Installation and User's Guide: IBM Tivoli Continuous Data Protection For Files 3.1
Installation and User's Guide: IBM Tivoli Continuous Data Protection For Files 3.1
GC32-1783-02
GC32-1783-02
Note Before using this information and the product it supports, read the information in Notices on page 99.
Edition notice This edition applies to version 3, release 1 of Continuous Data Protection for Files and to all subsequent releases and modifications until otherwise indicated in new editions. Copyright International Business Machines Corporation 2005, 2007. All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
Contents
Preface . . . . . . . . . . . . . . . v
Accessing publications online . . . . . . . . . v Ordering publications . . . . . . . . . . . v Support information . . . . . . . . . . . . v Searching knowledge bases . . . . . . . . v Accessibility features . . . . . . . . . . vi View Continuous Protection Activity Report View Report of Scheduled Backups . . . . . . . . 70 . 70
. . . . 91
63
. 63 . 67
iii
iv
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
Preface
This publication helps you install and use Continuous Data Protection for Files.
Ordering publications
You can order or download PDF and HTML versions of some IBM publications online. To order or download IBM publications online go to the following Web site: http://www.elink.ibmlink.ibm.com/publications/servlet/pbi.wss. The publications are available in PDF or HTML formats, or both. The Web site also provides information for ordering publications from countries other than the United States. In the United States, you can also order publications by calling: 800-879-2755.
Support information
You can find support information for IBM products from a number of different sources. v Searching knowledge bases v Finding product fixes on page vi
v v v v
Accessibility features
Accessibility features help a user who has a physical disability, such as restricted mobility or limited vision, to use software products successfully. The major accessibility features of Continuous Data Protection for Files are described in this topic. v The user interface is HTML 4.0 compliant, and accessibility is limited only by the choice of Internet browser. v All user documentation is provided in HTML and PDF format. Descriptive text is provided for all documentation images. v The product can be used with keyboard only (a pointing device is optional).
vi
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
Local Storage
Continuous Protection
Files are continuously backed up to the local disk, and can additionally be backed up to remote storage.
Restore
from any storage location
Continuous E-mail
Source Files
E-mail and Scheduled Protection
Files are backed up to remote storage locations based on schedule settings.
Types of Protection
Continuous Data Protection for Files offers three types of protection for your files: continuous protection, scheduled protection, and vaulting. Continuous protection means that every time a file is saved, a backup copy is created. Hence, the backup copy exactly matches the original file as you last saved it. If you choose to save more than one version of a backup copy, the previous backup copies will match the previous versions of your file. Files that are protected by schedule are copied to the remote storage area on a regular schedule. They are not backed up every time you save them, as are continuously protected files. Hence, scheduled protection yields fewer backup copies. If a file is lost between the time it is saved and the time it is backed up, you will be able to restore only a previous version of the file. E-mail files are protected on a schedule. If the storage area is unavailable when a protected file is saved, Continuous Data Protection for Files will maintain an internal copy, and create the backup copy on the remote storage area when the storage area becomes available.
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
How protected
Frequency of backups
File is backed up File is backed up whenever it is saved. only at the scheduled time, and only if it has been saved since the previous schedule. Local or remote Files selected in the Folders and Files box and the Applications box of the Files to Protect page of the Settings Notebook. Remote only Files selected in the E-mail Protection page of the Settings Notebook. Files selected in the Folders and Files dialog of the Advanced page of the Settings Notebook.
not applicable Files selected in the Vault box of the Files to Protect page of the Settings Notebook.
Restore Wizard When you want to restore a file, a wizard helps you pick the version of the file you want, and allows you to choose where to restore it. Enhanced integration with Lotus Notes e-mail client Continuous Data Protection for Files works closely with Lotus Notes e-mail client to efficiently provide protection for your mail files. This protection allows you to easily restore your e-mail files in the event they are lost or damaged. Versioning of data level changes for e-mail files Continuous Data Protection for Files tracks data level changes on e-mail files. This allows you to restore local copies of your Lotus Notes and Microsoft Outlook files from the point in time of your choosing. MSI installation package Continuous Data Protection for Files has an MSI installation package and uses Windows Installer. You can use Microsoft Systems Management Server to deploy Continuous Data Protection for Files MSI package to computers that you administer. Microsoft Vista operating system support Continuous Data Protection for Files runs on 32-bit Windows Vista Ultimate and Business Edition (x86-32), in addition to the following operating systems: v 32-bit Windows 2000 Server, Advanced Server, SP2 and up (x86-32) v 32-bit Windows XP Professional, SP1 and up (x86-32) v 32-bit Windows 2003 ServerStandard Edition and Enterprise Edition (x86-32)
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
Basic Installation
Basic installation includes a wizard-guided configuration, and is suitable for installation on a single local computer. You can also upgrade and uninstall on a single computer. For installing to a remote computer, installing without user interaction, or installing to many computers, see Advanced Installation on page 18.
System Requirements
Continuous Data Protection for Files requires a Windows server or workstation with specific hardware and software.
Hardware
Minimum hardware is an Intel Pentium III machine with the following specifications: v 500 MHz CPU v 384 MB RAM v Free disk space 21 MB for install footprint Additional space to store local backup copies Note: You must configure as much space as is needed to store at least one backup copy of every file that you protect. See Maximum space for backups: field on page 29. The hardware configuration must also support the Windows operating system, as specified by Microsoft Corp.
Software
The following Windows operating systems are supported: v 32-bit Windows 2000 Server, Advanced Server, SP2 and up (x86-32) v 32-bit Windows XP Professional, SP1 and up (x86-32) v 32-bit Windows 2003 ServerStandard Edition and Enterprise Edition (x86-32) v 32-bit Windows Vista Ultimate and Business Edition (x86-32) The Continuous Data Protection for Files user interface supports the following browsers: v Internet Explorer, Version 6.0 and higher v Mozilla Firefox 1.5.0.7 and higher
Continuous Data Protection for Files supports Tivoli Storage Manager server version 5.3.3 and higher.
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
v A product that uses the Tivoli Storage Manager API is installed and running. Tivoli Storage Manager Backup-Archive client is such a product. Note: If you are upgrading from version 2.1.x on a non-English operating system, you will not see all national language text until you reboot. After installation (and reboot, if required), Continuous Data Protection for Files immediately starts protecting your files. If you want to change your protection settings, see Settings Notebook on page 27.
When Continuous Data Protection for Files is installed, it is pre-configured with a list of files and folders to continuously protect. Use this page to confirm that the initial protection settings are correct for your needs, or change the settings as appropriate. The protected files are listed by Folders and Files and by Applications These lists are not exclusive of one another, but offer two views of what is protected. If you prefer viewing the file paths, names, and extensions that are protected, use the Folders and Files box. This option allows you to use a file tree to specify what to protect. If you prefer viewing the applications that are protected, use the Applications box. This option allows you to specify applications from a list. Files that are created by the listed applications are protected. The file extensions associated with the application will automatically be added to the Folders and Files list. Note that e-mail applications are specified in the E-mail Protection page. Because these files are often very large, their protection settings are configured separately. Folders and Files box:
This box gives a summary of the folders and files that are continuously protected. The number of items protected refers to the items in the list of folders and files. A single list item can specify more than one file. Click the Details link to view all items in the list and modify the list. The Folders and Files Settings dialog will display. Folders and Files Settings dialog (Initial Configuration Wizard): Specify folders and files to protect by adding or removing items from the list.
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
The top of the list box has two menu buttons. Click the buttons to include or remove items from the list. Include Click Include to add files and folders that you want to protect. The Select folders dialog will open. Remove Select one or more list items, then click Remove to remove those items. Each row in the list has one column: Name Patterns in the Name column specify one or more files or folders. See Interpreting File and Folder Patterns on page 10 to determine what files and folders will match a Name pattern with blanks or wildcards. When a folder is protected, all of its files and sub-folders are protected. Select folders dialog:
The Select folders dialog allows you to specify files and folders. You can browse to choose a folder, or type the name of a file or folder in the Folder name text field. If you browse and choose a file or folder, you can modify its path in the Folder name text field. Note: Only your internal drives can be protected. Any external storage devices are considered remote storage devices. Interpreting File and Folder Patterns: Protection settings use patterns to specify what files and folders to protect. The files and folders that are protected depend on blanks before and after a pattern, and asterisks in the pattern. You can enter the complete path of a file that you want to protect. For example, C:\Documents and Settings\Administrator\My Documents\Soccer\2005AYSO\ Parent Info U8B.doc. The complete path unambiguously matches a single file. But to specify all files this way would be quite time-consuming. Use asterisks and blanks as wildcards in the pattern to specify several files. An asterisk matches any number of characters in a file path. If there are no asterisks, then Continuous Data Protection for Files will match any file whose fully expanded path name has that exact pattern anywhere in the path or filename. The pattern is not case-sensitive. If there are no asterisks in the pattern, then blank spaces before and after the pattern are interpreted as asterisks. Hence, \myDocs\ and *\myDocs\* yield the same matches. If there are asterisks in the pattern, then blank spaces before or after
10
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
the pattern match no characters. Hence, \myDir\, *\myDir\, and \myDir\* could yield three different matches, as in the table of examples below. As an example, assume a pattern fish. This pattern matches: C:\dir\fish.doc and C:\fish\anyfile.doc and c:\Dirfishfood\something. If the pattern has slashes around it (\fish\), it will match any object with \fish\ somewhere in the path. This pattern matches C:\fish\anyfile.doc but not C:\dir\fish.doc and not c:\Dirfishfood\something
Table 2. File and folder pattern matches This pattern ... \myDir\ or \mYdiR\ or *\myDir\* or *\mydir\* ... matches these folders and files on your computer: c:\myDir\ c:\myDir\Contacts\ c:\myDir\Contacts\contacts.txt c:\Projects\myDir\ c:\Projects\myDir\myThings\ c:\Projects\myDir\myThings\things.doc c:\Projects\myDir\myThings\myPhoto.jpg d:\Notes\myDir\ c:\myDir\ c:\Projects\myDir\ d:\Notes\myDir\
*\myDir\
\myDir\* d:*\mydir\* \my best d:\Notes\myDir\ c:\Books\My Best.doc c:\Photos.jpg\My Best Photo\ c:\Photos.jpg\My Best Photo\Best.jpg f:\Projects\My Best Project\ f:\Projects\My Best Project\Dream.xls c:\Photos.jpg\ c:\Photos.jpg\myHouse.bmp c:\Photos.jpg\My Best Photo\Best.jpg c:\Projects\myDir\myThings\myPhoto.jpg c:\Photos.jpg\ c:\Photos.jpg\My Best Photo\Best.jpg c:\Projects\myDir\myThings\myPhoto.jpg All files and folders on the E: drive.
.jpg
*.jpg
E:\ E:\*
Applications box: This box gives a short list of the applications that are protected.
To see the complete list of the applications that are protected, click Details. The Critical Settings dialog will display.
11
The Applications and Extensions box presents a list of applications and their associated file extensions. Applications that are checked will be continuously protected. You can check and uncheck applications to suit your protection needs. The list of applications has two views. Each view orders the applications in a different way. Click the menu item at the top of the box to change the view. View by Ranking The applications that have the greatest quantity of files on your computer are presented at the top of the list. The applications that have the least quantity of files on your computer are presented at the bottom of the list. View Alphabetically The applications are presented in alphabetical order. If you check a box, all file extensions associated with that application will be added to the list of protected files. If you uncheck a box, all files with that extension will be removed from the list of protected files. Note that removing file extensions from the list of protected files does not mean adding those files to the list of files that are explicitly excluded from protection. Click OK in any of the views to update the list of protected files. Click Cancel to leave the dialog without changing the list of protected files. You can add files to be protected in the Critical Settings dialog, but these applications will be protected only if the files are not explicitly excluded. See Including and Excluding Files from Protection on page 33 for more information. E-mail Protection page (Initial Configuration Wizard): Select the e-mail applications that you want to protect. Select a schedule for protecting the e-mail applications.
12
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
Because e-mail files typically are very large, they are not backed up continuously, but only on the schedule that you select. E-mail files are backed up only to remote storage. If the remote storage is not available at the scheduled backup time, Continuous Data Protection for Files will queue the backup copies for later transmission. When the remote storage area becomes available, Continuous Data Protection for Files will create the backup copies on the remote storage area. E-mail Application drop down list Select one of the popular e-mail applications in the list. If your application is not listed, select Other. E-mail Application Data Folder text field If you choose your e-mail application from the E-mail Application list, the default file type for that application will appear in this box, and you will not be able to update the file specification. You can update this field only if you select Other in the E-mail Application list. How often to protect your e-mail: drop down list You can schedule e-mail protection at one of several intervals: v Never. E-mail will not be protected. v Hourly. E-mail files will be backed up every hour, just after the hour. v Daily. If you choose this interval, also select the time for the backup. v Weekly. If you choose this interval, also select the day and time for the backup. v Monthly. If you choose this interval, also select the day of the month and time for the backup. Remote Storage page (Initial Configuration Wizard):
Chapter 2. Installing Continuous Data Protection for Files
13
Specify the remote storage for the backups of your protected files.
Storing files in a remote storage area will protect the files in case local copies are lost. Backups of continuously protected files, and files protected on a schedule, are stored in the same remote area. Continuous Data Protection for Files is very tolerant of intermittently available networks. If remote storage area is temporarily unavailable, Continuous Data Protection for Files will queue backup copies until the remote storage becomes available. Back up to: drop down list and Location: text field: Specify the remote storage device where your backup copies will be stored. Specify the type of storage in the Back up to: list, and the location of your storage device in the Location: field. What you select from the Back up to: list affects what you enter in the Location: field. External Device or File Server: You can specify a file server or removable disk to store the backup copies. The remote device can be another computer (such as a NAS or file server), or a remote disk, or a removable disk. In the Location: field, if you choose a remote server, it is recommended that you use Universal Naming Convention (UNC) specification for the file server instead of drive letters. Drive letters can change after rebooting and often do not reconnect automatically. If you choose a USB external device, you can select the driver letter. However, removable external device drive letters can change. Recommendations and detailed procedure for configuring USB drives as remote storage is in technical note 1245761 at the Continuous Data Protection for Files collection of technical notes: http://www-1.ibm.com/support/search.wss?rs=2339&tc=SS3PE6&rank=8 &dc=DB520+D800+D900+DA900+DA800&dtm
14
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
Click the Browse button to view a Browse for folder dialog box. Use this dialog box to navigate to the location for your remote storage area. If this dialog becomes hidden behind other windows, click on the task bar to bring it to the front. Continuous Data Protection for Files will create backup copies in a subfolder named \RealTimeBackup\computer name. For example, if a computer name is Computer1, and the remote storage location is configured with the value \\remote\share, backup copies will be stored in \\remote\share\ RealTimeBackup\Computer1\. If you log in to your computer with a user name and password that is valid also on your remote storage location, Continuous Data Protection for Files will authenticate transparently into that network location. If you do not log in to your computer with a user name and password that is valid also on your remote storage location, you will need to log into the network interactively using another account with regular privileges. You can log in interactively by using the Net Use command. Some versions of Windows have a concept of simplified file sharing, which allows one computer to easily connect to another computer over the network. The resulting connection allows only limited file system capabilities, and inhibits the creation of backup copies. Some information such as access control lists or file streams can be lost. It is recommended to disable simplified file sharing on the remote storage area. WebDAV Server: Some Internet Service Providers (ISPs) provide Web-based Distributed Authoring and Versioning, or WebDAV. The WebDAV protocol provides the functionality to create, change and move documents on a remote server. This is useful, among other things, for authoring the documents which a Web server serves, but can also be used for general Web-based file storage. If your ISP provides WebDAV functionality, Continuous Data Protection for Files can store backups on a Web-based server. In the Location: field. enter your WebDAV server location using the following format: https://MyISP.com/MyAcct. When using WebDAV, Continuous Data Protection for Files only supports the Basic Authentication method described in the HTTP 1.0 RFC. Because this authentication method sends the password as clear text over the network, it is also recommended that the Web server be configured to use secure sockets. Tivoli Storage Manager or Tivoli Storage Manager Express: Continuous Data Protection for Files can store backup copies on a Tivoli Storage Manager server. You do not need to install the Tivoli Storage Manager backup-archive client. If you install the Tivoli Storage Manager backup-archive client, it functions independently from Continuous Data Protection for Files. In the Location: field, specify the Tivoli Storage Manager server location, using the following format: tsm://Host.com. You can also use an IP address for the server address. You will be prompted to enter a valid password for your Tivoli Storage Manager server.
Chapter 2. Installing Continuous Data Protection for Files
15
Continuous Data Protection for Files supports Tivoli Storage Manager server version 5.3.3 or later. Configure your Tivoli Storage Manager server before trying to connect from Continuous Data Protection for Files. Register your computer as a Tivoli Storage Manager node. Continuous Data Protection for Files will use the password assigned at registration to connect to the Tivoli Storage Manager server. For more information about registering a Tivoli Storage Manager node for your computer, see IBM Tivoli Storage Manager for Windows Administrators Guide. In order to manage storage space, the Tivoli Storage Manager administrator must grant authority to the Tivoli Storage Manager client node to delete backup copies. For steps to assign authority to delete backup copies, see this topic in the problem determination section: Tivoli Storage Manager Client Node Lacks Authority to Delete Backup Copies on page 94. To avoid problems when using theTivoli Storage Manager server, see the problem determination section: Files are not backed up to Tivoli Storage Manager server on page 93. You can restore backup copies from theTivoli Storage Manager server only with the Continuous Data Protection for Files GUI. You cannot use the Tivoli Storage Manager Backup-Archive client to restore backup copies created by Continuous Data Protection for Files. Maximum space for backups: field: Specify how much space to use for all backup copies on remote storage. The default size for the remote storage area is 40 GB. If you increase the number of backup versions to keep, consider increasing your storage area size. If you are unsure of how much space to allocate, you can monitor your space usage on the Status page and adjust the version and space settings accordingly. When the storage space becomes full, Continuous Data Protection for Files deletes older backup copy versions of files that have several backup copy versions. After deleting the versioned backup copies, if more space is needed for new backup copies, Continuous Data Protection for Files deletes the last remaining backup copies of enough files to make room for the newest backup copy. If you try to remotely back up a file which is larger than the space you have allocated for your remote storage area, Continuous Data Protection for Files will purge all older versions of your files, and then may fail to back up the file. Make sure that the maximum space for your remote storage areas is greater than the maximum file size for remote backup in the Advanced page of the Settings Notebook. For example, if you decrease your maximum space for backups to 1 GB, you should decrease the maximum file size for remote backup from the default of 1 GB. Initial Backup page: Use the Initial Backup page to choose if you want to back up all your files when you finish the wizard.
16
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
When you first install Continuous Data Protection for Files, it is highly recommended that you immediately back up all files that you configured for protection. Without the initial backup, only files that change will be protected. The initial backup will protect all of the existing files that you designated for protection. The initial backup will scan all of your local drives, looking for files that you designated for protection. All files that meet your specifications will be backed up to local or remote or both storage areas. This process can take a long time and can slow down your computer. Start this initial backup when you will not be using your computer for other applications. If you choose not to back up by the installation wizard, you can force a complete backup at a later time. At that time, use the Files to Protect page of the Settings Notebook. Summary page (Initial Configuration Wizard): Use the Summary page to view a summary of your configuration choices, and decide if you want to apply you configuration choices to Continuous Data Protection for Files. The Summary page displays the configuration you specified in the previous pages of the wizard. Choose Back to return to a previous page to modify your configuration choices. Choose Finish to apply your configuration choices.Continuous Data Protection for Files will continue to run in the background and protect your files using the configuration choices you made. Choose Cancel to exit the wizard without applying your configuration choices. Continuous Data Protection for Files will continue to run in the background and protect your files using the pre-configured settings.
Chapter 2. Installing Continuous Data Protection for Files
17
Advanced Installation
The Basic Installation on page 5 describes an installation that requires user interaction, and installs Continuous Data Protection for Files on a single machine. There are more options for installing, upgrading, and re-configuring Continuous Data Protection for Files. There are several ways to install or upgrade Continuous Data Protection for Files without user interaction. Silent installation on a local computer You can install Continuous Data Protection for Files on your local computer silently. This means that you will not see the installer wizard, nor the Continuous Data Protection for Files initial configuration wizard. Silent product upgrades and configuration updates on a local or remote computer You can upgrade the product level and change protection settings on a local or remote computer silently. When you put a new product installer file or a new configuration file in the appropriate folder, Continuous Data Protection for Files will pull the information. Continuous Data Protection for Files will adopt the new product level from the installer file or the new protection settings from the configuration file. Silent installation pushed to a remote computer Using silent installation, an administrator can push Continuous Data Protection for Files to remote computers. Once Continuous Data Protection for Files is installed, it will pull product upgrades and configuration information. You can use this feature to upgrade your local Continuous Data Protection for Files client or Continuous Data Protection for Files on other computers. Silent local upgrade You can upgrade the product level on your local computer by putting the
18
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
upgraded installer in the appropriate folder. Continuous Data Protection for Files will pull in the new code. After a reboot, the product will protect your files at the new level. Silent installation pushed to another computer An administrator can push Continuous Data Protection for Files to other computers.
Parameters
/S Install silently. Without this parameter, you will install interactively via the installation wizard and (if necessary) the initial configuration wizard. options The following options are allowed: INSTALLDIR=folder The default installation folder is C:\Program Files\Tivoli\ CDP_for_Files. If you want to install to another folder, use this option and specify the folder. REBOOT=ReallySuppress Suppress system reboot after installation. This option is recommended when you are pushing installation to a remote computer (see FpPushInst.exe (Push Install Command) on page 22), because rebooting after installation could be disruptive to users on the remote system. This option is not recommended for a local installation when a previous version of Continuous Data Protection for Files exists.
19
/l*v log file path Specify a file to log the installation activities.
Note that no blank space is permitted between the double-quote delimiter and the parameter (/v).
20
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
21
uninstalled, some files are not removed by the installer. The old files can cause problems for a new installation of Continuous Data Protection for Files. After uninstallation, and before installing again, remove the following folders: The local storage area The local storage area is the RealTimeBackup folder on a local drive. Rename this folder if you want to save the backup copies. The remote storage area for the computer The remote storage area is in the RealTimeBackup\<computer name> folder of the remote device that you configured for the previous installation. Rename this folder if you want to save the backup copies. The installation folder For Windows XP and Vista: C:\Program Files\Tivoli\CDP_for_Files The application data folder For Windows XP: C:\Documents and Settings\All Users\Application Data\Tivoli\CDP_for_Files For Windows Vista: C:\Program Data\Tivoli\CDP_for_Files
22
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
folder. FpPushInst.exe executable then starts a service on the remote computer to invoke a silent installation. Due to firewall and other system settings, the FpPushInst.exe executable will not work in some environments.
Syntax
FpPushInst.exe remote computer name /user:username /pwd:password /c:local path of configuration file /r local path of installer /S \/v /qn options\ There must be a blank space before each parameter. Blank space is optional between most parameters and their values. No space is allowed between and /S. No space is allowed between and /v.
Parameters
remote computer name The host name of the computer where you want to install Continuous Data Protection for Files. /user:username /pwd:password An administrative user account and password on the remote computer. /c:local path and file name of configuration file The path and file name of a Continuous Data Protection for Files configuration file on the local computer. See Provide a Configuration File for the Continuous Data Protection for Files Client on page 24. The FpPushInst.exe executable copies the local configuration file to the \System32\ folder in the Windows installation folder of the remote computer. This parameter is optional. If not specified, the configuration of the remote Continuous Data Protection for Files client will be the default configuration. Note: The Continuous Data Protection for Files installer looks for a configuration file named fpa.txt in the \System32\ folder in the Windows installation folder of the remote computer. Continuous Data Protection for Files installer will not use a configuration file in that folder with any name other than fpa.txt. Hence, in most circumstances, the file you specify with this parameter should be named fpa.txt. /r local path and file name of installer file The path and file name of Continuous Data Protection for Files installer file on local computer. The installer file name must contain the string CDP and end with .exe. For example, a valid path and name is TivoliCDP_CDPForFiles_3.1.0.0_windows.exe. Separate the parameter and the value with a blank space. /S The /S parameter indicates silent installation. options The FpPushInst.exe executable passes these options to the installer. The options for a push installation are the following: DONT_LAUNCH_FILEPATHSRV=1 This option is required for push installation. A pushed installation runs in the system context. It is not recommended that you launch Continuous Data Protection for Files in the system context after installation. Running Continuous Data Protection for Files in the system context can lead to failures when backing up files, or failures
23
later when a user tries to restore files. Use this option to suppress launching Continuous Data Protection for Files in the system context immediately after installation. REBOOT=ReallySuppress Suppress system reboot after installation. If users are logged on to the remote system, rebooting can be disruptive. INSTALLDIR=folder The default installation folder is C:\Program Files\Tivoli\ CDP_for_Files. If you want to install to another folder, use this option and specify the folder. The path corresponds to the remote computer. /l*v log file path Specify a file to log the installation activities. The path corresponds to the remote computer.
Example
This example pushes the installer file (TivoliCDP_CDPForFiles_3.1.0.0_windows.exe) to the remote computer (Computer1). It also pushes a local configuration file c:\fpa.txt to the remote computers Windows installation folder as \System32\fpa.txt. The /user and /pwd values are used to log on to the remote computer for this operation. FpPushInst.exe then starts a service on the remote computer to invoke the installer, passing to it the parameters: /S, REBOOT=ReallySuppress, DONT_LAUNCH_FILEPATHSRV=1. This tells the installer to install silently; do not reboot after installation, and do not launch Continuous Data Protection for Files in the system context immediately after installation. The installer will adopt the protection settings in the configuration file in the Windows installation folder \System32\fpa.txt.
FpPushInst.exe \\Computer1 /user:Administrator /pwd:secret /c:c:\fpa.txt /r C:\TivoliSoftware\TivoliCDP_CDPForFiles_3.1.0.0_windows.exe "/S \"/v /qn REBOOT=ReallySuppress DONT_LAUNCH_FILEPATHSRV=1 \""
Provide a Configuration File for the Continuous Data Protection for Files Client
When Continuous Data Protection for Files is initially installed, the installer can get configuration data from a file \System32\fpa.txt in the Windows installation folder. (See Windows Installation Folder on page 25). If this file does not exist, the installer will install Continuous Data Protection for Files with default configuration. After the initial installation, Continuous Data Protection for Files will pull future configuration settings from configuration files placed in a downloads folder in the central administration area (see Administration Folders on page 85 and Chapter 7, Central Management Considerations, on page 81). New configurations will be adopted within 10 to 20 minutes after being placed in the downloads folder. Create a configuration file from an existing client: 1. Use the Settings Notebook to configure the client as you want the configuration for other Continuous Data Protection for Files clients.
24
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
2. Publish the configuration. Use the Publish... check box in the Central Administration page of the user interface. A configuration file called fpcommands.xml is created in the global downloads folder in the central administration area. If you will use the file to change configuration after an initial installation, do not rename the file. Continuous Data Protection for Files pulls configuration data only from a file named fpcommands.xml. To use the published configuration settings when invoking the installer, rename the file to fpa.txt and place it in the \System32\ folder in the Windows installation folder. To use the published configuration settings after an initial installation, place the fpcommands.xml file in the downloads folder of the consuming Continuous Data Protection for Files client. If you will use the configuration file for a push installation, do not configure a forced backup. If you force a backup on a pushed installation, Continuous Data Protection for Files will attempt to back up files in the system context. These backups can fail, and when a logged on user later attempts to restore these files the restore can fail. To avoid a forced backup, do not check the Run Scan Now on other computers check box in the Central Administration Settings window.
25
26
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
Settings Notebook
After the initial installation and configuration, you can change your protection settings with the Settings Notebook.
Open the Settings Notebook by clicking Settings from the menu of the Continuous Data Protection for Files Status page. Use the control buttons at the bottom of each Settings Notebook page to navigate to any page whose settings you want to change. Click the OK button to apply your new settings and return to the Continuous Data Protection for Files Status page. Click the Apply button to apply your new settings and stay in the Settings Notebook. Click the Cancel button to exit the Settings Notebook without applying your changes. The Settings Notebook has 5 pages: v Use the General page on page 28 for these settings: Which drive to use for your local storage area How many versions of protected files to keep on local storage area The maximum size of your local storage area
Copyright IBM Corp. 2005, 2007
27
Whether you want to store backup copies on local storage area, remote storage area, neither, or both v Use the Files to Protect page on page 30 for these settings: Which folders and files to continuously protect Which folders to vault Force a backup of all protected files when you change which files are continuously protected v Use the E-mail Protection page (Settings Notebook) on page 41 for your e-mail protection settings, including the schedule to protect your e-mail and all files that are backed up on a schedule. v Use the Remote Storage page (Settings Notebook) on page 42 for these settings: Your remote storage area How many versions of protected files to keep on remote storage area The maximum size of your remote storage area Whether to encrypt, compress, or use sub-file copy for backup copies stored on remote storage area v Use the Advanced page on page 47 for these settings: Whether to allow program messages to pop up Performance settings, including the following: - Maximum size file to protect on local storage area - Maximum size file to protect on remote storage area - Maximum speed for transfer to remote storage area The Advanced page also contains a link to set your scheduled backups. Follow the link to do these tasks: - Choose which files to back up on a schedule - Start a backup of your scheduled files immediately - View reports of your scheduled backups
General page
Use the General page to choose the local storage area for the backup copies of your continuously protected files. Choose the storage location and space, and how many versions of protected files you want to keep.
28
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
29
The default space for local backups is 500 MB. During a forced backup of all protected files, Continuous Data Protection for Files can use more space than you configured for local storage. (A forced backup of all files occurs during the initial backup when you install Continuous Data Protection for Files, and when you check the Back up with new settings box in the Settings Notebook). The excessive space condition is only temporary. After the forced backup of all files is complete, the first time you change a protected file, Continuous Data Protection for Files purges files from the local storage area, if necessary, to meet the space you configured. Note: If you try to back up a file which is larger than the space you have allocated for your storage area, Continuous Data Protection for Files will purge all older versions of your files, and then will fail to back up the file. Make sure that the maximum space for your storage areas is greater than the file size limit in the Advanced page of the Settings Notebook.
Local storage only Continuous Data Protection for Files will create backup copies only on the local storage area. Remote storage only Continuous Data Protection for Files will create backup copies only on the remote storage area. Local and remote storage Continuous Data Protection for Files will create backup copies on both the local and remote storage areas. This provides the most protection for your files, and is the default choice.
30
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
This box gives a summary of the folders and files that are continuously protected. The number of items protected refers to the items in the list of folders and files. A single list item can specify more than one file. Click the Details link to view all items in the list and modify the list. The Folders and Files Settings dialog will display. Folders and Files Settings dialog for continuous protection: Specify which folders and files to continuously protect by selecting those to include and those to exclude.
31
The top of the list box has three menu buttons. Click the buttons to add and remove items from the list. Include Click Include to add files and folders that you want to continuously protect. The Select folders dialog will open. Exclude Click Exclude to add files and folders that you want to exclude from continuous and scheduled protection. The Select folders dialog will open. Remove Select a list item, then click Remove to remove that list item. Each row in the list has two columns: Name Patterns in the Name column specify one or more files or folders. See Interpreting File and Folder Patterns on page 10 to determine what files and folders will match a Name pattern with blanks or wildcards. When a folder is protected, all of its files and sub-folders are protected. Type Values in the Type column indicate if the files and folders should be included or excluded from protection. Files and folders of type Exclude will be explicitly excluded from continuous and scheduled protection. Files of type Include will be protected. Exclude has precedence over Include, so any file or folder that matches an Exclude pattern will not be protected, even if the same file or folder matches an Include pattern. (See Including and Excluding Files from Protection on page 33).
Note: This Folders and Files Settings list looks similar to the list displayed in the Initial Configuration Wizard. However, the Initial Configuration Wizard only allows file additions (all of type Include). The Initial Configuration Wizard is intended to get Continuous Data Protection for Files started quickly and easily. Any Exclude patterns exclude files from protection as soon as Continuous Data Protection for Files is installed, but they are hidden from view during installation. Although the installed Exclude patterns are recommended for most users, the Exclude patterns are exposed in the Settings Notebook to allow advanced users more robust configuration options.
32
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
Protected Drives: All files that meet the include and exclude specifications, and that appear to Continuous Data Protection for Files as internal drives, are protected. In some cases, an external USB drive looks like an internal drive, and Continuous Data Protection for Files tries to protect the files on that drive. In this case, add the drive letter to the exclusion list so that all files on the USB drive are excluded from protection. For example, if your E: drive is a USB drive, add E:\ to the list of excluded items. Including and Excluding Files from Protection: Protected files are specified by including files and by explicitly excluding files. Continuous and scheduled protection (not vaulted) Continuous Data Protection for Files keeps a list of files that are included for protection, and a list of files that are explicitly excluded from protection. The list of included files is separated into those that are included for continuous protection, and those that are included for scheduled protection. The list of excluded files applies to both continuous and scheduled protection. A file is on the include list if it is defined in the Folders and Files list by a pattern with Type Include. Similarly, a file is on the exclude list if it is defined by a pattern of Type Exclude. It is possible that a file can be on both the include list and the exclude list. If a file (or folder) is on the exclude list, it will not be protected, neither by continuous protection nor by scheduled protection. Even if the file (or folder) is also on an include list, it will not be protected. If a file is on an include list and not on the exclude list, it will be protected. If a file is not on an include list, it will not be protected. The table below summarizes the interaction of inclusion and exclusion. The two left columns indicate if a file is included or excluded, and the right column indicates if the inclusion and exclusion yield protection for the file.
File is specified on Include list NO NO YES YES Files is specified on Exclude list Is file protected? NO YES NO YES NO NO YES NO
You add items to the include list in several places where settings are configured. You add items to the exclude list in only one place: the Folders and files settings dialog of the Files to protect page of the Settings Notebook.
33
For example, assume the list above, which includes only \My Documents\, and explicitly excludes only *.tmp . The result is that any files with .tmp file extension in \My Documents\ folder will not be protected. All other files in \My Documents\ folder and its sub-folders will be protected. As another example, assume the same list as above. If you choose an application in the Application Settings dialog on page 36 that typically creates files with extension .tmp, those .tmp files will not be protected. Continuous Data Protection for Files provides a default list of files and folders to be included and excluded. This list excludes from protection various Windows operating system files, the Program Files folder, and temporary files. These exclusions are recommended. Be very careful when excluding items. Because the patterns in your list can match more than one folder or file, be careful that you do not exclude some files by mistake. See Interpreting File and Folder Patterns on page 10 for an explanation of how patterns match file and folder names. For example, consider a small variation to an excluded pattern: \Temp\. If you used instead \temp (without the closing folder delimiter), this would have a very different effect. Even though this may seem like a small change, it has a potentially large impact. All files which have \temple, \temptation\, \temperature\, \template\, and other variations of \temp*, would be excluded from protection. Consider another example. You choose to exclude *.gif so you can avoid backing up files saved by your browser when you open different web sites. This pattern will also exclude all .gif files in \My Pictures\ folder. Vaulted folders Vaulted folders, and the files in them, are not affected by the exclude list, nor by the lists of files that are specified for continuous or scheduled protection. All files that you select in the Vault settings dialog of the Files to protect page of the Settings Notebook will be vaulted. Select folders dialog:
34
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
The Select folders dialog allows you to specify files and folders. You can browse to choose a folder, or type the name of a file or folder in the Folder name text field. If you browse and choose a file or folder, you can modify its path in the Folder name text field. Note: Only your internal drives can be protected. Any external storage devices are considered remote storage devices. Interpreting File and Folder Patterns: Protection settings use patterns to specify what files and folders to protect. The files and folders that are protected depend on blanks before and after a pattern, and asterisks in the pattern. You can enter the complete path of a file that you want to protect. For example, C:\Documents and Settings\Administrator\My Documents\Soccer\2005AYSO\ Parent Info U8B.doc. The complete path unambiguously matches a single file. But to specify all files this way would be quite time-consuming. Use asterisks and blanks as wildcards in the pattern to specify several files. An asterisk matches any number of characters in a file path. If there are no asterisks, then Continuous Data Protection for Files will match any file whose fully expanded path name has that exact pattern anywhere in the path or filename. The pattern is not case-sensitive. If there are no asterisks in the pattern, then blank spaces before and after the pattern are interpreted as asterisks. Hence, \myDocs\ and *\myDocs\* yield the same matches. If there are asterisks in the pattern, then blank spaces before or after
Chapter 3. Changing Protection Settings
35
the pattern match no characters. Hence, \myDir\, *\myDir\, and \myDir\* could yield three different matches, as in the table of examples below. As an example, assume a pattern fish. This pattern matches: C:\dir\fish.doc and C:\fish\anyfile.doc and c:\Dirfishfood\something. If the pattern has slashes around it (\fish\), it will match any object with \fish\ somewhere in the path. This pattern matches C:\fish\anyfile.doc but not C:\dir\fish.doc and not c:\Dirfishfood\something
Table 3. File and folder pattern matches This pattern ... \myDir\ or \mYdiR\ or *\myDir\* or *\mydir\* ... matches these folders and files on your computer: c:\myDir\ c:\myDir\Contacts\ c:\myDir\Contacts\contacts.txt c:\Projects\myDir\ c:\Projects\myDir\myThings\ c:\Projects\myDir\myThings\things.doc c:\Projects\myDir\myThings\myPhoto.jpg d:\Notes\myDir\ c:\myDir\ c:\Projects\myDir\ d:\Notes\myDir\
*\myDir\
\myDir\* d:*\mydir\* \my best d:\Notes\myDir\ c:\Books\My Best.doc c:\Photos.jpg\My Best Photo\ c:\Photos.jpg\My Best Photo\Best.jpg f:\Projects\My Best Project\ f:\Projects\My Best Project\Dream.xls c:\Photos.jpg\ c:\Photos.jpg\myHouse.bmp c:\Photos.jpg\My Best Photo\Best.jpg c:\Projects\myDir\myThings\myPhoto.jpg c:\Photos.jpg\ c:\Photos.jpg\My Best Photo\Best.jpg c:\Projects\myDir\myThings\myPhoto.jpg All files and folders on the E: drive.
.jpg
*.jpg
E:\ E:\*
Applications box
This box gives a short list of the applications that are protected.
To see the complete list of the applications that are protected, click Details. The Application Settings dialog will display. Application Settings dialog:
36
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
The Applications and Extensions box presents a list of applications and their associated file extensions. When an application is checked, all files with the associated extensions will be protected. For example, when Adobe Acrobat is checked, all files with extension .xfd,.rmf,.pdx,.pdf, and .bpdx will be protected. You can check and uncheck applications to suit your protection needs. The list of applications has two views. Each view orders the applications in a different way. Click the menu item at the top of the box to change the view. View by Ranking The applications that have the greatest quantity of files on your computer are presented at the top of the list. The applications that have the least quantity of files on your computer are presented at the bottom of the list. View Alphabetically The applications are presented in alphabetical order. If you check a box, all file extensions associated with that application will be added to the list of protected files. If you uncheck a box, all files with that extension will be removed from the list of protected files. Note that removing file extensions from the list of protected files does not mean adding those files to the list of files that are explicitly excluded from protection. Click OK in any of the views to update the list of protected files. Click Cancel to leave the dialog without changing the list of protected files. You can add files to be protected in the Application Settings dialog, but these applications will be protected only if the files are not explicitly excluded. (See Including and Excluding Files from Protection on page 33).
37
Vault box
Displays a summary of vaulted folders.
To change the folders that are protected, click Details. Vault Settings dialog: Specify a list of folders. All files in that folder and all sub-folders will be protected from being changed or deleted.
Vaulted folders cannot be modified nor deleted. Files can be added to the folder, but the files in the folder cannot be changed nor deleted. The Folders and Files box lists the files that are protected by vault. Click Vault to open a browser to choose files to protect. Click Unvault to remove vault protection from the selected folder, and all its files and sub-folders. Neither the Exclude nor Include items from other dialogs affect the list of vaulted folders. All folders in the Vault settings dialog, and only the folders in the Vault settings dialog, will be vaulted. Click the OK button to add your changes to the pending settings updates. Note: The configured settings will not be applied until you click the Settings Notebook OK or Apply button Click the Cancel button to exit the dialog without applying changes. Vault Duration:
38
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
You can specify the duration of vaulting by using special folder names. Files in these folders will be vaulted for a specific period of time and after that time the files will not be vaulted. To specify duration of vaulting, create a folder named\KeepSafe\ in any vaulted area. In the \KeepSafe\ folder, create folders that indicate the vaulting period. For example, C:\MyImportantDir\KeepSafe\Retain 3 years\. Any file created in that folder will be prevented from alteration or deletion for three years. After the expiration time, the file is no longer vaulted. There are three ways to indicate the vaulting period. Each way requires that you use a keyword in the folder name. 1. \KeepSafe\RetainForever\ Files in this folder will be vaulted forever. Such material can never be moved to another folder with shorter vaulting duration. Material can be moved within the folder tree and to other folders of the same duration. 2. \KeepSafe\Retain Duration\ Specify exact vaulting periods using English terminology. Duration is specified by a combination of the following time units: Years Days Hours Minutes Seconds Use 1 or more time units. Each time unit you use must be preceded by a number up to 5 digits long. You may include spaces or underlines or dashes and mix case in the folder name. The following are valid examples: \Retain23days4hours\ \Retain 3years\ \Retain_3years\ \Retain-23DAYS_4minutes\ \Retain 1000 days\ 3. \KeepSafe\RetainUntil Date\ Specify a date after which the vaulting will expire. The date must include year, month, and day in the following format: yyyymmddhhmmss. The hours, minutes and seconds are optional. The default time is 00:00:00. The following are valid examples: \RetainUntil20191231235959\ \RetainUntil 20200101\ \RetainUntil20200101\ \RetainUntil_20200101\ Note: You cannot create a \Retain... folder within a vaulted \Retain... folder. You cannot move material that is in one vaulted \Retain... folder to a vaulted \Retain... folder that has an earlier expiration date.
39
If you changed the specifications for Folders and Files or Applications to include files that were not previously protected, it is highly recommended that you back up those files now. Check the box to scan and protect all files when you click the Settings Notebook OK or Apply button. During a forced backup of all protected files, Continuous Data Protection for Files can use more space than you configured for local storage. (A forced backup of all files occurs during the initial backup when you install Continuous Data Protection for Files, and when you check the Back up with new settings box in the Settings Notebook). The excessive space condition is only temporary. After the forced backup of all files is complete, the first time you change a protected file, Continuous Data Protection for Files purges files from the local storage area, if necessary, to meet the space you configured. A backup is not necessary to activate vault protection. If you changed Vault settings, the folders become vaulted when you click the Settings Notebook OK or Apply button. Do not check this box if you are creating a configuration file for a push installation. If you use this configuration setting in a push install, the backup copies will be created in the system context. When you later run Continuous Data Protection for Files in the user context, you can have problems restoring these files. When to Back Up All Files: When you first install Continuous Data Protection for Files, it is highly recommended that you immediately back up all files that you configured for protection. Without the initial backup, only files that change will be protected. The initial backup will protect all of the existing files that you designated for protection. One exception is when you push an installation of Continuous Data Protection for Files to a remote computer and do not reboot. If you force a backup on a pushed installation without rebooting, Continuous Data Protection for Files will attempt to back up files in the system context. These backups can fail, and when a logged on user later attempts to restore these files the restore can fail. After the initial backup, the typical rate of file changes do not require that you again back up all files at once. If you change the specifications for Folders and Files or Applications to include files that were not previously protected, the new files need to be backed up. If you extend protection to new e-mail files or other files that are included in scheduled backups, the new files need to be backed up. Until you change these files, and without a forced backup, Continuous Data Protection for Files will not back up these files. To protect these files, you must force a backup of all files. If you dont change your configuration but suddenly make a big change to the files that are configured for protection, you should also force a backup of all files. Consider this if you add a new drive whose files are configured for protection. A forced backup causes Continuous Data Protection for Files to scan all local drives looking for files that you designated for protection This means that every file in every directory will be investigated, and all files that meet the include, exclude, and size criteria will be copied to the local or remote or both storage areas. The creation of backup copies could take several hours. It will also take significant processing resources. Plan the backup at a time when you do not need computing resources for other activities.
40
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
After this scan and backup is complete, Continuous Data Protection for Files will continue to operate in the background without any significant impact on your regular computing activities. Changing the Vault settings does not require a forced backup. You can force a backup of your continuously protected files in two places: v The Initial Configuration Wizard, when you initially configure Continuous Data Protection for Files v The Files to Protect page of the Settings Notebook, any time after initial configuration.
Because e-mail files typically are very large, they are not backed up continuously, but only on the schedule that you select. E-mail files are backed up only to remote storage. If the remote storage is not available at the scheduled backup time, Continuous Data Protection for Files will queue the backup copies for later transmission. When the remote storage area becomes available, Continuous Data Protection for Files will create the backup copies on the remote storage area.
41
Storing files in a remote storage area will protect the files in case local copies are lost. Backups of continuously protected files, and files protected on a schedule, are stored in the same remote area. Continuous Data Protection for Files is very tolerant of intermittently available networks. If remote storage area is temporarily unavailable, Continuous Data Protection for Files will queue backup copies until the remote storage becomes available.
42
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
43
be used for general Web-based file storage. If your ISP provides WebDAV functionality, Continuous Data Protection for Files can store backups on a Web-based server. In the Location: field. enter your WebDAV server location using the following format: https://MyISP.com/MyAcct. When using WebDAV, Continuous Data Protection for Files only supports the Basic Authentication method described in the HTTP 1.0 RFC. Because this authentication method sends the password as clear text over the network, it is also recommended that the Web server be configured to use secure sockets. Tivoli Storage Manager or Tivoli Storage Manager Express: Continuous Data Protection for Files can store backup copies on a Tivoli Storage Manager server. You do not need to install the Tivoli Storage Manager backup-archive client. If you install the Tivoli Storage Manager backup-archive client, it functions independently from Continuous Data Protection for Files. In the Location: field, specify the Tivoli Storage Manager server location, using the following format: tsm://Host.com. You can also use an IP address for the server address. You will be prompted to enter a valid password for your Tivoli Storage Manager server. Continuous Data Protection for Files supports Tivoli Storage Manager server version 5.3.3 or later. Configure your Tivoli Storage Manager server before trying to connect from Continuous Data Protection for Files. Register your computer as a Tivoli Storage Manager node. Continuous Data Protection for Files will use the password assigned at registration to connect to the Tivoli Storage Manager server. For more information about registering a Tivoli Storage Manager node for your computer, see IBM Tivoli Storage Manager for Windows Administrators Guide. In order to manage storage space, the Tivoli Storage Manager administrator must grant authority to the Tivoli Storage Manager client node to delete backup copies. For steps to assign authority to delete backup copies, see this topic in the problem determination section: Tivoli Storage Manager Client Node Lacks Authority to Delete Backup Copies on page 94. To avoid problems when using theTivoli Storage Manager server, see the problem determination section: Files are not backed up to Tivoli Storage Manager server on page 93. You can restore backup copies from theTivoli Storage Manager server only with the Continuous Data Protection for Files GUI. You cannot use the Tivoli Storage Manager Backup-Archive client to restore backup copies created by Continuous Data Protection for Files.
44
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
want to restore. When the configured number of versions is reached, older versions of a file are deleted. Keeping more versions requires more storage space, but allows you more choices when restoring a file.
45
Microsoft Windows XP, upgrade from version 2.2 C:\Program Files\Tivoli\CDP_for_Files\dsm.opt Microsoft Windows XP, new installation of version 3.1 C:\Documents and Settings\All Users\Application Data\Tivoli\ CDP_for_Files\dsm.opt. Note: \Application Data\ is a hidden folder, and to see it you must modify your view preferences in Explorer to show hidden files and folders. Microsoft Windows Vista, new installation of version 3.1 C:\ProgramData\Tivoli\CDP_for_Files\dsm.opt. Note: \ProgramData\ is a hidden folder, and to see it you must modify your view preferences in Explorer to show hidden files and folders. Files stored on the local storage area are not encrypted. Files that are compressed can not be encrypted, and the user interface will not allow you to configure both encryption and compression. Files that use sub-file copy can be encrypted. Continuous Data Protection for Files can not protect backup copies that it has encrypted. This is an issue only if you store backup copies on a file server, and then protect the files on the file server. If you configure Continuous Data Protection for Files to encrypt the backup copies to a file server, you must not use Continuous Data Protection for Files to protect the encrypted backup copies on that file server. You can use Tivoli Storage Manager or another backup solution to protect the encrypted backup copies on that file server.
46
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
Check the box to turn on sub-file copy. In the Use sub-file copy for files larger than: field, specify the file size threshold for using sub-file copy. For files larger than this size, only the changed information is copied to the storage area.
Advanced page
The Advanced page allows you to control popup messages and tune performance.
Performance Settings
Do not locally back up files larger than: field Limit the size of files that are backed up to your local storage area. If you try to back up a file which is larger than the space you have allocated for your storage area, Continuous Data Protection for Files will purge all older versions of your files, and then will fail to back up the file. Make sure that the file size limit in this field, and the size limit for files backed up to remote storage, is less than the maximum space for your storage areas. Do not remotely back up files larger than: field Limit the size of files that are backed up to your remote storage area. Maximum remote transfer rate: field You can set a limit on the volume of data that Continuous Data Protection for Files transfers to remote storage. Consider limiting the transfer rate if you need to ease the burden on your network.
47
When considering what files to protect on a schedule, see Types of Protection on page 2 and Considerations for scheduled backups on page 49.
48
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
The scheduled backup reports table gives a summary of scheduled backups to remote storage areas for all computers who share a common central administration folder. For more information on central administration folders, see Administration Folders on page 85. To see the reports table, you must be connected to your remote storage area. Each row identifies the reports associated with one Continuous Data Protection for Files client, and contains the following cells: Version The version of Continuous Data Protection for Files. Last Backup The last completed scheduled backup. Files A number indicating approximately how many files were successfully backed up at the last schedule. Due to the nature of the program and how the logging is done, this number is only an approximation. Click the number to display a complete report of the scheduled backup. In addition to files backed up, the report shows administrative activities and failed backup attempts. Failures This column indicates how many errors there were during the backup. Click the number to display a report of the errors during scheduled backup. History Click the link to display a list of the historical backup and failure logs. Once this list is displayed, you are able to click on logs to display more information. Only reports which had actual files backed up will show as active links. Considerations for scheduled backups: Protect appropriate files on a schedule, and prepare the files for backup.
49
Files that are appropriate to protect on a schedule Large or frequently saved files can consume considerable computing or network resources when they are backed up. You can scheduled periodic backups of these files when the burden on computing or network resources will be least inconvenient. Some files are not often closed and saved, but should be backed up periodically. Files protected by schedule will be backed up even if they are open, but you can try to schedule the backup for a time when the file will be closed. The files you select for scheduled protection will be backed up only at the scheduled time, and only if they change during the scheduled interval. This can yield fewer backup versions than continuously protected files. Fewer backup versions use less storage space, but offer fewer opportunities when you want to restore a file. Closing applications before a scheduled backup Continuous Data Protection for Files backs up all files that have changed during the schedule interval, including files that are still open at the time of backup. The backup copies of files that are backed up while open can be corrupted. So it is suggested that you close applications before a scheduled backup. Continuous Data Protection for Files offers an opportunity to close applications before a scheduled backup. At the beginning of a scheduled backup, Continuous Data Protection for Files attempts to close all files that are listed in a text file called closeapps.txt in the installation directory. Each line in the file must be a program name, with name and extension, but no folder path. Continuous Data Protection for Files sends a close command to each instance of every program named in the closeapps.txt file. Note that Continuous Data Protection for Files will not send a start command to any of those programs when the scheduled backup is finished.
50
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
The Status page displays when you click twice the Continuous Data Protection for Files icon in the system tray or start Continuous Data Protection for Files from the Start>All Programs>Tivoli menu.
51
4. In the Applications box, click the details link. The Applications Settings dialog displays, and the Files to Protect page becomes inactive. 5. Check the applications whose files you want to protect. Uncheck those applications whose files you do not want to protect. 6. Click the OK button. The Applications Settings dialog exits, and the Files to Protect page again becomes active. 7. If you want to add or exclude files and folders by specifying file paths, in the Folders and Files box, click the details link. The Folder and Files Settings dialog displays, and the Files to Protect page becomes inactive. For an explanation of how to include and exclude files in this dialog, see Folders and Files Settings dialog for continuous protection on page 31 8. If you added applications or file specifications, you should now force a backup to ensure that all the new files are immediately protected. See When to Back Up All Files on page 40 for an explanation. Check the Back up with new settings check box. 9. Click the OK button. The Settings Notebook exits and your new settings are applied. If you forced a backup, your system performance will become slower during the extensive scan of your protected drives.
52
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
4. Click the Scheduled Backup Settings link. The Folders and Files Settings dialog for scheduled backups displays, and the Advanced page becomes inactive. 5. Click the Include menu item. The Select Folders dialog displays, and the Folders and Files Settings dialog becomes inactive. 6. Choose a folder in the folders tree, or specify a folder in the Folder name (wildcards allowed) field. You can specify individual files or folders. With wildcards, you can specify all files and folders that match your pattern. See Interpreting File and Folder Patterns on page 10 for details. 7. Click the OK button. The Select Folders dialog exits, and the Folders and Files Settings dialog for scheduled backups again becomes active. The file or folder that you specified is added to the list. 8. Repeat the above 3 steps to specify more folders to protect. 9. In the Folders and Files Settings dialog, select the files and folders that you no longer want protected on a schedule, and click the Remove menu item. The files and folders are removed from the list. 10. Click the OK button. The Folders and Files Settings dialog exits, and the Advanced page in the Settings Notebook again becomes active. 11. Click the OK button. The Settings Notebook exits and your new settings are applied.
53
4. Choose your e-mail application from the E-mail Application drop down list. If your application is not listed in the drop down list, choose Other. If you chose Other, the E-mail Application Data Folder (wildcards allowed) field will become active. 5. If you chose Other, enter a file specification in the E-mail Application Data Folder (wildcards allowed) field. You can type the specification or browse for the folder. 6. Click the OK button. The Settings Notebook exits and your new settings are applied.
54
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
3. In the Vault box, click the details link. The Vault Settings dialog displays, and the Files to Protect page becomes inactive. 4. Click the Vault menu item. The Select Folders dialog displays, and the Vault Settings dialog becomes inactive. 5. Choose a folder in the folders tree, or specify a folder in the Folder name (wildcards allowed) field. You cannot specify individual files. With wildcards, you can specify all folders that match your pattern. See Interpreting File and Folder Patterns on page 10 for details. 6. Click the OK button. The Select Folders dialog exits, and the Vault Settings dialog again becomes active. The folder that you specified is added to the list. 7. Repeat the above 3 steps to specify more folders to vault. 8. In the Vault Settings dialog, select the folders that you no longer want vaulted, and click the Unvault menu item. The folders that you specified are removed from the list. 9. Click the OK button. The Vault Settings dialog exits, and the Files to Protect page in the Settings Notebook again becomes active. 10. Click the OK button. The Settings Notebook exits, and your folders become vaulted.
55
4. Choose the schedule period in the How often to protect your e-mail: drop down list. Depending on the schedule period that you chose, day or time fields will display 5. If applicable for the scheduled period, choose the day and time to perform the backup. 6. Click the OK button. The Settings Notebook exits and your new settings are applied.
56
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
3. Choose the location, number of versions, and space for local backup copies. For explanations of the fields on this page, see General page on page 28. 4. Click the OK button. The Settings Notebook exits and your new settings are applied.
57
4. Choose appropriate values for the remote storage area fields. For explanations of the fields on this page, see Remote Storage page (Settings Notebook) on page 42. 5. Click the OK button. The Settings Notebook exits and your new settings are applied.
Force a Backup
When you change your configuration so that a new set of files is protected, either by continuous protection or scheduled protection, it is recommended that you back up all protected files. Failing to back up all protected files will yield protection only for those files that you change. You can force a backup of all protected files; force a scheduled backup before the scheduled period elapses; and stop a forced backup. These tasks assume that you start from the Continuous Data Protection for Files Status page.
The Status page displays when you click twice the Continuous Data Protection for Files icon in the system tray or start Continuous Data Protection for Files from the Start>All Programs>Tivoli menu.
58
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
4. Check the Back up with new settings check box. 5. Click the OK button. The Settings Notebook exits and Continuous Data Protection for Files begins to scan your protected drives and back up all files that you designated for continuous or scheduled protection. Your system performance will become slower during the extensive scan of your protected drives.
59
1. Open the Continuous Data Protection for Files Status page. 2. Click the Settings menu item. The Settings Notebook displays. 3. In the Settings Notebook, click the Advanced tab on the left side of the notebook. The Advanced page displays.
4. Click the Scheduled Backup Settings link. The Folders and Files Settings dialog for scheduled backups displays, and the Advanced page becomes inactive. 5. Check the Start scheduled backup now check box. 6. Click the OK button. The Folders and Files Settings dialog exits, and the Advanced page in the Settings Notebook again becomes active. 7. Click the OK button. The Settings Notebook exits and Continuous Data Protection for Files begins to back up all files that have changed since the last scheduled backup.
60
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
The Status page displays when you click twice the Continuous Data Protection for Files icon in the system tray or start Continuous Data Protection for Files from the Start>All Programs>Tivoli menu.
1. The bar at the bottom of the Status page displays a brief text message of the status of backup and restore activities. Let your cursor hover over the text. A summary of activities will pop up from the bar. The summary lists 5 activities. For each activity, there is a link to a detailed status dialog, and a brief text that indicates the status of the activity.
61
2. Click the link for the activity you want to stop. The detailed status dialog for that activity displays, and the Status page becomes inactive.
3. Click the Stop button. The detailed status dialog exits, and the Status page becomes active again. Within a short time, the activity will stop.
62
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
Popup Messages
Once you install and configure Continuous Data Protection for Files, it will work unobtrusively in the background. Chances are good that you can forget about Continuous Data Protection for Files until you want to restore a file. Unless you will do some active monitoring of Continuous Data Protection for Files, it is recommended that you allow Continuous Data Protection for Files to warn you those few times that you might need to pay attention to your protection system. For example, if you are running out of space in your storage area, Continuous Data Protection for Files can warn you with a message. To receive such messages from Continuous Data Protection for Files, you must configure Continuous Data Protection for Files to send you messages. By default, Continuous Data Protection for Files sends you messages. You configure this setting in the Allow program messages to pop up drop down list in the Advanced page of the Settings Notebook.
63
The icons on the Status page reflect the status of those areas. In normal conditions, the icons are blue. The icon changes to yellow as a warning. The Remote Storage icon becomes yellow when you are disconnected from your remote storage area. This is not necessarily cause for alarm. For example, if you know that you will connect to your remote storage location before long, you do not need to worry. Continuous Data Protection for Files queues changed files while the storage area is unavailable, and transfers the files when the storage becomes available. However, if you are not aware that your remote storage is unavailable, and do not know that you will soon recover your connection, you should investigate your remote storage. The Local Storage icon becomes yellow if Continuous Data Protection for Files cannot access the local storage area. If the color of any icon is not blue and you are not aware of a transient threat to your protection system, you should investigate further. The Restore icon and the My Files icon never change color. Icon Fly-outs Data and Links Let your pointer hover over an icon to display summary information and links to detailed information. The summary information for each icon gives clues about your protection status, and the links provide details. My Files icon Files under protection If the number of files under protection is not reasonable given the changes youve made and list of files that youve configured, you should investigate further. Verify that you accurately configured the list of files to protect. Click the Settings link below Files under protection to configure the files to protect. View Report The View Report link opens a detailed list of recent protection activity. The top of the list contains failed activities and messages describing the failures. E-mail protection If the Last successful backup on field does not indicate a recent successful backup, verify the configuration of your e-mail application and the schedule for your e-mail backups. Click the Settings link below E-mail protection to configure your e-mail protection. Local Storage icon If the Usage bar indicates that your local storage is full, you should investigate further. You can re-configure your local storage area. Click the Settings link to configure your local storage area. Remote Storage icon
64
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
Usage bar If the usage bar indicates that your remote storage is full, you should investigate further. You can re-configure your remote storage area. Click the Settings link to configure your remote storage area.
The Activity Report lists failed activities (if any) at the top of the report. The failed activity is accompanied by a reason for the failure. Successful activities are listed below. The list is not a complete list of all activities; only the most recent activities are listed. The activity can be one of the following: Backup Continuous Data Protection for Files creates a backup copy on the storage area. Delete Continuous Data Protection for Files deletes the most recent backup copy from the storage area. Purge Continuous Data Protection for Files deletes a versioned backup copy because the storage area is full.
Chapter 4. Monitoring Your Protection
65
Report Continuous Data Protection for Files sends a report of scheduled backup activity to the central management area. Version Continuous Data Protection for Files adds a version suffix to a backup copy. A backup copy becomes versioned when Continuous Data Protection for Files creates a newer backup copy of the same file.
66
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
Status page
The Status page is the entry to the Continuous Data Protection for Files user interface. You can view a summary of how your files are being protected, and link to other screens to view details and change protection settings.
The Status page displays when you click twice the Continuous Data Protection for Files icon in the system tray or start Continuous Data Protection for Files from the Start>All Programs>Tivoli menu.
Menu Links
The top of the page has 5 links: Settings Links to the Settings Notebook on page 27. Use the Settings Notebook to change your protection settings. Restore Links to the Restore Wizard on page 74. Use the Restore Wizard to restore a file from a backup copy.
67
Central Administration Links to theCentral Administration Settings window on page 87. Use the Central Administration page to manage Continuous Data Protection for Files on other computers. Note: The Central Management feature is available with PC Edition and Server Edition. About Provides information about the product, including version level. Help Links to the online help documentation.
Graphic Icons
The center of the screen contains a graphic representation of Continuous Data Protection for Files protection. Let your pointer hover over an icon to display summary information and links to detailed information. My Files
Files under protection: number An approximation of the total number of files that have been protected since the last reboot. Due to the nature of the program and how the logging is done, this number is only an approximation. Settings Links to the Files to Protect page of the Settings Notebook. Use this link to change the files that are continuously protected.
68
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
View Report Links to the Activity Report. The Activity Report shows details of recent backup and restore activity. For an explanation of the Activity Report, see Continuous Protection Activity Report on page 65 E-mail Protection Settings Links to the E-mail page of the Settings Notebook. Use this link to change the e-mail application that is protected.
Restore Links to the restore wizard, which helps you restore files from backup copies. Local Storage
Usage: Shows how much space is being used by backup copies on local storage. The bar graph indicates what portion of the storage is being used. The text indicates the usage in bytes. Settings Links to the General page of the Settings Notebook. Use this link to change the size or location of your local storage; how many versions to keep of each protected file; and whether to use local storage, remote storage, or both. Remote Storage
69
Usage: Shows how much space is being used by backup copies on remote storage. The bar graph indicates what portion of the storage is being used. The text indicates the usage in bytes. Files Pending When remote storage is not available, Continuous Data Protection for Files queues backup copies that are destined for remote storage. When the remote storage becomes available, Continuous Data Protection for Files transmits the queued backup copies. This field indicates the number of files that are destined for remote storage but have not yet been transmitted. Settings Links to the Remote Storage page of the Settings Notebook.
Status Panel
The bar at the bottom of the screen displays a brief text message of the status of backup and restore activities. Let your cursor hover over the text to pop up status of 5 activities and links to detailed status reports. The status of the activities can be one of the following: idle The activity is idle. An activity can become idle before finishing if it is stopped by the user.
preempted The activity is idle, pending a higher-priority activity. active The activity is active. paused The activity was paused by the user. disconnected The storage area is unavailable. disabled The storage area is not configured.
70
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
3. Click the link Settings. The Settings Notebook displays; the Remote Storage page is selected. 4. On the left side of the notebook, select the Advanced page. 5. Click the link Scheduled Backup Settings. The Folders and Files Settings dialog for scheduled backup displays. 6. Click the link View Report.
71
72
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
The Status page displays when you click twice the Continuous Data Protection for in the system tray or start Continuous Data Protection for Files Files icon from the Start>All Programs>Tivoli menu.
Click the large arrow in the middle of the screen. The Restore Wizard will guide you to restore your file. For explanations of the Restore Wizard fields, see Restore Wizard on page 74.
73
Restore Wizard
Restore a protected file. Use the control buttons at the bottom of each wizard page to navigate to all pages. When you reach the final page, click the Finish button to restore your files. The wizard has 4 pages: v Welcome page (Restore Wizard) v Files to Restore page v Restore Location page on page 77 v Summary page (Restore Wizard) on page 77
The box contains a list of files that you can choose to restore. Each row contains the following fields: Select Check the box if you want to restore the file. File Name The name of the file that you can restore. Let your pointer hover over the file name to pop up the full path of the file. Version The drop-down box lists the dates and times that this file was backed up. Choose the version that you want to restore. Size The size of the file.
The list initially contains the last 20 files that were backed up. Change the list of files by clicking the Search or Folder View menu items at the top of the box:
74
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
Search Presents a dialog that allows you to search for backup copies to add to the list.
The Search dialog has several fields. The fields are combined to narrow the search criteria. Leaving any field blank increases the chances of finding more files. Find files With all or part of this name: field Use this field if you know the name or part of the name of the file you want to restore. You can enter a partial file name or folder and use an asterisk as wildcard. If you enter nothing, the search can yield files from any folder with any name. Find files Created by application: check box list Use this list if you know the application that created the file you want to restore. Check as many applications as you want. If you enter nothing, the search can yield files from any application. Find files From location type: drop down list Choose the location of the backup copy. You can choose from three locations: Local Remote The remote storage area that is currently configured. Other Any folder of your choosing. If you previously configured your local or remote storage areas differently than your current configurations, you can search in those previously configured areas. When you choose this option, the Location text entry field becomes active. Type the location to search or click the Browse button to browse for the folder.
Chapter 5. Restoring Files
75
Click the Search dialog OK to begin searching. Click the Search dialog Cancel button to exit the Search dialog without searching.
The Search Status window will show the progress of your search. The Search Status Cancel button will stop the search and return to the list of files without adding the files in your search criteria. If the search completes without being cancelled, the Files to Restore list will contain the results of your search. Folder View
Presents a dialog that allows you to browse folders to find your files. Folder View dialog has the following fields: Folder tree Browse the tree to find a folder. Click a folder and the files in that folder will display in the file view to the right of the folder tree. File view Displays the files in a folder that you chose. Check the box in the Select column to select a file. The Version drop-down list shows the dates that the file was backed up. Choose the version that you want to restore. Click Update Table to add the selected files to the list of files. Click Cancel to exit the dialog without adding any files to the list of files.
76
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
You can restore your files to their original location, or to a different location. Restore data to: Its original location Check the button if you want to restore the files you chose to their original locations. The original location is the full path that pops up when you let your pointer hover over the file name in the Files to Restore page. Restore data to: The following location If you want to restore the files to a different location, check the button and enter the new location in the field. You can use the Browse button to select the location. All files that you chose will be restored to the path that you specify. No part of the original path will be appended to the path that you specify. For example, assume the original files full path is C:\Documents and Settings\Administrator\My Documents\My Pictures\Vacation2006\ Family.jpg. Assume also that you want to restore the file to a folder called D:\BestPhotos. In the Restore data to: field, you must provide the folder name and a file name. Assume that you specify D:\BestPhotos\ Family2006.jpg. Continuous Data Protection for Files will restore the file to this path: D:\BestPhotos\Family2006.jpg.
77
Choose Finish to restore your files. If popup messages are enabled, you see a message when your restore is complete. Choose Cancel to exit the wizard without restoring your files.
78
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
79
A file that is protected by schedule could change several times during the schedule interval. Only the last version of the file prior to the end of the schedule will be backed up. A continuously protected file (one that is protected, but not protected by schedule) is backed up after every change. Continuous Data Protection for Files keeps as many versions of a file on local storage as you configure in the Versions to keep: field of the General page of the Settings Notebook, and as space allows. Continuous Data Protection for Files keeps as many versions of a file on remote storage as you configure in the Versions to keep: field of the Remote Storage page of the Settings Notebook, and as space allows.
80
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
An Example Configuration
The key to configuring your clients to be managed is in defining the central administration folders. Lets assume that there is one managing (administrator) client; and two groups of clients to be managed. In this example, the managed clients in group A do not explicitly configure the Central administration folder: field in the Central Administration Settings
81
window, so their central administration folder defaults to the \RealTimeBackup\ folder on the remote storage location. Both computers have the same central administration folder. Further, this example assumes that the managed clients in group B have different remote storage locations (or, in one case, no remote storage). Two clients with different remote storage locations would have different default central administration folders, and one client without remote storage would have no central administration folder. These three could not be managed as group unless they have a common central administration folder. You want to manage them as a group, so you must specify a common central administration folder. Configure a common central administration folder in the Central administration folder: field in the Central Administration Settings window. The configurations of the clients could look as below.
Table 4. Central Administration folder configurations for managing clients. Remote storage location (configured in Settings Notebook, Remote Storage page) not applicable for managing other clients \\MyServer\ MyShare\ \\MyServer\ MyShare\ \\SpaceMan\ CDPstorage\ https:// MyISP.com/ MyAcct not configured not configured \\MyServer\ MyShare\ RealTimeBackup \\MyServer\ MyShare\ RealTimeBackup \\SpaceMan\ CDPadmin\ \\SpaceMan\ CDPadmin\ \\SpaceMan\ CDPadmin\ Central Administration Settings window, Central administration folder: field value The settings in the two columns to the left yield the central administration folder
Mercury
Managed group A Managed group A Managed group B Managed group B Managed group B
Venus
not configured
Neptune Uranus
Pluto
82
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
Table 5. BrightStar Central Administration folder for managing group A. Remote storage location (configured in Settings Notebook, Remote Storage page) not applicable for managing other clients Central Administration Settings window, Central administration folder: field value The settings in the two columns to the left yield the central administration folder
For example, to manage the configuration of the clients in group A, do the following: 1. Use the Settings Notebook to update the configuration of BrightStar. Configure the values that you want to export to group A. 2. Click the Apply button on any page of the Settings Notebook. 3. Open the Central Administration Settings window. 4. In the Central administration folder: enter (or browse for)\\MyServer\ MyShare\RealTimeBackup. 5. Click the OK button. The window will close. 6. Open the Central Administration Settings window again. 7. Check the Publish this computers settings as the configuration template for other computers to use check box. At this point, consider if you want BrighStar to operate with this configuration, or if you want to return to the Settings Notebook and restore BrightStars previous configuration. When you want to manage group B, configure BrightStars central administration folder to be the same as the central administration folder for group B.
Table 6. BrightStar Central Administration folder for managing group B. Remote storage location (configured in Settings Notebook, Remote Storage page) not applicable for managing other clients Central Administration Settings window, Central administration folder: field value \\SpaceMan\ CDPadmin\ The settings in the two columns to the left yield the central administration folder \\SpaceMan\ CDPadmin\
For example, to view the backup reports of the clients in group B, do the following: 1. Open the Central Administration Settings window. 2. In the Central administration folder: enter (or browse for)\\SpaceMan\ CDPadmin\. 3. Click the OK button. The window will close. 4. Open the Central Administration Settings window again.
83
5. Click the View Report link. The remote storage reports table will open. The remote storage reports table gives a summary of scheduled backup activity for the group B computers. At this point, consider if you want BrighStar to operate with this central administration folder, or if you want to restore BrightStars previous central administration folder.
Group Administrator
For example, to manage the configuration of the client on Mercury, do the following: 1. Use the Settings Notebook to update the configuration of BrightStar. Configure the values that you want to export to Mercury. 2. Click the Apply button on any page of the Settings Notebook. 3. Open the Central Administration Settings window. 4. In the Central administration folder: enter (or browse for) \\MyServer\MyShare\RealTimeBackup\Mercury\. 5. Click the OK button. The window will close. 6. Open the Central Administration Settings window again. 7. Check the Publish this computers settings as the configuration template for other computers to use check box. At this point, consider if you want BrightStar to operate with this configuration, or if you want to return to the Settings Notebook and restore BrightStars previous configuration.
84
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
Venus
Managed group A
Neptune
Managed group B
Uranus
Managed group B
Pluto
Managed group B
Administration Folders
Continuous Data Protection for Files uses special folders to manage configuration settings and product level. Continuous Data Protection for Files clients consume configuration information and new product code from these folders. Continuous Data Protection for Files clients store their status reports on these folders, and can push their configuration information to these folders for other clients to consume. The central administration folder is specified in the Central Administration Folder: field in the Central Administration Settings window. If the Central Administration Folder: field is not configured, then the central administration folder defaults to the \RealTimeBackup\ folder in the remote storage area. If neither the Central Administration Folder: field nor a remote storage area is configured, then there is no central administration folder. Note: There is no central administration folder on Tivoli Storage Manager server remote storage. If you use Tivoli Storage Manager server remote storage and you want to use central administration folders, you must configure the Central Administration Folder: field in the Central Administration Settings window.
85
The central administration folder contains two levels of administrative sub-folders. Group administrative sub-folders These folders apply to all computers that share this central administration folder. Computer-specific sub-folders These folders apply to only 1 computer. In each level of administrative sub-folders, there are two folders: The Reports folder Continuous Data Protection for Files stores status reports in the Reports folder. You can view the reports in the graphical user interface. The full path is <central administration folder>\BackupAdmin\Reports\. The Downloads folder When you put product upgrades or configuration files in this folder, Continuous Data Protection for Files will automatically adopt the product upgrades or configuration. For more information about this process, see Upgrade Silently: Pull Upgrades and Configurations on page 20. The full path is <central administration folder>\BackupAdmin\Downloads\. Note: The consuming computers must have read access to the administration folders.
Reports folder name for all \\MyServer\MyShare\ computers that share the CDPadmin\BackupAdmin\ central administration folder: Reports\
86
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
Table 9. Central Administration Folder Names (continued) Central Administration area is configured in the Central administration folder: field in the Central Administration Settings window as \\MyServer\MyShare\ CDPadmin\ Downloads folder name for single computer: \\MyServer\MyShare\ CDPadmin\BackupAdmin\ Downloads\ Central Administration area is not configured in the Central administration folder: field in the Central Administration Settings window, but defaults to a subfolder of the remote storage location: \\MyServer\MyShare\ \\MyServer\MyShare\ RealTimeBackup\ Computer1\BackupAdmin\ Downloads\ \\MyServer\MyShare\ RealTimeBackup\ BackupAdmin\Downloads\
Downloads folder name for \\MyServer\MyShare\ all computers that share the CDPadmin\BackupAdmin\ central administration folder: Downloads\
87
window are limited to only those computers that are centrally managed from this folder. If you type the name of a folder that does not exist, Continuous Data Protection for Files will create the folder. The central administration folder is used for several purposes. You can change the folder depending on your purpose. See a discussion of central administration folder uses in Administration Folders on page 85.
Publish this computers settings as the configuration template for other computers to use check box
When managing Continuous Data Protection for Files on a group of computers, it is customary to configure one computer as the template for all computers in the group. If you have configured other computers to share the central administration folder of this computer, they can be centrally managed by this computer. Check this box to use this computers settings to configure the other computers. When you click the OK button, this computers configuration settings file will be copied to the downloads subfolder of the central administration folder that is shared by the group of computers. All computers that share the central administration folder will adopt the Continuous Data Protection for Files settings that you publish. If you publish this computers settings, your management of the group can be further extended: Lock the configuration of other computers check box Check this box to prevent any of the centrally managed computers from changing their settings. Note: If you will use the published configuration file to push installation to another computer, all Continuous Data Protection for Files clients that share the central administration folder with the new client will be prevented from updating their configurations. Run Scan Now on other computers check box When you change a configuration to protect files and folders that were not previously protected, you should back up all files. See When to Back Up All Files on page 40. Check this box to force the centrally managed computers to back up all protected files. Note: Publishing to managed computers a configuration file with this setting can put a large burden on the network and the computing resources of the managed computers. Note: If you will use the published configuration file to push installation to another computer, do not check this box. If you use this configuration setting in a push install, the push-installed Continuous Data Protection for Files client will create backup copies in the system context. When you later run Continuous Data Protection for Files in the user context, you can have problems restoring these files.
88
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
The scheduled backup reports table gives a summary of scheduled backups to remote storage areas for all computers who share a common central administration folder. For more information on central administration folders, see Administration Folders on page 85. To see the reports table, you must be connected to your remote storage area. Each row identifies the reports associated with one Continuous Data Protection for Files client, and contains the following cells: Version The version of Continuous Data Protection for Files. Last Backup The last completed scheduled backup. Files A number indicating approximately how many files were successfully backed up at the last schedule. Due to the nature of the program and how the logging is done, this number is only an approximation. Click the number to display a complete report of the scheduled backup. In addition to files backed up, the report shows administrative activities and failed backup attempts. Failures This column indicates how many errors there were during the backup. Click the number to display a report of the errors during scheduled backup. History Click the link to display a list of the historical backup and failure logs. Once this list is displayed, you are able to click on logs to display more information. Only reports which had actual files backed up will show as active links.
89
90
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
91
92
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
93
Continuous Data Protection for Files uses Tivoli Storage Manager API. By default, the Tivoli Storage Manager API uses the clients hostname as the Tivoli Storage Manager node name when identifying itself to the Tivoli Storage Manager server. A Tivoli Storage Manager server administrator typically registers a node using the hostname. In some cases, the Tivoli Storage Manager server administrator uses a name that is different from the clients hostname, and this causes the problem. When this happens, you must configure the Tivoli Storage Manager API to use the appropriate node name when logging on to the Tivoli Storage Manager server. You can correct this problem by doing the following: 1. Edit the dsm.opt file. This files can be in one of three places, depending on the kind of installation: New installation Continuous Data Protection for Files on Windows XP C:\Documents and Settings\All Users\Application Data\Tivoli\CDP_for_Files. Note: \Application Data\ is a hidden folder, and to see it you must modify your view preferences in Explorer to show hidden files and folders. Upgrade from version 2 to version 3 on Windows XP The Continuous Data Protection for Files installation directory. The default installation directory is C:\Program Files\Tivoli\CDP_for_Files. New installation on Windows Vista C:\Program Data\Tivoli\CDP_for_Files. Note: \ProgramData\ is a hidden folder, and to see it you must modify your view preferences in Explorer to show hidden files and folders. 2. Add the node name to the dsm.opt file. To do this, go to the end of the file, and on a new line add the NODENAME parameter followed by the node name. For example: NODENAME TSMclientnode1. 3. Save the dsm.opt file. The next time Continuous Data Protection for Files connects to the Tivoli Storage Manager server, it uses the node name you specified. Continuous Data Protection for Files prompts you for the password, if necessary.
Tivoli Storage Manager Client Node Lacks Authority to Delete Backup Copies
If Continuous Data Protection for Files does not have delete backup permission on the Tivoli Storage Manager server, it cannot successfully purge older files when the designated storage space is getting full. The following error is displayed in the replication.log file:
FilePath ERROR ANS1126E (RC27) The file space cannot be deleted because this node does not have permission to delete archived or backed up data.
Remote backup can be suspended because the backup storage space cannot be purged to make room for new files.
94
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
Continuous Data Protection for Files requires permission to manage space on the Tivoli Storage Manager server and to create file versions. The registered node which is used by the Continuous Data Protection for Files client to access the Tivoli Storage Manager server must have the permission to delete the backups it creates. This function is required when Continuous Data Protection for Files needs to purge files when the backup storage space is full. Enable permission to delete backup copies for Tivoli Storage Manager Enterprise server as below. This sample assumes node name of TSMclientnode1; replace the node name appropriately when you enter the command: 1. Log into the Tivoli Storage Manager server and bring up the Tivoli Storage Manager administrative command line. 2. Enter this command to the Tivoli Storage Manager server: update node TSMclientnode1 backdel=y. Enable permission to delete backup copies for Tivoli Storage Manager Express server as follows: 1. Open DOS command prompt 2. Enter this command: cd C:\Program Files\Tivoli\TSM\server 3. Enter this command: net stop TSM Express Backup Server 4. Enter this command: dsmserv.exe 5. Enter this command to the Tivoli Storage Manager server: update node TSMclientnode1 backdel=y 6. Enter this command to the Tivoli Storage Manager server: halt 7. At the DOS command prompt, restart the Express server by entering this command: net start TSM Express Backup Server
Non-system accounts do not have appropriate user security rights to use Tivoli Storage Manager
If a non-system account does not have appropriate user security rights, and Continuous Data Protection for Files is configured to back up files to Tivoli Storage Manager server, files modified by the non-system account are not backed up. In order to back up files to a Tivoli Storage Manager server, the proper user security rights must be given to the non-system user account to use the Tivoli Storage Manager client. Any non-system account (local or domain) must have the following rights: Back up files and directories Restore files and directories Manage auditing and security logs
Continuous Data Protection for Files user interface contains no file data
If the Continuous Data Protection for Files daemon is not running, or if your browser is in offline mode, the Continuous Data Protection for Files user interface contains no file data. This condition is accompanied by an error message which begins like this: FPA_getNamedObject: Could not find:. There are two possible causes for this problem. Your browser is offline. Your browser must be in online mode to see file data. Internet Explorer
95
and Firefox browsers are turned on- or off- line by checking or unchecking File > Work Offline from the browser menu. Confirm that this menu item is not checked. The Continuous Data Protection for Files daemon is not running. To determine if the Continuous Data Protection for Files daemon is running, and restart if necessary, see Restart Continuous Data Protection for Files Daemon.
96
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
(corresponding to the original 5 versions backed up without compression), and 5 versions of the file named file.txt.cdp (corresponding to the new 5 versions backed up with compression enabled).
97
98
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
Notices
This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the users responsibility to evaluate and verify the operation of any non-IBM product, program, or service. IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not grant you any license to these patents. You can send license inquiries, in writing, to: IBM Director of Licensing IBM Corporation North Castle Drive Armonk, NY 10504-1785 U.S.A. For license inquiries regarding double-byte (DBCS) information, contact the IBM Intellectual Property Department in your country or send inquiries, in writing, to: IBM World Trade Asia Corporation Licensing 2-31 Roppongi 3-chome, Minato-ku Tokyo 106-0032, Japan The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Any references in this information to non-IBM Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk. IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you.
Copyright IBM Corp. 2005, 2007
99
Licensees of this program who wish to have information about it for the purpose of enabling: (i) the exchange of information between independently created programs and other programs (including this one) and (ii) the mutual use of the information which has been exchanged, should contact: IBM Corporation Software Interoperability Coordinator, Department 49XA 3605 Highway 52 N Rochester, MN 55901 U.S.A. Such information may be available, subject to appropriate terms and conditions, including in some cases, payment of a fee. The licensed program described in this information and all licensed material available for it are provided by IBM under terms of the IBM Customer Agreement, IBM International Program License Agreement, or any equivalent agreement between us. Any performance data contained herein was determined in a controlled environment. Therefore, the results obtained in other operating environments may vary significantly. Some measurements may have been made on development-level systems and there is no guarantee that these measurements will be the same on generally available systems. Furthermore, some measurements may have been estimated through extrapolation. Actual results may vary. Users of this document should verify the applicable data for their specific environment. Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. All statements regarding IBMs future direction or intent are subject to change or withdrawal without notice, and represent goals and objectives only. All IBM prices shown are IBMs suggested retail prices, are current and are subject to change without notice. Dealer prices may vary. This information is for planning purposes only. The information herein is subject to change before the products described become available. This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. COPYRIGHT LICENSE: This information contains sample application programs in source language, which illustrate programming techniques on various operating platforms. You may copy, modify, and distribute these sample programs in any form without payment to IBM, for the purposes of developing, using, marketing or distributing application programs conforming to the application programming interface for the operating
100
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
platform for which the sample programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of these programs. Each copy or any portion of these sample programs or any derivative work, must include a copyright notice as follows: (your company name) (year). Portions of this code are derived from IBM Corp. Sample Programs. Copyright IBM Corp. _enter the year or years_. All rights reserved. If you are viewing this information softcopy, the photographs and color illustrations may not appear.
Notices
101
102
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
Trademarks
IBM, the IBM logo and the following terms are trademarks of the International Business Machines Corporation in the United States, other countries, or both:
Lotus Notes Redbooks Tivoli
Adobe, Acrobat and all Adobe-based trademarks are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, other countries, or both. Intel, Intel Inside (logos), MMX and Pentium are trademarks of Intel Corporation in the United States, other countries, or both. Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. UNIX is a registered trademark of The Open Group in the United States and other countries. Linux is a trademark of Linus Torvalds in the United States, other countries, or both. Other company, product or service names may be trademarks or service marks of others.
103
104
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
Index A
accessibility vi Activity Report 63, 65 administration folders 85 Advanced page 47 Application Settings dialog 37 Applications and Extensions box Applications box 11, 36
D
disability vi Downloads folder 85 drives, protected 33 dsm.opt 93 12, 37
G
General page 29
H
How many versions to keep: field 44 How often to protect your e-mail drop down list 13, 42
E
E-mail Application Data Folder text field 13, 42 E-mail Application drop down list 13, 41 e-mail protection monitoring 63 restore files 73 specify which applications are protected 53 E-mail Protection page (Initial Configuration Wizard) 13 E-mail Protection page (Settings Notebook) 41 Encrypt backups radio button 45 exclude files from protection 33 external device remote storage location 14, 43
B
back up all files force a backup of all protected files 59 force a scheduled backup 59 stop backup 60 when to back up all files 40 back up all protected files 59 Back up to: drop down list 14, 43 Back up with new settings check box 40 backup copies format 79 modify with native file system tools 80 restore files 73 specify the local storage area 56 specify the remote storage area 57 versions 79 BackupAdmin folder 85
I
include files for protection 33 information center v Initial Backup page 17 Initial Configuration Wizard 7 E-mail Protection page 13 Initial Backup page 17 Remote Storage page 14 Summary page 17 Welcome page 7 What is Critical page 8 installation advanced 18 command 19 configuration file 24 local silent installation 19 pull upgrade 20 push to remote computers 22 basic 6 requirements 6 run as a service instead of an application 91 system requirements 5 uninstall 18 upgrade considerations 2, 21 Internet, search for problem resolution v Internet, searching for problem resolution vi interpreting file and folder patterns 10, 35 introducing Continuous Data Protection for Files 1
F
file server remote storage location 14, 43 FilePathSrv.exe restart daemon 96 run as a service instead of an application 91 Files are not backed up 93 Files to protect are incorrectly specified 93 Files to Protect page 30 Files to Restore page 74 fixes, obtaining vi Folders and Files box 8, 31 Folders and Files Settings dialog (Initial Configuration Wizard) 9 Folders and Files Settings dialog for continuous protection 32 Folders and Files Settings dialog for scheduled backups 48 force a backup of all files stop backup 60 when to force a backup of all files 40 force a backup of all protected files 59 force a scheduled backup 59 fpa.txt 24 fpcommands.xml 24 FpForServers.js exec 91 FpPushInst.exe 22
C
central administration folders 85 Central Administration Settings window 87 central management considerations 81 closeapps.txt 50 Compress backups radio button 46 configuration file 24 Configuration Wizard 7 E-mail Protection page 13 Initial Backup page 17 Remote Storage page 14 Summary page 17 Welcome page 7 What is Critical page 8 continuous protection definition 2 force a backup of all files 59 monitoring 63 restore files 73 specify files using wildcards 10, 35 specify the local storage area 56 specify the remote storage area 57 specify which files are included and excluded 33 specify which files are protected 51 when to force a backup of all files 40 Critical Settings dialog 12
K
keyboard vi knowledge bases, searching v
L
Local Backup Copy Versions are Greater than Configured 96 local storage area specify the location 56 Local Storage icon 63 Location text field 14, 43
105
M
managing a server 91 managing clients 81 Maximum space for backups: field 45 monitoring continuous protection 63 e-mail protection 63 local client 63 managed clients 63 scheduled protection 63 16,
S
Scheduled backup reports table 49, 89 scheduled backup, force 59 scheduled protection close applications prior to scheduled backup 50 definition 2 force a scheduled backup 59 monitoring 63 restore files 73 scheduled backup considerations 50 specify files using wildcards 10, 35 specify the schedule period 55 specify the storage area 57 specify which files are included and excluded 33 specify which files are protected 52 when to force a backup of all files 40 Select folders dialog 9, 34 Settings Notebook 27 Advanced page 47 E-mail Protection page 41 Files to Protect page 30 General page 29 Remote Storage page 42 silent installation command 19 local silent installation 19 push to remote computers 22 Status page 67 stop backup activity 60 stop restore activity 60 storage area specify the local storage area 56 specify the remote storage area 57 Storage for backup copies is not correctly specified 93 Summary page (Initial Configuration Wizard) 17 Summary page (Restore Wizard) 77 support information v system requirements 5
USB device exclude from protection 33 remote storage location 14, 43 Use sub-file copy check box 46 user interface contains no file data 95
V
Vault box 38 vault duration 39 Vault Settings dialog 38 vaulted protection definition 2 specify vault duration 39 specify which files are vaulted
N
name patterns with wildcards 10, 35 Number of Backup Copy Versions are Greater than Configured 96
54
W
WebDAV server remote storage location 15, 44 Welcome page (Initial Configuration Wizard) 7 Welcome page (Restore Wizard) 74 What is Critical page (Initial Configuration Wizard) 8 when to back up all files 40 wildcards in name patterns 10, 35 Windows installation folder 25 Windows, Notebooks, and Dialogs Application Settings dialog 37 Central Administration Settings window 87 Critical Settings dialog 12 Folders and Files Settings dialog 9 Folders and Files Settings dialog for continuous protection 32 Folders and Files Settings dialog for scheduled backups 48 Initial Configuration Wizard 7 E-mail Protection page 13 Initial Backup page 17 Remote Storage page 14 Summary page 17 Welcome page 7 What is Critical page 8 Restore Wizard 74 Files to Restore page 74 Restore Location page 77 Summary page 77 Welcome page 74 Scheduled backup reports table 49, 89 Select folders dialog 9, 34 Settings Notebook 27 Advanced page 47 E-mail Protection page 41 Files to Protect page 30 General page 29 Remote Storage page 42 Status page 67 Vault Settings dialog 38
O
ordering publications v overview of product 1
P
patterns with wildcards 10, 35 popup messages 63 product overview 1 protected drives 33 protecting a server 91 provide a configuration file 24 publications ordering v pull upgrade installation 20 push installation to remote computers 22
R
Remote Backup Copy Versions are Greater than Configured 96 remote storage WebDAV server 15, 44 remote storage area specify the location 57 Remote Storage icon 63 remote storage location external device 14, 43 file server 14, 43 Tivoli Storage Manager 15, 44 USB device 14, 43 Remote Storage page (Initial Configuration Wizard) 14 Remote Storage page (Settings Notebook) 42 remove product 18 Reports folder 85 restart daemon 96 restore files 73 Restore Location page 77 Restore Wizard 74 Files to Restore page 74 Restore Location page 77 Summary page 77 Welcome page 74
T
Target file system can only handle sequential I/Os. 94 Tivoli Storage Manager 93 client node lacks authority to delete backup copies 94 delete backup copies 94 dsm.opt 93 node name does not match hostname 93 user security rights 95 Tivoli Storage Manager remote storage location 15, 44 trademarks 103
U
uninstall 18 upgrade product considerations 21 interactive installation pull installation 20 6
106
IBM Tivoli Continuous Data Protection for Files 3.1: Installation and Users Guide
Printed in USA
GC32-1783-02