Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
2
Ref: ADM42EW-0108
Atempo Copyrights
Atempo retains all property rights concerning the documentation of Time Navigator
software.
Your right to copy the Time Navigator software documentation is limited by the
legislation on copyright. Copies or adaptations without Atempos prior written consent are
forbidden by law and constitute a reprehensible breach.
This documentation is provided "as is" without any warranty of any kind, either expressed
or implied, including (but not limited to) the implied warranties or conditions of
merchantability or fitness for a particular purpose. Atempo shall not be liable for loss of
profits, decreasing or interrupted business activity, for loss of data or data use, nor for
any indirect, special or consequential damages whatsoever, even if Atempo has been
advised of the possibility of such damages arising out of a fault or an error in the
documentation or in Time Navigator software.
Atempo retains all rights to modify this documentation periodically without notice. No
part of this guide may be reproduced or transmitted, for any purpose, by any means,
electronic or mechanical, without Atempos express and written permission.
Atempo, Atempos logo and Time Navigator are registered trademarks of Atempo.
All brand or product names mentioned in this guide are trademarks or registered
trademarks of their respective companies or organizations.
Copyright 1992-2008 Atempo. All rights reserved.
The International Component for Unicode (libicu). For more information, consult
http://www-306.ibm.com/software/globalization/icu/index.jsp
lesstif: the Hungry Programmers' version of OSF/Motif. For more information, consult
http://www.lesstif.org/
http://2038bug.com/
http://www.perl.org.
The licenses for these components can be consulted in the Time Navigator Release Notes
guide.
Contents
Contents
Introduction
Time Navigator Features . . . . . . . . . . . . . .
Backup/Restore . . . . . . . . . . . . . . . .
Archiving . . . . . . . . . . . . . . . . . . .
Time Navigation . . . . . . . . . . . . . . .
Conventions . . . . . . . . . . . . . . . . . . . . . .
Time Navigator Documentation . . . . . . . . .
Time Navigator Release Notes . . . . . .
Time Navigator Getting Started Guide
Other Guides . . . . . . . . . . . . . . . . .
Time Navigator Online Help . . . . . . . . . . .
Time Navigator Tutorials . . . . . . . . . . . . .
Technical Support . . . . . . . . . . . . . . . . . .
Web Support . . . . . . . . . . . . . . . . . .
Your Comments are Welcome . . . . . . . . . . .
Chapter 1
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
2
2
2
3
4
5
5
5
5
6
6
7
7
8
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
10
10
12
13
13
13
15
15
16
16
17
17
18
19
20
25
27
28
ii
Alarm Area . . . . . . . .
Handling Platforms . . . . . . .
Displaying Platforms . . .
Searching for a Platform
Grouping Platforms . . .
Sorting Platforms . . . . .
Chapter 2
Chapter 3
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
29
31
31
32
33
35
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
38
39
43
45
47
49
50
51
52
52
54
55
59
59
62
63
64
64
67
68
About Platforms . . . . . . . . . . . . . . . . . . . . . . . . .
Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Applications . . . . . . . . . . . . . . . . . . . . . . . .
Firewalls and Backup Masters . . . . . . . . . . . . .
Mobile Platforms . . . . . . . . . . . . . . . . . . . . .
Creating a Platform . . . . . . . . . . . . . . . . . . . . . . .
Creating a Host . . . . . . . . . . . . . . . . . . . . . .
Creating a New Host Detected by Time Navigator
Creating Applications . . . . . . . . . . . . . . . . . .
Creating Platform Groups . . . . . . . . . . . . . . . .
Enabling Platforms . . . . . . . . . . . . . . . . . . . .
Disabling Platforms . . . . . . . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
70
70
70
71
73
74
74
79
81
83
84
84
Catalog Management
Platform Management
Contents
Chapter 4
iii
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 86
. 86
. 87
. 90
. 96
. 99
.100
.101
.101
.102
.103
.104
.104
.105
.106
.106
.106
.107
.108
.110
.111
.111
.112
.113
.113
.113
.114
.114
.115
.115
.116
.116
.117
.117
.117
.118
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.120
.120
.120
.120
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
iv
System Users . . . . . . . . . . . . .
User Groups . . . . . . . . . . . . . .
User and Access Rights Operations . . . .
Defining Default Access Rights . .
Defining Personal Access Rights .
Creating a User . . . . . . . . . . . .
Editing a User . . . . . . . . . . . . .
Deleting a User . . . . . . . . . . . .
Defining or Modifying a Password
Changing the User Identity . . . . .
Creating a User Group . . . . . . .
Editing a User Group . . . . . . . .
Deleting a User Group . . . . . . .
Chapter 5
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.121
.122
.123
.123
.123
.129
.130
.131
.131
.132
.133
.134
.135
About Devices . . . . . . . . . . . . . . . . . . . . . . .
Initial Configuration of Devices in Time Navigator
Device Detection Wizard . . . . . . . . . . . . . . . . .
Device Configuration Manager . . . . . . . . . . . . .
Device List Window . . . . . . . . . . . . . . . .
Library Split Definition . . . . . . . . . . . . . .
Library Drive Position Test . . . . . . . . . . . . . . .
Libraries . . . . . . . . . . . . . . . . . . . . . . . . . . .
About Libraries . . . . . . . . . . . . . . . . . . .
Creating a Library . . . . . . . . . . . . . . . . .
Advanced Library Properties . . . . . . . . . . .
Editing a Library . . . . . . . . . . . . . . . . . .
Reinitializing a Library . . . . . . . . . . . . . .
Deleting a Library . . . . . . . . . . . . . . . . .
Drives . . . . . . . . . . . . . . . . . . . . . . . . . . . .
About Drives . . . . . . . . . . . . . . . . . . . .
Creating a Drive . . . . . . . . . . . . . . . . . .
Changing the Mode of the Drive . . . . . . . .
Supervising Drive . . . . . . . . . . . . . . . . .
Testing Drives . . . . . . . . . . . . . . . . . . . .
Automatically Cleaning Drives . . . . . . . . . .
Manually Cleaning Drives . . . . . . . . . . . .
Editing Drives . . . . . . . . . . . . . . . . . . . .
Deleting Drives . . . . . . . . . . . . . . . . . . .
Ejecting a Media from a Drive . . . . . . . . .
Displaying Drives . . . . . . . . . . . . . . . . .
List Administration of Drives . . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.137
.139
.140
.147
.148
.152
.157
.159
.159
.161
.165
.165
.166
.166
.167
.167
.170
.182
.182
.183
.184
.185
.186
.187
.188
.188
.189
Contents
Chapter 6
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.189
.191
.191
.191
.191
.192
.192
.193
.193
.193
.194
.195
.195
.196
.198
.199
.200
.200
.204
.210
.213
.215
.217
.217
.218
.218
.219
.220
.221
.224
.226
.226
.228
.228
.228
.229
.229
vi
Chapter 7
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.235
.235
.237
.237
.238
.240
.240
.241
.242
.243
.243
.244
.245
.245
.247
.247
.248
.249
.250
.251
.252
.252
.252
.253
.253
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.286
.286
.286
.288
.288
.289
.290
.291
.291
.291
.300
.300
.301
.315
.316
.
.
.
.
.
Contents
Deleting Strategies . . . . . . . . . . . . . . .
List Administration of Strategies . . . . . . . . . .
Viewing the Strategy List . . . . . . . . . . .
Strategy List Window . . . . . . . . . . . . .
Exporting the Strategy List . . . . . . . . . .
Editing Strategies . . . . . . . . . . . . . . . .
Modifying Strategy Media Pools . . . . . .
Modifying Strategy Schedules . . . . . . . .
Resetting Pending Strategies . . . . . . . . .
Deleting Strategies . . . . . . . . . . . . . . .
Scheduler . . . . . . . . . . . . . . . . . . . . . . . .
About the scheduler . . . . . . . . . . . . . .
Configuring the Scheduler . . . . . . . . . .
Creating a Schedule . . . . . . . . . . . . . .
Examples of Schedule Creation . . . . . . .
Scheduling a Backup . . . . . . . . . . . . . .
Editing a Schedule . . . . . . . . . . . . . . .
Copying a Schedule . . . . . . . . . . . . . .
Importing a Schedule . . . . . . . . . . . . .
Exporting a Schedule . . . . . . . . . . . . .
Deleting a Schedule . . . . . . . . . . . . . .
Copying a Schedule Rule . . . . . . . . . . .
Modifying a Schedule Rule . . . . . . . . . .
Deleting a Schedule Rule . . . . . . . . . . .
Backup Selections . . . . . . . . . . . . . . . . . . .
About Backup Selections . . . . . . . . . . .
Creating a Backup Selection . . . . . . . . .
Filter Syntax . . . . . . . . . . . . . . . . . . .
Filtering Nested Selections . . . . . . . . . .
Backup Selection Representation . . . . . .
Viewing Backup Selections . . . . . . . . . .
Editing a Backup Selection . . . . . . . . . .
Deleting a Backup Selection . . . . . . . . .
List Administration of Backup Selections . . . . .
List of all Backup Selections . . . . . . . . .
Viewing Backup Selection Information . . .
Exporting the Backup Selection List . . . .
Editing Backup Selections . . . . . . . . . . .
Modifying Backup Selection Parameters . .
Modifying Backup Selection Filters . . . . .
Modifying Backup Selection Security Rule
Deleting Backup Selections . . . . . . . . . .
Macro-multiplexing . . . . . . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
vii
.316
.317
.317
.317
.319
.319
.320
.321
.322
.322
.323
.323
.324
.326
.333
.335
.336
.336
.336
.337
.337
.337
.338
.338
.339
.339
.339
.347
.352
.353
.353
.355
.355
.357
.357
.358
.359
.359
.359
.360
.361
.362
.364
viii
Chapter 8
Chapter 9
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.364
.365
.365
.366
.368
.368
.368
.369
.370
.370
Windows . . . . . . . . . . . . . . . . . . . . . . . . . .
Using the Time Navigator Agent . . . . . . .
Backing up Files . . . . . . . . . . . . . . . . .
Restoring Files . . . . . . . . . . . . . . . . . .
Registry . . . . . . . . . . . . . . . . . . . . . .
Windows 2000/2003/XP/Vista . . . . . . . . . . . . .
Unix . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Mac OS X . . . . . . . . . . . . . . . . . . . . . . . . .
Time Navigator Daemon . . . . . . . . . . . .
Time Navigator Interfaces . . . . . . . . . . .
Specifics of the Mac OS X agent . . . . . . .
Known Issues . . . . . . . . . . . . . . . . . . .
VMS . . . . . . . . . . . . . . . . . . . . . . . . . . . .
General information . . . . . . . . . . . . . . .
OES NetWare . . . . . . . . . . . . . . . . . . . . . . .
OES Linux . . . . . . . . . . . . . . . . . . . . . . . . .
NDMP . . . . . . . . . . . . . . . . . . . . . . . . . . .
Time Navigator Agent Job Viewer . . . . . . . . .
Starting Time Navigator Agent Job Viewer
Job Details . . . . . . . . . . . . . . . . . . . . .
Refreshing the Displayed Information . . . .
Mac OS X . . . . . . . . . . . . . . . . . . . . .
NetWare . . . . . . . . . . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.372
.372
.372
.372
.372
.372
.373
.373
.374
.374
.374
.375
.377
.380
.380
.383
.384
.385
.386
.386
.389
.391
.392
.394
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.406
.406
.407
.408
Agents
On Demand Backup
Configuring On Demand Backup
Defining Users . . . . . . .
Defining Strategies . . . . .
Managing Load . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Contents
ix
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.411
.411
.414
.414
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.419
.420
.421
.422
.422
.423
.424
.425
.425
.425
.428
.428
.428
.429
.429
.430
.430
Chapter 11 Alarms
Alarm Description . . . . . . . .
Alarm IDs and categories
Alarm Severity . . . . . .
Alarm Type . . . . . . . .
Alarm Messages . . . . .
Viewing Alarms . . . . . . . . .
Sorting Alarms . . . . . .
Processing Alarms . . . . . . . .
Notifying Alarms . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.434
.434
.434
.435
.435
.436
.439
.440
.443
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.446
.446
.447
.447
.448
.
.
.
.
.
Connecting to a Catalog . . . . . .
Updating the Event Manager . . .
Setting User Preferences . . . . .
Preferences Window . . . . . . . .
Event Display . . . . . . . . . . . . . . . .
Selecting the Events to Display .
Selecting the Columns to Display
Adjusting Columns . . . . . . . . .
Adding a Line Break . . . . . . . .
Filtering Events . . . . . . . . . . .
Event Filter Parameters . . . . . .
Clearing Events . . . . . . . . . . .
Event Search . . . . . . . . . . . . . . . .
Event Export . . . . . . . . . . . . . . . .
Export Events . . . . . . . . . . . .
Export Events Window . . . . . .
Event Purging . . . . . . . . . . . . . . . .
event File . . . . . . . . . . . . . . . . . .
log or log_debug File . . . . . . .
Notifying Events . . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.448
.448
.450
.450
.451
.451
.452
.452
.453
.453
.454
.457
.458
.459
.459
.459
.462
.463
.463
.465
Viewing Jobs . . . . . . . . . . . . . . . . . . . . . .
Selecting Catalogs . . . . . . . . . . . . . . . . . . .
Selecting a Catalog . . . . . . . . . . . . . . .
Catalog Selection Window . . . . . . . . . .
Job Information . . . . . . . . . . . . . . . . . . . . .
Displaying Job History . . . . . . . . . . . .
Column Choice Job Window . . . . . . . . .
Sorting Jobs . . . . . . . . . . . . . . . . . . . . . . .
Sorting Jobs . . . . . . . . . . . . . . . . . . .
Job Manager Preferences . . . . . . . . . . . . . . .
Refreshing Time Navigator Job Manager
Job Details . . . . . . . . . . . . . . . . . . . . . . . .
Viewing Job Details . . . . . . . . . . . . . .
Viewing Alarm Details . . . . . . . . . . . .
Job Details Window - General Tab . . . . .
Job Details Window - Advanced Tab . . . .
Job Details Window - Specific Tab . . . . .
Job Details Window - Events Tab . . . . . .
Column Choice Window - Events . . . . . .
Export Events Window . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.468
.469
.469
.469
.470
.470
.470
.474
.474
.475
.475
.476
.476
.476
.477
.479
.481
.483
.484
.485
Contents
.......................
Job Details Window - Alarms Tab .
Filtering Jobs . . . . . . . . . . . . . . . . . .
Filtering Jobs . . . . . . . . . . . . . .
Job Filtering Window . . . . . . . . .
Purging Jobs . . . . . . . . . . . . . . . . . .
Purging Jobs . . . . . . . . . . . . . . .
Job Purge Window . . . . . . . . . . .
Processing Jobs . . . . . . . . . . . . . . . . .
Processing Jobs . . . . . . . . . . . . .
Exporting Jobs . . . . . . . . . . . . . . . . .
Exporting Jobs . . . . . . . . . . . . .
Export Job Window . . . . . . . . . .
Duplicating Jobs . . . . . . . . . . . . . . . .
Duplicating Jobs . . . . . . . . . . . .
Job Duplication Window . . . . . . .
Job Reports . . . . . . . . . . . . . . . . . . .
Modifying Job Behavior using Parameters
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
xi
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.487
.487
.489
.489
.490
.492
.492
.492
.494
.494
.495
.495
.495
.497
.497
.497
.499
.500
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.503
.503
.504
.505
.505
.506
.508
.508
.513
.513
.513
.514
.516
.516
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.520
.521
.522
.522
.523
.524
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
xii
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.525
.525
.526
.527
.527
.528
.529
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.531
.532
.532
.532
.535
.541
.542
.543
.545
.546
.546
.547
.547
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.549
.551
.551
.552
.554
.567
.567
.572
.573
.574
.574
.583
.583
Contents
Basic Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Keywords . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Creating a dynamic List file . . . . . . . . . . . . . . . . . .
Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring Backups . . . . . . . . . . . . . . . . . . . . . . .
List Application Creation Parameters . . . . . . . . . . . . .
Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using Time Navigator Restore & Archive Manager . .
Restore Methods . . . . . . . . . . . . . . . . . . . . . . . . .
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
List File Examples . . . . . . . . . . . . . . . . . . . . . . . .
Graphical Representation . . . . . . . . . . . . . . . . . . . .
Using the List Application to back up a MYSQL database
xiii
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.591
.592
.603
.604
.604
.606
.612
.614
.618
.620
.620
.623
.624
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.627
.627
.629
.632
.632
.633
.635
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.637
.637
.638
.639
.640
.641
.641
.642
.642
.643
.643
Appendix
Appendix 1: Advanced Library Properties . . . . . . . . . . . . . . . . . . . . .645
Appendix 2: Specific Library Information . . . . . . . . . . . . . . . . . . . . . .650
Cartridge Management when Partitioning an Adic Scalar i500 Library 650
Appendix 3: TCP Parameter Modification . . . . . . . . . . . . . . . . . . . . .651
xiv
Glossary
Index
Introduction
The possibility for users to perform restore operations themselves, without the help
of the administrator and without knowing how the backup robotized library is
organized.
The possibility for administrators to schedule backups easily, manage the robotized
library automatically and monitor backup operations on the network.
The on-line backup of the main types of database.
The possibility to work in a very heterogeneous environment: Unix, Windows,
NetWare, Mac OS X and VMS operating systems can all be backed up.
Archiving
Archiving meets another need in data management, that of storing data (projects,
measurement results, etc.) in the medium to long term, for security as well as space
saving reasons. Archiving operations consist in copying data into an archive folder and
associating this folder with keywords for identification purposes.
Time Navigator offers:
The ability for users to create archive folders with indexes and to archive and
restore data by themselves, with key word search capabilities.
Introduction
Time Navigation
Designed by Atempo, Time Navigation greatly simplifies the consultation and restore of
backed up or archived data. At any time, the user can navigate in the past on his machine
and view the exact image of his files or directories as they were on a given date,
regardless of their actual location on the storage media. Restoring them is then just a click
away.
Conventions
This guide uses conventions to make information easy to access and understand.
Text in Time Navigator graphical application windows is displayed in the following font:
Window text.
Time Navigator commands and scripts related to the different operating systems
(Unix, Windows, etc.) are displayed in the following font:
scripts and commands.
1.
First step.
2.
Introduction
The Time Navigator Release Notes and Time Navigator Getting Started
Guide manuals are also available in print format.
Other Guides
The Reference guides (Time Navigator Installation Guide, Time Navigator
Administration Guide and Time Navigator Restore Guide) describe the installation,
administration and use of the software for backing up and restoring file systems.
The Specific guides describe installation, configuration and use of Time Navigator
options, such as Time Navigator Archiving Server, Time Navigator for Oracle,
Time Navigator for MS-SQL Server, Time Navigator for NDMP, etc.
This online help system allows you to find the information you need easily and quickly:
From any dialog box within the application, click on Help to access context-sensitive information describing the parameters of the dialog box.
From any graphical interface, choose Help - Help Topics to get the online help for this
interface. You can also search for information through the Contents tab, the Index
tab or the Search tab that offers a powerful full-text search.
Setup Tutorial: How to install, use the Preferences tool and configure the Device
Detection Wizard.
Restore Tutorial: How to restore missing files or previous versions of existing files.
Archiving Tutorial: How to use Time Navigator for long-term storage and
classification of your file sytems.
To access these tutorials, choose Help-Tutorial from the Time Navigator Administration
Console or Time Navigator Restore & Archive Manager. The tutorials are also
available from the Autorun (Windows) or from the CD-ROM index.htm file (Unix).
To view these tutorials, you need:
A web browser.
Introduction
http://www.macromedia.com/shockwave/download/alternates/
Note
The Shockwave Player and Macromedia Flash Player programs are not
available for IBM AIX and VMS.
Technical Support
Web Support
If you have subscribed a maintenance contract and you encounter a problem with
Time Navigator, consult the Atempo Web Support at:
http://support.atempo.com
Complete information on Atempo Web Support, including how to get a login, the range
of tools and services available and how to use each of them, can be found in the
Time Navigator Troubleshooting Guide, on your Time Navigator delivery CD-ROM.
The Knowledge Base includes:
Technical Notes.
If you are unable to solve your problem or find the information you need, Atempo and
its partners will help you. Web support includes an interactive interface through which
you can log your inquiries directly and follow them up. Support is also available by email
and by phone.
When calling the Atempo Technical Support team, please provide your maintenance
contract number. We also recommend that for all Support inquiries you generate the
Time Navigator Environment Report.
For more details on the Environment Report, see the Time Navigator Troubleshooting
Guide.
C H A P T E R
Time Navigator Administration Console is one of the main interfaces you will
encounter when using Time Navigator. It offers a truly interactive and centralized
administration that includes:
This chapter describes the functioning of Time Navigator Administration Console both
in disconnected and connected mode.
10
The Time Navigator service must be started on the Time Navigator server.
Unix Prerequisites
A script called runtina is provided in the $TINA_HOME/Bin directory which loads the
Time Navigator environment at the moment a command is run. It takes the command
itself as its argument.
Example:/usr/Atempo/tina/Bin/runtina tina_adm -language English
It is also possible to add $TINA_HOME/Bin to the PATH variable in your .profile file.
If you do this, you do not need to include the path every time to execute runtina. For
example, you can directly type
runtina tina_adm -language English
in any console window.
Any other commands can be launched in the same way.
Alternatively, the environment can be set by running tina.sh or tina.csh, depending
on the shell you are using. For shell and bash, type
. $TINA_HOME/Bin/.tina.sh
Chapter 1
11
source $TINA_HOME/Bin/.tina.csh
Note:
Atempo recommends using runtina rather than the shell script to set the
environment, because certain system libraries in the environment can disrupt
the running of standard Unix commands such as ls.
Note:
If the script is run at reboot, it may prevent the launching of the window
manager. Make sure not to set the script in a user profile (.cshrc, .profile ...).
An X-Window graphical display is required. You must check that the environment
variable DISPLAY is correctly defined or use the [-display display] option of the
tina_adm command.
12
Disconnected Mode
When you are in disconnected mode, no catalog is displayed in Time Navigator
Administration Console. This does not mean that the Time Navigator service or
daemon is not running. One or more catalogs may be active, but you are not connected
to any one of them, hence no catalog contents appear in Time Navigator Administration
Console.
In disconnected mode, you can perform the following operations:
Creating a Catalog
Editing a Catalog
Warning:
1.
If some catalogs have already been created, the Catalog Selection window appears.
Select none and click on OK.
3.
Note:
For a full description of the options available with the tina_adm command
and their default value, see the "tina_adm" section in the Time Navigator
Command Line Interface guide.
Chapter 1
13
Connected Mode
Prerequisites
In addition to the prerequisites for opening Time Navigator Administration Console in
disconnected mode, opening in connected mode, meaning to connect to a catalog, implies
that at least one catalog has already been created on the server.
By default, when you create a catalog, the Privileged User is the only one allowed
to connect to the catalog. Thus if you are connecting to a catalog for the first time,
you must use the privileged user identity with or without a password depending on
whether you defined one or not.
Tip:
While you are logged in as the privileged user you can grant other users
access to the catalog (see To define user specific rights, page 123) as
well as modify the default rights (see Defining Default Access Rights,
page 123).
On subsequent login, if you need to be logged as the privileged user, provide the
privileged user name and password if you have defined one.
Enter the user name and password exactly as defined in the catalog. The user must
at least have the General Task permission to connect to the catalog. If you did not
specify a password for a user, just provide the user name. To define users in the
catalog, see To create a user, page 129.
If the user name you provide is unknown to the catalog, whether you provide a
14
password or not, the user will be assigned default permissions. The default
permissions do not allow a user to connect to the catalog. The privileged user can
modify the default rights to allow access to the catalog to any user, see Defining
Default Access Rights, page 123 for details.
Level of Catalog Access
The following table presents the permissions required to perform catalog operations:
Operation
Privileged user and any user with the General Task permission. See
Users and Access Rights, page 119.
Privileged user and any user with the General Task permission and
the permission specific to each functionality. See Defining
Personal Access Rights, page 123 for details.
1.
2.
The List of Catalogs Window window appears. Select the catalog you want to connect
to and click on OK. You can only be connected to one catalog at a time.
Chapter 1
3.
15
The Catalog Login Window appears. Enter the name and password of the user you
want to log in as. See Catalog Identity, page 13 to choose the appropriate user.
If the user you provide does not have the permission to connect to the catalog a
warning message is displayed. If the password you provide is incorrect, the
Catalog Login window reappears to let you enter the password again.
Once you have provided a correct login, Time Navigator Administration Console
appears.
You can only connect to a running catalog. If a catalog is stopped, you must
start it before you can connect to it, see To start a catalog, page 49.
1.
In the Catalog Information area, select the catalog you want to connect to.
2.
Choose Catalog-Connect.
3.
If the catalog user currently connected has the permission to access the catalog you
are trying to connect to, no login is required. If not (or if no catalog user is
currently connected, i.e., you are in disconnected mode) you have to provide a
login allowing the connection to the new catalog. See Catalog Identity, page 13
and Level of Catalog Access, page 14 for details.
4.
The catalog previously displayed is disconnected and the newly selected one
appears.
16
In the Catalog tab of the Catalog information area, right-click a catalog then choose
Refresh Catalog Status.
Note:
Next time you start Time Navigator Administration Console, it will return to its default
configuration and refresh the entire catalog list.
Chapter 1
17
Choose Catalog-Quit.
18
Menu
Bar
Network
Area
Catalog
Information
Area
Status Bar
Icon
Area
Alarm
Area
Chapter 1
19
The Status bar which indicates the current catalog, the current user and the number
of platforms.
The Icon area which represents the list of all platform groups managed in the
Time Navigator configuration.
The Alarm area which allows you to view alarms initiated by the application
graphically. The three buttons represent different severity levels. See Alarms,
page 433, for additional information.
The Network, Alarms, and Real Time Information areas are updated every five seconds.
Several instances of Time Navigator Administration Console can run at the same time.
Any action performed in one instance will be also viewed in the others, except when
removing or creating a platform.
Menu Bar
The Menu bar includes all the administration menus:
Catalog Menu
The Catalog menu allows performance of catalog operations such as creating, starting,
connecting, etc.
See Opening Time Navigator Administration Console, page 13.
Monitoring Menu
The Monitoring Menu allows opening of the Time Navigator monitoring interfaces:
Platform Menu
The Backup menu allows to create backup objects such as strategies, backup selections,
groups, etc, to schedule automatic backups. See Automatic Backup Configuration,
page 285.
20
Archiving Menu
The Devices menu allows to detect and manage devices, as well as perform library and
drive operations.
See Device & Media Management, page 137 and Time Navigator Library
Manager, page 233.
Storage Menu
The Storage menu allows management of media, media pools, cartridges, snapshots and
replications.
See Device & Media Management, page 137.
Security Menu
The Security menu provides access to Time Navigator Security & Compliance
Manager (if you installed this fonctionality) and allows management of users and access
rights for Time Navigator.
See Users and Access Rights, page 119 and Time Navigator Security & Compliance
Manager.
Help Menu
The help menu provides access to Time Navigator Online Help, tutorial, Web support
zone and information concerning the Time Navigator Licenses and version used.
Network Area
The Network area contains the platforms, libraries and drives in its upper part, and in
the lower part, the shared drives.
Selecting Items in the Network Area
To perform any operation on a platform, platform group, drive or library, you must first
select it in the Network area.
To select an object in the network area
1.
Display the object to select in the Network area if it is not already displayed (see
Displaying Platforms, page 31).
2.
Click on the object icon. The outer frame turns to a darker blue: the object is
selected.
Chapter 1
21
In the Icons area, click on the icon of any platform belonging to the group. All the
group is selected and is displayed with a black background.
Note:
Only one object can be selected at a time, whatever its nature (platform, drive,
library or group).
Platform Representation
Click here
to select
the
1. Alarms
2. Host/Application Status
3. Network Information
4. Host/Application Name
5. Host/Application Type
6. Backup strategies
(A, B, C or D)
Host/Application Status.
Background color
: platform is enabled, backup authorized.
Black cross on an ocher background : platform is disabled, backup not authorized.
22
Host/Application Name
The name corresponds to a hostname and not an alias (ex: hercule), except if you declared it in
the localhostname field of the hosts file in the Conf directory of the Time Navigator
installation directory.
Backup strategies associated with the host/application (A, B, C and D) up to 4 strategies for any
given platform.
If a letter appears in the box, it indicates that the backup strategy is defined. If a backup is being
performed, the box of the concerned strategy is displayed with a green background.
Drive Representation
Click here
to select
the drive
Chapter 1
Line n#
Drive Information
23
Note: When a drive has several alarms of different severity levels, the color of the bar indicates
the maximum severity level (ex: a minor alarm and a major alarm = orange bar).
2
Drive Status.
Enabled, green background
Disabled, ocher background
Maintenance, ocher background
: drive is available
: drive is unavailable
: drive is in maintenance mode
A different icon appears for each operation being performed by the drive. The operations are:
Writing on media
Forwarding media
Rewinding media
Writing a label
Recycling media
Deleting media
Drive Name
This is the logical name of a drive.
Media Name
*
: non labelled media.
Label
: labelled media.
The background color indicates the nature of the request:
A Red background means that the media is required.
A background of the same color as the overall background means that the media has been
identified and is being used.
Volume of data processed on media (not just for the current session).
24
Displaying Drives
In order to optimize the network area display you have the option of showing or hiding
drives in Time Navigator Administration Console.
To Show/Hide a drive
1.
2.
Select the drives you want to show or hide and click on OK.
Tip:
The Show/Hide drive menu is also available when you right click on a host or
drive icon. Right clicking on the host icon allows you to display/hide all the
drives attached to that host at once. Right clicking on a drive icon allows you
to hide that drive only.
Library Representation
Click here
to select
the library
Chapter 1
25
Network Representation
Click here
to select
the
Line
Network Information
Network Name
Description
The catalog is running and is the catalog currently
displayed in Time Navigator Administration Console.
The catalog is running but is not currently displayed in
Time Navigator Administration Console.
The catalog is running but the current user does not have
the permission to access that catalog.
26
Icon
Description
The catalog is stopped.
The catalog status is unknown due to an error.
The catalog status is unknown (the automatic refresh is
turned off).
Description
Volume
This is the catalog size you declared when you first created your catalog. This figure will
not change unless you edit your catalog and modify it. See Editing a Catalog, page 45
for details on how to increase the catalog size.
Free
This is the amount of available space in your catalog expressed as a percentage of total
catalog volume.
This percentage decreases when the number of backup selections and versions increases. It
increases when media are recycled or objects are deleted.
The free space should not be allowed to be too low as it could seriously hinder
Time Navigator functioning. Thus, when you reach 20% of remaining free space, the field
will be displayed in orange to warn you (this value can be modified using the tunable
Catalog Filling Rate Alarm). If you reach 5%, the field will be red.
The catalog will cease functioning when it is 98% full.
Objects
Number of all distinct objects (files and directories) contained in the catalog.
Instances
Backing up a new backup selection involves the creation of one object and one version
in the catalog. The object and the first version created use an average of 512 bytes. The
following versions use approximately 128 bytes (Unix, Windows XP) or 256 bytes for
systems such as 2000/2003, NetWare, VMS with extended security management (ACL
or access list type). Backing up an existing object only involves the creation of a new
version.
Chapter 1
27
If backup strategies or archive folders have multiple writing media pools, several file
copies are written. In this case, one version is created for each copy. For example, if
your strategy has a multiple writing media pool, each file is backed up in two copies and
two new versions are recorded in the catalog for each file.
Cache Area
The Cache area enables you to follow the evolution of the cache occupied space.
Fields
Information
Volume
Total cache volume as determined when the catalog was created (sums up disk and memory
cache).
Free
Writing
Percentage of cache used for writing sessions (e.g., during backup and archiving operations).
Reading
Percentage of cache used for reading sessions (e.g., during restore operations).
Description
28
Numbered
Area
4
Description
The first number represents the number of platforms currently displayed. The
second number represents the total number of platforms in the catalog
Alarm area. Displays the alarms issued by Time Navigator:
Icon Area
The Icon area contains all the platforms declared in the application. Platforms belonging
to a group are represented in a group area containing an icon for each platform. Only the
first ten characters of the name are displayed.
Using the icon area right click menu, you can:
The platform status is indicated by its icon color and by symbols whose meaning is
explained in the following table:
Chapter 1
Visual Clue
Description
Example
Enabled platform.
adele.fs2
Ocher icon
Disabled platform.
hobbes.list
Green icon
adele
aria
adele.fs2
Circle
axle
Vertical bar
adele
Vertical bar to the right of circle. Platform not displayed in the Network area and
connected to one or several drives.
29
athanagor
gaston.list
Note:
When a platform is selected in the Network area, its icon blinks in the Icon
area to allow the user better to view it.
Alarm Area
The Alarms area allows you to view alarms initiated by the application. It contains three
buttons which correspond to different severity levels.
The color of the button indicates the alarm severity level:
Green button:
no alarm.
Red button:
critical alarm.
30
Blinking button:
If you click on an alarm button, the list of alarms of the selected severity level is
displayed.
You can acknowledge the displayed alarms. The list contains information on alarms such
as name and type of the object, severity level, first and last dates of occurrence, number
of occurrences and message.
For more information on managing alarms, see Alarms, page 433.
Chapter 1
31
Handling Platforms
Displaying Platforms
In the Icons area, the presence of symbols on a platform icon indicates that the platform,
and the libraries and drives, attached to it (if any) are not displayed in the Network area.
The platform button in the Icons area acts as a toggle to view, or not, the platform in the
Network area.
Note:
To display a drive or a library, you must display the host it is connected to.
For more information on the meaning of symbols associated with icons, seeIcon Area,
page 28.
To display a platform in the Network area
1.
2.
In the Icons area, the symbol the platform icon contains disappears and the platform,
along with the libraries and drives connected to it (if any), is displayed in the Network
area.
Tip:
You can also double-click on the platform icon in the Icons area to display the
platform in the Network area.
1.
2.
The selected platforms, along with the libraries and the drives connected to them (if any),
are no longer displayed in the Network area. A symbol appears among the corresponding
32
You can also double-click on the platform icon in the Icons area to remove the
platform from the Network area.
1.
2.
Select a platform in the list or fill in the Search field to filter platforms according
to their names.
You can use, among others, the following special characters:
3.
Click on OK.
If the platform was minimized in the Icon area, it is maximized and appears in
the Network area.
Chapter 1
33
Grouping Platforms
Platform groups allow you to define backup settings for the whole group at once. All
platforms belonging to the group will have identical backup settings.
Only users authorized to edit backup strategies and backup selections can perform this
operation.
Note:
Warning:
If the platform you plan to add to a group already has backup selections and
strategies defined, they will be replaced with the group backup selections
and strategies.
To group platforms
1.
2.
In the Existing groups list, select the platform or the platform group that you want
to associate with a group.
Tip:
3.
You can select more than one group or platforms using the Ctrl key.
In the Destination groups list, select the group with which you want to associate
the selected platform.
34
4.
Click on Apply to take the modifications into account without closing the window
and click on OK to close the window.
A dialog box reminds you that the platform adopts the backup selections and
strategies of the group it is associated with and prompts you to confirm your
decision.
Warning:
5.
Tip:
1.
2.
In the Existing groups list, select the platform to remove from the group.
3.
4.
Click on Apply to take the modifications into account without closing the window
and click on OK to close the window.
Tip:
You can also drag and drop the platform outside of the group in Icons area.
Note:
When a platform is removed from a group, it keeps the strategies and backup
selections of the group with which it was associated. If you are allowed to, you
can modify its backup selections and strategies. See Editing Strategies,
page 316 and Editing a Backup Selection, page 355.
Chapter 1
35
Sorting Platforms
When you open Time Navigator Administration Console, the platforms in a group are
automatically sorted in alphabetical order, and the groups are sorted in the alphabetical
order of the first platform in each group. You have the option, if you modify the groups,
to manually sort platforms.
To sort platform groups
You can also right click in the icon area and select Sort.
36
37
C H A P T E R
Catalog Management
38
The multicatalog functionality allows you to set up backup and archiving operations with a
lot of freedom. For instance, one catalog can be dedicated to backing up data and another to
archiving data.
The different catalogs work independently from one another although they may share
resources such as drives and libraries through Time Navigator Library Sharing Manager.
Some Time Navigator applications such as Time Navigator Task Viewer,
Time Navigator Job Manager or Time Navigator Media Request Console, will let you
access several catalogs at the same time, while others, such as Time Navigator
Administration Console will require you to choose a single working catalog.
Note:
Each catalog must be backed up on a regular basis to secure your Time Navigator
environment.
Chapter 2
Catalog Management
39
Creating a Catalog
When you create a catalog, Time Navigator automatically creates a Data.catalog_name
directory in the installation directory, containing a series of odb, ... odb_n files that represent
the catalog. The maximum size of an .odb file is 1 GB, thus depending on the size of your
catalog, 1 to 32 odb files will be created.
For performance reasons, you may want to locate your odb files elsewhere than in the default
directory. To do so, use the Split Catalog File (odb_translation_path_)# or Catalog File
Location (global_odb_translation_path) tunables prior to creating the catalog.
Note:
The catalog must be created on a local disk, not on a network disk via NFS for
instance.
See the Time Navigator Tunables guide for details on how to use these tunables.
Preliminary Steps
To create a catalog
1.
Choose Catalog-New.
The Time Navigator Catalog Editor window appears.
40
2.
Provide a catalog name and size, and an identity for the privileged user as
described in Catalog Parameters Area, page 43.
3.
Click on Add in the Cache area to define your cache space. The following window
appears:
4.
Choose the Type and Size of the cache space and click on OK.
Chapter 2
Catalog Management
as well as a size. Repeat the operation for each disk cache to be created.
Cache Characteristics
Cache type
Characteristic
Value
Maximum Size
2047 MB
Minimum Size
Unix: 2047MB
Windows: 64 MB except if tunable
max_memory_axes_size is set (see the
Time Navigator Tunables guide for details)
If the tunable is not set, the cache size you provide is
automatically divided into 64 MB segments and
rounded up to the nearest multiple of 64. For
instance if you request 200 MB of memory cache,
four segments are created.
32 MB
Maximum Size
Minimum Size
1 GB
Memory
Disk
32 MB
< 2 GB
32 GB
128 GB
256 GB
> 16 GB
512 GB
41
42
5.
To modify the structure of your cache, click on the Advanced Tab. See Advanced
Tab, page 44 for details.
6.
When you configure a memory cache in Time Navigator Configurator, the maximum
size allowed is proportional to the size of the shared memory defined in your machine.
The default values defined at setup are:
sysctl -w kern.sysv.shmmax=536870912
sysctl -w kern.sysv.shmmin=1
sysctl -w kern.sysv.shmmni=128
sysctl -w kern.sysv.shmseg=32
sysctl -w kern.sysv.shmall=131072
This means that, by default, you cannot create a memory cache larger than 512 MB.
However, if you want to have memory cache larger than this, you can modify the size of
the shared memory in your Mac system. You can do this manually by modifying the shm
values in the file /etc/rc.
To Modify the Memcache Default Values in MacOS
The general principle is to set the shmmax and shmall values according to the following
formula:
shmmax=total size in bytes to allocate to your shared memory
shmall=shmmax/4096
For example, the following values will allow the creation of memcache of up to 1 GB:
shmmax=1073741824
shmall=262144
Warning
Atempo recommends that you do not allocate more than 1/4 of the system
memory to Time Navigator cache. Example: if your server has 4GB system
memory, do not allocate anymore than 1GB for Time Navigator.
Chapter 2
Note
Catalog Management
43
After any modification of the file /etc/rc, the machine needs to be rebooted.
Catalog Name: Name that appears in the Time Navigator interfaces. The catalog
name is not case sensitive and always appears in lower case.You can use the
following characters:
Any letter.
Underscore _.
At least 128 MB, at most 128 GB. To determine your catalog size, be aware that
the first version of a backed up object will use up approximately 1024 bytes.
Subsequent instances will use up approximately 256 bytes for Unix, clients and 512
bytes for Windows, MAC OS X, NetWare, and VMS clients (the difference in size
is due to the presence of security attributes and/or ACLs).
Note:
44
Enter a name for the privileged user. This user needs not exist at the operating
system level. You can use any characters.
The privileged user is the only user that can grant access rights to other users. He
has all the rights to perform any operations on the catalog, except editing the
catalog. Editing the catalog can only be performed by root or a user with
administrators rights.
Password
Enter a password for the privileged user and confirm it in the Confirm field.
Note:
If you choose not to define a password for the privileged user at this point,
you can define one later, just as you would for any catalog user.
Server Name
This field is automatically filled by Time Navigator and contains the name of the
server you are working on.
Comments
Enter a comment if you wish. This comment will appear next to the catalog name
in the Catalog List window.
Cache Tab
Advanced Tab
Note:
The default container size is calculated according to the cache size you
specify in the Cache tab. You may change the size of the containers as
needed, without modifying the size of the cache.
Average number of Versions per objet: Allows Time Navigator to optimize the catalog
structure by keeping versions of a same object in the same location. The default
value is 5, i.e., each time a new object is backed up in the catalog, Time Navigator
Chapter 2
Catalog Management
45
reserves enough space near the object to hold 4 more versions of that object. Keep
the default value if you are unsure of what information you should provide. This
field only appears when you are creating a catalog, not when you are editing it.
Memory cache layout is xx containers of yy MB: Indicates the current memory cache
layout based on the memory cache information found in the Cache Tab. xx is the
number of containers, yy is the size of each container.
New Size of Memory Containers (MB): Allows you to modify the size of the memory
cache containers, if the default cache container size does not suit your needs.
Choose a size between 4 MB and 256 MB.
Disk cache layout is xx containers of yy MB: Indicates the current disk cache layout based
on the disk cache information found in the Cache Tab. xx is the number of
containers, yy is the size of each container.
New Size of Disk Containers (MB): Allows you to modify the size of the disk cache
containers, if the default cache container size does not suit your needs. Choose a
size between 4 MB and 256 MB.
Editing a Catalog
Once a catalog has been created, you may need to edit it, for instance to increase its size.
Note:
1.
2.
Stop the catalog. Right click on the catalog to edit in the Catalog Information area and
choose Stop.
3.
Choose Catalog-Properties. The Catalog List window appears. Select the catalog to edit
and click on OK.
46
4.
5.
All fields but the Host Id and the catalog name can be edited.
For all other fields, follow the procedure described in Creating a Catalog,
page 39.
Restart the catalog. In the catalog information area, right click on the catalog and
choose Start. Log in as the privileged user of the catalog.
Chapter 2
Catalog Management
47
It is possible to perform several simultaneous restore jobs. This is known as parallel restore.
Parallel restore works by initiating a father job that then handles several child jobs. These
child jobs appear as parallel jobs. Child jobs may also be fathers. All these jobs remain
active until at least one has ended. They will only appear in the job history once all child
jobs have completed.
Note:
Parallel restore does not depend on having backed up the original data with a
parallel backup. You can perform a parallel restore on data that was backed up
without parallelism if the backup was done on several cartridges.
You can set limits to the maximum number of snapshots or cartridges to use. The limits
concerning snapshots are mostly related to your network abilities. The practical limit on
cartridges is the number of drives available. The limits apply to each individual restore and
not all of the current restores.
If a child job is interrupted or fails for some reason, the other child jobs will continue
normally.
During a parallel restore job, if a file is split across two cartridges, parallel performance is
reduced as this will require two passes on the job:
Note:
a first pass to restore data from the first cartridge and perform other complete jobs.
a second pass to complete the restoration of data on the second cartridge for the job(s)
split across two cartridges.
Parallel backup only applies to hosts and filesystem applications. It does not
apply to any other application type including the catalog application.
1.
48
2.
Set the restore parameters as specified in Catalog Parameters Window, page 48.
3.
Click on OK.
processes that can be launched simultaneously by a single snapshot restore job. The default
value is 3.
Note:
The job limitation is currently based on using all enabled drives. Resource
management then determines what can be done with available resources.
On Demand Backup
Maximum of On Demand Backup per day and per host: Specifies the global maximum number of
On Demand Backups that authorized users throughout the network are permitted to launch
within a 24-hour period on any given host. The default value is 5.
Chapter 2
Catalog Management
49
Starting a Catalog
If a catalog is not running, you cannot display its contents in Time Navigator
Administration Console. You must start it before performing any action on it.
Note:
The privileged user is the only user allowed to start the catalog.
Tip:
To start a catalog
1.
If you are already connected to a catalog, switch to disconnected mode, unless the
currently logged user is the privileged user of the catalog you want to start.
2.
In the catalog information area, select the catalog you want to start and choose
Catalog-Start.
3.
If you are in disconnected mode, the catalog login window appears. Log in as the
privileged user of the catalog you want to start.
4.
The catalog is started, its icon in the catalog information area becomes green.
50
Stopping a Catalog
It is possible to stop a catalog without stopping the Time Navigator service or daemon.
Stopping a catalog allows you to edit that catalog. A stopped catalog remains so until it is
manually started again using the Catalog-Start menu.
Note:
The privileged user is the only user allowed to stop the catalog.
Tip:
To stop a catalog
1.
2.
In the catalog information area, select the catalog to stop and choose
Catalog-Stop.
Chapter 2
Catalog Management
51
Suspending a Catalog
It is possible to suspend a catalog without stopping the Time Navigator service or daemon.
Suspending a catalog allows you to edit the catalog. Unlike a stopped catalog, a suspended
catalog is automatically restarted if the Time Navigator service or daemon is shut down and
then restarted. A suspended catalog can also be restarted manually using the Catalog-Start
menu.
Note:
The privileged user is the only user allowed to suspend the catalog.
Tip:
To suspend a catalog
1.
2.
In the catalog information area, select the catalog to suspend and choose
Catalog-Suspend.
52
All the catalog operations performed by the Catalog application are also available in
command line. See the tina_init and tina_odbsave commands, as well as the Catalog
Manual Procedures appendix in the Time Navigator Command Line Interface
guide for details.
Catalog Application
The Catalog Application allows you to back up the catalog contents. It is automatically
created when you create a catalog. Its name is: <catalog_name>.cat
Warning:
The Catalog application copies the catalog on the backup media and creates a small
meta-catalog file: the Boot Catalog. The boot catalog contains all the necessary information
to locate and restore the backed up catalog files. The boot catalog is saved on disk for ease
of access, in a directory named Boot in the Data.<catalog name> directory
The boot catalog files are named as follows: bootxxxx_<catalog_name>.cod
Using environment variables (see Available Environment Variables, page 55 for
details), it is possible to forward a copy of the boot catalog through email, and to perform
a duplicate (mirror) backup of the boot catalog.
The Catalog Application appears in Time Navigator Administration Console with the
following icon:
Chapter 2
Catalog Management
53
The Catalog Application is attached to a server. It is catalog specific, i.e., it can back up
only one catalog. However, you may have several Catalog applications located in the
same catalog. In this way, you can centralize backups of different catalogs into one
catalog.
The Catalog Application is not installed in the catalog it is backing up. It is installed
in a catalog belonging to a different server.
54
No filter is set
Once the application is created, you must define its environment variables and configure it
for automatic backups.
Configuring the Catalog Application backup consists in defining:
Warning:
The creation of the boot catalog takes place once the backup job is complete.
As a result, if a postprocessing is defined via the backup strategy, it will run
prior to the creation of the boot catalog and thus it will not perform any
operation on the boot catalog.
1.
2.
Chapter 2
3.
Catalog Management
55
Edit the fields of this interface as described in the following section, Catalog
Application Creation Parameters, page 55.
another host.
Application Name: Name of the application you want to create. The application name can be
User Name: Name of the user who has access to the application.
Password: Allows to provide a password and confirm it. Use of a password is optional.
If you do not remove the parenthesis, the variable will not be taken into
consideration.
56
Environment Variable
Name
Default
Value
Possible
Value
TINA_SDB_BOOT_HISTORY
any integer
TINA_SDB_CATALOG
Current
catalog name
Catalog
name
TINA_SDB_MAIL_TO
No default
value
Email
address
TINA_SDB_MAIL_FROM
tina@
atempo.com
Email
address
TINA_SDB_HOME
$TINA_HOME
Path
TINA_SDB_LIB_PATH
(Unix only)
No default
value
Path
TINA_SDB_MAIL_SERVER
No default
value
Server name
TINA_SDB_MIRROR_PATH
No default
value
Path
TINA_SDB_RECOVER
Yes
Yes, No
TINA_SDB_RESTORE_PAT
H
$TINA_HOME
/Bin
Path
TINA_SDB_SAVE_EVENTS
Yes
Yes, No
TINA_SDB_SAVE_HISTORY
any integer
Description
TINA_SDB_RECOVER = no
Chapter 2
Catalog Management
57
Environment Variable
Name
Default
Value
Possible
Value
TINA_SDB_SAVE_PATH
No default
value
Path
TINA_SDB_SERVICE_NAM
E
Current
Time Naviga
tor service
name
Service
name
TINA_SDB_SKIP_INDEX
No
Yes, No
Description
Environment variables can also be edited via Time Navigator Restore & Archive
Manager.
Open the Time Navigator Restore & Archive Manager corresponding to the application that you
need to edit variables for. Open the meta-tree and the Information directory. A list of
Information icons appears displaying all the variables that are available for the application.
The variables are represented in the following format:
VARIABLE_NAME = value
Status
Gray
Green
Orange
Red
58
Note
For some applications, it is mandatory to edit the TINA_APP_LIB_PATH environment variable. The environment variable must be edited via the
Time Navigator Administration Console when creating the application in
Time Navigator. This variable is needed for Time Navigator to connect to the
application.
Editing an environment variable in the Time Navigator Restore & Archive Manager
1.
Make sure that the user connected to the Time Navigator Restore & Archive
Manager is granted the General Tasks and Platforms rights (Administration tab in the
Access Control window).
For more information on users access rights, see the Time Navigator Administration Guide.
2.
3.
4.
If you assign an incorrect value to a variable, a red or orange icon (depending on the
severity) appears in the tree, followed by an error message. You can still access the list
of variables and modify the incorrect value with the procedure above.
Information on environment variables
Select the variable and choose Tree-Selection-Help to display information about the variable.
The Help window contains the variable description, the possible values and the default
value, if any.
Note
It is possible to copy and paste text from the Help window to the Properties
window.
Chapter 2
Catalog Management
59
1.
2.
Create a backup strategy. See Creating a Backup Strategy, page 301 for details.
Choose times and frequency for the catalog application backup. There is no
distinction between full and incremental backups, i.e., whether you schedule full or
incremental backups, all backups will be full.
Note:
Atempo recommends backing up the catalog daily, once the last backup job
has been completed.
3.
4.
1.
2.
You can also right click on the Catalog Application icon and select
Time Navigator Restore & Archive Manager. The following window
appears.
60
The Information directory contains details concerning the catalog and the environment
variables.
The Boot catalog directory contains the boot catalog files as well as the value of the
environment variables defining the directory path and history.
The Catalog save on disk directory contains the catalog backup disk copies, if any, as
Chapter 2
Catalog Management
61
well as the value of the environment variables defining the directory path and history.
Warning:
The Configuration directory contains the Time Navigator Adm and Conf directories and
allows to back up their contents. Since the Adm directory contains all the
Time Navigator events, it could be quite voluminous. It is thus recommended to
define a backup selection on the Adm directory using the same strategies as the backup
selection set at the root of the application, with the Compressed option enabled. Use
filters to exclude the Adm directory from the root backup (see Filter Syntax,
page 347).
If you do not want to back up the events, set the TINA_SDB_SAVE_EVENTS
environment variable to no.
For more information about the events and parameters files, see the Time Navigator
Administration Guide and the Time Navigator Installation Guide.
The Index directory contains the indexes allowing to perform advanced search of
backed up objects, for instance x2k_index if you are using the MS Exchange Single
Object Restore feature.
The Mirror boot catalog directory contains the mirror boot catalog files, if any, as well
as the value of the environment variables defining the directory path and history.
Warning:
62
When you back up another catalog on the same server, Time Navigator does not
create a boot catalog and does not display all the directories in Time Navigator
Restore & Archive Manager.
1.
2.
Choose Platform-New-Application.
3.
Select Catalog in the Application Type window. The New Application window appears.
4.
Fill in the fields and define at least the following environment variables. The value of
the variables must be that of the catalog to back up:
Mandatory Variables:
TINA_SDB_CATALOG
Optional Variables:
The following variables need to be set only if their value for the catalog to back up is
different from the value for the catalog performing the backup:
TINA_SDB_HOME
TINA_SDB_SERVICE_NAME
TINA_SDB_LIB_PATH (Unix only)
Repeat the operation until each catalog you want to back up has its own Catalog
Application.
5.
Chapter 2
Catalog Management
63
When you back up a remote catalog, Time Navigator does not create a boot
catalog and does not display all the directories in Time Navigator Restore &
Archive Manager.
1.
2.
Choose Platform-New-Application.
3.
Select Catalog in the Application type window. The New Application window will
appear.
4.
Fill in the fields and define at least the following environment variables. The value of
the variables must be that of the catalog to back up:
Mandatory Variables:
TINA_SDB_CATALOG
Optional Variables:
The following variables need to be set only if their value for the catalog to back up is
different from the value for the catalog performing the backup:
TINA_SDB_HOME
TINA_SDB_SERVICE_NAME
TINA_SDB_LIB_PATH (Unix only)
5.
Repeat the operation until each catalog you want to back up has its own Catalog
Application.
6.
Configure the application for automatic backup. See To configure the catalog
application, page 59 for details.
64
If you have performed some platform backups between the last catalog backup and the
moment the restore takes place, that data will not be restored since it is not included in the
catalog backup. However that data is written on cartridges, and can be retrieved via the
tina_cart command. Thus, you may want to close all cartridges to avoid overwriting that data
during future backups.
To do so, add the -close_cart option when you launch the tina_init command in the different
cases presented below.
Note:
Using this option closes all cartridges in the catalog. You will have to reopen them
manually if you want to reuse them.
In addition, if all cartridges are closed, make sure you have enough spare
cartridges in your library to handle the upcoming backups.
Chapter 2
Catalog Management
65
If your library has the capacity to read barcodes, the catalog restore process
automatically includes a barcode reinitialization.
If your library does not support barcodes, a read label reinitialization can
be included in the restore process if you use the following command:
tina_init -boot $TINA_HOME$/Data.<catalog_name>/Boot/
bootxxxx_<catalog_name>.cod -force_reinit
This option is only available for non barcode libraries, and it will trigger a
reinitialization of all non barcode libraries associated to the catalog.
Examples
Command to restore the democat catalog installed in a Time Navigator Library Sharing
Manager configuration:
tina_init -boot $TINA_HOME/Data.democat/Boot/boot0023_democat.cod -catalog_name
boot_democat
tina_init -boot $TINA_HOME/Data.democat/Boot/boot0023_democat.cod -catalog_name
boot_democat
tina_init -boot \%TINA_HOME%\Data.democat\Boot\
boot0023_democat.cod -catalog_name boot_democat
Command to restore the democat catalog and reinitialize the nonbarcode library
associated to democat:
tina_init -boot $TINA_HOME/Data.democat/Boot/boot0023_democat.cod -force_reinit
tina_init -boot $TINA_HOME/Data.democat/Boot/boot0023_democat.cod -force_reinit
tina_init -boot \%TINA_HOME%\Data.democat\Boot\
boot0023_democat.cod -force_reinit
Command to restore the democat catalog and close all cartridges in the catalog:
66
If the media pool containing the primary catalog backup is not available and you want to use
a multiple writing media pool, proceed as follows:
1.
2.
3.
Open Time Navigator Administration Console for the newly created boot_tina
catalog.
4.
5.
Open Time Navigator Restore & Archive Manager for the boot_tina.cat Catalog
application. Restore the catalog backup file you need.
6.
Stop the Time Navigator service or execute a tina_stop to shut down the daemon.
7.
8.
In the file:
$TINA_HOME/Conf/catalogs
$TINA_HOME/Conf/catalogs
%TINA_HOME%/Conf/catalogs.txt,
remove the 4 lines concerning the boot_tina catalog, and delete the Data.boot_tina
Chapter 2
Catalog Management
67
directory.
Note:
If your library has the capacity to read barcodes, the catalog restore process
automatically includes a barcode reinitialization.
If your library does not support barcodes, a read label reinitialization can
be included in the restore process if you use the following command:
tina_init -file $TINA_HOME/<restored_catalog_file>
-force_reinit
This option is only available for non barcode libraries, and it will trigger a
reinitialization of all non barcode libraries associated to the catalog.
1.
In Time Navigator Administration Console, select the Catalog Application icon for
the catalog to be restored and choose Platform-Time Navigator Restore & Archive
Manager.
or
Right click on the Catalog Application icon for the catalog to be restored and select
Time Navigator Restore & Archive Manager.
2.
In Time Navigator Restore & Archive Manager, open the file tree until you see the
file representing your catalog.
3.
4.
5.
6.
68
instance: /home/tina/Bin/newdoc.cod.
Note:
If you are using a key that does not include the catalog name, you must add
a name for the restored catalog as a parameter in the tina_init command:
tina_init -file <restored_catalog_path> -catalog_name <restored_catalog_name>
See the Time Navigator Restore Guide for details concerning restore procedures.
69
C H A P T E R
Platform Management
In this section you will find the necessary procedures to perform the following platform
related tasks:
70
About Platforms
The Platforms object represents the hosts and applications backed up by
Time Navigator. Host and application backup configuration and management are
centralized in Time Navigator Administration Console.
Hosts
Hosts are Time Navigator client machines; they represent the machines being backed
up. Authorized users can perform archiving on hosts. The following operating systems
are currently supported for hosts:
Windows
Unix
Mac OS X
NetWare
VMS
In addition to backing up, archiving and restoring the above client file systems,
Time Navigator provides the following features:
Applications
Applications include databases and application software. The applications currently
supported by Time Navigator are:
Chapter 3
Platform Management
71
of their actual physical location. See List Application, page 589 for details.
NetDisk (the Net Disk application allows you to back up and restore
Windows 2000/2003 mapped network drives). See Mapped Network Drives,
page 627 for details.
System State
72
Chapter 3
Platform Management
73
Mobile Platforms
For machines such as laptop computers that are subject to being disconnected from the
network regularly, Time Navigator includes a Mobile Platform feature, applying to both
host and application. This preventsthe server from trying to connect to an absent
platform, and ensures that if the platform misses a scheduled backup, the backup will run
as soon as it is reconnected to the network.
To configure a mobile platform, see Creating a Platform, page 74, and Backup
Strategy Window - Advanced Tab, page 306.
74
Creating a Platform
Creating a Host
Upon installing Time Navigator, the setup automatically creates a host in
Time Navigator Administration Console for each client machine declared in the
catalog. In addition, you can:
Note:
The number of hosts you can create is limited by the terms of your license.
1.
2.
3.
4.
The new host is displayed in the Network area and its icon in the Icons area. It constitutes
a new group.
For more information on host representation in Time Navigator Administration
Console, see Platform Representation, page 21.
Chapter 3
Platform Management
75
If you want to use aliases, you must declare the aliases in the hosts file. See
Time Navigator Configuration Files in the Time Navigator Installation
Guide for details.
Software Version: Time Navigator version installed on the host. When creating a host, the
version is "Unknown". The version is only available when editing the host. See Editing
Hosts, page 106 for more information.
Comment: Allows you to enter a comment concerning the host you are creating.
An error message is displayed if the host does not exist on the network or if it has already
been created.
76
The protocol corresponding to the selected host type is automatically checked. For most
hosts, the protocol will be TiNa 4.1.0.
For a Network Appliance host, the protocol will be NDMP and you will be asked to
specify a User name and Password.
Note:
Chapter 3
Platform Management
77
Backup Master: Select this option if you want to specify a backup master for the created
host. The backup master can either be the Time Navigator server or another host on the
network. If a backup master if selected, the binary used during backup will be running
on the master rather than on the host. This option can be very useful if a firewall is
present or if no binaries can be installed on the host.
Select the Server option or select the Host option, and enter the name of the host in the
Master Name textbox.
An error message is displayed if the selected host cannot be a backup master.
Note:
The Backup Master option will automatically be selected if the host type you are
creating requires a backup master. By default, the server will be the backup
master.
For more information on the backup master, see Firewalls and Backup Masters,
page 71.
Storage Node: Check this box if the created host is a storage node.
For more information on Time Navigator in a SAN environment, see Time Navigator
in SAN Environments, page 419.
78
Do Not Report Host Unavailability: If your host is a mobile platform, i.e., a laptop computer
or a machine frequently disconnected from the network, check this box, to prevent
Time Navigator from issuing an alarm each time the host is not found on the network.
To configure mobile hosts, see also Backup Strategy Window - Advanced Tab,
page 306.
Secured Agent: Check this box if you want to encrypt and secure Time Navigator network
connections between this host and other Time Navigator agents.
Note:
To secure network connections, you must have created at least one certificate.
See the Time Navigator Security & Compliance Manager guide for more
information.
Fill in the fields of the SAN Connection tab if the host you are creating is part of a SAN
environment and if you have already created at least one shared drive in Time Navigator.
Add: Allows you to associate the host to drives in a SAN environment.
Remove: Allows you to disconnect the host from the drives in a SAN environment.
Device Descriptor: Allows you to enter the device descriptor for the host.
Chapter 3
Platform Management
79
For more information on Time Navigator in a SAN environment, see Time Navigator
in SAN Environments, page 419.
Hosts on which a Time Navigator service or daemon is running and that are
unknown to the catalog.
Hosts that are known to the catalog but whose operating system has changed.
1.
Check whether a host icon appears in the status bar of Time Navigator
Administration Console. The number next to the icon indicates the number of
hosts detected on the network. In the example below, 2 new hosts have been
detected.
2.
Choose Platform-New-Hosts from list. The New Discovered Hosts window appears.
80
3.
In the host list, select the hosts that you want to declare in the catalog and create
in the Network area.
4.
Click on New.
The Host Creation Progress window appears and indicates if the creation was
successful.
5.
Click on Close. The newly created host appears in the Network area.
If you want to disable the automatic host detection feature, you can set the tunable
"Disable Host Automatic Detection" (disable_host_auto_discovery).
If you want Time Navigator to systematically create detected hosts in the catalog without
notifying the user via the graphical interface, you can set the tunable "Automatic Creation
for Detected Hosts" (create_auto_discovered_host).
See the Time Navigator Tunables guide for details.
Chapter 3
Platform Management
81
Marks the selected host(s) as Ignored. When marked as ignored, hosts disappear from the list.
If you want to display them again, check the Display hosts with "Ignored" status box.
Note:
Note:
Deleted hosts disappear from the host list but they will reappear as new each
time the machines are rebooted.
Display host with "ignored" status: Allows to display in the list the hosts that were marked as
Ignored.
New: Automatically creates the selected host(s) in the catalog.
Creating Applications
Just as you had to create a host per machine to be backed up, you must create an
application for each application to be backed up. The number of applications you can
create is limited by the terms of your license.
To create an application
1.
In the Network area, select the host where the application is installed.
2.
82
3.
Note:
Select an application in the list, then click on OK. The New Application Window
is displayed.
The fields appearing in this window varies according to the application you are
creating. The following screen is for an Oracle application.
Chapter 3
4.
Platform Management
83
Enter the name of the new application in the Application Name textbox. The
application name is the name given to the application backup folder.
The application name can be edited at a later date if needed without losing backups.
Warning:
5.
Enter the application owner information in the Owner textbox. Click on Password to
enter a password and confirm it.
The owner is usually the operating system user who installed the application
software.
6.
Enter the access user information in the Access User textbox. Click on Access
Password to enter a password and confirm it.
7.
Enter the Environment Variables required for the application you are creating.
8.
9.
For application specific information, see the guide corresponding to the application you
are creating, such as Time Navigator for Oracle, Time Navigator for NDMP, etc.
84
Enabling Platforms
When first created, a platform (host or application) is disabled. A platform must be
enabled to support a backup.
To enable a platform
1.
2.
Select the platform to enable in the list or fill in the Search field to filter platforms
according to their names.
You can use, among others, the following special characters:
3.
Click on OK to validate.
Tip:
If you have only one platform to enable, you can also right click on the
platform icon and choose Enable.
If you have a lot of platforms to enable, it is recommended to use the
Platform-Use-Enable-Host/Application menu because it allows for platform
multiple selection.
The cross with an ocher background disappears from the host icon in the Network area.
The host icon is displayed with a green background in the Icons area.
Disabling Platforms
The disabled status indicates that no backup occurs on the platform. You can temporarily
disable a platform for the following reasons:
Chapter 3
Platform Management
85
Devices connected to a disabled host, can still be used, provided that the
tina_daemon process is active on the host.
To disable a platform
1.
2.
Select the platform to disable in the list or fill in the Search field to filter platforms
according to their names.
You can use, among others, the following special characters:
3.
Click on OK to validate.
Tip:
If you have only one platform to disable, you can also right click on the
platform icon and choose Disable.
If you have a lot of platforms to disable, it is recommended to use the
Platform-Use-Disable-Host/Application menu because it allows for platform
multiple selection.
A cross with an ocher background is displayed on the host icon in the Network area.
The platform icon is displayed with an ocher background in the Icons area.
86
Tunables, page 87
License, page 99
1.
Select the platform for which you want to set preferences in Time Navigator
Administration Console.
2.
Chapter 3
Tip:
Platform Management
87
You can also use the tina_pref command on Unix and the Start-All Programs-Time
Navigator-Utilities-Preferences menu on Windows.
Tunables
Tunables are special parameters that modify Time Navigator behavior. They may be
used to tune the application to fit specific needs.
The Preferences tools allows you to:
88
Note:
When you set tunables via the Preferences tools, settings are recorded in the following
file:
%TINA_HOME%\Conf\parameters.txt
$TINA_HOME/Conf/parameters
Note:
Category I: Basic tunables that can be used without help from Customer Services.
Category II: Advanced tunables that must be used with help from Customer
Services. Use them cautiously as an inconsiderate use may damage your
configuration and prevent Time Navigator from efficiently protecting your data.
The Time Navigator tunables are dynamic. No restarting of the
Time Navigator service is required. However, if you modify a tunable
impacting a graphical application, the application must be closed an opened
again for the new tunable to be taken into account. See the Time Navigator
Tunables Guide for details.
To set a tunable
1.
2.
Click on New. The Tunable Selection window appears. It displays the list of all the
tunables available. To display the list of advanced tunables, check the Show
Advanced Tunables box. When you select a tunable, its description appears in the
right pane.
3.
Open a category and select a tunable in the list and click on OK. A tunable
information window appears.
4.
In the Value tab, enter the tunable value in the New Value field, and click on OK. The
default value is also displayed. Click on Reset to return to the default value.
Chapter 3
5.
Platform Management
89
In the Executables tab, check Choose Executables if you want to limit the use of the
tunable to specific binaries or if you want to assign different values to this tunable
for different executables. Select the executables you want in the list.
Note:
By default, if you do not select any executable, the tunable applies to all
executables.
If the executable you want to select does not appear in the list, click on New
Executable and enter the name of the executable.
6.
In the Catalogs tab, check Choose Catalogs if you want to limit the use of the tunable
to specific catalogs or if you want to assign different values to this tunable for
different catalogs. Select the catalogs you want in the list.
Note:
By default, if you do not select any catalog, the tunable applies to all
catalogs.
If the catalog you want to select does not appear in the list, click on New Catalog
and enter the name of the catalog.
7.
The new tunable appears in the Current Tunable List with its value, the binaries
and the catalogs chosen.
8.
Repeat this operation for all the tunables you want to define on the platform. If you
want to assign different values to the same tunables according to the binaries or
catalogs it applies to, you need to define it several times, for each value.
9.
Click on Apply if you want to apply your choices and keep the Preferences window
open, otherwise click on OK.
1.
2.
Select the tunable that you need to modify and click on Properties . The Tunable
information window appears.
3.
Modify the Value, Executables and Catalogs tabs as needed. See To set a
tunable, page 88 for details.
4.
90
To remove a tunable
1.
2.
Select the tunable that you want to remove and click on Remove.
3.
4.
Event Notification
Time Navigator Event Viewer consists of all the logs generated by Time Navigator.
They are used to troubleshoot incidents that occur with any Time Navigator function
or process. They can be consulted either through Time Navigator Event Viewer or in
the file:
%TINA_HOME%\Adm\event.txt
$TINA_HOME/Adm/event
Events can be redirected towards external elements. You can specify the catalog, the
type of events you want to redirect, as well as the kind of information to be displayed
for each event. Using this Event Notification editor fills in the file:
%TINA_HOME%\Conf\logs.xml
$TINA_HOME/Conf/logs.xml
DTD and XSL are provided with the logs.xml file in the Conf directory:
The logs.dtd file can be used to check for the validity of the xml file.
The logs.xsl stylesheet can be used to view the contents of the logs.xml file via a
browser without using Time Navigator.
Warning:
Several event notifications can be defined on the same Time Navigator Server.
To create an event notification:
1.
Select Event Notification in the tree structure of the Preferences tool. The list of
current notifications appears. It contains the names of event notifications that are
already set on your Time Navigator Server.
Chapter 3
Platform Management
91
2.
3.
Destination Tab
Mode: Specifies the output mode to be used. You must choose one of the following:
System Logs sends the output to the internal log system under Unix (syslog), VMS
(central operator) and Windows (Event Viewer).
SNMP (Simple Network Management Protocol) sends the output to SNMP on Unix
and Windows.
SNMP Manager: specifies the SNMP manager machine which must have a daemon
Note:
Command sends the output to a command line or a script on Unix and Windows.
Command Path: specifies the absolute path of an executable or a script file.
Click on Browse (...) to provide the absolute path of an executable or a script file.
If several Time Navigator environments are present on the machine, you must
specify the following command line options to be able to use the "command"
output along with Time Navigator commands:
-tina <environment_name> and -tina_service_name <service_name>.
92
Time Navigator service is running or as long as you do not click on the OK button
to close it.
For instance, you can send an email to the administrator each time a critical or
major alarm is issued.
SMTP Server: specifies the name of the SMTP server.
From: specifies the name of the email sender.
To: specifies the name of the recipient.
Cc: specifies the names of other recipients if any.
Subject: specifies the subject of the email.
Name Tab
Name: Name of the event notification that you are creating. By defalut, the name is
NOTIFICATION_<number>.
Comment: Description identifying the event notification.
Severity Tab
Notified Severity Levels: Types of severity levels that you want to notify.
Click on the column left of the Severity list to select the severity levels to notify.
Format Tab
Event File Format: specifies the private format of the event file. It enables you to create event
sub-files based on filters. The notified events can be viewed via Time Navigator Event
Viewer.
Chapter 3
Platform Management
93
Customized Format: specifies the types of information that you want to notify.
Click on the column left of the Format list to select the information types to notify.
Alarm Object Name: The name of the object with which the alarm is associated. If the
object is a library named takata_vls, the alarm object name will be takata_vls. Only
Alarm Object Type: The type of the object with which the alarm is associated (drive,
library, host, application, job, etc.). Only available when an alarm is notified.
Process ID: The identification number of the process which has generated the event.
Job ID: The identification number of the job associated with the event.
Logging Date: The date the event is recorded in the server event file.
Severity Short Name: The event severity level abbreviated with letters.
I for Info
W for Warning
A for Acct
E for Error
D for Debug
F for Fatal
Severity Long Name: The event severity level. For having the list of severity levels,
User Name: The name of the user associated with the event.
Server Name: The name of the catalog server associated with the event.
Function: The name of the function that has generated the event (debug
information).
Class Tab
Notified Classes: Types of classes that you want to notify.
Click on the column left of the Class list to select the class types to notify.
94
Fuzzy Object: Events related to a fuzzy object, for instance an object modified while
Secure Event: Events related to security and compliance operations. See the
Non Uncompressed Object: Events related to objects that are restored but not
uncompressed.
End User: Events easily understandable designed to help the user in case of error
during Time Navigator execution.
Note:
The number of logs concerning fuzzy object encountered when a job is being
performed has been limited by default to 20, to avoid slowing down
performances. You can use the accounting_max_fuzzy_objects tunable to specify
how many fuzzy object logs should be kept in the event file (see the
Time Navigator Tunables guide for details.)
Filter Tab
Filters can be used to specify selection criteria when notifying event information. Enter
the name(s) of the objects you want to filter in the corresponding fields.
These fields accept lists. If you want to specify several names inside the same field, they
must be separated by a blank. They also accept wildcards (* to specify any character from
0 to n and ? to specify any single character).
If no filter is mentioned, all events are notified.
Chapter 3
Platform Management
95
The Alarm Filter tab is only displayed when an alarm severity level is selected in the Severity
tab (minor, major or critical alarms).
Alarm filters can be used to specify selection criteria when notifying alarm information.
Enter the name(s) of the objects you want to filter in the corresponding fields.
These fields accept lists. If you want to specify several names inside the same field, they
must be separated by a blank. They also accept wildcards (* to specify any character from
0 to n and ? to specify any single character).
If no filter is mentioned, all alarms are notified.
1.
Select Event Notification in the tree structure of the Preferences tool. The list of
current notifications appears.It contains the names of event notifications that are
already set on your Time Navigator Server.
2.
3.
4.
1.
Select Event Notification in the tree structure of the Preferences tool. The list of
current notifications appears.It contains the names of event notifications that are
already set on your Time Navigator Server.
96
2.
3.
4.
Check Disable.
5.
1.
Select Event Notification in the tree structure of the Preferences tool. The list of
current notifications appears.It contains the names of event notifications that are
already set on your Time Navigator Server.
2.
3.
Domain Filters
Note:
Hosts
Media pools
Users
Applications
host
This indicates that access control to the domain is at the host level. A list of host
is defined. Only the hosts defined in this list can access the domain and view the
objects belonging to this domain. In addition these hosts are the only hosts
appearing in the domain.
host_user
This indicates that a second level of access control is added, according to the user.
Chapter 3
Platform Management
97
A list of host and a list of users are defined. Access can only be granted for users
belonging to the list and connecting from a host defined in the list. In addition the
hosts and users defined in the lists are the only ones appearing in the domain.
Note:
When you define a new domain in the Preferences, the tunable is automatically
set to the value host. To set it to the value host_user, you must edit the tunable
value as described in Tunables, page 87.
See also the Time Navigator Tunables guide for more information on tunables.
A domain filter consists of the following parameters:
In a domain, the parameter ...
defines ...
Privileged
Administration
Pools
Users
Application
1.
When the filtering is enabled, only the machines declared in the file can connect
to the catalog. This means that an undefined host cannot be backed up.
2.
The following objects are always accessible from every client of a catalog:
98
The drives and libraries, if the host to which they are connected is accessible
3.
The Time Navigator Server has a privileged access to all the objects in all its
catalogs.
4.
When the filtering is enabled, the server host file must contain the information
required to correctly define all the clients which can connect to the catalogs,
especially concerning the machines DNS extensions. The server must be able to
link the network name sent by the client and the host name defined in the domain
filter.
5.
When the filtering is enabled and you want to create a new object in the catalog,
the domain must be updated prior to the object creation.
6.
The IP Address
1.
In the Preferences tool, select Configuration-Domain Filters and click on New. The
Domain Parameters Window appears.
2.
Click on Connection to get the hosts, pools, users and applications information
appear in the corresponding tabs.
Chapter 3
3.
Platform Management
99
In the Priviledged tab, click on New and provide the IP address of the machines
allowed to access all the objects in the catalog. Click on OK. Repeat this operation
for all concerned hosts.
Note:
These machines cannot be viewed from the domains, unless they are
defined in it as hosts.
4.
In the Administration tab, click on New and provide the IP address of the domain
administration consoles. Click on OK.
5.
In the Host tab, click on New and select the host allowed to access the domain and
to be included in the domain, from the list.
Click on OK.
6.
In the Pools tab, click on New and select the media pools to be included in the
domain from the list. Click on OK.
7.
In the Users tab, click on New and select the users to be included in the domain
from the list. Click on OK.
Note:
In addition, if you want to restrict access to the domain to the users you
define in this tab, you must set the value of the tunable domain_filters to
host_user. See Tunables, page 87 for details.
8.
In the Applications tab, click on New and select the applications to be included in the
domain, from the list. Click on OK.
9.
License
Note:
Modifying the license concerns Time Navigator servers only, not agents.
The License preferences shows you the license mode you are currently using as well as
the license contents, and allows you to modify it.
If you are using an evaluation license, you can switch to using a local or remote license
server. If you are already using a license server, either local or remote, you cannot switch
to using an evaluation license.
100
1.
2.
3.
Note:
Provide the path of the atempo.lic license file that you received by mail from
Atempo administrative services.
The Service button allows you to stop and start the Atempo License Manager
service.
4.
Services
Note:
You can modify the TCP and UDP port numbers that you defined when installing
Time Navigator.
To modify Time Navigator Service parameters
1.
2.
3.
On Unix machines, click on Search from Service Name to automatically select the TCP
and UDP port associated to the specified service in the etc\services file of the local
machine or NIS.
Chapter 3
4.
Platform Management
101
Note:
Note :
Catalog
Catalog configuration allows to modify the list of catalogs that can back up the agent.
To modify the catalog list
1.
2.
Click on the catalogs to add them to the list of catalogs that will back up the agent.
3.
4.
If the catalog you want to add does not appear in the list, click on Add a Catalog and
provide the following information:
5.
Help/Tutorial
Note :
The Help/Tutorial preference concerns Time Navigator Unix servers only, not
Windows servers, and not agents.
For theses platforms, you can choose the browser to use to view the online help and
tutorials. In addition, if the setup program is unable to detect a default browser, you must
configure it with the Preferences tool.
To configure the browser to use to view the online help and tutorial
1.
102
2.
3.
Enter the path of the browser you want to use or click on the Browse button to select
it.
4.
Web Interfaces
Note:
The Web interfaces preferences allow you to specify whether you want to use Atempo
Web Server or another Web server to access Time Navigator Web Restore and Time
Navigator Web Supervision.
By default, an Apache server is installed along with Time Navigator, however this
server is not in service until you configure it.
To configure Atempo Web Server
1.
2.
3.
4.
1.
2.
3.
Chapter 3
4.
5.
Note:
Platform Management
103
Description
Status
Databases
The databases parameters allow you to set the installation directory (Windows) or the
name of the administrator (Unix) for the following Time Navigator applications:
Sybase
DB2 V7
DB2 V8
1.
2.
Check the application for which you want to set the parameters.
3.
Enter the path of the installation directory or click on Browse to select it (Windows),
or enter the name of the administrator (Unix).
104
4.
Note:
Advanced Indexing
Note:
Use the SER parameter to configure the Single Email Restore feature of the
Time Navigator for MS-Exchange application. This parameter lets you define the Path
of the index database.
To configure Time Navigator for MS-Exchange Single Email Restore feature
1.
2.
3.
Enter the path where you want the indexing database to be located or click on
Browse to select a directory.
4.
Note:
NDMP
Note:
1.
2.
Chapter 3
3.
4.
Note:
Platform Management
105
VMware
Note:
1.
2.
3.
Enter the Name you want to give to the Configuration File. The extension .conf is
automatically appended to this name.
4.
Enter the Name of the Virtual Center (the machine in your VMware network that
handles administrative tasks).
5.
Enter the Name of the User of the Virtual Center, and his/her Password.
6.
Note:
See the Time Navigator for VMware with VCB guide for details.
106
Editing Platforms
Editing Hosts
Editing a host enables you to modify the following parameters:
The Type.
The Protocol.
Editing a host also enables you to view the Time Navigator Software version that is
installed on the selected host.
To edit a host
1.
2.
3.
4.
The Backup Master option cannot be deselected if the host type requires it.
Editing Applications
Editing an application enables you to modify the following parameters:
The Username.
The Password.
1.
Chapter 3
Platform Management
107
2.
3.
Modify the application settings: the application name, the username, the password
and the environment variables. See Creating Applications, page 81 for details.
4.
108
Deleting Platforms
Deleting a platform removes the platform from the network backed up by
Time Navigator. The backup strategies and selections associated with the platform are
lost and all the backed up files are removed from the catalog.
When deleting a host, you can create an archive folder carrying the name of the deleted
host (i.e., host.hostname). All backed up files are thus kept in the folder and can be
recovered from any other host. The folder belongs to the root or Administrator user.
When you delete a host, the devices connected to this host are also deleted.
Note:
The archive folder host.hostname uses media associated with the host strategies.
If the media have a recycling policy, the archive folder will be purged
progressively.
For more information on restoring archived files, see the Time Navigator Archiving
Server guide.
To delete a platform
1.
2.
3.
Chapter 3
Platform Management
109
Note:
It is recommended to wait until the platform backups are finished, and to delete
its backup strategies before removing the platform from the network.
110
Ignore the newly detected hosts so that they no longer appear as new. For example,
if the host is already known to another Time Navigator catalog and you do not
want to declare it in the working catalog.
Delete the newly detected hosts from the list. Deleted hosts will reappear as new
whenever the machine is rebooted.
1.
Check whether a host icon appears in the status bar of Time Navigator
Administration Console. The number next to the icon indicates the number of
hosts detected on the network. In the example below, 2 new hosts have been
detected.
2.
Choose Platform-Nex-Hosts from list. The New Discovered Hosts window appears.
3.
In the host list, select the hosts that you want to discard permanently from the
working catalog and click on the arrow icon on the right.
Such hosts disappear from the host list. If you want to display them again, check
the Display hosts with "Ignored" status box. They will appear in the list with the Ignored
status. This allows to create them at a later stage if needed.
4.
1.
Choose Platform-New-Hosts from list. The New Discovered Hosts window appears.
2.
In the host list, select the hosts that you do not want to declare in the catalog now
and click on the cross icon on the right.
Such hosts disappear from the host list. They will reappear as new each time they
are rebooted.
3.
Chapter 3
Platform Management
111
Name: Name of the host as defined when the host was created.
Comment: Comment concerning the host if you entered one when you created the
host.
112
Note:
See the Time Navigator Security & Compliance Manager guide for
details.
Properties: Opens the Host Properties window for a single selected host.
Tip:
You can also double click on a host in the list to open the Host Properties
window.
Modify Status: Opens the Host Status window to modify the Enabled/Disabled status for
all the selected hosts.
Modify Parameters: Opens the Host Parameters window to modify parameters for all the
selected hosts.
Modify Comment: Opens the Host Comment window to modify the comment of all the
selected hosts.
Delete: Allows to delete all the selected hosts.
Note:
A message box ask you if you want to create archive folders to archive the
hosts backup files.
1.
2.
Browse through the list and click on Close when you are done.
Chapter 3
Platform Management
113
1.
2.
3.
4.
Click on OK. The exported file is created in the location you specified.
5.
Click on Close in the Host List window when you are done.
Editing a Host
Note:
To edit a host
1.
2.
Select the host you want to edit and click on Properties. The Host Properties window
appears. Modify the parameters as needed and click on OK to apply the
modifications. See Creating a Host, page 74 for details.
3.
4.
Click on Close in the Host List window when you are done.
1.
2.
Select the hosts for which you want to change the status and click on Modify Status.
The Host Status window appears.
3.
4.
Click on Close in the Host List window when you are done.
114
1.
2.
Select the hosts for which you want to modify parameters and click on Modify
Parameters. The Host Parameters window appears.
3.
4.
Click on Close in the Host List window when you are done.
hosts.
Do not report Host Unavailability: This parameter must be checked if hosts are mobile.
Modify Storage Node Status: Check this box if you want to modify whether or not hosts are
storage nodes.
Storage Node: This parameter must be checked if hosts are storage nodes.
Modify Compliance Status: Check this box if you want to modify whether or not hosts are
secured.
Secured Agent: This parameter must be checked if hosts are secured hosts.
See Host Window - Advanced Tab, page 77 for details concerning these host
parameters.
1.
2.
Select the hosts for which you want to change or add a comment and click on Modify
Comment. The Host Comment window appears.
Chapter 3
Platform Management
3.
Enter a comment and click on OK to apply the comment to all selected hosts.
4.
Click on Close in the Host List window when you are done.
115
Deleting Hosts
To delete hosts
1.
2.
3.
A message box appears asking you if you want to create archive folders to archive
the hosts backup files. Click on Yes if you want to archive the contents of the
deleted hosts backup folders. Otherwise, click on No.
Note:
Archiving the hosts backup files will allow you to restore them should
you need to at a later date.
116
Name: Name of the application as defined when the application was created.
Comment: Comment concerning the application if you entered one when you created
the application.
Properties: Opens the Application Properties window for the selected application.
Tip:
You can also double click on an application in the list to open the Application
Properties window.
Modify Status: Opens the Application Status window to modify the Enabled/Disabled status
1.
2.
Browse through the list and click on Close when you are done.
1.
Chapter 3
Platform Management
2.
3.
4.
Click on OK. The exported file is created in the location you specified.
5.
Click on Close in the Application List window when you are done.
117
Editing an Application
Note:
To edit an application
1.
2.
Select the application you want to edit and click on Properties. The Application
Properties window appears. Modify the parameters as needed and click on OK to
apply the modifications. See Creating Applications, page 81 for details.
3.
4.
Click on Close in the Application List window when you are done.
1.
2.
Select the applications for which you want to change the status and click on Modify
Status. The Application Status window appears.
3.
4.
Click on Close in the Application List window when you are done.
1.
118
2.
Select the applications for which you want to change or add a comment and click
on Modify Comment. The Application Comment window appears.
3.
Enter a comment and click on OK to apply the comment to all selected applications.
4.
Click on Close in the Application List window when you are done.
Deleting Applications
To delete applications
1.
2.
3.
A message box appears asking you to confirm your choice. Click on Yes if you
want to delete the applications, otherwise, click on Cancel.
119
C H A P T E R
User and Access rights can be defined under the Security menu.
In order to define or modify default or personal access rights for Time Navigator
users, you must be logged in as the Time Navigator privileged user (the Security User Access Rights menu which you must use to perform this operation, only appears
when you are logged in as the privileged user).
Any user who has the right to access Time Navigator Administration Console
and manage user groups can: create a user and modify his password, create user
groups, associate users with a group, remove users from a group.
Any user can be declared as a Time Navigator user even if the user does not exist
at the operating system level.
120
Access to platforms.
Platform Access
Platform access is based upon rights defined at the operating system level. To be able to
see the contents of a platform in Time Navigator Restore & Archive Manager, a user
must have the permission to access that platform. A login will thus be required each time
the user wants to display a platform in Time Navigator Restore & Archive Manager.
The MAC OS X user with administration rights can access all files.
Chapter 4
121
Privileged User
The Time Navigator privileged user name is defined by the administrator when a catalog
is created.
The privileged user is the only user allowed to define the access rights of other users.
Defining rights is performed via the User-Access menu. This menu is only available to the
privileged user and is hidden or dimmed for any other user.
By default, the privileged user has the rights to perform any operations except editing the
catalog or creating another catalog. Editing or creating a catalog can only be performed
by the root or Administrator user. The privileged user's rights cannot be modified and
he can be neither deleted nor removed from a user group. Changing the identity of a
catalog privileged user can only be performed by editing the catalog. The former
privileged user is then assigned default user rights.
Users Known to the Catalog
Users known to the catalog have been individually declared in the catalog. They may
have a password and they may have been assigned specific rights. Once a password is
declared for a user, that password is required each time the user wants to connect to the
catalog. If no specific rights have been defined for a known user, that user access is
limited to the default access right.
Users Unknown to the Catalog
By default, other users only have archiving and restoring rights (provided that they have
the necessary operating system access rights to the files they want to archive or restore).
They do not have the right to open Time Navigator Administration Console.
Some users may be granted the right to open Time Navigator Administration Console
and to manage user groups. They can create, edit, delete users (except the privileged
user) and user groups, move users to another groups, modify user passwords.
To declare users, define users rights and set paswords, see User and Access Rights
Operations, page 123.
System Users
Privileges need also to be defined for system users that have to issue Time Navigator
command lines.
For instance, the system user must be the root user (on Unix systems) or must have at
least the backup operator rights (on Windows systems) or administrators rights (Mac
OS X systems) to execute the tina_export command.
122
For more information on system user rights with command line, see the Time Navigator
Command Line Interface guide.
For more information on how to add a system user in a user group, see Editing a User,
page 130.
User Groups
User groups are used to perform archiving, and to define personal access rights for users.
A user must belong to a group before he can be granted personal access rights.
Users belonging to a user group are authorized by the administrator to archive data with
the drives allocated to their group. When users need to label a cartridge, archive or
extract archives from a local archiving folder with Time Navigator Restore & Archive
Manager, they must choose one drive in the list of available drives allocated to their
group. The administrator thereby controls the drives a user has access to.
A user cannot belong to several groups at once but a user can be moved from one group
to another.
To create or edit a user group, see Creating a User Group, page 133 and Editing a
User Group, page 134.
For more information on local archive folders, see the Time Navigator Archiving
Server guide.
Chapter 4
123
1.
2.
3.
Click on the tab of the access rights category you want to modify and check the
access rights you want to grant to the default users. See Defining Personal Access
Rights, page 123 for details concerning the different access rights.
4.
Click on OK to validate.
Note:
In order to take your modifications into account, you must restart the
applications.
You can only grant personal rights to a Users Known to the Catalog.
1.
2.
3.
Select a user in the list, and click on OK. The Access Control window appears. The
name of the selected user is displayed in the upper part of the window.
124
4.
Choose between:
Share Default Access Rights: Allows the selected user to share all the default
access rights.
Define Personal Access Rights: Allows to define customized access rights for the
selected user.
5.
Click on the tab of the access rights category you want to modify and check the
access rights you want to grant to the default users.
6.
7.
Check Copy Default Access Rights if you want to apply all the access rights
Chapter 4
8.
Note:
125
Click on OK to validate.
In order to take your modifications into account, you must restart the
applications.
Process alarms. If the user does not have the Administration right, the Alarms
window is reachable via Time Navigator Library Manager, but in a read-only
mode.
Process jobs via Time Navigator Job Manager. If the user does not have the
Administration right, he can only modify his own jobs.
Also allows to use administration objects (such as platforms, drives, libraries, media,
users, etc.).
Note:
To create, edit or delete objects, it is also necessary to have the access right to
the specific object.
Platforms: Allows to create, edit, delete platforms (hosts and applications) and to enable
or disable platforms.
Drives: Allows to create, edit, and delete manual or robotized drives.
Media Pools: Allows to create, edit, and delete media pools. Also allows to associate media
a library in Time Navigator Administration Guide and define a cleaning slot via
Time Navigator Library Manager.
126
User Group Management: Allows to create, edit and delete users and user groups. Also
If a user does not have this right but has the overall Administration right, he
will be able to change identity and modify his password.
All: Provides cartridge administrator rights. The user has complete access to all the
Note:
User's Only: Allows the user to perform operations on his own cartridges only.
This level of allowed cartridge does not allow the user to duplicate cartridges.
This right is not required to give the user access to media pools during backup
or restore operations.
None: The user cannot perform any cartridge operations.
Mount Request Operator: Allows to perform requests to mount cartridges. Allows to have
access to Time Navigator Media Request Console. Allows to move cartridges within a
library (Time Navigator Library Manager). Allows to bring cartridges on/off line
(Time Navigator Library Manager). Allows to empty drives (Time Navigator
Administration Console and Time Navigator Library Manager).
Drive Use: Allows to perform all operations on drives (identifying contents, cleaning and
testing). Also allows to enable/disable drives.
Note:
The user must have the Drives permission defined in the Administration tab.
Note:
The user must have the Library permission defined in the Administration tab.
Chapter 4
127
Note:
Choose the Destination Directory: Allows to select a destination directory other than the
Note:
Archive Administrator: Gives the user archive administrator rights. The user has access to
128
restore operations.
Security Templates (create, delete): Allows to manage security templates.
Rules (create, delete):
Archive Manager.
Connect to any Platform via Time Navigator Restore & Archive Manager: Allows to view the file
Hidden: The user only views the menus he has access to.
Chapter 4
129
Dimmed: The user views all the menus but the ones he cannot use are dimmed.
Creating a User
Creating users consists in declaring them in the Time Navigator catalog. The users can
either be known to the machine operating system or not. Users specific to
Time Navigator can be created in order to enhance catalog security. You may grant
specific access rights to the users you create. See Defining Personal Access Rights,
page 123 for details.
To create a user
1.
Use a login that allows for User Group Management to connect to the catalog.
2.
3.
Enter a name for the user or click on User Name to select from the list of operating
system users.You can use the following characters:
Underscore _.
Backslash "\".
Note:
Warning:
130
4.
Click on Password to define and confirm a password, if needed. The password uses
alphanumeric characters.
5.
6.
Click on Group to associate the user with a user group. The list of the user groups
available in Time Navigator appears. Select a group in the list, then click on OK.
Note:
7.
A user must belong to a group. Even if you have not yet created any
group in Time Navigator, the system group is available by default.
Click on OK to validate.
Tip:
You can also create a user when you create or modify a user group using the
Security-User Group-New and Security-User Group-Properties menus. However, you
cannot use these menus to define a password for the new user. You must choose
the Security-User-Properties command to define a password if any. See Creating
a User Group, page 133 for details.
Editing a User
Editing a user allows you to modify the following settings:
Note:
The privileged user can only belong to the system group which is
automatically created when a catalog is created. The group of the
privileged user cannot be changed.
To edit a user
1.
Use a login that allows for User Group Management to connect to the catalog.
Chapter 4
131
2.
3.
Select a user in the list, then click on OK. The User Properties window appears.
4.
5.
Click on OK to validate.
Time Navigator automatically updates the User Group Properties window if you have
modified the group the user belongs to.
Deleting a User
Deleting a user from the Time Navigator catalog removes all his media, and therefore
all his archived files, from the catalog. The operation can be quite lengthy.
To delete a user
1.
Use a login that allows for User Group Management to connect to the catalog.
2.
Choose Security-User-Delete. The User Selection window appears. It contains all the
users available in the active catalog.
3.
Select the user to be deleted in the list, then click on OK. A dialog box prompts
you to confirm your decision.
4.
The deleted user is automatically removed from the group he belonged to.
To modify the password of the privileged user, you must be logged in as the
privileged user.
To modify or define the password of any user (except the privileged user), the
catalog login must allow for User Group Management.
To modify or define the password of the user currently connected to the catalog
does not require any specific rights.
1.
Use the login appropriate to the user type you want to edit.
2.
132
3.
4.
In the User Properties window, enter the new password, confirm it and click on OK.
You can use the following characters:
Tip:
Any letter.
Underscore _.
You also have the option to define a users password when you create the user.
See To create a user, page 129.
1.
2.
3.
4.
Click on OK to validate.
The identity of the new user appears in the status bar in the lower part of Time Navigator
Administration Console.
Chapter 4
133
A user cannot belong to several groups at once. However, a user can be moved
from one group to another.
1.
Use a login that allows for User Group Management to connect to the catalog.
2.
3.
Enter the name of the new user group in the Group Name textbox
(ex: accounting).
4.
If you enter the name of a user that does not exist, Time Navigator creates
the user.
134
If the user you enter already belongs to another group, Time Navigator asks
you if you want to change the group of that user.
Note:
Do not remove a user from his old group before adding him to the new
one. Otherwise the user will loose all his archives.
If you mistakenly add a user to the group, click on Remove to delete that user
from the group.
Click on Add in the Drives area to associate a drive with the user group. The list of
drives available in Time Navigator is displayed. Select a drive in the list, then click
on OK.
If you mistakenly add a drive to the group, click on Remove to delete that drive from
the group.
6.
Click on OK to validate.
The created user group is automatically displayed in the User Groups tab of the Drive
Properties window with which it is associated.
When editing a user group, a system user can be added to a Time Navigator user group
with the Add button. This button will display the users of the operating system or of the
entire domain if a domain has been defined. The system user will have to be added into a
group in order to give him privileges for Time Navigator operations, especially for
issuing command lines (ex: tina_export).
To edit a user group
1.
Use a login that allows for User Group Management to connect to the catalog.
2.
Chapter 4
135
3.
Select a user group in the list, then click on OK. The User Group Properties window
appears.
4.
Add and/or Remove users and drives as described in Creating a User Group,
page 133.
5.
Click on OK to validate.
Time Navigator automatically updates the User Groups tab of the Drive Properties window
according to the modifications made in the Drives area.
1.
Use a login that allows for User Group Management to connect to the catalog.
2.
3.
Select a user group in the list, then click on OK. A dialog box prompts you to
confirm your decision.
4.
The deleted user group is automatically removed from the User Groups tab of the Drive
Properties window with which it was associated.
136
137
C H A P T E R
This section describes all the objects you need to manipulate in order to manage your
media as well as the various operations that can be performed on these objects:
Note:
All the procedures shown in this section are available via Time Navigator
Administration Console. Be aware however, that many media operations can
also be performed via Time Navigator Library Manager. See
Time Navigator Library Manager, page 237 for details.
About Devices
The term Devices designates Libraries and Drives.
138
Virtual systems that emulate the physical structure on a hard disk, using files
to represent the cartridges. Time Navigator has a proprietary Virtual Library
System, managing access to the library files on disk directly.
Drives connected to the libraries to manage data transfer between the cartridges in
the library slots and the file systems of the protected computers.
Physical and virtual libraries and drives used for backup and restore of data with
Time Navigator need to be recognized and declared within it. This can be done
automatically or manually.
Time Navigator provides four interfaces to assist you with this process at various levels
of detail and expertise:
Device Detection Wizard: Detects and declares your libraries and drives automatically,
Device Configuration Manager: Detects your libraries and drives automatically, and
provides interfaces for you to edit defaults and alter configuration details before
deciding which devices to declare.
Library - New or Properties: Advanced setup of Libraries, particularly useful for setting
up Time Navigator Virtual Library Manager. Also needed for manual
configuration of libraries not recognized by Time Navigator.
Drive - New or Properties: Advanced setup of Drives and association with Libraries, for
cases where drives are not recognized by Time Navigator Device Detection.
Chapter 5
139
You have physically installed your backup network hosts and devices.
You have installed a Time Navigator 4.2 server on a host, or upgraded a host to
4.2 from an earlier version of Time Navigator.
You are launching Time Navigator Administration Console for the first time on
a given environment.
Time Navigator detects that there are not yet any devices declared in your system. The
Administration Assistant window appears for the purpose of guiding you through the various
declaration options that are open to you:
Devices are essential to the running of Time Navigator for backup and restore
operations. Three options are available to you for handling them:
Discover and declare physical devices: This option launches the Device Detection Wizard.
It presupposes that there are physical or virtual devices already present in your
network.
Declare a Virtual Device for Backup to Disk (Atempo VLS): Atempos proprietary Virtual
Library System cannot be set up via the Device Detection Wizard or the Device
Configuration Manager. Selecting this option will launch a series of interfaces that
Declare Devices Later: This option puts off the device declaration process and lets you
get on with something else. If you do not wish to set up your devices at this time,
you will be able to launch the other procedures from Time Navigator
Administration Console at a moment of your choice.
140
Note:
Device detection must not be launched if there are any Time Navigator jobs
running. Please check in Time Navigator Job Manager that this is not the
case and cancel any unterminated jobs.
1.
2.
The first screen that appears contains Pre-requisite Conditions for device declaration.
If you do not take this information into account, your device declaration may fail.
Please read the Pre-requisites carefully and make sure that you meet all the
conditions, then click on Next.
Chapter 5
3.
141
If you did not launch the Wizard directly from a selected host, the next window that
appears is Host Selection. Select here the hosts on which you want to launch the
automatic detection and declaration procedures.
The window supports multiple selection. To select several contiguous hosts, hold
the Shift key down as you point and click the cursor. To select disjointed hosts,
hold the CTRL key down as you point and click the cursor. Click on Next when
your selection is complete.
4.
The system may take a few minutes to detect all your devices. You will see a
progress bar while the process is running. Finally, the window below will appear.
142
This window lists all the physical and virtual drives and libraries detected on the
selected hosts in your system, with the parameters they need to be recognized by
Time Navigator. By default, all fully detected devices are selected To Declare. You
may remove a device from the selection by unchecking the box to the left of it.
Time Navigator creates a default name for each device based on its Serial ID and
Type. This is the name by which it will be known in the Time Navigator Catalog
and appear in the interfaces. To change this default name, highlight the device and
type a new name in the New Name box.
When the selection is as you wish, click on Next.
5.
If the Wizard has all the information it needs to declare the devices, the window
below will now appear. If everything is as you want it, simply click on Finish.
6.
The devices are detected and appear in Time Navigator Administration Console.
Chapter 5
143
Sometimes the Wizard cannot auto-detect all the information it needs to declare a device
automatically. In this case, you may see one or more of the following dialog boxes during
the procedure. These will enable you manually to supply the missing parameters.
1.
If Time Navigator cannot find any devices on one or more of the hosts you
selected, the following window will appear.
144
2.
If Time Navigator cannot recognize a device that it has detected, you will see the
symbol ??? in the Serial ID column. In this case, depending on what information
is missing, you will be guided through the necessary steps for the device to be
recognized.
3.
The window below appears if Time Navigator was unable to detect the Type of a
library. It allows you to select the Vendor and Model of the library manually. Once
you have checked the box to the left of the vendor and highlighted the model, click
on Next.
4.
A similar window appears if Time Navigator was unable to detect the Type of a
drive. It allows you to select the Model of the drive manually. Once you have
checked the box to the left of the vendor and highlighted the model, click on Next.
Chapter 5
145
5.
The SAN Network Selection window (not shown) appears only when a SAN is
detected. The Wizard puts any device that should be in a SAN in a default SAN
labeled 01_. If this is your only SAN, you may change its name. If several SANs
are detected, then you must manually select which devices go on which SANs. You
may also create a new SAN in the SAN Network Selection window.
6.
If the Wizard finds drives but cannot determine in which library they belong, the
following window appears:
The Wizard tries to judge the most likely configuration. If this is correct, just click
146
on Next. Otherwise, manually select the associated library in the pull-down list, or
define the drive as Standalone.
Chapter 5
147
1.
Note:
2.
3.
If you have launched the item from the Devices menu, rather than directly from a
host, the Storage Node Choice for Device Detection Windows appears.
Select the hosts you want to include in the Device Detection procedure. You can
select multiple contiguous nodes with CRTL+Shift and the mouse, or multiple
individual nodes with CTRL and the mouse.
148
4.
If a host you want to include is not on the list, and has been configured in the
current catalog in Time Navigator, the Add Storage Nodes to the List button will be
active. Click on this button to call up a list of configured hosts for selection.
Tip:
If the Add Storage Nodes ot the List button is inactive, it means that there are no
more hosts configured in this catalog of Time Navigator. To add more hosts,
launch the menu Platform - New - Host.
Similarly, you can remove hosts from the Device Detection by selecting them with
the mouse and clicking on the button Remove Storage Nodes from the List.
The detection process can take a few minutes. When it is complete, you will see the Device
List window:
Library
or Drive
Chapter 5
Yellow: These devices have been detected and are flagged to be declared.
149
Orange: These devices are declared but not detected. This could present a problem
- for example a device that has been physically removed from the network without
being deleted in Time Navigator.
Grey: All other devices, including ??? devices requiring more information before
they can be declared.
Type: This is the format of the library or drive: 4mm, 8mm, Optical, etc. The Type cannot
always be detected. If it is not, ??? will appear in this column and you will have to select
it manually. If the Type is not provided, the device cannot be declared.
Some Types are not yet supported by Time Navigator (i.e. not present in the
Compatibility Guide). Unrecognized libraries are classed as Generic by default. Drives
cannot be Generic. The Type must be entered manually if it is not detected.
Serial Number: The serial number of the device, as detected. If the device cannot be
detected, this will read ???.
Name: This is the name by which the device will be known in the Time Navigator
Catalog and called for backup and restore operations. A default name, made up from the
type and the serial number, is provided, but it can be changed.
Descriptor: The form of the Device Descriptor depends on the Operating System.
Host: The name of the host on which the device has been detected (if you have run
detection on multiple hosts). If a device is connected to more than one host, it will appear
several times in the list, each connection on a separate line, all with the same serial
number. For example, a device on a SAN can be seen by several hosts or storage nodes.
When one of the lines is selected, the others show up highlighted in white.
Connections: The device can either be connected directly to a host or it can be connected
to a SAN.
150
Library: This column describes to which library a drive is associated. It will only show
information on lines concerning drives and will be blank for libraries.
Position: This column concerns drives only and will be blank for libraries. It designates
the position of the drive within the library (also called index). The first position is 0.
Number of Drives: This column concerns libraries only and details how many drives are in
cannot be declared.
Buttons
Select New Hosts for Device Detection: Brings up the interface for selection of hosts on which
as name, or manually to enter information needed to declare devices that have not been
completely detected. See Properties Window, page 151.
Note:
Double-clicking on the line of a device has the same effect as clicking on this
button.
To Declare: Prepares the detected device to be declared (its status line should turn yellow).
Library Split: This button allows you to split a single library into several logical libraries.
The procedure is described in detail in the section Library Split Definition, page 152.
When a library is split, its icon changes to:
Reinitialize: This button returns the selected device to the configuration it had just after the
detection process terminated. This is useful if you wish to cancel your edits on a given
device without having to re-run the detection process on the entire host.
Chapter 5
151
Merge Two Identical Connections: This button permits handling of cases in which two
connections appear, or which one is detected but not declared (without a serial number
or ???), and the other declared but not detected, but in reality they represent the same
connection. When you select both items, the button becomes active and lets you merge
the two connections into a single one.
Associate with a Single Physical Drive: This button permits handling of a case in which a single
drive is attached to two separate hosts, and appears in the list as two unidentified drives
(no serial number or ???). If the user knows that the two items represent the same drive,
this button allows the two drives to be declared as a single drive on a SAN.
Apply: Declares all the devices that have been flagged for declaration.
Close: Exits the Device Configuration Manager.
Properties Window
This window appears when you double click on the line of a device, or click on the
Properties button, in the Device Configuration Manager. It allows you specify configuration
parameters manually for any device that was incompletely or not detected (devices
labeled ???), or change the default name of a detected device prior to its declaration.
General Area:
To Declare: Check this box if the device has been parametered as needed and you
want it to be declared when the Apply process is next run.
152
Name: This is the name by which the device will be known in the Time Navigator
Catalog and called for backup and restore operations. If you do not like the
provided default name, made up from the type and the serial number, you can
change here.
Type: This is the format of the library or drive: 4mm, 8mm, Optical, etc. If the
Type could not be detected (i.e. ??? in the Type column in the Device Configuration
Manager), you will have to select it manually. Click on the Browse button to call up
a list of all supported Types. If you do not see the required Type, select Generic.
Drive Area
1.
The Library Split Definition lets you determine the number of splits.
Chapter 5
153
The default, when you open the window, is two splits. This can be changed in the
Number of Splits field. The splits then appear in the box underneath. They take the
name of the library followed by _1 to _n, where n is the number of splits.
2.
Select one of the splits and click on the Split Properties button to configure the drives
and slots in that split. The Drive Choice for Library Split Window appears:
154
3.
Click on the button Add drives in split to call up the Drive Choice window, pictured
below. Here you have a list of all the drives configured on the Library you are
splitting. Select the drives you wish to include in the split. You can do multiple
selections by holding down the Shift key as you click with the mouse from the first
to the last element in your selection, or select all with the CTRL+A key
combination. Click on OK when you have finished.
4.
Click on the button Add slots in split to assign slot numbers to the split. The Slot
Choice window appears. It lists all the slots available in the Library. You can make
multiple selections by holding down the Shift key as you highlight with the mouse,
or select all with the CTRL+A key combination. Once a range of slot numbers have
been assigned to a given split, they disappear from this list so that they cannot be
accidentally assigned to another split. Click on OK when you have made your
selection.
Chapter 5
155
5.
The drives and slots you selected now appear in the Split Properties window that we
saw earlier. You can modify this configuration, if necessary, using the buttons to
add and remove drives and slots, or click on OK to validate it.
6.
Continue the configuration of the other splits in the library by selecting each in
turn and launching the Split Properties window on it. When all the splits have been
configured, the configuration will appear in the lower part of the Library Split
Definition window, as pictured below:
In the line at the bottom, each pair of parentheses represents a split. The numbers
ahead of the pipe symbol (|) are the drives assigned to the split, while the numbers
156
after the pipe represent the slot numbers. For example, the second pair of
parentheses in our illustration, (0,1|11,12,13), shows that two drives, and slot
numbers 11 through 13, have been assigned to the split dev_JGE51A0025_2.
Click on OK to apply the split to the Library. In the Device List Window, page 148
window the library will display all the splits and the icon will have changed to the
Split Libray icon.
Chapter 5
157
This is useful in cases where a library is unrecognized (i.e. it displays as ??? after
the Device Detection has been run, implying that no serialization method has been
detected for its drives), and has had to be declared manually. In such cases, the
serial numbers and positions of the drives within the library have not been retrieved
automatically.
Test Drive Position is also useful when a library has been split and the drives need to
be reindexed.
To use the Drive Position Test feature
Drivers for the Library and drives must be installed and configured.
Each drive in the Library must have been declared in Time Navigator and
associated with the Library.
Note:
1.
158
2.
When you are sure that the preconditions have been met, click on the button Start
Library Positions Learn Operation.
3.
The operation can take a while. There is no graphical display associated with it.
When the learn is finished, the window changes and displays a Close button. Click
on this to finish and exit.
Chapter 5
159
Libraries
About Libraries
Time Navigator distinguishes between several different kinds of libraries, depending on
the protocols used to manage them and on their physical architecture.
Traditional physical Libraries are devices using the SCSI protocol to control the
mounting and unmounting of cartridges in robotized drives. A device descriptor
designates the SCSI parameters of the configuration. These libraries consist of:
Software Controlled Libraries, having more than around 600 slots, are too large to be
managed via the SCSI protocol. An extra software layer is added to interface
between the library and Time Navigator. Time Navigator dialogues with the
software rather than directly via SCSI with the device itself. Hence they do not
have a device descriptor, but are configured by setting parameters in the software.
Virtual Libraries
These are emulations on disk of the traditional SCSI protocol libraries. They
are configured in the same way as physical libraries, and require a device
descriptor, except for one case:
Atempos proprietary Virtual Library System must be set up manually using its
own interface. This is covered in a separate chapter of this guide. See
Backup to Disk with Virtual Library System, page 531.
Library Representation
Libraries are displayed in the Network area of Time Navigator Administration Console.
They appear between the host they are attached to, and the drives associated with them.
The icons vary according to whether the library is:
160
A Virtual SCSI Library other than the Atempo VLS (no door)
Under the librarys name, a second information bar specifies the type of library
(within the range of types supported by Atempo from the vendor.)
Inconsistency may appear following manual operations (ex: cartridge move not requested
by Time Navigator) and the actual contents of the library may no longer correspond to
the contents of the catalog. The reinitialization of the library is then required.
Reinitializing a library allows Time Navigator to match the library logical status with its
actual physical status. The logical status is the image of the library Time Navigator
builds in the catalog.
Chapter 5
161
Allocating a library and at least one of its drives is required. If allocation fails,
reinitialization will wait until a drive becomes available.
Note:
A distinction must be made between the use of a library and the use of the library drives.
The library is allocated when a cartridge mount request is issued. The picker (mechanical
arm) moves a cartridge from a slot to a drive or from a drive to a slot.
Robotized or not, a drive is allocated to a cartridge if it is used for reading or writing
on cartridges. Drives may be allocated while the library is not and inversely.
You can add or remove cartridges to and from the library. These operations are known
as bringing cartridges on-line and off-line.
Bringing cartridges on-line requires that:
Creating a Library
In most cases, library creation is handled through the Device Detection Wizard and Device
Configuration Manager that we covered in the first part of this chapter.
Note:
Before creating a library with Time Navigator, make sure that the SCSI
adapter for the library has been installed.
To create a library
1.
In the Network area, click on the icon of the host to which the library is to be
attached.
162
2.
3.
Choose between Libraries, Software Controlled Libraries and Virtual Libraries. (See
About Libraries, page 159 for details).
Note:
4.
5.
Chapter 5
163
The name of the host you selected appears in the Host Name field. You cannot edit
it at this point.
6.
Fill in the library parameters as described in New Library Window, page 164.
7.
If you have already created drives, click on Add in the Associated Drives area and
select the drives to associate.
Note:
If the drives have not been created yet, you will have the opportunity
when you create your drives to associate them with the library.
8.
The Library Properties button gives you access to various parameters defining the
library behavior. Time Navigator assigns default values to all parameters
according to the library you select in step 2 above. Thus you do not have to modify
anything in that window. Should you decide to change any of the library properties,
be extremely careful as it could greatly disturb Time Navigator functioning. For
a detailed list of the library properties, see Advanced Library Properties,
page 165.
9.
Click on OK.
164
Indicates the library model you selected in the Library List Window.
Host Name: Indicates the host the library is attached to. This is the host you selected in
Warning:
Note:
The protocol used to access the library is always the Tina protocol, even
if the host accessing the library has been set to use the NDMP protocol. As
a result the device descriptor must always respect the Time Navigator
format, not the NDMP format.
The colon character ":" is not allowed for the library device descriptor
definition.
For example: qc0
Path of the file allowing access to the library. For example: /dev/qc
SCSI address of the library. The Device Descriptor must be entered in a
cxbytzla format, where:
Tip:
Library Name:
Name of the library. This name appears with the library icon in the
Network area.
Chapter 5
165
Serial Number: Concerns library installed in a SAN environment. The Serial Number is
automatically detected by Time Navigator and appears when editing the library if you
have set the tunable Use Serial Number to Determine Device Descriptor. See Device
Descriptor Re-allocation, page 423 for details.
If the library is software-managed, the library type appears in this field.
Reset: If the serial needs to be updated, click on the Reset button, Time Navigator
Only drives that are not already associated to a library appear in the Drive List
window when you click on Add.
Advanced Properties: Lets you access the Library Properties window. See Advanced Library
Properties, page 165.
Editing a Library
Once a library has been created, you always have the option to edit the following:
The library serial number (can be reset and redetected by Time Navigator).
The library type and name, as well as the name of the host to which the library is
connected cannot be modified.
To edit a library
1.
2.
166
3.
4.
5.
Time Navigator automatically updates the windows concerning the drives associated
with the library, according to the modifications performed in the Associated Drives area.
Reinitializing a Library
For details concerning library reinitialization, see Reinitializing Libraries, page 247
Deleting a Library
If you delete a library from the network, you must delete it from Time Navigator. When
you delete a library, you modify the loading mode of the drives associated with the
library. Drives are manually loaded again.
To delete a library
1.
2.
Choose Devices-Library-Delete. The Delete Library window appears. It contains all the
characteristics of the selected library.
3.
Chapter 5
167
Drives
About Drives
Drives are storage devices (backup and archiving). Many types of drives are supported by
machine that is client or server of Time Navigator). It is also possible to share a drive
between several Time Navigator catalogs via Time Navigator Library Sharing
Manager.
A shared drive is connected to a Storage Area Network (SAN). It can be controled by
several hosts via the SAN.
DVD-RAM Drives
Note :
168
WORM Drives
Make sure you do not mix WORM and WMRM (Write Many Read
Many) drives in the same library. Such configurations are not
supported by Time Navigator.
In order to improve reading and writing performances, some optical WORM drives
are equipped with a cache that can be enabled/disabled. By default, the cache is
disabled by Time Navigator. This prevents the catalog from being desynchronized
from the actual media content, should a power cut occur. If you want to enable the
cache at you own risk, set the "Enable optical cache on write"
(enable_optical_write_cache). For details on how to set tunables, see the
Time Navigator Tunables guide.
Drive Loading Mode
Drives must be cleaned on a regular basis to maintain them in good working condition.
Time Navigator keeps track of the number of times a drive is being used, and uses
various settings to control the drive cleaning. A cleaning request is automatically
triggered when the Time of Use since the Last Cleaning is greater than the Time of use
Chapter 5
169
Drive cleaning only applies to physical drives. Virtual drives do not require
cleaning.
Drive cleaning operations have priority over any other operation requiring a drive
(backup, archiving, etc.) except if the other operation is already in progress, in which
case the cleaning will wait for the operation to end before proceeding.
If you cancel a cleaning request, the following requested operation will occur and
Time Navigator will request the drive cleaning again the next time it is used.
The cleaning operation status (manual or automatic) depends on:
Robotized drive
Manual drive
=
Manual cleaning
Slot
reserved
for the cleaning
cartridge
=
Automatic cleaning
No slot reserved
for the cleaning
cartridge
=
Manual cleaning
To automate the cleaning operation, reserve a slot in the library for the cleaning cartridge
and make sure a cleaning cartridge is in the cleaning slot. Time Navigator will also
handle the cleaning cartridge wear according to manufacturer specifications and require
you to change the cleaning cartridge when it is worn.
In the case of manual cleaning, a dialog box prompts you to insert a cleaning cartridge
in the device and to specify the end of the cleaning operation.
For information on drive representation in Time Navigator Administration Console,
see Drive Representation, page 22.
170
Creating a Drive
In most cases, drive creation is handled through the Device Detection Wizard and Device
Configuration Manager that we covered in the first part of this chapter.
However, if you need to create a drive manually, or wish to set up a disk drive that will
emulate drive operation from a hard disk, you may use the following procedure to create
it directly in Time Navigator Administration Console.
Likewise, if you are creating a DVD-RAM drive, you must use this procedure since
neither the Device Detection Wizard nor the Device Configuration Manager support
the detection of DVD-RAM drives.
Note:
Optical drives, other than DVD-RAM, do not support the manual mode. They
must be robotized.
Note:
To create a drive
1.
In the Network area, select the library to which the drive is connected.
Note:
2.
If the drive is directly attached to a host, select that host. The host must
be a storage node.
Choose Devices-Drive-New and select a drive from the Drive Type Selection window.
Chapter 5
3.
Select the drive manufacturer and type. Click on OK. The New Drive window
appears:
4.
5.
Drive Window - Connection Tab, page 180 (for shared drives only)
171
The new drive is displayed in the Network area and is linked to the selected host. A vertical
bar is displayed at the right of the circle representing the host in the Icons area.
For more information on drive representation in Time Navigator Administration
Console, see Network Area, page 20.
172
If one or several media pools, libraries, and user groups are associated with the drive, they
will automatically be displayed by Time Navigator in the corresponding areas in the
Drive window: Media pools, Libraries and User Groups.
Note:
Time Navigator does not check for the presence of the device on the network
when it is created, but at each attempt to access it.
Note:
The colon character ":" is not allowed in the name of the drive.
Cartridge Life Cycle (points): Cartridge wear parameter (ex: 1500 life points).
A default value is automatically entered by Time Navigator depending on your drive.
For more information on cartridge wear, see Cartridge Wear, page 203.
Serial Number: Serial number of the drive. It concerns SAN drives only. It is automatically
detected by Time Navigator and appears when editing the drive if you have activated the
tunable Use Serial Number to Determine Device Descriptor. For more information on
serial numbers, see Device Descriptor Re-allocation, page 423.
Chapter 5
173
Reset: Forces Time Navigator to re-detect the drive serial number. Useful if the drive has
been changed.
Local Drive (not shared): Indicates whether the drive is local or shared.
Host: Name of the host the drive is attached to.
Device Descriptor:
HP-UX: /dev/rmt/0mn
Linux: /dev/nst0
format.
The device descriptor of a DVD-RAM drive is the drive letter assigned in the file
system, for instance: "D:"
174
Note:
Warning:
Drives attached to the same host must imperatively have their own unique
device descriptor. Do not use the same descriptor for all drives.
The Device Descriptor used must be a no rewind device. Otherwise, the
cartridge label and data are systematically overwritten at each new backup.
To check that the Device Descriptor being used is correct, perform a drive
test as described in Testing Drives, page 183.
Warning:
The protocol used to access drives is always the Tina protocol, even if the
host accessing the drive has been set to use the NDMP protocol. As a result
the device descriptor must always respect the Time Navigator format, not
the NDMP format.
Note:
If the created drive is a Disk Drive, the device descriptor corresponds to the
absolute path of the directory into which the data will be backed up.
Chapter 5
175
Note:
If you have already created media pools, click on Add to select the media pool(s)
you want to associate with the drive. If not, you will be able to add a media
pool later.
Note:
Note:
If the created drive can be used with both rewritable (WMRM) and
non-rewritable (WORM) media, you must declare it as either WMRM (default
behavior) or WORM. Mixing different types of media for the same drive is
not allowed in Time Navigator.
176
If the library is robotized, click on Library to select the library containing the drive.
Note:
The fields in the Library tab can be accessed if at least one library has already
been declared in Time Navigator.
Library: Name of the library associated with the drive (if any).
Drive Position in Library: Indicates the drive location inside the library. See Changing the
Chapter 5
177
Statistics Area
Use since Last Cleaning: Number of hours the drive has been used for since the last
cleaning.
Last Cleaning Date: Date when the drive was last cleaned.
Cleaning Managed by Time Navigator: Indicates whether you want the drive cleaning to
be managed by Time Navigator.
Max. Use between Cleanings (Hr): Maximum number of hours the drive can be used for
between two cleaning sessions.
Note:
178
Use before Next Cleaning (Hr): Number of hours the drive can be used for, before
Note:
Note:
Default values are entered for all parameters automatically according to the
drive type.
For more information on cleaning drives, see Drive Cleaning, page 168.
Change Identity to Access Device: Indicates that you are providing a specific user identity to
Chapter 5
179
180
the host.
For example: tape0
Chapter 5
HP-UX : /dev/rmt/0mnb
Linux : /dev/nst0
181
The Device Descriptor represents the drive SCSI address. It must be entered in a cxbytzla
format.
Note:
Warning:
Drives attached to the same host must imperatively have their own unique
device descriptor.
The Device Descriptor used must be a no rewind device. Otherwise, the
cartridge label and data are systematically overwritten at each new backup.
NDMP Area
NDMP: This box must be checked if you want the drive to support NDMP.
Network Name: Drive network name
User: NDMP user
Password: NDMP user password
Version: NDMP version
182
Description
Enabled
Disabled
Maintenance
1.
2.
The Mode is displayed underneath the drive icon in the Network area.
Supervising Drive
If you have installed Time Navigator Web Supervision, you have the option to monitor
your catalog and drive activities via a Web browser. The URL to access Time Navigator
Web Supervision depends on the parameters you specified during installation.
See the Time Navigator Web Interfaces guide for more information.
Chapter 5
183
Testing Drives
Although this step is optional, we strongly recommend performing this operation when
the drive is used for the first time or any time a hardware maintenance operation is
performed.
Testing the drive will verify that it is in working condition, that it has been properly
configured and that Time Navigator correctly handles that drive.
If a drive returns errors indicating that it has broken down, Time Navigator
automatically disables the drive and triggers an alarm. In that case you should perform a
drive test to try identifying the problem.
The reasons for a failed test can be one of the following:
There is a conflict between the driver version and the operating system.
The media is unavailable: it must be neither write protected, nor too worn out
in the case of magnetic tapes.
The driver for the drive is configured in fixed block size mode. Time Navigator
requires that the driver be put into variable block size mode.
For more information about the driver configuration, see the drive manufacturers
documentation and Time Navigator Drivers guide.
If you are working in a SAN environment and several hosts have access to a drive, you
can select the host to use to perform the test. You should test the drive with all hosts.
Note:
This test requires a spare cartridge. Any data contained on the cartridge will
be deleted by the test.
Warning:
Testing a WORM drive implies that the WORM media used will be
unusable once the operation is complete. It is recommended that you then
remove this media from the library.
To test a drive
1.
Right-click on the drive to test in the Network area and select Maintenance.
See Changing the Mode of the Drive, page 182 for details.
184
2.
3.
If several hosts have access to the drive (SAN environment), select the host you
want to perform the test with in the Select Access for Drive window and click on OK.
4.
The test begins and the Drive Test window appears showing you the test progress. If
the test is sucessful, the message: This Device works correctly is displayed. Otherwise,
Time Navigator returns one of the following errors:
Read error
Write error
Rewinding error
Status error
Configuration error
Positionning error
Note:
5.
Max. Use between Cleaning (hours). The value of this parameter depends on the drive
Use before Next Cleaning (hours). When the drive is created, this parameter is by
default the same as the first parameter since the drive is supposed to have never
been used. Afterward, Time Navigator keeps track of the time the drive is being
used, and automatically triggers a cleaning request whenever this value comes to
0.
Chapter 5
185
1.
2.
3.
In the Cleaning Management Area, check the Cleaning Managed by Time Navigator box.
4.
Modify the Max. Use between Cleaning setting (ex: 30 hours). The Use before Next
Cleaning setting is automatically updated.
Note:
5.
For more information on drive cleaning, see Drive Cleaning, page 168.
1.
2.
Choose Devices-Drive-Operations-Cleaning,
Note:
The cleaning operation begins if the selected drive is enabled and available.
186
The Use before Next Cleaning parameter is reset to its original value.
Warning:
1.
2.
3.
In the Information tab, reset the Use since Last Cleaning field value to 0. The Use before
Next Cleaning parameter is reset to its original value.
4.
Editing Drives
Editing a drive enables you to check or modify the following settings:
The maximum time of use between two cleaning sessions and the time of use before
cleaning to allow Time Navigator to automatically initiate the drive cleaning
request.
See Automatically Cleaning Drives, page 184 for details.
The life cycle of cartridges associated with a drive to allow Time Navigator to
automatically calculate the cartridge wear level.
See Cartridge Wear, page 203 for details.
The drive serial number (can be reset and detected again by Time Navigator).
The user groups and media pools the drive is associated with.
1.
Chapter 5
2.
3.
4.
Note:
187
Time Navigator automatically updates the media pools, libraries, and user
groups areas of the Drive Properties windows if you modify the drive
information through the Media Pools, Libraries or User Groups windows (i.e., if you
create a library and associate a previously created drive to it, the library name
will automatically appear in the Drive Properties Library field).
Deleting Drives
If you remove a drive from your network, you must also remove it from
Time Navigator. Deleting a drive removes it from the list of available drives defined for
the libraries, media pools and user groups.
The recorded cartridges are kept and can be read on any other compatible drive.
To delete a drive
1.
2.
3.
The deleted drive is automatically removed from the Associated Drives areas
of the Media Pool and Library Properties windows and from the Drives
area of the User Group Properties window it was associated with.
1.
2.
188
Tip:
The Drive Contents Window appears. See Drive Contents Window, page 188 for
details.
1.
2.
You can also right click on a drive and choose Eject Media.
Displaying Drives
See Displaying Drives, page 24 to find out how you can show or hide a drive in
Time Navigator Administration Console.
Chapter 5
189
Status: Status of the drive, either Enabled, Restore Only, Maintenance or Disabled.
Serial Number: Drive serial number. Automatically detected by Time Navigator after
the first access to the drive, if it is a shared drive.
Library: Name of the library associated with the drive.
190
Note:
Note:
This column shows a question mark when you first open the window,
click on Identify Content to identify the cartridge.
This column shows a question mark when you first open the window,
click on Test to test the drive and display the result.
Connection: Shows the connection type of the drive, either local with the name of
Sharing: Indicates the number of hosts than can access the drive.
Properties: Opens the Drive Properties window for the selected drive.
Tip:
You can also double click on a drive in the list to open the Drive Properties
window.
Modify Status: Opens the Drive Status window to modify the status of all the selected drives.
Modify Connection Status: Opens the Drive Connection Status window to modify that status.
Allows to switch between local and SAN connection.
Identify Content: Allows you to identify the cartridge contained in the selected drives.
Chapter 5
191
1.
2.
Browse through the list and click on Close when you are done.
1.
2.
3.
4.
Click on OK. The exported file is created in the location you specified.
5.
Click on Close in the Drive List window when you are done.
Editing a Drive
Note:
To edit a drive
1.
2.
Select the drive you want to edit and click on Properties. The Drive Properties
window appears. Modify the parameters as needed and click on OK to apply the
modifications. See Creating a Drive, page 170 for details.
3.
4.
Click on Close in the Drive List window when you are done.
1.
192
Select the drives for which you want to change the status and click on Modify Status.
The Drive Status window appears. See Changing the Mode of the Drive,
page 182 for details.
3.
4.
Click on Close in the Drive List window when you are done.
1.
2.
3.
Select the lower radio button, select the SANs name from the drop-down list and
click OK.
4.
1.
2.
3.
4.
1.
2.
Select the drives whose content you want to identify and click on Identify Content.
Chapter 5
193
3.
4.
A Progress window appears. Click on Hide if you do not want to see it.
5.
Once the operation is completed the name of the cartridges contained in the drives
appears in the Cartridge column.
6.
Click on Close in the Drive List window when you are done.
1.
2.
Select the drives you want to empty and click on Eject Media.
3.
4.
A Progress window appears. Click on Hide if you do not want to see it.
5.
6.
Click on Close in the Drive List window when you are done.
Testing Drives
To test drives
1.
2.
Select the drives you want to test and click on Test. See Testing Drives,
page 183 for details.
3.
4.
A Progress window appears. Click on Hide if you do not want to see it.
5.
Click on Close in the Drive List window when you are done.
Cleaning Drives
To clean drives
1.
194
2.
Select the drives you want to clean and click on Cleaning. See Manually Cleaning
Drives, page 185 for details.
3.
4.
A Progress window appears. Click on Hide if you do not want to see it.
5.
Click on Close in the Drive List window when you are done.
Deleting Drives
To delete drives
1.
2.
Select the drives you want to delete and click on Delete. See Deleting Drives,
page 187 for details.
3.
4.
A Progress window appears. Click on Hide if you do not want to see it.
5.
Once the operation is completed the drives no longer appear in the list.
6.
Click on Close in the Drive List window when you are done.
Chapter 5
195
Media Pools
About Media Pools
Media pools are created to manage media in a catalog. A media pool is defined by a
name, a label, associated drive(s) and a management policy. Once created, the pool can
be associated with a backup strategy or an archiving folder to allow data to be written on
cartridges. Cartridges will be automatically added to a pool when needed.
It is recommended to keep automatic backup and archiving on separate pools since the
media used for automatic backup can be recycled and reused whereas those used for
archiving will most likely not be recycled.
A media pool can also be used to dedicate some drives to automatic backup and others
to archiving. Most frequently, though, pools will have access to all available drives and
Time Navigator will decide which drive will be used for a particular backup, archiving
or restore.
Storage vs. Recycling Policy
When creating or editing a media pool, you can choose between two media management
policies:
The storage policy consists in increasing the number of cartridges indefinitely. Once a
cartridge is full, Time Navigator asks for a spare cartridge, labels it and fills it. It keeps
on requesting spare cartridges each time the previous cartridge is full. The backup
volume continuously increases and there is no automatic recycling. The administrator can
manually delete cartridges when he thinks that the backed up information is no longer
needed.
The recycling policy keeps data on a cartridge for a limited time only. The retention
period policy consists in labeling a certain number of cartridges that are used in turn. The
Retention Period parameter of the media pool allows you to define the retention time that
data is kept.
196
If the retention priod is equal to zero, no data retention period is guaranteed. Only the
number of media available in the pool determines the retention period.You should
pre-label at least enough cartridges to complete your most voluminous backup since
Time Navigator will not request spare cartridges but will overwrite existing ones. If
there are no more empty cartridges, the one which contains the oldest data will be
recycled. Time Navigator thus keeps files for several days or months depending on the
number of cartridges, the backed up volume and the backup frequency.
If the retention period is not equal to zero, cartridges containing data older than the
retention period can be recycled. If no cartridge meets this requirement, a spare cartridge
is labelled under the name of the user in the media pool. Thus, the data retention period
is guaranteed.
Automatically Created Pools
These pools only appear in the media pool list if they contain cartridges. You cannot edit
or delete these pools.
1.
Chapter 5
197
2.
3.
Click on Add in the Associated Drives area to associate a drive with the media pool.
The list of available drives is displayed. Select a drive in the list and click on OK.
Repeat this step to associate other drives.
Note:
Warning:
4.
The created media pool is automatically displayed in the Media Pools area of the
Drive Properties window with which it is associated.
Tip:
The pool name can be related to the pool use (ex: backup week for the weekly
full backups) or to the platforms backed up with the pool, ...etc.
198
Label: Is usually a short version of the pool name. The pool label appears in the name of
If you modify the comment, specify whether you want the new pool comment
to be applied on all existing cartridges in the pool or only on the new
cartridges.
Retention Period
Infinite: Select this option if you do not want to recycle cartridges. This option is
referred to as the storage policy. In that case, Time Navigator will not reuse a
cartridge once it is filled.
Data stored during: Select this option if you want to recycle cartridges after a set
Retention Period: Represents the time period Time Navigator will wait once a
Add: Allows you to determine the drives Time Navigator may use when
performing a backup with this media pool.
Remove: Allows you to stop a drive from being used by Time Navigator for
Logical Name:
Displays all the drives that may use this media pool.
Chapter 5
199
The label of the media pool is written at the beginning of each media and thus cannot be
modified.
To edit a media pool:
1.
2.
Select a media pool in the list, then click on OK. The Media Pool Properties
window appears.
3.
Modify the media pool parameters as needed (See Media Pool Window,
page 197) and click on OK.
Note:
If you have modified the comment, a dialog box asks you whether you want
the new pool comment to be applied on all existing media in the pool (click on
Yes) or only on the new media (click on No).
1.
2.
Select a media pool in the list, then click on OK. A message window prompts you
to confirm your choice.
3.
200
Cartridges
About Cartridges
Backup Media
The backup media used by Time Navigator can be of the following kind:
Cartridges
Acartridge refers to either a magnetic tape, a digital optical disk, or even files
on a disk. With VTL Disk Drives for instance, a cartridge is simulated by a file
created on disk.
Snapshot
Oracle
NDMP
List
Filesystem
Replica
A replica represents a copy of data performed with the Time Navigator replication
features. A replica is kept on disk.
Cartridge Identification
Cartridges are always associated with an owner. The cartridge owner is the pool label
the cartridge belongs to.
Time Navigator offers two ways to identify a cartridge:
The label is an actual file written on the cartridge enabling its identification. It contains
the following information:
An optional description.
Chapter 5
201
To identify a cartridge, Time Navigator reads its label, and thus requires that the
cartridge be mounted in a drive.
The administrator can label cartridges for any user. In Time Navigator Restore &
Archive Manager, the current user can only label cartridges for his own use. To do so,
he must belong to a user group containing drives.
Prior to any operation, the cartridge label is read: there is no possible identification error.
Barcodes, if supported by your library, also let Time Navigator identify a cartridge, but
without mounting it in a drive and reading its label. The library picker quickly scans all
the cartridges in the library and reads their barcodes. Reading barcodes is much faster
than reading labels.
Warning:
Note:
Two cartridges cannot have the same bar code because identification
problems will occur.
Cartridge Status
When a brand-new cartridge is inserted in a library or a cartridge has just been erased,
it appears as an unknown cartridge. Upon identification, a cartridge takes on one of the
following statuses:
Cartridge
Status
Description
Spare
Lost + Found
Known
202
Cartridge Access
Access to cartridges is controlled. No user can write on the cartridges of another user.
A cartridge can only be deleted by its owner or a cartridge administrator (any user for
whom this right has been defined, or a privileged user such as: root, Time Navigator
privileged user, administrator... etc.).
Priorities for Cartridge Use during a Backup
2.
3.
4.
Recyclable cartridges. The one with the oldest last backup will be used first, then
other recycling cartridges in the same order. See Recycle, page 205 for details.
5.
Spare cartridges.
If several cartridges have the same priority status, preference will go to the one located
inside the drive, if applicable.
If the cartridge that is next in line to be used is not present in the library, Time Navigator
automatically selects the one after it.
Job Priority
In Time Navigator, several jobs can be started at the same time. They are executed in
the following order:
If a cartridge is already mounted in the drive, all jobs using this cartridge have
priority. This avoids mounting and unmounting cartridges repetitively.
If no cartridge is mounted in the drive, restore/archiving jobs have priority over
backup jobs.
Writing Formats
tar
cpio
Chapter 5
203
Different formats cannot be mixed on a single cartridge. A cartridge begun with the tar
format may only contain tar files. However, a cartridge with the TiNa format can contain
a compressed file, then a compressed and encoded file, then a file which is neither
compressed nor encoded, etc.
As the tar and cpio formats comply with POSIX standards, it is possible to restore data
with the tar and cpio commands from any Unix machine. In addition, it is possible to
restore on a Windows system, data backed up on a Unix system in the Time Navigator
tar format (see the documentation of the particular tar command you are using to find out
the options you need, i.e., you may need to: specify a no rewind option, specify the block
size, create a device (mount -b option)...etc.).
On a Windows 2000/2003 machine, if you use the tar or cpio formats, some information
is not backed up. For example, some data and attributes associated with files are not
backed up.
The tina_cart command allows you to read data written in the TiNa format without
having Time Navigator installed on the machine. See the Time Navigator Command
Line Interface guide.
Externalizing Cartridges
Cartridges can be put offline, externalized and stored in vaults or remote sites. This
operation can be useful:
If the library capacity is not sufficient compared with the cartridge retention period.
If you want to guard your cartridges in the event of natural or human accidents.
Time Navigator provides assistance for quickly detecting cartridges that are eligible to
be put offline (out of the library). By default, eligible cartridges are closed or full, and
not recyclable.
This feature also allows to draw up the list of offline cartridges that have passed their
retention period. Such cartridges should be put online so that they can be recycled.
Cartridge Wear
204
The first time a cartridge is labelled, it receives the maximum life point for its type. Each
time the cartridge label is read by Time Navigator (i.e., prior to rewinding, reading or
writing on the tape), a life point is substracted and the wear percentage updated
accordingly.
Warning:
Note:
To perform cartridge operations, your user profile must give you permission
to Edit the media pool of every user. See Defining Personal Access Rights,
page 123 for details.
Note:
For manual drives, make sure you insert the appropriate cartridge in the drive
before proceeding.
Spare
Lost + Found
Known
Recycle
no
no
yes
Close
no
no
yes
Reopen
no
no
yes
Delete
yes
yes
yes
-> Spare
no
yes
yes
Duplicate
no
no
yes
Writing Label
yes
no
no
Offline
yes
yes
yes
Chapter 5
205
Recycle
When you recycle a cartridge that contains only part of a job, i.e., when a single backup
used more than one cartridge, only that cartridge is recycled. Its status becomes Emptied.
Data can still be restored from the remaining non-recycled cartridges.
However if the job is an NDMP job, and is spread on several cartridges, the job is
recycled on all the cartridges if you recycle any one of the cartridges. A partially recycled
cartridge remains full until it is totally recycled. For instance:
If an NDMP backup job JOB1 stores data on:
Cart0001 (Full)
Cart0002 (Full)
Cart0003 (Full)
Cart0003 remains Full but JOB1 is no longer available in the cartridge information
interface.
Cart0004 remains Partialy filled.
Cart0001 is Emptied
Cart0002 is Emptied
Cart0004 remains Partialy filled but JOB2 is no longer available in the cartridge
information interface.
206
Recycling steps
In the catalog, all the file versions contained on the cartridge are marked as
"deleted".
The catalog is cleaned to actually remove all the file versions marked as
deleted. This step is performed via a maintenance job. The maintenance job
is automatically launched every day at noon by default.
The data on the recycled cartridge can no longer be restored via the catalog.
However, as long as the cartridge is not used again and that the data is still
physically present on the cartridge, it is possible to recover the data via the
tina_cart command.
For more information, see the Time Navigator Command Line Interface Guide.
Automatic vs. manual recycling
When recycling is automatically performed, the cartridge with the oldest last
backup, i.e, which has been recyclable for the longest time, will be recycled
first.
When the recycling is manually initiated via Time Navigator Administration
Console, only Step 1 is performed immediately. Step 2 takes place on the next
scheduled catalog maintenance job, unless it is manually launched using the
tina_odbgc -purge command.
When the recycling is manually launched via the tina_cart_control
Chapter 5
207
Note:
Close
It is full
208
If your catalog is damaged and restored, backups C and D performed between the catalog
backup and the catalog restore will not exist in the catalog once it is restored. If cartridges
are not closed upon restoring the catalog, backup E will overwrite the data written by
backups C and D. Although files backed up by backups C and D cannot be restored by
the catalog, it is possible to access them using the tina_cart command. To avoid
overwriting this data, you should close any partially filled cartridges when you restore
your catalog.
Reopen
Deleting cartridges should be used only for cartridges that have actually
been destroyed or lost, to make sure that Time Navigator will not request
them at any time in the future.
The actual information contained on the cartridge, including its label, remains. If you
reuse a deleted cartridge, it will appear as a Lost+Found, that is, Time Navigator will be
able to read its label but will not recognize it as belonging to the catalog you deleted it
from.
> Spare
Duplicate
Chapter 5
209
A cartridge can be duplicated into another set of cartridges or associated with another
type of media. Several destination cartridges can correspond to a single source cartridge
if storage capacities are different.
If a file is spread on two cartridges, the duplication of one of these cartridges will entail
the duplication of the whole file, hence the mounting of the two source cartridges.
Label
Labelling only applies to Spare cartridges. Other cartridges already have a label. Once it
is labelled, a cartridge can be used to back up data. It can then be kept with no date
limitations, deleted, recycled or duplicated.
Labelled cartridges are either:
Empty.
Partly filled.
Full.
Closed.
Note:
For Time Navigator, a spare cartridge may contain information that has been
manually backed up, outside the application. Labelling a cartridge will delete
this information.
Offline
When you remove a cartridge from the library either manually or via a mailbox, this
functionality allows you to inform the catalog that the cartridge is offline.
210
1.
2.
Select a pool, then click on OK. The Media Information Window containing all the
cartridges of the pool you selected appears. See Media Information Window,
page 211 for details.
3.
Click on Column Choice to select the columns you want to view. The Column Choice
Window appears. See Column Choice Window, page 212 for details.
You may Sort the cartridges according to any column content. To do so, double
click in the column heading you want the cartridges to be sorted by. On the first
click sorting will be descending. Click a second time to sort in ascending order.
4.
5.
Chapter 5
211
By default the box is unchecked when you open the window, to avoid delaying the
opening of the window if there is a great number of cartridges for which the status has
to be determined.
In/Out Period: Lets you modify the cartridge externalization time period criteria.
Pool Choice: Lets you select another media pool in order to display the related cartridge
information.
Cartridge List: Contains all the cartridges belonging to the selected pool.
Cartridge Operations
Recycle: Consists in reusing a cartridge already containing backups within the same media
pool.
Close: Prevents any writing operation on the cartridge.
Reopen: Opens a previously closed cartridge.
Delete: Removes the cartridge and all versions it contains from the catalog.
> Spare: Assigns the cartridge to the Spare media pool, erasing its contents, but keeping
the cartridge history in the catalog.
Duplicate: Copies data from one cartridge to another.
212
Off-line: Puts the cartridge off-line in the catalog and moves it to the mailbox slot (if any),
selected.
Hidden Columns: Lists the columns that are not displayed in the Media Information window.
Visible Columns: Lists the columns that are displayed in the Media Information window.
> Button: Once columns are selected in the Hidden Columns list, use the > Button to move
the selected columns to the Visible Columns list. You can also double click on columns
individually to move them to the Visible Columns list.
< Button: Once columns are selected in the Visible Columns list, use the < Button to move
the selected columns to the Hidden Columns list. You can also double click on columns
individually to move them to the Hidden Columns list.
Available Columns
Filling Level: The possible values for the filling status are: Partly filled, Empty,
Chapter 5
213
Emptied, or full.
Note:
Last Recycling: Date of the last recycling. If the cartridge has never been recycled,
this date is the same as the creation date.
Location: Either the library name or "External" for a non robotized drive or if the
cartridge was brought offline.
Rule: Name of the security rule if the cartridge contains data secured by a rule. A
cartridge cannot contain data secured by different rules. See the Time Navigator
Security & Compliance Manager guide for details on secured backup.
Description: By default the catalog name if the cartridge has been labeled by the user.
Last Backup: Date of the last backup performed on the cartridge. Equivalent to last
Format: Writing format, either TiNa, tar, cpio, sidf, none or unknown.
Wear level: Percentage calculated from the Cartridge Life Cycle parameter found in the
Drive Properties window. See Cartridge Wear, page 203 for details.
Retention Period: Cartridge recycling status: Infinite, Expired since (days, hours),
In/Out Status: Ready Offline (eligible to be put offline), Ready Online (eligible to be
put online), or - .
Tape File: Number of tape files present on the tape. A tape file contains all the
1.
2.
214
3.
In the Media Information Window, click on Export. The Export window appears:
4.
5.
Click on OK.
Export Window
File: Indicates the name of the text file the list is exported to. Enter an absolute path in
The file extension must match the selected file format (.txt or .html).
/Documents/list.txt
/tmp/list
C:\temp\list.txt
Browse Button: Lets you select a name and location for the export file.
Export only Selected Lines: Lets you only export information for the objects selected in the
list.
Chapter 5
215
File Format: Lets you choose the format of the export file, either Text or HTML.
Encoding: Lets you choose the encoding for the export file, either Latin 1
Export Visible Columns: Check this box to export all the information displayed in the
list.
Note:
When the Export Visible Columns box is checked, the selection in the
Export/Do not Export lists is not taken into account.
Uncheck the Export Visible Columns box and doubleclick on the column heading to switch
them from the Export list to the Do not export list and inversely.
Recycling a Cartridge
Recycling cartridges is performed automatically if you select the Data stored during option
when creating or editing a pool. In that case, a cartridge is recycled, as needed, during
a backup if no other cartridge is available, and if at least one cartridge has reached the
end of its retention period. See Recycle, page 205 for details.
In order to minimize drive use, cartridge recycling takes place in two steps: in the first
step, a drive is allocated to modify the cartridge label to indicate that the cartridge
becomes available for a writing session. The second step does not require a drive and
concerns only the cleaning of the catalog.
The catalog cleaning is automatically performed every day at noon. You can modify the
time of cleaning with the Catalog Cleaning Time (date_run_catalog_gc) tunable.
You can also cancel the automatic catalog cleaning job using the Disable Daily Catalog
Cleaning (disable_catalog_gc) tunable. In that case, the catalog cleaning must be
manually performed using the tina_odbgc command.
For details concerning the tunables, see the Time Navigator Tunables guide.
216
For details concerning the Time Navigator commands, see the Time Navigator
Command Line Interface guide.
You can also recycle a cartridge manually by following the procedure below.
Note:
Note:
If the cartridge(s) you want to recycle contains the last full backup, or any of
the incremental backups performed after the last full backup, of a backup folder
for a given strategy, a warning appears to inform you that your operation may
corrupt data integrity. You will have the option either to proceed with the
recycling or recycle only the cartridges that do not contain critical data. This
ensures that the last backup version of a backup folder remains available to be
restored at all times.
1.
Choose Storage-Media-Management.
2.
3.
4.
Click on Start.
5.
Note:
The recycling operation described here only takes care of step 1 in the recycling
process (see Recycle, page 205 for details). To actually complete the
removal of all recycled file versions from the catalog, either wait for the next
catalog maintenance job to occur (that job is automatically launched every day
at 12:00) or launch the tina_odbgc -purge command (see the
Time Navigator Command Line Interface guide for details).
Chapter 5
217
Closing a Cartridge
A cartridge is automatically closed if:
It is full.
An error occurs when writing data (ex: an error such as a media defect).
You can manually close a partially filled or empty cartridge at any time to avoid writing
on it. See Close, page 207 for details.
To close a cartridge
1.
Choose Storage-Media-Management.
2.
3.
4.
Click on Start.
5.
Reopening a Cartridge
It is possible to reopen a cartridge that has been previously closed.
To reopen a cartridge
1.
Choose Storage-Media-Management.
2.
3.
4.
Click on Start.
5.
218
Deleting a Cartridge
When you delete a cartridge, you delete the cartridge object and all its content from the
catalog. The actual information contained on the cartridge, including its label, remains.
If you reuse a deleted cartridge in the same catalog, it will appear as a Lost+Found, that
is, Time Navigator will be able to read its label but will not recognize it as belonging
to the catalog you deleted it from.
Note:
Cartridges that have been destroyed or lost should be deleted, to make sure that
Time Navigator does not request them at any time in the future.
To delete a cartridge
1.
Choose Storage-Media-Management.
2.
3.
4.
Click on Start.
Note:
Deleting can be quite lengthy if the cartridge contains a high number of objects.
Warning:
5.
Removing versions from the catalog is a very delicate operation that must
not be interrupted. Do not quit the application during this operation or you
may corrupt your catalog.
Erasing a Cartridge
When you erase a cartridge, the cartridge label is physically erased. The cartridge is
labeled as spare. The cartridge content becomes inaccessible for the catalog, but the
cartridge object still exists. This allows the catalog to keep the wear and cleaning
information after the cartridge has been erased.
Chapter 5
219
You should use this feature if the cartridge content is of no interest to you and you want
to reuse the cartridge.
Note:
To erase a cartridge
1.
Choose Storage-Media-Management.
2.
3.
Select the cartridge(s) to erase in the list, then click on -> Spare.
The Cartridge Erase window appears. It displays the available drives.
4.
Click on Start.
5.
Duplicating a Cartridge
Duplicating a cartridge can be divided in two operations:
The creation of one version by copied object (directory or file) in the catalog.
Note:
To duplicate a cartridge
1.
Choose Storage-Media-Management.
2.
3.
4.
Select the pool you want the duplicated cartridge to belong to then click on OK.
The Cartridge Duplicating window appears.
5.
Click on Start.
220
6.
Note:
Duplicating a cartridge can take a long time if the number of backed up files
is high. The operation can entail the mounting of several source cartridges if a
file belonging to the cartridge to be duplicated is spread out on several
cartridges.
Note:
Once the duplication is complete, the duplicated versions become the primary
versions, and the original versions become secondary. Thus if a restore is
required Time Navigator requests the duplicated cartridge. You may modify
this behavior with the tunable "Use Source Cartridge when Restoring
Duplicated Cartridge" (see the Time Navigator Tunables guide for details).
If the library is not equipped with at least one out mailbox, you have to
manually remove the cartridge from the slot, but the catalog is informed that
the cartridge is no longer inside the library.
1.
Choose Storage-Media-Management.
2.
3.
4.
Click on Off-line.
The Set Cartridge Offline window appears.
Tip:
If you are putting offline more cartridges than there are mailbox slots in
the library, check the Retry if mailbox full box. When this option is checked,
once all mailbox slots are full, Time Navigator waits for the
administrator to empty the slots and places cartridges into the slots as
soon as they are emptied, until all selected cartridges are put offline.
Chapter 5
221
If you do not check the option, an operator request is issued each time
the mailbox is full, thus sending the administrator back and forth
between the library to empty the mailbox and Time Navigator
Administration Console to suspend and acknowledge the operator
requests.
5.
Click on Start.
6.
1.
Choose Storage-Media-Management.
2.
3.
Select the cartridge that you want to view the information for and click on
Information. The Cartridge Information window appears. See Cartridge Information
Window - Information Tab, page 221 or the Cartridge Information Window Jobs Tab, page 223.
222
beginning of its life. This value is not reinitialized when the cartridge is recycled.
Filling: The amount of information currently on the cartridge. On a new cartridge that has
never been recycled, this value will be the same as that for Volume Written.
Comment: Allows you to enter any information about this cartridge that can be of use for
If you had already filled the Comment field when creating or editing the media
pool, the same comment appears in the cartridge Comment field. See Creating
a Media Pool, page 196 for details.
Chapter 5
223
Data integrity if the job contains either the last full backup, or any of the incremental
backups performed after the last full backup, of a backup folder for a given
strategy. Such data is not recyclable. This ensures that the last backup version of
a backup folder remains available at all times to be restored.
Data in retention time period if the data has not yet reach the maximum retention period.
Such data is not recyclable.
Note:
224
End Date: Date and time when the job is finished or cancelled.
Externalizing a Cartridge
The cartridge externalization feature provides assistance for quickly detecting cartridges
that are eligible to be put offline and externalized in order to free space in the library.
It also allows you to view cartridges that should be brought online again in order to be
recycled.
For details concerning the cartridge externalization feature, see Externalizing
Cartridges, page 203.
Offline Criteria
It is online. The name of the library appears in the Location column of the Media
Information window.
It does not contain critical data (last full backup and following incremental backups).
Online Criteria
It is offline. The External status appears in the Location column of the Media Information
window.
1.
Choose Storage-Media-Management.
2.
3.
Chapter 5
225
Note:
Since the calculation of these criteria can take a long time, you may disactivate
this function by unchecking the checkbox next to this button. When the
checkbox is disactivated, the In/Out Status button is greyed out and no
information appears in the In/Out Status column.
1.
Choose Storage-Media-Management.
2.
Select a pool in the media pool list. The Media Information window appears.
3.
Click on the In/Out Period button. The In/Out Period window appears.
4.
5.
Click on OK.
Command Line
If you would rather view all the cartridges of the catalog instead of only the cartridges
belonging to one media pool, use the command line feature: the
tina_library_control command for cartridges eligible to be brought offline and the
tina_cart_control command for cartridges eligible to be brought online. The
command options allow to filter and sort the list according to your needs.
See the Time Navigator Command Line Interface Guide, for details.
226
Replacing a Cartridge
Defective, worn-out or otherwise unsuitable cartridges must be replaced physically in the
Library, and logically in Time Navigator.
To replace a cartridge with a short retention period:
1.
Choose Storage-Media-Management.
2.
3.
4.
In the time between these two actions, insert a new cartridge into the library.
1.
Choose Storage-Media-Management.
2.
3.
After duplication, delete the original cartridge in the catalog, and remove it from
the library.
4.
5.
6.
In the time between these two actions, insert a new cartridge into the library.
Chapter 5
227
For more information on cartridge labels, see Cartridge Identification, page 200.
Note:
For Time Navigator, a spare cartridge can contain information that has been
manually backed up. Labeling a cartridge deletes this information.
Note:
1.
2.
Select the media pool for which you want to label cartridges, then click on OK. An
error message is displayed if no drive is associated with the media pool, otherwise,
the Label Cartridge window appears.
3.
Enter the number of cartridges you want to label. They will be labelled in a row.
The description field contains, by default, the catalog name. You may change the
field content. Whatever description you enter will be included on each cartridge.
Click on OK.
4.
If the drive needs to be manually loaded, insert the cartridge to label in the drive.
The In Progress window appears. It keeps you informed of the labeling process.
5.
Note:
228
1.
2.
Enter alphanumerical characters in the Prefix of Cartridge Labels area to add a prefix to
the cartridge labels of the working catalog.
3.
The Cartridge Life Cycle parameter is used by Time Navigator to calculate the
Cartridge Wear level.
See Creating a Drive, page 170 and Cartridge Wear, page 203 for details.
You may edit the Cartridge Life Cycle parameter at any point.
To edit the cartridge life cycle
1.
2.
Chapter 5
3.
4.
5.
229
1.
2.
3.
Click on Column Choice. Select the Wear Level column. Close the Column Selection
window.
4.
Warning:
The Time of Use since last cleaning and Time of Use before cleaning parameters in the Drive
Properties window. This operation is described in Automatically Cleaning
Drives, page 184.
The cleaning cartridge parameters in the Library Properties window.
1.
2.
230
3.
4.
5.
The Reserved Slot in the library for the cleaning cartridge. In most cases, when
you create a library, the reserved slot for cleaning is 0. Enter the slot number
you want to use for the cleaning cartridge.
The number of Cleanings already performed with the cleaning cartridge. By
default, when you create a library, the number of cleaning is 0.
The cleaning cartridge Life Cycle. It is the maximum number of cleanings
authorized with the cartridge. This is defined by the cleaning cartridge
manufacturer.
Warning:
The counter representing the number of cleanings already performed with the cartridge
is automatically incremented each time you use the cleaning cartridge.
Chapter 5
231
If you have not reserved a slot for the cleaning cartridge, you must manually manage its
wear by specifying every cleaning performed with the cartridge.
Time Navigator automatically asks you to change the cleaning cartridge when the
number of performed cleanings is greater than the cartridge life cycle. You must then
manually put the cleaning cartridge in the reserved slot.
The cleaning cartridge settings can be defined when creating a library or modified when
editing it.
232
233
C H A P T E R
In this chapter, both terms "media" and "cartridge" are used to refer to either a magnetic
tape, a digital optical disk, or files on a disk.
Managing Libraries
Libraries can be controlled and managed with Time Navigator Library Manager. This
application lets you:
Note:
234
1.
Choose Catalog-Connect.
2.
Chapter 6
235
To change library
1.
Choose Library-Change.
2.
Label: to view the cartridge label as defined in the media pool properties.
Bar Code: to view the cartridge bar code, if your library supports them.
Full label: to view the cartridge full label, if the label is longer than the default slot
size. The slot size is then modified to suit the label size.
1.
Choose Library-Properties.
2.
3.
Library Operations
Editing Library Properties
You may verify or modify your library properties at any time. The library properties are
set by default upon library creation. Time Navigator assigns properties to a library
according to manufacturers specifications.
236
The library properties contain information such as whether or not a Cleaning Cartridge is
being used, whether the library manages Bar Code or not, whether the slots in the window
are displayed horizontally or vertically, ...etc.
Not all properties can be edited.
Even though Time Navigator recognizes libraries and sets their properties, you can edit
them in order to specify your library behaviour.
Warning:
1.
Choose Library-Properties.
2.
Select the tab containing the properties you want to edit: Standard, Generic, Specific
or Geometry. See Library Properties, page 237 for details.
3.
4.
Click on OK.
Tip:
Chapter 6
237
Library Properties
For a complete list of Library Properties, see Appendix 1: Advanced Library
Properties, page 645.
Reinitializing Libraries
Reinitializing a library allows Time Navigator to match the library logical status with
the library actual physical status. The logical status is the image of the library
Time Navigator builds in the catalog.
Note:
238
The Bar Code reinitialization can be used even if the library does not support barcode. In that case, the library simply checks the full/empty and
available/not available status of the slots and drives. This type of reinitialization does not involve any reading or moving of the cartridges and is
therefore much faster than the other reinitialization types.
Read Label
Full Inventory
Warning:
During the reinitialization, the library is busy and Time Navigator Library Manager is
not active.
You can also manually trigger the library reinitialization.
1.
Chapter 6
239
or
Right Click in Time Navigator Library Manager background, select
Reinitialization
2.
1.
2.
3.
During the reinitialization, a picker (mechanical arm) is displayed on the bottom right of
the library icon in the Network area to indicate that the library is being reinitialized.
Note:
240
Drives
Drive Information
Time Navigator Library Manager indicates whether the drive is full or empty, whether
the drive is active or not. It also shows the alarms and locks applied to a drive and the
drive activity, if any.
There are three kinds of information.
Drive Status
Visual Clue
Enabled
Maintenance
Enabled for
Restore Only
Disabled (See
Note 1:)
Except status
(See Note 2:)
Drive Status
Visual Clue
Empty
Full
Minor Alarm
Major Alarm
Critical Alarm
Locked
Note 3:)
(See
Drive
Activity
Visual Clue
Reading
Writing
Forwarding
Chapter 6
Rewinding
241
Note 1:
When a drive is disabled, it indicates that the drive is unavailable. This unavailability can
be of two types:
Note 2:
When a cartridge in the drive has an Except status, it indicates that the physical drive
contents does not match the catalog contents. Choose Library-Operations-Reinitialization-Full
Inventory to solve the inconsistency.
Note 3:
A lock on the cartridge object located inside the drive (the lock appears in the drive
upper left corner). It indicates that the cartridge itself is reserved by a
Time Navigator process.
A lock on the drive (the lock appears in the drive lower left corner). It indicates
that the drive is reserved by a Time Navigator process.
242
The following table shows the different modes a drive can be in:
Drive Mode
Description
Enabled
Only restore operations can be performed and non job related operations
such as: erasing, recycling, labelling, or identifying a cartridge; cleaning
or testing the drive, reinitializing the library.
Note: During a restore, drives in the mode Enabled for Restore only are
used in priority. If none is available, another drive is chosen. In addition,
if the cartridge required to perform the restore is already mounted in a
drive, that drive is used for the restore regardless of the drive mode.
Disabled
Maintenance
1.
2.
Choose Drive and one of the following: Enable, Enable for restore only, Maintenance or
Disable, depending on the mode you want to apply to the drives.
Enabling/Disabling
By default, when you create a drive, it is disabled. You must enable it in order to perform
any job (backup, archiving, restore...).
The disabled status indicates that the drive is not used for performing backups or
archiving.
If a drive is actually disconnected from the host, for maintenance reasons or for any other
reason, you must temporarily disable it to prevent Time Navigator from attempting to
use it.
See also Changing the Mode of the Drive, page 182 and Testing Drives, page 183.
To enable/disable a drive
In Time Navigator Library Manager, select the drive you want to enable/disable.
Choose Drive-Enable or Drive-Disable.
or
Chapter 6
243
Testing a Drive
Testing a drive allows you to check if it works correctly.
Note:
To test a drive:
1.
In the Library Operation window, select the drive you want to test, choose Drive-Test.
Time Navigator performs a series of tests on the drive.
Tip:
2.
You can also right click on a drive and choose Test. Time Navigator
performs a series of tests on the drive.
Cleaning a Drive
Drives must be cleaned on a regular basis to maintain them in good working conditions.
To clean a drive with a dedicated Cleaning slot:
1.
In Time Navigator Library Manager, select the drive you want to clean.
2.
Choose Drive-Cleaning.
or
Right click on a drive and choose Cleaning.
1.
2.
3.
Choose Drive-Cleaning.
244
In Time Navigator Library Manager, select the drive you want to empty and
choose Drive-Eject Media.
or
Right click on a drive and choose Eject Media.
Chapter 6
Cartridges
Slot/Cartridge Information
Description
Visual Clue
S0
S1
S2
245
246
Slot
Description
Visual Clue
S3, S4
S5
Slot is orange
(a red slot would indicate a fatal alarm, a
yellow slot, a minor alarm)
S6
S7
S8
S9
S10
Note 1:
A lock on the cartridge object (upper lock). It indicates that the cartridge itself is
reserved by a Time Navigator process.
A lock on the slot (lower lock). It indicates that the slot is reserved by a
Time Navigator process.
Note 2:
When a slot is disabled, it indicates that the slot is unavailable. This unavailability can
be of two types:
Chapter 6
247
Physical unavailability: the decision resides with the library handler. The slot may
be damaged.
Media Operations
Some of the media operations available from Time Navigator Library Manager are the
same as the ones available through the main menu Storage-Media-Management in
Time Navigator Administration Console.
To Recycle, Close, Reopen, Erase or Delete media
In the Library Operation window, select the cartridges you need, choose MediaOperations, select All Cartridges or Selection Only and select the operation you want to
perform.
or
Right click on a cartridge, select the operation you want to perform.
In addition, with Time Navigator Library Manager, you may identify a cartridge, bring
a cartridge On or Off line and move a cartridge from one slot to another.
Cartridge Status
If a cartridge is unknown to the catalog, it will appear in the library with questions marks.
You must identify it before attempting any operation on that cartridge. This operation is
equivalent to performing a library reinitialization for a single cartridge. Upon
identification, a cartridge will take on one of the following statuses:
Cartridge Status
Description
Spare
Lost + Found
Known
248
Identifying a Cartridge
To identify a cartridge:
In the Library Operations window, right click on the cartridge to identify and select
Identify.
or
Choose Reinitialization-Selection Only- Read Label. See Reinitializing Libraries,
page 237 for details.
Time Navigator provides assistance for quickly detecting cartridges that are eligible to
be put offline and externalized.
This feature also allows you to draw up the list of offline cartridges that should be put
online because they have passed their retention period.
See Externalizing Cartridges, page 203 for details.
The lists are displayed via two commands: tina_library_control for cartridges to
be put offline and tina_cart_control for cartridges to be put online. Some options
allows you to sort and filter the cartridge lists according to your needs.
See the Time Navigator Command Line Interface guide for details.
Bringing Cartridges On/Off line
Before bringing cartridge(s) online, make sure you have enough empty available slot(s)
in your library.
Note:
To bring a cleaning cartridge online or offline, see Cleaning Slot, page 253.
Chapter 6
249
1.
Put the cartridge(s) in the "in" or "in/out" mailbox slot(s) and proceed.
2.
3.
Perform a Bar Code reinitialization, to inform the catalog of the empty/full status of
the mailbox slot(s).
4.
Select the mailbox slot(s) containing cartridges to be brought on line and choose
Media-On-Line.
or
Right click on the mailbox slot(s) one after the other and select On-Line (this menu
is only available if the slot is full).
The cartridge(s) will be put in available slots and identified. If no drive is available at
the time, the cartridges will appear as unknown (????).
To bring cartridges online without a mailbox
1.
Note:
When you select the Media-On-Line command, all the slots available to
receive a cartridge become locked to avoid being used by another
procedure. Thus the non locked available slots in the screen above
refer to slots that were not locked and available before the operation
started.
250
2.
Click on View List to get a list of the slots available to receive a cartridge.
3.
Insert the cartridge(s), close the library door and click on OK.
4.
Time Navigator performs a partial barcode (read label if barcode is not an option)
reinitialization of all the slots available to receive a cartridge.
1.
2.
If you are putting off-line more cartridges than there are mailbox slots
in the library, check the Retry if mailbox full box. Once all mailbox slots are
full, Time Navigator waits for the administrator to empty the slots and
places cartridges into the slots as soon as they are emptied, until all
selected cartridges are put off-line.
If you do not check the option, an operator request is issued each time
the mailbox is full, thus sending the administrator back and forth
between the library to empty the mailbox and Administration Console to
suspend and acknowledge the operator requests.
3.
Check that the selected cartridges are the ones that you want to put off-line and
click on Confirm.
4.
5.
1.
2.
Chapter 6
251
3.
Click on View List to get a list of the slots to be emptied, i.e., the slots you selected
in step1.
4.
5.
Moving Cartridges
Time Navigator Library Manager allows you to move cartridges, from a location to
another.
Note:
Users cannot move the cleaning cartridge from one slot to another. Users are
only allowed to put the cleaning cartridge on or offline.
Note:
To move a cartridge:
1.
2.
Choose Media-Moving.
3.
Select the destination location in the Destination Choice Window and click on OK.
Tip:
You can also drag and drop the cartridge from its present location to its
destination. Except for the cleaning cartridge that cannot be dragged and
dropped.
To move several cartridges at once, use the Slots-Change Content menu. See Changing
252
Replacing a Cartridge
Defective, worn-out or otherwise unsuitable cartridges must be replaced physically in the
Library, and logically in Time Navigator. See Replacing a Cartridge, page 226.
Slot Operations
Mailbox Slots
The mailbox slots are used to add or remove cartridges in the library.
A mailbox slot can be:
Enabling/Disabling a Slot
You can disable a slot to prevent the current catalog from using that slot and the cartridge
it may contain. Enabling it allows the catalog to use the slot and associated cartridge.
This feature can be used to avoid mixing tapes inside the library if several catalogs are
using the same library.
When a slot is disabled, the catalog will view it as logically unavailable and will not
attempt to use it until it is enabled again.
To enable/disable a slot
1.
2.
Chapter 6
253
1.
2.
3.
Click on View list to see the list of the slots to modify, i.e., the slots designated in
step 1.
4.
5.
Time Navigator will initiate a partial reinitialization of the selected slots, in a Bar
Code mode if available, otherwise in a Read Label mode.
Cleaning Slot
The cleaning slot is specially designed to handle the cleaning cartridge. Once a slot is
chosen as the cleaning slot, Time Navigator will not attempt to read the cartridge located
inside that slot (during a full read label reinitialization for instance).
Most often, Slot 0 is designated as the cleaning slot. However this is not always the case,
some libraries do not have a preset cleaning slot. You will have to manually set it.
You can change the cleaning slot at any point, but a library cannot contain more than one
cleaning slot.
Some of the functions described below are also available through the Library Properties
window.
If no cleaning slot is defined, use the Add command to create one. If you want to re-assign
the cleaning slot to a different slot, use the Set command. Finally, to delete the cleaning
slot, use the Remove command.
254
1.
2.
3.
1.
2.
1.
2.
Chapter 6
255
256
Chapter 6
257
258
Chapter 6
259
260
Chapter 6
261
262
Chapter 6
263
264
Chapter 6
265
266
Chapter 6
267
268
Chapter 6
269
270
Chapter 6
271
272
Chapter 6
273
274
Chapter 6
275
276
Chapter 6
277
278
Chapter 6
279
280
Chapter 6
281
282
Chapter 6
283
284
285
C H A P T E R
Automatic Backup
Configuration
In this section, you will find the description of the steps required to configure your
Time Navigator environment to perform automatic backups or your data as well as
administration information.
286
Full
Synthetic full
Incremental
The full backup backs up the contents of all directories that have a backup selection
associated with the strategy.
The synthetic full backup is built from previous full and incremental backups and does
not generate any network traffic. Instead of copying objects (files and directories) from
the disk, Time Navigator finds the last backed up version of each object in the catalog
to build the synthetic full backup. For each object, the most recent version is taken into
account, whatever the strategy, i.e., if you are performing a synthetic backup with
strategy A, and the last version of a file was backed up by an incremental session with
strategy B, the synthetic backup will use the version from strategy B.
Warning:
You must have at least two drives available to perform Synthetic Full backups
since both a reading and a writing session are involved.
The incremental backup only backs up the objects that have been modified or created
since the last backup (either full or incremental of the same strategy). If your very first
backup is incremental, all files and directories will be backed up as they would have been
with a full backup.
Parallel Backups
Time Navigator Parallel Backup is a functionality that increases system performance
by splitting backup jobs into several processes that run simultaneously. Each process
backs up one backup selection.
When the parallel backup is in progress, each process is shown in Time Navigator Job
Manager as it takes place. When the parallel backup is complete, it appears as only one
job.
Chapter 7
287
Limitations
The following are not supported:
1.
Create several backup selections and check the Parallelization option for each of
them. See Define Backup Selection Window - Properties Tab, page 344.
2.
Create a strategy and associate all the backup selections involved in the parallel
backup to this strategy. See Creating a Backup Selection, page 339.
3.
Define the Parallelism Index of the strategy. This is the number of simultaneous
data streams. See Backup Strategy Window - Advanced Tab, page 306.
To determine the Parallelism index, add 1 to the number of simultaneous data
streams you want. For example, if you want 4 simultaneous data streams, the
Parallelism index is 5.
288
Scheduling issues
Incremental backups allow you to perform quick backups, minimizing the volume of
data transferred. Restore performance, however may not be optimal. If data is spread out
on several media, more media mounting/unmounting will be required to read data. This
may lengthen the overall restore time. Time Navigation will help optimize media
mounting and reduce the restore time of spread out data.
Full backups must be regularly performed for security reasons and to regroup data in
order to accelerate its restore. However, they will take more time because of the large
volume to back up. Performance will vary according to the networks and platforms types
being used.
Synthetic full backups do not initiate any activity on the client hosts nor on the network
since all operations are performed on the server where the catalog is located. They allow
you to save time and they avoid overwhelming a low bandwidth network and putting a
strain on client hosts.
They also let you back up migrated or compressed files rapidly. It is not necessary to
retrieve migrated files nor to decompress files compressed on disks by the operating
system (Windows 2000/2003, NetWare, etc.) before backing them up.
Note:
The synthetic full backup does not reflect the reality of the disk at the time it
is performed. For instance, files modified between the last backup taken into
account and the synthetic session are not backed up. It is thus recommended to
schedule a synthetic backup right after an incremental session.
Chapter 7
289
Backup Process
Each strategy is independent from the others. If the example file is backed up by Strategy
A, modified, then backed up by Strategy B, the next incremental session of Strategy A
will also back up the example file.
Backup strategies (defined by the administrator) are associated with backup selections
(defined for each client platform or platform groups by the administrator or users). For
each platform or platform group, backup selections determine the directories and files to
back up.
The server checks every 5 minutes which platforms are to be backed up. It then runs the
tina_backup program on the platforms to be backed up. The server must be able to connect
to the client: the Time Navigator service or daemon must be running on the client.
Note:
Service ends if the tina_daemon on the server is stopped. Clients will no longer
be able to connect. Error messages, such as Connection error with the host x or
The host x does not accept the connection are logged in the event file.
A backup session starts depending on the date and time defined in the strategy. For each
strategy, tina_backup checks the type of backup. If a full session is scheduled, all backup
selections associated with the strategy are considered. If an incremental session is
scheduled, the backup selections considered are those whose strategy and time settings
correspond to the current session.
When a backup selection is considered during a session, the files and the subdirectories
to back up are filtered by name and size (by default * for the name and infinite for the
maximum file size). A backup format must be defined for each strategy and eventually
compression and encoding can be selected.
For a given strategy and platform, only one session can take place at a time. If a session
is not complete, no new session can start. When a session starts, a Start backup (full or
incremental) message is logged in the event file. For each backup selection considered,
the beginning and the ending messages are added to the event file. When all backup
selections have been backed up, the End backup (full or incremental) message is added.
The session is complete, a new backup can start.
For more information concerning events, see Time Navigator Event Viewer,
page 445.
290
When using different strategies, you define different times, different recycling policies,
and different drives for any given platform. Each strategy is associated with at least a
main pool and eventually one or more multiple writing media pools for full and
incremental sessions.
Main pools allow you to specify the drives to be used for backups, the media to be used
and the recycling mode. Main pools for incremental and full sessions of a given strategy
can be identical or distinct.
Multiple writing pools allow you to perform duplicate copies of the files backed up by a
session. You can define up to three multiple writing pools.
A main pool may also be a multiple writing pool. Each file is then copied twice with the
same drives, on the same media pool.
Note:
If you are scheduling a backup with several pools, i.e., with duplicate writing
sessions, you must have at least one available drive per media pool, since
duplicate writing sessions take place simultaneously.
Manual Triggering
In addition to automatically scheduled backup, the administrator can manually trigger a
(full or incremental) backup for any strategy, on any platform.
An incremental session performed under those conditions includes all backup selections
associated with the selected strategy.
Chapter 7
291
Administration Assistant
The administration assistant automatically opens when you launch Time Navigator
Administration Console, if:
You do not have any devices configured in your catalog. In that case, the assistant
allows you to start the Device Configuration Wizard (see Initial Configuration of
Devices in Time Navigator, page 139 for details).
One or more platforms in the catalog have not been configured for backup yet. In
that case, the assistant allows you to start the Backup Wizard (see Backup
Strategies, page 300 for details).
To disable the automatic launching of the assistant, set the tunable Disable Administration
Assistant. See the Time Navigator Tunables guide for details.
Backup Wizard
The Backup Wizard allows you to configure platforms for backup. A backup
configuration consists of the following elements:
A backup selection
A media pool
A scheduling
The wizard automatically assigns the backup configuration to the first available strategy
for the given platform. For instance, if you are configuring a backup on the platform
"myplatform" that has no strategy defined yet, the Wizard will use Strategy A. If
"myplatform" already has strategies A and B defined, then the wizard will create
Strategy C.
1.
292
You can also right click on a platform and choose Backup Wizard.
Click on Next.
2.
In the Platform Selection window, select the platform that needs to be configured
for backup.
Note:
Chapter 7
293
Click on Next.
Note:
If compatible platforms (same operating system for hosts, and same type
for applications) have already been configured for backup, the wizard
gives you the option to Configure a new backup or Back up with an existing
configuration. If you choose to use an existing configuration, the wizard
lets you select the platform whose configuration you want to use.
294
3.
4.
In the New Backup Selection window, enter the path of the folder containing the
data to back up, or click on Browse to select the path.
In the Media Pool window, choose wether you want to use the same or separate
pools for full and incremental backups. If you use the same pool, both backup types
will have the same retention period (i.e., the amount of time backed up data is kept
before the media is recycled) and will be backed up using the same device.
Chapter 7
295
Click on Next.
Note:
6.
If you already have media pools in your catalog, the wizard asks whether
you want to use an existing pool or create a new one. If you choose to
use an existing pool, the wizard asks you to select a pool from the list
of available pools.
In the Media Pool Parameters window, indicate the retention period and device to
use for the new pool.
296
Retention Period
If you do not want to limit the amount of time during which data is stored, select
Do not reuse media. Otherwise, choose the number of days, months or years during
which data will be stored. Once that time period expires, the media will be reused
to store new data.
Device
Select the library you want to use to back up your data.
Click on Next.
7.
In the Media Pool Name window, enter a name for the new pool.
Chapter 7
297
Click on Next.
Note:
8.
If you chose to use separate pools for full and incremental backups, you
need to define both a full pool and an incremental pool.
298
Typically, full backups are performed weekly while incremental backups are
performed daily.
Click on Next.
9.
Chapter 7
299
Click on Next.
Note:
In your catalog, if you have some platforms compatible with the one you
are configuring (same operating system for hosts, and same type for
applications), and that are not yet configured for backup, the wizard
opens the Platform Group window, to let you apply the current backup
configuration to these platforms.
Note:
Click on Finish.
In Time Navigator Administration Console, the platform(s) you configured now
show the letter of the Strategy you just defined.
300
Backup Strategies
About Backup Strategy
Strategies allow you to schedule dates and times for automatic backup, job priority and
parallelism, snapshot or replication sessions and to specify the media pool to be used to
write data.
Strategies must be defined for each platform or platform group to be backed up, snapshot
or replicated. If no strategy is defined for a platform or platform group, no file will be
backed up.
Strategies are referred to by the letters A, B, C and D and appear in the Network area of
Time Navigator Administration Console.
Strategy Types
Backup strategy
Snapshot strategy (see the Time Navigator SnapBackup guide for details)
Replication strategy (see the Time Navigator Replication guide for details)
Note:
Once you have chosen the type of a strategy, you cannot modify it, i.e., you
cannot turn a snapshot strategy into a standard backup strategy. If a particular
strategy is no longer needed, delete it and recreate a new strategy of a different
type.
In additon, you cannot create both snapshot and replication strategies on a
single platform.
Simultaneous Backups
One of the issues you have to watch out for when scheduling backups, is the number of
simultaneous backups. When a session is about to be performed, a job is created on the
backup server which in turn launches a tina_daemon process and a tina_backup process. As
a result, if many backups are scheduled at the same time, the server could become
saturated with all the tina_daemon and tina_backup processes.
If you are particularly concerned with your backup server performances, you have the
option to limit the number of simultaneous jobs via two tunables: Limit Number of
Simultaneous Jobs (limit_nb_jobs) and Maximum Number of Simultaneous Jobs
(max_nb_jobs).
Chapter 7
301
The parallelism index defines the maximum number of jobs for each defined strategy. A
parallelism index is set as a practical upper limit according to your system resources. It
can also be set as an upper limit that you wish to attain but may not be able to all of the
time.
If more than 4 strategies are needed for a particular platform, you have the
option of creating a clone of the platform with the Filesystem application. You
will then have four more strategies available for each Filesystem application you
create on a given platform. See Creating Applications, page 81.
Note:
The Strategy Creation procedure only takes into account the creation of a
backup strategy. For snapshot or replication strategy, see the Time Navigator
SnapBackup guide or the Time Navigator Replication guide.
1.
2.
3.
Fill in the parameters for the new backup strategy as described in:
302
4.
Note:
To import information from another strategy, click on Import. In the Import a Strategy
window, select a platform, a strategy, the elements you want to import and click
on OK.
The Default Configuration button sets default for all tabs at once.
The new strategy appears under the host icon in the Network area of Time Navigator
Administration Console.
Chapter 7
303
Main: Lets you select a main media pool from the list of available pools.
Note:
Even if you do not want to schedule full backups for this strategy, you must
select a main media pool in the Full tab.
can define up to three secondary media pools. The Add button lets you select pools
from the list of available pools. The Remove button deletes a pool from the
Multiple Writing Pools list.
Warning:
Using multiple writing requires having at least one drive per simultaneous
backup copies to be performed.
Schedule name: Indicates the name of the schedule that triggers automatic backups.
Choose: Opens the Schedule Management window to let you select a schedule from
New: Opens the Schedule window to let you define a new schedule.
Edit: Allows you to edit the schedule specified in the Schedule Name field.
Unlink: Allows you to unlink the schedule currently associated to the strategy.
Disable Temporarily: Allows you to pause the full backups that should take place with
304
A, B, C and D: Backup strategies involved in a synthetic backup. If you do not want the
synthetic backup to be constructed from previous backups of all strategies, uncheck the
unwanted strategies.
Note:
Note:
You must have at least 2 drives available to perform Synthetic backups since
both a reading and a writing session are involved.
Options set in the Advanced tab do not apply to Synthetic backups except for the
Format option.
calendar.
Chapter 7
305
Note:
Even if you do not want to schedule incremental backups for this strategy,
you must select a main media pool in the Incremental tab.
Main: Lets you select a main media pool from the list of available pools.
can define up to three secondary media pools. The Add button lets you select pools
from the list of available pools. The Remove button deletes a pool from the
306
Using multiple writing requires having at least one drive per simultaneous
backup copies to be performed.
Schedule name: Indicates the name of the schedule that triggers automatic backups.
Choose: Opens the Schedule Management window to let you select a schedule from
New: Opens the Schedule window to let you define a new schedule.
Edit: Allows you to edit the schedule specified in the Schedule Name field.
Unlink: Allows you to unlink the schedule currently associated to the strategy.
Disable Temporarily: Allows you to pause the incremental backups that should take
calendar.
Chapter 7
Warning:
307
All the Advanced options you set apply to both incremental and full backups
defined for the strategy, except if you have selected the Synthetic backup
option in the Full tab. Only the Format option of the Advanced option, will
apply to a Synthetic backup.
The Use Cache on Server option allows you choose whether to back up data using the
cache on the Time Navigator server. If you you choose not to use the cache, and
the platform is a storage node, the library and drives can be directly attached to it.
If the platform is a Time Navigator Agent, data is backed up via a storage node.
The Go through Network Filesystem option concerns Unix hosts only. It allows
Time Navigator to go through NFS mount points, in order to back up files located
on other disks.
Note:
The root user of the machine performing the backup must have the access
rights to the machine on which NFS points have been mounted.
308
Tip:
The Do not go through Local File System option prevents Time Navigator from backing
up file systems mounted on a local mount point. Only the file system designated
by the backup selection is backed up.
The Wait for End of Writing on Media option allows you to wait until data has safely
been written on media before performing a postprocessing. The backup strategy
will be displayed as being in progress, i.e., with a green background, in
Time Navigator Administration Console Network area, until data is written on
media rather than until it is written in the cache space, as is usually the case.
The Specific Attribute Backup option allows:
ACLs (Access Control List) backup into the catalog and files access rights
management. This option is available on specific platforms where ACLs are backed
up on tapes by default and can also be backed up into the catalog, if this option is
activated.
Note:
The Relaunch until Platform is Reachable option ensures that a strategy remains active
until the platform can be reached. Time Navigator checks every 5 minutes for a
list of platforms to be backed up according to the schedules defined in the various
strategies. If this option is checked, an unreachable platform remains on that list
until it is actually backed up, whatever the reason for the unreachability.
Tip:
The Continue Backup if one of the Multiple Writing Sessions Fails option ensures that a
backup job starts or continues even if one of the writing sessions composing the
job fails or cannot start. For instance, if one of the drives fails before or during a
Chapter 7
309
backup in multiple writing mode, one of the sessions stops but the other ones will
continue. The user can eventually perform a media duplication at a later date if
necessary.
The On Demand Backup option makes this strategy available to authorized users from
agent posts to run backups on demand, outside the schedule set by the administrator
(See On Demand Backup, page 405).
The Sessions can be Multiplexed option allows you to manage the macro-multiplexing
mechanism. When several backups are started simultaneously, this mechanism is
used to split a backup into blocks in order to optimize backup duration and medium
use.
Note:
Format Area
Allows you to select the Writing Formats (see Writing Formats, page 202 for details)
that will be used for backup. Click on the radio button of the format you want. By default,
the TiNa format is selected.
Warning:
On a Windows 2000/2003 machine, if you use the tar or cpio formats, some
information will not be backed up. For example, some file attributes and
some data associated with files will not be backed up.
Note:
If you uncheck the Use Cache on Server option, the only formats available are
sidf or tar.
Note:
If you are creating a strategy for an NDMP application, you must use the
"unknown" format. This is the only case when this format is used.
310
Command Area
In the Commands area, you can indicate actions to be taken immediately before (Preprocessing) and immediately after (Post-Processing) a backup has taken place. You must
enter either the absolute path of the command you want to execute, or the absolute path
of a script file or executable file.
Tip:
You can use one of the Pre- and- Postprocessing Variables (see Pre- and
Postprocessing Variables, page 313) set by the backup process in the
processing scripts
Pre-processing example:
/Applications/database/stop_database.sh
/home/people/db/stop_database.sh
c:\database\stop_database.cmd
Post-processing example:
/Applications/database/start_database.sh
/home/people/db/start_database.sh
c:\database\start_database.cmd
Note:
Note:
Jobs Area
Priority: Indicates the priority level of jobs associated with the strategy being defined.
Chapter 7
311
Parallelism Index: Allows you to define the number of jobs that can be performed
simultaneously. The maximum value depends on the number of drives available for
backup operations.
Note:
A value of 0 for the Parallelism Index turns off parallelism. The (default) value
1 does not allow parallel jobs. The minimum value to activate parallelism is 3.
Having set a paralellism index, you must associate it with a backup selection to fully
define a parallel backup. See Define Backup Selection Window - Properties Tab,
page 344 for more information.
Retry on Incident Area
Allows you to automatically restart, at regular intervals, a failed backup. Enter a number
in the Number textbox to specify how many times Time Navigator will restart the
automatic backup. Enter a time interval in minutes in the Interval textbox to specify the
time interval between restarting attempts.
By default, a backup will be restarted twice with a 10 minute interval.
Reset: Sets default for all tabs at once.
Import: Allows you to use information from another strategy.
Calendar View: Allows you to view the scheduled backups at a glance in a monthly
calendar.
The FinderInfo along with the ResourceFork constitute the Apple extended attributes. In
addition, there can be third party extended attributes. Extended attributes consist of a
name and data. They are currently used only on Mac OS. They are directly integrated in
file systems (HFS, XSAN and UFS). On UFS and XSAN, they are stored in ._ files.
ACLs are not stored as extended attributes on Mac OS.
312
All extended attributes are backed up on tape. However, currently only the FinderInfo
can also be backed up in the catalog.
Operating System
Catalog Backup of
Extended Attributes
(FinderInfo only)
Tape Backup of
Extended Attributes
Tina5
sidf
Writing Format
Tina5
sidf
tar
tar
no
no
yes,
optional
yes,
optional
yes
no
yes,
optional
yes
yes
no
yes,
optional
yes
To back up the Finder info in the catalog, check the option Specific Attribute Backup when
defining the backup strategy for the client. See Backup Strategy Window - Advanced
Tab, page 306 for details.
ACLs
Operating System
Writing Format
tar
tar
Unix:
Solaris, HP-UX, Fujitsu,
Digital Unix, CRAY, AIX,
Linux
no
no
yes, optional
yes, optional
Other Unix
no
no
no
no
Chapter 7
Operating System
313
Mac OS X:
10.3 (Panther)
10.4 (Tiger)
10.5 (Leopard)
no
no
no
no
no
no
no
yes, optional
yes, optional
no
yes, optional
yes, optional
Windows:
2000/2003
XP
yes
n/a
no
n/a
yes, optional
n/a
yes, optional
n/a
NetWare
no
no
yes
yes
VMS
no
no
yes, optional
yes, optional
yes
no
no
no
In cases where ACLs backup is optional, the choice is made by checking the Specific
Attribute Backup option when the backup strategy for the client is defined. See Backup
Strategy Window - Advanced Tab, page 306, for details.
Note:
It is essential to check the Specific Attribute Backup option if you need to restore
only the Specific Attributes of an object without the data.
Note:
When deciding whether or not to back up Specific Attributes in the catalog for
Windows 2000/2003, keep in mind that they could make your catalog quite
voluminous and affect performance. Specific Attributes tape backup on the
other hand has no impact on performance.
Value
TINA_BACKUP_COPY_MODE
TINA_EVT_JOB_INFO
Job number
314
Variable Name
Value
TINA_CATALOG
TINA_HOME
Value
TINA_BACKUP_COPY_MODE
TINA_EVT_JOB_INFO
Job number
TINA_CATALOG
TINA_HOME
TINA_RETCODE
option concerns only the Oracle and List applications and is mandatory for these two
applications, since some of the data cannot be snapshotted (for instance the redo logs for
Oracle).
Remove Snapshot after Backup: Specifies that Time Navigator removes the snapshot contents
from disk once it has been backed up on tape. This option is only available if you perform
a tape copy of your snapshot.
Default Configuration:
calendar.
See the Time Navigator SnapBackup guide for details.
Chapter 7
315
Allow incremental Replication: Allows you to keep track of the replicas in the catalog. This
option is mandatory to perform incremental replication and to keep the replica up to date
if, for instance some files have been deleted since the last replica.
See the Time Navigator Replication guide for details.
Default Configuration:
calendar.
1.
2.
316
Right click on the letter of the strategy you want to back up, below the host icon,
and select Full (or Incremental) Session Now.
3.
The backup starts if the selected platform or platform group is enabled and if no
other session of the strategy is in progress.
Editing Strategies
The Backup-Selected Platform- Strategy-Properties menu is used to edit a backup strategy.
To edit a backup strategy
1.
Select a platform.
2.
3.
Deleting Strategies
You can delete a strategy. In this case, the backups scheduled with that strategy will not
be performed any longer.
To delete a backup strategy
1.
Select a platform.
2.
3.
Click on Delete to delete the strategy. A dialog box prompts you to confirm your
decision.
The deleted strategy is removed from the Network area of Time Navigator
Administration Console.
Chapter 7
1.
2.
Platform: Name of the host or application for which the strategy is defined.
317
318
Main Pool (full): Name of the main full pool associated to the strategy.
Main Pool (incremental): Name of the main incremental pool associated to the strategy.
Secondary Pools (full): Name of the secondary full pools associated to the strategy.
the strategy.
Synthetic: Indicates the letter of the strategies involved in synthetic backups for the
platform.
Priority: Indicates the strategy priority as defined in the Advanced tab of the
strategy. Possible values are: High, Very high, Medium, Low Very low.
Properties: Opens the Strategy Properties window for the selected strategy.
Tip:
You can also double click on a strategy in the list to open the Strategy
Properties window.
Modify Media Pools: Opens the Strategy Pool window to modify the pools for the selected
strategies.
Modify Schedules: Opens the Strategy Schedules window to modify schedules for the
selected strategies.
Modify Priority: Allows to change the priority of the selected strategy. Choose the priority
Chapter 7
319
Note:
Whenever you select a strategy in the list, all the other strategies that could be
affected by a modification of that strategy (i.e., strategies bearing the same
letter and associated to platforms belonging to the same group) are highlighted
too.
1.
2.
3.
4.
Click on OK. The exported file is created in the location you specified.
5.
Click on Close in the Strategy List window when you are done.
Editing Strategies
Note:
When you modify a strategy, all the strategies bearing the same letter and
associated to platforms belonging to the same group are modified as well.
To edit a strategy
1.
2.
Select the strategy you want to edit and click on Properties. The Strategy Properties
window appears. Modify the parameters as needed and click on OK to apply the
modifications. See Creating a Backup Strategy, page 301 for details.
3.
4.
Click on Close in the Strategy List window when you are done.
320
When you modify a strategy, all the strategies bearing the same letter and
associated to platforms belonging to the same group are modified as well.
1.
2.
Select the strategies for which you want to modify pools and click on Modify Media
Pools. The Strategy Pools window appears.
3.
Modify the pools as described in Strategy Pools Window, page 320 and click
on OK to apply the modifications. See Creating a Backup Strategy, page 301 for
details concerning strategy pools.
4.
Click on Close in the Strategy List window when you are done.
Modify Secondary Full Pools: Check this box to modify the secondary full pools
Add to existing secondary pools: Specifies that the secondary pools you define are in
Replace existing secondary pools: Specifies that the secondary pools you define are
Remove from existing secondary pools: Specifies that the secondary pools you define
Select: Allows you to select pools from the list of available pools.
Chapter 7
321
Add to existing secondary pools: Specifies that the secondary pools you define are in
Replace existing secondary pools: Specifies that the secondary pools you define are
Remove from existing secondary pools: Specifies that the secondary pools you define
Select: Allows you to select pools from the list of available pools.
1.
2.
Select the strategies for which you want to modify schedules and click on Modify
Schedules. The Strategy Schedules window appears.
3.
Modify the schedules as described in Strategy Schedules Window, page 321 and
click on OK to apply the modifications. See Creating a Schedule, page 326 for
details concerning schedules.
4.
Click on Close in the Strategy List window when you are done.
Modify Full Schedule Status: Check this box to modify the full schedule status.
Disable Temporarily: Allows you to pause the full backups that should take
322
Modify Incremental Schedule Status: Check this box to modify the incremental schedule
status.
Disable Temporarily: Allows you to pause the incremental backups that should
take place with the strategy until you uncheck the box.
1.
2.
Select the strategies you want to reset and click on Reset Pending Strategies.
3.
4.
Click on Close in the Strategy List window when you are done.
Deleting Strategies
Note:
When you delete a strategy, all the strategies bearing the same letter and
associated to platforms belonging to the same group are deleted as well.
To delete strategies
1.
2.
Select the strategies you want to delete and click on Delete. See Deleting
Strategies, page 316 for details.
3.
4.
Once the operation is completed the strategies no longer appear in the list.
5.
Click on Close in the Strategy List window when you are done.
Chapter 7
323
Scheduler
Note:
If you are upgrading from a version prior to version 4.1.0, schedules are
automatically created based on the scheduling information contained in your
existing backup strategies.
A name
A schedule can be either created from scratch, copied from an existing schedule,
imported from a file or you can modify an existing schedule. You can also delete a
schedule if you no longer need it, however you will not be able to delete a schedule if it
is associated to an active job.
The same schedule can be used by several strategies.
By default, when you create a catalog, the following three schedules are created:
Schedule rule
Start rules that allow you to define the day(s) and times of the week/month when a
backup should take place
Activity Interval rules that allow you to define times during the day when backups can
324
take place
Exclusion rules that allow you to define specific days when backups cannot take
place.
Note:
You can use any combination of rules for a particular schedule, with at least
one Start rule defined in order to launch backups.
Similarly to a schedule, a schedule rule can be either created from scratch, copied from
an existing rule, or you can modify an existing rule. A rule can also be deleted if you no
longer need it.
1.
2.
Chapter 7
325
Scheduler Activity Accounting Event: Enables the generation of event logs for scheduler
activities.
Disable Scheduler Activity: If the Scheduler is disabled no scheduled backups can take place
in the catalog.
Send an Alarm if Scheduler is Disabled: Allows to choose whether or not an alarm is generated
time.
Note:
The control over the number of jobs running simultaneously only takes place
when a scheduled job is launched, not when a job is manually launched.
However all jobs are taken into account (whether launched automatically or
manually) when counting the number of jobs running.
Maximum Number of Simultaneous Jobs: Allows to define the maximum number of jobs that
could be running at the same time. The default value is 100.
Warn if Maximum Number of Jobs is exceeded: Check this box to trigger alarms, warnings and
logs when the number of jobs running is greater than the maximum you defined.
Cancellation Timeout for Scheduled jobs:
326
Recurrent: Allows you to choose the days of the week that are non working days.
Specific: The Add and Remove buttons allow you to define a list of non working days via
a calendar. The days chosen appear in the Date column.
Creating a Schedule
To create a schedule
1.
2.
3.
Chapter 7
4.
327
You need to create at least one schedule rule. To do so, depending on the rule type
you want to create, click on:
Start rules allows you to define the times when you want to launch backups.
See Backup Launching Rule Window, page 329 for a description of the
required parameters.
Activity interval rules allow you to define a time period during the day when
backups are allowed to run. See Activity Interval Rule Window, page 331
for a description of the required parameters.
Exclusion rules allow you to define criteria upon which exclusions are based.
See Exclusion Rule Window, page 333 for a description of the required
parameters.
Warning:
The schedule takes into account all the rules you define.
5.
Click on OK.
Schedule Window
Name: Name of the current Schedule.
Rules tab
328
Calendar Area
<< button: Moves the calendar displays back one year.
< button: Moves the calendar display back one month.
> button: Moves the calendar displays forward one month.
>> button: Moves the calendar display forward one year.
Note:
Once a backup has been scheduled for a day, a black dot appears next
to that day in the calendar area.
Actions Tab
The actions tabs provides the following information concerning the strategies that use this
particular schedule.
Advanced Tab
Schedule Activity Accounting Events: Check this box if you want scheduling events to be
Only events concerning this schedule are recorded if you activate the Schedule
Activity Accounting Events. To activate events logging for the entire Scheduler,
do so in the Sheduler Configuration window (see Configuring the Scheduler,
page 324).
Chapter 7
329
Daily: If you select daily backups, you must choose between every n days, every
working or non working day, or define a specific date when you want backups to
330
take place.
Note:
You can define the non working days in the Scheduler Configuration
window. See Configuring the Scheduler, page 324 for details.
Weekly: If you select weekly backups, specify if it is every week or n week and on
Monthly: If you select monthly backups, specify the day of the month when you
Define Start Hour: Check this box if you want to define a backup launching rule.
Hours and Minutes: Use the scroll down lists to select the backup time.
Add: Allows you to add the selected hours and minutes in the Defined Times list in order
to schedule a backup.
Next Hour: Adds the hour following the one selected in the list as a backup time.
Chapter 7
331
Next 15 minutes: Adds 15 minutes to the time selected in the list and create a new backup
time.
Defined Times: Lists all the backup times.
Delete: Deletes the selected backup time.
Validity Tab
Start Date: Defines the date when the rule becomes valid. The rule is not taken into
End Date: Defines the date when the rule is no longer valid. The rule is not taken
into account after the End Date. This parameter is not mandatory.
332
Define an Interval: Check this box if you want to define an Active Interval rule.
Start Hour: Defines the hour when the active interval begins, i.e., no backup can
take place before this time. The earliest beginnning Start Hour is 00:00.
End Hour: Defines the hour when the active interval ends, i.e., no backup can take
place after this time. The latest End Hour is 23:55. Defining an End Hour is not
mandatory, if you do not specify the end hour, backups will continue according to
the next day Start Hour parameter.
Cancel jobs if outside of the interval: Specifies that if a job is still in progress while the
Let jobs continue outside of the interval: Specifies that if a job is still in progress while
Chapter 7
333
Let jobs continue outside of the interval and send an alarm: Specifies that if a job is still in
progress while the interval end hour is reached, the job is allowed to continue, but
an alarm warns that the job is running outside the active interval.
Validity Tab
See Validity Tab, page 331.
334
Solution:
Start Rule:
Define 23h00 as a start hour on Sunday.
Activity Interval Rule
Define an active interval from 00h00 to 08h00 for all working days and select
"Cancel jobs if outside interval".
Example 2
Backup requirements:
Schedule incremental backups every working day at 7 pm. Backups must imperatively
stop on the following day at 8 am if it is a working day.
Solution:
Create a schedule consisting of a Start rule and an two Activity Interval rules:
Start Rule:
In the first rule, define 19h00 as a start hour for every working day.
Activity Interval Rule:
Define an active interval from 00h00 to 08h00 for all working days and select
"Cancel jobs if outside interval".
Activity Interval Rule:
Define an active interval with a beginning time of 19:00 and no ending time, for
all working days.
Example 3
Backup requirements:
Schedule incremental backups every working day at 10 pm. Backup must imperatively
stop on the following day at 8 am if it is a working day. If some backups are paused,
they must restart at 7 pm on working days.
Solution:
Create a schedule consisting of a Start rule and an two Activity Interval rules:
Start Rule:
In the first rule define 22:00 pm as a start hour for all working days.
Activity Interval Rule:
In the second rule define an active interval from 00:00 to 08:00 for all working
days.
Activity Interval Rule:
Chapter 7
335
In the third rule define an active interval with a beginning time of 19:00 and no
ending time, for all working days.
Example 4
Backup requirements:
Schedule a full backup the first monday of each month at 8 pm. The backup must
imperatively stop on the following day at 8 pm.
Solution:
Create a schedule consisting of a Start rule and an Activity Interval rule:
In the first rule define 20:00 as a start hour every first monday of the month.
In the second rule define an active interval from 00:00 to 20:00 every first monday
of the month, with an offset of one day.
Example 5
Backup requirements:
Schedule a full backup on pool A on the last sunday of the month.
Schedule full backups on pool B every sunday of the month except the last one.
Solution:
Create two schedules as follows:
For the first schedule, define a Start rule with a monthly frequency on the last
Sunday every month. Choose a Start Hour.
Associate that schedule to Strategy A that uses Pool A for full backups.
For the second schedule, define a Start rule with a monthly frequency on the 2nd,
3rd, 4th and last Sunday every month. Add an offset of -7 days. Choose a Start
Hour.
Associate that schedule to Strategy B that uses Pool B for full backups.
Scheduling a Backup
To schedule automatic backups for a platform, proceed as follows:
1.
In Time Navigator Administration Console, select a platform and choose BackupSelected Platform-Strategy A, B, C or D-New, or Properties if the strategy is already
created.
2.
To schedule full backups, click on Choose in the Scheduler area of the Full tab, to
select an existing Schedule, or click on New if you want to define a new schedule
(see Creating a Schedule, page 326).
336
3.
4.
Editing a Schedule
Note:
When you edit a schedule, all the strategies that use that particular schedule
will be affected.
To edit a schedule
1.
2.
Select a schedule in the list and click on Properties. The Schedule window appears.
3.
Modify parameters as needed (see Schedule Window, page 327 and Backup
Launching Rule Window, page 329), and click on OK.
Copying a Schedule
To copy a schedule
1.
2.
Select the schedule you want to copy in the list and click on Copy. The Schedule
is copied and appears in the list as Copy of....
3.
Importing a Schedule
To import a schedule
1.
2.
3.
Enter the name and path of the file containing the schedule to import, or browse
your file system and select it.
Chapter 7
4.
337
Exporting a Schedule
To export a schedule
1.
2.
3.
Enter the name and path of the file where you want to export the schedule, or
browse your file system and select it.
4.
Deleting a Schedule
Note:
Prior to deleting a schedule, you must unlink it from every strategy that is using
that particular schedule. In addition, you will not be able to delete a schedule
if it is associated to an active job.
To delete a schedule
1.
2.
3.
1.
2.
Select the schedule you want to copy a rule from and click on Properties.
3.
In the Schedule window, select the rule to copy and click on Copy.
4.
Select the type of the copied rule, either Start, Activity Interval or Exclusion.
338
5.
In the Schedule Rule window, modify the rule parameters as described in Backup
Launching Rule Window, page 329, Activity Interval Rule Window,
page 331 ou Exclusion Rule Window, page 333.
6.
7.
Click on OK in the Schedule Rule and Schedule windows to validate your choice.
1.
2.
Select the schedule in which you want to modify a rule and click on Properties.
3.
In the Schedule window, select the rule to modify and click on Properties.
4.
5.
1.
2.
Select the schedule in which you want to delete a rule and click on Properties.
3.
In the Schedule window, select the rule to delete and click on Delete.
Chapter 7
339
Backup Selections
About Backup Selections
Backup Selections specify the directories to be backed up, as well as time phases and
conditions under which directories are backed up. If no backup selection is defined for a
platform, backup cannot take place with Time Navigator. Any user authorized by the
administrator can define, modify or delete a backup selection with Time Navigator
Restore & Archive Manager.
Defining a backup selection consists of defining the following settings:
The Format options (compressing and/or encoding data, only available with the TiNa
format).
The Filters on the name and size of the backed up files.
All backup selections associated with a strategy are taken into consideration during
backups. Except in the case of an automatically initiated incremental backup, where only
backup selections whose time phases correspond to the current session strategy times are
considered.
You may also use Time Navigator Restore & Archive Manager to define
your backup selections. Select the host and choose Platform-Time Navigator
Restore & Archive Manager. In the file tree, select the directory on which
you want to set a backup selection and choose BackupSelection-New. In the
Define Backup Selection window, set the parameters as indicated in the
procedure below.
1.
340
2.
3.
Click on New. The Path of the New Backup Selection window appears.
4.
Enter the path of the directory to back up in the Backup Selection textbox or click
on the Browse icon. The Browsing window appears. Select the directory you want
in the file tree and click on OK. The Define Backup Selection window is displayed.
The Directory represents the backup selection you are currently defining.
Warning:
5.
If you do not use the browsing feature, verify that you enter the
correct directory path in the POSIX form (for instance /c/data and not
c:\data) to make sure that your directory will actually be backed up.
Note:
Strategies: Select the strategy you want your backup selection to be backed
up with. The star (*) next to a strategy indicates that the strategy has actually
been defined.
By Default, all time phases and all strategies are selected, no filters or special
formats are set. For a description of the filters, time phases and format, see
Chapter 7
6.
341
Time Navigator catalog directories that are already backed up via the Catalog
application:
$TINA_HOME/Data.catalog_name
$TINA_HOME/Data.catalog_name
%TINA_HOME%\Data.catalog_name
342
Select: Selection filter list. See Selection Filters Window, page 342.
Exclude: Exclusion filter list. See Exclusion Filters Window, page 343.
For instance, the * character in the Selection textbox will back up all the objects.
The *.old string in the Exclusion textbox will exclude all the .old files.
Tip:
You can also directly enter a list of filters separated by spaces in the Selection
or Exclusion textboxes. If the file or directory names contain spaces, you must
insert a backslash before the space charaters to prevent Time Navigator from
interpreting them as string separators (for instance: hello\ world).
Size: Filters objects according to their size by setting a maximum file size. This filter
does not apply to directories.
Files Modified Since: Filters files according to their last modification date. This filter does
All the selection filters from compatible platforms in the catalog are available
for import.
Chapter 7
343
All the exclusion filters from compatible platforms in the catalog are available
for import.
344
Compressed: Gives you better time performances in low data flow network since it reduces
the amount of data traveling through the network. However, it requires more machine
resources. It also uses less space on storage media. Compression takes place on the client
machine.
Chapter 7
345
Encoded: Protects data against illicit reading. When the Encoded box is checked, data
traveling on the network is encoded and is writen on media encoded. Encoding takes
place on the client machine.
Tip:
In order to restore encoded data, you need the original catalog into which the
data was backed up, or you can use the tina_cart command. tina_cart allows
you to automatically decode data contained on a media.
Note:
The Compressed and Encoded options are only available if the strategies you
chose the TiNa format when you create the strategy.
Parallelized: Enables parallel backups for the backup selection being defined. This is used
with strategy definitions to enhance backup performance. With applications, only backup
selections that can be parallelized according to the application can be enabled.
Once you have enabled parallel backups, you will also have to set a Parallelism Index whose
maximum value equals the number of available drives.
Note:
Parallel restore does not depend on using this option. It is entirely possible to
use parallel restore on backup selections that were not backed up using the
parallelized option.
346
The selected rule must be signed by the certificate authentifying the host from
which the backup is initiated.
Backup: Applies the security rule to the backup selection during backup.
Archiving: Applies the security rule to the backup selection during archiving. Make sure
you choose this option if you want to secure the backup of applications using archive
folders such as Time Navigator for Oracle using Recovery Manager.
For more information on security rules and certificates, see the Time Navigator Security
& Compliance Manager guide.
Default Configuration: Resets all the parameters to the default configuration.
Chapter 7
347
Filter Syntax
Note:
Filters use Posix syntax, i.e. forward slashes rather than backslashes,
regardless of Operating System.
Note:
To select the files tina, tina_adm and tina_restore from the directory
/application/tina/Bin
/usr/tina/Bin
c:\Program Files\Atempo\tina\Bin
You can:
Either define a backup selection at the root of the platform and enter the following
Selection filters :
/usr/tina/Bin/tina
/usr/tina/Bin/tina_adm
/c/Program Files/Atempo/tina/Bin/tina_restore
The paths dir/file and /.../dir/file are equivalent since in both cases, the selection is
performed in the whole tree structure defined in the backup selection.
Conversely, the paths dir/file and dir/.../file are not equivalent.
If you specify dir/file, the selection is performed on the file file in the dir directory under
the backup selection.
If you specify dir/.../file, the selection is performed on all the files file from the directory
dir under the backup selection.
348
The default value of the directories that can be filtered is the sign * (it represents the full
directory contents).
Filters can be used in backup selections to narrow down the choice of files to be backed
up (selection and/or rejection lists) or in the file tree of Time Navigator Restore &
Archive Manager to view only the wanted files.
1.
Level 1
Level 2
Level 3 Level 4
DirRoot
Dir01
Dir001
2.
3.
Dir02
Dir002
Dir0002
file.log
file1.txt
file2.log
file3.log
Log
Dir0002
6.
7.
Level 6
file2.txt
4.
5.
Level 5
file.log
file.txt
Dir03
8.
Dir003
Dir002
file.txt
9.
file.txt
10
.
tmp
log1.log
11
data
log
log1.txt
Chapter 7
349
/DirRoot/Dir01/Dir001/file2.txt
To back up just one file in a tree structure, specify the whole path and name. This
line backs up the file in line 2, as well as the entire directory structure.
/DirRoot/Dir02/Dir002/*.log
To back up all files with the extension .log, in the directory /DirRoot/Dir02/Dir002/
(the files in lines 3 and 4). Also backs up the entire directory structure.
/Dir02/Dir002/*.log
This will just back up the directory structure. No files with the extension *.log will
be detected.
Dir02/Dir002/*.log
Same as above, but this time using a relative path (no slash at the beginning of the
expression). This will back up lines 3 and 4.
Dir002/*.log
Backs up lines 3 and 4. This filter starts with a relative directory Dir002, which it
finds on lines 3 and 7, and backs up all files with the extension .log, immediately
under it. Since the directory in line 7 has no files with extension .log immediately
under it, but just other directories, the file in line 7 is not backed up.
Dir002/.../*.log
By contrast, this will back up lines 3 and 4, but also the file in line 7. This filter
starts with a relative directory Dir002, which it finds on lines 3 and 7, and backs
up all files with the extension .log, recursively through the sub-directories.
Dir*/.../Log/.../*
To back up all files in subdirectories called Log of directories whose name begins
with Dir (i.e. lines 5, 6 and 11).
da*/.../Log/.../*
da*/.../Log/.../
Dir03/
Dir03/*
Backs up files directly under Dir03 and directory structure under it, but does not
back up files in sub-directories of Dir03 (i.e. will back up line 8, but not 9 or the
file in line 7).
Dir03/.../*
350
Dir03*
Exclusion Filters
The Exclusion textbox specifies the list of the objects not to be backed up. If the list
includes directories, the files they contain are not backed up. By default, no object is
excluded (empty list). Both relative and absolute paths can be used.
Warning:
If, in a given strategy, a directory has an exclusion filter on it, none of its subdirectories
can be backed up by that strategy. Subdirectories of an excluded backup selection inherit
the exclusion, no matter what other backup selections or inclusion filters are placed on
them. They can only be backed up by a different strategy.
This is because Time Navigator reads a directory tree from its root to its smallest
branches, detecting backup selections and applying filters as it descends. As soon as it
reaches a branch with an exclusion filter on it, it stops descending and skips the branch.
Thus details on the branch's subdirectories are never read.
Example 1: Bad Practice:
Strategy A contains:
a backup selection defined on "/" with a filter excluding the sub-directory "/
Volumes"
Consequence:
"/Volumes" will not be backed up. The filter excluding it has priority on the backup
selection including it, and the whole branch will be ignored.
Example 2: Bad Practice:
Strategy A contains:
a backup selection defined on "/" with a filter excluding the sub-directory "/
Chapter 7
351
Volumes"
Strategy B contains:
Consequence:
As soon as Strategy A is run, it will no longer be possible to restore the files in "/
Volumes". Running Strategy B will not recover the files.
Example 3: Correct Practice:
Strategy A contains:
a backup selection defined on "/" with a filter excluding the sub-directory "/
Volumes"
Strategy B contains:
This is the correct way to ensure that the files in "/Volumes", are backed up.
Slashes (/) and double-slashes (//) located at the end of a path are ignored.
Example
????.o : all files with four characters followed by the extension .o are filtered.
352
tina_st[ao][pt] : all files beginning with tina_st with all possible combinations after
st (a or o in 3rd position and p or t in 4th position) are filtered, such as tina_stop and
tina_stat.
/c/users/.../temp : all files or directories named temp are filtered from /c/users, such
as /c/users/temp or /c/users/fred/temp, etc. On the other hand, /temp is not filtered.
tina_st[ao][pt] : all files beginning with tina_st with all possible combinations after
st (a or o in 3rd position and p or t in 4th position) are filtered, such as tina_stop and
tina_stat.
/c/users/.../temp : all files or directories named temp are filtered from /c/users, such
as /c/users/temp or /c/users/fred/temp, etc. On the other hand, /temp is not filtered.
Chapter 7
353
Warning:
If a parent backup selection filters out the path of a child backup selection
associated to the same strategy, the child backup selection is never backed
up. For instance:
- If you set a backup selection on /dir/dir1 with an exclusion filter
eliminating *dir3* from the backup, associated to StrategyA,
- If you set a backup selection on /dir/dir1/dir2/dir3 (with or without filters)
associated to Strategy A,
The backup selection /dir/dir1/dir2/dir3 will never be backed up since it is
excluded from the parent backup selection.
354
1.
2.
3.
4.
Click on Close.
Column Selection
Strategy: Strategies that back up the backup selection.
Exclusion: Exclusion filter criteria.
Format: Either compressed or Encoded depending on the format defined for the backup
selection.
Maximum Size: Contents of the Size filter.
Modified Since: Contents of the Modified since filter.
Selected: Selection filter criteria.
Chapter 7
355
1.
2.
3.
Select the backup selection to modify in the list and click on Properties.
The Define Backup Selection window is displayed. See Creating a Backup
Selection, page 339, and follow the same procedure.
4.
5.
Click on Close.
Note:
It is also possible to edit a backup selection with Time Navigator Restore &
Archive Manager. Select the backup selection in the file tree and choose
Backup Selection-Properties.
1.
2.
Choose Backup-Backuo Selection List. The list of backup selections of the selected
platform is displayed.
3.
Select the backup selection to delete in the list and click on Delete.
The Delete Backup Class window is displayed. It contains all the characteristics of
the selected class.
356
4.
Note:
Click on Delete to validate the operation. A dialog box prompts you to confirm your
decision.
It is also possible to delete a backup selection in Time Navigator Restore &
Archive Manager. Select the backup selection in the file tree and choose
Backup Selection-Delete.
Chapter 7
357
Number of Backup Selections: Total number of backup selections appearing in the list.
Export: Allows to export the backup selection list to a file.
Backup Selection Information
Platform: Name of the platform onto which the backup selection is defined.
Type: Platform type, operating system for a host, application type if the platform
is an application.
Strategy: Letter of the strategies with which the backup selection is associated.
Protected Volume: Volume of data contained in the backup selection. This
information appears only if at least one backup has been performed.
358
Filters: Indicates whether filters have been defined on the backup selection or not.
Security Rules: Name of the security rule associated to the backup selection.
Properties: Opens the Define Backup Selection window for the selected backup selection.
Tip:
You can also double click on a backup selection in the list to open the Define
Backup Selection window.
Modify Format: Opens the Backup Selection Format window to modify the format of the
selected backup selections.
Modify Filters: Opens the Backup Selection Filter window to modify filters for the selected
backup selections.
Modify Security Rule: Opens the Backup Selection Security Rule window to modify the
Note:
Whenever you select a backup selection in the list, all the other backup
selections that could be affected by a modification of that selection (i.e., backup
selections with the same path and associated to platforms belonging to the same
group) are highlighted too.
1.
2.
Browse through the list and click on Close when you are done.
Chapter 7
359
1.
2.
3.
4.
Click on OK. The exported file is created in the location you specified.
5.
Click on Close in the List of all Backup Selections window when you are done.
When you modify a backup selection, all the backup selections consisting of
the same path and associated to platforms belonging to the same group are
modified as well.
1.
2.
Select the backup selection you want to edit and click on Properties. The Define
Backup Selection window appears. Modify the parameters as needed and click on OK
to apply the modifications. See Creating a Backup Selection, page 339 for
details.
3.
To edit another backup selection, select it in the list and repeat step 2.
4.
Click on Close in the List of all Backup Selections when you are done.
When you modify a backup selection, all the backup selections consisting of
the same path and associated to platforms belonging to the same group are
modified as well.
360
1.
2.
Select the backup selections for which you want to modify the parameters and click
on Modify Parameters.
3.
Modify the parameters and click on OK to apply the modifications. See Creating
a Backup Selection, page 339 for details concerning backup selection format.
4.
Click on Close in the List of all Backup Selections window when you are done.
When you modify a backup selection, all the backup selections consisting of
the same path and associated to platforms belonging to the same group are
modified as well.
1.
2.
Select the backup selections for which you want to modify the filters and click on
Modify Filters. The Backup Selection Filters window appears.
3.
Modify filters as described in Backup Selection Filters Window, page 360 and
click on OK to apply the modifications. See Creating a Backup Selection,
page 339 for details concerning backup selection filters.
4.
Click on Close in the List of all Backup Selections window when you are done.
Add to existing filters: Specifies that the filter you define are in addition to existing
ones.
Replace existing filters: Specifies that the filter you define are replacing existing ones.
Chapter 7
361
Remove from existing filters: Specifies that the filter you select are to be removed from
details.
Exclusion: Specifies exclusion filters, see Exclusion Filters Window, page 343.
See Define Backup Selection Window - Filters Tab, page 341 for details concerning
backup selection filters.
When you modify a backup selection, all the backup selections consisting of
the same path and associated to platforms belonging to the same group are
modified as well.
1.
2.
Select the backup selections for which you want to modify the rule and click on
Modify Security Rule. The Backup Selection Security Rule window appears.
362
3.
4.
Click on Close in the List of all Backup Selections window when you are done.
Note:
See the Time Navigator Security & Compliance Manager guide for
details.
Note:
See the Time Navigator Security & Compliance Manager guide for
details.
When you delete a backup selection, all the backup selections consisting of the
same path and associated to platforms belonging to the same group are deleted
as well.
1.
2.
Select the backup selections you want to delete and click on Delete.
3.
A message box appears asking you if you want to create archive folders to archive
the hosts backup files. Click on Yes if you want to archive the contents of the
deleted hosts backup folders. Otherwise, click on No.
Chapter 7
363
364
Macro-multiplexing
This section presents the basic concepts of macro-multiplexing, and how they apply to
Time Navigator features. A good understanding of cache mechanisms is helpful to
handle macro-multiplexing.
The most recently processed data remains in the cache and can be accessed very
quickly should it be restored. This is referred to as the cache effect.
Memory cache: it varies in size between 32 MB and 256 MB. It offers very good
performances. Atempo recommends using at least 64 MB of memory cache.
Disk cache: provides capacity from 32 MB to dozens of GB, but offers lower
performances than memory cache.
Chapter 7
365
DRIVE
DATA
FLOW
CACHE
Backup B1
SPACE
TAPE
Backup B2
Backup B3
B1
B2
B3
memory
disks
366
should be allocated. Thus backups are not processed one after the other. This system
optimizes writing throughput and takes full advantage of fast drives.
The total backup duration will be shorter than the sum of each individual backup
duration.
DRIVE
Backup B1
CACHE
SPACE
Backup B2
Backup B3
C1 C2 C3 C1 C3 C2
C1
C2
C3
TAPE
C1, C2 and C3 =
256 MB containers
Cache
Axes
Note:
Configuring Macro-multiplexing
Cache requirement
The size of all disks cache combined must be at least 2 GB, otherwise, the macromultiplexed mode is disabled. The size of any individual disk cache however, must not
exceed 2047 MB. For performance reasons, it is strongly recommended to have more
cache disk cache than drives (2 x n drives) with a maximum of 16 cache spaces (memory
cache + disk cache).
Chapter 7
367
Modifying the cache space requires editing the catalog. See Editing a Catalog, page 45
for details or Creating a Catalog, page 39, if you decide to work with a brand new
catalog.
To activate macro-multiplexing
1.
Select a host.
2.
3.
Click on the Advanced tab. See Backup Strategy Window - Advanced Tab,
page 306 for details.
4.
5.
6.
In the Format area, check TiNa, since the is the only format allowed when
macromultiplexing is enabled.
7.
8.
Note:
368
1.
Choose Backup-Backup Status List. The Backup Status by Platform window appears.
2.
Choose the viewing parameters. The list of platforms matching your criteria
appears.
view:
The list of platforms with the n most recent backups that failed
The list of platforms with the n most recent full backups that failed
The list of platforms with the n most recent incremental backups that failed
Chapter 7
369
Enabled Platforms Only: Displays only the platforms that are enabled.
Platform List
period.
Last backup status: The backup status is identified with different colors:
Last completed backup: Date of the last backup that was completed.
Last completed full backup: Date of the last full backup that was completed.
Last completed incremental backup: Date of the last incremental backup that was
completed.
Retention Alert: An orange retention period alert appears for a strategy if the
retention period margin between the last full backup and the end of the retention
period represents less than 20% of the total retention period. If the end of the
retention period is reached, a red alert is triggered.
Note :
Details: Displays detailed information about the backups performed on the selected
platform.
Run Strategy Now: Allows to re-run a backup session that failed.
1.
In the Backup Status by Platform window, select the platform for which you want
to display the backup details.
2.
370
3.
Click on the different tabs, Strategy A, B, C to view the backup details for each
strategy.
4.
Strategy tabs
Last Backup: Description (Backup type, platform name and strategy), date and status of
retention period margin is the time period between the last full backup and the end of the
retention period of the media pool associated to the strategy. If the retention period
margin represents less than 20% of the total retention period, an orange retention alert
is triggered. If the end of the retention period is reached, a red alert is triggered.
Re-running a Strategy
If one of the backups failed and the issue causing the failure is solved, you can re-run
the backup session.
To re-run a strategy:
1.
In the Backup Status by Platform window, select the platform for which you want
to re-run the strategy. The Run Strategy window appears.
2.
3.
371
C H A P T E R
Agents
This chapter covers the use of the application on all supported agents. The agents can be
under any of the following types of operating system:
Windows
Unix
Linux
Mac OS X
VMS
NetWare
NDMP
For NetWare agents, the Time Navigator graphical interface is not available.
For details concerning Specific Attributes and ACLs backup for each OS, see Backup
of Specific Attributes, page 311.
372
Windows
Using the Time Navigator Agent
The tina_daemon.exe binary allows the Time Navigator server to manage the file
system of the Windows client, and thus to back up the clients data by running the
tina_backup.exe binary.
The Time Navigator agent is automatically started as a service whenever the
Windows machine starts.
Backing up Files
All file attributes (read-only, system, hidden, archive) are backed up.
It is recommended not to back up the following files:
*.bak
*.tmp
Restoring Files
All file attributes and dates are recovered.
Registry
The registry is made up of two files: System.dat and Users.dat located in the
Windows directory. They can be backed up and restored.
Windows 2000/2003/XP/Vista
For information concerning Windows 2000/2003/XP/Vista clients and the System State
application, see the Time Navigator Agent for Windows guide.
Chapter 8
Agents
373
Unix
Unix agents can perform all operations with Time Navigator as long as Motif is available
on the machine.
Linux
Linux agents can perform all operations with Time Navigator as long as X11 is available
on the machine.
In order to backup ACLs, make sure that the libacl.so library is declared in the PATH
environment variable of the system.
Time Navigator handles file systems controlled by Data Migration Facility (DMF) from
SGI through the use of the bapi_fs tunable.
For information concerning the bapi_fs tunable, see the Time Navigator Tunables guide.
374
Mac OS X
Mac OS X agents can perform all the operations with Time Navigator as long as X11 is
available on the machine.
See the Time Navigator Installation Guide for details concerning the Mac OS X agent
and X11 installation.
To start or stop the Time Navigator daemon on a Mac OS X client, proceed as follows:
1.
Click on the Finder, choose Applications-Utilities and double click on the Terminal icon
to open it.
2.
Run the the following command to set the Time Navigator environment:
. ./.tina.sh
4.
1.
Make sure that the Time Navigator daemon is running as previously explained
(see Time Navigator Daemon, page 374).
2.
3.
In the Atempo folder, open the folder of the Time Navigator environment you
want to use.
Chapter 8
4.
Agents
375
Double-click on the icon of the interface you want to use. See the Time Navigator
Administration Guide (tina_adm, tina_job, tina_library) and
Time Navigator Restore Guide (tina) for details concerning each interface.
Note:
The tina_adm command is only available if you installed the Admin Tools
component during setup.
Resource Fork
Files on Mac systems are traditionally made of two parts: the data fork that contains the
actual data and the resource fork that contains such information as attributes, program
segments, icon bitmaps and other parameters.
The resource forks are associated with HFS+ volumes. In newer versions of the
MAC OS X, they are being used less and less. However, for compatibility reasons,
Time Navigator Agent for Mac OS X allows to back up and restore the resource forks.
Note:
In addition, the resource fork backup is used by Time Navigator to handle the
processing of alias.
Backup
The version size provided by Time Navigator includes the Data fork, the Resource fork
and additional information.
376
Restore
Resource forks are restored only on an HFS+ file system. If you perform a cross restore
from an HFS+ to a UFS file system, resource forks are lost and the restored file only
contains the data fork.
Note:
If you copy fileA.txt from an HFS+ to an UFS volume, the Finder keeps
the resource fork in ._fileA.txt on the UFS volume.
Alias
Time Navigator Agent for Mac OS X allows to back up and restore aliases.
HFS+
On an HFS+ system, an alias is a file that contains only a resource fork and no data
fork. A field in the Finder Info indicates that the file is an alias.
All alias information is contained in the resource fork and in the Finder Info and can
therefore be backed up and restored with Time Navigator.
UFS
The restore of aliases for UFS file systems does not require the restore of the
Finder Info.
Since resource forks are not restored on a UFS file system, a cross restore from HFS+
to UFS does not allow to restore the alias. Only the empty file fileA.txt alias is
restored.
Cross restoring from UFS to HFS+
Cross restore between UFS and HFS+ is not supported by Time Navigator.
Chapter 8
Agents
377
FinderInfo
Time Navigator Agent for Mac OS X allows to back up and restore the Finder Info. The
Finder Info is backed up as a block using APIs, the detailed contents of the Finder Info
is not known. The backed up Finder elements include the following:
For details concerning the backup of the FinderInfo, see Backup of Specific Attributes,
page 311.
PAM
Using Pluggable Authentication Modules (PAM) requires the following configuration:
Mac OS X configuration
In the folder /etc/pam.d create a file atempo containing the following:
Known Issues
Accented Character
Files containing accented characters in their name are correctly backed up and restored.
However, non ASCII characters are not displayed in the Time Navigator interfaces and
are replaced by #.
378
Case Sensitivity
Time Navigator for Mac OS X automatically handles case sensitivity depending on the
file system type. On UFS, Time Navigator is case sensitive, fileA is different from
FileA. Both files can be located in the same directory. On HFS+, Time Navigator is
not case sensitive, fileA is the same as FileA. If you rename fileA into FileA, it will not
be backed up during the next incremental. During the next full backup, FileA will be
back up and its version will be linked to fileA versions.
Case Sensitivity in Command line
While most Time Navigator commands work with a Time Navigator Mac OS X
platform as they do with any other operating system, you must be careful with the
following commands that use a path or a file name as a parameters:
tina_cart
The option -files is case sensitive. You must use the exact case of the file names
tina_restore
The option -path_folder is case sensitive. To list the contents of a directory,
you must provide the exact case of the directory path even if the directory is located
in a non-case sensitive file system.
tina_find
The option -path_folder (unlike the tina_restore -path_folder option),
tina_alpha
The file names specified in the command instance are case sensitive.
The object names specified in the commands add and sub are not case sensitive.
For details concerning the command line, see the Time Navigator Command Line
Interface guide.
Finders comments
The Finders comments are located in the file .DS_Store. This file is currently updated
only when the machine is restarted. Thus a backup of that file may not contain the latest
modifications. A solution to that issue is currently being sought with the manufacturer of
Mac OS X.
Atempo proposes the following procedure to bypass that issue:
Chapter 8
Agents
379
The shortcut key to activate the context sensitive menus is the apple key rather than the
Ctrl key.
Cross restoring aliases on a different file system
It is not possible to cross restore aliases from HFS+ to UFS,nor from UFS to HFS+.
380
VMS
General information
VMS agents can use all the Time Navigator graphical interface functionalities as
long as DEC Windows Motif is installed on the machine.
Time Navigator tree structure is not limited to eight levels.
The SYS$STARTUP:TINA_SHUTDOWN.COM procedure is used to stop the
application.
The Time Navigator start-up procedure defines the following:
TINA$ROOT on the Time Navigator installation directory
TINA$COM = TINA$ROOT:[COM]
TINA$EXE = TINA$ROOT:[EXE], directories where the Time Navigator
binaries are located.
Note:
Atempo recommends that you use logical names such as these instead of absolute
paths to access binaries. This maintains consistency with any scripts that you
might use.
The directories names beginning with the hyphen character (-) are properly
processed by Time Navigator.
With VMS you must define a symbol before using parameters with a
Time Navigator binary.
For instance, if you want to use the tina_restore command help parameter,
you must execute the following:
$ tina_rst = "$ TINA$EXE:TINA_RESTORE.EXE"
$ tina_rst -help
Parameters are converted to lower case. If a parameter must remain in upper case,
it must appear between quotes. Example:
$ tina_archive = "$ TINA$EXE:TINA_ARCHIVE.EXE"
$ tina_archive -backup -full -strat "A"
The TINA_STATUS symbol represents the command return code. Its values are:
Chapter 8
Agents
381
If you have just installed Time Navigator Agent for VMS, do not enter the following
commands unless the installation was correctly performed.
1.
2.
3.
4.
Define or remove the following logical names to adapt Time Navigator to your
environment specifics:
TINA_SET_BACKUP_DATE:
Set to any value, this logical name indicates that the backup date of any file backed
up with Time Navigator will be updated.
TINA_ALL_VERSIONS:
Set to any value, this logical name indicates that Time Navigator is working in a
multi-version mode. When performing a backup or an archiving, all versions of a
file are displayed in the selection window (otherwise, only the last version will be
displayed). This option uses up a lot of space in the catalog since Time Navigator
creates a backup selection per file version.
During a restore, if Time Navigator detects an existing file with the same version
number as the file you are restoring, you will have the option either to replace or
rename the file. The old file will be renamed as
filename.type_saven;p (where n = a number).
Note:
If you choose to use the TINA_ALL_VERSIONS logical name, you must add the *
character after each file name in the exclusion filter. For instance to exclude all
LOG file versions, enter *.LOG;* in the exclusion filter.
To exclude only version 2 files, enter *.LOG;2 in the exclusion filter.
Definition at the VMS user level
382
Start Time Navigator Agent for VMS with the following commands:
RUN TINA$EXE:TINA to start Time Navigator Restore & Archive Manager.
RUN TINA$EXE:TINA_ADM to start Time Navigator Administration Console.
Backup Selection
Due to a viewing problem in Time Navigator Restore & Archive Manager,
Time Navigator does not support the use of logical names in the path of the backup
selection.
If you have already performed a backup on a backup selection containing a logical name
and you want to restore some data from that backup, open Time Navigator Restore &
Archive Manager and set the date to a date in the past, with or without showing deleted
files depending on your need. You will be able to see the backed up versions and perform
the restore.
Chapter 8
OES NetWare
See the Time Navigator Agent for NetWare guide.
Agents
383
384
OES Linux
See the Time Navigator Agent for NetWare guide.
Chapter 8
NDMP
See the Time Navigator for NDMP guide.
Agents
385
386
Icon appearance
Status
Red
Blue
Backup in progress
Chapter 8
Icon appearance
Status
Restore in progress
Agents
387
Run the tina_user_info binary located in the Bin directory of the tina user
acccount.
Enter run tina$exe:tina_user_info on the command line.
The application main window appears.
Main Window
Time Navigator Agent Job Viewer main window is divided into three areas: the menu
bar, the information area and the status bar.
Menu
Bar
Information
Area
Status
Bar
Menu bar
Application-Job Details
Displays the Job Details windows.
For more information about the Job Details window, see Job Details, page 389.
Application-Quit
388
View-Refresh
Refreshes the displayed information manually.
Information area
Date of the last successful full or incremental backup preceded by a green diamond.
Note:
Date of the last full or incremental backup which ended on error. The date is
preceded by a red or orange diamond which indicates the error severity.
Color
Error Description
Orange
Red
The last backup date is displayed only if the backup came after the last
successful backup.
The date of the failed backup is not displayed if the latest backup was
successful.
Date of the next scheduled full or incremental backup.
The displayed dates do not concern application backups, only filesystem backups.
Status bar
Chapter 8
Numbered
Area
1
Icon
Agents
389
Description
Catalog connection status
The Catalog is the Time Navigator database. It contains the information
required to run Time Navigator (platform configuration, drives, libraries,
users, media, etc.), as well as the description and location of all backed up
and archived files.
If the Catalog cannot be accessed, backups and restores cannot be performed.
You can have several Catalogs defined for the same client platform.
The number of catalogs that remain connected is indicated on the right of the
catalog icon.
If the connection to one of the catalogs fails, a red exclamation mark appears
on the catalog icon on the left of the status bar.
Refreshing
The information area and the status bar are refreshed every two minutes if no backup or
restore job is in progress on your machine. If a job is running, the refreshing period is
30 seconds. You can manually refresh the window choosing View-Refresh.
Job Details
The Job Details window displays additional information about complete and cancelled
backups, and about backup and restore jobs in progress.
To view the Job Details window
1.
390
2.
Click on the Complete, Cancelled and In Progress tabs to view successful and
cancelled backups as well as current jobs.
3.
Complete
The Complete tab is used to display the following information after a successful
backup:
Catalog
Description
Job type, name of the platform, name of the strategy and backup type
(incremental or full)
Status
Date
Processed Volume
Processed Objects
Note:
The Complete and Cancelled tabs allow you to view the details of backup
jobs. The In Progress tab also allows you to view restores.
Cancelled
The Cancelled tab is used to display the following information after a cancelled
Chapter 8
Agents
391
backup:
Catalog
Description
Job type, name of the platform, name of the strategy and backup type
(incremental or full)
Status
Date
Processed Volume
Processed Objects
In Progress
The In Progress tab is used to display the following information about running
backup and restore jobs:
Catalog
Description
Status
Date
Processed Volume
Processed Objects
1.
Choose View-Refresh.
2.
392
Mac OS X
Opening Time Navigator Backup Activity Widget
On Mac OS X Tiger platforms Time Navigator Agent Job Viewer is in the form of a
Dashboard Widget.
To start Time Navigator Backup Activity Widget on a Mac OS X client
Chapter 8
Agents
393
Refreshing frequency: allows the user to set the value and unit of the refreshing
period.
Environment Choice: allows the user to choose the Time Navigator environment, if
several environment are present. Othewise the button does not appear.
Viewing Jobs
Time Navigator Job Manager displays complete information about backup and restore
jobs as well as all the job types found in Time Navigator either finished or in progress.
To view Jobs
1.
Click on the Last Backup Status icon. The Catalog Login window appears.
2.
Provide a user name and password to connect to the catalog. The Time Navigator
Job Manager appears.
394
NetWare
Opening Time Navigator Agent Job Viewer
To start Time Navigator Agent Job Viewer on a NetWare client
Main Window
Time Navigator Agent Job Viewer main window is divided in two areas: a Status area
and a Command bar.
Status area
The status area is refreshed every two minutes if no backup or restore job is in progress
on your machine. If a job is running, the refreshing period is 30 seconds.
Chapter 8
Agents
395
Command Bar
Esc to Quit
F5 to do a refresh
For more information about the Job Details window, see the section below.
Job Details
This window displays additional information about backup and restore jobs in progress.
To view the Job Details window
1.
Press the Enter key. The information is displayed on two separate windows.
2.
Press the Tab key to switch from one Details window to the other.
The following information appears in the first window;
Name of the Catalog into which the backup or restore was performed.
Description of the backup or restore jobs (Job type, name of the backed up or
396
3.
Chapter 8
Agents
397
398
Chapter 8
Agents
399
400
Chapter 8
Agents
401
402
Chapter 8
Agents
403
404
405
C H A P T E R
On Demand Backup
On Demand Backup is a feature in Time Navigator that empowers an end user to start
the backup job.
It allows users to initiate backups at their convenience, outside the schedule set by the
administrator. They do not have to apply to the administrator in person every time they
need an unscheduled backup. Administrators are able to retain control of backup access
and load.
Imagine a busy executive who is often on the road with a laptop. Before leaving on a
business trip, he or she needs to ensure that all his or her work is well-protected. He
needs a backup then and there - with a plane to catch, there can be no waiting around for
the next automatic backup to run. On Demand Backup is the solution.
The principle of on-demand backup is straightforward:
How many On Demand Backups can be run per strategy in a 24-hour period.
Limitations
406
Defining Users
A User having On Demand Backup rights must already exist. Create it if necessary. For
information on how to create a User, see Chapter 9, Users and Access Rights,
page 119.
To give On Demand Backup rights to a user
1.
2.
The list of Users appears. Select the User and click OK. The Access Control window
appears:
3.
In the top part of the window, select Define Personal Access Rights.
Chapter 9
On Demand Backup
4.
Under the Backup tab, check the box On Demand Backup (start and stop).
5.
Note:
407
If you wish to give all the Users in your Network the right to use On Demand
Backup, select Security-User Access Rights-Default. This assumes they do not
already have a personal profile created.
Defining Strategies
Create a Backup selection and Strategy for which it will be possible to run On Demand
Backups, or edit an existing one. For more information on creating or editing a strategy,
see Chapter 7, Automatic Backup Configuration, page 285.
To set On Demand Backup on a strategy
1.
In the New Strategy or Strategy Properties Window, under the Advanced tab, check the
box Available for On Demand Backup as shown in the illustration below.
2.
Click on OK.
408
Managing Load
The Administrator must set a global parameter for the entire Time Navigator network of
how many On Demand Backups can be run per host and per day. The default value is 5.
To set the limit
1.
Chapter 9
On Demand Backup
409
2.
In the On Demand Backup area in the lower half of the window, modify the parameter
Maximum of On Demand Backup per day and per host.
3.
Click on OK.
410
411
At least one On Demand Backup still can be run as defined in the Maximum per
day on that host
If one of these conditions ceases to be present after the program has been launched, the
second tab remains, but the Start and Cancel buttons are greyed and the label beside them
reads "No available platforms for On Demand Backup".
412
Two buttons, Start and Cancel to start and cancel the On Demand Backup
A scrollable Details of my On Demand Backup area displaying status and information
for the On Demand Backup jobs:
The first level is the catalogs, but it appears only in a multi-catalog environment.
If there is only one Time Navigator catalog, the jobs become the first level.
Jobs are displayed with an icon representing their status:
Under each job, the backup selections (with a yellow folder icon) and the
Information icon (white i on blue circle) are found.
If Information is opened, the job id and the folder name appear.
The tree keeps only one job per catalog, platform, and strategy. When a more recent job
is created, it replaces the old one of the same catalog, platform and strategy.
Tree Update
An update can be forced with the View - Refresh menu item, or by pressing the F5 key.
To Operate On Demand Backup on Windows and Unix
1.
2.
3.
413
4.
Click on the Start button to launch the backup, or on the Cancel button to cancel a
backup in progress.
414
The Start On Demand Backup can be unavailable (i.e. the Start button disabled, or
the On Demand Backup tab does not appear on Time Navigator Agent Job
Viewer) if:
A backup job is still active on this platform. Check in the Job Details or in
Time Navigator Job Manager whether there are any jobs stopped on error.
They need to be cancelled for On Demand Backup to be available.
The number of On Demand Backups launched within the last 24 hours is
greater than the limit set by the administrator.
The backup server is busy (i.e. the number of running jobs is greater than
the fixed limit).
The user does not have sufficient rights.
The Cancel On Demand Backup can be unavailable (Cancel button disabled, or the
On Demand Backup tab does not appear on Time Navigator Agent Job Viewer)
if:
It is possible for several On Demand Backup jobs to be running at once. For example,
the Start of On Demand Backup starts two backup jobs:
415
to the platform.
416
417
418
419
C H A P T E R
10
10
This section describes how to configure Time Navigator in order to implement a backup
and restore solution on a dedicated data storage network, the Storage Area Network
(SAN).
See Multiple Servers or Storage Nodes, page 422 to help you choose between the two
types of architectures according to your needs and constraints.
420
For more information about the representation of this configuration in Time Navigator
Administration Console, see "SAN Supervision", page 424.
Chapter 10
421
For more information about the representation of this configuration in Time Navigator
Administration Console, see "Storage Node Architecture Implementation", page 428.
422
If the catalog is full on storage node architecture, you can either add a catalog on
the same server or add a second server with the Time Navigator Shared Drive
Option.
You can also add NDMP file servers with dedicated catalogs to a storage node
architecture.
Features
Multiple Servers
Storage Node
Multiple writing
YES
YES
Media duplication
YES
YES
Synthetic backup
YES
NO
YES
NO
YES
YES
NO
YES
NO
Dedicated catalog
YES
NO
Macro-multiplexing
YES
NO
tina_export command
YES
Chapter 10
423
Windows
SUN Solaris
Linux
The drive serial number is automatically detected if the drive is created on a SAN in
Time Navigator Administration Console (see "To create a SAN", page 429).
On the other hand, the detection of the library serial number and the re-allocation of the
device descriptors require the Use Serial Number to Determine Device Descriptor
(check_device_descriptor_from_serial_number) tunable to be declared
through the Configurator on the Time Navigator Server.
To implement device descriptor re-allocation
1.
Before performing an operation likely to modify the devices connected to the SAN
(zoning), declare the Use Serial Number to Determine Device Descriptor
(check_device_descriptor_from_serial_number) tunable via
Time Navigator Configurator on the server.
For more information on tunables, see the Time Navigator Tunables Guide.
2.
Once the zoning operation is completed, restart the Time Navigator server and
storage nodes connected to the drives or libraries through the SAN to update the
device configuration. If you do not want to restart the machines, you must
manually update the device configuration on the operating systems.
For more information on device configuration, see the operating system
administration documentation and the Time Navigator Drivers Guide.
3.
Perform an operation which requires access to the drives and libraries. For
instance, reinitialize the library and read a cartridge label with the drives.
This operation allows update of the device descriptor in Time Navigator. The new
descriptor appears in the Drive and Library Properties windows.
424
4.
SAN Supervision
Time Navigator Web Supervision is designed to facilitate remote supervision and
administration in large SAN environments with many catalogs.
For more information about Time Navigator Web Supervision, refer to the
Time Navigator Web Interfaces guide.
Chapter 10
425
Time Navigator Server must be installed on the main server managing the library.
The setup must be used to split the library so that each server is allocated a split
in the library.
For more information about the library split, see the Time Navigator Library
Sharing Manager Guide.
When you create catalogs on the various servers, they must all be accessible by all
servers. To do so, you must manually modify the catalogs files on each server
to add an entry for each catalog. See Time Navigator Installation Guide for
details.
Configuration
Each secondary server must be similarly configured, except for the main server
managing the library.
To configure the main server
1.
2.
426
3.
Select the SAN icon and choose Devices-Drive-New. The Drive Type Selection
window appears.
4.
Choose the drive type and click on OK. The New Drive window appears.
5.
Set the parameters in the various tabs as described in "Changing the Mode of the
Drive", page 182.
Note:
In the Identity tab, make sure you enter the name of a user who has the
necessary rights to access the drive.
6.
In the Connection tab, click on Add to specify the host you want to be backed up
onto the drive. The Host List window appears.
7.
8.
9.
The drive icon appears attached to the SAN in the lower part of the Network area.
The screen below represents the Network Area of the main server Time Navigator
Administration Console: the main server name is takata; it is attached to the DocLib
library containing the DocDrive and DocDrive2 drives:
Chapter 10
427
1.
2.
3.
428
Time Navigator Server must be installed on the backup server. The setup must
have been runned and the Time Navigator Server option checked.
Time NavigatorStorage Node must be installed on each storage node. The setup
must have been run and the Time Navigator Storage Node option checked.
For more information concerning Time Navigator installation, see the Time Navigator
Installation Guide.
Configuration
Attention:
1.
Create the library attached to the Time Navigator Server. See "Creating a
Library", page 161.
2.
Declare each storage node as a host. Check the Storage Node option in the
Advanced tab of the New Host window. See "Creating a Host", page 74.
3.
4.
Create the shared drives. See "Shared Drive Creation", page 429.
5.
Create a backup strategy on each storage node. Uncheck the Use Cache on Server
option in the Advanced tab. See "Creating a Backup Strategy", page 301.
Note:
When performing a backup without using the cache on the server, the
backup format used is SIDF (System Independent Data Format - ISO/
IEC 14863).
Chapter 10
429
SAN Creation
To create a SAN
1.
2.
Enter any name for the network in the Network Name field and click on OK. The SAN
icon appears in the lower part of the Network area.
1.
2.
3.
Choose the drive type and click on OK. The New Drive window appears.
4.
Set the parameters in the various tabs as described in "Changing the Mode of the
Drive", page 182.
Note:
In the Identity tab, make sure you enter the name of a user who has the
necessary rights to access the drive.
5.
In the Connection tab, click on Add to specify the storage node hosts you want to be
backed up onto the drive. The Host List window appears.
6.
7.
In the Host column, select a host and enter its device descriptor in the Device
Descriptor field.
8.
The drive icon appears attached to the SAN in the lower part of the Network area.
Note:
Adding hosts in the Drive window automatically fills in the SAN Connection tab
in the Host window.
The screen below represents the backup server Time Navigator Administration
Console: the backup server name is takata, the storage node names are aria and
frida. DocDrive and DocDrive2 drives are the shared drives connected to a SAN.
430
1.
2.
Chapter 10
3.
1.
2.
3.
431
432
433
C H A P T E R
11
Alarms
11
Time Navigator contains an internal alarm system management which simplifies the
application management.
This system displays alarms in Time Navigator Administration Console. The
administrator is thus informed, in real time, of possible problems and can react
accordingly.
Most alarms are associated with an object (host, application, drive, library, user or
media). When it does not apply to a specific object (i.e., catalog backup failure), the
alarm is associated with the server.
Note:
A guide provides the list of all the alarm messages that are likely to appear in the
Time Navigator Graphical User Interfaces.
See the Time Navigator Alarms guide.
434
Alarm Description
Alarm IDs and categories
All the alarms are referenced in Time Navigator by a unique identification number
(ID: TN_ALARM_ID030020) and sorted by category:
Server: refers to catalog and site security. Alarm IDs range from 10000 to 19999.
Agent: refers to hosts and applications. Alarm IDs range from 20000 to 29999.
Data Management: refers to all operations about data management (backup,
restore, duplication, etc.). Alarm IDs range from 30000 to 39999.
Devices and Media: refers to device configuration, media errors, hardware errors.
Alarm IDs range from 50000 to 59999.
Security: refers to user accesses and Security & Compliance Manager (SCM).
Alarm IDs range from 60000 to 69999.
Others: refers to alarms which do not belong to the categories defined above.
Alarm IDs range from 200000 on.
Alarm Severity
An alarm can be of three different levels; each level has a color associated to it:
Alarm
Severity
Alarm Color
Description
Minor
Yellow
Major
Orange
Critical
Red
Chapter 11
Alarms
435
Alarm Type
The alarms appear in Time Navigator Administration Console in three areas: the
Network area, the Alarm area and the Icon area.
Each area displays alarms in a different way. The following table summarizes the alarm
properties according to their location.
See Time Navigator Administration Console Main Window, page 18 for details
concerning the Administration window areas.
Alarm
Location
Description
Visual clue
Network Area
Alarms by object:
- Host
- Drive
- Library
Alarm Area
Icon Area
Alarms by host
An alarm can be recurring, i.e., the same alarm appears several times. Same alarm implies
an alarm for the same object, with the same severity level and the same message.
Alarm Messages
Alarm messages are presented with their identification number (ID), their title and their
help message.
The alarm help message is associated with all the events of alarm severity (critical, major
and minor). This message is divided into two parts:
436
Viewing Alarms
When the application is working normally, the three buttons of the Alarms area are green
and do not blink.
When alarms are initiated by Time Navigator, the buttons of the Alarms area start
blinking. If it is an alarm concerning an object of host, drive or library type, the bar
located under the object in the Network area starts blinking.
If it is an alarm concerning an object of host type, the host icon is also displayed with a
colored background in the Icons area.
The alarm buttons will keep on blinking until the administrator acknowledges the alarm
one way or the other.
To view an alarm list
If you want to view the alarms by severity level, click in the Alarms area on the
colored button corresponding to the severity you want to see.
If you want to view alarms by object, click on the bar located under the
corresponding object icon in the Network area.
If you want to view the list of all alarms, whatever the severity level or the object,
use the Monitoring-Alarms menu.
Chapter 11
Alarms
437
in the window. See Alarm Column Choice Window, page 438 for details.
Alarm List: Contains all the alarms about the current catalog.
Cause: Specifies the cause of the problem described in the alarm message.
Action: Specifies the action to perform to solve the problem described in the alarm
message.
Note:
The Cause and Action fields display the help message of the selected alarm in
the Alarm List OR the help message of all the alarms in the list if the latter
have the same identification number (ID).
438
See Processing Alarms, page 440 for more details on how to acknowledge alarms.
selected.
Hidden Columns: Lists the columns that are not displayed in the Alarm List window.
Visible Columns: Lists the columns that are displayed in the Alarm List window.
> Button: Once columns are selected in the Hidden Columns list, use the > Button to move
the selected columns to the Visible Columns list. You can also double click on columns
individually to move them to the Visible Columns list.
< Button: Once columns are selected in the Visible Columns list, use the < Button to move
the selected columns to the Hidden Columns list. You can also double click on columns
individually to move them to the Hidden Columns list.
Available Alarm columns:
Severity: Alarm severity: Minor, Major or Critical.
First Date: Date of the first occurrence of the alarm.
Last Date: Date of the last occurrence of the alarm.
Count: Number of times the alarm occurred.
Object Type: Type of the object for which the alarm occurs. The object type can be
Acknowledged.
Permanent
The alarm and any subsequent same version of it are acknowledged. The
alarm stops blinking.
Temporary
Only the current occurrence of the alarm is acknowledged. The alarm stops
Chapter 11
Alarms
439
blinking.
Not Acknowledged
Note:
Sorting Alarms
You may sort alarms by the content of any column. To do so, double click on the heading
of the column by which you want to sort. On the first click, sorting will be ascending.
Click a second time to sort in descending order.
440
Processing Alarms
Once created, an alarm can either be acknowledged, activated or deleted.
1.
The alarm is acknowledged once for all the times it is issued subsequently. This
implies that you will not receive any visual clue when this alarm is issued next.
The only way to find out if the alarm has occurred again is to check if the count
has been incremented or to look in Time Navigator Event Viewer.
2.
Only the current occurrence of the alarm is acknowledged. If this alarm is issued
again, you will see the buttons blinking.
3.
Activating an alarm
Deleting an alarm
In the Alarm list, right click on the alarm you wish to process. A popup menu will
appear. Choose one of the processing options. Unavailable options are greyed. You
may use multiple selection with the Ctrl key to process several alarms at once.
-OR
In the Alarm list, select the alarm you want to process, then click on one of the
available buttons (Properties, Activate, Acknowledge Permanently, Acknowledge
Temporarily or Delete). Once the alarm is processed, the processing information is
displayed in the Acknowledgement column in the Alarm list.
-OR
Double click on the alarm in the list, on the blinking button in the Alarm area or on
the blinking bar in the Network area, or select the alarm in the list and click on Properties.
The Alarm Properties window appears.
Chapter 11
Alarms
441
Use the Acknowledgement radio buttons to either acknowledge or activate the alarm.
Once all alarms have been acknowledged, buttons and/or bars in the Network area stop
blinking and host icons appear with their original background color (grey or ocher) in
the Icon area.
Library or Drive.
Severity: Alarm severity: Minor, Major or Critical.
First Date: Date of the first occurrence of the alarm.
Last Date: Date of the last occurrence of the alarm.
Count: Number of times the alarm occurred.
442
message.
Acknowledgement
Permanent (no alert on next alarm): Specifies that the alarm and any subsequent
same version of it are acknowledged.
Temporary (alert on next alarm): Specifies that only the current occurrence of the
alarm is acknowledged.
Chapter 11
Alarms
443
Notifying Alarms
The Preferences tool allows you to redirect alarms to external elements (ex: snmp, a file,
a command line, the console, etc.) in the wanted format.
See Setting Platform Preferences, page 86 for details concerning the notification of
alarms.
444
445
C H A P T E R
12
12
This section describes how to perform the following operations on the Time Navigator
Event Viewer:
446
About Events
Time Navigator Event Viewer provides insight into Time Navigator processes. It is a
very useful tool to troubleshoot incidents that occur with any Time Navigator function
or process.
The information displayed in Time Navigator Event Viewer is kept in the event file
on the server. An event file also exists on every client machine. See event File,
page 463 for details.
Time Navigator Event Viewer allows the administrator to display events graphically, to
apply filters and to sort them. For example, the administrator may view all events
regarding all backups for all machines, or just the restore operations on a specific
machine. Each event type, information, warning, minor alarm, major alarm, etc. is
displayed with a dedicated color in order to facilitate reading.
Viewing Events
Time Navigator events can be viewed using the following modes:
In Connected mode, you are connecting to a catalog to access the events related
to that catalog.
In File mode, you are directly opening the event file located on the server,
without being connected to a particular catalog. Events relating to all the catalogs
created on the server are displayed.
In Command mode, see the "tina_event" section in the Time Navigator Command
Line Interface guide for details.
Chapter 12
447
1.
Choose Catalog-Open file. The Event File Name Input Window appears.
2.
Enter the name and path of the events file you want, or click on Browse to select a
file.
3.
Click on OK.
448
1.
2.
3.
Click on OK.
An Event window appears displaying the events for the selected catalog.
Chapter 12
449
This procedure overrides the value of the Maximum number of events retrieved by request
parameter set in the Preferences Window.
To enable the automatic updating of Time Navigator Event Viewer:
450
1.
Choose Catalog-Preferences.
2.
3.
Preferences Window
This window lets you edit and configure user preferences.
General
Apply Filters on Server: Allows to filter events on the server prior to downloading
Use this option if you are viewing the events on a machine other than
the server and you are concerned with network performances. Checking
this option reduces the number of events traveling on your network.
On the other hand, if you are modifying filters frequently during a
remote session, do not check this option, otherwise events are
downloaded from the server again after each modification. When the
option is not checked, all events are kept in memory on the remote
machine and can be manipulated easily without having to be retrieved
from the server again.
On the other hand, if you are modifying filters frequently during a remote session,
do not check this option, otherwise events are downloaded from the server again
after each modification. When the option is not checked, all events are kept in
memory on the remote machine and can be manipulated easily without having to
be retrieved from the server again.
Refresh Period (s): Specifies the time, in seconds, between two auto-refresh.
Chapter 12
451
Allows to divide the events into pages to improve performance. When this option is
selected, only a portion of all loaded events are displayed at a time in Time Navigator
Event Viewer.
Note:
This limitation applies to the number of events displayed in the event list on
screen, not to the number of events loaded in memory as is the case with the
Maximum number of events retrieved per request parameter.
Events per page: specifies the maximum number of events appearing in one page. The
value you enter is recorded in the user preferences file. The initial default value is 1000
events.
Event Display
You can choose what information is displayed in the Time Navigator Event Viewer and
how it is displayed.
End-user events are easily understandable and designed to help the user in case of
error during Time Navigator execution
Advanced events are more detailed events which help the Atempo Technical Support
to analyze more sophisticated problems. Advanced events are only available in
English.
452
The Severity and Message columns are always displayed, even if you do not
select them.
1.
2.
3.
Event Properties
Alarm Help: Alarm help message, which is divided into twp parts, the cause of the
Date (logging): The date the event is recorded in the server event file.
Job ID: The job ID is a single identification number for each job.
Adjusting Columns
To adjust the column width:
Click and drag the edge of the column heading to either widen or narrow it.
To return all columns to their default size, choose View-Adjust Columns.
Chapter 12
453
Filtering Events
In order to customize the type of events displayed in Time Navigator Event Viewer,
you can use different filters.
To filter events:
1.
2.
3.
Click on OK.
Note:
Make sure the filters are enabled: go to the Events menu and check that the
Disable Filter option is not activated.
To disable filters:
If you want to disable the filters that you set in the Event Filters window, choose EventsDisable Filters.
A check mark appears left of the menu and all the events are displayed.
To re-enable the filters, choose choose Events-Disable Filters again.
The check mark disapperas, meaning that the filters are enabled.
454
To activate any of the filters check the box in front of it and specify the value to use to
filter. Filters are as follows:
Severity
Chapter 12
Severity
level
Abbreviated as
Description
Fatal
Fatal (F)
Error
Error (E)
Warning
Warn (W)
Information
Info (I)
Debug
Debug (D)
Diagnosis Help
(ex: Network error).
Accounting
Acct (A)
Minor Alarm
Min A (m)
Major Alarm
Maj A (M)
Critical
Alarm
Crit A (C)
455
To facilitate their identification, severity levels are displayed with different colors in
Time Navigator Event Viewer (ex: the Information severity level is displayed with
an ocher background and the Critical Alarm alarm level with a red background).
Class
456
Description
Standard
Standard events.
I/O Error
Fuzzy Object
Secure Event
Note:
The number of logs concerning fuzzy object encountered when a job is being
performed has been limited by default to 20, to avoid slowing down
performances. You can use the accounting_max_fuzzy_objects tunable
to specify how many fuzzy object logs should be kept in the event file (see
the Time Navigator Tunables guide for details.)
For instance, if you select Fuzzy Object and Non Restored Object, only events related to fuzzy
or non restored objects will be displayed.
Emission Date
Use the sliding cursors in the Emission date area to set the beginning and ending dates of
the time period you want events to be displayed for.
Basic Tab
Message: To only display events containing the specified message. Use special
characters to indicate the text to filter. For instance, enter *media com00004* to
display all messages including the media com00004 string . See Time Navigator
Host: To only display events concerning a particular host attached to the server with
Chapter 12
457
Users: To display events for a particular user with or without the root user.
Program: To display events concerning a particular program, such as,
tina_library, tina_backup.
Advanced Tab
Clearing Events
You can clear all the current events from Time Navigator Event Viewer. Cleared events
are still present on the disk, but no longer appear in Time Navigator Event Viewer.
To clear events :
Choose Events-Clear.
All events disappear from Time Navigator Event Viewer.
To display them again, choose Events-Load all.
458
Event Search
In order to find a specific event and display it in Time Navigator Event Viewer, you
can:
Tip:
Previous event
Next event
1.
2.
Specify your search criteria by entering the Event Filter Parameters. See Filtering
Events, page 453 for details concerning this window.
3.
Click on OK.
The first event matching the criteria is highlighted.
4.
Choose Events-Find Next (F3) to highlight the following event matching the criteria.
Chapter 12
459
Event Export
Events can be exported to a file whenever the need arises. You can choose the type of
information to be exported and the file format.
Note:
If you want redirect events to external destinations (ex: snmp, a file, a command
line, the console, etc.) in the format you want, use the Preferences tool.
See Event Notification, page 90 for more information on the Preferences
tool and event notification.
Export Events
To export events:
1.
Choose Events-Export.
2.
3.
460
C:\temp\events.txt
/tmp/events.txt
/tmp/events.txt
Export Only Selected Lines: This option is not available, all events pertaining to the selected
Encoding: The proposed encoding depends on the file format you select:
File Format
Encoding
None
HTML
Text
Chapter 12
461
Content Tab
The Content tab only appears if you have selected HTML or Text in the File Format tab.
Export Visible Columns: Check this box to export all the information displayed in the
Events list.
Note:
When the Export Visible Columns box is checked, the selection in the
Export/Do not Export lists are not taken into account.
If there are different items from the Event tab that you want to export, double click
the items in the Export and Do not Export list.
Note:
462
Event Purging
Events are automatically purged every hour. The event retention is defined independently
for each severity level, via a series of tunables. The following table summarizes the
tunable names and default values. To modify the tunables, see the Time Navigator
Tunables guide.
Tunable Name
14
14
14
14
14
Chapter 12
463
event File
All events appearing in the Event window are kept in the event log file, located in the
Adm directory. If this file does not exist, Time Navigator automatically creates it.
The file provides detailed information on any incident. For each event, the tina_daemon
program writes the event in an unreadable private format:
Note:
The event file must not be a symbolic link. However, the Adm directory can
be a symbolic link to another directory.
Only privileged users of the various operating systems are allowed to write in the event
file (ex: root for Unix, administrator for Windows 2000/2003, user with
administration rights for MAC OS X). Thus, there is no access rights problem.
All client events are gathered in the server event file so that you can consult the events
of all client machines from the server and have an overall view of the network. However,
an event file is also present on every agent declared in Time Navigator.
The client event file is used when the server event file is unavailable, namely when
the server service is not running. Events will be kept in the client event file until they
can be moved to the server.
Events are written in this particular log file if the list of catalogs cannot be retrieved or
if the event file cannot be to written in.
464
If the file log_debug.catalog_name exists in the Adm directory, Time Navigator uses
it to record all events. If the file does not exist, Time Navigator uses the
log.catalog_name file (which is created if necessary) to record all events except
Debug events.
Fields contained in the log or log_debug file:
Id: specifies the process identification number. Lines are usually grouped by family
number. The first line is the lowest level one and next lines appear in stacking
order until the program ends.
Package, Function and Position: identify the part of the code involved in the event.
Message: specifies the type of event with sometimes a Time Navigator internal
return code (retcode) or the system error type errno.
Using these files, it is possible to clearly diagnose a problem without performing any
particular operation. You may rename the file log.catalog_name into
log_debug.catalog_name to record more information.
Example of file log_debug.catalog_name:
Id
21773
21773
21773
21773
21773
21773
21773
21773
21778
21778
21983
21983
21983
22281
22281
22281
22281
22281
22281
22281
22281
22281
22281
22281
22281
22281
Date
Tue
Tue
Tue
Tue
Tue
Tue
Tue
Tue
Tue
Tue
Tue
Tue
Tue
Tue
Tue
Tue
Tue
Tue
Tue
Tue
Tue
Tue
Tue
Tue
Tue
Tue
Apr
Apr
Apr
Apr
Apr
Apr
Apr
Apr
Apr
Apr
Apr
Apr
Apr
Apr
Apr
Apr
Apr
Apr
Apr
Apr
Apr
Apr
Apr
Apr
Apr
Apr
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
09:00:37
09:00:38
09:00:38
09:00:39
09:00:39
09:00:42
09:01:03
09:01:03
09:02:16
09:02:16
09:41:36
09:41:36
09:42:25
10:00:05
10:00:14
10:00:46
10:00:49
10:01:00
10:01:01
10:01:05
10:01:05
10:01:06
10:01:06
10:01:23
10:02:03
10:02:07
Severity
2000
2000
2000
2000
2000
2000
2000
2000
2000
2000
2000
2000
2000
2000
2000
2000
2000
2000
2000
2000
2000
2000
2000
2000
2000
2000
A
A
A
A
A
A
A
A
A
A
I
I
W
A
A
A
A
A
A
A
A
A
A
A
A
A
Package, Function
and Position
Message
"Clt:desc_dir"[2]
Start backup selection "/usr..."
"Clt:desc_dir"[14]
End backup selection "/usr..."
"Clt:desc_dir"[2]
Start backup selection "/usr..."
"Clt:desc_dir"[14]
End backup selection "/usr..."
"Clt:desc_dir"[2]
Start backup selection "/usr..."
"Clt:create_sessions"[5] Create session, session_id =...
"Clt:desc_dir"[14]
End backup selection "/usr..."
"Clt:archiver"[16]
End incremental backup ...
"Dri:manage_sess_w"[23] End writing on media BCK00021...
"Vvm:log_volume_ecrit"[6]Stat folder "daisy" writing,...
"Clt:restore"[1]
Start restoring backup:
"Clt:restore"[4]
Destination = "/tmp", Folder ...
"Vos:unix_chown"[2]
Error chown "nmpolling", ...
"Clt:archiver"[4]
Start incremental backup...
"Clt:desc_dir"[2]
Start backup selection "/usr..."
"Clt:desc_dir"[14]
End backup selection "/usr..."
"Clt:desc_dir"[2]
Start backup selection "/usr..."
"Clt:desc_dir"[14]
End backup selection "/usr..."
"Clt:desc_dir"[2]
Start backup selection "/usr..."
"Clt:desc_dir"[14]
End backup selection "/usr..."
"Clt:desc_dir"[2]
Start backup selection "/usr..."
"Clt:desc_dir"[14]
End backup selection "/usr..."
"Clt:desc_dir"[2]
Start backup selection "/usr..."
"Clt:create_sessions"[5] Create session, session_id =...
"Clt:desc_dir"[14]
End backup selection "/usr..."
"Clt:archiver"[16]
End incremental backup,...
Chapter 12
22359
21983
21983
22359
22359
22359
23162
Tue
Tue
Tue
Tue
Tue
Tue
Tue
Apr
Apr
Apr
Apr
Apr
Apr
Apr
4
4
4
4
4
4
4
10:05:22
10:05:50
10:06:07
10:09:30
10:10:07
10:10:07
10:48:03
2000
2000
2000
2000
2000
2000
2000
I
D
I
I
A
A
A
465
Notifying Events
Time Navigator allows you to redirect events to external elements (ex: snmp, a file, a
command line, the console, etc.) in the wanted format via the Preferences tool.
See Setting Platform Preferences, page 86 for details concerning the notification of
events.
466
467
C H A P T E R
13
13
Jobs executed by Time Navigator are managed through a graphical window refreshed in
real time. The job concept applies to several types of sessions. The main job types are:
Archiving
Restore
Media duplication
Catalog maintenance
468
Viewing Jobs
To view the list of jobs
It is also possible to view jobs using the tina_job command. See the
"tina_job" section in the Time Navigator Command Line Interface guide for
details.
Chapter 13
469
Selecting Catalogs
By default, Time Navigator Job Manager only shows jobs for the catalog currently
displayed in Time Navigator Administration Console. If you are managing more than
one catalog, you may want to view jobs belonging to several catalogs at once.
Selecting a Catalog
To select catalogs:
1.
2.
Click in the catalog checkbox you wish to connect to and click on Apply to know
its status.
3.
The icon between the checkbox and the catalog name indicates the status of the catalog:
Green icon with a small white cross on a red background: Indicates that you do not have
Tip:
Gray icon with a red cross: Indicates that the catalog is unavailable (the catalog could
be stopped, suspended,...).
Question mark: Indicates that the catalog status is unknown.
Check the box in front of a catalog and click on Apply to identify its status.
470
Job Information
When you open Time Navigator Job Manager, by default, only Active jobs are
displayed. You have the option to display job History as well.
1.
Choose View-History. The job history list appears below the Active job list. The
View-History menu is now checked.
Tip:
1.
2.
Double click on the column headings or use the < and > buttons to move columns
between the Visible Columns list and the Hidden Columns list.
You can also click on All to select all columns and on Invert to make all selected
columns unselected and, inversely, all unselected columns selected.
Note:
The History list default display includes the End Date column in addition
to all the Active jobs default columns.
Note:
Among the default columns, only the Media and Submit Date columns
(and End Date for historical jobs) can be hidden. The other columns are
always displayed.
Chapter 13
471
Tip:
Available Columns:
Default columns
Catalog: In a multi-catalog environment, indicates the catalog name.
Status: The most frequently used statuses are: Complete, Cancelled on error,
Blue:
In progress
Green:
Finished
Red:
Cancelled on error
472
Note:
Volume (historical jobs only): Total amount of data processed by the job. By default
the volume unit is gigabyte. To change the unit see Preferences Window,
page 475.
Note:
This information is only available for jobs that actually wrote data on
tape. For snapshot jobs for instance, the volume is provided only for the
job handling the snapshot data backed up on tape (if any), or if you
selected a multiple writing pool to copy the entire snapshot on tape.
Alarms: If a problem occurs while a job is running, a critical, major, or minor alarm
appears. The alarm is displayed with the color associated to its severity.
Media: Depending on the media type, this column indicates either the name of the
phase.
Rank (Active jobs only): Job execution number indicating job priority.
Instant Rate (GB/H) (Active jobs only): Current rate of data processed by the job.
Average Rate (GB/H): Average rate of data processed by the job since the beginning
of the job. For historical jobs, the average rate is based on the total amount of data
processed and the whole duration of the job.
Chapter 13
473
Duration: Duration of a job. For active jobs, the Duration column displays the time
elapsed between the beginning of the job and the present moment.
Additional columns
End Date: Date and time when the job is finished or cancelled.
Execution Date: Date and time when the job actually begins to be performed.
Note:
The Execution date may differ from the Start Date if for instance, the job
is waiting for physical resources to become available.
Folder: Name of the backup or archive folder involved with the job.
Host: Name of the host involved with the job.
Start Date: Date and time when the job is ready to be performed, i.e., all jobs with
474
Sorting Jobs
You may sort jobs by the content of any column.
Sorting Jobs
To sorts jobs:
1.
Double click on the heading of the column by which you want to sort. On the first
click, sorting will be ascending.
2.
Chapter 13
475
1.
2.
Use the sliding button to set the refresh period and click on OK.
Preferences Window
Active Job Refresh Period
Kilobytes
Megabytes
Gigabytes
Terabytes
Most Appropriate Unit: use this option to let Time Navigator choose the best unit
476
Job Details
In addition to the information displayed in the list, you may access detailed information
for each job.
You can also select a job in the list, right click and select Detail, or double
click on a job in the list.
The Job Details Window appears with the General tab preselected.
1.
Double click on a job associated with an alarm in the Job list. The job message
appears in the lower part of Time Navigator Job Manager.
2.
Click on Alarm Detail in the right lower part of Time Navigator Job Manager.
The Job Details Window appears with the Alarms tab preselected.
Chapter 13
477
The General tab gives you access to information common to all job types. Most of the
information found in the General tab is identical to the information found in the job list
window. In addition, the Progress area provides the following information:
Information Area
Description: Contains the job type, i.e., Backup (full or incremental), Synthetic,
Status: The most frequently used statuses are: Complete, Cancelled on error,
Cancelled on request, Running...etc. Jobs with a running status may be either
active or inactive. An inactive session indicates that one of the resources (media,
drives) required to execute the job is unavailable.
The status Scheduled concerns active backup jobs only and indicates that the server
created a job corresponding to a scheduled backup on an agent, and is waiting for
the agent to respond. If the agent does not respond within the one hour default
timeout, the status becomes Cancelled without starting. If the server cannot reach the
client, the status becomes Cancelled (unreachable agent). The timeout can be modified
using the tunable timeout_on_scheduled_jobs.
478
Media: Either the name of the media pool being used to perform the job, or
Snapshot, or Replication.
Folder: Name of the backup folder involved with the job.
Progress Area
Expected Volume: Indicates the volume of data to be processed in bytes. This field
Note:
Progress: If the expected volume is known, this field indicates the progression of a job
in percentage when it is being executed. If the expected volume is unknown, this field
displays a result in megabytes. Once the job is ended, the result is a volume given in
megabytes.
Instant Rate (GB/H): (Active jobs only) Current rate of data processed by the job.
Average Rate (GB/H): Average rate of data processed by the job since the beginning
of the job. For historical jobs, the average rate is based on the total amount of data
processed and the whole duration of the job.
Chapter 13
479
Dates Area
Execution Date: Date and time when the job actually begins to be performed.
Note:
The Execution date may differ from the Start Date if for instance, the
job is waiting for physical resources to become available.
Start Date: Date and time when the job is ready to be performed, i.e., all jobs with
higher priority have been cleared.
End Date: Date and time when the job is completed or cancelled.
Current: Indicates the number of times the job has been initiated and allows you to
480
administrator.
Interval (min): Indicates the time interval, in minutes, separating the retries on
Blocks Used: Indicates the number of blocks used in the cache space for the job. In
the case of a full synthetic backup, this number corresponds to the total amount of
reading and writing sessions in cache.
Total Blocks: Indicates the total number of blocks contained in the cache space. Each
Use Rate: Indicates the percentage of the cache space used by the job being
processed.
Current Object Area
It indicates the object (file or directory) being processed by the on tape writing session.
Sessions Area
Note:
Chapter 13
481
Note:
The information displayed in the Specific tab area varies according to the job
type. The above screen is for a backup.
Name: Indicates the name of the platform on which the job has been or is running.
Format: Indicates the data writing format used for the backup in question (TiNa, tar
or cpio).
Folder: Indicates the host (or the application) backup folder name.
482
Folder Area
This area is only present if the job type is archiving or restore.
The Information found in this area is as follows:
Job Type
Name
Format
Archiving
Restore
N/A
Replication Area
This area is only present if the job is a replication.
Host: Indicates the name of the host where the replication destination is located.
Directory: Indicates the path and name of the directory backed up.
Rule: Indicates the name of the security rule associated with the backup selection
Chapter 13
483
All the events attached to the job are displayed with the following columns:
PID: Identifier of the Time Navigator process concerned by the event. That process
Host: Indicates the name of the Logical Host, i.e., the host that triggered the action.
User: Indicates the name of the Logical User, i.e., the user that triggered the action.
concerning the export of events, see Export Events Window, page 485.
Note:
The Export only selected lines option is not available in this context. All the events
pertaining to the selected job are exported.
484
The three following check boxes are only used when hierarchical relations exist between
jobs, i.e., a job is issued from another job:
Parent: Allows display of the events concerning the parent job of the current job (if
any).
Brothers: Allows display of the events concerning brother jobs of the current job
(if any).
Children: Allows display of the events concerning children jobs of the current job
(if any).
Advanced Events: Allows display of the list of detailed events. By default, only the enduser events are displayed.
selected.
You can choose among the following columns:
Alarm Help: Alarm help message, which is divided into twp parts, the cause of the
Date (Logging): The date the event is recorded in the server event file.
Chapter 13
485
C:\temp\events.txt
/tmp/events.txt
/tmp/events.txt
Export Only Selected Lines: This option is not available, all events pertaining to the selected
File Format: Allows you to choose the format of the export file, either Event file
format, HTML or Text.
Encoding: The proposed encoding depends on the file format you select:
File Format
Encoding
None
486
File Format
Encoding
HTML
Text
Content Tab
The Content tab only appears if you have selected HTML or Text in the File Format tab.
Export Visible Columns: Check this box to export all the information displayed in the
Events list.
Note:
When the Export Visible Columns box is checked, the selection in the
Export/Do not Export lists are not taken into account.
If there are different items from the Event tab that you want to export, double click
the items in the Export and Do not Export list.
Note:
Chapter 13
487
Abbreviation
Color
Description
Fatal
Fatal (F)
Red
Error
Error (E)
Orange
Warning
Warn (W)
Yellow
Information
Info (I)
Blue
General interest.
Debug
Debug (D)
Green
Diagnosis.
Accounting
Acct (A)
Violet
Minor Alarm
Min A (m)
Yellow
Major Alarm
Maj A (M)
Orange
Critical Alarm
Crit A (C)
Red
488
The help message associated with the alarm. This message is divided into two
parts, Cause and Action.
Severity
Color
Description
Minor
Yellow
Major
Orange
Critical
Red
Cause: Specifies the cause of the problem described in the alarm message.
Action: Specifies the action to perform to solve the problem described in the
alarm message.
Note:
The Cause and Action fields display the help message of the selected alarm in
the Alarm List OR the help message of all the alarms in the list if the latter
have the same identification number (ID).
Chapter 13
489
Filtering Jobs
Several filters are available to let you customize the jobs to be displayed. Some filters
apply to all jobs, active or historical; they appear in the Overall Filtering area. Other filters
apply only to historical jobs; they appear in the Job History Filtering area. By default, no
filters are selected.
Note:
Filter preferences are automaticaly saved when you close Time Navigator Job
Manager.
Filtering Jobs
To filter jobs
1.
2.
490
Note:
Note:
Hide Job Type: Excludes jobs based on the job type (backup, archiving, restore...).
The Catalog Collection job type is applicable if you have Time Navigator Reporter
installed as well.
Dates:
Time interval definition: Using the two slide cursors, select the beginning and
end dates to display jobs.
Definition of time navigation period: Choose from how far back in time you want
jobs displayed.
Chapter 13
491
By default, the viewing period is set to 60 hours and the maximum time period to
3 months.
Note:
viewing period.
Job Manager Maximum Period (max_days_for_job_filter) for the
Maximum number of jobs displayed: Allows you to set a limit on the number of jobs
appearing in Time Navigator Job Manager. The limit applies to both active and
historical jobs.The default value is 200.
Hide Job Status: You have the option to exclude historical jobs based on their status:
Cancelled without starting: The backup server initiated a backup job, but that
job was cancelled because the agent failed to respond within the default one
hour timeout. See the tunable timeout_on_scheduled_jobs in the
Time Navigator Tunables guide to modify the value of the timeout.
Cancelled on catalog stop: Time Navigator was shut down while the job was in
progress.
Cancelled (unreachable agent): The backup server was unable to reach the agent
492
Purging Jobs
This feature allows you to purge jobs on demand from the catalog. Jobs that have reached
the retention period are removed from the catalog if all their objects have been destroyed.
As a result, this feature can help you save some catalog space as well as improve
Time Navigator Job Manager performances. Keep in mind however, that purged jobs
are no longer included in statistical analysis, nor will they appear in any future Job
Accounting report.
In order to purge jobs, you must have the permission to administer the catalog (General
Tasks permission in the Administration tab of the Access Control windows). If this is not the
case, the menu is grayed out.
If Time Navigator Job Manager is connected to several catalogs, all catalogs for which
you are administrator are purged.
Tip:
Purging Jobs
To purge jobs
1.
Choose Jobs-Purge. The Job Purge window will appear. Use the sliding button to
set the retention period between 0 and 30 days. The default value is 30 days.
Chapter 13
493
Note:
The maximum and default value can be modified using the Job Retention in the
Catalog (job_retention_days) tunable.
Note:
494
Processing Jobs
You may directly intervene, at any time on the jobs in the Active jobs list to:
Modify the execution order of a job in the list. The job priority can be either moved
up by one, moved down by one, or moved all the way to the top or the bottom of
the list.
Cancel, pause or restart a job.
Note:
When a job is stopped on error, it remains in the Active job list after all
automatic retries are exhausted, until you manually cancel or restart it. If you
cancel it, the job moves to the History list and its status becomes "Cancelled on
error."
Note:
The Pause operation is not available for backups jobs that do not use the cache
on the server.
Processing Jobs
To modify job priority
1.
Select the job you want to process (you may only process one job at a time).
2.
Choose Jobs-Priority and select the operation you want to perform. The job priority
can be either moved Up by one, moved Down by one, or moved all the way to the
Top or the Bottom of the list.
or
1.
Select the job you want to process (you may only process one job at a time).
2.
Note:
To process jobs, you may also select a job and use the buttons on the window
outer left side to indicate the operation you wish to perform.
Chapter 13
495
Exporting Jobs
The job Export function allows you to export the job information of your choice to a file.
Exporting Jobs
To export the job list
1.
In Time Navigator Job Manager, make sure that only the jobs you want to export
are displayed.
2.
3.
4.
your machine, or enter the absolute path where you want the file to be located. For
instance:
C:\temp\jobs.txt
496
/tmp/jobs.txt
/tmp/jobs.txt
Export only Selected Lines: Allows you to only export the jobs you have selected in the
File Format: Allows you to choose the format of the export file, either Text or
HTML.
Encoding: Allows you to choose the encoding for the export file, either Latin 1
Encoding
HTML
Text
UTF-8
US-ASCII
Latin 1 (ISO8859-1)
Contents
Export Visible Columns: Allows to export all the information displayed in the Jobs list.
Note:
When the Export Visible Columns box is checked, the selection in the
Export/Do not Export lists are not taken into account.
Otherwise, uncheck that box and doubleclick on the column heading to switch them
from the Export list to the Do not export list.
Chapter 13
497
Duplicating Jobs
You can duplicate data backed up by a backup or archiving job. Job duplication allows
you to duplicate one or several jobs on one or several media, as opposed to media
duplication which only permits duplication of a complete media.
Prerequisites
Several jobs can be duplicated simultaneously if they belong to the same catalog.
Job types eligible for duplication are: backup, synthetic backup, archiving, media
duplication.
Duplicating Jobs
To duplicate jobs
1.
From Time Navigator Job Manager, select one or several jobs to duplicate in the
History list.
2.
3.
Original Pool: The media pool containing the data to duplicate will also be the one
498
Other Pool: Specify another media pool if you do not want the original pool to
Options
Start on Empty Cartridge: Only allows use of empty cartridges for job duplication.
Close Duplicated Cartridges: Allows you to close the cartridges that contain duplicated
data.
Tip:
If you check the Start on Empty Cartridge and Close Duplicated Cartridges
options, you will obtain a consistent media pool including only data of
the current duplication.
Continue on Error: Allows to continue duplication even if errors due to data occur.
You can also duplicate jobs using the tina_job_control command. Refer to the
Time Navigator Command Line Interface guide for more details.
Simultaneous Job Duplications
By default, even if several jobs are selected in Time Navigator Job Manager to be
duplicated, duplications are performed sequentially, one after the other. This behavior is
designed to prevent duplication operations from reserving all the available drives.
To modify the default behavior, you can:
Select the jobs to duplicate one by one instead of all at once and choose JobDuplicate. In that case all duplications are launched in a row, provided that there
are enough available drives to perform the duplications.
For instance to duplicate ten jobs two by two (four drives required), select a first
group of five jobs, choose Job-Duplicate. Then select the five remaining jobs.
Chapter 13
499
Job Reports
The job reports allow you to view various information concerning the jobs performed by
Time Navigator.
Note:
The job accounting reports are available in command line only. For detailed
documentation and instructions on how to generate reports, see the
Time Navigator Command Line Interface guide. The commands used to
generate reports are: tina_acct and tina_report.
This report generates a standard accounting report that lists all the jobs, sorted by
type, that took place within the last 24 hours. By default, the report lists the
following information:
The date and time the job was submitted, began, ended
The job ID
The media and drives involved as well as the backup format (Tina, Tar, Cpio)
and the tape file number.
If you want a customized job accounting report, you may use parameters to
determine what information is displayed in the report and in what order.
2.
This report produces reports concerning the data backed up, either globally for all
the catalogs involved, or in a more detailled fashion. This report is invoice oriented,
allowing users to be billed according to the volume processed.
500
501
C H A P T E R
14
14
Time Navigator Task Viewer can be used to optimize backup, network traffic and drive
workload.
It gives a global view of the workload for all past and future backups. By graphically
displaying each job load, along with the resulting data flow, Time Navigator Task
Viewer helps the administrator spread the jobs over time, balancing the overhead.
Moreover, Time Navigator Task Viewer proves an efficient forecasting tool. By
providing the administrator a comprehensive view of the ultimate result of programming
new backups, adding new data sets, or modifying backup frequency, etc. It helps plan
for new resources.
Time Navigator Task Viewer allows you to view at a glance all the backups completed
or planned for any given platform. This chapter describes Time Navigator Task Viewer
and presents the functionalities offered by Time Navigator Task Viewer.
To open Time Navigator Task Viewer
To use Time Navigator Task Viewer in command line, see the "tina_sched"
section in the Time Navigator Command Line Interface guide.
502
Chapter 14
503
Name
The following table summarizes the color code used in Time Navigator Task Viewer.
Information
Color
Meaning
Platform
(colors are the same as those
used in Time Navigator
Administration Console)
Enabled host
Enabled application
Brown background
Disabled platform
Strategy
Green background
Defined strategy
Brown background
Undefined strategy
The list of platforms can be sorted by platform, catalog, or type (host or application)
either in ascending or descending order.
By default, the list is sorted by name, then by catalog, and finally by type.
To sort the list of platforms
1.
504
2.
In Time Navigator Task Viewer, choose the sorting order with the
View-Descending Order menu:
Tip:
Backup Area
The second main area in Time Navigator Task Viewer shows all backups that are
completed and planned. The red vertical line dividing this area symbolizes the present.
History corresponds to backups performed in the past by Time Navigator, whether
The bars in the time scale represent backups. The thickness of the bars depends on the
backup duration (see Filters, page 508 for details on backup duration).
The bar color code is as follows:
Bar Color
Meaning
Light blue
Incremental backup
Dark blue
Full backup
Sky blue
Backup in progress
Red
Chapter 14
505
1.
Choose View-Zoom Mode or use the right mouse button and select Zoom Mode in the
pop-up menu.
2.
The cursor changes, the menus become unavailable. Position the cursor at the point
where you want the displayed interval to begin. Right-click, a menu appears:
The first item in the menu is the date and time where the zoom interval will begin.
Click on Zoom Beginning to apply.
3.
A vertical line appears in the backup area at the Zoom beginning point. Position
the cursor at the point where you want the displayed interval to end. Right-click,
a menu appears:
506
4.
The first item in the menu is the date and time where the zoom interval will end.
Click on Zoom end to apply. The backup area will be resized according to the dates
you just defined.
Note:
At any time during this process, click on Cancel to exit the zoom mode.
Pop-up Menus
Several pop-up menus are available in Time Navigator Task Viewer. The information
displayed varies according to the area selected with the cursor.
Platform List Area:
If you right-click in the Platform List area, the following menu appears:
The first item indicates the platform name and the catalog name.
The second item gives you access to the backup evolution window after you select
a strategy. See Viewing Backup Evolution of Performed Backups, page 514,
for details.
The third item gives you access to the zoom mode, see Using the Zoom Mode,
page 505, for details.
Backup Area:
The second item displays the Backup Evolution window for the strategy. See
Chapter 14
507
The third item gives you access to the zoom mode. See Using the Zoom Mode,
page 505, for details.
508
Filters
Filtering the Display of the Platforms
Use filters to better define the information you wish to view in Time Navigator Task
Viewer.
To filter the display of the platforms:
1.
Choose Scheduler-Filters.
2.
Filter the display of the platform list according to their name and the catalog they
belong to. See Filtering the Display of the Platforms, page 508.
View the backup schedule according to the type of backup (full or incremental), the
type of platform (application or host), and the strategy (A, B, C, or D). See View
tab, page 510 .
Define the time period to view the backup schedule and set the parameter to
estimate backup duration. See Dates Tab, page 511 .
Platforms Tab
Chapter 14
509
Use the Platforms Tab to filter the display of the platform list according to their name and
their type (host or application).
Tip: Use the Ctrl and Shift keys to select multiple platforms and double-click on the
Note:
510
View tab
Use the View Tab to view the backup schedule according to the type of backup (full or
incremental) and the strategy (A, B, C, or D).
Full: Displays platforms for which full backups have been scheduled.
Incremental: Displays platforms for which incremental backups have been scheduled.
Strategies A, B, C and D: Displays platforms for which the checked strategies have been
defined.
Enabled: When checked, displays only enabled platforms. Disabled platforms do not
appear.
Active Strategies: When checked, displays only the strategies that have been defined for
the platform.
Chapter 14
511
Default Configuration: Sets the default values for all three tabs. By default all filters in the
Dates Tab
Use the Dates Tab to define the time period to view the backup schedule and set the
parameter to estimate backup duration. Move the slider in the past (history) and in the
future (schedule area) to set the beginning and end dates.
Absolute Date: Lets you toggle between an absolute date format (e.g., Tues Apr 11 2000
This date format only applies inside this filter window. It does not apply to the
main window date format.
512
Minimum
Maximum
Default
Value
History
Button
Schedule
Button
History
Date
60 days
2 days from
present
2 days from
present
Schedule
Date
30 days
1 day after
present
4 days after
present
Duration Estimation: Sets the number of backups that will be used to calculate the thickness
of the lines representing backups. Time Navigator averages the duration of past backups
to estimate the duration of future backups. The maximum number of backups used to
estimate is 100. The default value is 1.
Note:
If you use the default value, no calculation is actually performed, all scheduled
backups are assigned the same duration as the last one performed.
Note:
If you specify a number of backups higher than the actual number of backups
present in the catalog, the latter number is used to estimate backup duration. For
example, if five backups have been saved in the catalog and an average of 10
backups have been performed, the backup duration is calculated from the last
five backups available.
Default Configuration: Sets the default values for all three tabs.
Chapter 14
513
Choose Scheduler-Export.
2.
Enter the absolute path where you want the text file to be located. For example:
C:\temp\evt.txt
/tmp/evt
3.
Click on OK.
514
Choose View-Simultaneous Backups. Simultaneous backups appear in the lower part of the
window, below the platforms.
Use the filters if you want to display the Simultaneous Backups according
to a platform, a catalog, a strategy, a backup type, etc. See Filters,
page 508 for details.
1.
Chapter 14
515
Strategy X.
Note:
If you right-click in the Backup Area, you can only access the Backup
Evolution for the strategy you clicked on. Whereas, if you right-click in
the Platform Area, you can access the Backup Evolution for any strategy
available for the platform you clicked on. See Pop-up Menus,
page 506 for details.
Displays the evolution in time and volume of performed backups (History area of the
main window) for a given platform, strategy, and backup type.
For each backup, from the most recent to the oldest, the following information is
displayed:
In the upper area:
Identification: Displays the platform name, catalog name, and backup strategy.
Backup Type: Displays the backup evolution for full or incremental backups.
516
Selecting a Catalog
At any time during your session, if several catalogs are present on your machine, you can
change the catalog selection.
To select a catalog:
1.
2.
3.
Click on Apply.
4.
Click on Close.
The icon between the checkbox and the catalog name indicates the status of the catalog:
Green icon with a small white cross on a red background: Indicates that you do not have
Chapter 14
517
Tip:
Gray icon with a red cross: Indicates that the catalog is unavailable (the catalog could
be stopped, suspended,...).
Question mark: Indicates that the catalog status is unknown.
Check the box in front of a catalog and click on Apply to identify its status.
518
519
C H A P T E R
15
15
All the requests concerning media are handled through Time Navigator Media Request
Console. This application centralizes requests from all catalogs into a single interface.
When a media operation (mounting, dismounting, moving cartridges, ...) is required to
perform a backup, a restore or any other function, a request is logged into the catalog
and appears in all Time Navigator Media Request Console applications that are running
and connected to that catalog.
The process that requested the cartridge operation is then paused until either an operator
performs the action or the time-out expires. Depending on the request result, the process
can either resume, resend a similar request, or cancel on error.
Note:
520
To use Time Navigator Media Request Console on a command line, see the
tina_operator section in the Time Navigator Command Line Interface
guide.
Viewing Requests
To view Time Navigator media requests
1.
Choose View to show or hide the processed requests area. Also use that menu to
modify the column selection in either the pending or processed requests area of the
window.
The Column Selection feature is also available by right-clicking.
In the Column Selection window, various options are available.
2.
3.
Click on Invert to make all selected columns unselected and, inversely, all
unselected columns selected
4.
Double-click on columns individually to move them back and forth between the
Visible Columns and Hidden Columns list.
5.
Note:
Select columns individually or in multiple selections and use the < and > button
to move columns from one list to the other.
In case of multiple selections, the last selected column appears with a yellow
border to indicate that it is the active one. You may double-click on it to move
the whole selection at once).
Selecting Catalogs
By default, Time Navigator Media Request Console only shows requests from the
catalog currently used by Time Navigator Administration Console. If you are
managing more than one catalog, choose Catalog-Select to open the Catalog Selection
window and select all the catalogs you need.
522
Managing Requests
Whenever a new request is created, it appears in the upper part of Time Navigator
Media Request Console in the Pending Requests area. The request life cycle is divided
in two parts, the handling phase and the acknowledgment phase. Each phase has its own
time-out. Requests will go through several statuses during their life cycle (see Request
Status and Evolution, page 527 for details).
Handling a Request
During the Handling phase, when the request first appears in the upper window, the
operator is expected to take the request into account. However the operator must do so
before the time-out expires. The time-out is represented in Time Navigator Media
Request Console by the red progression bar. The remaining time appears in the red bar.
If the operator does not handle the request before it is timed out, the request will be
moved to the Processed Request list (in the lower part of the main window) with a Timed
Out Handling status.
To handle a request
1.
You can also double-click on the request, or select the request and rightclick to access Handling in the pop-up menu.
Once this window appears, the request is considered to be handled and enters
the acknowledging phase. A new time-out starts. It is represented by the red
progress bar in the Acknowledgment area of the Request Information window.
The cartridge name, barcode and comment lets you identify the requested
cartridge.
2.
Responding to a Request
During the Acknowledging phase, the operator is expected to either perform the required
action, discard the request if the action cannot be fulfilled, or suspend the request if the
action requires more time than the acknowledgable timeout will allow. If the request is
suspended, a third longer security timeout starts.
If the operator does not acknowledge the request before it is timed out, the request will
be moved to the Processed Request list (in the lower part of the main window) with a
Timed Out Acknowledging Status or Timed Out Security if the request was suspended and
never acknowledged.
To respond to a request
Click on either Acknowledge or Discard and close the Handling Request window.
524
Acknowledge is that the operator fulfilled the request having performed the action
required.
the request.
Note:
If a request has been suspended, the operator cannot close the Handling Request
window until the request is either acknowledged or discarded.
Once a request has been acknowledged, it appears in the Processed Requests list, in the
lower part of Time Navigator Media Request Console.
Processed Requests
The processed request list is a useful way to check for requests that happened in the
absence of the operator. Also consult Time Navigator Job Manager to verify the
consequences of timed out requests by the processes requesting them.
To view processed request detailed information
Choose View-Handled Requests. The handled requests appear in the lower part of
Time Navigator Media Request Console.
Note:
If you want to hide the handled requests, choose View-Handled Requests again.
1.
2.
Choose the information you want to view in the handled requests area.
Use the Column Choice window to modify the column selection in the Handled Requests
area.
area.
Visible Columns: Lists the columns that are displayed in the Handled Requests area.
> Button: Once columns are selected in the Visible Columns list, use the > Button
to move the selected columns to the Hidden Columns list. You can also doubleclick on a column name to move it to the Hidden Columns list.
< Button: Once columns are selected in the Hidden Columns list, use the < Button
to move the selected columns to the Visible Columns list. You can also doubleclick on a column name to move it to the Visible Columns list.
526
1.
2.
Choose the information you want to view in the pending requests area.
Use the Column Choice window to modify the column selection in the Pending Requests
area.
Invert: Makes all selected columns unselected and, inversely, all unselected columns
selected.
Hidden Columns: Lists the columns that are not displayed in the Pending Requests
area.
Visible Columns: Lists the columns that are displayed in the Pending Requests area.
> Button: Once columns are selected in the Hidden Columns list, use the > Button to
move the selected columns to the Visible Columns list. You can also double-click on
a column name to move it to the Visible Columns list.
< Button: Once columns are selected in the Visible Columns list, use the < Button to
move the selected columns to the Hidden Columns list. You can also double-click on
a column name to move it to the Hidden Columns list.
Status Definition
Submitted
Handled
The operator has taken the request into account before the handling time-out
expired. A new time-out starts, further action is required.
Acknowledged
The operator fulfilled the request before the acknowledgeable time-out expired.
This is a final stage, no further action is required.
Unacknowledged
The operator cannot fulfill the request and indicated it to the application before the
acknowledgeable time-out expired. This is a final stage, no further action is
required.
Suspended
The operator needs additional time and suspended the acknowledgeable time-out. A
new security time-out starts, further action is required.
The request was not taken into account within the handling time-out. This is a final
stage, no further action is required.
The request was not acknowledged nor suspended before the acknowledgeable timeout expired. This is a final stage, no further action is required.
The operator did not acknowledge the request within the security time frame after
having suspended it. This is a final stage, no further action is required.
Terminated
Time Navigator shut down before the request could be handled or acknowledged.
528
Status Evolution
The following table shows all the different statuses a request may go through during its
life cycle.
Submitted
Handled
Acknowledged
Final stage
Unacknowledged
Final stage
Terminated
Final stage
Suspended
Acknowledged
Final stage
Unacknowledged
Final stage
Terminated
Final stage
Terminated
Final stage
530
531
C H A P T E R
16
16
See Exporting Data Backed up to Disk to a Tape Library, page 549 for details.
532
Specifying the number of VTL Disk Drives that you want to use.
Only one backup version of the Vtl directory is kept. Only the last version
backed up can thus be restored.
Chapter 16
533
1.
2.
3.
In the Directory Selection window, click on Next to accept the default installation
directory or enter a different directory. You can also click on Browse to select a
directory.
534
4.
In the Size Selection Windows, click on Next to accept the default size and number
of cartridges or modify the values.
5.
In the Name window, click on Next to accept the default name or enter a name for
the VLS.
Chapter 16
535
6.
7.
If you have to configure a backup for any of your platforms, the Administrative
Assistant allows you to do so. See , page 291 for details.
1.
2.
In the Network area, click on the icon of the host where you want to create the VLS.
3.
536
4.
Select Virtual Libraries-Atempo-Virtual Library System and click on OK. The Create
Atempo VLS window appears.
5.
6.
To set advanced parameters, click on the VLS Environment Variables button. See
VLS Configuration Window, page 539 for details.
7.
Chapter 16
537
Host Name: The name of the host you selected appears in the Host Name field. You
cannot edit it at this point.
Library Name: The name of the library appears with the library icon in the
Network area.
Number of Drives: Number of Virtual Disk Drives that you want to use. The
default value is 2.
Media Directory: Directory where the cartridges are going to be created. Click
on the Browse button to select a directory on your disk.
Warning:
Cartridge Size (MB): Size of one cartridge. The size must be between 256 MB
and 200 GB.
Number of Cartridges: Number of spare cartridges available in the library. It
must be between 4 and 6000.
538
Disk Space Allocation: Specifies whether the space allocated to the cartridges is
reserved on the disk when the label reinitialization is performed.
Note:
Note:
If you choose the Cartridges in Slots option, make sure you perform a Label
Reinitialization of the library via the Devices-Library-OperationsReinitialization-Label menu. As space allocation may take a long time, we
recommend that this operation be performed at a time when
Time Navigator Administration Console is not being used.
Chapter 16
539
This feature is not compatible with the SAN feature. If you add media
directories, you cannot use the VLS in a SAN environment.
Add: Allows you to enter the Absolute path of an additional directory in
which cartridge files are stored, and a number of cartridges to add in that
directory.
For Windows platforms, if the cartridge directory is located on a network
drive, enter the path with the UNC format:
\\server_name\share_name\directory_name
Connection Identity:
Note:
User Name: Name of the user required to access the cartridge directory.
This information may be required for instance if the cartridge directory is
located on a network drive on a Windows platforms. For Windows
platforms, the user name format must be: domain_name\user_name.
The user allowed to access the cartridge directory must also have access
to the Vtl directory located in the Time Navigator installation
directory.
Password: Password of the user required to access the cartridge directory.
540
Chapter 16
541
Description
ALLOCATE_SPACE
CART_DIR
Where:
CART_DIR is the cartridge directory you specified at library
creation; catalog_name is the name of the catalog where the Virtual
Library System has been
created; device_descriptor is the device descriptor of the Virtual
Library System.
CART_DIR_EXTRAN
(where N stands for 0, 1, 2 ...
depending on the number of
additional directories)
CART_SIZE
MAILBOX_DIR
MAX_NB_CARTRIDGES
MAX_NB_CARTRIDGES_MBX
NB_CART_TO_ADD
542
Parameter
Description
NB_CART_TO_ADD_EXTRAN
(where N stands for 0, 1, 2 ...
depending on the number of
additional directories)
NET_PASSWORD
NET_USER
SAN
CART_DIR/DiskDrives/catalog_name/device_descriptor
CART_DIR/DiskDrives/catalog_name/device_descriptor
CART_DIR\DiskDrives\catalog_name\device_descriptor
Where:
CART_DIR is the cartridge directory you specified when you created the library.
catalog_name is the name of the catalog where the Virtual Library System has
been created.
If you specified at library creation that you wanted to allocate the cartridge space on disk,
you must choose the Library-Operations-Reinitialization-Label menu to perform a Label
Chapter 16
543
Warning:
As space allocation may take a long time, we recommend that this operation
be performed at a time when Time Navigator Administration Console is
not being used.
If you want to stop space allocation in progress, edit the library and set the
ALLOCATE_SPACE parameter to NONE.
See Editing a Virtual Library System, page 545 for details about VLS Parameters.
SAN Configuration
You can configure a Virtual Library System on a SAN architecture (Storage Area
Network), except if you are performing backups using the NDMP protocol. In this case,
the use of a VLS is not supported.
Warning:
The SAN features cannot be used if you have defined additional cartridge
directories. See Create Atempo VLS Window - Advanced Tab,
page 538.
See Time Navigator in SAN Environments, page 419 for details about the SAN.
To create a Virtual Library System on a SAN
Note:
A platform of network type must have been created previously via the PlatformNew-Network menu.
1.
2.
3.
4.
SAN
544
HOSTN
CART_DIR_HOSTN
Click on OK.
The drives are now displayed near the SAN in the lower part of the Network area.
A small SAN network appears on the icon of the hosts associated with the VTL Disk
Drives.
Chapter 16
545
1.
2.
3.
4.
If you edit the CART_SIZE parameter, only new cartridges will take the
new size. The size of existing cartridges remains the same.
Modify the value of a parameter: select the parameter in the list and click on
Edit.
Add a new parameter: click on Add, select the parameter in the list and click
on OK.
In the Edit VLS Parameter window, enter a value or modify the current value in the
Value field and click on OK.
6.
546
Time Navigator Library Manager is accessed via the Devices-Library-OperationsManagement menu. It provides information about the VTL Disk Drives, the mailbox slots
and the cartridges:
The Drive area contains all the VTL Disk Drives and indicates if they are full or
empty.
The Mailbox area contains all the virtual mailbox slots.
The Slots area represents all the slots containing the cartridges present in the Virtual
Library System.
All the cartridge operations that can be performed with standard cartridges are also
available for virtual cartridges. This section only describes operations that are specific to
a Virtual Library System:
See Libraries, page 159 for details about standard library management.
1.
2.
Choose Devices-Library-Properties.
3.
Chapter 16
4.
547
Click on OK. The library is automatically reinitialized in order to take the new
cartridges into account.
1.
2.
Check that the selected cartridges are the one that you want to put offline.
Tip:
If you have selected more cartridges than there are mailboxes in the
library, check the Retry if mailbox full box.
3.
Click on Start. The cartridge is moved from its slot to a mailbox slot.
4.
In Time Navigator Library Manager, select the mailbox slot and choose LibraryOperations-Reinitialization-Bar Code to inform the catalog that the mailbox slot is empty.
548
1.
3.
Select the mailbox slot(s) containing cartridges to be brought online and choose
Media-On-Line.
549
C H A P T E R
17
17
In order to export data backed up to disk to a tape library on a scheduled basis, Atempo
designed a specific application: Time Navigator Virtual Library System Application.
Note:
Duplication Mode
The Virtual Library System Application offers two duplication modes:
550
Windows only:
Uninstall and reinstall the schedule service. See Installing the Schedule Service,
page 575 for details.
Then, check the following to make sure that the Virtual Library System Application
operates properly:
Open the Virtual Library System Application and choose Virtual Library-Edit
Configuration, to check the configuration. The parallelism index is now available on
Windows, and can be set to any value regardless of the number of meta-pools.
Make sure that there is data to duplicate, and choose Virtual Library-MonitoringDuplicate and Remove Data now to start the duplication and removal process manually.
You should see all the duplications running in parallel. Once duplications have
been completed, the background color for some of the meta-pools can be yellow.
This is not relevant with the job duplication mode of the
Virtual Library System Application.
Warning:
If you are using the Virtual Library System Application with the job
duplication mode, updating Time Navigator will reinstall the cartridge
duplication mode (default mode). You must then follow the above procedure
to go back to the job duplication mode.
Chapter 17
551
552
Data on disk is first duplicated on cartridges in a tape library for longer storage.
You can either duplicate full and incremental backups or only full backups.
Duplication takes place everyday at a given time.
Note:
Then, data is removed from the disk. The data that has been duplicated on the tape
library is then removed from the disk until a specified threshold is reached. Data
removal occurs when a given filling rate is reached for the Virtual Library System,
starting with the cartridge files that are recyclable.
It is also possible to perform an emergency data removal whenever there is a critical need
for free space on the Virtual Library System.
Prerequisites
Architecture
The Virtual Library System Application must be run on a Time Navigator Server or
Storage Node on the machine where the Virtual Library System is located.
Device Configuration
The tape library and the drives to which data is going to be exported must have been
declared in Time Navigator Administration Console.
Chapter 17
553
The tina_vlsa binary must be run with the root user, who must be declared
as a Time Navigator user. He must be granted at least the cartridge and drive
permissions. It is recommended that he be granted the same permissions as the
Time Navigator privileged user.
The system administrator of the machine onto which the Virtual Library
System Application is installed must be declared as a Time Navigator user. He must be
granted at least the cartridge and drive permissions. It is recommended that he be granted
the same permissions as the Time Navigator privileged user.
The system administrator of the machine onto which the Virtual Library System
Application is installed must be declared as a Time Navigator user. He must be granted
the cartridge and drive permissions. It is recommended that he be granted the same
permissions as the Time Navigator privileged user.
See Users and Access Rights, page 119 for details on how to declare users in
Time Navigator.
This directory is backed up along with the Time Navigator catalog. Make sure your
catalog is backed up on a regular basis.
See Backing up the Catalog, page 52 for details on how to back up the
Time Navigator catalog.
Restore Configuration
The "Use Source Cartridge when Restoring Duplicated Cartridge" tunable
(keep_primary_on_duplication) must be set to yes on the Time Navigator Server.
It must be set prior to using the Virtual Library System Application.
The tunable allows you to restore from the original cartridge on disk rather than from
the cartridge on the tape library. This is particularly useful when the data is present both
on the disk and on the tape library.
See the Time Navigator Tunables guide for details on how to set a tunable.
554
Note:
Chapter 17
555
556
You must imperatively install the Windows Schedule Service, so that data duplication and
removal can be launched at the specified time.
To install the Schedule Service
1.
In the Virtual Library System Application main window, choose Schedule ServiceInstall.
2.
In the Account Name field, enter the name of the system administrator
(.\Administrator) and in the Password field, enter the administrator password.
3.
Click on OK.
The Schedule Service (tina_vls_sched_tina4) is now installed. Make sure it
is started.
1.
In the Virtual Library System Application main window, choose Virtual LibraryConfiguration. The Virtual Library Parameters window appears.
Chapter 17
2.
557
declared.
Note:
You will be asked to enter the Privileged User Name and the Password to
retrieve information from the catalog.
Virtual Library Name: Name of the virtual library allowing to back up data to disk.
Duplication/Removal Schedule
Checking the Duplication/Removal Schedule box enables the automatic scheduling for
duplication and removal operations.
Start Time: Time when the data duplication and removal will start every day. Use
the hh:mm format.
558
Duplication Parameters
Time Limit: Checking this box allows you to define a deadline after which no
Example
If the backups take place during the night, you can program the duplication jobs
to start at 10:00 and you can set the time limit to 19:00. If the duplication jobs for
some of the cartridges has not started at 19:00, they are blocked until the following
day, and the duplicated data is deleted from disk at once. Thus, duplication and
deletion operations do not interfere with backup operations.
Note:
If the time limit is before the start time (for instance, 7:00 and 22:00),
duplication jobs will start at the specified time and go on until the time
limit on the following day.
Parallelization Index (Unix only): Number of metapools that you want to duplicate
simultaneously. This index must not be greater than the number of drives available
in the physical library.
Warning:
Removal Parameters
Start Threshold: Maximum percentage of fullness that you want your Virtual Library
System to contain.
For example, if you set the threshold to 90%, information will be removed when
the Virtual Library System is more than 90% full, starting with the cartridge files
that are recyclable.
Chapter 17
559
For example, if you set the threshold to 80%, data will be removed until the Virtual
Library System is 80% full.
Note:
3.
Click on OK.
560
Managing Metapools
Managing metapools consists of:
Defining at least one metapool. A meta-pool is a cartridge pool for the Virtual
Library System (source pool) which is associated to one or two cartridge pools on
the tape library (target pools). It defines the global retention period policy and the
type of backup and duplication. Some parameters can also be set to automatically
close cartridges according to specific criteria, so that they can be duplicated.
Warning:
Editing metapools to modify the associated pools and the closing parameters.
Deleting metapools.
To define metapools:
1.
Chapter 17
2.
561
Enter the following parameters to create cartridge pools for the Virtual Library
System (backup to disk):
Catalog Name: Name of the Time Navigator catalog where the libraries are
declared.
Note:
You may be asked to enter the Privileged User Name and the Password to
retrieve information from the catalog.
Virtual Library Name: Name of the virtual library allowing to back up data to disk.
Metapool Name: Name of the metapool that you want to create for the Virtual Library
System.
Scenario : Duplication scenario that you want to implement. A scenario indicates
how the data is backed up (standard or synthetic backup), and the type of backup
to duplicate (full or incremental).
562
Synthetic backup is the preferred method because the backup is performed from
the Time Navigator server and not from the agent. This method is faster and puts
no load on the agent machine.
See Backup Types, page 286 for details on synthetic backup.
The scenarios available are the following:
Only full backups are duplicated. All full backup are synthetic backups and
the duplication is performed simultaneously: only one job is started that
writes both on the Virtual Library System and on the tape library.
Two pools are automatically created for the Virtual Library System to
separate full backups from incremental backups. The full backup pool bears
the name of the metapool and the pool dedicated to incremental backups uses
the same name followed by an _i.
Label: Label for the cartridge files on disk.
Retention Period: Number of days the data on the Virtual Library System will be
In the Target Cartridge Pool area, enter the following parameters to create or choose
a cartridge pool for the duplication from disk to tape:
Target Library: Name of the tape library where you want data to be duplicated.
Chapter 17
563
Cartridge Pool: Specifies whether you want to use an Existing Pool or Create a New Pool.
Note:
Target cartridge pools can be created either at the meta-pool level in the
Virtual Library Sytem Application, or directly via the Storage-Media PoolNew menu of Time Navigator Administration Console.
Existing Pool: Specifies the name of the cartridge pool if you chose to use an existing
pool.
New Pool Name: Name of the new cartridge pool if you chose not to use an existing
pool.
New Pool Label: Label for the new cartridge pool.
Retention Period: Number of days the data on the tape library will be retained before
4.
The Secondary Cartridge Pool area allows to specify a second pool, so that
to the data from disk is duplicated to two different tapes. This may be
useful if you want to externalize one of the copies and keep the second
one in the tape library.
Check the Automatic Catridge Closing box if you want to define automatic closing
criteria and enter the following parameters to specify what category of cartridges
should be automaticaly closed in order to be duplicated.
Filling Rate: Maximum percentage of fullness that you want your cartridge to
reach before being automatically closed. If you set this option to 80%, the
cartridge will be closed as soon as it is 80% full.
5.
First Backup: Time Period following the first backup and after which the
cartridge will be automatically closed. If you set this option to 5 days, the
cartridge will be closed 5 days after the first backup. This option ensures
that no data is kept for too long on disk without being duplicated.
Click on OK.
To edit a metapool:
1.
In the Virtual Library System Application main window, choose Metapool-Edit. The
Edit Metapool window appears.
564
2.
In the Catalog Name and Virtual Library Name drop-down lists, choose the catalog and
the virtual library associated with the metapool to edit.
3.
4.
5.
Only the target cartridge pools and the closing parameters can be
modified.
Click on OK.
To delete a metapool:
1.
2.
In the Catalog Name and Virtual Library Name drop-down lists, choose the catalog and
the virtual library associated with the metapool to delete.
3.
4.
Click on Delete.
1.
Chapter 17
2.
565
declared.
Note:
You may be asked to enter the Privileged User Name and the Password to
retrieve information from the catalog.
Virtual Library Name: Name of the virtual library allowing to back up data to disk.
Platform to Back up: Platform that you want to back up.
Strategy Name: Name of the strategy that you want to create: A, B, C or D. Only
the strategies that have not been defined yet are available.
Metapool: Name of the metapool you want to use. If you selected a stream based
application, only Regular full backup metapools are available.
Full Backup Day: Day on which the weekly full backup will be performed.
Full Backup Time: Time at which the weekly full backup will be performed.
566
Incremental Backup Time: Time the daily incremental backup will be performed.
3.
Click on OK.
4.
If you want to have a different strategy scheduling policy and set more advanced
parameters, you can then edit the strategy in Time Navigator Administration
Console (Backup-Selected Platform-Strategy-Properties menu).
1.
2.
Select a metapool in the list and use the Up and Down button to define the priority
level for each metapool.
3.
4.
Click on OK.
Chapter 17
567
In the Virtual Library System Application main window, choose Virtual Library-Test.
The Virtual Library Test window appears.
The Test window displays a line for each component that was tested. Inconsistencies are
displayed in bold red type, explaining what the problem or inconsistency is.
Monitoring
Monitoring libraries consists of the following operations:
Displaying information about the Virtual Library System and the metapools.
Note:
568
1.
In the Virtual Library System Application main window, choose Virtual LibraryMonitoring. The Virtual Library Monitoring Report window appears.
Note:
2.
In the Catalog drop down list, select the catalog where the libraries are declared.
Note:
3.
You may be asked to enter the Privileged User Name and the Password to
retrieve information from the catalog.
In the Virtual Library drop down list, select the virtual library that you want to
monitor.
The report is displayed in the text area below. You can refresh it by clicking on
Refresh.
Chapter 17
569
Available Information
The information displayed in the monitoring window are of two types:
Space Used: Percentage of the Virtual Library System that is already used. The
Color
Description
No color
Green
Yellow
Red
Duplication Progress: Percentage of the duplicable cartridges that have already been
duplicated.
Duplicable Cartridges: Number of cartridges that are eligible for duplication (Full and
Closed cartridges).
Metapool Information
The above information is available for metapools, as well as the following information:
570
Description
Green
Yellow
Orange
Red
1.
Click on the Export Report button. The Export Monitoring Report window appears.
2.
3.
Click on OK.
1.
In the Virtual Library System Application main window, choose Virtual LibraryMonitoring. The Virtual Library Monitoring window appears.
2.
In the Catalog drop down list, select the catalog where the libraries are declared.
Note:
3.
You may be asked to enter the Privileged User Name and the Password to
retrieve information from the catalog.
In the Virtual Library drop down list, select the virtual library that you want to
monitor.
Chapter 17
4.
571
1.
In the Virtual Library System Application main window, choose Virtual LibraryMonitoring. The Virtual Library Monitoring window appears.
2.
In the Catalog drop down list, select the catalog where the libraries are declared.
Note:
You may be asked to enter the Privileged User Name and the Password to
retrieve information from the catalog.
3.
In the Virtual Library drop down list, select the virtual library that you want to
monitor.
4.
In the Stop Threshold field, enter the percentage of when data removal will stop.
For example, if you set the threshold to 80%, data will be removed until the Virtual
Library System is 80% full.
5.
572
Improved data protection: All backed up data can be duplicated daily without
waiting for cartridges to be full or closed.
Handling of large files spanning on several cartridges.
Improved parallel duplication: Parallel duplication is available on Windows
systems.
Parallelism is not limited to one duplication per meta-pool and all jobs that are
backed up on different cartridges can be duplicated in parallel, provided there are
enough available drives.
Backup strategies are no longer configured in the
Virtual Library System Application, but directly in Time Navigator
Administration Console, which allows for a finer and more advanced scheduling.
Chapter 17
573
Principles
Time Navigator Virtual Library System Application associates a Virtual Library
System to a tape library in order to export data automatically.
Data backed up on disk is first duplicated on cartridges in a tape library for longer
storage on a per job basis. You can either duplicate full and incremental backups
or only full backups.
Duplication takes place everyday at a given time.
Then, data is removed from the disk. The data that has been duplicated on the tape
library is then removed from the disk until a specified threshold is reached. Data
removal occurs when a given filling rate is reached for the Virtual Library System,
starting with the cartridge files that are recyclable.
It is also possible to perform an emergency data removal whenever there is a critical need
for free space on the Virtual Library System.
574
Prerequisites
Architecture
The Virtual Library System Application must be run on a Time Navigator Server or
Storage Node on the machine where the Virtual Library System is located.
Device Configuration
The tape library and the drives to which data is going to be exported must have been
declared in Time Navigator Administration Console.
This directory is backed up along with the Time Navigator catalog. Make sure your
catalog is backed up on a regular basis.
See Backing up the Catalog, page 52 for details on how to back up the
Time Navigator catalog.
Chapter 17
575
You must imperatively install the Windows Schedule Service, so that data duplication and
removal can be launched at the specified time.
576
1.
In the Virtual Library System Application main window, choose Schedule ServiceInstall.
The Schedule Service (named tina_vls_sched_xxx) is now installed. Make sure
it is started.
1.
In the Virtual Library System Application main window, choose Schedule ServiceUninstall.
The Schedule Service (named tina_vls_sched_xxx) is now uninstalled.
1.
In the Virtual Library System Application main window, choose Virtual Library-Edit
Configuration. The Duplication/Removal Parameters window appears.
Chapter 17
2.
577
You will be asked to enter the Privileged User Name and the Password to
retrieve information from the catalog.
Virtual Library Name: Name of the virtual library allowing to back up data to disk.
578
Library Size
Note:
The libray size parameters must only be set if the source library is a
physical library and not a virtual library.
Cartridge Size (MB): Size of the cartridges in the source physical library.
Number of Cartridges: Number of cartridges present in the source physical library.
Duplication/Removal Schedule
Checking the Duplication/Removal Schedule box enables the automatic scheduling for
duplication and removal operations.
Start Time: Time when the data duplication and removal will start every day. Use the
hh:mm format.
Duplication Parameters
Time Limit: Checking this box allows you to define a deadline after which no
Example
If the backups take place during the night, you can program the duplications to start
at 10:00 and you can set the time limit to 19:00. If the duplications for some of the
jobs have not started at 19:00, they are blocked until the following day, and the
duplicated data is deleted from disk at once. Thus, duplication and deletion
operations do not interfere with backup operations.
Note:
If the time limit is before the start time (for instance, 7:00 and 22:00),
duplication jobs will start at the specified time and go on until the time
limit on the following day.
Parallelization Index: Number of jobs that you want to duplicate simultaneously. This
index must not be greater than the number of drives available in the physical library.
Note:
If two jobs are backed up on the same cartridge, they cannot be duplicated
in parallel. The second job will be queued while the first job is duplicated.
Removal Parameters
Chapter 17
579
Start Threshold: Maximum percentage of fullness that you want your Virtual Library
System to contain.
For example, if you set the threshold to 90%, information will be removed when
the Virtual Library System is more than 90% full, starting with the cartridge files
that are recyclable.
Stop Threshold: Percentage of when data removal will stop.
For example, if you set the threshold to 80%, data will be removed until the Virtual
Library System is 80% full.
3.
Note:
Tip:
Most of the time, the Start and Stop Thresholds are set to the same value.
Click on OK.
Managing Metapools
Managing metapools consists of:
Defining at least one metapool. A meta-pool is a cartridge pool for the Virtual
Library System (source pool) which is associated to one or two cartridge pools on
the tape library (target pools). It defines the global retention period policy and the
type of backup and duplication.
Warning:
Deleting metapools.
To define metapools:
1.
580
2.
Enter the following parameters to create cartridge pools for the Virtual Library
System (backup to disk):
Catalog Name: Name of the Time Navigator catalog where the libraries are declared.
Note:
You may be asked to enter the Privileged User Name and the Password to
retrieve information from the catalog.
Virtual Library Name: Name of the virtual library allowing to back up data to disk.
Metapool Name: Name of the metapool that you want to create for the Virtual Library
System.
Scenario : Duplication scenario that you want to implement. A scenario indicates the
Chapter 17
581
Retention Period: Number of days the data on the Virtual Library System will be
In the Target Cartridge Pool area, enter the following parameters to create or choose a
cartridge pool for the duplication from disk to tape:
Target Library: Name of the tape library where you want data to be duplicated.
Cartridge Pool: Specifies whether you want to use an Existing Pool or Create a New Pool.
Note:
Target cartridge pools can be created either at the meta-pool level in the
Virtual Library Sytem Application, or directly via the Storage-Cartridge
Pool-New menu of Time Navigator Administration Console.
Existing Pool: Specifies the name of the cartridge pool if you chose to use an existing
pool.
New Pool Name: Name of the new cartridge pool if you chose not to use an existing
pool.
New Pool Label: Label for the new cartridge pool.
Retention Period: Number of days the data on the tape library will be retained before
4.
The Secondary Cartridge Pool area allows to specify a second pool, so that
to the data from disk is duplicated to two different tapes. This may be
useful if you want to externalize one of the copies and keep the second
one in the tape library.
Click on OK.
To edit a metapool:
1.
In the Virtual Library System Application main window, choose Metapool-Edit. The
Edit Metapool window appears.
2.
In the Catalog Name and Virtual Library Name drop-down lists, choose the catalog and
the virtual library associated with the metapool to edit.
3.
582
4.
5.
Click on OK.
To delete a metapool:
1.
2.
In the Catalog Name and Virtual Library Name drop-down lists, choose the catalog and
the virtual library associated with the metapool to delete.
3.
4.
Click on Delete.
1.
Chapter 17
583
2.
Select a metapool in the list and use the Up and Down button to define the priority
level for each metapool.
3.
4.
Click on OK.
In the Virtual Library System Application main window, choose Virtual Library-Test.
The Virtual Library Test window appears.
The Test window displays a line for each component that was tested. Inconsistencies are
displayed in bold red type, explaining what the problem or inconsistency is.
Monitoring
Monitoring libraries consists of the following operations:
Displaying information about the Virtual Library System and the metapools.
584
Note:
1.
In the Virtual Library System Application main window, choose Virtual LibraryMonitoring. The Virtual Library Monitoring Report window appears.
Note:
2.
In the Catalog drop down list, select the catalog where the libraries are declared.
Note:
You may be asked to enter the Privileged User Name and the Password to
retrieve information from the catalog.
Chapter 17
3.
585
In the Virtual Library drop down list, select the virtual library that you want to
monitor.
The report is displayed in the text area below. You can refresh it by clicking on
Refresh.
Available Information
The information displayed in the monitoring window are of two types:
Space Used: Percentage of the Virtual Library System that is already used. The
Color
Description
No color
Green
Yellow
Red
Duplication Progress: Percentage of the duplicable cartridges that have already been
duplicated.
586
Metapool Information
The above information is available for metapools, as well as the following information:
Description
Green
Yellow
Orange
Red
1.
Click on the Export Report button. The Export Monitoring Report window appears.
2.
3.
Click on OK.
1.
In the Virtual Library System Application main window, choose Virtual LibraryMonitoring. The Virtual Library Monitoring window appears.
Chapter 17
2.
587
In the Catalog drop down list, select the catalog where the libraries are declared.
Note:
You may be asked to enter the Privileged User Name and the Password to
retrieve information from the catalog.
3.
In the Virtual Library drop down list, select the virtual library that you want to
monitor.
4.
1.
In the Virtual Library System Application main window, choose Virtual LibraryMonitoring. The Virtual Library Monitoring window appears.
2.
In the Catalog drop down list, select the catalog where the libraries are declared.
Note:
You may be asked to enter the Privileged User Name and the Password to
retrieve information from the catalog.
3.
In the Virtual Library drop down list, select the virtual library that you want to
monitor.
4.
In the Stop Threshold field, enter the percentage of when data removal will stop.
For example, if you set the threshold to 80%, data will be removed until the Virtual
Library System is 80% full.
588
5.
589
C H A P T E R
18
List Application
18
Application Overview
Definition
A List application allows you to create and organize objects at a logical level. These
objects can be located on different locations on a same machine (ex: objects located on
different partitions under Windows 2000/2003 or on different file systems under Unix).
The application makes it possible to back up a list of objects of the following type:
Regular file
Directory
Raw device
Symbolic links
Special Unix objects, such as: character or block device access, named pipe.
The List application can be used to perform cold backups of an Oracle database, to back
up the critical files of an operating system (ex: passwd under Unix, win.ini under
Windows 2000/2003).
The List application is able to back up any database product equipped with a backup
utility using named pipe.
The List application does not support ACLs (Access Control Lists).
List File
The list of the objects to back up associated with a "List" application is defined in a file
called List file.
The List file can be specified in the following manners:
Enter the file name in the List File textbox of the New Application window in
Time Navigator Administration Console.
Click on Browse next to the List File textbox of the New Application window to select
the file on disk.
590
If you decide to specify the List file via the List File textbox and if the
TINA_AML_SOURCE_FILE environment variable is also set, Time Navigator will take
into account the List file specified in the List File textbox.
For more information on environment variables, see Environment Variables,
page 607.
Parallel Backup
When you perform parallel backups with the List application, the backup job is divided
into several jobs, according to the degree of parallelism defined when you create the
backup strategy and backup selections. You can define a synchronization point using the
WAIT keyword, if necessary.
Chapter 18
List Application
591
Basic Rules
The basic syntax rules are the following:
The name associated with each keyword FILE or DIR must appear between quotes
if it contains a space, ex: "my name" or my_name or "my_name" are accepted,
but my name is not.
The name associated with each keyword FILE or DIR must not contain the slash
character. For instance, DIR "/vol/vol1" is not allowed.
If the name of one of your files or directories happens to be a declared List
application keyword, it must appear between quotes (single or double), to prevent
it from being interpreted as a keyword.
For instance:
DIR size ("/vol/vol0/DT/PROD/TESTDATA/treendmp/size") should be
written:
DIR "size" ("/vol/vol0/DT/PROD/TESTDATA/treendmp/size" )
592
Keywords
For simplicity reasons, the syntax used includes a limited number of keywords. They are
presented below in alphabetical order.
DIR
DIR name ( path | DIR | FILE )
or
DIR name ( path | DIR | FILE | MOUNT | TREE | EXEC | LINK | PIPE |
INFO )
The keyword DIR is used to define a meta-directory (like an ordinary directory) which
can be composed of other meta-directories (DIR) or meta-files (FILE). It allows for a
DIR is a sub-meta-directory.
FILE is a meta-file.
DIR mydir (
FILE myfile ("/Users/Demo/Weather.html")
FILE myfile ("/Users/Demo/Movies/mymovie.avi")
)
=> Backs up the file /Users/Demo/Weather.html and /Users/Demo/Movies/
mymovie.avi
DIR mydir2 (
DIR mydir3 (
FILE myfile ("/Users/Demo/Pictures/image.jpeg")
)
)
=> Backs up the file image.jpeg
Another use of DIR consists in directly specifying a path, which makes it possible to back
up all regular files present in the directory.
DIR mypath ( "/Users/Demo/Movies" )
Backs up only the contents of the directory /Users/Demo/Movies.
Chapter 18
List Application
593
DIR mydir (
FILE hosts ( "/etc/hosts" )
FILE config ( "/usr/people/lch/.cshrc" )
)
Backs up the files /etc/hosts and /usr/people/lch/.cshrc.
DIR mydir2 (
DIR mydir3 (
FILE dummy ( "/usr/people2/file" )
)
)
Backs up the file file.
Another use of DIR consists in directly specifying a path, which makes it possible to back
up all regular files present in the directory.
DIR mypath ( "/usr/local/bin" )
Backs up only the contents of the directory /usr/local/bin.
DIR mydir (
FILE hosts ( "c:\hosts\hosts.txt" )
FILE config ( "c:\config\config.txt" )
)
Backs up the files hosts.txt and config.txt.
DIR mydir2 (
DIR mydir3 (
FILE dummy ( "c:\winnt\win.ini" )
)
)
Backs up the file win.ini.
Another use of DIR consists in directly specifying a path, which makes it possible to back
594
Example
EXEC Keyword
DIR "First Directory" (
DIR "Rake Files" (
"/home02/rks/testdir"
EXEC "/home02/rks/testsave/test_exec.sh"
)
DIR "Recursive files" (
TREE "/home02/rks/testdir"
EXEC "/home02/rks/testsave/test_exec.sh"
)
DIR "Specific Files" (
EXEC "/home02/rks/testsave/test_exec.sh",
FILE ".script" ( "/home02/rks/testdir/.cshrc" ),
FILE ".doc" (
"/home02/rks/testdir/testdir2/testdir3/testdir4/lindberg.doc" ),
LINK ".link" ( "/home02/rks/testdir/.cshrc" ),
)
)
Example
Chapter 18
List Application
595
;;
esac
exit 0
Example
Executable script called by the EXEC keyword, using the TINA_CATALOG and
TINA_AML_FOLDER variables
See Environment Variables, page 607 for a complete description of the
TINA_CATALOG and TINA_AML_FOLDER variables.
::::::::::::::
test_exec.sh
::::::::::::::
#!/bin/sh
case "$1" in
'-pre')
# Stabilize the data
$TINA_HOME/Bin/tina_alarm -catalog $TINA_CATALOG -severity acct -text
"Preparing Data in $TINA_AML_FOLDER:$3 meta-directory"
sleep 10
;;
'-post')
# Release the data
$TINA_HOME/Bin/tina_alarm -catalog $TINA_CATALOG -severity acct -text
"Postparing Data in $TINA_AML_FOLDER:$3 meta-directory"
sleep 10
;;
*)
echo "Usage: $0 { -pre | -post } -dir path"
exit 100
;;
esac
case "$2" in
'-dir')
;;
*)
echo "Usage: $0 { -pre | -post } -dir path"
exit 101
;;
esac
exit 0
FILE
FILE name ( { path, ... } OFFSET m | SIZE n | MYSELF )
The FILE keyword is mostly used to back up files and raw devices. The absolute file
path is specified by path. It can also be used with mirror files. The term applies to files
which are theoretically identical to one another. The concept is mainly used for databases.
path is the path (or a list of paths) to a file (or mirror files) to be backed up.
596
OFFSET is the partition address of the data to be backed up. The unit is K for KB,
M for MB and G for GB. The default value is: 0 if the OFFSET parameter is not
specified.
SIZE represents the amount of data to be backed up from the OFFSET location. If
SIZE=0, the amount of data is unlimited, the entire file will be backed up. The
default value is 0 if the SIZE parameter is not specified.
MYSELF is a keyword used to automatically back up the List file. If the MYSELF
parameter is being used, OFFSET and SIZE are useless.
Warning:
Example
Using the OFFSET and SIZE parameters allows you to back up part of your
data if the application you are using shares raw devices or if you are
performing operations between raw devices of different sizes.
Do not use these parameters if the data volume is subject to change during
backup.
FILE Keyword
FILE myfile ( "c:\winnt\system32\drivers\etc\services" )
Backs up the file services.
FILE mypartition ( "/dev/rdsk/c0t0d0s0" OFFSET 4K SIZE 23550K)
Backs up the raw device c0t0d0s0 from the 4 KB address for a size of 23550 KB.
FILE mymirror (
"/mirror/file1" ,
"/mirror/file2" ,
"/mirror/file3" ,
)
Backs up just once the three identical files file1, file2 and file3.
If the size of one of the files is different, an error message is sent to the event file
(Meta-file file1 size 4012 <> mirror file3 size 2015).
FILE auto ( MYSELF )
Backs up the current List file. If the List file name is c:\temp\test_list.txt, then
FILE auto ( MYSELF ) corresponds to FILE auto ("c:\temp\test_list.txt").
Note:
The MYSELF keyword is replaced by the physical name of the List file. If this
file contains the INCLUDE keyword, it is not expanded in the backed up file.
To back up the included file contents, you must add a MYSELF keyword into
the included file.
Chapter 18
List Application
597
INCLUDE
INCLUDE ( file_path )
The keyword INCLUDE is used to include the contents of another List file into the list of
INFO Keyword
DIR "First Directory" (
INFO "info1" ("This is a comment")
)
DIR "Second Directory" (
INFO "info2" ("This is another comment")
)
598
Tip:
If you want the INFO link to be sorted to the top of its directory, start its name
with a space character.
LINK
LINK "link_name" ("target_name")
The LINK keyword allows you to create a meta-link to a file. The file data will not be
backed up.
MOUNT
DIR "mydir" (MOUNT path)
The MOUNT keyword allows to backup and restore file systems with the list application
in a similar fashion as the Time Navigator Filesystem application. Symbolic links are
not followed, they are backed up as a link.
Note:
Example
The MOUNT keyword cannot be used with the TREE keyword, but is
compatible with EXEC and INFO.
MOUNT keyword
DIR "Mounted files" (
EXEC "/DT/DEV/dev/rks/testlist/test_exec.sh",
MOUNT "/DT/DEV/dev/rks/testdir"
)
NOSNAP
This keyword is used only when performing snapshot of the List application. When the
List application is set to snapshot a volume, the NOSNAP keyword can be used to prevent
the snapshot of a level 1 directory within that volume. A level 1 directory is a directory
located just below the root of the List application, as defined in the List file.
Example
NOSNAP keyword
DIR "My Dir" (TREE "/usr/localuser" NOSNAP)
DIR "My second Dir" (MOUNT "/usr/tmp")
In this example, the "My Dir" directory is going to be backed up on tape while the "My
second Dir" directory is going to be snapshotted.
Chapter 18
List Application
599
PIPE
PIPE "pipe_name" (GENBY|USEDBY exec_path)
The PIPE keyword allows to back up a dump via a named pipe.
The GENBY option specifies that the pipe is created by the script or the program specified
by exec_path.
The USEDBY option specifies that the pipe is created by the List application.
The path of the script or program (exec_path) corresponds to the path of the script or
PIPE Keyword
DIR "First Directory" (
PIPE "Pipe_A" ( USEDBY "/aml/unix/pipe_script.sh" )
PIPE "Pipe_B" ( GENBY "/aml/unix/pipe_script.sh" )
Example
600
exit 0
Example
Executable script called by the PIPE keyword, using the TINA_CATALOG and
TINA_AML_FOLDER variables
See Environment Variables, page 607 for a complete description of the
TINA_CATALOG and TINA_AML_FOLDER variables.
::::::::::::::
test_pipe.sh
::::::::::::::
#!/bin/sh
# This script does not create a pipe,
# so it must be used with the keyword USEDBY.
case "$2" in
'-backup')
# Create the data
$TINA_HOME/Bin/tina_alarm -catalog $TINA_CATALOG -severity acct -text
"Backup data to $1 in $TINA_AML_FOLDER"
sleep 5
echo "Silly Data" > $1
;;
'-restore')
# Restore the data
$TINA_HOME/Bin/tina_alarm -catalog $TINA_CATALOG -severity acct -text
"Restore data from $1 in $TINA_AML_FOLDER to /tmp/test_pipe_$$"
sleep 5
cat $1 > /tmp/test_pipe_$$
;;
*)
$TINA_HOME/Bin/tina_alarm -catalog $TINA_CATALOG -severity error
"Usage: $0 abs_pipe [ -backup [ -full | -incr ] | -restore ]"
exit 100
;;
esac
exit 0
TREE
DIR name (TREE path)
The TREE keyword causes a gutter type meta-directory to be recursively extended
downwards if it contains sub-directories thus enabling the backup of a tree of files and
directories, specifying only one gutter physical path.
Note:
Only regular files are backed up with the TREE keyword. Symbolink links are
followed to their final destination and backed up as files. If you want to back
up symbolic links as links and perform a file system like backup, use the
MOUNT keyword instead of the TREE keyword.
Chapter 18
Example
List Application
601
TREE Keyword
DIR "First Directory" (
DIR "Rake Files" (
EXEC "/home02/rks/testsave/test_exec.sh",
INFO " info" ( "Rake means one level only" ),
"/home02/rks/testdir"
)
DIR "Recursive files" (
EXEC "/home02/rks/testsave/test_exec.sh",
INFO " info" ( "Recursive means all levels" ),
TREE "/home02/rks/testdir"
)
DIR "Specific Files" (
EXEC "/home02/rks/testsave/test_exec.sh",
INFO " info" ( "Specific means named objects only" ),
FILE ".script" ( "/home02/rks/testdir/.cshrc" ),
FILE ".doc" ( "/home02/rks/testdir/testdir2/testdir3/testdir4
/lindberg.doc" ),
LINK ".link" ( "/home02/rks/testdir/.cshrc" ),
)
)
Options
The TREE keyword can also be used with the following options:
LEVEL n
INCL special_characters
Only the files matching the special_characters criteria are going to be
displayed. The syntax of the special characters is the same as the syntax used to
filter backup selections. See Filter Syntax, page 347 for details.
EXCL special_characters
All files matching the special_characters criteria are excluded from the
display. The syntax of the special characters is the same as the syntax used to filter
backup selections. See Filter Syntax, page 347 for details.
Example
"dddd" (
"L0" (TREE "/DT/DEV/people/nko/a1" LEVEL 0)
"L1" (TREE "/DT/DEV/people/nko/a1" LEVEL 1)
"L2" (TREE "/DT/DEV/people/nko/a1" LEVEL 2)
"Inc1" (TREE "/DT/DEV/people/nko/a1" INCL "*.c")
"Inc2" (TREE "/DT/DEV/people/nko/a1" INCL "*.c*" EXCL "*.cat")
VERSION (optional)
VERSION number
The VERSION keyword is used to specify a version number for the List file. In case of
a conflict with the syntactic analyzer (most recent analyzer), a message is displayed in
602
the Time Navigator event file (Monitoring-Time Navigator Event Viewer menu in
Time Navigator Administration Console to view events).
Example
VERSION Keyword
VERSION 1
If the List file is automatically created, it indicates that it is compliant with version 1
It is advised not to specify a version number in the List file, since the version
number only makes sense when the List file is automatically created by an
application.
# (optional)
# comment
The # keyword is used to specify a comment in the List file.
The comment must be entered after this keyword and ends at the end of the line (i.e., if
the comment is entered on several lines, you must insert the # keyword on each line).
Example
# Keyword
# Backs up a system file
FILE system ("c:\winnt\system32\ntio.sys")
FILE automatically ( MYSELF )
FILE system ("c:\winnt\system.ini" )
FILE win ("c:\winnt\win.ini" )
DIR special (# backs up confidential data
DIR confidential ("d:\private\secret")
FILE key ("d:\private\key.txt")
)
INCLUDE ("e:\list\add_list.txt")
Backs up the following objects:
Chapter 18
List Application
603
The WAIT keyword implements a synchronization point. The synchronization point can
be useful when you perform parallel backups of the List Application. It is an option of
the DIR keyword.
When Time Navigator encounters a meta-directory with a WAIT keyword, it waits until
all the meta-directory's children and brothers have finished their backup, and then
continue the navigation in the tree for other backups.
Example
WAIT keyword
DIR "First Directory" (
FILE "Sample" ("/etc/services")
DIR "Dir2" ( TREE "/DT/DEV/people/nko/FF/Src")
DIR "Dir3" ( TREE "/DT/DEV/people/nko/AA/Src")
WAIT
)
DIR "Second Directory" (
FILE "Me" (MYSELF)
FILE "Host" ("/etc/hosts")
LINK "Link" ("/DT/DEV/people/nko/.kshrc")
604
Backup
The List Application is managed by Time Navigator in the same way as other
applications and hosts. You must create at least one backup strategy and one backup
selection to back up a List application automatically. You can perform full and/or
incremental backups of the application.
This section deals with the List application configuration and details the steps to follow
to set up an automatic backup.
Configuring Backups
The procedure below is performed using Time Navigator Administration Console menus:
1.
2.
3.
4.
5.
Note:
Chapter 18
List Application
605
1.
Select a host in the Network area. An application is always associated with a host.
2.
3.
Select the List application in the list, then click on OK. The New Application
window appears.
4.
Edit the fields of this window as described in the following section, List
Application Creation Parameters, page 39.
5.
Note:
Either by entering the absolute path of the file in the List File textbox, or by
clicking on Browse to select it .
Or by defining the TINA_AML_SOURCE_FILE environment variable in the
Environment Variables area.
If a List file is defined at both locations, Time Navigator will take into
account the List file specified in the List File textbox.
To add an environment variable, click on Add in the Environment Variables area. The
Edit Environment Variable window appears. Enter the environment variable name
606
in the Name textbox and the environment variable value in the Value textbox then
click on OK.
You can edit or delete an environment variable using the Edit and Remove buttons.
Note:
6.
7.
Right click on the List application icon you have just created and select Enable to
enable the application.
Tip:
If you have a lot of applications to enable, use the Platform-Use-EnableApplication menu that allows for multiple application selection.
Once the List application has been declared in Time Navigator Administration
Console, you must proceed as follows:
For more information on the List file syntax, see List File Syntax, page 591.
cannot be modified.
Application Name: Name of the application you want to create. The application name can
Chapter 18
List Application
607
List File: Absolute path of the List file associated with the application.
Note:
The List file can be defined using either the List File textbox, or the
TINA_AML_SOURCE_FILE environment variable. If a List file is defined at
both locations, Time Navigator will take into account the List file specified in
the List File textbox.
User Name: Name of the user who has access to the application.
Password: Allows to provide a password and confirm it.
Snapshot Type: Name of the available snapshot technologies.
Configuration: Click on this button to configure the selected snapshot technology.
Environment Variables
Possible
Values
[default]
Environment Variable
Description
TINA_AML_DEST_FILE
Optional
TINA_AML_IO_TIMEOUT
Optional
TINA_AML_SOURCE_FILE
Integer in seconds
[120]
The maximum
value is one day.
Status
Optional
608
Possible
Values
[default]
Environment Variable
Description
Status
TINA_CATALOG
Automatically
set by Time
Navigator
TINA_AML_FOLDER
Automatically
set by Time
Navigator
Status
Chapter 18
List Application
Gray
Green
Orange
Red
Note
609
For some applications, it is mandatory to edit the TINA_APP_LIB_PATH environment variable. The environment variable must be edited via the
Time Navigator Administration Console when creating the application in
Time Navigator. This variable is needed for Time Navigator to connect to the
application.
Editing an environment variable in the Time Navigator Restore & Archive Manager
1.
Make sure that the user connected to the Time Navigator Restore & Archive
Manager is granted the General Tasks and Platforms rights (Administration tab in the
Access Control window).
For more information on users access rights, see the Time Navigator Administration Guide.
2.
3.
4.
If you assign an incorrect value to a variable, a red or orange icon (depending on the
severity) appears in the tree, followed by an error message. You can still access the list
of variables and modify the incorrect value with the procedure above.
Information on environment variables
Select the variable and choose Tree-Selection-Help to display information about the variable.
The Help window contains the variable description, the possible values and the default
value, if any.
610
Note
It is possible to copy and paste text from the Help window to the Properties
window.
Chapter 18
List Application
611
Backup Selection
By default, a backup selection is automatically set on the root meta-directory of the file
tree. This allows you to gather objects from different locations in order to back them up
easily with the List application.
This default backup selection has the following settings:
No filter is set
The List application allows for a more flexible backup administration. Depending on
backup requirements, you can also define backup selections on different locations in the
application folder, as in a file system.
612
Restore
The List application allows you to:
Restore objects located in various locations on a same machine in a simple and quick
way.
Restore objects in a different location from the source location (standard restore) or on
another machine with a different disk configuration (cross-restore). This feature is
called "relocation".
The only difference between the source list file (TINA_AML_SOURCE_FILE) and the
destination list file (TINA_AML_DEST_FILE) is the physical path location.
Example
DIR "Document" (
FILE "File" ( "/Volumes/Home/Applis/oracle/Documents/my_document.doc" )
)
Chapter 18
List Application
613
)
)
)
Example
DIR "Document" (
FILE "File" ( "/Volumes/Home/Applis/oracle/Documents/Restore/my_document.doc" )
)
When you open Time Navigator Restore & Archive Manager, the following
information is displayed if you defined the TINA_AML_DEST_FILE:
"Alternate restore destination in force via %TINA_AML_DEST_FILE%"
614
Note:
Between Time Navigator versions 3.6 and 3.7.0.2, a relocation method was
available provided that all links were defined with environment variables
representing the mount points before the backup operation. This method is no
longer supported as of version 3.7.0.3. You must now use the
TINA_AML_DEST_FILE environment variable.
$ cat demo.txt
DIR "First Directory" (
Chapter 18
EXEC
INFO
FILE
PIPE
PIPE
List Application
"/Users/Demo/mac/exec_script.sh"
"Info 1" ("Objects example")
"Me" (MYSELF)
"Pipe A" ( USEDBY "/Users/Demo/mac/pipe_script.sh")
"Pipe B" ( GENBY "/Users/Demo/mac/pipe_script.sh")
)
# Include a list file
INCLUDE ( "/Users/Demo/mac/file_list2.txt")
$ cat demo.txt
DIR "First Directory" (
EXEC "/aml/unix/exec_script.sh"
INFO "Info 1" ("Objects example")
FILE "File List" (MYSELF)
FILE "Services File" ("/etc/services")
PIPE "Pipe A" ( USEDBY "/aml/unix/pipe_script.sh" )
PIPE "Pipe B" ( GENBY "/aml/unix/pipe_script.sh" )
)
# Includes a List file
INCLUDE ("/tmp/file_list2.txt")
$ cat demo.txt
DIR "First Directory" (
EXEC "g:\AppList\win32\exec_script.bat"
INFO "Info 1" ("Objects example")
FILE "File List" (MYSELF)
FILE "Services File"
("C:\WINNT\system32\drivers\etc\services")
PIPE "Pipe A" (USEDBY "g:\AppList\win32\pipe_script.bat")
PIPE "Pipe B" (GENBY "g:\AppList\win32\pipe_script.bat")
)
# Includes a List file
INCLUDE ( "c:\temp\file_list2.txt" )
Example
# List File
DIR "Second Directory" (
INFO "Info 2" ("Directories examples")
DIR "Library - 1" ( TREE "/Library")
DIR "Library - 2" ("/Users/Demo/Library")
)
# List File
615
616
# List File
For more information on the List file syntax, see List File Syntax, page 591.
The Demo list application is represented in Time Navigator Restore & Archive
Manager by the following file tree:
The object representation of the Demo list application in the file tree is explained in
Chapter 18
List Application
617
Open directory
Gutter
File
Information
Pipe
"Exec"
The location of the object physical link in the file tree complies with the following rule:
the objects physical link appears directly below the object.
Note:
The directory gutter is a destination meta-link for all the objects in the
directory.
Note:
Since objects in the file tree are classified in alphabetical order, a directory
gutter may not appear directly below the directory (ex: a file name beginning
with a space could be located before the directory gutter).
618
Object Information
Information on objects can be displayed by choosing Tree-Selection-Contents or TreeSelection-Versions.
In the Directory Contents window, the file physical link appears with the file name followed
by the extension: .00.
For more information about the Tree-Selection menu, see the Time Navigator Restore
Guide.
Restore Methods
Restoring objects belonging to the List application is performed in the same way as
Time Navigator standard objects.
The only difference occurs when you select the objects to be restored. The selection
depends on the object type:
If the file is created with the FILE keyword, you must select the file and its
physical link.
If the file is created with the DIR keyword, you must select the gutter of the
directory into which the file is located.
Two methods can be used to restore objects:
Synchronization.
Whatever the method chosen, a basic rule must be followed when selecting the objects
to be restored:
Select an object and a destination, i.e its physical link.
Chapter 18
List Application
619
1.
Select a time period for showing deleted files in the lower part of the Time Navigation
area.
2.
3.
Select the disappeared objects and their physical links in the file tree.
The icons of these objects and their links are striped.
4.
For more information on how to restore objects with a time navigation period, see the
Time Navigator Restore Guide.
Synchronization
Synchronization is used to restore an object as it was at a given date.
To restore a file using synchronization
1.
2.
3.
4.
Click on Synchronize. The file tree is updated. The viewing date is the past: it is
the backup date of the selected version.
5.
For the FILE type file, select the file physical link in the file tree (ex: /etc/
passwd).
- or For the DIR type file, select the gutter of the directory into which the file is located
in the file tree (ex: /usr/tina/Conf).
6.
For more information on how to restore objects with synchronization, see the
Time Navigator Restore Guide.
620
Examples
This section presents an example of the List application. This application type can be
used to perform cold backups of an Oracle database, to back up the critical files of an
operating system (ex: passwd under Unix, win.ini under Windows 2000/2003), to
perform a raw device backup etc.
# Generated by Time Navigator Enterprise Edition List 5.0.0.2., App 4.0.4, Dynamic "", Compil\'e
Jun 30 2005
VERSION 6
DIR "TIGER10G" (
DIR "TABLESPACES" (
DIR "SYSTEM" (
FILE "file0001.dbf" ( "/Volumes/Home/Applis/oracle/product/oradata/
TIGER10G/system01.dbf" )
),
DIR "UNDOTBS1" (
FILE "file0002.dbf" ( "/Volumes/Home/Applis/oracle/product/oradata/
TIGER10G/undotbs01.dbf" )
),
DIR "SYSAUX" (
FILE "file0003.dbf" ( "/Volumes/Home/Applis/oracle/product/oradata/
TIGER10G/sysaux01.dbf" )
),
DIR "USERS" (
FILE "file0004.dbf" ( "/Volumes/Home/Applis/oracle/product/oradata/
TIGER10G/users01.dbf" )
),
DIR "TEMP" (
LINK "tempfile0001" ( "/Volumes/Home/Applis/oracle/product/oradata/
TIGER10G/temp01.dbf" SIZE 20488K )
)
),
DIR "_ARCHIVE_LOGS" (
"/Volumes/Home/Applis/oracle/product/oradata/TIGER10G/archives/"
),
DIR "_CONTROL_FILES" (
"/Volumes/Home/Applis/oracle/product/admin/TIGER10G/udump/" ,
FILE "control.ctl" (
"/Volumes/Home/Applis/oracle/product/oradata/TIGER10G/control01.ctl" ,
"/Volumes/Home/Applis/oracle/product/oradata/TIGER10G/control02.ctl" ,
Chapter 18
List Application
621
"/Volumes/Home/Applis/oracle/product/oradata/TIGER10G/control03.ctl"
),
FILE "control.sql" ( )
),
DIR "_REDO_LOGS" (
FILE "GROUP_01" ( "/Volumes/Home/Applis/oracle/product/oradata/TIGER10G/redo01.log"
),
FILE "GROUP_02" ( "/Volumes/Home/Applis/oracle/product/oradata/TIGER10G/redo02.log"
),
FILE "GROUP_03" ( "/Volumes/Home/Applis/oracle/product/oradata/TIGER10G/redo03.log"
)
)
)
The following example allows you to perform cold backups of an Oracle database.
The tina_cold_DB73.txt List file is associated with the charlie_o73_cold List
application and backs up the following objects:
Logs (archive_logs).
622
"/export/home/oradata/DB73/redoDB7302.log" ,
"/home04/oradata/DB73/redoDB7302.log"
),
FILE "GROUP 03" (
"/export/home/oradata/DB73/redoDB7303.log" ,
"/home04/oradata/DB73/redoDB7303.log"
),
FILE "GROUP 01" (
"/export/home/oradata/DB73/redoDB7301.log" ,
"/home04/oradata/DB73/redoDB7301.log"
)
)
)
The following example allows you to perform cold backups of an Oracle database.The
tina_cold_ora92.txt List file is associated with the morpheus.ora92.cold List
application and backs up the following objects:
Logs (archive_logs).
# Generated by Time Navigator\-r List 4.0.0., App 3.2.3, Dynamic "i386_WinNTV500", Compiled Jan 15 2005
VERSION 4
DIR "ORA92" (
DIR "TABLESPACES" (
DIR "DRSYS" (
FILE "file0004.dbf" ( "F:\ORACLE\ORADATA\ORA92\DRSYS01.DBF" )
),
DIR "EXAMPLE" (
FILE "file0005.dbf" ( "F:\ORACLE\ORADATA\ORA92\EXAMPLE01.DBF" )
),
DIR "INDX" (
FILE "file0006.dbf" ( "F:\ORACLE\ORADATA\ORA92\INDX01.DBF" )
),
DIR "SYSTEM" (
FILE "file0001.dbf" ( "F:\ORACLE\ORADATA\ORA92\SYSTEM01.DBF" )
),
DIR "TEMP" (
LINK "tempfile0001" ( "F:\ORACLE\ORADATA\ORA92\TEMP01.DBF" SIZE 40968K )
),
DIR "TOOLS" (
FILE "file0008.dbf" ( "F:\ORACLE\ORADATA\ORA92\TOOLS01.DBF" )
),
DIR "UNDOTBS1" (
FILE "file0002.dbf" ( "F:\ORACLE\ORADATA\ORA92\UNDOTBS01.DBF" )
),
DIR "USERS" (
FILE "file0009.dbf" ( "F:\ORACLE\ORADATA\ORA92\USERS01.DBF" )
)
),
DIR "_ARCHIVE_LOGS" (
"F:\oracle\oradata\ora92\archive\"
),
DIR "_CONTROL_FILES" (
FILE "control.ctl" (
"F:\oracle\oradata\ORA92\control01.ctl" ,
Chapter 18
List Application
623
"F:\oracle\oradata\ORA92\control02.ctl" ,
"F:\oracle\oradata\ORA92\control03.ctl"
),
FILE "control.sql" ( )
),
DIR "_REDO_LOGS" (
FILE "GROUP 03" ( "F:\ORACLE\ORADATA\ORA92\REDO03.LOG" ),
FILE "GROUP 01" ( "F:\ORACLE\ORADATA\ORA92\REDO01.LOG" ),
FILE "GROUP 02" ( "F:\ORACLE\ORADATA\ORA92\REDO02.LOG" )
)
)
Graphical Representation
The List application is represented graphically by the following file tree in
Time Navigator Restore & Archive Manager:
The _REDO_LOGS directory contains two versions for each of the three files.
Note:
This list is automatically generated by Time Navigator for Oracle each time a
database hot backup or replication is performed.
624
The List file name and path defined via the TINA_AML_SOURCE_FILE variable
are:
E:\MySqlDev\Scripts\AppGeneratorFullScript.txt
Chapter 18
List Application
625
The script MySql1bFullScript.exe also generates a cmd file for each table
found in the database, as follows:
rem Windows version
rem SHELL et WIN32
rem
rem
if "%2"=="-backup" goto backup
if "%2"=="-restore" goto resto
:backup
C:\MySql4.1\bin\mysqldump.exe golf user >> %1
goto fin
:resto
type %1 > E:\MySqlDev\Scripts\resto\golf_user3536.sql
goto fin
:fin
exit 0
626
To view the contents of the List application, open the Time Navigator Restore &
Archive Manager:
627
C H A P T E R
19
19
Time Navigator allows you to back up, archive or restore Windows 2000/2003 mapped
network drives using the Net Disk Application (page 627), if the drives are located in
the same domain as the machine they are mapped onto. Otherwise, use the Backing up
and Restoring a Mapped Network Drive without the Net Disk Application procedure
(page 633).
A network drive is a directory or drive of a remote machine (often used as a file server)
that can be mapped onto any machine in the network. In order to access the drive on a
local machine, a user must have the necessary permissions on the remote machine.
Do not confuse network drives mapped by the Net Disk application with
network drives mapped by the Windows Explorer (with a letter) in the current
session. The basic notion may be the same, but the environments are distinct
from one another. As an illustration, it is perfectly possible to back up network
disks with the Net Disk application without being logged into them on the
Windows server.
Backup
Applications are managed by Time Navigator in the same way as hosts. You must create
at least one backup strategy and one backup selection to back up a Net Disk application
automatically. You can perform full and/or incremental backups of the application.
628
Configuring Backups
The list below details the steps for setting up an automatic backup. The procedures below
are performed using Time Navigator Administration Console menus.
1.
2.
3.
4.
5.
Note:
All these procedures are discussed at length in previous chapters. See Ejecting
a Media from a Drive, page 188, and Automatic Backup Configuration,
page 285. Steps 1 and 2 are detailed below and additional information
concerning the backup selection is provided as well.
1.
In the Network area, select the host for which you want to back up network drives.
An application is always associated with a host.
2.
3.
Select the Net Disk application in the list, then click on OK. The New Application
window appears.
4.
Edit the fields of the window as described in the following section, Net Disk
Application Creation Parameters, page 629.
Chapter 19
629
5.
Click on OK to validate.
6.
Right click on the Net Disk application icon you have just created and select Enable
to enable the application.
Tip;
multiple selection.
another host.
630
Application Name: Name of the application you want to create. The application name can
Tip:
It could be convenient to have the application icon displayed next to its host.
As the objects in the Network area appear in alphabetical order, you should
start the application name with the name of the host and add a suffix. For
instance, if your Net Disk application is installed on the aria host, the name of
the application could be aria.netdisk.
Server: Name of the remote machine where the mapped drives are located.
User Name: Name of the local machine user who has access to the mapped network drives.
Note:
The user of the local machine must be known to the operating system of the
remote machine. To ensure full access when backing up mapped network
drives, it is recommended that the user be an administrator of the domain where
the mapped network drives are located.
Environment Variables
Environment
Variable
TINA_APP_LIB_PATH
Description
Path.
Automatically set to
libtina_ndk.dll
%TINA_HOME%\bin\libtina_ndk.dll
Status
Chapter 19
631
Backup Selection
In the Time Navigator file tree, the backup selection is represented by a small green ball
located on the left of the icon of a Net Disk application object.
The Net Disk application offers a flexible backup administration of mapped network
drives on Windows 2000/2003 systems. Depending on backup requirements, you can
also define backup selections at different locations within the application folder, at the
machines level, at the mapped network drives level and even within the mapped
network drives. The Net Disk application also supports synthetic backups.
Note
Hidden drives, such as C$, do not appear in the Net Disk application file tree
and cannot be backed up by the Net Disk application.
Parallel Backup
The Net Disk application supports parallel backup. Time Navigator Parallel Backup and
Restore is a functionality that increases system performance by allowing users to split
backup jobs into several processes that can run simultaneously.
The user must select parallelism points in Time Navigator and set the maximum
number of streams in the strategy (parallelism index). When Time Navigator
encounters such a point during backup, it spawns a process to back up the node and its
sons.
632
1.
After creating a Net Disk Application, set parallel backup selections on directories
on the Net Disk tree in Time Navigator Restore & Archive Manager (the
Properties Tab of the Define Backup Selection window).
2.
Define a strategy with a parallelism index equal to the number of drives (Advanced
Tab of the Strategy Properties window). For the parallel backup mechanism to be
visible, it is recommended to set an index greater than 2.
Restore
The Net Disk application allows you to restore mapped network drives under
Windows 2000/2003. You can restore objects that have disappeared during mishandling
or a disk crash, but also restore objects as they were at a given date.
Note
Note
See the Time Navigator Restore Guide for more information about restore procedures.
Archiving
Mapped network drives can be archived through Time Navigator Archiving Server.
See the Time Navigator Archiving Server Guide for more information about archiving
procedures.
Chapter 19
633
Tunables
Add the following five tunables in the parameters.txt file, located in the
%TINA_Home%\Conf directory:
force_fixed_bad_remote_disk=yes
archive_pre_processing
archive_post_processing
restore_pre_processing
restore_post_processing
Note:
For backups, the pre and post processings are specified in the Strategy
window, not via a tunable.
To mount and unmount the network drives before and after archiving or
restoration, the pre-processing tunables must contain the path to a mount script,
and the post-processing tunables the path to an unmount script.
Following is an example of definition for these tunables:
parameter:archive_pre_processing=c:\tina\conf\backup_pre.bat
parameter:archive_post_processing=c:\tina\conf\backup_post.bat
parameter:restore_pre_processing=c:\tina\conf\restore_pre.bat
parameter:restore_post_processing=c:\tina\conf\restore_post.bat
Warning:
2.
Scripts
The letter you use in the scripts to define the destination drive for the mapping
must be different from the letter defining the source drive, and must not be already
in use for anything else.
For instance, if the drive you wish to back up is mapped on F:\, map it to R:\ in
the scripts and make sure that R:\ is not used for anything else. Thus the
Time Navigator mounting/unmounting activities will not interfere with your
634
3.
Filesystem Application
Backup Strategy
Create a strategy for the FileSystem application. In the Advanced tab, check the Go
through Network FileSystems option and enter the path to a mount script in the
Preprocessing field and the path to an unmount script in the Postprocessing field.
5.
Backup Selection
To create the backup selection(s), map the network drive on the letter used in the
scripts. Open Time Navigator Restore & Archive Manager to view the drives in
the file tree structure and set your backup selection(s). Unmap the drive.
Chapter 19
Archiving
Network drives can be archived using Time Navigator Archiving Server.
See the Time Navigator Archiving Server guide for details.
635
636
637
C H A P T E R
20
Filesystem Application
20
Application Definition
The Filesystem application allows you to go beyond the maximum of four strategies that
can be created for a host. A Filesystem application acts as a clone for a host, thus for
each application created you can specify four additional strategies.
In addition, the root directory of the Filesystem application can optionally be defined as
an environment variable, and can be different from the root directory of the host with
which the application is associated. In this case, using the Filesystem application allows
you to dissociate data from its actual location on the network.
Benefits of defining the root directory of the Filesystem Application
If the directory composing the root of the Filesystem application backup selection
is moved to a different location, only the value of the environment variable needs
to be changed. No modification of the backup folder of the application is required.
Thus the backup history of the backup selection is maintained, and you do not need
to create a new backup selection.
If you create several Filesystem applications associated with the same host, to back
up directories located on separate disks, you are able to parallelize the backup of
your host, thus improving backup performance.
Backup
To perform backups with a Filesystem application, configure Time Navigator following
these steps:
1.
2.
3.
638
4.
Create a backup selection if the default backup selection at the root does not suit
you.
1.
In the Network area of Time Navigator Administration Console, select the host
for which you want to create a filesystem application.
Note:
2.
3.
Select the Filesystem application in the list, then click on OK. The New Application
window appears.
4.
Edit the fields of this window as described in the following section, Filesystem
Application Creation Parameters, page 39.
Chapter 20
Filesystem Application
5.
Click on OK to validate.
6.
Right click on the Filesystem application icon you have just created and select
Enable to enable the application.
Tip:
639
multiple selection.
User Name: Name of the user who has access to the application.
Note:
640
Environment Variables
Enter variables as needed, for instance, enter TINA_FS_ROOT_DIR in the Name textbox,
and the path of the directory to be used as the root of the Filesystem application in the
Value textbox. For instance:
/usr/people/rde
/usr/people/rde
c:\usr\people\rde
Environment Variable
Description
Status
TINA_FS_ROOT_DIR
Optional
Chapter 20
Filesystem Application
641
Note:
If you want to perform parallel backups set the parallelism to at least 2, in the
Advanced tab of the New Strategy window.
If you want to perform parallel backups, create at least two backup selections
and check the Parallelized option in the Properties tab of the Define Backup
Selection window.
If you are using the TINA_FS_ROOT_DIR environment variable to specify the path of the
root directory, you can also choose to set several backup selections on any sub-directories
within the root directory.
Warning:
In the Time Navigator file tree, the backup selection is represented by a small green ball
located on the left of the directory designated as a backup selection.
642
For details on how to create a backup selection, see Creating a Backup Selection,
page 339.
Restore
Viewing the Application Contents
The Filesystem Application contains an Information meta-directory just below the root.
This directory contains useful system and parameter information. It is visible within
Time Navigator Restore & Archive Manager, and allows environment variables to be
edited or unset in that interface, in addition to Time Navigator Administration Console.
The information directory is backed up in the catalog so that settings at the moment of
any previous backup can be seen.
Time Navigator creates a gutter meta-directory when backing up the filesystem
application. The gutter allows the creation of the directories specified in the destination
path if they are missing when a restore is performed. The path of the gutter directory is
based on the value of the TINA_FS_ROOT_DIR environment variable.
Chapter 20
Filesystem Application
643
Information
Environment Variables
Gutter
Restoring data
To restore data with the Filesystem application, proceed as with any other
Time Navigator application.
If you have set the TINA_FS_ROOT_DIR environment variable to perform backups, the
variable will also determine where the data should be restored.
A Filesystem application backed up on Unix or Mac OS X can be cross-restored to a
Windows platform. To do so, first edit the Filesystem application via Time Navigator
Administration Console (Patform-Properties menu) and remove any User and Password that
may have been defined there. Both fields must remain blank to perform inter-system
cross-restores.
See the Time Navigator Restore Guide for more information concerning restore
procedures.
Archiving
The Filsystem application can be archived through Time Navigator Archiving Server.
See the Time Navigator Archiving Server Guide for more information about archiving
procedures.
644
645
Appendix
Property
Description
Use Barcodes
Shared Library
Cleaning Slot
Indicates that a slot has been reserved in the library for the cleaning
cartridge.
Reserved Slots
Performed Cleanings
Autorized Cleanings
Code Button
646
Generic Tab
Generic properties concern the librarys handling and behavioral logic.
Warning:
If misused, these properties can prevent the library from working properly.
Property
Description
This property is used when a library cannot perform the Init Element
Status (IES, library inventory) while a cartridge is mounted in a
drive. Checking this property will empty all drives before the IES
and replace the cartridges in the drives after the IES.
Appendix
647
Property
Description
Indicates whether or not the library supports the "IES with Range"
SCSI command.
Code Button
Specific Tab
Specific properties concern library handling and behavior logic with a SCSI dimension.
Warning:
If misused, these properties can prevent the library from working properly
and can force the administrator to restart the machine connected to the
library.
Property
Description
Manage Pack
648
Property
Description
The Init Element Status with Range (IESR) is used to perform the
inventory when the Init Element Status (IES) is unusable.
3575 only.
No IES Command if a Drive is Full This property concerns Exabyte EZ17 libraries only. It prevents IES
commands from being sent to the library.
VTL only: Use "info" file
Appendix
649
Property
Description
Allows the library to scan all mailbox slots in order to update their
contents, if the status of the slot has become questionable.
Code Button
Geometry Tab
The geometry properties define the library screen appearance in Time Navigator
Library Manager.
Property
Description
Slot 1 Position
Number of columns/lines
Code Button
650
When cartridges are exported and a partition places cartridges into the slots of the
mailbox, these slots are seen by other partitions with a status of "Except".
When cartridges are imported: the cartridges inserted in the mailbox must be
assigned to a partition by the operator. This assignment is performed from the
library's Control Screen in the form of a selection of the partition that the operator
is required to make. The selection interface is displayed until the operator has made
a choice. It is not possible to reject or interrupt this choice.
However, the operator can forget to respond to the choice of partition proposed by the
library. In this case, all the cartridges that have been inserted in the mailbox remain
marked with the "Except" status for all partitions.
To ensure that operations of putting online and putting offline are correctly run in
Time Navigator:
The best practice for importing cartridges with this library consists in following these
steps:
1.
2.
3.
4.
5.
Appendix
651
6.
7.
With regards to cartridge exports in Time Navigator Library Manager, the first thing
to do is to reinitialize the barcodes of the mailbox to detect the slots that have an "Except"
flag. These slots will appear hashed and be inaccessible from Time Navigator Library
Manager. You can then choose only accessible slots for the export operations.
Note
HP-UX
Display
/usr/bin/ndd -get /dev/tcp tcp_keepalive_interval
Modify
/usr/bin/ndd -set /dev/tcp tcp_keepalive_interval <new_value>
IBM AIX
Display
/usr/sbin/no -a | grep tcp_keepidle
Modify
/usr/sbin/no -o tcp_keepidle=<new_value>
SUN Solaris
Display
652
Modify
% /usr/sbin/ndd -set /dev/tcp tcp_keepalive_interval
<new_value>
Linux
Display
/sbin/sysctl -e net.ipv4 | grep tcp_keepalive_intvl (Result is in
seconds)
Modify
/sbin/sysctl -w net.ipv4.tcp_keepalive_intvl=<new_value>
Windows
On Windows, the following OS/network settings are implemented:
Idle time threshold. Any connection idle for at least this time is a candidate for
liveness checking. The default value is 2 hours.
Maximum number (unsigned integer) of keep-alive messages that can be sent
before a connection is declared dead. The default value is 5.
Minimum delay that is applied between keep-alive messages. The default value
is 5 seconds.
Once a connection is declared dead, any current or subsequent attempt to
communicate on that connection will fail immediately with an error.
The keep-alive message is a simple, low-level message. If the connection is still
present, the other end will use fundamental TCP/IP functionality to reply, without
affecting the sending application. The cost of a liveness check is negligible ;
because it is implemented via an exchange of TCP/IP ACKs, there is minimal
network or processor utilization.
Windows relies on system-wide registry settings to set a single check interval for an entire
machine. Even worse, the default is to wait two (2) hours before checking for a dropped
connection! This is usually inadequate for responsive liveness checking.
To modify the Idle time threshold, you must create or modify the following DWORD
registry key and reboot the machine for the new settings to take effect (unit is
millisecond):
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\
Parameters\KeepAliveTime
Appendix
653
654
655
Glossary
This glossary contains terms found in this guide. Some terms are specific to the
Time Navigator software.
A
Application
Architecture
Archive
Archiving
B
Backup
Backup
Backup Selection
Backup master
Backup strategy
A definition of the media pool used, the date and the hour at
which an automatic backup starts.
Bringing off-line
Bringing on-line
656
C
Catalog
Cartridge
Close
Command syntax
Compressed format
D
Drive
Duplicate
E
Edit
Enabled
Encoded format
Extraction
F
File tree
Format
Full backup
H
Host
Glossary
657
I
Icons area
Incremental backup
J
Job
L
Label
Label
To write a label.
Library
M
Mailbox
Media
Media pool
N
Named pipe
Network area
658
O
Object
Operator request
P
Platform
Platform group
R
Reading session
Recycle
Refresh
Retention Period
S
Storage device
Storage node
Symbolic link
Synchronization
T
Tape
Tape file
Glossary
659
Time Navigation
Time phases
U
User group
V
Version
W
Waiting session
Writing session
660
Index
Index
A
Access right
application 120
cartridge 202
catalog 14, 120
default 123
drive 178
file 120
functionality 120
host 120
personal 123
platform 120
user 14, 44, 119, 178
Acknowledging
Time Navigator Media Request
Console 523
ACL
backup 308, 312
administrative assistant 291
Administrator, media 227
Agent
Linux 373
OES Linux 384
OES NetWare 383
Unix 373
VMS 380, 381
Windows 372
Windows 2000 372
Windows 2003 372
Alarm
notifying 443
processing 440
representation 23, 29, 434
severity 29, 434, 454, 488
sorting 439
status 30
viewing 436, 487
Alarm area (tina_adm) 29, 435
Allocating
drive 161
library 161
Application
access right 120
B
Backup
ACL 308, 312
advanced configuration 69,
119, 137, 233, 285,
419
catalog 52, 54, 62, 63
definition 286
exporting 513
Filesystem application 637
filtering information 508
full 286, 288, 302
incremental 286, 288, 304,
315, 367
List application 604
manual triggering 290, 315
master 71, 77, 106
multiplexed 309, 365
Net Disk application 627
On Demand 405
pre/postprocessing 308, 310
scheduling 288
simple backup without macromultiplexing 365
specific attributes 311
synthetic 286, 288, 422
tunable 300
viewing 501, 514
661
C
Cache
662
axes 364
creating 40
disk 364
editing 367
free space 27
information 27
memory 364
Modifying Size in MacOs 42
reading 27
size 366
use 364
volume 27
writing 27
Cache area (tina_adm) 27
Cache space see Cache
Cartridge
access right 202
adding in the silo see
Cartridge, bringing
on line
bar code 201, 238
bringing off line 161, 220
bringing on line 161, 249
cleaning 229
cleaning settings 229, 230
closing 207, 217
copying see Cartridge,
duplicating
definition 200
deleting 208, 218
duplicating 208, 219, 422
erasing 208, 219
externalization 203, 224
identifying 200
information 221, 241
known status 201, 204, 247
label 200, 202
label prefix 228
life points 172, 203
Lost+Found status 196, 201,
204, 208, 218, 247
mount request 161
moving 251
priority 202
recycling 202, 205, 215, 216
removing from the silo see
Cartridge, bringing
off line
reopening 208, 217
replacing 226
selecting 469
settings 46
size 43
starting 17
stopping 50
suspending 51
tunable 39, 215
unknown user 13, 121
volume 26
catalog
increasing the size of 45
Catalog application
backing up
remote catalog 63
several catalogs on the
same server 62
simple catalog 54
configuring 53, 59
definition 52
environment variables 54, 55
restoring
another catalog on the
same server 67
catalog with Boot catalog
64
viewing 59
Catalog area (tina_adm) 26
Catalog Information area (tina_adm)
25
Changing
drive mode 182
user identity 132, 178
Cleaning a drive 243
automatically 169
definition 168, 184
editing 185
manually 169, 185, 243
request 168, 184
settings 229
Cleaning cartridge
settings 229, 230
wear 169
Client, NDMP 385
Closing a cartridge 207, 217
Compressing
file 203, 288, 344
Configuration
devices 139
libraries 139
Configuring
Index
D
Data integrity 216, 222, 223
Data stored during 215
Dedicated catalog 422
Default access right 123
Definition
application 70
application Filesystem 70
application List 70
application Net Disk 71
backup 286
boot catalog 52
bringing a cartridge off line
161
bringing a cartridge on line
161
cartridge 200
cartridge pool 195
catalog 38
Catalog application 52
cleaning a drive 168, 184
events 445
filesystem application 637,
661
host 70
jobs 467
library 159
List application 589
macro-multiplexing 364
parallel backup 286
Time Navigator Media Request
Console 519
Time Navigator Task Viewer
501
user group 122
Deleting
application 108
backup class 355
backup strategy 316
cartridge 208, 218
drive 187
event redirection 96
host 108
library 166
platform 108
user 131
user group 135
Detected host
creating 79
Deleting 110
ignoring 110
Device
About Devices 137
automatic declaring 139
automatic discovering 139
configuring 139
663
664
information 240
loading mode 168
local 167
manual cleaning 169, 185,
243
manually loaded 168
modifying the drive connection
type 192
position, index 157
representation 22
robotized 161, 168
settings 171, 186
shared 79, 167, 429
test 174
testing 183, 243
testing position or index in
library 157
VTL Disk Drive 167
web supervision 182
Drive cleaning
automatic 169, 184
definition 168, 184
editing 185
manual 169
request 168, 184
settings 184
Drives
list administration 189
Duplicating
jobs 497
Duplicating a cartridge 208, 219,
422
Duplicating a job 497
DVD-RAM drive 167, 173
E
Editing
application 106
backup selection 355
backup strategy 316
cache 367
catalog 45
drive 186
drive cleaning 185
environment variables 58, 609
event redirection 95
host 106
jobs 500
library 165, 235
password 131
platform 106
slot 253
user 130
user group 134
Virtual Library System 545
Ejecting media from drive 188, 244
Enabling
application 84
drive 182, 242
platform 84
slot 252
Encoding a file 203, 345
Environment variables
Catalog application 54, 55
editing 58, 609
Filesystem application 640,
641
information 58, 609
Erasing a cartridge 208, 219
event file 289, 446, 463
Event redirection
create 90
delete 96
edit 95
Events
Connected mode 447
definition 445
exporting 459
filtering 454
notifying 465
purging 462
redirecting 459
severity 454
tunable 462
user preferences 450
viewing 447, 483
Export from disk to tape 549
Exporting
backup 513
cartridge pool information 213
events 459
jobs 495
Time Navigator Task Viewer
513
Externalization
cartridges 224
Externalizing
cartridges 203
selecting cartridges 248
F
File
access right 120
compressed 203, 288, 344
encoded 203, 345
File mode, Time Navigator Event
Manager 446, 447
Filesystem application
backing up 637
backup class 641
backup strategy 301
creating 638
definition 70, 637, 661
environment variables 641
restoring 642
Filtering
backup class 347, 352, 353
backup information 508
backup selection 341
Events 454
jobs 489
Time Navigator Task Viewer
information 508
Firewall 71, 651
broken connection 72
Free space
cache 27
catalog 26
Full backup 286, 288, 302
Functionality access right 120
H
Help on environment variables 58,
609
Host
access right 120
automatic creation 79
automatic detection 79
creating 74
definition 70
deleting 108
deleting detected host 110
disabling 85
editing 106
ignoring detected host 110
password 120
representation 21, 28
settings 74, 106
see also Platform
hosts file 75
Index
I
Icon area (tina_adm) 28, 435
Identifier, SCSI 423
Identifying
cartridge 200
catalog 13, 15
user 132, 178
Importing a backup strategy 302
Inconsistency see Library,
inconsistency
Incremental backup 286, 288, 304,
315, 367
Infinite retention period 195
Information
backup class 353
cache 27
cartridge 221, 241
cartridge pool 210
catalog 26
drive 240
jobs 470, 476
slot 241
Installing Time Navigator over a
SAN 425, 428
Instance, catalog 26
J
Jobs
definition 467
duplicating 497
editing 500
exporting 495
filtering 489
information 470, 476
maintenance 206, 216, 467
parallelism index 301
priority 202
processing 494
purging 492
report 499
simultaneous backups 300
sorting 474
status 471
tunable 500
viewing 468, 476
Juke-box see Library
K
Keyword
L
Label
cartridge 200, 202
prefix 228
reading 238
viewing 235
writing 209, 227
Library
allocating 161
automatic declaring 139
automatic discovering 139
contents 159, 238
creating 161
definition 159
deleting 166
Device Configuration Manager
147
Device Detection Wizard 140
editing 165, 235
generic properties 646
geometry properties 649
inconsistency 160
kinds of Library 137
kinds of library 159
mailbox 159
reinitializing 160, 163, 237
representation 24, 159
settings 165
slot 159
specific properties 647
splitting 422, 425, 427
standard properties 645
testing drive position 157
viewing 233, 234
Virtual Library System 531
Library Drive Position Test 157
Life points, cartridge 172, 203
Limits
parallelization 345
Linux agent 373
List Administration of Drives 189
List application
backing up 604
definition 70, 589
keyword 592
665
M
Mac OS X
Modyfying Cache Size 42
Macro-multiplexing
backup 309, 365
configuring 366
definition 364
incremental backup 367
SAN environment 422
Mailbox
library 159
slot 252
MAILBOX_DIR, VLS parameter
547
Main cartridge pool 290
maintenance job 206, 216, 467
Manual triggering, backup 315
Mapped network drive
under Windows 2000/2003 see
List application and
Net Disk application
Master, backup 71, 77, 106
MAX_NB_CARTRIDGES_MBX,
VLS parameter 547
Media
administrator 227
Media see Cartridge and Cartridge
pool
Memory cache 364
Menu Bar (tina_adm) 19
Mixed, SAN architecture 422
Mobile platform 78, 308
Mount points, NFS 307
Mount request 161
Moving a cartridge 251
Multicatalog 38
666
N
Name
application 83
catalog 43
logical (VMS) 381
user 44, 129
NDMP
application 79, 202, 309
client 385
NDMPApplication
NDMP see NDMP, application
Nested backup class 352
Net Disk application
archiving 632
backing up 627
backup class 631
creating 628
definition 71
parallel backup 631
restoring 632
Network area (tina_adm) 20, 435
Network representation 25
NFS mount points 307
none, writing format 202
Notifying
alarm 443
events 465
NtmsSvc, Windows service 428
O
Object
catalog 26
selecting in the Network area
(tina_adm) 20
odb file 39
OES Linux, agent 384
OES NetWare, agent 383
On Demand Backup 405
Catalog Parameters 408
Configuring 406
in Time Navigator Job
Manager 414
Limitations 405
Strategies 407
Time Navigator Agent Job
Viewer 411
Unavailable 414
User Rights 406
Windows Taskbar 413
Operations
on slots 252
Overview
backup selection 289
backup strategy 289
P
Parallel backup
definition 286
Net Disk application 631
Parallel backup limitations
Limitations
parallel backup 286
Parallel restoring
limits 47
Parallelism index
jobs 301
Parallelization
limits 345
Parameter see Settings
Parameters
backup class 341
Password
application 120
catalog 120
editing 131
host 120
platform 120
user 44, 121, 131
Pending backup strategies 322
Personal access right 123
Platform
access right 120
adding in a group 33
deleting 108
disabling 85
displaying in the Network area
31
editing 106
enabling 84
group see Platform group
mobile 78, 308
password 120
removing from a group 34
R
Raw device 589, 596, 620
Reading
cache 27
label 238
Recycling a cartridge 202, 205,
215, 216
Recycling policy, cartridge pool
195
Redirecting
events 459
Reinitializing a library 160, 163,
237
Remote catalog 63
Removable Storage, Windows
service 428
Removing
a platform from the Network
area 31
Index
S
SAN
configuring Time Navigator
425, 428
connection properties 78
creating 429
installing Time Navigator 425,
428
macro-multiplexing 422
mixed architecture 422
multiple server architecture
420, 422, 425
settings 78
storage node architecture 77,
288, 421, 422, 428
667
T
Tape see Cartridge
tar
Unix command 203
writing format 202, 203, 309,
422
TCP Parameter 651
TCP parameter 72
Testing a Drive 243
Testing a drive 174, 183
SAN environment 183
668
Time 386
Time Navigator
configuring over a SAN 425,
428
installing over a SAN 425,
428
Time Navigator Administration
Console
Alarm area 29, 435
Cache area 27
Catalog area 26
Catalog Information area 25
Connected mode 13
Disconnected mode 12
Icon area 28, 435
Menu Bar 19
Network area 20, 435
representation 18
status bar 27
Time Navigator Agent Job Viewer
386, 411
compass icon (Windows) 386
main window (NetWare) 394
main window (Windows and
Unix) 387
more on backups (Windows
and Unix) 389
On Demand Backup 411
starting (NetWare) 392, 393,
394
starting (Windows and Unix)
386
Time Navigator Event Manager
Connected mode 446
File mode 446, 447
viewing 447
Time Navigator Job Manager 467
Display of On Demand Backup
414
Time Navigator Media Request
Console
acknowledging 523
definition 519
processing 522, 524
status 527
viewing 520, 524
Time Navigator Task Viewer
definition 501
exporting 513
filtering information 508
representation 503
events 462
jobs 500
U
Unix agent 373
Unknown
user to the catalog 13, 121
writing format 202, 309
Use cache on server 307
User
access right 14, 44, 119, 178
changing identity 132, 178
creating 129
default access right 123
deleting 131
editing 130
group see User group
known to the catalog 13, 121
name 44, 129
On Demand Backup Rights
406
password 44, 121, 131
personal access right 123
privileged 13, 14, 44, 119,
121
removing from a group 135
settings 130
unknown to the catalog 13,
121
User group
creating 133
definition 122
deleting 135
editing 134
settings 134
see also User
Users.dat file 372
V
Variables denvironnement
ORACLE_BASE 607
ORACLE_HOME 607
Viewing
alarm 436, 487
backup 501, 514
backup class 354
bar code 235
Boot catalog 59
cartridge 221
cartridge pool 210
Index
Catalog application 59
events 447, 483
jobs 468, 476
label 235
library 233, 234
simultaneous backups 514
Time Navigator Event
Manager 447
Time Navigator Media Request
Console 520, 524
Viewing Requests 520
Virtual Library System
adding cartridges 546
bringing cartridges off line 547
bringing cartridges on line 547
configuring 532
disk space allocation 542
editing 545
exporting to a tape library 549
file location 542
Virtual Library System Application
549
defining a backup strategy
564, 582
defining catridge closing
options 563
defining metapool priority
566, 582
defining metapools 560, 579
deleting metapools 564, 582
displaying information 568,
584
duplication and removal
options 556, 576
editing metapools 563, 581
emergency data removal 571,
587
exporting the monitoring report
570, 586
monitoring 567, 583
prerequisites 552
principles 551, 573
testing 567, 583
Windows Schedule Service
556, 575
VLSA
cartridge duplication 551
duplication mode 549
job duplication 572
VMS
agent 380
W
Wear
cartridge 172, 203, 228, 229
cleaning cartridge 169
Web supervision
drive 182
SAN 428
Windows
backing up files 372
registry 372
restoring files 372
use 372
Windows 2000
agent 372
mapped network drive see List
application and Net
Disk application
Windows 2003
agent 372
mapped network drive see List
application and Net
Disk application
Writing
backup session 290
cache 27
cartridge 308
label 209, 227
multiple 66, 290, 422
Writing format
cpio 202, 203, 309, 422
none 202
sidf 202, 288, 309, 422, 428
tar 202, 203, 309, 422
TiNa 202, 203, 309, 339,
422
unknown 202, 309
X
X-Window display 11
Y
Yellow triangle
drive 240
slot 246
Z
Zoom, Time Navigator Task
Viewer 505
669
670