NetVault®: FASTRecover™
version 4.2
Virtual-Based Appliance
Quick Start Guide
RDP-108-4.2-EN-01 10/22/10
Copyrights
NetVault: FASTRecover Virtual-Based Appliance Quick Start Guide
Software Copyright © 2010 BakBone Software
Documentation Copyright © 2010 BakBone Software
This software product is copyrighted and all rights are reserved. The distribution and sale of this
product are intended for the use of the original purchaser only per the terms of the License
Agreement. All other product trademarks are the property of their respective owners.
The NetVault: FASTRecover Virtual-Based Appliance Quick Start Guide is copyrighted and all
rights are reserved.
This document may not, in whole or part, be copied, photocopied, reproduced, translated,
reduced or transferred to any electronic medium or machine-readable form without prior consent
in writing from BakBone Software.
THIS PUBLICATION IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER
EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT.
THIS PUBLICATION COULD INCLUDE TECHNICAL INACCURACIES OR TYPOGRAPHICAL
ERRORS. CHANGES ARE PERIODICALLY ADDED TO THE INFORMATION HEREIN; THESE
CHANGES WILL BE INCORPORATED INTO NEW EDITIONS OF THE PUBLICATION.
BAKBONE SOFTWARE MAY MAKE IMPROVEMENTS AND/OR CHANGES IN THE
PRODUCT(S) AND/OR THE PROGRAM(S) DESCRIBED IN THIS PUBLICATION AT ANY
TIME.
© 1999–2010 BakBone®, BakBone Software®, NetVault®, Application Plugin Module™, BakBone
logo®, Integrated Data Protection™, SmartDisk™, Asempra®, and FASTRecover™ are all
trademarks or registered trademarks of BakBone Software, Inc., in the United States and/or in
other countries. All other brands, products or service names are or may be trademarks,
registered trademarks or service marks of, and used to identify, products or services of their
respective owners.
BakBone Software
9540 Towne Centre Drive, Suite 100 Š San Diego, California 92121 Š 866.484.2663
Table of Contents
Chapter 1: Introducing NetVault: FASTRecover
•
•
•
•
•
•
•
NetVault: FASTRecover – At a Glance ............................................................................ 7
Key Benefits ...................................................................................................................... 8
Feature Summary ............................................................................................................. 8
Target Audience ................................................................................................................ 9
Recommended Additional Reading ................................................................................ 9
Technical Support ............................................................................................................. 9
Documentation Updates ................................................................................................... 9
Chapter 2: Understanding NVFR Architecture
•
•
•
•
•
•
•
11
NVFR Architecture – An Overview ................................................................................ 12
NVFR Virtual Server ........................................................................................................ 12
NVFR Server .................................................................................................................... 13
NVFR Online Storage ..................................................................................................... 13
NVFR Virtual-Based Appliance ...................................................................................... 13
NVFR Agent ..................................................................................................................... 13
NVFR Management Console .......................................................................................... 13
Chapter 3: Reviewing Installation Prerequisites
•
•
•
•
7
15
NVFR Server Requirements ........................................................................................... 15
Network Bandwidth Requirements ............................................................................... 15
Authentication Requirements ........................................................................................ 16
NVFR Agent Requirements ............................................................................................ 17
-
Supported Platforms ...................................................................................................................... 17
Restarting the Protected Server after NVFR Agent Installation ..................................................... 17
Prerequisite for Windows File System Protection .......................................................................... 17
Prerequisites for Exchange Data Protection .................................................................................. 17
4
- Prerequisites for SQL Server Data Protection ............................................................................... 20
Chapter 4: Configuring the Virtual-Based Appliance
23
• Configuring the Appliance – An Overview ....................................................................23
- Collecting Configuration Details ..................................................................................................... 24
• Installing the NVFR Virtual-Based Appliance ...............................................................24
- Importing the Image ....................................................................................................................... 24
- Completing the Initial Setup ........................................................................................................... 29
• Configuring the NVFR Virtual Server ............................................................................31
-
Logging On the NVFR Management Console ............................................................................... 31
Configuring Email Notification ........................................................................................................ 31
Creating the NVFR Virtual Server .................................................................................................. 32
Configuring Access ........................................................................................................................ 38
Chapter 5: Installing and Removing the NVFR Agent
49
• Protecting a Clustered Environment .............................................................................49
- Installing the NVFR Agent in a Clustered Environment ................................................................. 50
- Installing the NVFR Agent for Cluster Continuous Replication (CCR) Deployments on Exchange
2007 51
- Making Sure that Local Continuous Replication (LCR) is Disabled ............................................... 51
• Protecting an Exchange 2010 Environment .................................................................52
- Protecting an Individual Mailbox Server ......................................................................................... 52
- Protecting a Single-Location or Multiple-Location DAG Deployment ............................................. 52
• Running the NVFR Agent Setup Wizard ........................................................................55
• Configuring the NVFR Agent on an Active/Passive Cluster .......................................62
- Configuring the NVFR Agent in Windows 2003 ............................................................................. 62
- Configuring the NVFR Agent in Windows 2008 ............................................................................. 64
• Using the Windows Performance Monitor Counters ...................................................68
• Removing the NVFR Agent .............................................................................................68
- Uninstalling the Agent from a Single Computer ............................................................................. 68
- Uninstalling the Agent from a Windows Cluster ............................................................................. 69
Chapter 6: Updating the Configuration After Installation
71
• Starting the Reconfiguration Utility ...............................................................................71
• Updating NVFR Virtual IP Address ................................................................................72
• Updating Cache and Log Directories ............................................................................72
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
5
• Enabling Exchange Log Truncation .............................................................................. 73
• Enabling SQL Server Log Truncation ........................................................................... 74
• Enabling Data Compression .......................................................................................... 75
6
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
7
Chapter 1:
INTRODUCING NETVAULT:
FASTRECOVER
1.1.0
„
NetVault: FASTRecover – At a Glance
„
Key Benefits
„
Feature Summary
„
Target Audience
„
Recommended Additional Reading
„
Technical Support
„
Documentation Updates
NetVault: FASTRecover – At a Glance
Increasingly, organizations of all sizes are harnessing the power of Microsoft
Windows and its leading applications — Exchange and SQL Server — to support
critical processes tied directly to revenue generation and customer service.
Therefore, the availability of these applications and systems has become a top
priority for businesses of all sizes. While backup is the cornerstone of all data
protection strategies, associated backup windows remain one of the toughest
challenges faced by IT professionals today. For example, it is becoming quite
common for organizations to store hundreds of gigabytes (GBs) and even
terabytes (TBs) of Exchange or SQL Server data which can take upwards of 12
hours or more to back up. The amount of data stored within these applications is
not shrinking, which leaves administrators with a serious challenge of ensuring
they properly protect the data within their mission-critical applications. With
traditional backups, administrators also face challenges with regards to speed,
failed jobs, and media management issues. Now, imagine eliminating backup
windows for Exchange, SQL Server, or Windows file servers while providing
extremely fast recovery to practically any-point-in-time all in a cost-effective
software-only deployment. With NetVault: FASTRecover (NVFR), you can!
NVFR provides cost-effective real-time, disk-based data protection that eliminates
backup windows for Exchange, SQL Server, and Windows file servers, while
giving you the power of extremely fast recovery to practically any-point-in-time.
NVFR provides a simplified software deployment that reduces the level of
expertise required for installation and administration. Recover protected data to an
alternate physical server or even a virtual machine in as fast as 30 seconds.
Integration with most traditional backup solutions, including BakBone’s
8
Chapter 1
Introducing NetVault: FASTRecover
NetVault®: Backup (NVBU), offers further reassurance that you can store your
critical data off-site.
1.2.0
1.3.0
Key Benefits
„
Elimination of Backup Windows – NVFR eliminates one of your
organizations biggest data protection challenges — your backup windows for
critical data. NVFR provides disk-based, real-time data protection for your
Exchange, SQL Server, and Windows file servers. NVFR also reduces
network contention because it is always on — capturing and backing up bytelevel changes in your environment as they occur. Imagine the peace of mind
you will realize by no longer having to worry about your backup windows.
„
Lightning Fast Recovery of Data – NVFR provides lightning fast recovery of
your data. With a few clicks of the mouse, your users will be back in business
in a flash. NVFR’s Virtual On-Demand Recovery (VODR) technology makes
these critical applications and their associated data available for use in as
little as 30-seconds. Recovered data is completely usable by the application
on first recovery — eliminating wasted time and multiple recovery attempts.
„
Simple Deployment – NVFR supports flexible deployment by providing a
software-only solution that integrates with your existing systems and storage.
„
Minimizes Costs by Integrating with Existing Backup Applications –
With off-site backups being an important part of the data protection plan for
any business-critical application, NVFR’s integration with traditional backup
applications, including NVBU, gives users the confidence that the recovery
data stored in NVFR’s Online Storage is protected and stored off-site.
Feature Summary
„
Fast disk-based backups for Windows environments and applications,
including Exchange, SQL Server, and Windows file system data
„
Extremely fast recovery to practically any-point-in-time, even when failing
over
„
Flexible software-only deployment options
„
Protection for Exchange and SQL Server Failover Clusters and Windows
Clustered File Servers
„
Recover to physical or virtual machines
„
Point-and-click granular recovery
„
Simple-to-use web-based management console
„
Integrates with most tape backup applications, including NVBU
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
1.4.0
9
Target Audience
While Linux and Windows Administrator skills are generally not required to protect
and recover data with NVFR, they are required to perform the initial installation
and configuration of the NVFR components.
1.5.0
Recommended Additional Reading
The following documentation is also available for NVFR:
„
NetVault: FASTRecover Command Line Interface Guide
„
NetVault: FASTRecover Management Console User’s Guide
http://www.bakbone.com/documentation
1.6.0
Technical Support
BakBone Software is dedicated to providing friendly, expert advice to its
customers. BakBone’s highly trained professionals are available to answer
questions, offer solutions to problems, and generally help make the most of any
BakBone software purchase. Log on to the web site for more information.
http://www.bakbone.com/supportportal
1.7.0
Documentation Updates
For late-breaking documentation updates, refer to the BakBone Software
Knowledge Base. BakBone’s Knowledge Base article for NVFR can be found at
the following link:
http://kb.bakbone.com/5762
10
Chapter 1
Introducing NetVault: FASTRecover
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
11
Chapter 2:
UNDERSTANDING NVFR
ARCHITECTURE
„
NVFR Architecture – An Overview
„
NVFR Virtual Server
„
NVFR Virtual-Based Appliance
„
NVFR Server
„
NVFR Online Storage
„
NVFR Agent
„
NVFR Management Console
12
Chapter 2
Understanding NVFR Architecture
2.1.0
NVFR Architecture – An Overview
The following diagram shows a basic configuration of how you might set up NVFR.
Figure 2-1:
NVFR
Architecture
diagram
2.2.0
NVFR Virtual Server
An NVFR Virtual Server is an Active/Active 1-to-4 node fault-tolerant cluster,
where the NVFR Server is simultaneously protecting Exchange, SQL Server, and
Windows file servers.
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
2.3.0
13
NVFR Server
The NVFR Server is a single server in an NVFR Virtual Server and is hot
swappable, so that you can add new NVFR Servers to increase service capacity,
and you can remove existing NVFR Servers for maintenance. The NVFR Server
also hosts the NVFR Management Console and alerts database.
2.4.0
NVFR Online Storage
The NVFR Online Storage provides the historical repository for the protected data.
NVFR Online Storage must be configured as block-based volumes, and it cannot
be configured as VTL, deduplication, or NAS shares. The NVFR Virtual-Based
Appliance includes a virtual disk for emulating NVFR Online Storage. You cannot
use the NVFR Virtual-Based Appliance to extend storage capacity.
2.5.0
NVFR Virtual-Based Appliance
The NVFR Virtual-Based Appliance is a VMware Virtual Machine that is
preconfigured as an NVFR Server. It uses a virtual disk to emulate NVFR Online
Storage, and it supports one NVFR Server per NVFR Virtual Server.
The NVFR Virtual-Based Appliance supports the following:
2.6.0
„
Maximum data protection – Approximately 200GB
„
Maximum number of Data Sets – 1 (If you want to use more, you must
request an update to your License Key.)
„
Maximum number of nodes in NVFR Virtual Server – 1
NVFR Agent
The NVFR Agent resides on each protected Exchange, SQL Server, or Windows
file server (also referred to as an NVFR Client) to stream data to and from the
NVFR Virtual Server. The NVFR Agent is application-aware, recognizing
Exchange, SQL Server, and Microsoft Office applications such as Word, Excel,
and PowerPoint. The NVFR Agent performs Exchange and SQL Server Volume
Shadow Copy Service (VSS) Snapshots, while continuously tracking Exchange or
SQL Server log files or file system writes and sending them in real-time to the
NVFR Server. Local disk cache is used as necessary based on resource
limitations and application events.
2.7.0
NVFR Management Console
Use the NVFR Management Console to configure the protected servers, initiate
recoveries, and browse protected data. When used in conjunction with NVBU, it
14
Chapter 2
Understanding NVFR Architecture
creates Common Internet File System (CIFS) Views for integration. You can also
use the NVFR Management Console to retrieve diagnostic information.
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
15
Chapter 3:
REVIEWING INSTALLATION
PREREQUISITES
3.1.0
„
NVFR Server Requirements
„
Network Bandwidth Requirements
„
Authentication Requirements
„
NVFR Agent Requirements
™
Supported Platforms
™
Restarting the Protected Server after NVFR Agent Installation
™
Prerequisite for Windows File System Protection
™
Prerequisites for Exchange Data Protection
™
Prerequisites for SQL Server Data Protection
NVFR Server Requirements
For details on the supported platforms for the NVFR Server, refer to the NetVault:
FASTRecover Supported Platforms document on the BakBone web site:
http://www.bakbone.com/compatibility
3.2.0
Network Bandwidth Requirements
The NVFR Virtual Server can be connected to either a local-area network (LAN) or
wide-area network (WAN) and requires a minimum network bandwidth of T3
(45 megabits per second [Mbps]) or higher. The actual network requirement also
must factor in the change rate and size of data.
The NVFR Virtual Server is intended to handle throughput from a number of
protected systems and provide off-host backup capabilities via CIFS protocol.
Therefore, the public interfaces for the NVFR Virtual Server must be connected to
GigE ports on your LAN switch.
Verify that you can access the NVFR Server remotely via TCP/IP.
16
Chapter 3
Reviewing Installation Prerequisites
3.3.0
Authentication Requirements
Define the following authentication details to be used during configuration of the
NVFR Server that will provide access to NVFR Management Console:
Domain Administrator Account for Installation
„
Domain Administrator Credentials are only required for use during the
installation process
NVFR Administrator Security Group
„
Security Group with full NVFR Administration rights
„
Includes ability to administer NVFR Virtual Server and initiate protection and
restores
NVFR Monitor Security Group
„
Security Group with ability only to monitor NVFR
„
Ability only to view NVFR Status
™
Unable to initiate protection or restores
™
Unable to administer NVFR Virtual Server
NVFR CIFS Viewer Security Group
„
Security Group with ability only to mount Data Sets using CIFS Views.
Additional Security Group Requirements
Because NVFR uses an LDAP query to Active Directory to perform authentication
and authorization, you must adhere to the following guidelines when you set up
the Security Groups for access to NVFR:
„
Assign users directly to the groups that you create. That is, do not assign
them as part of a group that is allowed access (a group within a group).
„
Make sure that the Security Group is not the primary group for a user. For
example, if Domain Users is the default group for new users, make sure that
you create a separate Security Group for the users in NVFR; do not use
Domain Users.
The following example demonstrates how you might set up the Security Groups:
1. Create three security groups in Active Directory, NVFRAdmins, NVFRUsers,
and NVFRCIFS.
2. Set NVFRAdmins as the group that has administrative privileges, set
NVFRUsers as the group that has monitoring privileges in the NVFR
Management Console, and set NVFRCIFS as the group that can only view
Data Sets.
3. Add users directly to each group as applicable.
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
3.4.0
3.4.1
17
NVFR Agent Requirements
Supported Platforms
For details on the supported platforms for the NVFR Agent, refer to the NetVault:
FASTRecover Supported Platforms and System Requirements document on the
BakBone web site:
http://www.bakbone.com/compatibility
3.4.2
Restarting the Protected Server after NVFR Agent
Installation
After you install the NVFR Agent on the proposed server for protection, you must
reboot the protected server so that the Windows Minifilter Driver is established.
3.4.3
Prerequisite for Windows File System Protection
Opportunistic Locking is the default file-locking mechanism used by Windows. It is
designed to improve performance by controlling the caching of files on the client.
Disabling these locks ensures that protected files are not open for an extended
time. If files remain open when a recovery option begins, the recovered data will
not match the last data written to the file.
For information on disabling opportunistic locking, refer to:
http://support.microsoft.com/kb/296264
3.4.4
Prerequisites for Exchange Data Protection
Note: In Exchange 2003 and 2007, database and Storage Group information is
stored as components of the Exchange Server and is referred to as Storage
Groups. Exchange 2010 does not use Storage Groups and databases are not tied
to a specific server. Throughout this document, BakBone uses Storage Group/
Mailbox Database to represent both Exchange Server configurations.
Before you begin, make sure that you have the following prerequisites in place:
„
Make sure that there is adequate free space on the Exchange volumes to be
protected. For proper operation of Exchange protection, there should be at
least 300MB of free space on each volume. For optimum performance,
BakBone recommends that you have at least 10 percent of free space on the
protected volumes.
„
Before initiating the Exchange protection, ensure that Circular Logging is
disabled on the machine that is to serve as the Exchange Server. The
Exchange Server will overwrite files if Circular Logging is enabled, making it
impossible to reliably restore from the transaction logs. To disable Circular
Logging, perform the steps in Disabling Circular Logging in Exchange 2003
18
Chapter 3
Reviewing Installation Prerequisites
on page 19, Disabling Circular Logging in Exchange 2007 on page 19, or
Disabling Circular Logging in Exchange 2010 on page 19.
Important: Disabling Circular Logging will cause the number of transaction files to
grow and possibly consume all the available space on the volume where the
transaction logs are stored. NVFR provides the ability to truncate Exchange
Transaction logs. For more information on enabling this feature, see Updating the
Configuration After Installation on page 71.
„
For optimal performance and system operations, BakBone recommends that
you run the Microsoft Exchange Best Practices Analyzer and follow its
recommendations.
http://www.microsoft.com/downloads/details.aspx?FamilyID=DBAB201F4BEE-4943-AC22-E2DDBD258DF3&displaylang=en
„
„
Make sure that the following services are enabled in the Windows Control
Panel for the proposed protected servers:
™
Microsoft Software Shadow Copy Provider
™
Volume Shadow Copy
™
Exchange VSS Writer (For instructions on enabling the Exchange VSS
Writer, see Enabling Exchange VSS Writer on page 18.)
For Exchange 2003, make sure that msExchESEParamLogBuffers is set to
9000. For more information, refer to the Microsoft ESE log buffers that are set
too low can cause the Microsoft Exchange Information Store service to stop
responding article at:
http://support.microsoft.com/kb/328466
3.4.4.a
Enabling Exchange VSS Writer
1. On the taskbar, click Start, and then click Run.
2. On the Run dialog, type regedit, and then click OK.
3. Locate and double-click the following registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\
MSExchangeIS\ParametersSystem
4. Double-click the Disable Exchange Writer value.
5. In the Value data text box on the Edit String dialog, change the value from 1
to 0, and then click OK.
6. Exit the Registry Editor.
7. On the taskbar, click Start, point to Administrative Tools, and click
Services.
8. Stop and restart the Microsoft Exchange Information Store
(MSExchangeIS) service.
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
3.4.4.b
19
Disabling Circular Logging in Exchange 2003
1. Open the Exchange System Manager.
2. Expand Servers, and then expand an Exchange Server.
3. Right-click the applicable Storage Group, and select Properties.
4. On the Properties dialog, clear the Enable circular logging check box, and
click OK to save the change.
5. Close the Exchange System Manager, and restart the Microsoft Exchange
Information Store (MSExchangeIS) service for the change to take effect.
You can find complete instructions for this procedure in the relevant Microsoft
Exchange 2003 documentation. In addition, you can consult the Circular logging is
disabled article. At the time this document was generated, this article was
available at:
http://support.microsoft.com/kb/258470/en-us
3.4.4.c
Disabling Circular Logging in Exchange 2007
1. Open the Exchange Management Console.
2. Expand Server Configuration, and expand the applicable server.
3. Right-click the applicable Storage Group, and select Properties.
4. On the Properties dialog, clear the Enable circular logging check box, and
click OK to save the change.
5. Close the Exchange Management Console, and restart the Microsoft
Exchange Information Store (MSExchangeIS) service for the change to
take effect.
For complete instructions for this procedure, refer to the relevant Microsoft
Exchange 2007 documentation. In addition, you can consult the How to Enable or
Disable Circular Logging for a Storage Group article. At the time this document
was generated, this article was available at:
http://technet.microsoft.com/en-us/library/bb331968.aspx
3.4.4.d
Disabling Circular Logging in Exchange 2010
1. Open the Exchange Management Console.
2. Navigate to Organization Configuration > Mailbox.
3. On the Database Management tab, select the applicable database, and click
Properties.
4. On the Properties dialog, select the Maintenance tab, clear the Enable
circular logging check box, and click OK to save the change.
5. Close the Exchange Management Console, and restart the Microsoft
Exchange Information Store (MSExchangeIS) service for the change to
take effect.
20
Chapter 3
Reviewing Installation Prerequisites
For complete instructions for this procedure, refer to the relevant Microsoft
Exchange 2010 documentation. In addition, you can consult the Configure Mailbox
Database Properties article. At the time this document was generated, this article
was available at:
http://technet.microsoft.com/en-us/library/dd297937.aspx
3.4.5
Prerequisites for SQL Server Data Protection
Before you begin, make sure that you have the following prerequisites in place:
„
The SQL Server is configured with Windows Authentication Mode or Mixed
Mode Authentication.
„
To protect a SQL Server database in real-time, it must be using the Full
Recovery Model.
„
There is adequate free space on the SQL Server volumes to be protected.
For proper operation of SQL Server protection there should be at least
300MB of free space on each volume. For optimum performance, BakBone
recommends that you have at least 10 percent of free space on the protected
volumes.
„
The following software is installed on the machine where the SQL Server
Instance resides:
™
SQL Server Native Client or SQLNCLI. For more information, refer to:
http://msdn2.microsoft.com/en-us/library/ms131321.aspx
™
„
SQL Distributed Management Objects (SQL-DMO). Register the SQLDMO components as described in Registering SQL-DMO Components on
page 21.
If you are using SQL Server 2008, make sure that you have the SQL Server
2005 Backward-Compatibility Components installed. Because NVFR Server
uses SQL-DMO to browse and use SQL Server instances, you must install
the Backward-Compatibility package to use SQL Server 2008. You can
download the redistributable package from:
http://www.microsoft.com/downloads/details.aspx?FamilyId=228DE03F3B5A-428A-923F-58A033D316E1&displaylang=en
Install this package after you install SQL Server 2008 SP1.
„
The following services are enabled in the Windows Control Panel for the
proposed protected servers:
™
™
For SQL Server 2005 and 2008:
„
Microsoft Software Shadow Copy Provider
„
Volume Shadow Copy
„
SQL Server VSS Writer
For SQL Server 2000:
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
„
Microsoft Software Shadow Copy Provider
„
Volume Shadow Copy
„
MSDE VSS Writer
21
Additionally, follow these guidelines:
3.4.5.a
„
Be aware that the master system database is not protected in real-time. It is
only protected during snapshots.
„
Be aware that databases with autoshrink enabled are only protected during
snapshots.
„
NVFR supports full-text catalog protection for SQL Server. However, in SQL
Server 2005, full-text catalogs are only protected during snapshots. If one or
more databases being protected have full-text catalogs, BakBone
recommends that you manually start full-text population for the database
tables that have full-text indexes defined after recovery of the SQL Server
Instance or an individual database.
Registering SQL-DMO Components
1. Go to the following directory:
C:\Program Files\Microsoft SQL Server \90\Tools\Binn\Resources\
<language>
2. Execute the following:
%Program Files%\Microsoft SQL Server\80\Tools\Binn\
REGSVR32 SQLDMO.DLL
For more information, refer to:
http://msdn2.microsoft.com/en-us/library/ms141187.aspx
22
Chapter 3
Reviewing Installation Prerequisites
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
23
Chapter 4:
CONFIGURING THE VIRTUALBASED APPLIANCE
„
Configuring the Appliance – An Overview
™
„
„
4.1.0
Collecting Configuration Details
Installing the NVFR Virtual-Based Appliance
™
Importing the Image
™
Completing the Initial Setup
Configuring the NVFR Virtual Server
™
Logging On the NVFR Management Console
™
Configuring Email Notification
™
Creating the NVFR Virtual Server
™
Configuring Access
Configuring the Appliance – An Overview
This chapter describes installing and configuring the NVFR Virtual-Based
Appliance and the NVFR Virtual Server. You must complete the configuration
procedures for the NVFR Virtual-Based Appliance before configuring the NVFR
Virtual Server.
24
Chapter 4
Configuring the Virtual-Based Appliance
4.1.1
Collecting Configuration Details
Define the following static IP addresses to be used during configuration of the
NVFR Virtual-Based Appliance.
„
„
NVFR Server
„
Static IP Address
„
Subnet Mask
„
Default Gateway
NVFR Virtual Server Virtual IP
„
Static IP Address
„
Subnet Mask (same as
NVFR Server)
„
Default Gateway (same as
NVFR Server)
Note: BakBone recommends that you specify two NTP Servers with one being
the Domain Controller
„
„
4.2.0
4.2.1
Domain Name System (DNS) Server
„
IP Address
„
Secondary IP Address
„
DNS Domain Name
Email Notification Settings
„
Email Sender
„
Email Recipient
„
SMTP Server Address
Installing the NVFR Virtual-Based Appliance
Importing the Image
1. After you download the file that you need to set up the NVFR Virtual-Based
Appliance, unzip it.
You will see the following files in which n.n represents the current version:
„
nvfr n.n(VA).ovf
„
nvfr n.n(VA)-disk1.vmdk
„
nvfr32_setup.exe
„
nvfr64_setup.exe
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
25
2. Launch VMware.
Depending on the VMware version being used, the VMware Infrastructure
Client window or vSphere Client window appears. This section uses
examples from the vSphere Client.
3. Do one of the following:
„
If you are using VMware Infrastructure Client, click File > Virtual
Appliance > Import.
„
If you are using vSphere Client, click File > Deploy OVF Template.
Figure 4-1:
vSphere Client
window
4. Do one of the following:
Figure 4-2:
Source dialog
„
If you are using VMware Infrastructure Client, in the Import Location
dialog, select Import from file, and click Browse.
„
If you are using vSphere Client, in the Source dialog, select Deploy from
file, and click Browse.
26
Chapter 4
Configuring the Virtual-Based Appliance
5. Locate and select the vmware-appliance.ovf file, and then click Next.
6. When the Virtual Appliance Details (VMware Infrastructure Client) or OVF
Template Details (vSphere Client) dialog appears, click Next to continue.
Figure 4-3:
OVF Template
Details dialog
7. In the Select a Name and Location for this Virtual Appliance (VMware
Infrastructure Client) or Name and Location (vSphere Client) dialog, enter a
name for the NVFR Virtual-Based Appliance in the Name box, and click Next.
Figure 4-4:
Name and
Location
dialog
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
27
8. In the Choose a Datastore for the Virtual Appliance (VMware
Infrastructure Client) or Datastore (vSphere Client) dialog, select the
applicable datastore, and click Next.
Figure 4-5:
Datastore
dialog
9. In the Ready to Complete dialog, click Finish to proceed with the import
process.
Figure 4-6:
Ready to
Complete
dialog
28
Chapter 4
Configuring the Virtual-Based Appliance
A progress message appears while the import is processed.
Figure 4-7:
Progress
message
10.When the Deployment Completed Successfully dialog appears, click
Close.
Figure 4-8:
Deployment
Completed
Successfully
dialog
Note: You can improve NVFR Server performance and increase the number of
Data Sets that you can protect by increasing the memory of the Virtual-Based
Appliance. BakBone recommends allocating 1GB per Data Set. (If you want to
increase the number of Data Sets, you must also request an update to your
License Key.)
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
4.2.2
29
Completing the Initial Setup
1. In the left pane of the VMware Infrastructure Client or vSphere Client window,
select the NVFR Virtual-Based Appliance that you created during the import
process.
Figure 4-9:
NVFR VirtualBased
Appliance
selected
2. In the right pane, select Console.
3. In the toolbar, click Play.
4. When the Initial setup procedure prompt appears, follow the prompts, and
enter the following parameters:
Important: Ensure that the Configuration Details have been collected as detailed
in Collecting Configuration Details on page 24 before starting the configuration of
the NVFR Virtual-Based Appliance to ensure that the configuration interface does
not time out.
a. Public LAN Interface IP Address:
Please enter a valid IP Address [172.30.1.100]:
Type the NVFR IP Address, and press Enter.
30
Chapter 4
Configuring the Virtual-Based Appliance
b. Public Interface IP subnet mask:
Please enter a valid subnet mask [255.255.255.0]:
Type the Subnet Mask Address, and press Enter.
c. Public interface default route IP Address:
Please enter a valid IP address [172.30.1.1]:
Type the Default Gateway Address, and press Enter.
d. Server Name:
Please enter server name:
Type the NVFR Server Name, and press Enter.
e. Do you want to accept the values entered above <y/n> [y]:
Type Y, and press Enter.
Figure 4-10:
Initial setup
procedure
prompt
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
4.3.0
31
Configuring the NVFR Virtual Server
Use the NVFR Management Console to configure the NVFR Virtual Server and
protected servers, initiate recoveries, and browse protected data. The NVFR
Management Console exports Data Sets for integration with traditional backup
applications such as NVBU. You can also use the NVFR Management Console to
retrieve diagnostic information.
4.3.1
Logging On the NVFR Management Console
1. After configuring the NVFR Virtual-Based Appliance, access the NVFR
Server via the NVFR Management Console at:
http://<NVFRServerIP>
2. On the NVFR Logon dialog, enter admin for the user name and bakbone for
the password.
Figure 4-11:
NVFR Logon
dialog
3. In the Log on to list, select LOCAL, and click Login.
The NVFR Management Console home screen appears.
4.3.2
Configuring Email Notification
1. In the NVFR Management Console, click Diagnostics in the left pane.
2. In the Alert Configuration frame, enter the required settings:
Figure 4-12:
Alert
Configuration
screen
„
Alert email Sender
„
Alert email Recipient
„
SMTP Server Address
32
Chapter 4
Configuring the Virtual-Based Appliance
3. Click Commit Changes to save the configuration.
4.3.3
Creating the NVFR Virtual Server
1. In the NVFR Management Console, click Setup Wizard in the left pane.
2. On the Welcome dialog, click Next.
Figure 4-13:
NVFR Virtual
Server Setup
Wizard
Welcome
dialog
3. When the End User License Agreement dialog appears, review the license,
select Click here to accept the EULA, and click Next.
Figure 4-14:
End User
License
Agreement
dialog
4. When the Create Virtual Server dialog appears, with the currently
accessible volume devices listed, click the radio button of the volume device
to be used for NVFR Online Storage.
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
33
The Virtual Server Setting fields for the volume device display.
Figure 4-15:
Create Virtual
Server dialog
5. In the Name for Virtual Server field, enter a user-defined name of the NVFR
Virtual Server.
6. In the Name for Volume field, enter a user-defined name of the NVFR
Storage Volume.
7. In the Volume Type list, select Combined.
8. Click Next.
The Public Network Settings dialog appears.
Figure 4-16:
Public Network
Settings dialog
34
Chapter 4
Configuring the Virtual-Based Appliance
Note that the fields are pre-populated with default addresses detected by
NVFR during installation, including:
„
Public Subnet Mask
„
Default Route
„
DNS Server(s)
„
DNS Domain
„
Name Service Port Number
Important: Changing the default addresses populated by the wizard during this
Virtual Server creation procedure requires that all NVFR Agents be identically
configured.
9. Enter the NVFR Virtual Server Virtual IP Address, and click Next.
10.On the Time and Date dialog, enter the IP address (or multiple addresses) in
the NTP Server(s) field.
Note: The NVFR Virtual Server relies on NTP to maintain time consistency across
the NVFR Servers, and it requires a local source of time synchronization to ensure
consistency between the protected machines and the NVFR Virtual Server.
BakBone recommends that: 1) the NVFR use the same time source as the
protected machines, and: 2) that you specify more than one server to ensure
stability. Typically this time source is the Windows Active Directory Domain
Controller. Should this time source ever change, you must reconfigure NVFR to
reflect that change.
Figure 4-17:
Time and Date
dialog
11. Use the drop-down lists to select a Timezone, and then click Next to
continue.
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
35
12.On the Authentication dialog, enter the Kerberos settings, select the Use
HTTPS for user interface check box if you want secure access to the NVFR
Management Console, and click Next.
Note: The FQDN of the network is usually the Kerberos Realm name.
If you choose to use HTTPS, a TLS certificate is created for each NVFR Server
and for the Virtual Server. You must instruct the browser to trust these certificates
when you open the Virtual Server via a browser window.
Figure 4-18:
Authentication
dialog
13.On the Virtual Server Private Network Settings dialog, select the No
Virtual Server Private LAN check box.
36
Chapter 4
Configuring the Virtual-Based Appliance
The NVFR Virtual-Based Appliance does not support multiple NVFR Servers
in the Virtual Server.
Figure 4-19:
Virtual Server
Private
Network
Settings dialog
14.On the NVFR Server Specific Configuration dialog, update the NVFR
Server Name, and, optionally, modify the NVFR Server Public IP Address.
The name that you enter is used in the NVFR Management Console to
represent this NVFR Server.
Figure 4-20:
NVFR Server
Specific
Configuration
dialog
15.Click Finish to create the NVFR Virtual Server.
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
37
16.When the Virtual Server successfully created dialog appears, make note
of the Virtual IP Address and Port Number for later use in the installation of
NVFR Agents.
Figure 4-21:
Success
dialog with IP
Address and
Port Number
displayed
17.Click OK to dismiss the wizard.
The process of NVFR Virtual Server creating may take a few minutes. The
status bar in the upper-left area of the NVFR Server console switches from
RED to YELLOW to GREEN to signal that the NVFR Virtual Server is
operational.
During the process, the status moves through the following states:
„
OFFLINE
„
MONITOR
„
FORMING
„
SERV_START
„
SERV READY
„
VIRTUAL READY
Note: Occasionally the state may toggle from SERV_START to FORMING while
the NVFR Virtual Server is looking for time synchronization.
18.Log off the NVFR Management Console by clicking Logout in the upper-right
corner.
38
Chapter 4
Configuring the Virtual-Based Appliance
4.3.4
Configuring Access
NVFR supports several types of logon structure. Select the type that is appropriate
for your current environment. (If your environment changes, you can also change
NVFR access accordingly.)
4.3.4.a
„
Active Directory – If your environment uses Active Directory, BakBone
recommends that you select this option.
„
Generic LDAP – If your environment does not use Active Directory but does
use LDAP, select this option.
„
NVFR Standalone – If your environment does not use Active Directory or
LDAP, or if you want NVFR to manage authentication, select this option.
Configuring Access for Active Directory
To configure access to NVFR, perform the following steps:
Note: If you change your logon structure (switch from LDAP to Active Directory or
from Active Directory to LDAP) for any reason, be aware that NVFR will
automatically restart the CIFS Service on each NVFR Server. When switching to
Active Directory, you must supply the Administrator password on each NVFR
Server to join each NVFR Server to the Windows Domain.
1. Access the NVFR Server via the NVFR Management Console at:
http://<NVFRVirtualServerIP>
2. On the NVFR Logon dialog, enter admin for the user name and bakbone for
the password.
3. In the Log on to list, select LOCAL, and click Login.
The NVFR Management Console home screen appears.
4. On the horizontal menu bar, click Configure Access.
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
39
5. On the Configure Access dialog, select Active Directory from the
Directory type list.
Figure 4-22:
Configure
Access dialog
for Active
Directory
6. In the Windows realm field, enter the name of the Windows Domain
(FQDN).
This is the FQDN name of the domain that is used to authenticate NVFR
users.
7. In the Administration user field, enter the Domain Administrator’s user
name.
Note: The user must have sufficient privileges for read access to the various
groups in the domain.
8. In the Administration password field, enter the Domain Administrator’s
password.
9. Select the Security Groups with access to NVFR from the existing Domain
Security Groups displayed in the dialog when the Select button is clicked.
Figure 4-23:
Windows
Domain Group
dialog
40
Chapter 4
Configuring the Virtual-Based Appliance
„
Group with administration privileges – This Security Group has full
NVFR administration rights, including the ability to initiate protection and
restores. All members of this group have the ability to administer NVFR
and are considered NVFR Administrators.
„
Group with monitoring privileges – This Security Group only has the
ability to monitor NVFR. This group is unable to initiate protection of
restores or administer the NVFR Virtual Server.
„
Group with CIFS view privileges – This Security Group has the ability to
mount Data Sets using CIFS views.
10.Click Save to enact the Access configuration.
11. Log off the NVFR Management Console by clicking Logout in the upper-right
corner.
4.3.4.b
Configuring CIFS Views in an Active Directory Environment
You can make NVFR data accessible to Windows clients by CIFS views for
protected Data Sets. To enable the CIFS View functionality, you must configure
CIFS on the NVFR Virtual Server by performing the following steps:
1. Access the NVFR Server via the NVFR Management Console at:
http://<NVFRServerIP>
2. On the NVFR Logon dialog, enter admin for the user name and bakbone for
the password.
3. In the Log on to list, select LOCAL, and click Login.
4. On the horizontal menu bar, click Server: <LocalNVFRServerName>.
5. Expand <LocalNVFRServerName>, and click CIFS in the left pane.
6. If you want to set parameters on all NVFR Servers that are currently running
on the NVFR Virtual Server, select the Set Virtual Server Wide check box in
the CIFS Configuration frame.
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
41
Figure 4-24:
CIFS
Configuration
screen
7. In the Windows Domain field, enter the name of the Windows/NetBIOS
Domain in which this NVFR Server will be used.
This is not a fully-qualified Internet domain name but a Windows Domain
name, such as MYDOMAIN.
Note: The Windows Domain field accepts uppercase and lowercase letters,
numbers, and these special characters: ! @ # $ % ^ & ( ) - _ ' { } ~
8. For Windows Realm, enter the fully-qualified Windows realm, such as
MYDOMAIN.COM.
9. In the Administrator Username and Administrator Password fields, enter
the information for the user of the domain that you specified in the Windows
Domain field.
This user must have sufficient privileges to add the NVFR Server to the
Windows Domain.
Note: The Administrator Username field does not accept these special
characters: " / \ [ ] : ; | = + * ? < > %
The Administrator Password field does not accept this special character: %
10.Click Configure CIFS.
4.3.4.c
Configuring Access for an LDAP Environment
NVFR Management Console access can be set up with a wide variety of LDAP
schemas. CIFS access for data view use requires an LDAP schema compatible
with Samba. For Samba configuration details, refer to:
http://www.samba.org/samba/docs/man/Samba-HOWTO-Collection/
passdb.html
42
Chapter 4
Configuring the Virtual-Based Appliance
In the discussion that follows, the LDAP Server is configured using examples from
Figure 4-26 and Figure 4-25.
Figure 4-25:
LDAP Server –
users
Figure 4-26:
LDAP Server –
groups
Important: If you configure NVFR access to use the Generic LDAP option, be
aware that the Samba package used by the NVFR Server to present data views
requires that your LDAP Server is configured with the nis.schema, along with
several other schemas. The nis.schema does not support multibyte characters. If
you need multibyte-character support for user IDs, you must modify the syntax for
the memberUid field. You must update the memberUid attribute to use the
DirectoryString syntax (OID=1.3.6.1.4.1.1466.115.121.1.26) instead of using the
default International Reference Alphabet No. 5 (IRA5, formerly known as
International Alphabet No. 5 or IA5) character set.
To configure access to NVFR, perform the following steps:
1. Access the NVFR Server via the NVFR Management Console at:
http://<NVFRServerIP>
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
43
2. On the NVFR Logon dialog, enter admin for the user name and bakbone for
the password.
3. In the Log on to list, select LOCAL, and click Login.
The NVFR Management Console home screen appears.
4. On the horizontal menu bar, click Configure Access.
5. On the Configure Access dialog, select Generic LDAP from the Directory
type list.
Figure 4-27:
Configure
Access dialog
for Generic
LDAP
6. In the Service server field, enter an IP address or DNS name for the LDAP
Server.
7. In the Base DN field, enter the distinguished name for the domain.
8. In the Browse user DN field, enter the user ID for a user with browse access
rights to the directory.
This user ID is used to access the group information when setting up the
Administration, Monitoring, and CIFS View groups.
44
Chapter 4
Configuring the Virtual-Based Appliance
9. In the Browse user password field, enter the password for the browse user.
10.In the User class field, enter the class for users of this domain.
This is an objectClass attribute that all users who have access to NVFR
share.
11. In the User name field, enter the login name for users of this domain.
This is an attribute that matches the user’s login name.
12.In the User suffix field, enter the information that you append as a prefix to
the Base Distinguished Name (DN) for users of this domain.
This is an attribute that stores user-account information.
13.In the Group class field, enter the class for groups in this domain.
This is an objectClass attribute that all groups share.
14.Scroll down to expose the remaining fields on the dialog.
15.In the Group name field, enter the group name.
This is the type of attribute in which the group name is stored.
16.In the Group member field, enter the group member.
This is the name of the attribute where users in the group can be found.
17.If applicable, select one of the following from the Group member type list:
„
If you want to have only the user name entered and users found and
validated via the user class, user name, group member fields, and so on,
select User login id.
„
If you want the full user distinguished name specified on login operations,
select User DN.
18.In the Group suffix field, enter the information that you append as a prefix to
the Base DN for groups in this domain.
This is an attribute that stores group-mapping information.
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
45
19.In the Security Groups with access to NVFR section, click the applicable
Select button, and then select the corresponding groups.
Figure 4-28:
Windows
Domain Group
dialog
„
Group with administration privileges – This Security Group has full
NVFR administration rights, including the ability to initiate protection and
restores. All members of this group have the ability to administer NVFR
and are considered NVFR Administrators.
„
Group with monitoring privileges – This Security Group only has the
ability to monitor NVFR. This group is unable to initiate protection of
restores or administer the NVFR Virtual Server.
„
Group with CIFS view privileges – This Security Group has the ability to
mount Data Sets using CIFS views.
20.Click Save to enact the Access configuration.
21.Log off the NVFR Management Console by clicking Logout in the upper-right
corner.
4.3.4.d
Configuring CIFS Views in an LDAP Environment
You can make NVFR data accessible to Windows clients by exporting protected
Data Sets. To enable the export functionality, you must configure CIFS on the
NVFR Virtual Server by performing the following steps:
1. Access the NVFR Server via the NVFR Management Console at:
http://<NVFRServerIP>
2. On the NVFR Logon dialog, enter admin for the user name and bakbone for
the password.
3. In the Log on to list, select LOCAL, and click Login.
4. On the horizontal menu bar, click Server: <LocalNVFRServerName>.
5. Expand <LocalNVFRServerName>, and click CIFS in the left pane.
46
Chapter 4
Configuring the Virtual-Based Appliance
6. In the Windows Domain field, enter the name of the Windows/NetBIOS
Domain in which this NVFR Server will be used.
This is not a fully-qualified Internet domain name but a Windows Domain
name, such as MYDOMAIN.
Note: The Windows Domain field accepts uppercase and lowercase letters,
numbers, and these special characters: ! @ # $ % ^ & ( ) - _ ' { } ~
Figure 4-29:
CIFS
Configuration
screen
7. Click Configure CIFS.
4.3.4.e
Configuring Standalone Access and Adding Users
You can configure standalone access to the NVFR Management Console, and
then use the Users screen to add, update, and remove individual users. If you
select this option, NVFR uses a built-in LDAP server to authenticate users.
1. Access the NVFR Server via the NVFR Management Console at:
http://<NVFRServerIP>
2. On the NVFR Logon dialog, enter admin for the user name and bakbone for
the password.
3. In the Log on to list, select LOCAL, and click Login.
The NVFR Management Console home screen appears.
4. On the horizontal menu bar, click Configure Access.
5. On the Configure Access dialog, select NVFR Standalone from the
Directory type list.
Figure 4-30:
Configure
Access dialog
for Standalone
access
6. Click Save to enact the Access configuration.
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
47
A new option, Users, appears in the left pane.
7. In the left pane, click Users.
8. In the Manage Users frame, click Add.
Figure 4-31:
Users screen
9. In the Add User frame, complete the applicable fields for the first new user
that you want to create:
„
User ID – Enter a logon ID for the user.
„
First Name – Enter the user’s first name.
„
Last Name – Enter the user’s last name.
„
New Password – Enter a password for the user.
„
Confirm Password – Enter the password again.
Figure 4-32:
Add User
screen
10.Select the check box for each group in which the new user should be
included, and click Commit Changes.
„
Administration – This Security Group has full NVFR administration
rights, including the ability to initiate protection and restores. All members
of this group have the ability to administer NVFR and are considered
NVFR Administrators.
48
Chapter 4
Configuring the Virtual-Based Appliance
„
Monitoring – This Security Group only has the ability to monitor NVFR.
This group is unable to initiate protection of restores or administer the
NVFR Virtual Server.
„
CIFS Viewer – This Security Group has the ability to mount Data Sets
using CIFS views.
11. Repeat Step 9 and Step 10 for each applicable user that you want to add to
the system.
12.Log off the NVFR Management Console by clicking Logout in the upper-right
corner.
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
INSTALLING
Chapter 5:
„
5.1.0
REMOVING
NVFR AGENT
AND
THE
„
49
Protecting a Clustered Environment
™
Installing the NVFR Agent in a Clustered Environment
™
Installing the NVFR Agent for Cluster Continuous Replication (CCR)
Deployments on Exchange 2007
™
Making Sure that Local Continuous Replication (LCR) is Disabled
Protecting an Exchange 2010 Environment
™
Protecting an Individual Mailbox Server
™
Protecting a Single-Location or Multiple-Location DAG Deployment
„
Running the NVFR Agent Setup Wizard
„
Configuring the NVFR Agent on an Active/Passive Cluster
™
Configuring the NVFR Agent in Windows 2003
™
Configuring the NVFR Agent in Windows 2008
„
Using the Windows Performance Monitor Counters
„
Removing the NVFR Agent
™
Uninstalling the Agent from a Single Computer
™
Uninstalling the Agent from a Windows Cluster
Protecting a Clustered Environment
NVFR supports protection for clustered Windows applications in the Active/
Passive configuration and provides co-existence with Active/Active configurations.
In both configurations, the Agent is installed on each node in the Windows Cluster.
„
In the Active/Active case for Windows file system, multiple nodes in the
cluster may be active at the same time. Each application or resource has one
node designated as its primary server, and its data is protected as long as the
application or resource is running on its primary server. If the application or
resource fails over to another node in the cluster, protection is suspended
until the primary server comes back up and the application or resource fails
back to the primary server.
„
In the Active/Passive case, such as SQL Server Failover Clustering or
Exchange Server Failover Clustering or Single Copy Cluster (SCC), only one
50
Chapter 5
Installing and Removing the NVFR Agent
node in the cluster is active at any given time. In the event of a failover to
another node in the cluster, protection will continue without interruption.
Note: NVFR supports the shared nothing model for Active/Active clusters. This is
the default and most common mode for Microsoft Cluster Server and the Windows
Cluster Service. NVFR protects only one host at a time, and a manual operation is
required to re-enable protection on the protected server after a failover.
5.1.1
Installing the NVFR Agent in a Clustered Environment
When installing in a clustered environment, follow the procedure described in
Running the NVFR Agent Setup Wizard on page 55 for each node in the Windows
Cluster. For clusters in the Active/Active configuration, no additional steps are
necessary.
For Active/Passive clusters, you must perform this additional configuration step on
each node in the cluster: Add the Agent as a clustered resource, and configure it to
protect the primary server, as described in Configuring the NVFR Agent on an
Active/Passive Cluster on page 62. If you are protecting a SQL Server, you must
also change the user associated with the NVFR Agent Logon account (for more
information, see Step 15 in the next section, Running the NVFR Agent Setup
Wizard on page 55).
After completing the necessary procedures on each node in the Windows Cluster,
you are ready to initiate data protection via the NVFR Management Console, as
described in the NetVault: FASTRecover Management Console User’s Guide.
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
5.1.2
51
Installing the NVFR Agent for Cluster Continuous
Replication (CCR) Deployments on Exchange 2007
After you have a properly configured Exchange Server CCR environment in place,
you must install the NVFR Agent on all the Exchange Mailbox Servers. When the
Cluster Type dialog appears during installation of the NVFR Agent, make sure that
you select the Active/Passive option.
Figure 5-1:
Exchange
2007 CCR
deployment
NetVault: FASTRecover Server Software
NetVault: FASTRecover Client Software
Exchange Virtual Server
Exchange Mailbox Server
Active Node
Exchange Mailbox Server
Passive Node
NetVault: FASTRecover
Virtual Server
Online Storage
5.1.3
LAN/WAN
Making Sure that Local Continuous Replication (LCR) is
Disabled
NVFR does not support Local Continuous Replication (LCR). Make sure that LCR
is disabled for the applicable Storage Groups/Mailbox Databases. Although NVFR
initially allows you to set up protection on the Storage Group, it stops protection
after a few minutes when it determines that LCR is enabled.
If you forget to disable LCR for a Storage Group/Mailbox Database, perform the
following steps to enable protection again after NVFR stops protecting it:
1. Disable LCR for the applicable Storage Group/Mailbox Database.
2. Add the Storage Group/Mailbox Database to the Exclude List.
For information on using the Exclude List, refer to the NetVault:
FASTRecover Management Console User’s Guide.
3. Remove the Storage Group/Mailbox Database from the Exclude List.
52
Chapter 5
Installing and Removing the NVFR Agent
5.2.0
Protecting an Exchange 2010 Environment
This section provides installation-related information that you should be aware of if
you are installing NVFR in an environment that uses Exchange 2010.
5.2.1
Protecting an Individual Mailbox Server
In the Exchange 2010 Single Mailbox Server environment, you should install the
NVFR Agent on the specific Exchange Mailbox Server. This single NVFR Agent
will protect and recover all the mailbox databases that reside on this individual
Exchange Mailbox Server.
Figure 5-2:
Exchange
2010 Single
Mailbox Server
environment
5.2.2
Protecting a Single-Location or Multiple-Location DAG
Deployment
In a Single-Location Database Availability Group (DAG) Deployment, multiple
Exchange Mailbox Servers exist in a single Active Directory Site and are
physically located in the same Data Center. A DAG is created across multiple
Mailbox Servers with the Database Copies spread across the multiple Mailbox
Servers.
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
53
Figure 5-3:
Exchange
2010 SingleLocation DAG
environment
In a Multiple-Location DAG Deployment, multiple Exchange Mailbox Servers exist
in a single Active Directory Site and are physically located in multiple Data
Centers. A DAG is created across multiple Mailbox Servers with the Database
Copies spread across the multiple Mailbox Servers.
54
Chapter 5
Installing and Removing the NVFR Agent
Figure 5-4:
Exchange
2010 MultipleLocation DAG
environment
In an Exchange 2010 DAG Deployment, you should install the NVFR Agent on
each Exchange Mailbox Server. Each NVFR Agent will protect all the Active
Database Copies that reside on the individual Exchange Mailbox Server. When
the Cluster Type dialog appears during installation of the NVFR Agent, make sure
that you select the Active/Active option.
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
5.3.0
55
Running the NVFR Agent Setup Wizard
This section describes the procedure for installing the Agent on either a
standalone server or on multiple nodes in a Windows Cluster.
1. Copy the applicable file to the system that you want to use as an NVFR
Agent:
„
nvfr32_setup.exe
„
nvfr64_setup.exe
2. Invoke the Agent Setup wizard by locating and unzipping the NVFR Agent
Install file and double-clicking nvfr64_setup.exe (for a 64-bit machine) or
nvfr32_setup.exe (for a 32-bit machine).
3. When the Welcome dialog appears, click Next to continue.
Figure 5-5:
Welcome
dialog
56
Chapter 5
Installing and Removing the NVFR Agent
4. When the License Agreement dialog appears, review the License
Agreement, select I accept the terms in the license agreement, and click
Next.
Figure 5-6:
License
Agreement
dialog
The Custom Setup dialog appears.
Figure 5-7:
Custom Setup
dialog
5. Specify the Installation type by choosing NVFR Agent or NVFR Command
Line.
If applicable, customize the installation by clicking the icon’s arrow button to
display a drop-down list of installation options for either.
Note: The NVFR Command Line installation menu offers the option of disabling
the NetVault Command Line Interface for NVFR (nvc utility). The nvc utility is an
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
57
NVFR Agent command line interface (CLI) that you can use to work with CIFS
Views and set up Replications using Offline Mode.
If you install both the NVFR Agent and the nvc utility, the nvc utility is installed
under: C:\Program Files\BakBone\NVFR\nvc
6. Click Next to continue.
7. On the Cache Folder dialog, accept the default location for the cache, or
click Change to specify a location, and then click Next.
Note: Avoid placing the cache file on a SAN volume.
Figure 5-8:
Cache Folder
dialog
8. On the Log File dialog, specify the maximum Log File Size for the Agent,
and then click Next.
58
Chapter 5
Installing and Removing the NVFR Agent
The log file should be between 64MB and 300MB. The log file is a circular
buffer, so if you make it larger, more information is available for
troubleshooting.
Figure 5-9:
Default Log
File Size
dialog
9. On the NVFR Virtual IP Address dialog, enter the Virtual IP Address that
you assigned when configuring the NVFR Virtual Server, and click Next.
Figure 5-10:
NVFR Virtual
IP Address
dialog
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
59
10.If you are installing the NVFR Agent on a cluster, select the applicable option
when the Cluster Type dialog appears, and click Next.
If this screen appears, you only need to specify what type of cluster is used;
you do not need to indicate which machine (node) is Active and which is
Passive.
Figure 5-11:
Cluster Type
dialog
11. When the Ready to Install the Program dialog appears, verify that the
selected installation settings are correct, and then click Install to begin.
Figure 5-12:
Ready to
Install the
Program
dialog
The Installing NVFR Agent dialog appears, with a status bar indicating the
progress of the installation.
12.When the Wizard Completed dialog appears, click Finish to complete the
NVFR Agent installation.
60
Chapter 5
Installing and Removing the NVFR Agent
Figure 5-13:
Wizard
Completed
dialog
13.When the confirmation prompt for the option of restarting the computer
appears, click Yes to restart the system and enable the NVFR Agent or No to
postpone the restart.
Important: The protected server must be restarted to enable the NVFR Agent.
Figure 5-14:
Prompt to
restart
14.After the computer has restarted, verify that the NetVault: FASTRecover
Agent service is active by typing net start at the command prompt, or by
selecting Start > Settings > Control Panel > Administrative Tools >
Services, and ensuring NetVault: FASTRecover Agent is started.
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
61
15.If the NVFR Agent will be protecting SQL Server in a clustered environment,
complete the following steps to set the NVFR Agent Logon Account to a user
with SQL Server Administrator privileges:
a. With the Services window open, right-click NetVault: FASTRecover
Agent, and select Properties.
Figure 5-15:
Services
window with
Properties
selected for
NVFR Agent
b. On the Properties dialog, select the Log On tab.
Figure 5-16:
Properties
dialog with Log
On tab
displayed
62
Chapter 5
Installing and Removing the NVFR Agent
c. Select This account, and enter the account information for a user that
has SQL Server Administrator privileges.
d. To save your changes and dismiss the dialog, click OK.
If installing on a standalone server, you are now ready to initiate data protection via
the NVFR Management Console, as described in the NetVault: FASTRecover
Management Console User’s Guide.
When installing in a clustered environment in the Active/Active configuration, no
additional steps are necessary.
When installing in a clustered environment in the Active/Passive configuration,
follow the additional configuration procedures described in the next section.
5.4.0
Configuring the NVFR Agent on an Active/
Passive Cluster
When installing in a clustered environment in the Active/Passive configuration,
complete the applicable steps based on which Windows OS you are using.
5.4.1
Configuring the NVFR Agent in Windows 2003
This section explains how to add the NVFR Agent as a clustered resource and
configure it to protect the primary server of a cluster.
Note: This section only applies to Windows file system Active/Passive Clusters,
SQL Server Failover Clusters, and Exchange Server Failover Clusters or SCCs
that use Windows 2003.
The first step is to open the Cluster Administrator MMC console on the primary
server (any machine in the cluster can be the primary server) and add a cluster
resource for the HDRV (NetVault: FASTRecover Agent) service to the same
cluster group as the resource being protected.
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
63
1. Right-click the cluster group, and select New > Resource from the menu.
Figure 5-17:
Cluster
Administrator
window
Note: Figure 5-17 shows a File Server group. Select Exchange or SQL Server if
appropriate.
The New Resource wizard is displayed.
2. Give the new resource a name and description.
a. From the Resource type drop-down list, select Generic Service.
b. From the Group drop-down list, select the same group as the disk.
c. Click the Next button to continue.
3. On the Possible Owners dialog, use the Add or Remove buttons to ensure
that all servers in the cluster are Possible Owners of this resource, and then
click Next to continue.
4. On the Dependencies dialog, assign the appropriate dependency:
„
For a file server, assign the disk as the dependency.
„
For an Exchange Server, assign a dependency to Exchange
Information Store Instance.
„
For a SQL Server, assign a dependency to SQL Server.
5. Click Next to continue.
6. On the Generic Service Parameters dialog, set the Service name to HDRV,
and click Next to continue.
7. When the final dialog appears that prompts for the registry keys to replicate,
enable replication for the registry key:
Software\BakBone Software\HDRV
8. Click Finish to dismiss the wizard.
9. After the NVFR Agent resource has been added, bring it online by rightclicking the resource and selecting Bring Online.
64
Chapter 5
Installing and Removing the NVFR Agent
At this point you are ready to initiate data protection via the NVFR
Management Console, as described in the NetVault: FASTRecover
Management Console User’s Guide.
5.4.2
Configuring the NVFR Agent in Windows 2008
This section explains how to add the NVFR Agent as a clustered resource and
configure it to protect the primary server of a cluster.
Note: This section only applies to Windows file system Active/Passive Clusters,
SQL Server Failover Clusters, and Exchange Server Failover Clusters or SCCs
that use Windows 2008.
The first step is to open the Failover Cluster Management console on the
primary server (any machine in the cluster can be the primary server) and add a
cluster resource for the HDRV service to the same cluster group as the resource
being protected.
1. In the Failover Cluster Management console, select the applicable cluster.
2. In the Actions pane, click Add a resource, and select 4 - Generic Service
from the menu.
Figure 5-18:
Failover
Cluster
Management
window
Note: Figure 5-18 shows a SQL Server group. Select a file system or Exchange
Server if appropriate.
The New Resource wizard is displayed.
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
65
3. On the Select Service dialog, select NetVault: FASTRecover Agent, and
click Next.
Figure 5-19:
Select Service
dialog
4. On the Confirmation dialog, verify that the NetVault: FASTRecover Agent
(hdrv) service is selected, and click Next.
Figure 5-20:
Confirmation
dialog
66
Chapter 5
Installing and Removing the NVFR Agent
5. When the Summary dialog appears that indicates that the resource was
successfully created, click Finish.
Figure 5-21:
Summary
dialog
6. In the Summary pane, under Other Resources, right-click NetVault:
FASTRecover Agent, and select Properties.
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
7. On the Dependencies tab, assign the appropriate dependency:
„
For a file server, assign the disk as the dependency.
„
For an Exchange Server, assign a dependency to Exchange
Information Store Instance.
„
For a SQL Server, assign a dependency to SQL Server.
Figure 5-22:
Dependencies
tab
8. On the Registry Replication tab, complete the following steps:
a. Click Add.
b. On the Registry Key dialog, enter SOFTWARE\BakBone
Software\HDRV, and click OK.
9. Click Apply to save your changes and complete the process.
10.Right-click NetVault: FASTRecover Agent, and select Bring Online.
At this point you are ready to initiate data protection via the NVFR
Management Console, as described in the NetVault: FASTRecover
Management Console User’s Guide.
67
68
Chapter 5
Installing and Removing the NVFR Agent
5.5.0
Using the Windows Performance Monitor
Counters
The files exdaperf<32/64>.dll, sqdaperf<32/64>.dll, and fsdaperf<32/64>.dll
are installed in the C:\WINDOWS\system32 directory. They are used by the
NVFR Agent to produce statistics that measure its performance.
You can access these values using the Microsoft Windows Performance
Monitor (perfmon.exe) to monitor Agent operation.
Note: If you do not start Perfmon and load the counters, the files are not used.
5.6.0
5.6.1
Removing the NVFR Agent
Uninstalling the Agent from a Single Computer
1. Invoke the Agent Setup wizard by locating the file nvfr64_setup.exe or
nvfr32_setup.exe and double-clicking it.
Alternatively, you can use Control Panel > Add or Remove Programs to
remove the NetVault: FASTRecover Agent.
When the installer detects that a previous version of the NetVault:
FASTRecover Agent is currently installed, the first dialog of the NVFR Setup
wizard presents options for uninstalling.
2. Select the Remove the current installation completely option, and click
Next.
The NetVault: FASTRecover Agent is removed from the server.
3. When the confirmation prompt for the option of restarting the computer
appears, click Yes to restart the system and complete the removal or No to
postpone the restart.
Important: The protected server must be restarted to complete the uninstall.
Figure 5-23:
Prompt to
restart
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
5.6.2
69
Uninstalling the Agent from a Windows Cluster
When removing the NVFR Agent in a clustered environment, you must remove the
clustered resource for the Agent (and also for the Application Checkpoint Service
in the case of a SQL Server) before removing the NVFR Agent from each
Windows Cluster node.
Follow these steps:
1. On the primary server, use the Microsoft Cluster Administrator Console to:
„
Take the HDRV resource offline.
„
Remove the HDRV resource.
2. On each physical machine in the cluster, uninstall the NVFR Agent software,
as described in Uninstalling the Agent from a Single Computer on page 68.
70
Chapter 5
Installing and Removing the NVFR Agent
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
UPDATING
6.1.0
71
Chapter 6:
CONFIGURATION
AFTER INSTALLATION
THE
„
Starting the Reconfiguration Utility
„
Updating NVFR Virtual IP Address
„
Updating Cache and Log Directories
„
Enabling Exchange Log Truncation
„
Enabling SQL Server Log Truncation
„
Enabling Data Compression
Starting the Reconfiguration Utility
A utility to update the NVFR Agent configuration after installation is automatically
installed with the NVFR Agent. On the NVFR Client where the NVFR Agent is
installed, launch the Reconfiguration utility by selecting Start > Program Files >
NetVault > NetVault: FASTRecover > NVFR Agent Reconfiguration.
Figure 6-1:
Agent
Configuration
dialog
The configuration parameters are described in the following sections.
72
Chapter 6
Updating the Configuration After Installation
6.2.0
Updating NVFR Virtual IP Address
The IP address for connecting with NVFR is specified when the NVFR Agent is
installed on each computer to be protected. If this IP address must be changed
after installation, you must update each protected machine so it can connect
properly.
To update the NVFR Virtual Server IP address, perform the following steps:
1. In the NVFR Virtual IP field of the Agent Configuration dialog, enter the
new NVFR Virtual IP address.
2. To verify that the IP address you entered can be reached, click Ping.
3. Click Save Configuration.
4. When the Restart Required dialog appears that asks for confirmation to
restart the NVFR Services, click Yes.
5. Repeat this procedure for each NVFR Agent connected to the NVFR Virtual
Server.
6.3.0
Updating Cache and Log Directories
The Reconfiguration utility also provides a way to change the directories used by
the NVFR Agent for temporary files (the Cache directory) or logs (the Logs
directory). You might want to change these directories if the original path
becomes inaccessible or does not have enough space to store the temporary files
or logs.
To change the locations, perform the following steps:
1. Update the Cache directory and Logs directory fields of the Agent
Configuration dialog as desired.
2. Click Save Configuration.
3. When the dialog appears that asks for confirmation to restart the NVFR
Services, click Yes.
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
6.4.0
73
Enabling Exchange Log Truncation
Exchange Transaction Log truncation is used to “clean” the Exchange Server
Storage Groups/Mailbox Databases, thereby improving performance and reducing
the disk space requirements and the time required to recover a database.
Therefore, BakBone recommends enabling Exchange Log Truncation.
Note: BakBone recommends that you enable Exchange Log Truncation prior to
initiating protection for the Exchange Server because enabling Exchange Log
Truncation on an existing protected Exchange Server will cause a
resynchronization of the Exchange Server between the NVFR Agent and the
NVFR Online Storage.
When Exchange Log Truncation is enabled, NVFR uses the following process
for truncating the Exchange Logs.
Figure 6-2:
Exchange Log
Truncation
Time Line
diagram
To enable or disable Exchange Log Truncation, perform the following steps:
1. Click Change next to Exchange Log Truncation to toggle between Enabled
and Disabled.
2. Click Save Configuration.
3. When the dialog appears that asks for confirmation to restart the NVFR
Services, click Yes.
After the NVFR Services are restarted, NVFR performs a resynchronization
of the Exchange Server between the NVFR Agent and the NVFR Online
Storage.
74
Chapter 6
Updating the Configuration After Installation
6.5.0
Enabling SQL Server Log Truncation
If SQL Server log records are not deleted from the transaction log of Full Recovery
Model databases, they eventually fill the disk space that is available to the
physical log files. Log truncation automatically frees disk space for reuse by the
transaction log; therefore, BakBone recommends enabling SQL Server Log
Truncation.
When SQL Server Log Truncation is enabled, NVFR explicitly executes a
checkpoint command every X minutes determined by the SQL Server Log
Truncation Interval. For more information on checkpoints, refer to the
Checkpoints and the Active Portion of the Log section of the SQL Server Online
Books at:
http://technet.microsoft.com/en-us/library/ms189573(SQL.90).aspx
To enable or disable SQL Server Log Truncation, perform the following steps:
1. Click Config next to SQL Server Log Truncation Interval.
2. In the SQL Log Truncation dialog, specify the interval between SQL Server
checkpoint commands by specifying a number from 0 to 10080.
To disable SQL Server Log Truncation, enter 0.
Figure 6-3:
SQL Server
Log Truncation
dialog
3. Click OK to dismiss the dialog, and then click Save Configuration.
4. When the dialog appears that asks for confirmation to restart the NVFR
Services, click Yes.
After the NVFR Services are restarted, NVFR performs a resynchronization
of the SQL Server between the NVFR Agent and the NVFR Online Storage.
NetVault: FASTRecover
Virtual-Based Appliance Quick Start Guide
6.6.0
75
Enabling Data Compression
When Data Compression is enabled, the data transfer between the NVFR Agent
and the NVFR Server is compressed. The Data Compression Level indicates the
level of compression that is performed. Possible values range from 1 to 9 with 9
being the highest level of compression. The higher compression levels will require
more CPU usage on the protected server. In general, BakBone recommends
using a Data Compression Level of 3 to reduce the amount of data transferred
without greatly impacting CPU resources on the protected server.
To enable or disable Data Compression, perform the following steps:
1. Click Config next to Data Compression Level.
2. In the Data Compression dialog, specify the level of Data Compression by
specifying a number from 0 to 9.
To disable Data Compression, enter 0.
Figure 6-4:
Data
Compression
dialog
3. Click OK to dismiss the dialog, and then click Save Configuration.
4. When the dialog appears that asks for confirmation to restart the NVFR
Services, click Yes.
After the NVFR Services are restarted, NVFR performs a resynchronization
between the NVFR Agent and the NVFR Online Storage.
76
Chapter 6
Updating the Configuration After Installation
Download PDF
Similar pages