420
ibm.com/redbooks Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg Bass Wolfgang Beuttler Marcia Kubo Deployment best practices Integration with TSM and Notes Case studies, troubleshooting , tips

Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

ibm.com/redbooks

Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Vasfi GucerGreg Bass

Wolfgang BeuttlerMarcia Kubo

Deployment best practices

Integration with TSM and Notes

Case studies, troubleshooting , tips

Front cover

Page 2: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg
Page 3: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

August 2007

International Technical Support Organization

SG24-7423-00

Page 4: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

© Copyright International Business Machines Corporation 2007. All rights reserved.Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADPSchedule Contract with IBM Corp.

First Edition (August 2007)This edition applies to IBM Tivoli Continuous Data Protection for Files Version 3, Release 1.

Note: Before using this information and the product it supports, read the information in “Notices” on page xix.

Page 5: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Contents

Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii

Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv

Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii

Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xixTrademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xx

Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiThe team that wrote this book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiBecome a published author . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiiComments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiii

Part 1. Planning and architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Chapter 1. Introduction to Tivoli Continuous Data Protection for Files . . . 31.1 General overview of Tivoli Continuous Data Protection for Files . . . . . . . . 5

1.1.1 What is Tivoli Continuous Data Protection for Files? . . . . . . . . . . . . . 51.1.2 Why Tivoli Continuous Data Protection for Files is needed . . . . . . . . 61.1.3 Who should use Tivoli Continuous Data Protection for Files? . . . . . . 9

1.2 How Tivoli Continuous Data Protection for Files works. . . . . . . . . . . . . . . 111.3 Main features of Tivoli Continuous Data Protection for Files . . . . . . . . . . 131.4 Value proposition of Tivoli Continuous Data Protection for Files . . . . . . . 14

1.4.1 Benefits of using Tivoli Continuous Data Protection for Files . . . . . . 171.4.2 Unique differentiators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

Chapter 2. Product architecture, planning, and deployment . . . . . . . . . . 192.1 Product architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

2.1.1 Main components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202.1.2 Capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202.1.3 Daemon architecture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

2.2 Planning for deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252.2.1 What are my critical files? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262.2.2 Where should I back my files up to? . . . . . . . . . . . . . . . . . . . . . . . . . 262.2.3 How often do I need to back up different types of files? . . . . . . . . . . 262.2.4 Do I need e-mail and scheduled backups? . . . . . . . . . . . . . . . . . . . . 272.2.5 Do I need the Vault feature? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282.2.6 Summary of protection methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

© Copyright IBM Corp. 2007. All rights reserved. iii

Page 6: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

2.3 Best practices and sizing considerations . . . . . . . . . . . . . . . . . . . . . . . . . 302.3.1 Overall summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302.3.2 Corporate scenario- Tivoli Continuous Data Protection for Files with

Tivoli Storage Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312.3.3 Corporate scenario- file server as remote storage target for Tivoli

Continuous Data Protection for Files workstations . . . . . . . . . . . . . . 322.3.4 Corporate scenario- Tivoli Continuous Data Protection for Files loaded

on file server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332.3.5 Home user scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

2.4 Tivoli Continuous Data Protection for Files installation requirements . . . . 342.4.1 Basic installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342.4.2 System requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

Part 2. Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

Chapter 3. Installation and configuration . . . . . . . . . . . . . . . . . . . . . . . . . . 393.1 Basic installation and configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

3.1.1 Installing Tivoli Continuous Data Protection for Files . . . . . . . . . . . . 403.1.2 Configuration using the Initial Configuration Wizard . . . . . . . . . . . . . 48

3.2 Advanced installation options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 643.2.1 Installation using command-line parameters. . . . . . . . . . . . . . . . . . . 653.2.2 Silent installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 683.2.3 Push installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 693.2.4 Pull installation (upgrade) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 723.2.5 Providing a configuration file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74

3.3 Advanced configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 753.3.1 Settings Notebook. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 763.3.2 Central Administration Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . 101

3.4 Additional considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1083.4.1 Installation and data directories . . . . . . . . . . . . . . . . . . . . . . . . . . . 1083.4.2 Interpreting file and folder patterns . . . . . . . . . . . . . . . . . . . . . . . . . 1093.4.3 Including and excluding files from protection . . . . . . . . . . . . . . . . . 1113.4.4 Vault duration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1143.4.5 Default protection settings (Settings Notebook) . . . . . . . . . . . . . . . 116

Chapter 4. Proof of concept scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . 1214.1 Product features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1224.2 Single user environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123

4.2.1 Single computer, local disk only . . . . . . . . . . . . . . . . . . . . . . . . . . . 1234.2.2 Single computer with external storage . . . . . . . . . . . . . . . . . . . . . . 1264.2.3 Single computer with ISP connection . . . . . . . . . . . . . . . . . . . . . . . 136

4.3 Multiple computers in a home or small business. . . . . . . . . . . . . . . . . . . 1454.3.1 Home network with a file server . . . . . . . . . . . . . . . . . . . . . . . . . . . 1464.3.2 Small business with Tivoli Storage Manager Express . . . . . . . . . . 151

iv Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 7: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

4.3.3 Small business with a file server . . . . . . . . . . . . . . . . . . . . . . . . . . . 1674.4 Tivoli Continuous Data Protection for Files in an enterprise environment180

4.4.1 Enterprise environment with Tivoli Storage Manager . . . . . . . . . . . 1804.4.2 Enterprise with Tivoli Continuous Data Protection for Files loaded on file

servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2004.4.3 Enterprise and remote offices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227

4.5 Restore scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2284.5.1 Restore from local disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2304.5.2 Restore from remote storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2344.5.3 Restore from Tivoli Storage Manager or Tivoli Storage Manager Express

to a file server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251

Chapter 5. Troubleshooting, hints, and tips . . . . . . . . . . . . . . . . . . . . . . . 2555.1 Installation issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256

5.1.1 Disk space. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2565.1.2 Non-privileged users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2625.1.3 Port conflicts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2635.1.4 Push installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2795.1.5 Pull installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286

5.2 Replication issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2915.2.1 Removable disk issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2925.2.2 File server issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3025.2.3 WebDAV issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3045.2.4 Tivoli Storage Manager issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3105.2.5 Transient conditions (remote storage location not reachable) . . . . 343

5.3 System operation and log files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3475.3.1 Tivoli Continuous Data Protection for Files system operation files . 3475.3.2 Tivoli Continuous Data Protection for Files logs . . . . . . . . . . . . . . . 3485.3.3 Tivoli Storage Manager specific log files. . . . . . . . . . . . . . . . . . . . . 350

5.4 Tracing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3515.4.1 Before you start . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3515.4.2 How to run a trace. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3525.4.3 Tracing example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353

Contents v

Page 8: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Part 3. Planning for a client engagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357

Appendix A. Project planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359Required skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360Available resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360Solution description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361Solution deployment tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365Strategies for successful implementation. . . . . . . . . . . . . . . . . . . . . . . . . . . . 371Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372

Appendix B. Sample Statement of Work for Tivoli Continuous Data Protection for Files deployment . . . . . . . . . . . . . . . . . . . . . 375

Building a protected environment for user workstations. . . . . . . . . . . . . . . . . 376

Abbreviations and Acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381

Related publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383Publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383Online resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383How to get IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383Help from IBM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384

Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385

vi Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 9: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figures

1-1 Why Tivoli Continuous Data Protection for Files is needed . . . . . . . . . . . . 81-2 Unique hybrid approach of Tivoli Continuous Data Protection for Files . . 111-3 General overview of Tivoli Continuous Data Protection for Files . . . . . . . 122-1 Agent-driver interaction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222-2 Replication threads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253-1 Installation Setup Language window. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403-2 InstallShield Wizard is being prepared . . . . . . . . . . . . . . . . . . . . . . . . . . . 413-3 Information window including the build number . . . . . . . . . . . . . . . . . . . . 423-4 Software License Agreement options . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433-5 Destination Folder window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443-6 Ready to Install window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453-7 Installation progress window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 463-8 Installation completed window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473-9 Welcome page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493-10 What is Critical page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503-11 Folder and Files Settings dialog box (critical files) . . . . . . . . . . . . . . . . . 513-12 Select folders dialog box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 523-13 Applications and Extensions box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533-14 E-mail Protection page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553-15 Remote Storage page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573-16 Initial Backup page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 613-17 Summary page with initial backup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 633-18 Status page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 643-19 Message that a new version is being installed . . . . . . . . . . . . . . . . . . . . 733-20 Message to reboot system after pull installation . . . . . . . . . . . . . . . . . . . 733-21 General page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 773-22 Files to Protect page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 803-23 Folders and Files box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 813-24 Folder and Files Settings dialog box (include/exclude). . . . . . . . . . . . . . 813-25 Select folders box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 833-26 Applications box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 833-27 Application Settings box (applications viewed by ranking) . . . . . . . . . . . 843-28 Vault box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 853-29 Vault Settings box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 853-30 Back up with new settings check box . . . . . . . . . . . . . . . . . . . . . . . . . . . 863-31 E-mail Protection page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 893-32 E-mail Application: list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 903-33 E-mail Application Data Folder: text field . . . . . . . . . . . . . . . . . . . . . . . . 90

© Copyright IBM Corp. 2007. All rights reserved. vii

Page 10: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

3-34 Folder and Files Settings box (schedules) . . . . . . . . . . . . . . . . . . . . . . . 913-35 Scheduled backup reports table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 933-36 Remote Storage page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 953-37 Advanced page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1003-38 Central Administration Settings window . . . . . . . . . . . . . . . . . . . . . . . . 1043-39 Successfully published fpcommands.xml pop-up window . . . . . . . . . . 1053-40 Scheduled backup reports table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1073-41 Folder and Files Settings box (example include/exclude settings) . . . . 1134-1 Single computer, local disk only . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1234-2 General Configuration for a single user with local disk configuration . . . 1244-3 Files to protect in a single user with local disk configuration. . . . . . . . . . 1254-4 Continuous protection file directory. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1264-5 Single computer, with external storage . . . . . . . . . . . . . . . . . . . . . . . . . . 1274-6 General configuration for a single user scenario with external disk . . . . 1284-7 Selection of important files to continuously protect in a single user scenario

with external disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1294-8 Configuring the remote storage for scheduled protection . . . . . . . . . . . . 1304-9 Configuring files for scheduled protection . . . . . . . . . . . . . . . . . . . . . . . . 1314-10 Configure the frequency and time to start the scheduled protection. . . 1324-11 Start an initial backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1334-12 Original directory and files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1344-13 Replicated directory and files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1354-14 Single computer, with ISP connection. . . . . . . . . . . . . . . . . . . . . . . . . . 1364-15 Continuous protection for a single computer with ISP connection . . . . 1384-16 Important files continuous protection in a single user with an ISP

connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1394-17 Remote storage with ISP configuration. . . . . . . . . . . . . . . . . . . . . . . . . 1404-18 Username and password to access Web server. . . . . . . . . . . . . . . . . . 1414-19 Configure the frequency and time to start the scheduled protection to an

ISP provider . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1424-20 Files for scheduled protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1434-21 Activity report for changed files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1434-22 Activity report for changed file pres1.ppt. . . . . . . . . . . . . . . . . . . . . . . . 1444-23 Sub-file functionality example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1454-24 Home network with a file server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1464-25 General configuration without continuous protection . . . . . . . . . . . . . . 1474-26 Map network drive in each computer . . . . . . . . . . . . . . . . . . . . . . . . . . 1484-27 Configure user and password to access the file server . . . . . . . . . . . . 1484-28 Configure remote storage for scheduled protection . . . . . . . . . . . . . . . 1494-29 Configure schedule and select application for scheduled protection . . 1504-30 Select files for scheduled protection . . . . . . . . . . . . . . . . . . . . . . . . . . . 1514-31 Small business without file server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1524-32 Computers and applications option on Tivoli Storage Manager Express153

viii Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 11: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

4-33 Wizard to add computers and optionally deploy the backup client software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154

4-34 Select option to add a computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1554-35 Installation settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1564-36 Confirm settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1574-37 Stop Tivoli Storage Manager Express service . . . . . . . . . . . . . . . . . . . 1574-38 Start Tivoli Storage Manager Express in foreground mode . . . . . . . . . 1584-39 Configure node with delete permission . . . . . . . . . . . . . . . . . . . . . . . . . 1584-40 Shutdown Tivoli Storage Manager Express . . . . . . . . . . . . . . . . . . . . . 1594-41 Start Tivoli Storage Manager Express . . . . . . . . . . . . . . . . . . . . . . . . . 1594-42 Reset the password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1594-43 Windows credentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1604-44 New password information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1604-45 General configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1614-46 Files to protect in continuous protection . . . . . . . . . . . . . . . . . . . . . . . . 1624-47 Remote storage configuration for Tivoli Storage Manager Express . . . 1634-48 Node password on Tivoli Storage Manager Express server . . . . . . . . . 1644-49 Select applications, files, and frequency to back up to Tivoli Storage

Manager Express . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1654-50 Create the include list for scheduled protection . . . . . . . . . . . . . . . . . . 1664-51 Filespace on Tivoli Storage Manager Express . . . . . . . . . . . . . . . . . . . 1674-52 Small business with a file server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1684-53 Map network drive and reconnect at logon . . . . . . . . . . . . . . . . . . . . . . 1694-54 Configure user name and password to access the file server . . . . . . . 1694-55 General configuration for this scenario . . . . . . . . . . . . . . . . . . . . . . . . . 1704-56 Files to protect in continuous backup . . . . . . . . . . . . . . . . . . . . . . . . . . 1714-57 Configure remote storage for continuous and scheduled protection. . . 1724-58 Configure directories, files, and frequency for schedule protection . . . 1734-59 Select files and directories for scheduled protection. . . . . . . . . . . . . . . 1744-60 Inform password for encrypted files . . . . . . . . . . . . . . . . . . . . . . . . . . . 1744-61 Replicated files with encryption option on file server . . . . . . . . . . . . . . 1754-62 Computers and applications on Tivoli Storage Manager Express . . . . 1764-63 Excluded files on Tivoli Storage Manager Express client . . . . . . . . . . . 1774-64 Remove directory from dsm.opt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1784-65 Files to backup on Tivoli Storage Manager Express. . . . . . . . . . . . . . . 1794-66 Example of enterprise environment with Tivoli Storage Manager

centric . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1814-67 Lab environment (Tivoli Storage Manager centric) . . . . . . . . . . . . . . . . 1834-68 Add nodes to Tivoli Storage Manager server . . . . . . . . . . . . . . . . . . . . 1854-69 General configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1864-70 Files to protect in continuous protection . . . . . . . . . . . . . . . . . . . . . . . . 1874-71 Remote storage configuration to Tivoli Storage Manager. . . . . . . . . . . 1884-72 Node password on Tivoli Storage Manager . . . . . . . . . . . . . . . . . . . . . 189

Figures ix

Page 12: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

4-73 Select applications, files, and frequency to back up to Tivoli Storage Manager Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189

4-74 Create the include list for scheduled protection . . . . . . . . . . . . . . . . . . 1904-75 Advanced settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1914-76 Initial Tivoli Continuous Data Protection for Files panel . . . . . . . . . . . . 1924-77 Central administration configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . 1944-78 Publish settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1954-79 Rename fpcommands.xml to use push installation. . . . . . . . . . . . . . . . 1954-80 Push installation on Bruge, Windows 2003 server . . . . . . . . . . . . . . . . 1964-81 Warning message . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1974-82 Scheduled backup reports table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1974-83 Expiration example on Tivoli Storage Manager Server. . . . . . . . . . . . . 1994-84 Example of enterprise environment with Tivoli Storage Manager and file

server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2014-85 Lab environment (Tivoli Storage Manager and file server) . . . . . . . . . . 2034-86 General configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2044-87 Files to protect in continuous protection . . . . . . . . . . . . . . . . . . . . . . . . 2054-88 Remote storage configuration to file server Florence . . . . . . . . . . . . . . 2064-89 Select applications, files, and frequency to back up to a file server . . . 2074-90 Create the include list for scheduled protection . . . . . . . . . . . . . . . . . . 2084-91 Advanced settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2094-92 Central administration configuration for group A. . . . . . . . . . . . . . . . . . 2104-93 Publish settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2114-94 Remote storage configuration to file server Cairo. . . . . . . . . . . . . . . . . 2114-95 Select applications, files and frequency to backup to file server Cairo . 2124-96 Create the include list for scheduled protection . . . . . . . . . . . . . . . . . . 2134-97 Advanced settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2144-98 Central administration configuration for group B. . . . . . . . . . . . . . . . . . 2154-99 Publish settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2164-100 Central Management Report for Group B . . . . . . . . . . . . . . . . . . . . . . 2184-101 Files to protect on file server Florence . . . . . . . . . . . . . . . . . . . . . . . . 2194-102 Protected vaulting settings on file server Florence . . . . . . . . . . . . . . . 2194-103 Files to protect on file server Cairo . . . . . . . . . . . . . . . . . . . . . . . . . . . 2204-104 Protected vaulting settings on file server Cairo. . . . . . . . . . . . . . . . . . 2204-105 Message error when trying to delete vaulted files. . . . . . . . . . . . . . . . 2214-106 Protect Lotus Notes 7, using scheduled continuous protection . . . . . 2224-107 Password for Lotus Notes Database. . . . . . . . . . . . . . . . . . . . . . . . . . 2224-108 Notes files on file server Cairo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2234-109 Backup policy on Tivoli Storage Manager. . . . . . . . . . . . . . . . . . . . . . 2244-110 Register node on Tivoli Storage Manager server . . . . . . . . . . . . . . . . 2254-111 Example of dsm.opt file. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2254-112 Validate password. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2264-113 Schedule backup on Tivoli Storage Manager . . . . . . . . . . . . . . . . . . . 226

x Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 13: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

4-114 Enterprise and remote offices example. . . . . . . . . . . . . . . . . . . . . . . . 2274-115 Status page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2284-116 Welcome page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2294-117 Files to restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2304-118 Search BackupMe.txt file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2314-119 Search status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2324-120 Select the file to restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2324-121 Restore Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2334-122 Summary information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2344-123 View report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2344-124 Select remote storage to restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2354-125 Tivoli Continuous Data Protection for Files searching files . . . . . . . . . 2364-126 Select file name and version of file to restore . . . . . . . . . . . . . . . . . . . 2364-127 Select location to restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2374-128 Summary information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2384-129 Status page, view report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2384-130 Check the restored file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2394-131 Tivoli Continuous Data Protection for Files searching for files . . . . . . 2394-132 Select files to restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2404-133 Select location to restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2414-134 Summary information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2424-135 Status page, view report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2424-136 Check the restored file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2434-137 Tivoli Continuous Data Protection for Files Change Search Location

window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2434-138 Select files to restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2444-139 Select location to restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2454-140 Summary information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2464-141 Status page, view report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2464-142 Select remote storage to restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2474-143 Tivoli Continuous Data Protection for Files searching for files . . . . . . 2484-144 Select files to restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2484-145 Versions of notes file log.nsf on file server . . . . . . . . . . . . . . . . . . . . . 2494-146 Select location to restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2494-147 Summary information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2504-148 Status page, view report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2504-149 The restored notes file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2514-150 Tivoli Storage Manager backup-archive client . . . . . . . . . . . . . . . . . . 2514-151 Restore Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2524-152 Select destination folder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2534-153 Report status. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2545-1 Ready to Install the Program window . . . . . . . . . . . . . . . . . . . . . . . . . . . 2565-2 Out of Disk Space window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257

Figures xi

Page 14: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

5-3 Custom Setup window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2585-4 Cancel installation window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2595-5 InstallShield Wizard Completed window (canceled installation) . . . . . . . 2595-6 Setup Type (of installation) window . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2605-7 Destination Folder window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2615-8 Change Current Destination Folder window . . . . . . . . . . . . . . . . . . . . . . 2625-9 Error message during non-privileged user installation . . . . . . . . . . . . . . 2635-10 Port 9003 already being used by another program. . . . . . . . . . . . . . . . 2655-11 Tivoli Continuous Data Protection for Files reporting a problem. . . . . . 2665-12 Tivoli Continuous Data Protection for Files unable to start the Initial

Configuration Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2675-13 Tivoli Continuous Data Protection for Files entries in the event log . . . 2685-14 Error entry in the Windows system event log . . . . . . . . . . . . . . . . . . . . 2695-15 Port number in the FpPort DWORD Value . . . . . . . . . . . . . . . . . . . . . . 2705-16 Modifying the FpPort DWORD Value . . . . . . . . . . . . . . . . . . . . . . . . . . 2715-17 Changing the port number to 9005 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2715-18 New port number in the FpPort DWORD Value . . . . . . . . . . . . . . . . . . 2725-19 Original start.html file with port 9003. . . . . . . . . . . . . . . . . . . . . . . . . . . 2735-20 File start.html after editing (now using port 9005) . . . . . . . . . . . . . . . . . 2745-21 Netstat -a output showing the usage of the new port 9005. . . . . . . . . . 2765-22 HTML listener now successfully listening on port 9005 (Event Viewer) 2775-23 Tivoli Continuous Data Protection for Files user interface using port

9005 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2785-24 Shortcut in the quick launch area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2795-25 Push installation failing due to remote computer not being available . . 2815-26 Check if remote system is available using the ping command . . . . . . . 2825-27 Push installation failing due to wrong user name or wrong password . 2835-28 Push installation failing due to wrong command syntax . . . . . . . . . . . . 2845-29 Successful push installation of Tivoli Continuous Data Protection for

Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2855-30 Tivoli Continuous Data Protection for Files (pull) installation message 2875-31 Event message due to installation of new software version . . . . . . . . . 2885-32 FPcommand.bat file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2895-33 Options file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2895-34 Message to reboot the computer after the (pull) installation . . . . . . . . . 2905-35 External USB disk named USB_Drive mapped as drive F:. . . . . . . . . . 2925-36 Drive F: (USB_Drive) as remote backup target (external device) . . . . . 2935-37 Disk full informational message . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2945-38 Event log entry due to target backup device being full (Event ID: 6077)2945-39 Remote storage location inaccessible due to disk / file system full (Status

page) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2955-40 Tivoli Continuous Data Protection for Files experiencing a problem. . . 2955-41 Event log entry due to disk / file system full condition (Event ID: 6000) 296

xii Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 15: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

5-42 Modified settings in the Remote Backup page to save space on the remote target location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297

5-43 Changed drive letter assignments. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2985-44 Informational message that the network target cannot be reached . . . 2995-45 Event entry due to replication problem caused by changed drive letters

(Event ID: 6069) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3005-46 Remote storage location inaccessible due to changed drive letter

assignment (Status page). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3015-47 Shared network folder e$ on file server Izmir mapped to drive (W:) . . . 3035-48 Using the UNC name instead of the drive letter for the remote storage

location (Remote Storage page). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3045-49 Using a WebDAV server as the remote storage destination. . . . . . . . . 3065-50 Tivoli Continuous Data Protection for Files needs a password

(informational message) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3075-51 Tivoli Continuous Data Protection for Files prompts for a password to

access the WebDAV server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3075-52 Entering user name and password . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3085-53 The two passwords do not match . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3085-54 WebDAV server not reachable because no Internet connection is

available . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3095-55 WebDAV server can be reached again (Internet connection

established) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3095-56 Default (minimum) dsm.opt file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3105-57 Using a Tivoli Storage Manager server as a remote backup location

(Helsinki). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3135-58 Window explains target location (Helsinki) is not responding properly . 3145-59 Tivoli Continuous Data Protection for Files warning message . . . . . . . 3145-60 Event log entry due to unknown or incorrect ID (node name) entered . 3155-61 Entries in dsierror.log caused by unknown or incorrect ID (node name)

entered . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3155-62 Tivoli Continuous Data Protection for Files prompting for a password to

access the Tivoli Storage Manager server . . . . . . . . . . . . . . . . . . . . . . . 3185-63 Informational entry in the event log (password information needed) . . 3195-64 Event log entry due to insufficient permission to delete backed up data3205-65 Error messages in dsierror.log due to insufficient permissions to delete

backed up data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3215-66 Event log entry when storing more versions of files as defined on remote

storage location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3225-67 Tivoli Continuous Data Protection for Files unable to unlink the file (Event

ID: 6086). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3235-68 FilePath ERROR entry (Event ID: 6000) in event log due to a permission

problem. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3245-69 Entry in file purge_failed.log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325

Figures xiii

Page 16: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

5-70 File dsierror.log with error messages ANS1126E . . . . . . . . . . . . . . . . . 3255-71 Target location (Helsinki) is not responding properly (window). . . . . . . 3315-72 Entry in event log due to session being rejected from Tivoli Storage

Manager server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3325-73 ANS1355E message in dsierror.log file (session rejected) . . . . . . . . . . 3325-74 Replication engine unable to copy the file (Event ID: 6086) . . . . . . . . . 3335-75 Entry in file replication-failed.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3345-76 Informational message about the network target being not reachable . 3365-77 TCP/IP connection error messages in file dsierror.log . . . . . . . . . . . . . 3365-78 Event log entry caused by the network target being not available (Event

ID: 6069). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3375-79 Entry in file replication-active.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3385-80 Entries in file replication-queue.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3385-81 Modified dsm.opt file containing an exclude statement for *.txt files. . . 3405-82 Entry in event log due to file being excluded from backup (Event ID:

6000) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3415-83 Replication engine unable to copy the file (Event ID: 6086) . . . . . . . . . 3425-84 ANS1115W warning message in dsierror.log (excluded file) . . . . . . . . 3435-85 Remote storage location not reachable (notification message) . . . . . . 3445-86 Remote storage location inaccessible (Status page) . . . . . . . . . . . . . . 3455-87 Remote storage location reachable again (notification message) . . . . 3465-88 Remote storage location accessible again (Status page) . . . . . . . . . . . 3465-89 FilePath agent in interactive mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3545-90 Command to start a Tivoli Continuous Data Protection for Files trace . 3545-91 Create file.doc to trigger an activity. . . . . . . . . . . . . . . . . . . . . . . . . . . . 3545-92 DebugView capturing the trace output . . . . . . . . . . . . . . . . . . . . . . . . . 3555-93 Command to stop the trace. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3555-94 Quitting the interactive mode of the FilePath agent . . . . . . . . . . . . . . . 3555-95 Functionality overview of Tivoli Continuous Data Protection for Files. . 377

xiv Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 17: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Tables

1-1 Comparison between Tivoli Continuous Data Protection for Files and traditional backup solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

2-1 Summary of protection methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293-1 Default installation and data directories . . . . . . . . . . . . . . . . . . . . . . . . . 1093-2 File and folder pattern matches. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1103-3 Interaction of inclusion and exclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . 1123-4 General page default settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1163-5 Files to Protect page default settings . . . . . . . . . . . . . . . . . . . . . . . . . . . 1173-6 E-mail Protection page default settings. . . . . . . . . . . . . . . . . . . . . . . . . . 1183-7 Remote Storage page default settings . . . . . . . . . . . . . . . . . . . . . . . . . . 1183-8 Advanced page default settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1184-1 Tivoli Continuous Data Protection V3.1 feature support matrix . . . . . . . 1224-2 Central administration folder configurations for managing clients. . . . . . 1924-3 Lifecycle file. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1984-4 Characteristics of file on Tivoli Storage Manager . . . . . . . . . . . . . . . . . . 1984-5 Central administration folder configurations for managing clients. . . . . . 2165-1 Description of options used in dsm.opt . . . . . . . . . . . . . . . . . . . . . . . . . . 3115-2 Some additional useful dsm.opt options . . . . . . . . . . . . . . . . . . . . . . . . . 3125-3 Important system operation files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3475-4 Installation log file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3485-5 Replication logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3495-6 Scheduled protection logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3495-7 Local pool log file and \gendb\ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3505-8 Tivoli Storage Manager API log file. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3515-9 Solution tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3635-10 Solution demonstration tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3645-11 Skill adjustment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3655-12 Major solution deployment tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3655-13 Technical requirement gathering sample examples . . . . . . . . . . . . . . . 3665-14 Solution planning sub-tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3675-15 Solution implement sub-tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3685-16 Solution test sub-tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3705-17 Solution client training sub-tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3705-18 Engagement closing sub-tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370

© Copyright IBM Corp. 2007. All rights reserved. xv

Page 18: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

xvi Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 19: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Examples

5-1 Registering node florence without delete backup permission (register node)316

5-2 Details of node florence without delete backup permission (query node)3175-3 Select command output displaying too much active versions of a file . . 3265-4 Register node florence with backdelete=yes parameter (register node). 3265-5 Update existing node florence with backdelete=yes parameter (update

node) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3265-6 Details of node florence with delete backup permission (query node) . . 3275-7 Select command output displaying active and inactive versions of a file 3285-8 Running expiration on the Tivoli Storage Manager server (expire inventory)

3285-9 Select command output after running expiration (only active versions) . 3295-10 Tivoli Storage Manager client sessions disabled on Tivoli Storage

Manager server (query status) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3295-11 Enable Tivoli Storage Manager client sessions again (enable sessions)3345-12 Tivoli Storage Manager client sessions enabled on IBM Tivoli Storage

Manager server (query status) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3345-13 Tracing example (trace mask=fpl_meta). . . . . . . . . . . . . . . . . . . . . . . . 355

© Copyright IBM Corp. 2007. All rights reserved. xvii

Page 20: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

xviii Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 21: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Notices

This information was developed for products and services offered in the U.S.A.

IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-IBM product, program, or service.

IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not give you any license to these patents. You can send license inquiries, in writing, to: IBM Director of Licensing, IBM Corporation, North Castle Drive, Armonk, NY 10504-1785 U.S.A.

The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you.

This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice.

Any references in this information to non-IBM Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk.

IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you.

Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products.

This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental.

COPYRIGHT LICENSE:

This information contains sample application programs in source language, which illustrate programming techniques on various operating platforms. You may copy, modify, and distribute these sample programs in any form without payment to IBM, for the purposes of developing, using, marketing or distributing application programs conforming to the application programming interface for the operating platform for which the sample programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of these programs.

© Copyright IBM Corp. 2007. All rights reserved. xix

Page 22: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Trademarks

The following terms are trademarks of the International Business Machines Corporation in the United States, other countries, or both:

Redbooks (logo) ®AIX®Domino®IBM®

Lotus Notes®Lotus®Notes®Passport Advantage®

Redbooks®System p™Tivoli®

The following terms are trademarks of other companies:

Oracle, JD Edwards, PeopleSoft, Siebel, and TopLink are registered trademarks of Oracle Corporation and/or its affiliates.

NetApp, and the Network Appliance logo are trademarks or registered trademarks of Network Appliance, Inc. in the U.S. and other countries.

Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.

Internet Explorer, Microsoft, Outlook, Windows Server, Windows Vista, Windows, Win32, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both.

Intel, Pentium, Intel logo, Intel Inside logo, and Intel Centrino logo are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States, other countries, or both.

Other company, product, or service names may be trademarks or service marks of others.

xx Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 23: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Preface

Tivoli Continuous Data Protection for Files is specifically targeted at user computers, such as mobile computers and workstations, as well as file servers. It provides continuous data protection of files, providing the highest level of protection possible, yet is simple to use and administer.

This book presents a deployment guide for Tivoli Continuous Data Protection for Files Version 3.1. We cover planning, installing, and troubleshooting Tivoli Continuous Data Protection for Files for several use case scenarios. In addition, we provide some case studies, including integration with IBM Tivoli Storage Manager, that can be used as a proof of concept or demonstration of the product at a client environment.

This book is geared for IT Specialists who will be working on Tivoli Continuous Data Protection for Files installations and proof of concepts.

The team that wrote this book

This book was produced by a team of specialists from around the world working at the International Technical Support Organization, Austin Center.

Vasfi Gucer is an IBM® Certified Consultant IT Specialist working at the ITSO Austin Center. He worked with IBM Turkey for 10 years and has been with the ITSO since January 1999. He has more than 12 years of experience in systems management, networking hardware, and distributed platform software. He has worked on various Tivoli® customer projects as a Systems Architect in Turkey and the United States. Vasfi is also a Certified Tivoli Consultant.

Greg Bass is a Tivoli storage specialist in the Techline presales support organization based out of Austin, Texas. Greg has been supporting Tivoli storage products since 2000 when he was hired by the Tivoli Sales Infrastructure Group (SIG). Greg originally joined IBM in 1999 when he was brought to Austin to provide technical support for Lotus® Notes® and Domino® servers. Greg has been in the technology realm for over 15 years. Prior to IBM, Greg worked in the San Francisco bay area for PC Computing magazine, Oracle® and an Internet startup called Fabrik.

Wolfgang Beuttler is an IBM Tivoli Storage Manager Support Specialist in Mainz, Germany. He works for the Tivoli Storage Manager front- and back-end support team and provides support to clients all over the world, including onsite

© Copyright IBM Corp. 2007. All rights reserved. xxi

Page 24: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

support. He has more than 14 years of experience in IT and eight years of experience with IBM and the Tivoli Storage Manager product portfolio, starting with ADSM Version 3.1. His areas of expertise include defect as well as non-defect problem determination of Tivoli Storage Manager products.

Marcia Kubo is an IT Presales Support Specialist, in Brazil. She has eight years of experience in the IT field. She has been working for IBM since 2004. Her areas of expertise include IBM System p™ and AIX®, IBM Storage and Data Protection solutions. She is an ITIL Certified, Tivoli Productivity Center V3.1 Certified, IBM Certified Deployment Professional: Tivoli Storage Manager V5.3, IBM Certified Storage Administrator: Tivoli Storage Manager V5, and an IBM Certified Advanced Technical Expert for AIX version V4.

Thanks to the following people for their contributions to this project:

Arzu Gucer, Bart JacobInternational Technical Support Organization, Austin Center

Terry Copeland, William Haselton, Linda Sandmann, Jennifer Shaw, Eric Schaefer, Chris Stakutis, Daniel Thompson, Erik WilkinsonIBM USA

Become a published author

Join us for a two- to six-week residency program! Help write a book dealing with specific products or solutions, while getting hands-on experience with leading-edge technologies. You will have the opportunity to team with IBM technical professionals, Business Partners, and Clients.

Your efforts will help increase product acceptance and customer satisfaction. As a bonus, you will develop a network of contacts in IBM development labs, and increase your productivity and marketability.

Find out more about the residency program, browse the residency index, and apply online at:

ibm.com/redbooks/residencies.html

xxii Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 25: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Comments welcome

Your comments are important to us!

We want our books to be as helpful as possible. Send us your comments about this book or other IBM Redbooks® in one of the following ways:

� Use the online Contact us review Redbooks form found at:

ibm.com/redbooks

� Send your comments in an e-mail to:

[email protected]

� Mail your comments to:

IBM Corporation, International Technical Support OrganizationDept. HYTD Mail Station P0992455 South RoadPoughkeepsie, NY 12601-5400

Preface xxiii

Page 26: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

xxiv Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 27: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Part 1 Planning and architecture

In this part we introduce the planning and architecture considerations for Tivoli Continuous Data Protection for Files V3.1.

Part 1

© Copyright IBM Corp. 2007. All rights reserved. 1

Page 28: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

2 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 29: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Chapter 1. Introduction to Tivoli Continuous Data Protection for Files

The newest phase in the evolution of file backup is real time protection, and IBM Tivoli Continuous Data Protection for Files delivers a compelling solution offering a unique blend of continuous data protection and scheduled data protection in a single product. Tivoli Continuous Data Protection for Files is a solution for both file servers and user endpoints such as notebooks and workstations. Tivoli Continuous Data Protection for Files exploits the increasing availability of affordable disk storage by offering multiple disk-based target options for copies of your data. Instead of waiting for a scheduled interval, Tivoli Continuous Data Protection for Files backs up your files the moment they are saved, in real time. What's more, it does this effortlessly and transparently, in some cases eliminating the backup window.

This chapter provides an introduction to Tivoli Continuous Data Protection for Files and discusses the following topics:

� “Introduction to Tivoli Continuous Data Protection for Files” on page 3

� “How Tivoli Continuous Data Protection for Files works” on page 11

� “Main features of Tivoli Continuous Data Protection for Files” on page 13

1

© Copyright IBM Corp. 2007. All rights reserved. 3

Page 30: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

� “Value proposition of Tivoli Continuous Data Protection for Files” on page 14

4 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 31: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

1.1 General overview of Tivoli Continuous Data Protection for Files

It is important to understand the evolution of data protection applications and the environments in which they operate in order to fully appreciate the Tivoli Continuous Data Protection for Files solution.

1.1.1 What is Tivoli Continuous Data Protection for Files?Tivoli Continuous Data Protection for Files is a unique hybrid approach to file backup that combines replication with traditional backups. Tivoli Continuous Data Protection for Files is a real time, continuous data protection solution for mobile computers, workstations, and fileservers. Backups can go to one or more disk targets. Files are copied and saved in their native format. Tivoli Continuous Data Protection for Files is also highly tolerant of transient network connectivity. Easy-to-use wizards allow for simple configuration and file restoration. In addition, Tivoli Continuous Data Protection for Files is engineered specifically to support Lotus Notes and Microsoft® Outlook® mail clients.

Tivoli Continuous Data Protection for Files will back up your most important files the moment they change instead of waiting for a scheduled backup. Non-critical files can be backed up on a scheduled basis. It works in the background, similar to a virus scanner, and is therefore completely transparent to the user.

Since Tivoli Continuous Data Protection for Files has a single end-point architecture, there is no need for additional components such as a server component. It requires only a single installation on the system where the files to be protected are located.

Tivoli Continuous Data Protection for Files keeps copies of your data in their native file format and does not modify or encode them in any way. This transparency allows for direct access to the copied files with our without the Tivoli Continuous Data Protection for Files GUI.

In addition to providing multiple recovery points through file versioning, Tivoli Continuous Data Protection for Files provides additional redundancy by allowing multiple options for target destinations for your copied files:

� On local disk for protection, even when not connected to a network

� To a network file server or NAS device for remote machine protection

� To an IBM Tivoli Storage Manager (Tivoli Storage Manager) or IBM Tivoli Storage Manager Express (Tivoli Storage Manager Express) server

� To a Web-based device through http or https

Chapter 1. Introduction to Tivoli Continuous Data Protection for Files 5

Page 32: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Table 1-1 demonstrates the differences between Tivoli Continuous Data Protection for Files and traditional backup approaches.

Table 1-1 Comparison between Tivoli Continuous Data Protection for Files and traditional backup solutions

So overall, Tivoli Continuous Data Protection for Files provides simple, effective, and real time file protection for:

� Accidental file deletion� File corruption� Unwanted file alteration� Disk crashes� Other unforeseen losses

1.1.2 Why Tivoli Continuous Data Protection for Files is neededBusinesses today are increasingly concerned with protecting their data. Losing key business information can hamper productivity, delay projects, and divert resources and calls to the help desk. It can also harm organizations when they face regulatory scrutiny. In fact, many businesses today are legally required to use formal data protection.

Data corruption is a regular concern, and companies need better recovery point capabilities. Often the most valuable files are those that the users are working with right now. In addition, companies need sophisticated policy-based data management that enables them to focus on data with the most business value.

Tivoli Continuous Data Protection for Files

Traditional backup solutions

When to protect Continuous for highly important files, scheduled for others

Scheduled, full system

How to detect Journal-based on all file systems

Journal-based on some file systems

Where copies are stored Disk only, locally or remote;Tivoli Storage Manager

Typically on tape

Storage format Left “native”, online as files Wrapped into a proprietary format

Management / administration complexity

Simplified per-client administration only

Client-server concept;server component typically more expensive/complex

6 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 33: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Although most companies have implemented solutions for protecting enterprise data, data residing on workstations and notebooks is often under protected—even though it amounts to 60 percent of all corporate data, according to some industry experts. This is particularly true where lost data can significantly impact productivity and viability. Additional facts to consider:

� In many companies, about 60-70% of corporate data resides on notebooks and workstations which are rarely, if ever, backed up.

� Almost half of small to medium sized businesses admit to having no formal data protection procedure.

� The loss of productivity due to data loss on user computers is a growing concern.

� Virus and data corruption on file servers is an increasing problem.

– Companies need better recovery point capabilities.

� Today’s backup and recovery solutions are usually scheduled and tend to miss the most valuable data- what the user is working on right now.

� Mobile computer/desktop data protection is a growing problem:

– Corporate data centers are reluctant to take on mobile computer management.

– The business impact of lost data on mobile computers/desktops is increasing:

• Specific segments, such as law firms, medical practices, consulting, and so on, can have a very significant impact to productivity and liability.

• The aggregate impact to large corporations is significant.

With this in mind, Tivoli Continuous Data Protection for Files is designed to help alleviate clients' concerns and provide simple, effective, and efficient data protection and integrity. Key client issues driving the requirements for continuous data protection are:

� Critical information assets are being stored across the organization; they are no longer consolidated on just a few key servers.

� The complexity and expense associated with the replication of information assets across an organization.

� A shortage of skilled people resources, which demands that highly automated tools be deployed to help allow consistent practices across platforms, minimize human error, and improve the amount of storage a single storage administrator can handle.

� Meeting service-level objectives by providing continuous availability of data.

Chapter 1. Introduction to Tivoli Continuous Data Protection for Files 7

Page 34: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

� The integrity of data for governance and security requirements.

� Backups taken “only” on a scheduled basis allow too much productivity loss.

For several years a major market trend has been the steady decline in the cost of disk storage (local hard drives, SAN disks, removable disks, NAS devices, and so on). This trend makes file protection using disk replication technologies more cost effective compared to traditional backup/recovery solutions, which primarily use tape as their storage repository.

Tivoli Continuous Data Protection for Files leverages this development by utilizing a traditional backup and recovery solution while also employing data replication techniques. In the long term, this approach will lead to maximized efficiency and productivity in terms of both human and financial resources. For more information about the value proposition and the benefits of using Tivoli Continuous Data Protection for Files, refer to section 1.4, “Value proposition of Tivoli Continuous Data Protection for Files” on page 14.

Figure 1-1 Why Tivoli Continuous Data Protection for Files is needed

1. Employee productivity declines when data assets are lost or difficult to recover.

2. Business and regulatory requirements for data continuity are increasing.

3. Disk costs are declining, making replication technologies more cost effective.

4. Critical data assets found in remote offices, mobile computers, and desktops are often not protected.

5. Employee productivity declines with difficult recovery of data and recreation of lost assets.

Recovery Time Objective

Cos

t Recovery from a

disk imageRecovery from tape

copy

Why is Tivoli Continuous Data Protection for Files needed?

Tivoli Continuous Data Protection for Files delivers faster recovery of file assets

8 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 35: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

1.1.3 Who should use Tivoli Continuous Data Protection for Files?

The concept and design of Tivoli Continuous Data Protection for Files makes it ideal to protect both home computing environments and workstations or large file servers in business critical environments. Generally speaking, Tivoli Continuous Data Protection for Files should be used by everyone who has the need to continuously protect files in real time.

Ideal candidates for Tivoli Continuous Data Protection for Files are organizations with valuable data spread across multiple locations, departments, and file servers, or those whose IT infrastructure includes desktops and mobile computers which are not protected adequately or frequently.

Tivoli Continuous Data Protection for Files might also be of interest for enterprise clients with large file servers already using traditional backup solutions like Tivoli Storage Manager or Veritas NetBackup. Due to the amount of data needed to be backed up, large file servers are often unable to meet their backup window. Data loss can also occur after the point of the last scheduled backup. Tivoli Continuous Data Protection for Files with its continuous backup methodology is therefore a perfect complement to traditional backup solutions.

Overall, Tivoli Continuous Data Protection for Files could be the answer when:

� Clients are considering buying disks as an alternative to tape for simpler administration and configuration and faster recovery service levels.

� Clients view data as a major corporate asset.

� Clients are considering snapshot technologies. With Tivoli Continuous Data Protection for Files, there is no need to understand advanced IT concepts such as snapshots, mirrors, synchronous versus asynchronous and how to configure, maintain, and manage such elements.

� Clients are concerned about their ability to meet service and availability levels with a minimal to zero backup window.

� Skilled storage administrators are difficult to find and retain.

� Employee productivity suffers due to accidental data loss and recreating files from scratch.

� Organizations are considering a backup solution for remote offices

Tivoli Continuous Data Protection for Files is ideal for remote office servers, because it will maintain a local backup of files and replicate data to centrally based servers while tolerating issues with network connectivity.

� System administrators need their computer systems to be online 24x7 with minimum CPU or network impact during data protection operations.

Chapter 1. Introduction to Tivoli Continuous Data Protection for Files 9

Page 36: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

� The organization is considering how to easily protect information assets found on individual desktops and mobile computers with minimum administration.

� The organization needs to protect critical files from alteration, deletion, viruses, and corruption.

10 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 37: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

1.2 How Tivoli Continuous Data Protection for Files works

Tivoli Continuous Data Protection for Files is a new backup paradigm using a unique hybrid approach by combining modern replication technologies with traditional backup methods. It does so by taking all the benefits from each technology and uniting them together into a completely new product: Tivoli Continuous Data Protection for Files.

Figure 1-2 Unique hybrid approach of Tivoli Continuous Data Protection for Files

But how does it work? Figure 1-3 on page 12 gives a general overview on how Tivoli Continuous Data Protection for Files works.

Replication Traditional backups

• To-disk duplication• Lightning fast• Real time for important files• Tolerant of transient

networks• Multiple targets

• Versioning of files• Central administration• Archiving (vaulting)• Retention• Highly scalable

Tivoli Continuous

Data Protection for Files

Chapter 1. Introduction to Tivoli Continuous Data Protection for Files 11

Page 38: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 1-3 General overview of Tivoli Continuous Data Protection for Files

Tivoli Continuous Data Protection for Files tracks the creation of new files or changes to existing files. If the file is included in your list of protected files or file types an immediate copy is made into a backup area (a separate directory tree) on the local disk. Tivoli Continuous Data Protection for Files can store multiple versions of each file subject to the local “pool size” which can be configured by the user. When the pool is full, the oldest copies (versions) are removed to make room for newer ones.

The same file can also be sent to a remote storage area, such as a removable disk, file server, NAS device, and WebDAV server for remote protection.

Another copy of the file can be sent to a Tivoli Storage Manager server or Tivoli Storage Manager Express server. Traditionally, Tivoli Storage Manager is a data protection product often used in larger business environments. Those clients might find Tivoli Continuous Data Protection for Files useful as a real time client solution for mobile computers and workstations, but they still want most of the protected data to be managed by a Tivoli Storage Manager server.

If scheduled protection is enabled, then files associated with scheduled protection will be queued for transmission to the remote target based on the

Note: The Tivoli Continuous Data Protection for Filescode installs the Tivoli Storage Manager API automatically, so there is no need to install a separate API package.

12 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 39: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

interval that has been selected within Tivoli Continuous Data Protection for Files (Hourly, Daily, Weekly, Monthly). When the interval expires, Tivoli Continuous Data Protection for Files will copy changed files to the remote target storage location.

The types of protection offered by Tivoli Continuous Data Protection for Files (continuous or scheduled, local or remote) can be easily configured by the user in multiple combinations. This allows the user to protect their assets in a highly flexible manner.

To summarize how Tivoli Continuous Data Protection for Files works, we have to differentiate between continuous and scheduled backup concepts:

� Files protected continuously:

– Specify multiple storage locations for continuously protected files.

– The target area(s) will capture a copy of the file each time it is saved.

– The local target area is auto-managed as a pool with a configurable size.

– There is an option to specify a remote file server for off-machine protection; it is still real time, but tolerant of transient networks.

– There is an option to specify a Tivoli Storage Manager server or Tivoli Storage Manager Express server for off-machine protection; it is still real time, but tolerant of transient networks.

� Files protected by scheduled backups (primarily mail files):

– Mail files are protected on a scheduled basis by being sent to the remote file server or Tivoli Storage Manager server.

– Change-journal eliminates having to take processor resources to scan the file system.

– Files are “versioned” on a remote file server, allowing for point-in-time restore.

– Remote versions are automatically managed to a configurable pool size.

1.3 Main features of Tivoli Continuous Data Protection for Files

At the time of this publication, the latest version of Tivoli Continuous Data Protection for Files was version 3.1. The main features of this version are:

� Completely automated continuous protection of important files

� When a file is saved:

– A copy is stored in a pool on local disk.

Chapter 1. Introduction to Tivoli Continuous Data Protection for Files 13

Page 40: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

– Another copy can be sent to a file server, NAS device, or WebDAV server, Tivoli Storage Manager, or Tivoli Storage Manager Express server

� Real time data protection

� High/low priority files options

Tivoli Continuous Data Protection for Files allows user designated files to be backed up continuously as soon as they change. The user can also designate less important or constantly changing files to be saved on a scheduled basis (Hourly, Daily, Weekly, Monthly).

� File include/exclude options

Tivoli Continuous Data Protection for Files offers the usage of include/exclude lists. By using them, the client can define precisely what type of files will be included for protection. They can also specify a list of files or directories that will be excluded by Tivoli Continuous Data Protection for Files and not backed up or vaulted.

� Tolerant of transient networks

� Versioning of files

� Archive retention

� Scalable

� Small foot print

Tivoli Continuous Data Protection for Files can be installed in a few minutes on a system and will only use about 21 MB of disk space.

� Simplified management and central administration

Due to its simplified management concept, Tivoli Continuous Data Protection for Files provides a central administration interface that allows the user to restore his own files quickly and easily.

� No server component required

� Maintains native file format

Tivoli Continuous Data Protection for Files maintains files in their natural format and does not encode them in a proprietary format or modify them in any other way.

1.4 Value proposition of Tivoli Continuous Data Protection for Files

For business units dependent on data availability and rapid data recovery, Tivoli Continuous Data Protection for Files provides uniquely efficient and effective

14 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 41: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

data protection to ensure business continuity, employee productivity, and integrity of information assets.

For storage managers and administrators responsible for protecting data while containing cost, Tivoli Continuous Data Protection for Files simplifies heterogeneous storage management and provides real options for an integrated data protection solution across all information assets.

Tivoli Continuous Data Protection for Files:

� Provides easy to use data protection and integrity, requires little or no training to use

� Improves employee productivity by providing real time backups of data, so when a failure occurs, the recovery can be the latest version, not the last time a scheduled backup ran

� Improves IT productivity and labor resource utilization, because users can more easily recover files without IT involvement

� Improves network and bandwidth usage, because it is optimized to send data through network only when it is connected with no user or IT manual intervention required for optimizing the bandwidth usage

The value proposition using Tivoli Continuous Data Protection for Files can be summarized as follows:

� Reduced or eliminated backup window

– Improved backup resource utilization

– Better return on investment (ROI) and total cost of ownership (TCO)

� Improved recovery point objective (RPO)

Note: In finance, the return on investment (ROI)a is a calculation used to determine whether a proposed investment is wise, and how well it will repay the investor. It is calculated as the ratio of the amount gained (taken as positive), or lost (taken as negative), relative to the basis.

Total cost of ownership (TCO)b is a financial estimate designed to help consumers and enterprise managers assess direct and indirect costs related to the purchase of any capital investment, such as (but not limited to) computer software or hardware.

a. Definition taken from article “Return on investment”, found at:http://en.wikipedia.org/wiki/Return_on_investmentb. Definition taken from article “Total cost of ownership”, found at:http://en.wikipedia.org/wiki/Total_cost_of_ownership

Chapter 1. Introduction to Tivoli Continuous Data Protection for Files 15

Page 42: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

– Reduced loss of data

– Improved productivity

� Improved recovery time objective (RTO)

– User initiated restore, zero administration intervention

– Optional recovery from disk (local or remote)

Note: The RPO is the degree of difference between the active online data and the disaster recovery copy of that data. An RPO of zero would mean that the primary copy and the disaster recovery copy are in exact synchronization. A failure would result in zero loss of data.

Note: The RTO is the amount of time after a failure that someone is willing to spend before a given application or group of data is back up and available. An RTO of zero means that failures should cause zero disruption.

16 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 43: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

1.4.1 Benefits of using Tivoli Continuous Data Protection for FilesUsing Tivoli Continuous Data Protection for Files provides the following benefits:

� Simplified storage management can save IT staff and computer user time and labor

� Continuous data protection provides data integrity when viruses attack and corrupt systems

� Reduces or eliminates backup windows

� Optimizes integration to network and enterprise data protection solutions

� Optimizes bandwidth and network transfer of data

� Continuously protects multiple versions of files to allow clients a choice of recovery points

� Ability to write-protect data locally to prevent unwanted modification

This has a variety of uses such as allowing a user to store final versions of documents to prevent unintentional changes.

� Ability to send data to heterogeneous backup devices: local file system (on local or SAN disk), file server, NAS, USB disk, HTTP server, or Tivoli Storage Manager server

1.4.2 Unique differentiatorsThe following unique differentiators of Tivoli Continuous Data Protection for Files have been identified:

� Fast time to deployment

Tivoli Continuous Data Protection for Files can be installed, configured, and running in a few minutes.

� Ease of daily use

No need to understand more IT-savvy concepts such as "snapshots" and how to maintain, configure, and manage such elements.

� Elimination or reduction of backup windows

� Backup target flexibility

� Tivoli Continuous Data Protection for Files allows the target of the backup to be any type of modern disk-based storage device such as: a local file system on local or Storage Area Network (SAN) disk, a USB (Universal Serial Bus) device, a File Server, a Network Attached Storage (NAS) device or a WebDAV enabled web server. If Tivoli Storage Manager is used as the remote storage destination, both disk and tape storage pools can be used.

� Easily integrates into traditional backup solutions

Chapter 1. Introduction to Tivoli Continuous Data Protection for Files 17

Page 44: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Tivoli Continuous Data Protection for Files integrates naturally with Tivoli Storage Manager and Tivoli Storage Manager Express as well as the backup target device, which can be backed up by any off the shelf data protection package.

� Effective backup for remote systems and traveling users

Tivoli Continuous Data Protection for Files tolerates a missing remote target without generating error messages or shutting down the product. As soon as the remote target becomes visible again, Tivoli Continuous Data Protection for Files will resume its continuous or scheduled backups to the target.

� Effective backup for remote offices

Tivoli Continuous Data Protection for Files is ideal for remote office servers, because it will locally version and protect high-importance files and migrates data back to corporate servers while tolerating network spottiness.

� Simple backup for department solutions

Anyone, even with minimal technical skills, can add Tivoli Continuous Data Protection for Files to a department file server to provide real time file protection (even if just locally).

� User productivity

With Tivoli Continuous Data Protection for Files, you can be assured that there is no loss of productivity due to re-creation of lost work. Other backup/recovery solutions offer near continuous protection: once an hour or once a day, which is not as effective as continuous data protection.

� Automating manual process to protect all corporate assets

Users do not need to save to corporate systems for data protection and audit purposes; Tivoli Continuous Data Protection for Files automatically protects all changes to files (even when not connected to the corporate network).

� Protects critical files from alteration or deletion, viruses, and corruption

Tivoli Continuous Data Protection for Files allows users to protect critical corporate assets in order to prevent deletion or alteration of active files from user error, device failure, or corruption.

18 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 45: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Chapter 2. Product architecture, planning, and deployment

This chapter discusses the architecture, planning considerations, and deployment of Tivoli Continuous Data Protection for Files and has the following sections:

� “Product architecture” on page 20

� “Planning for deployment” on page 25

� “Best practices and sizing considerations” on page 30

� “Tivoli Continuous Data Protection for Files installation requirements” on page 34

2

© Copyright IBM Corp. 2007. All rights reserved. 19

Page 46: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

2.1 Product architectureTivoli Continuous Data Protection for Files is a product that has just enough controls and options to allow for a wide range of different configurations. At its core, the program operates at the kernel level of the operating system, monitoring all file operations. It keeps track of all pertinent activities and performs other operations based on the configuration. Tivoli Continuous Data Protection for Files knows when you open files, when you save them, when you close them, and whether or not you have changed the file when you close or save them. When there is a change saved, this is noted and a new version of the file is replicated to one or more locations, either immediately or at a later time.

The underlying technology was designed to be a general file system extension tool that can be presented to the user in a variety of different formats, for different purposes. The current product, Tivoli Continuous Data Protection for Files, mostly exploits the function of copy-on-close replication.

2.1.1 Main componentsThe main components of Tivoli Continuous Data Protection for Files are:

� Kernel

fp.sys1: This is the driver that loads when the computer boots up. It is located in \%WINDIR%\System32\Drivers.

� User

– FilePathSrv.exe: This is the daemon, or process, that starts as a service (CDPforFilesSrv). If you are running in regular user mode, this service will stop until it has something to do. If you are running in service mode, the service will stay active. To run it from a command prompt, type filepathsrv -d. It is located in the Installation directory.

– fpa.exe: This is the command line interactive program that passes commands to the kernel. It can be used to set tracing levels. It is located in the Installation directory.

2.1.2 CapabilitiesThe kernel layer of the product performs a number of activities:

� Audit: Watches file activity, particularly noting files that are closed with new data

� Write Once Read Many (WORM): Prevents I/O or any alteration to files

1 The underlying technology of Tivoli Continuous Data Protection for Files is called FilePath. “fp” is shorthand for FilePath. Some internal components are called fp or use fp as a prefix.

20 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 47: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

� Mirroring: Kernel-based I/O mirroring: Inactive in the current product

� Replication: Notification of files that are replicated

The kernel layer is based on a set of rules that set up the conditions under which certain activities, or actions, are performed. The rules and actions come preconfigured to make the product act as designed. When Tivoli Continuous Data Protection for Files performs a basic local backup of a file that has changed, the kernel is obeying a chained set of rules and actions. A basic chain includes:

Rule: When should the action occur? On Open, On Write or On Close.

Meta rules (optional): What conditions apply? For example, it does not fall under the exclusion list, and it matches *.ppt (or something from the inclusion list).

Action: What to do if the rules are true? Trigger a replication, block I/O to this file (Vault action).

All of the basic rule action chains required for Tivoli Continuous Data Protection for Files to function properly are kept in XML format in the file fpa.txt.

The daemon, or process, handles the following activities:

� Executing the replication, or copy-on-close

� Driving the scheduled protection

� Displaying updated information in the GUI

Important: Do not edit the fpa.txt file. First, you might change something in one of the rule action chains, which will cause the product to become unstable. Second, Tivoli Continuous Data Protection for Files updates the file from time to time, so you might lose some information by saving over necessary changes.

Chapter 2. Product architecture, planning, and deployment 21

Page 48: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

See Figure 2-1 for an illustration of the relationship between the kernel layer and the daemon or driver.

Figure 2-1 Agent-driver interaction

2.1.3 Daemon architectureThe daemon runs several threads to perform its various functions. They are:

� Queue thread

� Audit thread

� Sysprotect

� TSM thread

� HTML listener

� Replication thread(s)

Queue threadWhen the kernel needs something done that can only be done in user mode, it creates a Queue entry, posts it, and usually waits for a response from the daemon. The main daemon thread is the queue reader, which loops in a read().

FPQAudit buffer

KERNEL

AGENT

Agent has a thread that is always in a “read()” to get next queue command; Does a “write()” to respond.

Kernel injects commands; mostly to kick-off replication activities, but other maintenance too.

FPQ: Critical component. Priority-based queue. Both round-trip (synchronous) and one-way. Options include “punt if full” or “block if full.” IOCTL interface

-Inject XML

-Get Audit buffer

-Get database, etc

Audits accumulate in the kernel and are batch-dumped to daemon for speed.

Manipulation of live database

Platform

Replication threads(up to 10)

Audit thread

HTML listener

Service

Interactive FPAMain thread

22 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 49: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

There are about six commands that the queue thread can be asked to perform, but the most important one in this product is “Do a replication.” For each replication request at a given priority level, a file is opened and appended with the specifics of the replication request. These files are in XML format. (See the Replication section of Figure 2-1 on page 22 for a description of these files.) These files are monitored by the replication threads that are described below.

Audit threadThe main purpose of the audit thread is to wake up periodically and ask the kernel to dump its audit/log buffers. The audit buffers capture file change events that are used by Tivoli Continuous Data Protection for Files for scheduled protection and other activities. The daemon sleeps for a few seconds and then drains any messages in the buffer (via an IOCTL request into the kernel). The buffer is formatted as a list of XML messages; each message indicates both the file to add this message to, and the message. The message can be anything defined by the “action” and is typically in XML format. It includes various expanders (substitutions) for such things as filename, and so on. The following is an example of a message:

<change vfs=”Unlink” src=”C:\fp\buildchk.log” other=””size=”10697” app=”System”/>

The ChangeJournal (sysprotect) rules/actions cause these audits to be accumulated into a file called ChangeJournal.log in the installation directory. The LocalPool rule causes audits to accumulate the locally versioned files into the LocalPool.log file.

SysprotectWhen this thread is started, its job is to perform a scheduled protection by addressing all of the files listed in the ChangeJournal.log file. This thread is started either on a periodic basis, or when the user selects Start Scheduled Backup Now from the Scheduled Protection window. When started, the thread will do the following:

1. Detect if the file ChangeJournal.log_1_inprocess exists and process that file.

2. Automatically rename ChangeJournal.log to ChangeJournal.log_1_inprocess so that audits can continue to accumulate.

3. Process the ChangeJournal.log_1_inprocess file and record each line to the ChangeJournal.log_2_last file.

To minimize audit traffic, the kernel side keeps a hash of files that have been altered (tabulation) and avoids issuing multiple audits for files that have been repeatedly altered. This hash has a 2,000 file limit and then it cycles. Sysprotect also ignores the “vfs” mentioned in the log (see example message above) and

Chapter 2. Product architecture, planning, and deployment 23

Page 50: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

determines what to do based on the current version of a file. For example, if the source file is missing, presume that an unlink should be performed.

The Sysprotect thread also performs the function of remote pool management. Every time a version is created on the remote target, an entry is made in the RemoteVersions.log file. The ServerPool metric is increased by the versioned file’s size, and this metric is compared against the ServerPoolQuota metric that was configured in the Remote Storage settings in the Configuration Notebook. If the metric indicates that the pool size is over the quota, the following actions are performed:

1. The RemoteVersions.log file is consumed, one line at a time, deleting the oldest files and removing the file name from the list.

2. This continues until the pool size is at least 20% under the threshold size.

3. The remainder of the RemoteVersions.log file replaces itself.

4. Files deleted are logged as unlinks in the Replication.log file.

5. Deletions that fail are logged to either:

– purge_failed.log: Generally when users have cleaned up the pool by deleting files themselves, in which case the pool size metric is decreased

– purge_struggled.log: Usually in the case of a network access type of error

TSM threadThe TSM thread starts when a Tivoli Storage Manager backup occurs for the real time processing activity.

HTML listenerThe HTML listener thread processes requests from the browser. The browser displays the product GUI, which has information about configuration and settings and is also used by the user to change configuration settings.

Replication thread(s)The replication threads manage the replication activity. They are file-centric, and they monitor the replication files. The queue thread places the list of files to be replicated in a replication-queued.N file, where N is the priority. The replication thread automatically renames this to a replication-active.N file and then processes the replications in priority order. If the replication encounters a permanent failure, the transaction gets logged in the replication-failed.N file. All other transactions are posted to the replication.log file. These threads are restartable and persistent, which makes them easy to trace for diagnosing problems. If the threads die, they will not stall the system. See Figure 2-2 on page 25 for a diagram of this process.

24 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 51: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 2-2 Replication threads

2.2 Planning for deploymentAlthough it is simple to install and configure Tivoli Continuous Data Protection for Files, it is worth taking a little time to consider how best to deploy the product to leverage it to the fullest. In this section, we will discuss general considerations as you install and configure the product.

For a single machine installation, it is important to configure the product so that it is working most efficiently for you. Tivoli Continuous Data Protection for Files is a set it and forget it type of product. Once you have it set up, it will run in the background and you will be mostly unaware of it until you need to restore a critical file. To make sure that you can easily restore the correct version of a file at that critical point, you should take a little time up front to review your configuration.

Before you begin, you should consider the following questions:

� What are my critical files?

� Where should I back my files up to?

� How often do I need to back up different types of files?

� Do I need e-mail and scheduled backups?

� Do I need the Vault feature?

FPQ

KERNEL

AGENT

Main thread

Replication-Queued-Priority

Replication-Active-Priority

Repl-1 threadRepl-1

threadReplication-1 thread

Rename

Replication-Failed-Priority Replication-Log

Chapter 2. Product architecture, planning, and deployment 25

Page 52: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

2.2.1 What are my critical files?By default, Tivoli Continuous Data Protection for Files will back up the contents of your \My Documents\ folder, along with a few other file types. If you typically save all of your critical documents under this directory path, then you will not need to add anything to the inclusion list. If, however, you save critical files in a different directory path, you should consider what type of files they are and where they get saved. Some programs select a different path by default, or you might have set up a different location for some files. In this case, you need to consider where those files get saved, what type of files they are, and what the file extension is. Depending on your situation, you will need to add either the directory path or the file extension to your inclusion list.

2.2.2 Where should I back my files up to?

The default location for backups created by Tivoli Continuous Data Protection for Files is a local disk on your computer. Tivoli Continuous Data Protection for Files will automatically select the drive with the largest free space as the target location. The primary use of this backup site is for you to have immediate access to recently saved versions of your files. If you save a version of a file but need to undo that save, or if you mistakenly delete an important file, you can easily restore a previously saved version of the file from your local backup. If you are working on a computer that is not connected to a network or any type of external storage, this will be your only backup location. If you have access to some sort of remote storage, you will probably want to consider one or more of the other backup options. These options include a local hard drive (local network or USB drive), a remote file server, a remote WebDav server, or a remote Tivoli Storage Manager or Tivoli Storage Manager Express server. We strongly recommend using the remote backup option if at all possible in case of hard drive failure or loss. You will need to know the fully qualified UNC path for your remote drive to configure it properly. Check with your network administrator if you do not know what to use.

2.2.3 How often do I need to back up different types of files?This question is dependent on each user’s unique environment. The very best, but totally impractical, configuration would back up every version of every file and

Tip: If you will be backing up several computers to a single network drive, you will not need to set up a separate folder for each user. Tivoli Continuous Data Protection for Files will create a unique folder for each computer with the computer’s network name at the top of the directory structure, directly underneath the RealTimeBackup folder.

26 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 53: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

keep them forever. Since this is not possible, you need to think about what best suits your needs. If you are going to implement either the remote continuous option or the scheduled backup option, you will need to consider both the size and timing of your backup.

Remote continuousAlthough this backup option is labeled continuous, this is not always literally true. Tivoli Continuous Data Protection for Files makes note of all of your file saves, but if you are not currently connected to the network or if you are in between the time intervals you have set up for Tivoli Storage Manager backups, a list of file changes will be kept for backup at the next possible time.

When you are selecting a time interval for Tivoli Storage Manager backups, keep in mind that the most recently saved version of a file will be sent when your Tivoli Storage Manager interval is due. So, if you set your Tivoli Storage Manager interval for 30 minutes, and you save a file 10 times in that interval, only the last version of the file will be sent to your Tivoli Storage Manager server. The number of versions of that file kept in Tivoli Storage Manager is configured in Tivoli Storage Manager.

Although you do not explicitly set the time interval for continuous remote backups to a file server, you should keep in mind what percentage of time you are connected to the network. This will have an impact in the number of versions you select to keep on the remote target before they are eligible to be purged.

2.2.4 Do I need e-mail and scheduled backups?

Tivoli Continuous Data Protection for Files offers a more traditional form of backup that allows you designate files that will be backed up on a scheduled interval- hourly, daily, weekly, and monthly. Scheduled backups are ideal for large files or dynamic files that change constantly, such as e-mail. You can back up these files to either a remote file or Web server or to your preconfigured Tivoli Storage Manager server.

E-mail backupYou configure Tivoli Continuous Data Protection for Files to backup your e-mail application and its associated files via the E-mail Protection tab. Because e-mail files are typically large, they are not backed up continuously. They are only backed up on the schedule that you select. E-mail files are backed up only to remote storage. If the remote storage is not available at the scheduled backup time, Tivoli Continuous Data Protection for Files will queue the backup copies for later transmission. When the remote storage area becomes available, Tivoli Continuous Data Protection for Files will create the backup copies on the remote storage area.

Chapter 2. Product architecture, planning, and deployment 27

Page 54: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Additional files to protect on a schedule Large or frequently saved files can consume considerable computing or network resources when they are backed up. You can scheduled periodic backups of these files when the burden on computing or network resources will be least inconvenient. Files protected by schedule will be backed up even if they are open, but you can try to schedule the backup for a time when the file will be closed. The files you select for scheduled protection will be backed up only at the scheduled time and only if they change during the scheduled interval. This can yield fewer backup versions than continuously protected files. Fewer backup versions use less storage space, but offer fewer opportunities when you want to restore a file.

We strongly recommend that you include scheduled backups covering a larger set of files than included with continuous backup for the following reasons:

� You might have missed some important file types in your inclusion list.

� You might install software that creates a new directory structure for saving files and therefore would not be caught by the inclusion list.

� There might be other files that get damaged or accidentally deleted that are important for the operation of various programs on your computer. Having these files backed up on some schedule may prevent you from having to reinstall software.

2.2.5 Do I need the Vault feature?In some cases, you might have files that need to be preserved in their exact format for a period of time. One way to do this is to write them to a CD-ROM. However, with the Vault feature in Tivoli Continuous Data Protection for Files, you can protect these files in the same manner. Once you Vault a file with Tivoli Continuous Data Protection for Files the file cannot be changed in any way. Vaulted files are available as read-only versions and cannot be altered or deleted. Some users might need this function for regulatory reasons. For example, if you are required to keep financial records in their original form for seven years, you can put these files in a directory covered under the Vault function. Tivoli Continuous Data Protection for Files will protect them from editing and deletion.

Important: The scheduled protection option offered in Tivoli Continuous Data Protection for Files cannot be used for a complete system restore in the event of total hard drive failure. It does not take a complete snapshot of your machine that would include the system files that are required for a complete system restore.

28 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 55: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

2.2.6 Summary of protection methods

The attributes of each type of protection are compared in the following table.

Table 2-1 Summary of protection methods

Continuous Protection

Scheduled Protection

Vaulting

Recommended for which files

Recommended for your most important files. Not recommended for large dynamic files like e-mail.

Recommended for large dynamic files like e-mail.

Recommended for files that you don’t want to be changed nor deleted.

How protected Backup copies are created on storage area.

Backup copies are created on a storage area

Vaulted files and folders cannot be modified nor deleted.

Frequency of backups

File is backed up whenever it is saved.

File is backed up only at the scheduled time, and only if it has been saved since the previous schedule.

No backups.

Backup copy storage area

Local or remote. Remote only. Not applicable.

Files protected Files selected in the Folders and Files box and the Applications box of the Files to Protect page of the Settings Notebook.

Files selected in the E-mail Protection page of the Settings Notebook. Files selected in the Folders and Files dialog of the Advanced page of the Settings Notebook.

Files selected in the Vault box of the Files to Protect page of the Settings Notebook.

Chapter 2. Product architecture, planning, and deployment 29

Page 56: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

2.3 Best practices and sizing considerations

Tivoli Continuous Data Protection for Files is a simple product that has just enough controls and options to allow for a wide range of different configurations. The goal of this section is to outline what the creators of Tivoli Continuous Data Protection for Files believe are typical best practices configurations.

2.3.1 Overall summary

Here is our overall summary of how Tivoli Continuous Data Protection for Files should typically be configured:

� General tab. Set Continuous protection level: Local storage only with 2 GB cache. Include Microsoft Office files and other user-created content that is considered high-value. Note: enabling continuous protection to Remote storage (which includes file servers, Web servers, or a Tivoli Storage Manager server) could cause unnecessary network load. Consider an hourly scheduled backup if you want to keep files extremely current on remote targets.

� E-mail protection tab. This page allows for backup scheduling of e-mail and other file types. Configure a daily backup schedule with 10 GB cache (or approximately 1/6 to 1/10 the size of the source disks); 5 versions (and leave the other defaults as is). Use the Scheduled Backup Settings link to configure your include/exclude list for scheduled protection. Include a broader list of files than that defined with Continuous protection. For robust file protection consider using a wild card “*” (everything else), and a weekly schedule because these backups could be lengthy.

Tivoli Continuous Data Protection for Files’ hallmark feature is the local-continuous protection which allows users to be 100% protected regardless of where they are and what their network connectivity is. This local/continuous feature should always be active. It is prudent, however, to adjust the exclusion list carefully. Be sure the Files to Protect list includes document types (or locations) that truly represent the critical work for users.

30 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 57: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

2.3.2 Corporate scenario- Tivoli Continuous Data Protection for Files with Tivoli Storage Manager

The best model for Tivoli Storage Manager with Tivoli Continuous Data Protection for Files is to have Tivoli Storage Manager backup a Tivoli Continuous Data Protection for Files target file server. Tivoli Storage Manager is a sophisticated backup and archive management system that can offer far greater control over versioning, long term retention, and hierarchical storage than Tivoli Continuous Data Protection for Files. We highly recommend that users consider backing up the Tivoli Continuous Data Protection for Files target file server using a traditional Tivoli Storage Manager environment.

Using Tivoli Continuous Data Protection for Files for backups to a Tivoli Storage Manager server makes more sense on a file server than on a user’s workstation. A file server is typically a managed system in an IT shop (versus a user workstation whose uptime and network status are constantly in flux). As such, the connection to the Tivoli Storage Manager server is more dependable. Also, material on a corporate file server typically has a different level of retention and governance needs, so there is value in getting the data into Tivoli Storage Manager in a timely fashion. For such environments, Tivoli Continuous Data Protection for Files plus Tivoli Storage Manager is a valuable combination.

Important: The default size for the remote storage area is 40 GB. If you increase the number of backup versions to keep, consider increasing your storage area size. If you are unsure of how much space to allocate, you can monitor your space usage on the Status page and adjust the version and space settings accordingly.

When the storage space becomes full, Tivoli Continuous Data Protection for Files deletes older backup copy versions of files that have several backup copy versions. After deleting the versioned backup copies, if more space is needed for new backup copies, Tivoli Continuous Data Protection for Files deletes the last remaining backup copies of enough files to make room for the newest backup copy.

If you try to remotely back up a file which is larger than the space you have allocated for your remote storage area, Tivoli Continuous Data Protection for Files will purge all older versions of your files and might fail to back up the file. Make sure that the maximum space for your remote storage areas is greater than the maximum file size for remote backup in the Advanced page of the Settings Notebook. For example, if you decrease your maximum space for backups to 1 GB, you should decrease the maximum file size for remote backup from the default of 1 GB.

Chapter 2. Product architecture, planning, and deployment 31

Page 58: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Is it necessary (or valuable) to have Tivoli Continuous Data Protection for Files push the data directly to Tivoli Storage Manager rather than simply having Tivoli Storage Manager run on a schedule? Yes, for two reasons. One reason is that Tivoli Continuous Data Protection for Files will never scan the file system looking for files to move because it has its journal list. This is particularly important for very large file systems. The second reason is that using Tivoli Continuous Data Protection for Files allows the administrator to have a separate include list. You might want to configure Tivoli Continuous Data Protection for Files to hourly back up some set of very important files, and let Tivoli Storage Manager back up the remaining system at night.

2.3.3 Corporate scenario- file server as remote storage target for Tivoli Continuous Data Protection for Files workstations

We believe that the typical corporate environment for Tivoli Continuous Data Protection for Files will often look something like this: 20 to 100 users sharing a common file server as their backup target with 50% of those users being highly mobile (notebook users). In this scenario, we recommend configuring the user workstations as discussed in 2.3.1, “Overall summary” on page 30.

In addition we have three suggestions for the configuration of the remote file servers which function as your backup target:

� Disk pools with backup to tape: On your file server, pick a reasonable pool size per user (2-8 GB) with the intention of holding some number of days/months worth of material (rather than holding all material from a user). Then back that file server up using a traditional backup package (such as Tivoli Storage Manager or something similar) to tape. In this mode, the version count should be set to 1. The remote target’s purpose is to allow for rapid restore of user data in the event of machine or disk failure of the workstation, but long term retrieval and retention will be the responsibility of your backup package.

� Disk pools with no backup: In this mode, the target file server is the long term backup device for all material. Configure the user space to be far more generous (perhaps 50% of their own system) and allow much higher version quantities (20). Since there is no other secondary backup element, more data needs to be present on this system to allow for longer historical recoveries.

� Disk pools daisy chained: In this mode, data passes through this backup file server and then re-replicates outwards (using Tivoli Continuous Data Protection for Files) to another concentration point (which would in turn be backed up using a traditional backup/tape configuration). This mode is well suited for remote offices where the backup target is essentially a local cache (provides better connection performance connection for the remote office

32 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 59: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

users) and essentially has all day to trickle the data back to a corporate location over a slower WAN link.

2.3.4 Corporate scenario- Tivoli Continuous Data Protection for Files loaded on file server

Tivoli Continuous Data Protection for Files runs just as well on file servers as it does on user endpoints (i.e. locally protecting data on file servers versus protecting data that resides on notebooks and workstations). The primary value of running Tivoli Continuous Data Protection for Files on a file server is that it allows each user to have multiple backup versions of their material locally available on the file server. In such an environment, the local cache for Tivoli Continuous Data Protection for Files should be generously sized (perhaps 25% of the size of the total file space).

Should such a deployment use Tivoli Continuous Data Protection for Files to move data off of that file server and onto another backup target? Possibly. If the customer already has a backup strategy for that file server, perhaps nothing else needs to be done. Certainly, the administrator could exploit the fact that Tivoli Continuous Data Protection for Files is present and have this file server (and maybe several others) push their data to another collection point (a backup target) and then back up that target with a traditional mechanism or send data directly to a Tivoli Storage Manager server or Tivoli Storage Manager Express server.

2.3.5 Home user scenario

We recommend that typical home users configure their Tivoli Continuous Data Protection for Files per the 2.3.1, “Overall summary” on page 30, electing a generous local cache size (perhaps 20% of their disk capacity).

Homeowner machines are possibly the most susceptible to damage and theft so it is of paramount importance to have an off-machine target configured in addition to the local repository internal to your machine. USB (or other removable) targets are a fine and affordable choice as this remote target. Additionally, continuous backups to a remote location makes the most sense when the remote target is a locally attached USB drive. This way you have continuous protection to a remote device without generating the corresponding network traffic.

Users can also consider deploying an older computer on their home network as a backup target (configured as a file server in simple file serving mode) which relieves the user from having to remember to plug in a disk device. Attach a removable/USB device to that computer, if desired.

Chapter 2. Product architecture, planning, and deployment 33

Page 60: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

For additional redundancy consider deploying Tivoli Continuous Data Protection for Files on the backup target and have it push data outward, hopefully out of the house to an ISP target. In such a case, it might be necessary to shorten the include list to only critical file types.

2.4 Tivoli Continuous Data Protection for Files installation requirements

The following section contains information for installing and initially configuring Tivoli Continuous Data Protection for Files.

2.4.1 Basic installation

Basic installation includes a wizard-guided configuration and is suitable for installation on a single local computer. You can also upgrade and uninstall on a single computer.

2.4.2 System requirements

Tivoli Continuous Data Protection for Files requires a Windows® server or workstation with specific hardware and software.

Hardware Minimum hardware is an Intel® Pentium® III machine with the following specifications:

� 500 MHz CPU, 384 MB RAM

� Free disk space

– 21 MB for install footprint

– Additional space to store local backup copies

The hardware configuration must also support the Windows operating system, as specified by Microsoft Corporation.

Note: You must configure enough space to store at least one backup copy of every file that you protect. See 2.3, “Best practices and sizing considerations” on page 30.

34 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 61: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Software The following Windows operating systems are supported:

� 32-bit Windows 2000 Server, Advanced Server, SP2 and up (x86-32)

� 32-bit Windows XP Professional, SP1 and up (x86-32)

� 32-bit Windows 2003 Server–Standard Edition and Enterprise Edition (x86-32)

� 32-bit Windows Vista™ Ultimate and Business Edition (x86-32)

The Continuous Data Protection for Files user interface supports the following browsers:

� Internet Explorer®, Version 6.0 and higher

� Mozilla Firefox 1.5.0.7 and higher

Chapter 2. Product architecture, planning, and deployment 35

Page 62: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

36 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 63: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Part 2 Deployment

In this part we discuss deployment of Tivoli Continuous Data Protection for Files, including several case studies that show the features of the products.

Part 2

© Copyright IBM Corp. 2007. All rights reserved. 37

Page 64: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

38 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 65: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Chapter 3. Installation and configuration

In this chapter we describe how to install and customize Tivoli Continuous Data Protection for Files on a Windows (2003) system.

The instructions given in this chapter are very detailed. By following them, you should be able to successfully install Tivoli Continuous Data Protection for Files and configure it, meeting your or your company’s requirements.

We also explain additional installation techniques like push installation to another computer and more advanced setup options. The chapter ends with a section about more general but important concepts you need to consider when implementing and maintaining Tivoli Continuous Data Protection for Files.

The following topics are discussed in this chapter:

� “Basic installation and configuration” on page 40

� “Advanced installation options” on page 64

� “Advanced configuration” on page 75

� “Additional considerations” on page 108

3

© Copyright IBM Corp. 2007. All rights reserved. 39

Page 66: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

3.1 Basic installation and configuration

There are several ways to install Tivoli Continuous Data Protection for Files on a computer. For example interactively, silently, or using a push or pull installation.

In this section we describe how to install Tivoli Continuous Data Protection for Files interactively on a single computer. For the other installation methods refer to 3.2, “Advanced installation options” on page 64.

3.1.1 Installing Tivoli Continuous Data Protection for Files

To install Tivoli Continuous Data Protection for Files, follow these steps:

1. Insert the product installation CD. Double-click on the Tivoli Continuous Data Protection for Files installer icon.

2. The installer displays the language selection box as shown in Figure 3-1. Accept either the default language of English (United States) or choose your preferred language, and click OK.

Figure 3-1 Installation Setup Language window

Important: Before installing Tivoli Continuous Data Protection for Files, you have to make sure that your computer meets the necessary hardware and software requirements of Tivoli Continuous Data Protection for Files. Refer to 2.4.2, “System requirements” on page 34.

Note: If you do not have the CD and have downloaded the software from the IBM Passport Advantage® Web site, just double-click on the Tivoli Continuous Data Protection for Files executable file (ends with .exe) and you will be directed to the screens below.

40 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 67: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

3. The InstallShield Wizard is prepared before the installation can continue (see Figure 3-2).

Figure 3-2 InstallShield Wizard is being prepared

4. The Tivoli Continuous Data Protection for Files information window displays including the build number, as shown in Figure 3-3 on page 42. Click Next to continue.

Note: This selection only specifies the language for the Tivoli Continuous Data Protection for Files installation dialog boxes. The language of the Tivoli Continuous Data Protection for Files menus and messages depends on the language settings of the Internet Browser that you are using.

Chapter 3. Installation and configuration 41

Page 68: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 3-3 Information window including the build number

5. The License Agreement window will be displayed (see Figure 3-4 on page 43). Read the license agreement carefully. Select the appropriate button if you accept the terms of the agreement, and click Next.

42 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 69: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 3-4 Software License Agreement options

6. The following window is the Destination Folder window (see Figure 3-5 on page 44). Here you can choose the location where Tivoli Continuous Data Protection for Files will be installed. You can change the default installation directory if you click the Change button and then choose an appropriate folder suiting your requirements, or you can just accept the default installation folder and click Next.

Note: If you do not accept the license agreement and click Next, a window displays asking you if you really wish to decline the license agreement. If you click Yes, the InstallShield Wizard will be completed and the product will not be installed. Finally, you need to click Finish to exit the wizard.

Chapter 3. Installation and configuration 43

Page 70: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 3-5 Destination Folder window

7. The Ready to Install the Program window displays (see Figure 3-6 on page 45). Confirm that the information is correct and click Next, or click Back to make the necessary corrections.

Note: We advise you to use the default Installation location.

44 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 71: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 3-6 Ready to Install window

8. Tivoli Continuous Data Protection for Files is installed on your computer. The progress of the installation is indicated by the progress bar in the installation window as shown in Figure 3-7 on page 46.

Chapter 3. Installation and configuration 45

Page 72: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 3-7 Installation progress window

9. At the end of the installation, the InstallShield Wizard Completed box displays (see Figure 3-8 on page 47). Click Finish to end the InstallShield Wizard.

Note:

� During installation, a command prompt window opens as the installer runs several scripts. Do not close or cancel this window. Let the installation run to the end.

� The installation can take up to several minutes depending on various variables, so in case the progress bar does not move forward for some time be patient and wait until the installation ends.

46 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 73: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 3-8 Installation completed window

Note:

Depending on the installation type of Tivoli Continuous Data Protection for Files, you might have to reboot your computer.

� A reboot is not necessary– When you install Tivoli Continuous Data Protection for Files for the

first time on your computer

� A reboot is necessary– When you re-install Tivoli Continuous Data Protection for Files or

upgrade to Tivoli Continuous Data Protection for Files from a previous version

– If a product that uses the IBM Tivoli Storage Manager (Tivoli Storage Manager) API is installed and running on your computer such as the Tivoli Storage Manager Backup-Archive client

If a reboot is necessary, a window will be displayed asking you to restart your system. Click Yes to reboot your computer at this time, or click No if you want to reboot at a later time.

Chapter 3. Installation and configuration 47

Page 74: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

After the installation is completed, the Initial Configuration Wizard starts automatically. For more details, refer to 3.1.2, “Configuration using the Initial Configuration Wizard” on page 48.

3.1.2 Configuration using the Initial Configuration Wizard

The Initial Configuration Wizard is new in Tivoli Continuous Data Protection for Files. It guides you through the initial setup of Tivoli Continuous Data Protection for Files. After you have finished the basic configuration settings, Tivoli Continuous Data Protection for Files will immediately be able to protect your files regarding your configuration settings.

You can always change the protection settings of Tivoli Continuous Data Protection for Files at a later time as discussed in 3.3, “Advanced configuration” on page 75.

Using the Initial Configuration Wizard, you can:

� Determine what files need continuous protection

� Determine where to store your backups

� Configure e-mail protection

� Make an initial backup (if desired)

Navigation through the Initial Configuration Wizard and the actions you can perform are done using the buttons in the lower left hand corner:

Back Brings you back to the previous page

Next Takes you forward to the next page

Finish Saves your settings (and runs the initial backup if chosen to do so). When finished, the Status page (Figure 3-18 on page 64) will be shown.

Cancel Cancels the Initial Configuration Wizard and brings you straight to the Status page (Figure 3-18 on page 64) without changing the initial protection settings

Welcome pageThe Welcome page is the first screen of the Initial Configuration Wizard (see Figure 3-9 on page 49). It lists the steps to initially set your protection settings.

Note: Not all buttons can be clicked in every page of the Initial Configuration Wizard.

48 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 75: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 3-9 Welcome page

Click Next to get to the What is Critical page.

What is Critical pageUse the What is Critical page (see Figure 3-10 on page 50) to specify the files and folders that you want to protect. The specified files, folders, and applications will be continuously protected, which means Tivoli Continuous Data Protection for Files will create backup copies to a storage area as soon as the files are changed.

Chapter 3. Installation and configuration 49

Page 76: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 3-10 What is Critical page

When Tivoli Continuous Data Protection for Files is installed, it is preconfigured with a list of files and folders to continuously protect. Use this page to confirm that the initial protection settings are correct for your needs, or change the settings as appropriate.

The protected files are listed by Folders and Files and by Applications. These lists are not exclusive of one another, but offer two views of what is protected:

� If you prefer viewing the file paths, names, and extensions that are protected, use the Folders and Files box. This option allows you to use a file tree to specify what to protect.

� If you prefer viewing the applications that are protected, use the Applications box. This option allows you to specify applications from a list. Files that are created by the listed applications are protected. The file extensions associated with the application will automatically be added to the Folders and Files list.

50 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 77: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Folders and Files boxThe Folders and Files dialog box gives a summary of the folders and files that are continuously protected. It contains either the names of protected files and folders, or, in the case of an extensive list, the number of items being protected which refer to the items in the list of folders and files. A single list item can specify more than one file.

To view all items in the list and modify the list, click the Details link. The Folders and Files Settings dialog will display.

Folder and Files Settings dialog boxIn the Folder and Files Settings dialog box (see Figure 3-11) you specify folders and files to protect by adding or removing items from the list.

Figure 3-11 Folder and Files Settings dialog box (critical files)

The top of the list box has two menu buttons. Click the buttons to include or remove items from the list.

Include Click Include to add files and folders that you want to protect. The Select folders dialog (see Figure 3-12 on page 52) will open.

Remove Select one or more list items, then click Remove to remove those items.

Note: E-mail applications are specified in the E-mail Protection page. Because these files are often very large, their protection settings are configured separately.

Chapter 3. Installation and configuration 51

Page 78: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Each row in the list has one column:

Name Patterns in the Name column specify one or more files or folders. See 3.4.2, “Interpreting file and folder patterns” on page 109 to determine what files and folders will match a Name pattern with blanks or wildcards. When a folder is protected, all of its files and sub-folders are protected.

Select folders dialog boxThe Select folders dialog box (see Figure 3-12) allows you to specify files and folders. You can browse to choose a folder, or type the name of a file or folder in the Folder name: text field. If you browse and choose a file or folder, you can modify its path in the Folder name: text field.

Figure 3-12 Select folders dialog box

Note: Only your internal drives can be protected. Any external storage devices are considered remote storage devices.

52 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 79: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Applications boxThe Applications box gives a short list of the applications that are protected.

To see the complete list of the applications that are protected, click Details. The Applications and Extensions box will display.

Applications and Extensions boxIn the Applications and Extensions box (see Figure 3-13) you specify a list of critical applications to protect.

Figure 3-13 Applications and Extensions box

The Applications and Extensions box presents a list of applications and their associated file extensions. Applications that are checked will be continuously protected.

The list of applications has two views. Each views orders the applications in a different way. Click the menu item at the top of the box to change the view.

View By Ranking The applications that have the greatest number of files on your computer are at the top of the list. The applications that have the fewest number files on your computer are at the bottom of the list.

Note: The list of applications shown in the Applications and Extensions box could differ from one computer to another. Tivoli Continuous Data Protection for Files actually checks what applications have been installed on a computer when displaying this list.

Chapter 3. Installation and configuration 53

Page 80: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

View Alphabetically The applications are listed in alphabetical order.

You can check and uncheck applications to suit your protection needs:

� If you check a box, all file extensions associated with that application will be added to the list of protected files.

� If you uncheck a box, all files with that extension will be removed from the list of protected files. Note that removing file extensions from the list of protected files does not mean adding those files to the list of files that are excluded from protection.

Click OK in any of the views to update the list of protected files. Click Cancel to leave the dialog without changing the list of protected files.

E-mail Protection pageIn the E-mail Protection page (see Figure 3-14 on page 55) of the Initial Configuration Wizard you can select the e-mail application(s) that you want to protect as well as how often you want to protect your e-mail application(s).

Important: You can add files to be protected in the Critical Settings dialog, but these applications will be protected only if the files are not excluded. Refer to 3.4.3, “Including and excluding files from protection” on page 111 for more information.

54 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 81: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 3-14 E-mail Protection page

Important: When using e-mail protection, be aware of the following:

� Because e-mail files typically are very large and frequently change, they are not backed up continuously, but only on the schedule that you select.

� E-mail files are backed up only to remote storage. If the remote storage is not available at the scheduled backup time, Tivoli Continuous Data Protection for Files will queue the backup copies for later transmission. When the remote storage area becomes available, Tivoli Continuous Data Protection for Files will create the backup copies on the remote storage area.

In case your E-mail files get changed multiple times when your remote storage area is temporarily unavailable, only the latest version of these files will be copied over to the remote storage location once it becomes available again.

Chapter 3. Installation and configuration 55

Page 82: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

E-mail Application: listSelect one of the popular e-mail applications in the list. If your application is not listed, select Other.

E-mail Application Data Folder: text fieldIf you choose your e-mail application from the E-mail Application: list, the default file type for that application will appear in this box, and you will not be able to update the file specification. You can update this field only if you select Other in the E-mail Application: list.

How often to protect your e-mail: listYou can schedule e-mail protection at one of several intervals:

Never E-mail will not be protected.

Hourly E-mail files will be backed up every hour, just after the hour.

Daily If you choose this interval, choose the time for the backup.

Weekly If you choose this interval, choose the day and time for the backup.

Monthly If you choose this interval, choose the day of the month and time for the backup.

Remote Storage pageYou can specify the remote storage for the backups of your protected files on the Remote Storage page (see Figure 3-15 on page 57).

56 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 83: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 3-15 Remote Storage page

Storing files in a remote storage area will protect the files in case local copies are lost. Backups of continuously protected files and files protected on a schedule are stored in the same remote area. Tivoli Continuous Data Protection for Files is very tolerant of intermittently available networks. If remote storage area is temporarily available, Tivoli Continuous Data Protection for Files will queue backup copies until the remote storage becomes available.

Back up to: list and Location: text fieldSpecify the remote storage device where your backup copies will be stored. Specify the type of storage in the Back up to: list and the location of your storage

Attention: If you change the same file multiple times when your remote storage area is temporarily unavailable, only the latest version of this file will be copied over to the remote storage location once it becomes available again.

Chapter 3. Installation and configuration 57

Page 84: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

device in the Location: field. What you select from the Back up to: list affects what you enter in the Location: field.

You can choose from the following remote backup locations:

� External Device or File Server

� WebDAV Server

� Tivoli Storage Manager or Tivoli Storage Manager Express Server

External Device or File ServerYou can specify a file server or removable disk to store the backup copies. The remote device can be another computer (such as a NAS or file server), a remote disk, or a removable disk.

In the Location: field, it is recommended that you use Universal Naming Convention (UNC) specification for the file server instead of drive letters when you specify a remote storage area. Drive letters can change after rebooting and often do not reconnect automatically.

Click the Browse button to view a Browse for folder dialog box. Use this dialog box to navigate to the location for your remote storage area. If this dialog box becomes hidden behind other windows, click on the task bar to bring it to the front.

Note: If you choose a WebDAV server or a Tivoli Storage Manager (Express) server as your remote backup destination, Tivoli Continuous Data Protection for Files will prompt you for a valid user name and password to authenticate the Tivoli Continuous Data Protection for Files client with the remote server. For more information refer to 4.2.3, “Single computer with ISP connection” on page 136.

Note: Using UNC, you can specify the file server either by its computer name or by its IP address.

Tip: If you choose a USB external device, you can select the drive letter. However, removable external device drive letters can change. Recommendations and detailed procedures for configuring USB drives as remote storage is described in technical note 1245761 “Instructions on how to point Continuous Data Protection for Files to a USB device“:

http://www-1.ibm.com/support/docview.wss?rs=2339&context=SS3PE6&dc=DB520&q1=1245761&uid=swg21245761&loc=en_US&cs=utf-8&lang=en

58 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 85: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Tivoli Continuous Data Protection for Files will create backup copies in a sub-folder named \RealTimeBackup\computername. For example, if a computer name is TestComputer, and the remote storage location is configured with the value \\remote\share, backup copies will be stored in \\remote\share\RealTimeBackup\TestComputer\.

If you log in to your computer with a user name and password that is also valid on your remote storage location, Tivoli Continuous Data Protection for Files will authenticate transparently into that network location. If you do not log in to your computer with a user name and password that is also valid on your remote storage location, you will need to log in to the network interactively using another account with regular privileges. You can log in interactively by using the Net Use command.

WebDAV ServerSome Internet Service Providers (ISPs) provide Web-based Distributed Authoring and Versioning (WebDAV). The WebDAV protocol provides the functionality to create, change, and move documents on a remote server. This is useful for authoring the documents which a Web server serves, but can also be used for general Web-based file storage. If your ISP provides WebDAV functionality, Tivoli Continuous Data Protection for Files can store backups on a Web-based server.

In the Location: field. enter your WebDAV server location using the following format:

https://MyISP.com/MyAcct

Tivoli Storage Manager or Tivoli Storage Manager Express ServerIn the Location: field, specify the Tivoli Storage Manager server location, using the following format:

Tip: Some versions of Windows have a concept of simplified file sharing, which allows one computer to easily connect to another computer over the network. The resulting connection allows only limited file system capabilities and inhibits the creation of backup copies. Some information, such as access control lists or file streams, can be lost. We recommend that you disable simplified file sharing on the remote storage area.

Note: When using WebDAV, Tivoli Continuous Data Protection for Files only supports the Basic Authentication method described in the HTTP 1.0 RFC. Because this authentication method sends the password as clear text over the network, we recommend that the Web server be configured to use secure sockets.

Chapter 3. Installation and configuration 59

Page 86: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

tsm://Host.com

Before Tivoli Continuous Data Protection for Files can connect to the Tivoli Storage Manager server, you need to configure your Tivoli Storage Manager server first by registering your computer where Tivoli Continuous Data Protection for Files is installed as a Tivoli Storage Manager node. Tivoli Continuous Data Protection for Files will use the password assigned at registration to connect to the Tivoli Storage Manager server. For more information about registering a Tivoli Storage Manager node for your computer, see IBM Tivoli Storage Manager for Windows: Administrator’s Guide, SC32-0121.

To avoid problems when using Tivoli Storage Manager server, see 5.2.4, “Tivoli Storage Manager issues” on page 310.

You can restore backup copies from Tivoli Storage Manager server only with the Tivoli Continuous Data Protection for Files GUI. You cannot use the Tivoli Storage Manager Backup-Archive client to restore backup copies created by Tivoli Continuous Data Protection for Files.

Maximum space for backups: fieldHere you specify how much space to use for all backup copies on remote storage.

The default size for the remote storage area is 40 GB. If you increase the number of backup versions to keep, consider increasing your storage area size. If you are unsure of how much space to allocate, you can monitor your space usage on the Status page and adjust the version and space settings accordingly.

When the storage space becomes full, Tivoli Continuous Data Protection for Files deletes older backup copy versions of files that have several backup copy versions. After deleting the versioned backup copies, if more space is needed for new backup copies, Tivoli Continuous Data Protection for Files deletes the last remaining backup copies of enough files to make room for the newest backup copy.

Note: You can use a dotted IP address instead of an IP name for the Tivoli Storage Manager server address.

Important: In order to manage storage space, the Tivoli Storage Manager administrator must grant authority to the Tivoli Storage Manager client node to delete backup copies. For steps to assign authority to delete backup copies, see “Node name defined but with “wrong” permission” on page 316.

60 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 87: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Initial Backup pageUse the Initial Backup page (see Figure 3-16) to choose if you want to back up all your files when you finish the wizard.

Figure 3-16 Initial Backup page

When you first install Tivoli Continuous Data Protection for Files, we strongly recommend that you immediately back up all files that you configured for protection. Without the initial backup, only files that change will be protected. The initial backup will protect all of the existing files that you designated for protection.

Tip: If you try to remotely back up a file which is larger than the space you have allocated for your remote storage area, Tivoli Continuous Data Protection for Files will purge all older versions of your files and might fail to back up the file. Make sure that the maximum space for your remote storage area is greater than the maximum file size for remote backup in the Advanced page of the Settings Notebook. For example, if you decrease your maximum space for backups to 1 GB, you should decrease the maximum file size for remote backup from the default of 1 GB.

Chapter 3. Installation and configuration 61

Page 88: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

The initial backup will scan all of your local drives, looking for files that you designated for protection. All files that meet your specifications will be backed up to local, remote, or both storage areas.

If you choose not to back up by the installation wizard, you can force a complete backup at a later time. At that time, use the Files to Protect page of the Settings Notebook (see “Files to Protect page” on page 79).

Summary pageUse the Summary page (see Figure 3-17 on page 63) to view a summary of your configuration choices, and decide if you want to apply your configuration choices to Tivoli Continuous Data Protection for Files.

Note: The “Yes, perform an initial backup of the system” option is selected by default.

Important: This process can take a long time and can slow down your computer. Start this initial backup when you will not be using your computer for other applications.

62 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 89: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 3-17 Summary page with initial backup

It displays the configuration you specified in the previous pages of the wizard.

� Choose Back to return to a previous page to modify your configuration choices.

� Choose Finish to apply your configuration choices. Tivoli Continuous Data Protection for Files will continue to run in the background and protect your files using the configuration choices you made.

� Choose Cancel to exit the wizard without applying your configuration choices. Tivoli Continuous Data Protection for Files will continue to run in the background and protect your files using the preconfigured settings.

Status pageAfter the Initial Configuration Wizard has completed, you will see the Status page as shown in Figure 3-18 on page 64.

Chapter 3. Installation and configuration 63

Page 90: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 3-18 Status page

The Status page is the entry to the Tivoli Continuous Data Protection for Files user interface. You can view a summary of how your files are being protected and link to other screens to view details and change protection settings. For more details see 3.3, “Advanced configuration” on page 75.

3.2 Advanced installation options

In addition to the interactive installation of Tivoli Continuous Data Protection for Files we have described in 3.1.1, “Installing Tivoli Continuous Data Protection for Files” on page 40, there are also some more advanced installation options available which we discuss in this section.

We cover the following advanced installation techniques:

64 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 91: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

� Installation using command-line parameters

� Silent installation

� Push installation

� Pull installation (upgrade)

� Providing a configuration file

3.2.1 Installation using command-line parameters

The installation process of Tivoli Continuous Data Protection for Files can be controlled by adding specific command-line parameters to the Tivoli Continuous Data Protection for Files installation executable.

A special case of the installation using command-line parameters is the silent installation. See 3.2.2, “Silent installation” on page 68 for more details about this type of installation.

General syntaxThe general syntax is:

TivoliCDP_CDPForFiles_3.1.0.45_windows.exe [parameters]

ParametersThe parameters are:

� /s

The /s command-line parameter hides the initialization dialog and causes the setup.exe to run silently.

� /l

Using the /l command-line parameter, you can specify what language to use during setup by using the appropriate decimal language identifier.

Note: The Tivoli Continuous Data Protection for Files installer is an executable file with a name like TivoliCDP_CDPForFiles_3.1.0.45_windows.exe. The installer name must include CDP and must be file type .exe. The version of the file name (3.1.0.45) can change from one version to the next.

Note: The /s parameter alone does not force a completely silent installation. For more details about silent installation, refer to 3.2.2, “Silent installation” on page 68.

Chapter 3. Installation and configuration 65

Page 92: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Example for displaying all installation dialogs in German:

TivoliCDP_CDPForFiles_3.1.0.45_windows.exe /l”1031”

� /v

The /v command-line parameter enables you to pass parameters supported by the Windows Installer through setup.exe to the MSI package.

Supported parameters are:

– /qn

The /qn command-line parameter causes everything but setup.exe to be silent.

– /l*v “path and file name”

The /l*v parameter enables verbose logging. A distinct log file name and location can be specified.

– Tivoli Continuous Data Protection for Files specific installation options

• INSTALLDIR=folder

The default installation folder is C:\Program Files\Tivoli\CDP_for_Files. If you want to install to another folder, use this option and specify the folder.

• REBOOT=ReallySuppress

Suppress system reboot after installation.

Note: For more information about language identifiers see:

http://helpnet.installshield.com/robo/projects/InstallShieldXHelpLib/IHelpGlobLangIdentifiers.htm

Not all language identifiers are currently supported by Tivoli Continuous Data Protection for Files.

Note: The /qn parameter alone does not force a completely silent installation. For more details about silent installation, refer to 3.2.2, “Silent installation” on page 68.

66 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 93: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

All parameters are optional and can be combined together in each way to suit your installation requirements and needs.

Example using specific options:TivoliCDP_CDPForFiles_3.1.0.45_windows.exe /l”1031” /v”/l*v C:\inst.log INSTALLDIR=C:\newdir”

This command will:

� Show all installation dialog boxes in German (/l”1031”)

� Log installation messages in file inst.log in the root of drive C: (/l*v C:\inst.log)

Important:

� This option is recommended when you are pushing an installation to a remote computer (see 3.2.3, “Push installation” on page 69), because rebooting after installation could be disruptive to users on the remote system.

� This option is not recommended for a local installation when a previous version of Tivoli Continuous Data Protection for Files exists.

Important: Command-line options that require a parameter must be specified with no space between the option and its parameter.

Example:

TivoliCDP_CDPForFiles_3.1.0.45_windows.exe /v”INSTALLDIR=C:\newdir”

is valid, while

TivoliCDP_CDPForFiles_3.1.0.45_windows.exe /v “INSTALLDIR=C:\newdir”

is not.

Quotation marks around an option's parameter are required only if the parameter contains spaces. If a path within a parameter contains spaces, you might need to use quotation marks within quotation marks, as in the following example:

TivoliCDP_CDPForFiles_3.1.0.45_windows.exe /v”INSTALLDIR=\”C:\new dir\””

Note that the inner quotation marks need to be masked using a backslash (\) prior to the quotation mark.

Chapter 3. Installation and configuration 67

Page 94: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

� Use the C:\newdir directory as the installation location instead of the default installation directory (INSTALLDIR=C:\newdir)

3.2.2 Silent installation

The silent installation can be considered a special case of the command-line installation (see 3.2.1, “Installation using command-line parameters” on page 65) using a specific combination of command-line parameters.

General silent installation syntax:TivoliCDP_CDPForFiles_3.1.0.45_windows.exe /s /v”/qn [options]”

OptionsThe following options are allowed:

� INSTALLDIR=folder

The default installation folder is C:\Program Files\Tivoli\CDP_for_Files. If you want to install to another folder, use this option and specify the folder.

� REBOOT=ReallySuppress

Suppress system reboot after installation.

Example using specific options:TivoliCDP_CDPForFiles_3.1.0.45_windows.exe /s /v”/qn /l*v C:\inst.log INSTALLDIR=C:\newdir REBOOT=ReallySuppress”

This command will:

� Do a silent installation (/s /v”/qn ...”)

� Log installation messages in file inst.log in the root of drive C: (/l*v C:\inst.log)

� Use the C:\newdir directory as the installation location instead of the default installation directory (INSTALLDIR=C:\newdir)

� Suppress a reboot after installation (if this would have been necessary)

A special case of silent installation is the push installation (see 3.2.3, “Push installation” on page 69), because this type of installation copies the necessary installer executable, and configuration file if specified, to a remote computer and starts a silent installation on that system.

How push installation works is shown in the following section.

68 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 95: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

3.2.3 Push installation

There are several ways to push initial installation of Tivoli Continuous Data Protection for Files to other computers on your network.

� Use Microsoft Systems Management Server to install the IBM Tivoli Continuous Data Protection for Files.msi package. Refer to the Microsoft Systems Management Server documentation:

http://www.microsoft.com/technet/sms/default.mspx

� Use IBM Tivoli Provisioning Manager Express for Software Distribution. Refer to IBM Tivoli Provisioning Manager Express for Software Distribution documentation:

http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/index.jsp?toc=/com.ibm.itpmesd.doc/toc.xml

� Place the installer executable on a file server and ask the users to invoke the installer from there at their leisure.

� Use the Tivoli Continuous Data Protection for Files fpPushInst.exe executable.

Using the fpPushInst.exe is discussed here.

fpPushInst.exe (Push Install Command)The fpPushInst.exe executable pushes a local installer executable to another computer. To be more specific, it pushes the Tivoli Continuous Data Protection for Files installer executable to the \System32\ folder in the Windows installation directory of the remote computer.

The push install executable can be found at the root of the Tivoli Continuous Data Protection for Files installation folder, which is by default C:\Program Files\Tivoli\CDP_for_Files.

The fpPushInst.exe executable can also copy a local configuration file fpa.txt to \System32\ in the Windows installation folder on the remote system and then start a service on the remote computer to invoke a silent installation using the specified configuration file fpa.txt (see 3.2.5, “Providing a configuration file” on page 74 for more information).

Note: Typically, the Windows installation directory is C:\Windows. In this case the folder where the Tivoli Continuous Data Protection for Files installer executable would be placed in is the C:\Windows\System32\ folder.

Chapter 3. Installation and configuration 69

Page 96: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

General push installation syntaxThe general push installation syntax is:

fpPushInst <\\computer> [/user:user] [/pwd:pwd|*] [/c:filename] /r <command/program [options]>

ParametersThe parameters are:

� computer

The host name of the computer where you want to install Tivoli Continuous Data Protection for Files

� /user:user and /pwd:pwd

An administrative user account and password on the remote computer

� /c:filename

The path and file name of a Tivoli Continuous Data Protection for Files configuration file on the local computer (see 3.2.5, “Providing a configuration file” on page 74). The fpPushInst.exe executable copies the local configuration file to the \System32\ folder in the Windows installation folder of the remote computer. This parameter is optional. If not specified, the configuration of the remote Tivoli Continuous Data Protection for Files client will be the default configuration.

� /r

The path and file name of the Tivoli Continuous Data Protection for Files installer file on the local computer. The installer file name must contain the string CDP and end with .exe. For example, a valid path and name is TivoliCDP_CDPForFiles_3.1.0.45_windows.exe.

Note: Due to firewall and other system settings, the fpPushInst.exe executable will not work in some environments.

Tip: The Tivoli Continuous Data Protection for Files installer looks for a configuration file named fpa.txt in the \System32\ folder in the Windows installation folder of the remote computer. Tivoli Continuous Data Protection for Files installer will not use a configuration file in that folder with any name other than fpa.txt. So, in most circumstances, the file you specify with this parameter should be named fpa.txt.

70 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 97: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Valid options are:

– /s

The /s command-line parameter hides the initialization dialog and causes the setup.exe to run silently.

– /v

The /v command-line parameter enables you to pass parameters supported by the Windows Installer through setup.exe to the MSI package.

Supported parameters are:

• /qn

The /qn command-line parameter causes everything but setup.exe to be silent.

• /l*v “path and file name”

The /l*v parameter enables verbose logging. A distinct log file name and location can be specified.

• The options for a push installation are the following:

DONT_LAUNCH_FILEPATHSRV=1This option is required for push installation. A pushed installation runs in the system context. It is not recommended that you launch Tivoli Continuous Data Protection for Files in the system context after installation. Running Tivoli Continuous Data Protection for Files in the system context can lead to failures when backing up files, or failures later when a user tries to restore files. Use this option to suppress launching Tivoli Continuous Data Protection for Files in the system context immediately after installation.

REBOOT=ReallySuppressSuppress system reboot after installation. If users are logged on to the remote system, rebooting can be disruptive.

INSTALLDIR=folderThe default installation folder is C:\Program Files\Tivoli\CDP_for_Files. If you want to install to another folder, use this option and specify the folder. The path corresponds to the remote computer.

Note: Separate the parameter and the value with a blank space, for example:

/r “C:\CDP 3.1 Code\TivoliCDP_CDPForFiles_3.1.0.45_windows.exe”

Chapter 3. Installation and configuration 71

Page 98: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Example using specific options:fpPushInst.exe \\Cairo /user:administrator /pwd:cdp4admin /c:C:\CDP_Files\fpa.txt /r “C:\CDP 3.1 Code\TivoliCDP_CDPForFiles_3.1.0.45_windows.exe” /s /v\”/qn REBOOT=ReallySuppress DONT_LAUNCH_FILEPATHSRV=1\”

This command will:

� Use computer Cairo as the remote destination for the push installation (\\Cairo)

� Log into Cairo using user administrator and password cdp4admin (/user:administrator /pwd:cdp4admin)

� Push a configuration file named fpa.txt from local folder C:\CDP_Files to the \System32\ sub-folder of the Windows installation directory on Cairo and use these protection settings during (silent) installation (/c:C:\CDP_Files\fpa.txt)

� Push the Tivoli Continuous Data Protection for Files installer file to the remote computer (/r “C:\CDP 3.1 Code\TivoliCDP_CDPForFiles_3.1.0.45_windows.exe”)

– Starting a service on the remote computer Cairo doing a silent installation (/s /v”/qn ...”)

– Not rebooting after installation (REBOOT=ReallySuppress)

– Not launching Tivoli Continuous Data Protection for Files in the system context immediately after installation (DONT_LAUNCH_FILEPATHSRV=1)

3.2.4 Pull installation (upgrade)

Once Tivoli Continuous Data Protection for Files is installed, you can silently upgrade the product by putting a new installer executable file in the downloads folder (see “Administration folders” on page 102) of the central administration area (see 3.3.2, “Central Administration Settings” on page 101). Tivoli Continuous Data Protection for Files will pull the new product code from there and install it silently on the local computer.

Important: Note that you need to mask the quotation marks surrounding the options of the /v parameter as shown in the above example by using a backslash (\) prior the quotation mark.

Do not use any unintentional spaces in the syntax for the /v parameter as this might cause the fpPushInst.exe command to fail.

72 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 99: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Tivoli Continuous Data Protection for Files checks for new installer and configuration files every 10 to 20 minutes. If the date of an installer file is more recent than the file used for the current product level, Tivoli Continuous Data Protection for Files will adopt the new product level.

When Tivoli Continuous Data Protection for Files detects a new installer file, a message displays from the system tray indicating that a new version of the software is being installed (see Figure 3-19).

Figure 3-19 Message that a new version is being installed

When the installation is complete, a message displays from the system tray indicating that the new software has been loaded, and you must reboot to resume data protection (see Figure 3-20).

Figure 3-20 Message to reboot system after pull installation

From the time that Tivoli Continuous Data Protection for Files pulls the upgrade until the computer is rebooted, Tivoli Continuous Data Protection for Files stops protecting your files. After the reboot, Tivoli Continuous Data Protection for Files continues protecting your files. Your protection settings are the same as in the previous version of the product.

Note: The new installer file name must contain the uppercase string CDP and must end with .exe. For example, a typical name is TivoliCDP_CDPForFiles_3.1.0.45_windows.exe.

Chapter 3. Installation and configuration 73

Page 100: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

3.2.5 Providing a configuration file

When Tivoli Continuous Data Protection for Files is initially installed, the installer can get configuration data from a file named fpa.txt in the \System32\ sub-folder of the Windows installation directory (see “Windows installation folder” on page 75). If this file does not exist, the installer will install Tivoli Continuous Data Protection for Files with some default configuration settings and start the Initial Configuration Wizard at the end of the installation process for you to make the initial configuration.

After the initial installation, Tivoli Continuous Data Protection for Files will pull future configuration settings from configuration files placed in a downloads folder in the central administration area (see 3.3.2, “Central Administration Settings” on page 101). New configurations will be adopted within 10 to 20 minutes after being placed in the downloads folder.

Create a configuration file from an existing client:

� Configure Tivoli Continuous Data Protection for Files

Use the Settings Notebook (see 3.3.1, “Settings Notebook” on page 76) to configure the client settings you want as the base configuration for other Tivoli Continuous Data Protection for Files clients.

� Publish the configuration

Use the “Publish this computers settings ...” check box in the Central Administration page of the user interface. A configuration file called fpcommands.xml is created in the global downloads folder in the central administration area.

Depending on if you want to use the just published configuration settings when invoking the installer or use it after an initial installation, some further actions are necessary. These options are detailed here.

Attention: Until you reboot, Tivoli Continuous Data Protection for Files will not back up any files. You will not lose any existing backup copies, but any changes you make will not be protected. If there is a long delay between install and reboot, consider forcing a backup of all protected files to protect any files that were changed during that time.

Important: If you will use this file to change a configuration after an initial installation, do not rename the file. Tivoli Continuous Data Protection for Files only pulls configuration data from a file named fpcommands.xml.

74 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 101: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

During initial installationTo use the published configuration settings when invoking the installer, rename the file to fpa.txt and place it in the \System32\ folder in the Windows installation folder of the system where Tivoli Continuous Data Protection for Files is getting installed.

After an initial installationTo use the published configuration settings after an initial installation, place the fpcommands.xml file in the downloads folder of the Tivoli Continuous Data Protection for Files client that is being updated. If you will use the configuration file for a push installation, do not configure a forced backup.

Windows installation folderTivoli Continuous Data Protection for Files references the Windows installation folder during installation while it is looking for a file named fpa.txt in the \System32\ sub-folder of the Windows installation directory.

If the fpa.txt file is present in the \System32\ sub-folder of the Windows installation directory, Tivoli Continuous Data Protection for Files will use these configurations settings (see 3.2.5, “Providing a configuration file” on page 74). If not, the Initial Configuration Wizard will be started for initial configuration of Tivoli Continuous Data Protection for Files (see 3.1.2, “Configuration using the Initial Configuration Wizard” on page 48).

3.3 Advanced configuration

When you install Tivoli Continuous Data Protection for Files for the first time, the Initial Configuration Wizard assists you with your initial protection settings.

Important: If you force a backup on a pushed installation, Tivoli Continuous Data Protection for Files will attempt to back up files in the system context. These backups can fail, and when a user later attempts to restore these files the restore can fail. To avoid a forced backup, do not check the Run “Scan Now” on other computers check box in the Central Administration Settings window.

Note: The Windows installation directory is also known by the environment variable %WINDIR% and as shared drive ADMIN$. Typically, the Windows installation directory is C:\Windows.

Chapter 3. Installation and configuration 75

Page 102: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

In this section we describe how you can change your protection settings after an initial installation by using the Settings Notebook (see 3.3.1, “Settings Notebook” on page 76). We also give you an overview of how you can manage multiple Tivoli Continuous Data Protection for Files client systems using the central administration functionality of Tivoli Continuous Data Protection for Files (see 3.3.2, “Central Administration Settings” on page 101).

3.3.1 Settings Notebook

You can access the Settings Notebook by clicking Settings from the menu of the Tivoli Continuous Data Protection for Files Status page (see Figure 3-18 on page 64).

The Settings Notebook consists of the following pages:

� General page (see “General page” on page 76)

� Files to Protect page (see “Files to Protect page” on page 79)

� E-mail Protection page (see “E-mail Protection page” on page 88)

� Remote Storage page (see “Remote Storage page” on page 94)

� Advanced page (see “Advanced page” on page 99)

In the lower left hand corner of the Settings Notebook, you have the following action buttons to control the changes you have made in the Settings Notebook:

OK Applies your new settings and returns to the Tivoli Continuous Data Protection for Files Status page

Apply Applies your new settings but stays in the Settings Notebook

Cancel Exits the Settings Notebook without applying your changes

For more details about the Settings Notebook and how to configure Tivoli Continuous Data Protection for Files in detail, refer to IBM Tivoli Continuous Data Protection for Files 3.1: Installation and User’s Guide, GC32-1783.

General pageUse the General page (see Figure 3-21 on page 77) for these settings:

� Which drive to use for your local storage area

� How many versions of protected files to keep on local storage area

� The maximum size of your local storage area

76 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 103: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

� Whether or not you want to store backup copies on local storage area, remote storage area, neither, or both

Figure 3-21 General page

Back up to: listChoose the location where your local backup copies will be stored. Local backup copies will be stored in a folder on one of your local drives. The default configuration is the non-removable local drive which has the most free space.

Tivoli Continuous Data Protection for Files will create backup copies in a sub-folder named \RealTimeBackup\. For example, if the local storage area is configured as the C:\ drive, backup copies will be stored in C:\RealTimeBackup\.

Chapter 3. Installation and configuration 77

Page 104: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

How many versions to keep: fieldTivoli Continuous Data Protection for Files can save more than one backup version of each file. When you restore a file, you can choose which version of the file you want to restore. When the configured number of versions is reached, older versions of a file are deleted. Keeping more versions requires more storage space, but allows you more choices when restoring a file.

Maximum space for backups: fieldSpecify how much space to use for all backup copies on local storage. When the storage area becomes full, older versions of files are deleted until the storage area is at about 80 percent of the configured maximum. If, after deleting all versioned backup copies, local storage space is still insufficient, Tivoli Continuous Data Protection for Files will delete the oldest non-versioned files.

The default space for local backups is 500 MB.

During a forced backup of all protected files, Tivoli Continuous Data Protection for Files can use more space than you configured for local storage. The excessive space condition is only temporary. After the forced backup of all files is complete, the first time you change a protected file, Tivoli Continuous Data Protection for Files purges files from the local storage area, if necessary, to meet the space you configured.

Continuous protection level: listTivoli Continuous Data Protection for Files offers two levels of protection for your files: continuous protection and scheduled protection. Use this list to select which storage areas to use for continuously protected files.

None No files will be continuously protected.

Note: The drive selected in the Back up to: list specifies the location where the backup copies are stored. The Back up to: list does not specify the files and folders to protect.

Important: No warning message displays when the maximum space is reached.

Tip: If you try to back up a file which is larger than the space you have allocated for your storage area, Tivoli Continuous Data Protection for Files will purge all older versions of your files and then will fail to back up the file. Make sure that the maximum space for your storage areas is greater than the file size limit in the Advanced page of the Settings Notebook.

78 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 105: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Local storage only Tivoli Continuous Data Protection for Files will create backup copies only on the local storage area.

Remote storage onlyTivoli Continuous Data Protection for Files will create backup copies only on the remote storage area.

Local and remote storageTivoli Continuous Data Protection for Files will create backup copies on both the local and remote storage areas. This provides the most protection for your files and is the default choice.

Files to Protect pageUse the Files to Protect page (see Figure 3-22 on page 80) for these settings:

� Which folders and files to continuously protect

� Which folders to vault

� Force a backup of all protected files when you change which files are continuously protected

Chapter 3. Installation and configuration 79

Page 106: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 3-22 Files to Protect page

The Files to Protect page is similar to the What is Critical page (see Figure 3-10 on page 50) of the Initial Configuration Wizard. On both pages you select the files and folders that you want to continuously protect, and you can specify the files to protect by Folders and Files and by Applications.

In addition to the What is Critical page of the Initial Configuration Wizard, you can specify in the Files to Protect page those folders that you want to vault. You can also force an initial backup of all protected files when you add some files or folders for continuous protection.

Folders and Files boxThe Folders and Files box (see Figure 3-23 on page 81) gives a summary of the folders and files that are continuously protected. The number of items protected

80 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 107: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

refers to the items in the list of folders and files. A single list item can specify more than one file.

Figure 3-23 Folders and Files box

Click the Details link to view all items in the list and modify the list. The Folder and Files Settings dialog box will display.

Folder and Files Settings dialog boxSpecify which folders and files to continuously protect by specifying those to include and those to exclude (see Figure 3-24).

Figure 3-24 Folder and Files Settings dialog box (include/exclude)

Note: This Folders and Files Settings list is similar to the list displayed in the Initial Configuration Wizard. However, the Initial Configuration Wizard only allows file additions (all of type Include). The Initial Configuration Wizard is designed to get Tivoli Continuous Data Protection for Files started quickly and easily. Any Exclude patterns exclude files from protection as soon as Tivoli Continuous Data Protection for Files is installed, but they are hidden from view during installation. Although the predefined Exclude patterns are recommended for most users, the Exclude patterns are exposed in the Settings Notebook to allow advanced users more robust configuration options.

Chapter 3. Installation and configuration 81

Page 108: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

The top of the list box has three menu buttons. Click the buttons to add and remove items from the list.

Include Click Include to add files and folders that you want to continuously protect. The Select folders box will open.

Exclude Click Exclude to add files and folders that you want to exclude from continuous and scheduled protection. The Select folders box will open.

Remove Select a list item, then click Remove to remove that list item.

Each row in the list has two columns:

Name Patterns in the Name column specify one or more files or folders. See 3.4.2, “Interpreting file and folder patterns” on page 109 to determine what files and folders will match a name pattern with blanks or wildcards.

Type Values in the Type column indicate if the files and folders should be included or excluded from protection. Files and folders of type Exclude will be excluded from continuous and scheduled protection. Files of type Include will be protected.

Select folders boxThe Select folders box (see Figure 3-25 on page 83) allows you to specify files and folders. You can browse to choose a folder, or type the name of a file or folder in the Folder name: text field. If you browse and choose a file or folder, you can modify its path in the Folder name: text field.

Important:

� When a folder is protected, all of its files and sub-folders are protected.

� Exclude has precedence over Include, so any file or folder that matches an Exclude pattern will not be protected, even if the same file or folder matches an Include pattern (see 3.4.3, “Including and excluding files from protection” on page 111).

82 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 109: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 3-25 Select folders box

Applications boxThe Applications box (see Figure 3-26) gives a short list of the applications that are protected.

Figure 3-26 Applications box

To see the complete list of the applications that are protected, click Details. The Applications and Extensions box will display.

Note: Only your internal drives can be protected. Any external storage devices are considered remote storage devices.

Chapter 3. Installation and configuration 83

Page 110: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Application Settings boxThe Applications and Extensions box (see Figure 3-27) has a list of applications and their associated file extensions. Applications that are checked will be continuously protected.

Figure 3-27 Application Settings box (applications viewed by ranking)

The list of applications has two views. Each view orders the applications in a different way. Click the menu item at the top of the box to change the view.

View By Ranking The applications that have the greatest number of files on your computer are at the top of the list. The applications that have the fewest number of files on your computer are at the bottom of the list.

View Alphabetically The applications are listed in alphabetical order.

You can check and uncheck applications to suit your protection needs:

� If you check a box, all file extensions associated with that application will be added to the list of protected files.

� If you uncheck a box, all files with that extension will be removed from the list of protected files. Note that removing file extensions from the list of protected files does not mean adding those files to the list of files that are excluded from protection.

Note: The list of applications shown in the Applications and Extensions box can differ from one computer to another. Tivoli Continuous Data Protection for Files actually checks what applications have been installed on a computer when displaying this list.

84 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 111: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Click OK in any of the views to update the list of protected files. Click Cancel to leave the box without changing the list of protected files.

Vault boxThe Vault box (see Figure 3-28) displays a summary of vaulted folders.

Figure 3-28 Vault box

To change the folders that are protected, click Details. The Vault Settings box displays.

Vault Settings boxThe Vault Settings box (see Figure 3-29) displays a list of folders. All files in these folders and all sub-folders will be protected from being changed or deleted.

Figure 3-29 Vault Settings box

Vaulted folders cannot be modified nor deleted. Files can be added to the folder, but the files in the folder cannot be changed nor deleted.

Vault Click Vault to open a browser to choose the folder(s) to protect.

Unvault Click Unvault to remove vault protection from the selected folder and all its files and sub-folders.

Chapter 3. Installation and configuration 85

Page 112: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

� Click the OK button to add your changes to the pending settings updates.

� Click the Cancel button to exit the box without applying changes.

For more information about how to specify a vaulting duration, see 3.4.4, “Vault duration” on page 114

Back up with new settings check boxUse the Back up with new settings check box (see Figure 3-30) to scan all drives and back up all files that are configured for protection.

Figure 3-30 Back up with new settings check box

If you changed the specifications for Folders and Files or Applications to include files that were not previously protected, we strongly recommend that you back up those files now. Check the box to scan and protect all files when you click the Settings Notebook OK or Apply button.

A backup is not necessary to activate vault protection. If you changed Vault settings, the folders become vaulted when you click the Settings Notebook OK or Apply button. Changing the Vault settings does not require a forced backup.

Important: Neither the Exclude nor Include items from other dialog boxes affect the list of vaulted folders. All folders in the Vault Settings box, and only the folders in the Vault Settings box, will be vaulted.

Note: The configured settings will not be applied until you click the Settings Notebook OK or Apply button

Note: During a forced backup of all protected files, Tivoli Continuous Data Protection for Files can use more space than you configured for local storage. The excessive space condition is only temporary. After the forced backup of all files is complete, the first time you change a protected file, Tivoli Continuous Data Protection for Files purges files from the local storage area, if necessary, to meet the space you configured.

86 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 113: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

After this scan and backup is complete, Tivoli Continuous Data Protection for Files will continue to operate in the background without any significant impact on your regular computing activities.

Tip:

Occasions in which you should consider backing up all files:

� When you first install Tivoli Continuous Data Protection for Files, we strongly recommend that you immediately back up all files that you configured for protection. Without the initial backup, only files that change will be protected. The initial backup will protect all of the existing files that you designated for protection.

� After the initial backup, the typical rate of file changes does not require that you again back up all files at once. If you change the specifications for Folders and Files or Applications to include files that were not previously protected, the new files need to be backed up. If you extend protection to new e-mail files or other files that are included in scheduled backups, the new files need to be backed up. Until you change these files, and without a forced backup, Tivoli Continuous Data Protection for Files will not back up these files. To protect these files, you must force a backup of all files.

� If you don’t change your configuration but suddenly make a significant change to the files that are configured for protection, you should also force a backup of all files. Consider this if you add a new drive whose files are configured for protection.

When you should not backup all files:

� When you push an installation of Tivoli Continuous Data Protection for Files to a remote computer and do not reboot. If you force a backup on a pushed installation without rebooting, Tivoli Continuous Data Protection for Files will attempt to back up files in the system context. These backups can fail, and when a logged on user later attempts to restore these files the restore can fail.

� If you are creating a configuration file for a push installation, do not check this box.

Chapter 3. Installation and configuration 87

Page 114: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

E-mail Protection pageUse the E-mail Protection page (see Figure 3-31 on page 89) for these settings:

� What e-mail application, if any, to protect including the schedule frequency to protect your e-mail:

– Never

– Hourly

– Daily

– Weekly

– Monthly

� What files are backed up on a schedule, which tasks are run:

– Choose which files to back up on a schedule

– Start a backup of your scheduled files immediately

– View reports of your scheduled backups

Important: A forced backup causes Tivoli Continuous Data Protection for Files to scan all local drives looking for files that you designated for protection This means that all files that meet the include, exclude, and size criteria will be copied to the local, remote, or both storage areas. The creation of backup copies could take several hours. It will also take significant processing resources. Plan the backup at a time when you do not need computing resources for other activities.

88 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 115: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 3-31 E-mail Protection page

E-mail Application: listTivoli Continuous Data Protection for Files has predefined protection settings for the following e-mail applications:

Lotus Notes Associated suffixes: *.id and *.nsf

Microsoft Outlook Associated suffix: *.pst

Microsoft Outlook Express 5.5, 6Associated suffixes: *.mbx and *.dbx

In the E-mail Application list you can select one of the given e-mail applications (Lotus Notes, Microsoft Outlook, Microsoft Outlook Express 5.5, 6), none of them (Select Applications), all together (All), or Other if you are using another e-mail application (see Figure 3-32 on page 90).

Chapter 3. Installation and configuration 89

Page 116: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 3-32 E-mail Application: list

E-mail Application Data Folder: text fieldIf you choose your e-mail application from the E-mail Application list, the default file type for that application will display in the E-mail Application Data Folder box, and you will not be able to update the file specification. You can update this field only if you select Other in the E-mail Application list.

In case you have selected Other, enter in the E-mail Application Data Folder text field the suffix(es) your e-mail application is using, for example *.mail (see Figure 3-33).

Figure 3-33 E-mail Application Data Folder: text field

How often to protect your e-mail: listYou can schedule e-mail protection at one of several intervals:

Never E-mail will not be protected.

Hourly E-mail files will be backed up every hour, just after the hour.

Daily If you choose this interval, choose the time for the backup.

Note: For backing up large e-mail application files which exceed the specified maximum file size threshold for sub-file copies (see “Use sub-file copy for files larger than: field” on page 99), Tivoli Continuous Data Protection for Files is using a bitmap backup mechanism, which means only the changed blocks of a file are sent to the remote backup target.

The versioned bitmap backups of a file which have been backed up using the bitmap backup mechanism, have a -TPdelta file name suffix.

90 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 117: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Weekly If you choose this interval, choose the day and time for the backup.

Monthly If you choose this interval, choose the day of the month and time for the backup.

Scheduled Backup Settings linkClick the Scheduled Backup Settings link to open the Folders and Files Settings box (see Figure 3-34) for scheduled backup.

Folder and Files Settings boxIn the Folder and Files Settings box you specify folders and files to back up on the same schedule as e-mail files are backed up.

Figure 3-34 Folder and Files Settings box (schedules)

Start scheduled backup now check boxThe folders and files that you specify will be backed up on the same schedule as your e-mail backups. If you want to force a backup now, check the Start scheduled backup now box and click the OK button.

Chapter 3. Installation and configuration 91

Page 118: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

View Report linkClick the View Report link to open a table of scheduled backup reports for all computers that share a common central administration folder. For more information about central administration see 3.3.2, “Central Administration Settings” on page 101.

Scheduled backup reports tableUse the reports table (see Figure 3-35 on page 93) to monitor scheduled backups to remote storage areas.

Note: Considerations for scheduled backups

� Files that are appropriate to protect on a schedule

Large or frequently saved files can consume considerable computing or network resources when they are backed up. You can scheduled periodic backups of these files when the burden on computing or network resources will be least inconvenient.

Some files are not often closed and saved, but should be backed up periodically. Files protected by schedule will be backed up even if they are open, but you can try to schedule the backup for a time when the file will be closed.

The files you select for scheduled protection will be backed up only at the scheduled time and only if they change during the scheduled interval. This can yield fewer backup versions than continuously protected files. Fewer backup versions use less storage space, but offer fewer opportunities when you want to restore a file.

� Closing applications before a scheduled backup

Tivoli Continuous Data Protection for Files backs up all files that have changed during the schedule interval, including files that are still open at the time of backup. The backup copies of files that are backed up while open can be corrupted. So, we recommend that you close applications before a scheduled backup. Tivoli Continuous Data Protection for Files offers an opportunity to close applications before a scheduled backup.

At the beginning of a scheduled backup, Tivoli Continuous Data Protection for Files attempts to close all files that are listed in a text file called closeapps.txt in the installation directory. Each line in the file must be a program name, with name and extension, but no folder path. Tivoli Continuous Data Protection for Files sends a close command to each instance of every program named in the closeapps.txt file. Note that Tivoli Continuous Data Protection for Files will not send a start command to any of those programs when the scheduled backup is finished.

92 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 119: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 3-35 Scheduled backup reports table

The scheduled backup reports table gives a summary of scheduled backups to remote storage areas for all computers who share a common central administration folder. To see the reports table, you must be connected to your remote storage area.

Each row identifies the reports associated with one Tivoli Continuous Data Protection for Files client and contains the following cells:

Version The version of Tivoli Continuous Data Protection for Files

Last Backup The last completed scheduled backup

Files A number indicating approximately how many files were successfully backed up at the last schedule. Due to the nature of the program and how the logging is done, this number is only an approximation. Click the number to

Chapter 3. Installation and configuration 93

Page 120: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

display a complete report of the scheduled backup. In addition to files backed up, the report shows administrative activities and failed backup attempts.

Failures This column indicates how many errors there were during the backup. Click the number to display a report of the errors during scheduled backup.

History Click the link to display a list of the historical backup and failure logs. Once this list is displayed, you are able to click on logs to display more information. Only reports which had actual files backed up will show as active links.

Remote Storage pageUse the Remote Storage page (see Figure 3-36 on page 95) for these settings:

� Your remote storage area

� How many versions of protected files to keep on remote storage area

� The maximum size of your remote storage area

� Whether or not to encrypt, compress, or use sub-file copy for backup copies stored on remote storage area

94 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 121: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 3-36 Remote Storage page

Storing files in a remote storage area will protect the files in case local copies are lost. Backups of continuously protected files and files protected on a schedule are stored in the same remote area. Tivoli Continuous Data Protection for Files is tolerant of intermittently available networks. If a remote storage area is temporarily available, Tivoli Continuous Data Protection for Files will queue backup copies until the remote storage becomes available.

Attention: If you change the same file multiple times when your remote storage area is temporarily unavailable, only the latest version of this file will be copied over to the remote storage location once it becomes available again.

Chapter 3. Installation and configuration 95

Page 122: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Advanced SettingsYou can specify the following advanced settings for your backups going to a remote storage location:

� Encrypt your backups

� Compress your backups

� Activate sub-file backups

Encrypt backups buttonSet encryption for remote backup copies.

The encryption feature provides extra security on your remote location. This can be useful if multiple users have access to the remote server location, and you need to ensure that each user’s data is protected from other users, or anyone else who has access to the remote server.

When you click the button labeled Encrypt backups, at the next backup process Tivoli Continuous Data Protection for Files will display a box so that you can create a password for the encrypted files (see 4.3.3, “Small business with a file server” on page 167). This password will be required to view or access any files which are backed up by Tivoli Continuous Data Protection for Files. The encrypted password is kept either in the data directory (new installation) or in the installation directory (upgrade installation from Tivoli Continuous Data Protection for Files V2.x). If the files in this directory are lost, you will be prompted to enter a new password.

General things to know about encryption:

� Files stored on the local storage area are not encrypted.

Note:

� Encryption and compression are mutually exclusive: you can specify either one or the other, but not both at the same time.

� Encryption and compression can both be combined with sub-file backups.

Tip: To enable encryption for your remote backup copies, press the Encrypt backups button. If you want to disable encryption, press this button again.

Note: Once encryption has been enabled, the password is stored. If you disable encryption, then enable it again, you will not be prompted for a new password.

96 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 123: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

� Files that are compressed using the compression option of Tivoli Continuous Data Protection for Files, cannot be encrypted, and the user interface will not allow you to configure both encryption and compression.

� Files that use sub-file copy can be encrypted.

In case you want to use Tivoli Storage Manager API encryption instead of letting Tivoli Continuous Data Protection for Files encrypt the files, you need to be aware that Tivoli Continuous Data Protection for Files does not support prompted encryption. So, if you specify a Tivoli Storage Manager server as your remote storage area, you must configure non-prompted encryption in the Tivoli Storage Manager API client dsm.opt options file. In the dsm.opt file, use the statement:

encryptkey save

See 3.4.1, “Installation and data directories” on page 108 to learn where the dsm.opt file can be found on your computer. For more information about setting encryption options in the Tivoli Storage Manager dsm.opt file, refer to Chapter 9, “Using processing options”, in IBM Tivoli Storage Manager for Windows: Backup-Archive Clients Installation and User’s Guide, SC32-0146.

Compress backups buttonSet compression for remote backup copies.

Use compression to save space on your remote storage location. The compression feature is not compatible with the encryption feature. You can use

Important: The Tivoli Storage Manager API also has the ability to encrypt files when backing them up to a Tivoli Storage Manager server. This capability is transparent to the Tivoli Continuous Data Protection for Files client making it possible, but not recommended, to enable encryption with both applications.

Important: Tivoli Continuous Data Protection for Files cannot protect backup copies that it has encrypted. This is an issue only if you store backup copies on a file server and then protect the files on the file server. If you configure Tivoli Continuous Data Protection for Files to encrypt the backup copies to a file server, you must not use Tivoli Continuous Data Protection for Files to protect the encrypted backup copies on that file server. You can use Tivoli Storage Manager or another backup solution to protect the encrypted backup copies on that file server.

Tip: To enable compression for your remote backup copies, click the Compress backups button. If you want to disable compression, click this button again

Chapter 3. Installation and configuration 97

Page 124: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

compression or encryption, but not both simultaneously. Files backed up using the compression function must be restored using Tivoli Continuous Data Protection for Files.

If you enable both compression and sub-file copy, sub-file copy has precedence. This means that a file which has a size larger than the minimum for sub-file copy will not be compressed, since it is subject to sub-file copy activity. Only files smaller than the minimum size for sub-file copy will be compressed.

Use sub-file copy check boxCheck the box to turn on sub-file copy for remote backup copies.

Initially, an entire file is copied to the storage area. When sub-file copy is turned on, and when the file changes, only the changed information is copied to the storage area. The sub-file copies are saved as separate files on the remote storage.

Sub-file copy can significantly reduce the amount of network traffic. However, sub-file copy consumes more processing resources on your computer. The default setting is to use sub-file copy for files larger than 50 MB. If you need to conserve more network resources, you can reduce the size setting so sub-file copy will be used on even smaller files.

Important: Tivoli Continuous Data Protection for Files is using a LZW compression algorithm. This can result in files actually getting larger in size when they are stored on the remote target location, if those files have already been stored locally in a compressed (or pseudo-compressed) format, such as ZIP, AVI, or MP3 files.

Note: If a file has been compressed by Tivoli Continuous Data Protection for Files, an additional suffix .cdp will be added to the original name of the file name, for example the local file name compressed_file.txt will become compressed_file.txt.cdp on the remote storage location.

Attention: Currently Tivoli Continuous Data Protection for Files does not support sub-file backups to a Tivoli Storage Manager server and a Microsoft Internet Information Services (IIS) Server as the remote backup destination even though you can check the sub-file backup option.

Note: The sub-file copies of a file which has been backed up using the sub-file backup option, have a -FPdelta file name suffix.

98 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 125: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Use sub-file copy for files larger than: fieldIn the Use sub-file copy for files larger than: field, specify the file size threshold for using sub-file copy. For files larger than this size, only the changed information is copied to the storage area.

Advanced pageUse the Advanced page (see Figure 3-37 on page 100) for these settings:

� Whether to allow program messages to pop up

� Performance settings, including the following:

– Maximum size file to protect on local storage area

– Maximum size file to protect on remote storage area

– Maximum speed for transfer to remote storage area

� Contains a link to set your scheduled backups (see Figure 3-31 on page 89)

Note: Activating sub-file copy and specifying the file size threshold for using sub-file copy does affect the way e-mail files will be backed up by Tivoli Continuous Data Protection for Files (see “E-mail Application Data Folder: text field” on page 90 for more information).

Chapter 3. Installation and configuration 99

Page 126: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 3-37 Advanced page

Allow program messages to pop up: listFor certain types of activities or notifications, Tivoli Continuous Data Protection for Files opens messages from the icon in the system tray. To prevent the messages from opening, select Disabled.

Performance SettingsIn the Performance settings area you can specify how Tivoli Continuous Data Protection for Files handles large files (locally and remotely) and restrict the transfer rate when backing up to the remote storage destination:

Attention: If messaging is disabled, important program messages regarding the failure of Tivoli Continuous Data Protection for Files operations will be suppressed, which could lead to loss of data.

100 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 127: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Do not locally back up files larger than: fieldLimit the size of files that are backed up to your local storage area. If you try to back up a file which is larger than the space you have allocated for your storage area, Tivoli Continuous Data Protection for Files will purge all older versions of your files, and then will fail to back up the file. Make sure that the file size limit in this field and the size limit for files backed up to remote storage is less than the maximum space for your storage areas.

Do not remotely back up files larger than: fieldLimit the size of files that are backed up to your remote storage area.

Maximum remote transfer rate: fieldYou can set a limit on the volume of data that Tivoli Continuous Data Protection for Files transfers to remote storage. Consider limiting the transfer rate if you need to ease the burden on your network.

3.3.2 Central Administration Settings

Tivoli Continuous Data Protection for Files has features that allow an administrator to manage the configuration of other Tivoli Continuous Data Protection for Files clients. You can manage the installed product level and configuration of other Tivoli Continuous Data Protection for Files clients and monitor their (schedule) activity reports.

The following tasks can be managed using central administration:

� Pulling of new product level (pull installation) and configuration settings

Once Tivoli Continuous Data Protection for Files is installed, you can update the product level and configuration by putting the installer and configuration file in the appropriate downloads folder for the consuming clients (see 3.2.4, “Pull installation (upgrade)” on page 72).

� Central sharing of configuration data and monitoring of (schedule) activity reports

You can configure the downloads and reports folders of the managed clients and the central administration folder of the managing client. You must configure each so that so that the managed clients consume the configuration and information exported by the managing client. The same configuration allows the managing client to view the activity reports of the managed clients. You can change the administration folder of the managing client to communicate with different groups of managed clients.

Note: The central management feature is only available with the PC Edition and Server Edition of Tivoli Continuous Data Protection for Files.

Chapter 3. Installation and configuration 101

Page 128: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

For the latter one, refer to the examples given in Chapter 7, “Central Management Considerations”, in IBM Tivoli Continuous Data Protection for Files 3.1: Installation and User’s Guide, GC32-1783.

� Pushing an installation of Tivoli Continuous Data Protection for Files to other computers (push installation)

Tivoli Continuous Data Protection for Files includes an executable that will push an installation of the product to other computers. You can also push a specific configuration file at the time of the installation (see 3.2.3, “Push installation” on page 69).

Before we explain the concept of central administration and its settings, you need to understand what kind of administration folders Tivoli Continuous Data Protection for Files has and what they are needed for.

Administration foldersTivoli Continuous Data Protection for Files uses special folders to manage configuration settings and product level. Tivoli Continuous Data Protection for Files clients pull configuration information and new product code from these folders. They also store their status reports in these folders and can push their own configuration information to these folders for other clients to consume.

The folder for central administration is specified in the Central Administration Folder field in the Central Administration Settings window (see Figure 3-38 on page 104):

� If the Central Administration Folder: field is not configured, then the central administration folder defaults to the \RealTimeBackup\ folder in the remote storage area.

� If neither the Central Administration Folder: field nor a remote storage area is configured, then there is no central administration folder.

The central administration folder contains two levels of administrative sub-folders:

Group administrative sub-foldersThese folders apply to all computers that share this central administration folder.

Note: There is no central administration folder on Tivoli Storage Manager server remote storage. If you define a Tivoli Storage Manager server as your remote backup location and you want to use central administration folders, you must configure the Central Administration Folder: field in the Central Administration Settings window.

102 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 129: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Computer-specific sub-foldersThese folders apply to only one computer.

In each level of administrative sub-folders, there are two folders:

The Reports folder Tivoli Continuous Data Protection for Files stores status reports in the Reports folder. You can view the reports using the user interface of Tivoli Continuous Data Protection for Files. The full path is <central administration folder>\BackupAdmin\Reports\.

The Downloads folderWhen you put product upgrades or configuration files in this folder, Tivoli Continuous Data Protection for Files will automatically adopt the product upgrades or configuration. For more information about this process, see 3.2.4, “Pull installation (upgrade)” on page 72. The full path is <central administration folder>\BackupAdmin\Downloads\.

Central Administration Settings windowYou can open the Central Administration Settings window (see Figure 3-38 on page 104) by clicking Central Administration from the menu of the Tivoli Continuous Data Protection for Files Status page (see Figure 3-18 on page 64).

The Central Administration Settings window allows you to:

� Identify administration folders for this computer.

� Manage the configuration settings on other computers.

Note: For pulling product upgrades or configuration files from the central administration area, the managed Tivoli Continuous Data Protection for Files clients must have read access to the administration folders.

Chapter 3. Installation and configuration 103

Page 130: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 3-38 Central Administration Settings window

Central Administration Folder: fieldType or browse for a folder that will be the central administration folder for this computer. The administrative tasks on the Central Administration Settings window are limited to only those computers that are centrally managed from this folder.

The central administration folder is used for several purposes. You can change the folder depending on your purpose (see “Administration folders” on page 102).

Note: If you type the name of a folder that does not exist, Tivoli Continuous Data Protection for Files will create the folder.

104 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 131: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Publish this computer’s settings ... check boxWhen managing Tivoli Continuous Data Protection for Files on a group of computers, it is customary to configure one computer as the template for all computers in the group. If you have configured other computers to share the central administration folder of this computer, they can be centrally managed by this computer. Check this box to use this computer’s settings to configure the other computers. When you click the OK button, this computer’s configuration settings file will be copied to the downloads sub-folder of the central administration folder that is shared by the group of computers (see Figure 3-39). All computers that share the central administration folder will adopt the Tivoli Continuous Data Protection for Files configuration that you publish.

Figure 3-39 Successfully published fpcommands.xml pop-up window

If you publish this computer’s settings, your management of the group can be further extended:

Lock the configuration of other computers check boxCheck this box to prevent any of the centrally managed computers from changing their settings.

Run “Scan Now” on other computers check boxWhen you change a configuration to protect files and folders that were not previously protected, you should back up all files (see “Back up with new settings check box” on page 86 for considerations when backing up all files).Check this box to force the centrally managed computers to back up all protected files.

Note: If you will use the published configuration file to push installation to another computer, all Tivoli Continuous Data Protection for Files clients that share the central administration folder with the new client will be prevented from updating their configurations.

Chapter 3. Installation and configuration 105

Page 132: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

View Report linkClick the View Report link to display a table of scheduled backup reports for the computers that are centrally managed. A new browser window opens with the scheduled backup reports table (see Figure 3-40 on page 107).

Scheduled backup reports tableUse the reports table to monitor scheduled backups to remote storage areas.

Note:

� Publishing to managed computers a configuration file with this setting can put a large burden on the network and the computing resources of the managed computers.

� If you will use the published configuration file to push installation to another computer, do not check this box. If you use this configuration setting in a push install, the push-installed Tivoli Continuous Data Protection for Files client will create backup copies in the system context. When you later run Tivoli Continuous Data Protection for Files in the user context, you can have problems restoring these files.

106 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 133: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 3-40 Scheduled backup reports table

The scheduled backup reports table gives a summary of scheduled backups to remote storage areas for all computers that share a common central administration folder. For more information on central administration folders, refer to “Administration folders” on page 102.

Each row identifies the reports associated with one Tivoli Continuous Data Protection for Files client, and contains the following cells:

Version The version of Tivoli Continuous Data Protection for Files.

Last Backup The last completed scheduled backup.

Note: To see the reports table, you must be connected to your remote storage area.

Chapter 3. Installation and configuration 107

Page 134: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Files This column indicates approximately how many files were successfully backed up at the last schedule. Due to the nature of the program and how the logging is done, this number is only an approximation. Click the number to display a complete report of the scheduled backup. In addition to files backed up, the report shows administrative activities and failed backup attempts.

Failures This column indicates how many errors there were during the backup. Click the number to display a report of the errors during scheduled backup.

History Click the link to display a list of the historical backup and failure logs. Once this list is displayed, you are able to click on logs to display more information. Only reports which had actual files backed up will show as active links.

3.4 Additional considerations

The following section lists several important concepts for consideration when implementing and maintaining Tivoli Continuous Data Protection for Files.

3.4.1 Installation and data directories

Depending on the operating system and type of installation - new versus upgrade installation - the path of the installation directory and the data directory might differ from one computer to another.

The Tivoli Continuous Data Protection for Files program files will be installed in the installation directory you specify during your initial installation (see 3.1.1, “Installing Tivoli Continuous Data Protection for Files” on page 40). If you are upgrading an older version of Tivoli Continuous Data Protection for Files, the installation directory of this version will be used to place the program files of Tivoli Continuous Data Protection for Files.

If you are installing Tivoli Continuous Data Protection for Files for the first time, the configuration file (fpa.txt), the Tivoli Storage Manager client options file (dsm.opt), the log files as well as some other important files will be stored in a special data directory. In case you are upgrading to Tivoli Continuous Data Protection for Files from a prior version, these files will be placed in the installation directory of the previous Tivoli Continuous Data Protection for Files version.

108 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 135: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Table 3-1 shows an overview of the used directories depending on the operating system and type of installation.

Table 3-1 Default installation and data directories

If you need to see the files in the data directory, this might not be possible at first, because this folder is hidden by the operating system by default.

To allow hidden folders and files to be displayed by the operating system, follow these steps:

1. Select Start → Run, type explorer, and click OK. This opens the Windows Explorer.

2. Click Tools, and select Folder Options... .

3. Click the View tab to show the current folder settings.

4. In the Advanced settings area click the Show hidden files and folders radio button.

5. Click OK to close the Folder Options window.

6. To exit the Windows Explorer, click File and select Close.

3.4.2 Interpreting file and folder patterns

Protection settings use patterns to specify what files and folders to protect. The files and folders that are protected depend on blanks before and after a pattern and asterisks in the pattern.

You can enter the complete path of a file that you want to protect. For example, C:\Documents and Settings\Administrator\My Documents\testfile.doc. The complete path unambiguously matches a single file. But to specify all files this way would be time consuming. Use asterisks and blanks as wildcards in the pattern to specify several files.

Installation directory Data directory (fpa.txt, dsm.opt, log files, and so on.)

Windows XP, 2003– new installation

C:\Program Files\Tivoli\CDP_for_Files\

aC:\Documents and Settings\All Users\Application Data\Tivoli\CDP_for_Files\

a. By default, the \Application Data\ is a “hidden folder”.

Windows XP, 2003– upgrade installation

C:\Program Files\Tivoli\CDP_for_Files\

C:\Program Files\Tivoli\CDP_for_Files\

MS Vista– new installation

C:\Program Files\Tivoli\CDP_for_Files\

C:\ProgramData\Tivoli\CDP_for_Files\

Chapter 3. Installation and configuration 109

Page 136: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

As an example, assume a pattern “fish”. This pattern matches:C:\dir\fish.doc and C:\fish\testfile.doc and C:\fishfood\something.

If the pattern has slashes around it (\fish\), it will match any object with \fish\ somewhere in the path. This pattern matches for example C:\FisH\testfile.doc but not C:\dir\fish.doc and not C:\fishfood\something.

Table 3-2 File and folder pattern matches

Tip:

� An asterisk matches any number of characters in a file path. If there are no asterisks, then Tivoli Continuous Data Protection for Files will match any file whose fully expanded path name has that exact pattern anywhere in the path or filename.

� If there are no asterisks in the pattern, then blank spaces before and after the pattern are interpreted as asterisks. So, \myDocs\ and *\myDocs\* yield the same matches. If there are asterisks in the pattern, then blank spaces before or after the pattern match no characters. So, \myDir\, *\myDir\, and \myDir\* could yield three different matches (see examples in Table 3-2).

Note: The pattern is not case-sensitive.

This pattern ... ... matches these folders and files on your computer:

\myDir\ or\mYdiR\ or*\myDir\* or*\mydir\*

C:\myDir\C:\myDir\Contacts\C:\myDir\Contacts\contacts.txtC:\Projects\myDir\C:\Projects\myDir\myThings\C:\Projects\myDir\myThings\things.docC:\Projects\myDir\myThings\myPhoto.jpgD:\Notes\myDir\

*\myDir\ C:\myDir\C:\Projects\myDir\D:\Notes\myDir\

\myDir\*

d:*\mydir\* D:\Notes\myDir\

110 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 137: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

3.4.3 Including and excluding files from protection

Protected files are specified by including files and by excluding files.

Continuous and scheduled protection (not vaulted)Tivoli Continuous Data Protection for Files keeps a list of files that are included for protection and a list of files that are explicitly excluded from protection. The list of included files is separated into those that are included for continuous protection and those that are included for scheduled protection. The list of excluded files applies to both continuous and scheduled protection.

A file is on the include list if it is defined in the Folders and Files list by a pattern with type Include. Similarly, a file is on the exclude list if it is defined by a pattern with type Exclude. It is possible that a file can be on both the include list and the exclude list.

\my best C:\Books\My Best.docC:\Photos.jpg\My Best Photo\C:\Photos.jpg\My Best Photo\Best.jpgF:\Projects\My Best Project\F:\Projects\My Best Project\Dream.xls

.jpg C:\Photos.jpg\C:\Photos.jpg\myHouse.bmpC:\Photos.jpg\My Best Photo\Best.jpgC:\Projects\myDir\myThings\myPhoto.jpg

*.jpg C:\Photos.jpg\C:\Photos.jpg\My Best Photo\Best.jpgC:\Projects\myDir\myThings\myPhoto.jpg

E:\ orE:\*

All files and folders on the E: drive.

This pattern ... ... matches these folders and files on your computer:

Chapter 3. Installation and configuration 111

Page 138: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

The table below (see Table 3-3) summarizes the interaction of inclusion and exclusion. The two left columns indicate if a file is included or excluded, and the right column indicates if the inclusion and exclusion yield protection for the file.

Table 3-3 Interaction of inclusion and exclusion

Attention:

To avoid situations where you think you protect a file or folder but indeed you do not (or vice versa), be aware of how include and exclude lists work in Tivoli Continuous Data Protection for Files:

� If a file (or folder) is on the exclude list, it will not be protected, neither by continuous protection nor by scheduled protection. Even if the file (or folder) is also on an include list, it will not be protected.

� If a file is on an include list and not on the exclude list, it will be protected.

� If a file is not on an include list, it will not be protected.

File is specified on Include list

File is specified on Exclude list

Is file protected?

No No No

No Yes No

Yes No Yes

Yes Yes No

Note:

Locations where files and folders can be added (and removed) from include and exclude list:

� You add items to the include list in several places where settings are configured.

� You add items to the exclude list in only one place: the Folder and Files Settings box of the Files to Protect page of the Settings Notebook.

112 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 139: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

.

Figure 3-41 Folder and Files Settings box (example include/exclude settings)

For example, the list above includes only \My Documents\ and excludes only *.test. The result is that any files with .test file extension in \My Documents\ folder will not be protected. All other files in \My Documents\ folder and its sub-folders will be protected.

For another example, using the same list above, if you choose an application in the Application Settings box that typically creates files with extension .test, those .test files will not be protected.

For example, consider a small variation to an excluded pattern: \Temp\. If you used instead \temp (without the closing folder delimiter), this would have a very different effect. Even though this might seem like a small change, it has a potentially large impact. All files which have \temple, \temptation\, \temperature\, \template\, and other variations of \temp*, would be excluded from protection.

Note: Tivoli Continuous Data Protection for Files provides a default list of files and folders to be included and excluded. This list excludes from protection various Windows operating system files, the Program Files folder, and temporary files. These exclusions are recommended.

Attention: Be very careful when excluding items. Because the patterns in your list can match more than one folder or file, be careful that you do not exclude some files by mistake. See 3.4.2, “Interpreting file and folder patterns” on page 109 for an explanation of how patterns match file and folder names.

Chapter 3. Installation and configuration 113

Page 140: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Consider another example. You choose to exclude *.gif so you can avoid backing up files saved by your browser when you open different Web sites. This pattern will also exclude all .gif files in \My Pictures\ folder.

Vaulted foldersVaulted folders, and the files in them, are not affected by the exclude list, nor by the lists of files that are specified for continuous or scheduled protection. All files that you select in the Vault settings box of the Files to protect page of the Settings Notebook will be vaulted.

3.4.4 Vault duration

You can specify the duration of vaulting by using special folder names. Files in these folders will be vaulted for a specific period of time and after that time the files will not be vaulted.

To specify duration of vaulting, create a folder named \KeepSafe\ in any vaulted area. In the \KeepSafe\ folder, create folders that indicate the vaulting period. For example, C:\CDP_Vault\KeepSafe\Retain 3 years\. Any file created in that folder will be prevented from alteration or deletion for three years. After the expiration time, the file is no longer vaulted. There are three ways to indicate the vaulting period. Each way requires that you use a keyword in the folder name.

� \KeepSafe\RetainForever\

Files in this folder will be vaulted forever. Such material can never be moved to another folder with shorter vaulting duration. Material can be moved within the folder tree and to other folders of the same duration.

� \KeepSafe\Retain Duration\

Specify exact vaulting periods using English terminology. Duration is specified by a combination of the following time units:

– Years

– Days

– Hours

– Minutes

– Seconds

Use one or more time units. Each time unit you use must be preceded by a number up to five digits long. You may include spaces, underlines, or dashes and mix case in the folder name. The following are valid examples:

\Retain23days4hours\

\Retain 3years\

114 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 141: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

\Retain_3years\

\Retain-23DAYS_4minutes\

\Retain 1000 days\

� \KeepSafe\RetainUntil Date\

Specify a date after which the vaulting will expire. The date must include year, month, and day in the following format: yyyymmddhhmmss. The hours, minutes, and seconds are optional. The default time is 00:00:00.

The following are valid examples:

\RetainUntil20190117153045\

\RetainUntil 20200101\

\RetainUntil20200101\

\RetainUntil_20200101\

Note:

� yyyyThe year is specified using a 4 digit format, example: 2019

� mmThe month is specified using a 2 digit format, example: 01 for January

� ddThe day is specified using a 2 digit format, example: 17 for the 17th day of the month

� Optional:

– hhThe hour is specified using the 2 digit 24h format, example: 15 for 3am

– mmThe minutes are specified using a 2 digit format, example: 30 for 30 minutes after the hour

– ssThe seconds are specified using a 2 digit format, example: 45 for 45 seconds after the minute

Chapter 3. Installation and configuration 115

Page 142: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

3.4.5 Default protection settings (Settings Notebook)

In case you have made some modifications to your Tivoli Continuous Data Protection for Files protection settings and want to revert back to the default settings, you need to know what those default settings are.

This section lists the default Tivoli Continuous Data Protection for Files protection settings - separately outlined for each page of the Settings Notebook.

General pageIn Table 3-4 you can see the default settings for the general protection settings of Tivoli Continuous Data Protection for Files.

Table 3-4 General page default settings

Files to Protect pageTable 3-5 on page 117 shows the default values for the files you want to protect.

Note:

� You cannot create a \Retain... folder within a vaulted \Retain... folder.

� You cannot move material that is in one vaulted \Retain... folder to a vaulted \Retain... folder that has an earlier expiration date.

General page

Back up to aC:\

a. Tivoli Continuous Data Protection for Files chooses by default the non-removable local drive which has the most free space. If you have more than one non-removable local drive in your computer, a drive name other than C: might be chosen.

How many versions to keep 20

Maximum space for backups 500 MB

Continuous protection level Local and remote storage

116 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 143: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Table 3-5 Files to Protect page default settings

E-mail Protection pageThe default values for your e-mail protection and your schedules are in Table 3-6 on page 118.

Files to Protect page

Folders and Files Include \My Documents\

*.doc

*.xls

*.ppt

*.123

Exclude RealTimeBackup

\Program Files

\System32\

~

*.tmp

*.temp

\Temp\

\Temporary

\Windows\

\System Volume

\tsmlvsacache

\cache

\Tivoli\CDP_for_Files\

Applications No applications

Vault 0 folders

Start an initial backup with the new settings left unchecked

Chapter 3. Installation and configuration 117

Page 144: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Table 3-6 E-mail Protection page default settings

Remote Storage pageIn Table 3-7 you can see the default remote storage settings of Tivoli Continuous Data Protection for Files

Table 3-7 Remote Storage page default settings

Advanced pageTable 3-8 shows the default advanced protection settings of Tivoli Continuous Data Protection for Files.

Table 3-8 Advanced page default settings

E-mail Protection page

E-mail Application Select Application (nothing preselected)

E-mail Application Data Folder (wildcards allowed)

nothing predefined

How often to protect your e-mail Never

Scheduled Backup Settings nothing predefined

Remote Storage page

Back up to None Selected

Location nothing predefined

How many versions to keep 5

Maximum space for backups 40 GB

Advanced Settings Encrypt backups not preselected

Compress backups not preselected

Use sub-file copy left unchecked

Use sub-file copy for files larger than

50 MB

Advanced page

Allow program messages to pop up Enabled

Performance Settings Do not locally back up files larger than

10 GB

118 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 145: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Do not remotely back up files larger than

1 GB

Maximum remote transfer rate 1 Gbs

Scheduled Backup Settings nothing predefined

Advanced page

Chapter 3. Installation and configuration 119

Page 146: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

120 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 147: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Chapter 4. Proof of concept scenarios

In this chapter we cover several different usage scenarios for Tivoli Continuous Data Protection for Files. These scenarios attempt to provide you with an understanding of the various configurations and implementations possible with Tivoli Continuous Data Protection for Files. Use these scenarios as guidance for your planning and deployment strategy, and remember proper planning will help ensure successful implementation.

This chapter covers the following:

� “Product features” on page 122

� “Single user environment” on page 123

� “Multiple computers in a home or small business” on page 145

� “Tivoli Continuous Data Protection for Files in an enterprise environment” on page 180

� “Restore scenarios” on page 228

4

© Copyright IBM Corp. 2007. All rights reserved. 121

Page 148: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

4.1 Product features

The previous chapters have described various aspects of Tivoli Continuous Data Protection for Files functionality, however, not all functionality is supported in every usage scenario. Use the matrix below to determine what functionality is supported in an environmental context.

Table 4-1 shows the Tivoli Continuous Data Protection for Files feature support matrix:

Table 4-1 Tivoli Continuous Data Protection V3.1 feature support matrix

CDPFeature

Local Disk Remote Disk(external disk / file server)

WebDAV (Apache)

WebDAV (IIS 5.0/6.0)

Tivoli Storage Manager

Encryption Not supported Supported APAR opened APAR opened Supported

Compression Not supported Supported APAR opened APAR opened Supported

Vault Supported Not supported Not supported Not supported Not supported

Sub-file copy Not supported Supported Supported Full backups Full backups

Management area

N/A Supported Supported Supported Must specify

Note:

� Compression and encryption features are mutually exclusive. It is not possible to use both together.

� The compression feature in Tivoli Continuous Data Protection for Files can not be used in conjunction with Tivoli Storage Manager compression. If the compression is enabled in Tivoli Storage Manager do not set this variable within Tivoli Continuous Data Protection for Files.

� If you have encryption enabled within Tivoli Storage Manager, note that Tivoli Continuous Data Protection for Files works only Tivoli Storage Manager’s AES128 encryption option.

� If you are using Tivoli Storage Manager as your remote backup target you need to specify a management area on a central Tivoli Continuous Data Protection for Files server if you wish to take advantage of Tivoli Continuous Data Protection for Files central management functions, such as backup reports and push installations.

122 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 149: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

4.2 Single user environment

Below we describe typical scenarios for home and mobile users. In this scenario we have three primary target locations for our copied data:

� Local disk only

� External storage (direct attached USB drive)

� Web server (in conjunction with a qualified ISP)

4.2.1 Single computer, local disk only

In this environment, we use Tivoli Continuous Data Protection for Files to backup our most important data to local disk.

Figure 4-1 Single computer, local disk only

In our lab environment we have a machine called Amsterdam.

The environment has the following characteristics:

– Desktop computer

– Intel Pentium 4 CPU 2.40 GHz

– 512 MB memory

– Windows Microsoft Vista Ultimate

– 5 GB for backup files

– Continuous protection of the directory \Example Data\

The following screens will walk you through the configuration described above:

AmsterdamWindows VistaUser desktop

Continuous protectionto local disk

Active daemon identifyng the modified files

Replicates the files in a local directory

CDP

1

Chapter 4. Proof of concept scenarios 123

Page 150: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-2 General Configuration for a single user with local disk configuration

Figure 4-2 shows which variables need to be configured when we have only the local disk and the C:\ drive partition available in this desktop. We are going to keep two versions of our protected files and the maximum space that we will use for backups will be 5 GB.

124 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 151: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-3 Files to protect in a single user with local disk configuration

Figure 4-3, shows which files we have selected to protect. We are only protecting the \Example Data\ directory.

During the initial replication, Tivoli Continuous Data Protection for Files will create a directory called RealTimeBackup on the drive specified in General tab configuration. In our scenario the drive C:\ was specified.

Chapter 4. Proof of concept scenarios 125

Page 152: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-4 Continuous protection file directory

Figure 4-4 shows the data that exists in C:\RealTimeBackup\ directory. Note that Tivoli Continuous Data Protection for Files mirrors our source directory tree inside the target \RealTimeBackup\ directory. Based on the specifications of our configuration you will see two versions of each file in our target directory.

4.2.2 Single computer with external storage

In this environment we have configured continuous data protection for backups of our most important files to a local drive and scheduled protection for backups of less important (or constantly changing) files to an external drive. In our lab environment we have the same machine from the above scenario, Amsterdam, and we added a direct attached USB drive as the target for our files under scheduled protection.

126 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 153: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-5 Single computer, with external storage

The environment has the following characteristics:

– Desktop computer

– Intel Pentium 4 CPU 2.40 GHz

– 512 MB memory

– Windows Microsoft Vista Ultimate

– 5 GB local disk for continuously protected files

– 100 GB external (USB) disk for scheduled protection of files

– The directories \Example Data\ and \My Documents\ will be under continuous protection

– The directories \Example Data\ and all pdf and txt files will have the scheduled protection using the compression feature

This scenario is very similar to what we discussed previously, but with the added external disk as the target storage area for our scheduled protection. The following screens will walk you through the configuration described above.

AmsterdamWindows VistaUser desktop

CDP

USB

Continuous protection to local disk

Schedule protection to remote storage

3

Active daemon identifying the modified files:

- Continuous protection sends to replication thread

- Scheduled protection sends to journal list

Replicates the files in a local directory

At schedule time verifies the journal list and replicates the pending files in an externaldisk

112

2

3

45

678

9

10

11

1 2

Chapter 4. Proof of concept scenarios 127

Page 154: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-6 General configuration for a single user scenario with external disk

Figure 4-6 shows the necessary configuration for continuous protection of files. This is the same configuration that we have in section 4.2.1, “Single computer, local disk only” on page 123.

128 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 155: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-7 Selection of important files to continuously protect in a single user scenario with external disk

Figure 4-7 shows that the \My Documents\ directory was added to our selection of continuously protected files.

Chapter 4. Proof of concept scenarios 129

Page 156: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-8 Configuring the remote storage for scheduled protection

Figure 4-8 shows the necessary configuration for the remote storage in this scenario. We intend to use 100 GB on the target device and to maintain two versions of each file. We enabled the Compress backups option to save space on the external disk. The directory E:\RealTimeBackup\ will be created on the external USB device.

Note: When you configure your removable storage device make sure that you select it by using the Browse option next to the Location field on the Remote Storage page. There is currently an issue with the software that allows some removable devices to show up in the General backup list. You should not select the removable device from the General pick list.

130 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 157: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-9 Configuring files for scheduled protection

Figure 4-9 shows how to configure files for scheduled protection. It is necessary to configure a separate list of files to include in the scheduled protection settings. Select the E-mail Protection tab and then click the Schedule Backup Settings link. Include all extensions and directories that you want to protect with the scheduled option in the Folders and File Settings window (shown above).

Note: Tivoli Continuous Data Protection for Files keeps a list of files that are included for protection and a list of files that are excluded from protection. The list of included files is separated into those that are included for continuous protection and those that are included for scheduled protection. The list of excluded files applies to both continuous and scheduled protection.

Chapter 4. Proof of concept scenarios 131

Page 158: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-10 Configure the frequency and time to start the scheduled protection

Figure 4-10 shows that the scheduled backup will run daily, and the process will start at 07:00 PM.

After the configuration is complete, you can start an initial backup by selecting the Start scheduled backup now check box. If you do not use this option, files changed under scheduled protection will be replicated when the next scheduled interval occurs.

Note: The best time to configure scheduled protection is when the machine is not in use and all applications are closed.

132 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 159: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-11 Start an initial backup

Figure 4-11 shows how to start an initial backup of files under either continuous or scheduled protection. We recommend that you use this option when you are not using your computer. The first scan takes some time to run, depending on the size of your files and network traffic.

CompressionAnother way to save space on your remote location is to enable the file compression feature within Tivoli Continuous Data Protection for Files. If you configure Tivoli Continuous Data Protection for Files to use compression, you must use it to restore compressed files.

Note: If you intend to back up a significant number of files that have already been compressed or are of a compressed format, Tivoli Continuous Data Protection for Files compression might not be advisable.

Chapter 4. Proof of concept scenarios 133

Page 160: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

After the initial scan, you can check to see if the files are compressed on the external storage device. The following pictures compare the original directory with the replicated directory:

Figure 4-12 Original directory and files

Figure 4-12 shows the original directory and files. The selected file presentation1.ppt is 739 KB in size. Compare this file with the replicated directory.

134 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 161: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-13 Replicated directory and files

Figure 4-13 shows the replicated directory and files. The selected replicated file presentation1 is 697 KB in size. As you can see, the file was compressed.

For files that already have a compressed format, like avi, mp3, zip, etc., enabling compression might actually result in the files growing in size.

This is illustrated with file avi1.avi in the screen above. The original file is 276,806 KB and the replicated file is 276,807 KB. At this point you are probably wondering why Tivoli Continuous Data Protection for Files does not just back up the file uncompressed when it realizes the compressed file is going to be bigger than the source file. It is because the compression feature was added to save bandwidth on the LAN.

By the time Tivoli Continuous Data Protection for Files realizes the file is getting bigger while being compressed, most of the file has already been sent to the backup directory. If you are sending the file to a backup server over the LAN, it is

Chapter 4. Proof of concept scenarios 135

Page 162: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

better for bandwidth to send the rest of the compressed file instead of restarting the backup and sending the entire file uncompressed.

4.2.3 Single computer with ISP connection

This scenario represents a user who has a single computer (a mobile computer) that has access to external storage through an ISP. For this user, all files are saved on local machines, and the remote storage on the ISP server is used primarily for occasional backups. The local backup repository still provides the primary method of protection.

In our lab environment, we have two machines, one called paris and another called madrid. Paris is the WebDAV server and Madrid is the mobile computer with Tivoli Continuous Data Protection for Files installed.

Figure 4-14 Single computer, with ISP connection

The environment has the following configuration:

� Paris:

Note: If the storage space you have available through your ISP is limited, you might want to narrow the inclusion list for the schedule backup to save space.

MadridWindows XP

Mobile Computer

CDP

Active daemon identifying the modified files:

- Continuous protection sends to replication thread

- Scheduled protection sends to journal list

Replicates the files in local and remote storage at the same time

At schedule time verifies the journal list and replicates the pending files to an ISP provider

ParisWindows 2003

HTTP Server 6.1

Broadband

112

2

3

45

67

8

9

10

11

3

1

2

2

3

2

112

2

3

45

67

8

9

10

11

136 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 163: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

– Desktop computer

– Intel Pentium 4 CPU 2.40 GHz

– 512 MB memory

– Microsoft Windows Server® 2003

– IBM HTTP Server V6.1

� Madrid

– Mobile computer

– Intel Pentium Dual Core 2.16 Ghz

– 1 GB memory

– Windows XP Service Pack 2

– Continuous protection to local and remote drive

– Scheduled protection to Tivoli Storage Manager

– Important files for continuous protection

– ExampleData for scheduled protection

– 2 versions and 5 GB for continuous protection

– 5 versions and 10 GB for scheduled protection

– Sub-files for files greater than 3 MB

Chapter 4. Proof of concept scenarios 137

Page 164: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-15 Continuous protection for a single computer with ISP connection

Figure 4-15 shows the configuration for continuous protection for a single computer with an ISP based storage repository. When any file in ImportantFiles directory has changed, it will replicate to local disk and to the ISP provider.

Note: An internet connection to your remote storage device must be available for continuous replication of files that change. If a connection to the remote device is not available Tivoli Continuous Data Protection for Files will not be able to replicate copies of files as they change, and changed files are not cached for later transport. When the remote target becomes available Tivoli Continuous Data Protection for Files will transmit the current version of a protected file to the remote location. Versions of files that changed when the remote target was not available are no longer available to copy to the remote storage location, because these interim files are not cached by Tivoli Continuous Data Protection for Files.

138 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 165: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-16 Important files continuous protection in a single user with an ISP connection

Figure 4-16 shows that the ImportantFiles directory was added to the continuous protection.

Chapter 4. Proof of concept scenarios 139

Page 166: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-17 Remote storage with ISP configuration

Figure 4-17 shows how to configure Tivoli Continuous Data Protection for Files when you have an ISP provider providing remote storage. In our lab environment we have a machine called Paris that has the HTTP Server V6.1 and the directory secure_backupvault with rights to receive the replicated files. All files that are bigger than 3 MB will use the sub-file copy feature that sends only the changed blocks of a file, as opposed to the entire file, to the remote storage location (reducing network traffic). After you apply your changes a window asking for user ID and password to access the Web server displays. See Figure 4-18 on page 141.

140 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 167: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-18 Username and password to access Web server

Note: There are various options on the market today for ISP-provided remote storage. Some service providers (e.g. Cable or DSL) will make disk space available (either as part of the base service or as a paid upgrade) for their users. Ideally the space provided is file server-type space which can be mounted by the operating system. If the target storage is web-server/ftp space, ask your service provider if they support WebDAV which allows Web servers to expose their storage space as file-server space. The ISP might offer a VPN (virtual private network) style connection or simply a SSL interface (and WebDAV can run over SSL transparently). As for securing the data on the back-end at the ISP, consult with your ISP provider to learn what they offer for on-disk security

Chapter 4. Proof of concept scenarios 141

Page 168: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-19 Configure the frequency and time to start the scheduled protection to an ISP provider

142 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 169: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-20 Files for scheduled protection

Figure 4-20 shows the files configured for scheduled protection. Each hour Tivoli Continuous Data Protection for Files will scan the directory ExampleData to verify whether any files have changed since the last backup. All files that have changed since scheduled protection was configured will be replicated at the scheduled interval time.

Figure 4-21 Activity report for changed files

As an example, the files in Example Data directory docu1.doc, pres1.ppt, and sheet1.xls were modified. Figure 4-21 shows that all changed files were replicated to both local and remote storage.

Chapter 4. Proof of concept scenarios 143

Page 170: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-22 Activity report for changed file pres1.ppt

To test how versioning in remote storage works, the file pres1.ppt was modified. This file was changed six times. Figure 4-22 shows that the last version was purged in the remote storage.

Sub-file copy and versioningIf you configure Tivoli Continuous Data Protection for Files to use sub-file copy, it will create files that contain each file’s delta information in your designated storage area. Those files have an FPdelta file name suffix.

To test the sub-file copy functionality the file Sub-file example.txt was modified. This file is larger than 3 MB. Figure 4-23 on page 145 shows the replicated directory in our HTTP Server Paris. As you can see, we have the original file with 3,208 KB and a delta file with only the modified characters which is only 1 KB. Note that this feature is supported only with remote storage.

To track versions of a file, Tivoli Continuous Data Protection for Files adds a version suffix to the file name of the backup copy. On remote storage, all backup copies contain a version suffix. When a file is deleted on your computer, Tivoli Continuous Data Protection for Files will add a version identifier to the file name of the most recent backup copy on the remote storage.

The most recent backup copy of a file is the active backup copy. Older backup copies of that file are inactive backup copies. Tivoli Continuous Data Protection for Files will delete inactive backup copies of a file first if the storage space limit is reached.

144 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 171: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

A file that is protected by schedule could change several times during the schedule interval. Only the last version of the file prior to the end of the schedule will be backed up. A continuously protected file is backed up after every change.

Figure 4-23 Sub-file functionality example

To test how versioning in remote storage works, the file pres1.ppt was modified. This file was changed six times. Figure 4-22 on page 144 shows that the last version was purged in the remote storage.

4.3 Multiple computers in a home or small business

In this scenario there are multiple computers connected through a single network. You can have a supplemental file server or a backup application to protect the copied data. Tivoli Continuous Data Protection for Files will be configured in three different ways:

– Home network with a file server

– Small business without file server

– Small business with a file server

Chapter 4. Proof of concept scenarios 145

Page 172: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

4.3.1 Home network with a file server

This scenario represents a small home environment, a single network with several computers. Typically this configuration will involve two to ten machines. Tivoli Continuous Data Protection for Files will replicate the data to a target file server. In this example the user will copy the replicated data to DVD. Only the scheduled protection will be used. See the lab environment illustrated below:

Figure 4-24 Home network with a file server

The computers Cairo, Dakar, Amsterdam, and Madrid are configured to send the backup files to Berlin. Each computer needs to have appropriate access to the target file server to back up their files. Tivoli Continuous Data Protection for Files is installed on each machine. Below is the base configuration of Tivoli Continuous Data Protection for Files in this scenario:

– Scheduled protection to the file server

– 10 GB and 2 versions for scheduled protection

– ExampleData directory for scheduled protection

– Frequency for scheduled protection = Daily

LAN

BerlinWindows 2003

Pentium 41,5 GB memory

File Server

CairoWindows 2003

Pentium 41,5 GB memoryUser desktop

DakarWindows 2000

Pentium 41,5 GB memoryUser desktop

MadridWindows XP

Intel Dual Core1 GB memory

Mobile computer

AmsterdamWindows Vista

Pentium 41 GB memoryUser desktop

CDP

1

CDP

1

2

112

2

3

45

67

8

9

10

1 1112

2

3

45

67

8

9

10

1 1

CDP

1

CDP

1

2 2 2

112

2

3

45

67

8

9

10

11 112

2

3

45

67

8

9

10

11

112

2

3

45

67

8

9

10

11

Active daemon identifying the modified files:

- Scheduled protection sends to journal list

At schedule time verifies the journal list and replicates the pending files to the file server

Backs up files on file server to the DVD Disks

1

2

ExternalDrive

DVD Disks

3

3

146 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 173: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-25 General configuration without continuous protection

Figure 4-25 shows the configuration to disable continuous protection.

The General page is configured with the following settings:

– Backup to: (leave default, not used in this scenario)

– How many versions to keep: (leave default, not used in this scenario)

– Maximum space for backups: (leave default, not used in this scenario)

– Continuous protection level: None (to disable continuous protection)

Before configuring the remote storage in Tivoli Continuous Data Protection for Files, you need to map a drive on each user’s computer to the target file server. The shared directory cdp_fileserver is already configured on Berlin server. See Figure 4-26 on page 148.

Chapter 4. Proof of concept scenarios 147

Page 174: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-26 Map network drive in each computer

We configured our file server to require a user name and password. See Figure 4-27.

Figure 4-27 Configure user and password to access the file server

148 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 175: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-28 Configure remote storage for scheduled protection

Figure 4-28 shows the Remote Storage page configuration for this scenario.

The configuration is:

– Backup to: File Server (Berlin server)

– Location: \\berlin\cdp_fileserver

– How many versions to keep: 1

– Maximum space for backup: 3 GB (the maximum space for backups for each machine needs to be enough to maintain at least one version for each file designated for scheduled protection)

Chapter 4. Proof of concept scenarios 149

Page 176: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-29 Configure schedule and select application for scheduled protection

Note: When the storage space becomes full, Tivoli Continuous Data Protection for Files deletes older backup copy versions of files that have several backup copy versions. After deleting the versioned backup copies, if more space is needed for new backup copies, Tivoli Continuous Data Protection for Files deletes the last remaining backup copies of enough files to make room for the newest backup copy. No warning message displays when the maximum space is reached.

150 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 177: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-30 Select files for scheduled protection

Figure 4-29 on page 150 and Figure 4-30 show the frequency, directories, and files for schedule protection. In the E-mail protection tab, select Schedule backup settings, select Include, browse to select the directory, and click OK to save your changes.

Each day after the scheduled backup has finished, you can back up the RealTimeBackup directory on the file server to DVD (or another media of your choice).

4.3.2 Small business with Tivoli Storage Manager Express

This scenario represents a small business environment of 10 to 25 desktop computers in a single network. The customer doesn’t want to invest money in a file server as a target for backup copies, but the customer needs to back up the user’s data due to legal requirements. In this case, Tivoli Continuous Data Protection for Files is configured to send the continuous and scheduled backups directly to a Tivoli Storage Manager Express server.

An illustration of our lab environment:

Note: IBM Tivoli Storage Manager Express is designed for small business environments with five to twenty servers. Typically, these businesses do not have the resources for a dedicated storage administrator, but nevertheless they must have reliable backups and restores.

Chapter 4. Proof of concept scenarios 151

Page 178: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-31 Small business without file server

In this configuration, all computers have two lists of files to protect, one for continuous protection and another for scheduled protection. They are configured as follows:

– Continuous protection to local drive

– Scheduled protection to Tivoli Storage Manager Express

– 2 GB and 2 versions for continuous protection

– ImportantFiles directory for continuous protection

– ExampleData directory for scheduled protection

– 10 GB and 10 versions for scheduled protection

– Frequency for scheduled protection = Daily at 7 PM

Before configuring Tivoli Continuous Data Protection for Files, it is necessary to configure Tivoli Storage Manager Express.

LAN

BerlinWindows 2003

Pentium 41,5 GB memory

Tivoli Storage ManagerExpress

CairoWindows 2003

Pentium 41,5 GB memoryUser desktop

DakarWindows 2000

Pentium 41,5 GB memoryUser desktop

AmsterdamWindows Vista

Pentium 41 GB memoryUser desktop

CDP

1 2

31

12

2

3

4567

8

9

10

11112

2

3

4567

8

9

10

11

CDP

1

CDP

12 2

3 31

12

2

3

4567

8

9

10

11

112

2

3

4567

8

9

10

11

4

Tape Library

Active daemon identifying the modified files:

- Continuous protection sends to replication thread

- Scheduled protection sends to journal list

Replicates the files in a local disk

At schedule time verifies the journal list and replicates the pending files to Tivoli Storage Manager Express

Saves files in tapes for long-term copies

1

2

3

4

IzmirWindows XP

Pentium 4512 GB memory

User desktop

CDP

1 2

31

12

2

3

45

678

9

10

11

152 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 179: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Tivoli Storage Manager Express configurationThe Tivoli Storage Manager Express server is installed and configured on the Berlin server. It is not necessary to install the backup/archive client, Tivoli Continuous Data Protection for Files will use the API (application program interface) to send files to Tivoli Storage Manager Express. The default dsm.opt is located on the C:\Documents and Settings\All Users\Application Data\Tivoli\CDP_for_Files\ directory.

You must register the machines where Tivoli Continuous Data Protection for Files resides with the Tivoli Storage Manager Express server.

On the Tivoli Storage Manager Express server Berlin, do the following:

1. On Tivoli Storage Manager Express server go to:

– Start → Tivoli Storage Manager → Backup Server Administration.

2. Input user name and password:

– Administrator / cdp4admin

3. Select the Computers and applications option as shown in Figure 4-32.

Figure 4-32 Computers and applications option on Tivoli Storage Manager Express

Chapter 4. Proof of concept scenarios 153

Page 180: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

4. On left panel, Select Action → Add Computers ....

The following wizard displays:

Figure 4-33 Wizard to add computers and optionally deploy the backup client software

5. Select General and the option Add computer, but not deploy the client software, as shown in Figure 4-34 on page 155.

154 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 181: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-34 Select option to add a computer

To add a computer/node:

• Computer name: Node name of client where Tivoli Continuous Data Protection for Files is loaded

• Contact information: Administrator responsible for machine

• Web address for the backup client Web interface: The IP address for server and port number to access the node through Web

• Computer owner’s e-mail address: To send notification about schedule information

Chapter 4. Proof of concept scenarios 155

Page 182: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-35 Installation settings

6. Confirm settings, and finish the task.

156 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 183: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-36 Confirm settings

7. Open an MS DOS prompt to configure backup delete permission on Tivoli Storage Manager Express.

8. Stop the Tivoli Storage Manager Express service, as shown below.

Figure 4-37 Stop Tivoli Storage Manager Express service

9. Start Tivoli Storage Manager Express in foreground mode, as follows.

C:\Program Files\Tivoli\TSM\server>net stop "TSM Express Backup Server"The TSM Express Backup Server service is stopping.The TSM Express Backup Server service was stopped successfully.

Chapter 4. Proof of concept scenarios 157

Page 184: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-38 Start Tivoli Storage Manager Express in foreground mode

10.Configure delete permission.

Figure 4-39 Configure node with delete permission

11.Stop Tivoli Storage Manager Express in the foreground mode.

C:\Program Files\Tivoli\TSM\server>dsmservANR0900I Processing options file C:\Program Files\Tivoli\TSM\Server1\dsmserv.opt.ANR7800I DSMSERV generated at 02:27:45 on Mar 9 2006.

Tivoli Storage Manager Express for WindowsVersion 5, Release 3, Level 7.0

Licensed Materials - Property of IBM

(C) Copyright IBM Corporation 1990, 2006.All rights reserved.U.S. Government Users Restricted Rights - Use, duplication or disclosurerestricted by GSA ADP Schedule Contract with IBM Corporation.

ANR4726I The ICC support module has been loaded.ANR0990I Server restart-recovery in progress.ANR0200I Recovery log assigned capacity is 100 megabytes.ANR0201I Database assigned capacity is 2000 megabytes.ANR0306I Recovery log volume mount in progress.ANR0285I Database page shadowing started using file dbpgshdw.bdt.ANR0353I Recovery log analysis pass in progress.ANR0354I Recovery log redo pass in progress.ANR0355I Recovery log undo pass in progress.ANR0352I Transaction recovery complete.ANR1635I The server machine GUID,bb.b9.d8.b0.02.3a.11.dc.ac.9a.00.0c.29.eb.67.de, has initialized.ANR2100I Activity log process has started.ANR0993I Server initialization complete.

TSM:TSM-DEMO>update node dakar backdel=yesANR2017I Administrator SERVER_CONSOLE issued command: UPDATE NODE dakar backdel=yes

158 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 185: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-40 Shutdown Tivoli Storage Manager Express

12.Start Tivoli Storage Manager Express service.

Figure 4-41 Start Tivoli Storage Manager Express

13.Log in on Tivoli Storage Manager Express again, select Computers and applications. Select the Dakar client node and reset the password, as shown in Figure 4-42.

Figure 4-42 Reset the password

TSM:TSM-DEMO> haltANR0991I Server shutdown complete.

C:\Program Files\Tivoli\TSM\server>net start "TSM Express Backup Server"he TSM Express Backup Server service is starting.he TSM Express Backup Server service was started successfully.

Chapter 4. Proof of concept scenarios 159

Page 186: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

14.Input the user name and password, as in Figure 4-43.

Figure 4-43 Windows credentials

15.Note the new password (Figure 4-44).

Figure 4-44 New password information

Tivoli Continuous Data Protection for Files and Tivoli Storage Manager Express Now, let’s configure Tivoli Continuous Data Protection for Files to work with Tivoli Storage Manager Express.

Note: The first time that you connect the client node to the Tivoli Storage Manager Express server you need to reset the password.

160 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 187: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-45 General configuration

Figure 4-45 shows the general configuration for this scenario:

– Backup to: C:\ (local disk only)

– How many versions to keep: 2 (two versions of each file with continuous protection)

– Maximum space for backups: 2 GB (maximum space allocated for continuous protection)

– Continuous protection level: Local storage only (continuous protection is enabled only for local disk)

Chapter 4. Proof of concept scenarios 161

Page 188: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-46 Files to protect in continuous protection

Figure 4-46 shows the files selected for continuous protection. In this scenario, all machines have the ImportantFiles directory, and all files that require continuous protection should be located in this directory.

To create your include list of files and directories, click the Details link next to Folders and Files. A new window, Folders and Files Settings, displays. Click Include and fill in the folder name or extensions to add to continuous protection.

162 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 189: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-47 Remote storage configuration for Tivoli Storage Manager Express

Figure 4-47 shows the configuration to send files to Tivoli Storage Manager Express:

– Backup to: Tivoli Storage Manager

– Location: tsm://berlin\ (hostname or IP address of the Tivoli Storage Manager Express Server)

– How many versions to keep: 10 different versions of each file

– Maximum space for backups: 10 GB (maximum space for backups on Tivoli Storage Manager Express Server)

You will be prompted to input the user name and password for this node when connecting to Tivoli Storage Manager Express, see Figure 4-48 on page 164.

Chapter 4. Proof of concept scenarios 163

Page 190: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-48 Node password on Tivoli Storage Manager Express server

164 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 191: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-49 Select applications, files, and frequency to back up to Tivoli Storage Manager Express

Chapter 4. Proof of concept scenarios 165

Page 192: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-50 Create the include list for scheduled protection

Figure 4-49 on page 165 and Figure 4-50 show the frequency, directories, and files for schedule protection. All files that are being changed during the day in the ExampleData directory will be backed up to Tivoli Storage Manager Express every day at 7 PM.

Backup policyTivoli Continuous Data Protection for Files sends files to Tivoli Storage Manager Express with appended text which creates unique file names, even when the object is a new version of a file that has already been backed up. These newer versions of an existing file will be seen by Tivoli Storage Manager Express server as new files, will be categorized as active backup versions, and will never be marked as inactive. The backup policy is controlled and enforced by Tivoli Continuous Data Protection for Files. So, when a file is purged it will be marked on Tivoli Storage Manager Express as an expired object, allowing it to be removed from the Tivoli Storage Manager Express storage pool.

Note that you cannot see each backup file in your Tivoli Storage Manager Express server; you can simply verify if a filespace called cdpfs exists. See Figure 4-51 on page 167.

166 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 193: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-51 Filespace on Tivoli Storage Manager Express

4.3.3 Small business with a file server

This scenario represents a small business environment (user desktops and application servers). Consider this scenario for 25 to 100 computers. In this case each client machine uses Tivoli Continuous Data Protection for Files to replicate data to a target file server. You can then back up the files from the file server to a backup server. For a small business, Tivoli Storage Manager Express is recommended.

An illustration of our lab environment:

Chapter 4. Proof of concept scenarios 167

Page 194: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-52 Small business with a file server

Our file server in this environment is Athens. The backup will be sent to the Tivoli Storage Manager Server Express, Berlin.

The lab environment:

– Continuous and scheduled protection to file server

– 15 GB and 2 versions for each file

– ImportantFiles directory for continuous protection

– ExampleData directory for scheduled protection

– Frequency for scheduled protection = Daily

– Encryption

Before configuring the Tivoli Continuous Data Protection for Files, it is necessary to configure the file server with the appropriate privileges and map the file server to each user’s computer. To reconnect to the file server each time that the machine is rebooted, use the option in Windows Explorer: Tools → Map a network drive. See Figure 4-53 on page 169 and Figure 4-54 on page 169.

Active daemon identifying the modified files:

- Continuous protection sends to replication thread

- Scheduled protection sends to journal list

Replicates the files in remote storage

At schedule time verifies the journal list and replicates the pending files to an ISP provider

At schedule time backs up the files to TSM Server Express

1

2

3

4

LAN

AthensWindows 2003

Pentium 41,5 GB memory

File Server

TokyoWindows 2003

Pentium 41,5 GB memoryUser desktop

DakarWindows 2000

Pentium 41,5 GB memoryUser desktop

RomeWindows XP

Intel Dual Core1 GB memory

Mobile computer

AmsterdamWindows Vista

Pentium 41 GB memoryUser desktop

CDP

1

2

31

12

2

3

4567

8

9

10

11112

2

3

4567

8

9

10

11

CDP

1

CDP

1

2 2

3 31

12

2

3

4567

8

9

10

11

112

2

3

4

5678

9

10

11

BerlinWindows 2003

Pentium 41 GB memory

TSM Server Express

CDP

1

2

31

12

2

3

4567

8

9

10

11

TSM Client

2

3

4

4

168 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 195: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-53 Map network drive and reconnect at logon

Figure 4-54 Configure user name and password to access the file server

Chapter 4. Proof of concept scenarios 169

Page 196: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Tivoli Continuous Data Protection for Files with a file serverFigure 4-55, shows the general configuration for desktop and mobile computers in this scenario.

Figure 4-55 General configuration for this scenario

The recommended configuration for each machine is:

– Backup to: (leave default, not applicable in this scenario)

– How many versions to keep: (leave default, not applicable in this scenario)

– Maximum space for backups: (leave default, not applicable in this scenario)

– Continuous protection level: Remote storage only

170 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 197: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-56 Files to protect in continuous backup

Figure 4-56 shows the files to protect continuously. In this scenario all machines have this directory created which contains all files designated for continuous protection.

Note: When the continuous protection level is configured to remote storage only, you need to configure all parameters for continuous and scheduled protection in the Remote Storage tab.

Chapter 4. Proof of concept scenarios 171

Page 198: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-57 Configure remote storage for continuous and scheduled protection

Figure 4-57 shows the remote storage configuration for this scenario:

– Backup to: File Server (Athens)

– Location: \\athens\cdp_fileserver (mapped drive)

– How many versions to keep: 2 (two versions for files protected by both continuous and scheduled backups)

– Maximum space for backup: 15 GB (the maximum space for backup for each machine needs to be large enough to maintain at least one version for each file covered with both continuous and scheduled protection)

– Advanced setting: For security reasons encryption will be used. All machines in this environment are using the storage area for their replicated files.

172 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 199: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

– Sub-file copy option: Send only the modified blocks when the file is greater than 3 MB.

Figure 4-58 Configure directories, files, and frequency for schedule protection

Chapter 4. Proof of concept scenarios 173

Page 200: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-59 Select files and directories for scheduled protection

Figure 4-58 on page 173 and Figure 4-59 show the frequency, directories, and files for schedule protection.

EncryptionThe encryption feature provides security on your remote storage location. This can be useful if multiple users have access to the remote server location, and you need to ensure that each user’s data is protected from others.

Figure 4-60 Inform password for encrypted files

When the first file is sent to the file server, you will be prompted for a password to enable encryption of the files, see Figure 4-60.

174 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 201: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

It is critically important that the password be remembered and kept in a place that is retrievable in the event of a machine or disk failure. If the password is lost, all encrypted data is completely unretrievable. The password is absolutely critical.

You can then verify that the files are encrypted on the file server. See Figure 4-61.

Figure 4-61 Replicated files with encryption option on file server

Tivoli Continuous Data Protection for Files cannot protect backup copies that have already been encrypted by another instance of Tivoli Continuous Data Protection for Files. This is an issue only if you send encrypted files to a file server with Tivoli Continuous Data Protection for Files, and then try to send these files to another file server or to an ISP provider using a local copy of Tivoli Continuous Data Protection for Files. If you configure Tivoli Continuous Data Protection for Files to encrypt the backup copies to a file server, you must not use Tivoli Continuous Data Protection for Files to protect the encrypted backup copies in that file server. You can use Tivoli Storage Manager or another backup solution to protect the encrypted backup copies on that file server.

Chapter 4. Proof of concept scenarios 175

Page 202: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Backup the file server to a Tivoli Storage Manager ExpressIt is necessary to define your file server as a client node on to Tivoli Storage Manager Express. You can follow the same steps to add a node that are in section 4.3.2, “Small business with Tivoli Storage Manager Express” on page 151, to Tivoli Storage Manager Express.

Figure 4-62 Computers and applications on Tivoli Storage Manager Express

We have defined Athens as a client node to Tivoli Storage Manager Express to backup the RealTimeBackup directory. See Figure 4-62. By default this directory is excluded. See Figure 4-63 on page 177.

176 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 203: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-63 Excluded files on Tivoli Storage Manager Express client

You need to edit the file C:\Program Files\tivoli\tsm\baclient\dsm.opt to remove this exclusion. See Figure 4-64 on page 178.

Chapter 4. Proof of concept scenarios 177

Page 204: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-64 Remove directory from dsm.opt

Now, it is possible to back up the replicated files from Tivoli Continuous Data Protection for Files to Tivoli Storage Manager Express. See Figure 4-65 on page 179.

178 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 205: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-65 Files to backup on Tivoli Storage Manager Express

Backup policyThe number of backup versions on the file server will be controlled by Tivoli Continuous Data Protection for Files, while Tivoli Storage Manager Express will control the number of files that will be backed up from the file server.

With Tivoli Storage Manager Express, you have a default backup policy which retains files locally on disk for 14 days after the original backup. However, Tivoli Storage Manager Express can be configured to use media copies to keep backups for longer than the default 14 days allowing you to restore data after it has been expired from the backup server’s disk storage.

Note: Be sure to size Tivoli Storage Manager Express storage with enough disk space to accommodate 14 days of backups. You can extend the availability of your data by implementing media copies, which can also be sent offsite for additional recoverability.

Chapter 4. Proof of concept scenarios 179

Page 206: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

4.4 Tivoli Continuous Data Protection for Files in an enterprise environment

The typical corporate environment for Tivoli Continuous Data Protection for Files can consist of up to a thousand user desktops. The planning and sizing considerations are critical in this type of configuration, so take the time to plan your deployment effectively.

For enterprise environments we recommend that you use the push installation capabilities of Tivoli Continuous Data Protection for Files to deploy the same configuration on all computers.

The typical scenarios for large environments discussed here are:

– Enterprise with Tivoli Storage Manager

– Enterprise with file servers

– Enterprise and branch offices

4.4.1 Enterprise environment with Tivoli Storage Manager

In this configuration, a user has Tivoli Continuous Data Protection for Files loaded on the local machine which sends data to network file servers. File servers are then backed up by Tivoli Storage Manager. See Figure 4-66 on page 181.

180 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 207: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-66 Example of enterprise environment with Tivoli Storage Manager centric

When you have a significant number of individual desktops loaded with Tivoli Continuous Data Protection for Files it is not advisable to send backups directly to Tivoli Storage Manager. Each file that needs to be replicated opens a new connection on the server, so it is easy to imagine a scenario with an overwhelmed Tivoli Storage Manager server. If you intend to send data from Tivoli Continuous Data Protection for Files to a Tivoli Storage Manager server, consider having different Tivoli Storage Manager server instances for your Tivoli Storage Manager client backups and your Tivoli Continuous Data Protection for Files backups.

Important: The server is critical to the overall Tivoli Storage Manager infrastructure and design. Do a proper sizing of your Tivoli Storage Manager environment before your Tivoli Continuous Data Protection for Files installation and configuration. Use the rule of thumb to configure the size of your Tivoli Storage Manager database at 1 to 2% of the total amount of data in the environment. If you know the number of files to back up and the backup policy, you can multiply this number by 600 bytes.

Tape Library

Department A

Department B

Department Z

.

.

.

Mobile Computers

LAN

CDP

CDP

CDP

CDP

TSM

TSM

TSM

TSM

Chapter 4. Proof of concept scenarios 181

Page 208: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

The lab environment is configured as follows:

– Continuous protection to local drive

– Scheduled protection to Tivoli Storage Manager

– ImportantFiles directory covered by continuous protection

– ImportantFiles and ExampleData directories covered by scheduled protection

– Frequency for scheduled protection= Hourly

– 1 version and 5 GB for continuous protection

– 2 versions and 30 GB for scheduled protection

– Remote storage to Tivoli Storage Manager Server

– Push installation

– Central administration

– Do not replicate files greater than 200 MB local and 2 GB remote

See the flow for this environment in Figure 4-67 on page 183.

Tip: In our environment we implemented a user policy that all important files should be saved in the \ImportantFiles\ directory and other files that are candidates for backup in the \ExampleData\ directory. Creating a similar policy and configuration for your environment will ease storage administration.

182 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 209: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-67 Lab environment (Tivoli Storage Manager centric)

Before configuring Tivoli Continuous Data Protection for Files, it is necessary to properly configure Tivoli Storage Manager.

Tivoli Storage Manager configurationTivoli Storage Manager enables you to protect your organization’s data from failures and other errors by storing backup, archive, space management, and bare-metal restore data, as well as compliance and disaster recovery data in a hierarchy of offline storage. Because it is highly scalable, Tivoli Storage Manager can help protect computers running a variety of different operating systems, on hardware ranging from notebooks to a z/OS system and connected together through the Internet, wide area networks (WANs), local area networks (LANs), or storage area networks (SANs). It uses Web based management, intelligent data move-and-store techniques, and comprehensive policy based automation that work together to help increase data protection and potentially decrease time and administration costs.

Note: For more details on Tivoli Storage Manager go to http://www-306.ibm.com/software/tivoli/products/storage-mgr/.

LAN

HelsinkiWindows 2003

Dual Core3 GB memory

Tivoli Storage Manager

BrugeWindows 2003

Pentium 41,5 GB memoryUser desktop

DakarWindows 2000

Pentium 41,5 GB memoryUser desktop

AmsterdamWindows Vista

Pentium 41 GB memoryUser desktop

CDP

1 2

31

12

2

3

45

67

8

9

10

1 1112

2

3

45

67

8

9

10

1 1

CDP

1

CDP

12 2

3 31

12

2

3

45

67

8

9

10

11

112

2

3

45

67

8

9

10

11

4

Tape Library

Active daemon identifying the modified files:

- Continuous protection sends to replication thread

- Scheduled protection sends to journal list

Replicates the files in a local disk

At schedule time verifies the journal list and replicates the pending files to Tivoli Storage Manager

Migrates files to tapes

1

2

3

4

IzmirWindows XP

Pentium 4512 GB memory

User desktop

CDP

1 2

31

12

2

3

45

678

9

10

1 1

BerlinCentral

Administration

Chapter 4. Proof of concept scenarios 183

Page 210: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

The Tivoli Storage Manager server is installed and configured on server Helsinki. On our clients it is not necessary to install the Tivoli Storage Manager backup/archive client, because Tivoli Continuous Data Protection for Files will use the Tivoli Storage Manager API (application program interface) to send files to Tivoli Storage Manager server. The default dsm.opt file is located in the C:\Documents and Settings\All Users\Application Data\Tivoli\CDP_for_Files\ directory.

You can use the command line to configure each node on Tivoli Storage Manager Server. The password assigned at that time will be used by Tivoli Continuous Data Protection for Files to connect to Tivoli Storage Manager server.

In order to properly manage storage space the Tivoli Storage Manager administrator must grant authority to the client node to delete backup copies. For more information about registering a Tivoli Storage Manager node, see IBM Tivoli Storage Manager for Windows Administrator’s Guide. See Web link http://publib.boulder.ibm.com/infocenter/tivihelp/v1r1/index.jsp for more details.

Follow these examples to add a client node to a Tivoli Storage Manager:

� Add nodes to Tivoli Storage Manager server:

184 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 211: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-68 Add nodes to Tivoli Storage Manager server

IBM Tivoli Storage ManagerCommand Line Administrative Interface - Version 5, Release 4, Level 0.2(c) Copyright by IBM Corporation and other(s) 1990, 2007. All Rights Reserved.

Enter your user id: admin

Enter your password: *****

Session established with server ITSO_TSM: Windows Server Version 5, Release 4, Level 0.0 Server date/time: 05/09/2007 18:47:20 Last access: 05/09/2007 18:46:42

tsm: ITSO_TSM>register node bruge cdp4admin passexp=0 backdel=yesANR2060I Node BRUGE registered in policy domain STANDARD.ANR2099I Administrative userid BRUGE defined for OWNER access to node BRUGE.

tsm: ITSO_TSM>register node dakar cdp4admin passexp=0 backdel=yesANR2060I Node DAKAR registered in policy domain STANDARD.ANR2099I Administrative userid DAKAR defined for OWNER access to node DAKAR.

tsm: ITSO_TSM>register node Amsterdam cdp4admin passexp=0 backdel=yesANR2060I Node Amsterdam registered in policy domain STANDARD.ANR2099I Administrative userid Amsterdam defined for OWNER access to node IZMIR.

tsm: ITSO_TSM>register node izmir cdp4admin passexp=0 backdel=yesANR2060I Node IZMIR registered in policy domain STANDARD.ANR2099I Administrative userid IZMIR defined for OWNER access to node IZMIR.

tsm: ITSO_TSM>q node

Node Name Platform Policy Domain Days Since Days Since Locked? Name Last Acce- Password ss Set------------------------- -------- -------------- ---------- ---------- -------

AMSTERDAM (?) STANDARD <1 <1 NoBRUGE (?) STANDARD <1 <1 NoDAKAR (?) STANDARD <1 <1 NoIZMIR (?) STANDARD <1 <1 No

Chapter 4. Proof of concept scenarios 185

Page 212: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Central management Tivoli Continuous Data Protection for Files has features that allow an administrator to manage the configuration of other Tivoli Continuous Data Protection for Files clients. You can manage the installed product level and configuration of other Tivoli Continuous Data Protection for Files clients. The administrator can also monitor the activity reports of the other clients. To use the central management features, you must configure your Tivoli Continuous Data Protection for Files clients to work together. Select one machine on your network to use as a central management server. In our lab environment the server Berlin will play this role. It is necessary to install Tivoli Continuous Data Protection for Files on this server and do the initial configuration.

Figure 4-69 General configuration

Figure 4-69 shows the configuration for continuous protection in this scenario:

– Backup to: C:\ (Local disk only)

186 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 213: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

– How many versions to keep: 1 (Just one version for each file with continuous protection)

– Maximum space for backups: 5 GB (Maximum space for local continuous protection)

– Continuous protection level: Local storage only (continuous protection is enabled only for local disk).

Figure 4-70 Files to protect in continuous protection

Figure 4-70 shows the files designated to protect continuously.

Chapter 4. Proof of concept scenarios 187

Page 214: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-71 Remote storage configuration to Tivoli Storage Manager

Figure 4-71 shows the remote settings configuration to send files to Tivoli Storage Manager:

– Backup to: Tivoli Storage Manager

– Location: tsm://helsinki (hostname or IP address of the Tivoli Storage Manager Server)

– How many versions to keep: 2

– Maximum space for backups: 30 GB (maximum space for backups on Tivoli Storage Manager Server).

You will be prompted for a Tivoli Storage Manager user name and password, see Figure 4-72 on page 189:

188 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 215: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-72 Node password on Tivoli Storage Manager

Figure 4-73 Select applications, files, and frequency to back up to Tivoli Storage Manager Server

Chapter 4. Proof of concept scenarios 189

Page 216: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-74 Create the include list for scheduled protection

Figure 4-73 on page 189 and Figure 4-74 show the frequency, directories, and files for scheduled protection.

– E-mail application: Select application (It will be configured on Schedule Backup Settings link)

– E-mail application data folder (wildcards allowed): Blank (It will be configured on Schedule Backup Settings link)

– How often to protect your e-mail: Hourly

– Select Schedule Backup Settings: Include the extensions or directories for scheduled protection

Note:

� It is not necessary to use the encryption feature, because Tivoli Storage Manager implements a user name and password to protect files.

� Sub-file copy is not supported to send files directly to Tivoli Storage Manager.

190 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 217: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-75 Advanced settings

Figure 4-75 shows the Advanced configuration for Tivoli Continuous Data Protection for Files:

– Allow program messages to pop up: Disabled (disables messages when you are using centralized administration)

– Do not locally backup files larger than: 200 MB

– Do not remotely backup files larger than: 2 GB

Centralized AdministrationUse the Central Administration Settings window to identify administration folders for this computer and to manage the configuration settings on other computers. Select the option Central Administration on the Tivoli Continuous Data Protection for Files main panel, see Figure 4-76 on page 192.

Chapter 4. Proof of concept scenarios 191

Page 218: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-76 Initial Tivoli Continuous Data Protection for Files panel

The key to configuring your clients to be managed centrally is in defining the central administration folder(s). When managing Tivoli Continuous Data Protection for Files on a group of computers, it is customary to configure one computer as the template for all computers in the group. In our lab, the Berlin server was used as a template for the group. Tivoli Continuous Data Protection for Files clients with different configurations would need to point to different central administration folders (in our lab environment all clients have the same configuration and all point to the same central administration directory).

Table 4-2 Central administration folder configurations for managing clients

Computer Name Group Remote storage location (Configured in remote storage tab)

Central AdministrationFolders

Result Remote storage location and Central Administration

Berlin Administrator Not applicable Not applicable Not applicable

192 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 219: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Tivoli Continuous Data Protection for Files uses special folders to manage configuration settings and product levels. Tivoli Continuous Data Protection for Files clients pull configuration options and new product code from these folders, and can push their configuration information to these folders for others clients to pull.

The central administration folder is specified in the Central Administration Folder field. If not specified then the central administration folder defaults to the \RealTImeBackup\ folder in the remote storage area.

The central administration folder contains two levels of administrative sub-folders.

– Group administrative sub-folder: These folders apply to all computers that share this central administration folder. In each level of administrative sub-folders, there are two folders:

• Reports Folder: Tivoli Continuous Data Protection for Files stores status reports in the Reports folder. The full path in our environment is \\Berlin\C$\cdp_admin\$MACHINE\BackupAdmin\Reports.

• Downloads Folder: When you put product upgrades or configuration files in this folder Tivoli Continuous Data Protection for Files will automatically pull the product upgrades or configuration. The full path in our environment is \\Berlin\C$\BackupAdmin\Downloads.

– Computer-specific sub-folders: These folders apply to only one computer.

There is no central administration folder on Tivoli Storage Manager server remote storage. If you use Tivoli Storage Manager server remote storage and you want to use central administration folders, you must configure the Central

Bruge Group TSM tsm:\\helsinki \\Berlin\C$\cdp_admin

\\Berlin\C$\cdp_admin

Dakar Group TSM tsm:\\helsinki \\Berlin\C$\cdp_admin

\\Berlin\C$\cdp_admin

Amsterdam Group TSM tsm:\\helsinki \\Berlin\C$\cdp_admin

\\Berlin\C$\cdp_admin

Izmir Group TSM tsm:\\helsinki \\Berlin\C$\cdp_admin

\\Berlin\C$\cdp_admin

Computer Name Group Remote storage location (Configured in remote storage tab)

Central AdministrationFolders

Result Remote storage location and Central Administration

Chapter 4. Proof of concept scenarios 193

Page 220: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Administration Folder: field in the Central Administration Settings window on the local machine. Type or browse for a folder that will be the central administration folder for the local computer.

Figure 4-77 Central administration configuration

Note: Verify the default directory on the Central Administration server has the appropriate access rights.

194 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 221: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Check the box Publish this computer’s settings as the configuration template for other computers to use, see Figure 4-77 on page 194. When you click the OK button, this computer’s configuration settings file will be copied to the downloads sub-folder of the central administration folder that is shared by the group of computers. All computers that share the central administration folder will adopt the Tivoli Continuous Data Protection for Files settings that you publish.

Use the Lock the configuration of others computers option to prevent any of the centrally managed computers from changing their settings.

Figure 4-78 Publish settings

Figure 4-78 shows that the fpcommands.xml was created successfully.

Figure 4-79 Rename fpcommands.xml to use push installation

To use published configuration settings when invoking the installer, rename the file to fpa.txt. See Figure 4-79.

Note: If you will use the published configuration file to push an installation to another computer, all Tivoli Continuous Data Protection for Files clients that share the central administration folder with the new client will be prevented from updating their configurations.

Note: If you will use the published configuration file to push installation to another computer, do not check the Run Scan Now box. If you do, all Tivoli Continuous Data Protection for Files clients that share the central administration folder with the new client will scan and backup all protected files. This can be a large burden on your network and the individual computer’s resources.

C:\cdp_admin\BackupAdmin\Downloads>copy fpcommands.xml fpa.txt 1 file(s) copied.

Chapter 4. Proof of concept scenarios 195

Page 222: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Now, it is necessary to distribute the Tivoli Continuous Data Protection for Files software to other computers.

Figure 4-80 Push installation on Bruge, Windows 2003 server

Figure 4-80 shows the push installation. See 3.2.3, “Push installation” on page 69 for more details.

The user on this computer will not notice that the push installation is occurring. Tivoli Continuous Data Protection for Files will activate itself after the next reboot.

In our scenario Dakar needs to have the same configuration of Berlin, our central management server. After rebooting the machine Dakar, the configuration is the same as that of the server Berlin. If you try to change the configuration you will get a warning message that the configuration is locked against changes, see Figure 4-81 on page 197.

C:\Program Files\Tivoli\CDP_for_Files>fpPushInst.exe \\Bruge /user:administrator /pwd:cdp4admin /c:C:\cdp_admin\BackupAdmin\Downloads\fpa.txt /r "C:\cdp_admin\BackupAdmin\Downloads\TivoliCDP_CDPForFiles_3.1.0.45_windows.exe" /s /v\"/qn Reboot=ReallySupress DONT_LAUNCH_FILEPATHSRV=1\"

Connecting to remote service \\Bruge ... ADMIN$ connected IPC$ connectedFile C:\cdp_admin\BackupAdmin\Downloads\fpa.txt copied to \\Bruge\ADMIN$\System32\fpa.txtFile C:\cdp_admin\BackupAdmin\Downloads\TivoliCDP_CDPForFiles_3.1.0.45_windows.exe copied.

Communication with remote established.

Waiting remote command's response...

Remote command returned 0(0x0)

Note: Push install is not supported on the Microsoft Vista operating system. In order to utilize your standard configuration, do a manual installation and configure the Central Administration Folder- for example \\Berlin\C$\cdp_admin. Use pull installation to utilize the same configuration from other managed client nodes. See 3.2.4, “Pull installation (upgrade)” on page 72 for more details.

196 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 223: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-81 Warning message

Centralized reportingThe scheduled backup reports table gives a summary of scheduled backups to remote storage areas for all computers who share a common central administration folder. To verify backups on our server Berlin we select Central Administration → View Report.

Figure 4-82 Scheduled backup reports table

Figure 4-82 shows the scheduled backup reports.

� Version: The version of Tivoli Continuous Data Protection for Files

Chapter 4. Proof of concept scenarios 197

Page 224: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

� Files: A number indicating approximately how many files were successfully backed up at the last schedule

� Failures: How many errors there were during the backup

� History: List of historical backup and failure logs

Backup policyThe existing backup policy configured on the Tivoli Storage Manager server will not be used in this configuration. Tivoli Continuous Data Protection for Files controls the number of files in the remote storage. Tivoli Storage Manager will be used as a storage repository and will not control versioning. For example, this scenario specifies that two versions shall be kept on Tivoli Storage Manager server. In the example below, the docu3.doc file had three different modifications creating two active versions and other remaining versions in an inactive state. See Table 4-3 and Table 4-4.

Table 4-3 Lifecycle file

Table 4-4 Characteristics of file on Tivoli Storage Manager

First Schedule Second Schedule Third Schedule

docu3.doc (Active) docu3.doc (Active) docu3.doc (Active)

- docu3.doc-FP1178726854.doc (Active)

docu3.doc-FP1178727242.doc (Active)

- - docu3.doc-FP1178726854.doc (Inactive)

File Name Active / Inactive Backup Date / Time

docu3.doc Active 2007-05-0914:58:27

docu3.doc-FP1178726854.doc

Active 2007-05-0914:12:56

docu3.doc-FP1178658964.doc

Inactive 2007-05-0914:06:34

198 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 225: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-83 Expiration example on Tivoli Storage Manager Server

Tivoli Continuous Data Protection for Files marks unwanted files as inactive. Expire inventory deletes unwanted backups from the Tivoli Storage Manager catalog and marks the backups on storage pools as expired. When the expire inventory process is executed on the Tivoli Storage Manager server the inactive versions will be removed from the Tivoli Storage Manager Database. See Figure 4-83.

tsm: ITSO_TSM>select ll_name,state,backup_date from backups where node_name='DAKAR' and ll_name like 'docu3%'ANR2963W This SQL query may produce a very large result table, or may require a significant amount of time to compute.

Do you wish to proceed? (Yes (Y)/No (N)) y

LL_NAME STATE BACKUP_DATE------------------ ------------------ ------------------docu3.doc ACTIVE_VERSION 2007-05-09 14:58:27.000000docu3.doc-FP11787- ACTIVE_VERSION 2007-05-09 27242.doc 14:12:56.000000docu3.doc-FP11787- INACTIVE_VERSION 2007-05-09 26854.doc 14:06:34.000000

tsm: ITSO_TSM>expire inventoryANS8003I Process number 8 started.

tsm: ITSO_TSM>select ll_name,state,backup_date from backups where node_name='DAKAR' and ll_name like 'docu3%'ANR2963W This SQL query may produce a very large result table, or may require a significant amount of time to compute.

Do you wish to proceed? (Yes (Y)/No (N)) y

LL_NAME STATE BACKUP_DATE------------------ ------------------ ------------------docu3.doc ACTIVE_VERSION 2007-05-09 14:58:27.000000docu3.doc-FP11787- ACTIVE_VERSION 2007-05-09 27242.doc 14:12:56.000000

tsm: ITSO_TSM>

Chapter 4. Proof of concept scenarios 199

Page 226: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

4.4.2 Enterprise with Tivoli Continuous Data Protection for Files loaded on file servers

Tivoli Continuous Data Protection for Files is also designed to run well on the file server (protecting the data that resides on file servers versus protecting data on the end-point workstations). The main value of Tivoli Continuous Data Protection for Files on a file server is that it essentially allows each user to have continuous versioning of their files available locally and at a high speed.

As described in scenario 4.4.1, “Enterprise environment with Tivoli Storage Manager” on page 180, user workstations can be configured to send data directly to Tivoli Storage Manager, but it is not the preferred configuration for several reasons:

– An additional application/agent that needs to be deployed

– An additional application needs to be licensed

– Tivoli Storage Manager sub-file mechanisms are not as space/network-efficient as Tivoli Continuous Data Protection for Files

– The network restart capability is batch oriented (if the transmission of pending files to Tivoli Storage Manager fails, it will start over completely when connected again)

– A file server is constantly up while the user’s workstation might not be network connected at all times

Note: We recommend that you back up the target file server using a traditional backup application such as Tivoli Storage Manager.

Note: When using a Tivoli Storage Manager server as your remote storage location, it is considered a best practice to position Tivoli Storage Manager and Tivoli Continuous Data Protection for Files on a file server rather than directly on users’ workstations.

200 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 227: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-84 Example of enterprise environment with Tivoli Storage Manager and file server

The lab environment is configured as follows:

� Group A (desktop computers)

– Continuous protection to local drive

– Scheduled protection to file server A

– Continuous protection for ImportantFiles directory

– Scheduled protection for ImportantFiles and ExampleData directories

– Frequency for scheduled protection = Hourly

– 1 version and 5 GB for continuous protection

– 2 versions and 30 GB for scheduled protection

– Remote Storage to file server A (Florence)

– Sub-file copy from files greater than 3 MB (Notes sub-file backup)

– Push installation to install Tivoli Continuous Data Protection for Files client

– Central administration to manage clients

TSMTSMTSMTSM

Tape Library

.

.

.

Mobile Computers

Corporate LAN

Department A

CDP

Department B

CDP

Department Z

CDP

CDP

File ServerA

File ServerB

File ServerZ

File ServerMobile Computers

Backup LAN

Chapter 4. Proof of concept scenarios 201

Page 228: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

– Do not replicate files greater than 200 MB local and 2 GB remote

– Maximum remote transfer rate 1Gbps

� Group B (mobile computers)

– Continuous protection to local drive

– Scheduled protection to file server B

– Continuous protection for ImportantFiles directory

– Scheduled protection for ImportantFiles and ExampleData directories

– Scheduled protection for e-mail

– Frequency for scheduled protection = Daily at 09:00 AM

– 1 version and 5 GB for continuous protection

– 2 versions and 30 GB for scheduled protection

– Remote Storage to file server B (Cairo)

– Sub-file copy from files greater than 3 MB (Notes sub-file backup)

– Push installation to install Tivoli Continuous Data Protection for Files client

– Central administration to manage clients

– Do not replicate files greater than 200 MB local and 2 GB remote

– Maximum remote transfer rate 100 MB

� File servers

– Vault for DoNotDeleteFiles directory

This environment contains two different groups to manage. See the flow for this environment on Figure 4-85 on page 203.

202 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 229: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-85 Lab environment (Tivoli Storage Manager and file server)

Tivoli Continuous Data Protection for Files with file serverThe main value of Tivoli Continuous Data Protection for Files on a file server is that it essentially allows each user to have continuous versions of their material available, at high speed, and it is possible to use a file server that already exists in your environment.

Before configuring Tivoli Continuous Data Protection for Files, it is necessary to configure the file server with the appropriate privileges and map the file server to each user’s computer. To reconnect to the file server each time the machine is rebooted, use the option in Windows Explorer: Tools → Map a network drive. See Figure 4-53 on page 169 and Figure 4-54 on page 169.

Berlin is the Central Administration server in this scenario, and it will be used to manage groups A and B.

� Configuration for Group A:

Active daemon identifying the modified files:

- Continuous protection sends to replication thread and replicates it locally

- Scheduled protection sends to journal list

Replicates the files in a remote storage

At schedule time verifies the journal list and replicates the pending files to File Server

At schedule time backs up the files to TSM Server

1

2

3

4

Corporate LAN

FlorenceWindows 2003

Pentium 41,5 GB memory

File Server A

TokyoWindows 2003

Pentium 41,5 GB memoryUser desktop

DakarWindows 2000

Pentium 41,5 GB memoryUser desktop

RomeWindows XP

Intel Dual Core1 GB memory

Mobile computer

AmsterdamWindows Vista

Pentium 41 GB memoryUser desktop

1 2

112

2

3

4

5678

9

10

11112

2

3

4

5678

9

10

11

CDP

1

CDP

1

3

112

2

3

4

5678

9

10

11

HelsinkiWindows 2003

Pentium 41 GB memoryTSM Server

CDP

1

TSM Client

3

4

CDP

2 2 2

3

112

2

3

4

5678

9

10

11

3

112

2

3

4

5678

9

10

11

3

CairoWindows 2003

Pentium 41,5 GB memory

File Server B

ViennaWindows XP

Pentium 41,5 GB memory

Mobile

MonacoWindows XP

Pentium 41,5 GB memory

Mobile

BrasiliaWindows XP

Intel Dual Core1 GB memory

Mobile

MontevideoWindows XP

Pentium 41 GB memory

Mobile

1 2

112

2

3

4

5678

9

10

11112

2

3

4

5678

9

10

11

CDP

1

CDP

1

3CDP

1

TSM Client

3

4

CDP

2 2 2

3

112

2

3

4

5678

9

10

11

3

112

2

3

4

5678

9

10

11

3

Backup LAN4

4

BerlinWindows 20003

Central Management

Chapter 4. Proof of concept scenarios 203

Page 230: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-86 General configuration

Figure 4-86 shows the configuration for continuous protection in this scenario:

– Backup to: C:\ (local disk only)

– How many versions to keep: 1 (versions to cover with continuous protection)

– Maximum space for backups: 5 GB (maximum space for local continuous protection)

– Continuous protection level: Local storage only (continuous protection is enabled only for local disk)

204 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 231: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-87 Files to protect in continuous protection

Figure 4-87 shows the files to protect continuously in this scenario.

Chapter 4. Proof of concept scenarios 205

Page 232: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-88 Remote storage configuration to file server Florence

Figure 4-88 shows the configuration to file server Florence.

– Backup to: File Server

– Location: \\florence\cdp_fileserver

– How many versions to keep: 2

– Maximum space for backups: 30 GB (maximum space for local continuous protection)

– Advanced Settings:

• Encryption backups: Disable

• Compression backups: Disable

– Sub-file copy: 3 MB (send only portions of each file greater than 3 MB)

206 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 233: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-89 Select applications, files, and frequency to back up to a file server

Note:

� If you want additional security for your files on your file server enable the encryption option

� If you want to save space on your file server use the compression option

Chapter 4. Proof of concept scenarios 207

Page 234: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-90 Create the include list for scheduled protection

Figure 4-89 on page 207 and Figure 4-90 show the frequency, directories, and files for scheduled protection.

– E-mail application: Select application (configured on Schedule Backup Settings link)

– E-mail application data folder (wildcards allowed): Blank (configured on Schedule Backup Settings link)

– How often to protect your e-mail: Hourly

– Schedule Backup Settings: ImportantData and ExampleData (include extensions and directories to scheduled protection)

208 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 235: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-91 Advanced settings

Figure 4-91 shows the advanced configuration for Tivoli Continuous Data Protection for Files:

– Allow program messages to pop-up: Disabled (recommended for centralized administration)

– Do not locally backup files larger than: 200 MB (files greater than 200 MB will be skipped by Tivoli Continuous Data Protection for Files continuous protection)

– Do not remotely backup files larger than: 2 GB (files greater than 2 GB will skipped by Tivoli Continuous Data Protection for Files scheduled protection)

– Maximum remote transfer rate: 1 Gbs (maximum network throughput allowed)

Chapter 4. Proof of concept scenarios 209

Page 236: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-92 Central administration configuration for group A

Figure 4-92 shows the Central Administration Settings for servers on Group A:

– Central Administration Folder: \\Berlin\C$\cdp_admin\groupA

– Publish this computer’s settings as the configuration template for others computers to use: Enable (create the fpcommands.xml file)

• Lock the configuration of others computers: Enable

• Run “Scan Now” on other computers: Disable

– Click OK to publish settings, see Figure 4-93 on page 211.

210 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 237: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-93 Publish settings

� Configuration for Group B:

Some configuration options are the same as Group A so it is not necessary to change them:

– General configuration

– Files to protect in continuous protection

Figure 4-94 Remote storage configuration to file server Cairo

Chapter 4. Proof of concept scenarios 211

Page 238: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-94 on page 211 shows the configuration to file server Cairo:

– Back up to: File Server

– Location: \\cairo\cdp_fileserver

– How many versions to keep: 2 (number of different versions of each file)

– Maximum space for backups: 30 GB (maximum space for local continuous protection)

– Advanced Settings:

• Encryption backups: Disable

• Compression backups: Disable

• Sub-file copy: 3 MB (send only portions of each file greater than 3 MB)

Figure 4-95 Select applications, files and frequency to backup to file server Cairo

212 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 239: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-96 Create the include list for scheduled protection

Figure 4-95 on page 212 and Figure 4-96 show the frequency as well as directories and files for scheduled protection.

Chapter 4. Proof of concept scenarios 213

Page 240: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-97 Advanced settings

Figure 4-97 shows the advanced configuration for Tivoli Continuous Data Protection for Files.

214 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 241: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-98 Central administration configuration for group B

Figure 4-98 shows the Central Administration Settings for servers on Group A:

– Central Administration Folder: \\Berlin\C$\cdp_admin\groupB

– Publish this computer’s settings as the configuration template for others computers to use: Enable (create the fpcommands.xml file)

• Lock the configuration of others computers: Enable

• Run “Scan Now” on other computers: Disable

Click OK to publish settings, see Figure 4-99 on page 216:

Chapter 4. Proof of concept scenarios 215

Page 242: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-99 Publish settings

Push InstallationUse the push installation option to distribute Tivoli Continuous Data Protection for Files to all computers.

Use push installation on the servers. For Windows Vista, you need to install Tivoli Continuous Data Protection for Files manually.

Central managementTwo clients with different remote storage locations would have different default central administration folders. See Table 4-5.

Table 4-5 Central administration folder configurations for managing clients

Note: You can also use software distribution applications to install Tivoli Continuous Data Protection for Files.

Computer Name

Group Remote storage location (Configured in remote storage tab)

Central Administration Folders

Result: Remote storage location and Central Administration

Berlin Administrator Not applicable Not applicable Not applicable

Tokyo Group A \\Florence\cdp_fileserver

\\Berlin\C$\cdp_admin\GroupA

\\Berlin\C$\cdp_admin\GroupA

Dakar Group A \\Florence\cdp_fileserver

\\Berlin\C$\cdp_admin\GroupA

\\Berlin\C$\cdp_admin\GroupA

Amsterdam Group A \\Florence\cdp_fileserver

\\Berlin\C$\cdp_admin\GroupA

\\Berlin\C$\cdp_admin\GroupA

Rome Group A \\Florence\cdp_fileserver

\\Berlin\C$\cdp_admin\GroupA

\\Berlin\C$\cdp_admin\GroupA

Vienna Group B \\Cairo\cdp_fileserver

\\Berlin\C$\cdp_admin\GroupB

\\Berlin\C$\cdp_admin\GroupB

216 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 243: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

When you manage group A, configure Berlin’s central administration folder to be the same as the central administration folder for group A. Follow these steps:

1. Open the Central Administration Settings window.

2. In the Central Administration Folder type \\Berlin\C$\cdp_admin\GroupA (or browse for this directory).

3. Click the OK button. The window will close.

4. Open the Central Administration Settings window again.

5. Click the View Report link. The remote storage reports table will open.

When you manage group B, configure Berlin’s central administration folder to be the same as the central administration folder for group A. Follow these steps:

1. Open the Central Administration Settings window.

2. In the Central Administration Folder type \\Berlin\C$\cdp_admin\GroupB (or browse for this directory).

3. Click the OK button. The window will close.

4. Open the Central Administration Settings window again

5. Click the View Report link. The remote storage reports table will open.

Figure 4-100 on page 218 shows the report for Group A.

Monaco Group B \\Cairo\cdp_fileserver

\\Berlin\C$\cdp_admin\GroupB

\\Berlin\C$\cdp_admin\GroupB

Montevideo Group B \\Cairo\cdp_fileserver

\\Berlin\C$\cdp_admin\GroupB

\\Berlin\C$\cdp_admin\GroupB

Brasilia Group B \\Cairo\cdp_fileserver

\\Berlin\C$\cdp_admin\GroupB

\\Berlin\C$\cdp_admin\GroupB

Computer Name

Group Remote storage location (Configured in remote storage tab)

Central Administration Folders

Result: Remote storage location and Central Administration

Chapter 4. Proof of concept scenarios 217

Page 244: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-100 Central Management Report for Group B

VaultVault folders, and the files in them, are not affected by the exclude list, nor by the list of files that are specified for continuous or scheduled protection. All files that you select in the Vault settings dialog will be vaulted.

In our lab environment Tivoli Continuous Data Protection for Files is installed on the file server with just the vault option configured. No other tabs need to be configured. See Figure 4-101 on page 219, Figure 4-102 on page 219, Figure 4-103 on page 220 and Figure 4-104 on page 220.

218 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 245: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-101 Files to protect on file server Florence

Figure 4-102 Protected vaulting settings on file server Florence

Chapter 4. Proof of concept scenarios 219

Page 246: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-103 Files to protect on file server Cairo

Figure 4-104 Protected vaulting settings on file server Cairo

220 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 247: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

If anyone tries to delete a file inside in this directory they will receive a message that this file is write-protected. See Figure 4-105.

Figure 4-105 Message error when trying to delete vaulted files

E-mail integration (Notes)Tivoli Continuous Data Protection for Files has special support for files that are constantly open. The technique used by Tivoli Continuous Data Protection for Files is referred to as “bitmapping” a file’s I/O. When writes occur to database/file, Tivoli Continuous Data Protection for Files keeps a “bit” that identifies the region that is changing. This is a extremely low-overhead operation. At the time of replication, Tivoli Continuous Data Protection for Files can exploit that bitmap to know the regions to copy to the target.

Because e-mail files typically are very large, they are not backed up continuously, but only on the schedule that you select. E-mail files are backed up only to remote storage. If the remote storage is not available at the scheduled backup time, Continuous Data Protection for Files will queue the backup copies for later transmission. When the remote storage area becomes available, Continuous Data Protection for Files will create the backup copies on the remote storage area.

In lab environment, Vienna, a Windows XP desktop user has Lotus Notes 7 installed and constantly in use. See Figure 4-106 on page 222.

Note: If transmission is interrupted for any reason or the computer reboots or is shut down, Tivoli Continuous Data Protection for Files will resume at the block last transferred; it will not restart the entire transmission.

Chapter 4. Proof of concept scenarios 221

Page 248: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-106 Protect Lotus Notes 7, using scheduled continuous protection

The first time that you are using Tivoli Continuous Data Protection for Files with Notes you will be prompted for a Notes password. See Figure 4-107.

Figure 4-107 Password for Lotus Notes Database

This scenario has sub-file configured for files greater than 3 MB. Figure 4-108 on page 223 shows the replicated Notes files on file server Cairo.

222 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 249: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-108 Notes files on file server Cairo

Backup file server to Tivoli Storage Manager ServerDefine your file server as a client node on Tivoli Storage Manager to back up the protected files from Tivoli Continuous Data Protection for Files.

Configure backup policy on Tivoli Storage Manager ServerEach file backed up by Tivoli Continuous Data Protection for Files has an appended suffix, so the file will be seen as unique to Tivoli Storage Manager and always active on Tivoli Storage Manager server and will never expire. Tivoli Storage Manager will delete these files when Tivoli Continuous Data Protection for Files purges them from the file server.

In this scenario, the customer wants to retain the backed up files for 360 days.

1. From the Tivoli Storage Manager command line configure policy domain, policyset, management class and backup copy group:

Chapter 4. Proof of concept scenarios 223

Page 250: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-109 Backup policy on Tivoli Storage Manager

2. From the Tivoli Storage Manager command line add nodes to Tivoli Storage Manager Server.

tsm: ITSO_TSM>define domain pdfls description='Domain for File Server'ANR1500I Policy domain PDFLS defined.

tsm: ITSO_TSM>define policyset pdfls psfls description='Policy Set for File Server'ANR1510I Policy set PSFLS defined in policy domain PDFLS.

tsm: ITSO_TSM>define mgmtclass pdfls psfls mcfls description='Management Class Default for File Server'ANR1520I Management class MCFLS defined in policy domain PDFLS, set PSFLS.

tsm: ITSO_TSM>define copygroup pdfls psfls mcfls standard verexists=1 retextra=0 verdeleted=1 retonly=360 destination=diskpoolANR1530I Backup copy group STANDARD defined in policy domain PDFLS, set PSFLS, management class MCFLS.

tsm: ITSO_TSM>assign defmgmtclass pdfls psfls mcflsANR1538I Default management class set to MCFLS for policy domain PDFLS, set PSFLS.

tsm: ITSO_TSM>activate policyset pdfls psflsANR1554W DEFAULT Management class MCFLS in policy set PDFLS PSFLS does not have an ARCHIVE copygroup: files will notbe archived by default if this set is activated.

Do you wish to proceed? (Yes (Y)/No (N)) yANR1554W DEFAULT Management class MCFLS in policy set PDFLS PSFLS does not have an ARCHIVE copygroup: files will notbe archived by default if this set is activated.ANR1514I Policy set PSFLS activated in policy domain PDFLS.

224 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 251: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-110 Register node on Tivoli Storage Manager server

3. On the Tivoli Storage Manager client configure dsm.opt options (C:\Program Files\tivoli\tsm\client\ba\bin\dsm.opt).

Figure 4-111 Example of dsm.opt file

tsm: ITSO_TSM>register node florence cdp4admin domain=pdfls passex=0ANR2060I Node FLORENCE registered in policy domain PDFLS.ANR2099I Administrative userid FLORENCE defined for OWNER access to node FLORENCE.

tsm: ITSO_TSM>register node cairo cdp4admin domain=pdfls passex=0ANR2060I Node CAIRO registered in policy domain PDFLS.ANR2099I Administrative userid CAIRO defined for OWNER access to node CAIRO.

Chapter 4. Proof of concept scenarios 225

Page 252: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

4. On the client node validate user name and password to access Tivoli Storage Manager. Go to Start → All Programs → Tivoli Storage Manager → Backup-Archive GUI.

Figure 4-112 Validate password

5. Use Tivoli Storage Manager schedule or another scheduling tool to setup times to back up your file server

Figure 4-113 Schedule backup on Tivoli Storage Manager

tsm: ITSO_TSM>define schedule pdfls fs_incr_daily type=client description='Daily Backup Incremental' action=incrementalstarttime=22:00 duration=1 durunits=hours period=1 perunits=days dayofweek=anyANR2500I Schedule FS_INCR_DAILY defined in policy domain PDFLS.

tsm: ITSO_TSM>define association pdfls fs_incr_daily cairo,florenceANR2510I Node CAIRO associated with schedule FS_INCR_DAILY in policy domain PDFLS.ANR2510I Node FLORENCE associated with schedule FS_INCR_DAILY in policy domain PDFLS.

226 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 253: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

4.4.3 Enterprise and remote offices

A situation where you have small, remote offices with no local administrator is an ideal scenario to use Tivoli Continuous Data Protection for Files to replicate data to a centralized corporate file server. This is recommended when you have a few servers and the daily percentage of data change varies from 2 to 8%, otherwise the connection link might not be enough to support the replication of the remote data (based on the assumption your remote office has a limited network connection).

Figure 4-114 Enterprise and remote offices example

To send the replicated files to a local file server follow the steps outlined in the section“Tivoli Continuous Data Protection for Files with file server” on page 203. Remember to appropriately configure the “Maximum remote transfer rate”, on the Advanced tab.

Note: Properly size your network link when you intend to replicate data using a WAN.

Corporate LAN

TSMTSMTSMTSM

Tape Library

.

.

.

Mobile Computers

Department A

CDP

Department B

File ServerA

File ServerB

File ServerRemote Offces

File ServerMobile

Computers

Backup LAN

Department B

CDP

Corporate Site

Servers

Servers

Remote Office A

Remote Office B

Broadband

Chapter 4. Proof of concept scenarios 227

Page 254: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

4.5 Restore scenarios

If you have lost an important file (or set of files) Tivoli Continuous Data Protection for Files provides you with an easy way to restore your lost information. You can restore individual files, groups of files, and directory trees. You can restore them to their original location or to a new location. If a file has several backup versions, you can either restore the most recent version (the default setting) or select a different version. A wizard guides you to find the file, choose the right version, and choose the location to restore your file.

To restore files, you need to click on the link Restore, on the file status page. See Figure 4-115.

Figure 4-115 Status page

The Welcome page lists the steps to restore your files. See Figure 4-116 on page 229.

228 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 255: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-116 Welcome page

Click the Next button to advance to the next page of the wizard, the page Files to restore displays, see Figure 4-117 on page 230, or click the Cancel button to exit the wizard without restoring any files.

Chapter 4. Proof of concept scenarios 229

Page 256: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-117 Files to restore

4.5.1 Restore from local disk

In this scenario, the file BackupMe.txt will be restored on the Berlin server.

1. On the Files to Restore page, select the option Search, and type the name of the file to restore.

230 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 257: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-118 Search BackupMe.txt file

The search dialog has several fields. The fields are combined to narrow the search criteria. Leaving any field blank increases the chances of finding more files.

• Find files with all or part of this name: The option used in this example. When you know the name or part of the name of the file you want to restore. You can use an asterisk as a wildcard.

• Find files created by application check box: When you know the application that you want to restore. Check as many applications as you want.

• Find files from location type: Local (default option), remote storage or other (any folder you choose)

Chapter 4. Proof of concept scenarios 231

Page 258: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-119 Search status

2. Select the file to restore and click Next.

Figure 4-120 Select the file to restore

232 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 259: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

– Information on the file to restore:

• File Name: The name of the file to restore. Let your pointer hover over the file name to reveal the full path of the file.

• Version: The box lists the dates and times that this file was backed up. Note that this file has three different versions.

• Size: The size of the file

3. We will restore the file in the C:\RestoreFiles directory. Select the option to restore the file to the following location.

Figure 4-121 Restore Location

4. See the summary information and click Finish to restore the file.

Chapter 4. Proof of concept scenarios 233

Page 260: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-122 Summary information

5. On the Status Page, View Report, you can check if the file was restored successfully:

Figure 4-123 View report

4.5.2 Restore from remote storage

It is possible to restore your files from the remote storage area that is currently configured.

234 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 261: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Restore from external storage a compressed fileIn this scenario, the file RestoreCompress.txt will be restored from an external device, on Amsterdam server. Remember that when you have a compressed file, it is mandatory to use Tivoli Continuous Data Protection for Files to restore, otherwise you cannot work with the file.

� In the Settings Notebook, select Restore → Next (on Welcome Page) → Search (on Files to Restore) → Remote (on From location type, drill down option):

Figure 4-124 Select remote storage to restore

6. Click OK. Tivoli Continuous Data Protection for Files will search for the file:

Chapter 4. Proof of concept scenarios 235

Page 262: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-125 Tivoli Continuous Data Protection for Files searching files

7. Select the file RestoreCompress.txt and click Next:

Figure 4-126 Select file name and version of file to restore

236 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 263: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

8. Select the option Restore data to the Following location, and select the path C:\RestoreFiles\ .

Figure 4-127 Select location to restore

9. On Summary information, verify that everything is correct and click Next.

Chapter 4. Proof of concept scenarios 237

Page 264: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-128 Summary information

10.On the Status Page, View Report, check if the file was restored successfully:

Figure 4-129 Status page, view report

11.The restored file does not have the extension .cdp anymore.

238 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 265: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-130 Check the restored file

Restore an encryption file from an ISP provider In this scenario, the file RestoreEncryption.txt will be restored from an ISP provider to Madrid server.

1. In the Settings Notebook, select Restore → Next (on Welcome Page) → Search (on Files to Restore) → Remote (on From location type, drill down option):

2. Click OK to search the file.

Figure 4-131 Tivoli Continuous Data Protection for Files searching for files

3. Select the file RestoreEncryption.txt and click Next.

Chapter 4. Proof of concept scenarios 239

Page 266: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-132 Select files to restore

4. Select the option Restore data to Following location, and select the path C:\RestoreFiles\ .

240 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 267: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-133 Select location to restore

5. In Summary information, verify that everything is correct and click Next.

Chapter 4. Proof of concept scenarios 241

Page 268: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-134 Summary information

6. In the Status Page, View Report, check if the file was restored successfully.

Figure 4-135 Status page, view report

7. The restored file does not have the extension .cdp anymore.

242 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 269: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-136 Check the restored file

Restore an entire directory from a File Server In this scenario, the directory ExampleData will be restored from a file server to the Dakar server.

1. In the Settings Notebook, select Restore → Next (on Welcome Page) → Folder View → Change Search Location link → Remote (on from Change source location (drill down option). Click OK.

2. Select the directory that you want to restore, click Update Table, and click OK.

Figure 4-137 Tivoli Continuous Data Protection for Files Change Search Location window

Chapter 4. Proof of concept scenarios 243

Page 270: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-138 Select files to restore

3. Select The following location and type in the path C:\RestoreDirectory\.

244 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 271: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-139 Select location to restore

4. In Summary information, verify everything is correct and click Next.

Chapter 4. Proof of concept scenarios 245

Page 272: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-140 Summary information

5. Check status page to confirm the files were restored successfully.

Figure 4-141 Status page, view report

Restore from File Server sub-file copy backupIn this scenario, the file log.nsf will be restored from the file server Vienna.

� In the Settings Notebook, select Restore → Next (on Welcome Page) → Search (on Files to Restore) → Remote (on From location type, drill down option):

246 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 273: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-142 Select remote storage to restore

� Click OK to search the files.

Chapter 4. Proof of concept scenarios 247

Page 274: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-143 Tivoli Continuous Data Protection for Files searching for files

6. Select the file log.nsf and click Next.

Figure 4-144 Select files to restore

248 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 275: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

This file has two different versions on the file server and one FPdelta file. If you choose the last version to restore, you will restore the last version and add the modifications that exist on delta file. See below.

Figure 4-145 Versions of notes file log.nsf on file server

7. Select the option Restore data to: The following location, and type in the path C:\RestoreNotes\.

Figure 4-146 Select location to restore

8. In Summary information, verify everything is correct and click Next.

Chapter 4. Proof of concept scenarios 249

Page 276: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-147 Summary information

9. In Status Page, View Report, confirm that the file was restored successfully.

Figure 4-148 Status page, view report

10.The restored file is shown below.

250 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 277: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-149 The restored notes file

4.5.3 Restore from Tivoli Storage Manager or Tivoli Storage Manager Express to a file server

The Tivoli Storage Manager client or Tivoli Storage Manager Express backup-client program allows you to restore files from the backup server to a file server. In this scenario the directory C:\ExampleData will be restored to the Dakar server on C:\RestoreFiles directory.

1. Start the Tivoli Storage Manager backup archive program: Start → Programs → Tivoli Storage Manager → Backup-Archive GUI.

Figure 4-150 Tivoli Storage Manager backup-archive client

Chapter 4. Proof of concept scenarios 251

Page 278: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

2. Select Restore → Select File Level → Select Directories or Files to Restore. Click Restore.

Figure 4-151 Restore Tab

3. Select The following Location and type the path to restore on C:\RestoreFiles. Choose the option Restore Complete Path. Click Restore.

252 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 279: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-152 Select destination folder

4. Check the Restore Report. If all files were restored successfully, click OK in the Restore Completed window.

Chapter 4. Proof of concept scenarios 253

Page 280: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 4-153 Report status

254 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 281: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Chapter 5. Troubleshooting, hints, and tips

In this chapter, we discuss troubleshooting methods, hints, and tips for running Tivoli Continuous Data Protection for Files. We cover potential installation issues and replication problems using an external device, a Web-based Distributed Authoring and Versioning (WebDAV) server and an IBM Tivoli Storage Manager server. We provide information about the log files used by Tivoli Continuous Data Protection for Files and show how to trace the program.

In particular, we cover the following topics:

� “Installation issues” on page 256

� “Replication issues” on page 291

� “System operation and log files” on page 347

� “Tracing” on page 351

5

Note: While installing, configuring, and operating Tivoli Continuous Data Protection for Files, you might experience various issues. We cover common issues. It is not possible to cover all potential problems. If you face a problem that we have not described, follow the normal support procedure to contact your local IBM support personnel. This chapter helps you gather information that you can hand over to IBM support personnel for deeper problem analysis.

© Copyright IBM Corp. 2007. All rights reserved. 255

Page 282: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

5.1 Installation issuesThis section contains information about some common problems that might arise during installation of Tivoli Continuous Data Protection for Files and explains how to solve and avoid these issues. For more information about the installation possibilities refer to 3.1, “Basic installation and configuration” on page 40 and 3.2, “Advanced installation options” on page 64.

5.1.1 Disk spaceBy default, Tivoli Continuous Data Protection for Files is installed in the directory C:\Program Files\Tivoli\CDP_for_Files. You can change the installation location to a different drive, path, or both, but this might lead to a problem if the new location does not have enough free disk space to install Tivoli Continuous Data Protection for Files.

Figure 5-1 shows an example of a non-default installation location, where Tivoli Continuous Data Protection for Files is installed in the directory G:\Program Files\Tivoli\CDP_for_Files.

Figure 5-1 Ready to Install the Program window

Before Tivoli Continuous Data Protection for Files actually starts the installation process, it checks if the destination disk has enough free space for a complete installation.

256 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 283: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

If you click Next, and Tivoli Continuous Data Protection for Files encounters an out-of-space condition, you will see a warning window as shown in Figure 5-2.

Figure 5-2 Out of Disk Space window

Click OK to close the Out of Disk Space window. You will now see the Custom Setup window as shown in Figure 5-3 on page 258.

Note: The disk with the out-of-space condition is highlighted (here the G: drive).

Chapter 5. Troubleshooting, hints, and tips 257

Page 284: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-3 Custom Setup window

At this point you can:

� Remove files or folders from the destination drive to free up the needed space and continue the installation.

� Cancel this installation and start a new installation choosing a different installation destination.

� Choose a different installation location.

Removing files or foldersTo delete files or folders from the designated installation location, you can use the Windows Explorer or the Windows command prompt.

If you have freed up enough disk space for the Tivoli Continuous Data Protection for Files installation, click Next in the Custom Setup window (see Figure 5-3). You will see the Ready to Install the Program window (see Figure 5-1 on page 256). If you click Next, the installation process of Tivoli Continuous Data Protection for Files will start.

Cancelling the installation processIf you want to cancel this installation process, click Cancel in the Custom Setup window (see Figure 5-3). A window displays asking you if you really want to

258 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 285: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

cancel the installation of Tivoli Continuous Data Protection for Files (see Figure 5-4).

Figure 5-4 Cancel installation window

If you click Yes, the InstallShield Wizard Completed window (see Figure 5-5) displays informing you that the wizard was interrupted before Tivoli Continuous Data Protection for Files could be completely installed.

Figure 5-5 InstallShield Wizard Completed window (canceled installation)

Click Finish to exit the InstallShield Wizard. If you now run the installation again, make sure to specify an installation location with enough free disk space.

Chapter 5. Troubleshooting, hints, and tips 259

Page 286: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Choosing a different installation locationIf you decide to install Tivoli Continuous Data Protection for Files to a different installation location, click Back in the Custom Setup window (see Figure 5-3 on page 258).

You will see the Setup Type window as shown in Figure 5-6.

Figure 5-6 Setup Type (of installation) window

Select Complete as the installation type and click Next. The Ready to Install the Program window displays (see Figure 5-1 on page 256).

Click Back, and you will see the Destination Folder window as shown in Figure 5-7 on page 261.

260 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 287: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-7 Destination Folder window

If you click Change..., you will be able to change the installation directory for Tivoli Continuous Data Protection for Files (see Figure 5-8 on page 262).

Chapter 5. Troubleshooting, hints, and tips 261

Page 288: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-8 Change Current Destination Folder window

Here you can select a different installation destination with more disk space to finally complete the installation of Tivoli Continuous Data Protection for Files.

5.1.2 Non-privileged users

Tivoli Continuous Data Protection for Files works for all Windows users, even those users that have only limited privileges (non-privileged users).

Important: Be aware that you can only change the location where Tivoli Continuous Data Protection for Files installs its program files. You cannot change the location of the Tivoli Continuous Data Protection for Files data files. See 3.4.1, “Installation and data directories” on page 108 for more information about the installation directories.

For the installation process of Tivoli Continuous Data Protection for Files to complete successfully, make sure that both installation locations, the program files installation directory and the data installation directory, have enough free disk space.

262 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 289: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

However, to install Tivoli Continuous Data Protection for Files on a system, the user needs to have administrative rights. This is necessary because besides the program files, the user needs to install low-level driver components and perform updates to the Windows registry.

To protect a system from unauthorized program installations, non-privileged users are usually not allowed to install programs into the program files directory. If a non-privileged user tries to install Tivoli Continuous Data Protection for Files anyway, an error window is displayed informing the user that the destination directory is not writable (see Figure 5-9).

Figure 5-9 Error message during non-privileged user installation

5.1.3 Port conflicts

To run Tivoli Continuous Data Protection for Files and manage it through its user interface, Tivoli Continuous Data Protection for Files service is listening by default on port 9003.

Unfortunately, you cannot change this port prior or during the installation process. In case another application is already using port 9003, the Tivoli Continuous Data Protection for Files service will later fail binding to it.

This section shows how you can change the default port in the Windows registry after the installation is finished, so Tivoli Continuous Data Protection for Files can operate again.

Note: To configure Tivoli Continuous Data Protection for Files in a multi-user environment, refer to 4.4.1, “Enterprise environment with Tivoli Storage Manager” on page 180.

Tip: Ensure that you have the necessary administrative rights to install Tivoli Continuous Data Protection for Files or ask your system administrator to perform the program installation for you.

Chapter 5. Troubleshooting, hints, and tips 263

Page 290: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Checking for potential port conflicts before the installationTo display all the current connections and listening ports, use the netstat -a command. To do so, perform the following steps:

1. Click Start → Run, type cmd, and click OK.

2. In the command-line window that displays, enter the netstat -a command.

Figure 5-10 on page 265 shows the output of a netstat -a command before the installation of Tivoli Continuous Data Protection for Files. A program is already listening on port 9003.

Important: If an application is already using port 9003 and cannot use a different port number, the installation of Tivoli Continuous Data Protection for Files will not fail. All necessary files will be copied to the system and the required entries will be made in the Windows registry.

264 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 291: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-10 Port 9003 already being used by another program

Microsoft Windows [Version 5.2.3790](C) Copyright 1985-2003 Microsoft Corp.

C:\Documents and Settings\Administrator>netstat -a

Active Connections

Proto Local Address Foreign Address State TCP florence:echo florence:0 LISTENING TCP florence:discard florence:0 LISTENING TCP florence:daytime florence:0 LISTENING TCP florence:qotd florence:0 LISTENING TCP florence:chargen florence:0 LISTENING TCP florence:nameserver florence:0 LISTENING TCP florence:domain florence:0 LISTENING TCP florence:http florence:0 LISTENING TCP florence:epmap florence:0 LISTENING TCP florence:microsoft-ds florence:0 LISTENING TCP florence:1025 florence:0 LISTENING TCP florence:1028 florence:0 LISTENING TCP florence:1037 florence:0 LISTENING TCP florence:1038 florence:0 LISTENING TCP florence:1042 florence:0 LISTENING TCP florence:1044 florence:0 LISTENING TCP florence:1062 florence:0 LISTENING TCP florence:1085 florence:0 LISTENING TCP florence:1086 florence:0 LISTENING TCP florence:1920 florence:0 LISTENING TCP florence:2100 florence:0 LISTENING TCP florence:3389 florence:0 LISTENING TCP florence:3661 florence:0 LISTENING TCP florence:5800 florence:0 LISTENING TCP florence:5900 florence:0 LISTENING TCP florence:6014 florence:0 LISTENING TCP florence:6789 florence:0 LISTENING TCP florence:8222 florence:0 LISTENING TCP florence:8333 florence:0 LISTENING TCP florence:9003 florence:0 LISTENING TCP florence:9510 florence:0 LISTENING TCP florence:9514 florence:0 LISTENING TCP florence:9515 florence:0 LISTENING TCP florence:10110 florence:0 LISTENING

Chapter 5. Troubleshooting, hints, and tips 265

Page 292: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

In this example, the Tivoli Continuous Data Protection for Files service will not be able to bind successfully to port 9003 after the installation is completed.

Installing Tivoli Continuous Data Protection for FilesRefer to 3.1, “Basic installation and configuration” on page 40 and 3.2, “Advanced installation options” on page 64 for details about how to install Tivoli Continuous Data Protection for Files.

At the end of the installation processWhen the service tries to start for the first time at the end of the Tivoli Continuous Data Protection for Files installation process, a notification message informs you that Tivoli Continuous Data Protection for Files is experiencing a problem (see Figure 5-11).

Figure 5-11 Tivoli Continuous Data Protection for Files reporting a problem

At the same time, Tivoli Continuous Data Protection for Files is launching a Web browser trying to start the Initial Configuration Wizard. This fails because it is trying to open the URL with the default port 9003 (see Figure 5-12 on page 267).

266 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 293: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-12 Tivoli Continuous Data Protection for Files unable to start the Initial Configuration Wizard

Windows system event logIf you refer to the system event log in the Event Viewer, as requested by Tivoli Continuous Data Protection for Files, the event log shows something similar to Figure 5-13 on page 268.

Depending on the Windows operating system that you use, follow these steps to start the Event Viewer:

� Windows XP:

Select Start → Control Panel → Administrative Tools → Event Viewer → System.

� Windows 2000 and 2003:

Chapter 5. Troubleshooting, hints, and tips 267

Page 294: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Select Start → Settings → Control Panel → Administrative Tools → Event Viewer → System.

� Microsoft Vista:

Select Start → Control Panel → System and Maintenance → Administrative Tools → Event Viewer → Windows Logs → System.

Figure 5-13 Tivoli Continuous Data Protection for Files entries in the event log

There are three log entries that belong to the Tivoli Continuous Data Protection for Files:

� Two informational log entries:

– Source: FilePath

Event ID: 6033

Description: FilePath (host) driver loaded and ready

– Source: Tivoli CDP for Files

Event ID: 6103

Description: Tivoli CDP for Files version 3.1.x.y is starting (kernel driver version is 3.1.x.y)

� One error log entry:

Note: Instead of 3.1.x.y, you will see a real version number depending on the version of Tivoli Continuous Data Protection for Files you are running, for example 3.1.0.45.

268 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 295: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

– Source: Tivoli CDP for Files

Event ID: 6008

Description: During socket bind operation, failed; Reason: There are no more files.

Figure 5-14 shows the complete properties of the error event log entry due to the Tivoli Continuous Data Protection for Files not being able to bind to the port. You can open this window by right-clicking Error log entry with Event ID 6008 and selecting Properties.

Figure 5-14 Error entry in the Windows system event log

Editing the Windows registryTo change the port number to a different unused port so that Tivoli Continuous Data Protection for Files can work properly, edit the Windows registry using the Registry Editor.

We explain the steps to make the changes in the Windows registry in detail, because an incorrect handling of the Registry Editor can seriously harm the Windows system’s stability and ability to function.

Chapter 5. Troubleshooting, hints, and tips 269

Page 296: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Perform the following steps to make the necessary changes in the Windows registry:

1. To start the Registry Editor, select Start → Run, type regedit, and click OK.

2. In the left frame, locate and select the branch HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\FilePathsrv

Figure 5-15 shows that the port number (by default 9003) is stored in the DWORD Value named FpPort.

Figure 5-15 Port number in the FpPort DWORD Value

3. Right-click the FpPort DWORD Value, and select Modify (see Figure 5-16 on page 271).

Attention:

� If you use the Registry Editor incorrectly, you could cause serious problems that could require you to reinstall your operating system. IBM cannot guarantee that you can solve the problems that result from using the Registry Editor incorrectly. Use the Registry Editor at your own risk.

� We recommend that you make a backup of the Windows registry before making any manual changes to it. This allows you to restore the Windows registry in case something goes wrong accidentally.

270 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 297: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-16 Modifying the FpPort DWORD Value

4. Select Decimal, enter an unused port number (for example, 9005), and click OK (see Figure 5-17).

Figure 5-17 Changing the port number to 9005

Figure 5-18 on page 272 shows the new port number (9005) in the FpPort DWORD Value.

Chapter 5. Troubleshooting, hints, and tips 271

Page 298: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-18 New port number in the FpPort DWORD Value

5. Click File and select Exit to close the Registry Editor. The changes you made are saved automatically.

Final stepsAfter changing the Windows registry, you have to perform some additional steps.

Modifying start.html and config.htmlTivoli Continuous Data Protection for Files places a small icon in the notification area of the taskbar in order to notify you about incidents or informational messages (for example see Figure 5-11 on page 266).

Important: Usually if Tivoli Continuous Data Protection for Files is using its default port 9003, you can use the system tray icon to start the user interface of Tivoli Continuous Data Protection for Files by double-clicking it.

This does not work when you have to change the port number to something other than 9003, because the default port (9003) is hard coded using this icon.

If you want to start the Tivoli Continuous Data Protection for Files user interface by its program shortcut (Start → (All) Programs → Tivoli → CDP for Files → IBM Tivoli Continuous Data Protection for Files), this will not work anymore.

Refer to “Creating a shortcut in the quick launch area” on page 277 for an easy way to launch the user interface of Tivoli Continuous Data Protection for Files again.

272 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 299: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

To get Tivoli Continuous Data Protection for Files to work, you need to change the port number of the URL in the files start.html and config.html to the same value that you entered in the Windows registry (in this case, 9005).

To edit the start.html file, perform the following steps:

1. Click Start → Run, type wordpad, and click OK. The WordPad editor opens.

2. Click File → Open.

3. Change the type of files to be displayed from Rich Text Format (*.rtf) to All Documents (*.*) in the Files of type: list.

4. Use the navigation area to locate the file start.html in the C:\Program Files\Tivoli\CDP_for_Files\html\login directory (or wherever you have installed the Tivoli Continuous Data Protection for Files program files).

5. Select file start.html and click Open. The original start.html looks like Figure 5-19.

Figure 5-19 Original start.html file with port 9003

6. Change the port number from 9003 to 9005. The file start.html should now look like Figure 5-20 on page 274.

Note: Usually, it is not necessary to make any manual changes to files like we do here with start.html (config.html).

Follow the same steps as shown with start.html, with file config.html which you can find in the same directory as file start.html.

Chapter 5. Troubleshooting, hints, and tips 273

Page 300: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-20 File start.html after editing (now using port 9005)

7. To save the changes, select File → Save.

8. Exit WordPad by selecting File → Exit.

Logging off / logging on or restarting the serviceThe last step to get the port conflict resolved depends on whether you are running Tivoli Continuous Data Protection for Files as a logged in application (which is the default) or whether you executed the FpForServers.js program so that Tivoli Continuous Data Protection for Files runs as a real Windows service.

� Running as a logged in application (default):

If Tivoli Continuous Data Protection for Files is running as a logged in application, you have to log off and log on again.

� Running as a Windows service:

In case Tivoli Continuous Data Protection for Files is running as a Windows service, you have to restart the service by performing the following steps:

a. Windows 2000 and 2003:Select Start → Settings → Control Panel → Administrative Tools → Services.

Windows XP:Select Start → Control Panel → Administrative Tools → Services.

Microsoft Vista:Select Start → Control Panel → System and Maintenance → Administrative Tools → Services.

b. Right-click the CDPforFilesSrv service and select Restart.

274 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 301: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Checking port usageFinally, you need to check that everything is working as expected and that Tivoli Continuous Data Protection for Files is using the new port.

Using the netstat -a commandTo check whether the new port (9005) is listened to, use the netstat -a command again. Figure 5-21 on page 276 shows the output of a netstat -a command after you have changed the port number.

Note: For more information about FpForServers.js and how to use Tivoli Continuous Data Protection for Files on a file server, refer to “Run Continuous Data Protection for Files as a Service” in Chapter 8, “Protecting a Server” in IBM Tivoli Continuous Data Protection for Files 3.1: Installation and User’s Guide, GC32-1783.

Chapter 5. Troubleshooting, hints, and tips 275

Page 302: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-21 Netstat -a output showing the usage of the new port 9005

Microsoft Windows [Version 5.2.3790](C) Copyright 1985-2003 Microsoft Corp.

C:\Documents and Settings\Administrator>netstat -a

Active Connections

Proto Local Address Foreign Address State TCP florence:echo florence:0 LISTENING TCP florence:discard florence:0 LISTENING TCP florence:daytime florence:0 LISTENING TCP florence:qotd florence:0 LISTENING TCP florence:chargen florence:0 LISTENING TCP florence:nameserver florence:0 LISTENING TCP florence:domain florence:0 LISTENING TCP florence:http florence:0 LISTENING TCP florence:epmap florence:0 LISTENING TCP florence:microsoft-ds florence:0 LISTENING TCP florence:1025 florence:0 LISTENING TCP florence:1028 florence:0 LISTENING TCP florence:1037 florence:0 LISTENING TCP florence:1038 florence:0 LISTENING TCP florence:1042 florence:0 LISTENING TCP florence:1044 florence:0 LISTENING TCP florence:1062 florence:0 LISTENING TCP florence:1085 florence:0 LISTENING TCP florence:1086 florence:0 LISTENING TCP florence:1920 florence:0 LISTENING TCP florence:2100 florence:0 LISTENING TCP florence:3389 florence:0 LISTENING TCP florence:3661 florence:0 LISTENING TCP florence:5800 florence:0 LISTENING TCP florence:5900 florence:0 LISTENING TCP florence:6014 florence:0 LISTENING TCP florence:6789 florence:0 LISTENING TCP florence:8222 florence:0 LISTENING TCP florence:8333 florence:0 LISTENING TCP florence:9003 florence:0 LISTENING TCP florence:9005 florence:0 LISTENING TCP florence:9510 florence:0 LISTENING TCP florence:9514 florence:0 LISTENING TCP florence:9515 florence:0 LISTENING

276 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 303: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Checking the Event ViewerIn the Event Viewer, you can also see that the HTML listener thread of Tivoli Continuous Data Protection for Files is now able to listen on port 9005 (see Figure 5-22).

Figure 5-22 HTML listener now successfully listening on port 9005 (Event Viewer)

Creating a shortcut in the quick launch areaAs already mentioned earlier in this section, it is no longer possible to start the user interface of Tivoli Continuous Data Protection for Files using the icon in the Windows notification area nor by using the program shortcut of Tivoli Continuous Data Protection for Files.

How can you start the Tivoli Continuous Data Protection for Files user interface to manage your protection settings?

There are several ways, but an easy way is by creating a shortcut in the quick launch area of the Windows taskbar.

Follow these steps to create a shortcut in the quick launch area:

Chapter 5. Troubleshooting, hints, and tips 277

Page 304: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

1. Start your favorite Internet browser, for example Microsoft Internet Explorer or Mozilla Firefox.

2. Enter the following URL in the URL (location) area of your browser and press Enter:

http://localhost:9005/G4/index.html

You will see the Status page of Tivoli Continuous Data Protection for Files as shown in Figure 5-23.

Figure 5-23 Tivoli Continuous Data Protection for Files user interface using port 9005

3. To create the shortcut to this URL in the quick launch area, click the little icon at the beginning of the URL address in the URL (location) area and drag-and-drop it into the quick launch area.

Figure 5-24 on page 279 shows the new shortcut to this URL in the quick launch area.

278 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 305: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-24 Shortcut in the quick launch area

If you double-click the icon in the quick launch bar, it will start the user interface of Tivoli Continuous Data Protection for Files using the appropriate URL (http://localhost:9005/G4/index.html).

5.1.4 Push installation

As described in 3.2.3, “Push installation” on page 69, you can use the fpPushInst.exe executable for pushing a local Tivoli Continuous Data Protection for Files installer executable to another computer.

This is an example of a correct syntax for pushing Tivoli Continuous Data Protection for Files to a remote computer:

fpPushInst.exe \\Cairo /user:administrator /pwd:cdp4admin /c:C:\CDP_Files\fpa.txt /r “C:\CDP_Files\TivoliCDP_CDPForFiles_3.1.0.45_windows.exe” /s /v\”/qn /l*v C:\inst.log REBOOT=ReallySuppress DONT_LAUNCH_FILEPATHSRV=1\”

This command will:

Tip: If you want to push the Tivoli Continuous Data Protection for Files installer executable to multiple computers at the same time, you can do so by creating a Windows batch file and specifying the fpPushInst.exe command syntax multiple times in this batch file.

For more information about the creation of Windows batch files, see “Microsoft Windows XP Batch file reference”, found at:

http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/batch.mspx?mfr=true

Important: You need to mask the quotation marks surrounding the options of the /v parameter as shown in the above example by using a backslash (\) prior the quotation mark.

Do not use any unintentional spaces in the /v parameter syntax because this might cause the fpPushInst.exe command to fail.

Chapter 5. Troubleshooting, hints, and tips 279

Page 306: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

� Use computer Cairo as the remote destination for the push installation (\\Cairo)

� Log into Cairo using user administrator and password cdp4admin (/user:administrator /pwd:cdp4admin)

� Push a configuration file named fpa.txt from local folder C:\CDP_Files to the \System32\ sub-folder of the Windows installation directory on Cairo and use these protection settings during (silent) installation (/c:C:\CDP_Files\fpa.txt)

� Push the Tivoli Continuous Data Protection for Files installer file to the remote computer (/r “C:\CDP_Files\TivoliCDP_CDPForFiles_3.1.0.45_windows.exe")

– Starting a service on the remote computer Cairo doing a silent installation (/s /v”/qn ...”)

– Log installation messages in file inst.log in the root of drive C: (/l*v C:\inst.log)

– Not rebooting after installation (REBOOT=ReallySuppress)

– Not launching Tivoli Continuous Data Protection for Files in the system context immediately after installation (DONT_LAUNCH_FILEPATHSRV=1)

We will use this example and modify it to demonstrate various issues you might see when using the push installation feature of Tivoli Continuous Data Protection for Files.

In detail, we will discuss the following scenarios:

� Remote system not being available

� Wrong user name and/or password

� Wrong fpPushInst.exe command syntax

� Correct fpPushInst.exe command syntax

Note: The log file inst.log will not be created on the local Windows system; it will be created on the remote computer (Cairo).

280 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 307: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Remote system not being availableWhen you are trying to push the installation of Tivoli Continuous Data Protection for Files to a remote computer which is currently not available on the network, for example, if the user has shutdown the computer, the push installation will fail. This can easily happen if you are pushing Tivoli Continuous Data Protection for Files to multiple computers at the same time and did not check to see if they were all available on the network.

Figure 5-25 shows the output of the failing fpPushInst.exe command in case the remote computer is unavailable on the network.

Figure 5-25 Push installation failing due to remote computer not being available

Note: The fpPushInst.exe executable can be found in the installation directory of Tivoli Continuous Data Protection for Files. By default this is the C:\Program Files\Tivoli\CDP_for_Files directory, but this can be wherever you have chosen to install Tivoli Continuous Data Protection for Files on your system.

If you have not used the default installation location for Tivoli Continuous Data Protection for Files, use the following steps to change to this directory.

1. Select Start → Run, type cmd, and click OK. A Windows command line window displays.

2. Change to the installation directory of Tivoli Continuous Data Protection for Files by entering cd “\program files\tivoli\cdp_for_files”.

Now you can run the fpPushInst.exe commands as described in the following examples.

C:\Program Files\Tivoli\CDP_for_Files>fpPushInst.exe \\Cairo /user:administrator /pwd:cdp4admin /c:C:\CDP_Files\fpa.txt /r "C:\CDP_Files\TivoliCDP_CDPForFiles_3.1.0.45_windows.exe" /s /v\"/qn /l*v C:\inst.log REBOOT=ReallySuppress DONT_LAUNCH_FILEPATHSRV=1\"Connecting to remote service \\Cairo ... Failed

Couldn't connect to \\Cairo\ADMIN$No network provider accepted the given network path.

C:\Program Files\Tivoli\CDP_for_Files>

Chapter 5. Troubleshooting, hints, and tips 281

Page 308: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Solution:Make sure that the remote target system is available on the network. For example, see if you can reach the remote system using the ping command.

To do so, follow these steps:

1. Select Start → Run, type cmd, and click OK. A Windows command line window displays.

2. Enter ping followed by the target name or address (see Figure 5-26).

Figure 5-26 Check if remote system is available using the ping command

If you get a reply from the target system, the remote computer is available on the network and a push installation to this computer should be possible if no further errors occur.

Wrong user name and/or passwordIf you specify an unknown (administrative) user name, a wrong password, or both, the fpPushInst.exe executable cannot connect successfully to the remote computer and therefore the push installation fails.

Microsoft Windows [Version 5.2.3790](C) Copyright 1985-2003 Microsoft Corp.

C:\Documents and Settings\Administrator>ping Cairo

Pinging Cairo [9.3.5.56] with 32 bytes of data:

Reply from 9.3.5.56: bytes=32 time<1ms TTL=128Reply from 9.3.5.56: bytes=32 time<1ms TTL=128Reply from 9.3.5.56: bytes=32 time<1ms TTL=128Reply from 9.3.5.56: bytes=32 time<1ms TTL=128

Ping statistics for 9.3.5.56: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 0ms, Average = 0ms

C:\Documents and Settings\Administrator>

282 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 309: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

In Figure 5-27 you can see the failing message being reported by the Tivoli Continuous Data Protection for Files push installation executable as a result of using an unknown user name or a wrong password.

Figure 5-27 Push installation failing due to wrong user name or wrong password

Solution:Make sure to specify an administrative user account as the user name and a valid password for that account.

Wrong fpPushInst.exe command syntaxEven if the target computer is available on the network, and you are using a correct user name and password for the push installation of Tivoli Continuous Data Protection for Files, the installation still might fail. Most likely this is due to using a wrong fpPushInst.exe command syntax.

For more information about the correct fpPushInst.exe command syntax and all available options refer to 3.2.3, “Push installation” on page 69.

Important: Use an administrative user account to connect to the remote computer because this account will be used for the installation of Tivoli Continuous Data Protection for Files on the target system.

Refer to 5.1.2, “Non-privileged users” on page 262 for more information about the potential issues when trying to install Tivoli Continuous Data Protection for Files as a non-privileged user.

C:\Program Files\Tivoli\CDP_for_Files>fpPushInst.exe \\Cairo /user:admin /pwd:cdptest /c:C:\CDP_Files\fpa.txt /r "C:\CDP_Files\TivoliCDP_CDPForFiles_3.1.0.45_windows.exe" /s /v\"/qn REBOOT=ReallySuppress DONT_LAUNCH_FILEPATHSRV=1\"Connecting to remote service \\Cairo ... Failed

Couldn't connect to \\Cairo\ADMIN$Logon failure: unknown user name or bad password.

C:\Program Files\Tivoli\CDP_for_Files>

Chapter 5. Troubleshooting, hints, and tips 283

Page 310: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-28 shows the output of the failing fpPushInst.exe command when a wrong syntax has been used. Note that in this example we did not mask the quotation marks surrounding the options of the /v parameter causing the push installation of Tivoli Continuous Data Protection for Files to fail.

Figure 5-28 Push installation failing due to wrong command syntax

As you can see, the fpPushInst.exe executable was able to connect successfully to the remote computer Cairo and could copy the Tivoli Continuous Data Protection for Files configuration file (fpa.txt) and the Tivoli Continuous Data Protection for Files installer executable to the \System32\ sub-folder of the Windows installation folder.

What actually does fail is the installation process of Tivoli Continuous Data Protection for Files taking place on the remote computer (Cairo) due to the incorrect command syntax. The fpPushInst.exe command returns to the Windows command line with a remote return code different than 0 (here: 1203(0x4B3)).

Important: You need to mask the quotation marks surrounding the options of the /v parameter as shown in the above example by using a backslash (\) prior to the quotation mark.

Do not use any unintentional spaces in the syntax for the /v parameter because this could cause the fpPushInst.exe command to fail.

C:\Program Files\Tivoli\CDP_for_Files>fpPushInst.exe \\Cairo /user:administrator /pwd:cdp4admin /c:C:\CDP_Files\fpa.txt /r "C:\CDP_Files\TivoliCDP_CDPForFiles_3.1.0.45_windows.exe" /s /v"/qn /l*v C:\inst.log REBOOT=ReallySuppress DONT_LAUNCH_FILEPATHSRV=1"Connecting to remote service \\Cairo ... ADMIN$ connected IPC$ connectedFile C:\CDP_Files\fpa.txt copied to \\Cairo\ADMIN$\System32\fpa.txtFile C:\CDP_Files\TivoliCDP_CDPForFiles_3.1.0.45_windows.exe copied.

Communication with remote established.

Waiting remote command's response...

Remote command returned 1203(0x4B3)

C:\Program Files\Tivoli\CDP_for_Files>

284 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 311: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Solution:Check the fpPushInst.exe command syntax for any unintentional spaces and for quotation marks surrounding the options of the /v parameter which have not been masked using a backslash (\) before the quotation mark. Correct the syntax if necessary and try the Tivoli Continuous Data Protection for Files push installation again.

Correct fpPushInst.exe command syntaxIf everything is correct and the push installation of Tivoli Continuous Data Protection for Files succeeded, the fpPushInst.exe command returns to the Windows command line with a remote return code of 0(0x0) (see Figure 5-29).

Figure 5-29 Successful push installation of Tivoli Continuous Data Protection for Files

Note: Although we have specified a log file to be written in the root of the C: drive (/l*v C:\inst.log), this log file is not getting written because the installation is failing too early in the installation process.

C:\Program Files\Tivoli\CDP_for_Files>fpPushInst.exe \\Cairo /user:administrator /pwd:cdp4admin /c:C:\CDP_Files\fpa.txt /r "C:\CDP_Files\TivoliCDP_CDPForFiles_3.1.0.45_windows.exe" /s /v\"/qn /l*v C:\inst.log REBOOT=ReallySuppress DONT_LAUNCH_FILEPATHSRV=1\"Connecting to remote service \\Cairo ... ADMIN$ connected IPC$ connectedFile C:\CDP_Files\fpa.txt copied to \\Cairo\ADMIN$\System32\fpa.txtFile C:\CDP_Files\TivoliCDP_CDPForFiles_3.1.0.45_windows.exe copied.

Communication with remote established.

Waiting remote command's response...

Remote command returned 0(0x0)

C:\Program Files\Tivoli\CDP_for_Files>

Chapter 5. Troubleshooting, hints, and tips 285

Page 312: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Tivoli Continuous Data Protection for Files will start protecting the files on the remote computer (Cairo) the next time this system is rebooted.

5.1.5 Pull installation

In 3.2.4, “Pull installation (upgrade)” on page 72, we explained how to silently upgrade Tivoli Continuous Data Protection for Files once it is installed by placing a newer installer executable file in the downloads folder (see “Administration folders” on page 102) of the central administration area (see 3.3.2, “Central Administration Settings” on page 101).

In this section we explain potential issues you might see when using the pull installation to upgrade one or more Tivoli Continuous Data Protection for Files clients to a newer version of the product.

The following scenarios are discussed in this section:

� Upgrade to version 3.1 from a version below 2.2.1.22

� Upgrade to version 3.1 from version 2.2.1.22 and higher

Upgrade to version 3.1 from a version below 2.2.1.22If you are trying to upgrade to Tivoli Continuous Data Protection for Files V3.1 using pull installation, and you are currently running a Tivoli Continuous Data Protection for Files client below V2.2.1.22 on this computer, the pull installation will fail.

Note: At this point there is no indication visible on the remote computer that Tivoli Continuous Data Protection for Files has been installed on this system using the push installation: no Tivoli Continuous Data Protection for Files icon is placed in the notification area nor any other message displayed informing the user about the Tivoli Continuous Data Protection for Files push installation.

However, if you look at the installed programs (IBM Tivoli Continuous Data Protection for Files) or the Windows services (CDPforFilesSrv) you can see footprints of Tivoli Continuous Data Protection for Files on the remote computer.

Be aware that the log file inst.log is created on the remote computer (Cairo) and not on your local system.

286 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 313: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

It will be able to pull the code of the Tivoli Continuous Data Protection for Files V3.1 client from the downloads folder of the central administration area, but the installation does not work.

When your Tivoli Continuous Data Protection for Files client below V2.2.1.22 tries to install the upgrade to Tivoli Continuous Data Protection for Files V3.1, you will see following message in the notification area (see Figure 5-30):

Figure 5-30 Tivoli Continuous Data Protection for Files (pull) installation message

You will find the same message (“A new version of the software is being installed.”) as Event ID 6092 in the Event Viewer (see Figure 5-31 on page 288).

Important: A Tivoli Continuous Data Protection for Files client below V2.2.1.22 is not able to use pull installation to upgrade to a Tivoli Continuous Data Protection for Files V3.1 client.

Chapter 5. Troubleshooting, hints, and tips 287

Page 314: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-31 Event message due to installation of new software version

This installation does fail. You will see the following additional files in the installation directory of your Tivoli Continuous Data Protection for Files client:

� FPcommand.bat

� options

� TivoliCDP_CDPForFiles_3.1.0.45_windows.exe

FPcommand.bat fileThe FPcommand.bat file (see Figure 5-32 on page 289) contains the command to install the Tivoli Continuous Data Protection for Files (V3.1) installer executable with some specific (Java™-based) installation options as defined in the options file (see Figure 5-33 on page 289).

This command does not work when a Tivoli Continuous Data Protection for Files V3.1 client is getting installed. This is because starting with Tivoli Continuous Data Protection for Files V3.1, a different installation/packaging method has been used; instead of the Java-based installation as used with Tivoli Continuous Data Protection for Files V.2.2 and below, now Tivoli Continuous Data Protection for Files V3.1 is using the Microsoft Windows Installer for the installation.

288 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 315: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

The given installation command tries to use the old Java-based installation syntax resulting in the command, and therefore the installation, to fail.

Figure 5-32 FPcommand.bat file

options fileThe options file contains specific Java-based installation options (see Figure 5-33).

Figure 5-33 Options file

TivoliCDP_CDPForFiles_3.1.0.45_windows.exe fileThis is the Tivoli Continuous Data Protection for Files V3.1 installer executable which was originally placed in the downloads folder of the central administration area and was pulled from there.

Recommendation:Upgrade to Tivoli Continuous Data Protection for Files V2.2.1.22 (or higher) first. You can upgrade by using pull installation if you place a higher versioned Tivoli Continuous Data Protection for Files V2.2 installer executable in the downloads folder.

If Tivoli Continuous Data Protection for Files V2.2.1.22 (or higher) code has been pulled off the downloads folder and installed successfully, you can then place the Tivoli Continuous Data Protection for Files V3.1 installer executable in that downloads folder. This Tivoli Continuous Data Protection for Files V3.1 installer file will then be pulled from there and installed on your computer.

set DSM_CDP=1cd /d "C:\Program Files\Tivoli\CDP_for_Files\""C:\Program Files\Tivoli\CDP_for_Files\TivoliCDP_CDPForFiles_3.1.0.45_windows.exe" -silent -options "C:\Program Files\Tivoli\CDP_for_Files\options"

-W bean9.selection=1-G licenseAccepted=true

Important: You will get no additional information messages indicating that the pull installation of Tivoli Continuous Data Protection for Files V3.1 has failed at this time.

Chapter 5. Troubleshooting, hints, and tips 289

Page 316: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Summary:If you are running a Tivoli Continuous Data Protection for Files client below V2.2.1.22, the order of upgrades to Tivoli Continuous Data Protection for Files V.3.1 needs to be:

Tivoli Continuous Data Protection for Files below V2.2.1.22 → Tivoli Continuous Data Protection for Files V2.2.1.22 or higher → Tivoli Continuous Data Protection for Files V3.1.

Upgrade to version 3.1 from version 2.2.1.22 and higherUpgrading from Tivoli Continuous Data Protection for Files V2.2.1.22 (or higher) to Tivoli Continuous Data Protection for Files V3.1 using a pull installation does not have the same issue that we discussed in the previous section (see “Upgrade to version 3.1 from a version below 2.2.1.22” on page 286).

During the installation of the newer Tivoli Continuous Data Protection for Files (V3.1) client, you will see a message in the notification area informing you about the installation of the new software version (see Figure 5-30 on page 287).

After the installation succeeds, you will be asked to reboot your computer to resume protection of your data using the new Tivoli Continuous Data Protection for Files client version (see Figure 5-34).

Figure 5-34 Message to reboot the computer after the (pull) installation

If you look in the installation directory of your Tivoli Continuous Data Protection for Files client, you will find following files:

� msipull.log

� TivoliCDP_CDPForFiles_3.1.0.45_windows.exe

Important: A Tivoli Continuous Data Protection for Files V2.2.1.22 (or higher) client is able to pull and install a Tivoli Continuous Data Protection for Files V3.1 installer file placed in the downloads folder of the central administration area.

290 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 317: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

msipull.log fileThe msipull.log file is the installation log of the new Tivoli Continuous Data Protection for Files (V3.1) client as logged by the Microsoft Windows Installer.

This file can be used as a first source for problem determination if any problems occur during pull installation.

TivoliCDP_CDPForFiles_3.1.0.45_windows.exe fileThis is the Tivoli Continuous Data Protection for Files V3.1 installer executable which was originally placed in the downloads folder of the central administration area and was pulled from there.

5.2 Replication issues

This section covers some common (remote) replication issues. We discuss problems that could occur if you are using a removable disk (external device) as a remote target for saving your files. We also discuss issues you might experience when you are sending files to a remote file server, a Web-based Distributed Authoring and Versioning (WebDAV) server, and to a Tivoli Storage Manager server. Finally, transient (network) conditions are covered.

In detail, the following topics are described in the section about using a removable (external USB) disk as a remote backup target:

� Removable disk / file system is full

� Problems with changing drive letter assignments

We show you potential issues when you store files on a remote file server, because you have to consider using a Universal Naming Convention1 (UNC) name instead of a drive letter.

The WebDAV section covers these common issues:

� Using wrong user name or password

� No Internet connection available (transient condition)

In the section about IBM Tivoli Storage Manager issues, we discuss the following:

� No node name defined or wrong node name

� Node name defined but with wrong permission

1 For information about Universal Naming Convention (UNC), see “Path (computing)”, found at:http://en.wikipedia.org/wiki/Path_%28computing%29#Universal_Naming_Convention

Chapter 5. Troubleshooting, hints, and tips 291

Page 318: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

� IBM Tivoli Storage Manager client sessions disabled

� IBM Tivoli Storage Manager server unavailable

� Conflicting include/exclude lists

Transient conditions (the remote storage location is temporarily not reachable) are described in the last section.

5.2.1 Removable disk issues

Using a removable (external USB) disk is a very common and convenient method for protecting data when there is no file server available as a remote backup target. For example, if you are travelling around with your mobile computer, you do not want to miss having an alternative backup location other than your local backup area in case your internal disk gets corrupted, so that you can safely restore from the removable disk.

In the following example, we are using an external USB disk named “USB_Drive” with assigned drive letter F as a remote backup location (see Figure 5-35 and Figure 5-36 on page 293).

Figure 5-35 External USB disk named USB_Drive mapped as drive F:

292 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 319: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-36 Drive F: (USB_Drive) as remote backup target (external device)

Disk / file system fullDue to the rising amount of data these days, an external USB drive might run out of disk/file space, even though the sizes of removable disks have dramatically increased in the last couple of years. If Tivoli Continuous Data Protection for Files is facing a problem replicating to the specified remote location due to a disk / file system full condition, it lets you know about this by issuing the notification message seen in Figure 5-37 on page 294.

Chapter 5. Troubleshooting, hints, and tips 293

Page 320: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-37 Disk full informational message

The “backup device full” condition will also generate an informational message with Event ID: 6077 in the Windows system event log (see Figure 5-38).

Figure 5-38 Event log entry due to target backup device being full (Event ID: 6077)

Important: Tivoli Continuous Data Protection for Files keeps track of the changes you make to your files even when you see this message. It waits for some time and tries to replicate the changed files later, because this might be a temporary condition.

294 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 321: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

The Tivoli Continuous Data Protection for Files Status page indicates the current problem of your remote storage by turning the color of the Remote Storage icon from blue to yellow with a little exclamation mark (see Figure 5-39).

Figure 5-39 Remote storage location inaccessible due to disk / file system full (Status page)

Tivoli Continuous Data Protection for Files will wait for one minute and then tries replicating the changed file(s). If this fails again, an error message will be shown in the notification area (see Figure 5-40).

Figure 5-40 Tivoli Continuous Data Protection for Files experiencing a problem

Chapter 5. Troubleshooting, hints, and tips 295

Page 322: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

The Windows system event log Event ID: 6000 is generated with more information about what process of Tivoli Continuous Data Protection for Files has a problem (see Figure 5-41).

Figure 5-41 Event log entry due to disk / file system full condition (Event ID: 6000)

Solution:To avoid a disk / file system full condition, you can do either one or more of the following things:

� Free up some space on the removable disk or the remote file system.

296 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 323: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

� On the Remote Storage page of the Settings Notebook, adjust the Remote Storage settings (see Figure 5-42):

– Decrease the number of versions per file being stored remotely.

and/or

– Reduce the space being used for files on the remote location.

and/or

– Activate compression of remote backups.

Figure 5-42 Modified settings in the Remote Backup page to save space on the remote target location

Important: Do not delete any files or directories in the \RealTimeBackup\ folder, because this is the folder for Tivoli Continuous Data Protection for Files to store remote backup versions of your files.

If you delete files there, for example using the Windows Explorer or the Windows command line, it is not known to Tivoli Continuous Data Protection for Files. Because Tivoli Continuous Data Protection for Files has no opportunity to re-sync its own gendb database inventory (see, “Local pool log file and \gendb\ directory” on page 350) with the real inventory on the remote target, Tivoli Continuous Data Protection for Files could get out-of-sync. For example, Tivoli Continuous Data Protection for Files could show you files for restore which are actually not available anymore (due to having been manually deleted on the remote storage location).

If possible, free disk space outside of the \RealTimeBackup\ folder.

Chapter 5. Troubleshooting, hints, and tips 297

Page 324: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Changing drive letter assignmentsOne of the main features of the Windows operating systems in conjunction with USB (storage) devices is the plug-and-play functionality that automatically assigns a drive letter to a USB device as soon as it gets connected to the system. Usually, Windows keeps track of the already assigned drive letters (persistent drive letters) so that the same device gets the same drive letter assigned when it is plugged in the next time. However, under certain circumstances, this might not hold true, and a newly plugged-in USB device claims the same drive letter as another USB device that is currently offline.

An example is shown in Figure 5-43: the USB disk (USB_Drive) had been offline when we plugged in a USB stick (USB_Stick). The USB stick claimed drive letter (F:) so the USB disk got the next available drive letter (G:) assigned when we plugged it in later.

Figure 5-43 Changed drive letter assignments

Note: We did not change the configuration of Tivoli Continuous Data Protection for Files, so drive (F:) is still defined as the remote backup location (see Figure 5-36 on page 293).

298 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 325: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Instead, Tivoli Continuous Data Protection for Files informs you that it cannot reach the target location by a notification message (see Figure 5-44).

Figure 5-44 Informational message that the network target cannot be reached

The replication engine of Tivoli Continuous Data Protection for Files creates an entry in the Windows system event log with Event ID: 6069 giving information about the error condition of the network (see Figure 5-45 on page 300).

Important: Tivoli Continuous Data Protection for Files does not replicate to the new remote location (F:) as long as there is no \RealTimeBackup\ folder on this device. This avoids unintentionally altering a device that is not meant to be a remote backup location, like a digital camera.

Chapter 5. Troubleshooting, hints, and tips 299

Page 326: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-45 Event entry due to replication problem caused by changed drive letters (Event ID: 6069)

The color of the Remote Storage icon on the Status page of Tivoli Continuous Data Protection for Files turns from blue to yellow with a little exclamation mark showing that it has problems with the remote storage location (see Figure 5-46 on page 301).

300 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 327: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-46 Remote storage location inaccessible due to changed drive letter assignment (Status page)

Solution:In order to avoid unwanted changing of drive letters, you should consider manually assigning your removable disk a drive letter near the end of the alphabet, for example, X, Y or Z, because available drive letters are assigned automatically alphabetically. It is also a good idea to check the drive letter assignments each time you bring new USB devices online and correct them if necessary.

To manually change the driver letter assignment for your external USB drive, follow these steps:

1. On the Windows desktop, right-click My Computer and then click Manage.

2. Under Computer Management, click Disk Management. In the right pane, you will see your drives listed.

Chapter 5. Troubleshooting, hints, and tips 301

Page 328: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

3. Right-click the drive or device you want to change, and then click Change Drive Letter and Paths.

4. Click Change, click Assign the following drive letter, click the drive letter you want to assign, and then click OK.

5. Click the Yes button when the window displays asking you to confirm the change of the drive letter.

5.2.2 File server issues

In this section, we discuss replication problems in case you have decided to protect your files by storing them on a remote network location (file server) for additional protection.

Typical replication to a file server as the remote storage location problems are due to transient network conditions, that is, the file server is (temporarily) not reachable over the network. For more information about transient conditions refer to 5.2.5, “Transient conditions (remote storage location not reachable)” on page 343.

Tip: Another way to prevent such an issue, is to create and assign a specific mount point to the external device (USB drive). For a detailed procedure refer to technical note 1245761 “Instructions on how to point Continuous Data Protection for Files to a USB device”, found at:

http://www-1.ibm.com/support/docview.wss?rs=2339&context=SS3PE6&dc=DB520&q1=1245761&uid=swg21245761&loc=en_US&cs=utf-8&lang=en

Note: For avoiding general problems using a file server as a remote backup location:

� Log on to your machine with a user name and password that Tivoli Continuous Data Protection for Files can use to authenticate transparently into the network location you have specified. You can alternatively log into the network using another account with regular privileges interactively (for example, by using the Net Use command).

� Some versions of Windows have simplified file sharing, which allows one computer to network-attach to another with very little difficulty. The resulting connection allows only limited file system capabilities. If possible, disable simplified file sharing on the target system, because it limits how well Tivoli Continuous Data Protection for Files can produce an identical copy of your files. If simplified file sharing is not disabled, some information, such as access control lists or file streams, might not get copied correctly.

302 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 329: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Universal Naming Convention (UNC) versus drive lettersTo specify a remote backup location in the Tivoli Continuous Data Protection for Files user interface, you can either use the Universal Naming Convention (UNC) name of the file server or the drive letter you have it mapped to.

In Figure 5-47, you can see that we connected to a shared network folder e$ on file server Izmir and have mapped it to drive letter (W:).

Figure 5-47 Shared network folder e$ on file server Izmir mapped to drive (W:)

In our case, the recommended way to specify the file server is shown in Figure 5-48 on page 304 using the UNC name \\izmir\e$ instead of drive letter (W:).

Tip: Use the UNC naming specification of the file server instead of drive letters, since drive letters can change after rebooting and many times do not reconnect automatically.

Chapter 5. Troubleshooting, hints, and tips 303

Page 330: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-48 Using the UNC name instead of the drive letter for the remote storage location (Remote Storage page)

5.2.3 WebDAV issues

Storing files on a Web-based Distributed Authoring and Versioning (WebDAV) server has become more popular in the last few years for sharing files (pictures, music and video files, etc.). Many Internet Service Providers (ISPs) offer their customers disk space on a WebDAV server as part of their contract.

In this section, we show you some common problems when you use a WebDAV server on the Internet as a remote backup location for your files using Tivoli Continuous Data Protection for Files.

304 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 331: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Using a WebDAV server as a remote backup locationFrom the Back up to: list on the Remote Storage page of the Settings Notebook you need to select Web Server (WebDAV) if you want to use a WebDAV server as the remote location for storing your files.

You need to use the correct syntax as given by your ISP or administrator in the Location: field when specifying the URL address of your WebDAV server.

If the IP address of your WebDAV server is for example webdav.server.net, you need to specify the following URL in the Location: field on the Remote Storage page:

https://webdav.server.net

Figure 5-49 on page 306 displays an example using a WebDAV server with webdav.server.net as the IP address. In this example we defined to keep five versions of a file on the WebDAV server using 5 GB as the maximum space.

Chapter 5. Troubleshooting, hints, and tips 305

Page 332: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-49 Using a WebDAV server as the remote storage destination

Wrong user name and/or passwordIn addition to using the correct URL for your WebDAV server, you need to know and specify a valid user name and password for Tivoli Continuous Data Protection for Files to be able to communicate with the WebDAV server.

Tivoli Continuous Data Protection for Files displays an informational message in the notification area that a password is needed for backing up files to the remote location (see Figure 5-50 on page 307).

306 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 333: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-50 Tivoli Continuous Data Protection for Files needs a password (informational message)

A new Web browser window opens prompting you to enter a user name and password to access the WebDAV server (see Figure 5-51).

Figure 5-51 Tivoli Continuous Data Protection for Files prompts for a password to access the WebDAV server

You need to enter the user name and password as given to you by your ISP or administrator (see Figure 5-52 on page 308).

Chapter 5. Troubleshooting, hints, and tips 307

Page 334: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-52 Entering user name and password

The password needs to be entered twice to confirm its validity. If both passwords do not match, Tivoli Continuous Data Protection for Files opens a window informing you about this situation (see Figure 5-53).

Figure 5-53 The two passwords do not match

If both passwords are identical but wrong, or if the user name is not correct, Tivoli Continuous Data Protection for Files cannot successfully connect to the WebDAV server. If this happens, Tivoli Continuous Data Protection for Files keeps prompting you for the (correct) user name and password until you enter a correct user name and password (see Figure 5-51 on page 307).

If you enter a correct user name and password, Tivoli Continuous Data Protection for Files creates a password file in the \pwd\ folder of the data directory with a similar name to the IP name of the WebDAV server (in our case the file name is webdavservernet.pwd). This file contains encrypted information to authenticate Tivoli Continuous Data Protection for Files with the WebDAV server.

308 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 335: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

No Internet connection available (transient condition)For Tivoli Continuous Data Protection for Files to be able to store files on the WebDAV server, you need to have an active Internet connection. If Tivoli Continuous Data Protection for Files cannot access the WebDAV server because your Internet connection is not active or was dropped, it will display information that it cannot reach the remote network target (see Figure 5-54).

Figure 5-54 WebDAV server not reachable because no Internet connection is available

Because this might be a temporary condition, Tivoli Continuous Data Protection for Files will again try connecting to the WebDAV server to continue storing files there.

There can be many reasons why your Internet connection is not available. If you are permanently unable to connect to the Internet, contact your ISP for further assistance.

Once the Internet connection can be established again and the WebDAV server can be reached, you are notified about this event by Tivoli Continuous Data Protection for Files and replication continues (Figure 5-55).

Figure 5-55 WebDAV server can be reached again (Internet connection established)

Attention: Tivoli Continuous Data Protection for Files keeps track of the changes you make to your files even when you see this message. It waits for some time and tries to replicate the changed file(s) later, because this might be a temporary condition.

If you change the same file multiple times when your Internet connection is temporarily unavailable, only the latest version of this file is copied over to the WebDAV server when the Internet connection becomes available again.

Chapter 5. Troubleshooting, hints, and tips 309

Page 336: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

For more information about transient conditions, refer to 5.2.5, “Transient conditions (remote storage location not reachable)” on page 343.

5.2.4 Tivoli Storage Manager issues

In this section, we discuss potential issues related to Tivoli Continuous Data Protection for Files in conjunction with a Tivoli Storage Manager server, respectively the Tivoli Storage Manager application programming interface (API).

General informationIn order to run properly, the Tivoli Storage Manager API client utilizes a client options file (dsm.opt). This file is installed automatically during the installation of Tivoli Continuous Data Protection for Files and is placed in the data directory used by Tivoli Continuous Data Protection for Files (see 3.4.1, “Installation and data directories” on page 108).

Figure 5-56 displays the default (minimum) dsm.opt file as it is installed, created, and used by Tivoli Continuous Data Protection for Files.

Figure 5-56 Default (minimum) dsm.opt file

Note: In this section, we do not describe in detail how to configure the Tivoli Storage Manager API client with all its available options, nor do we discuss all the commands needed to maintain a Tivoli Storage Manager server.

For more information about these topics, refer to Tivoli Storage Manager for Windows: Backup-Archive Clients Installation and User’s Guide, SC32-0146 and Tivoli Storage Manager for Windows: Administrator’s Guide, SC32-0121.

Note: If there is already a Tivoli Storage Manager API available on your computer, maybe because you have a Tivoli Storage Manager Backup/Archive client installed, Tivoli Continuous Data Protection for Files will only install the Tivoli Storage Manager API files if the ones on the machine are older than the ones in the install package (merge module installation).

Tivoli Continuous Data Protection for Files uses its own dsm.opt file in the data directory to communicate with a Tivoli Storage Manager server. A separately installed Tivoli Storage Manager client will have a separate options file (dsm.opt).

COMMMETHOD TCPipPASSWORDACCESS generate

310 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 337: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

One of the most important purposes of the options file is to specify the communication protocol necessary to establish communications between the Tivoli Storage Manager API client and the Tivoli Storage Manager backup server. For example, to use the Transmission Control Protocol (TCP)/Internet Protocol (IP) communication protocol, the following needs to be stated in the dsm.opt file:

COMMMethod TCPIP

If your Tivoli Storage Manager server administrator decides that each client node needs to authenticate to the server when starting a session, you need to specify one of the following:

� If you want to be prompted for a password (PASSWORDAccess prompt)

� If the Tivoli Storage Manager API client automatically generates a new password for your client node each time it expires and stores the password encrypted in the Windows registry (PASSWORDAccess generate). This option is used in file dsm.opt used by Tivoli Continuous Data Protection for Files.

Table 5-1 lists the minimum (default) options of the Tivoli Storage Manager API client options file as used by Tivoli Continuous Data Protection for Files and provides a short description of each of them and their used parameter value.

Table 5-1 Description of options used in dsm.opt

By default, the Tivoli Storage Manager API uses the client’s host name as the Tivoli Storage Manager node name when identifying itself to the Tivoli Storage Manager server. Sometimes it is a company’s policy to use a specific naming convention for Tivoli Storage Manager node names that differ from the client host names. In this case, you must configure the Tivoli Storage Manager API to use

Option Description Used value by Tivoli Continuous Data Protection for Files

COMMMethod This option specifies the communication method you use to provide connectivity for client-server communication.

TCPip

PASSWORDAccess This option specifies whether you want to generate your password automatically or set it as a user prompt. Your administrator can require a password for your client node by enabling the authentication feature. Ask your administrator if a password is required for your client node.

generate

Chapter 5. Troubleshooting, hints, and tips 311

Page 338: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

the appropriate node name when logging on to the Tivoli Storage Manager server. You can do so using the NODename option, for example:

NODename cdp_florence

The Tivoli Storage Manager server usually listens on port 1500 for incoming Tivoli Storage Manager client sessions. Because this can be changed by the Tivoli Storage Manager server administrator, you might need to specify a different port in the dsm.opt file to be used by the Tivoli Storage Manager API. To specify the TCP/IP port on which the Tivoli Storage Manager server listens for incoming client sessions, use the TCPPort option, for example:

TCPPort 1510

Table 5-2 summarizes some additional dsm.opt options which are useful in case the Tivoli Storage Manager server administrator does not use the default Tivoli Storage Manager values.

Table 5-2 Some additional useful dsm.opt options

Using a Tivoli Storage Manager server as a remote backup locationIf you want to use a Tivoli Storage Manager server as the remote backup destination of your files, you need to select Tivoli Storage Manager from the Back up to: list in the Remote Storage page of the Settings Notebook.

Be sure to use correct syntax in the Location: field by using either the dotted IP address or the IP name of the Tivoli Storage Manager server. Figure 5-57 on page 313 shows an example using the IP name of the Tivoli Storage Manager server named Helsinki. We specified in this example to keep two versions per file on the Tivoli Storage Manager server occupying a maximum space of 5 GB.

Option Description Default value (if not set)

NODename Use this option in your client options file dsm.opt to identify your workstation to the server. You can use different node names to identify multiple operating systems on your workstation.

workstation (host) name

TCPPort This option specifies a TCP/IP port address for a Tivoli Continuous Data Protection for Files server. You can obtain this address from your administrator.

1500

312 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 339: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-57 Using a Tivoli Storage Manager server as a remote backup location (Helsinki)

No node name defined or wrong node nameAt the time you specify a Tivoli Storage Manager server IP address or name in the Location field and click OK or Apply on the Remote Storage page of the Settings Notebook, Tivoli Continuous Data Protection for Files tries to connect to the Tivoli Storage Manager server using the Tivoli Storage Manager API with the given options in the dsm.opt file and using the default values for options if they are not stated in dsm.opt.

If you have not yet defined a Tivoli Storage Manager node name for the Tivoli Continuous Data Protection for Files client or you have defined a wrong node name, you will see a window display informing you that the target location you have specified (Helsinki) is not responding properly (see Figure 5-58 on page 314).

Chapter 5. Troubleshooting, hints, and tips 313

Page 340: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-58 Window explains target location (Helsinki) is not responding properly

A Tivoli Continuous Data Protection for Files warning message displays in the notification area asking you to check the details in the Activity Report page of Tivoli Continuous Data Protection for Files, because the software is experiencing some problems (see Figure 5-59).

Figure 5-59 Tivoli Continuous Data Protection for Files warning message

This happens as Tivoli Continuous Data Protection for Files tries to connect to the Tivoli Storage Manager server using the client’s host name, or the node name if it has been specified in the dsm.opt file, as the Tivoli Storage Manager node name and this fails if this node name does not exist on the Tivoli Storage Manager server.

If you open the Windows system event log (see “Windows system event log” on page 267 for how to access the Windows system event log), you will see an event log entry (Event ID: 6000) explaining that the session has been rejected (ANS1353E) due to a wrong or in this case unknown ID (Tivoli Storage Manager node name) entered (see Figure 5-60 on page 315).

314 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 341: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-60 Event log entry due to unknown or incorrect ID (node name) entered

The same error message (ANS1353E) is written into the error log file (dsierror.log) of the Tivoli Storage Manager API client which can be found in the data directory of Tivoli Continuous Data Protection for Files (see Figure 5-61).

Figure 5-61 Entries in dsierror.log caused by unknown or incorrect ID (node name) entered

Note: Return code (RC) 53 is defined as DSM_RC_REJECT_ID_UNKNOWN, which translates to “The node name you entered is not known by the server, or you are attempting to access a file migrated to a different node.”

For more information about Tivoli Storage Manager API return codes and their definitions, refer to Tivoli Storage Manager: Using the Application Program Interface, SC32-0147.

05/10/2007 16:50:27 ANS1353E Session rejected: Unknown or incorrect ID entered05/10/2007 16:50:27 ANS1353E Session rejected: Unknown or incorrect ID entered

Chapter 5. Troubleshooting, hints, and tips 315

Page 342: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Solution:To solve this kind of error, you need to register the Tivoli Continuous Data Protection for Files client’s host name as a Tivoli Storage Manager node name on the Tivoli Storage Manager server first, before the Tivoli Continuous Data Protection for Files client connects to the Tivoli Storage Manager server. If you have done so already, make sure you have used the correct node name and rename it on the Tivoli Storage Manager server if necessary.

For more details on how to register or rename a node name on a Tivoli Storage Manager server, refer, for example, to IBM Tivoli Storage Manager for Windows: Administrator’s Reference, SC32-0127.

Node name defined but with “wrong” permissionEven if you have registered the Tivoli Continuous Data Protection for Files client’s host name as a node name on the Tivoli Storage Manager server, there can still be some issues preventing Tivoli Continuous Data Protection for Files from working correctly together with a Tivoli Storage Manager server.

One thing to keep in mind when you define the Tivoli Storage Manager client node, is to grant the authority to delete backup copies on the Tivoli Storage Manager server to that node.

For demonstration purposes, we register node name “florence” - which is the host name of the computer hosting the Tivoli Continuous Data Protection for Files client - using password “cdp4tsm” without granting delete backup permission to that node (see Example 5-1).

Example 5-1 Registering node florence without delete backup permission (register node)

tsm: ITSO_TSM>register node florence cdp4tsmSession established with server ITSO_TSM: Windows Server Version 5, Release 4, Level 0.0 Server date/time: 05/10/2007 16:57:03 Last access: 05/10/2007 15:27:11

ANR2060I Node FLORENCE registered in policy domain STANDARD.ANR2099I Administrative userid FLORENCE defined for OWNER access to node FLORENCE.

Important: If Tivoli Continuous Data Protection for Files does not have delete backup permission on the Tivoli Storage Manager server, it cannot successfully purge older files when the designated storage space is getting full or when the maximum number of versions per file defined to be stored on the remote storage location is exceeded.

316 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 343: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Example 5-2 shows the details of node “florence” without delete backup permission (Backup Delete Allowed?: No).

Example 5-2 Details of node florence without delete backup permission (query node)

tsm: ITSO_TSM>query node florence f=d

Node Name: FLORENCE Platform: (?) Client OS Level: (?) Client Version: (?) Policy Domain Name: STANDARD Last Access Date/Time: 05/10/2007 16:57:03 Days Since Last Access: <1 Password Set Date/Time: 05/10/2007 16:57:03 Days Since Password Set: <1 Invalid Sign-on Count: 0 Locked?: No Contact: Compression: Client Archive Delete Allowed?: Yes Backup Delete Allowed?: No Registration Date/Time: 05/10/2007 16:57:03 Registering Administrator: ADMINLast Communication Method Used: Bytes Received Last Session: 0 Bytes Sent Last Session: 0 Duration of Last Session: 0.00 Pct. Idle Wait Last Session: 0.00 Pct. Comm. Wait Last Session: 0.00 Pct. Media Wait Last Session: 0.00 Optionset: URL: Node Type: Client Password Expiration Period: Keep Mount Point?: No Maximum Mount Points Allowed: 1 Auto Filespace Rename : No Validate Protocol: No TCP/IP Name: TCP/IP Address: Globally Unique ID: Transaction Group Max: 0 Data Write Path: ANY Data Read Path: ANY

Chapter 5. Troubleshooting, hints, and tips 317

Page 344: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Session Initiation: ClientOrServer High-level Address: Low-level Address: Collocation Group Name: Proxynode Target: Proxynode Agent: Node Groups: Email Address:

When Tivoli Continuous Data Protection for Files contacts the Tivoli Storage Manager server for the first time with a valid node name, Tivoli Continuous Data Protection for Files opens a new Web browser prompting you to enter the password to identify Tivoli Continuous Data Protection for Files to the Tivoli Storage Manager server (see Figure 5-62).

Figure 5-62 Tivoli Continuous Data Protection for Files prompting for a password to access the Tivoli Storage Manager server

318 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 345: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

In the Windows system event log - for how to access the Windows system event log refer to “Windows system event log” on page 267 - you see an event log entry (Event ID: 6091) generated due to the missing password which is needed to access the Tivoli Storage Manager server (see Figure 5-63).

Figure 5-63 Informational entry in the event log (password information needed)

After you have entered the same password you used when defining the node name on the Tivoli Storage Manager server (in our example “cdp4tsm”) and click OK, the Web browser window can be closed.

A second entry in the Windows system event log is created after you have entered the password. At this time, Tivoli Continuous Data Protection for Files logs into the Tivoli Storage Manager server for the first time using the Tivoli Storage Manager API, checking if the node has sufficient permissions. As this is not true (Backup Delete Allowed?: No), a FilePath ERROR is logged with Event ID: 6000 in the Windows system event log (see Figure 5-64 on page 320).

Note: The password will be stored encrypted in a special file for that remote backup target in the \pwd\ folder in the data directory of Tivoli Continuous Data Protection for Files.

Chapter 5. Troubleshooting, hints, and tips 319

Page 346: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-64 Event log entry due to insufficient permission to delete backed up data

Figure 5-65 on page 321 displays the entries in the diserror.log (Tivoli Storage Manager API error log file).

Note: Return code (RC) 27 is defined as DSM_RC_ABORT_NOT_AUTHORIZED, which translates to “You cannot delete the file space data unless your Tivoli Continuous Data Protection for Files administrator has authorized your node to do so. Authorization permits you to delete backup data, archive data, or both.”

For more information about Tivoli Storage Manager API return codes and their definition, refer to Tivoli Storage Manager: Using the Application Program Interface, SC32-0147.

320 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 347: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-65 Error messages in dsierror.log due to insufficient permissions to delete backed up data

� The first message (ANS1025E) is expected because at the very first contact of Tivoli Continuous Data Protection for Files with the Tivoli Storage Manager server there is no password for authentication available yet, leading to the session rejected error message.

After you have entered the correct password when prompted to do so, this message does not display again.

� The second message (ANS1126E) is caused due to Tivoli Continuous Data Protection for Files (respectively its node name) lacking the authority to delete backup copies on the Tivoli Storage Manager server.

A series of entries in the Windows system event log will be created when Tivoli Continuous Data Protection for Files tries to store more files on the remote backup location (Tivoli Storage Manager server) as defined in the Remote Storage page of the Settings Notebook.

At first, for each file which is getting stored, two FilePath ERROR with Event ID: 6000 get reported in the Windows system event log (see Figure 5-66 on page 322).

05/10/2007 16:59:29 ANS1025E Session rejected: Authentication failure05/10/2007 16:59:54 ANS1126E The file space cannot be deleted because this node does not have permission to delete archived or backed up data.

Important: At this time, Tivoli Continuous Data Protection for Files stores files on the Tivoli Storage Manager server without any further error message indicating that the node does not have sufficient delete backup copies permissions - until your designated storage space is full or when the maximum number of versions per file defined to be stored on the remote storage location is exceeded.

If this happens, Tivoli Continuous Data Protection for Files cannot successfully purge older files on the Tivoli Storage Manager server.

Chapter 5. Troubleshooting, hints, and tips 321

Page 348: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-66 Event log entry when storing more versions of files as defined on remote storage location

Also, Event ID: 6086 is created as the replication engine of Tivoli Continuous Data Protection for Files is not able to unlink the (old) versioned file (see Figure 5-67 on page 323).

322 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 349: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-67 Tivoli Continuous Data Protection for Files unable to unlink the file (Event ID: 6086)

The purge of older versioned files is not possible due to no authority to delete backup copies on the Tivoli Storage Manager server as reported by Event ID: 6000 in the Windows system event log (see Figure 5-68 on page 324).

Chapter 5. Troubleshooting, hints, and tips 323

Page 350: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-68 FilePath ERROR entry (Event ID: 6000) in event log due to a permission problem

Due to Tivoli Continuous Data Protection for Files being unavailable to purge files on the Tivoli Storage Manager server, the file purge_failed.log is created, or a replication-status entry message is appended to that file if it already exists. For more information about the log files used by Tivoli Continuous Data Protection for Files, refer to 5.3.2, “Tivoli Continuous Data Protection for Files logs” on page 348.

File purge_failed.log contains a replication-status message, that Tivoli Continuous Data Protection for Files failed (lastStatus="FAIL") to unlink (action="Unlink") file florence.txt-FP1178834646.txt ((src="tsm://helsinki\RealTimeBackup\florence\C\Documents and Settings\Administrator\My Documents\florence.txt-FP1178834646.txt") and (dst="tsm://helsinki\RealTimeBackup\florence\C\Documents and Settings\Administrator\My Documents\florence.txt-FP1178834646.txt")) on Tivoli Storage Manager server Helsinki (see Figure 5-69 on page 325).

324 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 351: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-69 Entry in file purge_failed.log

Each - unsuccessful - try to purge a file on the Tivoli Storage Manager server is causing error message ANS1126E to appear in the diserror.log (see Figure 5-70).

Figure 5-70 File dsierror.log with error messages ANS1126E

Example 5-3 on page 326 shows the output of a select command against the Tivoli Storage Manager server backups table. Note that we have originally defined only two versions (see Figure 5-57 on page 313) to be kept on the remote storage location, but the output of the select command shows seven active versions (six versioned and one un-versioned) of the file “florence.txt”.

<replication-status when="2007-05-10 17:05:01" lastStatus="FAIL" explanation="Purge" errValue="5079" errMnemonic="DSTEPERM" action="Unlink" src="tsm://helsinki\RealTimeBackup\florence\C\Documents and Settings\Administrator\My Documents\florence.txt-FP1178834646.txt" dst="tsm://helsinki\RealTimeBackup\florence\C\Documents and Settings\Administrator\My Documents\florence.txt-FP1178834646.txt" size="3" priority="5" time="1178834701" ID="589417085500000185"/>

05/10/2007 17:05:01 ANS1126E The file space cannot be deleted because this node does not have permission to delete archived or backed up data.05/10/2007 17:05:01 ANS1126E The file space cannot be deleted because this node does not have permission to delete archived or backed up data.

Important: Even if the defined maximum number of versions per file is exceeded, or the designated storage space is exhausted, Tivoli Continuous Data Protection for Files does still backup files to the Tivoli Storage Manager in case of missing delete backup authority.

As Tivoli Continuous Data Protection for Files appends to each versioned file a unique file identifier, for instance florence.txt-FP11-78834646.txt, each version of the same file is treated as a different (new) file and therefore as an active object by the Tivoli Storage Manager server.

This can lead to tremendous problems as the number of active objects can increase dramatically and - due to their active state - are not deleted by a Tivoli Storage Manager server expire inventory process. Also the storage on disk or tape pools used by the Tivoli Storage Manager server can grow rapidly in such a case.

Chapter 5. Troubleshooting, hints, and tips 325

Page 352: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Example 5-3 Select command output displaying too much active versions of a file

tsm: ITSO_TSM>select node_name,state,ll_name from backups where node_name='FLORENCE' and ll_name like '%florence%'ANR2963W This SQL query may produce a very large result table, or may require a significant amount of time to compute.

Do you wish to proceed? (Yes (Y)/No (N)) y

NODE_NAME STATE LL_NAME------------------ ------------------ ------------------FLORENCE ACTIVE_VERSION florenceFLORENCE ACTIVE_VERSION florence.txtFLORENCE ACTIVE_VERSION florence.txt-FP11- 78834630.txtFLORENCE ACTIVE_VERSION florence.txt-FP11- 78834646.txtFLORENCE ACTIVE_VERSION florence.txt-FP11- 78834663.txtFLORENCE ACTIVE_VERSION florence.txt-FP11- 78834698.txtFLORENCE ACTIVE_VERSION florence.txt-FP11- 78834705.txtFLORENCE ACTIVE_VERSION florence.txt-FP11- 78834711.txt

Solution:To avoid such a situation, you need to either register the node name on the Tivoli Storage Manager server using the backdelete=yes parameter with the register node command (see Example 5-4) or, if the node has already been registered, use the update node command and specify the backdelete=yes parameter (see Example 5-5).

Example 5-4 Register node florence with backdelete=yes parameter (register node)

tsm: ITSO_TSM>register node florence cdp4tsm backdelete=yesANR2060I Node FLORENCE registered in policy domain STANDARD.ANR2099I Administrative userid FLORENCE defined for OWNER access to node FLORENCE.

Example 5-5 Update existing node florence with backdelete=yes parameter (update node)

tsm: ITSO_TSM>update node florence backdelete=yesANR2063I Node FLORENCE updated.

326 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 353: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Example 5-6 shows the details of node “florence” with delete backup permission (Backup Delete Allowed?: Yes).

Example 5-6 Details of node florence with delete backup permission (query node)

tsm: ITSO_TSM>query node florence f=d

Node Name: FLORENCE Platform: (?) Client OS Level: (?) Client Version: (?) Policy Domain Name: STANDARD Last Access Date/Time: 05/10/2007 17:16:43 Days Since Last Access: <1 Password Set Date/Time: 05/10/2007 17:16:43 Days Since Password Set: <1 Invalid Sign-on Count: 0 Locked?: No Contact: Compression: Client Archive Delete Allowed?: Yes Backup Delete Allowed?: Yes Registration Date/Time: 05/10/2007 17:16:43 Registering Administrator: ADMINLast Communication Method Used: Bytes Received Last Session: 0 Bytes Sent Last Session: 0 Duration of Last Session: 0.00 Pct. Idle Wait Last Session: 0.00 Pct. Comm. Wait Last Session: 0.00 Pct. Media Wait Last Session: 0.00 Optionset: URL: Node Type: Client Password Expiration Period: Keep Mount Point?: No Maximum Mount Points Allowed: 1 Auto Filespace Rename : No Validate Protocol: No TCP/IP Name: TCP/IP Address: Globally Unique ID: Transaction Group Max: 0 Data Write Path: ANY Data Read Path: ANY

Chapter 5. Troubleshooting, hints, and tips 327

Page 354: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Session Initiation: ClientOrServer High-level Address: Low-level Address: Collocation Group Name: Proxynode Target: Proxynode Agent: Node Groups: Email Address:

If you have registered or updated a node using the required backdelete=yes parameter, Tivoli Continuous Data Protection for Files is able to successfully purge files on the Tivoli Storage Manager server.

Example 5-7 shows the output of a select command run against the Tivoli Storage Manager server backups table displaying active and inactive versions of the file “florence.txt”. The formerly active versions of this file have been purged successfully by Tivoli Continuous Data Protection for Files now becoming an inactive version.

Example 5-7 Select command output displaying active and inactive versions of a file

tsm: ITSO_TSM>select node_name,state,ll_name from backups where node_name='FLORENCE' and ll_name like '%florence%'ANR2963W This SQL query may produce a very large result table, or may require a significant amount of time to compute.

Do you wish to proceed? (Yes (Y)/No (N)) y

NODE_NAME STATE LL_NAME------------------ ------------------ ------------------FLORENCE ACTIVE_VERSION florenceFLORENCE ACTIVE_VERSION florence.txtFLORENCE ACTIVE_VERSION florence.txt-FP11- 78835759.txtFLORENCE INACTIVE_VERSION florence.txt-FP11- 78835715.txtFLORENCE INACTIVE_VERSION florence.txt-FP11- 78835740.txt

To eliminate inactive versions of files from the Tivoli Storage Manager server database, you need to run the expire inventory command (see Example 5-8).

Example 5-8 Running expiration on the Tivoli Storage Manager server (expire inventory)

tsm: ITSO_TSM>expire inventory

328 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 355: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

ANS8003I Process number 17 started.

In Example 5-9 you can see, that the inactive versions have now been deleted from the Tivoli Storage Manager server database.

Example 5-9 Select command output after running expiration (only active versions)

tsm: ITSO_TSM>select node_name,state,ll_name from backups where node_name='FLORENCE' and ll_name like '%florence%'ANR2963W This SQL query may produce a very large result table, or may require a significant amount of time to compute.

Do you wish to proceed? (Yes (Y)/No (N)) y

NODE_NAME STATE LL_NAME------------------ ------------------ ------------------FLORENCE ACTIVE_VERSION florenceFLORENCE ACTIVE_VERSION florence.txtFLORENCE ACTIVE_VERSION florence.txt-FP11- 78835759.txt

Tivoli Storage Manager client sessions disabledThere are many reasons, for example to perform maintenance on the Tivoli Storage Manager server, that a Tivoli Storage Manager server administrator does not want Tivoli Storage Manager client sessions to temporarily access the Tivoli Storage Manager server.

He can prevent incoming Tivoli Storage Manager client sessions using the disable sessions client command on the Tivoli Storage Manager server.

Example 5-10 displays the output from a query status command showing that the Tivoli Storage Manager server has been disabled for incoming Tivoli Storage Manager sessions (Availability: Enabled for Admin and Server sessions).

Example 5-10 Tivoli Storage Manager client sessions disabled on Tivoli Storage Manager server (query status)

tsm: ITSO_TSM>query statusStorage Management Server for Windows - Version 5, Release 4, Level 0.0

Server Name: ITSO_TSM Server host name or IP address: 9.3.5.52 Server TCP/IP port number: 1500 Crossdefine: Off

Chapter 5. Troubleshooting, hints, and tips 329

Page 356: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Server Password Set: No Server Installation Date/Time: 05/03/2007 20:05:21 Server Restart Date/Time: 05/10/2007 18:58:10 Authentication: On Password Expiration Period: 90 Day(s) Invalid Sign-on Attempt Limit: 0 Minimum Password Length: 0 Registration: Closed Subfile Backup: No Availability: Enabled for Admin and Server sessions Accounting: On Activity Log Retention: 1 Day(s) Activity Log Number of Records: 1497 Activity Log Size: <1 M Activity Summary Retention Period: 30 Day(s) License Audit Period: 30 Day(s) Last License Audit: 05/15/2007 06:58:10 Server License Compliance: Valid Central Scheduler: Active Maximum Sessions: 25 Maximum Scheduled Sessions: 12 Event Record Retention Period: 10 Day(s) Client Action Duration: 5 Day(s) Schedule Randomization Percentage: 50 Query Schedule Period: 6 Hour(s) Maximum Command Retries: 10 Retry Period: 5 Minute(s) Scheduling Modes: Any Log Mode: Normal Database Backup Trigger: Not Defined BufPoolSize: 32,680 K Active Receivers: CONSOLE ACTLOG NTEVENTLOG Configuration manager?: Off Refresh interval: 60 Last refresh date/time: Context Messaging: Off Server-free Status: On Server-free Batch Size: 200Table of Contents (TOC) Load Retention: 120 Minute(s) Machine Globally Unique ID: ec.10.51.80.64.1a.11.d9.b6.b1.00.11.09.9b.97.40 Archive Retention Protection: Off Encryption Strength: AES

330 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 357: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Under this condition, Tivoli Continuous Data Protection for Files cannot successfully backup files to the Tivoli Storage Manager server using the Tivoli Storage Manager API as the incoming connection is rejected by the Tivoli Storage Manager server. As this is not transparent to Tivoli Continuous Data Protection for Files, it still tries to store files on the Tivoli Storage Manager if they were changed on the local system.

If Tivoli Continuous Data Protection for Files wants to send a file to a Tivoli Storage Manager server with Tivoli Storage Manager client sessions being disabled, a window shows up informing you that the target location is not responding properly (see Figure 5-71).

Figure 5-71 Target location (Helsinki) is not responding properly (window)

The explanation why the remote backup target does not respond properly, can be found in the Windows system event log. An error Event ID: 6000 is generated because the session was rejected by the Tivoli Storage Manager server due to the disabled Tivoli Storage Manager client sessions (see Figure 5-72 on page 332).

Chapter 5. Troubleshooting, hints, and tips 331

Page 358: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-72 Entry in event log due to session being rejected from Tivoli Storage Manager server

The same error message (ANS1355E) is also written into the error log file (dsierror.log) of Tivoli Storage Manager API client (see Figure 5-73).

Figure 5-73 ANS1355E message in dsierror.log file (session rejected)

Along with the Event ID: 6000 message, a second event (Event ID: 6086) will be written into the Windows system event log (see Figure 5-74 on page 333).

Note: Return code (RC) 55 is defined as DSM_RC_REJECT_SERVER_DISABLED, which translates to “The server is in a disabled state and cannot be accessed for normal activity.”

For more information about Tivoli Storage Manager API return codes and their definition, refer to Tivoli Storage Manager: Using the Application Program Interface, SC32-0147.

05/10/2007 17:33:12 ANS1355E Session rejected: Server disabled

332 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 359: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-74 Replication engine unable to copy the file (Event ID: 6086)

This error event has been caused, as the replication engine of Tivoli Continuous Data Protection for Files could not copy the locally changed file successfully to the Tivoli Storage Manager server.

Replication problems and errors are written into specific log files used by Tivoli Continuous Data Protection for Files. See 5.3.2, “Tivoli Continuous Data Protection for Files logs” on page 348 for more information about the Tivoli Continuous Data Protection for Files logs.

In this case, file replication-failed.5 is created, or - if it already exists - a new entry is appended to the replication-failed.5 file (see Figure 5-75 on page 334).

Chapter 5. Troubleshooting, hints, and tips 333

Page 360: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-75 Entry in file replication-failed.5

It contains a replication entry, that the backup (action="Copy") of file florence.txt (src="C:\Documents and Settings\Administrator\My Documents\florence.txt") to Tivoli Storage Manager server Helsinki (dst="tsm://helsinki\RealTimeBackup\florence\C\Documents and Settings\Administrator\My Documents\florence.txt") was not possible (lastStatus="FAIL").

Solution:For Tivoli Continuous Data Protection for Files to be able to backup files to the Tivoli Storage Manager server again, the Tivoli Storage Manager server administrator needs to allow Tivoli Storage Manager client sessions to access the Tivoli Storage Manager server.

This can be done using the enable sessions client command (see Example 5-11).

Example 5-11 Enable Tivoli Storage Manager client sessions again (enable sessions)

tsm: ITSO_TSM>enable sessions clientANR2552I Server now enabled for Client access.

The query status output when Tivoli Storage Manager clients sessions are enabled again can be seen in Example 5-12 (Availability: Enabled).

Example 5-12 Tivoli Storage Manager client sessions enabled on IBM Tivoli Storage Manager server (query status)

tsm: ITSO_TSM>query statusStorage Management Server for Windows - Version 5, Release 4, Level 0.0

Server Name: ITSO_TSM Server host name or IP address: 9.3.5.52 Server TCP/IP port number: 1500 Crossdefine: Off Server Password Set: No

<replicate when="2007-05-10 17:33:12" lastStatus="FAIL" explanation="Unable to access the specified file" errValue="0" errMnemonic="SUCCESS" action="Copy" src="C:\Documents and Settings\Administrator\My Documents\florence.txt" dst="tsm://helsinki\RealTimeBackup\florence\C\Documents and Settings\Administrator\My Documents\florence.txt" size="2" priority="5" time="1178836392" ID="589417836500000315"/>

334 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 361: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Server Installation Date/Time: 05/03/2007 20:05:21 Server Restart Date/Time: 05/10/2007 18:58:10 Authentication: On Password Expiration Period: 90 Day(s) Invalid Sign-on Attempt Limit: 0 Minimum Password Length: 0 Registration: Closed Subfile Backup: No Availability: Enabled Accounting: On Activity Log Retention: 1 Day(s) Activity Log Number of Records: 1500 Activity Log Size: <1 M Activity Summary Retention Period: 30 Day(s) License Audit Period: 30 Day(s) Last License Audit: 05/15/2007 06:58:10 Server License Compliance: Valid Central Scheduler: Active Maximum Sessions: 25 Maximum Scheduled Sessions: 12 Event Record Retention Period: 10 Day(s) Client Action Duration: 5 Day(s) Schedule Randomization Percentage: 50 Query Schedule Period: 6 Hour(s) Maximum Command Retries: 10 Retry Period: 5 Minute(s) Scheduling Modes: Any Log Mode: Normal Database Backup Trigger: Not Defined BufPoolSize: 32,680 K Active Receivers: CONSOLE ACTLOG NTEVENTLOG Configuration manager?: Off Refresh interval: 60 Last refresh date/time: Context Messaging: Off Server-free Status: On Server-free Batch Size: 200Table of Contents (TOC) Load Retention: 120 Minute(s) Machine Globally Unique ID: ec.10.51.80.64.1a.11.d9.b6.b1.00.11.09.9b.97.40 Archive Retention Protection: Off Encryption Strength: AES

Chapter 5. Troubleshooting, hints, and tips 335

Page 362: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Tivoli Storage Manager server unavailableIt can happen, that the Tivoli Storage Manager cannot be reached at all by any Tivoli Storage Manager client, for example, if the Tivoli Storage Manager server had been shutdown completely.

This condition is not transparent to Tivoli Continuous Data Protection for Files, so it tries sending files to the Tivoli Storage Manager server if they have been changed locally on the computer, using the Tivoli Storage Manager API. If the remote backup target cannot be reached at all, Tivoli Continuous Data Protection for Files informs you about this condition with a message in the notification area (see Figure 5-76).

Figure 5-76 Informational message about the network target being not reachable

Tivoli Continuous Data Protection for Files assumes, that this is only a transient condition (see 5.2.5, “Transient conditions (remote storage location not reachable)” on page 343 for more information) and re-tries to establish the connection to the remote backup target (Tivoli Storage Manager server Helsinki).

File dsierror.log contains several TCP/IP error messages, that no connection to the Tivoli Storage Manager server could be established (see Figure 5-77).

Figure 5-77 TCP/IP connection error messages in file dsierror.log

About every 10 seconds Tivoli Continuous Data Protection for Files tries to re-establish a connection with the remote storage location for continuous data protection.

05/10/2007 17:45:39 ANS5216E Could not establish a TCP/IP connection with address 'helsinki:1500'. The TCP/IP error is 'Unknown error' (errno = 10061). 05/10/2007 17:45:39 ANS4039E Could not establish a session with a TSM server or client agent. The TSM return code is -50. 05/10/2007 17:45:39 ANS1017E Session rejected: TCP/IP connection failure05/10/2007 17:45:49 ANS5216E Could not establish a TCP/IP connection with address 'helsinki:1500'. The TCP/IP error is 'Unknown error' (errno = 10061). 05/10/2007 17:45:49 ANS4039E Could not establish a session with a TSM server or client agent. The TSM return code is -50. 05/10/2007 17:45:49 ANS1017E Session rejected: TCP/IP connection failure

336 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 363: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

The unavailability of the Tivoli Storage Manager server on the network is also causing an entry being generated in the Windows event log (Event ID: 6069) as the replication daemon detects that kind of network error condition (see Figure 5-78).

Figure 5-78 Event log entry caused by the network target being not available (Event ID: 6069)

As Tivoli Continuous Data Protection for Files is unable to replicate files being changed to the Tivoli Storage Manager server, it tracks the changed files in special replication log files. Refer to 5.3.2, “Tivoli Continuous Data Protection for Files logs” on page 348 for more information about the log files used by Tivoli Continuous Data Protection for Files.

Here, the files replication-active.5 and replication-queue.5 get created. Usually these files are only available temporarily, but in case of the remote storage being unavailable these files will stay active until the remote backup destination can be accessed again (see Figure 5-79 on page 338 and Figure 5-80 on page 338).

Chapter 5. Troubleshooting, hints, and tips 337

Page 364: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-79 Entry in file replication-active.5

Figure 5-80 Entries in file replication-queue.5

The main difference between those two files is, that the first change of a file will be tracked in file replication-active.5, as during the active replication process Tivoli Continuous Data Protection for Files detected that the remote backup location was not available and therefore could not replicate this file.

All other changes of the same file - if it will be changed multiple times during the transient network condition - will be logged (queued) in file replication-queue.5 for replication at a later time once the remote storage location becomes available again.

<replicate when="2007-05-10 17:45:30" lastStatus="QUEUED" action="Copy" src="C:\Documents and Settings\Administrator\My Documents\florence.txt" dst="tsm://helsinki\RealTimeBackup\florence\C\Documents and Settings\Administrator\My Documents\florence.txt" size="13" priority="5" time="1178837130" ID="589418378000000235"/>

<replicate when="2007-05-10 17:45:39" lastStatus="QUEUED" action="Copy" src="C:\Documents and Settings\Administrator\My Documents\florence.txt" dst="tsm://helsinki\RealTimeBackup\florence\C\Documents and Settings\Administrator\My Documents\florence.txt" size="14" priority="5" time="1178837139" ID="589418378000000255"/><replicate when="2007-05-10 17:45:53" lastStatus="QUEUED" action="Copy" src="C:\Documents and Settings\Administrator\My Documents\florence.txt" dst="tsm://helsinki\RealTimeBackup\florence\C\Documents and Settings\Administrator\My Documents\florence.txt" size="15" priority="5" time="1178837153" ID="589418378000000275"/><replicate when="2007-05-10 17:46:30" lastStatus="QUEUED" action="Copy" src="C:\Documents and Settings\Administrator\My Documents\florence.txt" dst="tsm://helsinki\RealTimeBackup\florence\C\Documents and Settings\Administrator\My Documents\florence.txt" size="16" priority="5" time="1178837190" ID="589418378000000295"/>

338 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 365: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Solution:For Tivoli Continuous Data Protection for Files to be able to backup files to the Tivoli Storage Manager server, the Tivoli Storage Manager server needs to be started by the Tivoli Storage Manager server administrator.

If the Tivoli Storage Manager server is up and running again, Tivoli Continuous Data Protection for Files will back up the files which have been changed while the Tivoli Storage Manager server was unavailable and will continue to store newly changed files on the Tivoli Storage Manager server.

Conflicting include/exclude listsBoth Tivoli Continuous Data Protection for Files and the Tivoli Storage Manager (API) manage files or directories for backup services based on include/exclude lists. This can lead to potential conflicts between Tivoli Continuous Data Protection for Files and the Tivoli Storage Manager API, for example, if a file is included in Tivoli Continuous Data Protection for Files for continuous protection but is excluded by the Tivoli Storage Manager API client from being stored on the Tivoli Storage Manager server.

By design, the Tivoli Storage Manager (API) backs up any file that is not excluded. This can be done either in the Tivoli Storage Manager API client options file (dsm.opt) or on the Tivoli Storage Manager server (for multiple Tivoli Storage Manager clients together) using a client option set. We do not discuss the latter option here. For more information about defining a client option set,

Attention: Note that each replicate entry (lastStatus="QUEUED") in file replication-queue.5 refers to the same file name (src="C:\Documents and Settings\Administrator\My Documents\florence.txt").

Also be aware that Tivoli Continuous Data Protection for Files has no local cache to store different versions of the same file if it is changed repeatedly while the remote target is unavailable.

So if you made changes to the same file multiple times when the Tivoli Storage Manager server was (temporarily) unavailable, only the latest version of this file will be copied over to the Tivoli Storage Manager server after it becomes available again.

Note: For details about how to include files, directories, or both for protection, or how to exclude them from protection in Tivoli Continuous Data Protection for Files, refer to “Files to Protect page” on page 79.

Chapter 5. Troubleshooting, hints, and tips 339

Page 366: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

refer to Chapter 5, “Administrative Commands”, in IBM Tivoli Storage Manager for Windows: Administrator’s Reference, SC32-0127.

You can add various include or exclude statements into the dsm.opt file. For full details about possible include/exclude statements and their syntax, refer to Chapter 2, “Configuring Tivoli Storage Manager”, in Tivoli Storage Manager for Windows: Backup-Archive Clients Installation and User’s Guide, SC32-0146.

However, adding include/exclude statements into the dsm.opt might also lead to conflicts with the include/exclude list Tivoli Continuous Data Protection for Files is using. This is the reason why we do not recommend using include/exclude statements in the dsm.opt file for Tivoli Continuous Data Protection for Files implementations.

As shown in our configuration example in Figure 3-22 on page 80, we defined all files in the \My Documents\ folder as files being protected continuously by Tivoli Continuous Data Protection for Files.

Figure 5-81 shows the modified file dsm.opt we use in this example. Note that we added an exclude statement (Exclude "*:\...\*.txt"), which excludes all files with extension *.txt from being backed up by the Tivoli Storage Manager API.

Figure 5-81 Modified dsm.opt file containing an exclude statement for *.txt files

Important: The default Tivoli Storage Manager API options file dsm.opt (see Figure 5-56 on page 310) as used by Tivoli Continuous Data Protection for Files, does not contain any include/exclude statement, so all files will be backed up by the Tivoli Storage Manager API.

We do recommend to specify files and folders to be backed up in the include/exclude list of Tivoli Continuous Data Protection for Files only, and not to use separate or additional include/exclude statements in the dsm.opt file of the Tivoli Storage Manager API.

In this case, Tivoli Continuous Data Protection for Files controls which files will be backed up (or not) and no potential conflicts between different include/exclude lists will occur.

COMMMETHOD TCPipPASSWORDACCESS generateEXCLUDE “*:\...\*.txt”

340 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 367: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

If we edit, for example, file florence.txt in the directory C:\Documents and Settings\Administrator\My Documents and save the changes, Tivoli Continuous Data Protection for Files tries to send the changed file to the Tivoli Storage Manager server using the Tivoli Storage Manager API. This fails, that is, the changed file florence.txt is not sent to the Tivoli Storage Manager server.

The reason is we excluded all files ending with *.txt from being backed up by the Tivoli Storage Manager API according to the exclude statement in the dsm.opt file. In the Windows system event log you see an event log entry (Event ID: 6000) generated due to file florence.txt being excluded from backup (see Figure 5-82).

Figure 5-82 Entry in event log due to file being excluded from backup (Event ID: 6000)

Note: Return code (RC) 185 is defined as DSM_RC_TL_EXCLUDED, which translates to “You cannot back up, archive, or migrate files that are excluded.”

For more information about Tivoli Storage Manager API return codes and their definition, refer to Tivoli Storage Manager: Using the Application Program Interface, SC32-0147.

Chapter 5. Troubleshooting, hints, and tips 341

Page 368: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Beside the Event ID: 6000 message, a second event (Event ID: 6086) will be written into the Windows system event log (see Figure 5-83).

Figure 5-83 Replication engine unable to copy the file (Event ID: 6086)

This error event has been caused, as the replication engine of Tivoli Continuous Data Protection for Files could not copy the locally changed file successfully to the Tivoli Storage Manager server.

In the dsierror.log file a warning message (ANS1115W) will be reported, that a file had been excluded from backup due to the include/exclude list (Figure 5-84 on page 343).

Note: The file name is missing in the ANS1115W warning message. You need to check the Windows system event log for error messages with the same timestamp as the ANS1115W message to see what file actually is excluded from backups and therefore causing this entry in the dsierror.log file.

342 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 369: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-84 ANS1115W warning message in dsierror.log (excluded file)

Solution:In order to avoid such include/exclude conflicts between Tivoli Continuous Data Protection for Files and the Tivoli Storage Manager API, do not use any include/exclude statements in the dsm.opt file of the Tivoli Storage Manager API client. Instead, use Tivoli Continuous Data Protection for Files to specify which files and folders to protect (include) and which not (exclude) - even when using the Tivoli Storage Manager API to store files on a Tivoli Storage Manager server.

5.2.5 Transient conditions (remote storage location not reachable)

Replication problems due to transient conditions (remote storage location temporarily not reachable) can have a variety of different causes. The result is, that the remote location (external device, file server, Web server (WebDAV), or Tivoli Storage Manager server) cannot be accessed and therefore Tivoli Continuous Data Protection for Files fails replicating to this backup target.

Several common issues are:

� The external disk is not plugged into your computer.

� Your own system is not connected to the network (for example, when you work from home and are not logged on to your company’s network).

� The network has a problem (for example, a router/switch/hub is defective).

� The file-, WebDAV-, or Tivoli Storage Manager server is unavailable (for example, due to maintenance work).

If the remote backup location is not reachable when Tivoli Continuous Data Protection for Files tries to replicate to it, you will see the notification message shown in Figure 5-85 on page 344.

05/15/2007 14:43:43 ANS1115W File '' excluded by Include/Exclude list

Attention: Files excluded from backup by a Tivoli Storage Manager API include/exclude list will not be sent to the Tivoli Storage Manager server even if they are included for protection in Tivoli Continuous Data Protection for Files.

Chapter 5. Troubleshooting, hints, and tips 343

Page 370: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-85 Remote storage location not reachable (notification message)

At the same time, the Tivoli Continuous Data Protection for Files Status page shows the current inaccessibility of your remote storage by turning the color of the Remote Storage icon from blue to yellow with a little exclamation mark (see Figure 5-86 on page 345).

Note: Even if you are using an external device (disk) as your remote storage location, you will see this notification message informing about the network target not being reachable in the case when you have an unconnected external device.

344 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 371: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-86 Remote storage location inaccessible (Status page)

Once the remote storage location can be reached again, you will be notified about this event by Tivoli Continuous Data Protection for Files (see Figure 5-87 on page 346) and replication will continue.

Attention: Tivoli Continuous Data Protection for Files will keep track of the changes you make to your files even when you see this message. It will wait for some time and try to replicate the changed file(s) later again, as this might be only a temporary condition.

If you change the same file multiple times when your remote storage area is temporarily unavailable, only the latest version of this file will be copied over to the remote storage location when it becomes available again.

Chapter 5. Troubleshooting, hints, and tips 345

Page 372: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-87 Remote storage location reachable again (notification message)

Finally, the Remote Storage icon in the Status page of the Tivoli Continuous Data Protection for Files user interface turns back to blue again (see Figure 5-88).

Figure 5-88 Remote storage location accessible again (Status page)

346 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 373: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

5.3 System operation and log files

The following section provides some information about important system operation and log files used by Tivoli Continuous Data Protection for Files and the Tivoli Storage Manager application programming interface (API). An in-depth discussion about the log files and their structure will not take place here, as this is not necessary for the daily use of Tivoli Continuous Data Protection for Files. Anyhow, a general understanding of these log files might be of interest for deeper problem determination and troubleshooting.

The log files are created, transparently to the user, in the data directory while the other system operation files - except for fpa.txt, which is in the data directory, too - can be found in the installation directory of Tivoli Continuous Data Protection for Files. Refer to 3.4.1, “Installation and data directories” on page 108 for more information about the directories used by Tivoli Continuous Data Protection for Files.

5.3.1 Tivoli Continuous Data Protection for Files system operation files

For Tivoli Continuous Data Protection for Files to function, there are several system operation files necessary. Table 5-3 displays the most important system operation files used by Tivoli Continuous Data Protection for Files.

Table 5-3 Important system operation files2

File name Description

fp.sys File fp.sys is the driver which loads when the computer boots up. It is located in the \%WINDIR%\System32\Drivers directory.

FilePathSrv.exe FilePathSrv.exe is the daemon, or process which starts as a service (name: CDPforFilesSrv). If you are running in regular user mode, this service will stop right away, until it has something to do. If you are running in service-mode, the service will stay active.

2 The file fpa.txt is located in the data directory while all other system operating files will be found in the installation directory of Tivoli Continuous Data Protection for Files.

Chapter 5. Troubleshooting, hints, and tips 347

Page 374: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

5.3.2 Tivoli Continuous Data Protection for Files logs

Tivoli Continuous Data Protection for Files uses various logs for reporting or tracking its activities. Those log files are explained in this section of the chapter.

Installation log fileIn Table 5-4, you can see the log file being created during installation of Tivoli Continuous Data Protection for Files. It is helpful in case you have trouble getting Tivoli Continuous Data Protection for Files installed on your system.

Table 5-4 Installation log file

fpa.exe File fpa.exe is the command line, interactive program which passes commands to the kernel. It can, for example, be used to set tracing levels or to change underlying Tivoli Continuous Data Protection for Files settings.

fpa.txt The fpa.txt file is the database where main “rules” and some configuration information is stored.

File name Description

Note: You might not find all of the mentioned logs in your Tivoli Continuous Data Protection for Files data directory, as some of the log files are only used temporarily while others depend on how you have configured Tivoli Continuous Data Protection for Files.

Log file name Description

fpinstall.log The file fpinstall.log contains the installation information fromTivoli Continuous Data Protection for Files.

348 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 375: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Replication logsThe log files regarding the replication activities of Tivoli Continuous Data Protection for Files are explained in Table 5-5.

Table 5-5 Replication logs

E-mail and scheduled protection logsTable 5-6 summarizes the various log files used when e-mail and/or scheduled protection has been enabled in the E-mail Protection page of the Settings Notebook in the Tivoli Continuous Data Protection for Files user interface.

Table 5-6 Scheduled protection logs

Tip: If you have trouble installing Tivoli Continuous Data Protection for Files, it is recommended trying to install Tivoli Continuous Data Protection for Files using the verbose logging possibility (/l*v “path and file name”) of the Microsoft Windows Installer. This allows IBM support personnel to check the given log file too, for the reason of the installation failure.

For more information about Tivoli Continuous Data Protection for Files installation using command-line parameters, refer to 3.2.1, “Installation using command-line parameters” on page 65.

Log file name Description

replication.log The log file replication.log contains the last replication transactions (limited in size to 1.3 MB).

replication-queue.N (where N=0...9) Queued replication transactions are written into file replication-queue.N.

replication-active.N (where N=0...9) File replication-active.N contains the currently active replication transactions.

replication-failed.N (where N=0...9) Failed replication transactions are reported in log file replication-failed.N (not limited in size).

Log file name Description

ChangeJournal.log The file ChangeJournal.log does contain a list of all files pending for scheduled processing.

ChangeJournal.log_1_inprocess Currently processed files are reported in file ChangeJournal.log_1_inprocess.

Chapter 5. Troubleshooting, hints, and tips 349

Page 376: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Local pool log file and \gendb\ directoryThe local pool log file and the directory \gendb\ are explained in Table 5-7.

Table 5-7 Local pool log file and \gendb\

5.3.3 Tivoli Storage Manager specific log files

For storing files on a Tivoli Storage Manager server as a remote backup location, Tivoli Continuous Data Protection for Files is using the Tivoli Storage Manager application programming interface (API). The Tivoli Storage Manager API has its

ChangeJournal.log_2_last File ChangeJournal.log_2_last contains the last files being processed.

ChangeJournal.log_3_out ChangeJournal.log_3_out is empty.

ChangeJournal.log_LastSuccess File ChangeJournal.log_LastSuccess contains the date and time of the last successful scheduled backup as seen in the E-mail Protection section of the My Files summary on the Tivoli Continuous Data Protection for Files Status page.

RemoteVersions.log File RemoteVersions.log holds an entry for each “versioned” file stored at the remote target.

purge_struggled.log Files that appear unreachable during purge are reported in file purge_struggled.log if this looks like a temporary (restartable) condition.

purge_failed.log Files that appear unreachable during purge are reported in file purge_failed.log if this is a permanent (non-restartable) condition.

Log file name Description

LocalPool.log The file LocalPool.log is a list of all files in the local file pool (backup area).

\gendb\ (directory) The directory \gendb\ and its subdirectories respectively hold version names with dates to facilitate pruning based on the retention settings.

Log file name Description

350 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 377: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

own specific log file for reporting (error) messages in conjunction with a Tivoli Storage Manager server.

Table 5-8 shows the log file used by the Tivoli Storage Manager API and its description.

Table 5-8 Tivoli Storage Manager API log file3

5.4 Tracing

For problem determination, Tivoli Continuous Data Protection for Files has a built-in tracing functionality. In this section, we will show you the basics of how to capture a Tivoli Continuous Data Protection for Files trace and a short tracing example.

5.4.1 Before you start

In order to view the Tivoli Continuous Data Protection for Files trace output, you need to have DebugView for Windows installed. DebugView is a program to display both Win32® and kernel-mode debug output. It can be downloaded from the following Web site:

http://www.microsoft.com/technet/sysinternals/utilities/DebugView.mspx

For installation instructions and usage of DebugView, refer to the same URL.

Log file name Description

dsierror.log File dsierror.log contains (error) messages which arise when backing up files to a Tivoli Storage Manager server.

3 The dsierror.log file of the Tivoli Storage Manager API used by Tivoli Continuous Data Protection for Files is located in the data directory of Tivoli Continuous Data Protection for Files.

Important: Tracing facilities are used by Tivoli Continuous Data Protection for Files product development and IBM support personnel for diagnosing and debugging problems and should only be used when requested by them. These facilities are subject to change without notice and might vary depending upon the version and release of the product.

Chapter 5. Troubleshooting, hints, and tips 351

Page 378: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

5.4.2 How to run a trace

Tracing will be started using the FilePath agent (fpa) executable fpa.exe found in the installation directory of Tivoli Continuous Data Protection for Files. The FilePath agent is a configuration/reporting tool and a daemon. It can be run with command-line parameters (as commands) that will get processed and then exits/returns or in an interactive mode where it awaits user-typed commands and responds after each one. In our example (see 5.4.3, “Tracing example” on page 353), we will use the FilePath agent interactively.

Trace syntax:TRACE [level=FINE/MEDIUM/COARSE] [program=programname] [device=FILE/SCREEN] mask=BASIC,ALL,SYS,HOOK,HOOK_IO,FPA,REPLQ,REPLT,REPLK,REPLD,LOG,EXEC,AUDIT,FPL,FPL_OPEN,FPL_WRITE,FPL_CLOSE,FPL_LIST,FPL_META,HTML,HTML_SET,HTML_GET,HTML_RESTORE,DEBUG1,XML,FPQ,METRIC,ERR,HASH,IOCTL,PF,FILE,LRP,ANALFS,ANALFS_XML,ANALFS_FILES,EXPUNGE,FNAME,WORM,CAS,TABULATION,MIRROR_META,MIRROR_IO,MIRROR_IOLIST,MIRROR_SIZE,MIRROR_DRAINER

Parameters:� level

Specifies the granularity of trace messages being reported.

– FINE

Specifies that all messages are logged.

– MEDIUM

Specifies that the most important messages are logged.

– COARSE

Specifies that only a few messages are logged.

� program

Specifies to filter a particular program’s interaction.

– programname

Note: See Chapter 2, “Product architecture, planning, and deployment” on page 19 to get more information about the FilePath agent (fpa.exe).

Attention: This might create a huge amount of output depending on the trace mask(s) being used.

352 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 379: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Specifies the name of the particular program to monitor.

� device

Specifies the system logging target.

– FILE

Specifies the system error log file as the logging target.

– SCREEN

Specifies the current terminal device of the active process as the logging target.

� mask

Specifies the trace mask(s). In case multiple trace masks are used, this is a comma separated list of trace masks.

5.4.3 Tracing example

The following section demonstrates how to capture a Tivoli Continuous Data Protection for Files trace. The trace mask we are using (mask=fpl_meta) in this example is to show how Tivoli Continuous Data Protection for Files iterates through the exclude and include list to check if a file needs to be processed or not.

Use the following steps to start the FilePath agent (see also Figure 5-89 on page 354):

1. Select Start → Run, type cmd, and click OK. A Windows command-line window displays.

2. Change to the installation directory of Tivoli Continuous Data Protection for Files by entering cd “\program files\tivoli\cdp_for_files”.

3. To run the FilePath agent in interactive mode, enter fpa.

Important: The system error log (file) of Windows operating systems is the Windows event log. Using device=FILE on Windows is not recommended, as the trace output would be written into the Windows system event log and flood it with a lot of error messages.

Important: Before activating the Tivoli Continuous Data Protection for Files trace, you need to execute the DebugView program by double-clicking the DebugView program file (dbgview.exe). DebugView will immediately start capturing debug output.

Chapter 5. Troubleshooting, hints, and tips 353

Page 380: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-89 FilePath agent in interactive mode

The fpa> command prompt indicates that you are now using the FilePath agent interactively. Enter, on the fpa> command prompt, the trace command, as seen in Figure 5-90, to start the trace:

Figure 5-90 Command to start a Tivoli Continuous Data Protection for Files trace

By specifying the trace command parameter program=cmd.exe, we are filtering the trace for Windows command-line (cmd.exe) activities only. This helps us reduce the information being captured in the trace though we are using the finest trace granularity (level=fine).

Select Start → Run, type cmd, and click OK to open a second Windows command-line window. To trigger an activity, create a file that is defined in your Tivoli Continuous Data Protection for Files configuration as a file for continuous data protection (see Figure 3-22 on page 80), for example, by running echo test >> c:\file.doc, as shown in Figure 5-91.

Figure 5-91 Create file.doc to trigger an activity

Immediately after you have issued the command, the DebugView program is capturing the trace (debug) output, as you can see in Figure 5-92 on page 355.

Microsoft Windows [Version 5.2.3790](C) Copyright 1985-2003 Microsoft Corp.

C:\Documents and Settings\Administrator>cd "\program files\tivoli\cdp_for_files"

C:\Program Files\Tivoli\CDP_for_Files>fpafpa>

fpa>trace level=fine device=screen program=cmd.exe mask=fpl_meta

Microsoft Windows [Version 5.2.3790](C) Copyright 1985-2003 Microsoft Corp.

C:\Documents and Settings\Administrator>echo test >> c:\file.doc

C:\Documents and Settings\Administrator>

354 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 381: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Figure 5-92 DebugView capturing the trace output

To end tracing, enter a trace command with an empty trace mask (see Figure 5-93).

Figure 5-93 Command to stop the trace

By entering quit or exit on the fpa> command prompt, you can leave the FilePath agent again (see Figure 5-94).

Figure 5-94 Quitting the interactive mode of the FilePath agent

Example 5-13 shows an excerpt from the complete trace created by creating the file named file.doc. You can see that the complete file name (C:\file.doc) is decomposed into its components: the directory (C:\), the base (file), and the extension (.doc). Afterwards, the file name is first matched against the exclude and then against the include list. As we defined files with extension “doc” for continuous data protection, the latter one is a hit (IsMetaHit Result:1 TRUE), and the action is executed: file.doc is processed for continuous data protection.

Example 5-13 Tracing example (trace mask=fpl_meta)

000000730.00080263FPL_META isAppropriateRuleTime rule:Group0 writable:1 meta.when OpenRW isDir:0 meta.select:Dirs&Files000000740.00080829FPL_META isAppropriateRuleTime4 Result:1 TRUE000000750.00081805FPL_META isMetaHit rule:Group0 dir:C:\ base:file ext:.doc

fpa>trace mask=""

fpa>quit

C:\Program Files\Tivoli\CDP_for_Files>

Chapter 5. Troubleshooting, hints, and tips 355

Page 382: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

000000760.00083456 FPL_META isHit fullname:C:\file.doc matchList:RealTimeBackup|\Program Files|\System32\|~|*.tmp|*.temp|\Temp\|\Temporary|\Windows\|\System Volume|\tsmlvsacache|\cache|\Tivoli\CDP_for_Files\ match:Contains000000770.00084565 FPL_META isHit full:[C:\file.doc] item:[RealTimeBackup]000000780.00085615 FPL_META isHit full:[C:\file.doc] item:[\Program Files]000000790.00086663 FPL_META isHit full:[C:\file.doc] item:[\System32\]000000800.00087668 FPL_META isHit full:[C:\file.doc] item:[~]000000810.00088680 FPL_META isHit full:[C:\file.doc] item:[*.tmp]000000820.00089753 FPL_META isHit full:[C:\file.doc] item:[*.temp]000000830.00090779 FPL_META isHit full:[C:\file.doc] item:[\Temp\]000000840.00091815 FPL_META isHit full:[C:\file.doc] item:[\Temporary]000000850.00092845 FPL_META isHit full:[C:\file.doc] item:[\Windows\]000000860.00093892 FPL_META isHit full:[C:\file.doc] item:[\System Volume]000000870.00094931 FPL_META isHit full:[C:\file.doc] item:[\tsmlvsacache]000000880.00095948 FPL_META isHit full:[C:\file.doc] item:[\cache]000000890.00097032 FPL_META isHit full:[C:\file.doc] item:[\Tivoli\CDP_for_Files\]000000900.00097675 FPL_META isHit Result:0 FALSE000000910.00098192FPL_META IsMetaHit Result:0 FALSE000000920.00099113FPL_META isAppropriateRuleTime rule:ChangeJournal writable:1 meta.when OpenRW isDir:0 meta.select:Dirs&Files000000930.00099677FPL_META isAppropriateRuleTime4 Result:1 TRUE000000940.00100675FPL_META isMetaHit rule:ChangeJournal dir:C:\ base:file ext:.doc000000950.00101682 FPL_META isHit fullname:C:\file.doc matchList: match:Contains000000960.00102353 FPL_META isHit Result:0 FALSE000000970.00102866FPL_META IsMetaHit Result:0 FALSE000000980.00103770FPL_META isAppropriateRuleTime rule:Group1 writable:1 meta.when OpenRW isDir:0 meta.select:Dirs&Files000000990.00104336FPL_META isAppropriateRuleTime4 Result:1 TRUE000001000.00105311FPL_META isMetaHit rule:Group1 dir:C:\ base:file ext:.doc000001010.00106493 FPL_META isHit fullname:C:\file.doc matchList:\My Documents\|*.doc|*.xls|*.ppt|*.123| match:Contains000001020.00107569 FPL_META isHit full:[C:\file.doc] item:[\My Documents\]000001030.00108586 FPL_META isHit full:[C:\file.doc] item:[*.doc]000001040.00109232 FPL_META isHit Result:1 TRUE000001050.00109752FPL_META IsMetaHit Result:1 TRUE

356 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 383: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Part 3 Planning for a client engagement

In this part we discuss service engagement planning for Tivoli Continuous Data Protection for Files in general. The target audience of this chapter is Business Partners and Solution Developers.

Part 3

Important: The time estimates in this section are not representative of all the possible implementation scenarios of a Tivoli Continuous Data Protection for Files based solution. Each environment is considered as unique and the time estimates regarded as general guidelines, not absolute numbers.

© Copyright IBM Corp. 2007. All rights reserved. 357

Page 384: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

358 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 385: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Appendix A. Project planning

This appendix describes the necessary planning steps that can help you in the deployment for small, medium or large environments. The information in the section is not applicable to implementation of Tivoli Continuous Data Protection for Files on a single user computer. It is more geared to multi-computer and enterprise wide deployments.

The following topics are discussed:

� “Required skills” on page 360

� “Solution description” on page 361

� “Solution deployment tasks” on page 365

� “Strategies for successful implementation” on page 371

� “Summary” on page 372

A

© Copyright IBM Corp. 2007. All rights reserved. 359

Page 386: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Required skills

To be able to successfully deploy a Tivoli Continuous Data Protection for Files solution requires considerable research and collaborative efforts between technicians, managers, consultants, administrators and users.

The purpose of this section is to identify the skills needed and where to find available resources to help with Tivoli Continuous Data Protection for Files. You need to establish a team of people with a variety of skills, depending on the solution that you need to implement in order to design, develop and deploy a Tivoli Continuous Data Protection for Files solution:

� Windows operating system administration skills

– Administrate and configure Windows servers platform

– TCP/IP protocol networking skills

� File server configuration skills (If you have a file server in your environment)

– Administrate and configure a file server

– Set right permissions on a file server

� Connectivity and network skills

– Configure to establish communication between all machines involved in the solution

� Storage (external disks) skills

– Configure external drive, on a single-computer, on a file server or on a Tivoli Storage Manager

� Tivoli Storage Manager skills (If you intend to backup your file server)

– Ability to plan, install, configure, execute administrative tasks and perform problem determination on Tivoli Storage Manager and all optional components installed

Available resources

The prerequisite skills listed in the previous table are those needed to customize or develop the solution. For each of these skills there are a variety of resources

Note: It is important to identify all the applications and resources that exist in the client environment prior to defining the skills necessary for your deployment plan.

360 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 387: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

available to help acquire the necessary skill level. The educational resources available for Tivoli Continuous Data Protection for Files:

� Tivoli Continuous Data Protection for Files online information:

– For more information about Tivoli Continuous Data Protection for Files see web page:

http://www-306.ibm.com/software/tivoli/products/continuous-data-protection/

– Online documentation:

http://publib.boulder.ibm.com/infocenter/tivihelp/v12r1/index.jsp?toc=/com.ibm.itcdpf.doc/toc.xml

� IBM Redbooks:

You can access practical and architectural information regarding IBM hardware and software on the IBM Redbooks Web site, including information about Tivoli Continuous Data Protection for Files concepts and architecture. See Web page: http://www.redbooks.ibm.com

Solution description

The deployment of any product is simplified when all relevant issues are considered and an action plan is completed prior to roll-out. It is important to invest time and effort to understand how Tivoli Continuous Data Protection for Files is going to be used and possible scenarios you can create that best fits your environment.

The purpose of this section is to describe the groundwork and documentation required for a successful deployment.

Solution overviewThe solution overview helps you to understand the solution concepts, business value and system architecture considerations. The following items need to be considered:

– Solution concepts and business value

– Solution architecture

– Recommended software, hardware and tools

Solution planning guideThe solution planning guide helps you to plan for the client engagement. The following items need to be considered:

Appendix A. Project planning 361

Page 388: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

– Skills required to implement the solution

– Spreadsheet of time estimates to plan for a services engagement

– Task descriptions

– Best practices

Implementation guideThe implementation guide is a technical guideline that helps you to set up the solution and learn all important techniques needed to implement a customized solution. The following items need to be considered:

– Implementation checklist

– Instructions, tips, installation best practices

– Customization information

– Use cases that can be used as part of a demonstration or education

– Sample code, data, script and configurations

The key to achieve a successful Tivoli Continuous Data Protection for Files deployment depends on the adherence to a common road map, tailored to the client needs.

You need to define the scope of the solution. The solution depends on, how many servers you want to protect and determining what will be your remote storage.Tivoli Continuous Data Protection for Files provides some facilities for remote deployment and report management, it is a real-time, continuous data protection solution for workstations and notebooks and is specially designed to work well even if the network connections are intermittent. Tivoli Continuous Data Protection for Files also provides continuous protection for file servers, reducing or eliminating backup windows and the amount of data potentially lost in a failure.

There are several options for Tivoli Continuous Data Protection for Files solutions that can be presented to the client:

� Replicate data to a file server and backup to Tivoli Storage Manager or IBM Tivoli Storage Manager Express (depending on the size of your environment)

� Replicate data directly to a Tivoli Storage Manager or IBM Tivoli Storage Manager Express (depending on the size of your environment)

� Use Tivoli Continuous Data Protection for Files to backup remote office locations to a centralized server

� If you are an ISP provider, you can offer Tivoli Continuous Data Protection for Files as a service to replicate the important data across the internet.

362 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 389: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

It is important to work with clients to understand their needs and expectations. Once you have gathered this data, document the tasks, deliverables and associated costs in a Statement of Work. The Statement of Work acts as your contractual agreement with the client for the duration of the project. A detailed and well-defined Statement of Work is advantageous both to you and to your client.

Implementors of a solution routinely rely on theirs skills and previous experience as a guide, but there are always some issues that might require some educated guesswork. You need to define the services engagement in your solution scope:

� Build an executive assessment

The Executive Assessment is a service that can be offered to prospective clients as a billable service.

This tool set helps you ask the right people the right questions; so that you get the information you need to propose the appropriate solution. The complete Executive Assessment process should take approximately 10 to 16 hours. See the tasks in Table 5-9

Table 5-9 Solution tasks

This is a business-case assessment, not a technical assessment, so the audience should be business owners, line-of-business, marketing and sales managers, and finally, the IT manager. The business owner or line-of-business executive is likely to be the decision maker.

� Set up a demonstration system of proof of technology

A demonstration system is typically set up in advance to show your clients the attributes of the solution. Tivoli Continuous Data Protection for Files is a very

Task Estimated time (hours)

An initial fact-finding meeting, asking questions and gathering data

3

A review and analysis of competing solutions

2

Preparation of a set of strategic recommendations

1

Create a demonstration prototype 3-9

A presentation of findings and close a contract

1

Total 10-16

Appendix A. Project planning 363

Page 390: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

simple tool to install and configure. You can do a simple demonstration to show how Tivoli Continuous Data Protection for Files will be used on the client’s environment. You can create an environment on a virtualized machine. See Table 5-10.

Table 5-10 Solution demonstration tasks

� Analyze the solution tasks

After the client has agreed to use the solution in their environment, you must determine the amount of effort necessary to implement it. These estimates would then be collected and written into a contract or Statement of Work.

The suggested tasks will be discuss on next section “Solution deployment tasks” on page 365. The overall solution timing might be influenced by the amount of skill and experience that you or your team have with the solution, and also the access to resources facilitated by your client. The estimated time of implementation is typically based on the following:

� Knowledge of the Operating Systems.

� Knowledge of network configuration.

� Knowledge of file server configuration.

� Knowledge of Tivoli Storage Manager configuration.

Depending on your skills and experience, the estimates presented might be too high or too low. Table 5-11 on page 365 illustrates one method of approximating more realistic time estimates for your efforts, based on whether you or your team are new to each skill area or could be considered experts. A novice represents someone who has completed training in the skill area but has no hands-on

Task Estimated time (hours)

Set up Hardware 1-2

Perform network configuration 1

Install and configure Operating System 2-4

Install and configure an e-mail application 1-2

Install and configure Tivoli Continuous Data Protection for Files (continuous and scheduled protection)

1-2

Demonstrated the functionality to the client

1-2

Total: 7-13

364 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 391: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

experience. An expert represents someone who has completed training in the skill area and has also implemented Tivoli Continuous Data Protection for Files. You might use the percentages to adjust your time estimate.

Table 5-11 Skill adjustment

� Create a statement of work

A Statement of Work is a binding contractual agreement between you and your client that defines the service engagement that you must perform and the result that the client can expect from the engagement. The contract should leave nothing in unclear terms.

A good overall understanding of the solution scope is a crucial prerequisite to successfully developing and implementing the solution. As a Solution Provider, you must understand what is involved in developing such a solution before you can discuss it with your client and size it for a cost estimate.

Solution deployment tasks

This section discusses the tasks necessary for solution deployment. It can be used to document the timing estimates for major deployment tasks. These tasks are broken down into sub-tasks in the later sections and discussed in more detail.

Table 5-12 Major solution deployment tasks

Skill Novice increase by Expert reduce by

Experience of operating system

25% 10%

Experience of network configuration

30% 10%

Experience of file server configuration

40% 15%

Experience of Tivoli Storage Manager configuration

35% 20%

Task

Perform environmental analysis and plan tasks

Appendix A. Project planning 365

Page 392: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Perform environmental analysis and plan tasksTo help gather these technical requirements, use the provided sample questions and make note of the issues that they raise, as demonstrated in Table 5-13.

Table 5-13 Technical requirement gathering sample examples

Plan the solution Planning the deployment of the Tivoli Continuous Data Protection for Files solution includes the subtasks listed below.

Plan the solution

Implement the solution

Test the solution

Customer training

Close the engagement

Question Notes

What versions of the Windows operating system are in your environment?

Check if all Windows versions that the client has are supported.

How many user desktops or mobile computers are deployed?

The number of desktops or mobile computers is important to verify how many licenses will be needed.

How many GB’s of data do you intend to replicate from each desktop?

Helps to estimated external storage resources needed.

Will the files be replicated to a File Server or directly to a Tivoli Storage Manager Server?

Estimate the time to configure Tivoli Continuous Data Protection for Files to a file server or to a Tivoli Storage Manager server.

How many versions of each file? Will help you determine the storage resources necessary

Do you need to support mobile users? Check the size of your WAN connection.

Do they need a granular security model? Helps determine what security options might be needed.

Task

366 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 393: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Table 5-14 Solution planning sub-tasks

� Gather detailed information about client requirements

At the beginning of your engagement meet with your clients to understand their proposed objectives and gather their requirements. First determine the functional requirements. Functional requirements define the business functions that the Tivoli Continuous Data Protection for Files solution is going to provide. You determine the requirements by developing a good understanding of the business needs and what you hope to achieve. It is important to gather these requirements early in the process, and discover any challenges that might lie ahead while they can still be dealt with easily. Once you have determined the functional requirements, you can clarify the technical and system requirements.

Obtaining the technical requirements involves spending time at the client site to determine and understand the client’s hardware and software installation and infrastructure. A complete high-level inventory of the environment is created.

� Analyze client requirements

In this stage information about client requirements are compiled and reviewed. Appropriate diagrams and charts are created in order to study how data copies will flow during replication and restores.

� Design the solution

After the environment has been inventoried and described in sufficient detail and all requirements have been agreed to and documented, the detailed design of

Task Estimated hours CDP, File Server and TSM

Estimated hoursCDP and TSM

Gather detailed information about client environment

8-16 8-16

Analyze client requirements

4-8 4-8

Design the solution 8-16 8-16

Develop implementation plan

4-8 4-8

Develop a test plan 4-8 4-8

Analyze client education needs

4-8 4-8

Perform GAP analysis 5-10 5-10

Appendix A. Project planning 367

Page 394: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

the backup/recovery solution can be completed. The appropriate hardware to support the requirements is also chosen along with the right type and number of Tivoli Continuous Data Protection for Files nodes. It is important to design the solution to support the most demanding component.

The solution design might require revisiting the requirements analysis phase due to unfavorable costs that arise trying to satisfy the clients initial recovery or data retention requirements. In such a situation the requirements could be lowered to balance requirements and costs.

� Develop implementation plan

Implementing a Tivoli Continuous Data Protection for Files infrastructure successfully requires a fair amount of coordination and collaboration. Project planning and project management skills might be required to implement a detailed solution with minimal impact on regular production operations. Plans for procuring the actual hardware, software, services and supplies are developed as early in the process as possible.

� Develop a test plan

A comprehensive test plan is developed to test the Tivoli Continuous Data Protection for Files implementation. The plan includes testing solution infrastructure (correct data-flow through network to a file server or a Tivoli Storage Manager server) configuration and data file retention.

� Analyze client education needs

The support staff must be well trained in the details of Tivoli Continuous Data Protection for Files administration. Customer education plans must be created.

� Perform GAP analysis

This task might involve performing a GAP analysis to give the client an estimate of the development effort required to set up the solution. As its core, the analysis seeks to determine what customizable components need to be extended, modified, or created. The number of complexity of customizable components drive the size of the project and the required resources.

Implement the solutionThe implementation of the solution is performed using the tasks described in Table 5-15.

Table 5-15 Solution implement sub-tasks

Task Estimated Time CDP, File Server and TSM

Estimated timeCDP and TSM

Hardware installation Depends on environment Depends on environment

368 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 395: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

� Hardware installation

Installation and configuration of hardware included in the solution is performed. This includes disk subsystems for file server, or a Tivoli Storage Manager server infrastructure, for example.

� Tivoli Storage Manager installation and configuration

The efforts to install and configure Tivoli Storage Manager in this task, depends if the client wants to replicate the files directly to Tivoli Storage Manager, or if just the file servers will be backed up. The estimated hours corresponds to a basic server installation and configuration.

� File Server

The efforts to configure a file server to replicate data and back it up to a Tivoli Storage Manager server.

� Tivoli Continuous Data Protection for Files installation

After the infrastructure has been implemented the project proceeds to the more delicate work of installation and configuration of the product. Where large numbers of similar systems are encountered, a standard client installation might be tested and replicated or pushed to all clients using application deployment software, such as Tivoli Configuration Manager, or Microsoft Systems Management Server (SMS).

Test the solutionThe tasks needed to test solution are listed in Table 5-16 on page 370.

Tivoli Storage Manager installation and configuration

10-20 12-24

File server configuration 8-12 N/A

Installation and configuration on Tivoli Continuous Data Protection for Files

8 - 10 (for 20 user workstations)

8 - 10 (for 20 user workstations)

Note: We do not provide details on installation for Microsoft SMS deployment. The clients who have SMS should refer to that product’s documentation for installation, configuration and use.

Task Estimated Time CDP, File Server and TSM

Estimated timeCDP and TSM

Appendix A. Project planning 369

Page 396: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Table 5-16 Solution test sub-tasks

� Perform replication/restore test plan

Solution infrastructure, Tivoli Continuous Data Protection for Files configuration and basic file replication and restore is tested and the results are noted for later documentation.

� Performance testing

Various performance tests are carried out (backup/restore) speed across network).

Client trainingThe tasks needed to perform client training are listed in Table 5-17.

Table 5-17 Solution client training sub-tasks

We recommend that key system administrators are trained in the use of Tivoli Continuous Data Protection for Files. During the implementation you can offer hands-on training to your client.

Close the engagementClosing the engagement is performed using tasks listed in the following table:

Table 5-18 Engagement closing sub-tasks

� Document the solution

Task Estimated Time CDP, File Server and TSM

Estimated timeCDP and TSM

Perform replication / restore test plan

4-8 2-4

Performance testing 2-4 2-4

Task Estimated Time CDP, File Server and TSM

Estimated timeCDP and TSM

Customer training 4-8 4-8

Task Estimated Time CDP, File Server and TSM

Estimated timeCDP and TSM

Document solution 16-20 16-20

Close the engagement 4-8 4-8

370 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 397: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

It is highly recommended to have your Tivoli Continuous Data Protection for Files environment documented with a list of all user desktops, application installation points and functionality flow charts.

� Close the engagement

A final verification is made to ensure the implemented solution matches the initial client requirements. Documentation is handed over to the appropriate parties.

When the technical work has been completed, and the education has been delivered, the engagement will need to be formally closed with the project sponsor. We suggest the following agenda items are covered during the meeting with the project sponsor:

1. Review of original business objectives

2. Summary of how solution meets defined objectives

3. Summary of services delivered

4. Summary of new capability

5. Other services or product identified during engagement

6. Thanks and closing

Strategies for successful implementation

Building and sustaining a storage management solution can challenge even the most successful organization. As mentioned earlier, have the right personnel on your deployment team, carefully plan out your deployment, and have commitment from the organization as a whole. In addition to these strategies, this section discusses other key considerations that can help you achieve a successful implementation of the Tivoli Continuous Data Protection for Files. Follow these strategies for a successful implementation:

Read the updated documentationIt is important to always check the online information about Tivoli Continuous Data Protection for Files because it is updated frequently. The README file that is shipped with the product contains the release notes and features included with the latest version.

Obtain commitmentExperts agree that a storage management initiative stands little chance of success unless upper level management takes ownership of the project. Project leaders can initiate the effort, but commitment from upper level management to get everyone behind it is an essential ingredient.

Appendix A. Project planning 371

Page 398: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Verify technology integration issuesThe infrastructure design and network will impact directly on Tivoli Continuous Data Protection for Files if you are sending replicated files to a remote storage, so all those aspects should be carefully examined and considered during your planning stage.

Clearly establish the scope of the projectEstablish the scope of any knowledge management project early, and try to be realistic in what you can achieve and in ensuring that it truly provides business value.

Educate the clientIt is widely accepted that a favorable corporate culture is a prerequisite for the successful implementation of knowledge management initiatives, so you have to focus not just on technology, but on culture and process as well. Sustainable knowledge management requires the introduction of a knowledge sharing culture organized around key skills, and a set of incentives to reuse knowledge to reinforce the skills required for the effective operation of the organization. You might not agree entirely with this point of view, but being aware of what is being written about knowledge management and considering how knowledge sharing and information reuse is currently practiced in your organization might reveal the type of culture you have to work with when you draw up your knowledge management program.

Involve, train, and inform your usersThe benefits of deploying a knowledge management solution are likely to be lost on most users in your organization because there is no immediate result you can point to.

Obtain the right hardwareYou will have a lot of problems if inadequate hardware resources have been allocated. System administrators should resist using second-hand hardware that does not meet the minimum system requirements.

Summary

For anyone who has deployed new technology into an enterprise, the concepts of careful planning and phasing a deployment through test and pilot environments will probably not be new. Much of the content of this chapter should therefore be a quick refresher.

372 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 399: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

However, when knowledge management technologies are involved, it is important to always consider the cultural and organizational impacts. Finding a clear and defined purpose for your deployment, and then ensuring that the organization truly understands the need to solve that problem, is crucial to ensuring the organizational commitment to any cultural changes required.

Appendix A. Project planning 373

Page 400: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

374 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 401: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Appendix B. Sample Statement of Work for Tivoli Continuous Data Protection for Files deployment

In this appendix, we provide a skeleton document that you can use to create your own customized Statement of Work. This is just a sample and should be customized based on the requirements of the client engagements.

B

© Copyright IBM Corp. 2007. All rights reserved. 375

Page 402: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Building a protected environment for user workstations

The content of the Statement of Work would include activities that provide:

� Continuous data protection

� Scheduled data protection

� Centralized reporting

The Statement of Work to protect user workstations should consist of the following sections.

Executive summaryThis service will build the infrastructure required to provide data protection for your computing environment. It will also supply working samples of key items that you will need to deploy a product solution.

After this work has been completed, you will have the infrastructure necessary to successfully protect your user workstations.

Solution descriptionBusinesses today cannot afford unprotected data. Losing key business information hampers productivity; creates application outages, delays projects, diverts resources and calls to the help desk, and harms businesses’ reputations with clients. And governments are increasingly requiring businesses to formally deploy data protection.

Often times the most valuable files are what users are working on right now. Being able to roll back to a specific point in time is necessary, rather than just going back to last night’s backup. Companies need sophisticated policy-based data management that enables them to focus on the data with the highest business value as well.

Although most companies have implemented solutions for protecting the enterprise data, data residing in workstations, notebooks and file servers is notoriously under-protected – even though it amounts to 60 to 70 percent of all corporate data, according to some industry experts.

Tivoli Continuous Data Protection for Files (Figure 5-95 on page 377) provides a real-time, continuous data protection solution for file servers and users-endpoints. Instead of waiting for a scheduled interval, Tivoli Continuous Data Protection for Files backs up your most important files the moment they are saved, in real time. What's more, it does this effortlessly and transparently, in some cases eliminating the backup window. You can specify as many as three target backup/replication areas for high-priority files to help you capture every

376 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 403: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

save of a file when it occurs to help protect against corruption, file loss or system loss.

Figure 5-95 Functionality overview of Tivoli Continuous Data Protection for Files

The client will be provided with a complete Tivoli Continuous Data Protection for Files solution- including integrated with a file server and Tivoli Storage Manager- to backup their user workstations. The provider guarantees the complete recoverability of the most critical files in case of hardware failure, user failure or hardware loss.

AssumptionsThese are the assumptions that is made in this Statement of Work.

� Tivoli Continuous Data Protection for Files will be installed in all desktops and notebooks

� One server will be configured to be used for central administration of Tivoli Continuous Data Protection for Files

� All desktops and notebooks will be able to access the central administration server with the proper authority

Appendix B. Sample Statement of Work for Tivoli Continuous Data Protection for Files deployment 377

Page 404: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

� Tivoli Continuous Data Protection for Files will be configured to protect the following files and directories:

– My Documents

– Favorites

– D:\PersonalFiles

– pst files

– office files

� A secure file server will be established as a remote target for data replication

� The storage area on the file server should be sized to properly contain the replicated data

� The file server will be backed up to a Tivoli Storage Manager server

� The Tivoli Storage Manager Server infrastructure will be configured prior to the Tivoli Continuous Data Protection for Files installation

� The sizing of Tivoli Storage Manager database and storage pool should be sufficient to contain the replicated data backed up from the file server

Business partner responsibilitiesThis service will be provided according to the high standards of <name of Business Partner>, an IBM Certified Business Partner.

We will provide:

� Skilled staff to undertake the defined activities

� Documentation of the completed solution

� Project management of these activities

Client responsibilities– Designate a representative who will be the focal point for all

communication with IBM or Business Partner relative to this project and who will have the authority to act on the client’s behalf in matters regarding this project.

– Designating operations personnel to work with IBM or Business Partner as appropriate.

– Provide all product data in a format as requested.

Note: Insert this section, only if you intend to work with a Business Partner. You are free to add additional responsibilities here that you will be taking on as part of this project.

378 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 405: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

– Provide all data and information required for implementation.

– Provide suitable workspace with internet and telephone access for the services specialists working on client premises.

– Provide user IDs, passwords, and IP addresses as required, enabling IBM or Business Partner to perform the service.

Staffing estimatesThe project will be performed with one Tivoli Continuous Data Protection for Files deployment specialist, who will be on site as required by the project schedule. We will also provide project management services, and will be onsite at the end of the project for its formal closure. The project is estimated to be performed within 5 working days (depending on the number of machines that you need to install).

We expect that will need a single member of your staff working with us throughout this time, who will also perform any mediation role required between us and any other required technical resources within your computer operation.

TestingThe testing of the solution will be done with your existing infrastructure to replicate the data to a file server or Tivoli Storage Manager Server.

Testing will be complete, when we have successfully:

� Replicate data to a file server or Tivoli Storage Manager

� Restored data from file server or Tivoli Storage Manager to the user workstation

� Generate reports

� Agree performance is acceptable

DeliverablesAt the end of this engagement, you will have:

� Documentation of the deployed environment

Completion criteriaCompletion criteria for this project are:

� The successful completion of all the tests

Note: Add any technical client responsibilities that you need to assign in order to complete a successful delivery of your service.

Appendix B. Sample Statement of Work for Tivoli Continuous Data Protection for Files deployment 379

Page 406: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

� The delivery of the solution documentation

380 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 407: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Abbreviations and Acronyms

IBM International Business Machines Corporation

IIS Internet Information Services

ISP Internet Service Provider

ITSO International Technical Support Organization

LAN local area network

NAS network attached storage

RC return code

ROI return on investment

RPO recovery point objective

RTO recovery time objective

SAN storage area network

SMS Systems Management Server

TCO total cost of ownership

TCP Transmission Control Protocol

UNC Universal Naming Convention

USB Universal Serial Bus

WAN wide area network

WebDAV Web-based Distributed Authoring and Versioning

WORM Write Once Read Many

© Copyright IBM Corp. 2007. All rights reserved.

381
Page 408: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

382 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 409: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Related publications

The publications listed in this section are considered particularly suitable for a more detailed discussion of the topics covered in this book.

Publications

These publications are also relevant as further information sources:

� Tivoli Continuous Data Protection for Files Version 3.1. Installation and User’s Guide, GC32-1783

� IBM Tivoli Storage Manager for Windows Administrator’s Guide V5.4, SC32-0121

� IBM Tivoli Storage Manager: Using the Application Program Interface, SC32-0147

� IBM Tivoli Storage Manager for Windows: Backup-Archive Clients Installation and User’s Guide, SC32-0146

Online resources

These Web sites are also relevant as further information sources:

� Tivoli Continuous Data Protection for Files online documentation:

http://publib.boulder.ibm.com/infocenter/tivihelp/v12r1/index.jsp?toc=/com.ibm.itcdpf.doc/toc.xml

� Tivoli Provisioning Manager Express online documentation

http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/index.jsp?toc=/com.ibm.itpmesd.doc/toc.xml

How to get IBM Redbooks

You can search for, view, or download IBM Redbooks, Redpapers, Technotes, draft publications and Additional materials, as well as order hardcopy IBM Redbooks, at this Web site:

© Copyright IBM Corp. 2007. All rights reserved. 383

Page 410: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

ibm.com/redbooks

Help from IBM

IBM Support and downloads

ibm.com/support

IBM Global Services

ibm.com/services

384 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 411: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Index

Aaction 21Advanced page 118AES128 encryption option 122ANS1025E 321ANS1115W 342ANS1126E 321, 325Apache 122API (application program interface) 153Applications box 53Audit 20automating manual process 18

Bbackdelete=yes parameter 328backup copy group 223Backup policy 198backup windows 17Backup-Archive client 60Backup-target flexibility 17bandwidth optimization 17basic file replication 370basic file restore 370build number 41–42business continuity 15

CCable service provider 141Central Administration 191central administration folder 101–102, 193

computer-specific sub-folders 103downloads folder 103group administrative sub-folders 102reports folder 103

Central Administration Folder field 102Central Administration Settings 210Central Administration Settings window 75, 217central management 122, 216Centralized reporting 197ChangeJournal 23ChangeJournal.log 23ChangeJournal.log_2_last file 23

© Copyright IBM Corp. 2007. All rights reserved.

ChangeJournal.log_LastSuccess 350changing drive letter assignments 298Checking port usage 275client requirements 367Close the engagement 370–371closeapps.txt 92command-line installation 68COMMMethod 311Completion criteria 379compliance data 183compress backups 130compressed_file.txt 98compressed_file.txt.cdp 98compression of remote backups 297compression option 207configurable pool size 13Conflicting include/exclude lists 339Continuous and scheduled protection 111continuous data protection 20, 126

default location 26Continuous protection level 161Critical page 49

DDaemon architecture 22data integrity 17default dsm.opt file 310Default protection settings 116deliverables 379direct attached USB drive 126disable sessions client command 329disaster-recovery data 183disk full 293Disk pools daisy chained 32Disk pools with backup to tape 32Disk pools with no backup 32disk storage pools 17document the solution 370DONT_LAUNCH_FILEPATHSRV=1 72dsierror.log 321, 342, 351DSL service provider 141dsm.opt 153, 184, 225, 340–341dsm.opt file 97

385

Page 412: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

dsm.opt options 312NODename 312TCPPort 312

DSM_RC_REJECT_ID_UNKNOWN 315DSM_RC_TL_EXCLUDED 341

Eeducation 368eliminate inactive versions of files 328E-mail application 27E-mail files 27E-mail Protection page 54, 117encryption file 239establish the scope 372example.txt 144exclude list 111excluding files 111exclusion list 21executive assessment 363Executive summary 376expire inventory command 328external disk 129external USB device 130

Ffile patterns 109file server 26–27File server issues 302file system full 293FilePathSrv.exe 20Files to Protect page 116file-server space 141firewall 70first scan 133folder patterns 109Folders and Files box 51fp.sys 20fpa.exe 20fpa.txt 21, 70, 75, 108, 195, 347fpcommands.xml 74–75, 195, 210FPdelta file name suffix 144fpPushInst.exe 69, 72functional requirements 367

Hheterogeneous backup devices 17hidden folders 109

hierarchical storage 31HTML listener 24HTTP Server V6.1 140

IIBM Passport Advantage 40IBM Passport Advantage Web site, 40IBM Tivoli Continuous Data Protection for Files.msi 69IBM Tivoli Provisioning Manager Express for Soft-ware Distribution 69IBM Tivoli Storage Manager Express 12implementation guide 362implementation plan 368Implementing the solution

file Server 369hardware installation 369Tivoli Continuous Data Protection for Files in-stallation 369Tivoli Storage Manager installation and configu-ration 369

Improved backup resource utilization 15improved productivity 16inactive 199include list 111inclusion list 21, 26increase data protection 183Initial Backup page 61Initial Configuration Wizard 48inst.log 67–68installation

silent 65Installation directory 20, 23InstallShield Wizard 46InstallShield Wizard Completed dialog 46interim files 138Internet connection 138Internet Explorer, Version 6.0 35Internet Service Providers (ISPs) 59ISP based storage repository 138ISP provider 140ISP-provided remote storage 141

KKeepSafe folder 114kernel layer 21

386 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 413: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Llist of excluded files 131local area network (LAN) 183local cache size 33local pool size 12locally attached USB drive 33long-term retention 31

Mmail 27Main components 20management class 223maximum number of versions 325Maximum space for backups 60, 161Meta rules 21Microsoft Corporation 34Microsoft Systems Management Server (SMS) 69, 369Microsoft Vista Business Edition 35Mirroring

Kernel-based I/O mirroring 21mobile computer 136–137Mozilla Firefox 1.5.0.7 35multiple storage locations 13multiple versions of files 17mutually exclusive 122

NNAS device 12native format 5netstat -a 275Network Attached Storage (NAS) 17network file server (NAS) 5network traffic 133networking skills 360newest backup copy 60node name defined with wrong permission 316NODename option 312Notes sub-file backup 202

Ooriginal business objectives 371

Ppasswords do not match 308pattern matches 110Perform GAP analysis 368

Perform replication 370performance testing 370policy domain 223policyset 223primarily mail files 13product identified during engagement 371project sponsor 371proof of concept scenarios 121proof of technology 363protected file 138providing real-time backups 15pull installation 72, 101

troubleshooting 286purge of older versioned files 323purge_failed.log 24, 324purge_struggled.log 24Push install

Microsoft Vista operating system 196Push Install Command 69push installation 196

troubleshooting 279

Qquery status 334query status command 329

Rrapid data recovery 14real-time data protection 14RealTimeBackup 125RealTimeBackup directory 126RealTimeBackup folder 26RealTimeBackup subfolder 77RealTimeBackupcomputername 59REBOOT=ReallySuppress 68recovery options 17recovery point objective (RPO) 15recovery time objective (RTO) 16Redbooks Web site 383

Contact us xxiiireduce network traffic 140reduced loss of data 16register node 185register node command 326Registry Editor 270remaining backup copies 150remote backup

option 26

Index 387

Page 414: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

remote backup target 122remote continuous 27remote storage location 59, 95Remote Storage page 56, 118remote target 24, 27remote WebDav server 26RemoteVersions.log 24Removable disk issues 292replicate to local disk 138replicated directory 134replication 21replication issues 291replication.log 24replication-active.N file 24replication-failed.N file 24replication-queued.N file 24reports table 107restore a previously saved version 26restore scenarios 228restore test plan 370return on investment (ROI) 15

SSample Statement of Work 375

assumptions 377business partner responsibilities 378client responsibilities 378completion criteria 379deliverables 379executive summary 376solution description 376staffing estimates 379testing 379

Schedule Backup Settings 208scheduled backups 13scheduled interval time 143scheduled protection 21, 209scope of the solution 362secure_backupvault 140Select Schedule Backup Settings 190ServerPool 24ServerPoolQuota 24several backup copy versions 150silent installation 65, 68simplified file sharing concept 59simplified management 14single user environment 123small foot print 14

solution description 361solution design 367solution overview 361solution planning guide 361space management 183SSL 141staffing estimates 379Start scheduled backup now check box 132Statement of Work 363–364Status page 63, 103storage area network (SAN) 17, 183storage pools 199Sub-file copy 144Summary page 62Sysprotect 23System requirements 34

Ttape storage pools 17target file server 31target location is not responding properly 331technical note 1245761 58technical requirements 367technology integration issues 372test plan 368Test the solution 369testing 379Tivoli Continuous Data Protection for Files 5, 17, 33–34, 40, 43, 59–60, 122, 131, 186, 196, 295, 308, 318–319, 339, 351, 360–361, 364, 371

advanced installation 64architecture and components 20available resources 360backup policy 198benefits 17capabilities 20Central Administration Settings window 102central management 122, 186, 216centralized reporting 197compression 122configuration 39connect to Tivoli Storage Manager server 184corporate scenario 32Daemon architecture 22

audit thread 23queue thread 22sysprotect 23

Default protection settings

388 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 415: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Advanced page 118E-mail Protection page 117Files to Protect page 116General page 116Remote Storage page 118

default protection settings 116demonstration 364deployment 19encryption feature 122general overview 5hints and tips 255home or small business scenario 145Home user scenario 33installation 39, 369

default language 40Destination Folder window 43fpPushInst.exe 69information window 41installation and data directories 108License Agreement window 42open command prompt window 46providing a configuration file 74pull installation 40pull installation (upgrade) 72Ready to Install the Program window 44reboot 47upgrade 72

installation requirements 34Basic installation 34hardware 34software 35supported operating systems 35System requirements 34

installing 40integration 17interactive installation 40interval selected 13

Daily 13Hourly 13Monthly 13Weekly 13

main components 20kernel 20user 20

main features 13Multiple computers 145

Home network with a file server 146product capabilities 20

Audit 20

MirroringKernel-based I/O mirroring 21

Replication 21Write Once Read Many (WORM) 20

product loaded on file server 33README file 371required skills 360restore scenarios 228Sales engagement

analyze client requirements 367available resources 360building an executive assessment 363client training 370closing the engagement 370create a statement of work 365develop a test plan 368develop an implementation plan 368documenting the solution 370implement the solution 368overall solution timing 364perform environmental analysis 366perform GAP analysis 368Performance testing 370plan the solution 366required skills 360setting up a demonstration system 363solution deployment tasks 365solution description 361solution tasks 363successful implementation 371

Sample Statement of Work 375server 312Single user environment 123

Single computer with external storage 126Single computer with ISP connection 136Single computer, local disk only 123

sizing considerations 30solution 360solution description 361support matrix 122Tivoli Storage Manager Express integration 160tracing 351

how to run 352troubleshooting 255unique differentiators 17using patterns 109valid node name 318value proposition 14

Tivoli Continuous Data Protection for Files V2.x 96

Index 389

Page 416: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

Tivoli Storage Manager 9, 12–13, 27, 30–31, 122, 316, 325, 333, 369, 379

API 184, 339API client 311, 339backup policy 224Backup-Archive client 60backups 27client 225client node 60client sessions disabled 329command line 224database 181, 329granting authority 60restore from 251server 14, 27, 339server administrator 339skills 360troubleshooting 310

Tivoli Storage Manager Express 5, 18, 33, 251integration 160restore from 251server 14service 157

Tivoli Storage Manager node 60total cost of ownership (TCO) 15traditional backup application 200traditional backup solutions 17traditional Tivoli Storage Manager environment 31training 370transient conditions 343transient networks 14traveling users 18TSM interval 27TSM thread 24

Uuncompressed 136unique differentiators 17Universal Naming Convention (UNC) 291, 303unwanted files 199update node command 326usage scenarios 122USB (Universal Serial Bus) 17USB disk 298USB external device 58USB stick 298user productivity 18

Vvalue proposition 14vault 218vault box 85vault duration 114vault folders 218Veritas NetBackup 9versioning 144virtualized machine 364VPN (virtual private network) 141

WWeb server 140Web-based Distributed Authoring and Versioning (WebDAV) 304, 343

what is it? 141WebDAV issues 304WebDAV over SSL 141WebDAV server 12, 58–59, 136, 308WebDAV server location 59Welcome page 48wide area network (WAN) 183wildcards 109Windows 2000 Advanced Server 35Windows 2000 Server 35Windows 2003 Server 35Windows Microsoft Vista Ultimate 123, 127Windows system event log 319Windows Vista Ultimate and Business Edition 35Windows XP Professional 35Write Once Read Many (WORM) 20write-protect data 17wrong node name 313wrong user name 306

390 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 417: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

(0.5” spine)0.475”<

->0.875”

250 <->

459 pages

Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Page 418: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg
Page 419: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg
Page 420: Deployment Guide Series: Tivoli Continuous Data Protection ...polnickr/cdp/sg247423.pdf · Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1 Vasfi Gucer Greg

®

SG24-7423-00 ISBN 0738489115

INTERNATIONAL TECHNICALSUPPORTORGANIZATION

BUILDING TECHNICALINFORMATION BASED ONPRACTICAL EXPERIENCE

IBM Redbooks are developed by the IBM International Technical Support Organization. Experts from IBM, Customers and Partners from around the world create timely technical information based on realistic scenarios. Specific recommendations are provided to help you implement IT solutions more effectively in your environment.

For more information:ibm.com/redbooks

Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Deployment best practices

Integration with the TSM and Notes

Case studies, troubleshooting and much more

Tivoli Continuous Data Protection for Files is specifically targeted at user computers, such as mobile computers and workstations, as well as file servers. It provides continuous data protection of files, providing the highest level of protection possible, yet is simple to use and administer.

This IBM Redbooks® publication presents a deployment guide for Tivoli Continuous Data Protection for Files Version 3.1. We cover planning, installing, and troubleshooting of Tivoli Continuous Data Protection for Files for several use case scenarios. In addition, we provide some case studies, including integration with IBM Tivoli Storage Manager, that can be used as a proof of concept or demonstration of the product at a client environment.

The target audience for this document is IT Specialists who will be working on Tivoli Continuous Data Protection for Files installations and proof of concepts.

Back cover