Professional Documents
Culture Documents
Avamar Admin 19.2 Participant Guide Li Note
Avamar Admin 19.2 Participant Guide Li Note
ADMINISTRATION
DOWNLOADABLE CONTENT
DOWNLOADABLE CONTENT
Internal Use - Confidential
Table of Contents
©
Internal Use - Confidential Copyright 2020 Dell Inc. Page iii
Inviting Avamar Clients to Activate - AUI and Avamar Administrator .................................. 99
Activating Clients - Windows and Linux ............................................................................ 100
Client ID and Activation Status ......................................................................................... 102
Activating Clients Using Avamar Client Manager ............................................................. 103
Account Management for Clients - AUI and Avamar Administrator .................................. 104
Disabling Client Backup ................................................................................................... 105
Account Management for Clients - Avamar Client Manager ............................................. 107
Using the MCCLI Command ............................................................................................ 108
Best Practices: Domains, Users, and Clients ................................................................... 110
Adding a Data Domain System Using AUI ....................................................................... 111
©
Internal Use - Confidential Copyright 2020 Dell Inc. Page v
Editing System Event Profile ............................................................................................ 283
Create a Custom Event Profile ......................................................................................... 285
Server Monitoring............................................................................................................. 294
System Management ....................................................................................................... 296
Avamar Server Status and Processes.............................................................................. 299
Email Home Notification ................................................................................................... 303
ConnectEMC ................................................................................................................... 304
Server Maintenance Activities Overview .......................................................................... 307
Scheduling Activities: Backup/Maintenance Window ........................................................ 309
Daily Maintenance: Garbage Collection ........................................................................... 313
Daily Maintenance: Checkpoints ...................................................................................... 314
Managing Checkpoints .................................................................................................... 316
Best Practices for Scheduling .......................................................................................... 317
Impact of Maintenance Activities and Backups ................................................................ 317
Impacts of Maintenance Activities on Data Domain.......................................................... 319
Avamar Server Capacity Definitions ................................................................................. 321
Avamar Server Lifecycle Management............................................................................. 323
Factors Affecting Capacity Utilization ............................................................................... 324
Understanding Checkpoint Overhead .............................................................................. 324
Factors Affecting Checkpoint Overhead ........................................................................... 325
Important Capacity Thresholds ........................................................................................ 326
When OS View Exceeds 85 Percent ................................................................................ 328
Capacity Warning Threshold ............................................................................................ 328
Capacity Read-Only Threshold ........................................................................................ 330
Managing Capacity Utilization .......................................................................................... 330
Checkpoint Utilization ...................................................................................................... 334
capacity.sh ....................................................................................................................... 335
DPN Summary Report ..................................................................................................... 337
Backup Statistics.............................................................................................................. 339
©
Internal Use - Confidential Copyright 2020 Dell Inc. Page vii
Avamar Overview
Avamar Overview
Avamar enables central administration through its remote access interfaces. The
following interfaces are used to administer an Avamar server:
Page
Internal Use - Confidential 8 © Copyright 2020 Dell Inc.
Avamar Overview
Avamar Desktop/Laptop
Avamar Desktop/Laptop1 enables the end users to restore their data without the
intervention of the backup administrator. The following are some of the features of
Avamar Desktop/Laptop:
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 9
Avamar Overview
Connection Limit
Click to enlarge
When Avamar is integrated with Data Domain system, Avamar can support up to
336 concurrent backup connections. Each connection can consist of multiple
streams, a maximum of 500 streams.
Page
Internal Use - Confidential 10 © Copyright 2020 Dell Inc.
Avamar Overview
• Notification4
• Reporting5
3 The Avamar data server stores, processes, and manages variable-sized chunks
that the client sends during a backup. Data server is also known as Global Storage
Area Network (GSAN).
4 Various kinds of notifications are created when specific events occur. Events can
be viewed using the Avamar Administrator Event Management and AUI. Events
can be configured as pop-up alerts to the GUI and notifications via email messages
to designated recipients. Examples of events include client activation, and
successful or failed backups.
5 Third-party tools and applications can be used to monitor and report on the syslog
files and SNMP traps that include Dell EMC Smarts and Dell EMC Data Protection
AdvisorSystem events. Actions initiated by users, such as user logins, are
maintained in an audit log for enforcement and accountability of security policies.
Avamar activities and events can also be accessed to run pre-configured and ad
hoc reports through read-only view of the Management Console Database.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 11
Avamar Overview
Avamar client6 software runs on each computer being backed up. Avamar client
software consists of two main processes apart from avscc7. They are:
• avagent
• avtar
6 Avamar clients are networked computers or workstations that access the Avamar
server over a network connection. You can organize and segregate clients by
using Avamar domains. Domains provide enhanced security by enabling you to
define administrative user accounts on a domain-by-domain basis. Before Avamar
can backup and restore data on a client you must add, or register, the client with
the Avamar server, and then activate the client.
Page
Internal Use - Confidential 12 © Copyright 2020 Dell Inc.
Avamar Overview
Avamar Server
Work order for backup
Backup data
Avamar Client
Data Domain
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 13
Avamar Overview
avagent
avtar
Storage node 0.1
Avamar Client
27000/29000
Storage node 0.0
Avamar Server
Page
Internal Use - Confidential 14 © Copyright 2020 Dell Inc.
Avamar Overview
The table below shows the details of some of the data ports used in communication
between Avamar clients and the Avamar server:
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 15
Avamar Overview
Page
Internal Use - Confidential 16 © Copyright 2020 Dell Inc.
Avamar Overview
Note: Please see the Avamar Product Security Guide for complete
data port usage and firewall requirements.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 17
Avamar Overview
Usage Environment
最好有DD
The following is the environment where the Data Domain usage is best suited:
Example:
- 4% daily change, 30 day retention
- 8% daily change, 45 day retention
Page
Internal Use - Confidential 18 © Copyright 2020 Dell Inc.
Avamar Overview
Backup Process
Avamar
Metadata
Client Backup
Data Domain
8Backup metadata is used to identify files and backup data that is stored on the
Data Domain system.
9Based on the metadata, the Avamar system manages the backup data. The
backup process uses Avamar-Data Domain deduplication methods, which can
provide faster backup and recovery, especially for large active databases.
10Data Domain integration can also provide flexibility, since the Data Domain
storage can be shared with other Avamar servers and/or other applications.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 19
Avamar Overview
DD Boost Process
Avamar clients use the Data Domain Bandwidth Optimized Open Storage (DD
Boost11) with Distributed Segment Processing to access a Data Domain system.
The DD Boost SDK is installed automatically on the client computer when you
install the Avamar client.
1. ID Segment 2. Unique?
DD Boost
3. Compress 4. Write
The following processes are included during a backup when integrated with Data
Domain:
ID Segments12
Uniqueness13
11DD Boost provides deduplication at the client so that only unique data is sent
across the network. The method is similar to how Avamar provides deduplication
except that the file cache is not used (with the exception of file system backups).
12When a backup request is made, DD Boost software on the client will divide the
data into variable size segments and determine a unique fingerprint ID for the
segment.
Page
Internal Use - Confidential 20 © Copyright 2020 Dell Inc.
Avamar Overview
Compress14
Write15
File cache not used16 (exception: file systems)
13 The client checks to see if the segment has already been stored.
14If it is a unique segment, the client will compress the data and send it to the Data
Domain.
16Note that for most backup types, the file cache on the client is not used. File
system backups, however, do use a file cache. This means that if a file has not
changed since the last backup, it does not need to be segmented, and its
segments do not need to be queried against the Data Domain.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 21
Avamar Overview
End users should never need to know or access data directly on the Data Domain
server, since all files and folders on Data Domain are managed by the Avamar
server.
Page
Internal Use - Confidential 22 © Copyright 2020 Dell Inc.
Avamar Overview
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 23
Avamar Overview
Maintenance Activities
18Data Domain may have a different maintenance schedule from Avamar. Though
the backups are deleted from Data Domain, the space is freed only after Data
Domain performs cleaning activities.
Page
Internal Use - Confidential 24 © Copyright 2020 Dell Inc.
Avamar Overview
ddrmaint Process
ddrmaint
Maintenance Commands
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 25
Avamar Overview
The following are the three different types of backup configurations when Data
Domain system is integrated with Avamar:
1挂多 多个avamar挂一个DD
19 The basic configuration consists of a single Data Domain system with a single
Avamar system backing up a number of Avamar clients. During the backup, the
Avamar sends a backup request to the Avamar client.If the backup request
includes the option to use a Data Domain system as the target, the Avamar client
sends the backup data directly to the Data Domain system. The backup data is not
staged on the Avamar before it is sent to the Data Domain.Metadata for the backup
is sent from the Avamar client to the Avamar server. This enables the Avamar to
manage the backup even though the data is stored on a Data Domain system.
Metadata is stored on the Avamar system, and the backup data is sent to and
stored on the Data Domain.
20This environment has an Avamar system with multiple Data Domain systems.To
segregate data, use multiple Data Domain systems with a single Avamar server.
This type of configuration provides a large amount of storage by using multiple
Data Domains. When using this type of configuration, be sure that the Avamar
server is sized properly so that it is able to store all metadata. Having multiple Data
Domains also increases the amount of simultaneous backups allowed.Although it is
possible to direct the backups from one client to two different Data Domain
systems, remember that the data from one system will not deduplicate against a
separate one. Therefore, deduplication rates may be lower. Also, backup clients
that use incremental backup strategies must store the incrementals on the same
Data Domain system as their associated full backups.
Page
Internal Use - Confidential 26 © Copyright 2020 Dell Inc.
Avamar Overview
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 27
Avamar Overview
Integrating Avamar with Data Domain provides a few additional features. These
include Instant Access, Checkpoint backups to Data Domain, Token-based
Authentication, REST API, and Cloud Tier.
1 2 3 4 5
1: Instant Access
When performing image level backups of virtual machines, a virtual machine may
be booted from the backup data without the must perform a restore. This feature of
Data Domain integration is known as Instant Access.
3: Token-Based Authentication
Page
Internal Use - Confidential 28 © Copyright 2020 Dell Inc.
Avamar Overview
Avamar can establish a connection to a Data Domain system using Data Domain
Boost Token-based Authentication22. This allows Avamar clients to connect
securely to the Data Domain system without going through login formalities.
4: REST API
• Quota management
• Data Domain physical capacity reporting
5: Cloud Tier
Avamar leverages the Data Domain Cloud Tiering Feature. The feature allows
older backups to be tiered to cloud-based storage. Some of the cloud tier features
include:
22In Token-based Authentication, each token is unique. The token exists only for
the duration of a backup. The clients do not store any of the credentials. Therefore,
the risk of breach into a system is greatly reduced. This feature is important for
multi-tenant BaaS environments.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 29
Avamar Overview
The table in the slide lists some of the ports used in communication between
Avamar clients, Avamar server, and integrated Data Domain system:
111 TCP/UDP Utility node Data Domain Access to RPC and NFS
System port mapper functionality
on Data Domain systems
Page
Internal Use - Confidential 30 © Copyright 2020 Dell Inc.
Avamar Overview
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 31
Avamar Overview
The Avamar agent running on the backup client (avtar) traverses each directory in
the backup. A set of tasks and comparisons determine if the data is present in the
Avamar server before backup.
1 2 3 4 5
1: The avtar process checks the client’s f_cache.dat file to see if the file was
backed up before. If the file was backed up, it is skipped from processing.
2: If there is no match in the f_cache.dat file, the data is processed. First, sticky-
byte factoring divides the data into variable-sized chunks.
• Chunks are hashed. The hash created from a data chunk is referred to as an
atomic hash. Atomic hashes are combined to create Composite hashes.
• Each atomic hash is compared to the entries in the client’s p_cache.dat file to
determine if it has been stored before. If a match is found composites are
created.
• If there is no match in the p_cache.dat file, the p_cache.dat file is updated, and
the hash is sent to the Avamar server with an is-present command.
Page
Internal Use - Confidential 32 © Copyright 2020 Dell Inc.
Avamar Overview
5: If there is no match on the Avamar server, the Avamar server stores the hash
and the data corresponding to the hash. The process repeats during every backup.
The local p_cache.dat file updates with the hashes for the atomic and composite
hashes.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 33
Avamar Overview
STICKY-BYTE
FACTORING
B. Due to change in data, the chunks are updated and synchronized with data from the
previous backup
STICKY-BYTE
FACTORING
With sticky-byte factoring, avtar divides raw data into chunks that vary in size 23.
The chunk sizes remain the same if the data is identical to the previous backup. If
there is a change in data, sticky-byte factoring:
数据切片的大小
23The chunks vary in size between 2KB and 64 KB. The size of data chunks
average to 24 KB.
Page
Internal Use - Confidential 34 © Copyright 2020 Dell Inc.
Avamar Overview
Sticky-byte
Factoring
Compression
24 The original source file can be compressed by more than 25% only based on a
list of compressible file types contained in the client software.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 35
Avamar Overview
avtar uses the following filtering process to filter out previously backed up files and
chunks.
Page
Internal Use - Confidential 36 © Copyright 2020 Dell Inc.
Avamar Overview
SHA-1 Hashing
Compressio
n
25 Hashes are unique data strings created through the hashing process.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 37
Avamar Overview
Cloud Tier
Avamar Cloud Tier Enables movement of Avamar Backups26 in Data Domain to the
cloud. Its important features are:
26Avamar Cloud Tier allows seamless and secure tiering of backups to the cloud.
From the AUI, configure cloud tier to move Avamar backups from Data Domain to
the cloud, as well as perform seamless recovery of these backups.
Page
Internal Use - Confidential 38 © Copyright 2020 Dell Inc.
Avamar Overview
Data Protection Advisor (DPA)27 eliminates the need for multiple reporting and
analysis tools to manage and monitor the backup environment. DPA provides:
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 39
Avamar Overview
• Improved monitoring28
• Single-window view of the infrastructure29
29DPA provides a single view of the entire infrastructure through data discovery,
analysis, and reporting that leverages key backup management functions. DPA
incorporates backup solutions, replication technologies, virtual environments,
tape/VTL storage, SAN and NAS systems, and the business applications protected
by the infrastructure.
Page
Internal Use - Confidential 40 © Copyright 2020 Dell Inc.
Avamar Overview
Search is a scalable, fault-tolerant virtual appliance used for indexing and search of
backup data.
2 1
1: Search
2: Indexing
Scheduled collection activities gather and index the metadata and the content of
backups. It is stored within the Search node or cluster. Search can:
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 41
Avamar Overview
Page
Internal Use - Confidential 42 © Copyright 2020 Dell Inc.
Avamar Overview
• Migration31
• Recovery32
30
ADMe is a software tool used for migrating Avamar backup data to other storage
mediums, such as tape drives, cloud, or USB drives.
31During migration, ADMe re-hydrates the backup data to a staging server before
the data is exported to a tape-based backup product.
32Migrated files can be retrieved from tape using native recovery tools of ADME. A
new GUI has been added to the software to simplify migration and recovery of
Avamar backups.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 43
Avamar Overview
File System storage has few advantages over databases. The advantages are
illustrated in the following table.
File Systems
Page
Internal Use - Confidential 44 © Copyright 2020 Dell Inc.
Avamar Overview
Avamar Client
(avtar)
Database Plug-
in
Database
Application
Avamar Client
Avamar Server
Avamar Database clients are specialized client software for backing up and
restoring databases33. The software allows the users to choose between different
configurations depending upon the placement and type of agents.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 45
Avamar Overview
There are several options for installing client agents when backing up databases.
The options are defined by the placement of agents and the types of agents
required.
Avamar Database Agent 'hot' Database Dump with 'hot' snapshot copy with
on Database Server Proxy Proxy
Page
Internal Use - Confidential 46 © Copyright 2020 Dell Inc.
AUI Overview
AUI Overview
Introduction to AUI
What is AUI?
Avamar Web User Interface (AUI) is a web management application that is used to
administer an Avamar server.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 47
AUI Overview
Page
Internal Use - Confidential 48 © Copyright 2020 Dell Inc.
AUI Overview
Once you log in to the AUI, you can see the navigation pane towards the left of the
screen. You can use the navigation pane to quickly browse through different panes
in the AUI. It provides links that open other panes to perform tasks in the AUI.
Similarly, you can collapse the navigation pane for a broader view of the dashboard
by clicking << option from the AUI as shown in the image.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 49
AUI Overview
The Asset Management35 page provides the ability to manage Avamar domains
and client-related operations such as create/edit/delete/refresh Avamar domains,
add/edit/delete/sync clients on the Avamar server, and perform backup and restore
of the clients.
34The dashboard view is available for the users who have ADMIN (root and
vCenter) and REPL_USER privileges. These user accounts and permissions can
be defined within the AUI.
35The Asset Management view is available for the users who have ADMIN,
ADMIN_CANNOT_RETIRE, BACKUP_ONLY_USER,
BACKUP_RESTORE_USER, BACKUP_ADMIN, BACKUP_RESTORE_ADMIN,
REPL_USER, RESTORE_ONLY_USER, RESTORE_ADMIN privileges.
Page
Internal Use - Confidential 50 © Copyright 2020 Dell Inc.
AUI Overview
1 7
8
10 11 12 13 14
6
4
3
5
2: The Capacity | Overview panel provides system capacity usage information for
the Avamar server and any Data Domain systems that have been added.
3: The Events | All panel displays the unacknowledged serious system errors and
warnings that have occurred, and certain defined system alerts.
4: The Client | Information panel displays Avamar client details, such as the plug-
in type, total client count, and total protected Gigabytes (GB).
5: The Activities | Replication panel indicates the current backup status of groups
that are configured with replication.
7: Displays the number of clients, activities, and policies that are created for a
specific domain.
8: The DOMAIN ACTIONS tab allows the user to edit, delete, and refresh any
domains.
9: The Client Summary tab displays the summary of the client that is created
under a specific domain.
10: The ADD CLIENT option allows the user to add a client for a specific domain.
11: The BACKUP option allows the user to run a backup for the client.
12: The RESTORE option allows the user to run a restore for a client.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 51
AUI Overview
13: The ADD POLICY option allows the user to add a policy to run a backup.
14: The MORE ACTIONS option allows the user to invite, edit, delete, sync clients
that are added to a domain.
The Policy pane allows you to add Backup, Advanced, Replication, and Cloud Tier
Policies.
The Administration pane allows you to add accounts to the system, and to create
and manage schedules, datasets, retention policies, and rules. This pane allows
you to deploy and manage Avamar proxies. Similarly, it allows you to configure
vCenter-to-Avamar authentication, register the Avamar Plug-in for vSphere Web
Client, and add a Data Domain system to Avamar.
Page
Internal Use - Confidential 52 © Copyright 2020 Dell Inc.
AUI Overview
The Monitor pane allows you to view the job activities, various events, and different
types of reports using FItness Analyzer tool.
AUI Dashboard
36 Only users with ADMIN privileges have access to the dashboard view.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 53
AUI Overview
Page
Internal Use - Confidential 54 © Copyright 2020 Dell Inc.
AUI Overview
The Capacity | Overview panel provides information about system capacity usage
for the Avamar server and Data Domain systems.
37 Integrated indicates how many clients are integrated into the server.
38Unprotected indicates that a scheduled backup policy has not been defined for
the client.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 55
AUI Overview
The Events | All panel displays any unacknowledged system errors and warnings
that have occurred, as well as system alerts39.
39The type of alerts that are displayed under the Events | All panel include HFS
check failures, Capacity warnings, and Capacity usage warnings. All the events are
categorized as Critical, Error, and Warning.
Page
Internal Use - Confidential 56 © Copyright 2020 Dell Inc.
AUI Overview
Note: All the events40 are displayed in the list with the name, date, and time that
they occurred.
The Activities | Backup panel indicates if the scheduled backups occur at the
correct time or if there is any problem that is preventing the backups from
occurring. Various color codes41 represent the status of the backups.
40To display all the critical events, click View More option in the AUI. The user
must explicitly acknowledge the events to clear these serious system errors and
warnings.
41The blue color indicates the backup jobs that have completed successfully. The
green color indicates scheduled backup jobs that are in-progress. The yellow color
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 57
AUI Overview
Note: To view errors and troubleshooting while performing any backup or restore
jobs, you need to navigate to the Event pane in the AUI.
The Activities | Replication panel indicates the replication status of groups that
are configured with replication42.
indicates the backup jobs that are scheduled but have not yet started. And finally,
the red color indicates the backup jobs that did not complete successfully or
completed with errors.
42All the replication jobs are configured from the AUI by selecting Replication
Policy in the navigation pane.
Page
Internal Use - Confidential 58 © Copyright 2020 Dell Inc.
AUI Overview
完成了
• Blue color: Indicates the replication jobs are completed successfully
正在做
• Green color: Indicates schedule replication jobs which are in progress
没有启动呢
• Yellow color: Indicates replication jobs that are scheduled but have not yet
started
错误
• Red color: Indicates replication jobs that did not complete successfully or
completed with errors
The Client | Information panel displays Avamar client information which includes
plug-in type, total client count, and total protected Gigabytes (GB).
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 59
Installing Avamar Backup Client Software
Avamar
Backup Clients
Administrator
43Avamar backup client software is installed and run on each client. Similarly,
specialized database client software plug-ins are installed for backing up and
restoring databases.
Page
Internal Use - Confidential 60 © Copyright 2020 Dell Inc.
Installing Avamar Backup Client Software
System
Requirements
Disk Space
Network Connectivity
• System Requirements44
• Client on the same network as Avamar server
• Must be able to ping Avamar server45
44System requirements include operating system, file system, memory, hard drive
space, network interface, and browser.
C:\> nslookup
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 61
Installing Avamar Backup Client Software
Page
Internal Use - Confidential 62 © Copyright 2020 Dell Inc.
Installing Avamar Backup Client Software
The following steps demonstrate how to install an Avamar Windows client software:
Step One
Open a web browser and navigate to the Avamar Web Restore by entering
https://<Avamar server hostname>/dtlt/home.html.
Once the page opens, click Downloads to access the Windows client software.
Step Two
Expand Windows (64-bit) and click the Windows client software to download the
.msi file.
Click the downloaded file and choose Run to start with the installation process.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 63
Installing Avamar Backup Client Software
Click to enlarge
Step Three
Once the installer begins, click Next and accept the license agreement. Then, click
Next.
Page
Internal Use - Confidential 64 © Copyright 2020 Dell Inc.
Installing Avamar Backup Client Software
Click to enlarge
Step Four
46This feature provides you the ability to run their own backups and restores. If this
feature is not desired, click the down arrow next to Avamar Client User Interface
and can make the entire feature unavailable.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 65
Installing Avamar Backup Client Software
Click to enlarge
Step Five
During the installation, you are asked to provide server information. This
information is used to activate the current client with an Avamar server. Activating
the client enables the client to perform backup and restore to that server.
You can either activate the client to a server at the time of installation or later. Click
Next and Install to start with the installation.
Page
Internal Use - Confidential 66 © Copyright 2020 Dell Inc.
Installing Avamar Backup Client Software
Click to enlarge
Step Six
You can see the progress of the installation. Once the installation is complete, click
Finish to close the installer prompt.
With the installation of client software on a Windows machine, you may notice three
plug-ins appear for the client in the AUI and Avamar Administrator.
These three plug-ins are all included in the Windows client installation and have
different purposes.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 67
Installing Avamar Backup Client Software
47 The Windows File System plug-in is used to perform backups and restores of file
system data. It allows backup and restore of individual files.
VSS插件:备份整个OS,或做BMR逻辑恢复
48 The Windows VSS plug-in is used to backup the entire system state and any
critical disks. This type of backup can be used for bare metal recoveries.
The Windows VSS plug-in also creates VSS snapshots to provide a consistent
point-in-time copy of the volume. You can select this plug-in to perform full system
backups.
VSS is used during backup to handle the backup of open files. You can select the
VSS plug-in when performing regular file system backups.
49The Windows Update plug-in is not used for backups or restores, but for “push”
upgrades from Client Manager. It allows an administrator to remotely update
Avamar client software on the client machine. You should not select this plug-in
when performing any backups.
Page
Internal Use - Confidential 68 © Copyright 2020 Dell Inc.
Installing Avamar Backup Client Software
The Avamar Client software can be installed on a large number of Windows or Mac
computers using a systems management tool50.
The systems management tools which are used to remotely push install the
Avamar client software include:
• Microsoft System Center Configuration Manager
• Quest Management Xtensions on Mac
• IBM Tivoli Management Framework
• HP OpenView ServiceCenter
• Symantec Altiris
• Apple Remote Desktop
50 A systems management tool can remotely push install the software to a large
number of computers in a short amount of time.A systems management tool can
often generate a list of the computers where the software is successfully installed.
You can use this list in Avamar Client Manager to register and activate computers.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 69
Installing Avamar Backup Client Software
You can launch the Avamar Windows Client interface in two ways:
Double-
If the Avamar client icon is not visible in the Windows System Tray, then you
can start up the avscc by searching for the Avamar client application in the
Windows Start menu.
51You can double-click the Avamar client icon in the windows system tray to view a
quick activity status.
52 You can right-click the Avamar client icon for client initiated backup/restores.
Similarly, you can click Back Up... option to open the Avamar Desktop/Laptop
interface.
Page
Internal Use - Confidential 70 © Copyright 2020 Dell Inc.
Installing Avamar Backup Client Software
While performing a Windows client installation, the Backup Agent, avagent, and
avscc are started automatically.
The Task Manager can be used to verify that the processes are running.
Task Manager:
avagent.exe
avscc.exe
Services:
Backup Agent
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 71
Installing Avamar Backup Client Software
On an Avamar Windows client, the Avamar binaries, utilities, and log files are
located in C:\Program Files\avs by default.
On an Avamar LINUX client, the Avamar files are located in root folder (/) by
default.
Windows
Linux
Page
Internal Use - Confidential 72 © Copyright 2020 Dell Inc.
Account Management
Account Management
Avamar Domains
Avamar Client Domains are distinct zones that are used to organize and separate
backup clients for administrative purposes. The server provides enhanced security
by enabling you to define administrative user accounts on a domain-by-domain
basis.
Nesting domains within domains allows you to create a hierarchy for managing
organizations and clients within the organizations.
Root
domain
Sub-domain
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 73
Account Management
The following are some of the default and special domains that are used in
Avamar:
53The REPLICATE domain contains replicated data from other Avamar servers.
This domain is created once the server receives replication data.
54The MC_RETIRED domain holds clients that have been retired which means
they are no longer being backed up.
55The clients domain is a regular domain that comes preconfigured on the Avamar
server. It can be used for the backup clients.
56The MC_SYSTEM domain holds the Avamar server. Since replication uses client
software that is installed on the Avamar server, the Avamar server itself must
appear in the tree. This domain serves as a container for this client.
Page
Internal Use - Confidential 74 © Copyright 2020 Dell Inc.
Account Management
Important: Of the domains listed here, only the /clients domain can
be deleted.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 75
Account Management
Avamar Users
The privileges assigned to a user determine the tasks that the user can perform in
AUI. Also, the privileges determine the ability of the user to initiate backups and
restores.
Page
Internal Use - Confidential 76 © Copyright 2020 Dell Inc.
Account Management
There are three categories of user roles which have its own roles:
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 77
Account Management
The level at which a user account is added to the Avamar system and the role that
is assigned to the user determine the access and privileges that are assigned to
that user.
Root
Users57
Admin Administrator
Avamar server
Domain
Users58
Administrator
Avamar Domain Admin
57Root users are created at the root domain, represented by the Avamar server in
the domain tree.
Root users can perform tasks for all domains in the hierarchy and the clients within
the domains.
Page
Internal Use - Confidential 78 © Copyright 2020 Dell Inc.
Account Management
Client
Users59
Backup/Restore User
Avamar provides several preconfigured user accounts at the root domain level
which include:
58Domain Users are created at the Avamar domain level. Users at the domain level
can perform tasks for that domain, the clients assigned to the domain, and any
domain or client beneath the domain in the domain hierarchy.
59Client Users are created for an individual Avamar client. The tasks a client user
can perform are limited to that specific client.
60 MCUser is used to administer the Avamar server at the root domain level.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 79
Account Management
AUI View
Avamar Authentication
64 Administrator role
Page
Internal Use - Confidential 80 © Copyright 2020 Dell Inc.
Account Management
Type One
66In the example shown in the image, a user is logged in with the ClientUser
account into the /clients/DekstopClient domain. Because the user is a domain
administrator, ClientUser has access to the /clients/DesktopClient domain and any
sub-domains that are created under /clients/DesktopClient. This role gives the user
with administrative, backup, and restore privileges for these domains and clients
within the domains.
However, because the user is not a root domain administrator, ClientUser only has
access to /clients/DesktopClient and its sub-domains.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 81
Account Management
Type Two
Click to enlarge
Page
Internal Use - Confidential 82 © Copyright 2020 Dell Inc.
Account Management
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 83
Account Management
You can expand the tree to view sub-domains and clients that are assigned to the
domain.
Hierarchical domain
"tree structure"
AUI View
Page
Internal Use - Confidential 84 © Copyright 2020 Dell Inc.
Account Management
Avamar allows you to perform various account management tasks using the AUI.
Add a domain
Add a user
69 The user must be logged into the root domain with the Administrator privilege.
70 The user must be logged into a domain with the Administrator privilege.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 85
Account Management
71 The user must be logged into a domain with the Administrator privilege.
72 The user must be logged into a domain with the Administrator privilege.
Page
Internal Use - Confidential 86 © Copyright 2020 Dell Inc.
Account Management
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 87
Account Management
OR
Page
Internal Use - Confidential 88 © Copyright 2020 Dell Inc.
Account Management
When you delete a domain, all clients that are associated with the specific domain
are deleted.
If you use directory service authentication, Avamar removes the LDAP maps that
use that domain for access.
OR
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 89
Account Management
Page
Internal Use - Confidential 90 © Copyright 2020 Dell Inc.
Account Management
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 91
Account Management
Page
Internal Use - Confidential 92 © Copyright 2020 Dell Inc.
Account Management
An Avamar server must be configured first to authenticate with the directory service
in order to use a directory service authentication.
The following are some of the important notes about directory service
authentication:
• Can be configured from the Administration interface in Avamar Administrator
• Not available in Avamar Web User Interface (AUI)
• Edits the necessary LDAP and kerberos configuration files to allow
authentication
• NIS authentication is also supported
Click to enlarge
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 93
Account Management
Click to enlarge
The following steps allow you to create an LDAP group and add a user:
1. Open the Active Directory Users and Computers application
2. Select Users
Page
Internal Use - Confidential 94 © Copyright 2020 Dell Inc.
Account Management
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 95
Account Management
Click to enlarge
Page
Internal Use - Confidential 96 © Copyright 2020 Dell Inc.
Account Management
An Avamar client must be registered74 and activated with Avamar server before
performing any backup or restore of the data.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 97
Account Management
Server-side registration76
Client Manager78
75 With Client-side registration and activation, the registration is initiated from the
client which may have already been done during the client software installation
process. If not, register after installing the client software.In Windows, the installer
can initiate registration by right-clicking the Avamar client (avscc) tray icon and
choosing Manage > Activate Client.In Linux and UNIX, you may run the avregister
command that is located in the Avamar software bin directory. Both of these
methods also activate the client simultaneously.
76Server-side registration of an Avamar client can be done using AUI and Avamar
Administrator. In this way, you can add the client to an Avamar system in the
desired domain.
77Batch client registration is used to define multiple clients using a single client
definition file. The file is then imported to the Avamar server to register them.
Page
Internal Use - Confidential 98 © Copyright 2020 Dell Inc.
Account Management
• AUI79
• Avamar Administrator80
79
To activate a client using AUI, select the client under a domain and click MORE
ACTIONS > Invite Client.
80To activate a client using Avamar Administrator, after the client is added to a
domain, select the client and choose Actions > Account Management > Invite
Client.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 99
Account Management
Windows
In Windows, once the client software is installed, you can activate the client by
right-clicking the Avamar client (avscc) tray icon and choosing Manage >
Activate.
In Linux and Unix, the client registration process using the avregister command
also activates the client.
Page
Internal Use - Confidential 100 © Copyright 2020 Dell Inc.
Account Management
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 101
Account Management
During the activation process, the Avamar server passes the client ID (CID) to the
client. The client ID is stored in an encrypted file on the client file system.
The details of the client can be viewed in the VIEW MORE option after selecting
the client.
In order to activate a client another Avamar server using AUI, you need to navigate
to Asset Management and select the client under a domain. Then, you need to
select MORE OPTIONS and click Edit Client. You need to uncheck the Activated
box. Then, you can activate the client with the other Avamar server either from the
client machine or from AUI when logged into the other Avamar server.
Page
Internal Use - Confidential 102 © Copyright 2020 Dell Inc.
Account Management
Avamar Client Manager provides a centralized facility for activating clients with an
Avamar server.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 103
Account Management
Administrators can perform additional tasks with clients from the AUI or Avamar
Administrator Administration interface.
Edit Client82 Move Client83 Retire Client84 Delete Client85 Invite Client86
82 The Edit Client option can be used to change the client name and optional
descriptive information. It also allows the administrator to enable, activate, and
initiate any client backups.
84 Retiring a client is less destructive than deleting a client. Retired clients do not
participate in regular backups, however, previous backups are still maintained and
files can be restored using a directed restore. All the retired clients are moved to
the MC_RETIRED domain.
If the client has been replicated to another Avamar server, you may optionally
change the retention times of the replicated backups as well.
85 The Delete Client option permanently deletes all backups that are stored that are
for the client. If there is any chance that you want to restore data from this client,
retire the client instead.
Page
Internal Use - Confidential 104 © Copyright 2020 Dell Inc.
Account Management
You can disable a client backup from the AUI and Avamar Administrator. When a
client is disabled, it cannot use the Avamar server to backup any files.
Result: Disabled client has false value under the Enabled column.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 105
Account Management
Note: Disabled clients have an X placed next to their icon when the client is
displayed in the tree.
Page
Internal Use - Confidential 106 © Copyright 2020 Dell Inc.
Account Management
All additional tasks that are performed on a client in the AUI and Avamar
Administrator can also be performed from an Avamar Client Manager87.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 107
Account Management
The MCCLI is installed on the Avamar server utility node during server installation
and can be run from a command line89 on the utility node.
88Most of the tasks that can be performed in an AUI or Avamar Administrator can
also be performed from the command line with MCCLI.
89 The user must have a valid Avamar Administrator credential in order to connect
to an Avamar server using the MCCLI.
Page
Internal Use - Confidential 108 © Copyright 2020 Dell Inc.
Account Management
MCCLI
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 109
Account Management
Following are some of the best practices to keep in mind when planning for the
Avamar domains, users, and clients in an Avamar environment.
Minimize the number of domains for easy Use only /clients domain if Manage users and
management additional domains are not needed password
Page
Internal Use - Confidential 110 © Copyright 2020 Dell Inc.
Account Management
You can integrate a Data Domain using Avamar Web User Interface (AUI).
The following steps demonstrate how to attach a Data Domain with Avamar using
AUI.
Step One
Step Two
Step Three
Under the System tab, enter the Data Domain system name and DD Boost
credentials, and, then, click VALIDATE.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 111
Account Management
Step Four
Under the SNMP tab, enter the SNMP Community String and click NEXT.
Keep the default setting under Tiering tab and click FINISH to attach the Data
Domain.
Page
Internal Use - Confidential 112 © Copyright 2020 Dell Inc.
Using Client Manager
• Activate
• Move
• Upgrade
• Retire
• Delete
• Change Group Associations
The login page authenticates the username and the password with administrator
accounts that are registered on the Avamar server. Avamar Client Manager only
allows access for accounts with administrator privileges on the Avamar server that
is running the Avamar Client Manager process.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 113
Using Client Manager
The Avamar Client Manager software runs on the Avamar utility node. Users can
register multiple Avamar servers with a single instance of Client Manager so they
all appear in one interface. This makes managing multiple systems easier, and also
enables features such as migrating clients from one Avamar server to another.
From the Server Summary screen, click Add Server and provide the Avamar
servers hostname or IP, then enter the MCUser account password to add the new
server.
Page
Internal Use - Confidential 114 © Copyright 2020 Dell Inc.
Using Client Manager
1:
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 115
Using Client Manager
Client Filtering
The Client Manager uses multiple filters. Different types of clients can be selected
from the panel on left in the interface. Further filtering can be applied from the
Filters bar at the top of the window.
2
3
1: With Registered Clients the filters available are Operating System (OS), Client
Status, and Client Name.
Under the Client Status, you can filter by Activation failure or Pending
response.
The Client Name drop-down allows you to put in the name of the client the Client
Manager examines.
In the Registered Clients section, you can perform the following client-related
tasks:
Page
Internal Use - Confidential 116 © Copyright 2020 Dell Inc.
Using Client Manager
2: Selecting Failed Clients from the left panel shows the clients that have had
failures. The clients can be further filtered by selecting a date range of when those
failures occurred.
The Period and Activity filter specifies the period that Client Manager examines.
The Failure Criteria defines the threshold that is used by the Client Manager.
In the Failed Clients section you can perform the following tasks:
• Delete a client
• Manage a client's group associates
• View and edit a client's details
• Add and remove group override settings
3: Selecting Idle Clients, from the left panel show clients that do not have any
backups. These clients can be further filtered by selecting a date range of when
those clients. Idle Clients, uses the Period filter to specify the period that the
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 117
Using Client Manager
Client Manager examines for activity, and the Activity Type filter uses the specific
type of activity to filter.
In the Idle Clients section, you can perform the following tasks:
• Delete a client
• Manage a client's group associations
• View and edit a client's details
• Add and remove group override settings
The Client Manager provides tools for managing clients within Avamar. These tools
can move clients to a new server, move clients to a new domain, delete or retire
clients, activate clients, and modify groups.
3 4 5 6 7
1
1: The Clients section will open up the menu for Add Clients, Registered Clients,
Activated Clients, Failed Clients, Idle Clients, and Upgrade Clients.
Page
Internal Use - Confidential 118 © Copyright 2020 Dell Inc.
Using Client Manager
2: Activated Clients panel gives the ability to move clients between Avamar
servers or domains, retire, delete clients, modify groups, and edit client details.
3: Users can change the Avamar client and an Avamar server. By moving the client
to a different Avamar domain or a new one.
Select a client, and then in the Actions bar, click Move. The Client Move dialog
appears as shown here.
In the Domain Section pane select a target domain and click Next. Then select a
new group or create another new group. Click Finish.
4: Avamar Client manager can also retire a client whose backups are no longer
needed.
The Retire menu allows you to select more than one client and the retention policy
setting allows the selection to apply to all selected clients.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 119
Using Client Manager
Option Description
Retire client and retain backups with The Avamar server retains the backups for
existing expiration date the existing retention period
Retire client and retain all backups The Avamar server retains the backups
indefinitely until you manually delete them
Retire client and reset backup The Avamar server retains the backups
expiration date until the date set in New Expiration Date
5: To remove the backups of a client from an Avamar server, delete the client from
the server. When the Avamar Client Manager deletes a client, it stops all activities
with that client, delete the client's backups, and removes all records of the client
from the server's database.
Page
Internal Use - Confidential 120 © Copyright 2020 Dell Inc.
Using Client Manager
6: Group Association shows the policies applied to that client as well as view or
add groups that include the client.
In the Dataset, Schedule, and Retention columns, select any of the blue links for
more details.
7: View/Edit Details show more details about the client and is similar to the Edit
Client window in the Policy interface of Avamar Administrator. Here you may
disable backups of the client, temporarily deactivate the client, and edit end-user
permissions for Desktop/Laptop.
The Summary tab shows information about the client, also a list of users who are
associated with the client.
The Backups tab shows the backup history associated with On-Demand,
Scheduled, and From and To filters.
The Plug-ins tab shows the Avamar plug-ins that are installed on the client.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 121
Using Client Manager
Step One
With the Avamar Client Manager, administrators can move the clients registration,
activation, and backups to a new Avamar server.
From the left-side menu, click Clients and select Activated Clients.
Page
Internal Use - Confidential 122 © Copyright 2020 Dell Inc.
Using Client Manager
Step Two
Select a client under the Client pane. Do not select an NDMP client or a client that
has backups on a Data Domain server.
Step Three
From the Actions bar, click Move. The Domain Selection pane of the Client
Move dialog box appears.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 123
Using Client Manager
Step Four
From the top of the Domain Selection pane, the server selection drop-down list,
select the Avamar server that is the target of the move and click Next.
Step Five
In the Group Selection pane, select the target domain. You can optionally select
more than one target group.
Page
Internal Use - Confidential 124 © Copyright 2020 Dell Inc.
Using Client Manager
In the Replicate Existing Backups at the bottom of the Group Selection Pane,
select a value. Then click Finish.
Optionally, in the Delete From Source can be checked to remove all the clients
backups from the source server. Then click Finish.
Step Six
In the Source Server, type the password for the repluser account on the source
server.
In the Target Server, type the password for the repluser account on the target
server
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 125
Using Client Manager
Click OK.
The Avamar Client Manager moves the client to the selected target.
Page
Internal Use - Confidential 126 © Copyright 2020 Dell Inc.
Using Client Manager
This list91 must be available on the machine running the Client Manager web
browser.
90 The client list file is a plain text, comma-separated value (CSV) file containing up
to two values for each client.
91This list can be manually created, or you can create it by using the output of a
systems management tool such as the Microsoft System Center Configuration
Manager or the Microsoft Systems Management Server.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 127
Using Client Manager
Avamar Client Manager can be used to activate Avamar for desktops and laptops
and for other systems, such as enterprise servers. Before activating the clients with
Client Manager, install the Avamar Client software on the client machine.
Step One
To activate a client from the Avamar Client Manager, click Add Clients from the
Clients section in left panel.
Step Two
Click New Clients. You can enter directory service authentication information, or
browse for a .CSV file containing a client list.
The Client Information source opens, enter the username and password, and
click OK.
Page
Internal Use - Confidential 128 © Copyright 2020 Dell Inc.
Using Client Manager
Step Three
In the Summary window, a list of all clients in the LDAP domain appears. Select a
client for activation and click Activate.
Step Four
In the Server-Domain Selection, select a domain. You can also create a new
domain by clicking the Create Domain button.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 129
Using Client Manager
Step Five
From the Server - Group Selection, choose a backup group. You can also create
a new domain or a new group. However, you can only select the datasets,
schedules, and retention policies that have been previously created. Click Finish to
activate.
Page
Internal Use - Confidential 130 © Copyright 2020 Dell Inc.
Using Client Manager
Step Six
Step Seven
If the client is not available during the activation request, the activation job is
queued and retried every two hours for the next two days.
Queued jobs can be viewed and optionally canceled from the Queues section from
the left panel.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 131
Using Client Manager
Page
Internal Use - Confidential 132 © Copyright 2020 Dell Inc.
Avamar Backups
Avamar Backups
Scheduled Backups
Scheduled92 On-Demand93
93 On-Demand Backups are the types of client backups that are initiated instantly.
On-Demand Backups can be initiated from the AUI, Avamar Administrator, and the
Management Console Command Line interface (MCCLI).
On-demand backups can also be run from a client machine using the Avamar
Client, Avamar Desktop Laptop interface, and with the avtar command from the
command line.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 133
Avamar Backups
Scheduled Backups
Backup Policy
Avamar uses backup policies for automating backups and enforcing consistent
rules across a collection of clients.
94Datasets define the persistent backup selections for the file systems, directories,
or files that are in a backup. You can also narrow the scope by specifying certain
content, such as file types, to exclude or include.
Datasets can be created at any domain level and can be assigned to one or more
policies and clients within the assigned domain.
Page
Internal Use - Confidential 134 © Copyright 2020 Dell Inc.
Avamar Backups
95The Schedule for a group determines when and how often a backup will
automatically run.
Schedules can be created at any domain level and can be assigned to one or more
policies within the assigned domain.
96Retention Policies specify how long each backup is retained. Any backups older
than the specified retention are automatically dropped from the system.
Retention policies can be created at any domain level and can be assigned to one
or more policies and clients within the assigned domain.
Note that the retention policies can still be reused even if the client is deleted or
retired.
97 Avamar client is a device from which files can be backed up or a device to which
files can be restored. Typically this is a laptop, desktop, server, or a virtual
machine.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 135
Avamar Backups
Creating a Dataset
A single dataset definition can use more than one plug-in type. When backing up,
Avamar uses the appropriate plug-in type based on the client definition98.
Step One
Step Two
98 Usually, you have to use the default dataset to back up all local file systems for
all clients. However, there may be instances where you must create a dataset to
define specific persistent requirements.
Page
Internal Use - Confidential 136 © Copyright 2020 Dell Inc.
Avamar Backups
Step Three
In the Create Dataset page, enter the following information, and click SUBMIT.
• Dataset Name99
• Plugins100
• Options101
100 Select the types of plugins that need to be part of the backup policy.
101Selecting a plug-in enables the options available for the specific plug-in. A single
dataset can include options selections for more than one plug-in type.
Options can be selected from the items presented in the AUI or entered as
attribute/value text. For example, you can enter a label for the backup by supplying
a value for the Backup label attribute in the AUI.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 137
Avamar Backups
• Source Data102
• Inclusions103
• Exclusions104
There are other options like backup storage on the Data Domain system as well.
Checking Show Advanced Options expands the list of options displayed to include
options that may be of interest to those troubleshooting or fine-tuning the system.
For example, if you are troubleshooting a problem with a specific backup, you may
want to enable debugging messages for a period of time.
102On the Source Data tab, identify the data backed up by this dataset
specification. You can choose to either select all data for all local file systems or to
enter explicit file systems, directories, or files per plug-in type.
If entering explicit items, the default all local file systems entry for that plug-in type
is removed.
Similarly, clients create a backup for every plug-in installed on the client, if those
plugins have been specified in the same dataset.
103The Inclusions tab specify the items that you want to include in the backup. Be
sure that the correct plug-in is selected from the list.
104 The Exclusions tab specify items to exclude from the backup dataset specified
in Source Data. Be sure to select the correct plug-in.Also, the exclusions only apply
to the plug-in selected when adding them to the list.
Page
Internal Use - Confidential 138 © Copyright 2020 Dell Inc.
Avamar Backups
The following list specifies some of the best practices while using a dataset:
- Input different retentions for different subsets of data. Do not configure more
than one dataset per
- Input different subsets of data to be backed up
client
on different days of the week.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 139
Avamar Backups
About Schedules
Schedules that are created at the root domain level can be assigned to any backup
policy throughout the hierarchy.
The following preconfigured schedules are defined at the root domain level in
Avamar:
106Default Replication Schedule is used for replication jobs. It is set to run daily at
11 PM.
107 The Default Schedule is assigned to the Default Group. It is initially configured
to run once a day with the earliest start time of 10 P.M. US Pacific time for a
maximum of 8 hours.
Page
Internal Use - Confidential 140 © Copyright 2020 Dell Inc.
Avamar Backups
110
Notification Schedule controls when custom event profile email notification
messages are sent.
111
Override Daily Schedule is used to define the available start times for Avamar
Desktop Laptop clients that have overridden their normal schedule.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 141
Avamar Backups
Recurrence Types
The recurrence types in Avamar schedules are of various types, including Daily,
Weekly, Monthly, and On-Demand112.
Daily
If Daily schedule is selected, the policies associated with the schedule run on a
daily basis.113
Weekly
If Weekly is selected, the policies associated with the schedule run on a weekly
basis114.
112On-demand schedules will never run. Theses schedules are typically assigned
to backup policies that run on-demand.
113If the Daily recurrence type is selected, then the backup jobs are repeated every
day at one or more times of the day.
With daily schedules, you must also limit the duration of the activity to prevent job
overlap.
Page
Internal Use - Confidential 142 © Copyright 2020 Dell Inc.
Avamar Backups
Monthly
If Monthly is selected, the policies associated with the schedule run on a monthly
basis115.
114
If the Weekly recurrence type is selected, then the backup job is repeated every
week on one or more days of the week.
With weekly schedules, you must also define the earliest start time for the activity,
as well as the time at which the activity is stopped, even if it is still in progress.
115If the Monthly recurrence type is selected, the backup jobs repeat on a specific
calendar date or on a designated day of the week each month, such as the first
Sunday of every month.
With monthly schedules, you must also define the earliest start time for the activity,
as well as the time at which the activity is stopped, even if it is still in progress.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 143
Avamar Backups
On-Demand
The On-Demand schedules will never run. Schedules of this type are typically
assigned to policies that are only run on-demand.
The times displayed when editing or creating a schedule, and the times displayed
in the AUI and Avamar Administrator interfaces, are in the local time zone.
117
The time that is displayed in most client log files is the local time of the client.
However, there are some client log files that are time/date-stamped in GMT.
Page
Internal Use - Confidential 144 © Copyright 2020 Dell Inc.
Avamar Backups
AUI or
Avamar Avamar Avamar
Server Client Administrator
Interface
Operational Windows
Avamar divides each day into two operational windows during which various
system activities are performed.
Backup118 Maintenance119
118The Backup window defines the period of time the Avamar server reserves for
performing regular, scheduled backups. During the Backup window, the Avamar
server does not run any server maintenance activities.
By default, the Backup window is configured to start at 8 P.M. and end at 8 A.M.
You need to configure all backup schedules used to run backups to start, run, and
complete during the period of time that is defined by the Backup window. Also,
avoid creating any schedules that extend into the Maintenance window, as backups
that are running cause garbage collection performance to drop.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 145
Avamar Backups
120 However, the customization should be done cautiously, as any changes made
to the windows have the potential to negatively impact server maintenance
activities.
Page
Internal Use - Confidential 146 © Copyright 2020 Dell Inc.
Avamar Backups
Allowing Overtime
122After the first successful backup for the client, the Overtime attribute is changed
automatically to No overtime allowed.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 147
Avamar Backups
Define a Schedule
Step One
123 If you are running a full initial client backup where the time to complete the
backup could potentially exceed the schedule duration period, set the Overtime
attribute to Overtime on next backup only. This allows the backup to run beyond
the duration period.
124 When overtime is allowed, the duration settings on a schedule are ignored,
allowing scheduled backups to run as long as necessary to complete.
Page
Internal Use - Confidential 148 © Copyright 2020 Dell Inc.
Avamar Backups
Step Two
Step Three
Under the Basic Configuration tab, enter the following information, and click
NEXT.
• Schedule Name
• Backup Window
• Retention Type
Step Four
Under the Recurrence Pattern tab, provide the recurrence pattern for the schedule
based on the recurrence type selected, and click NEXT.
Note: The information entry varies based on the recurrence type selection.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 149
Avamar Backups
Step Five
Under the Activities Constraint tab, provide the schedule start and end time, and
click NEXT.
Step Six
Review the summary of the schedule configuration under the Summary tab, and
click FINISH.
Note: The information entry varies based on the recurrence type selection.
Page
Internal Use - Confidential 150 © Copyright 2020 Dell Inc.
Avamar Backups
The following list specifies some of the best practices while using a schedule:
125If a backup is scheduled to begin from 2:00 AM to 2:59 AM during the spring
transition, or from 1:00 AM to 1:59 AM during the autumn transition, the backup
does not begin.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 151
Avamar Backups
About Retention
Retention Policies specify how long the backup is retained. Any backups older than
the specified retention are automatically dropped126 from the system.
Retention policies can be created at any domain level and can be assigned to one
or more groups and clients within the respective domain/sub-domain.
The following preconfigured retention policies are defined at the root domain level
in Avamar:
126 The actual deletion of backup data from the system depends on several factors,
including whether the data is referenced by another backup that has not yet expired
and the garbage collection cycle.
128End User On Demand Retention is a special policy that controls how long on-
demand backups that are initiated by the client are kept in the system. This policy
only applies to server-class operating systems that use the Back Up Now menu
option. It does not apply to on-demand backups initiated from DTLT.
129Minimal Retention is a special retention policy that controls the minimal retention
feature. When enabled, this retention enforces a minimum level of retention across
an entire site. By default, this retention type is disabled.
Page
Internal Use - Confidential 152 © Copyright 2020 Dell Inc.
Avamar Backups
Step One
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 153
Avamar Backups
Step Two
Step Three
In the Add Retention Policy page, enter the following information, and click SAVE.
• Retention Name
• Retention Period (if selected)
• End Date Period (optional)
• No end date (optional)
Note: If you check Override basic retention policy for scheduled backups
option, then you need to enter customized retention period.
Page
Internal Use - Confidential 154 © Copyright 2020 Dell Inc.
Avamar Backups
The following list specifies some of the best practices when planning for a retention
policy:
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 155
Avamar Backups
Within the root domain, Avamar includes two preconfigured backup policies:
Default Group132 and Default Proxy Group133.
132The Default Group automatically includes all new clients, if no other groups
have been configured.
The Default Group always uses the system default dataset, schedule, and retention
policy. This cannot be changed; however, the specifications of the default dataset,
schedule, and retention can be changed.
133The Default Proxy Group is also a preconfigured backup policy and is used to
support VMware Image Proxy clients.
The RUN option in the AUI initiates a backup job on demand. By default, this group
is disabled.
Page
Internal Use - Confidential 156 © Copyright 2020 Dell Inc.
Avamar Backups
Step One
Step Two
Select a domain where you need to create a backup policy, and click +ADD.
Step Three
Under the Properties tab, enter a name for the backup policy, and mark check for
the Enabled option, and click NEXT.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 157
Avamar Backups
Step Four
Under the Members tab, include a client that needs to be backed up, and click
NEXT.
Step Five
Under the Dataset tab, select a dataset based on the backup requirement, and
click NEXT.
Note: You can include Windows VSS and Windows SQL if needed.
Page
Internal Use - Confidential 158 © Copyright 2020 Dell Inc.
Avamar Backups
Step Six
Under the Schedules tab, select a specific schedule based on the schedule
requirement, and click NEXT.
Step Seven
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 159
Avamar Backups
Step Eight
Under the Summary tab, you can review the summary information of the backup
policy and click FINISH to create a backup policy.
Note: Avamar provides you an option to Override Dataset in the summary page.
Once the backup policy is created, the backup job is initiated automatically based
on the schedule that is associated with the backup policy.
Page
Internal Use - Confidential 160 © Copyright 2020 Dell Inc.
Avamar Backups
The following list specifies some of the best practices when planning for a backup
policy:
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 161
Avamar Backups
On-Demand Backups
On-demand backups by definition are run manually at the time the backup request
is initiated. The on-demand backup can be initiated from different interfaces.
On-Demand Backup
Avamar Desktop/Laptop
The following steps show how to initiate an on-demand backup of a client using
AUI:
1. Log in to the AUI, and go to Asset Management pane.
2. Select the client that is registered to a domain.
3. Click BACKUP to initiate an on-demand backup.
Page
Internal Use - Confidential 162 © Copyright 2020 Dell Inc.
Avamar Backups
The following steps shows how to initiate an on-demand backup of a backup policy:
1. Log in to the AUI, and navigate to Backup Policy pane.
2. Select the backup policy, and click RUN to initiate an on-demand backup of a
policy.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 163
Avamar Backups
On-demand backups can also be initiated by the end user from an Avamar
Windows client using the Avamar Client (avscc), Avamar Desktop Laptop interface,
or with the avtar command.
Avamar Client
The following steps show how to initiate an on-demand backup of a client using an
Avamar client:
1. Right-click Avamar client icon from the system tray
2. Click Back Up Now
134All the client plug-ins must be installed, registered, and activated to the Avamar
server before initiating a backup.
135 This option works even if Avamar Desktop Laptop is not installed.
To perform this operation, the client initiated backups option must be enabled in the
client.
Page
Internal Use - Confidential 164 © Copyright 2020 Dell Inc.
Avamar Backups
With the Avamar Desktop Laptop interface, the end-user is limited to performing
on-demand backups of the dataset assigned to the client’s policy136 only.
The following steps shows how to initiate an on-demand backup of a policy using
an Avamar Desktop Laptop:
1. Right-click Avamar client icon from the system tray
2. Click Back Up...
3. Under Backup tab in Avamar Desktop Laptop, select a policy, and click Back
Up Now.
136If the client is assigned to multiple policies, then the end-user can choose which
group policy to be backed up.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 165
Avamar Backups
avtar
avtar137 is the Avamar executable that runs on the client and is used to backup and
restore files.
The following list shows the location in different clients where the command can be
executed:
• Server utility node: /usr/local/avamar/bin
• LINUX/UNIX clients: /usr/local/avamar/bin
• Windows clients: C:\Program Files\avs\bin
137The avtar command can be run from a command line on the client to perform a
backup.
Page
Internal Use - Confidential 166 © Copyright 2020 Dell Inc.
Avamar Backups
Avamar allows you to initiate an on-demand backup of a client and a backup policy
using Avamar Administrator Backup and Restore or Policy interfaces.
Avamar allows you to initiate an on-demand backup from the Backup and Restore
view in an Avamar Administrator.
The More Options138 is used to specify plug-in options with the backup.
138Options that are displayed are similar to those displayed when configuring a
dataset specification. Most often you want to set the retention period for each on-
demand backup, a name for the backup, and, if running the backup for
troubleshooting purposes, then run with statistics and diagnostics.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 167
Avamar Backups
OR
Page
Internal Use - Confidential 168 © Copyright 2020 Dell Inc.
Avamar Backups
139You need to select a client and then click Back Up. Then, select a specific
backup policy with a dataset that needs to be initiated.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 169
Avamar Backups
Example 1: Run mccli command to back up a directory (Abackup) for a specific client
During a backup, the Avamar server sends a backup request to the Avamar client.
If the backup request includes the option to use a Data Domain system as the
target, then the Avamar client sends140 the backup data directly to the Data Domain
system.
As a result, backup data is stored on the Data Domain while tracking metadata is
stored on the Avamar server.
140 The backup data is not staged on the Avamar server before it is sent to the Data
Domain system. Metadata for the backup is sent from the Avamar client to the
Avamar server. This enables Avamar to manage the backup even though the data
is stored on a Data Domain system.
Page
Internal Use - Confidential 170 © Copyright 2020 Dell Inc.
Avamar Backups
Avamar
Backup Request
Metadata
avagent
DD Boost
Data Domain
Client
Deduplicated Data
Since an Avamar checkpoint is effectively a copy of all Avamar data, this provides
disaster recovery.
141If a disaster were to occur and the Avamar server is destroyed, the checkpoint
data can be restored.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 171
Avamar Backups
Page
Internal Use - Confidential 172 © Copyright 2020 Dell Inc.
Avamar Backups
Avamar Desktop/Laptop
Management
142
142
In a corporate environment, you can install Avamar Desktop/Laptop on
Windows and Macintosh desktop and laptop computers by using systems
management tools such as Microsoft Systems Management Server 2003 (SMS).
You can also install the Avamar Desktop/Laptop software locally by launching an
installation wizard.
After client installation, you can activate, upgrade, analyze, and manage clients by
using the Avamar Client Manager web browser UI.
143
Avamar Client Manager users authenticate through the Active Directory or
OpenLDAP-compliant directory service, with or without Kerberos encryption.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 173
Avamar Backups
Pass-through authentication enables users to access the web UI without using the
login screen. A secure message mechanism authenticates users that are based on
information from the client computer. It also enables administrators to allow non-
domain users to restore files to their local account on the computer.
144 Avamar Desktop/Laptop functionality is available through the client local user
interface (client UI) and web browser user interface (web UI).
With the client UI, an Avamar icon appears in the notification area, or system tray,
or on Windows computers or on the menu bar on Mac computers.
You can right-click the icon on Windows or click the icon on Mac to open the client
menu, which provides access to backup and restore, program settings, and logs.
145
Users can start an on-demand backup with a single click on the client menu, or
open the web UI for an interactive on-demand backup.
Users can also perform scheduled backups of all the Avamar Desktop/Laptop
clients.
146 Users can search for or browse to folders, files, and file versions to either the
original location or to a new location on the same computer.
Users can restore data with the same name or a new name.
147
The History page in the web UI provides a 14-day history of the status of restore
and backup tasks for a client computer. Also, it provides the listing of the folders
and files that are backed up during that period.
Page
Internal Use - Confidential 174 © Copyright 2020 Dell Inc.
Avamar Backups
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 175
Avamar Backups
The following are the important points to keep in mind while deploying an Avamar
client software:
• Windows and Macintosh clients only148
• Optionally Client User Interface must be installed
• Can be selected for interactive installation
− Deploying thousands of clients is time consuming
• Command-line installation149
− System management tools can use the command line for mass deployment
3. Pass-through Authentication
148 The recommended method to install the Avamar client software on large
numbers of Windows or Mac computers is to use a systems management tool. A
systems management tool can remotely push install the software on large numbers
of computers in a short amount of time. Avamar 19.2 supports some Linux clients
as well, including DTLT on RHEL, SUSE, Ubuntu, CentOS and Debian
149For Windows, the msiexec command is used to install the Avamar client
package. The Avamar-specific option UICOMPONENT=1 is used to install the
optional Client User Interface.
Page
Internal Use - Confidential 176 © Copyright 2020 Dell Inc.
Avamar Backups
• Users can backup and restore files without viewing the login screen
4. LDAP Authentication
The following are some of the important notes about LDAP Authentication:
• Do not use the root account on a Mac to restore files from backups
5. Avamar Authentication
The following are some of the important notes about Avamar Authentication:
• Works with users who authenticate at the Avamar root level, domain levels,
or sub-domain levels
• First checks at the sub-domain level followed by other levels till username is
found
• Client computers must have a static, resolvable, fully qualified domain name
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 177
Avamar Backups
6. Mixed Authentication
The following are some of the important notes about Mixed Authentication:
In Avamar DTLT, you need to define the backup policies before performing a
backup.
151Define the time at which the backup is initiated. Backups should be scheduled to
run during the day when end users are connected to the network.
152 Defines how long the backups are available for restore.
Page
Internal Use - Confidential 178 © Copyright 2020 Dell Inc.
Avamar Backups
The following points have to be kept in mind while creating a DTLT dataset:
• Back up only user files and folders
• Exclude common data: apps, OS files, and non-business files
Exclusions • *\Recent\*.lnk
• *\catalog.wci
• *\windows.edb
• *.avi, *.mp3, *.wmv, etc.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 179
Avamar Backups
Exclusions • */.Trash/
• */Library/Caches/
• */Library/Cookies/
• */Library/Logs/
• */Library/PubSub/Feeds/
• */Library/Application
• Support/SyncServices/Local/
The following are some of the important points about the DTLT backup schedule:
• Avamar Desktop/Laptop backup should run during the day
• Maintenance Window moved to overnight
• Avoid backup during maintenance window
Page
Internal Use - Confidential 180 © Copyright 2020 Dell Inc.
Avamar Backups
The following points needs to be performed while enabling end-user changes to the
scheduled start time:
• Add times to Override Daily Schedule 154
• Enable Allow override group daily schedule in Edit Client dialog
• Client uses Daily schedule policy
154 The Avamar administrator can allow end-users to override the scheduled time.
This is done by modifying the schedule policy named “Override Daily Schedule” in
order to provide a list of acceptable backup start times that the end-user may
choose from. It is recommended to remove anytime from this schedule that would
interfere with the maintenance window.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 181
Avamar Backups
The following table describes the methods for starting a client backup:
156
Users can start an on-demand backup on an Avamar Desktop/Laptop client
computer by a single-click on the Back Up Now button on the client menu.
157Interactive backups allow users to select a backup group that is associated with
the client and back up the client by using the group's settings.
When on-demand backup sets are enabled, interactive backups also allow users to
choose instead to back up only selected files and folders.
Page
Internal Use - Confidential 182 © Copyright 2020 Dell Inc.
Avamar Backups
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 183
Avamar Backups
The following are some of the useful information about Avamar DTLT web
interface:
• Avamar Desktop/Laptop software must be installed on applicable clients158
• Interface available in 14 languages
− Automatically appears in the locale of the OS, if supported
− End-user can switch to any of the supported locales
• Interface can be re-branded by replacing the logo graphic
• Launched via “system tray” icon by clicking Back Up
Avamar Desktop/Laptop users can use the web UI to either browse to or search for
folders, files, and file versions to restore.
158The Client User Interface optional component should be selected during the
installation of the Avamar client software on the client machine.
Page
Internal Use - Confidential 184 © Copyright 2020 Dell Inc.
Avamar Backups
159 From the left-side menu of the web UI, you need to select Browse to view the
backups for a client computer in a tree view that you can browse to find folders and
files to restore.
To browse a specific backup instead of all backups for the client, use Backup Date
and Time to select the date and time of the backup.
160From the left-side menu in the web UI, you need to select Search to search for
specific folders and files to restore.
To start a search, type a search string in the search field, and click Search. Results
appear as they are gathered, and a progress indicator provides information about
the length of the search.
161 The backups for a client computer contain more than one version of many of the
files that are backed up. When a file is backed up and then subsequently edited,
the next backup contains a new version of the file. Each version is kept for the
retention period set by the administrator.
The number of versions of a file in the client backups depends on many factors
such as length of time that backed up data is retained, frequency of backups, and
how often the file is edited.
When there are multiple versions of a file in the backups for a client, a version icon
appears next to the file name when you browse or search for data to restore. To
select a version of the file other than the most recent version, click the version icon
and then select the version. Then choose whether to overwrite the existing file on
the client computer or to restore the file version with a new name.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 185
Avamar Backups
The following are some of the best practices that needs to be kept in mind while
using an Avamar Desktop/Laptop Client interface:
Page
Internal Use - Confidential 186 © Copyright 2020 Dell Inc.
Avamar Backups
Monitoring Activity
Avamar provides several ways to monitor backup, restore, replication, and tiering
activities162 to report on backup status, and to manage backups.
1621) In progress
2) Completed
3) Failed
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 187
Avamar Backups
• Filter activities by
domain164
• Filter activities by
status165
163By default, the Activity tab displays the most recent 5,000 client activities. To
select a different duration, in the Filter activities by duration drop-down list, select
the last 24 hours or Last 72 hours.
164 By default, the Activity tab displays all activities regardless of domain. To display
only the activities for a specific domain, in the Filter activities by domain drop-down
list, select a domain or sub-domain.
165 By default, the Activity tab displays all activities regardless of status.
Page
Internal Use - Confidential 188 © Copyright 2020 Dell Inc.
Avamar Backups
Managing Backups
Avamar allows you to manage backups from the AUI and Avamar Administrator.
You can list the backups run for a particular client by selecting the client registered
to a domain under the Asset Management tab and clicking VIEW MORE.
166Avamar allows you to find a completed backup by searching for a backup that
occurred on a specific calendar date or during a specific date range, or by
searching for a backup with a specific retention type.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 189
Avamar Backups
167 Avamar allows you to restore a regular or replicated backup to the original client
or to a different client based on the requirement.
168Avamar allows you to recall the backup directly to the client from a cloud unit if
the tier status of the backup is CLOUD.
169Avamar allows you to delete a backup. This will permanently delete all data from
the backup that is stored in the server.
170The expiration date can be a specific date that you select or a retention period
of a certain number of days, weeks, months, or years.
Avamar allows you to configure a backup to remain in backup storage for as long
as the client remains active on the Avamar server.
171
To support certain advanced features, the administrator automatically assigns
one or more retention types to every backup.
For example, the first backup that is created on an Avamar system is tagged as
daily, weekly, monthly, or yearly. You can manually change the retention types
assigned to a backup.
Page
Internal Use - Confidential 190 © Copyright 2020 Dell Inc.
Avamar Backups
AUI
Avamar
Administrator
Administrators can control user access to the client on-demand backup process
and determine other client-initiated settings through client configuration options.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 191
Avamar Backups
Avamar agents are platform-specific software processes running on the client that
communicates with the Avamar server and with any plug-ins installed on that client.
172When this attribute is enabled, any authorized users can initiate client-initiated
on-demand backups of this client.
173 When this attribute is enabled, users can select specific folders and files for
client-initiated on-demand backups.
174When this attribute is enabled, the client uses a new retention policy and not the
backup policy retention policy for the client-initiated on-demand backups.
Page
Internal Use - Confidential 192 © Copyright 2020 Dell Inc.
Avamar Backups
The following list provides some information about the client settings:
• Two types of plug-in: File system and Database
• Avamar sends the following while communicating with a client
− Client ID
− Specific Agent Version
− Build running on the client
− List of plug-ins (version and build) currently installed on the client
• Operations can be controlled for all clients on an agent or plug-in basis
• Functions are accessed from Tools > Manage Agents and Plug-ins
• Global Client Settings
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 193
Avamar Backups
Partial Backup
- Partial backups do not reduce subsequent scans as the file cache is not updated for canceled backups
- No need to disable the backup deletion process for long, multi-day replications
Avamar supports data shredding to help facilitate the secure deletion of data from
an Avamar server when classified data is accidentally backed up to a non-classified
server. The secure backup deletion feature is a seven-pass overwrite process
executed via securedelete CLI command.
The following are some of the important points about data shredding:
• Level of granularity at client backup level
• Deletes only a single client backup at a time
Page
Internal Use - Confidential 194 © Copyright 2020 Dell Inc.
Avamar Backups
175After running securedelete on a client backup, it is possible the data may remain
on the Avamar server, since the same files that consist of that backup may also
reside in multiple checkpoints.
176If backups that contain the data to be deleted have also been replicated to other
Avamar servers, then the same actions need to be repeated on the replication
targets.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 195
Performing Restores
Performing Restores
Avamar Restores
The first step to restore data is to find the backup with the data you must restore.
To locate backups by a date when one or more of the following situations apply.
In the AUI navigation pane click the on the left double arrows >>, and click Asset
Management. In the Asset Management pane select the domain for the client.
Select the client in the list, in the Client Summary pane on the right, click VIEW
MORE.
Page
Internal Use - Confidential 196 © Copyright 2020 Dell Inc.
Performing Restores
From the list select the client and click on SEARCH. Click in the Date Range field
to open the calendar view. Select the date range needed for the restore, and click
RETRIEVE.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 197
Performing Restores
In the Destination Client pane, select Restore to original client, and click NEXT.
In the Backup Content pane, select the location for the restore. (In this case its the
whole C:) and click NEXT.
Page
Internal Use - Confidential 198 © Copyright 2020 Dell Inc.
Performing Restores
From the More Option pane (Optional) select the filters as needed for the restore.
Refer to the users guide for each plug-in for more details of these options. Then
click NEXT.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 199
Performing Restores
The Summary page will display. Review the information, and click FINISH.
MCCLI Restores
The Avamar administrator can use the mccli interface at a command line to
perform restores of backups to Avamar clients. The mccli backup show
command includes options to show backups with a specified retention type and
display the contents of a backup.
Page
Internal Use - Confidential 200 © Copyright 2020 Dell Inc.
Performing Restores
To restore a backup, select the backup to restore from the list and run the mccli
backup restore command.
avtar Restores
The avtar command can be run from a command line on the client to perform a
restore.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 201
Performing Restores
Use the avtar to list all backups with a label. In this example we used the label
"Kimbkup".
Page
Internal Use - Confidential 202 © Copyright 2020 Dell Inc.
Performing Restores
Avamar Desktop/Laptop allows the end users to perform restores of their data
independently. Users can search for items to restore, or they can browse a backup
directory tree to display and select files and folders to restore.
1: The Backup button allows users to pick a file or folder for a backup. If the user
has multiple machines, a drop-down menu is available to select which machine to
be used for the source of the backup data.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 203
Performing Restores
2: The History button allows the users to view the past history of this backup.
3: Users can use the Search or Browse buttons to show a list of files and folders.
From the list the users can choose the file or folder to restore.
Page
Internal Use - Confidential 204 © Copyright 2020 Dell Inc.
Performing Restores
From the list the users can choose the file or folder to restore.
To access the Activity Monitor, open the navigation pane, and then click Activity.
The Activity Monitor appears with a list of all activities.
1 2
4
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 205
Performing Restores
2: Filter activities by duration: By default, the Activity Monitor displays the most
recent 5,000 client activities. To select a different duration, in the Filter activities
by duration drop-down list, select Last 24 hours or Last 72 hours.
To display only activities with a specific status, at the top of the Activity Monitor,
select one of the following options:
• Completed
• Failed
• Running
• Waiting
4: To filter activities by client, start time, plug-in, or type, click in their respective
column.
The Activity Monitor displays the date and time that an activity began, and the
total number of bytes examined during an activity.
Page
Internal Use - Confidential 206 © Copyright 2020 Dell Inc.
Performing Restores
When the restore of the backup177 is initiated, the Avamar server uses the stored
metadata from the backup178 to locate the data on the Data Domain. Then, data is
restored179 back to the appropriate client.
177 During a backup, the Avamar server sends a backup request to the Avamar
client. If the backup request includes the option to use a Data Domain system as
the target backup, then the data is stored on the Data Domain system and
metadata is stored on the Avamar server.
178
All data for a backup is stored under a single dedicated MTree on a single Data
Domain system.
179The recovery process is transparent to the administrator. Since the backup and
restore processes use both the Avamar and the Data Domain, if either is
unavailable, backups and restores are not possible.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 207
Performing Restores
Avamar
Metadata
Request
avagent
Restore Data
DD Boost
Data Domain
Page
Internal Use - Confidential 208 © Copyright 2020 Dell Inc.
Performing Restores
Search
Search180 processes content from multiple input sources for Avamar servers in
Data Protection Suite. It supports the following types of indexing:
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 209
Performing Restores
The Advance Options pane allows the administrator more ability to narrow down
the restore. Also this allows for more details log and use of scripts for a backup.
181Metadata only indexing is a lightweight search for the name, location, size, and
date for files.
182Full content index expands on metadata only index by drilling in to the body of
the files to index the content.
Page
Internal Use - Confidential 210 © Copyright 2020 Dell Inc.
Performing Restores
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 211
Performing Restores
1
2
3
4
5
6
7
8
9
1: Check client-side caches and reports inconsistencies does not restore data,
only performs validation check of client-side cache with the Avamar server.
2: Check and repair client-side caches does not restore data, only performs
client cache validation checks with Avamar server and repairs the inconsistencies.
3: Rebuild client-side caches from the most recent backup does not restore data.
This uses contents of last backup to re-create client-side file cache.
4: Do not descend into subfolder restores only the specific folder and no
subfolders.
5: Re-create original path beneath target folder, re-creates the original path to
the files and folders beneath the specified target.
6: Restore hidden folders and files, restores files and folders that have the
HIDDEN attribute set in the backup.
7: Restore folders and files with SYSTEM attribute, restores the files and folders
with the SYSTEM attribute.
Page
Internal Use - Confidential 212 © Copyright 2020 Dell Inc.
Performing Restores
8: Directly connect to all server nodes, this may improve the performance by
establishing more than one connection to the server.
9: Run as user name, allows the plug-in to run as the user on the client.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 213
Performing Restores
Recovery Pre-Requisites
183Check the contents of the backup in the Backup and Restore interface to ensure
there is an entry for the Automated System Recovery (ASR) writer.
184Download the WinPE ISO image from the Avamar server, that is located in the
Documents and Settings webpage in the Windows Disaster Recovery Wizard
Section. 32-bit and 64-bit versions are available. The ISO includes many common
NIC and disk device drivers. However, if the ISO does not contain the drivers
needed, you may add them into the ISO. Drivers do not require a reboot. To
discover if the ISO already has the proper drivers, you may run the Avamar System
Recovery Wizard on your system at any time to see if it recognizes the NIC and
disk devices. Burn the ISO to a CD or to a bootable USB drive.
185To recover from a disaster, provision new hardware that is similar to the original
hardware. The disk size must be at least the same size as the source. Also, be
sure to have the same number of disks with the same LUN numbering.
Page
Internal Use - Confidential 214 © Copyright 2020 Dell Inc.
Performing Restores
Avamar can be used with native OS-specific server recover solutions to achieve
various levels of server disaster recovery.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 215
Performing Restores
Avamar backup for bare-metal recovery191 includes the system-state. The Avamar
leverages Microsoft VSS service to create backups of system state information.
When the WinPE192 boot disk is loaded, it starts the Avamar System Recovery
Wizard. This wizard performs a basic configuration of the network, then contacts
the Avamar server and restores all the server data.
192The WinPE ISO can also be added as a boot image to a Windows Deployment
Services server. This allows the new bare-metal server to boot the image from the
network instead of a local CD. Restoring a physical server to a virtual machine is
also supported. This can be useful if a server must be recovered immediately
before new hardware is available. During the disaster recovery, all critical disks are
formatted. A critical disk is defined as one that contains operating system files or
Page
Internal Use - Confidential 216 © Copyright 2020 Dell Inc.
Performing Restores
Windows full system backup for the client must be performed to successfully
recover a Windows 2008, 2012, and 2016 server. A full system backup is
performed using the Windows VSS plug-in193.
1: Select Plug-in Type, use the Windows VSS option. The Backup is performed
using the Windows VSS plug-in.
2: Clear out all other plug-in options, and add in the VSS options. The dataset
should have client file system and system state data.
It is recommended to perform the full system backup for the client on a regular,
scheduled basis. The dataset for the group backup must include the entire client
193The VSS plug-in does not back up critical disks on shared storage in a cluster. If
the server has shared cluster storage, this must be backed up using a file system
plug-in.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 217
Performing Restores
file system and the system state data. Ensure the retention on the backup is
sufficient to ensure the backup of the system state is always available.
3: The Options tab you can add a Snapup Label and have options to select for
Create Disaster Recovery Backup.
When the new client is booted from the WinPE disk, the Avamar System Recovery
Wizard194 is displayed. The wizard asks for date and time information, networking
194 The Avamar System Recovery Wizard asks for date and time, networking
information, Avamar server address, location for the recovered backup, details
Page
Internal Use - Confidential 218 © Copyright 2020 Dell Inc.
Performing Restores
information, the address of the Avamar server, and the backup to recover from. It
also confirms which disks195 are formatted and to which disk it is recovered.
about the disks, operating system, system settings, and all the files are restored.
Applications, such as databases and Exchange, must be restored from their most
recent backup.
195If any disks or NICs do not appear during this process, you may have to add
their drivers onto the ISO and manually select them.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 219
Avamar Replication
Avamar Replication
If you use a Data Domain system as a backup target for Avamar196, then the
replication process also transfers Avamar data from the source Data Domain
system to a destination Data Domain system.
196If a Data Domain system is configured with a source Avamar server, then there
must be a corresponding Data Domain system that is configured with a destination
server, otherwise, the replication fails for backups that are stored on the source
Data Domain system.
197 Replication is a direct copy and occurs on the Avamar replication schedules and
is supported in multiple environments.
Page
Internal Use - Confidential 220 © Copyright 2020 Dell Inc.
Avamar Replication
Avamar Avamar
Metadata
Backup Data
Here is the replication process and various topologies that are used when a Data
Domain system is integrated with Avamar.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 221
Avamar Replication
198 The replication process is initiated from the source Avamar server. If the data
that has been selected for replication includes data stored on the source Data
Domain, the source Avamar queries the target Avamar server to ensure that there
is a target Data Domain. The source Avamar also communicates with the target
Data Domain to ensure that replication is possible. Then, the source Avamar
replicates meta data to the target Avamar while the source Data Domain sends
backup data directly to the target Data Domain. Data is not staged on the Avamar
server.Since the source Avamar server must communicate with the target Data
Domain, it is not possible to separate the Avamar and Data Domain traffic onto
separate networks. Also, be aware that if the source Data Domain is used to store
data other than the Avamar backup data, it will not be replicated. Configure
replication for this data separately through the Data Domain interface.
199Ensure that the target site must have a target Avamar server configured with its
own Data Domain. Be sure that the destination systems have enough capacity to
store all data, especially when multiple systems are replicating to one.
Page
Internal Use - Confidential 222 © Copyright 2020 Dell Inc.
Avamar Replication
An Avamar replication job copies client backups from the source Avamar system to
an alternate destination200.
Pre-Requisites
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 223
Avamar Replication
Replication Destination
The Avamar system supports replication to other Avamar systems and to Data
Domain (DD) systems through DD Boost.
Step 1
Click to enlarge
201An Avamar system can also replicate to another Avamar system that is running
a different version of the Avamar server software. However, the best results occur
with the same software version.
Page
Internal Use - Confidential 224 © Copyright 2020 Dell Inc.
Avamar Replication
Step 2
Click to enlarge
Step 3
In the popup window that appears, enter the destination server details with repluser
privilege, and click VALIDATE.
Step 4
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 225
Avamar Replication
Click to enlarge
Define a Schedule
The method of scheduling replication tasks depends on the type of replication that
is used. In a policy-based replication, schedules are defined in a similar way to
back up schedules.
To configure schedules for a policy-based replication, the first step is to log in to the
AUI.
Once logged in to the AUI, follow the steps that are shown below:
1. Navigate to Setting pane, and select a domain.
Page
Internal Use - Confidential 226 © Copyright 2020 Dell Inc.
Avamar Replication
You can also configure the retention period based on the requirement.
The following table lists the supported replication configurations for Avamar
replication using DD Boost.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 227
Avamar Replication
In a replication environment with more than one destination Data Domain system,
you can set the system202 that receives the replicas by mapping a domain on the
source Avamar server to a destination Data Domain system.
202You can specify a Data Domain system as a default destination. The Avamar
server replicates to a default destination when a destination Data Domain system is
not identified in the Storage Mapping tab.
Page
Internal Use - Confidential 228 © Copyright 2020 Dell Inc.
Avamar Replication
The following steps must be followed in order to set a default Data Domain
destination system:
1. Log in to the AUI, and go to the System pane.
2. Click the Data Domain tab.
3. Click +ADD if the Data Domain system does not already exist in the list.
Continue to step 4.
4. Select the Data Domain, and click EDIT.
5. Scroll down to the Misc section, and select Use system as default replication
storage checkbox.
6. Click VALIDATE and OK.
If there are multiple destination Data Domain systems, you can control which
system receives the data that replicates203 from the source Data Domain system.
203
To specify the destination system, a domain should be mapped on the source
Avamar system to a destination Data Domain system.
If the mapping is not done, then Avamar replicates the data from the source Data
Domain system to the default destination.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 229
Avamar Replication
To map a domain:
1. Log in to the AUI, and navigate to System pane.
2. Click Storage Mapping tab, and click +ADD.
3. Select the Data Domain system from the list to use as replication target.
4. Click SUBMIT.
The replication policy enables you to define the settings for policy-based
replication. The replication policy also enables you to perform a scheduled as well
as on-demand replication from source to destination systems.
The following steps describe how to create a replication policy in the AUI:
Step 1
Log in to the AUI, and navigate to Replication Policy pane, and click +ADD.
Page
Internal Use - Confidential 230 © Copyright 2020 Dell Inc.
Avamar Replication
Step 2
You can have the replication of the backups either in alphabetical order or parallel.
Step 3
Under the Members tab, you can either replicate all clients or choose any specific
client that you want to replicate.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 231
Avamar Replication
Step 4
Under the Backup Filters tab, you can either replicate all the backups or you can
include/exclude any specific backups by type, date etc.
Step 5
Under the Schedule tab, you can either select the Default Replication Schedule or
you can choose a schedule created by the user.
Page
Internal Use - Confidential 232 © Copyright 2020 Dell Inc.
Avamar Replication
Step 6
Under the Retention tab, you can either keep the default retention or you can edit
the retention period.
Step 7
Under the Destination tab, select the destination Avamar server and click NEXT.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 233
Avamar Replication
Note: If you have not configured a destination server, then you can add a
destination server by clicking +ADD DESTINATION option.
Step 8
Finally, review the summary and click FINISH to create a replication policy.
Page
Internal Use - Confidential 234 © Copyright 2020 Dell Inc.
Avamar Replication
The Activity window in the AUI enables you to view status information for both on-
demand and scheduled replication activity.
Display specific
type of activity
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 235
Avamar Replication
Replicas at Source
The Replicas at Source204 feature allows you to view, manage, and restore
replicated backups while logged into the source Avamar server.
Page
Internal Use - Confidential 236 © Copyright 2020 Dell Inc.
Avamar Replication
Avamar allows you to restore the replicated backups on a destination system using
AUI. This method is used when the source Avamar server is unavailable and the
Replicas at Source feature is not enabled on the source Avamar system.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 237
Avamar Replication
Replicas at Source feature allow you to restore replicated backups on the source
Avamar server using the AUI.
Page
Internal Use - Confidential 238 © Copyright 2020 Dell Inc.
Cloud Tier
Cloud Tier
Cloud Tier
The Avamar Cloud Tier feature enables you to move Avamar backups from a Data
Domain system to the cloud. The Cloud Tier feature provides long-term storage of
Avamar backups by seamlessly and securely tiering data to the cloud.
Cloud Tier
Avamar backup
data stored in
Data Domain Active Tier Data is moved to cloud for long-term
retention
Click to enlarge.
The following are some of the important points to be remembered while using cloud
tier in Avamar:
• Configure cloud tier to move Avamar backups on the Data Domain to the cloud
using AUI.
• Perform efficient recovery of the backups to the client.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 239
Cloud Tier
• Need to configure Data Domain cloud storage units before configuring cloud tier
in AUI.
• AUI supports virtual machine File Level Recovery (FLR) operations for backups
in the cloud.
The following two tasks are performed as part of configuring the Avamar server to
manage the Cloud Tier feature:
205You can switch from one cloud unit to another. Each Avamar server can have
only one active cloud unit simultaneously. After you switch the cloud unit, Avamar
moves the existing backups that have been marked for tiering to the new cloud unit
when the Data Domain system triggers data movement.
206 For the backups stored on the cloud, Granular, or File Level Restore (GLR/FLR)
is the method to restore a piece of data or files to the client. With this feature, you
do not recall the whole backup from the cloud to the active tier. Instead, you can
restore only the file which the client needs.
The GLR/FLR feature saves the data transfer rate and time. GLR is supported on
AUI if the cloud unit that is configured on Data Domain is Elastic Cloud Storage
(ECS). GLR is not supported on AUI if the cloud unit that is configured on the Data
Domain are other types. If the backup is on Active Tier (local Data Domain), the
GLR function does not have such a limitation.
Page
Internal Use - Confidential 240 © Copyright 2020 Dell Inc.
Cloud Tier
To use the Cloud Tier feature, you should have a Data Domain system with Cloud
Tier enabled.
To add or edit a Data Domain system, the first step is to log in to the AUI.
Once logged in to the AUI, follow the steps that are shown below:
Step One
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 241
Cloud Tier
Step Two
Page
Internal Use - Confidential 242 © Copyright 2020 Dell Inc.
Cloud Tier
Click to enlarge
Under the System tab, enter the IPV4 DD System Name, DDBoost Username and
Password, and click VALIDATE.
Step Three
Under the SNMP tab, enter a value to the SNMP Community String and click
NEXT.
Step Four
Under the Tiering tab, select the Enable Cloud Tier option.
Then, select the cloud unit from the drop-down and click FINISH.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 243
Cloud Tier
Important: The cloud tier feature can be enabled only after adding a
Data Domain system. The Enable Cloud Tier option is not available
for you while adding a new DD system. The cloud tier feature has to
be purchased and deployed on the Data Domain.
To run a Cloud Tier operation, you have to create a Cloud Tier policy.
To create a Cloud Tier policy, the first step is to log in to the AUI.
Once logged in to the AUI, follow the steps that are shown below:
Step One
From the navigation pane, click Cloud Tier Policy and click + ADD.
Page
Internal Use - Confidential 244 © Copyright 2020 Dell Inc.
Cloud Tier
Step Two
Step Three
Under the Members tab, choose individual client under a domain and click NEXT.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 245
Cloud Tier
Step Four
Under the Backup Filters tab, enter the following information and click NEXT.
• Age Threshold: Determine how long backup resides on the Data Domain
before tiered to cloud
• Backup Filter: Select either tier all backups or filter backup tiering by including
or excluding backups
• Backup Types: Select the type of backup
• Maximum backups per client: Select how many backups to tier to the cloud
each time the schedule is run
Page
Internal Use - Confidential 246 © Copyright 2020 Dell Inc.
Cloud Tier
Step Five
Step Six
Under the Retention tab, you can either keep the current expiration or set
expiration by backup type and click NEXT.
Step Seven
Under the Destination tab, you can see list of Data Domains with cloud units
enabled and then click NEXT.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 247
Cloud Tier
Step Eight
Under the Summary tab, review the Cloud Tier policy information and click
FINISH.
Result: You can see that the Cloud Tier policy is created successfully.
Page
Internal Use - Confidential 248 © Copyright 2020 Dell Inc.
Cloud Tier
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 249
Cloud Tier
On-Demand backup of a
Cloud Tier policy is the
process of running the
policy instantly by the
user.
To perform an on-
demand backup of the
policy, follow the steps
that are shown below:
1. Once logged in to the
AUI, click Cloud Tier
Policy from the
navigation pane
2. Select the Cloud Tier
policy, and click RUN
Page
Internal Use - Confidential 250 © Copyright 2020 Dell Inc.
Cloud Tier
The process of restoring backups207 that are tiered to the cloud are identical to the
normal restore operation.
207 First, Avamar recalls a copy of backup from the cloud to the active tier of the
Data Domain. Then, the restore of backup is performed from the active tier to the
client.
The status of the backup is Cloud. It is because the backup is stored on the Data
Domain cloud tier after the restoration. The copy of the backup on the active tier is
used for the restore operation and is deleted after 10 days.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 251
Cloud Tier
Cloud Tier
Restore
backup
Recall
DD backup
Active
Client
A recall operation allows you to move a backup residing on cloud tier storage back
to the active tier on the Data Domain system. In the AUI, you can enable recall at
the policy level.
To enable recall a cloud tier backup at the policy level, follow the steps that are
shown below:
Step One
Page
Internal Use - Confidential 252 © Copyright 2020 Dell Inc.
Cloud Tier
Step Two
Step Three
Under the Properties tab, select Undo Tier, then select one of the options based
on the requirement and click NEXT.
208 Unmark previously marked backup and changes the status to ACTIVE.
209 Unmark and recalls backups that are moved to cloud tier.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 253
Cloud Tier
Step Four
Under the Members tab, keep the default client and click NEXT.
Page
Internal Use - Confidential 254 © Copyright 2020 Dell Inc.
Cloud Tier
Step Five
Under the Backup Filters tab, keep the default values which were configured
before and click NEXT.
Step Six
If the Undo Tier option is enabled, then the Schedule tab is disabled. Click NEXT to
continue.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 255
Cloud Tier
Step Seven
Under the Retention tab, you can either keep the current expiration or set
expiration by backup type and click NEXT.
Page
Internal Use - Confidential 256 © Copyright 2020 Dell Inc.
Cloud Tier
Step Eight
Under the Destination tab, you can see list of Data Domains with cloud units
enabled and click NEXT.
Step Nine
Under the Summary tab, review the recall of the Cloud Tier at the policy level
information and click FINISH to save the changes.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 257
Cloud Tier
Avamar supports File or Granular Level Restore only from the Dell EMC Elastic
Cloud Storage (ECS) cloud unit210.
Avamar does not support File or Granular Level restore from a non-ECS cloud
unit211.
210
To restore a single file from the backup that is in the ECS cloud unit, you do not
must recall the whole backup from the cloud to the active tier of the Data Domain.
You can directly restore the single file from the cloud.
211With a non-ECS cloud unit, you have to first recall the whole backup from the
cloud to the active tier of Data Domain. Then, you can restore a single file from the
active tier of Data Domain to the client.
Page
Internal Use - Confidential 258 © Copyright 2020 Dell Inc.
Cloud Tier
ECS Cloud
Recall whole
Active backup
Single File
Tier
Whole backup
Restor
e Work File or Granular Level
Job Restore File or Granular Level Restore directly
from cloud
Client
Single File
Click to enlarge
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 259
System Monitoring and Maintenance
The Avamar Operating System has two login accounts, root212 and admin213. Most
support operations on the Avamar server nodes are performed as user admin.
Avamar also has internal accounts and BASH214. The internal server accounts are:
212
Root is the standard operating system superuser which is required to install
RPMs and starting and stopping.
213The admin is the owner for all the Avamar system data. Most support operations
on Avamar server nodes are performed as user admins.
Page
Internal Use - Confidential 260 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
• root
• MCUser215
• repluser216
• viewuser
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 261
System Monitoring and Maintenance
1
3
2
4
2: The src directory is where the customer tar and web downloaded files reside.
Data, checkpoints, and logs are located in one or more /data0n directories on a
single-node Avamar server and on each storage node of a multinode Avamar
server.
Page
Internal Use - Confidential 262 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
2: The cur directories contain data and log files. Some of the files that are found in
the directory are:
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 263
System Monitoring and Maintenance
The Module.Node format is 0.s for Utility node and 0.0, 0.1, 0.2...0.9, 0.a, 0.b and
so on, for multinodes. Shown here is a single node format, showing Node.0.0.
217The format, where MODULE is the number that are assigned to the Avamar
server/grid and NODE = 0, 1, 2,…9, a, b, and so on, for storage nodes. The utility
node of a multi-node server of module 0 is referred to as 0.s. The first accelerator
node is 0.accelerar.0.
219Are number generated when a node is added to the Avamar system and it does
not change when IP address or position in probe.xml changes.
Page
Internal Use - Confidential 264 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
Probe.xml Files
The probe.xml file is a node resource database file that stores the types and IP
addresses of Avamar server nodes which are located in
/usr/local/avamar/var directory. This is created during the Avamar
installation, and the nodedb command is used to maintain the file.
Nodenumbers Utility
The logical and physical node numbers are the same, except when nodes are
added, decommissioned, or replaced, it is possible the physical and logical node
numbers to get out of sync.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 265
System Monitoring and Maintenance
To keep the physical and logical node numbers the same, during node
replacement, the same physical node number as that of the node being replaced
can be used, use the Avamar utility, nodenumbers.
Some of the Avamar commands and utilities authenticate against all nodes in a
multi-node Avamar system. The mapall command provides the password for each
node, thus not having to enter passwords for every node.
Loading the SSH keys prior to using any commands using the admin_key file.
Loading the admin_key is done from the utility node.
To run this command, as user admin load the admin SSH keys:
1. su - admin
2. ssh-agent bash
3. ssh-add ~/ssh/admin_key
Page
Internal Use - Confidential 266 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
Mapall Utility
The mapall is a utility that is used to perform operations on all the nodes in an
Avamar server. The mapall utility uses the information in probe.xml to resolve
MODULE.NODE designations into IP addresses. To avoid password prompts, first
load the SSH keys.
• -all Runs command on all node in the system. (if not used the command only
runs on the storage node).
• --bg Runs command in the background and does not wait for it to complete.
• --nodes = NODELIST Runs command on specific nodes.
• --noerror Continues if error occurs.
• --parallel Runs command on each node simultaneously.
Activity Monitoring
By default, the Activity Monitor tab displays the most recent 5,000 client activities
during the past 24 to 72 hours.
You can increase or reduce the amount of information in the Activity Monitor by
editing the mcserver.xml file located:
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 267
System Monitoring and Maintenance
/usr/local/avamar/var/mc/server_data/prefs/mcserver.xml
To view the activity from Left Menu, select Activity, and all clients status appear in
the Activity window.
1 4
1: The VIEW LOGS shows the details of the clients backup or restores. You can
also choose to download and send to support.
Page
Internal Use - Confidential 268 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
Column Description
Start Time Date and time that this activity began, adjusted
for the prevailing time zone, which is shown in
parentheses. Daylight Savings Time (DST)
transitions are automatically compensated.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 269
System Monitoring and Maintenance
Column Description
4: Filter by duration allows the view to be All, Last 72 hours, and Last 24 hours.
Page
Internal Use - Confidential 270 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
Activity Summary
The Activity Summary tab displays the view of Group and VMware container
success and failures.
1
7
2 3 4 5 6 8 9
1: The Summary View can be changed either to show the Group or the VMware
Container.
5: Queued: Number of backups for the group currently in the scheduler queue.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 271
System Monitoring and Maintenance
8: Time Queued: Interval between start time and the first client work order is
started by any client in the group.
9: Time Active: Total amount of time used to perform all backup activities for this
group (the time between when the first client work order is started and the last
client work order is finished).
Event Monitoring
• SYSTEM
• APPLICATION
• USER
• SECURITY
Page
Internal Use - Confidential 272 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
2 3 4
1: Mode can be displayed in either Monitor or Query mode. For Query mode, use
the filters to select a range of dates for the events to display by using From Date
and To Date fields.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 273
System Monitoring and Maintenance
2: The Event Details window displays more details on the actual event. Use the
Help button for more details on this option.
3: Event Filter allows the use of Filters to be applied to the selected event.
4: Export Events Report allows the event to saved off as a .csv report.
Page
Internal Use - Confidential 274 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 275
System Monitoring and Maintenance
Certain system events initiated by users, those with a category of Security and type
of Audit, are recorded in the Audit Log220.
To view the audit login Event Management, select the Audit Log tab. Double-click
an event in the log to display details about the selected event.
2 3 4
220Administrators can use this information to enforce security policies and detect
deviation from those policies.
Page
Internal Use - Confidential 276 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
2: Select a log, and click the View Detail. Event Detail will open and provide
details.
3: The Filter will allow for administrator to select Date Range, To Date, Category,
Type, Severity, and Domains. The More button will offer Code filters, which can
be used to include or exclude.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 277
System Monitoring and Maintenance
4: Export Events Report allows the event to saved off as a .csv report.
Page
Internal Use - Confidential 278 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
The Event Management in the AUI, is seen from Event Management window.
Filters can be used to narrow down the event viewing and a selection can be reset
of retrieved by dates.
1: The Event Management offers views for Critical, Error, and Warnings.
2: Filters can be set to narrow down the events. Administrators can use a date
range, Type, and Categories. Selecting the Unacknowledge event only then
select RETRIEVE.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 279
System Monitoring and Maintenance
In the image below the Errors were 6 and after acknowledging two events, the
Error results are now 4.
Page
Internal Use - Confidential 280 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
Managing Profiles
Avamar provides notifications when any event occurs, including pop-up alerts, the
acknowledgement-required list, email messages, syslog files, and SNMP traps. In
addition, third-party tools and applications can also be used to monitor and report
on the syslog files and SNMP traps.
1
2
1: The System Profile lists all possible event codes and when the event occurs,
whether a GUI Alert is sent and/or an acknowledgment is required. You can
change either of these options for each event code. There is only one system
profile.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 281
System Monitoring and Maintenance
Page
Internal Use - Confidential 282 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
• Local SNMP Trap: Verify if Traps are successfully generated and received.
This is read-only and is intended for test purposes only.
• Local Syslog: If enabled, provides the status reports by the syslogd process
on the Avamar server.
The System Profile contains all possible system event codes. You can edit the
system-event profile to control whether an event generates a pop-up alert in
Avamar Administrator, an entry in the common unacknowledged events list, or
neither.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 283
System Monitoring and Maintenance
1: From the System Profile users can see All Codes and Audit Codes. To add or
remove specific codes, select the appropriate box and click OK.
To add an entry to the common unacknowledged events list each time that an
event occurs, select the Acknowledgement Required checkbox.
Page
Internal Use - Confidential 284 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
Step One
Custom event profiles enables the user to send notifications when specific system
events occur.
You cannot view system events and profiles outside the domain that you are
logged in to. This step affects the profiles that you can edit and the events that you
can add to a profile.
Step Two
In the left pane, select the domain for the custom event profile, and click New
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 285
System Monitoring and Maintenance
Step Three
In the Profile Name box, type in a name for the new event profile.
For Profile Type, leave the default setting of Email, Syslog, and SNMP Trap
Notification. The Usage Intelligence feature uses the preconfigured Usage
Intelligence profile, do not create a profile that is based on this profile type. This
step results in redundant data being sent to Avamar Support.
Page
Internal Use - Confidential 286 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
If you enabled email notifications, then specify whether to send email notifications
as soon as events occur or on a scheduled basis:
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 287
System Monitoring and Maintenance
Choose whether to enable or disable syslog notification for the profile by selecting
or clearing the Syslog Notification – Enabled checkbox.
Choose whether to enable or disable SNMP notification for the profile by selecting
or clearing the SNMP Trap Notification – Enabled checkbox. Click Next.
Page
Internal Use - Confidential 288 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
Step Four
The Event Codes page appears, click the All Codes tab. Then select the Notify
on the errors that are needed to trigger the notification.
Click the Audit Codes tab, and then select the Notify checkbox next to the audit
events221 that needed to trigger the notifications.
221An asterisk (*) next to an event code indicates an event of such severity that a
notification is sent when that event occurs, even if other event notifications are sent
on a schedule.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 289
System Monitoring and Maintenance
Step Five
If you click Next, then the options for Email Notification page appears. In the
Email Subject Header box, type an email subject line for the notification message.
Add an email recipient to the list by typing a valid email address in the Enter
Recipient box and then clicking +. Use the - to remove an email recipient. Click
Next.
222If the test email message is sent successfully, an Email accepted by transport
layer confirmation message appears.
Page
Internal Use - Confidential 290 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
Step Six
If the profile includes syslog notification messages, then specify the syslog
notification parameters:
• In the Address (IP or hostname) box, type the IP address or hostname of the
Avamar server node running the syslogd process.
• In the Port Number box, type the port number that is used for syslog
communication.
• Choose whether to include extended event-code information in the syslog
message by selecting or clearing the Include extended event data checkbox.
• From the Facility list, select one of the following: user, local0, local1, local2,
local3, local4, local5, local6, or local7.
Click Next.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 291
System Monitoring and Maintenance
Step Seven
If the SNMP Trap Notification message is needed, specify the SNMP parameters:
224Type the port number on the host server that is listening for SNMP traps. The
default data port is 162.
Page
Internal Use - Confidential 292 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
Click Finish.
225Type the name of the SNMP community that the SNMP trap listener is
configured to use. This is a test string that the local Net-SNMP agent uses to
authenticate with SNMP management application.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 293
System Monitoring and Maintenance
Server Monitoring
5
1 2 3 4
1: Node details on the Avamar tab of the Server Monitor are as follows:
226The Server Monitor tab on the Server window in Avamar Administrator includes
separate tabs for the Avamar server and any configured Data Domain systems
Page
Internal Use - Confidential 294 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
• Ping: Time in seconds that this node took to respond to a ping request
• In: Received packet throughput reported in KB per second
• Out: Sent packet throughput reported in KB per second
• Reads: Average number of hard drive reads per second as reported by the
operating system
• Writes: Average number of hard drive writes per second as reported by the
operating system.
• Utilization: Percentage of total available server storage capacity currently used.
5: The Data Domain tab in the Server Monitor provides CPU, disk activity, and
network activity for each node on the Data Domain system.
If the status is yellow or red, you can view additional status information to
determine and resolve the problem.
• Server Monitor tab presents a summarized view of CPU, network, and hard
drive performance statistics for the Avamar server. A separate subtab provides
the same information for any configured Data Domain systems.
• Server Management tab shows a detailed view of the server hardware
resources for the Avamar server and any configured Data Domain systems.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 295
System Monitoring and Maintenance
• Session Monitor tab shows a list of active client backups and restores
sessions.
• Checkpoint Management tab shows detailed information for all system
checkpoints that are performed for this Avamar server.
• Data Domain NFS Datastores tab lists the temporary NFS share for VMware
instant access on any configured Data Domain systems. The Avamar for
VMware User Guide provides more information about instant access.
System Management
From the left menu, select System, and click Server Management. In this view
administrators can review Checkpoints, Backup Window, Garbage Collection,
and Services.
1 2 3 4
Page
Internal Use - Confidential 296 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
1: Checkpoints tab displays the latest checkpoints that have been validated (green
checkmark) and unvalidated (red question mark).
3: The Garbage Collection window displays the information on the last garbage
collection. The Garbage collection history will provide an overall view of past
garbage collections and display a graphical chart.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 297
System Monitoring and Maintenance
In the Additional services pane, the details of the services running or not running
are displayed.
Page
Internal Use - Confidential 298 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
The Avamar server components must be running for successful system operation.
Avamar provides the dpnctl script to allow you to manually start, stop, and check
the status of Avamar server subsystems.
dpnctl status
The dpnctl script is run as user admin from the command line on the Avamar
single node server or utility node of a multi-node server.
For information about the dpnctl command options, type: dpnctl help.
To view the status of the Avamar system components, use the command dpnctl
status.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 299
System Monitoring and Maintenance
dpnctl stop
dpnctl start
Use dpnctl start to bring an Avamar server back online after a system shut-
down. After the server is back online, verify all server subsystems are up and
running.
Page
Internal Use - Confidential 300 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
To run dpnctl status | start | stop for a particular subsystem, type the
command followed by the subsystem name.
Executing dpnctl start starts any subsystems that are not already running.
Using dpnctl stop mcs stops both the MCS process and the backup scheduler,
sched. However, using dpnctl start mcs does not restart the backup
scheduler. Be sure to run dpnctl start sched to resume the scheduler.
To protect itself from hardware failures, mcs backs up or flushes its data to the
Avamar server it manages. This preserves all mcs data for a system restoration.
Flushes are done automatically via an avtar227 client session every hour and as
part of system checkpoints.
227 The avtar session used to backup the administrator server is run as MCUser.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 301
System Monitoring and Maintenance
228
By default, flush backups are stored in the special system domain that is
/MC_BACKUPS.
Page
Internal Use - Confidential 302 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
Avamar uses two systems to automatically send events, alerts, and system
information to Customer Support.
• Email Home229
• ConnectEMC
229By default, notification schedule email messages are sent at 6 a.m. and 3 p.m.
each day.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 303
System Monitoring and Maintenance
ConnectEMC
4
2
1
3
1: To edit the Failover Transport, highlight Failover Transport, and click Edit.
230 ConnectEMC is integrated with Secure Remote Support (SRS). Primary and
failover transport can be configured to use FTP or HTML communication. SRS
gives customer support the ability to provide remote Avamar support.
Page
Internal Use - Confidential 304 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
Clicking the Advanced button opens the settings for Retries, Timeout,
Description, and Email Subject.
2: To edit the Primary Transport, highlight Primary Transport, and click Edit.
Clicking the Advanced button opens the settings for Retries, Timeout,
Description, and Email Subject.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 305
System Monitoring and Maintenance
Clicking the Advanced button opens the settings for Retries, Timeout,
Description, and Email Subject.
4: Disable, Stop, and Test can be used to test any of these transports as well as
to test any new changes that are made.
5: The Help button can be used at any time to provide more details for the
ConnectEMC feature.
Page
Internal Use - Confidential 306 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
Avamar performs the system-maintenance operations for backup data on the Data
Domain system, including HFS checks, checkpoints, rollbacks, and garbage
collection.
• Garbage collection
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 307
System Monitoring and Maintenance
• Checkpoints
• HFS checks
These activities are managed internally during the period of time defined in the
Backup/Maintenance Window.231
231During the Maintenance window, the Avamar server runs garbage collection,
checkpoint, checkpoint validation (HFS check), and a final checkpoint.
Page
Internal Use - Confidential 308 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
The Backup Window is that portion of each day reserved to perform normal
scheduled backups. The Backup window232 defines a period of time when the
server does not perform any maintenance activities, including checkpoint, garbage
collection, and checkpoint validation.
232The default Backup window begins at 8 p.m. local server time and continues
uninterrupted for 12 hours until 8 a.m. You can customize the Backup window start
time and duration.
234Backups can be run during garbage collection, checkpoint creation, and HFS
check, and may be paused during HFS check start up. However, running backups
while these activities are running causes both backups and the maintenance
activities to take longer to complete and possibly even to fail.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 309
System Monitoring and Maintenance
1: The Window start time can be customized around the scheduled backups, and
does not automatically coordinate with the various backup schedules. May require
manual adjustment if there are any conflicts with the backup schedule.
Page
Internal Use - Confidential 310 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
2: The Duration can be customized, and does not automatically coordinate with
various backup schedules.
Any changes may require a manual adjustment if there is any conflict with backup
schedules.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 311
System Monitoring and Maintenance
Page
Internal Use - Confidential 312 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
Garbage collection is the process of removing235 unused chunks from backups that
have expired. This frees up capacity on the Avamar server.
Garbage collection236 runs once daily starting at the beginning of the Maintenance
window.
235Types of backup data that may be deleted during garbage collection include
expired backups, deleted backups, and partial backups older than seven days.
236
When Avamar is integrated with Data Domain, the space is not reclaimed until
Data Domain runs its maintenance activities, which run on a different schedule.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 313
System Monitoring and Maintenance
If the checkpoints are being stored on the Data Domain then this is not a validation
process.
It t is a best practice to leave this checkpoint retention policy at the default values.
237 Checkpoints are created using hard links to all the stripes. A checkpoint
directory is created on each active disk of each storage node of the Avamar server.
The directory contains the stripes on the disk as they were at the time the
checkpoint was taken.
239 Checkpoint validation is performed by running a Hash File System (HFS) check
on a checkpoint. The process that performs HFS checks is hfscheck, which is
similar to the UNIX fsck command. While an HFS check is being initiated, the
server is briefly placed in read-only mode until it finishes. HFS check validates the
integrity of a checkpoint by performing a series of checks on the stripes. If HFS
check detects errors in one or more stripes, it automatically attempts to repair
them.
Page
Internal Use - Confidential 314 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
By default, a rolling HFS check240 is automatically run once a day, usually during
the period defined by the Maintenance window. The default settings for HFS
checks can be modified to accommodate an environment for an individual site.
240A full HFS check performs checks of all the stripes. A rolling HFS check
performs checks of all new and modified stripes and a subset of unmodified stripes.
When a checkpoint has passed either type of HFS check, it is considered reliable
enough to be used for a system rollback. Rollback is the process of restoring the
Avamar server to a known good state using data stored in a validated checkpoint.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 315
System Monitoring and Maintenance
Managing Checkpoints
Under the Server Management tab, select Checkpoints tab. In the window you
can see the two checkpoints that are created, and the details on the right side in
the Details pane.
From this pane, a new checkpoint can be created. Click the +CREATE for a new
checkpoint.
Page
Internal Use - Confidential 316 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
When the system is in a read-only state (during checkpoint and garbage collection),
these system administration tasks cannot be performed:
243 Avoid starting any on-demand backups during HFS check process.
244
Running on-demand maintenance temporarily disables ALL scheduled
maintenance activities.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 317
System Monitoring and Maintenance
• Deleting a backup
• Changing a backup retention
245 Queued if more than eight backups per node, less 1 for the overall system.
246 All other maintenance jobs, such as checkpoint, replication, etc., can start.
247 If more than 8 backups per node, less 1 for the overall system.
Page
Internal Use - Confidential 318 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
Avamar performs the system-maintenance operations for backup data on the Data
Domain system, including HFS checks, checkpoints, rollbacks, and garbage
collection.
Avamar runs maintenance every day for 12 hours249, it communicates the same to
Data Domain250 as well. Data Domain does not run any maintenance on a daily
basis, only cleaning weekly.
249During this 12 hour period Garbage collection runs 3 hours, the other time is
spent on checkpoints and HFS checks. If the HFS check completes before the 12
hour window, the maintenance will complete.
250When Avamar and DD are integrated, the Data on DD has to match the Meta
Data on Avamar; the sync between Avamar and Data Domain is critical in terms of
data and meta data.
251Data Domain runs cleaning only once a week. On a daily basis, it moves the
data to /DELETED directory under its cur directory under the Avamar Mtree. By
default, on Tuesday when Data Domain runs cleaning, it clears the entire
/DELETED directory. Recoveries of backups are not possible after hashes are
deleted from Avamar, and the space is reclaimed from Data Domain only after
weekly cleaning is successful.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 319
System Monitoring and Maintenance
252In the event of a roll back on Avamar, the cp allows the Data Domain to run a
fast copy operation of that snapshot back to its point in time.
Page
Internal Use - Confidential 320 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
1: The ddrmaint utility implements all required operations on the Data Domain
system for the Avamar server.
The ddrmaint utility is installed on the utility node of a multi-node server, or the
single node of a single-node server, during Avamar server installation. The
ddrmaint utility is not installed on the data nodes of the Avamar server.
ddrmaint utility:
The goal of managing the capacity of the Avamar server is to achieve a “steady
state253” capacity where the rate at which new data chunks are added to the server
is equal to or less than the rate expired data chunks removed from the server.
New bytes are added to the Avamar server through the backup process. Old bytes
are removed from the server through expiring or deleting backups.
253 Steady state is the rate at which new data chunks added to the Avamar server
is equal to or less than the rate expired data chunks are removed from the server.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 321
System Monitoring and Maintenance
254 The total amount of data in each data partition which is measured by the OS.
This includes the total data in the cur directory, plus checkpoint overhead and
additional overhead in other directories. Approximately 20 to 25 percent is reserved
for checkpoint overhead. The remaining capacity is used for maintenance and
other OS activities.
256The Avamar server transitions to a read-only state when this occurs. This is
referred as the read-only threshold.
257The cur view of capacity utilization is the amount of data as measured by the
OS that is in the current working directory in each of the data partitions (data0#/cur)
on each Avamar server node. This capacity is approximately equal to the sum of
the maximum allocated sizes of all the stripes in the /data0#/cur directories.
Page
Internal Use - Confidential 322 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
A new deployed Avamar system typically fills rapidly for the first few weeks. This is
because nearly every client backed up contains large amounts of unique data.
Avamar’s commonality feature is not leveraged until several similar clients have
been backed up or the same clients have been backed up at least one time.
Once each client has been backed up a “settling” occurs. At this time it is possible
to consider and measure the ability of the system to store about as much new data
each day as it frees during the maintenance windows.
258The system achieves steady state shortly after the longest retention period for
the backups.
259The system achieves steady state shortly after the longest retention period for
the backup.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 323
System Monitoring and Maintenance
During the backup process, the Avamar client generates variable-sized data
chunks and the hashes of these chunks. Data is sent to the Avamar server, where
it is stored in stripes264. There is a hard link to data stripes from the cur directory.
260
Initial deduplication rate for the Avamar server across all clients is typically
about 70 percent for file system data, 35 percent for database data.
261Typically file system backups yield a 0.3% daily change rate, database backups
with a moderate change rate yield a three to five percent daily change rate.
262The number of daily, weekly, monthly, and yearly backups are retained. A best
practice is to use the advanced retention policy for backups.
Page
Internal Use - Confidential 324 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
CU CP CUR CP CUR
The metadata stripes are 36 Megabytes and data stripes are 40 Megabytes.
264 When there is an activity requiring modification of a stripe, such as adding new
data to a stripe, the read-only stripe, is copied to a writable stripe. The original
stripe associated with a checkpoint is maintained for the life of the checkpoint.
Creating the new stripe is checkpoint overhead.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 325
System Monitoring and Maintenance
• Checkpoint retention
• Whether HFS check succeeds every day
In steady state, Avamar places new data in the emptiest space.266 When re-using
existing stripes, the stripes are filled with chunks to the maximum267 allocated size
of the stripe.
Checkpoint overhead grows faster as the system disk space usage increases, due
to stripes that are more full being reused.
It is important to manage the capacity of the system daily. The administrator can
control the gsan capacity through dataset definitions, retention policies, the clients
backed up to the Avamar server, and by ensuring garbage collection runs regularly
to remove expired data.
267After reaching the maximum size, even when data is deleted and removed from
a stripe, the size of the stripe remains the maximum size.
Page
Internal Use - Confidential 326 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
• Capacity Warning is
issued when utilization
exceeds 80 percent of the
user capacity268.
• Garbage collection does
not run when OS capacity
utilization exceeds 85
percent.
• New stripes are not
created when OS
capacity exceeds 90
percent.
• Health Check Limit
occurs when 95
percent269 of user
capacity is consumed.
• New checkpoints are not created after the OS capacity utilization reaches 96
percent.
268 The administrator has to take actions when you start to receive warnings.
269
Backup activity is suspended, although existing backups are allowed to
complete.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 327
System Monitoring and Maintenance
When data is added to stripes, the stripes are filled with chunks up to the maximum
allocated stripe size. Even when data is deleted and removed from a stripe, the
size of the stripe remains the same.
Page
Internal Use - Confidential 328 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
The implications are, if on a data partition, the GSAN view of capacity utilization
grows to 50 percent 270of the total available OS capacity.
Possible causes for warning issued when utilization reaches 80 percent of user
capacity are:
270For an example, and half of the data is expired over time as garbage collection
removes the deleted data and the GSAN view of capacity utilization will reduce
down to 25 percent. However, the cur view of capacity utilization remains at 50
percent.
273Check to be sure the garbage collection is freeing up the same amount of data
that is being added. And check is the time allocated to the Maintenance window
sufficient for adequate collection to take place.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 329
System Monitoring and Maintenance
When user capacity utilization is at 100 percent, the Avamar server transitions to a
read-only state.
The following are a couple of actions that may be taken by Dell Technical Support:
Administrators need to monitor the capacity utilization of the Avamar server daily
and understand how to interpret the system reported warnings and errors.
Avamar checks the capacity of each Data Domain system every 24 hours. Avamar
then logs an event in the Event Monitor if the capacity reaches 95 percent full, or if
the forecast number of days until the capacity is full and less than or equal to 90
days.
Page
Internal Use - Confidential 330 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
2
1
1: By selecting the Data Domain system from the tree in the left pane, the Data
Domain system details appears on the right.
Total Capacity (post-comp size) The total capacity for compressed data on
the Data Domain system.
Server Utilization (post-comp size) The percentage of capacity used on the Data
Domain system for any reason after
compression of the data.
File System Available (post-comp The total amount of disk space available for
size) compressed data in the Data Domain File
System.
File System Used (post-comp size) The total amount of disk space used in the
Data Domain File System for compressed
data.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 331
System Monitoring and Maintenance
Page
Internal Use - Confidential 332 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
100 percent The server has reached the read-only limit and
automatically becomes read-only to protect the
integrity of the data that is already stored on the
server. If ConnectEMC has been enabled, a
Service Request (SR) is automatically logged.
4: This view is in the Avamar UI, and it shows the Capacity Overview.
This provides an overview of the Location, Full%, Space Used, and Space Left of
the Avamar.
• 43 GB Storage Used
• 767 GB Storage Available
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 333
System Monitoring and Maintenance
Checkpoint Utilization
Checkpoints reside on each storage node on the Avamar server. This information
can be used to determine the overhead space of each checkpoint.
The cps command shows the total amount of data in cur for each checkpoint
directory on the node in which the command is run.
Tip: The cps command can only be run from single-node server or
multi-node server storage nodes. In a multi-node server environment,
you must first copy the cps executable file from the utility node to
each storage node.
Page
Internal Use - Confidential 334 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
capacity.sh
The capacity.sh utility provides the net rate of change275 in the system for each
day over a period of the last two weeks. It also identifies the clients with the highest
rate of change.
275This information can be used to assess whether the system is running in steady
state, including the average rate of change in the environment and the
effectiveness of garbage collection.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 335
System Monitoring and Maintenance
Page
Internal Use - Confidential 336 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
The DPN Summary report276 lists the summary information about data stored in the
Avamar server and statistical data for each client backup. This report can also be
generated with the Fitness Analyzer.
The Date Range will appear. Select the dates needed for the report. Click
Continue and the DPN Summary Report will appear.
276 This is used to determine daily change rates for each client, high change rate
clients, amount of data protected, number of clients being protected, abnormal
client behavior, and estimate of commonality factoring and compression.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 337
System Monitoring and Maintenance
In the DPN Summary some of the data contained in the report are:
Page
Internal Use - Confidential 338 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
Backup Statistics
For detailed information about a specific backup, look at the backup statistics
available from the Avamar Administrator; Backup, Restore, and Manage view,
under the Manage tab.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 339
System Monitoring and Maintenance
1 2
1: The Details tab shows detailed information including the client name, completion
date and time, bytes excluded, bytes new, bytes modified, bytes modified sent, and
bytes modified not sent.
This information is also available for backups less than 72 hours old from the
Activity view as well as in AUI Details pane.
Page
Internal Use - Confidential 340 © Copyright 2020 Dell Inc.
System Monitoring and Maintenance
2: The Files tab shows total bytes, percent present, and percent new for a sample
of files in the backup.
The files selected for the sample tend to be the largest files and those with the
highest change rate.
3: The Backup Statistic report can be exported out to .csv and used or saved for
other reports. Click Export.
The Save window appears. Select the name for the report and click Save.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 341
Logs, Troubleshooting, and Reporting
Administrative Processes
Page
Internal Use - Confidential 342 © Copyright 2020 Dell Inc.
Logs, Troubleshooting, and Reporting
Administrator
server logs
278 Logs for activities run by cron are located at /usr/local/avamar/var/cron on the
utility node.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 343
Logs, Troubleshooting, and Reporting
Page
Internal Use - Confidential 344 © Copyright 2020 Dell Inc.
Logs, Troubleshooting, and Reporting
Info: Standard,
Warn: Investigation
informational; no
required
action required
Error: Problem
encountered, FATAL: Root cause
requires corrective analysis required
action
Click to enlarge
• Time279
• Event Codes280
• Severity Levels281
279
The time displayed in log messages is the local time of the client machine.
However, there may be instances where the server time is used.
280 Event codes are numbers given between '<' and '>' in the error message.
281
As shown in the image, security levels indicate four levels of information: Info,
Warn, Error, and Fatal. Except Info, all other levels require corrective action.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 345
Logs, Troubleshooting, and Reporting
Page
Internal Use - Confidential 346 © Copyright 2020 Dell Inc.
Logs, Troubleshooting, and Reporting
Data server logs include gsan.log282 and err.log283. The size of the
log file is limited to 25 MiB284. The file contains the most recent
information.
283err.log contains warnings and errors that are useful for troubleshooting specific
error conditions and issues.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 347
Logs, Troubleshooting, and Reporting
When examining the logs for error conditions, search for the following severity
levels:
Note:
• Logs on the storage nodes use GMT timestamps.
• Avoid searching for the word, 'ERR, as 'ERR' is used in
many messages such as 'MSG_ERR_NONE' and does not
necessarily indicate an error.
Page
Internal Use - Confidential 348 © Copyright 2020 Dell Inc.
Logs, Troubleshooting, and Reporting
getlogs Utility
The output of the getlogs script is a single tar file that contains the compressed logs
from all nodes.
On a multinode
server, load the SSH
keys
Each sub-directory
contains the compressed
logs of corresponding
nodes
Click to enlarge
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 349
Logs, Troubleshooting, and Reporting
Client Logs
Client logs located on client machines provide information about backup and
restore operations, and the user interface.
286
Provide information about the status of all backup and restore activity on the
computer.
287 Provide information about the performance of the user interface. A console log
is created for each user on a computer.
Page
Internal Use - Confidential 350 © Copyright 2020 Dell Inc.
Logs, Troubleshooting, and Reporting
Several useful options288 are available to enhance client logs and provide more
information about a backup for troubleshooting purposes. Some of the useful
options are:
288
The options can be specified when configuring backups from Avamar
Administrator or included in the avtar.cmd file or other tag files.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 351
Logs, Troubleshooting, and Reporting
290
Used rarely; prints throughput performance every second and is useful for
understanding network performance issues.
291Turns on highly verbose messages including the avtar session ID and mount
point information for each backup.
Any requirement to escalate a client issue to Dell EMC Technical Support. Debug
messages are enclosed in brackets and display GMT timestamps.
Page
Internal Use - Confidential 352 © Copyright 2020 Dell Inc.
Logs, Troubleshooting, and Reporting
The file cache plays an important role The hash cache screens out duplicate
when backing up file systems: compressed chunk data.
• The file cache, f_cache.dat, is used • The hash cache, p_cache.dat, is used
to determine if a file has previously to determine if a sub-file object has
been backed up. previously been backed up without
having to communicate with the
• Every entry in the file cache is 44
Avamar server.
bytes, which constitutes various
hashes of the file, metadata, and a • The hash cache includes a 20-byte
header for each entry. SHA-1 hash for each chunk, which is a
hash of the contents of the chunk. A 4-
byte header is also also included.
Database data
Avamar Server
Click to enlarge
File cache and hash cache help reduce the time for backup, as well as CPU
utilization at the client and server.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 353
Logs, Troubleshooting, and Reporting
The size of cache files grows with the increase in the number of backups295.
293The remaining data is further reduced by the hash cache before being sent to
the Avamar server.
294In the case of databases, the file cache is not effective, since the whole
database is treated as a single file.
295 During a backup, the caches are read into memory and then written out at the
end of the backup. The sizes of the cache files are printed near the beginning and
at the end of the avtar logs.
Page
Internal Use - Confidential 354 © Copyright 2020 Dell Inc.
Logs, Troubleshooting, and Reporting
Troubleshooting
Troubleshooting
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 355
Logs, Troubleshooting, and Reporting
The following actions help reduce errors and perform successful backups.
296 Network issues that interrupt the connection can cause backup failures.
297 Input/output errors on the client can lead to incomplete backups as some data is
left behind.
298High client activity levels can prevent files from being backed up. These tasks
have 'completed with exceptions' as their status. High client activity can prevent
backups from completing within the backup window.
300
Backup failures can be caused by incorrect or incomplete dataset definitions
and retention periods.
301 Data from client machines that may be disconnected from the network can lead
to incomplete backups.
Page
Internal Use - Confidential 356 © Copyright 2020 Dell Inc.
Logs, Troubleshooting, and Reporting
302
Regularly review the Activity Monitor and other backup activity reports to ensure
healthy backups.
303Ensure the maintenance activities are scheduled in such a way that they do not
overlap with backup activities.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 357
Logs, Troubleshooting, and Reporting
cid.bin File
cid.bin file is essential for the client to communicate with the Avamar Server.
Initial backups can be large, and this may lead to issues with client initialization.
Potential issues include:
Page
Internal Use - Confidential 358 © Copyright 2020 Dell Inc.
Logs, Troubleshooting, and Reporting
Time-out
305
As initial backups are larger than daily backups, initial backups time out at the
end of the backup window that is configured to meet daily backup requirements.
306
'Overtime' must be enabled so that initial backups don't get timed out, but
complete by taking extra time.
307
Partial backups may be created on the server due to timed out backups. The
Avamar completes the partial backups during subsequent scheduled backups.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 359
Logs, Troubleshooting, and Reporting
Network Issues
308 Sometimes the available WAN bandwidth may limit the backup throughput of
large initial backups that run for long time.
309To perform initial backups across a LAN connection, seed the Avamar server
with the remote client's data via a local connection.
310Partial backups may not be saved if the backup ends abruptly. Hence, it is a
good practice to break the backup into smaller datasets to avoid such situatons.
311Always run "ping" test between server and client to validate any network
connectivity issues.
Page
Internal Use - Confidential 360 © Copyright 2020 Dell Inc.
Logs, Troubleshooting, and Reporting
Manual Interventions
HFS checks validate the integrity of the Avamar data server. A failed HFS check
requires immediate attention.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 361
Logs, Troubleshooting, and Reporting
Rollback is the process of restoring the Avamar server to a previous state using
validated checkpoint data.
Page
Internal Use - Confidential 362 © Copyright 2020 Dell Inc.
Logs, Troubleshooting, and Reporting
Like the AUI, the Fitness Analyzer portal provides access to all functional areas
through the navigation pane on the left. The navigation pane provides access to the
following Fitness Analyzer features:
312 The Avamar Fitness Analyzer is a reporting and analysis portal that provides a
visual representation of server health and functionality. Reports generated by the
Fitness Analyzer help administrators troubleshoot issues and optimize system
performance.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 363
Logs, Troubleshooting, and Reporting
314 Provides a high-level view of Avamar server status and recent history.
315Generates and displays Avamar server reports that capture a snapshot of the
server at one point in time.
Page
Internal Use - Confidential 364 © Copyright 2020 Dell Inc.
Logs, Troubleshooting, and Reporting
Overview Pane
The Fitness Analyzer Overview pane presents a graphical timeline of recent server
activity.
319
Displays statistics and summaries for all VMware proxies and vCenters in the
Avamar environment.
320Reports completed and failed backup jobs with a summary of reports by error
code.
321 Illustrates trends of system health information at the node or resource level.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 365
Logs, Troubleshooting, and Reporting
324The timeline identifies areas of interest, such as high traffic, delayed backups or
replication jobs, and interference between backup activities and server
maintenance. The summaries in the navigation pane provide a breakdown of the
trends indicated here.
Page
Internal Use - Confidential 366 © Copyright 2020 Dell Inc.
Logs, Troubleshooting, and Reporting
Header Pane
The Fitness Analyzer header pane at the top-right corner of the window contains
common controls that apply to all functional areas. It provides access to the
following features:
326Flags are bubbles on the timeline that carry a number and a character. These
values identify important events for specific data series. For example, the flag '1R'
means that a replication group started at the time indicated by the flag's location.
The flag '1G' means that a backup group started at the indicated time.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 367
Logs, Troubleshooting, and Reporting
327 Refreshes the reporting data across all summaries and server health panels
Page
Internal Use - Confidential 368 © Copyright 2020 Dell Inc.
Logs, Troubleshooting, and Reporting
Reports and summaries During the initial creation Results are cached for
do not show active or of each pane, Fitness approximately 15 minutes
running jobs. These jobs Analyzer takes more time from their time of creation.
appear in reports pane than usual to display If moved away from a
and summary panes after results. The subsequent pane, the data may not
completion. results are cached to regenerate until the cache
provide faster results. expires.
Reports
Apart from reports available in MCS and Avamar Administrator, Fitness Analyzer
reporting331 provides two additional reports332.
332Pending Replication shows the number of backups and the amount of primary
data that are awaiting scheduled replication. Avamar - Capacity Report shows the
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 369
Logs, Troubleshooting, and Reporting
Summaries
1
2
3
4
5
1: Group Summary
daily changes in capacity usage, such as new data backed up to the Avamar
subsystem, and capacity freed by garbage collection.
Page
Internal Use - Confidential 370 © Copyright 2020 Dell Inc.
Logs, Troubleshooting, and Reporting
The Group summary tab presents the group summary report334. Its features
include:
2: Replication Summary
335The Group Summary tab shows information about clients and plug-ins that took
part in an activity. This information includes the client name and domain, plug-in
name, start and completion times, duration, amount of data transferred, and result
codes.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 371
Logs, Troubleshooting, and Reporting
3: Client Summary
The Client summary pane provides statistics that summarize the behavior and
attributes of individual Avamar clients.
Page
Internal Use - Confidential 372 © Copyright 2020 Dell Inc.
Logs, Troubleshooting, and Reporting
4: Proxy Summary
The Proxy summary pane summarizes the performance of entities within a vCenter
environment. This pane contains two tabs:
• Proxy Summary337
• Proxy Timeline338
5: Backup Summary
336The Statistics tab contains two panels: a tabular report at left and a graphical
report at right. The tabular report displays all of the recorded client activities over
the duration of the reporting period. The graphical report breaks down the
completion codes for each job in the tabular report.
338The Proxy timeline tab presents a graphical report that plots the scheduled start
and stop times for each activity in the virtual environment within the reporting
period. The timeline displays proxy servers and associated activities in a selected
vCenter.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 373
Logs, Troubleshooting, and Reporting
The Backup summary pane provides statistics that summarize the results of
individual backups on the server. This pane contains three tabs:
• Status codes339
• Error codes340
• History341
6: System Summary
• System configuration
339The Status codes tab presents a top-level summary of backups, sorted based
on result codes, within the reporting period.
340The Error codes tab presents a top-level summary of backups based on error
codes within the reporting period. Fitness Analyzer displays a table with a summary
of each backup, including the client, plug-in, domain and group, backup type, start
and stop times, and related error codes.
341Backup History page displays a table with a summary of each backup, including
the client, plug-in, domain and group, backup type, start and stop times, and result
codes.
Page
Internal Use - Confidential 374 © Copyright 2020 Dell Inc.
Logs, Troubleshooting, and Reporting
• Network configuration
• Software versions
• License information
• Schedule of operations
• Additional Avamar services
• Miscellaneous services
• Detailed node information
Custom event profiles enable you to send notifications, such as emails, when
specific system events occur.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 375
Logs, Troubleshooting, and Reporting
The Avamar Administrator tool can be used to generate reports for several of the
administrator server database views. To create a report:
342 In the New Report window, enter necessary details such as name, title, and
description of the report. select the report view from the drop-down list, and set
filter options. After clicking OK, the report name is listed under the selected domain
in Manage All Reports.
Page
Internal Use - Confidential 376 © Copyright 2020 Dell Inc.
Logs, Troubleshooting, and Reporting
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 377
Logs, Troubleshooting, and Reporting
343
PostgreSQL is an open-source Relational Database Management System
(RDMS).
344
Information in PostgreSQL can be accessed through any PostgreSQL-compliant
Open DataBase Connectivity (ODBC) interface. ODBC includes Crystal Reports,
Page
Internal Use - Confidential 378 © Copyright 2020 Dell Inc.
Logs, Troubleshooting, and Reporting
Database Views
MCS database views define the types of information you can access from the
Avamar Administrator. Shown below are some of the supported database views:
Database Views (1 of 2)
MS Query, and Microsoft Excel. You can also access the information with a local or
remote psql tool.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 379
Logs, Troubleshooting, and Reporting
Database Views (2 of 2)
Page
Internal Use - Confidential 380 © Copyright 2020 Dell Inc.
Logs, Troubleshooting, and Reporting
Data in PostgreSQL database on the Avamar server can be accessed using psql:
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 381
Logs, Troubleshooting, and Reporting
\d Displays all
tables and views
Click to enlarge
Microsoft Query can be used to access the administrator server database and
prepare reports with the information from database views.
Page
Internal Use - Confidential 382 © Copyright 2020 Dell Inc.
Logs, Troubleshooting, and Reporting
345In Microsoft Excel, select Data > Get Data > From Other Sources > From
Microsoft Query, and select MCDatabase as the data source.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 383
Course Summary
Course Summary
Course Summary
Page
Internal Use - Confidential 384 © Copyright 2020 Dell Inc.
Appendix
The Avamar Web User Interface is a web management application that is used to
administer an Avamar server. The AUI can monitor and configure the Avamar
servers, as well as perform all management activities.
Avamar Administrator
The Orchestra REST API extends the native Avamar server REST API to facilitate
the management of multiple Avamar servers. Once you register an Avamar server
with Orchestra, the API provides a single point of interface for management
operations. Orchestra obtains, holds, and supplies the required authentication
tokens on your behalf.
avagent
avagent runs as a service on the client. It establishes and maintains
communication with MCS on the Avamar server. avagent listens for incoming
work orders from MCS on the Avamar server. In response to a work order, such as
a backup or a restore, avagent will spawn avtar. avagent listens on port 28002.
avtar
avtar is the primary process for backups and restores. avtar communicates with the
GSAN processes on the storage nodes. The two types of plug-ins are file system
and application plug-ins.
Note: For the updated list of Avamar supported client file systems,
operating systems, platforms, and applications, please refer to Dell
EMC Avamar Interoperability and Compatibility Matrix available on
the Dell EMC Online Support website.
2. avtar checks in the file cache to see if the file has been backed up before.
3. If there is no match, the file is divided into variable-sized data chunks, and each
chunk is compressed and hashed.
4. The hash cache is checked to determine if each data chunk has been stored
before.
5. If there is no match in the hash cache, avtar checks the Avamar data server
for the hash value.
6. If the hash does not exist on the Avamar server, the backup data, in the form of
the compressed data chunk, and the hash are sent to the Avamar server.
7. The client caches are updated with the applicable hashes.
Hashing Algorithm
Hashing is the process of creating a short fixed-length data string from a large
block of data.
• During hashing, data chunks obtained from compression are input to the SHA-1
hashing algorithm.
• The hash created from each data object is called an atomic hash.
Note: Hashing does not effect the original data chunk. The original
chunk remains intact. Though it is used in hashing, it is not converted
into a hash. After the hashing process, both the data chunk and the
hash exist.
• During installation, the Avamar database clients add plug-ins to the database
server.
• During a backup, the database plug-ins communicate with the database API or
backup facility, and pass data to be backed up to avtar. avtar sends the data to
the Avamar server.
The following are true when the client is running on a separate host that has access
to data in the database:
Avamar Oracle
Agent
Oracle API
Oracle
Database
Server
Avamar
Server
Database
Pros Cons
346With Oracle RMAN incremental backups, Avamar client only scans changed
data. However, all incrementals need to be applied during restore process.
Oracle avtar
Pros Cons
Oracle avtar
Primary
Database
Snapshot
Avamar Server
Pros Cons
Backup Policy
The Backup Policy page enables you to create a backup policy to automate the
backup. The page also enables you to enforce consistent rules and system
behavior across a group of the user community. It is visible to the users who have
ADMIN, ADMIN_CANNOT_RETIRE, BACKUP_ONLY_USER, BACKUP_ADMIN,
REPL_USER privileges. The dataset, schedule, and retention policy comprise the
Backup Policy. The backup policy controls the backup behavior of all the members.
1 2 3
1: The + ADD option allows the user to add a backup policy to run a
backup/restore.
2: The EDIT option allows the user to edit the backup policy that is already created.
3: The MORE ACTIONS option allows you to enable a policy if the policy is
disabled before. Similarly, it also allows you to copy a policy.
4: The Policy details display shows details about dataset, schedule, and retention
settings for the selected policy.
Advanced Policy
The Advanced Policy page allows you to manage all application-consistent SQL
virtual machine backups, including automatic MS-SQL application discovery,
automatic backup group management, and automatic MS-SQL plug in and client
installation and registration. This view is visible to the users who have ADMIN,
ADMIN_CANNOT_RETIRE, REPL_USER privileges.
Replication Policy
The Replication Policy page helps the administrators to copy client backups from
the source Avamar system to an alternate destination that has an Avamar system
or an Avamar system integrated with Data Domain. Replicating backups to an
alternate destination protects against data loss if the source Avamar system fails. It
is visible to the users who have ADMIN and REPL_USER privileges.
1: The + ADD option in the cloud tier policy pane helps you to create a policy to
perform a cloud tier operation.
Setting
The Setting page assists administrators with adding user accounts to the system,
and creating and managing schedules, datasets, retention policies, and rules. It is
visible to the users who have ADMIN, ADMIN_CANNOT_RETIRE, and
REPL_USER, privileges.
1 2 3 4 5
2: Backup retention policies enable you to specify how long to keep a backup in the
system. A retention policy is assigned to each backup when the backup occurs.
Here, you can specify a custom retention policy when you perform an on-demand
backup, or create a retention policy that is assigned automatically to a group of
clients during a scheduled backup.
4: Here, you can create a rule, edit an existing rule, or delete a rule. Rules are used
by the Avamar Server for domain map and automatic backup policy assignment for
auto-discovered VMs.
5: Here, you can create a user account that defines an authentication system that
is used to grant users access to the Avamar server. A user account in Avamar can
administer a domain or client. It also defines the role for a user which controls the
operations that the user can perform.
6: The + ADD option allows you to add a schedule, dataset, retention, rule, and
user for a domain or client.
Proxy Management
VMware VM image backups and restores require the deployment of proxy virtual
machines within the vCenter. Proxies run Avamar software inside a Linux virtual
machine, and are deployed using an appliance template (.ova) file. The Avamar
proxy that you deploy is used for backing up your virtual environment. At a time
eight VMs can be backed up. If you want to backup more than 8 VMs, then you
need to deploy additional Avamar proxies.
The Proxy Management page assists the administrators with deploying and
managing Avamar proxies. This is done by recommending the number of proxies
that should be deployed in each vCenter, and a recommended ESX host location
for each proxy. It is visible to the users who have ADMIN,
ADMIN_CANNOT_RETIRE, and REPL_USER privileges.
System
The System page assists the administrator with configuring vCenter-to-Avamar
authentication, registering the Avamar Plug-in for vSphere Web Client, and adding
a Data Domain system to Avamar. In Avamar 19.1 version, you can add or edit the
RSA Authentication Manager to enable two-factor authentication (2FA) on virtual
machines. This feature provides additional authentication when you perform a VM
restore to ensure security. The System pane is visible to the users who have
ADMIN, ADMIN_CANNOT_RETIRE, and REPL_USER privileges.
For more details about the functionality of each tab, refer to Dell EMC Avamar
Administration Guide.
1 2 3 4 5 6 7
1: The VMware Plugin tab helps the vSphere users to initiate image backups and
restores of virtual machines in their environment.
2: The DD NFS Datastores tab lists the temporary NFS share for VMware instant
access on a configured Data Domain system.
3: The Data Domain tab allows you to add a Data Domain system and edit or
delete an existing system. Similarly, you can also specify a default DD destination
system in a replication environment with more than one destination DD system.
4: The Replication Destination tab allows you to add a replication destination which
is configured before running a replication job.
5: The Storage Mapping tab allows you to map a domain to a Data Domain system,
which is useful where there are multiple destination DD systems available. In such
situations, you can specify the specific system that receives the data that replicates
from the source Data Domain system.
7: The Server Management tab allows you to perform maintenance activities that
include checkpoints, garbage collection, reviewing the backup window.
8: Allows you to import the certificate file from your local system.
Activity
The Activity page provides status and detailed information for backup and
replication jobs. It is visible to the users who have ADMIN,
ADMIN_CANNOT_RETIRE, BACKUP_ONLY_USER,
BACKUP_RESTORE_USER, BACKUP_ADMIN, BACKUP_RESTORE_ADMIN,
REPL_USER, RESTORE_ONLY_USER, RESTORE_ADMIN, and
ACTIVITY_OPERATOR privileges.
2 3
1: It displays all the activities that are in-progress, failed, and completed. The
activities include backup, restore, replication, cloud tier job etc.
2: This option allows you to restart a backup that is complete/failed directly from the
Activity tab.
3: It displays the log information of a specific backup activity. This is useful for any
troubleshooting activities.
4: The Details option displays the complete information about the backup activity
that includes the domain, client, OS, policy, schedule time, retention, and so on.
Event
The Event page helps the administrator to monitor operational status and server
activity. Examples of Avamar events include client registration and activation,
successful and failed backups, and hard disk status. It is visible to the users who
have ADMIN, ADMIN_CANNOT_RETIRE, and REPL_USER privileges.
2 3
4 5
1: It displays the number of events giving warning message, error message, and
critical messages.
2: The FILTER option allows you to filter the events based on date, time, type, and
category.
3: The option allows you to acknowledge those events which are not
acknowledged.
4: Here, you can see all the events that are critical, warning, and errors based on
the filter selected.
Fitness Analyzer
The Fitness Analyzer page allows the administrator to view the server health and
functionality. This allows the administrator to troubleshoot issues, optimize system
performance, or plan future changes.
1: By default, the timeline contains one day of data. To view detailed information for
more than one day, select a different number of days from the Zoom option.
2: Each pane provides detailed information regarding the server health and
summaries.
Administrator
The users with the admin role can perform administrative tasks, backups, and
restores affecting their domain and any sub-domains within their domain. A root
level administrator has full control of the system.
Operator
The users with operator role have access to the specific Avamar Administrator
features they are entitled to use based on their assigned role.
User
The users are not allowed to log in to Avamar Administrator.
With policy-based replication, you can create replication groups in the AUI that
define the following replication settings:
• Replication group members, either domains or clients
• Priority order for replication tasks
• Backups to replicate, based on the retention setting or the backup date
• Maximum number of backups to replicate for each client
• Destination system for the replicas (replication to another Avamar system,
Cloud Tier, or Data
Domain system)
• Replication schedule
• Retention of replicas
Additionally, you can use the AUI to view and manage replicated backups349.
• Windows
Workorder: %SystemDrive%\Program Files\avs\var\clientlogs\
Agent: %SystemDrive%\Program Files\avs\var\
Console: %APPDATA%\Avamar\
• Linux and Mac
Workorder: /usr/local/avamar/clientlogs
Agent: /var/avamar/
Console On Linux: $HOME/
Console on Mac: On Mac:$HOME/.avamardata/
Avtar logs are labeled: <backup_label>-<plugin>.log. Listed below are the formats
of a few of the logs:
• Scheduled backups:
− <Schedule name>-<Group name>-<Unix time in msec>
• Ad-hoc group or client backups using a defined group policy:
− <Group name>-<Unix time in msec>
• Ad-hoc backups that are performed through Backup and Restore:
− MOD-<Unix time in msec>
Resolve Exceptions
Do not ignore exceptions and failures, since it may lead to missing files or data.
Check for the following exceptions.
• Completed with Exceptions: The message indicates that the backup is complete
with files missing.
• Timed Out - End: The status requires special attention. This indicates a large
amount of activity without any backup data being restored.
• Dropped Session: The status indicates that the activity was forcefully canceled.
The two possible causes are:
− Client reboot
− More than an hour of communication outage
• Completed: The status indicates that backup was completed as per defined
policies. However, make sure the policies are defined correctly.
Performing a Rollback
To rollback to a specific checkpoint:
Forced Rollbacks
If a data server (gsan) did not shut down correctly, dpnctl prompts for a rollback
upon restart. A rollback can also be forced using the --force_rollback option
in dpnctl start.
Exceptions
The following exceptions need to be considered.
Fitness Analyzer also works with existing Management Console Server (MCS)
reporting functions to provide old reports that were available through Avamar
Administrator.
Legend
Legends, situated below the timeline, identify each data series and the type of
activity. Legends interpret graphical, color-coded data in the timeline.
Legend Description
Scale
By default, the timeline contains one day of data. A Scale placed below the timeline
enables the administrator to view data for other time periods of time.
The Zoom control above the timeline can be used to view information from different
set of dates. The Overview pane displays a maximum of one week of data.
Bytes View
The Bytes view toggle button, at the top-right corner of the timeline, changes the
display units for the horizontal axis to Giga Bytes, so that the timeline represents
the amount of raw data that is transferred to the Avamar server. This view
distinguishes the relative impact of each group on the server.
Generating Reports
2. If the report requires start and end dates to be generated, select appropriate
values from the 'From Date' and 'To Date' fields.
3. Click on the Generate button
4. Select a report format from the drop-down
Accessing Reports
After the report is generated, the finished report becomes available in the
Completed Reports panel.
1. In Avamar Administrator, select Tools > Manage Profiles. The Manage All
Profiles window is displayed.
2. In the left pane, select the domain for the custom event profile, and click New.
The New Profile wizard appears.
3. In the Profile Name box, type a name for the event profile.
4. For Profile Type, keep the default setting of Email, Syslog, and SNMP Trap
Notification.
5. Enable the profile by checking the Profile Enabled checkbox.
6. Enable email notifications by checking the Email Enabled checkbox.
7. Select either 'Send data as events occur' or 'Send data on a schedule', as per
requirement.
8. In the Email Notification tab, add the recipient email list, and finally click OK to
confirm the settings.
nodenumbers
Used to display the logical node number, physical node number, IP address, and
MAC address of the storage nodes in the Avamar server.
Plug-in
A plug-in is a software component that adds a specific feature to an existing client.
When a client supports plug-ins, it enables customization for the customer.
The plug-in type indicates the top 10 most frequently used plug-ins by the clients.
The total client count indicates the number of clients that use a specific plug-in.
Similarly, the total protected GB indicates the total amount of data in GB that the
system protects for each plug-in type.
probe.xml
The probe.xml file supports both Network Address Translation (NAT) and multiple
network interfaces. Node types can be specified in probe.xml include utility,
storage, access, accelerator, spare, single-node server, and unclassified.