CV10 Core Fundamentals Course Student Guide - IndexCache Portion Is Very Wrong
CV10 Core Fundamentals Course Student Guide - IndexCache Portion Is Very Wrong
Student Guide
2|
Copyright
Information in this document, including URL and other website references, represents the current view
of CommVault Systems, Inc. as of the date of publication and is subject to change without notice to you.
Descriptions or references to third party products, services or websites are provided only as a
convenience to you and should not be considered an endorsement by CommVault. CommVault makes
no representations or warranties, express or implied, as to any third party products, services or
websites.
The names of actual companies and products mentioned herein may be the trademarks of their
respective owners. Unless otherwise noted, the example companies, organizations, products, domain
names, e-mail addresses, logos, people, places, and events depicted herein are fictitious.
Complying with all applicable copyright laws is the responsibility of the user. This document is intended
for distribution to and use only by CommVault customers. Use or distribution of this document by any
other persons is prohibited without the express written permission of CommVault. Without limiting the
rights under copyright, no part of this document may be reproduced, stored in or introduced into a
retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying,
recording, or otherwise), or for any purpose, without the express written permission of CommVault
Systems, Inc.
CommVault may have patents, patent applications, trademarks, copyrights, or other intellectual
property rights covering subject matter in this document. Except as expressly provided in any written
license agreement from CommVault, this document does not give you any license to CommVaults
intellectual property.
COMMVAULT MAKES NO WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED, AS TO THE INFORMATION
CONTAINED IN THIS DOCUMENT.
1999-2014 CommVault Systems, Inc. All rights reserved
CommVault, CommVault and logo, the CV logo, CommVault Systems, Solving Forward, SIM, Singular
Information Management, Simpana, CommVault Galaxy, Unified Data Management, QiNetix, Quick
Recovery, QR, CommNet, GridStor, Vault Tracker, InnerVault, QuickSnap, QSnap, Recovery Director,
CommServe, CommCell, IntelliSnap, ROMS, Simpana OnePass, CommVault Edge and CommValue, are
trademarks or registered trademarks of CommVault Systems, Inc. All other third party brands, products,
service names, trademarks, or registered service marks are the property of and used to identify the
products or services of their respective owners. All specifications are subject to change without notice.
All right, title and intellectual property rights in and to the Manual is owned by CommVault. No rights
are granted to you other than a license to use the Manual for your personal use and information. You
may not make a copy or derivative work of this Manual. You may not sell, resell, sublicense, rent, loan or
lease the Manual to another party, transfer or assign your rights to use the Manual or otherwise exploit
or use the Manual for any purpose other than for your personal use and reference. The Manual is
provided "AS IS" without a warranty of any kind and the information provided herein is subject to
change without notice.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
|3
Table of Contents
(R10.7)
4|
Viewing Job Status ......................................................................................................................... 45
Viewing Schedules.......................................................................................................................... 46
Alerts and Reports.......................................................................................................................... 47
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
|5
Object Based (Subclient) Retention ................................................................................................. 92
Aging Deduplicated Data ................................................................................................................ 94
Understanding Auxiliary Copy......................................................................................................... 95
Using Secondary Copies .................................................................................................................. 96
DASH Copy ..................................................................................................................................... 98
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
6|
Indexes and Image Files ................................................................................................................ 140
Restore Options ........................................................................................................................... 142
Understanding Archive Recall ....................................................................................................... 144
Understanding Full System Recovery ............................................................................................ 146
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Introduction I 7
Core Fundamentals
Introduction Module
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
8 | Introduction
Preliminaries
Who am I?
Who are you?
Why are we here?
How will this course be conducted?
Preliminaries
The value of this course comes from three distinct areas first, the content of the material
which guides your exploration and understanding of the product. Second, the skill of the
instructor to expand on those areas of interest and to add value from their experience with the
product. And lastly, you, the student whose questions and own experiences help not only
yourself but others in understanding how Simpana software can help you with your data
management requirements.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Introduction I 9
Education Advantage
Education Advantage
The CommVault Education Advantage product training portal contains a set of powerful tools to
enable CommVault customers and partners to better educate themselves on the use of the
CommVault software suite. The portal includes:
Training Self-Assessment Tools
Curriculum Guidance based on your Role in your CommVault Enterprise
Management of your CommVault Certifications
Access to Practice Exams and Certification Preparation Tools
And more!
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
10 | Introduction
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Introduction I 11
CommVault Certification
Certified Professional requires passing
Core Fundamentals
Implementation and Maintenance
Certified Specialist
Disaster Recovery
Virtualization
Certified Master
Certification
Prerequistes
CommVault Certification
CommVault's Certification Program validates expertise and advanced knowledge in topics,
including CommVault Core Fundamentals, Implementation and Maintenance, preparing for
Disaster Recovery and more advanced Specialist and Master technologies. Certification is a
valuable investment for both a company and the IT professional. Certified personnel can
increase a company's productivity, reduce operating costs, and increase potential for personal
career advancement.
CommVault's Certification Program has been re-designed to now offer Professional-level,
Specialist-level and Master-level certifications. This new Program provides certification based
on a career path, and enables advancement through the program based on an individuals
previous experience and desired area of focus. It also distinguishes higher-level certification
from lower-level certification as a verified proof of expertise.
Key Points
Certification is integrated with and managed through CommVault's online registration in
the Education Advantage Customer Portal.
Cost of certification registration is included in the associated training course.
Practice assessments are given in class at the end of each module.
Students may take the online certification exam(s) any time after completing the course.
Previous training course students (as validated by the registrar) can also request an
opportunity to take the online assessment exam at no charge.
For those that feel they do not require training, an online assessment opportunity for each
certification level may be purchased separately from the training course.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
12 | Introduction
CommVault Advantage
Point system based on:
ILT and eLearning courses
Certification
Maintenance Advantage
CommVault Advantage
CommVault Advantage is your profile as a CommVault consumer and expert. The CommVault
Advantage system captures your certifications, participation in learning events and courses,
your Forum participation, Support interaction and much more. Through your CommVault
interactions your awarded Profile Points are collected and compared with other CommVault
consumers worldwide. These Profile Points allow our users to thoroughly demonstrate their
Simpana software expertise for personal and professional growth. Login to CommVault
Advantage to check your progress and compare yourself to the Global CommVault community
or create an account today.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Introduction I 13
Monitoring
Job Management
Content
Policies
Protected Storage Resources
Security/Access/Capability
No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
14 | Introduction
Course Objective
To facilitate the understanding of the basic
components, dependencies, and functionality of
Simpana software in performing data
management.
Course Objective
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Introduction I 15
CommServe
Communication
Libraries
Data Protection /
Recovery
MediaAgent
Logical View
Client
Policy Copy
Agent
Default
Policy Copy
Custom
Data Set
Custom
Storage Policy
16 | Introduction
Logical Architecture
CommVaults logical architecture is defined in two main areas. The first area is the logical
management of production data which is designed in a hierarchal tree structure. Production
data is managed using Agents. These agents interface natively with the file system or application
and can be configured based on specific functionality of data being protected. Data within these
agents are grouped into a data set (backup set, replication set, or archive set). These data sets
represent all data the Agent is designed to protect. Within the data set, one or more subclients
can be used to map to specific data. The flexibility of subclients is that data can be grouped into
logical containers which can then be managed independently in the CommVault protected
environment.
The second area is managing data in CommVault protected storage. This is facilitated through
the use of storage policies. Storage policies are policy containers which contain one or more rule
sets for managing one or more copies of protected data. The first rule set is the primary copy.
This copy manages data being protected from the production environment. Additional
secondary copies can be created with their own rule sets. These rule sets will manage additional
copies of data which will be generated from existing copies within the CommVault protected
environment. The rule sets define what data will be protected (subclients), where it will reside
(data path), how long it will be kept for (retention), encryption options, and media management
options.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Introduction I 17
Training Environment
Training Environment
The CommVault virtual training environment, when available, can be used by students to
perform course activities or explore the products user interface. The training environment is
NOT fully resourced, nor are all components installed or available. All course activities are
supported, but due to host memory (RAM and disk space) constraints, only a limited number of
virtual machines can be operational at the same time and few tasks beyond the activities listed
in the course manual can be performed. Please discuss with your instructor what other
activity/tasks you can do.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
18 | Introduction
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Module 1
Getting Online with
Simpana Software
No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Topics
User Management
System (Client) Owners
Client Computer Groups
Topics
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Google Chrome
Microsoft IE
Mozilla Firefox
Safari
Web based console supported on
major web browsers
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
CommServe server
executes actions
based on script
instructions
Client
Script is initiated
from the client
MediaAgent
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Simpana CLI scripts can be run asynchronously (Set and forget) or synchronously (Wait for
final status). Synchronous execution (default) allows the administrator to have the script take
appropriate and/or further action based on the results of the operation.
Simpana Qscripts are pre-defined SQL scripts that enable you to query and in some cases
directly modify the CommServe database. You can execute QScripts using the qoperation
execscript qcommand.
Simpanas Application Programming Interface (QAPI) is a software development kit designed to
provide programmatic interface for users to perform various operations that can be run using
command line utilities or the CommCell console. QAPI exposes C style APIs which allows users
develop customized client applications, using either C or C++, for UNIX and Windows operating
systems.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
CommCell
Browser
Tool Bar
Content / Summary
Window
Job Controller
Window
Event Viewer
Window
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Tasks View
Right-click for
menu options
Basic Properties
Window
Advanced
Properties
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
User Management
CommCell User
CommCell
User Group
User assigned
to groups
User Groups are
associated with objects
in the browser
Active Directory
User Group
Capabilities are
assigned to groups
User Management
Each CommCell User should have their own login with full or a restricted set of capabilities to
view entities and/or perform tasks.
CommCell Users can be defined internally within the CommCell software or enabled externally
through Microsofts Active Directory or IBMs Domino Directory Server.
The ability of a user to view entities and perform tasks within a CommCell group collective is
managed exclusively via membership in a CommCell User Group.
CommCell User Group(s) are associated with CommCell entities (e.g. Clients, Libraries, Storage
Policies) enabling the member users to perform authorized tasks on those entities only.
A CommCell user can be a member of any number of CommCell User Groups. The users ability
to perform tasks on a CommCell entity is determined by the combined capabilities of the
CommCell User Groups that are associated with that entity. A list of tasks and required
capabilities can be found in product documentation.
External Users/Groups from Microsofts Active Directory or IBMs Domino Directory Service can
be associated with CommCell User Groups. Associated external group members can login to the
CommCell console using their external credentials. Single Sign on can be enabled to allow
external users already logged into the domain to access the CommCell console without reentering their password.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Activity
Security
Operation Window
Reporting
Updates
Job History
Firewall
Security
No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Configured in DR
Backup applet in the
Configure tab
Database and
registry dumped
CommServe
Disk Library
Storage Policy
Tape Library
Standby
CommServe
Backup phase to DR
Storage Policy
Export phase to
UNC path or drive
Backup
The backup process is used to back up the DR metadata to protected storage. This is
accomplished by associating the backup phase with a storage policy. A default DR storage policy
is automatically created when the first library is configured in the CommCell environment.
Although the backup phase can be associated with a regular storage policy it is recommended
to use a dedicated DR storage policy to protect the DR metadata.
DR Storage Policy
When the first library in a CommCell environment is configured a CommServe Disaster Recovery
storage policy will automatically be created. The Backup phase of the DR backup process will
automatically be associated with this storage policy. If the first library configured is a disk library
and a tape library is subsequently added, a storage policy secondary copy will be created and
associated with the tape library.
There are several critical points regarding the DR storage policy and backup phase
configurations:
Although the backup phase can be associated with any storage policy in the CommCell
environment, it is recommended to use a dedicated DR storage policy. Using a dedicated
policy will isolate DR metadata on its own set of media making it potentially easier to
locate in a disaster situation.
The most common reason the backup phase is associated with regular data protection
storage policies is to reduce the number of tapes being sent off-site. If the backup phase
is associated with a regular storage policy consider the following key points:
Make sure the Erase Data feature is disabled in the storage policy. If this is
not done the DR metadata will not be recoverable using the Media
Explorer utility.
When secondary policies are created in the Associations tab of the copy,
an option for the DR metadata will be available. Make sure every
secondary copy contains the DR metadata.
Make sure you are properly running and storing media reports. This is
especially important when sending large numbers of tapes off-site. If you
dont know which tape the metadata is on you will have to catalog every
tape until you locate the correct media which is storing the DR metadata.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
CommServe
FTP
download
Primary cache
location
Client
Clients
Remote cache
location
MediaAgents
Clients
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
To backup a subclient
right-click and select
Backup
a risk that a scheduled backup may run before the dump operations are complete. If the backup
of the dump location is saved as a script, the DBA can call the script once the dump operations
complete ensuring the data is properly protected.
Auxiliary Copy
Auxiliary copy jobs can be scheduled, run on demand, saved as scripts or set for automatic
scheduling. The automatic schedule will use a check frequency (default 30 minutes). Each time
the auxiliary copy runs it checks to see if any data needs to be copied. If no data requires
copying, the job terminates and runs on the next scheduled interval. If data requires copying
the auxiliary copy job will copy the data. This is an effective method of copying data to an offsite location (disk to disk) or copying data to tape when the source copy jobs finish at different
times. This can also be used for short RPOs where data must be copied off-site as soon as
possible. For example: a critical database uses log backups at 15 minute intervals to meet strict
RPO requirements. An auxiliary copy is configured with a 15 minute automatic interval to copy
the log files to an off-site location.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Currently active
jobs and job status
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Viewing Schedules
Viewing Schedules
Client schedules can be viewed and edited from the client, agent, data set and subclient levels.
When a specific level in the client tree is selected, all schedules at the selected level and all child
object schedules will be displayed.
Client schedule key points:
Schedules can be viewed at the client, agent, data set and subclient levels.
If a schedule is associated with a schedule policy the policy name will be listed in the first
column.
Schedules can be edited, deleted, disabled or executed by right-clicking on the job schedule.
For clients with a large amount of scheduled jobs consider using the Job Schedule report for
a more consolidated view.
Though client schedules can be viewed at the CommCell level using the Schedule icon,
viewing schedules in the client tree provides a simplified view easing administration,
especially in large environments.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Module 2
Configuring Simpana
Storage Resources
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Topics
Configure Media Agents
Media Agent Functions
Indexing Structure
Topics
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
CONFIGURE MEDIAAGENTS
Configure MediaAgents
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
MediaAgent Functions
Data Mover
Device Control
Index Manager
Index Cache
Server host
Deduplication
Database host
MediaAgent Functions
Data Mover
MediaAgents are the transition point for data moving on the data pipe to/from the Client Agent
and the data path to/from the protected media. All data moving to/from protected storage
must move through a MediaAgent. As such, resource provisioning for MediaAgent hosts (e.g.
CPU, Memory, and bandwidth) must be significant and adequate for both the volume and the
concurrency of data movement you expect it to handle.
A MediaAgent provides device control over media changers and removable media devices - and
writers to disk devices. This control defines the path upon which data moves to/from protected
storage. In addition to normal device integrity checks, the MediaAgent can validate the
integrity of data stored on the media during a recovery operation and validate the integrity of
the data on the network during a data protection operation.
In the case where the MediaAgent component is co-located on the same host as the Client
Agent, the exchange of data is contained within the host. This is called a SAN MediaAgent
configuration and has its advantages of keeping data off potentially slower TCP/IP networks by
using local higher performance transmission devices (e.g. Fibre Channel, SCSI, etc.). On the
other hand a MediaAgent component located on a host by itself can provide dedicated
resources and facilitate exchange of data over longer distances using TCP/IP (e.g. LAN, WAN,
etc.).
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Indexing Structure
Dedicated Index Cache and
Index Cache Server
MediaAgent
MediaAgent
Index
Cache
MediaAgent
Shared
Index
Cache
Disk
Library
Tape Library
Disk
Library
Tape
Library
Indexing Structure
Simpana software uses a distributed indexing structure that provides for enterprise level
scalability and automated index management. This works by using the CommServe database to
only retain job based metadata which will keep the database relatively small. Job and detailed
index information will be kept on the MediaAgent protecting the job, automatically copied to
media containing the job and optionally copied to an Index Cache Server.
Job summary data maintained in the CommServe database will keep track of all data chunks
being written to media. As each chunk completes it is logged in the CommServe database. This
information will also maintain media identities where the job was written to which can be used
when recalling off site media back for restores. This data will be held in the database for as long
as the job exists. This means even if the data has exceeded defined retention rules, the
summary information will still remain in the database until the job has been overwritten. An
option to browse aged data can be used to browse and recover data on media that has
exceeded retention but has not been overwritten.
The detailed index information for jobs is maintained in the MediaAgents Index Cache. This
information will contain each object protected, what chunk the data is in, and the chunk offset
defining the exact location of the data within the chunk. The index files are stored in the index
cache and after the data is protected to media, an archive index operation is conducted to write
the index to the media. This method automatically protects the index information eliminating
the need to perform separate index backup operations. The archived index can also be used if
the index cache is not available, when restoring the data at alternate locations, or if the indexes
have been pruned from the index cache location.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Transaction logging
The index copy on the Index Cache Server is created by either copying the original index during
the Archive Index phase of the data protection job, or dynamically through transactional log
replay. Transactional logs are sent at the completion of each storage chunk. In the event the
local cache is lost while indexing a job, the job can be restarted at the last transaction
successfully entered on the Index Cache Server.
Shared Index Cache (Network Share)
A Network Share is a designated location on the network where one or more MediaAgents store
their index cache. The Index Cache stored in a network share can be accessed from all
participating MediaAgents. You might use a network share if you have a dedicated partition
created exclusively for Index Cache and you wish to use this partition for index cache sharing.
Ensure that you have enough space to accommodate the index cache from all participating
MediaAgents.
Note: When using a network share, the local index and the shared index are one and the same.
A network disruption might corrupt the index and jobs might have to be restarted due to index
cache failure.
Intermediate Index Cache
It is recommended that the option Enable Intermediate Index Cache Directory be used when
configuring Index Cache on a network share. With this option turned on the index is written to
the local disk first and at commit points uploaded to the Network share. This will avoid failures
due to network disruptions/failures writing to the index on the network share.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Settings
Usage Pattern
Capacity
Allocation
Maintenance
access to the same directory. For UNIX hosted MediaAgents, Network File Share (NFS) protocol
can be used. NFS shared disks appear to the MediaAgent as local drives.
Replicated disk libraries are configured similar to a shared disk library with the exception that
the Shared Disk Device has a replicated data path defined to a volume accessible via another
MediaAgent. Replicated folders are read-only and replication can be configured using
CommVaults ContinuousDataReplicator (CDR) product or third party replication hardware or
software application.
Settings
While there are other settings available, the three most important settings are:
Usage Pattern determines how both writers and volumes are used when more than one data
stream is in action. The default usage pattern is Fill & Spill which will use all writers and the
available capacity of the first mount path before another mount path is used. The alternative is
Spill & Fill which distributes each job stream to different mount paths which can improve
performance if mount paths use different I/O devices.
Usable Capacity is managed through settings for Reserved capacity and Managed Threshold.
Reserve capacity can be set on each mount path to allow maintenance (defragmentation) or use
by other applications. Managed Thresholds are set at the library level and enabled through
associated Storage Policy copies. Managed Thresholds allow the administrator to make
maximum use of available capacity extending retention and thus availability of data in the disk
library.
Allocation management is available through library and mount path settings for the max
number of concurrent writers. Maximum number of allowed writers should be set to prevent
over-saturation of MediaAgent or disk resources. Pushing too many concurrent streams with
inadequate resources can be detrimental to overall throughput.
Another allocation management tool is the fragmentation setting for reserving concurrent
blocks for writing. With concurrent writes to the same disk, fragmentation is a concern that can
impact both restores and auxiliary copy operations.
Maintenance
You can schedule and run an analysis of fragmentation on a disk librarys mount paths. The
results of this analysis can be viewed in the Library and Drive Report. Appropriate tools can
then be used to reduce the fragmentation.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
MediaAgent
Disk Library
2 8 TB Mount Paths
Spill & Fill Configuration
Up to 50 concurrent write streams
Up to 120 TB usable capacity
Deduplication
Database
(DDB)
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Settings
Overwrite Media
Start New Media
Appendable Media
Maintenance
circumstances (exported, stuck tape) it may not be loadable. Default action is to use new
media. While this allows jobs to continue without manual intervention, it could result in some
tapes not being used to full capacity. (See next option!)
Appendable media option allows the continued writing to previously active media that still
have capacity remaining. If for some reason media was not fully used, default action is to make
the unused capacity available next time new media is requested for writing. Appendable media
can only be written to by the same storage policy copy stream and only if the last previous write
occurred within the specified time. These restrictions are there to ensure only similarly
retained data is written to the media.
Maintenance
Maintenance is essential in a tape library as dirty drive heads are common and can make
reading/writing data difficult. Newer libraries have sensors to automatically initiate cleaning
when required. Otherwise, cleaning can be scheduled or conducted based on vendor
recommended thresholds for usage and errors. Selecting the correct cleaning option for your
environment is important.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Read - Media in any logical state can be read if it contains valid data. Valid data is
defined as data obtained by a data protection job that has been logged into the
CommServe metadata. As data is written and tracked in large contiguous files called
chunks, this means data from any recorded chunk can be read regardless of whether
the associated job succeeded, failed, or was killed.
NOTE: Only successful job data is copied during an auxiliary copy operation. As such,
secondary copies do not contain chunks from failed or killed jobs. If numerous failed or killed
jobs exist, an Auxiliary copy job can be sometimes used to consolidate data on fewer media.
Data on the source copy can then be deleted and the associated media freed up for re-use.
Ownership - Assigned media is owned by a Storage Policy copy stream. Once assigned, only
that Storage Policy copy stream is able to write to that media. This ensures consistent retention
and handling of data. Ownership is relinquished when the media is reclassified as spare media.
However, data on aged media in the spare media pool can still be used for restore until the
media has been re-assigned and written to.
Capacity - Capacity is measured in two forms Used and Available. Used capacity is reported
on the properties dialog for each media and is also available in various reports. Its important to
note that with hardware compression enabled for tape drives, the size of the written data
reported is an estimate. Depending upon actual compression, the available remaining capacity
could be more or less than indicated. The CommVault software does not use this estimate in
determining if the tape is full or not. We will always write to the End of Tape marker unless
directed otherwise by system or user interaction.
Special Status
Media can assume special status by user or system action.
Special purpose media can be imported for the purpose of cleaning drives. Cleaning media is
assigned to the Cleaning Media Pool via one of three methods.
If administrators want to prevent a tape from being exported by either manual or automated
operations they can pin the media in the library to Prevent Export.
Barcodes/labels within the CommCell environment must be unique. If you are manually
entering a label the system will automatically append characters to make the label unique. If a
tape is introduced into the system with the same barcode as another existing tape then the
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Media Handling
Need for Unique Identity
Media Handling Prompts
Auto or Manual Discovery
Export Media/Mark Media
Exported
Vault Tracker Feature
Media Handling
While removable media libraries have their advantages, the task of moving media in and out is
not one of them. More properly known as Import and Export tasks, the CommVault software
provides numerous tools for making media handling easier for the administrator.
To facilitate locating the required data or destination media, the software must be able to
uniquely identify all media storage. In a disk library, this unique identity is accomplished through
Volume Folder names. With removable media, its accomplished through unique labels or
Barcodes. This requirement for unique identity is for all media under the CommServe host
control, not just within a single library.
Media handling prompts appear on the controlling MediaAgents host screen and optionally all
CommCell consoles (option enabled in Library properties). Event messages also appear on the
CommCell console. However, most administrators with frequent media handling requirements
will enable notification via the CommCell consoles alert feature.
Discovery is a process by which tapes imported into a library are identified and tracked by the
CommServe database. Auto-Discovery assumes any tape imported into the library belongs to
the CommCell media pool. Manual discovery can be used to selectively add media to the
CommServe database. During the Discovery process an electronic identity is written on the
media. This internal identity is called an On Media Label (OML) and is used to cross check and
verify that the correct tape is loaded in the drive.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Module 3
Defining Simpana Data
Management Policies
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Topics
Understanding Storage Policies
Purpose of Storage Policies
Understanding the Basis of a Policy
Storage Policy Structure
Simpana Deduplication
Dedicated Deduplication Storage Policy
Global Deduplication Storage Policy
Storage Policy Deduplication Settings
Understanding Retention
What is Retention?
Sample Retention Policy
Data Aging and Pruning
Storage Policy Aging Rules
Object based (Subclient) Retention
Aging Deduplicated Data
Topics
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Primary Backup
Primary Snap
Synchronous
Selective
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
SIMPANA DEDUPLICATION
Simpana Deduplication
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Storage Policy
File Server
Database
Server
Storage Policy
Storage Policy Copy
Dedicated Library
and Deduplication
Database
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Clients
Storage Policy
Policy Copy
30 Days
Clients
Global
Deduplication
Storage Policy
Storage Policy
Policy Copy
90 Days
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Block size
Policy copy store settings
Compression
Store availability
Enabling client side deduplication
DASH full / DASH copy
Deduplication Store
Each storage policy copy configured with a deduplication database will have its own
deduplication store. Quite simply a deduplication store is a group of folders used to write
deduplicated data to disk. Each store will be completely self-contained. Data blocks from one
store cannot be written to another store and data blocks in one store cannot be referenced
from a different deduplication database for another store. This means that the more
independent deduplication storage policies you have, the more duplicate data will exist in disk
storage.
Sealing the Store
Performance of the deduplication database is the primary factor in store sealing. If block
lookups take too long, data protection jobs will slow substantially. Sealing the store will start a
new deduplication database which will results in faster data protection jobs but will diminish
deduplication ratios. One reason causing block lookups is that the database has grown too large.
If the environment is designed and scaled appropriately this should not be a problem. Another
reason is that the deduplication database is being stored on slow disks or using inefficient
protocols such as NFS, CIFS or iSCSI. CommVault recommends using high speed dedicated disks
directly attached to the MediaAgent.
It is strongly recommended to contact CommVault support before sealing the deduplication
store.
Block Compression with Deduplication
By default when a storage policy is configured to use deduplication, compression is
automatically enabled for the storage policy copy. This setting will override the subclients
compression settings. For most data types compression is recommended. The process works by
compressing the block and then generating a signature hash on the compressed block. It is
important to note that using Simpana compression for data blocks will ensure the compressed
blocks always results in the same signature. If other compression methods are used then the
signature will be different and deduplication ratios will suffer.
Compression and databases
Most database applications will perform compression on the data before handing it off to the
Simpana database agent. In this case using Simpana compression is not advised as it can cause
the data to expand. With some database applications it can expand considerably. CommVault
strongly recommends using either the application compression or Simpana compression. If
application compression is going to be used, best practice is to use a dedicated storage policy
for the application and disable compression in the deduplication settings.
For Oracle databases advanced table compression is available which may result in dissimilar
hashes being generated each time the database is backed up. This can negate deduplication
completely. Careful consideration should be given to which compression methods should be
used. Though the Oracle compression is extremely efficient it may not always be the best
solution when using deduplicated storage. CommVault strongly recommends consulting with
professional services when deploying CommVault software to protect large Oracle databases.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
UNDERSTANDING RETENTION
Understanding Retention
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
What is Retention?
Available at all stages of
the data protection process
Subclient (Object based
Retention)
Job
Media
Policy
Affected by dependencies of
other data or data management
operations
What is Retention?
The key to understanding how Simpana software manages retention is that the retention
criterion and actions are designed to preclude inadvertent or pre-mature data loss. While
Storage Policy retention is the primary means to retain protected data, there are several other
ways outside of the Storage Policy Copys properties to modify/set retention. These include:
Job based (Subclient) Enables direct control of retention by content for backup and archive
data on the primary storage policy copy.
Job Enables control of retention for individual jobs. Days Retention can be configured in
the job parameters. Job retention can be modified at any point after a job is started. For
Snapshots you can define retention by the number of snaps (jobs).
Media Enables control of retention by hosted media. For disk media you can use Managed
Disk Space and for Tape media you can use the Prevent Overwrite functionality.
Policy Enables control of data by each Storage Policy Copy. Basic and extended retention
settings are available. Use of multiple copies along with association of subclients enables
extremely flexible data management.
Retention is also affected by dependencies of one job on another (e.g. incremental/differential
data depends on the associated full job for full restore. As such, these full jobs may be retained
longer if the associated dependent jobs are retained. In the case of databases, transactional log
backup jobs may be retained if the associated full job is retained. An administrator has control
over how retention is handled in these situations.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
If other data management operations/copies require a job (e.g. content indexing, verification,
secondary copies, it will be retained until all other data management requirements are met.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Disaster Recovery
Versions
Days
Versions
Days
E-Mail
(Database)
2 cycles
14
4 cycles
90
Mailboxes
(Standard)
4 cycles
30
Mailboxes
(VP+)
4 cycles
30
4 cycles
Finance
2 cycles
14
HR
2 cycles
User
(standard)
2 cycles
User
(VP+)
2 cycles
Historical
Versions
Days
90
Monthly Full
Yearly Full
365
1825
4 cycles
90
Monthly Full
Yearly Full
365
1825
14
4 cycles
90
Yearly Full
1825
14
4 cycles
90
14
4 cycles
90
Monthly Full
Yearly Full
365
1825
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
to measure retention in cycles and days. If retention was just managed by days and no backups
were run for a few weeks all backup data may age off leaving no backups.
Rule 4: A Cycle is based on the successful completion of a full or synthetic full backup
A cycle is traditionally defined as a complete full backup, all dependent incremental, differential,
or log backups; up to, but not including the subsequent full. In real world terms a cycle is all
backup jobs required to restore a system to a specific point in time. To better understand what a
cycle is we will reference a cycle as Active or Complete. As soon as a full backup completes
successfully it starts a new cycle which will be the active cycle. The previous active cycle will be
marked as a complete cycle.
An active cycle will only be marked complete if a new full backup finishes successfully. If a
scheduled full backup does not complete successfully, the active cycle will remain active until
such time that a full backup does complete. On the other hand a new active cycle will begin and
the previous active cycle will be marked complete when a full backup completes successfully
regardless of scheduling.
In this way a cycle can be thought of as a variable value based on the successful completion or
failure of a full backup. This also helps to break away from the traditional thought of a cycle
being a week long, or even a specified period of time. In the above example, over a two week
time period there are two cycles. The first started on Friday of week 1 and finished 11 days later
on Monday of week 2. This cycle was marked complete after the Tuesday full from week 2
completed successfully.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
INC
INC
INC
INC
INC
INC
INC
INC
INC
INC
Week 4
INC
FULL
FULL
FULL
INC
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
D
Data blocks from Job 2
H
Block data in
deduplicated storage
before data aging
Block data in
deduplicated storage
after data aging
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
DASH COPY
DASH Copy
DASH copy is an Auxiliary Copy option that provides a fast method of copying data by
transferring only the changed data to a secondary copy (second disk target). This is extremely
useful for creating secondary copies of deduplicated data.
The DASH Copy method is better than the MediaAgent Replication method as it transfers only
the modified data to secondary copy.
The DASH copy option is enabled in a secondary storage policy copys property dialog in the
Deduplication->Advanced Tab.
Disk Read Optimized Copy
Source copy must be dedupe-enabled.
Reads each signature from the respective chunks meta data (which contains the data block
signature).
Sends and compares each signature against the target copys Deduplicated Database (DDB)
If the signature exists, the target copys DDB is updated for a duplicate data block.
If the signature does not exist (unique data block) then that block is copied to the target
copy. The target copys DDB is updated accordingly.
Network Optimized Copy
Source copy can be dedupe-enabled or not.
Reads object data from chunk files to be copied and generates signature.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Module 4
Client Administration
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Topics
Understand Clients
Understanding Client Structure
Understanding Agents
Configure Subclients
Topics
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
UNDERSTAND CLIENTS
Understand Clients
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Hierarchical Control
Client
iDataAgent
iDataAgent
Data Set
Data Set
Subclient
Subclient
Database, TableSpace,
File group, Datafile, File,
Message, document, or
object level
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
CONFIGURE SUBCLIENTS
Configure Subclients
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Archive subclients have additional capability to further define content using Archive rules that
focus on content through characteristics such as time last used and size.
Scanning
Within the constraints of defined content, the actual data to be protected is identified by
scanning the content for objects that meet the criteria of the job type or rules. Full backups
should include all defined content. Incremental backups should include only that data that has
been modified since the last backup.
Several methods are available to identify modified data.
Windows subclient content defined on NTFS 3.0 and later can use the Change Journal as a
means to track modified files. The Change Journal scan is recommended when content is an
entire volume or large subset of a volume.
The most basic scan method is Recusive Scan (formerly referred to as Classic iFind). Recusive
scan uses the file/folder modification and creation times (MTIME/CTIME) to identify modified
files. This scan method is recommended when content is a small number of folders/files. It is
the default method if the content includes non-NTFS volumes (no Change Journal capability),
UNC paths, or volumes with no drive letters.
A third available scan method is Optimal Scan (formerly Data Classification Enabler). Optimal
scan uses a small database with background monitoring to track content. This scan method can
significantly reduce scan time and resource requirements. Optimal scan is recommended when
content is a larger number of files/folders.
MAKE SURE YOU SELECT THE APPROPRIATE SCAN METHOD! Inappropriate scans can delay or
even hang backup jobs.
Locked/Open Content
Not all data is in a state ready for backup. Some files may be in an exclusive state denying the
backup application access. Other files may be available, but not in a consistent state making
them viable for later restore. In these cases, interaction with the file system or application is
required to access the data. Microsoft provides the Volume Shadow Copy Service (VSS) with
application and file system integration specifically for this situation. However VSS is not
available for all Windows versions or applications. For non-Windows file systems, the
CommVault software provides QSnap software which performs the same service.
Even VSS or QSnap software may not be sufficient to access some application data in a
consistent state. For these situations, administrators can employ the subclients capability to
execute pre and post process commands to make the data accessible.
For example: Microsoft SQL Server 6.5 is no longer supported by Microsoft and CommVault
software does not have an SQL 6.5 iDataAgent. However, there are still a lot of functioning
applications using SQL 6.5. CommVault systems can still provide protection using a File System
iDataAgent. A subclient is created to run a pre-scan process command to create a dump of the
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Device streams
Multiple Job streams can be sent to the same mount path or drive pool. For tape devices,
multiplexing allows multiple job streams to be sent to the same device stream.
Options exist on the subclient properties dialog box to facilitate the state of data before it
reaches its storage destination. These options also allow the administrator to determine where
that state change will occur:
Compression can be enabled and is recommended to occur on Clients with low bandwidth
transmission paths or those with data destined for deduplicated storage.
Encryption can also be set on the subclient to occur before, during, or after transmission
depending upon whether the purpose of encryption is transmission or storage related. Note
that Encryption must be enabled at the client level for this option to be available.
Deduplication signature generation and its location can also be enabled. This option only has
affect if the associated Storage Policy is enabled for deduplication. CommVault recommends
deduplication signature generation occur on the client so as to not overtax the MediaAgent
processor which may be handling multiple job streams.
Job streams consume resources on the Client, MediaAgent, Data Paths, and, in the case of LANbased Clients, TCP/IP transmission bandwidth. As often is the case, the transmission media is
not dedicated to the exclusive use of the CommVault software. As such, the subclient has
resource tuning features that can constrain the consumption of bandwidth used to move the
data. This means we can play well with other applications using the network.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Size
State (ReadOnly)
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Stub Management/Retention
Files that are archived are deleted on the source and a stub file left in their place. By default, all
archived files are retained forever. To alter this characteristic you use two features:
First, schedule Synthetic Full backups enable the option to check for deleted stubs.
Second, in the Subclient Properties set the archived files retention value for when their
corresponding stub has been deleted. Retention options are to delete immediately, keep for a
specified number of days, or keep forever.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Application Archiving
Simpana OnePass Agent for Exchange Mailbox
End user Recovery via Outlook, Outlook Web Access, Mobile
device, or Web Console
Domino Mailbox Archiver Agent
Application Archiving
Simpana OnePass Agent for Exchange Mailbox
As with the Simpana OnePass Agent for Windows or Unix, the Simpana OnePass Agent for
Exchange Mailbox enables you to move the mailbox messages to a secondary storage and use
these messages to function as both backup and archive copy. Stubs are retained on the
production storage, which point to the messages that were moved as part of the backup. The
archived messages are available for quick and easy retrieval to administrators and end users.
This integrated agent is also able to selectively age off messages and stubs to reclaim space on
primary and the secondary storage based on message age in the mailbox.
Domino Mailbox Archiver Agent
The Domino Mailbox Archiver Agent periodically moves unused or infrequently used Lotus
Notes Mailbox messages on a host computer to secondary storage. The Domino Mailbox
Archiver Agent provides support for two distinct archiving scenarios:
Migration Archiving: Used to reduce the number of messages routinely backed up to primary
storage by the Lotus Notes/Domino Server iDataAgent.
Compliance Archiving: Used to index messages copied to the journaling mailbox to meet
security and compliance standards.
The Domino Mailbox Archiver Agent provides data protection support for all .nsf mail databases
visible to the Domino Server. However, only databases with alphanumeric names are support
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
First, it reduces the data collection time by excluding the movement of non-essential
data.
Second, it reduces the protected storage footprint from eliminating non-essential data.
And lastly, it reduces the system restore time by not having to restore non-essential
data.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Registry
Boot Files,
including System
Files
User
Profile
System Databases
Performance
Counters
Files protected by WFP
SYSVOL
System Protected Files*
* Optional
No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Topics
Understanding Job Management
What is a Job?
Initiating a Job
Job Priorities
Controlling a Job
Job States
Synthetic Full
DASH Full
Restore Data
Topics
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
What is a Job?
Definition
A Job is a task consisting of one or more phases executed and
managed via the Job Manager Service and appearing in the
Job Controller window
Types
Data Management
Data Recovery
Administrative
What is a Job?
A Job is a task consisting of one or more phases executed and managed via the Job Manager
Service and appearing in the Job Controller window. An exception to this are VaultTracker Policy
jobs which are called actions instead of jobs and these actions appear in the CommCell
Browsers Storage Resources->VaultTracker->Actions window.
Types of jobs include:
Data Management jobs are those jobs that involve collecting data or information from an Agent
on a client. These include Backup, Archive, Replication, Online Content Indexing, and Data
Collection. Some Data Management Jobs are also referred to as Data Protection jobs. Where
applicable, Data management jobs can be further broken down into Full and non-full job types.
Non-full job types are those that cover only new or changed data. This can be object level
changes (e.g. backup) or block level changes (QR Volume Creation).
Data Recovery jobs are those jobs that involve sending data to an agent. This does not
necessarily mean the same agent that provided the data. Data Recovery jobs include Restore,
CDR Recovery, Stub Recall, and Search Restore.
Administration jobs are any other jobs not classified as Data Management or Data Recovery.
Some key Administrative jobs include DR Backup, Auxiliary Copy, Data Aging, Data Verification,
and Backup Copy.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Initiating a Job
Types of Initiation
On Demand (immediate)
Scheduled
Initiating a Job
Jobs are initiated by the user as either on demand (immediate) or scheduled events. Scheduled
jobs are initiated at the set time and frequency by the Job Manager Service. Some jobs can be
saved in script form and executed from the command line. Command line execution allows for
integration with other management applications and coordination with external events.
Scheduling a Job
In the act of defining a job, the user will be given Job Initiation options which include
scheduling. Various schedule patterns and options can be defined. Alternatively, a Schedule
Policy for a job type can be created and then associated with an object. Viewing job schedules
is available at the CommCell level down to the Subclient level. At the CommCell level, the
Scheduler tool can be used to edit an existing job pattern, delete, clone, disable a job schedule,
run immediately, or decouple a Schedule Policy. Decoupling frees a job schedule from the
originating Schedule Policy making the schedule independent and editable for the associated
object. The Scheduler tool also has the option to filter the view by desired scheduled items on
a daily basis per month.
Some administrative jobs (Data Aging, DR Backup) are automatically scheduled by default for a
new CommCell environment. When installing components, adding new subclients or adding
Storage Policy copies, the user will be prompted to schedule the appropriate job. The Job
Schedule Report can be used to list all scheduled jobs. The Job Summary report can also report
schedule information as well as any subclient that has not been scheduled for a job.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Job Priorities
Priority
JobID
166
Preemptable?
20149
166
Preemptable?
Yes
20150
122
Client
Moon
Suspended
20153
Mars
Saturn
Job Controller
Priority
JobID
Client
122
166
20153
20151
Saturn
Wind
166
20151
20152
Wind
Fire
166
122
20152
20153
Fire
Saturn
Job Priorities
Job priority determines the numerical precedence in which the Job Manager assigns storage
resources to a task. Think of it as being served at a Deli counter that uses a ticket system. It
also determines preemption precedence when resources are limited. This means a higher
priority jobs can preempt a currently running job if there are no other resources available.
In the example shown, 2 jobs are running with the default priority. 2 jobs are queued and are
waiting for resources to be freed to start.
When a new job is started with a higher priority (lower number), the job moves to the head of
the queue and it will be the next job to run when resources are available.
If the Backups preempts other backups option in the Control Panels Job Management applet
is selected, the job manager will look for preemptable jobs. Only indexed jobs are preemptable.
It finds a preemptable job, suspends it, and frees up the resource. In this example it will unload
the tape, find the assigned active tape for the new job and load it. When that job completes,
the previous tape gets loaded back and the suspended job will resume.
Example:
-2 jobs are running with the default priority
-2 jobs are queued and are awaiting for resources to be freed to start.
[click]
-A new job is started. It has a higher priority of 122. The smaller the number the higher the
priority.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
[click]
-This job moves to the head of the queue and it will be the next job to start.
If we check Backups preempts other backups in the Job Management applet in the control
panel, [click] the job manager will look for preemptable jobs. Only indexed jobs are
preemptable. It finds a preemptable job and it suspends it and frees up the resource. It will
unload the tape and find a suitable tape and load it. Job 20153 will now start.
When that job complets, [click] the previous tape gets loaded back and the suspended job will
resume.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Controlling a Job
Controlling a Job
There are two primary means to control job start Activity Control and Operation Window.
Activity control disables or enables certain operations. For example, you want to prevent
backups from running while doing maintenance on a server or you dont want users running
restore jobs to that server.
Activity control is available at multiple levels starting from the CommCell environment level
(CommServe Properties) all the way down to the Subclient Properties level. Various types of
job activity can be controlled, with more choices at the CommCell environment level than at
subsequent lower levels.
Disabling activity at a higher level has a cascading effect down to the subclient level. Jobs that
fail to start due to the activity being disabled will be identified as such in the Event Log. As to
whether the job queues waiting for the activity to be enabled that is determined by options set
in the Control Panels Job Management applet.
Operation Windows limit the start and duration of an operation. Operation Windows are also
available at the CommCell environment level (Control Panel Applet) all the way down to the
Subclient task level.
Do Not Run rules can be defined in an Operation Window for a specific job, day of the week,
interval of dates, and from/to time. Operation Windows set as descending levels can optionally
ignore rules set at higher levels. Jobs to which the operation window rules apply will not start
in the Do Not Run intervals. Jobs currently running may be suspended for the interval or
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
allowed to complete. This depends upon the type of job and the options set in the Control
Panels Job Management applet.
There is also a job option that will start a job in a suspended state. Its primary use case would
be in an event-driven scenario where the event cannot be determined by a computer (i.e
human intervention required). In this case, the job must be manually started (resumed) by a
user.
The Job controller allows the user to monitor and control jobs in progress. For scalability, when
many jobs are in progress, the user can filter the view of jobs in the controller and take action
on multiple jobs at the same time.
The columns viewed in the Job Controller can be re-ordered, re-sized, removed or added, and
used as sort criteria for displaying jobs.
User action includes; changing the job priority, adding/deleting/modifying job alert, suspending
the job, resuming the job, killing the job, or resubmitting a failed job. Additional Job details
beyond what is seen in the Job Controller can also be viewed.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Job States
States
Running, Waiting, Pending,
Suspended, Queued, Killed,
Failed, Completed,
Completed with warning, or
Completed with Error
Job History
Used to view jobs no longer
in the Job Controller
Job States
What does XXX Job State mean?
While in the job controller, a job can have various states. These include Running, Waiting,
Pending, Suspended, Queued, Killed, Failed, Completed, Completed with warning, or Completed
with error. Transient states include Dangling Cleanup, Interrupt Pending, Kill Pending, Suspend
Pending, and System Kill Pending. Detailed explanation of each of these states can be found in
Books Online. Running and Waiting are natural job progress states. Pending indicates a phase of
the job has failed to complete successfully and is waiting to be retried. The Queued, Suspended
or Killed state can be initiated by the user or the system. Failed state is when all job retries have
been exhausted. A Dangling Cleanup is a failed phase waiting for the Job Manager Service to
finish associated processed.
Note that jobs that have been Killed, Failed, or Completed with or without Warning or Error
remain visible in the Job Controller for 5 minutes or until the Job Controller view is refreshed
whichever is earlier. This visibility retention time can be modified in the Control Panels User
Preference applet.
If the job is no longer visible in the Job Controller, how do I know its final state?
Once a job has completed, failed, or been killed, its final state can be seen in the Job Summary
Report or viewed in Job History. The Job History view is available from the CommCell level
down to the subclient level. By default, Job History for failed or killed jobs is retained for 90
days. This retention setting can be changed in the Control Panels Media Management applet in
the Data Aging tab. Completed job history is retained as long as the associated data is retained.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
However, some job details (e.g. list of protected files) which are drawn from the JobResults
folder on the client are retained less due to space constraints.
Whats the relationship between Job Phases, Pending state, and Job Retries?
As defined in the question What is a job? a job is made up of one or more phases. The job
manager service initiates each phase and reviews the phases reported completion or failure
before starting the next phase in the job. Failed phases put the job into a pending status.
Depending upon the type of job and phase that fails, the job phase that failed will be retried
or an earlier phase will be the restart point or the job as a whole will be failed.
Default Job Retry settings are defined in the Control Panels Job Management applet. These
settings can also be defined within each the job. You may want to increase the Job Retry
interval or reduce the number of attempts. In addition to retries, the overall time it takes to
complete a job can be defined. This helps to prevent jobs from entering an extended waiting
state which may affect the client system, application, or production data.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Synthetic Full
Uses previous backup to synthesize a new valid full backup
Does not touch the production data
Uses image files to determine which items to carry forward
Synthetic
Full
INC
INC
INC
INC
FULL
X
Deleted files not
carried into new
Synthetic full
No unauthorized use, copy or distribution.
Synthetic Full
A synthetic full synthesizes a full backup by copying objects from previous backups into a new
backup. You could consider a synthetic full as a restore into a backup. Synthetic full backups can
greatly reduce network traffic and load on the client by eliminating the need of moving all the
data from a production server.
A synthetic full works by using image files to determine which objects need to be protected.
Each time a data protection operation is run for a client (full/incremental/differential), an image
file is generated. This image is a view of the folder structure for a subclient at the time of
backup. This will include all folders, files, data/time stamp and journal counters. When a
synthetic full is performed the most recent image file is used to determine which objects need
to be protected. They are copied from previous backups into the new synthetic full.
A synthetic full is considered a valid full backup and a successful completion will begin a new
cycle. It will also result in the creation of a new index file. If any objects are missing from the
synthetic full you can use the Verify Synthetic Full option in the advanced backup options. This
will check what is in the synthetic full against the most recent image file. If any objects are
missing the next incremental backup will automatically backup those objects.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
DASH Full
Only for dedupe-enabled Primary Storage Policy Copies
Uses last backup image to update Reference pointers and the
index
No deduplicated data is read or written
Clients
MediaAgent
Full
Inc
Inc
Full
Inc
Inc
DASH
Full
Inc
Disk Library
Initial Full and
Incremental jobs written
to storage
Index
Cache
Deduplication
Database
Dash Full
DASH FULL is a Synthetic Full backup option available on a dedupe-enabled primary storage
policy copies.
A traditional Synthetic Full job determines what objects existed on the source subclient at the
time of the last backup. It uses this list to read the data from the primary copy vice the source
client and re-writes the data to the copy.
With deduplicated data, a DASH Full job works much the same way as a traditional Synthetic
Full with the exception that since all the data comes from existing data blocks in the library no
new duplicate data blocks would be written. Only the reference points in the Deduplication
database and the index for restore are updated. The savings in time and resources are
significant.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
RESTORE DATA
Restore Data
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Search
Uses Content Indexes
Metadata and text
Lost Data
Restore Browse
Uses Media Agent indexes
Expanding Hierarchical
data structure
display of
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Full
Index
Cache
Inc
Inc
Inc
Inc
Image Files
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Restore Options
Restore By Job
Multi-stream restore capable
Can include aged, killed, or failed jobs
Restore Browse
Different path
Different client
UNC Path
Restore Options
Direct
Supposing you know precisely what file you want to restore. Do you need to go through the
effort of Find, Search, or Browse? No, you do not. A data set level task of Restore is available
for File System iDataAgents. Just enter the specific path and filename - or you could use wild
cards (e.g. *.doc).
Restore By Job
The Restore by Job feature provides the facility to select a specific backup job or set of jobs to
be restored. This method of restoring data is faster under some circumstances as it reads
continuously from protected storage and retrieves the data independently rather than using the
indexing subsystem which does individual seek offsets on the media.
A key advantage of restore by jobs is restoration of any successfully written data in failed or
killed jobs.
If multiple job streams were used in parallel for the data protection job, then Restore by Job can
use those same multiple streams in parallel for the restore. The degree of parallelism would be
a factor of the degree of multiplexing for the jobs involved. The higher the multiplexing, the
more parallel the restore. Restore by Job cannot be used to restore the Windows System State
data.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Module 6
Monitoring Simpana Software
Operations and Status
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Topics
Understanding Monitoring Tools
CommCell Console Monitoring Tools
CommVault Monitor App
Configuring Alerts
Alert Categories and Output Options
Configuring Reports
Types of Reports
Remote Operations Monitor Service (ROMS)
Topics
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Storage Resources
Usage, Throughput, Content, Errors
Resource View
Job History
Statistics, Errors
Policies
Media not copied, Content
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
CONFIGURING ALERTS
Configuring Alerts
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
CommVaults Alert feature provides real time notification on events occurring within a
CommCell environment. These conditions can range from minor occurrences that do not
require intervention to severe occurrences that need immediate intervention. The system
detects conditions within two minutes of the occurrence. Alert coverage is defined for each
alert created and is hierarchical covering all sublevels of the defined object. Alerts can be
configured for any object that can be seen by the user creating the alert.
Alert Output Options
Alerts can be sent to their intended recipients by email/pager; to the CommServes application
log accessible from the Windows System Event Viewer; by SNMP Trap(s) to a SNMP capable
monitoring application; or initiate a command line program, executable script or batch file, save
to disk (CommServe host folder and/or file), sent to a RSS feed, or displayed as a console dialog
box.
Alert wording can be customized by the user. Relevant, localized information can be added to
reports such as responsible persons to contact or appropriate action/steps to take. To help with
customization of variable data in an alert, tokens representing the variables are provided.
Tokens can also be passed as arguments for the command line script. Command line arguments
support the use of all tokens except attachments (e.g. <PROTECTED_OBJECTS>) or lists (e.g.
<MEDIA_LIST>).
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Best Practices
When possible, configure alerts to cover Client Computer Groups vice individual clients and
when using the E-mail output option, use group e-mail addressing vice individual users. Groups
are more consistent and wont require you to modify alerts when individual Clients or users are
removed or added.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
CONFIGURING REPORTS
Configuring Reports
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Types of Reports
Types of Reports
A variety of reports can be created, each tailored to a particular aspect of data management.
Through filter criteria, you can customize each report to include only the data that is required.
Report templates can be customized and are available to you to save, run, schedule, edit and
view.
There are a variety of ways in which to access reports, including CommCell console, Web
Console, and CommNet Browser. Classic Reports on the CommCell console collect
comprehensive information about jobs, storage, data growth, and cost that administrators can
use to troubleshoot the environment and ensure that service level agreements are consistently
met. Reports on the Web Console are tailored for basic users and allow you to access job,
storage, and cost information.
CommCell View
CommCell View is a set of database views that can be used to create customized reports. These
views are provided in addition to the CommCell console Report Selection feature.
You can use the views provided with CommCell View or customize them to reflect the data in
any manner appropriate to your organization. You can query the database with Microsoft SQL
Mgmt Console or any SQL database query tool. Query results can be displayed through Explorer
or you can use products such as Microsoft Excel or Crystal Reports to format your query output.
Note that if you modify a view or create a new view, you must reapply them after each new
release. See Books Online for a list of views included with CommCell View.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Recommended Reports
CommCell Configuration Report
The CommCell Configuration (formerly CommCell Summary) Report provides the properties of
the CommServe system, MediaAgents, clients, agents, subclients, and storage policies within
the CommCell environment based on the selected filter criteria.
Job Summary Report
The Job summary report can be filtered to display jobs that are, or have been run in the
CommCell environment.
Data Retention Forecast and Compliance Report
The Data Retention Forecast and Compliance Report provides a history of data protection jobs,
associated media, data aging forecast and recyclable media based on the selected filter criteria.
Note that regardless of the filter options selected for this report, the report always checks
retention in days.
Media Information Report
The Media Information Report provides detailed information about the media that is associated
with storage libraries, the media repositories and/or locations, and the media that has been
written to or reserved by storage policy copies, all within a specified time range.
CommCell Readiness Report
The CommCell Readiness Report provides you with vital information about the condition of your
CommCell environment that can serve as a tool to warn you about potential problems that can
impact your operations before they occur.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Module 7
Working with Support
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Topics
Before you call Support
Troubleshooting Methodology
Viewing Job Details
Using the Event Viewer
Understanding Logs
Topics
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Troubleshooting Methodology
Gather Information
Narrow Probable Source
Eliminate Simple Causes
Apply one Solution at a time
Document
Occam's Razor
One should not increase, beyond what is necessary, the number of entities
required to explain anything. In other wordsLook for the simple solution.
Troubleshooting Methodology
Chefs can create tasty dishes without a recipe; Mechanics can diagnose and fix cars without
fancy machines or manuals; and artists can create wonderful paintings without paint-bynumber guides.
What do they have that we dont?
They have experience to guide them - experience that comes with time and practice.
Without experience we can still solve problems. We just need to substitute something for
experience. For chefs its a recipe; for mechanics its a manual; and for troubleshooting, this
guidance is called a methodology. Its really all the same. While it might seem tedious and
time-consuming at first, it will always find a solution.
Without a methodology, troubleshooting efforts will be different each time. While this may
sometimes solve problems, its a hit-or-miss proposition that does little towards reducing future
troubleshooting efforts or contributing to your collective experience.
The basic Troubleshooting Methodology is universal. Following the sequence of steps each
time leads you closer to a solution. Documenting each solution in terms of symptoms and
cause helps you to more quickly resolve a problem in the future when similar symptoms arise.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Gather Information
Time and description of problem
Note when the error first occurred since this is a key identifier in tracking down relevant
information from other sources both in and outside of the Simpana software. Describe the
problem both in general terms and in specifics as reported by the software. This would include
the exact text of the error that alerted you to the problem in the first place.
Pertinent Job details
Note the type of job, job id, start time, phase, state, etc. These details along with the time and
problem description will help you when you try to narrow down the probable source of the
problem.
Applicable Events
Find any and all events that may be applicable to the error.
Involved Resources/components
Identify all involved hardware and software components.
Relevant Log entries
Collect all log entries relevant to the job/task that had problems.
Other concurrent activity
Look at events/status from other jobs that were running at the same time.
Environment
Look for any external factor (e.g. storm, power failure, or other system issues) that may be a
factor.
Narrow Probable Source
Is this a known problem?
There is nothing worse than expending time and effort troubleshooting a problem that is known
and already has a solution or no solution. Check your documentation, product knowledge
base, product release notes, patches, and documentation.
Is this a pattern/re-occurring problem?
Does this error occur repeatedly? Does it occur at the same time? Same place? Is there a
pattern? What is common in the pattern? Elusive, sporadic errors are the most difficult to
isolate.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Always record the current state. In some cases, an applied solution may cause additional
errors. Now its a battle to get back to your previous state and your original problem.
Try the most probable solution first. If this is not an easy solution, you may want to try other
solutions that are easier or least disruptive first in order to eliminate them.
Always record the effect of a solution. Even if it does not solve the problem, it may have either
positive or negative effect on the application. If new errors are generated, you can then
associate them with the current state.
If applicable, back out each solution before trying the next. If all the simple causes have been
eliminated, and any software changes identified and addressed - rarely will an error be the
result of multiple concurrent software conditions.
Document
Documentation records the history of errors, troubleshooting efforts, and solutions. Some
errors can only be resolved by recognizing patterns. For example; backups run fine for a client
except on the first Friday of each month. It just so happens that another application runs a
particular process on that day that causes port conflicts. The offending process may not be
found without recognizing that there is a pattern of errors.
To give users a better chance of resolving future errors quicker, maintain good troubleshooting
records.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Details
Data Transfer statistics
Attempts
Phase status
Number of Attempts
Events
Related Events
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Understanding Logs
Operation Logs
Installation Logs
Understanding Logs
Logs enable experience support/development personnel to view a jobs historical detail
software processes and their results. Logs are not intended to be read/interpreted by
customers.
CommVault software Log files can be classified into four functional areas:
Service - Record of installed services interaction with hardware, OS, applications, and other
CommCell hosts.
Job Phase - Record of Task level activity required to execute a job.
Administration - Record of activity associated with the CommCell environment internal
operations such as licensing, updates, data aging, firewalls, and metadata protection.
Installation - Record of component installation activity.
CommVault software Log Files are present on each component. On Windows hosts, the log files
can be found in the <Install Home>\Simpana\Log Files directory. On UNIX\Linux hosts the log
files can be found in /var/log/galaxy/Log_Files directory. In NetWare they can be found in the
(SYS:\Simpana) directory.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Self Maintaining
Log files have a default maximum size of 5MB and most have a default version retention level
of 1. Version retention means the number of full logs kept plus the active log. Once an active
log reaches maximum size, it is renamed to <filename>_#.log where # represents the version. If
only one version is being retained, the next full log will overwrite the previous full log.
Because of the expected activity levels, the communication service (CVD) and media
management logs have a default version retention level of 3. CVD Log sizes and version
retention can be changed via registry values. Media Manager log size and version can be
changed via the Service Configuration tab of the Media Management control in the CommCell
console.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
TR Submission Process
TR Submission Process
Having exhausted your own troubleshooting efforts, you may want to open a Trouble Report
(TR) with your support group. A TR can be initiated by phone or via e-mail. You can create an email TR from the CommCell console itself. Alternatively you can use the e-mail TR form
available on CommVaults web site. If you use the form via the Maintenance Advantage
portable, the key information fields will automatically be populated.
Each TR passed through a Level I support review to see if the problem is procedural in nature, or
is a known problem with a solution. TRs that pass through Level I are assigned to a specialty
area (Level II) for a more focused look into the problem. If Level II support cannot identify or
resolve the problem, then Level III escalation into development is made.
The most common thing asked for by support when troubleshooting will be the log files. These
will enable support to recreate the events leading up to and during the problem. Since the
cause of the problem may be peripheral to the event itself, all logs from the CommServe and
any involved component hosts are usually requested. In the CommCell console, at the
CommCell level of the browser, youll find the Send Logs task.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Supports Top 10
10.
9.
8.
7.
6.
5.
4.
3.
2.
1.
Known Problems
Software Conflicts
Anomalies
Permission Related Issues
Network Related Issues
Services/Job Management
Performance Issues
Library/Drive/Media
Restore/Index issues
User Training
Supports Top 10
The following is a list of common problems based on the number of calls made to customer
support.
10. Known Problems
Documented in Release Notes
Documented in Books Online
Usually, no resolution. Sometimes possible workaround
9. Software Conflicts
Anti-virus
Other Backup products
Previous Simpana software Installations
8. Anomalies
Works fine the second time
Erratic no pattern of failure
Possibly attributable to timeouts
Reboot/Restart Services/Process to correct
7. Permissions Related Issues
Install or first use problem
CommServeDR or Mapped Drive Access
Exchange Login ID/Password
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Feedback
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
THANK YOU
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.