Overland ® Storage REO Business Continuity Appliance Administration Guide REO BCA Administration Guide

©2007-2009 Overland Storage, Inc. All rights reserved.

Overland®, Overland Data®, Overland Storage®, ARCvault®, LibraryPro®, LoaderXpress®, Multi-SitePAC®, NEO Series®, PowerLoader®, Protection OS®, REO®, REO 4000®, REO Series®, Snap Care®, Snap Server®, StorAssure®, ULTAMUS®, VR2®, WebTLC®, and XchangeNOW® are registered trademarks of Overland Storage, Inc. GuardianOS™, NEO™, REO Compass™, SnapWrite™, Snap Enterprise Data Replicator™, and Snap Server Manager™ are trademarks of Overland Storage, Inc. All other brand names or trademarks are the property of their respective owners. The names of companies and individuals used in examples are fictitious and intended to illustrate the use of the . Any resemblance to actual companies or individuals, whether past or present, is coincidental. PROPRIETARY NOTICE All information contained in or disclosed by this document is considered proprietary by Overland Storage. By accepting this material the recipient agrees that this material and the information contained therein are held in confidence and in trust and will not be used, reproduced in whole or in part, nor its contents revealed to others, except to meet the purpose for which it was delivered. It is understood that no right is conveyed to reproduce or have reproduced any item herein disclosed without express permission from Overland Storage. Overland Storage provides this manual as is, without warranty of any kind, either expressed or implied, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Overland Storage may make improvements or changes in the products or programs described in this manual at any time. These changes will be incorporated in new editions of this publication. Overland Storage assumes no responsibility for the accuracy, completeness, sufficiency, or usefulness of this manual, nor for any problem that might arise from the use of the information in this manual.

Overland Storage, Inc. 4820 Overland Avenue San Diego, CA 92123 U.S.A. Tel: 1.877.654.3429 (toll-free U.S.) Tel: +1.858.571.5555 Option 5 (International) Fax: +1.858.571.0982 (general) Fax: +1.858.571.3664 (sales) www.overlandstorage.com

10400242-101 07/2009 ©2009 Overland Storage, Inc. W ii Preface

About this Guide

The Overland Storage REO Business Continuity Appliance (BCA) combines enterprise- class disaster recovery with the world’s most advanced continuous data protection (CDP) in a single appliance.

Conventions

This user guide exercises several typographical conventions to help explain how to use the REO.

Convention Description & Usage Boldface Words in boldface indicate items to select such as menu items or command buttons. Ctrl-Alt-r This type of format details the keys you press simultaneously. In this example, hold down the Ctrl and Alt keys and press the r key. NOTE A Note indicates neutral or positive information that emphasizes or supplements important points of the main text. A note supplies information that may apply only in special cases—for example, memory limitations or details that apply to specific programs. IMPORTANT An Important note is a type of note that provides information essential to the completion of a task or that can impact the product and its function. CAUTION A Caution contains information that the user needs to know to avoid damaging or permanently deleting data or causing physical damage to the hardware or system. WARNING A Warning contains information essential to people’s safety. It advises users that failure to take or avoid a specific action could result in physical harm to the user or hardware. Flow Indicator (>) Words in bold font with a greater than sign between them indicate the flow of actions to accomplish a task. For example, Setup > Passwords > User indicates that you should press the Setup button, then the Passwords button, and finally the User button to accomplish a task.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W iii REO BCA Administration Guide Preface

Product Documentation

REO Series® product documentation and additional literature are available online at: http://www.overlandstorage.com.

Overland Technical Support

For assistance configuring and using your REO, search for help at: http://support.overlandstorage.com/ Our Overland Storage Technical Support staff is also available to assist you by phone at: 1 (877) 654-3429 (Toll-free and active only in US and Canada) +1 (858) 571-5555 Option 5 (Worldwide) They are available on normal business days, 6 AM through 5 PM (PST), excluding Overland holidays. At all other times we will respond to technical support calls within 4 hours. Technical support for our EMEA customers is available as well from our United Kingdom office at: +44 (0) 118-9898050 8:00 AM to 5:00 PM (GMT) Monday through Friday You can e-mail our technical support staff at [email protected].

Electrostatic Discharge Information

A discharge of static electricity can damage micro-circuitry or static-sensitive devices. To help prevent Electrostatic Discharge (ESD), observe standard ESD precautions.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W iv Contents

Preface About this Guide ...... PR-iii Conventions ...... PR-iii Product Documentation ...... PR-iv Chapter 1 - Introduction Overview ...... 1-1 REO BCA Components ...... 1-2 CX Server ...... 1-2 Process Server ...... 1-3 Volume Replication (VX Agent) ...... 1-4 VX Components ...... 1-4 VX Agent Communication ...... 1-6 File Replication (FX Agent) ...... 1-7 FX Components ...... 1-7 FX Agent Communication ...... 1-8 CDP Retention Option ...... 1-9 Chapter 2 - CX Dashboard Overview ...... 2-1 CX Dashboard Login ...... 2-2 CX Dashboard Components ...... 2-3 Checking CX Server / PS Status ...... 2-3 Chapter 3 - VX Agent Volume Protection ...... 3-1 VX Replication ...... 3-1 Profiling ...... 3-3 Differences Between Profiler and VX Replication ...... 3-3 How to Profile a Volume ...... 3-4 Preparing Target Volume for Replication ...... 3-5 Setting Up Replication Pairs Across Different Platforms ...... 3-6 Windows VX Agent ...... 3-6 Windows to Windows Replication ...... 3-6 Selecting Process Server ...... 3-8 Setting Replication Options ...... 3-8 Sync options ...... 3-9 Direct Copy ...... 3-10 Use Compression ...... 3-10

10400242-101 07/2009 ©2009 Overland Storage, Inc. W v REO BCA Administration Guide Contents

Add to Volume Consistency Group ...... 3-10 Process Server NAT IP address ...... 3-11 CDP Retention Option ...... 3-12 to Linux Replication ...... 3-15 Preparing Linux Volumes for Replication ...... 3-15 Windows to Linux Replication ...... 3-19 Linux to Windows Replication ...... 3-21 Clustered Volume Replication ...... 3-22 Editing a Replication Pair ...... 3-26 Retention Logging Policy ...... 3-29 Retention Settings ...... 3-30 Stop or Break a Replication ...... 3-31 Pause Replication ...... 3-32 Force Delete Option ...... 3-33 Recovery Operations ...... 3-34 Chapter 4 - FX Agent File Protection ...... 4-1 When to Use FX Replication ...... 4-2 FX Execution ...... 4-5 Creating User-defined FX Templates ...... 4-6 Things to Remember while Setting FX Job Options ...... 4-15 Replicating Files Through FX ...... 4-17 Replicating One Or More Files ...... 4-17 Creating Jobs and Job Groups ...... 4-19 Group Scheduling Modes ...... 4-22 Editing Existing Job Groups and Jobs ...... 4-24 FX error codes, causes, and solutions ...... 4-26 Chapter 5 - Recovery Operations Data Consistency ...... 5-1 Generating consistency markers/ Tags ...... 5-1 Automating Tag Generation through FX ...... 5-1 Recovery ...... 5-2 When to Use Recovery ...... 5-2 Determine the Time to Recover ...... 5-3 Recovery Snapshots ...... 5-4 Virtual Snapshots ...... 5-4 Scheduled Snapshots ...... 5-11 Event-Based Scheduled Snapshot through CX Dashboard for Linux Target ...... 5-11 Time-based Scheduled Snapshot through CX Dashboard for Windows Target: ...... 5-14 Performing Target Volume Rollback ...... 5-16 Recovery Pair Status ...... 5-19 Target Drive Rollback Status ...... 5-20 Chapter 6 - Checking Status Protection Status ...... 6-1 Volume Protection Status ...... 6-2 Resync required set to Yes ...... 6-3 Preparing for source volume resize ...... 6-4 Resuming from a source volume resize ...... 6-5

10400242-101 07/2009 ©2009 Overland Storage, Inc. W vi REO BCA Administration Guide Contents

Throttling ...... 6-6 What should be done? ...... 6-6 Disk Space Warning Threshold ...... 6-7 FTP Mode ...... 6-7 (Snapshot / Recovery / Rollback) Pair Status ...... 6-7 File Protection Status ...... 6-8 Agent Heartbeat ...... 6-12 Chapter 7 - Configuring Alerts Trap Listeners ...... 7-1 Adding Users and E-mail Alerts ...... 7-3 Types of Users ...... 7-3 To add an Administrator or User ...... 7-4 Mail server settings ...... 7-7 Agent Settings ...... 7-8 Process Server ...... 7-8 Chapter 8 - Log Management Host – Log details ...... 8-1 CX - Log Details ...... 8-2 Download Logs ...... 8-3 Audit Log ...... 8-3 CX Log Rotation ...... 8-4 Linux ...... 8-4 Windows ...... 8-5 Clear FR Logs by Date ...... 8-5 Retention Reserve Space Settings ...... 8-5 Agent Installers ...... 8-5 Chapter 9 - Analyzer and Trending Trending ...... 9-1 When is Trending Used ...... 9-1 Network Trending ...... 9-1 Bandwidth Report ...... 9-2 Bandwidth report tab ...... 9-3 Custom Report ...... 9-3 Health Report ...... 9-4 Custom Report ...... 9-5 Health Report Graphs ...... 9-6 Health Graph ...... 9-8 Detailed Trending ...... 9-10 Analyzer ...... 9-10 Chapter 10 - Configuration CX /Restore ...... 10-1 License Management ...... 10-2 Host-Based License ...... 10-2 Assigning Licenses ...... 10-2 Unlicensed Hosts ...... 10-3 Capacity Utilization ...... 10-4 Licensed Hosts ...... 10-4

10400242-101 07/2009 ©2009 Overland Storage, Inc. W vii REO BCA Administration Guide Contents

License Upload ...... 10-5 License Validity and Expiry ...... 10-5 Capacity Calculator ...... 10-6 Upgrading a License ...... 10-7 Configure Remote CX ...... 10-7 Introduction to remote CX recovery ...... 10-7 Protecting Primary CX Server ...... 10-8 Using the Primary CX Server ...... 10-10 Failing Over to the Standby CX Server ...... 10-10 Post Fail-Over ...... 10-11 Differences Between CX HA and Remote CX Features ...... 10-11 Process Server Fail-Over ...... 10-12 Versions & Patches ...... 10-14 Process Server Traffic Load Balancing ...... 10-14 Chapter 11 - Application Support Application support ...... 11-1 Exchange Server Support ...... 11-2 Protection ...... 11-3 Recovery Types ...... 11-3 Site wide outage ...... 11-3 Application.exe ...... 11-3 Recovery process through CX Dashboard ...... 11-3 SQL Server ...... 11-4 Protection ...... 11-4 Recovery types ...... 11-4 Chapter A - Performance Tuning Tuning the FX for Faster Execution ...... A-1 Options for Faster Execution ...... A-1 Auto Delete FX Logs on Source / Target ...... A-2 Tuning VX Agents ...... A-3 Fine Tuning the Source-Side Driver Component ...... A-3 Working Process ...... A-3 Registry Values ...... A-4 Production Environments with Aggressive Data Writes ...... A-5 Tuning the Target-Side Agent ...... A-6 MaxFastSyncApplyThreads ...... A-6 MaxRunsPerInvocation ...... A-6 MaxMemoryUsagePerReplication ...... A-6 MaxInMemoryCompressedFileSize: ...... A-6 MaxInMemoryUnCompressedFileSize ...... A-7 CompressionChunkSize ...... A-7 CompressionBufSize ...... A-7 SequenceCount and SequenceCountInMsecs ...... A-7 FastSyncHashCompareDataSize ...... A-8 CacheDirectory ...... A-8 MaxDiskUsagePerReplication: ...... A-8 MaxMemoryUsagePerReplication: ...... A-8 NWThreadsPerReplication ...... A-9 IOThreadsPerReplication ...... A-9

10400242-101 07/2009 ©2009 Overland Storage, Inc. W viii REO BCA Administration Guide Contents

MaxRunsPerInvocation ...... A-9 TcpSendWindowSize and TcpRecvWindowSize ...... A-9 CMRetryDelayInSeconds ...... A-10 CMMaxRetries ...... A-10 CacheMgrExitTime ...... A-10 MaxInMemoryUnCompressedFileSize ...... A-10 MaxInMemoryCompressedFileSize ...... A-11 CompressionChunkSize ...... A-11 CompressionBufSize ...... A-11 MinCacheFreeDiskSpace and MinCacheFreeDiskSpacePercent ...... A-11 Tuning TCP Window Sizes ...... A-12 Bandwidth Shaping ...... A-12 Preparing for bandwidth shaping ...... A-12 Bandwidth Shaping Pairs ...... A-13 Creating a Default Bandwidth Policy ...... A-13 Creating Scheduled Policies ...... A-14 Policy Conflicts ...... A-16 Prioritizing Policies ...... A-17 How are Policies Enforced? ...... A-17 Effect of Stopping VX Replication Pairs on the Bandwidth Policies ...... A-17 Advanced Configuration ...... A-18 Glossary and Acronym List

Index

10400242-101 07/2009 ©2009 Overland Storage, Inc. W ix CHAPTER 1 Introduction

This chapter introduces the REO BCA and its components. A high-level overview of REO BCA is discussed followed by a more detailed look at the REO BCA components and their architecture.

Overview

Overland Storage’s REO BCA is an application-aware business continuity solution that combines enterprise-class disaster recovery and advanced Continuous Data Protection (CDP) in a single product. REO BCA is ideally suited for implementing consolidated real time and remote replication based on CDP technology. CDP technology provides the capability to rollback/rewind the system to a point back in time without any data copies or restores. Data changes are captured at block-level on production volumes thus effectively reducing the Recovery Point Objective (RPO). Components of a REO BCA deployment (Figure 1-1) center around a REO BCA appliance that acts as a dedicated Configuration server (CX) and includes host agents (VX or FX) on Production and Backup servers. Process servers (PS) help off-load tasks.

REO BCA Appliance

Figure 1-1: A Typical REO BCA Deployment

The Configuration Server (CX) Operations such as setting replication pairs, performing recovery operations, license management, generating statistical reports, log management, and status reporting are performed through the CX server’s user interface (CX Dashboard).

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 1-1 REO BCA Administration Guide Introduction

The REO BCA, operating as the CX server, resides within the same LAN as the source host and provides a central web-based interface through which the CX server is administered. Targets are usually placed over a WAN or a LAN depending on the type of recovery policy in place.

Process Server (PS) The Process server is deployed within the same LAN as of the CX server. Each replication pair is assigned a Process server which takes care of all the off-load activities.

Host Agents (VX or FX) A host agent can either be a VX agent (for volume-level protection) or a FX agent (for file and directory protection). Hosts are off-loaded by intelligent agents (FX or VX), which do not compete for resources so that business applications are given priority. • VX agents are volume replication agents and perform block-level replication. VX agent has a small footprint on the host and moves only byte-level differences based on data changes. Features like snapshots (virtual and physical) can be taken on the target host without disrupting the replication. • FX agents are file replication agents and perform file- and folder-level replication. Each of these replications can be scheduled to run at a particular time. FX jobs are used in combination with the VX agent as part of the application solution.

REO BCA Components

CX Server The CX server lies in the center of the Production, Disaster Recovery (DR), and Process servers, and forms the nucleus of the REO BCA solution. All the administrative tasks, such as backup, monitor, or restore, are performed through the CX server’s web interface. Additionally the CX server also generates reports, graphs, e-mail, and trap alerts. All the process servers, VX hosts, and FX hosts communicate with the CX server on a constant basis. The PS is used to off-load the CX server for VX replication pairs. The PS is normally located on the CX server; however, under certain circumstances such as space limitations, a separate PS can be used (Figure 1-2).

Figure 1-2: CX Server with a Separate PS

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 1-2 REO BCA Administration Guide Introduction

A list of services that run on the CX server is shown in Table 1-1.

Table 1-1: CX Server Services

Service Purpose Timeshot manager Required to monitor health of replication activity, dispatches mails, monitor services generates graphs from rrd/log files sent by PS, monitor agent licenses, etc. Apache Required for agents to post information about replication activity. Serves as a control path for replication activity. MySQL, Scheduler MySQL DB stores all the meta data information. Scheduler is used for setting up FX jobs on the CX server.

Process Server Process servers are Linux machines located on the CX server (or due to space considerations a separate machine) to handle all the off-loadable activities such as FTP for data transfer, generating log files for graphs, compressing data on its way to the DR servers, etc. The PS is assigned to a replication pair while configuring a volume replication. Each PS can handle many VX replication pairs depending on the available resources. The PS is in constant communication (Figure 1-3) with the CX server, Production and DR servers.

Figure 1-3: Process Server Communication Links

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 1-3 REO BCA Administration Guide Introduction

A list of services that run on the PS is shown in Table 1-2.

Table 1-2: PS Services

Service Purpose Timeshot manager Required to register the Process server with CX server, monitor health monitor services of replication activity from Source or Target to Process server. Generate rrd/log files for bandwidth trending/data transfer activity. Volume synchronization Required to process differentials/resynchronize files sent by agent. processes Proftpd Service Required to facilitate FTP transfer from Source or Target to Process server.

Volume Replication (VX Agent) The VX agent is a software component installed on the Production server and its corresponding DR server to enable volume-level replication between them. The VX agent constantly communicates with the CX server and the respective Process server to perform continuous backup. The VX agent protects the source host at a volume level by continuously replicating the protected source volume to the target. Once you set a replication pair, the replication pair goes through stages: 1. The first stage is called “Initial Sync Step 1” where all the data on the disk is replicated to the corresponding target. 2. The second step is “Initial Sync Step 2” where all the data changes occurred during step 1 are replicated to the target. 3. The third stage is “Differential sync” where all the writes are intercepted by the VX agent and replicated to the target. Differential Sync is a continuous process. Since volume replication is done at a block level, the file system of the target changes to that of the source.

VX Components Once the VX agent is installed, a service named “svagents” is created (Figure 1-4). This service runs two threads “dataprotection.exe” and “s2.exe.”

Figure 1-4: Source VX Agent Composition

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 1-4 REO BCA Administration Guide Introduction

The components required by the VX agent differ depending on the role played by the VX agent (source VX or target VX). VACP consistency tags, s2.exe, and the driver are not used on the target VX agent. The target VX agent uses cache manager and dataprotection.exe to update the data changes from the source (Figure 1-5).

Figure 1-5: Target VX Agent Composition

Driver: The driver is a low-level component that intercepts disk writes and passes them over to S2.exe. The driver operates in three different modes (Table 1-3) depending on the data change rates and available resources.

Table 1-3: Data Capture Modes

Data Mode Meta Data Mode Bitmap Mode The driver captures the offset, The driver captures the offset The driver captures data length and the data itself. and length of the changed changes and stores them data. within a sparse file. Each bit in this sparse file represents the chunk of data on the volume.

The following picture (Figure 1-6) shows how the driver shifts modes to adapt to large data change rates or to handle resources.

Figure 1-6: Driver Mode Shifts

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 1-5 REO BCA Administration Guide Introduction

Dataprotection.exe On the Production server, dataprotection.exe is responsible for replicating all data on disk to the DR server. It is used while the replication pair is in “Initial Sync Step 1.” On the target server, dataprotection.exe is responsible for both replication and recovery.

S2.exe This process runs only on the Production server and starts along with dataprotection.exe. S2.exe works in sync with the driver to replicate real-time writes happening to the production volume.

VACP Consistency Tags Consistency tags (also called bookmarks or consistency events) are generated either manually or through scheduled jobs on the Production server through the “vacp.exe” command line utility found under the VX agent installation path. These tags act as markers on the disk to which a recovery operation can be performed.

Cache Manager The cache manager is used by the target VX agent to move data from the CX server, while the dataprotection.exe applies these data changes to the target volume and then deletes the files from the cache store. The retention logs on the target host are also updated by dataprotection.exe in the process. The picture below (Figure 1-7) shows the differentials on CX being moved to the cache store on the target host and then applied to the target volume.

Figure 1-7: Differentials Moved From CX by Cache Manager The amount of differential data on the CX server and on the target host can be seen through the CX Dashboard on the “Protection Status” screen.

VX Agent Communication The source and target VX agents never communicate with each other directly. All communication between the source and the target VX agents happens through the CX server. This means that the source and target VX agents are unaware of each other. However when a “Direct Copy” is performed, the VX agent performs replication within the same host.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 1-6 REO BCA Administration Guide Introduction

The VX agents communicate configuration and status information to the CX server over HTTP (Figure 1-8). The default configuration uses HTTP over standard Port 80. The source and target VX agents use FTP/FTPS as the data transfer protocol to send and receive data from the assigned Process server. The target VX agents additionally can open connections to Port 873 of the Process server when using off-load re synchronization.

Figure 1-8: VX Agent Communication Links HTTP and FTP/FTPS protocols were explicitly chosen as the communication protocols due to their firewall-friendly nature. Almost all stateful firewalls come with rules predefined for both HTTP and FTP/FTPS so there is no need to open a range of ports specifically.

File Replication (FX Agent) FX File Replication provides: • Asynchronously replicating complete file systems from a Production server (source) to a DR Server (target). • Scheduling jobs through the REO BCA CX interface involving the source and/or the target host. The FX agent is used in combination with the VX agent for protecting applications like SQL server, Exchange server, etc.

FX Components Once the FX agent is installed, a service named “svagents” is created (Figure 1-9).

Figure 1-9: FX Components

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 1-7 REO BCA Administration Guide Introduction

Scheduler The FX scheduler is a CX Dashboard component used to schedule a particular FX job for repetitive execution.

NOTE: To learn more about scheduler, refer to the section “Group Scheduling Modes” on page 4-22.

Prescript Prescript is optional. Using the Prescript option, a script file (batch file or a shell script) can be passed on to the FX job that is executed before the actual FX replication begins.

NOTE: To learn more about FX execution sequence, refer to the section “FX Execution” on page 4-5.

Postscript Postscript optional. Using the Postscript option, a script file (batch file or a shell script) can be passed on to the FX job that is executed after the actual FX replication begins.

NOTE: To learn more about FX execution sequence, refer to the section “FX Execution” on page 4-5.

File Replication This component performs file or directory replication. There are numerous options found on the CX Dashboard to adjust the replication behavior.

NOTE: To learn more about File Replication options, refer to the section “Replicating Files Through FX” on page 4-17.

FX Agent Communication The FX agents communicate (Figure 1-10) configuration and status information to the CX server over HTTP protocol. The source and target FX agents (unlike the VX agents) communicate directly to each other. The result is that data transfer occurs between the source and target FX agents without involving the CX server. The data transfer protocol by default, is a single socket connection to port 874 of the source or target. The port number can be customized under the FX “Job Options.”

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 1-8 REO BCA Administration Guide Introduction

Figure 1-10: FX Agent Communication Links

CDP Retention Option CDP Retention option technology enables you to roll a volume back in time or take a snapshot of a protected volume back in time. CDP Retention is specific for volume replication pairs. This option can be enabled at any time (Figure 1-11).

Figure 1-11: CDP Retention Option on the CX Dashboard If this option is enabled, a screen is displayed where you are prompted to enter the location of retention logs and the type of policy used to manage the logs. The VX agent on the target host intercepts each write command received from the CX server, updates the target volumes accordingly, and generates the corresponding retention logs (Figure 1-12).

Figure 1-12: CDP Retention Option Logs Being Generated

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 1-9 REO BCA Administration Guide Introduction

These retention logs store information about data changes within a specific time period. This time period is referred to as the retention window. Any rollback or back in time snapshot can be made only within this retention window. Retention log files grow in size to accommodate data changes happening on the Production server. There are three kinds of retention policies that control retention log size: time-based, space-based, and a combination of both. Depending on the type of policy enforced, the retention window is maintained by discarding older data changes within the retention log files to make room for new data changes. To learn more refer to “CDP Retention Option” on page 3-12.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 1-10 CHAPTER 2 CX Dashboard

Overview

The CX Dashboard is web-based and therefore has to be accessed through a web browser. It acts as a management console and is best viewed with a resolution of 1024x768. It supports Microsoft 6+ (recommended) and Firefox 1.0+. Through the CX Dashboard, you can perform a variety of continuous backup operations at both volume and file levels. Figure 2-1 shows a high-level view of the CX Dashboard capabilities.

Figure 2-1: CX Dashboard Options Through the CX Dashboard you are able to: • Set file and volume replication pairs. • Monitor status of replication pairs and recovery operations. • Define bandwidth policies specific to REO BCA. • Download logs. • Set e-mail alerts. • Obtain graphs and view health reports. • Perform recovery operations (such as target volume rollbacks, snapshots, etc.).

CAUTION: If a fully-qualified domain name is not used, a Linux-based CX server will relay a loop-back address. While working with the CX Dashboard, always use a fully-qualified domain name.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 2-1 REO BCA Administration Guide CX Dashboard

CX Dashboard Login

1. To access the CX Dashboard, open the browser and enter the IP address of the CX server. 2. At the Login screen (Figure 2-2), enter the user name and password. The default user name is “admin” and the default password is “password.”

Figure 2-2: Logging Into the CX Dashboard

IMPORTANT: For security reasons, we recommend that you change the default user name and password.

Upon successful authentication, the default Protection Status screen opens (Figure 2-3).

Figure 2-3: CX Dashboard Default Screen (REO BCA 100)

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 2-2 REO BCA Administration Guide CX Dashboard

CX Dashboard Components

The CX Dashboard is divided into two major areas: • The left side is the narrow Command Pane containing six icons, each with a specific functionality: • Volume Protection – Used to set volume replication pairs, edit existing volume replication pairs, or even remove a volume replication. • File Protection – Used to set file replication pairs, edit, or delete existing file replication pairs. • Protection Status – Used to monitor activities such as file replication, volume replication and recovery operations. • Recovery – Used to perform recovery operations such as snapshots and target volume rollback. • System – Used to set or remove agent licenses, download log files, set bandwidth shaping, etc. • Trending – Used to view a wide variety of graphs such as compressed data, network trending, etc. • The right side is the larger View Pane whose display changes depending on the command icon selected.

Checking CX Server / PS Status Normally the Process server is on the CX server and you can see all the services. However, when the Process server is installed on a different machine, the number of services listed on the CX Dashboard is less. 1. To check the status of the CX server (or the Process server), access the console. 2. Issue the command service tmanagerd status.

Figure 2-4: Sample tmanagerd Status

To stop the service, issue a service tmanagerd stop command. To restart the service, issue a service tmanagerd start command.

CAUTION: All the required services are monitored by tmanagerd and should be running at all times.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 2-3 CHAPTER 3 VX Agent

In this chapter you will learn to use the volume replication (VX) agent through the CX Dashboard. Examples are given that show in detail how to set up replication pairs, edit settings of an existing replication pair, and even stop a replication pair. At the end of this chapter, you are able to: • Set up replication pairs: • Replicate any Windows or Linux Production server to any Windows or Linux Disaster Recovery server. • Backup a Microsoft cluster environment through a VX agent. • Replicate a mount point to any Windows or Linux platform. • Use the CDP retention option technology. • Edit existing replication pairs: • Enable or disable CDP retention option. • Expose a target volume to the DR server without stopping a replication pair. • Other settings like forcing a Resync and enabling or disabling encryption.

Volume Protection

To provide complete volume protection, the VX agent service runs every time the host starts. For Windows hosts, you can check the status of the VX agent service through services.msc. For Linux hosts, you can check by accessing the console, navigating to the bin folder under the VX agent installation path, and issuing a ./status command. To stop the service, use the ./stop command; to restart it, use the ./start command.

CAUTION: The VX agent service is a critical part of the REO BCA and its CDP retention technology. It needs to run at all times.

VX Replication Volume protection is used to replicate data at a volume level. Because the VX agent performs block-level replication, the agent is ideal for protecting enterprise applications or volumes with heavy data change rates. To set up VX replication pairs: 1. Install the VX agent on both the Production and DR servers. 2. Point both VX agents to the same CX server. 3. Assign appropriate licenses to both the agents.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 3-1 REO BCA Administration Guide VX Agent

4. Ensure that the VX agents are up and running on both the Production and DR servers. 5. Verify that the VX driver is not bypassed. Through the Volume Protection option you can: • Set volume replication pairs. • Make changes to a replication pair. • Break or pause a replication pair. Click the Volume Protection icon in the Command Pane to display the Source Site drives (Figure 3-1).

Licensed Agents On This CX Server

Figure 3-1: Volume Protection Screen The source site contains the list of VX hosts pointed to this CX server. Expand any of the host to display a list of volumes under it (Figure 3-2).

Cluster Environments In a cluster environment, the heading Cluster Groups Volumes shows below the hosts. Clicking the box next to the name displays the cluster volumes. Refer to the section Microsoft clustered volume replication to set up replication of a cluster environment.

Figure 3-2: Cluster Groups Volumes Expanded View

Important Notes: • The target volume should be either equal to or larger than its corresponding source volume. • All the data on the target volume is lost once the replication pair is set. • While the replication is in progress the target volume will always be locked unless you manually unhide the target volume.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 3-2 REO BCA Administration Guide VX Agent

• The file system on the target volume changes to that of the source volume. Replication goes through three stages: 1. Resync Step 1 – All the data on the source volume is replicated to the target volume in this stage. 2. Resync Step 2 – All the data changes accumulated during Resync Step 1 is replicated to the target volume. 3. Differential Sync – A continuous process where all data changes are intercepted by the VX agent and then transferred to the target host.

Profiling Profiling is the process of gathering information about a system based on observed behavior. A Production server is profiled to gain valuable information such as data change rates, data compressibility, required bandwidth storage requirements, and so forth. After installing a VX agent on the Production server (or other host that is to be profiled), a CX server is attached to the same LAN, and a replication pair is set up using the CX Dashboard with the Production volume as the source and InMageProfiler as the target. This enables the CX server to continuously track all data changes on the Production volume. Profiling should continue for at least two weeks (preferably for a month) to provide a statistically significant amount of data. After profiling, DR planners can answer questions like: • What is the total storage capacity required for disaster recovery of select applications? • What is the bandwidth required for a near-zero RPO? • What is the bandwidth reduction due to compression? • Does the currently provisioned bandwidth suffice for a continuous DR implementation? • What is the storage required for desired retention window? • How are the data changes distributed throughout the day, week, or month? • What is the bandwidth requirement for a certain RPO?

Differences Between Profiler and VX Replication The table below compares using Profiler to using VX replication.

Table 3-1:

Profiler VX replication

Target CX server Another host with VX agent Starts and remains in Resync step 1-> Resync step Replication Status Differential Sync 2-> Differential Sync Only differential data is All data including data on disk Data replicated is replicated To size the production To protect data Objective environment

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 3-3 REO BCA Administration Guide VX Agent

How to Profile a Volume Once the appropriate license is assigned to the Production server agent, the agent appears on the CX Dashboard screens enabling you to perform backup operations: 1. Click Volume Protection on the left. 2. Select the volume that is to be profiled (Figure 3-3)

Figure 3-3: Selecting Volume for Profiling 3. Click Start Replication. 4. When the Target Site screen opens (Figure 3-4), select InMageProfiler.

Figure 3-4: Target as InMageProfiler 5. Scroll down to select the desired Process Server (Figure 3-5) that will handle the replication pair.

Figure 3-5: Selecting the Process Server

NOTE: Most of the replication options are disabled because the volume is only being profiled, not replicated.

6. Click Submit (Figure 3-6).

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 3-4 REO BCA Administration Guide VX Agent

Figure 3-6: Available Replication Options Unlike a normal replication, the profiling pair starts in Differential Sync mode. 7. While a volume is being profiled it cannot act as a source volume for any other target. You can monitor the status through the Protection Status screen (Figure 3-7).

Figure 3-7: Monitoring Volume Profiling Status Through Protection Status Screen

Preparing Target Volume for Replication After installing VX agents on the source and target (on a Windows platform), you should next optimize the source volumes. This step is optional and can be omitted, but by doing this, the bootstrap process and subsequent replication achieve better compression and thus complete sooner. You only need to optimize the source volumes that you intend to replicate. Other volumes should not be optimized. To optimize a source volume that has considerable amount of free space, you should run the volume optimization tool volopt.exe found in Agent Installation folder. This reduces the duration of the initial sync and result in higher compression levels. However, if the source volume is low on free space, skip this step. Volopt.exe takes a single drive letter as an argument. The time it takes to complete is proportional to the amount of unused space on the volume. You can estimate the time remaining by looking at the progress indicator.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 3-5 REO BCA Administration Guide VX Agent

This tool creates a file on the specified volume; this file takes up all the free space on the volume leaving only 1 GB (by default) free space and then deletes the file automatically. This helps the VX agent to perform a relatively faster initial sync. Alternatively, you can also specify the name of the file, and amount of free space to be left unused. Multiple volopt processes can be run in parallel. Contention for the disk controller can reduce the expected savings in time. The target volume on the remote host does not require optimization. Just perform a full format (as opposed to a quick format) of the target volume before starting replication. Ensure that you do not intend to use the target volume for any purpose other than replication, since all data is lost during the format.

Setting Up Replication Pairs Across Different Platforms VX supports volume-level replication for Windows and Linux partitions. Due to this cross- platform support, you can replicate from and to any one of them. Heterogeneous combinations like Windows source to Linux target and Linux source to Windows target are possible. Setting up a replication pair is a similar process for all of them. Additionally, you can replicate from and to mount points. Recovery operations can be performed from the CX Dashboard and also through the command line interface. Replications can be set up across different platforms; however, recovery operations differ by platform. In this section, you will see how to set up replication pairs (Figure 3-8).

Figure 3-8: Replication Pair Setup Process

Windows VX Agent Windows VX agent gets installed into C:\Program Files\InMage systems by default. This can be changed during the installation. Once installed and the service is running (requires a reboot), the agent needs to be pointed to one of the CX servers. Once the CX server issues a license to the VX agent, its ready for use. The same agent can act as either the source or the target. A Windows VX agent can replicate to either another Windows target or a Linux target.

Windows to Windows Replication Once volume optimization completes on the source volumes and formatting is complete on the corresponding target volume (equal or larger than the source volume size), then you can start replicating the source volume to the target volume: 1. At the CX Dashboard, click Volume Protection. The Source Site screen is shown. 2. Expand the source host Primary Drive and select a volume that is to be replicated (Figure 3-9).

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 3-6 REO BCA Administration Guide VX Agent

Figure 3-9: Selecting the Source 3. Click Start Replication. 4. Verify that the selected volume is not Inactive (as reported in the Replication Status column on the far right).

NOTE: The application field shows the applications installed on those volumes. REO BCA supports Windows and Linux File Services, MS Exchange, and MS SQL Server. (REO BCA is aware of these applications and provide greater support for these applications such as application consistency, failover, failback, etc.)

5. Click the Target link in the gold bar. The Target Site screen is shown (Figure 3-10 on page 3-8).

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 3-7 REO BCA Administration Guide VX Agent

Figure 3-10: Selecting the Target Volume Target volumes that are smaller than the source volume size are grayed out. The target volume should be larger or the exact same size as of the corresponding source volume. 6. Select the WAN volume to which the replicated data is written. In this screen, you complete the source-to-target mapping.

CAUTION: While replication is in progress, the target volume is locked and cannot be accessed by any other program. Windows 2008 prompts for a format of the target volume which should be ignored. All the data in the target volume is overwritten, with no recourse for recovery. The target volume should never be the boot volume of the remote host, or the volume where the system’s paging file is located. Overwriting these volumes leads to an unbootable remote system.

Selecting Process Server All the Process servers that point to the CX server are listed here. Choose the Process server which will handle all the off-load activities specific to this replication pair. For better scalability, point more Process servers to the CX server. Select the Process server and scroll down to set the Replication Options (Figure 3-11).

Figure 3-11: Selecting the Process Server

Setting Replication Options From the Replication Options section (Figure 3-12):

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 3-8 REO BCA Administration Guide VX Agent

• Secure Transport from Source to InMage CX – Check this option to encrypt data transmission from source host to the CX server. • Secure Transport from InMage CX to Destination – Check this option to encrypt data transmission from the CX server to a remote target.

Figure 3-12: Setting Replication Options

IMPORTANT: Encryption can have a certain degree of performance penalties compared to unencrypted transmissions. The performance impact is limited to the CX and Target servers. If the CX and Target servers are on the same system, then do NOT enable compression for better performance.

Sync options There are three sync options: Fast, Offload, and Direct Copy (Figure 3-13).

Figure 3-13: Sync Options • Fast – This option performs a faster Resync at the cost of source host’s CPU resources. • Offload – On the other hand performs a slower Resync with relatively less source host CPU cycles. • Direct Copy – Data is replicated direct from source to target.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 3-9 REO BCA Administration Guide VX Agent

Direct Copy Direct Copy is used when both source and target volumes reside on the same machine. This is mainly used for migrating data between similar or heterogeneous storage hardware, such as data migration between DAS to SAN, etc. Data can be quickly migrated without any impact on the network, since the data gets replicated directly from the source disk to target disk. Only the differentials are sent to the CX server and then back to the target disk. A checksum of the data is not computed during initial Resync to minimize the CPU impact on the host. Also, number of threads used for direct sync is configurable, giving better control on the speed of the initial resync. This allows you to throttle up or down your I/O usage.

Figure 3-14: Setting Replication Options Direct copy is used to reduce the RPO value by physically transporting the target volume to a remote host and then reusing the same volume for its corresponding source. Any disk controlled by the Production server (including a different storage subsystem) can be used as a target volume, making it suitable for data migration between arrays, or even DAS to SAN, etc. CPU usage for Direct Copy is expected to be cumulatively lower than a normal Resync in most cases since a checksum is not performed. However, the I/O is performed much faster, and could as well compete with the production I/O.

Use Compression By default, data compressed when transmitted from the CX server to the target disk is called CX Based Compression. This is a recommended option for a WAN. The other option is Host Based Compression where data is compressed by the host.

Add to Volume Consistency Group Volume consistency groups are used when more than one volume has to be replicated together to preserve the write order across those volumes. Ideally volume groups are used for applications spanning over multiple volumes to preserve writer order and time stamps.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 3-10 REO BCA Administration Guide VX Agent

This is highly efficient with databases or large applications. Using volume group prevents any one volume from getting far ahead of others. Thus, at any point in time, the replicated changes for all volumes is consistent across all volumes in the same consistency group. It is quite similar to setting up a normal volume replication. Under the replication options, you can choose to add this new replication pair to an existing volume group or you can create a new volume group (Figure 3-15).

Figure 3-15: Setting Replication Options

Process Server NAT IP address At times the Process servers are placed over different networks from the Production or DR servers as shown in the graphic below (Figure 3-16). The VX agent cannot communicate with the Process servers in this case. This issue is addressed by assigning a NAT IP address for the Process server through the CX Dashboard.

Figure 3-16: Using NAT for the Process Server To enable the source agent to communicate with the Process server on a different network, enable the option Use Process Server NAT IP address for Source (Figure 3-17). Similarly to enable target hosts to communicate with Process servers on different networks, enable the option Use Process Server NAT IP address for Target.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 3-11 REO BCA Administration Guide VX Agent

Figure 3-17: NAT Options You can assign a NAT IP to a Process server in the System > Agent Settings screen (Figure 3-18). Select the desired Process server, enter a NAT IP address, and click Change Settings.

Figure 3-18: Agent Settings for the Process Server

CDP Retention Option By default, the Enable CDP Retention option is active (Figure 3-19), giving roll-back capabilities to the replication pair. Disable the option to perform a ordinary volume replication. Refer to “CDP Retention Option” on page 1-9 to learn about CDP Retention option functionality.

Figure 3-19: CDP Retention Enabled If the CDP Retention option is not enabled, the replication starts the moment you click Submit under Replication Options. Retention log folders need to be excluded from virus scanners to avoid an increase in RPO time. Click Submit to start the replication pair.

Automatic Resync Options Automatic Resync is used when a replication pair is required to address data inconsistencies automatically. During replication, if there is any inconsistency from either of the VX agents (source or target), the resync required field (seen after a replication is set under protection status) is set to Yes indicating a force resync needs to be done at a later time (requires manual intervention).

Figure 3-20: Automatic Resync Options Section By enabling Automatic Resync Options, a resync required flag has the replication pair wait for a certain period of time (by default, 30 minutes) and then it performs a forced resync within the time frame specified in the options. This ensures data consistency and minimizes manual intervention. The following is a situation when a resync is required (flag set to Yes): Important Notes:

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 3-12 REO BCA Administration Guide VX Agent

• Resync Required is set to Yes when the CX server detects any inconsistency on the target volume. • CDP retention option logs are created freshly after each Resync. • E-mail alerts are sent out for the above two scenarios if configured accordingly. • Ensure that retention logs are stored on a NTFS partition for a Windows system or a native Linux file if the target is a Linux system. • Ensure enough free space is set aside for retention logs.

Types of CDP Retention Option Policies You can handle these retention logs through three different modes: • Space-based policy • Time-based policy • Composite policy (blend of both) Space-Based policy. A space-based retention policy ensures that all latest changes amounting to at least 256 MB (or the amount of memory you entered) are stored in the retention logs enabling a rollback to any point in time within the memory limit. Sometimes this can span over months (fewer writes to the disk), or lasts for just a few minutes (aggressive writes to the source volume). Enter the amount of space (256 MB or more) and the location of the retention logs (recommended drives are shown). Ensure that there is enough free space on the retention log volume and the volume is either Windows NTFS or Linux native file. Time-Based Policy. To opt for this policy, enter the time in days and hours for which you wish to retain the changes (instead of the amount of space). All the changes that fall within the specified time gets stored into the retention logs and the space is adjusted automatically. The space occupied for retention logs under the time-based policy is shown as 0 on the CX Dashboard since there is no space restriction here. You can observe this in the Volume Protection > Target > View Details screen. Composite Policy. Using time and space together is called composite policy. Table 3-2 shows the interaction between the options.

Table 3-2: CDP Retention Option Policy

Memory Condition Time Result Memory threshold hit Time threshold not hit 256 MB of logs stored (will not overshoot allocated space). Memory threshold not hit Time threshold hit Logs for specified time (1 day) are available despite having free space (will not overshoot time limit).

The CDP Retention option generates retention log files on the target host. Use the Retention Logging Policy area to define a policy how these logs should be handled.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 3-13 REO BCA Administration Guide VX Agent

Figure 3-21: Retention Option Fields The Retention Logging Policy fields are: • Retention Policy – Displays the type of policy being used. • Retention Log Size – A minimum of 256 MB is required. • Unused Space – Amount of free space (Figure 3-22) left after allocating the retention logs space.

Figure 3-22: Retention Reserve Space Settings Field

NOTE: This is configured through System > Agent Settings > Retention Reserve Space Settings. Enter the required amount of space to be left unused on the retention volume, and then click Commit.

• Retain Changes Up To – The maximum limit of space or time reserved for retention logs. When there are more changes to be accommodated, the older changes are removed to accommodate the new changes. Filling in days and hours rather than size creates a time-based retention policy. • On Insufficient Disk Space – When space is low on the retention log volume, the retention engine does one of two options: • The engine deletes older logs to make space for new changes. This is the default behavior.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 3-14 REO BCA Administration Guide VX Agent

• The engine stops applying differentials to the target until free space is available. • Log Data Directory – This is where the retention log files are stored. Important Notes: • The volume containing CDP retention option logs will not be displayed on the CX Dashboard. This is to safe guard the retention logs from accidental deletion. • CDP retention option logs are always stored on the Target host. • Retention logs cannot be stored on a FAT volume so be sure to give a non-FAT (NTFS) volume for retention logs on a Windows platform. • While storing retention logs on a Linux target host, FAT, NTFS and FUSE file systems should not be used; always use a native file system to store retention logs. • You should avoid creating retention logs on network or other drives that can become unavailable. • Select a volume where you can guarantee the disk space selected will always be available. • While replication is in progress, if the target host reboots and the log entry is not in /etc/fstab, the file system is unmounted and the logs are written using the home space. To avoid the loss of logs, when a retention path is mounted, the entry must also be made in /etc/fstab.

Linux to Linux Replication

Preparing Linux Volumes for Replication Linux mount accepts a label to indicate a block-special device containing a file system. If you opt to use these labels to identify the replicated devices on the source system, they can result in a conflict of names on the target. An example is when both the source and the target systems address the root volume by label and then you choose to replicate the root volume on to another device on target. Since the label is part of the file system, it also gets replicated and now the target has two devices with the same label. In this case, the boot process gets confused about which one to use. This can be the case for any volume with a label. These /root and /boot label conflicts could result in a system not coming up on reboot. Here is an example of labels being used with entries in /etc/fstab:

LABEL=/boot /boot ext3 defaults 1 2 LABEL=/root / ext3 defaults 1 1

This situation does not arise when labels are not used for any of the replicated devices. If you use labels for the devices, you can resolve it in two ways: • Use unique labels on the target system (see “Solution 1”). This approach ensures that source and target have no common labels. Since each file system has its own commands to set and get labels, refer to the file system documentation. Example: e2label for ext3 and resiserfstune for reiserfs. • Instead of labels, use explicit device names (see “Solution 2”). This approach solves the problem by identifying the block-level devices with complete path names (for example, use /dev/sda1 and /dev/sda2).

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 3-15 REO BCA Administration Guide VX Agent

Here are a few files that use labels at boot time. Ensure that these are updated to use either unique labels or device names depending on the approach taken: /boot/grub/grub.conf (RedHat) /boot/grub/menu.lst (SUSE) /etc/fstab

Solution 1 This procedure explains how to set unique labels. Sample of /etc/fstab on target before the change:

# This file edited by fstab-sync - see 'man fstab-sync' for details LABEL=/ / ext3 defaults 1 1 LABEL=/boot /boot ext3 defaults 1 2

Steps involved in preparing the target volume (UNIX/ Linux specific): 1. Read current labels based on the device names.

[root@rut-flt-tgt ~]# e2label /dev/sda1 /boot [root@rut-flt-tgt ~]# e2label /dev/sda2 / 2. Change the labels.

[root@rut-flt-tgt ~]# e2label /dev/sda1 /target_boot [root@rut-flt-tgt ~]# e2label /dev/sda2 /target_root

3. Modify the /etc/fstab file to reflect the new labels just set.

# This file is edited by fstab-sync - see 'man fstab-sync' for details LABEL=/target_root / ext3 defaults 1 1 LABEL=/target_boot /boot ext3 defaults 1 2

4. Modify the file /etc/grub.conf before changing the label.

title Red Hat Enterprise Linux AS (2.6.9-42-test.ELsmp) root (hd2,0) kernel /vmlinuz-2.6.9-42.ELsmp ro root=LABEL=/ initrd /initrd-2.6.9- 42.ELsmp.img 5. Replace the old labels with ones just created.

title Red Hat Enterprise Linux AS (2.6.9-42.ELsmp) root (hd0,0) kernel /vmlinuz-2.6.9-42.ELsmp ro root=LABEL=/target_root initrd /initrd-2.6.9-42.ELsmp.img

Solution 2 This procedure explains how to use device path names. Modified /etc/fstab:

. # This file edited by fstab-sync - see 'man fstab-sync' for details /dev/sda2 / ext3 defaults 1 1 /dev/sda1 /boot ext3 defaults 1 2

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 3-16 REO BCA Administration Guide VX Agent

Modified grub.conf:

title Red Hat Enterprise Linux AS (2.6.9-42.ELsmp) root (hd0,0) kernel /vmlinuz-2.6.9-42.ELsmp ro root=/dev/sda2 initrd /initrd- 2.6.9-42.ELsmp.img

1. At the CX Dashboard listing all the licensed hosts under Volume Protection, expand and select the source volume (Figure 3-23).

Figure 3-23: Licensed Hosts Listed Under Volume Protection 2. Click Start Replication. The Target Site screen (Figure 3-24) opens up.

Figure 3-24: Target Site Screen 3. Select the appropriate target, and then scroll down to set the options. 4. Select the desired Process Server (Figure 3-25).

Figure 3-25: Selecting Process Server 5. Select the desired Replication Options (Figure 3-26), then click Submit.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 3-17 REO BCA Administration Guide VX Agent

Figure 3-26: Select the Replication Options 6. When the CDP Retention option is enabled, specify the retention log path on the target (Figure 3-27), and ensure that this location is available at all times.

Figure 3-27: Selecting Retention Options 7. Click Submit to start the replication.

NOTE: Setting replication pairs is always similar, irrespective of platforms, or cross platform replication

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 3-18 REO BCA Administration Guide VX Agent

Windows to Linux Replication 1. Open the CX Dashboard, click Volume Protection, expand the Linux host to get the list of available volumes, and select the Windows volume (Figure 3-28).

Figure 3-28: Select the Appropriate Linux Volume 2. Click Start Replication to select the Linux target host. 3. Expand the Linux target host and select the target volume (Figure 3-29).

Figure 3-29: Select the Linux Target Volume 4. Select the Process server (Figure 3-30).

Figure 3-30: Choose the Process Server 5. Set the appropriate options, and click Submit (Figure 3-31).

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 3-19 REO BCA Administration Guide VX Agent

Figure 3-31: Select the Replication Options 6. Enable CDP Retention and define the type of retention policy (Figure 3-32).

Figure 3-32: Configuring the CDP Retention Policy Settings 7. Click Submit to start the replication pair. The replication pair is now set between a Windows source and a Linux target.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 3-20 REO BCA Administration Guide VX Agent

When a replication pair is set, the target volume is locked (hidden from the ). To view the contents of the target volume, use unlockdrives.exe (found in the VX agent installation folder). Alternate ways of unlocking the target volume are through the CX Dashboard. Refer to “Editing a Replication Pair” on page 3-26 on how to unlock a volume through the CX Dashboard. Once the target is exposed to the operating system, it requires a Resync to ensure consistency. When using Linux for a target volume, there are some operating system limitations: • If the target host reboots or if a user issues a mount command, the operating system will try and mount the target volume. Since the target volume takes up the file system as that of that corresponding source, the mount fails. If the system is rebooted, you are taken to the maintenance screen. To avoid this issue, manually edit the file /etc/fstab and remove the entry for the target volume.

CAUTION: Multiple mount points and stacking of mount points are not supported. If a volume is in use then it cannot be unmounted. While the replication is in progress, do not use disk management tools.

NOTE: Occasionally the target volume is still visible on Windows Explorer without any data and a new file cannot be created on the volume. This indicates that the target volume is locked. Reboot the target to hide the drive from Windows Explorer.

Linux to Windows Replication In previous examples, you have seen pairs with the CDP Retention option enabled. The following show how to set a replication pair without the CDP retention option.: 1. Select the Linux source volume, and click Start Replication.

Figure 3-33: Select the Source Volume for Replication 2. Select a Windows volume as target, then scroll down to set the required replication option (Figure 3-34).

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 3-21 REO BCA Administration Guide VX Agent

Figure 3-34: Setting the Windows Target Options 3. Click Submit to start the replication pair without CDP Retention. The Protection Status (Figure 3-35) shows the replication in progress. Notice that the same source is being replicated to two targets (this is a 1-N replication of one source with multiple targets).

Figure 3-35: Protection Status Screen

Microsoft Clustered Volume Replication Clustering is all about high availability and the REO BCA gives you that ability by being able to work in a Microsoft Clustering Environment.

Microsoft Clustering A server cluster is a collection of independent servers that together provide a single and highly available platform for hosting applications.

Server Cluster Nodes Server cluster nodes can be either active or passive providing these options: • Active Node – When a node is active it is actively handling requests

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 3-22 REO BCA Administration Guide VX Agent

• Passive Node – When a node is passive, it is idle, on standby waiting for another node to fail. • Multi-Node – When clusters are configured using different combinations of active and passive nodes. If an active node fails and there is a passive node available, application and services running on the failed node can be transferred to the passive node. Since the passive node has no current workload, the server should be able to assume the workload of another server without any problems (providing all servers have the same hardware configuration). If all severs in a cluster are active and a node fails, the applications and services running on the failed node can be transferred to another active node. Since the server is already active, the server will have to handle the processing load of both systems. The server must be sized to handle multiple workloads or it can fail as well. The following are the sequence of steps to use your REO BCA in a Microsoft clustering environment: 1. Install and configure Microsoft clustering (ensure proper cluster setup). 2. Failover all active instances of applications to one single Active node. 3. Install a VX agent on the passive node (without any active instances of applications). 4. Reboot the node after installation. 5. Failback to the node with the VX agent 6. Repeat the process on other nodes. 7. Setup replication pairs as required. The VX agent detects volumes that are part of a Microsoft Cluster. This information is also visible on the Source Site screen. 1. Click Volume Protection. The Source site shows Cluster Groups Volumes. 2. Expand the list, select the appropriate cluster, and then click Start Replication. (Figure 3-36)

Figure 3-36: Set Up and Start Replication for a Cluster Group 3. At the Cluster Setup screen, select the appropriate volume (Figure 3-37), and click Next.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 3-23 REO BCA Administration Guide VX Agent

Figure 3-37: Select the Cluster Volume 4. At the Target screen, select the target volume (Figure 3-38), and then scroll down to set the Replication Options.

Figure 3-38: Select the Cluster Target 5. Select the Process server (Figure 3-39).

Figure 3-39: Select the Process Server 6. At the Replication Options screen, verify that the Enable CDP Retention Option is checked (Figure 3-40), and click Submit.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 3-24 REO BCA Administration Guide VX Agent

Figure 3-40: Select the CDP Retention Option 7. Enter the retention values. For spaced-based, enter the amount of space that can be used for retention logs (256 MB minimum space on a NTFS file system). The suggested drives are shown (Figure 3-41).

Figure 3-41: Select Retention Values 8. When the retention policy is configured, click Submit.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 3-25 REO BCA Administration Guide VX Agent

9. At the final screen, click Finish to start the replication pair (Figure 3-42).

Figure 3-42: Start the Replication Pair You can check the status of the replication pair under Protection Status. The replication pair starts from Resync Sync step 1, then proceeds to Resync Step 2, and finally reaches Differential Sync.

Editing a Replication Pair At times you need to edit a replication pair’s settings: • Enable or disable CDP retention option for an existing replication pair. • Break or stop a replication pair. • Pause a replication pair. • Make a target volume visible. • Resync an existing replication pair. • Increase threshold for Resync and Differential Sync. • Enable or disable compression for an existing replication pair. • Enable or disable encryption for an existing replication pair, etc. To edit replication pair settings, click Volume Protection > Target Site, select the replication pair that you want to edit, and click View Details (Figure 3-43).

Figure 3-43: Selecting Replication Pairs to Edit This opens up Replication Pair Settings. There are five main sections: • Pair Details – read-only; no modifications through this option (Figure 3-44).

Figure 3-44: Pair Details Read-Only Screen • Pair Settings – Numerous settings that can be configured (Figure 3-45). See “Pair Settings” on page 3-27 for more details.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 3-26 REO BCA Administration Guide VX Agent

Figure 3-45: Windows Replication Pair Settings Screen • Automatic Resync Options – Settings can be edited, enabled, or disabled for an existing replication pair (Figure 3-46).

Figure 3-46: Automatic Resync Options Screen • Retention Settings – Numerous settings that can be configured (Figure 3-47). See YYY for more details.

Figure 3-47: Retention Settings Screen • Graphs

Pair Settings You can modify the following pair settings: • Visible Check Box – Makes the Mount Point option for the drive visible. • Visible Drive Mode – Target drive mode set (read-only or read/write mode). • Mount Point – If made visible by checking the Visible check box, the mount point can be set. • Resync – Force a resync. • Profiling Mode – Profile the source volume to predict resource requirements. • Secure CX to Destination – Enable or disable encryption between CX server and target. • Secure Source to CX – Enable or disable encryption between source and CX server. • Fast Resync Mode – Toggle between fast and off-load Resync. • RPO Threshold – If RPO increases beyond this limit, e-mail alerts are sent to the configured e-mail ID. • Replication Pool – Select the tmanagerd thread that handles this replication. • Resync Files Threshold – Cache folder size on CX server while replication is in Resync. If this limit is exceeded, then e-mail alerts are sent to the configured ID. If the value is set to zero, then replication pauses and the replication is not throttled while in resync mode.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 3-27 REO BCA Administration Guide VX Agent

• Differential Files Threshold – Cache folder size on CX server while replication is in Differential Sync. If this limit is exceeded, then e-mail alerts are sent to the configured ID. By default, the value is 8192 MB (8 GB). This can be customized to suit your environment. Once this threshold is reached, the replication pair is throttled. During throttling, the source stops its transfers to the CX server until all the accumulated differentials drain from the CX server to the target host. If the value is set to zero, then replication pauses and the replication is not throttled while in differential sync. • Compression Enable – Choose compression mode of either CX-based or host-based (Figure 3-48).

Figure 3-48: Windows Replication Pair (Mount Point Column Not Visible) The target volume can be made visible under read-only or read/write mode by enabling the Visible option (Figure 3-49). This in turn enables the Visible drive Mode, select the Read-only or Read/Write as desired and click Accept Changes to confirm changes (or Reset to cancel). For a Linux target, you will need to enter a mount point (which persists even after a reboot).

Figure 3-49: Mount Point Enabled When Visible Check Box Selected If the target is visible, then a red exclamatory mark (!) is seen beside the Server under Volume Protection -> Target Side (Figure 3-50).

Figure 3-50: Configured Replication Pairs Screen • Select a Different Process Server – You can change the Process server of a VX replication pair here. Select the desired Process server and click Accept Changes (Figure 3-51). This will move the replication pair to the new Process server.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 3-28 REO BCA Administration Guide VX Agent

Figure 3-51: Selecting a Different Process Server

Retention Settings A screen to change Retention Settings (Figure 3-52).

Figure 3-52: Retention Settings Screen Use these Retention Settings to change the following policies settings: • Enable or disable retention settings. • Increase the size of retention logs. • Enable an alert when disk space utilization reaches some percent (%). Retention Settings have two command buttons: Edit and Disable Retention: • Clicking Disable Retention disables CDP Retention option. Clicking Disable Retention again re-enables the CDP Retention option. When retention is disabled, the caption reads Enable CDP Retention Option. • Clicking Edit opens the Retention Logging Policy screen (Figure 3-53).

Figure 3-53: Retention Logging Policy Settings

Retention Logging Policy The size of retention logs can be edited through the Retention Logging Policy fields. You can switch between time-based policy and space-based policy (or have a combination of both).

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 3-29 REO BCA Administration Guide VX Agent

You can change the alert settings when the retention disk reaches a threshold using the Alert when disk space utilization reaches setting. This is set to 80% by default indicating that if the disk is 80% or more full, then an e-mail alert is sent (this requires e-mail alerts to be enabled). There are two ways of defining retention logs: • Specify a certain size or space (not less than 256 MB). • Specify a certain amount of time (not less than 1 hour). • Composite policy (a combination of time-based and space-based policy). Time-based policy retains only the latest changes as mentioned in the policy. Space-based policy retains changes as long as logs do not exceed the specified size. A composite policy however uses both approaches where you can define both size and time. On insufficient disk space on the retention volume – Either older retention logs are deleted to make space for new changes (default behavior) or differentials are paused (based on the option selected).

Retention Settings Retention settings can either be edited (increase or decrease size) using the Edit button or disabled by using the Disable Retention button (Figure 3-54). By doing this, older retention logs cannot be used for recovery operations and can be deleted manually.

Figure 3-54: Retention Settings Enabled

Figure 3-55: Retention Settings Disabled For time-based retention, the Retention Log Size Limit is shown as 0.00 indicating that there is no space restriction for retention logs. CDP Retention option can be enabled for this replication pair by clicking Configure Retention. All graphs relating to this particular replication pair can be seen after Retention Settings. Always unmount all virtual snapshots corresponding to that replication pair before: • Enabling or disabling the CDP Retention option for a replication pair. • Stopping a replication pair. • Modifying retention log folder. • Performing a target volume rollback.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 3-30 REO BCA Administration Guide VX Agent

Stop or Break a Replication To stop the replication, select the desired replication pair and click Stop Replication. When you are prompted for confirmation (Figure 3-56), click OK to continue to stop the replication pair. The Stop Replication Options appear on the same screen.

Figure 3-56: Stop Replication Confirmation Message Stop Replication Options contains Clean Media Retention Logs and Unlock Target Drive (Figure 3-57). Select both options to delete retention logs corresponding to this replication pair and unlock the target volume. However, it is not mandatory to select either of the options if you intend perform both these tasks manually at a later time. Click Submit to stop the replication pair. The retention logs can be removed manually to free up disk space. Once the replication pair is stopped, they will no longer appear on the CX Dashboard.

Figure 3-57: Cleanup Replication Options Screen

NOTE: While breaking a replication with a Linux target host, you are also prompted to mount the target volume. When the pair is in Resync, the Unlock Target Drive option is disabled.

The replication pair can take a few moments before it is deleted from the CX Dashboard and may appear on the Protection Status screen as shown in Figure 3-58.

Figure 3-58: Replication Pair in Process of Being Deleted

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 3-31 REO BCA Administration Guide VX Agent

Apply Changes button is used to change the RPO threshold. Reset button resets all values back. (Default value of RPO threshold is 0.) Under the Group field, the volume group name displayed is a hyperlink (Figure 3-59). Click the link to rename it.

Figure 3-59: Group Column Showing Volume Links After changing the volume Group label, the profiling mode, or the RPO threshold, click Apply Changes to confirm (or Reset to cancel). 1. To rename a volume group, click Volume Protection > Target. 2. Under Configured Replication Pairs section, click a name in the Group column to change it.

NOTE: Only the volume part of the name can be changed.

3. At the Volume Change Display Name screen (Figure 3-60), enter the new name, and click Change Display Name.

Figure 3-60: Changing a Volume Name The title changes to the new name indicating that the name has been changed. 4. Click Back to return to the Configured Replication Pairs screen where you now see the new name for the Group. If the source volume is not part of any other replication pair (one source can have multiple targets—this is called 1-N Replication), then a new entry representing the replication stream you created appears in the Protected Drives section. If the source volume has been used in other replication pairs, there will be no new entry listed; however, the entry can be found under the Volume Protection > Target Site or under Protection Status.

Pause Replication Rather than stopping the replication pair, you can choose to pause it. Click Volume Protection > Target Site, select the replication pair you want to pause, and click Pause Replication (Figure 3-61). When prompted for a confirmation, click OK and the replication pair is paused.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 3-32 REO BCA Administration Guide VX Agent

Figure 3-61: Pausing a Replication Pair While the replication pair is paused, other pairs can continue to backup your data. Pause replication is applicable only for the selected pair. When you are replicating one source volume to multiple target volumes, you are prompted either to pause the replication for the selected target host or for all the target hosts. You can resume the replication pair by selecting the replication pair and clicking Resume Replication. The Pause Replication button changes to Resume Replication when the replication pair is first paused.

Force Delete Option Force Delete is similar to that of Stop Replication with only the following differences between them:

Table 3-3: Differences Between Stop Replication and Force Delete

Feature Stop Replication Force Delete Deleting media You are presented with an option Media retention logs will not be retention logs. on the CX Dashboard to delete or deleted. retain media retention logs. Unlocking the target You are presented with an option to Target will remain locked. volume. unlock the target volume when the pair is not in resync.

Cache directory Background process handles this. Cache directory is not cleaned. cleanup. Deleting virtual Background process handles this. Virtual snapshots are not deleted. snapshots.

When a Stop Replication fails (or when you intended to forcefully delete a replication pair), select Volume Protection > Target, select the desired replication pair, and click Force Delete (Figure 3-62). At the confirmation message, click OK to continue with Force Delete.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 3-33 REO BCA Administration Guide VX Agent

Figure 3-62: Selecting a Force Delete

Recovery Operations A wide range of recovery operations can be performed on the target volume such as: • Physical snapshots • Virtual snapshots • Target volume rollback To learn more, refer to Chapter 5, “Recovery Operations.”

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 3-34 CHAPTER 4 FX Agent

The previous chapter focused on the Volume Replication (VX) agent; this chapter will focus on the File Replication (FX) agent. After this chapter you are able to: • Set up FX replication. • Understand FX job options and settings. • Understand FX execution sequence for both pull and push mode. • Default FX templates that are shipped and a brief description. • Create user-defined templates. • Understand various scheduling modes. • Edit an existing FX job.

File Protection

On Windows servers, the FX agent is installed as a software service that is configured to start automatically as part of the system startup. The agent service shows up as InMage DR-Scout FX Agent in Windows Services GUI. (The command services.msc can be used to display the GUI.) On Unix/Linux hosts, the FX agent is installed as a daemon process. As part of the FX agent installation, you can choose for or against an automatic start of FX agent daemon during system startups. The start, stop, and status scripts in the installation directory can be used to start, stop and display the status of FX agents respectively. After this, all the action is by the FX agent software. The agent installation folder is configurable during install and defaults to /usr/local/InMage/FX. The binaries take about 6 MB of disk storage. Important Notes: • FX agent service needs to be running with domain user privileges on Windows. • Ensure that the config.ini file under the FX installation path contains valid domain and user names. In most of the cases, the root user belongs to the root group. • When the root user does not belong to the root group, edit the config.ini file to change this line to read: inmsyncGID = This ensures that the FX agent has valid user privileges.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 4-1 REO BCA Administration Guide FX Agent

When to Use FX Replication FX replication is used to replicate a group of files or folders on a scheduled basis while keeping the properties intact. FX replication can be done across platforms. FX agent is used in conjunction with the VX agent to provide application support. A VX agent is for Volume Replication and a FX agent is for File Protection. To access the File Protection screen, click the File Protection icon in the Command Pane on the left (Figure 4-1).

Figure 4-1: Click Icon to Display Blank File Protection (FX) Screen Fields found on File Protection main screen are: • Filter – Shows the application name (given during configuration of the FX replication pair) used when working with many of the FX jobs (Figure 4-2).

Figure 4-2: Selecting an Application Name for Filtering • Application Per Page – Enter the number of applications displayed per page (Figure 4-3).

Figure 4-3: Options for Items Per Page • Jobs Per Page – Enter the number of jobs displayed per page (Figure 4-3). • Sort by (Arrows) – Lets you to sort the jobs more efficiently (Figure 4-4).

Figure 4-4: Sort By Arrow Provide Directional Control • New Job Group Wizard – Starts the wizard to configure a FX replication (Figure 4-5).

Figure 4-5: New Job Group Wizard Button • Manage Templates – Displays the list of available FX templates (Figure 4-6).

Figure 4-6: Manage Templates Button

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 4-2 REO BCA Administration Guide FX Agent

NOTE: You can create user-defined templates using the Manage Templates button.

You can choose to delete default templates (this is not recommended). FX templates are very helpful while performing failover and failback. They are used in conjunction with the VX agent. Each template calls a script which you may want to alter based on your specific environment (Figure 4-7). REO BCA actively supports enterprise applications such as Exchange and SQL Server.

Figure 4-7: Default Templates for Supported Applications The following is a list of the default FX templates: • BES Failover – Performs Blackberry Exchange Server failover. • CX Backup For Linux – Takes backup of entire CX server. • CX Backup For Windows – Takes backup of entire Windows. • CX DB Sync For Linux – This FX template is internally used by CX HA and remote CX features. This performs CX database sync between two CX servers. • DNS Failback – Performs a failback to the source host. • DNS Failover – Performs a DNS failover to the target host. • ESX Linux Guests Discovery – This template is used to discover Linux guests on a given ESX server. • ESX Windows Guests Discovery – This template is used to discover Windows guests on a given ESX server. • Exchange 2007 Consistency – Issues exchange 2007 consistency tags on the source. • Exchange 2007 Consistency Validation – Validates exchange logs and database on the source, the result of this validation can be seen under the FX log. • Exchange 2007 Failover Without Retention – Performs exchange 2007 failover for replication pairs set without CDP retention option enabled. • Exchange 2007 Planned Failover – Performs exchange 2007 failover to a consistent point. • Exchange 2007 Unplanned Failover – Performs exchange 2007 failover to a latest consistent point. • Exchange Consistency – Issues consistency tags for Exchange 2003.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 4-3 REO BCA Administration Guide FX Agent

• Exchange Consistency Validation – Validates Exchange logs and database on the source and outputs the result to FX log. • Exchange Discovery – Discovers an Exchange installation, its configuration, and the volumes it spans. • Exchange Failover Without Retention – Exchange 2003 failover based on latest consistent point. • Exchange Log Rotation – Rotates logs on exchange (source side). • Exchange Planned Failback • Exchange Planned Failover – Performs failover of exchange 2003 to a latest consistent point. • Exchange Unplanned Failover – Performs an unplanned failover of exchange. • FileServer Consistency – This template is used to issue consistency tags for file servers. • FileServer Discovery – This FX template is used to perform. • FileServer Failover Without Retention – Template used to perform a file server failover when replication pairs are set without CDP retention. • FileServer Planned Failback – FX template is used to perform a failback of file server. • FileServer Planned Failover – This is used to perform a planned file server failover. • FileServer Unplanned Failover – This is used to perform an unplanned file server failover. • Linux File Share Information – Replicates a Linux network share to a target where it remains as a network share. • MySQL Consistency – Used to issue consistency tags on MySQL volumes. • MySQL Discovery • MySQL Planned Failover – performs planned MySQL failover. • MySQL Unplanned Failover – Performs unplanned MySQL failover. • Oracle FX CX -> Target – Backing up Oracle Step 2. • Oracle FX Source -> CX – Backing up Oracle Step 1. • Oracle FX Target-> CX – Backing up Oracle Step 3 (refer to the solution document for detailed steps involved in backing up oracle). • Oracle(Unix/Linux) Consistency – This job is used to issue consistency tags on Linux-based Oracle volumes. • Oracle(Unix/Linux) Discovery • Oracle(Unix/Linux) Planned Failover – Used to perform Linux-based Oracle planned failover. • Oracle(Unix/Linux) Unplanned Failover – Used to perform Linux-based Oracle unplanned failover. • Oracle_Consistency_Windows – Used to issue consistency tags on Windows-based Oracle volumes. • SharePoint Consistency – Used to issue consistency tags for SharePoint volumes. • SharePoint Planned Failover – Used to perform SharePoint planned failover. • SharePoint Unplanned Failover – Used to perform SharePoint unplanned failover.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 4-4 REO BCA Administration Guide FX Agent

• SQL 2005 Consistency – Issues consistency tags on the source SQL 2005 server. • SQL 2005 Discovery – Discovers SQL 2005 installation, configuration and volumes it spans. • SQL 2005 Failover Without Retention – Performs a SQL 2005 failover for a replication pair configured without retention. • SQL 2005 Planned Failback • SQL 2005 Planned Failover – Performs a failover of SQL 2005 to the latest tag (which the script issues on the source and failover is made to this tag). • SQL 2005 Unplanned Failover – Performs SQL 2005 failover to a latest consistency tag. • SQL 2008 Consistency – Issues consistency tags on the source SQL 2008 server. • SQL 2008 Discovery – Discovers SQL 2008 installation, configuration and volumes it spans. • SQL 2008 Failover Without Retention – Performs a SQL 2008 failover for a replication pair configured without retention. • SQL 2008 Planned Failback • SQL 2008 Planned Failover – Performs a failover of SQL 2008 to the latest tag (which the script issues on the source and failover is made to this tag). • SQL 2008 Unplanned Failover – Performs SQL 2008 failover to a latest consistency tag. • SQL Consistency – Issues consistency tags for SQL 2000. • SQL Discovery – Discovers SQL 2000 database configurations and volumes involved. • SQL Failover Without Retention – Performs SQL 2000 for replication pairs configured without CDP retention option. • SQL Planned Failback • SQL Planned Failover – Performs a SQL 2000 planned failover. • SQL Unplanned Failover – Performs an unplanned failover of SQL 2000 database. • VerifyExchangePermissions • VerifyFileServerPermissions • VerifySqlPermissions • Windows File Share Information – Replicates a Windows network share to a target where it remains as a network share. • Windows File Share Information – This FX template is used to replicate Windows share information. • Linux File Share Information – Used to replicate file share information on a Linux server.

FX Execution By default, an FX job executes in pull mode (Figure 4-8). This can be changed to push mode (Figure 4-9) through the FX job options, under miscellaneous options. There is a difference between the two modes.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 4-5 REO BCA Administration Guide FX Agent

Figure 4-8: Pull Mode Cycle

Figure 4-9: Push Mode Cycle

Creating User-defined FX Templates An FX template stores the job options and the scheduled execution time, and applies them to a job when you choose the template while creating a replication pair. To create a new FX template: 1. Click File Protection > Manage Templates. 2. Enter the new template’s name in the field (Figure 4-10), and click Create.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 4-6 REO BCA Administration Guide FX Agent

Figure 4-10: New Template Name Field 3. Using the Replication Schedule options (Figure 4-11), schedule when to execute the template: • Schedule it to Run Once: • Run Now – Executes the job once its configured. • Run At – Executes the job once at a specific time. • Run On Demand – Needs to be executed manually. • Set it to run regularly at a Scheduled time: • Run Every – Loops every given amount of time. • Daily At – Runs daily at a given time. • Weekly On – Runs weekly at a given time.

NOTE: To learn more, refer to “Group Scheduling Modes” on page 4-22.

Figure 4-11: Replication Schedule Options Screen 4. Enter the Source and Target directories (Figure 4-12) where the templates are stored.

Figure 4-12: Directory Options Screen 5. Scroll down and set the Job Options. Job Options is divided into eight sections: a. File/Directory Options (Figure 4-13):

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 4-7 REO BCA Administration Guide FX Agent

Figure 4-13: File/Directory Options Screen • Copy the source directory to a subdirectory of the target directory – This replicates all the source files and folders into a subfolder on the target (default setting). • Copy the contents of the source directory directly into the target directory – This copies all the files and folders directly into the target host. • Always perform checksum – Performs a 128-bit MD4 checksum to ensure data consistency. (Default selected with block size 8192.) • Whole Files (no incremental checks) – Performs a full backup, overwriting older files on the target. • Create backup files – This enables the Backup Directory and Backup Suffix fields. Enter the complete directory path and the file suffix. • Backup Directory – This backs up existing files on the target to the specified folder with specified backup suffix and then the files are replaced on the target (keeping the backup intact). However, when the Push mode is selected, the backup directory is created under the target folder. • Compress files – This option compresses the files during transfer to save bandwidth (default setting). b. Inclusion/Exclusion Options (Figure 4-14):

Figure 4-14: Inclusion/Exclusion Options Screen • Update only (Do not overwrite newer files) – Updates only older files and does not overwrite newer files (default setting). If a same older file exists on the target, it is updated rather than overwritten.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 4-8 REO BCA Administration Guide FX Agent

• Only update files that already exist at the destination – If a file exists on the source and the target, enabling this option causes the FX agent to update the file but does not create any new files on the target. • Ignore files with same size and timestamp at destination – Files of same size and timestamp are not updated on the target. • Ignore files with same size – Ignores the files on the target with the same size irrespective of the timestamp. • Exclude files matching pattern – Ignores files with a specified extension. Does not copy files with specified pattern from source to target. If an exception has to be made, then check the Include Subset option below it. • Include subset of exclude list matching pattern – Any exception from the above Exclude option is entered here.

For example, if all the files with extension “.txt” are to be excluded (not copied to the target), then check the Exclude files matching patterns box and enter *.txt. If an exception is made for a file called something.txt, then check the Include subset of exclude list matching pattern box and enter something.txt.

Inclusion/Exclusion Options Further Explained The FR exclude option allows you to selectively exclude certain files from the list of files to be transferred. Multiple exclude patterns can be specified by separating them with a semicolon. The exclude and include patterns specified in the job options allow for flexible selection of which files to transfer/skip. An ordered list of include/exclude options specified is maintained, and when a filename is encountered, a check against each pattern is made in turn. The first matching pattern is acted on. If it is an exclude pattern, then that file is skipped. If it is an include pattern then that filename is not skipped. If no matching include/exclude pattern is found then the filename is not skipped. The patterns can take several forms. The rules are: • If the pattern starts with a slash (/), then it is matched against the start of the filename, otherwise it is matched against the end of the filename. Thus, “/myfile” would match a file called “myfile” at the base of the tree. On the other hand, “myfile” would match any file called “myfile” anywhere in the tree. • If the pattern ends with a slash (/), then it will only match a directory, not a file, link, or device. • If the pattern contains a wildcard character (* or ?), then the expression matching is applied using the UNIX shell file name matching rules. Otherwise, a simple string match is used. • If the pattern includes a double asterisk (**), then all wildcards in the pattern will match slashes; otherwise, they will stop at slashes. • If the pattern contains a slash (/), not counting a trailing slash, then it is matched against the full filename, including any leading directory. If the pattern does not contain a slash, then it is matched only against the final component of the filename. • If the pattern starts with a plus sign (+) followed by a space, then it is always considered an include pattern, even if specified as part of an exclude option. The plus sign is discarded before matching. • If the pattern starts with a minus sign (–) followed by a space, then it is always considered an exclude pattern, even if specified as part of an include option. The minus sign is discarded before matching.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 4-9 REO BCA Administration Guide FX Agent

NOTE: The +/- rules are most useful in exclude lists, allowing you to have a single exclude list that contains both include and exclude options.

Below are some exclude/include examples: • Exclude “*.o” would exclude all filenames matching *.o. • Exclude “/myfile” would exclude a file in the base directory called myfile. • Exclude “myfile/” would exclude any directory called myfile. • Exclude “/myfile/*/bar” would exclude any file called bar two levels below a base directory called myfile. • Exclude “/myfile/**/bar” would exclude any file called bar two or more levels below a base directory called myfile. • Include “*/”; “*.c”; exclude “*” would include all directories and C source files. • Include “myfile/”; “myfile/bar.c”; exclude “*” would include only myfile/bar.c. (The myfile/ directory must be explicitly included or it would be excluded by the “*”.)

NOTE: The double quotes around the exclude/include patterns in the above examples are purely for explanatory purposes and are to be discarded while specifying the patterns in the job options screen.

c. File Deletion Options (Figure 4-15):

Figure 4-15: File Deletion Options Screen

NOTE: One of the things regarding file deletion options that is that they can be disabled through the use of a specific key EnableDeleteOptions in the FX agent configuration file for UNIX agents and registry for Windows agents. This key value pair is set to the default value of 3255 (decimal) enabling all the delete options. Given below is a picture shows that the EnableDeleteOptions is set to 0, there by disabling the delete options.

• Enable file deletion options – Checking this option enables the options below it. • Delete files at destination that do not exist at source – This deletes any additional files on the target that no longer exist at the source. • Delete excluded files on the source – Excluded files are deleted on the source. • Delete files after transfer only – Copies all source files to the target and then deletes the target files that do not exist on the source. • Keep partially transferred files – Maintains partial files. d. Link Options (Figure 4-16):

NOTE: Link options deal specially with symbolic links. Each of the option has its own operation

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 4-10 REO BCA Administration Guide FX Agent

Figure 4-16: Link Options Screen • Copy symbolic links as symbolic links – Symbolic links are copied directly (not the actual data, but the data path is copied). • Copy contents of Symbolic Links – The actual data is copied rather than the symbolic links themselves. • Copy links outside the source tree – If the symbolic link is within the source directory (the one being replicated) and the actual data (the one symbolic link points to) is outside the source directory, that is copied as well. • Ignore Links outside the Source tree – If the symbolic link is within the directory being replicated and the actual data is outside the directory, then selecting this option will ignore the actual data. e. File Detail Options (Figure 4-17):

Figure 4-17: File Detail Options Screen • Preserve permissions – Maintains file attributes and their respective permissions on the target. • Preserve owner (root only) – Preserves file ownership attributes. This option is available to the only the super-user. • Preserve group – Preserves group attributes. • Preserve devices – Preserves devices after copy to the target. This option is available to the only the super-user. • Preserve times – Maintains all times (edited, created, etc.) of the source files on the target. f. Secure Shell Options (Figure 4-18):

Figure 4-18: Secure Shell Options Screen • Enable Encryption – If the SSHD service is not running on both the source and target or if the replication is within the same host, then this option is disabled. Checking this box will enable the options under it.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 4-11 REO BCA Administration Guide FX Agent

• Encryption Key Type – There are two types of encryption: RSA or DSA. Although DSA takes more time, it provides the best security. • Encryption Cipher – Select the appropriate cipher for encryption. You can configure each job to be encrypted with specific encryption key type and cipher type independently. Editing the job will create new encryption keys under the installation folder. Supported versions of SSH are OpenSSH server versions 3.8 (or above) and SecSH server versions 3.2 (or above). Ensure that the SSH binaries are installed, else the Secure Shell Options is disabled. Open SSH binaries can be obtained from www.openssh.com. Although Open SSH is not shipped with FX agent, it can be obtained separately.

CAUTION: • FX agent service should be running with domain user privileges for encryption to work. • Encryption will not work if the user name (the one FX agent starts with) is present in multiple domains.

g. Feedback Options (Figure 4-18):

Figure 4-19: Feedback Options Screen • Very high verbosity – Logs everything. • High verbosity • Medium verbosity – Gives debug information. • Low verbosity • Very low verbosity • Quiet – No logging. • Show file transfer statistics – Displays statistics in Protection Status. • Show progress during transfer – Displays statistics even while performing a transfer in Protection Status. h. Miscellaneous Options (Figure 4-18):

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 4-12 REO BCA Administration Guide FX Agent

Figure 4-20: Miscellaneous Options Screen • Create temporary files in – Creates temporary files in the specified directory (target) before transferring. However, if the push mode is selected, these temporary files are created under a directory placed under the target directory. • Do not cross file system boundaries – Backup restricted to file system limitations. • IO time-out in seconds – I/O time-out entered as seconds. • Specify port number to use – Port used by FX agent. • Limit bandwidth to __ KB/s – Limits bandwidth usage within the specified range. • Push data from source to target – Source host pushes data to the target. It is a faster process but requires more of the CPU resources. • Pull data to target from source – Target host pulls data from the source host. It is a slower process but doesn’t require more of the CPU resources.

NOTE: To learn more about FX execution while in pull or push mode, refer to “FX Execution” on page 4-5.

• CPU throttle (source) – Maximum amount of CPU resource to be used. • Send RPO alert if __ minutes passed – Notifies all CX administrators about the job crossing RPO bounds when the actual RPO exceeds the specified RPO threshold. Note that the administrator must have e-mail notifications enabled. • Send E-mail alert if __ minutes passed without job process – Specify the time (in number of minutes) before e-mail alerts are sent should the FX job not make any progress. • Pre execution script path name – The source side script executes first before the replication.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 4-13 REO BCA Administration Guide FX Agent

• Post execution script path name – The source side script executes after the replication is complete. • Pre execution script path name (destination) – Target side script executes first at the target then the replication takes place. • Post execution script path name (destination) – Target side script executes after the replication is done. Pre- and postscripts also support arguments.

For Windows the syntax (with the quotes) is: \c:\post Test.bat \ • Catch All Job Modifier – The keys used in this field are preceded by a -- (double dash). If an invalid argument is used, the job will not execute and returns an exit code of 1.

Table 4-1: Catch All Job Modifier Options

Key Effect - -A Replicates ACLs wherever ACLs are supported.(Windows without domain)

- -p Replicates permissions on Unix (and between heterogeneous platforms like Windows to Linux, etc.) - -S or - -sparse Handle sparse efficiently. - -n Dry run, shows what would have been transferred - -super Preserves file and folder permissions on Windows

An exit code 23 along with data compression and sync compression having value as NA indicate an error. Data compression and sync compression have non zero values and an exit code of 23 is thrown because of user permissions on Windows (Access Control List) or a mounting volume without a flag on Linux.

Figure 4-21: File Protection Status

CAUTION: FX agent service must be restarted for the job to take effect of the changes in the port settings when editing existing job. If the Daemon is not restarted the Jobs will fail to run.

To preserve permissions to the target you can use the Catch All option on all platforms (Figure 4-22).

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 4-14 REO BCA Administration Guide FX Agent

Figure 4-22: The File systems where the ACLs are not supported shows error 23 while replicating the typical ACL related errors shows up in the job logs like Figure 4-23.

set_acl: sys_acl_set_file(D000000640000015E/D0000006400000188/D0000006400000 18B/D000000640000018C, SMB_ACL_TYPE_DEFAULT): No error

Or

set_acl: sys_acl_set_file(D000000640000015E/D0000006400000188/D0000006400000 18B/D000000640000018C, SMB_ACL_TYPE_DEFAULT): Operation not supported

Figure 4-23: Job Log with ACL Error On Windows platforms: The source files and folders should be owned by a domain user (and not a local user).

Things to Remember while Setting FX Job Options Certain File Replication option combinations are known to cause unexpected behaviors. The known options and actual behaviors are documented in this section. Include and exclude options. If a file replication job contains rules set to both exclude a set of files and to include a subset of those excluded files, the include option is ignored. All files under the exclude option are excluded. Include and exclude options with other rules. Under the following set of rules, keep files at the target host that do not exit at source, exclude replication of certain files at source, and delete files at target (if present) that were excluded from replication at source. The behavior is as desired except that, the files that do not exist at the source host are deleted at the target along with the files excluded from replication. Symbolic links outside source tree. When the options to copy symbolic links as symbolic links and ignore links outside the source tree are set, replication of the symbolic links pointing to files outside the source tree is skipped. Illegal filenames across platforms. Certain special characters (or names) are allowed on certain platforms while they are illegal on others. For instance, while replicating files from a UNIX source to Windows target, files at the source with names that may be illegal on the Windows platform will not be replicated, the same applies to paths as well. While entering log paths or file names, ensure that illegal names are not used. This is applicable for both VX and FX agents.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 4-15 REO BCA Administration Guide FX Agent

FX agent service should always be running with domain user privileges.

Figure 4-24: Configuring FX Job Port Number The FR job options allow for pre and post execution scripts to be run. Each time a job starts, it attempts to run the pre execution script if any. Notice that if the script invokes a system reboot, this will reoccur in a loop as the script is run each time by a new instance of the FR job at startup. If it is required that the system reboots only once, the necessary logic would have to be placed in the script itself. The REO BCA File Replication agent allows for replication to or from hosts using NAT IP addresses. A typical scenario where this feature could be used is while trying to replicate files from a primary server to a remote target that accesses external networks through a firewall/router or vice versa. In this scenario, you will have to configure the agent to be aware of the NAT address of the host (i.e., address of the host as seen by external networks). The NAT IP address can be set by accessing the agent configuration utility, and checking Enable fixed NAT IP address and entering the NAT IP address in the field below. Note that a VPN connection to the primary site network would be required on the remote target so the agent can communicate with the REO BCA CX server. Further, router policies and/or Windows firewall policies may need to be configured to allow access to the specified FX agent daemon port (configurable in the CX Dashboard job options screen), especially while running a replication job in the push mode. The default port used by the FX agent daemon is 874.

Figure 4-25: Configuring NAT address

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 4-16 REO BCA Administration Guide FX Agent

Replicating Files Through FX

Replicating One Or More Files REO BCA provides a way to replicate a single file, file type, or selected group of files instead of replicating the whole folder. The following is an example to replicate one or more files (or file types): 1. Open CX Dashboard, and click File Protection. 2. Click New Job Group Wizard (Figure 4-26).

Figure 4-26: New Job Group Wizard Screen 3. Click Add Job. 4. At the Replication Hosts option screen (Figure 4-27):

Figure 4-27: Replication Hosts Option Screen a. Optionally, enter a job name and description. b. Select the Source host and enter the Directory where the file is located. c. Select the Destination host and enter the same Directory path as source. d. Click Next ->. 5. At the Options screen, scroll down to the Inclusion/Exclusion Options section (Figure 4-28):

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 4-17 REO BCA Administration Guide FX Agent

Figure 4-28: Options Screen Showing Exclude/Include Settings a. Check Exclude file matching pattern box and enter *.* (to exclude all files and folders) in the field. b. Check Include subset of exclude list matching pattern box and enter the name of the file in the field. If more than one file has to be replicated enter the names of the files separated by a semicolon. c. Complete the steps similar to setting up a normal FX job, and click Finish ->.

Creating Jobs and Job Groups 1. Open the CX Dashboard and click File Protection. 2. Click New Job Group Wizard to create a new job group. 3. Click Add Job (Figure 4-29).

Figure 4-29: New Job Group Wizard Initial Screen 4. Enter the Application name, Job Description, then select the source host as Source and target host as Destination. Enter the source and target directory then click Next to proceed. See Figure 4-30.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 4-18 REO BCA Administration Guide FX Agent

Figure 4-30: 5. This opens up the FX Job Options screen. Refer to the Job Options explained section for detailed explanation of each field. 6. Scroll down and click Finish to continue (Figure 4-31).

Figure 4-31: 7. At the Finish screen (Figure 4-32), click Set Schedule to determine when to run the job.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 4-19 REO BCA Administration Guide FX Agent

Figure 4-32: Schedule Job Group at Finish Screen 8. Choose the Scheduling Mode, and click Set Schedule (Figure 4-33).

Figure 4-33: Scheduling Screen • If no hosts are listed under Replication Hosts, you need to assign an FX license to the hosts. License assignment to hosts can be performed by clicking the License Management menu under the System tab. • If a job is scheduled to run at regular intervals, all further schedules are skipped until the executing FX job is completed. • The FX job should always be run with domain user privileges on Windows otherwise the agent window shows the error frsvc could not open service manager.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 4-20 REO BCA Administration Guide FX Agent

9. You are returned back to the previous screen (Figure 4-34). Here you can choose to add more jobs to the same group.

Figure 4-34: Job Group With Added Job You can add more jobs similarly by clicking Add Job, or delete created jobs at this stage by selecting the job and clicking Remove. If you click Cancel, the File Protection main screen appears without adding the job group and jobs. If you click Finish, the new job group is added and jobs to the database and start them based on the scheduling mode.

Group Scheduling Modes A job group can be scheduled to run once or run recursively. This section describes the six ways of scheduling a job group: • Run Once, Run Now – Runs job in the job group immediately after creation.

Figure 4-35: Run Once, Run Now • Run Once, Run At – Schedules the job group to run once at a specified date and time, with a resolution up to 1 minute.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 4-21 REO BCA Administration Guide FX Agent

Figure 4-36: Run Once, Run at Scheduling Mode

NOTE: The hours are specified using a 24-hour scale.

• Run Once, Run On Demand – Jobs in the job group are run on demand by using the job group start/stop buttons on file replication main screen.

Figure 4-37: Run Once, Run On Demand Scheduling Mode • Run Scheduled, Run Every – Schedules the job group to run as per the entered value. Job runs for the first time and job runs based on the entered value. For example, you enter two days, job runs immediately, and thereafter, it runs for every two days interval.

Figure 4-38: Run Scheduled, Run Every Scheduling Mode

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 4-22 REO BCA Administration Guide FX Agent

• Run Scheduled, Daily At – Schedules the job group to run once a day at a specified time.

Figure 4-39: Run Scheduled, Daily At Scheduling Mode • Run Scheduled, Weekly On – Schedules the job group to run once a week at a specified day and time, with resolution up to 1 minute.

Figure 4-40: Run Scheduled, Weekly On Scheduling Mode Note that with respect to recurring File Replication jobs, once an active instance completes its run, it is removed and a new instance is created for the next run. This instance contains null start/end times and its status will report Not Started indicating that it is waiting to be scheduled.

Editing Existing Job Groups and Jobs 1. To edit settings of an existing job, at the File Protection main screen, select the group you wish to edit, and click Details (Figure 4-41).

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 4-23 REO BCA Administration Guide FX Agent

Figure 4-41: Editing an Existing File Job Group

NOTE: If a job is edited in a job group, then the older job description is removed and the protection status screen shows ongoing jobs including previously executed FX jobs.

2. At the Group screen (Figure 4-42), click Edit to change the group settings.

Figure 4-42: File Replication Group Screen 3. At the edit screen (Figure 4-43), click Set Schedule to modify the existing group schedule.

Figure 4-43: File Replication Group Edit Screen 4. This brings up the scheduling screen where the mode can be changed as described in the scheduling section.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 4-24 REO BCA Administration Guide FX Agent

In addition to changing the group schedule, an existing job can be deleted by selecting the job and clicking the Remove button. An existing job can also be modified by selecting the job and clicking the Details button. This brings up the job wizard screen where the source/target hosts, directories, and job options can be changed as described in the earlier sections. New jobs can also be added to the existing group by clicking Add Job, which brings up the job wizard. To change the job run order click the or . If jobs are in the same run order, they will run in parallel. If two jobs are in the different run levels, they will run sequentially. All run order number one jobs are executed before run order two jobs. You can delete an existing job by selecting the job and clicking the Remove button. Job group definition can be completed by pressing Finish button.

NOTE: To Finish a job group, you must enter both job and its schedule. Otherwise, the Finish option will not appear.

FX error codes, causes, and solutions

Table 4-2: FX Error Codes

Error Codes Description Causes Troubleshooting 1 Syntax or usage error Invalid filter mentioned Edit the job options and correct the filters under Include/ Exclude Options Invalid options in catch all Edit the Job Options and correct the Catch all job modifier job modified under Miscellaneous options. 3 Errors selecting Destination is not a Edit the FX job and set a valid target directory input/output files, directory folders Unable to get details of a Verify the file system on which the files exist file or a directory is available for use. 5 Error starting client A file daemon.conf may be Restart the FX job. server protocol corrupted. This can be found under the FX installation path (for non-Windows) And for Windows daemon.conf can be found under FX installation folder or application data. 10 Error in Socket IO Source Directory does not Edit the job settings and set a valid source exist directory Failed to connect to remote • Check the FX agent service and start the FX agent. service if not already started. • A firewall might be blocking the FX agent’s port (default 874). Unblock the FX ports from the firewall. • Port might already be in use by another application. Stop the FX agent service and verify if the port is in use.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 4-25 REO BCA Administration Guide FX Agent

Table 4-2: FX Error Codes (Continued)

Error Codes Description Causes Troubleshooting 11 Error in file I/O Failed to open Include/Exclude option creates a file on the include/exclude file. target (in case of pull mode). The error occurs if this file cannot be accessed. Ensure enough free space and set read/write permissions to the parent folder. For Windows the parent folder is FX installation folder or application data. And for non-Windows the parent folder is FX installation folder. Unable to create Ensure FX agent service has permissions to destination folder create the directory in the target path. No free space available FX installation folder may be running out of space. Move the log files to a different volume to make free space. 12 Error in Resync Connection failure Ensure source and target FX services are up protocol data stream and running. Check the network connectivity. Unable to write to the Too many FX jobs are competing for the same socket. resource such as sockets or disk space at the same time. Schedule the jobs to run such that they do not overlap with each other. 14 Error in IPC code Unable to create a pipe or System policy restricting the FX agent to create a child process create child processes. 20 Received SIGUSR1 or FX agent service or its child Identify if any user or application has SIGINT process was stopped accidentally stopped the process and restart abruptly. the FX agent service. 23 Partial transfer due to Some of the files /file Windows: error attributes are not The FX agent service should be started with transferred completely. domain user privileges. Then FX job option Catch All Job Modifier should have the input value as --super. In general: Source FX agent should have permissions to read the files from the source and write them on the target. 24 Partial transfer due to This is a warning message Run the job again to maintain data vanished source files/ indicating file deletion on consistency. the source folder during FX execution.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 4-26 REO BCA Administration Guide FX Agent

Table 4-2: FX Error Codes (Continued)

Error Codes Description Causes Troubleshooting 30 Time-out in data No activity from the FX job While working with large number of files, send/receive for 9600 seconds will result there might be idle time during the FX in a time-out. This is used to replication. detect network outage Either increase the idle time or Split the job to smaller jobs. -255 Job Stopped by user Job stopped through CX Re run the job to replicate the data. Dashboard FX service is down while job Start the FX service. is in progress. Pre or Post script returned a Check the script for possible errors. non zero value. -127 Inmlimit: child Inmlimit is a child process Check the job log for errors and restart the FX terminated for FX, which again spawns service. unexpectedly inmsync. This error is shown when inmsync exits unexpectedly

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 4-27 CHAPTER 5 Recovery Operations

This chapter deals with Recovery through the CX Dashboard. In this chapter you will find examples for each of the recovery operation. After this chapter, you would be able to: • Issue consistency marker. • Perform a target volume rollback based on time or an event. • Perform snapshot operation. • Physical • Based on time or an event • Virtual read-only, virtual read/write • Based on time or an event • Scheduled snapshots based on time and or an event.

Data Consistency

To ensure data consistency, consistency markers (user-defined events) are issued on the production volumes. This is done through vacp.exe under the VX agent installation folder. To learn more about vacp.exe refer to the section Issuing consistency tags.

Generating Consistency Markers/ Tags Consistency markers are of three types: file system, user-defined, and application. File system tags flush all the volume data in the memory to the disk and then issue a marker which then gets replicated to the DR server’s volume (Target volume). User Defined Tags: When a user-defined tag is issued a file system tag is generated first and then a user-defined tag (with a custom name) is generated. These tags are used to identify important events such as marking month end jobs, etc. Application Tags: The application is paused then all the application data in the memory is flushed on to the disk and a marker is issued. All consistency markers are stored within the CDP retention option log files.

Automating Tag Generation through FX By using the Pre or Post script in the FX job options, a script can be set to execute at regular intervals. Enclosing a set of commands within this script, you can automate issuing consistency tags at regular intervals.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 5-1 REO BCA Administration Guide Recovery Operations

Recovery

In this section you can find recovery operations such as snapshots and target volume rollback.

When to Use Recovery Recovery operations are performed either to recover from an outage or to validate backups (on the target volume). While a volume replication is active, the target volume is locked and cannot be accessed. To view the contents of the target volume, you can either choose to unhide the target volume which pauses the replication and increase the RTO or you can choose to take a snapshot of the target volume (which will not disturb the replication). A snapshot is a copy of the target volume. Snapshots are broadly classified into two types • Point in time snapshots • Recovery snapshots

Figure 5-1: Types of Recovery Operations Point-in-time Snapshots: Gives you the copy of the target volume as of that instance (the time when you are taking the snapshot). CDP retention option is optional since the snapshot generated will always be of the latest state of the target volume. This can be performed either through the command line interface or through the CX Dashboard (through scheduled snapshots) Recovery Snapshots: Can be taken based on time or an event at some point back in time and this requires CDP retention option to be enabled. Again, it can be performed from the command line interface or through the CX Dashboard. Recovery and point in time snapshots can both be taken on Physical or a virtual volume. Taking a snapshot on a physical volume requires the intended snapshot volume it to be equal or larger than the target volume (in the replication pair). Virtual snapshots are virtual in nature. They require minimal system resources and are faster in loading or unloading. Virtual snapshots are again of three types • Read-only (CX Dashboard and CLI) • Read/Write (CX Dashboard and CLI)

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 5-2 REO BCA Administration Guide Recovery Operations

• Read/Write tracking (CLI only) As the name indicates read-only snapshots are for informative purposes and are not capable of retaining writes on to them. Read/write virtual snapshots do retain writes on to them, this is done by maintaining an archive log on some part of the local disk as specified (either from UI or through cdpcli). Read/Write tacking virtual snapshots goes a step forward; this is especially useful if a new virtual snapshot has to be updated with the writes of an unmounted virtual snapshot. All these snapshots can also be scheduled (scheduled snapshots)

Determine the Time to Recover 1. To perform a snapshot or a rollback to some point back in time three steps are followed as shown below.

Figure 5-2: 2. To identify the time, Click “Recovery” and select the desired replication pair and click “View Recovery Range”.

Figure 5-3: This opens the “Recovery Point Accuracy” screen. The graph below the “Pair Details” shows the health of retention logs. The green areas indicate data replication occurred in data mode and this is considered to be suitable for

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 5-3 REO BCA Administration Guide Recovery Operations

performing any recovery operations. You should be able to see a bar with two sliders, the left marker indicates the start time of the retention logs and the right marker indicates the end of the retention log time range. Red and yellow areas indicate that the time frame may not be suitable for performing a recovery operation to it. White areas indicate that the status is not available. You can move the markers on the slider to close in on a time frame, then click “Regenerate Graph” to further narrow down a consistent point.

Figure 5-4: After closing in on a time, you can proceed to perform any of the recovery operation. Notes: You can also select multiple replication pairs to see their recovery point accuracy. Based on the replication pair you select, you get that many sliders. Multiple Tabs appear when multiple replication pairs are selected below “Recovery Point”.

Recovery Snapshots

Virtual Snapshots

Overview From the usage standpoint, virtual snapshots are similar to recovery-based snapshots the only major difference being the target volumes are different. From the functional standpoint

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 5-4 REO BCA Administration Guide Recovery Operations

• Virtual Snapshots do not require any physical volumes. These volumes can be loaded and unloaded when required. • Virtual snapshots consume relatively less time than that of a normal recovery snapshot. This is due to the fact that virtual snapshot process does not perform any data copying as opposed to the normal recovery snapshot which performs volume copy. Virtual snapshot uses retention logs/COW data to service read requests from the virtual snapshot volume. Write operations on the virtual snapshot volume shall be stored in a private file of the virtual snapshot volume These unique characteristics of the virtual snapshots make it a very valuable tool for recovery process. Some of the scenarios where these snapshots can be of great help are:- • It is relatively easy to mount read-only application like reporting servers, standby servers, verification scripts, etc. by using virtual snapshots volumes. • When you need to do a roll back to a point –in-time, but not sure about the time to roll back. • Virtual Snapshot can be used to browse the data across different points in time horizon without having to do a full recovery snapshot, thus helping to zero-in to the desired point in a quicker way. • Once the recovery point has been determined, all it remains is either recover only the corrupted files/folders or resort to complete fully recovery snapshot for the determined recovery-point. • If we would like to view the replicated target volume, one way is to make the target volume visible. But, this would stop applying the differentials to the target volume. Other option is to create point-in-time virtual snapshot of the target volume. In this way, differentials are still applied to the target volume, but the same time, we were able to view the target volume at that particular instance in time. Other characteristics include • Like Recovery Snapshots, CDP retention option need to be enabled for creating virtual snapshots • There can be more than one virtual snapshot for replication pairs. • Virtual Snapshots can be created as “Read-only” or “Read/Write”. All the data written to virtual snapshot volumes is stored in separate log files specific to virtual snapshots. • Can create virtual snapshots with read-write and tracking enabled. This would allow tracking of writes in the virtual volume. The tracked data of a virtual volume can be applied on to another virtual volume/ physical volume. • Virtual Snapshots are available even after a reboot. • Virtual Snapshots Volumes are automatically dismounted, if the recovery point used for the virtual snapshot does not comply with the specified retention policies, i.e., you can find the older virtual snapshot volumes removed as the retentions logs get pruned along with time.

Creating a Virtual snapshot To create a virtual snapshot you need a replication pair (with or without CDP retention option) and a CDP license. Virtual snapshot creates a virtual volume and mounts it. This can be accessed through the operating system interface (either Windows or Linux). Creating Virtual Snapshots is a two step process:-

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 5-5 REO BCA Administration Guide Recovery Operations

• Map Generation Phase: Where CDP engine create a Meta data for the Virtual Snapshot based on recovery criteria. In case of point-in-time virtual snapshot, an empty map is created. • Mounting Phase: The CDP engine mounts the Virtual Snapshot Engine to specified drive letter or mount point Virtual snapshots should not be created on Removable media (floppy drives, CD drives, network drives etc). In case of a virtual volume the maximum space required for it is not more than the size of the target volume. Virtual snapshots are again of three types • Read-only • Read/Write • Read/Write tracking

Creating a Virtual Snapshot To create a virtual recovery snapshot click “Recovery” on the CX Dashboard. Select the server that corresponds to the replication pair and then click “Recover” button.

Figure 5-5: A new screen “Recovery snapshot options” appears. Virtual snapshot can be created based on time or an event. Also, you can select multiple pairs and click “Recover”.

Time-based Virtual Snapshot on Windows To create time-based virtual snapshots select an option “Using Time” under “recovery options”. This once clicked changes the “Recovery Point” section so that it can accommodate time.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 5-6 REO BCA Administration Guide Recovery Operations

Figure 5-6: Selecting “Using Time” Notes: Event-based snapshots have higher levels of data consistency than time-based snapshots Click “Recovery Point Accuracy List” under “Recovery Point” which shows the list of time range and their accuracy. You can see the slider under the recovery point accuracy. Marker at the left indicates “Start Time” whereas the marker on the left indicates “End Time”. Also, you can find the recovery point listing. Select the “Start Time” and “End Time” and click “Submit”.

Figure 5-7:

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 5-7 REO BCA Administration Guide Recovery Operations

Time is displayed as shown in the figure below. Select “Virtual” under “Drive type section”. You can choose “physical” to create a snapshot on a physical volume.

Figure 5-8: When you select more than one pair and click “Recover”, the “Recovery Snapshot Options” screen displays tabs as shown below. Each tab displays information about that particular pair.

Figure 5-9: To enable the virtual volume to support writes, check the “Read/Write” check box under “Virtual Drive Options”, and enter a path for “Data log path” (This is where meta data is stored about writes).

Figure 5-10: Creating a Read/Write Virtual Snapshot Notes: • Creating a virtual snapshot will always create certain meta data files. • For Read-only Virtual snapshots: If CDP retention option is enabled for the replication pair. These meta data files are stored under the retention log path • If retention is disabled for the replication pair. A path (data log path) has to be explicitly mentioned to store these files. This is applicable for both CX Dashboard and through the CLI interface.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 5-8 REO BCA Administration Guide Recovery Operations

• For Read/Write Virtual snapshots: Since a data log path has to be mentioned for storing data about writes, the meta data files are stored under the same path. Then, under the “Virtual Drives” you can select any of the available drive, and then click “Save” to finish. Now a virtual snapshot is created. If all the drive letters are occupied then an option called mount point can be used which requires a complete path to be entered for example: “D:\snapshotdata” and then click “Save”. For a Windows target mount points are supported only on NTFS file system. The directory should be empty, if the directory does not exist then a fresh directory is created. The size of a read/write virtual snapshot is equal to the source volume; exceeding this limit will result in data write failed on Virtual snapshot. If you are attempting to take a virtual snapshot on a Linux platform, you have to enter only “Mount point” since there will not be any drive letters.

Figure 5-11: After clicking save the UI returns to the “Recovery” screen. This is where you can see the progress under “Recovery pair status” and once it is completed successfully the option button before the host becomes active indicating that the virtual volume is mounted and is accessible.

Figure 5-12: Linux and Windows Vsnap (Time-Based) To remove virtual snapshot, select the host and then click “Release Drive” after a few moments the entry is removed from the UI indicating successful unmount. (“Info message” gets displayed in case of an error). Notes: Some of the recovery options will require consistency tags to be issued on the source volume. This can be done either through an FX job or through the vacp CLI. Refer the section “issuing consistency tags” in this document

Event-based Virtual Snapshot 1. To create an event-based virtual snapshot navigate to recovery in the UI, then select a server, and click “Recover” button.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 5-9 REO BCA Administration Guide Recovery Operations

Figure 5-13: 2. This takes you to the recovery snapshot options. Under “Recovery Options” select “Using Application consistency & Event-based”.

Figure 5-14: 3. Then under “Recovery Tag” search for an event tag. This displays a list of matching tags, select one of them. “Recovery Point accuracy” shows the accuracy of the tag (exact, approximate and not guaranteed). This can be seen in the “Accuracy” of the search result.

Figure 5-15: 4. Select an event to recover to and then scroll down to select the “Drive Type”.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 5-10 REO BCA Administration Guide Recovery Operations

Figure 5-16: 5. In the “Drive Type” section click “Virtual” and the sections beneath it changes displaying “Virtual drive options” (toggling between “read-only” and “read/write” virtual snapshots) and the list of available “virtual drives”. 6. Select one of the virtual drive and then click the “Save” button. An event-based virtual snapshot is created and mounted.

Figure 5-17: Linux and Windows Event-Based Snapshots Notes: Recovery Point Accuracy Range Listing: A tag is considered to be “Approximate” when an I/O occurs at the time of a bitmap read operation by the driver on the source side. Refer to the section “Tuning VX” for a detailed list for fine-tuning drivers. Event-based snapshots have higher levels of data consistency than time-based snapshots

Scheduled Snapshots Scheduled snapshots can be configured only through the CX Dashboard. Scheduled snapshots can • Execute at a later point of time. • Repeat execution at regular intervals • Wait for an event or time before executing the snapshot. (used for pairs without CDP retention option)

Event-Based Scheduled Snapshot through CX Dashboard for Linux Target 1. Access the CX Dashboard, click “Recovery”, and then on “Scheduled Snapshots”. Select the replication pair and then click “Create Snapshot”

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 5-11 REO BCA Administration Guide Recovery Operations

Figure 5-18: 2. Under “options” select “Event-based”. This enables the text area next to it, enter the name of the bookmark (consistency tag), and scroll down to select “Drive Type” as “physical” or “Virtual”.

Figure 5-19: 3. For this example, we select “Virtual”. Enter the mount point and then click “Save”.

Figure 5-20:

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 5-12 REO BCA Administration Guide Recovery Operations

4. This returns to “Scheduled snapshots” under “Recovery” screen. Now, under “Snapshot Drives Status”, the new scheduled snapshot appears with “Status” as “waiting on event”.

Figure 5-21: 5. To simulate an event we create a bookmark named “Tag_1” on the source host.

Figure 5-22: Generating a Consistency Tag in Linux 6. As soon as the consistency tag reaches the target, a snapshot is created, and in addition to that it further waits for the consistency tag (with the same name) to occur the next time. Every time the consistency tag reaches the CX a snapshot is created on the DR server

Figure 5-23: 7. To release the snapshot drive, select the snapshot drive, and click “Release Drive”. 8. To remove any stale entries, select the snapshot drive, and click “Forced Delete”. The forced delete removes the entry from the CX Dashboard. 9. Click “View”, under “History” to view all time-based past executions of the same snapshot.

Figure 5-24:

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 5-13 REO BCA Administration Guide Recovery Operations

Time-based Scheduled Snapshot through CX Dashboard for Windows Target: 1. Access the CX Dashboard, click “Recovery”, and then on “Scheduled Snapshots”. Select the replication pair and then click “Create Snapshot”.

Figure 5-25: 2. In the “Step One” screen, under “options” select “Time-based”, and scroll down to select “Drive Type” as “physical” or “Virtual”.

Figure 5-26:

CAUTION: Using a cdpcli command directly in the post or pre script is not supported, To overcome this cdpcli feature can be used in a batch file that can be called from the pre or post scripts

3. Now, select the appropriate volume for snapshot, and click “Next”.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 5-14 REO BCA Administration Guide Recovery Operations

Figure 5-27: 4. This opens up the “Scheduling Mode” screen. This is similar to the Group scheduling modes with two differences. FX group scheduling modes end at scheduling a job on “weekly” basis. In the “snapshot schedule” it is extended to “monthly” and even “yearly”. The other difference is the option “Run on Demand” which is unique only to the FX scheduler. Select appropriately and click “Save”

Figure 5-28:

NOTE: To take a snapshot for a pair without CDP retention option. Perform a scheduled time-based snapshot and select “Run Now” to create a snapshot.

This returns to “Scheduled snapshots” under “Recovery” screen. The new job can be seen under “Scheduled Snapshots”.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 5-15 REO BCA Administration Guide Recovery Operations

Figure 5-29: 5. Under “Snapshot Drives Status” you can see the progress of the new job (time-based). Click “View”, under “History”, to see all past time-based executions of the same snapshot.

Figure 5-30: View link when clicked appears as below

Figure 5-31: For custom event consistency tags (or bookmarks) it is recommended not to use Standard bookmark prefixes Once the “Status” is “Complete” then the snapshot is ready for access. Specifying Pre and Post Scripts are optional REO BCA provides an ability to integrate snapshot process with external applications like tape back software, databases, failover tools, data verification tools, exception handling, etc. The integration ability is provided by means executing pre/post scripts at the target host before and after the snapshot process. You can also specify parameters to the pre/post script and also further control the process using the return codes. Example: Pre Script Configuration: “c:\preTest.bat” “” “” Example: Post Script Configuration: “c:\postTest.bat” “” “

Performing Target Volume Rollback Target volume roll back is used to restore the volume back in time. Target Volume Rollback can be initiated from the REO BCA CX Dashboard or command line.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 5-16 REO BCA Administration Guide Recovery Operations

CAUTION: • This operation stops the replication pair automatically • This feature is available if retention is enabled for the specific replication pair. • Resync needs to be completed and replication needs to be in diff sync mode. • Unmount all virtual snapshots corresponding to this replication pair • Requires retention logs

1. Navigate to “Recovery snapshots” under “Recovery”.

Figure 5-32: 2. Select the replication pair and then click “Rollback” a message box appears.

Figure 5-33: Windows Rollback Message 3. Click “OK” to continue. Recovery Snapshot Options screen opens up. 4. Enter a valid time that falls between the time ranges to which a rollback is to be made. A time frame beyond this is not valid.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 5-17 REO BCA Administration Guide Recovery Operations

Figure 5-34: Time-Based Rollback 5. Rollback can also be done based on an event.

Figure 5-35: Event-Based Rollback 6. Roll back starts when save button is clicked. When rollback is in progress the volume is in locked state • Existing snapshots and recovery on the volume are lost. • Rollback volume cannot be subject to new snapshot, recovery and rollback • Volume is not appeared in the list • Replication pair is in disabled mode indicating that replication has stopped. • While performing rollback for Linux targets, enter a “mount point” under “Pair Details” 7. Once rollback is complete, the replication pair is broken, and rollback volume is enabled under target rollback table. 8. To delete record of a rollback, select the host, and click “Release Drive”.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 5-18 REO BCA Administration Guide Recovery Operations

Figure 5-36: 9. The image below shows two rolled back target volumes, one being a time-based rollback while other being an event-based rollback.

Figure 5-37:

Recovery Pair Status Recovery pair status shows the status of any recovery operation:

Figure 5-38: • Host: Target host name • Host Drive: Drive/ volume of which the snapshot/ recovery is taken • Recovery Drive: Snapshot volume • Drive Type: Type of drive used to contain a snapshot, virtual, WAN drive or virtual mount point • Status: will display the result as Complete or failed • Progress: Percentage in progress: if snapshot then 0 to 100%, if recovery then 2 stage process 0- 100% • Expected Recovery Point: Desired Recovery (shows time to which recovery should be done). • Actual Recovery Point: Recovery achieved by the agent (shows time to which recovery is achieved). • Recovery based on: Time, event, etc. • Info message: If any error during the operation of snapshot/recovery than the error message is displayed here. • View: To view how the snapshot is exported

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 5-19 REO BCA Administration Guide Recovery Operations

Target Drive Rollback Status When you perform a target volume rollback the status can be seen here (and in the “Protection Status”).

Figure 5-39: • Host: Target Host where the volume is being rolled back • Rollback Drive: Volume being rolled back. • Status: Status of the operation, complete, failed or in progress • Progress: Percent completed • Expected Recovery Point: Point in Time where it the recovery has to be made • Actual Recovery point: Recovery actually done • Recovery based on: Time-based or Tag-based with the name of the tag is displayed here • Info Message: error messages etc

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 5-20 CHAPTER 6 Checking Status

In this chapter, you will learn to monitor active operations through the “Protection Status” on the CX Dashboard. This screen is a read-only screen and does not accept any user input anywhere. The sole purpose of this screen is to show the status of any active operations such as replications (both FX and VX), recovery operations, etc. After this chapter you will be able to monitor: • VX replication • Understand each of the fields under “Volume protection Status” and interpret their values • Differentiate when a target volume is visible • Determine when a pair is throttled and how to resolve it. • Recovery operations • FX replication • FX executions and their logs • FX trending

Protection Status

Protection Status is used to monitor: • Active Volume replication • File replication history • Any active recovery operations Protection Status is the third button on the management panel (to the left). This is the screen that displays when you login. A new installation of CX will not have any replication pairs and so the protection status will be blank.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 6-1 REO BCA Administration Guide Checking Status

Figure 6-1:

Volume Protection Status The first section under “Protection Status” is “Volume Protection Status”

Figure 6-2: The first screen has a total of eleven fields each of them denoting information about a specific replication pair. • Server: Source -> target • Volume: Source to volume drive mapping • Group: This displays the group to which the replication belongs • Resync in Transit Step 1(MB): Resync data in transition while in step 1 of resync • Resync in Transit Step 2(MB): Resync data in transition while in step 2 of resync • Differentials left (MB): Remaining differential data to be transferred (in megabytes) are shown separately on CX and on Target. Differentials on CX indicate that the differentials have not yet moved to the target host. Differentials on the target indicate that dataprotection.exe has not yet applied these differentials to the target volume. Please refer to the section Volume Replication –VX Agent for more information. • Resync progress: Percentage of resync progress • RPO: RPO value in minutes (displays up to 2 hours in minutes and then switches to hours) • Status: Status of the replication pair (Resyncing (Step I), Resyncing (Step II) and Differential Sync) • Resync required: If the target is required to be synced with source then “YES” otherwise “NO”. • View details: Click “+” to view more details regarding the replication pair. By clicking “+” under “view details” reveals eleven fields:

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 6-2 REO BCA Administration Guide Checking Status

Figure 6-3: Protection Status -> Volume Protection Status -> View Details

Figure 6-4: Protection Status -> Volume Protection Status -> View Details • Capacity (MB): Source Volume Capacity • Resync Start Time (Step 1): Time when Initial resync started • Resync End Time (Step 1): Time when Initial resync completed • Resync Start Time (Step2): Start time of resync step2 (data writes occurred during resync step1) • Resync End Time (Step2): End time of resync step2 • Differential start time (Step 2): Time when differential sync started • Last update time: Last updated time from CX • Agent log: Enabled if logs are present • Secure CX to destination: Secure transport is enabled or not / Encryption (yes / no) • Use compression: Compression is enabled or not (yes / no). If yes, then either At CX server or at the host. • CDP retention option: CDP retention option is configured (than enabled /disabled) or un-configured • Resync mode: Type of resync used for this replication pair (for example, Offload, Fast or Direct). • Visible: Yes if volume is visible No if volume is not visible

Resync required set to Yes Occasionally the “resync required” field is set to “Yes” indicating data inconsistencies between the source and target volumes. Given below is the list of conditions and corrective action to be taken to ensure data consistency. Each of the condition will again generate an e-mail alert and a trap.

Table 6-1:

Action Reaction Target Volume visible in Read/ Perform a Resync or set Auto resync options Write mode Source or target host down for a Perform a Resync or set Auto resync options long time CX failover Perform a Resync or set Auto resync options

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 6-3 REO BCA Administration Guide Checking Status

Table 6-1:

Action Reaction CX backup restored Perform a Resync or set Auto resync options Source Volume Resized Resize the target volume, delete bitmap files on the source host and resume replication from CX Dashboard.

Preparing for source volume resize At times you may require resizing the source volume capacity. You can follow any of the two recommended procedures Recommended Procedure 1: Resize the target volume before resizing the source volume This is achieved in nine sequential steps

Figure 6-5: 1. Issue consistency tag: A vacp consistency tag is issued on the source volume as a precaution. This will enable you to recover back to the consistency tag when required. 2. Pause replication: Once the consistency tag reaches the target, pause the replication pair from the CX Dashboard 3. Access the target host and restart the VX agent 4. Resize the target volume such that its either equal or larger than the source volume after resize 5. Stop the VX agent service on the source host 6. Resize the source volume. Ensure that the target volume is not smaller than the source volume 7. Navigate to the VX agent install path and issue the following command to clear the agent cache • For Windows: drvutil --stopfiltering Voulmeleter: -deletebitmap • For Linux: inmstkops-bin r 8. Start the source VX agent 9. Resume the replication pair through CX Dashboard

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 6-4 REO BCA Administration Guide Checking Status

Alternative Procedure 2: Resizing the target volume after resizing the source volume

Figure 6-6: 1. Issue consistency tag and pause the replication pair once the tag reaches the target host 2. Stop the VX agent service on the source 3. Resize the source volume as desired 4. Navigate to the VX agent install path and issue the following command to clear the agent cache • For Windows: drvutil --stopfiltering Voulmeleter: -deletebitmap • For Linux: inmstkops-bin r 5. Start source VX agent 6. Restart target VX agent 7. Resize the target volume such that its equal or larger than the source volume 8. Resume replication through the CX Dashboard

Resuming from a source volume resize When the source volume has been resized without following the recommended procedures, there is a six step procedure to continue with the replication pair.

Figure 6-7: 1. You should see that the replication pair is paused. You will also be intimated about the source volume resize through e-mail and trap alerts if they are enabled. 2. Restart the VX agent service on the target host 3. Resize the target volume such that its either equal or larger than the source volume 4. Stop the VX agent service on the source host 5. Navigate to the VX agent install path and issue the following command to clear the agent cache

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 6-5 REO BCA Administration Guide Checking Status

• Windows: drvutil --stopfiltering Voulmeleter: -deletebitmap • Linux: inmstkops-bin r 6. Start the Service on the Source 7. Resume the replication through the CX Dashboard Notes: • Source volume resize does not support Volpack or Virtual Volume. • Resize does not support shrinking of volume size. • Do not perform a source volume resize while the replication pair is in Resync step 1 • It is recommended to perform a resync immediately after following any of the above three procedures • By following these procedures you will be able to maintain the older retention logs and also perform recover operations to events or time before the volume resize

Throttling Throttling is a mechanism where the source agent stops sending differential data to the CX server, this allows draining of all the differentials from the CX to the target, once all the differentials are drained then the source agent resumes sending the data.

Figure 6-8: This happens primarily when the target host is lagging behind. Reasons include • Low bandwidth, • Large amounts of data changes on the source volume, • If the cache folder for the replication pair is filled up on the CX server. • WAN outage

What should be done? After a replication pair is set, there are two values under the “Pair Settings”, one is “Resync Files Threshold (MB)”, and the other is “Differential Files Threshold (MB)”. When the specified amount of differential data is accumulated on the CX server, the pair is throttled. This can happen when the pair is in “Resync” or “Differential sync”. The value can be set under “Replication Pair Details -> pair settings”

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 6-6 REO BCA Administration Guide Checking Status

Figure 6-9: The default value for differential threshold is 8 GB and resync threshold is 2 GB. You can choose to fine-tune these values to enhance performance. You can also consider increasing bandwidth or fine-tuning bandwidth policies You can identify and move (or delete) large files on the CX cache through the command “du / --max-depth=2 | sort –n”. This should solve the issue where CX cache is full.

Disk Space Warning Threshold

Figure 6-10: If “/”, “/var/log”, “/home/svsystems” on the CX server exceeds 80% disk usage then throttling begins. You can change this % through the CX Dashboard by clicking System > CX Settings > Disk Space Warning Threshold. During throttling the source host stops sending data to the CX server. The CX server on the other hand sends data to the target host and gets it updated, once the differentials are drained on the CX server, the replication pair is restored to its original state.

FTP Mode

Figure 6-11: FTP is used during data transfer from CX to remote site, by default this is “Active” FTP, to change that select “Passive” from the drop down and then click “Commit”. This is particularly used when a firewall is in place. Refer to section “Firewall considerations” in the Installation guide. Notes: While using “Active” FTP on Windows 2008, disable firewall else the firewall will block all incoming connections.

(Snapshot / Recovery / Rollback) Pair Status All recovery operations are displayed under this section. Once the process is complete they are removed.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 6-7 REO BCA Administration Guide Checking Status

Figure 6-12: • Host: Target host name • Host Drive: Drive/ volume of which the snapshot/ recovery is taken • Snapshot /Recovery / Rollback Drive. • Drive Type: Type of drive used to contain a snapshot, virtual, WAN drive or virtual mount point • Progress: Percentage in progress: if snapshot then 0 to 100%, if recovery then 2 stage process 0- 100% • Start time: start time of the snapshot. • End time: end time of the snapshot. • Expected Recovery Point: Desired Recovery (shows time to which recovery should be done). • Actual Recovery Point: Recovery achieved by the agent (shows time to which recovery is achieved). • Status: Status of snapshot (queued, ready, In progress, completed) /recovery (queued, ready, snapshot In progress, snapshot completed, recovery in progress, completed) • Info message: If any error during the operation of snapshot/recovery than the error message is displayed here.

File Protection Status “File protection Status” shows status of a file replication

Figure 6-13: There are three controls under “Filter”

Figure 6-14:

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 6-8 REO BCA Administration Guide Checking Status

“Set”: This is used when you would like to filter out jobs on specific criteria such as based on GID, JID, Exit code, Application, Status, job Description or a combination of these. Click “Set” to change the view and “clear” to restore the default view. The “+” shows more details • Start time: Time when the replication started (time) • End time: Time when the replication ended (time) • Last update time: Displays last activity of replication (time) • Data compression: Data compressed from source to target (number). A greater number indicates better compression. This is available once the job execution is complete. This requires “compress files” to be enabled under “File/Directory Options” • Sync compression: This displays the percentage saving achieved by transferring differentials (i.e., transferring the changed bytes only). The formula is 1- (Actual Bytes transferred/Total Replication size) X 100. A greater number indicates better performance.

Figure 6-15: Sync compression Example • Bytes changed: Total number of bytes transferred from source to target during that particular schedule. • More details: under more details you can see log and “Trending” • Log displays all the activity of the replication and trending displays corresponding graphs If the FX “log” option in protection status is beyond 1 GB then Internet explorer will not be able to handle the file, although Firefox will support up to 2 GB, the recommended workaround is to use “low verbosity” in the job options The fields Data compression, Sync compression and Trending will be active once the “Status” of the job is “Completed”

FX Trending The trending link under “view details” displays a graph of total bytes sent, and total bytes sent (changed bytes). It also displays data compression and sync compression percentages.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 6-9 REO BCA Administration Guide Checking Status

FX Job per Execution This graph displays the total number of Megabytes sent and total Megabytes changed (differentials).

Figure 6-16: FX graph per execution

FX Cumulative Graph (daily) This displays the total Megabytes changed, sent per host on a daily basis.

Figure 6-17:

FX Cumulative Graph (Monthly) This graph displays the total number of Megabytes changed, sent from source on a monthly basis.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 6-10 REO BCA Administration Guide Checking Status

Figure 6-18:

FX Host Distribution Graph A pie graph displaying individual shares of data sent.

Figure 6-19: “Job Description”: A job description is given while setting up a FX job; this can be altered at a later time through “File Protection”. In the “Protection Status” you will only be able to see the status. This text box is used to set a filter for filtering out required jobs and shows the instance of executing job corresponding to the group and job ID. For example start a job in Group 1 and when you run the job 5 times there will be 5 instances with the same group ID. • “Application” is a drop down box with the list of all the applications (set at the time of setting up an FX job). Again this can also be altered through “File Protection” • “Status” field has a drop down box with a list of status all of the jobs belong to. Displays as starting, target starting and running and at last completed • “Source Host” contains the name of the host acting as a source for this FX job. • “Source Directory” is the folder being replicated to the “Target Directory” on the “Target host” • “Scheduled Type” shows when the job is scheduled to execute. • “GID” Group ID explains about the scheduling for Groups ID’s like Scheduling 1 or 2, 3 jobs in one group • JID: Is meant for each individual Job ID when it starts fresh job Replication

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 6-11 REO BCA Administration Guide Checking Status

• “Job Instance”: Every time a job runs it is given a unique number called job instance. It will have its own logs, etc. If the same job runs again, it will be called as a separate instance. For example, if a job runs for ten times there will be ten instances of the same job. • Exit code: Displays a number 0 if job success else it displays the corresponding number (click exit code to display the list of possible error codes) The check box to the end is used for the command buttons at the bottom of the screen. • “Clear logs for selected jobs” deletes all the log files for the selected jobs • “Delete all job history” removes all traces of the job from the UI

Agent Heartbeat

Agent heartbeat shows all the agents and process servers pointed to the CX server. You will find Host names, IP address, VX source (sentinel), VX target (Outpost) File replication agent and process Server fields here. This is used mainly to check the last time when the Agent sent an “alive” signal to the CX server

Figure 6-20:

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 6-12 CHAPTER 7 Configuring Alerts

This chapter explains: • Configuring SNMP traps • Configuring e-mail alerts and • Modifying agent settings

Trap Listeners

Traps are used to transmit messages from CX server to any other host that is configured in the “Add Trap Listener”. This is done through SNMP protocol and port 162 is used for this. Traps are used to transmit messages, events, etc., specific to VX agent. A trap receiving software needs to be installed on the target system (or any other system configured through the UI) which will interpret alerts sent by the CX server. The target system can be anywhere as long as it is accessible A host can be added to interpret traps through the UI. Navigate to “System” and then click “Monitoring” then enter the host name or the IP address under “Add trap listener” and click “Add”.

Figure 7-1: If a host name is to be used here, ensure that a fully qualified host name is used (for example, Neptune.drsite.in where Neptune is the host name and drsite.in is the domain name). After adding a host, it will appear in under the configured trap listeners. This is also the place where a trap listener can be deleted.

Figure 7-2: You can choose to use any of the trap listeners and listen to the trap port (default being 162). The CX server sends out traps to the e-mail address that was registered. A trap message will contain a number as shown in the picture below.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 7-1 REO BCA Administration Guide Configuring Alerts

Figure 7-3: The table below explains the reasons for the alert and corrective action to be taken. The table here gives an overview of traps their conditions and corrective measures to be taken.

Table 7-1: Types of Traps

Trap Code Reasons /Conditions that can Generate the Alert /Trap Corrective Action to Take 240 When any host installed with either VX or FX or both Agents Start agent (VX,FX) service if do not have the corresponding REO BCA FX or VX service stopped. running or the host itself was powered-down or the Check network connectivity. concerned host was not reachable through the network. Contact Technical Support if issue persists. 260 CX server’s / or /var/log or /home partitions may have less Increase the disk space on the space than the default or set size limit (default=80%) CX server / or “/var/log” or “/home” partitions. 280 RPO value for that replication pair was more than the set Make sure that the replication value for that corresponding pair is not or stopped or stuck. VX replication File Replication has not made progress within the last one pair will progress if the target is minute made visible. 265 There is a problem with storage mounted. Address the storage attached and then reboot the system. 215 When the Target volume of a replication pair is not in sync Perform a Resync on that with the source [due to sudden power failure during replication pair. replication or after a Visible-RW of the Target volume resync was not forced]

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 7-2 REO BCA Administration Guide Configuring Alerts

Table 7-1: Types of Traps

Trap Code Reasons /Conditions that can Generate the Alert /Trap Corrective Action to Take 315 This code starts one day before the VX license will expire Contact Technical Support for a and continue to appear even after the license is expired new license. 310 This code starts one day before the FX license will expire and continue to appear even after the license is expired 320 This code starts one day before the CX license will expire and continue to appear even after the license is expired 330 VX license will expire in seven days 325 FX license will expire in seven days 335 CX license will expire in seven days 250 Source Volume Resized Please refer to the section Preparing for source volume resize

Adding Users and E-mail Alerts

Types of Users There are two types of users that can access the CX Dashboard, the administrators and the users. Administrators have full access to the CX Dashboard while the user’s access is limited to monitoring active backups and managing log files. The following table lists out operations accessible for administrators and users. You can view, edit, add or delete administrators, users and configure e-mail alerts specific to each user account. User accounts on the other hand can view, edit and delete their own accounts and cannot do the same on any administrator account.

Table 7-2:

Operation Administrator User Volume Protection Full access No access File Protection Full access No access Protection Status Full access Full access Recovery Full access No access System Full access Limited access Trending Full access Full access

As an administrator you can view, edit, add or delete administrators, users and configure e-mail alerts specific to each user account. Only administrators can add/ remove agents to the CX Dashboard, Set, edit or stop replication pairs (FX and VX) while users can monitor replication pair progress, agent heart beat, manage log files, etc.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 7-3 REO BCA Administration Guide Configuring Alerts

To add an Administrator or User 1. On the “System” menu click the “Monitoring” link. The “Configured System Administrators” window appears. 2. You can view, edit or delete administrators through this screen. Also e-mail alerts can be configured through the same screen. 3. To add a new user click “Add Administrator”.

Figure 7-4: Adding a System Administration The “Add Administrator” screen opens up

Figure 7-5: Add Administrator 4. Enter the full name of the administrator then enter the user name 5. To create an administrator account, check the “Admin Access” option. When the option is not checked a user account is created. 6. Enter a password for the user and re-enter it to confirm it. 7. Enter the e-mail address to be used for CX generated e-mail alerts. 8. Click “Accept” to create the user, a dialog box appears indicating that the user is created successfully, click “OK”. 9. The “Configured System Administrators” screen appears with the list of added users.

Figure 7-6: Configuration Screen with New Administrator Details

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 7-4 REO BCA Administration Guide Configuring Alerts

You can see user details by clicking the “View” button. You can delete the user account by clicking “Delete” button. To modify the user details or to fine-tune e-mail alerts, click the “Edit” button for the corresponding user. The “Administrator Configuration” screen appears, there are three sections in this screen. • “Update Administrator Settings” is used to change the user name, user password, e-mail ID used for CX server’s e-mail alerts and the time interval of e-mail alerts. The default time between e-mail alerts is 30 minutes. All alerts are consolidated into one single e-mail and sent once every 30 minutes.

Figure 7-7: • “E-mail Notification” is used to select only the required e-mail alerts while the others are ignored. An e-mail alert is sent out at the specified interval if any of the following conditions are met.

Figure 7-8:

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 7-5 REO BCA Administration Guide Configuring Alerts

There are a total of fourteen types of e-mail alerts “RPO SLA threshold exceeded” When this option is checked an e-mail is sent out when the RPO value increases for a VX or FX replication.

Table 7-3: E-Mail Alerts

Event Description Reasons / conditions that can generate Corrective action to be taken RPO SLA threshold a) The target can drain slowly. Monitor the services at both source exceeded and target and CX and ensure the services are running. Resync required for VX a) The re-sync required might be set due to Restart a re-sync from UI or configure replication pair data inconsistency. a auto re-sync policy to get the pair to b) On source volume resize do restart c) If the target drive is exposed in read/write mode. d) Process server fail over for the replication pairs e) Configuration server fail over in case of the High availability scenario VX/FX agent not This e-mail is sent when the agent is unable Disable any firewalls (or allow FX responding to communicate with the CX server within agent through the firewall). 900 seconds. Either the Check and ensure that FX service is 1. Agent service may not be started running 2. A fire wall may be blocking the agent, Ping the target and CX servers to see if 3. Network failure or the host can communicate with them and vice versa. 4. The host itself may be down Check if agent is pointed to the right CX server The time-out can be configured under “System-> Agent settings” CX secondary storage If the disk space at CX exceeds than disk An e-mail alert is sent when the disk warnings and alerts space warning threshold, which is usage has reached 80% (as configured from UI. configured under “System-> CX settings”) for the following four volumes on the CX server. / /home /tmp and /var Agent logged error An e-mail alert is sent out when the VX or FX Check the Agent log message agent has encountered an error. CX, VX, FX license expiry E-mail alert is sent seven days before license Contact Technical Support or the and related issues expiry and continues until the new license is concerned Representative for uploaded. obtaining new Licenses Bandwidth shaping An e-mail alert is sent out when a policy is Monitor the bandwidth as per the alerts created, deleted, or is invalid configured policy

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 7-6 REO BCA Administration Guide Configuring Alerts

Table 7-3: E-Mail Alerts

Event Description Reasons / conditions that can generate Corrective action to be taken Capacity threshold This is applicable for capacity-based license. Upgrade license to higher capacity exceeded When the threshold is exceeded as set under “System-> license management - Set Capacity Utilization Threshold” an e-mail alert is sent out. Capacity utilization Again this option is applicable for Upgrade license to higher capacity reached limit capacity-based licensing, when the full capacity of the license is consumed by replication pairs, an e-mail alert is sent out until a higher capacity license is uploaded or a replication pair is removed in order to adjust within the defined license capacity. Health report every Enable this option to receive a protection if the protection coverage is lesser as report. By default the interval is set to one indicated by the report, monitor for the day. Protection report will always following on your system: a) RPO characteristics for the volume b) Has the pair been throttled? c) Has resync required been set to yes Source volume resize If the source volume capacity is resized As per the documentation. greater than the current configured source volume pair CX node Failover CX HA failover. Primary CX server has gone Bring the primary CX online and down perform a failback

Debug information for An e-mail is sent out if there are any errors in Check the host logs CX services the host logs

• “CX Auto Timeout” controls when a user is logged off automatically after a set period of inactivity. By default the value is set to three hours (180 minutes). Enter a time in minutes starting from 1 to 9999 minutes. For example, when a user has logged into the CX Dashboard and has been idle for three hours (or the configured amount of time), then he will be logged off automatically.

Figure 7-9: Notes: Click “Return” to cancel all the changes. You can also configure the e-mail alerts generated by the CX server to be sent to the administrator

Mail server settings The “Mail Settings” provides an interface to configure the e-mail server. By default the mail server host name is set as local host. When you change any of the mail server settings, enter the mail server name in this field.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 7-7 REO BCA Administration Guide Configuring Alerts

CX Server Name/ID: The name entered here will reflect in all e-mail alerts sent by this CX server. This is helpful while working with multiple CX servers.

Figure 7-10:

Agent Settings

You can specify the time-out duration for the agents with respect to the CX server. The CX server waits for a response from the agents for a specified time. If there is no response from the agent after the specified time, the connection is automatically timed out.

Figure 7-11: Change Agent Settings Use these steps to configure the Agent Settings: 1. On the “System” menu click the “Agent Settings” tab. The Agent Settings screen appears 2. Select the check box for the agent for which you want to specify the timeout. 3. Enter the “time-out” for the agent and click “Change Settings” 4. “CX NAT IP”: enter the NAT IP address for the CX server. (This is the place to set NAT IP for CX server) 5. Alias: You can choose to give an alias name for any host on the CX Dashboard. This will not change the actual host name but show the alias name within brackets on the CX Dashboard.

NOTE: The default agent time-out value is 900 seconds.

Process Server You can assign a NAT IP to a Process server under the “System -> Agent settings” screen. Select the desired Process server then enter a NAT IP and click “Change Settings”

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 7-8 REO BCA Administration Guide Configuring Alerts

Figure 7-12:

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 7-9 CHAPTER 8 Log Management

This chapter deals with log management. After this chapter you will be able to: • Set space utilization policies for logs • Getting CX logs to send to support personnel

Host – Log details

For better support, you might need to download REO BCA system logs files and pass it across the REO BCA support personnel. CX Server administrator console provides a feature to just do that. 1. Click “System” menu and navigate to “Logs” tab, you can further find navigate to “Host Logs” “CX Logs” and “Download Logs”

NOTE: Host logs are generated by the source and target hosts, where VX and FX agents are installed. VX agents by default shall log all severe and critical errors to host logs on the CX Server.

2. Navigate to the desired host and click it to expand the list of log files for the selected hosts

Figure 8-1: Host Log Files Browse By Host

Table 8-1: Host Log File Nomenclature

Log name Description driveletter_rpo View or download the RPO trends observed for the drive. E.g.: H_rpo driveletter_sentinel View or download VX Source (sentinel) logs for that particular drive. E.g.: H_sentinel

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 8-1 REO BCA Administration Guide Log Management

Table 8-1: Host Log File Nomenclature

Log name Description hosts View or download all the severe and critical errors for that hosts reported by the agents driveletter_perf View or download all log info about differentials

CX - Log Details

Click “CX Logs” to download all logs pertaining to CX logs.

Figure 8-2: CX log files

Table 8-2: CX Log Files Nomenclature

Log Name Description Audit View or Download log of User actions tman_monitor_disks View CX internal database connectivity, logs offline disks tmanager_ps View or Download logged messages for volume and file monitoring process for Process server Tmanager View or Download logged CX messages tman_monitor View or Download logged messages for volume and file monitoring process Message View or Download logged Scheduler messages. tman_volsync View or Download logged tman_volsync messages Bpmtrace View or Download logged VX Bandwidth Shaping messages Mrtgtrace tman_monitor_ps TrapLog View or Download CX logged trap messages Xferlog rsyncd

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 8-2 REO BCA Administration Guide Log Management

Download Logs

To download all logs in a compressed achieve, select the required hosts and/or RPO and/or Perf logs, then select the type of achieve either a zip or tar and then click Achieve Logs, this creates the required archive, then click the Download Logs. The same applies to CX-Download Logs.

Figure 8-3: Download Logs

Audit Log

The audit log stores all user activity on the CX Dashboard. Click Audit Log to view the activity (Figure 8-4).

Figure 8-4: The following are the types of actions that gets logged into the audit log • New administrator add • Trap listener add • Trap listener delete

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 8-3 REO BCA Administration Guide Log Management

• Disk space warning Threshold configuration • Agent settings configuration • Replication pair creation • Replication pair updated • Snapshot creation (physical) • Snapshot creation (virtual) • Snapshot update • Snapshot delete • Recovery snapshot creation (physical) • Recovery snapshot creation (virtual) • Replication pair delete • Rollback recovery snapshot creation • CX backup • CX restore • All FX logs deletion • FX logs deleted for specific Jobs • FX logs auto deletion • FX job create • FX job edit • FX job start • FX job stop • FX job remove • FX template creation • FX template deletion

CX Log Rotation

Linux CX rotates the logs if 80% of “/var” is used and the log file is equal or greater than 10 MB. Currently CX rotates the following logs under “/var/log” • “/var/log/xferlog” • “/var/log/wtmp” • “/var/log/tls.log” • “/var/log/boot.log” • “/var/log/mysqld.log” • “/var/log/secure” • “var/log/spooler” • “var/log/maillog” • “/var/log/messages” • “/var/log/warn “

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 8-4 REO BCA Administration Guide Log Management

• “/var/log/httpd/*.log” (all logs under httpd) • “/var/log/rsyncd.log” • “/tmp/phpdebug.txt” And “phpdebug.txt” in “/tmp” will be rotated if its size exceeds 10 MB. All the files are zipped and placed under the same folder.

Windows Windows-based CX server rotates all the log files under “c:\home\svsystems\var”

Clear FR Logs by Date

Every file replication job generates a log in the REO BCA CX server, each time it runs. These logs accumulate over time. You can specify the period after which you would like these logs to be deleted from the server. 1. On the “System” menu click the “CX Settings” tab. The “Clear FR Logs” by Date screen appears 2. Select the time interval for automatic deletion of logs and click “Commit”.

Figure 8-5: Clear FR Logs by Date

Retention Reserve Space Settings

Retention logs are stored on the target host. By default a free space of 256 MB is maintained on the retention volume. You can choose to increase or decrease this free space limit from this interface. For example, when the retention volume is of 1024 MB, by default only 768 MB will be used by the retention logs leaving 256 MB as free space. To use volumes containing free space of less than 256 MB, navigate to “System” -> “Agent Settings” and then reduce the “Retention Reserve Space settings” and click “Commit”

Figure 8-6:

Agent Installers

To download the installers, vacp clients etc, navigate to “System” -> “Agent installers”. You can also upload any binaries or files to the CX server which you intend to download at a later time.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 8-5 REO BCA Administration Guide Log Management

Figure 8-7: You can choose to upgrade agents through the Agent Upgrades interface. Upload the agent binaries then select the desired agents and click Upgrade Agents.

Figure 8-8:

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 8-6 CHAPTER 9 Analyzer and Trending

In this chapter we will see trending and analyzer sections. While trending displays self explanatory graphs, analyzer helps acquire vital information about the environment. With this information one can strike the balance between the required RPO and the available bandwidth, considering the data change rates. After this chapter you will be able to • Use trending graphs • Use analyzer

Trending

When is Trending Used Trending is the last button. You should see six links on the “Trending” screen. This gives a graphical representation of compression achieved on a monthly basis, it gives in detail graphs of each of the hosts. RPO graphs, data change rates, etc.

Figure 9-1:

Network Trending Network trending shows the amount of traffic (both inbound and outbound) on a daily, weekly, monthly basis. Roll the mouse over the “Network Trending” screen to view the list of process servers. Click the desired Process server to see trending graphs specific to the Process server.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 9-1 REO BCA Administration Guide Analyzer and Trending

Figure 9-2:

Figure 9-3:

Bandwidth Report All the incoming and outgoing FTP traffic for each Process Server is shown within these reports. The FTP traffic is logged in the xferlog file maintained by proftpd. This file is scanned to find incoming and outgoing FTP traffic for each host.

CAUTION: For hosts attached to s Windows Process Server, Bandwidth report is not generated.

The Bandwidth Report screen contains two tabs, “Bandwidth report” and “Custom Report”

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 9-2 REO BCA Administration Guide Analyzer and Trending

Bandwidth report tab This contains a drop down menu where you can select the desired host. By default the whole month’s data is displayed as shown below. You can also see “Last Day”, “Last Week”, “Last Month” and “Last Year’s” graphs by clicking the respective links on the right hand side.

Figure 9-4:

Custom Report At times you may require a report between specific times. Select the desired host then select the date and time and click “Generate Report” to see a custom report. Optionally you can select the “Complete Host Report” option to display “last day, last week, last month and last year’s” data as well

Figure 9-5: An example of “custom report” is shown in the picture below

Figure 9-6:

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 9-3 REO BCA Administration Guide Analyzer and Trending

Health Report Reports screen contains two tabs “Health Report” and “Custom Report”. The “Health Report” is generated for every source volume from the time the replication is set. This report contains details such as data change rates, amount of data compressed, amount of data not compressed, max RPO reached for that day, etc. A “custom report” can also be generated for the desired volume (or group of volumes) by specifying the “Start date” and “End Date”.

Figure 9-7:

NOTE: A blank health report is shown for the first hour after the CX configuration server is installed. This is the time taken for generating the report.

Health Report 1. To view the reports click “Trending” and then on “Reports”.

Figure 9-8: Fields in the above figure are explained below: • “Date”: Date of the generated Report • “Data changes -> With compression”: All the compressed data during transit is displayed in MB. • Data changes Without compression”: All the transmitted data (specific to the source volume selected) without compression is shown in MB. • “Max RPO”: Maximum RPO achieved for the given date. • Retention windows (days): Displays current retention day. • “No. of hours RPO not met”: Total time that the RPO didn’t meet the required SLA.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 9-4 REO BCA Administration Guide Analyzer and Trending

• “Retention log reset”: If the replication pair is set to Resync then the retention logs are reset when a resync is performed on that replication pair. The value “N” indicates that retention logs are intact for the given date. • “Throttled Duration (Hours)”: Total number of hours the replication pair (with the selected source volume) has throttled • “Protection Coverage”: The value usually shows 100% unless • RPO has exceeded the threshold value • A resync is performed on the replication pair • A replication pair has throttled • If there is a retention policy violation

Custom Report This report is generated per volume or a set of volumes on a daily basis. It shows data change rate with or without compression, Maximum RPO for the day, etc. 1. To view the report, click “Trending”, then on “Reports”, and select “Custom Report” tab 2. Select the desired volume (or group of volumes), enter “Start date” and “End Date” in “mmddyyyy” format along with the time, and then click “Generate Report”

Figure 9-9: 3. This opens “Health Report” screen and each of the fields are explained after the figure.

Figure 9-10: Fields for the above figure are explained below: • “Date”: Date of the generated Report

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 9-5 REO BCA Administration Guide Analyzer and Trending

• “Data changes -> With compression”: All the compressed data during transit is displayed in MB“. • Data changes Without compression”: All the transmitted data (specific to the source volume selected) without compression is shown in MB • “Max RPO”: Maximum RPO achieved for the given date. • Retention windows (days): Displays current retention day • “No. of hours RPO not met”: Total time that the RPO didn’t meet the required SLA. • “Retention log reset”: If the replication pair is set to Resync then the retention logs are reset when a resync is performed on that replication pair. The value “N” indicates that retention logs are intact for the given date. • “Throttled Duration (Hours)”: Total number of hours the replication pair (with the selected source volume) has throttled • “Protection Coverage”: The value usually shows 100% unless • RPO has exceeded the threshold value • A resync is performed on the replication pair • A replication pair has throttled • If there is a retention policy violation From the “Health Report” click “Health” as shown in the figure (marked in rectangular shape)

Figure 9-11:

NOTE: An e-mail is sent when E-mail alerts are configured

Health Report Graphs

Change Rate Graph Click “Change Rate”, this opens up the graph screen which contains last day, week, month, and year graphs that shows compressed and uncompressed data. X-axis indicates “Time” and Y-axis is “changes in bytes”. Graphs for last day, last week, last month and last year are shown on this screen. The graph below shows that at 18:00 hours, approximately 0.5KB of data is compressed. Similarly for 00:00 hours, 06:00 hours, and 12:00 hours the same amount of data is compressed. Green color indicates uncompressed data while blue indicates compressed data.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 9-6 REO BCA Administration Guide Analyzer and Trending

Figure 9-12:

RPO Graph RPO graph is displayed when RPO link is clicked. Here, x-axis indicates “Time” and y- axis indicate “RPO in minutes”. Last week graph has “week days” in x-axis, last month has “week number” in the x-axis, and last year has “month name” in the x-axis. The graph below shows that the “RPO” is approximately 0.7 minutes at 18:00 hours, RPO is approximately 1 minute at 00:00 hours, RPO is approximately 0.6 minute at 06:00 hours and RPO is approximately 0.6 minute at 12:00 hours.

Figure 9-13:

Retention Graph The retention graph’s x-axis indicates “Time” and y-axis indicates “Retention Window in days”. Weekly graph has “week days” in x-axis. Monthly graph has “week number” in the x-axis, and yearly graph has “month name” in the x-axis. Brown color indicates that retention has not met. This graph shows that the replication started at 06:00 hours and maintained “Retention” after 1800 hours.

Figure 9-14: Similarly you will find weekly, monthly and yearly graphs.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 9-7 REO BCA Administration Guide Analyzer and Trending

Health Graph Click “Health” link you should see a health report screen wherein you get a list box. This list box contains Protection health, RPO health, throttle, retention health, Resync Health, and Replication Accuracy. By default Protection Health graphs is displayed. When you click the list box a list is displayed. Each health graphs when selected displays corresponding graphs.

Figure 9-15:

Protection Health By default “Protection Health” screen appears. X-axis indicates time, week, week number, and month names. In the figure below, last day graph indicates that at 12.00 hours. “Protection Health” was degraded from 16.00 hours onwards in “Last Day”. “Protection Health” status became degraded at the end of the day in “Last Week” graph. “Protection Health” became degraded at the end of week 51 in “Last Month” graph. “Protection Health” was not met in “Last Year” graph.

Figure 9-16: Similarly you will find weekly, monthly and yearly graphs.

RPO Health The graph below shows when the RPO has met as green bars. Periods when the RPO has not met are indicated by red bars.

Figure 9-17:

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 9-8 REO BCA Administration Guide Analyzer and Trending

Throttle Health This graph indicates the “Throttle Health” was acceptable. Again green bars indicates health while the red bars indicate degradation. Similarly throttle graphs are available on weekly, monthly and yearly basis.

Figure 9-18:

Retention Health This graph shows that the retention health was acceptable most of the times. The red bar indicates that the retention health dropped just before 06: 00 hours. “Retention Health” graph, like other graphs is available on weekly, monthly and yearly basis also

Figure 9-19:

Resync Health This graphs shows both healthy and degraded “Resync Health” at different points in time. Again this graph is available on daily, weekly, monthly and yearly basis.

Figure 9-20:

Replication Accuracy: This graphs indicates that the “Replication Accuracy” was healthy between 16:00 and 20:00 hours and just before 16:00 hours. This graph is also available on weekly, monthly, and yearly basis.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 9-9 REO BCA Administration Guide Analyzer and Trending

Figure 9-21:

Detailed Trending Shows the list of all the graphs available, they can be downloaded in PNG format.

Figure 9-22:

Analyzer Analyzer is used to find the bandwidth required for a desired RPO for a single or a group of replication pairs. This is calculated considering last seven days of the replication pair’s data change rates, compression achieved, retention storage used, etc. The analyzer can be found under Trending. The CX Dashboard shows two separate sections: Protection Options and Pairs Configured.

Figure 9-23: “Protection Options” will accept inputs such as “Cumulative bandwidth available”, “Desired RPO” and “Retention Window”. The “Overhead factor” is used for calculation. Fill the relevant Fields and scroll down to select at least one of the replication pairs and then click “Analyze”

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 9-10 REO BCA Administration Guide Analyzer and Trending

Figure 9-24: This will display the result above the “Protection Options” and shows if the desired RPO is achieved with (or without) compression.

Figure 9-25: When the “Retention Window” is increased under the “Protection Options” then the “Retention Storage Required” under “Pairs Configured” will change accordingly. Recommended CX Configuration: After the Result is displayed, click “View Configuration” to see recommended CX configuration depending on the data change rates.

Figure 9-26: Click “Back” to return to the previous screen

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 9-11 REO BCA Administration Guide Analyzer and Trending

Figure 9-27:

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 9-12 CHAPTER 10 Configuration

This chapter deals with CX administrative tasks such as backing up CX and License management. After this chapter you will be able to: • Backup and restore CX settings • Add/ Remove agent licenses pointed to this CX server • Upload new license

CX Backup/Restore

This feature allows you to backup or restore the current settings on the CX box. The backup and restore pertains to the database and CX configuration files. To backup the REO BCA CX settings, click System > CX Settings.

Figure 10-1: CX Backup 1. Enter a valid backup name in the input box next to the Backup button.

NOTE: A valid backup name begins with an alphabet and can have subsequent characters as alphabets, numbers, and underscores.

2. Click the Backup button and you will be asked to choose a location to save the backup file as shown in the figure below.

Figure 10-2: Saving the CX Backup File

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 10-1 REO BCA Administration Guide Configuration

3. Click Save to disk and you will be asked to choose a directory to save the file. Select a directory and click Save. The CX settings are backed up to your computer as a file that bears the same name as specified in the backup name input box with the “.amc” extension as suffix. It is important to backup CX setting periodically to restore the settings at a later time (usually if the CX server is destroyed, or it has to be replaced with old settings)

License Management

After logging in to the CX Dashboard for the first time the CX Dashboard is blank. To perform any backup or recovery operation, assign appropriate license to the agent, only then the agent can be used.

Host-Based License Each host is assigned with a unique license and does not have any limit on the amount of data replicated. FX agent can be assigned a host-based license only.

Table 10-1: Differences Between Host-Based and Capacity-Based Licenses

Feature Host-Based License Capacity-Based License Hosts One license per host “N” number of hosts Amount of data protection No restriction Restricted by the license

Expiry Independent for each When CX license expires host

Assigning Licenses You can assign and release licenses for VX and FX agents through the CX Dashboard. Every agent should be assigned a valid license before it can take part in any replication job. The REO BCA licensing screen can be accessed by navigating to the License Management tab under the System menu. To upgrade to a newer license, upload the license file through the licensing screen and the upgrade is automatically done by the CX server. When you install the CX server, the UI is blank and shows all the agents pointed to it in the license management screen (accessible through System > License Management). To proceed further, assign license to each of the agent so that further operations are possible.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 10-2 REO BCA Administration Guide Configuration

Figure 10-3: License Management Screen

Unlicensed Hosts

Figure 10-4: 1. Select the type of license, either capacity or host-based license. Then select the appropriate VX or FX agent to which you want to assign the license. 2. Select an available license from the License drop-down box. 3. Click “Set License”. The screen refreshes and adds the new VX or FX agent to the list of licensed hosts. 4. While assigning the capacity license observe that the license still appears in the license column unlike the host license. Notes: • All VX licenses begin with VX as suffix as part of the license string.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 10-3 REO BCA Administration Guide Configuration

• An unlicensed host also sends log messages to the CX server like “host down” which can be ignored. • While replication is in progress refrain from using disk management tools on target volume

Capacity Utilization This shows the amount of capacity has been consumed by replication pairs. Once the “Set Capacity Utilization Threshold” limit is reached, e-mail alerts are sent out (if e-mail alerts are configured). To learn more about e-mail alerts refer to the section Adding users and e-mail alerts.

Figure 10-5:

Licensed Hosts If a host is no longer required it can be removed from the UI by releasing its license. It will appear under unlicensed hosts (to remove from unlicensed hosts as well, access the agent configuration window and change the IP address of the CX, or uninstall the VX agent) The REO BCA licensing screen can be accessed, by navigating to the “License Management” tab under the “System” menu

Figure 10-6: Releasing Assigning Licenses 1. Select the host and agent whose license you want to release. 2. Click “Release License”. This will free the license from its agent and add it to the list of free licenses. 3. To move an agent from host-based to capacity-based license, click the link “Assign Capacity License”, similarly to move from a capacity-based license to a host-based license, select the desired host and click “Assign Host license”

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 10-4 REO BCA Administration Guide Configuration

License Upload

Figure 10-7: 1. Click “Browse”. The Choose File window appears. 2. Select the valid license file and click “Upload”

NOTE: The old license file is backed up under the directory “/home/svsystems/etc” on CX in case you accidentally uploaded an invalid license file. You can restore it by gaining a shell access to CX.

License Validity and Expiry A license file is bound to a single CX box. The licensing module validates this by checking the MAC address of one of the interfaces on the host as specified by the customer, with the information in the license file. If there is a mismatch, none of the VX or FX jobs will work. VX agents at source will be throttled, FX agents will not receive their job configuration information and unlicensed hosts will not be allowed to receive a license. A MAC mismatch is alerted to the user under license details and so is a license expiry.

Figure 10-8: License Expired for Capacity-Based License The licensing scheme also supports time limited evaluation licenses. Each license has its own expiration date, after which, the license is unusable. If the license of an agent participating in a replication expires, the replication will come to a halt. License expiration for licensed agents is alerted to the user through red highlighted errors in the license management UI as shown. You will be alerted about the expiry of the license for a particular agent by a red highlighted error in the Licensed Hosts window as shown below.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 10-5 REO BCA Administration Guide Configuration

Figure 10-9: License Expiration Alerts

Capacity Calculator A capacity calculator is shown under “License Details”. It is used to add up the desired volume capacity. To move to a higher capacity license, identify the list of volumes that are to be protected through the capacity calculator

Figure 10-10: Select the list of volumes and the “Expected capacity growth” value as a percentage of the total capacity of selected volumes. The result will be displayed on the screen. You can then make a request for a higher-capacity license

Figure 10-11:

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 10-6 REO BCA Administration Guide Configuration

Upgrading a License If a capacity-based license is uploaded over an existing host-based license, you can upgrade to the new license without disrupting any backup or recovery operations. On the CX Dashboard, click “System -> License Management” then scroll down to “Licensed Hosts”. All VX agents with host-based licenses will show an “Assign Capacity License” link under the Upgrade License column. To upgrade the VX license to capacity-based license, just click the link and the new license is assigned to the agent without disrupting any operation.

Figure 10-12:

Configure Remote CX

Introduction to remote CX recovery While the “CX cluster” feature is used for high availability, the “Remote CX” feature is used for remote recovery. This solution describes using another standby CX server to counter loss of the primary CX server. The standby CX server is placed over a WAN link within the DR site. Then both the CX servers are linked through the primary CX server’s interface. This requires FX agents to be installed on both of them. You can continue with your normal backup and recovery operations through the primary CX server.

Figure 10-13: When the primary CX server is lost, all the replications are automatically diverted to the standby CX server. To start using the standby CX server UI, the link created between both the CX servers needs to be removed.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 10-7 REO BCA Administration Guide Configuration

Figure 10-14: This is broadly classified into four major sections as shown below. Each section is a collection of steps.

Figure 10-15: CX HA is not similar to Remote CX feature, for a list of differences between them refer to the section Differences between CX HA and Remote CX features.

Protecting Primary CX Server 1. Login to the primary CX server then click “System-> Configure Remote CX”, to enter the following values: • IP Address: Enter the Standby CX server’s IP address • NAT IP Address: When the CX server is using a NAT IP address, enter the NAT IP address. • Port Number: Enter the HTTP Port of the standby CX server; this is set to 80 by default • Time Out (In Minutes): The agent tries for the specified time before switching to the standby CX server. This is set to 10 minutes by default. 2. Click “Configure” to continue.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 10-8 REO BCA Administration Guide Configuration

Figure 10-16: 3. The link is set between the primary and standby CX server. This sets the FX job between the primary and standby CX servers. The FX job here is set automatically without any manual intervention. This job is set to run every five minutes.

Figure 10-17: 4. The FX job appears automatically under the primary CX server and then on the secondary CX.

Figure 10-18: 5. Login to the standby CX server’s UI and navigate to “System-> Configure Remote CX”. You should be able to see the primary and standby CX servers.

Figure 10-19:

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 10-9 REO BCA Administration Guide Configuration

CAUTION: It is important that both the primary and standby CX servers have the same time; else the FX job may not function as intended.

Using the Primary CX Server You can set VX replication pairs, FX jobs, etc., through the primary CX Dashboard.

Figure 10-20: All the FX, jobs, VX replications, etc., should appear on the standby CX server’s UI. However you will not be able to alter anything here. The primary CX server should display command buttons, etc., enabling you to set or remove FX jobs or VX replications, etc.

Figure 10-21: The standby CX server will not show any command buttons and should remain as a read- only interface

Figure 10-22:

Failing Over to the Standby CX Server 1. Switch to the secondary CX Dashboard and navigate to “System-> Configure Remote CX”, then click “Set Active” to start using the standby CX server’s UI.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 10-10 REO BCA Administration Guide Configuration

Figure 10-23: 2. This should make the standby CX server as active, select the stand by CX server entry and click “Release Pair” to break the link between both the CX servers. This will also delete the FX job.

Figure 10-24:

Post Fail-Over All the VX replication pairs are set for a “Resync required” as “YES” All the FX jobs are scheduled to “Run On Demand” Start the tmanagerd service on the standby CX server to start using it

Figure 10-25:

Differences Between CX HA and Remote CX Features CX HA and Remote CX features are not to be mistaken. Given below are the differences between them.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 10-11 REO BCA Administration Guide Configuration

Table 10-2: CX HA and Remote CX Differences

CX HA or CX Cluster Remote CX Usage To overcome loss of the primary CX Intended for remote recovery when server by instantly failing over to the the primary CX server (or the cluster secondary CX CX server) on the primary site is down. Topology Secondary CX is placed locally and Secondary CX is placed remotely is on a LINUX HA configuration and is not on a HA configuration. Usage High Availability Remote Recovery Fail-over Automatic fail-over Manual fail-over by choosing the secondary node as active Failback Requires manual intervention User should configure a remote CX from the new fail-over node to do a failback Misc Works only on LINUX Works on Windows and Linux when: • Primary -> Remote (both Windows) • Primary -> Remote (both Linux)

Process Server Fail-Over At times you may need to move VX replication pairs handled by one Process server to another. This may be due to: • Overload on the Process server • Low resources on the Process server • Process server that went down or was lost The picture below shows a CX configuration server communicating with two process servers, a Production server and a DR server. The primary PS is handing the replication pair while the backup PS is idle.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 10-12 REO BCA Administration Guide Configuration

Figure 10-26: When the Process server is down, you will need to perform a “Process Server Failover” through the CX Dashboard.

Figure 10-27: Navigate to “System “-> “Process Server Failover”, you should now see the screen given below. Select the old Process server with the VX replication pairs under the “Current Process Server” then select the new Process server under “Failover Process Server” and click “Failover”. This will move all the replication pairs from the old Process server to the new Process server. The corresponding VX replication pairs will require a Resync.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 10-13 REO BCA Administration Guide Configuration

Figure 10-28:

Versions & Patches This shows the “CX Patch History” and “Agent Versions and Patch history” sections. The CX patch history contains all the patches and updates performed on the CX server. The Agent versions and patch history contains all patches on the agent (both FX and VX)

Figure 10-29:

Process Server Traffic Load Balancing

A single Process server may be used by many hosts leading to degraded performance. You can choose to add additional NICs to the Process server and assign hosts to desired NICs. The picture below shows a Process server is handling multiple hosts through different NICs at the same time.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 10-14 REO BCA Administration Guide Configuration

Figure 10-30: After installing NICs on the Process server, switch to the CX Dashboard and navigate to “System- Process Server Traffic Load Balancing”. You should see the interface as shown below.

Figure 10-31: All the VX hosts pointed to the CX server appear under the “Select Volume Replication Agent” list. All Process servers connected to the CX server appear under the “Select Process Server” list. Select the desired VX agent host that is to be assigned to a NIC on the Process server, you should see the host name, IP address and heartbeat of the VX agent under the “Volume Replication Agent Details”. Then select the Process server, you should see similar details under the “Process Server Details”. This should display the list of NICs available on the Process server under “Select NIC to Map”. Select the desired NIC and click “Submit”

Figure 10-32: A prompt appears, click “OK” to proceed. This will assign the VX agent to the selected NIC on the Process server, a success dialogue is displayed, click “OK” to return to the same screen. You should see this entry under the “Already configured Agent-process Server NIC mapping”. This is also the place where you can delete this mapping.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 10-15 REO BCA Administration Guide Configuration

Figure 10-33:

NOTE: When there is no Agent-PS NIC mapping, by default all the load is handled by eth0. Please refer to the Firewall section in the install guide for a detailed list of ports to be enabled.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 10-16 CHAPTER 11 Application Support

This chapter briefly covers the application support offered by REO BCA. Popular enterprise applications like Exchange and SQL servers are considered as examples. The process of protecting these applications and the scripts that are involved are briefly discussed. After this chapter you will be able to: • Understand REO BCA application support for Exchange and SQL.

Application support

REO BCA exclusively supports enterprise applications like • Exchange server • SQL Server Volumes holding these applications are detected automatically by the VX agent and are shown on the CX Dashboard. Depending upon the resources and the DR policy in place, you can choose to have a local and a remote backup at the same time (or just one of them).

Figure 11-1: The CX server is capable of discovering application servers, issuing consistency tags (or bookmarks) while backing them up. This is done through “built in FX job templates”. FX templates can also perform failover and failback on application servers. Notes: • FX agent needs to be installed on the source and target hosts • VX and FX agents should be installed in their default paths • FX agent service should be up and running with Admin user privileges • FX agent should be licensed accordingly through corresponding CX server

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 11-1 REO BCA Administration Guide Application Support

• For more details about failover and failback of application servers, refer to the solution documents Enterprise applications can be failed over to the DR server through FX jobs. When the Production server is down, all uses connected to the Production server are automatically diverted to the remote server (DR server) and business operations are continued. This process is transparent to the user.

Figure 11-2: Failover to Target System When the Production server is back online, a failback is performed to the Production server thus reconnecting all users earlier connected to it.

Figure 11-3: Failback to Source System

Exchange Server Support

Exchange server plays a critical role in a fast paced business environment where timely communication is critical. Protecting and recovering an exchange server is a challenge faced by many administrators. Backing up exchange has some challenges such as • Large number of users • Exchange spanning over multiple volumes • Maintaining consistency on the backup server While recovering it is imperative to recover to a point with negligible or no data loss while ensuring data integrity.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 11-2 REO BCA Administration Guide Application Support

Protection After the VX and FX agents are installed on the source and target hosts, proceed to backing up the exchange server. The CX Dashboard detects volumes containing exchange server (shown under “Application” column under “Volume protection” -> “Primary drives”

Figure 11-4: Replicate all the volumes of the same exchange server in a volume group and once the pairs reach “Differential Sync”, the backup is ready with only differentials being applied. You can choose to define bandwidth policies to take full advantage of the REO BCA server

Recovery Types This section gives an overview of simple exchange recovery. Exchange recovery is performed if there is an outage of source exchange server, or as part of a mock drill. The types of recovery are as below • Rollback the target exchange server and continue business operations • Take a read/write virtual snapshot of the target exchange, thereby keeping the actual target exchange volumes unchanged and operate on the R/W Virtual snapshot • Failover to the target exchange server until the source is back online and then failback to the source exchange server • Access the target exchange volumes and manually select the required files

Site wide outage If there is a site-wide outage, then the CX server will be offline as well. Under this condition, you can perform a recovery through the console of the target exchange system. The following files will be used to perform a failover and a failback

Application.exe Application.exe performs • Planned failover of exchange and SQL server • Unplanned failover of exchange and SQL server • Failback of exchange and SQL server

Recovery process through CX Dashboard An FX job is created with the source exchange and target exchange sleeted as source and target respectively, the FX template used should be Exchange planned failover. Once the job completes exchange failover will be complete.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 11-3 REO BCA Administration Guide Application Support

Notes: • Failback will also use the same FX template (Exchange planned failover) • Planned failover issues a consistency tag on the source and the target is recovered to the same consistency tag. This ensures that there is minimal or no data loss. In case of partial recovery, the target is made visible or a snapshot (physical or virtual) is taken and then copied it back to the source host. Refer to the exchange failover guide for detailed explanation and process.

SQL Server

REO BCA supports Windows and Linux File Services, MS Exchange, and MS SQL Server. SQL server usually spans over multiple volumes. The challenges faced by backup administrators will mostly remain same as in case of exchange backup.

Protection The VX agent will detect installations of SQL server 2000 (or 2005) and will display under the “Application” field as shown below. If there is more than one volume, then replicate them in a volume group. For a complete process, refer to the solution document for SQL server.

Figure 11-5:

Recovery types Type of recovery depends on the kind of outage that occurs. If there is a site wide outage then recovery will be performed through target host’s console. If there is a partial outage such as data corruption or any other reason where the source host is functional but unable to start off the application server then recovery can be performed either through CX Dashboard or though console. Types of recovery: • Rollback the target exchange server and continue business operations • Take a read/write virtual snapshot of the target SQL server, thereby keeping the actual target SQL server volumes unchanged and operate on the R/W Virtual snapshot • Failover to the target SQL server until the source is back online and then failback to the source SQL server • Access the target SQL server volumes and manually select the required files

10400242-101 07/2009 ©2009 Overland Storage, Inc. W 11-4 APPENDIX A Performance Tuning

This appendix address these performance enhancements: • Tuning the FX agent for faster execution • Various options that can be fine-tuned on the source- and target-side VX agents for better performance. • Tuning the CX server for better performance • Creating bandwidth policies specific to the CX server.

Tuning the FX for Faster Execution

FX replication process depends on various factors such as number of files, file sizes, available bandwidth, etc. One could use different FX options to speed FX replication process, however the trade-offs need to be well understood before making these changes. FX replication performance can take a hit when there are large numbers of files [typically around 100 thousand]. During the FX replication process, the agent needs to determine the changed file list [w.r.t. target], this operation can tend to be costly when the number of files increases. This section explains various options and trade-offs to further speed up the replication.

Options for Faster Execution • Tuning File-listing options. This approach focus on controlling the way file-list is generated. There are two different mechanism used to determine changed files. • Checksum approach: checksum of each file on source and comparing them with corresponding target checksum. • File Timestamp and Size: Timestamp and File size (faster than checksum).

NOTE: Since checksum is a CPU consuming task, other options such as “file size” and “timestamps” can be used to further boost up the FX execution.

• Additional replication options of reducing activity logging operations. • Setting TCP send and receive buffer size. You can choose to fine-tune two dword-type registry keys “TcpSendBufSize” and “TcpRecvBufSize” under “HKLM/SOFTWARE/SV Systems/FileReplicationAgent” to set the send and receive buffer values of TCP for the FX agent. For Linux agents you can edit the “config.ini” file under the FX installation folder to find the keys as “#TcpSendBufSize = 0” and “#TcpRecvBufSize = 0”. Remove the “#”, set the desired values and save the file. You will need to restart the FX agent service after this.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W A-1 REO BCA Administration Guide Performance Tuning

Performance Tuning The following are the different options that can be looked at which can have an impact on the performance, while configuring a job. • “Checksum”: If this option is selected, FX performs checksum of all the files using “128-bit MD4 checksum” algorithm before transferring. It also performs the checksum on the target to determine whether the files are in sync or not. Calculating checksum is CPU intensive and requires I/O to be performed. For faster FX execution, disable the option “Always perform checksum”

Figure A-1: • Size: Choosing the option “Ignore files with same size” will force FX to ignore same sized files across source and target folders. The other option “Ignore files with same size and timestamp at destination” will ignore files with the same size and timestamp across source and target directories.

Figure A-2: • “Verbose”: This option will determine the level of FX logging> Selecting “Very low verbosity” will only log critical activity leading to lesser IO>

Figure A-3:

Auto Delete FX Logs on Source / Target Every time an FX job executes it is considered as a separate instance and a log file is created under the FX agent installation folder. There is a mechanism to delete these log files after a period of seven days. To enable automatic FX log file deletion:

10400242-101 07/2009 ©2009 Overland Storage, Inc. W A-2 REO BCA Administration Guide Performance Tuning

On Windows: Open the registry editor then navigate to “HKEY_LOCAL_MACHINE\Software\SV Systems\FileReplicationAgent” then set the registry value of “EnableFrLogFileDeletion” to 3255 (decimal) on both the source and target FX hosts On Linux platforms: Open the “config.ini” file under the FX installation folder (default path being “/usr/local/Inmage/Fx”) and set the value as 3255 on both the source and target FX hosts.

Tuning VX Agents

Fine Tuning the Source-Side Driver Component

Driver: Driver is a low-level component that acts as a bridge between the hardware and the agent service.

File writer: A logical unit within the driver that reads from the memory, sorts data and directs to threads based on pre-defined logic to write the data to disk. File writers are specific to a particular disk write and additionally there can also be common file writers

Threads: Threads are sub components of file writers; they acquire data from file writer and write it to disk as chunks of predefined size (4mb by default)

Working Process When the initial copy is complete and the replication pair enters into “differential sync” mode, the driver takes over by intercepting writes to the disk (Source side). This is a three-step process 1. First the driver transfers the writes to the memory then 2. The writes are sent to File Writers, each file writer has two threads if it is a single-processor system and four threads if it is a dual-processor system. 3. Threads create files of 4 MB each, which are later picked up by the agent service.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W A-3 REO BCA Administration Guide Performance Tuning

Figure A-4: The file writer accumulates and assigns a bunch of writes to its threads. This procedure can be fine-tuned to enhance performance

Registry Values The registry values are stored under “HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\involflt\ Parameters”

Figure A-5: Volume filtering is performed in two modes • Data mode: All the disk writes are tracked into the main memory in the form of metadata (Offset and Length of data) along with data itself. • Meta data mode: This returns the location and length of data written on the disk (metadata) to agent service. In case of low physical memory, the driver enters into bitmap mode, these saved changes are read back when there is free memory available. (Frequent disk access leads to slower performance). Certain driver thresholds determine the mode in which the driver operates VolumeDataFiltering: This enables disk writes to be tracked in Data Mode and once the memory usage threshold is reached, based on whether file-based tracking is enabled it will write data to Disk files. If file-based tracking is not enabled then it is automatically shifted to Meta data mode.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W A-4 REO BCA Administration Guide Performance Tuning

VolumeDataFilteringForNewVolumes: The driver will also monitor newly created volumes. By default this is enabled (value 1). By default this monitors in data mode and once the threshold is reached it switches to Meta data mode. To disable it, change the value to 0. NumberOfThreadsPerFileWriter: The number of threads can be increased, two for single-processor units and four for dual-processor units. Default value being 0. NumberOfCommonFileWriters: This is a user created special file writer for one or more specific replication pairs, Default value being 1. VolumeFileWriterId: User specified ID for a file writer. This is used if a dedicated writer with the specified ID is to be associated with a specific volume or group of volumes. FreeThresholdForFileWrite: File writer would start queuing data to disk when the amount of total space left is less than or equal to this value VolumeThresholdForFileWrite: File writer would start queuing data to disk when the amount of space used per volume is more than this value VolumeDataLogDirectory: This value is created under another key (guid). Specifies where the files have to be written. By default the files are written under /Application data/. As the guid changes for each replication so does the physical location. VolumeOutOfSyncTimestampInGMT: Specifies the volume out of sync time stamp in seconds (GMT) VolumeFileWriterThreadPriority: This has to be configured per replication pair. This value is common for all writers and specifies the thread priority for file writer threads. Individual writers for specific volume can be set to have different priority. Value can range from 0 to 19 (0 being the lowest and 19 being the highest). More than one replication pair can have the same thread priority VolumeDataToDiskLimitInMB: By default threads create 4 MB files (each containing writes). Collective space occupied by all these files can be configured through this. Default value is 512 MB. Although the agent service will continuously transfer them out of the source a limit is set so that free space is ensured on the source. This is configured per replication pair. VolumeDataFiles: Disabling this (changing to 0) will not create data files (4 MB files) on the disk, rather they are created in the memory and once the limit is reached it is switched into meta data mode.

Production Environments with Aggressive Data Writes You can choose to change the driver’s global registry settings under “\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\involflt\Pa rameters”. DataPoolSize: Memory allocated from paged pool that is used to store the change data coming to the driver. Default value: 64 MB for 32-bit and 256 MB for 64-bit platform. MaxNonPagedPoolInMB: This value is a portion of memory allocated from non paged pool. Default value: 12 MB for 32-bit and 32 MB for 64-bit platform. VolumeDataSizeLimit: This is the maximum limit that is used to determine the data pool size which can be used by any particular volume

10400242-101 07/2009 ©2009 Overland Storage, Inc. W A-5 REO BCA Administration Guide Performance Tuning

Default value: 32 MB for both 32- and 64-bit platforms.

Tuning the Target-Side Agent The following are the registry values that can be fine-tuned on the target side during differential sync to enhance performance. All the values are located under “HKEY_LOCAL_MACHINE\SOFTWARE\SV Systems\VxAgent”. These values can be edited manually through Windows registry editor (regedit.exe)

MaxFastSyncApplyThreads Functionality: This parameter is set on target to increase the number of threads used while performing initial and Resync on the target. More threads result in faster resync process. However increase this value only is the host has more than 4 CPUs. General guide line is to make the value equal to the number of CPUs. In case of single CPU machines the default is 4. Default value: 4

MaxRunsPerInvocation Functionality: Target side VX Agent makes few runs before it exits. In each run it • Acquires the file list from the CX server • Applies them to the target • Executes any ready snapshot requests The value here determines how many runs will be performed before the exit Type: Dword Default value: 10 Other values: 1 to any value (0 being infinite). If you set this value to zero, target site VX agent would run forever until there is a replication configuration change or svagent service shutdown. Larger value lets the agent complete its task but it runs for a longer time.

MaxMemoryUsagePerReplication Functionality: This is used to set a limit on memory that is used by a replication pair for storing differential files until they get applied to the target volume. Type: Dword Default value: 32 MB Min value: 2 times the maximum of either MaxInMemoryCompressedFileSize or MaxInMemoryUnCompressedFileSize

MaxInMemoryCompressedFileSize: Functionality: This determines the file size limit of a compressed file that should be downloaded to memory. If a compressed differential file size on CX is larger than this value, it will be downloaded to the application cache directory Type: Dword Default value: 4 MB

10400242-101 07/2009 ©2009 Overland Storage, Inc. W A-6 REO BCA Administration Guide Performance Tuning

Other values: If 0 (is also the min value) is set then all the compressed files from CX would be downloaded to application cache directory

MaxInMemoryUnCompressedFileSize Functionality: This determines the file size limit of an uncompressed file that should be downloaded to memory. If an uncompressed differential file size on CX is larger than this value, it will be downloaded to application cache directory. Functionality Type: Dword Default value: 8 MB Other values: If 0 (is also the min value) is set then all the uncompressed files from CX will be downloaded to application cache directory

CompressionChunkSize Functionality: All the differential files are uncompressed in chunks on the target. This registry value determines the uncompressed chunk size. Type: Dword Default value: 1 MB

CompressionBufSize Functionality: This registry value determines the size of buffer allocations for storing uncompressed output. We allocate memory in multiples of this registry value. In general this should be set to a value such that we do not have to do reallocate in most cases. Type: Dword Default value: 4 MB

SequenceCount and SequenceCountInMsecs Functionality: These two registry values are used in case of volume groups. It prevents any one volume in the volume group from getting too far ahead as well as prevent any one volume from monopolizing the cache. “SequenceCount” determines the no. of files that can be downloaded per volume without waiting for other volumes in the volume group. On reaching the “SequenceCount”, file download will be stopped and resumed only when download file count on all the volumes have reached the “SequenceCount”. “SequenceCountInMSecs” determines the amount of data in milliseconds granularity that can be downloaded per volume without waiting for others in the volume group. Type: Dword Default value for SequenceCount: 8 Default value for SequenceCountInMsecs: SequenceCountInMsecs = 60000 (60 seconds) The SequenceCount determines the delay between replication pairs in a volume group; larger number indicates greater distance between them.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W A-7 REO BCA Administration Guide Performance Tuning

FastSyncHashCompareDataSize Functionality: This value determines the amount of communication data sent from the source to the CX server, the value is set to 1024 KB. The same should be on the target side, else the resync will pause. Type: Dword Default value: 512 KB for older agents, 1024 for versions 3.5.2 and above

CacheDirectory Functionality: This is the intermediate directory for downloading differentials from CX to target before applying it to the target volume. Type: string. Default value: • Linux: /home/svsystems/var. • Windows: /Application Data. Recommended Value: Set this on a separate disk/partition other than system drive. This directory also needs to be excluded from virus scanners to prevent replication from slowing down. Use junctions/soft links to allow using separate cache directory per pair.

MaxDiskUsagePerReplication: Functionality: This determines the max disk space that can be consumed per replication pair by the cache directory. The cumulative disk space allocated for all the replication pairs should be less than the available space. Type: integer Units: bytes Default value: 512 MB Recommended value: Set this equal to (or greater than) peak data change so that all changes can be downloaded to the target server and minimize data loss in case of a disaster.

MaxMemoryUsagePerReplication: Functionality: This is used to set maximum memory that can be used by a replication pair for storing differential files until they are written to the cache directory. Once the memory utilization crosses this threshold, differentials will be downloaded directly to application cache directory till the memory usage for the pair again drops back. Type: integer Units: bytes Default value: 64 MB Recommended value: Increase this value to get better wan bandwidth utilization. Note, the combined memory usage for all the replication should be below the available physical memory leaving at least 1 gb memory for rest of processes. In case of Windows, the combined memory usage for all the replication pairs should be below 3 Gb.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W A-8 REO BCA Administration Guide Performance Tuning

Min value: Two times the maximum of either MaxInMemoryCompressedFileSize or MaxInMemoryUnCompressedFileSize.

NWThreadsPerReplication Functionality: This determines the no. of parallel downloads from CX server to the target per replication pair. Type: integer Units: none Default value: 2 Recommended value: Increase this if the network bandwidth utilization is low. See IOThreadsPerReplication before changing this parameter.

IOThreadsPerReplication Functionality: This determines the number of parallel writes from memory to the application cache per replication pair. Type: integer Units: none Default value: 2 Recommended value: Increase this if the changes are getting accumulated into memory and writes are becoming bottleneck.

MaxRunsPerInvocation Functionality: Target side VX Agent makes few runs before it exits. In each run it: • Gets file list from the cache directory • Applies them to the target • Executes any ready snapshot requests The value here determines how many runs will be performed per invocation. Type: integer Units: bytes Default value: 1 Range: 1 to any value (0 being infinite). If you set this value to zero, target site VX agent would run continuously until there is replication configuration change or svagent service is shutdown. Increasing this value reduces the process creation overheads and also allows for applying the changes from cache directory to target volume even if CX server is unavailable.

TcpSendWindowSize and TcpRecvWindowSize Functionality: The TCP Window is a buffer that determines how much data can be transferred before the server (REO BCA) waits for acknowledgement. Type: integer Units: bytes

10400242-101 07/2009 ©2009 Overland Storage, Inc. W A-9 REO BCA Administration Guide Performance Tuning

Default value: 1048576 Recommended value: needs to be large enough to fit the maximum_available_bandwidth x maximum_anticipaded_delay. Use http://www.speedguide.net/bdp.php to calculate the product and use the rounded value.

CMRetryDelayInSeconds Functionality: This determines the delay value between attempts by cache manager on encountering an error. Type: integer Units: seconds Default value: 30 Recommended value: 30 seconds

CMMaxRetries Functionality: This determines max. no of retries by cache manager on encountering an error while downloading a file before it exits. Type: integer Units: number Default value: 10 Recommended value: 10

CacheMgrExitTime Functionality: This determines max. Amount of time for which cache manager continuously run before exiting for next invocation. Type: integer Units: seconds Default value: 16200 Recommended value: none.

MaxInMemoryUnCompressedFileSize Functionality: This determines the max size of an uncompressed file that should be downloaded to memory. If an uncompressed differential file size on CX is larger than this value, it would be downloaded directly to application cache directory. Type: integer Units: bytes Default value: Linux: 16 MB, Windows: 8 MB Recommended value: Set this equal to (or greater than) average differential file size. Disable value: If 0 (is also the min value) is set then all the uncompressed files from CX would be downloaded to application cache directory

10400242-101 07/2009 ©2009 Overland Storage, Inc. W A-10 REO BCA Administration Guide Performance Tuning

MaxInMemoryCompressedFileSize Functionality: This determines the max size of a compressed file that should be downloaded to memory. If a compressed differential file size on CX is larger than this value, it would be downloaded directly to application cache directory. Type: integer Units: bytes Default value: Linux: 16 MB, Windows: 4 MB Recommended value: Set this equal to (or greater than) average differential file size. Disable value: If 0 is set then all the compressed files from CX would be downloaded to application cache directory

CompressionChunkSize Functionality: All the differential files are uncompressed in chunks on the target. This value determines the uncompress chunk size. Type: integer Units: bytes Default value: 1 MB Recommended value: 1 MB

CompressionBufSize Functionality: This determines the size of buffer allocations for storing uncompressed output. We allocate memory in multiples of this setting. In general this should be set to a value such that we do not have to do reallocations in most cases. Type: integer Units: bytes Default value: 4 MB Recommended value: Set this equal to (or greater than) average differential file size.

MinCacheFreeDiskSpace and MinCacheFreeDiskSpacePercent Functionality: These values control the amount of unused free disk space on the application cache volume for other applications sharing the volume. Minimum of either is used. Type: integer Units: bytes Default value: MinCacheFreeDiskSpace = 1 GB MinCacheFreeDiskSpacePercent = 25 Recommended value: if the cache volume is used only as intermediate storage for differentials, set this to a low value. (5% of cache volume size)

10400242-101 07/2009 ©2009 Overland Storage, Inc. W A-11 REO BCA Administration Guide Performance Tuning

Tuning TCP Window Sizes TCP Windows Tuning on Source/Target Servers, the defaults would suffice for servers with in a local LAN [Gig Network] Parameters: TcpSendWindowSize and TcpRecvWindowSize Location: Drscout.conf • Linux: /home/svsystems/var • Windows: /Application Data/etc Functionality: The TCP Window is a buffer that determines how much data can be transferred before the server (cx) waits for acknowledgement. Type: integer Units: bytes Default value: 1048576 It is observed that with 1 Gbs network link and 0.1ms latency 1048576 bytes results in better data transfer rates. Recommended value: needs to be large enough to fit the maximum_available_bandwidth x maximum_anticipaded_delay. Use: http://www.speedguide.net/bdp.php to calculate the product and use the rounded value.

Bandwidth Shaping

You can define the bandwidth shaping policies to regulate outgoing data traffic rates to the target. This helps in controlling the bandwidth usage by REO BCA. Bandwidth Shaping is applicable to Volume Replication only. You can specify the following information for bandwidth policy: • Policy name, description, bandwidth shaping information, cumulative bandwidth, and bandwidth shaping schedule. • Percentage bandwidth allocation between CX and Target machines called Bandwidth Shaping pairs. • Sharing of unused bandwidth between two bandwidth shaping pairs.

NOTE: You can configure the bandwidth policies only after setting up the VX replication process.

Preparing for bandwidth shaping Access the CX configuration server’s command prompt to verify if TCP segmentation off‐load is enabled by running the “ethtool ‐k eth0” command. A sample command is shown as below

10400242-101 07/2009 ©2009 Overland Storage, Inc. W A-12 REO BCA Administration Guide Performance Tuning

[root@imits198 tmp]# ethtool -k eth0 off-load parameters for eth0: Cannot get device udp large send off-load settings: Operation not supported rx-checksumming: on tx-checksumming: on scatter-gather: on tcp segmentation off-load: on udp fragmentation off-load: off generic segmentation off-load: off [root@imits198 tmp]#

Observe that the TCP segmentation off-load is set to on. Proceed to disable it through the command “ethtool -K eth0 tso off” You can verify it again through the “ethtool -k eth0” command. Always ensure that the “TCP segmentation offload” is set to off for the bandwidth shaping to function

Bandwidth Shaping Pairs The fine-grained cumulative bandwidth shaping (provisioning) is based on Bandwidth Shaping pairs. A bandwidth shaping pair is a unique combination of CX and participating Target host in the volume replication. 1. On the System menu click the Bandwidth Shaping link. The Configure Bandwidth Utilization window appears.

NOTE: The IP Address displays the CX server IP address and Traffic Control displays the CX server and Target server’s IP Address pairs.

Figure A-6: Enabling the Global Bandwidth Shaping Option 2. Select the “Enabled” checkbox to enable bandwidth shaping policies. 3. Click “Configure” to create, modify and view bandwidth policies.

Creating a Default Bandwidth Policy 1. In the Configure Bandwidth Utilization window, click Configure. The Existing Policies window appears.

Figure A-7: Creating New Bandwidth Policy 2. Click Create Policy. The Bandwidth Policy window appears.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W A-13 REO BCA Administration Guide Performance Tuning

3. Select the Default Policy checkbox and enter a name for the default policy. You can have only one default policy. 4. Type the description for the default policy. 5. Enter the cumulative bandwidth value in kilobits per second (kbps). 6. Select the appropriate Include checkbox to specify the destination target. 7. Enter the Allocation % values for the corresponding targets selected.

NOTE: Select the Share Unused Bandwidth checkbox if you want to share the unused bandwidth between the two bandwidth shaping pairs.

8. Click Save. A Policy Confirmation window appears. 9. Click Next. The default policy is now displayed under the Existing Policies window.

Figure A-8: Viewing Create Bandwidth Policy You can perform the following actions: • Click “View” and then click “Action”, to view the active policy details. • Click “Edit” and then click “Action”, to edit the active policy configuration. • Click “Delete” and then click “Action”, to delete the active policy.

Creating Scheduled Policies 1. In the “Existing Policies” window, click “Create Policy”. The “Bandwidth Policy” window appears.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W A-14 REO BCA Administration Guide Performance Tuning

Figure A-9: Bandwidth Policy Creation Screen 2. Enter the policy name, description, and cumulative bandwidth. 3. Select the appropriate “Include” checkbox to specify the destination target. 4. Enter the “Allocation %” values for the corresponding targets selected

NOTE: Select the “Share Unused Bandwidth” checkbox if you want to share the unused bandwidth between the two bandwidth shaping pairs.

5. Enter the time duration for the start and end of the policy. 6. Select one of the following option buttons to specify the type of policy: • Daily: Select the appropriate option button to specify if you want to start the policy every day or for a specified number of days. Weekly: Enter the number of weeks for which you want the policy to recur. You can also select the specific days on which you want to run the policy. • Monthly: Select the appropriate option button to specify if you want to start the policy on a particular day of every month. • Yearly: Select the appropriate option button to specify if you want to start the policy on a particular day of a month for that year.

NOTE: If a month does not have a given day then there will be no affect even if it is used (i.e., if you select the 30th, there will be no affect for the month of February).

7. Click “Save”. A “Policy Confirmation” window appears.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W A-15 REO BCA Administration Guide Performance Tuning

8. Click “Next”. The new policy is now displayed under the “Existing Policies” window.

Policy Conflicts Policy conflicts occur, when two or more policies are eligible for policy enforcement at the same time. To resolve these conflicts, REO BCA assigns priorities by default, which is based on the associated scheduling option. You can also prioritize the policies manually, based on your requirements. For better illustrations, consider the following policies as examples • Policy 1: Daily Policy - Every 1 day From: 06:00 AM to 11:50 P.M. • Policy 2: Weekly Policy – Every 1 Week on Every Monday, Tuesday From: 09:00 AM to 6:50 P.M. • Policy 3: Monthly Policy – Every 1 Month on October 24th From: 10:00 AM to 3:00 P.M. Consider current data & time to be: October 24th, Tuesday, 1:00 P.M. – All the policies will be applicable for enforcement as they meet the policy scheduling criteria. Bandwidth shaping modules detect these conflicts when policies are created or edited, in case of such conflicts, the policy with the highest priority is enforced, and in the above case it would policy-3. For more details on priorities refer to the subsequent section. The order of priority enforced by REO BCA is:

Table A-1: Bandwidth Policy and Priority

Policy Type Priority Default Policy 0 Daily-Periodic Ex. Every [1] day/s 1 Daily-Specific Ex. Every Day 2 Weekly 3 Monthly-Periodic Ex. Day 1 of every 2 months 4 Monthly-Specific Ex. The first day of every 2 months 5

Yearly-Periodic Ex. Every January 21 6 Yearly-Specific Ex. The last Wednesday of September 7

The conflicts in the policy are detected when they are created or edited. In case of such conflicts, the policy with the highest priority is enforced. Notes: • The default policy is applied only if the bandwidth shaping option is enabled and no other bandwidth policies can be enforced. • You can define only one default policy • The default policy does not have any schedule attached to it.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W A-16 REO BCA Administration Guide Performance Tuning

Prioritizing Policies 1. The Policy Confirmation window displays conflicting policies and allows you to change the order of priority. 2. Select the appropriate policy and prioritize it by moving it up or down in the Prioritize Policies field.

NOTE: The default policy is applied only if bandwidth shaping option is enabled and no other bandwidth policies can be enforced. You can define only one default policy and the default policy does not have any schedule attached to it.

Figure A-10: Prioritizing Bandwidth Policies 3. Click “Save” to finish. Click “Back” to review or change the policy details. 4. Click “Ignore” to apply the default priority order.

How are Policies Enforced? • The basic rule is the policy with highest assigned priority will be selected. • If there are multiple policies with the same priority, then the policy creation time will be used to resolve the policy. • In case, there are no-policies enforceable and default policy is configured, then default policy will be enforced automatically

Effect of Stopping VX Replication Pairs on the Bandwidth Policies Whenever the VX Replication is stopped, the bandwidth policies get readjusted. Consider the following illustrations:

Condition: If all the VX replication pairs are stopped Effect: all bandwidth policies get deleted.

Condition: If there are multiple VX replication pairs (with same target host), one replication pair is stopped Effect: no change in the bandwidth policies.

Condition: If there are multiple VX replication pairs (each with a different target host), one of the replication pair is stopped Effect: the bandwidth allocated to the stopped pair is allocated proportionately to the remaining pairs.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W A-17 REO BCA Administration Guide Performance Tuning

Advanced Configuration Bandwidth shaping feature, by default should require additional configuration apart from creating bandwidth policies. Advanced hardware related configurations can be done using “amethyst.conf” file located in “/home/svsystems/etc”. Some of the possible hardware related configurations are • Configuring to change or use a particular network device on CX server, by default the device “eth0” is specified. BPM_NTW_DEVICE = "eth0" BPM_LNK_SPEED = "100Mbit" • Shaping all outgoing traffic between CX and Outpost. BPM_SRC_PORTS = "" BPM_DEST_PORTS = "" Notes: • By default, all outgoing traffic originating from the ports 20, 21,873,989,990 are throttled. • Do not try to change other BPM related parameters, this would lead to non-functioning of the bandwidth shaping feature.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W A-18 Glossary and Acronym List

NOTE: This is a general Overland Storage glossary and acronym list. Not all items may be found in this document or be used by this product.

1000BASE-T 1000BASE-T (also known as IEEE 802.3ab) is a standard for gigabit Ethernet over copper wiring. It requires, at a minimum, Category 5 cable (the same as 100BASE-TX), but Category 5e ("Category 5 enhanced") and Category 6 cable may also be used and are often recommended. 1000BASE-T requires all four pairs to be present and is far less tolerant of poorly installed wiring than 100BASE-TX.

Address An address is a data structure or logical convention used to identify a unique entity, such as a particular process or network device.

Array A group of disk drives that are combined together to create a single large storage area. Up to 64 arrays are supported, each containing up to 16 drives per array. There is no capacity limit for the arrays.

Auto Balance A feature that automatically balances preferred paths evenly among all available host ports and controller ports. Auto balancing spreads I/O load by utilizing as many host ports and controller ports as possible.

Back-end Front-end and back-end are terms used to characterize program interfaces and services relative to the initial user, human or program, of these interfaces and services. A "front- end" application is one that application users interact with directly. A "back-end" application or program serves indirectly in support of the front-end services, usually by being closer to the required resource or having the capability to communicate with the required resource. The back-end application may interact directly with the front-end or, perhaps more typically, is a program called from an intermediate program that mediates front-end and back-end activities.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W GL-1 REO BCA Administration Guide Glossary and Acronym List

Back-off Percent In order to allow drives from a different family or manufacturer to be used as a replacement for a drive in an array, it is recommended that a small percentage of the drive’s capacity be reserved when creating the array. This is user selectable, from 0 to 10 percent. This is sometimes known as Reserved Capacity.

Bar Code The machine-readable representation of a product code. Bar codes are read by a scanner that passes over the code and registers the product code. The width of black lines and white spaces between varies. Combinations of lines and spaces represent characters. Overland uses 3-of-9 code (Code 39) where each character is represented by 9 bars, 3 of which are wide.

BCA Short for Business Continuity Appliance. The appliance performs those activities that are necessary to maintain service, consistency, and recoverability.

Bridging Devices that connect and pass packets between two network segments that use different communications protocol.

Bus or Channel A common physical path composed of wires or other media, across which signals are sent from one part of a computer to another. A channel is a means of transferring data between modules and adapters, or between an adapter and SCSI devices. A channel topology network consists of a single cable trunk that connects one workstation to the next in a daisy-chain configuration. All nodes share the same medium, and only one node can broadcast messages at a time.

Cache Flush Array This is the array that is used to automatically flush cache data in a situation where power has failed to some of the drives.

Cat 5 Cable Short for Category 5, it is network cabling that consists of four twisted pairs of copper wire terminated by 8P8C modular connectors. CAT 5 cabling supports frequencies up to 100 MHz and speeds up to 100 Mbps. (CAT 5e cabling supports frequencies up to 1000 MHz and speeds up to 1000 Mbps.) It can be used for ATM, token ring, 1000BASE-T, 100BASE-T, and 10BASE-T networking. Cat 5 is based on the EIA/TIA 568 Commercial Building Telecommunications Wiring Standard developed by the Electronics Industries Association as requested by the Computer Communications Industry Association in 1985.

Cat 6 Cable Short for Category 6, it is network cabling that consists of four twisted pairs of copper wire terminated by 8P8C modular connectors made to higher standards that help reduce noise caused by crosstalk and system noise. The ANSI/TIA-568-B.2-1 specification states the cable may be made with 22 to 24 AWG gauge wire, so long as the cable meets the specified testing standards.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W GL-2 REO BCA Administration Guide Glossary and Acronym List

It is designed for Gigabit Ethernet that is backward compatible with the Category 5/5e and Category 3 cable standards. Cat 6 features more stringent specifications for crosstalk and system noise. The cable standard provides performance of up to 250 MHz and is suitable for 10BASE-T / 100BASE-TX and 1000BASE-T (Gigabit Ethernet).

CDP Short for Continuous Data Protection. Continuous Data Protection refers to the backup of computer data by automatically saving a copy of every change made to that data, essentially capturing every version of the data that the user saves. It allows the user or administrator to restore data to any point in time. The service captures the changes to data to a separate storage location.

Chunk Size This is the amount of data that is written on a single drive before the controller moves to the next drive in the stripe.

CX A term used to describe the server component of the BCA product. Analogous to the BCA Server.

DSM Short for Device Specific Module, it is a software module that allows the ULTAMUS RAID storage array hardware to use Microsoft's MPIO.

Expansion Slot Area in a computer that accepts additional input/output boards to increase the capability of the computer.

F_port A Fabric port within a Fibre Channel switch that provides a point-to-point link attachment to a single N_Port. F_Ports are intermediate ports in virtual point-to-point links between end ports, for example N_Port to F_Port to F_Port to N_Port using a single Fibre Channel fabric switch.

Failback Failback occurs when a path with a higher priority than the currently active path is restored. In this case, I/O will “fail back” to the higher priority path once it is available again.

Failover The ability to automatically substitute a working system or path for one which has failed.

Failover/Failback A combination of Failover and Failback. When a preferred path becomes unavailable, another path is used to route I/O until the preferred path is restored. In this case I/O will "fail back" to the preferred path once it is available again.

FC-AL Short for Fibre Channel Arbitrated Loop. An FC-AL is a Fibre Channel network in which up to 126 systems and devices are connected in a loop topology, with each transmitter connecting to the receiver of the device on its logical right. The Fibre Channel Arbitrated

10400242-101 07/2009 ©2009 Overland Storage, Inc. W GL-3 REO BCA Administration Guide Glossary and Acronym List

Loop protocol used for transmission is different from Fibre Channel switched and point-to- point protocols. Multiple FC-AL loops can be connected via a fabric switch to extend the network.

Fibre Channel Fibre Channel (FC) is a gigabit-speed network technology which transports SCSI commands over Fibre Channel networks. Fibre Channel was primarily concerned with simplifying the connections and increasing distances, but later designers added the goals of connecting SCSI disk storage, providing higher speeds and far greater numbers of connected devices.

Firmware Software stored in read-only memory (ROM) or programmable ROM (PROM). Firmware is often responsible for the behavior of a system when it is first switched on.

FL_port A Fabric Loop port within a Fibre Channel switch that is capable of Fibre Channel Arbitrated Loop operations and is connected to one or more NL_Ports via a Fibre Channel Arbitrated Loop. An FL_Port becomes a shared entry point for public NL_Port devices to a Fibre Channel fabric. FL_Ports are intermediate ports in virtual point-to-point links between end ports that do not reside on the same loop, for example NL_Port to FL_Port to F_Port to N_Port through a single Fibre Channel fabric switch.

Front-end See Back-end.

FX A term used to describe the BCA Agent used for file-level replication.

Gigabit Ethernet Also known as GigE or GbE, this Ethernet standard uses a one Gigahertz (1000 Hz) clock rate to move data.

HBA Short for Host Bus Adapter. An HBA is an I/O adapter that sits between the host computer's bus and the Fibre Channel loop and manages the transfer of information between the two channels. In order to minimize the impact on host processor performance, the HBA performs many low-level interface functions automatically or with minimal processor involvement.

Hot Swap The action of components being removed and replaced while the unit is running, with power to either the component or a device still connected to the unit. Not all components are hot swappable. Please read installation and maintenance instructions carefully.

Internet A global network of networks used to exchange information using the TCP/IP protocol. It allows for electronic mail and the accessing ad retrieval of information from remote sources.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W GL-4 REO BCA Administration Guide Glossary and Acronym List

Initialization RAID 5, 6, and 50 disk arrays must have consistent parity before they can be used to protect data. Initialization writes a known pattern to all drives in the array. If you choose not to initialize an array, the array will be trusted. Any drive failure results in data corruption in a trusted array. (It is possible to later perform a parity rewrite that recalculates the parity based on the current data, thus ensuring the data and parity are consistent.)

Initiator Device A system component that originates an I/O command over an I/O bus or network. An initiator issues the commands; a target receives them.

Internal Logical Drive An internal logical drive is identical to a regular logical drive, except it is NOT made visible to a host adapter as a LUN. Instead, internal logical drives are used for setting up snapshot ODAs that are only accessed internally by the RAID controller.

IP Short for Internet Protocol. IP specifies the format of packets and the addressing scheme. iSCSI Short for Internet SCSI. iSCSI is an IP-based storage networking standard for linking data storage facilities, developed by the Internet Engineering Task Force (IETF). By carrying SCSI commands over IP networks, iSCSI is used to facilitate data transfers over intranets and to manage storage over long distances. The iSCSI protocol is among the key technologies expected to help bring about rapid development of the storage area network (SAN) market, by increasing the capabilities and performance of storage data transmission. Because of the ubiquity of IP networks, iSCSI can be used to transmit data over local area networks (LANs), wide area networks (WANs), or the Internet and can enable location-independent data storage and retrieval. iSNS Server Short for Internet Storage Name Service Server. This is a server on an iSCSI SAN providing name registration service and query capability to other iSCSI clients per the IETF draft iSNS specification.

LAN Short for Local Area Network. A network connecting computers in a relatively small area such as a building.

LED Short for Light-Emitting Diode. An LED is a type of diode that emits light when current passes through it. Visible LEDs are used as indicator lights on electronic devices.

Logical Drive A drive that is defined or created from regions of an array, a whole array, or a combination of regions of different arrays. The logical drive appears as a single disk to one or more host systems.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W GL-5 REO BCA Administration Guide Glossary and Acronym List

Logical Drive Availability To accommodate hosts with multiple ports and multiple host systems, it is possible to restrict a logical drive’s availability to a particular HBA or controller port. Access can be enabled or disabled for each host port of each controller.

LUN Short for Logical Unit Number. A SCSI or Fibre Channel device identifier. LUN is a subdivision of a SCSI target.

MAC Address Short for Media Access Control address, a hardware address that uniquely identifies each node of a network.

Mapped LUN Number Each logical drive is presented to the host system with a unique LUN. In certain cases (such as after deleting another logical drive) it may be desirable to change the number that a logical drive is presented as. This can be done at any time, bearing in mind that any attached host systems may need to be rebooted or reconfigured to maintain access to the logical drive.

Mapping table A table indexed by sequential LUN values, indicating the selected BUS:TARGET:LUN devices. Mapping tables are used by routers and bridges like the GEOi to perform Ethernet-to-SCSI pathing.

MD5 Algorithm MD5 is a way to verify data integrity, and is much more reliable than checksum and many other commonly used methods.

MPIO Short for Multipath Input/Output. A multipath solution built into Microsoft server-grade operating systems. It requires the DSM to work with the ULTAMUS RAID storage array hardware.

MTU Short for Maximum Transfer Unit. It is the largest size packet or frame, specified in octets (eight-bit bytes), that can be sent in a packet- or frame-based network.

N_port A Node port connects via a point-to-point link to either a single N_Port or a single F_Port. N_Ports handle creation, detection, and flow of message units to and from the connected systems. N_Ports are end ports in virtual point-to-point links through a fabric, for example N_Port to F_Port to F_Port to N_Port using a single Fibre Channel fabric switch.

Network Interface Card (NIC) A board that provides network communication capabilities to and from a computer.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W GL-6 REO BCA Administration Guide Glossary and Acronym List

NDMP Short for Network Data Management Protocol. A protocol standard used by some Network Attached Storage systems to provide an industry standard means to do backup and restores of the NAS system without the need for 3rd party agents to be installed on the NAS device. Also see NDMP.org for further details.

NL_port A Node Loop port is capable of arbitrated loop functions and protocols. An NL_Port connects via an arbitrated loop to other NL_Port and at most a single FL_Port. NL_Ports handle creation, detection, and flow of message units to and from the connected systems. NL_Ports are end ports in virtual point-to-point links through a fabric, for example NL_Port to F_Port to F_Port to N_Port using a single Fibre Channel fabric switch. In the absence of a fabric switch FL_Port, NL_Ports can communicate with other NL_Ports in virtual point-to-point links through a FC-AL open loop circuit often through FC-AL (Arbitrated Loop) hub or loop switch devices.

Node Name This is an eight-byte, 16-character hexadecimal number, uniquely identifying a single fibre device. It incorporates the World Wide Name and two additional bytes that are used to specify the format. In a host system with multiple FC ports, all adapters typically use the same Node Name, but unique Port Names.

NVRAM Abbreviation of Non-Volatile Random Access Memory, a type of memory that retains its contents when power is turned off.

ODA The Overwrite Data Area is an internal storage area on an array that is dedicated to storing data from a snapshot logical drive. The data stored on the ODA is the data from the logical drive that needed to be overwritten after a snapshot was initiated. The ODAs are mapped on top of internal logical drives. An ODA cannot be accessed externally through a host LUN; it is only accessed internally.

ODA Stripe Size The read/write block size that the system will use when copying data from the original logical drive to the ODA.

Port Name This is an eight-byte hexadecimal number, uniquely identifying a single host HBA port. It incorporates the World Wide Name and two additional bytes that are used to specify the format and indicate the port number.

Preferred Path The preferred path is the default path. When the path selection policy is set to Failover/Failback, the preferred path is always used if it is available. If the preferred path fails, I/O switches to another path. If it is later restored, I/O switches back to the preferred path.

PTP Short for Point-to-Point. PTP is the common mode of attachment to a single host. PTP is sometimes used to attach to a Fibre Channel switch for SAN connectivity.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W GL-7 REO BCA Administration Guide Glossary and Acronym List

RAID Level 0 RAID 0 is defined as disk striping where data is striped or spread across one or more drives in parallel. RAID 0 is ideal for environments in which performance (read and write) is more important than fault tolerance, or you need the maximum amount of available drive capacity in one volume. Drive parallelism increases throughput because all disks in the stripe set work together on every I/O operation. For greatest efficiency, all drives in the stripe set must be the same capacity. Because all drives are used in every operation, RAID 0 allows for single-threaded I/O only (i.e., one I/O operation at a time). Environments with many small simultaneous transactions (e.g., order entry systems) do not get the best possible throughput.

RAID Level 1 RAID 1 is defined as disk mirroring where one drive is an exact copy of the other. RAID 1 is useful for building a fault-tolerant system or data volume, providing excellent availability without sacrificing performance. However, you lose 50 percent of the assigned disk capacity. Read performance is somewhat higher than write performance.

RAID Level 5 RAID 5 is defined as disk striping with parity where the parity data is distributed across all drives in the volume. Normal data and parity data are written to drives in the stripe set in a round-robin algorithm. RAID 5 is multi-threaded for both reads and writes because both normal data and parity data are distributed round-robin. This is one reason why RAID 5 offers better overall performance in server applications. Random I/O benefits more from RAID 5 than does sequential I/O, and writes take a performance hit because of the parity calculations. RAID 5 is ideal for database applications.

RAID Level 6 RAID-6 is the same as RAID-5 except that it uses a second level of independently calculated and distributed parity information for additional fault tolerance. This extra fault tolerance provides data security in the event two drives fail before a drive can be replaced.RAID-6 provides greater fault tolerance than RAID-5. There is a loss in write performance with RAID-6 when compared to RAID-5 due to the requirement for storing parity twice for each write operation. A RAID-6 configuration also requires N+2 drives to accommodate the additional parity data, which makes RAID- require more raw capacity than RAID-5 for an equivalent usable storage capacity.

RAID Level 10 RAID 10 is defined as mirrored stripe sets or also known as RAID 0+1. You can build RAID 10 either directly through the RAID controller (depending on the controller) or by combining software mirroring and controller striping, or vice versa (called RAID 01).

RAID Level 50 This RAID level is a combination of RAID level 5 and RAID level 0. Individual smaller RAID 5 arrays are striped to give a single RAID 50 array. This can increase the performance by allowing the controller to more efficiently cluster commands together. Fault tolerance is also increased, as one drive can fail in each individual array.

RETMA Short for Radio-Electronics-Television Manufacturers' Association. It is the common name given for a 19-inch distribution frame rack for mounting components.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W GL-8 REO BCA Administration Guide Glossary and Acronym List

Round Robin The Round Robin path selection policy causes all healthy paths to be used for I/O. Paths are used in a round-robin order.

Router A router is a device that enables connectivity between Ethernet network segments.

RPO Short for Recovery Point Objective. Recovery Point Objective is the point in time to which you must recover data as defined by your organization. This is generally a definition of what an organization determines is an "acceptable loss" in a disaster situation.

RTO Short for Recovery Time Objective. Recovery Time Objective is the duration of time and a service level within which a business process must be restored after a disaster (or disruption) in order to avoid unacceptable consequences associated with a break in business continuity.

SAN Short for Storage Area Network. A shared storage architecture connecting computers and storage devices for online data access. Each connected system can directly access any attached storage device. Usually refers to the network behind servers that links one or more servers to one or more storage systems.

SAS Short for Serial Attached SCSI. It is a point-to-point serial protocol that replaces parallel SCSI bus technology (multidrop) and uses the standard SCSI command set. It has no termination issues, supports up to 16,384 devices (using expanders), and eliminates clock skew. It consists of an Initiator that originates device service requests, a Target containing logical units that receives device service requests, and a Service Delivery Subsystem that transmits information between the Initiator and the Target.

SCSI Short for Small Computer System Interface. SCSI is an industry standard for connecting peripheral devices and their controllers to an initiator. Storage devices are daisy-chained together and connected to a host adapter. The host adapter provides a shared bus that attached peripherals use to pass data to and from the host system. Examples of devices attached to the adapter include disk drives, CD-ROM discs, optical disks, and tape drives. In theory, any SCSI device can be plugged into any SCSI controller.

SCSI addressing Each device supported by a SCSI adapter has its own unique SCSI address, which dictates the device’s priority when arbitrating for access to the SCSI bus. A SCSI address of 7 has the highest priority. For a fast/wide SCSI adapter that supports up to 16 devices, the next highest priority address is 6, then 5, 4, 3, 2, 1, 0, 15, 14, 13, 12, 11, 10, 9, and 8. The narrow SCSI adapter supports up to eight devices, including itself. The SCSI address 7 has the highest priority, followed by 6, 5, 4, 3, 2, 1, and 0.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W GL-9 REO BCA Administration Guide Glossary and Acronym List

SCSI bus A SCSI bus provides a means of transferring data between SCSI devices. A SCSI bus is either an 8- or 16-bit bus that supports up to 8 or 16 devices, including itself. The bus can consist of any of initiators and targets, with the requirement that at least one initiator and one target must be present.

SCSI device A SCSI device is a single unit on a SCSI bus that originates or services SCSI commands. A SCSI device is identified by a unique SCSI address. SCSI devices can act as initiators or targets.

SCSI port A SCSI port is an opening at the back of a router that provides connection between the SCSI adapter and SCSI bus.

Snapback The process of restoring a logical drive from a selected snapshot. This process takes place internally in the RAID controller firmware and needs no support from any backup utility.

Snapshot A method for producing a point-in-time image of a logical drive. In the process of initiating a snapshot, no data is actually copied from the snapshotted logical drive. However as new writes are made to a snapshotted logical drive, existing data blocks are copied to the ODA before the new data is written to the logical drive.

Snapshot LUN A special LUN created from a combination of the snapshot logical drives’ data and the data contained in the ODA.

Snapshot Number Identifier that references one of several snapshots of the same logical drive.

Snapshotted LD A logical drive that has one or more snapshots initiated on it.

Storage Area Network See SAN.

Stripe The process of separating data for storage on more than one disk. For example, bit striping stores bits 0 and 4 of all bytes on disk 1, bits 1 and 5 on disk 2, etc.

Stripe Size This is the number of data drives multiplied by the chunk size.

Sub-array In RAID 50 applications, this is the name given to the individual RAID 5 arrays that are striped together. Each sub-array has one parity drive.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W GL-10 REO BCA Administration Guide Glossary and Acronym List

Target A target is a device (peripheral) that responds to an operation requested by an initiator (host system). Although peripherals are generally targets, a peripheral may be required to act temporarily as an initiator for some commands (for example, SCSI COPY command).

Telnet A terminal emulation program for TCP/IP networks such as the Internet. The Telnet program runs on a computer and connects it to a server on the network. You enter commands through the Telnet program and they will be executed as if you were entering them directly on the server console. This enables you to control the server and communicate with other servers on the network. To start a Telnet session, you must log in to a server by entering a valid user name and password. Telnet is a common way to remotely control Web servers.

Terminator A terminator refers to the electrical connection at each end of a SCSI bus. The terminator is composed of a set of resisters, or possibly other components. The function of a terminator is to provide a pull-up for open collector drivers on the bus, and also impedance matching to prevent signal reflections at the ends of the cable. SCSI buses require that a terminator be placed on the SCSI connector on the last SCSI peripheral. Data errors may occur in a SCSI bus that is not terminated.

TOE (TCP Offload Engine) Short for TCP Offload Engine. TOE is a technology used in network interface cards to offload processing of the entire TCP/IP stack to the network controller. It is primarily used with high-speed network interfaces, such as gigabit Ethernet and 10 gigabit Ethernet, where processing overhead of the network stack becomes significant.

Topology Logical layout of the parts of a computer system or network and their interconnections. There are two types of topology: physical and logical. The physical topology of a network refers to the configuration of cables, computers, and other peripherals. Logical topology is the method used to pass the information between workstations.

Unassigned Free Space The controller keeps a map of all the space that is not assigned to any logical drive. This space is available for creation or expansion. Each unassigned region is individually listed.

USB (Universal Serial Bus) Port A hardware interface for low-speed peripherals such as the keyboard, mouse, joystick, scanner, printer, and telephony devices.

VACP The utility used by the BCA agent to generate checkpoints for recovery.

Virtual LUN See Snapshot LUN.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W GL-11 REO BCA Administration Guide Glossary and Acronym List

VLAN Short for Virtual LAN. It consists of a network of computers that behave as if they are connected to the same wire - even though they may actually be physically connected to different segments of a LAN.

Volume Replication Copying data from the source volume to the destination volume.

VX A term used to describe the BCA Agent used for volume-level replication.

Write-Back Cache A caching method in which modifications to data in the cache aren't copied to the cache source until absolutely necessary. Write-back caching yields somewhat better performance than write-through caching because it reduces the number of write operations to main memory. With this performance improvement comes a slight risk that data may be lost if the system crashes.

10400242-101 07/2009 ©2009 Overland Storage, Inc. W GL-12 Index

Symbols electrostatic discharge information ...... PR-iv e-mail alerts ...... 7-6 > (Flow Indicator) ...... PR-iii F A file replication...... 1-8 agent heartbeat ...... 6-12 Force Delete ...... 3-33 agents ...... 7-8 FX agent ...... 1-7, 4-1 communication ...... 1-6, 1-8 FX agents...... 1-2 FX...... 1-2, 1-7 VX...... 1-2, 1-4 FX error codes ...... 4-26 alerts ...... 7-3 FX job options...... 4-15 analyzer...... 9-1 FX replication ...... 4-2 FX scheduler...... 1-8 FX trending...... 6-9 C cache manager...... 1-6 G Catch All Job Modifier...... 4-14 CDP Retention...... 1-9 GUI ...... 2-1 CDP technology ...... 1-1 cluster environment ...... 3-2 I Configuration server ...... 1-1 interface for CX ...... 2-1 consistency tags...... 1-6 Internal Logical Drive ...... A-5 Conventions...... PR-iii conventions...... PR-iii customer support ...... PR-iv J CX Dashboard...... 2-1 job group ...... 4-22 CX server ...... 1-1, 1-2 L D license management...... 10-2 data consistency ...... 5-1 Linux replication...... 3-15 dataprotection.exe ...... 1-6 logs ...... 8-1 default FX templates...... 4-3 deployment ...... 1-1 Direct Copy...... 3-10 N driver ...... 1-5 Node Name...... A-7

E O edit a replication ...... 3-26 ODA ...... A-7

10400242-101 07/2009 ©2009 Overland Storage, Inc. W IX-1 REO BCA Administration Guide Index

Overland Technical Support ...... PR-iv T overview ...... 1-1 target volume rollback...... 5-20 Overwrite Data Area...... A-7 technical support contacting ...... PR-iv P throttling ...... 6-6 Pair Status ...... 6-7 traps...... 7-1 pause a replication...... 3-32 trending...... 9-1 Port Name...... A-7 typographic conventions ...... PR-iii Postscript ...... 1-8 Prescript...... 1-8 V Process server ...... 1-2, 1-3 VACP consistency tags ...... 1-6 process servers...... 3-8 virtual snapshot...... 5-5 profiling...... 3-3 volume protection ...... 3-1 Protection Status VX agent ...... 1-4 overview ...... 6-1 Volume ...... 6-2 VX agents ...... 1-2 PS ...... 1-2, 1-3 VX replication pairs ...... 3-1

R W Windows VX agent ...... 3-6 RAID Level 0...... A-8 RAID Level 1...... A-8 RAID Level 10 ...... A-8 RAID Level 5...... A-8 RAID Level 50 ...... A-8 RAID Level 6...... A-8 recovery operations...... 5-2 recovery pair status...... 5-19 recovery snapshots ...... 5-4 REO BCA overview ...... 1-1 replicating the source volume ...... 3-6 Reserved Capacity ...... A-2 retention logs ...... 8-5 retention option policies ...... 3-13 retention window ...... 1-10

S S2.exe...... 1-6 scheduled snapshots...... 5-11 Snapback...... A-10 Snapshot ...... A-10 Snapshot LUN ...... A-10 source volume resize ...... 6-4 stop the replication...... 3-31 Storage Area Stripe Size ...... A-7 Stripe ...... A-10 svagents ...... 1-4

10400242-101 07/2009 ©2009 Overland Storage, Inc. W IX-2