-7 on page 259). For example, ([bc])\1
matches bb or cc but not bc or cb. The subexpression must entirely precede the back
reference in the regular expression.
Subexpressions are numbered in the order of their leading parentheses. Non-capturing
parentheses do not define subexpressions.
Escape
Description
\a
alert (bell) character, as in C
\b
backspace, as in C
\B
synonym for \ to help reduce the need for backslash doubling
\cX
(where X is any character) the character whose low-order 5 bits are the
same as those of X, and whose other bits are all zero
\e
the character whose collating-sequence name is ESC, or failing that, the
character with octal value 033
\f
form feed, as in C
\n
newline, as in C
\r
carriage return, as in C
\t
horizontal tab, as in C
\uwxyz
(where wxyz is exactly four hexadecimal digits) the Unicode character
U+wxyz in the local byte ordering
POSIX Regular Expressions
POSIX Regular Expressions
PAGE 257
Data Protection Appliance User Guide
Escape
Description
\Ustuvwxyz
(where stuvwxyz is exactly eight hexadecimal digits) reserved for a
somewhat hypothetical Unicode extension to 32 bits
\v
vertical tab, as in C
\xhhh
(where hhh is any sequence of hexadecimal digits) the character whose
hexadecimal value is 0xhhh (a single character no matter how many
hexadecimal digits are used)
\0
the character whose value is 0
\xy
(where xy is exactly two octal digits, and is not a back reference) the
character whose octal value is 0xy
\xyz
(where xyz is exactly three octal digits, and is not a back reference) the
character whose octal value is 0xyz
Table B-4: Regular expression character-entry escapes
Hexadecimal digits are 0-9, a-f, and A-F. Octal digits are 0-7.
The character-entry escapes are always taken as ordinary characters. For example, \135 is ]
in ASCII, but \135 does not terminate a bracket expression.
Escape
Description
\d
[[:digit:]]
\s
[[:space:]]
\w
[[:alnum:]] (note underline is included)
\D
[^[:digit:]]
\S
[^[:space:]]
\W
[^[:alnum:]] (note underline is included)
Table B-5: Regular expression class-shorthand escapes
Within bracket expressions, \d, \s, and \w lose their outer brackets, and \D, \S, and \W are
illegal. (So, for example, [a-c\d] is equivalent to [a-c[:digit:]]. Also, [a-c\D], which is equivalent
to [a-c^[:digit:]], is illegal.)
Escape
Description
\A
matches only at the beginning of the string (see “Regular Expression
Matching Rules” on page 259 for how this differs from ^)
\m
matches only at the beginning of a word
POSIX Regular Expressions
POSIX Regular Expressions
PAGE 258
Data Protection Appliance User Guide
Escape
Description
\M
matches only at the end of a word
\y
matches only at the beginning or end of a word
\Y
matches only at a point that is not the beginning or end of a word
\Z
matches only at the end of the string (see “Regular Expression Matching
Rules” on page 259 for how this differs from $)
Table B-6: Regular expression constraint escapes
A word is defined as in the specification of [[:<:]] and [[:>:]] above. Constraint escapes are
illegal within bracket expressions.
Escape
Description
\m
(where m is a nonzero digit) a back reference to the mth subexpression
\mnn
(where m is a nonzero digit, and nn is some more digits, and the decimal
value mnn is not greater than the number of closing capturing parentheses
seen so far) a back reference to the mnnth subexpression
Table B-7: Regular expression back references
Note: There is an inherent historical ambiguity between octal characterentry escapes and back references, which is resolved by heuristics, as hinted
at above. A leading zero always indicates an octal escape. A single non-zero
digit, not followed by another digit, is always taken as a back reference. A
multi-digit sequence not starting with a zero is taken as a back reference if it
comes after a suitable subexpression (i.e., the number is in the legal range for
a back reference), and otherwise is taken as octal.
Regular Expression Matching Rules
In the event that a Regular Expression could match more than one substring of a given
string, the regular expression matches the one starting earliest in the string. If the regular
expression could match more than one substring starting at that point, either the longest
possible match or the shortest possible match will be taken, depending on whether the
regular expression is greedy or non-greedy.
Whether a regular expression is greedy or not is determined by the following rules:


Most atoms, and all constraints, have no greediness attribute (because they cannot
match variable amounts of text anyway).
Adding parentheses around a regular expression does not change its greediness.
POSIX Regular Expressions
POSIX Regular Expressions
PAGE 259
Data Protection Appliance User Guide





A quantified atom with a fixed-repetition quantifier ({m} or {m}?) has the same
greediness (possibly none) as the atom itself.
A quantified atom with other normal quantifiers (including {m,n} with m equal to n)
is greedy (prefers longest match).
A quantified atom with a non-greedy quantifier (including {m,n}? with m equal to n)
is non-greedy (prefers shortest match).
A branch -- that is, an RE that has no top-level | operator -- has the same greediness
as the first quantified atom in it that has a greediness attribute
An RE consisting of two or more branches connected by the | operator is always
greedy.
The above rules associate greediness attributes not only with individual quantified atoms,
but with branches and entire regular expressions that contain quantified atoms. What that
means is that the matching is done in such a way that the branch, or whole regular
expression, matches the longest or shortest possible substring as a whole. Once the length
of the entire match is determined, the part of it that matches any particular subexpression
is determined on the basis of the greediness attribute of that subexpression, with
subexpressions starting earlier in the regular expression taking priority over ones starting
later.
In the first case, the regular expression as a whole is greedy because Y* is greedy. It can
match beginning at the Y, and it matches the longest possible string starting there—i.e.,
Y123. The output is the parenthesized part of that, or 123. In the second case, the regular
expression as a whole is non-greedy because Y*? is non-greedy. It can match beginning at
the Y, and it matches the shortest possible string starting there—i.e., Y1. The subexpression
[0-9]{1,3} is greedy, but it cannot change the decision as to the overall match length; so it is
forced to match just 1.
In short, when a regular expression contains both greedy and non-greedy subexpressions,
the total match length is either as long as possible or as short as possible, according to the
attribute assigned to the whole regular expression. The attributes assigned to the
subexpressions only affect how much of that match they are allowed to “eat” relative to
each other.
The quantifiers {1,1} and {1,1}? can be used to force greediness or non-greediness,
respectively, on a subexpression or a whole regular expression.
Match lengths are measured in characters, not collating elements. An empty string is
considered longer than no match at all. For example: bb* matches the three middle
characters of abbbc; (week|week) (night|knights) matches all ten characters of weeknights;
when (.*).* is matched against abc, the parenthesized subexpression matches all three
characters; and when (a*)* is matched against bc, both the whole regular expression and
the parenthesized subexpression match an empty string.
POSIX Regular Expressions
POSIX Regular Expressions
PAGE 260
Data Protection Appliance User Guide
If case-independent matching is specified, the effect is much as if all case distinctions had
vanished from the alphabet. When an alphabetic that exists in multiple cases appears as an
ordinary character outside a bracket expression, it is effectively transformed into a bracket
expression containing both cases—e.g., x becomes [xX]. When it appears inside a bracket
expression, all case counterparts of it are added to the bracket expression—e.g., [x]
becomes [xX] and [^x] becomes [^xX].
If newline-sensitive matching is specified, . and bracket expressions using ^ will never
match the newline character (so that matches will never cross newlines unless the regular
expression explicitly arranges it) and ^ and $ will match the empty string after and before a
newline respectively, in addition to matching at beginning and end of string respectively.
But the escapes \A and \Z continue to match beginning or end of string only.
If partial newline-sensitive matching is specified, this affects . and bracket expressions as
with newline-sensitive matching, but not ^ and $.
If inverse partial newline-sensitive matching is specified, this affects ^ and $ as with
newline-sensitive matching, but not . and bracket expressions. This isn’t very useful, but is
provided for symmetry.
POSIX Regular Expressions
POSIX Regular Expressions
PAGE 261
Data Protection Appliance User Guide
Acknowledgements
AIX is a trademark of IBM Corp., registered in the U.S. and other countries.
Intel is a trademark of Intel Corp. in the U.S. and other countries
Mac and Mac OS are trademarks of Apple Inc., registered in the U.S. and other countries.
Windows is a registered trademark of Microsoft Corporation in the United States and other
countries.
NetWare is a registered trademark of Novell, Inc., in the United States and other countries.
SCO is a registered trademark of The SCO Group, Inc. registered in the U.S. and other
countries.
Solaris is a registered trademark of Sun Microsystems, Inc., registered in the U.S. and other
countries.
Portions of the software fall under the Gnu Public License. To receive a copy of the
modified GPL source code, send a check or money order for sixty ($60.00) US dollars to:
Revinetix, Inc.
Attn: Source Code Distribution Dept.
308 E 4500 S, Suite 100
Salt Lake City, UT 84107-4057
Acknowledgements
PAGE 263
Data Protection Appliance User Guide
License Agreement
The Revinetix Appliance End User License Agreement is included here for reference.
This is a legal agreement between you (either an individual or entity) and Revinetix, Inc.
1 LICENSE GRANT: Revinetix, Inc grants to you a non-exclusive, non-sub-licensable license
to use one copy of the enclosed Revinetix computer program (the “Software”) and its
associated documentation (the “Documentation”) on a single computer (“single use” or
“single user”). The software is in “use” on a computer when it is loaded into temporary
memory (e.g., RAM) or installed into permanent memory (e.g., hard disk, optical media, CDROM, tape media or other storage device) of that computer. This license is granted only to
you if you have installed on your computer or network a corresponding networking
product or appliance that is distributed by Revinetix, Inc.
2 COPYRIGHT: Copyright in the Software and Documentation are owned by Revinetix, Inc
and are protected by United States Copyright Laws and international treaty provisions.
3 SCOPE OF LICENSE: You may: use the Software on one computer for each license
purchased; and make one copy of the Software for backup or archival purposes, subject to
the terms and conditions of this license; and transfer the Software to one single hard disk
or other long-term storage device for each license you purchase, provided you keep the
original solely for backup or archival purposes; and transfer to another party all copies of
the Software and Documentation in your possession upon notice to Revinetix, Inc, if the
person who receives your copy agrees to all the terms and conditions of this license. You
may not: copy the Software or Documentation for use by another; or rent, lease or lend the
Software or Documentation to another; or alter, modify, adapt, prepare a derivative work,
de-compile or reverse-engineer the Software; or create standardized accessories for sale or
use with the Software; or alter, remove or obscure any notices of copyright, patent,
trademark or other proprietary rights placed by Revinetix, Inc in the Software and
Documentation, without the express, written permission of Revinetix, Inc.
4 MULTIPLE MEDIA: If the Software package contains any combination of 3.5", 5.25" or
CD-ROM disks, then you may use only the disks appropriate for each computer licensed.
You may not use other disks on another computer or loan, rent, lease or transfer them to
another user except as part of the permanent transfer (as provided above) of all Software
and Documentation.
License Agreement
PAGE 265
Data Protection Appliance User Guide
5 LIMITED WARRANTY: Revinetix, Inc does not warrant that the functions contained in the
Software will meet your requirements or that the operation of the Software will be
uninterrupted or error free. The Software is warranted to be free from defects in materials
and workmanship and that the Software will perform substantially in accordance with the
Documentation for a period of ninety (90) days from the date of receipt. Any implied
warranties on the Software are limited to ninety (90) days. Some jurisdictions do not allow
limitations on duration of an implied warranty, so the above limitation may not apply to
you.
6 CUSTOMER REMEDIES: Revinetix, Inc and its suppliers’ entire liability and your exclusive
remedy shall be, at Revinetix, Inc.’s option, either (a) return of the price paid, or (b) repair
or replacement of the Software that does not meet Revinetix, Inc.’s limited warranty and
which is returned to Revinetix, Inc with a copy of your receipt. This Limited Warranty is
void if failure of the Software has resulted from accident, abuse, or misapplication. Any
replacement Software will be warranted for the remainder of the original warranty period
or thirty (30) days, whichever is longer.
7 NO OTHER WARRANTIES: Revinetix, Inc and its suppliers disclaim all other warranties in
the Software and Documentation, either express or implied, including, but not limited to,
implied warranties of merchantability and fitness for a particular purpose. This limited
warranty gives you specific legal rights. You may have other rights that vary from
jurisdiction to jurisdiction.
8 NO LIABILITY FOR CONSEQUENTIAL DAMAGES: In no event shall Revinetix, Inc or its
suppliers be liable for any damages whatsoever (including, without limitation, damages for
loss of business profits, business interruption, loss of business information, or any other
pecuniary loss arising out of the use of or inability to use this Revinetix, Inc product, even if
Revinetix, Inc has been advised of the possibility of such damages. Because some
jurisdictions do not allow the exclusion or limitation for consequential or incidental
damages, the above limitation may not apply to you.
9 U.S. GOVERNMENT RESTRICTED RIGHTS: The Software and Documentation are
provided with RESTRICTED RIGHTS. Use, duplication, or disclosure by the
Government is subject to restriction as set forth in subparagraph (c) (1) (ii) of the
Rights in Technical Data and Computer Software clauses at DFARS 252.227 - 7018
or subparagraphs (c) (1) and (2) of the Commercial Computer Software - Restricted
Rights clause at 48 CFR 52.227-18, as applicable. Copyright Owner and Licenser is
Revinetix, Inc—Legal Affairs, 308 E 4500 S, Suite 100; Salt Lake City, UT 841074057.
10 JURISDICTION: This agreement is governed by the laws of the State of Utah. If you have
any questions concerning this agreement, please write to Revinetix, Inc—Legal Affairs, 308
E 4500 S, Suite 100; Salt Lake City, UT 84107-4057.
License Agreement
PAGE 266
Data Protection Appliance User Guide
License Agreement
PAGE 267
Data Protection Appliance User Guide
Figure 0-1: Disk drive front .......................................................................................................... 3
Figure 0-2: Disk drive with open hinge ....................................................................................... 4
Figure 0-3: Port and cable connection key .................................................................................. 5
Figure 0-4: Initial login screen ..................................................................................................... 6
Figure 0-5: Edit Network screen .................................................................................................. 7
Figure 0-6: Initial Configuration screen with IP address ........................................................... 8
Figure 2-1: Login screen ............................................................................................................... 9
Figure 2-2: License Agreement screen ...................................................................................... 10
Figure 3-1: Submit, Reset, and Skip buttons ............................................................................. 11
Figure 3-2: Dismiss and Reload buttons ................................................................................... 12
Figure 3-3: Time Zone screen ..................................................................................................... 13
Figure 3-4: Date screen ............................................................................................................... 14
Figure 3-5: Password screen ...................................................................................................... 15
Figure 3-6: Network screen ........................................................................................................ 16
Figure 3-7: Interfaces screen ...................................................................................................... 17
Figure 3-8: DNS screen ............................................................................................................... 19
Figure 3-9: Certificate screen ..................................................................................................... 20
Figure 3-10: Confirm screen....................................................................................................... 22
Figure 3-11: Reboot screen ........................................................................................................ 23
Figure 4-1: Revinetix Management Console ............................................................................. 25
Figure 4-2: Actions menu............................................................................................................ 26
Figure 4-3: Filters ........................................................................................................................ 26
Figure 4-4: Filtering example: Clients > Summary screen ....................................................... 27
Figure 4-5: Filtering example: Jobs > History screen ............................................................... 27
Figure 4-6: Refresh menu ........................................................................................................... 28
Figure 4-7: Columns .................................................................................................................... 29
Figure 4-8: Columns menu ......................................................................................................... 29
Figure 4-9: Page controls ............................................................................................................ 29
Figure 4-10: Activate Configuration button .............................................................................. 30
Figure 4-11: View Notices button .............................................................................................. 30
Figure 4-12: Save Modified Backup Configuration banner...................................................... 31
Figure 5-1: Active Jobs sub tab ................................................................................................... 33
Figure 5-2: Active Jobs contextual menu ................................................................................... 37
Figure 5-3: Job message log example......................................................................................... 37
Figure 5-4: Importing Jobs sub tab ............................................................................................ 38
Figure 5-5: Deduping Jobs sub tab ............................................................................................. 40
Figure 5-6: Scheduled Jobs sub tab ............................................................................................ 41
Figure 5-7: Recent Jobs sub tab .................................................................................................. 42
Figure 5-8: Director Status sub tab ............................................................................................ 43
Figure 5-9: Restart Backup Service............................................................................................ 43
Figure 5-10: Storage sub tab ...................................................................................................... 44
Figure 5-11: Reports sub tab ...................................................................................................... 45
Figure 5-12: Advanced sub tab .................................................................................................. 46
Figure 5-13: Confirming creation of NAS backup client .......................................................... 48
Figure 6-1: Summary sub tab (after setup) ............................................................................... 53
Figure 6-2: Client contextual menu ........................................................................................... 57
Figure 6-3: Browse and Restore window .................................................................................. 58
PAGE 268
Data Protection Appliance User Guide
Figure 6-4: Search window ......................................................................................................... 59
Figure 6-5: Edit sub tab............................................................................................................... 61
Figure 6-6: File Set Editor window ............................................................................................ 66
Figure 6-7: List of Directories to Backup window .................................................................... 68
Figure 6-8: Matchers to include or exclude specific areas ....................................................... 71
Figure 6-9: Starting Directories and Files ................................................................................. 72
Figure 6-10: Browse Client button ............................................................................................ 72
Figure 6-11: File Selection .......................................................................................................... 72
Figure 6-12: List of Directories to Backup ................................................................................ 73
Figure 6-13: Starting Directories and Files' Edit button .......................................................... 73
Figure 6-14: Matcher Conditions ............................................................................................... 73
Figure 6-15: Browse Client ......................................................................................................... 74
Figure 6-16: Selection ................................................................................................................. 74
Figure 6-17: List of Patterns ....................................................................................................... 74
Figure 6-18: Editing text ............................................................................................................. 75
Figure 6-19: Edit Clients Options ............................................................................................... 77
Figure 6-20: New Client dialog ................................................................................................... 77
Figure 6-21: Client Filter............................................................................................................. 78
Figure 6-22: Shared File Sets sub tab ........................................................................................ 79
Figure 6-23: Shared File Sets contextual menu ........................................................................ 80
Figure 6-24: File Set Editor......................................................................................................... 81
Figure 6-25: Software sub tab .................................................................................................... 82
Figure 6-26: Active Directory sub tab ....................................................................................... 82
Figure 6-27: Creating a new Group Policy ................................................................................ 83
Figure 6-28: Naming the Group Policy ...................................................................................... 84
Figure 6-29: Editing the new Group Policy ............................................................................... 84
Figure 6-30: New > Package ....................................................................................................... 84
Figure 6-31: Finished Group Policy Editor................................................................................ 85
Figure 6-32: Adding Domain Computers .................................................................................. 86
Figure 6-33: Creating a link ........................................................................................................ 86
Figure 6-34: Linking the GPO ..................................................................................................... 87
Figure 6-35: Prioritizing the GPO links ..................................................................................... 87
Figure 6-36: Enabling System State Backup ............................................................................. 89
Figure 6-37: Schedules sub tab .................................................................................................. 90
Figure 6-38: Schedules contextual menu .................................................................................. 91
Figure 6-39: Schedule window................................................................................................... 91
Figure 6-40: Create Run window ............................................................................................... 92
Figure 6-41: Time Selection ....................................................................................................... 93
Figure 6-42: Day Selection (weekly scheduling) ...................................................................... 93
Figure 6-43: Day Selection (monthly scheduling) .................................................................... 94
Figure 6-44: Day Selection (monthly scheduling, on specific weeks) .................................... 94
Figure 6-45: Schedule ranges ..................................................................................................... 95
Figure 6-46: Month Selection ..................................................................................................... 95
Figure 6-47: Saved runs .............................................................................................................. 96
Figure 6-48: Quarterly backup schedule ................................................................................... 97
Figure 6-49: Usage sub tab ......................................................................................................... 99
Figure 7-1: History sub tab ....................................................................................................... 103
PAGE 269
Data Protection Appliance User Guide
Figure 7-2: History contextual menu ....................................................................................... 105
Figure 7-3: Message log example ............................................................................................. 106
Figure 7-4: Browse and Restore .............................................................................................. 107
Figure 7-5: Browsing folders .................................................................................................... 108
Figure 7-6: Restore screen ....................................................................................................... 109
Figure 7-7: Jobs Re(Import) screen ......................................................................................... 110
Figure 7-8: Deduplicate confirmation screen ......................................................................... 111
Figure 7-9: Properties screen ................................................................................................... 111
Figure 7-10: Setting sub tab ..................................................................................................... 112
Figure 7-11: Unreferenced Data sub tab ................................................................................. 114
Figure 7-12: Confirm deletion of volumes .............................................................................. 114
Figure 7-13: Confirm reimporting volumes ............................................................................ 114
Figure 8-1: Libraries sub tab .................................................................................................... 115
Figure 8-2: Archive Libraries ................................................................................................... 116
Figure 8-3: Library information ............................................................................................... 116
Figure 8-4: Manage Archive Disk screen ................................................................................. 117
Figure 8-5: Viewing archived jobs ........................................................................................... 119
Figure 8-6: An indication of empty archive bay...................................................................... 122
Figure 8-7: A Foreign Disk ........................................................................................................ 123
Figure 8-8: Disk formatting confirmation ............................................................................... 123
Figure 8-9: New (non-archive)disk information .................................................................... 124
Figure 8-10: Disk Info and Testing window ............................................................................ 125
Figure 8-11: Archive Jobs button ............................................................................................. 125
Figure 8-12: Jobs on the RAID available for archiving ........................................................... 126
Figure 8-13: Selected jobs to Archive ...................................................................................... 127
Figure 8-14: The Archive Process ............................................................................................ 128
Figure 8-15: History sub tab..................................................................................................... 130
Figure 8-16: Archive set screen ............................................................................................... 131
Figure 8-17: Settings sub tab .................................................................................................... 132
Figure 8-18: Encryption sub tab .............................................................................................. 133
Figure 8-19: Media Inventory sub tab ..................................................................................... 134
Figure 8-20: New Mirror sub tab ............................................................................................. 135
Figure 8-21: Add Remote Confirm Fingerprint screen .......................................................... 136
Figure 8-22: Remote Mirrors sub tab ...................................................................................... 136
Figure 8-23: Remote Settings sub tab...................................................................................... 138
Figure 8-24: Remote Repositories sub tab .............................................................................. 139
Figure 9-1: Mode/Options sub tab (Secondary) ..................................................................... 143
Figure 9-2: Change Replication Role Confirmation ................................................................ 143
Figure 9-3: Secondary appliance options ................................................................................ 144
Figure 9-4: Generate new key .................................................................................................. 145
Figure 9-5: Remote Appliance Information ............................................................................ 145
Figure 9-6: Configured Secondary ........................................................................................... 146
Figure 9-7: Enable Replication checked .................................................................................. 147
Figure 9-8: Primary appliances options .................................................................................. 148
Figure 9-9: Leave 'Enable Replication' unchecked ................................................................. 149
Figure 9-10: Copying over the Authentication Key ................................................................ 149
Figure 9-11: Secondary Appliance's Information ................................................................... 149
PAGE 270
Data Protection Appliance User Guide
Figure 9-12: Bandwidth Management ..................................................................................... 150
Figure 9-13: Remote Appliance Information .......................................................................... 151
Figure 9-14: Enabling Byte Level Replication ......................................................................... 154
Figure 9-15: Job count on Primary Appliance......................................................................... 154
Figure 9-16: Job Count on Secondary Appliance .................................................................... 154
Figure 9-17: Status sub tab ....................................................................................................... 156
Figure 9-18: Replicated Jobs .................................................................................................... 157
Figure 9-19: Pending Jobs......................................................................................................... 157
Figure 9-20: Configuration Error ............................................................................................. 157
Figure 10-1: Status sub tab ....................................................................................................... 159
Figure 10-2: RAID sub tab ........................................................................................................ 160
Figure 10-3: Red View Notices ................................................................................................. 161
Figure 10-4: The Offline button (disk 2 has been selected) .................................................. 161
Figure 10-5: Rebuilding an array ............................................................................................. 164
Figure 10-6: Setting sub tab ..................................................................................................... 167
Figure 10-7: Active Directory Membership screen ................................................................ 168
Figure 10-8: Certificate screen ................................................................................................. 169
Figure 10-9: Configuration screen ........................................................................................... 170
Figure 10-10: Devices Screen ................................................................................................... 171
Figure 10-11: Disk screen ......................................................................................................... 172
Figure 10-12: DNS Screen ......................................................................................................... 173
Figure 10-13: Email Screen ...................................................................................................... 174
Figure 10-14: Firewall screens ................................................................................................ 175
Figure 10-15: Host Name screen.............................................................................................. 176
Figure 10-16: Licenses screen .................................................................................................. 177
Figure 10-18: NAS screen ......................................................................................................... 178
Figure 10-19: Share status example ........................................................................................ 178
Figure 10-20: Enter folder name.............................................................................................. 179
Figure 10-21: Configure a new share ...................................................................................... 179
Figure 10-22: Configuring disk space for a new share ........................................................... 180
Figure 10-23: Main NAS setup screen ..................................................................................... 181
Figure 10-24: SMB protocol configuration screen ................................................................. 181
Figure 10-25: Account Management screen ........................................................................... 182
Figure 10-26: SMB file share configuration ............................................................................ 183
Figure 10-27: Configuring SMB users ...................................................................................... 184
Figure 10-28: Main NAS setup screen ..................................................................................... 185
Figure 10-29: Enabling the NFS protocol ................................................................................ 186
Figure 10-30: NFS file share configuration ............................................................................. 186
Figure 10-31: Networking screen ............................................................................................ 188
Figure 10-32: Notifications screen .......................................................................................... 189
Figure 10-33: Configuring Notifications settings ................................................................... 190
Figure 10-34: Weekly summary report example ................................................................... 192
Figure 10-35: Daily summary report example ....................................................................... 192
Figure 10-36: Password screen................................................................................................ 193
Figure 10-37: Reboot screen .................................................................................................... 194
Figure 10-38: Routes screen .................................................................................................... 195
Figure 10-39: Editing a route ................................................................................................... 196
PAGE 271
Data Protection Appliance User Guide
Figure 10-40: SNMP screen ...................................................................................................... 196
Figure 10-41: Time screen........................................................................................................ 197
Figure 10-42: Update screen .................................................................................................... 198
Figure 10-43: Update information and confirmation screen ................................................ 199
Figure 10-44: Update reboot confirmation screen ................................................................. 199
Figure 11-1: Portal screen ........................................................................................................ 201
Figure 11-2: Support update settings ...................................................................................... 202
Figure 12-1: Service Control tab .............................................................................................. 214
Figure 12-2: Exchange Database Backup tab .......................................................................... 215
Figure 12-3: Exchange Mailbox Backup tab ............................................................................ 216
Figure 12-4: SQL Backup tab .................................................................................................... 217
Figure 12-5: Enabling VSS ........................................................................................................ 229
Figure 12-6: Mailboxes in Mailbox Database .......................................................................... 230
Figure 12-7: Editing properties in Exchange Management Console ..................................... 233
Figure 12-8: Selecting Microsoft Exchange Writer folder ..................................................... 234
Figure 12-9: Selecting multiple database folders ................................................................... 234
Figure 13-1: BMR user interface .............................................................................................. 239
Figure 13-2: BMR Network Configuration screen .................................................................. 240
Figure 13-3: Password login prompt ....................................................................................... 241
Figure 13-4: Client selection screen ........................................................................................ 241
Figure 13-5: Disk and partition selection screen ................................................................... 242
Figure 13-6: Client configuration change warning ................................................................. 243
Figure 13-7: Backup start confirmation .................................................................................. 243
Figure 13-8: Backup progress screen ...................................................................................... 244
Figure 14-1: Typing 'msconfig' in Run .................................................................................... 247
Figure 14-2: Checking options in System Configuration ....................................................... 247
PAGE 272
Data Protection Appliance User Guide
PAGE 273
Data Protection Appliance User Guide
Revinetix Contact Information
Revinetix, Inc.
308 E 4500 S Ste.100
Salt Lake City, UT 84107
Telephone: 1-888-264-5116 or (801) 263-5116
Fax: (801) 264-2642
www.revinetix.com
PAGE 275
Download PDF
Similar pages