Professional Documents
Culture Documents
For Windows
Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes no warranty of any kind with regard to this manual, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. VERITAS Software Corporation shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual. VERITAS Legal Notice Copyright 2003-2005 VERITAS Software Corporation. All rights reserved. VERITAS, Backup Exec, NetBackup, the VERITAS Logo, and Desktop and Laptop Option are trademarks or registered trademarks of VERITAS Software Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. VERITAS Software Corporation 350 Ellis Street Mountain View, CA 94043 USA Phone 650-527-8000 Fax 650-527-2908 www.veritas.com Third-Party Legal Notices Certain third-party software may be distributed, embedded, or bundled with this VERITAS product or recommended for use in connection with its installation and use. Such third-party software is separately licensed by its copyright holder. Licenses that govern the use of the third party software included in the VERITAS product and proprietary notices of the copyright holders are listed in the Administrators Guide
ii
Contents
Determine Desktop Backup Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi Determining Hardware Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .vii Network Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .vii Centralized vs. Distributed Administration Servers . . . . . . . . . . . . . . . . . . . . . . . . viii Administration Server Hardware Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix Determining Which Database to Use . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix File Server Hardware Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x Sizing Method 1 - Calculation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x Sizing Method 2 - Pilot Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x Additional consideration for File Server Sizing . . . . . . . . . . . . . . . . . . . . . . . . . . . xi Sample File Server Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi Profile Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv Determine What to Back Up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv Backup strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv Determine When to Back up Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi Default Global Excludes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi Desktop Agent Rollout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xvii Installing the Desktop Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xvii MDAC 2.7 or 2.8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii Setting a Recovery Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii Desktop Agent Installation Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi
iii
iv
Administrators Guide
The VERITAS Desktop and Laptop Option (DLO) is an easy to use tool which provides automated file protection for desktops and laptops (collectively referred to as desktops). This Best Practices Guide summarizes VERITAS recommendations for planning and deploying both Backup Exec DLO and NetBackup DLO. For detailed information on using DLO, see the Backup Exec Administrators Guide or the NetBackup DLO Administrators Guide. To take full advantage of all of the benefits it can bring to your organization, VERITAS recommends that you do the following before fully implementing DLO: 1. Determine desktop backup requirements. 2. Determine the most effective hardware configuration and storage requirements based on the size of your enterprise, the current network environment, IT resources and requirements as well as the needs of the desktop users. 3. Create Profiles to meet the different needs of particular user subgroups. For example, mobile users who back up their laptop computers through dial up connections usually have different needs than their colleagues on LAN-connected workstations. 4. Roll out the Desktop Agents gradually. A gradual rollout spreads the impact of the first backup over a greater time period, while providing an opportunity to identify and resolve any issues that arise. To use DLO effectively, it is important to consider network capacity, the types of desktop users and how they connect to the network, when to back up data, data types and criticality, and other factors that will help to address specific user needs. In addition, you will want to decide who will have control over the backup process. DLO uses a policy-based configuration mechanism called a Profile to manage backups for groups of similar users. Desktop and laptop users are assigned to a Profile in which the DLO administrator grants or restricts user rights to control data protection for a desktop computer. DLO provides default Profiles for both desktop and laptop users and allows customization of Profiles to meet the needs of various user groups.
How many desktop and laptop users do you have, and are they located on the LAN or WAN relative to the administration and file servers? Do users currently back up data manually to network shares? If you have users in multiple locations, is there IT support locally, or is it centralized?
Profile Configuration
How can users be grouped to take advantage of common characteristics? For example, users working with vital technical or regulatory information that is constantly changing may require more frequent backups than users who do not work with critical data. What is the quantity of data to be stored? What type of data do you want to protect? Will it be specific file types such as .doc or .pdf files, specific folders, or a combination of both? What data should be excluded from backups? How many versions of each file should be retained? How frequently do you want to back up user data? Will backups be scheduled or will they be performed as files change?
The answers to the questions above will guide decisions regarding hardware and network configuration as well as determining how Profiles will be designed to customize backups. The most successful large deployments of DLO use a pilot process to determine backup requirements.
vi
Network Configuration
The backup of desktop computers impacts the network and servers, and can be impacted by a number of factors including the physical location of the desktop in relation to the file server, the type of connection and link speed between the desktop and file server, the number of desktop computers backed up at each site, and the number of hops. In geographically dispersed organizations, it may be desirable to have a file server at each location. Maximizing the number of desktop users who back up to local servers reduces WAN traffic and increases data transfer efficiency.
Sample Network Configurations for a DLO Installation Network Configuration Description Single Site Administration and Storage Where centralized administration is desired, single or multiple file servers can be located and administered at a centralized location. This can enhance uniformity of implementation and reduce the need for multiple support organizations.
vii
Determining Hardware Configuration Sample Network Configurations for a DLO Installation (continued) Network Configuration Description Multiple Sites With Centralized Administration In geographically dispersed organizations, it may be desirable to use local file servers with centralized DLO administration. This allows for optimized backup speed while providing centralized administration. Some local IT support may be necessary for local server administration, but most DLO administrative tasks can be performed remotely.
Multiple Sites with Independent Administration In widely dispersed organizations with strong IT support at each location, it may be desirable to have DLO administration and file servers for each LAN. This allows for improved customization, desktop user support and optimum data transfer speed.
Cons
Single point of management and configuration. Single DLO database for backup and disaster recovery purposes. Isolates administrative traffic to the local network. Provides local, independent control.
May require traffic over WANs for agent updates, loading and saving configuration settings, periodic Agent status updates, and alert data. No centralized management of DLO users and profiles.
Distributed
viii
Cons
Free Unless you back up more than 1000 Desktop Agents per Administration Server, MSDE should be sufficient for most needs. Allows reasonable scalability beyond 1000 Desktop Agents. Database tools are included with SQL Server
The number of concurrent connections to the database is limited, resulting in slower I/O to the database under load. 2GB table size maximum, although DLO is unlikely to reach this limit. - Requires some manual configuration for NBU-DLO to work with SQL Server - Cost, however you do not need to purchase a SQL Server client license for each Desktop Agent.
SQL Server
ix
1. The actual compression ratio will vary depending on the type of data backed up and should be verified.
x DLO Best Practices
xi
The number of Desktop Agents supported on each system are listed below and are dependent on concurrency ratios, which represent the percentage of clients that will be backing up to the server simultaneously. These numbers apply to day-to-day backups and
xii
do not represent the number of Desktop Agents that should perform the initial backup simultaneously. See Desktop Agent Rollout on page xvii for additional information on managing the initial Desktop Agent backup.
Desktop Agents Supported on Various Systems Configuration Light Load 10 MB/day # of Users 1000 Standard Server
Medium Load High Load 50 MB/day 100 MB/day # of Users 1000 # of Users 1000
High Concurrency Ratio: 5% Medium Concurrency Ratio: 2.5% Low Concurrency Ratio: 1%
High Concurrency Ratio: 5% Medium Concurrency Ratio: 2.5% Low Concurrency Ratio: 1%
xiii
Profile Setup
Profile Setup
DLO uses Profiles to apply settings to groups of similar desktop users. Profiles allow customization of the backup environment by the DLO administrator. Desktop users can be assigned to Profiles automatically based on their domain and group, or they can be individually assigned to Profiles by the DLO administrator. Using Profiles, the DLO Administrator can: Determine What to Back Up on page xiv Determine When to Back up Data on page xvi
Global Excludes are specified by the administrator in the DLO Administration Console and apply to every Backup Selection. Files and folders specified in a Global Exclude are never backed up. Backup Selection Excludes apply only to the specific Backup Selection in which they are created.
Excludes always take precedence over includes. For example, if you have a Backup Selection for the C:\Data directory, but exclude the C:\Data\junk folder in the same Backup Selection, nothing will be backed up in the C:\Data\junk folder, even if some files match a specified include. VERITAS recommends that you use a Backup Selection exclude if a specific Profile requires an exclude, but users of other Profiles may have a need to back up the directory or file type. Global Excludes should be used when the directory or file type should never be backed up.
Backup strategies
There are two options for includes and excludes in each Backup Selection:
xiv
Profile Setup
Everything But Strategy When you choose Include All File Types in a Backup Selection, all files in the selected folder are backed up unless the file type is specifically excluded in the global exclude list. Use this option when:
file types and locations will vary across your environment. you have little control over the desktop environment you want to protect all data, even if it increases costs and storage requirements. The broad scope of backups may require significant storage space. To determine what to exclude, look at the pending files during a backup, or look at what is taking up space in the Network and Desktop User Data Folders. This will help to refine the excludes.
Things to consider:
Include Only Strategy When you choose Include and exclude only the items listed below in the Backup Selection, you create a custom list of file types that will be included or excluded. If no includes are specified when the Backup Selection is created, a * include is added and all files that are not specifically excluded are backed up. If a specific include is later specified, the default * selection is removed and only those files or folders specifically included are backed up. For example, if you create a Backup Selection for C:\Data and select include and exclude only the items listed below, but do not provide any specific includes, all files not specifically excluded by the Backup Selection or Global Excludes will be backed up. If you later add an include such as *.doc, then the only files that will be backed up are the *.doc files. Use this option when: you want to tailor the scope of backups to meet specific organizational needs. you need to specifically target the backup scope to reduce the amount of data backed up. Users may store data in non-standard locations or outside the selected backup area. Care must be taken to insure that data is adequately protected by the defined backup scope.
Things to consider: -
xv
Profile Setup
xvi
Logon scripts
Note Desktop Agent users are assigned to a specific server during the Desktop Agent installation. If you deploy DLO using multiple Administration Servers, you will need to install the Desktop Agents using the install set from the appropriate server.
xvii
xviii
Silent installation.
Note For a completely silent install, you will need to run setup.exe /s after modifying the SETUP.INI file.
/qb!
Examples: For a silent installation, edit CmdLine in the SETUP.INI file as follows: Original: CmdLine=/qf DEFAULTMEDIASERVER=Desktop3 LAUNCHCLIENT=1 /l*v %TEMP%\DLOAgentInstall.log Modified: CmdLine=/qn DEFAULTMEDIASERVER=Desktop3 LAUNCHCLIENT=1 /l*v %TEMP%\DLOAgentInstall.log For an installation with a basic interface but no option to cancel the installation, edit CmdLine in the SETUP.INI file as follows: Original: CmdLine=/qf DEFAULTMEDIASERVER=Desktop3 LAUNCHCLIENT=1 /l*v %TEMP%\DLOAgentInstall.log Modified: CmdLine=/qb! DEFAULTMEDIASERVER=Desktop3 LAUNCHCLIENT=1 /l*v %TEMP%\DLOAgentInstall.log
xix
xx
Index
A administration server configuration viii hardware requirements ix B backup scope xiv D database ix Desktop Agent customizing installation xix install xix installing xvii rollout xvii E excludes xvi F file server choosing xi hardware requirements x G global excludes xvi H hardware file server x hardware configuration vii S server administration viii hardware requirements ix file x silent install xix SQL Server ix R recovery password xviii revision strategies xiv M MSDE ix N network configuration vii topology vi P Profile configuration vi setup xiv I install Desktop Agent options xix installation silent xix installing Desktop Agent xvii
xxi