• Tidak ada hasil yang ditemukan

SnapProtect Open Systems Cookbook for Microsoft Windows and Lunix File Systems v2

N/A
N/A
Protected

Academic year: 2017

Membagikan "SnapProtect Open Systems Cookbook for Microsoft Windows and Lunix File Systems v2"

Copied!
104
0
0

Teks penuh

(1)

2 SnapProtect POC Cookbook NetApp Confidential – Limited Use

SnapProtect v10 SP4 Open Systems Cookbook for

Microsoft Windows and Linux File Systems

Authors

(2)

Table of Contents

1 ABSTRACT ... 4

2 PRODUCT RESOURCES ... 4

3 SYSTEM REQUIREMENTS ... 4

INTEROPERABILITY MATRIX TOOL ... 4

COMMSERVE ... 4

MEDIAAGENT ... 4

ONCOMMAND Unified Manager (Version 5.2) ... 4

ARRAY LICENSES ... 4

4 SNAPPROTECT OPEN SYSTEMS ... 6

5 PREREQUISITES ... 7

SNAPPROTECT SOFTWARE ... 7

LICENSES ... 7

ARRAY SOFTWARE ... 7

SETUP ... 7

6 ONCOMMAND UNIFIED MANAGER 5.2 ... 8

INSTALL OCUM ... 8

INSTALL NETAPP MANAGEMENT CONSOLE... 14

CONFIGURE ONCOMMAND UNIFIED MANAGER ... 13

CONFIGURE RESOURCE POOLS ... 22

7 SNAPPROTECT INSTALLATION ... 28

INSTALL SNAPPROTECT ... 28

8 SNAPPROTECT CONFIGURATION ... 44

INITIAL CONFIGURATION ... 44

ADD THE NETAPP 7-MODE CONTROLLERS INTO THE ARRAY MANAGEMENT ... 45

9 CONFIGURE THE WINDOWS CLIENT ... 48

PERFORM A WINDOWS BACKUP ... 71

PERFORM A WINDOWS RESTORE ... 73

10 CONFIGURE THE LINUX CLIENT ... 77

PERFORM A LINUX BACKUP ... 92

(3)

NetApp Confidential – Limited Use

1 ABSTRACT

SnapProtect for Open Systems is a block level incremental replication capability. It replicates data from UNIX and Windows clients with source volumes carved out of disks that are locally attached to these clients from non-Netapp hardware arrays. This data is replicated to a Data ONTAP 7-Mode SnapVault destination as a single partition. It uses OnCommand Unified Manager to provision the destination volumes to which data is replicated. Data is replicated as GPT LUN on Windows. On Unix, LUN has the same format as the source volume LUN.

SnapProtect for Open Systems (SPOS) adds support for granular recovery from Data ONTAP 7-Mode SnapVault targets with application-consistent backups, file catalog, granular recovery and path-to-tape for select operating systems and applications.

Supported (non-clustered) operating systems and applications:  Windows, Linux and Solaris file systems

 Microsoft Exchange, Microsoft SQL Server and Oracle

This document can be used as a basic guide during SPOS POC engagements in order to showcase Windows and Linux file system backup/recovery. It can also be used to assist in the setup and configuration of the product. The steps in this guide are mostly geared toward POC lab and test work. It has not been created as a guide for production installations.

2 PRODUCT RESOURCES

Please refer to the links below for more information on SnapProtect support. Release Notes: https://library.netapp.com/ecm/ecm_download_file/ECMP1354326 Books Online: http://support.netapp.com/documentation/web/ECMP1354372.html

Copyright and License information: https://library.netapp.com/ecm/ecm_download_file/ECMP1229119

3 SYSTEM REQUIREMENTS

For the current system requirements, refer to the following links.

INTEROPERABILITY MATRIX TOOL

(4)

appropriate license for the specific data types  FlexClone licenses (on all arrays).

 HTTP/HTTPS licenses on the destination NetApp file server to allow communication  The NetApp Snap Management license:

o iSCSI Initiator must be configured on the client and proxy computers to access the snapshot device

o SnapVault Secondary License for backup and recovery operations (NetApp 7.x and 8.1.x)

(5)

NetApp Confidential – Limited Use

4 SNAPPROTECT OPEN SYSTEMS

The SnapProtect for Open Systems replication will happen in the context of SnapProtect backup. To carry out the replication transfer, you should run or schedule the replication workflow from the storage policy to which all the clients that need to be protected are associated. The workflow will in turn start of individual

SnapProtect backup jobs for each of the associated subclients. Each SnapProtect backup job for a subclient does the following:

 Creates a software snapshot of the source data using the native Snap engine such as VSS or QSnap/LVM.

 The volume is added to the OnCommand Unified Manager dataset that corresponds to the primary snap copy of storage policy to which the subclient is associated.

 The OnCommand Unified Manager carries out any provisioning tasks and requests the destination filer to connect back to the client SnapProtect for Open SystemsTransfer/SnapProtect for Open SystemsTest process.

 If the volume has never been protected before, then the SnapProtect for Open Systems agent will perform a baseline transfer, i.e., transfer all blocks for the volume to the destination filer.

 If the volume has been protected before, then the SnapProtect for Open Systems agent will figure out all the blocks that have changed for the volume since the last backup, using SHA-1 checksum mechanism and a checksum database and transfer only the changed blocks to the destination file server. For a given volume, all backups, except the first, are incremental.

(6)

5 PREREQUISITES

SNAPPROTECT SOFTWARE

 MediaAgent needs to be installed on any client machine whose data will be backed up using

SnapProtect for Open Systems. Please refer to the Books Online for a list of Media Agents based on the Platforms supported.

 Unix - SnapProtect Qsnap Driver or Linux LVM or Veritas VxvM is required to be installed on Unix clients. The source for the backup will be from a device that is either a qsnap device or a Linux LVM or a Veritas VxvM volume

LICENSES

Add any of the licenses that have been described in section 3.

ARRAY SOFTWARE

 OnCommand Unified Manager - A server running NetApp OnCommand Unified Manager server software 5.2 is required

 Operations Manager, Provisioning Manager, and Protection Manager licenses are required for the OnCommand Unified Manager

 SnapVault - NetApp replication technology used for backup and recovery

SETUP

Perform the following steps before using SnapProtect:  NetApp 7.x and 8.1.x

o On your destination file server, use the license command to check the sv_windows_pri, and sv_linux_pri and sv_unix_pri licenses are available for the secondary file servers  NetApp 8.2.x

o On your destination file server, use the license command to check the SnapVault license is available for the secondary file servers

o Enable SnapVault on the secondary file servers as shown below

(7)

NetApp Confidential – Limited Use

6 ONCOMMAND UNIFIED MANAGER 5.2

INSTALL OCUM

1. SnapProtect requires OCUM 5.0.2 and above. Download the software from the SUPPORT site.

(8)

3. Accept the license agreement and click next.

(9)

NetApp Confidential – Limited Use 5. Ensure that you select the Standard edition and click next.

(10)

7. Confirm the installation location.

(11)

NetApp Confidential – Limited Use 9. Wait for the installation to finish.

(12)

11. Check the Launch OnCommand console checkbox and click Finish to exit the setup.

(13)

NetApp Confidential – Limited Use

INSTALL NETAPP MANAGEMENT CONSOLE

1. Once you have installed the OCUM server, install the NetApp Management Console. This can be downloaded from within the Operations Manager console.

(14)
(15)

11 SnapProtect POC Cookbook NetApp Confidential – Limited Use 3. Click next to begin the installation.

(16)

5. Wait for the installer to complete

(17)

13 SnapProtect POC Cookbook NetApp Confidential – Limited Use

CONFIGURE ONCOMMAND UNIFIED MANAGER

1. Launch the NetApp Management Console and login.

2. Make sure that NDMP is enabled on all arrays. Run the following command on the 7-Mode controller to turn on NDMP.

ndmpd on

(18)
(19)

15 SnapProtect POC Cookbook NetApp Confidential – Limited Use

5. Enter the hostname of the array. Make sure to have an entry in the etc/hosts file which

(20)
(21)

17 SnapProtect POC Cookbook NetApp Confidential – Limited Use

(22)
(23)
(24)
(25)
(26)

12. Finish the wizard.

13. The host is then shown in the list. Check that the NDMP credentials are showing good. If not, click Edit and modify the password.

(27)

22 SnapProtect POC Cookbook NetApp Confidential – Limited Use

CONFIGURE RESOURCE POOLS

The next thing to configure will be the destination resource pools that will be used by SnapProtect during replication operations.

1. Under Data Resource Pools, click Add to start the wizard.

(28)
(29)
(30)
(31)
(32)
(33)

28 SnapProtect POC Cookbook NetApp Confidential – Limited Use

7 SNAPPROTECT INSTALLATION

INSTALL SNAPPROTECT

1. Download the core package from the NOW site as well as any service packs.

For partner access to the download refer to the following link.

https://fieldportal.netapp.com/viewcontent.asp?qv=1&docid=34152

(34)
(35)

30 SnapProtect POC Cookbook NetApp Confidential – Limited Use

(36)
(37)
(38)
(39)

34 SnapProtect POC Cookbook NetApp Confidential – Limited Use

(40)
(41)
(42)

11. Provide a password for the SQL user ‘sa’. The SQL database is used by SnapProtect to store information like configuration metadata.

(43)
(44)

13. Select Create a New Database.

(45)
(46)

15. Software cache is used for pushing agents to other hosts and also downloading any updates to the Commserve. To setup a software cache select the option below and click Next.

(47)
(48)
(49)

44 SnapProtect POC Cookbook NetApp Confidential – Limited Use

8 SNAPPROTECT CONFIGURATION

INITIAL CONFIGURATION

1. Launch the CommCell Console and login with the password that you provided during installation.

2. Disable automatic updates by right clicking on the CommServe  All Tasks  Add/Remove Software 

Download Software.

(50)

ADD THE NETAPP 7-MODE CONTROLLERS INTO THE ARRAY MANAGEMENT

(51)

46 SnapProtect POC Cookbook NetApp Confidential – Limited Use

(52)
(53)

48 SnapProtect POC Cookbook NetApp Confidential – Limited Use

9 CONFIGURE THE WINDOWS CLIENT

1. Right click on Client Computers  New Client  File System  Windows

(54)

3. View the summary and click Finish

(55)

50 SnapProtect POC Cookbook NetApp Confidential – Limited Use

(56)
(57)

52 SnapProtect POC Cookbook NetApp Confidential – Limited Use

(58)

8.

Leave the default setting for the next few screenshots until the Summary window appears and then click

Next.

(59)

54 SnapProtect POC Cookbook NetApp Confidential – Limited Use

10.

Verify that the client has been added successfully into the Client Computers and the Windows icon is

displayed towards the left of the IP

(60)
(61)

56 SnapProtect POC Cookbook NetApp Confidential – Limited Use

(62)
(63)

58 SnapProtect POC Cookbook NetApp Confidential – Limited Use

(64)
(65)

60 SnapProtect POC Cookbook NetApp Confidential – Limited Use

(66)
(67)

62 SnapProtect POC Cookbook NetApp Confidential – Limited Use

(68)
(69)

64 SnapProtect POC Cookbook NetApp Confidential – Limited Use

(70)
(71)

66 SnapProtect POC Cookbook NetApp Confidential – Limited Use

(72)
(73)

68 SnapProtect POC Cookbook NetApp Confidential – Limited Use

(74)
(75)

70 SnapProtect POC Cookbook NetApp Confidential – Limited Use

(76)

PERFORM A WINDOWS BACKUP

(77)

72 SnapProtect POC Cookbook NetApp Confidential – Limited Use 2. Click OK to start the backup

(78)

PERFORM A WINDOWS RESTORE

(79)

74 SnapProtect POC Cookbook NetApp Confidential – Limited Use

(80)
(81)

76 SnapProtect POC Cookbook NetApp Confidential – Limited Use

4.

Specify an alternate destination path or click on Restore to same folder to restore the data to its original

location.

(82)

10 CONFIGURE THE LINUX CLIENT

(83)

78 SnapProtect POC Cookbook NetApp Confidential – Limited Use 2. Create a New Storage Policy

(84)

4. Specify a location to store the indexes

(85)

80 SnapProtect POC Cookbook NetApp Confidential – Limited Use 6. Speify a retention policy if required.

(86)
(87)
(88)
(89)
(90)
(91)
(92)
(93)
(94)
(95)
(96)
(97)

92 SnapProtect POC Cookbook NetApp Confidential – Limited Use

PERFORM A LINUX BACKUP

(98)

2. Click OK to start the backup.

(99)

94 SnapProtect POC Cookbook NetApp Confidential – Limited Use

PERFORM A LINUX RESTORE

(100)
(101)
(102)
(103)
(104)

NetApp provides no representations or warranties regarding the accuracy, reliability, or serviceability of any information or recommendations provided in this publication, or with respect to any results that may be obtained by the use of the information or observance of any recommendations provided herein. The information in this document is distributed AS IS, and the use of this information or the implementation of

any recommendations or techniques herein is a customer’s responsibility and depends on the customer’s

ability to evaluate and integrate them into the customer’s operational environment. This document and

the information contained herein may be used solely in connection with the NetApp products discussed in this document.

Referensi

Dokumen terkait

Berdasarkan hasil wawancara dengan 47 responden pada masyarakat suku Kaili Ija di desa Bora yang dianggap paling mengetahui tentang pemanfaatan tumbuhan dalam

Hal ini sesuai dengan hipotesa penelitian Sementara itu dari fakta penelitian mengungkapkan bahwa fungsi dewan komisari, komisaris independen, komite audit, dan kebijakan

Fernando Alonso Diaz, who was born on July 29th, 1981 in Oviedo Spain, won the World Driver´s Championship title when he was 24 years old, breaking Emerson Fittipaldi´s record of

Uraian diatas membangkitkan minat peneliti untuk meneliti lebih jauh mengenai auditor, khususnya auditor yang bekerja pada Kantor Akuntan Publik (KAP) di Surabaya Timur dan

Rumusan masalah dalam penelitian ini bagaimana hasil belajar tematik tema 1 indahnya kebersamaan pada subtema dan pembelajaran tertentu dapat diupayakan melalui model

1) The existing microhydro power potential is a resource that can support rural development. The existence of the microhydro project can help the development of

Pada hari ini, SENIN tanggal TUJUH Bulan SEPTEM BER tahun DUA RIBU SEM BILAN , dimulai jam Sepuluh w ita sampai dengan selesai bertempat di portal Pengadaan Pemerintah

Penggunaan biro jasa pembuatan penawaran, Terlapor X lakukan karena pada saat itu banyak sekali proses tender/lelang yang harus Terlapor X ikuti dan waktu penyiapan dokumennya