Professional Documents
Culture Documents
Using the TSM client support for Windows 2000 Planning and implementing backup scenarios Restoring Windows 2000 objects
ibm.com/redbooks
SG24-6141-00
International Technical Support Organization Deploying the Tivoli Storage Manager Client in a Windows 2000 Environment
April 2001
Take Note! Before using this information and the product it supports, be sure to read the general information in Appendix A, Special notices on page 157.
First Edition (April 2001) This edition applies to Tivoli Storage Manager V4.1.2 for use with the Microsoft Windows 2000 Operating System. Comments may be addressed to: IBM Corporation, International Technical Support Organization Dept. 471F Building 80-E2 650 Harry Road San Jose, California 95120-6099 When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you.
Copyright International Business Machines Corporation 2001. All rights reserved. Note to U.S Government Users Documentation related to restricted rights Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp.
Contents
Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii Tables. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .ix Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xi The team that wrote this Redbook . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi Comments welcome . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii Chapter 1. Introducing TSM client support for Windows 2000 . . . . . . . 1 1.1 Types of Windows 2000 implementations . . . . . . . . . . . . . . . . . . . . . . . 1 1.1.1 Windows 2000 Professional . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.1.2 Windows 2000 Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.1.3 Windows 2000 Advanced Server . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.1.4 Windows 2000 Datacenter Server. . . . . . . . . . . . . . . . . . . . . . . . . 2 1.2 Introduction to TSM 4.1.2 support for Windows 2000 . . . . . . . . . . . . . . 3 1.3 System State components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.3.2 System boot files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 1.3.3 Registry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 1.3.4 Event logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 1.3.5 COM+ Class DB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 1.3.6 Certificate Services DB. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 1.3.7 Active Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 1.3.8 System Volume (SYSVOL) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 1.3.9 File Replication Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 1.3.10 Cluster DB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 1.4 File System (NTFS) components . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 1.4.1 Encrypted File System (EFS) . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 1.4.2 Reparse Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 1.4.3 Multiple Named Data Streams . . . . . . . . . . . . . . . . . . . . . . . . . . 13 1.4.4 The Change Journal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 1.4.5 Sparse file support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 1.4.6 Distributed Link Tracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 1.4.7 Directory Junctions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 1.4.8 Volume Mount Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 1.5 Storage components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 1.5.1 Disk Quotas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 1.5.2 Distributed File System (DFS) . . . . . . . . . . . . . . . . . . . . . . . . . . 16 1.5.3 Single Instance Store . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 1.5.4 Removable Storage Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 1.5.5 Remote Storage Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
iii
1.5.6 Indexing service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Chapter 2. Introducing Tivoli Storage Manager 4.1.2 client . . . . . . . . . 19 2.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 2.2 New features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 2.2.1 System Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 2.2.2 SYSTEMOBJECT domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 2.2.3 System Objects managed as a group . . . . . . . . . . . . . . . . . . . . . 21 2.2.4 New commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 2.2.5 Support for mobile computer users enhanced. . . . . . . . . . . . . . . 24 2.2.6 ODBC driver not included . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 2.2.7 InstallShield for Windows Installer used . . . . . . . . . . . . . . . . . . . 24 2.2.8 Registry backup now processes all hives . . . . . . . . . . . . . . . . . . 24 2.2.9 Event log backup now processes all logs . . . . . . . . . . . . . . . . . . 25 2.2.10 Restore to same location only. . . . . . . . . . . . . . . . . . . . . . . . . . 25 2.2.11 Management class . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 2.3 What has changed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 2.3.1 System Objects require new backup . . . . . . . . . . . . . . . . . . . . . . 25 2.3.2 Changed commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 2.3.3 Local backup only. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 2.3.4 One step backup and restore of System State . . . . . . . . . . . . . . 26 2.3.5 BACKUPREGISTRY option redundant . . . . . . . . . . . . . . . . . . . . 26 2.3.6 Restore without services active . . . . . . . . . . . . . . . . . . . . . . . . . 26 2.4 What has been fixed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 2.4.1 APAR list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 2.5 Advantages of TSM versus Microsoft NTbackup. . . . . . . . . . . . . . . . . 28 2.5.1 Using NTbackup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 2.5.2 Using Tivoli Storage Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Chapter 3. Implementation planning . . . . . . 3.1 Tivoli Storage Manager Server code level 3.2 Server registration modes . . . . . . . . . . . . 3.3 Server storage . . . . . . . . . . . . . . . . . . . . . 3.3.1 Database size calculation . . . . . . . . . 3.3.2 Recovery Log size calculation . . . . . 3.3.3 Primary storage pool size calculation 3.4 Network bandwidth . . . . . . . . . . . . . . . . . . 3.5 Warnings about migration from a previous 3.6 Software requirements . . . . . . . . . . . . . . . 3.7 Hardware requirements . . . . . . . . . . . . . . 3.8 User permissions for Windows 2000. . . . . 3.9 System information. . . . . . . . . . . . . . . . . . ......... ......... ......... ......... ......... ......... ......... ......... client level ......... ......... ......... ......... .. .. .. .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. .. .. .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 . 31 . 32 . 32 . 33 . 35 . 36 . 36 . 37 . 38 . 38 . 39 . 39
iv
Chapter 4. Installation and setup . . . . . . . . . . . . . . . . . . . . . . . 4.1 Include-exclude list. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.2 Tivoli Storage Manager 4.1.2 client install procedure . . . . . . . 4.2.1 Tivoli Storage Manager Client configuration wizards. . . . 4.3 ODBC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.4 Post install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.5 Uninstalling the client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.5.1 Remove services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.5.2 Remove code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.5.3 Remove temporary files . . . . . . . . . . . . . . . . . . . . . . . . . 4.5.4 Remove miscellaneous files . . . . . . . . . . . . . . . . . . . . . . 4.6 Tips and hints. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.6.1 Installation using Terminal Server. . . . . . . . . . . . . . . . . . 4.6.2 Renaming the Tivoli Storage Manager client node name Chapter 5. Windows 2000 backup . . . . . . . . . . . . . . . 5.1 Philosophy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.2 Permissions required . . . . . . . . . . . . . . . . . . . . . . . 5.2.1 Back up system objects . . . . . . . . . . . . . . . . . 5.2.2 Back up regular files . . . . . . . . . . . . . . . . . . . . 5.3 Scheduled backups . . . . . . . . . . . . . . . . . . . . . . . . 5.4 Client-controlled backups . . . . . . . . . . . . . . . . . . . . 5.4.1 GUI. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.4.2 Command line . . . . . . . . . . . . . . . . . . . . . . . . 5.4.3 Web client interface . . . . . . . . . . . . . . . . . . . . 5.5 Backing up Windows 2000 Professional . . . . . . . . . 5.6 Backing up system objects . . . . . . . . . . . . . . . . . . . 5.6.1 \ADSM.SYS contents . . . . . . . . . . . . . . . . . . . 5.6.2 Individual system object component backup . . 5.6.3 Creating inactive versions of System Objects . 5.7 Backing up DFS . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.7.1 DFSBACKUPMNTPNT YES . . . . . . . . . . . . . . 5.7.2 DFSBACKUPMNTPNT NO . . . . . . . . . . . . . . . 5.8 Tips and hints. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.8.1 Backup frequency . . . . . . . . . . . . . . . . . . . . . . 5.8.2 Perform test restores . . . . . . . . . . . . . . . . . . . 5.8.3 Windows 2000 user profiles . . . . . . . . . . . . . . 5.8.4 Transaction limits . . . . . . . . . . . . . . . . . . . . . . 5.8.5 MSINFO command . . . . . . . . . . . . . . . . . . . . . 5.8.6 Tree view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
.. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. ..
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. 43 . 43 . 45 . 51 . 71 . 72 . 72 . 72 . 72 . 72 . 73 . 73 . 73 . 73 . 75 . 75 . 76 . 76 . 76 . 77 . 77 . 77 . 78 . 78 . 78 . 79 . 80 . 80 . 84 . 85 . 86 . 87 . 87 . 87 . 87 . 88 . 88 . 89 . 89
6.2 Restoring a Windows 2000 system . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 6.2.1 Restore methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 6.2.2 The role of the System Object in the restore process . . . . . . . . . 93 6.2.3 Restoring a Windows 2000 Professional or member server . . . . 94 6.2.4 Restoring a Win 2000 domain controller (non-authoritatively) . . 102 6.3 Restoring Windows 2000 objects . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 6.3.1 Restoring components from the TSM System Object . . . . . . . . 111 6.3.2 Distributed File System (DFS) . . . . . . . . . . . . . . . . . . . . . . . . . 131 6.3.3 Disk quotas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 6.3.4 Sparse files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 6.3.5 Junction points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147 6.3.6 Removable Storage Management (RSM) . . . . . . . . . . . . . . . . . 148 6.3.7 Other Windows 2000 databases . . . . . . . . . . . . . . . . . . . . . . . . 150 6.4 Restoring user profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150 6.5 Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 6.5.1 Restoring Windows 2000 Professional or member server . . . . . 154 6.5.2 Restoring a Domain Controller (non-authoritatively) . . . . . . . . . 155 Appendix A. Special notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 Appendix B. Related publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161 B.1 IBM Redbooks publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161 B.2 IBM Redbooks collections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 B.3 Tivoli publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 How to get IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 IBM Redbooks fax order form . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 IBM Redbooks review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
vi
Figures
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. System State in NTbackup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 System Object in Tivoli Storage Manager Client . . . . . . . . . . . . . . . . . . . . . 6 Example of System Objects in the GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Example of a Query Systemobject command . . . . . . . . . . . . . . . . . . . . . . 21 Example of query inclexcl command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Example of show systemobject command. . . . . . . . . . . . . . . . . . . . . . . . . 24 Recommended include-exclude list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 Select language . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 InstallSheild starts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Choose destination folder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 Select type of install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 Custom setup menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Ready to install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 InstallSheild complete . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 Start setup wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 Choose type of install using the wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Create a new dsm.opt file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 Enter node name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 Choose communication method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Set TCP/IP parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Modify domain and include-exclude list . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 Install a new Web client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Select options file. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 Set Web client parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Enter node name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 Enter login account ID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 Web client is done . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Install a new client scheduler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Enter scheduler name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 Choose scheduler options file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 Set log file names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 Enter node name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 Select login account ID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 Scheduler options done . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 Client scheduler installed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 Tivoli Storage Manager Client Service settings . . . . . . . . . . . . . . . . . . . . . 71 Example of System Objects in the GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 Example of a System Object Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 Query filespace command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 Example of a Query Systemobject command . . . . . . . . . . . . . . . . . . . . . . 82
vii
41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. 52. 53. 54. 55. 56. 57. 58. 59. 60. 61. 62. 63. 64. 65. 66. 67. 68. 69. 70. 71. 72. 73. 74. 75. 76. 77. 78.
Example of Query Occupancy command . . . . . . . . . . . . . . . . . . . . . . . . . 82 GUI restore screen showing dates, times System Objects backed up . . . 83 a simple DFS configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 Example of Query systemobject command . . . . . . . . . . . . . . . . . . . . . . . . 94 Restore options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Successful Windows 2000 recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 Restore options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 Successful Windows 2000 recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 System Object Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 Example of authoritative restore command . . . . . . . . . . . . . . . . . . . . . . . 120 Restore System Volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 Example of a Complete Sysvol Directory Structure . . . . . . . . . . . . . . . . . 122 Example of Active Directory Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 Example of authoritative restore command . . . . . . . . . . . . . . . . . . . . . . . 124 System Volume (sysvol) Folder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Group policy object GUID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 System Volume Policy Folder s Identified by GUID. . . . . . . . . . . . . . . . . 127 Registry staging area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 Event Log Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 File level restore tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 DFS Link selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 Dialog box to specify objects destination . . . . . . . . . . . . . . . . . . . . . . . . . 136 File replace dialog box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 Status report post restoration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 Not available share . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 Not able to restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 Selecting data to restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140 Nonexistent target directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141 Restoring links directories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142 Restoring files from links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142 Nonexistent pointed directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 Changing the IDLETIMEOUT parameter . . . . . . . . . . . . . . . . . . . . . . . . . 147 Selecting the RSM database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 Reboot option after RSM restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150 Restoring a user profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152 File replace dialog box for user profiles . . . . . . . . . . . . . . . . . . . . . . . . . . 153 File replace on reboot for user profiles . . . . . . . . . . . . . . . . . . . . . . . . . . 153 Reboot message to apply changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
viii
Tables
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. Comparison of selected features in Windows 2000 implementations . . . . . 1 Tivoli Storage Manager client support for Windows 2000 . . . . . . . . . . . . . . 3 Windows 2000 event log file names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Server planning tasks checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Client planning task checklist. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Typical disk space occupancy, Windows 2000 Systems (system data) . . 33 Sample client requirements worksheet . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Rules of thumb for selecting percentage of data changed. . . . . . . . . . . . . 35 Typical data compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 Disk requirements for Tivoli Storage Manager Client . . . . . . . . . . . . . . . . 39 System Information sheet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Tivoli Storage Manager services settings . . . . . . . . . . . . . . . . . . . . . . . . . 71 Windows 2000 Restore Process Summary . . . . . . . . . . . . . . . . . . . . . . . . 94 Windows 2000 Domain Controller FSMO Roles . . . . . . . . . . . . . . . . . . . 103 Domain Controller Restore Process Summary . . . . . . . . . . . . . . . . . . . . 104 Active Directory Restore Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 Example scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 What is restored for each DFSBACKUPMNTPNT option . . . . . . . . . . . . 132
ix
Preface
This IBM Redbook will help you use the Tivoli Storage Manager (TSM) client at level 4.1.2 with Microsoft Windows 2000. It is intended as a supplement to other TSM redbooks and documentation. This book explains special considerations for using the TSM 4.1.2 client with Windows 2000. We cover implementation planning, installation, and setup, various backup considerations, and their associated restore methodologies. This book is not intended to be a Windows 2000 primer or to cover TSM server implementation. Readers are expected to be familiar with MS Windows 2000 administration concepts, functions, and features. Typically, they will be planning the deployment of Windows 2000, or will have already deployed it. We assume a basic understanding of TSM concepts and a good working knowledge of previous TSM clients (GUI and command line interfaces).
xi
Saskatchewan. His areas of expertise include OS/390, storage management, and ADSM/TSM. He has co-authored one previous IBM Redbook. Andrew Pearce is a Systems Technologist at Computer Sciences Corporation in Wollongong, New South Wales, Australia. He has 7 years of experience in the distributed systems field, working with Windows NT based systems since 1994. He has spent the last year working on a Windows 2000 design project for one of Australias largest companies. His areas of expertise include storage management and data recovery. Thanks to the following people for their invaluable contributions to this project: Jim Smith Tivoli Systems Mike Dile Tivoli Systems Don Moxley Tivoli Systems
Comments welcome
Your comments are important to us! We want our Redbooks to be as helpful as possible. Please send us your comments about this or other Redbooks in one of the following ways: Fax the evaluation form found in IBM Redbooks review on page 171 to the fax number shown on the form. Use the online evaluation form found at ibm.com/redbooks Send your comments in an Internet note to redbook@us.ibm.com
xii
As shown in Table 1, each implementation is aimed at a specific market and contains progressively more capability.
Table 1. Comparison of selected features in Windows 2000 implementations
Professional Maximum CPUs supported Maximum memory supported Services like Active Directory Clustering Network Load Balancing Winsock Direct 2
Server 4
Advanced Server 8
Datacenter Server 32
4 GB
4 GB
8 GB
64 GB
No
Yes
Yes
Yes
No No No
No No No
We did not test Windows 2000 Datacenter Server and it is not covered in this redbook.
Windows 2000 component System State related System boot files Registry Event Logs COM+ database Performance counters Certificate Services database System Volume directory Active Directory
Comments
yes yes yes yes yes yes yes yes Non-authoritative restores only. Use NTDSUTIL for authoritative restores. Included in system files
File Replication service Cluster database Storage Related Disk Quotas Single Instance Store Removable Storage Management database Remote Storage Service database
yes yes
Windows 2000 component Distributed File System Indexing Service NTFS Related NTFS Reparse Points NTFS Directory Junctions NTFS Volume Mount Points NTFS Spare Files Terminal services db NTFS Change Journal
Comments
yes yes yes yes No No Not required. Tivoli Storage Manager will back up changed data.
yes yes
1.3.1 Introduction
Windows 2000 has several key components (represented as files and databases) that are logically grouped together to ensure the operating system is backed up in a consistent state. Microsoft defines the collection of these components as the System State. Figure 1 illustrates the logical grouping of System State components in the Windows 2000 native backup application, NTbackup.
Rather than using Microsofts logical place holder (the System State), the Tivoli Storage Manager client places individual components (such as Active Directory and the registry) in the Tivoli Storage Manager System Object. This is shown in Figure 2. Other Windows 2000 features that are not part of the Microsoft System State, such as the Removable Storage Management database, are also included as components of the Tivoli Storage Manager System Object.
Note
The Tivoli Storage Manager client does not use the concept of the System State. Windows 2000 components which Microsoft has placed in the System State, have been placed in the Tivoli Storage Manager clients System Object. It is very easy to become confused when the terms System State and System Object are used together. Therefore, System State will only be used when the discussion is aimed at areas not specific to the Tivoli Storage Manager client.
The TSM concept of System Object is meant to be a generic description of any set of related files on any operating system. For example, System Object might some day have a similar definition on a UNIX system. 1.3.1.1 Dependency issues The Tivoli Storage Manager client has the ability to process the System Object components either granularly (that is as isolated components) or as a single entity. Unfortunately, the granular functionality cannot be fully exploited in the current version of Windows 2000. This is because of dependencies that exist at the operating system level between key Windows 2000 components. Dependencies mainly exist between the distributed services running on Windows 2000 domain controllers making it inadvisable to backup or restore one item in isolation. Examples of this are: The Windows 2000 System Volume (SysVol) is a replicated data set containing policies and scripts used by Active Directory. If the SysVol and Active Directory are not synchronized, it is likely that one will contain cross references to data that does not exist in the other. The Active Directory publishes references to the Distributed File System (DFS). If the Active Directory is backed up without considering DFS, it is possible that a restored Active Directory could publish broken DFS links.
The Windows 2000 registry contains housekeeping information on the Active Directory such as when to perform database consistency checks or a re-index operation. Windows 2000 Professional and member server systems are also affected by dependency issues. The most vivid example of this is the relationship between the System Files and the Registry, with the latter making references to files contained in the System Files component. To ensure that the integrity of backups are maintained, the following rules should be adopted for all Windows 2000 systems: Always back up the entire System Object. This is of particular importance on systems running Active Directory. Do not create a backup policy which partially backups up the System Object and expect the data to be restored in a consistent manner. For example, adopting a policy of backing up the entire System Object each weekend and just the Active Directory nightly is not recommended. Do not restore an isolated component from the System Object unless you are certain that it does not depend on another. The Windows 2000 Event logs are an example of a System Object component that can be safely restored in isolation In order to meet the objectives required for a consistent Windows 2000 backup, the Tivoli Storage Manager Client will only perform a full backup of all components in the System Object. For example, when backing up the System Files component, all files that make up the System Files are backed up in every job. An incremental backup is not performed.
Note
To understand more about the dependencies that exist in Windows 2000, please refer to Microsofts documentation on backup and restore. Two suggested documents are: Windows 2000 Server Distributed Systems Guide (part of the Windows 2000 Server resource kit) Windows 2000 Server Disaster Recovery Guidelines whitepaper at:
http://www.microsoft.com/TechNet/win2000/recovery.asp
1.3.1.2 Remote backup and restore The backup of System State components must be processed locally by the Tivoli Storage Manager client. System State components cannot be backed up remotely using a mapped drive. 1.3.1.3 How System Object components are processed The Tivoli Storage Manager client must use three different methods when processing the System Object components. This is due to the way the Windows 2000 backup APIs allow each component to be accessed. All processing is done under-the-covers and does not require any intervention from the Tivoli Storage Manager administrator. Smaller system objects such as the registry, event logs and COM+ database are dumped to files in a staging folder called ADSM.SYS. From here, Tivoli Storage Manager backs up system object data as standard files. The process for restores is reversed. This behavior can be observed in the dsmsched.log file on the client. It is important that the staging file, ADSM.SYS, is not excluded from processing. The statement INCLUDE :\ADSM.SYS\...\* should be included as the last statement in the dsm.opt file. For the larger database components, for example, Active Directory and Certificate Services, Tivoli Storage Manager makes API calls to backup directly from the database and transaction log files. Components such as the Sysvol, FRS, system and boot files are enumerated from the operating system and backed up as regular files.
The System File Protection service catalog file All files protected by System File Protection. These are files that have been installed from the Windows 2000 installation CD-ROM with extensions SYS, DLL, EXE, TTF, FON and OCX. For more information on
Windows 2000 System File Protection, see the Tivoli Storage Manager v3.73 and v4.1 Technical Guide, SG24-6110. Performance Counter Configuration files - \system32\perf?00?.dat - \system32\perf?00?.bak
1.3.3 Registry
The Windows 2000 Registry no longer allows individual Registry hives to be selected for backed up. Instead, a full backup of the Registry will always be performed. The Tivoli Storage Manager client uses information in the Registry to identify the nonvolatile Registry hives which are candidates for backup. Note that individual Registry hives can be activated using the REGREST utility which is provided in the Windows 2000 Resource Kit.
Event log System Application Security Directory Services IExplorer DNS server File Replication
10
11
The replication service stores data in both the directory services database and a local Jet database. The backup and restore of replicated data is controlled by the Windows 2000 File Replication Service (FRS). FRS is employed by Active Directory and Distributed File System (DFS) to replicate critical files for performance and availability. Tivoli Storage Manager provides backup and restore of data under the control of FRS. Tivoli Storage Manager obtains a list of directories from the FRS that are replicated, and then backs up all files and directories under this list of directories. FRS files are grouped as a System Object component and there is no file level granularity available for backup or restore; only the FRS System Object component can be restored.
1.3.10 Cluster DB
The cluster database component will only be present in the System Object if the server is running as a cluster node. The cluster database contains information about all physical and logical elements in a cluster. Tivoli Storage Manager backs up this information using standard interfaces designed to ensure restore consistency.
12
13
Tivoli Storage Manager Client supports Multiple Named Data Streams backed up or restored on NTFS 5 partitions. Files are restored normally within Named Data Streams but Data Streams attached to directories always overwrite the existing streams independently of the Client configuration. When these objects are restored to other type of partitions (NTFS4, FAT, FAT32) the Named Data Streams are not restored. Sparse Named Data Streams are not supported.
14
Link Tracking and Object IDs are stored as part of the Registry information. This must be considered when applications are restored to ensure reliability. Tivoli Storage Manager Client supports this feature as an addition to Registry backup and System files.
15
2. The restore is being made by an administrator but the data belongs to a normal user. In the first case the user can only restore as many files as its quota allows. When the limit is reached a full disk message appears. In the second case the ownership of files restored by an administrator reverts to the administrator if the file owners quota is exceeded.
16
The Removable Storage Management service uses a database which stores the devices configurations in an NTFS format. The Tivoli Storage Manager Client uses API calls to backup and restore the files comprising this database.
17
18
2.1 Background
Tivoli Storage Managers direction for backing up Windows 2000 is partly determined by features and functions introduced in Windows 2000 by Microsoft. As new features such as Active Directory are introduced, Tivoli Storage Manager must develop a process to back up and restore these features. Also, in many cases, Tivoli Storage Manager uses interfaces published by Microsoft to access these features. This frees Tivoli Storage Manager from having to create their own interfaces and, at the same time, limits Tivoli Storage Manager to following requirements set by Microsoft. In some cases, these Microsoft features or interfaces may not yet be completely developed, completely implemented, or completely standardized by Microsoft. In this case, Tivoli has the unenviable task of developing Tivoli Storage Manager code and processes to handle what is stable and developing a work-around for what is not. Sometimes the result is less than elegant. An example of this lack of clear direction is the different facilities Microsoft provides to back up the various objects that make up the System Object. Some components, primarily databases, can be backed up directly using Microsoft APIs, but even here, the interfaces are not standard. For other components, such as the Registry, Tivoli Storage Manager must internally call Microsoft tools to export the Registry to a staging directory and back it up from there.
19
20
tsm> query systemobject Size Backup Date -------------17,661 12/07/2000 10:55:37 135,258 12/07/2000 10:55:56 231,108,288 12/07/2000 10:55:29 18,093 12/07/2000 10:55:50 48,267,344 12/07/2000 10:55:54 10,006,668 12/07/2000 10:55:38 117,074 12/07/2000 10:55:38
A/I --A A A A A A A
21
The new commands are: QUERY QUERY QUERY QUERY QUERY QUERY QUERY QUERY QUERY QUERY QUERY SYSTEMOBJECT ACTIVEDIRECTORY CERTSERVDB CLUSTERDB COMPLUSDB EVENTLOG FRS REGISTRY RSM SYSFILES SYSVOL
2.2.4.3 RESTORE SYSTEMOBJECT This command restores all active Windows 2000 System Objects stored on the server. 2.2.4.4 QUERY INCLEXCL This command displays the include-exclude list in the order it will be processed. It displays the type of option (include, exclude, exlude.dir, and so on), the scope of the option (archive, all, and so on), and from where the option originated (dsm.opt, and so on). See Figure 5 for an example of the command output.
22
Tivoli Storage Manager Command Line Backup Client Interface - Version 4, Release 1, Level 2.0 (C) Copyright IBM Corporation, 1990, 2000, All Rights Reserved. tsm> query inclexcl Node Name: AAXABK Session established with server BRAZIL: AIX-RS/6000 Server Version 4, Release 1, Level 1.0 Server date/time: 12/05/2000 11:34:24 Last access: 12/05/2000 09:56:17 *** FILE INCLUDE/EXCLUDE *** Mode Function Pattern (match from top down) Source File ---- --------- ------------------------------ ----------------Excl Directory #\RECYCLER dsm.opt Excl Directory #\RECYCLED dsm.opt Excl Directory #\...\TEMPORARY INTERNET FILES dsm.opt Excl Directory #\SYSTEM VOLUME INFORMATION dsm.opt Excl Directory #\...\NTDS dsm.opt Excl Directory #\...\NTFRS\JET dsm.opt Incl All #\ADSM.SYS\...\* dsm.opt Excl All #\...\SYSTEM32\CONFIG\...\* dsm.opt Excl All #\...\PAGEFILE.SYS dsm.opt Excl All #\...\EA DATA. SF dsm.opt Excl All #\WINNT\DEBUG\*.* dsm.opt Excl All #\DOCUME~1\ADMINI~1.PAC\LOCALS~1\TEMP\...\* dsm.opt Excl All #\WINNT\SCHEDLGU.TXT dsm.opt Excl All #\HIBERFIL.SYS dsm.opt Excl All #\WINNT\NETLOGON.CHG dsm.opt Excl All #\WINNT\SYSTEM32\DTCLOG\MSDTC.LOG dsm.opt Excl All #\DOCUMENTS\...\INDEX.DAT dsm.opt Excl All #\WINNT\REGISTRATION\*.CLB\...\*.CRMLOG dsm.opt Excl All #\WINNT\CSC\...\* dsm.opt No encryption include/exclude statements defined. tsm> Figure 5. Example of query inclexcl command
2.2.4.5 Undocumented Show SYSTEMOBJECT command An undocumented command is available in the 4.1.2 version of the Backup Archive Client command line interface. It appears to display whether a System Object has ever been backed up in the life of this client node. Note that the return codes listed can be used by TSM technical support to help diagnose System Object backup and recovery problems. The syntax of the command is Show Systemobject. An example of the command and its output is shown in Figure 6.
23
Tivoli Storage Manager Command Line Backup Client Interface - Version 4, Release 1, Level 2.0 y (C) Copyright IBM Corporation, 1990, 2000, All Rights Reserved. tsm> show systemobject Node Name: SILVER Session established with server BRAZIL: AIX-RS/6000 Server Version 4, Release 1, Level 1.0 Server date/time: 11/22/2000 13:51:26 Last access: 11/22/2000 13:42:07 stat ---OK n/a OK n/a n/a OK n/a n/a OK OK tsm> rc ---0000 4312 0000 4312 4312 0000 4312 4312 0000 0000 system object ------------COM+ Database Certificate Server Database Event Log File Replication Service MSCS Database System and Boot Files System Volume Windows NT Directory Services Registry RSM Database
24
25
26
IC26949 - Message ANS1155E issued even if client is correctly configured for cluster support. IC26973 - When a file is skipped because it is changed, the Event Log entry only says Changed. It needs to be more descriptive. IC27088 - Client fails to observe exclude option if the option is specified in both dsm.opt and client options set. IC27199 - Tivoli Storage Manager admin command line NLS client is not processing DO YOU WISH TO PROCEED Y/N response as expected. IC27203 - Setup wizard for BA client not updating domain, ALL-LOCAL and selected filespaces should be exclusive options. IC27260 - When backing up file system that contains corrupted directories the client terminates processing without appropriate message. IC27264 - Windows client wizard 3.7.2.01 configures an invalid path for the client scheduler service. IC27315 - Tivoli Storage Manager client classic restore stops after 21 failures when data is unavailable on the server (ANS1314E). IC27371 - Root object / not rebound after deletion of management class. IC27382 - The httpport Registry setting is ignored by the Web client. IC27409 - Schedule reports Scheduled event completed successfully in spite of errors during backup. IC27528 - If a directory is removed after the archival of the higher level directory, the archive operation terminates with ANS4006E. IC27728 - DSMC RESTORE SYSFILES does not restore all system files if the backup was done with COMPRESSION=YES & COMPRESSALWAYS=NO. IC27750 - Unnecessary and misleading error messages are being written to the dsmerror.log file. IC27695 - API clients core dump if DIRMC is in dsm.sys file. IC27852 - Windows does not parse the DOMAIN statement correctly, when combining ALL-LOCAL with a drive. IC27992 - Trace flag AUDIT crashes Tivoli Storage Manager Web GUI and OS when prompted for offline media mount and choosing WAIT FOR VOLUME TO BE MOUNTED IC28337 - Too long command line arguments make Tivoli Storage Manager client crash.
27
IC28340 - CLC 'Successful deletion' message not received when deleting an archived file. IC28454 - ENCRYPTKEY option in GUI displays SAVE ENCRYPTION KEY PASSWORD LOCALLY even if Encryptkey prompt is specified in DSM.OPT IC28468 - Using ODBC in MS ACCESS to link a Tivoli Storage Manager table containing > 100 entries fails with error 3146. IC28492 - Client fails to send events to server. IC28544 - Automatically adjust clock for daylight savings changes causes incremental to do full backup. IC28545 - ANS5016E Not enough memory for restore operation. IC28565 - Wrong statistics at end of DSMC ARCHIVE. IC28568 - APAR IC25107 Win32 RC = 193 Error not resolved if file c:\program exists and DSMCUTIL install uses C:\Program Files.
28
2.5.2.1 Network backup Tivoli Storage Manager can back up over a network connection, allowing for centralized control and centralized data storage. 2.5.2.2 Policy management Tivoli Storage Manager has powerful policy management functions that allow for numerous different retention and expiration dates for different types of data.
29
30
Task Check Tivoli Storage Manager Server code level Verify server registration modes Update your server storage Calculate network bandwidth
Table 5. Client planning task checklist
Task Check warnings to migration Verify software requirements Verify hardware requirements Get user rights for Windows 2000 Obtain system information
Data that has been backed up from a Tivoli Storage Manager 4.1 Client or higher cannot be restored to a Tivoli Storage Manager 3.7 or lower.
31
32
remain in the Active Directory before the system permanently removes them; the default is 60 days). If you try to restore Active Directory data older than the Tombstone date, the restore APIs will reject data as out of date. Backups must be done frequently. To estimate the Database, Recovery Log and storage pools size needed to store information about Windows 2000 systems, the following information in Table 6 could be useful:
Table 6. Typical disk space occupancy, Windows 2000 Systems (system data)
Note
In the following sections we provide some guidelines to size disk storage volumes to allow you set up or modify your Tivoli Storage Manager Server environment to support the Windows 2000 clients. If additional planing information is needed, it is recommended that you review Getting Started with Tivoli Storage Manager: Implementation Guide, SG24-5416.
Client 1 Client name Contact information Operating systems Number of files backed up Number of backed up GB John Mack Servers Group Windows 2000 Professional 1000 2
Client 3 Sarah Smith Mobiles Group Windows 2000 Adv. Server Not Available 3
33
Client 1 Number of backup versions to keep GB changed per backup Data compression Backup window (hrs.) 2 0.02 0.66 4
Client 3 3 0.3 0 6
To estimate new and additional space to your current database, follow these steps: 1. Add the Number of backed up files for all clients with the same Number of Versions to keep. 2. Multiply this number by Number of Versions to keep to obtain the total files to be stored. 3. Multiply this number by 600 bytes to obtain the total bytes needed in the database to store information about files to be stored. 4. Add the Number of GB backed up for all clients with the same Number of versions to keep and multiply this number by Number of versions to keep and by 5% to obtain the total bytes needed in the database to store information about files to be stored. 5. Add the results obtained from steps 3 and 4 to obtain the total bytes needed in the database for backup files. 6. If you use a copy storage pool, multiply the results of step 2 by 200 to obtain the total bytes needed in the database to store storage pool file information. 7. If you use a copy storage pool, multiply the sum of Number of GB backed up for all clients with the same Number of versions to keep and multiply this number by Number of versions to keep and by 1% to obtain the total bytes needed in the database to store storage pool file information. 8. Add the results obtained from steps 6 and 7 to obtain the total bytes needed in the database for copy storage pool files. 9. Add the results in steps 5 and 8 to obtain the total bytes needed in the database. 10.Multiply the results obtained in step 9 by 135% to provide some tolerance to your estimation.
34
For example, using the information provided in Table 7 on page 33, the formula for calculating the sample database size is as follows: 1. 1,000 + 2,000 = 3,000 files 2. 3,000 * 2 = 6,000 files 3. 6,000 * 600 = 3,600,000 bytes 4. 4,000,000 * 3 * 0.05 = 600,000 bytes 5. 3,600,000 + 600,000 = 4,200,000 bytes 6. 6,000 * 200 = 1,200,000 bytes 7. 4,000,000 * 0.01 = 406,000 bytes 8. 1,200,000 + 406,000 = 1,606,000 bytes 9. 4,200,000 + 1,606,000 bytes = 5,806,000 bytes 10.5,806,000 * 1.35 = 7,838,100 bytes new/additional database size for backup files.
Configuration Large file server, very busy Small file server, not very busy Workstation Database server using Tivoli Data Protection Agent Database server not using Tivoli Data Protection Agent
It is suggested that you double the results to allow two backup cycles to occur without a database backup. For example, taking into account the database size obtained in the previous example and supposing a small file server, the estimated Recovery Log size would be: 7,838,100 bytes * 0.05 * 2 = 783,810 bytes.
35
Compression rate Database data Print and file server data Executables, compressed data, encrypted data 3:1 - 4:1 2:1 1:1
2. Add the total bytes transferred for all clients to obtain the total bytes transferred per backup cycle. 3. Add 15 percent to the results obtained in the previous step to provide tolerance. For example, using the previous example we have: 1. 0.02 x (1- 0.66), 0.01 x (1 - 0.5), 0.3 x (1 - 0) 2. 0.0068 + 0.0050 + 0.3 = 0.3118 3. 0.3118 * 1.15 = 0.35857 GB Primary Storage Pool size
36
2. Add the total bytes transferred for all clients to obtain the total bytes transferred per backup cycle. 3. Divide the total by the number of hours in your backup window. Using the information provided in Table 7 on page 33, we have: 1. 0.02 x (1- 0.66), 0.01 x (1 - 0.5), 0.3 x (1 - 0) 2. 0.0068 + 0.0050 + 0.3 = 0.3118 3. 0.3118 / 3 (minimum backup window) = 0.104 GB/hr. = 0.237 Mb/sec. The obtained bandwidth should be considered as additional to the normal network load during the backup window. Although NetBIOS and TCP/IP are supported protocols for client/server Tivoli Storage Manager communications, we recommend that you use TCP/IP because it is the easiest to set up from a Tivoli Storage Manager perspective. Also, some functions like Web communications require this protocol. Tivoli Storage Manager communication also requires machine names. If you are using NetBIOS, there is no additional set up needed. Using TCP/IP, you need to configure the Name Service Resolution of your choice (Host file for each client, WINS Server or DNS Server). DNS is the preferred option for Windows 2000 environments.
37
which continue using the volume label. While the migration is transparent, it affects the way filespace names are specified, especially from the command line backup-archive client. 5. If you have file names with international characters (umlauts, accents, and so forth) and you are upgrading from client version 3.1.0.5 or below, then after installing you may experience the symptoms of APAR IC21764. These symptoms include many ANS1304W Active object not found messages during incremental backups of files with international characters. To fix this problem you can search the index.storsys.ibm.com FTP site. The file names are: - IC21764L2.README.FTP - IC21764L2.README.1ST - IC21764L2.EXE You must first read the information provided in the IC21764L2.README.1if this is a new client installation, it is not necessary to use this fix. 6. If you run a client uninstall (version 3.1 or version 3.7) after installing Tivoli Storage Manager Client 4.1, some files of the 4.1 client could be deleted. Complete the following steps to correct this problem: a. Execute Add/Remove programs from the Control Panel. b. Choose Tivoli Storage Manager and double-click. c. On the Program Maintenance Dialog Box, select the Repair radio button.
38
INTEL
Total
Full install (all languages) Full install (one language) Complete (typical) install
A user must have admin authority to back up and recover system state information.
39
information in Table 11 is our recommendation, but feel free to add more fields according to your needs.
Table 11. System Information sheet
User information
Password admin
Domain Admins
Backup Operators
Carl Bellini Sara Smith Ron Terry Domain Backup Operators Authority full control Change
Permissions
Printers
port LPT1: 9.1.1.1:PASS Status Running Stopped Stopped Running Partition Size / Type Total Files / Directories Total Bytes Used
Services
Data
Drive
40
C:[Applications] D:[Information] General Network informations Computer Name: Server Domain: Domain1 Protocols: TCP/IP (DHCP), NetBIOS Junction points Type DFS Root DFS Link Volume mount Replicated files Type DFS Root Def. Normal Dir.
4 GB / NTFS 16 GB / FAT Desktop information Settings: 800x600 16bit Color Res. Background: Deep blue
2 GB 4 GB
Shared name myshare Public files Drive Z Target \\gold\c\mysha re2 \\gold\d\public
This information becomes useful during the restore operation, and especially with bare metal restores, where the information is needed at that moment. Also, this information is used as a way to verify your restore was completed successfully.
Note:
To make it easy to list service information, it is recommended that you run the svcinfo.exe utility included in the resource kit for windows 2000. Also, any Systems Management Applications such as Tivoli IT Director, could be really useful in obtaining all of this information automatically.
41
42
43
Backing up the DHCP, WINS, and Terminal services causes errors due to the database files that are open. If excludes are entered for these directories, Tivoli Storage Manager skips subdirectories containing the services own backups for the database files. Tivoli Storage Manager will not be able to restore these \backup files and a recovery of the services database will not be possible. An example of this is the %systemroot%\ is skipped if the %systemroot%\system32\dhcp folder is placed in the exclude list.
Note
Do not use the include-exclude list from the sample files or the standard documentation. Use the include-exclude list recommended below.
Figure 7 is our recommended and tested include-exclude list for Windows 2000. This list is valid for backing up and restoring Windows 2000 Professional and Windows 2000 Server systems, including all the System Objects. It does not contain statements for site specific applications or files or for non-critical files such as \TEMP that you may decide to eliminate from processing.
EXCLUDE "*:\WINNT\CSC\...\*" EXCLUDE "*:\WINNT\REGISTRATION\*.CLB\...\*.CRMLOG" EXCLUDE "*:\DOCUMENTS\...\INDEX.DAT" EXCLUDE "*:\PAGEFILE.SYS" EXCLUDE "*:\WINNT\SYSTEM32\DTCLOG\MSDTC.LOG" EXCLUDE "*:\WINNT\NETLOGON.CHG" EXCLUDE "*:\HIBERFIL.SYS" EXCLUDE "*:\WINNT\SCHEDLGU.TXT" EXCLUDE "*:\WINNT\DEBUG\*.*" Exclude "*:\...\ea data. sf" * The following exclude parameter will prevent a registry backup unless * the include *:\adsm.sys\...\* is also present. Exclude "*:\...\system32\config\...\*" Exclude.dir *:\...\ntfrs\jet Exclude.dir *:\...\ntds Exclude.dir "*:\System Volume Information" Exclude.dir "*:\...\Temporary Internet Files" Exclude.dir *:\Recycled Exclude.dir *:\Recycler Include *:\adsm.sys\...\* Figure 7. Recommended include-exclude list
44
Ensure the screen resolution is running at a minimum resolution of 800 x 600. If the screen is running at 640 x 480, some of the buttons in the TSM client are displayed off-screen. This issue is due to be fixed in a future release of the client.
After double-clicking on the package, the wizard unpacks the Tivoli Storage Manager client files into the default temporary folder
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Remove_After_Install\TSM_BA_Client
(which can be changed if desired) and then it automatically launches into the install process. The install wizard screens are presented in the following order: 1. As show in Figure 8, select the installation language.
45
2. Start the installation of Tivoli Storage Manager on this machine using the install wizard as shown in Figure 9.
46
3. Choose the directory to hold the Tivoli Storage Manager code as shown in Figure 10.
47
4. Select the type of install to perform as shown in Figure 11. The COMPLETE option installs all code necessary to run a typical client. The CUSTOM option allows picking the options to install, including the Administrator command line interface.
48
5. If CUSTOM is selected, this screen shows how to choose to install the administrator command line interface. As shown in Figure 12, click the plus sign beside the CLIENT entry to show each of the sub-entries. An X in the box indicates the entry is not selected. Click an entry to bring up any sub-entries or options to select or deselect that entry.
49
6. Now, as shown in Figure 13, the Tivoli Storage Manager installation is ready to begin.
50
7. Installation begins. Once the install has successfully completed, the screen shown in Figure 14 is presented.
51
To select the setup wizard from the menu bar, click Utilities ---> Setup Wizard as shown in Figure 15.
This brings up a screen allowing the selection of 3 areas to configure: Tivoli Storage Manager Backup Archive client Tivoli Storage Manager Web client Tivoli Storage Manager client scheduler
52
As shown in Figure 16, select the options required for your install by clicking the appropriate boxes.
4.2.1.1 Backup Archive client The Backup Archive client wizard assists in configuring the dsm.opt file for this client. 1. The options file task screen allows for the creation of a new dsm.opt options file or to copy a previously existing dsm.opt file from another location as shown in Figure 17. We recommend setting up a standard dsm.opt file and importing this file to each new client. This reduces the number of client option problems encountered later on.
53
2. Specify the node name of this client, as shown in Figure 18. Choose a node name that is unique and descriptive, yet is tied to this machine.
54
If open registration of clients is allowed, the open registration panels will be displayed. These panels are not shown in this book.
55
3. Choose the communication methods to be used by this client as shown in Figure 19.
56
4. Assuming the TCP/IP option is selected, enter the name of the Tivoli Storage Manager server. We recommend using the fully qualified name to reduce the potential for errors or confusion. For example, use BRAZIL.US.IBM.COM instead of just BRAZIL as is shown in the example in Figure 20.
57
5. The include-exclude list and the domain list may be modified from the panel shown in Figure 21. See 4.1, Include-exclude list on page 43 for a discussion of include-exclude lists.
58
4.2.1.2 Web Client 1. Select the Web Client option to install and configure the Web client services.They consist of two services on the Windows 2000 system: the client acceptor service, and the remote client agent. See Figure 22 for an example of the screen.
59
2. Select the dsm.opt option file that the Web client should use. The default is to use the backup archive options in C:\Program Files\Tivoli\TSM\baclient\dsm.opt. Unless this Web client has special requirements, use the dsm.opt from the backup archive client. See Figure 23 for an example of the screen.
60
3. Enter the TCP/IP port number to be used to access the Web client. The default is 1581. As shown in Figure 24, selecting YES to the second question restricts an administrator with client access privileges such as help desk personnel, from accessing this client using the Web client interface. Administrators with client owner privilege, system administrators, or policy administrators are not restricted from accessing this client through the Web client with this option.
61
4. Enter the node name and password of this Tivoli Storage Manager client. The default is to use the same name as the backup archive client. See Figure 25 for an example of the screen.
62
5. Select the user account that the Web client is to use for the service running the client acceptor service and the remote client agent service, which manage the Web client. We suggest using the system account to ensure that backups and restores of the system objects can be accomplished without security errors. See Figure 26 for an example of the screen. An issue exists with the Web client in this version of Tivoli Storage Manager. The configuration wizard for the Web client gives a choice on whether to set the Web client services to manual or automatic startup. This configuration option is applied to both services: Tivoli Storage Manager client acceptor; and Tivoli Storage Manager remote client agent. If this setting is not changed, the Web client will not function. As shown in Figure 36 on page 71, the correct startup settings are: - Tivoli Storage Manager client acceptor service = Automatic - Tivoli Storage Manager remote client agent = Manual The Tivoli Storage Manager remote client agent service automatically starts when the Web client backup/restore Java applet is launched. If it is running before the Web client is launched, the Java applet fails with a TCP/IP communications error.
.
63
6. The Web client configuration is complete. See Figure 27 for an example of the screen.
4.2.1.3 Client scheduler The Tivoli Storage Manager client scheduler is a service running on the Windows 2000 client that communicates with the Tivoli Storage Manager server to perform actions on the client that are scheduled by the server. 1. If the check box for the Tivoli Storage Manager client scheduler was selected in the Setup Wizard, the client scheduler wizard starts up to install and configure the Tivoli Storage Manager client scheduler. See Figure 28 for an example of the screen.
64
2. Enter a name for the scheduler service running on the client. We recommend using a descriptive name such as TSM Scheduler. See Figure 29 for an example of the screen. This wizard can be used to install the client scheduler service on another machine; however, this is not covered in this book.
65
3. Select the dsm.opt option file the client scheduler should use. The default is to use the backup archive options in C:\Program Files\Tivoli\TSM\baclient\dsm.opt. Unless this client scheduler has special requirements, use the dsm.opt from the backup archive client. See Figure 30 for an example of the screen.
66
4. Enter names to be used by the scheduler for its log and its error log. The defaults are dsmsched.log for the scheduler log and dsmerror.log for the error log, and both default to being stored in the c:\Progarm Files|Tivoli|TSM\baclient directory. Select event logging if detailed events for the client scheduler should be logged in the Windows 2000 Event Log. See Figure 31 for an example of the screen.
67
5. Enter the node name and password of this Tivoli Storage Manager client. The default is to use the same name as the backup archive client. See Figure 32 for an example of the screen.
68
6. Select the user account the client scheduler is to use for the service to access the files and objects it will be managing. We suggest using the system account to ensure that backups and restores of the system objects can be accomplished with out security errors. See Figure 33 for an example of the screen. We recommend setting the scheduler to start automatically when Windows 2000 boots to ensure the scheduler is always available to execute scheduled commands. See Figure 36 on page 71, for a display of the correct settings of this service.
69
7. Click Finish to complete the configuration of the client scheduler as shown in Figure 34.
8. The client scheduler installation is complete. See Figure 35 for an example of the screen.
70
4.2.1.4 Check if services are running Check that the client services are configured and running as desired. From the Windows 2000 Start button, select Start --> Settings --> Control Panel --> Administrative Tools --> Services to check which services are running. See Figure 36 for an example of the screen. The correct settings are shown in Table 12.
Table 12. Tivoli Storage Manager services settings
Service TSM Client Acceptor TSM Remote Client Agent TSM Scheduler
Status Started
Started
Automatic
4.3 ODBC
The ODBC package has been separated from the Tivoli Storage Manager client install package. It is available in the Tivoli Storage Manager ODBC Driver install package on the Tivoli Web site.
Note
We did not install or test the ODBC driver package for this redbook.
71
72
These files are left under the assumption that another client version may be installed. These files are useful to maintain continuity over a version change. If another client is not being installed, delete the directory at c:\Program Files\Tivoli and all its contents.
73
74
How to perform backups of various system objects and Windows 2000 Professional are also discussed. A process for retaining multiple backups of system objects is presented. Some recommendations and hints are presented.
5.1 Philosophy
Tivoli Storage Manager uses documented Microsoft application programming interfaces (APIs) to backup system objects. Some objects such as the Active Directory database have APIs that allow Tivoli Storage Manager to directly access the database. Other objects such as the Registry do not have interfaces that Tivoli Storage Manager can directly access. In these instances, Tivoli Storage Manager internally uses Microsoft utilities to copy the system objects to a staging directory and then the objects are backed up from that directory. A restore is performed in the reverse order. Tivoli Storage Manager keeps only the active copy of system objects implying that there are no inactive backups for system objects. Since the ability to restore an older version of a system object is useful and sometimes necessary, a manual procedure to capture inactive copies of the system objects is required. This task falls to the Tivoli Storage Manager administrator. See 5.6.3, Creating inactive versions of System Objects on page 84 for a suggested procedure. Our understanding is that the restore of inactive copies for system objects will be available in a future release of the Tivoli Storage Manager client. The backup and restore of a single Registry hive may be useful. Tivoli Storage Manager only backs up and restores the full Registry. Since Tivoli Storage Manager uses a staging directory, a clever Tivoli Storage Manager administrator may be able to create procedures to process individual Registry
75
hives. We are not that clever. See the Microsoft Windows 2000 Server Resource Kit for more information.
76
5.4.1 GUI
New system objects for Windows 2000 show up in the backup and restore screens of the graphical user interface according to what services are available on the system that Tivoli Storage Manager is attempting to back up. To back up a system object, click the appropriate grey box to select that object and click the BACKUP button. Figure 37 shows an example of the GUI displaying some of the new system objects.
77
78
Because of the way system objects are now being stored, a backup must be performed from a Tivoli Storage Manager 4.1.2 client prior to attempting to restore system objects from the Tivoli Storage Manager 4.1.2 client.
Microsoft indicates that the way to restore objects is to restore the whole System State at the same time from the same backup. This implies that the whole system must be restored to restore just one object. For example, restoring the Active directory will also restore the COM+ database, effectively back- leveling it at the same time. Take this into consideration prior to starting a restore of the system object. System objects which must be backed up together include the following. Microsoft does not support restoring these objects individually. Active directory (domain controller only) Certificate server database Cluster Database (cluster node only) COM+ database Registry System and boot files System volume
Other System Objects that can be backed up individually include: Event logs (system, security and application) Removable Storage Management Database (RSM) Replicated file systems
79
include-exclude list. The components that use the directory %systemroot%\ADSM.SYS and where the copies of the Windows 2000 object are stored are: Registry contents are in %systemroot%\adsm.sys\w2kreg Cluster database are in %systemroot%\adsm.sys\clusterdb COM+ database are in %systemroot%\adsm.sys\compdb Event logs are in %systemroot%\adsm.sys\eventlog
During restore processing of the Registry, a copy of the current Registry is first placed into the directory %systemroot%\adsm.sys\w2kreg.sav. This directory may be able to be used to restore the Registry in the event of a restore failure. See either the online help for the Restore Registry command or the manual Tivoli Storage Manager for Windows Using the Backup-Archive Client for more information.
80
For example, the whole system object is backed up on Monday. On Tuesday, the Registry component is backed up individually before making a system change. On Wednesday, the Active Directory requires a restore, which implies restoring the Registry from the same backup. Since the GUI interface of Tivoli Storage Manager does not provide a direct indication that the components are not synchronized, you proceed with the restore. However, because the Active Directory was backed up on Monday and the Registry on Tuesday, the restore may not produce the expected results. Queries of system object filespaces in the Backup Archive client GUI do not display any date and time stamp information indicating when these objects were backed up. Figure 38 shows this behavior on the restore screen after a valid backup. No information for the system objects is shown.
A Query Filespace command for a System Object filespace displays zero capacity and zero percentage used. Although this is what Tivoli Storage Manager displays after a valid backup, it is misleading and uninformative. The zeros do not tell if it is a valid backup, nor do they tell what components were backed up or how much or when. Figure 39 displays the same information from the Backup Archive client command line interface.
81
tsm> query filespace Num --1 tsm> Figure 39. Query filespace command Last Incr Date -------------00/00/0000 00:00:00 Type ---NTFS File Space Name --------------SYSTEM OBJECT
Curiously, by issuing the new command QUERY SYSTEMOBJECT from the Backup Archive client command interface, the backup date and the space used for each object is displayed. See Figure 40 for an example of this information.
tsm> query systemobject Size Backup Date -------------17,661 12/07/2000 10:55:37 135,258 12/07/2000 10:55:56 231,108,288 12/07/2000 10:55:29 18,093 12/07/2000 10:55:50 48,267,344 12/07/2000 10:55:54 10,006,668 12/07/2000 10:55:38 117,074 12/07/2000 10:55:38
A/I --A A A A A A A
The number of files backed up for the total System Object can be displayed by using the Query Occupancy command from an Administrator session. An example if this command is shown in Figure 41.
tsm: BRAZIL>query occupancy gold Node Name Physical Logical Space Space Occupied Occupied (MB) (MB) ---------------- ---- ---------- ---------- --------- --------- --------GOLD Bkup SYSTEM DISKPOOL 1,930 290.39 290.39 OBJECT tsm: BRAZIL> Type Filespace Name Storage Pool Name Number of Files
82
It is possible to obtain information about the restore in the GUI by using a convoluted method of renaming the System Object filespace to something else and then browsing the renamed filespace in the restore section. Figure 42 shows the GUI restore screen with renamed filespaces and dates and times of their backup. See 5.6.3, Creating inactive versions of System Objects on page 84 for more information about creating this situation.
Figure 42. GUI restore screen showing dates, times System Objects backed up
Attention
From the above, it becomes very apparent that Microsoft and Tivoli have provided more than enough rope to hang yourself! We strongly recommend checking backup timestamps by issuing the Query SYSTEMOBJECT command prior to initiating any System Object restore to ensure all System Object timestamps are for similar times. Be careful!
83
By specifying the -NOCONFIRM parameter on the dsmadmc command when starting the administrator session, the yes/no prompt will not be issued.
Note
We recommend performing this rename immediately after the backup has successfully completed. This prevents accidentally overwriting the current backup copy of the System Objects by performing another backup with any of the Backup Archive GUI, Web Client or command line interface. None of these interfaces call the recommended Postschedulecmd command to perform this rename. 3. Check the number of System Object filespaces that have been renamed and kept. If the number is greater than the number of versions to be kept, issue a Delete Filespace command for the oldest version from an administrator ID. For example:
delete filespace gold \system object 2000-10-05 06:43:11
84
Note
The Active Directory tags entries that have been logically deleted from the database and places them in a tombstone state. Garbage collection on the Active Directory deletes database entries in the tombstone state that are older than the tombstone lifetime (the default is 60 days). The restore of a domain controller (Active Directory) from a backup older than the Windows 2000 tombstone lifetime may create inconsistencies between domain controllers as the restored Active Directory may not have a record of some of deletions. Keeping an Active Directory version older than the specified tombstone lifetime date may not be useful. See Figure 42 on page 83 for an example of a number of renamed System Objects. We suggest utilizing the Postschedulecmd command of the Backup Archive client to run a Windows 2000 .bat file immediately after the Tivoli Storage Manager backup completes.
85
Figure 43.
We recommend that notes be kept manually about DFS root name and path name, and the path \\machine1\c:\Havier which is used by Tivoli Storage Manager, instead of a filespace name. This allows for a quick restore without having to guess about what connects to what.
86
You need to back up the root folder using normal Tivoli Storage Manager backup on the DFS machine. You need to backup Shared folders on other machines using normal Tivoli Storage Manager backup on those machines or using a SHARE on the DFS machine. We recommend using YES (the default).
5.7.2 DFSBACKUPMNTPNT NO
This is used to transform the DFS structure to a single machine. You cannot restore root with this option.
87
data cannot be restored from the backup. Unless the restore process is tested, recovery of any data is at risk. Numerous errors can slip in to corrupt your process, such as: An unreadable tape Configuration changes that inhibit backing up all the data Configuration changes that prevent recovering properly Incorrect procedures Human error
To minimize the potential of your recovery procedure failing, we recommend testing all restore procedures regularly. A suggested time frame follows. 5.8.2.1 Simple file restores Test a file restore to every file server client at least once a month. A client request for a file restore during the month would satisfy this requirement. Use real data that is changing as opposed to static test data to perform the test. Test a file restore to a sampling of desktop clients at least once a month. 5.8.2.2 Full system restores Test a full system restore every six months to at least one client of every client type, for example a file server, Active Directory server, clustered server, and desktop. If possible, restore the image to a spare, stand alone machine.
88
Place this file in the same location in each client so it can be found easily. Ensure that the Tivoli Storage Manager client include-exclude list does not exclude the resulting file.
89
90
Good reference material covering Windows 2000 backup and restore issues are: Windows 2000 Help Windows 2000 Resource Kits - Server and Professional Editions Windows 2000 Server Disaster Recovery Guidelines. This can be found online at http://www.microsoft.com/TechNet/win2000/recovery.asp.
91
Only file objects can be restored with Backup Operators rights. All other restores, that is, System Object components, require Administrator privileges. With this in mind, the safest option is to perform restores using an account with administrator rights.
92
recommend that you investigate more efficient operating system installation methods because this will reduce your down time should you have to perform real-life system recovery. Two examples are unattended scripted installs or using a disk imaging product.
93
You need to check that all the System Object components were backed up within a few seconds or minutes of each other (depending upon the size of the components). See Figure 44 for an example of this command.
tsm> query systemobject Size Backup Date -------------17,661 12/07/2000 10:55:37 135,258 12/07/2000 10:55:56 231,108,288 12/07/2000 10:55:29 18,093 12/07/2000 10:55:50 48,267,344 12/07/2000 10:55:54 10,006,668 12/07/2000 10:55:38 117,074 12/07/2000 10:55:38 tsm>.
A/I --A A A A A A A
1 2 3 4 5
Perform a minimal installation of Windows 2000 server in a workgroup with network connectively to the TSM server Install the Windows 2000 service pack that was running on the original system Create any additional disk partitions that were on the original system Install Tivoli Storage Manager client Restore file level data to the Windows 2000 boot / system partition
94
1 6 7 8 9 10
Perform a minimal installation of Windows 2000 server in a workgroup with network connectively to the TSM server Restore the entire System Object as single entity Reboot system Restore data back onto other drives Reboot system Check System
6.2.3.2 Assumptions This section details assumptions that the reader should be aware of. The system being recovered is a member of a domain. In the case of Windows 2000 Server and Advanced Server, the system is a member server, not a domain controller. For details on recovering a Windows 2000 domain controller, see 6.2.4, Restoring a Win 2000 domain controller (non-authoritatively) on page 102 in this chapter. This process is applicable to 3 variants of Windows 2000: Professional, Server and Advanced Server. For the sake of clarity, the generic term Windows 2000 system will be used to refer to all three products. The systems hardware components have already been correctly installed and configured. This includes, but is not limited to: System has power to all components Keyboard, mouse and monitor are connected Network controllers are installed and connected to the network Cabling of disk controllers and array controllers is complete Check that the hardware firmware is at the correct level (ideally this firmware should be at the same level as when the backup was taken)
The restore is done using Tivoli Storage Manager Backup Archive client not using a scheduled job. Each step in the procedure should be executed successfully before continuing with the next. If you do experience any errors, investigate them before proceeding. 6.2.3.3 Requirements This section details the pre-restore requirements. The Windows 2000 installation media should be available. An account with local administrator privileges must be used for the entire restoration process.
95
The Tivoli Storage Manager 4.1.2 client software should be available. Know the following about the Windows 2000 system being restored: Hard drive partitioning information Original computer name used for the Windows 2000 system Original TCP/IP address Which Windows 2000 service packs were running on your system
Know the host name and IP address of the Tivoli Storage Manager server that will be used for recovery. The original computer account of the system being restored must still exist in the domain. Do not delete this account as it will complicate the recovery process. 6.2.3.4 Restore issues concerning DFS or junction points There are issues that need to be considered when restoring a Windows 2000 system that has a Distributed File System or junction points installed. There is the potential to recover some data twice when restoring drives that have junction points defined. To avoid this we recommend only restoring the junction point definitions. Please refer to 6.3.2.3, Complete system restores and DFS on page 145 for details on how to address this issue. 6.2.3.5 Recovery procedure Because the major differences between Windows 2000 Professional, Server and Advanced Server are related to scalability features (rather than the key differences in the operating system that distinguishes a domain controller), we have found that the same recovery procedure can be applied to all three versions. Obviously, a Windows 2000 Professional system will have less services installed than a server-based system, but this should not affect the overall outcome of the restore. It should be noted that the procedures were developed on a Windows 2000 Advanced Server system, allowing the process to be scaled down to the two other product variants. 1. Perform any vendor specific configuration on the system. For example, define disk arrays, RAID partitions, and so on. 2. Install either Windows 2000 Professional, Server or Advanced Server (the product must match the system being recovered). - Make the Windows 2000 boot partition the same size as the system being recovered. The partition should also be formatted using the same file system (FAT32 or NTFS). The partition should have the same drive letter.
96
- The Windows 2000 operating system folder must be named the same as the system being recovered (this will usually be WINNT). - Configure the server with the same computer name as the system being recovered. - Make sure you record the password used for the local administrators account. This is required later on in the procedure. - Set the time and date correctly. - It is only necessary to perform a minimal install of Windows 2000 with just the networking components required to get the system on the network. Ensure the network card is using the correct drivers and that its configuration parameters are set to optimal settings for restore purposes. - There is no need to install additional services or applications that will not be used by the recovery process. For example, Terminal Server or Macintosh services. Installing such items will only increase the amount of time required to complete the operating system installation and may in fact add unnecessary complications to the restore process. To speed up the install time, you can deselect the components which are installed by default: Accessories, Internet Information Server, Indexing Service and Script Debugger. - Place the server into a temporary workgroup (use a workgroup name that does not exist). Do not make the server a domain member. 3. Install any service packs, patches or drivers that were running on the original system that directly interact with components used by the restore process. For example, network card drivers, disk controller drivers, operating system patches.
Important
We have found that a critical step in the restoration process is to install any Windows 2000 service packs that were originally running on the system. Do this before you start to restore using the Tivoli Storage Manager client. Failure to do this will probably compromise the success of the restore. 4. Configure the Windows 2000 system to contact the Tivoli Storage Manager server. There may be a requirement to place entries in the TCP/IP hosts file or point the Windows 2000 system to a DNS server to achieve this.
97
5. Recreate the same number of disk partitions that were on the original system. Ensure the following partition properties match the original system: Partition type (primary or logical/extended) File system type (FAT32 or NTFS) Disk type (basic or dynamic) Drive letters (D:, E:, F: and so on)
Note
Although, it is desirable to get the partition sizes to match the original system, this is not absolutely crucial. As long as there is sufficient space to restore all the data, it should not affect the success of the recovery. 6. Install the Tivoli Storage Manager client software. For more details, see section 4.2, Tivoli Storage Manager 4.1.2 client install procedure on page 45. - For compatibility reasons, ensure that the version of the Tivoli Storage Manager client used for the restore matches the one used for backup. - Install the Tivoli Storage Manager client into the same path and folder as the original system. 7. Run the Tivoli Storage Manager client configuration wizard. - Only configure the Backup / Archive client. It is not necessary to configure the TSM Scheduler or Web client. - Ensure the Tivoli Storage Manager client node name is the same as it was on the original system. - Configure the client to point to the Tivoli Storage Manager server.
Note
Ensure the screen resolution is running at a minimum resolution of 800 x 600. If the screen is running at 640 x 480, some of the buttons in the Tivoli Storage Manager client are displayed off-screen. This issue is due to be fixed in a future release of the client.
8. Before starting the restore, confirm the consistency of the System Object backup by running the command query systemobject from the Tivoli Storage Manager client command line. See 6.2.2.1, Checking the consistency of the System Object backup on page 93.
98
9. Start the Tivoli Storage Manager Back Archive client and select the Restore tab.
Tip
To prevent the Restore window from closing after each restore job has completed, enable the checkbox option Return to tree window after function completed. This option is found in Edit --> Preferences -->General. 10.Restore the boot / system partition: a. Expand File Level and select the drive designated as the Windows 2000 boot / system partition (this is usually the C drive). b. Select the Restore Options button (between the Estimate and Point in Time buttons) and set the collision options for files that already exist as shown in Figure 45.
c. Continue the restore process. When prompted, select to restore files to their original location. d. The restore should run cleanly without errors. e. At the end of the restore, do not select to reboot.
99
11.Restore the entire System Object. a. Select the System Object for restore. Do not select individual objects for restore. b. Continue the restore process. You will be presented with three prompts. Respond as follows: 1. When you are asked if you wish to the activate registry keys after the restore. Select Yes. 2. When you are asked to select a destination for the restored object, select to restore to the original location (selecting to restore to an alternative location will have no effect as System Objects cannot be redirected to another location). 3. Shortly after the restore starts you will be asked if you wish to force an overwrite on located files. Select Overwrite and check to apply this action to all files. c. The restore should run cleanly without errors. d. At the end of the restore, select to reboot. 12.Restart the system. 13.Restore any other data onto other drives on the system (D:, E:, and so on) setting the restore options as shown in Figure 45, Restore options on page 99. 14.Restart the system.
Note
The event logs are not restored back into the operating system (that is, they do not become active). They are restored into the folder \adsm.sys\eventlog. To view the logs you should point the event log viewer the appropriate log file in this folder.
100
15.Confirm that the system restore has been successful. Suggested items to check are: - Confirm that the system is a domain member again. From the desktop select My Computer --> Properties --> Network Identification. Also validate this by logging onto the system with a domain-based account. - Check Windows 2000 event logs for errors. In particular check for service and device driver failure. If the event logs were restored, check back to see if any errors that may be occurring are new or are just a legacy of the original system. - Check that all services show the correct status; that is, running, stopped, automatic, manual, and so forth. - Check that locally defined user and group accounts are present. If the system is part of a domain, check that domain-based accounts are members of local groups (check to see that the domain-based global administrators group is part of the local administrators group). - Check that print queues are present and functioning. - Check security on objects, for example, print queues and NTFS files and folders. - Check that the time zone and system time is correct. - Ask all users who use the system to check that their profiles have been restored.
Note
This list is by no-means exhaustive and should not be taken as a definitive checklist. Administrators should thoroughly check the components (services, devices, etc) of all applications running on the server. 16.If the system checks do not highlight any problems, the restore can now be considered complete (see Figure 46).
101
102
specific updates which can only be made by a single domain controller. The domain controllers which take on these roles are said to hold operation masters roles. There are a total of five Flexible Single Master Operations roles (FSMO) that exist in a Windows 2000 network. Some of the roles are domain-based, while others are forest-based. The five roles are shown in Table 14.
Table 14. Windows 2000 Domain Controller FSMO Roles
FSMO Role
Function The only domain controller that can perform write updates to the directory schema. This is a forest-based role. Main function is to add and remove domains from a forest. This is a forest-based role. Allocates sequences of relative IDs to each domain controller in its domain. These are used in the creation of security principals (user, group, and so on) by a domain controller. This is a domain-based role. Is responsible for updating the cross-domain group-to-user references when a new user is added. This is a domain-based role. Main role is to emulate a Windows NT primary domain controller providing backward compatibility for Windows NT systems participating in a Windows 2000 based domain. This is a domain-based role.
Schema Master
Infrastructure Master
The important thing to remember about FSMO roles is that they were created to avoid conflict situations. This means that there can only be one domain controller running that role within a domain or forest. For example, it would be very undesirable to have two systems trying to update the Active Directory Schema, hence the role of the Schema Master. FSMO roles can be moved to other domain controllers. In the case of a role holder that is going off-line for a scheduled outage, the role can be gracefully reassigned to another domain controller. If a domain controller becomes unavailable due to an unplanned outage, then it is possible to forcibly seize the role onto another domain. In this situation the original domain controller must never be allowed to come back online as conflict will occur (and corruption may follow). There is the potential for this to happen when restoring a domain controller from backup. Like any backup application, the Tivoli Storage Manager client
103
will back up a domain controllers FSMO role as part the system backup. This also means that the role will be restored along with all other components of the operating system. When a FSMO role domain controller fails, there are a number of things to be considered before restoring the system. These include: If the failed domain controller needs to be restored and brought back online, then the FSMO role must not be seized onto another system. If the role has been seized onto another domain controller, do not restore the system and bring it back online. In many cases a Windows 2000 forest or domain can function for period without a particular FSMO role. Although this is not recommended for a long period (that is, many weeks or months), it does mean that is no need to panic into unnecessarily seizing a FSMO role onto another domain controller. How long a FSMO role can be unavailable depends upon what the role is and how often it is used. For example, the Schema Master is only required when updates to the Active Directory schema are made. For many Windows 2000 environments, this may only occur a few times a year; therefore, the need to bring the schema master role back online may not be an urgent one. 6.2.4.2 Summary of domain controller restore Table 15 summarizes the restore process for a non-authoritative restore of a domain controller. This is for informational purposes only. For a working procedure, please follow the detailed procedure in section 6.2.3.5, Recovery procedure on page 96.
Table 15. Domain Controller Restore Process Summary
1 2 3 4 5 6 7 8 9 10
Perform a minimal installation of Windows 2000 server in a workgroup with network connectivity to the TSM server. Install the Windows 2000 service pack that was running on the original system. Create additional disk partitions that were on the original system. Install Tivoli Storage Manager client. Restore file level data to the Windows 2000 boot / system partition. Restore the entire System Object as single entity. Reboot system. Restore data back onto other drives. Reboot System. Check System.
104
6.2.4.3 Assumptions This section details assumptions that the reader should be aware of. The system being recovered is a domain controller. For details on recovering systems running Windows 2000 professional or Windows 2000 Server and Advanced Server running as a member server, please refer to 6.2.3, Restoring a Windows 2000 Professional or member server on page 94. Although both Windows 2000 Server and Advanced Server can run as a domain controller, for the sake of clarity, the generic term Windows 2000 server will be used to refer to both products. The systems hardware components have already been correctly installed and configured. This includes, but is not limited to: System has power to all components. Keyboard, mouse, and monitor are connected. Network controllers are installed and connected to the network. Cabling of disk controllers / array controllers is complete. Check that the hardware firmware is at the correct level (ideally this firmware should be at the same level as when the backup was taken).
The restore is done using Tivoli Storage Manager Backup Archive client, not using a scheduled job. Each step in the procedure should be executed successfully before continuing with the next. If you do experience any errors, investigate them before proceeding. Also, check Section 6.5, Troubleshooting on page 154. 6.2.4.4 Requirements This section details the pre-restore requirements. The Windows 2000 server installation media should be available. An account with local administrator privileges must be used for the entire restoration process. The Tivoli Storage Manager 4.1.2 client software should be available. Know the following about the Windows 2000 server being restored: Hard drive partitioning information. Original computer name used for the Windows 2000 system. Original TCP/IP address. Which Windows 2000 service packs were running on your system.
Know the host name and IP address of the Tivoli Storage Manager server that will be used for recovery.
105
The original computer account of the system being restored must still exist in the domain. Do not delete this account as it will complicate the recovery process. 6.2.4.5 Restore issues concerning DFS or junction points There are issues that need to be considered when restoring a Windows 2000 domain controller that has a Distributed File System or junction points installed. There is the potential to recover some data twice when restoring drives that have junction points defined. To avoid this, we recommend only restoring the junction point definitions. Please refer to 6.3.2.3, Complete system restores and DFS on page 145 for details on how to address this issue. 6.2.4.6 Recovery procedure Because the major differences between Windows 2000 Server and Advanced Server are related to scalability features (rather than differences in the operating system), the same recovery procedure can be used for either version. 1. Perform any vendor specific configuration on the system. For example, define disk arrays, RAID partitions, and so on. 2. Install either Windows 2000 Server or Advanced Server (the product must match the system being recovered). - Make the Windows 2000 boot partition the same size as the system being recovered. The partition should also be formatted using the same file system (FAT32 or NTFS). The partition should have the same drive letter. - Name the Windows 2000 operating system folder the same as the system being recovered (this will usually be WINNT). - Configure the server with the same computer name as the system being recovered. - Make sure you record the password used for the local administrators account. This is required later on in the procedure. - Set the time and date correctly. - It is only necessary to perform a minimal install of Windows 2000 with just the networking components required to get the system on the network. Ensure the network card is using the correct drivers and that its configuration parameters are set to optimal settings for restore purposes.
106
- There is no need to install additional services or applications that will not be used by the recovery process. For example, Terminal Server or Macintosh services. Installing such items will only increase the amount of time required to complete the operating system installation and may in fact add unnecessary complications to the restore process. To speed up the install time, you can deselect the components which are installed by default: Accessories, Internet Information Server, Indexing Service and Script Debugger. - Place the server into a temporary workgroup (use a workgroup name that does not exist). Do not make the server a domain member.
Note
Once Windows 2000 has finished installing and rebooted, do not convert the server into a domain controller. 3. Install any service packs, patches or drivers that were running on the original system that directly interact with components used by the restore process. For example, network card drivers, disk controller drivers, operating system patches.
Important
We have found that a critical step in the restoration process is to install to any Windows 2000 service packs that were originally running on the system. Do this before you start to restore using the Tivoli Storage Manager client. Failure to do this will probably compromise the success of the restore. 4. Configure the Windows 2000 server to be able to contact the Tivoli Storage Manager server. There may be a requirement to place entries in the TCP/IP hosts file or point the Windows 2000 server to a DNS server to achieve this. 5. Recreate the same number of disk partitions that were on the original system. Ensure the following partition properties match the original system: Partition type (primary or logical/extended) File system type (FAT32 or NTFS) Disk type (basic or dynamic) Drive letters (D:, E:, F: and so on)
107
Note
Although it is desirable to get the partition sizes to match the original system, this is not absolutely crucial. As long as there is sufficient space to restore all the data, it should not affect the success of the recovery. 6. Install the Tivoli Storage Manager client software. - For compatibility reasons, ensure the version of the Tivoli Storage Manager client used for the restore matches the one used for backup. - Install the Tivoli Storage Manager client into the same path and folder name folder as the original system. 7. Run the Tivoli Storage Manager client configuration wizard. - Only configure the Backup / Archive client. It is not necessary to configure the TSM Scheduler or Web client. - Ensure the Tivoli Storage Manager client node name is the same as it was on the original system. - Configure the client to point to the Tivoli Storage Manager server.
Note
Ensure the screen resolution is running at a minimum resolution of 800 x 600. If the screen is running at 640 x 480, some of the buttons in the Tivoli Storage Manager client are displayed off-screen. This issue is due to be fixed in a future release of the client 8. Before starting the restore, confirm the consistency of the System Object backup by running the command query systemobject from the Tivoli Storage Manager client command line. See 6.2.2.1, Checking the consistency of the System Object backup on page 93. 9. Start the Tivoli Storage Manager Back Archive client and select the Restore tab. 10.Restore the boot / system partition: a. Expand File Level and select the drive designated as the Windows 2000 boot / system partition (this is usually the C drive).
108
b. Select the Restore Options button (between the Estimate and Point in Time buttons) and set the collision options for files that already exist as shown in Figure 47.
c. Commence the restore process. When prompted, select to restore files to their original location. d. The restore should run cleanly without errors. e. At the end of the restore, do not reboot. 11.Restore any other data onto other drives on the system (D:, E:, and so on) setting the restore options as shown in Figure 47. 12.Reboot the system.
Note
The event logs are not restored back into the operating system (that is, they do not become active). They are restored into the \adsm.sys\eventlog folder. To view the logs, you should point the event log viewer to the appropriate log file in this folder.
109
13.Confirm that the system restore has been successful. Suggested items to check are: - Confirm that the system is now running as a domain controller. From the desktop, select My Computer --> Properties --> Network Identification. - Check Windows 2000 event logs for errors. In particular, check for service and device driver failure. If the event logs were restored, check back to see if any errors that may be occurring are new or are just a legacy of the original system. - Check that all services show the correct status; that is, running, stopped, automatic, manual, and so forth. - Check that Active Directory has restored successfully. - Check that any print queues are present and functioning. - Check security on objects, for example, print queues and NTFS files and folders. - Check that the time zone and system time is correct. - Ask all users who use the system to check that their profiles have been restored. - Check that the Active Directory and related components (for example File Replication Service and System Volume), are functioning correctly. Please refer to the Section , Validating an Active Directory restore on page 127 for guidance on this.
Note
This list is not exhaustive and should not be taken as a definitive checklist. Administrators should thoroughly check the components (services, devices, and so on) of all applications running on the server.
14.If the system checks do not highlight any problems the restore can now be considered complete (see Figure 48).
110
111
Active Directory will always be restored back into the \system32\Ntds folder. It is not possible to redirect the restore to an alternative folder. The only exception to this rule is the Windows 2000 event logs. These are not restored back into the \system32\config folder, but are placed in the \adsm.sys\eventlog folder. It is not possible to redirect the event logs to an alternative location on the server. For more information on Windows 2000 event log restores, please see 6.3.1.4, Event logs on page 129. Dependency issues In 6.2.2, The role of the System Object in the restore process on page 93, we already discussed the importance of restoring the entire System Object due to the dependency issues that exist between several of the Windows 2000 components. Adhering to this requirement will ensure that the component at the focus of the restore is kept in a consistent state. Checking the integrity of the System Object backup Before running any restore involving the System Object components, it is essential to verify the integrity of the backup. It should be confirmed that all of the System Object components were backed up as part of the same backup job. To do this, run the command query systemobject. You need to check that all the System Object components were backed up within a few seconds or minutes of each other (depending upon the size of the components).
tsm> query systemobject Size Backup Date -------------17,661 12/07/2000 10:55:37 135,258 12/07/2000 10:55:56 231,108,288 12/07/2000 10:55:29 18,093 12/07/2000 10:55:50 48,267,344 12/07/2000 10:55:54 10,006,668 12/07/2000 10:55:38 117,074 12/07/2000 10:55:38 tsm>.
A/I --A A A A A A A
6.3.1.2 Active Directory restores There are two types of Active Directory restores: authoritative and non-authoritative. While the Tivoli Storage Manager client is only able to perform non-authoritative restores, authoritative restores can be accomplished in conjunction with Windows 2000 using Ntdsutil (the Active Directory diagnostic tool). This is installed by default on all Windows 2000 domain controllers.
112
Tombstone dates Before commencing a restore involving the Active Directory, the backup must be checked to verify that its age does not exceed the Active Directory tombstone lifetime. Do not attempt to restore the Active Directory from a backup that is older than the tombstone date. The default tombstone date is 60 days; however, do not assume this. Check what it has been set to before commencing a restore. Process summary Table 16 summarizes the process used for both authoritative and non-authoritative restores. This is for information purposes only. When conducting the actual restore, please refer to the relevant sections later in this chapter.
Table 16. Active Directory Restore Summary
Description
1 2 3 4 5 6 7
Check integrity of System Object backup Restart domain controller in Direcotory Services Restore mode Restore entire System Object as single entity Use Ntdsutil to mark object(s) as authoritative Restart server back into normal mode Restore System Volume (SYSVOL authoritative restore) Check system
Non-authoritative restores A non-authoritative restore means that when the Active Directory is restored from backup, the restored data is then updated by way of normal replication. The process works as follows: 1. Active Directory is restored using the Tivoli Storage Manager client. This is performed with the domain controller off-line from its replication partners. 2. When the domain controller is brought back online, it talks to its replication partners and detects that the restored data has not been updated since the backup was performed. This triggers the restored Active Directory database to commence receiving and applying updates from its replication partners.
113
3. Once the updates are completed, the domain controllers database will be synchronized with its replication partners. Non-authoritative restores are only performed when the entire Active Directory component on a domain controller needs to be restored. This might be because the Active Directory on a domain controller is damaged, but the Windows 2000 operating system is still functioning. Alternatively, there may have been a domain controller failure and a non-authoritative restore is performed as part of the domain controller recovery process. Potential for data loss after a Non-authoritative restore It is worth noting that some data loss can occur after the Active Directory has been restored using a non-authoritative restore process. The likelihood of this occurring depends upon how often the domain controller replicates Active Directory data to its partners. Any new Active Directory transactions that occurred on the domain controller but were not replicated to its partners before the failure time will be lost. As an example, consider the following scenario: A domain controller called Saturn participates in a domain with 2 other replication partners. The WAN link between Saturn and its partners only allows replication to occur every 6 hours. Over the course of a day, the events listed in Table 17 occur.
Table 17. Example scenario
Saturn is fully backed up. User account Joe is added to the Active Directory running on Saturn. Saturn replicates with its partners. User account Dave is added to the Active Directory running on Saturn. A hard drive failure on Saturn causes Saturn to crash. A decision is made to rebuild the system. Saturn is successfully restored from the backup taken at 10:00 am. Its Active Directory database is non-authoritatively restored. Saturn opens up a replication session with its partners. Active Directory on Saturn is sent changes that have occurred on the other domain controllers.
114
Because the Active Directory database on Saturn reflects its state at the time of backup (10:00 am), it will only receive updates that it sent in the 12:00 pm replication (user Joe) plus any that have occurred on the other domain controllers. User Dave will be lost because this account had not been replicated to the other domain controllers before the failure occurred. Non-authoritative restore process The following process should be followed for non-authoritative restores. 1. Before starting the restore, confirm the consistency of the System Object backup by running the command query systemobject from the Tivoli Storage Manager client command line. See 6.2.2.1, Checking the consistency of the System Object backup on page 93. 2. Restart the server into Directory Services Restore Mode: a. On boot, when the Starting Windows screen appears, press F8 Troubleshooting and Advanced Options when prompted. You only have a few seconds to select F8. b. Select Directory Services Restore Mode from the Windows 2000 Advanced Options list. c. When Windows 2000 starts, you should see Safe Mode on all four corners of the desktop. d. You must logon using the servers local administrator account. 3. Start the Tivoli Storage Manager Back Archive client and select the Restore tab. 4. Restore the entire System Object. a. Select the System Object for restore as shown in Figure 49 on page 116. Do not select individual objects for restore.
115
b. Continue the restore process. You will be presented with three prompts. Enter the following responses: 1. When you are asked if you wish to the activate register keys after the restore, select Yes. 2. When you are asked to select a destination for the restored object, select to restore to the original location (selecting to restore to an alternative location will have no effect as System Objects cannot be redirected to another location). 3. Shortly after the restore starts you will be asked if you wish to force an overwrite on located files. Select Overwrite and check to apply this action to all files. c. The restore should run cleanly without errors. 5. Once the restore has completed, select to reboot the system. 6. Allow the system to boot back into normal mode (that is, not Directory Services Restore Mode). 7. Check that the Active Directory and related components (for example, File Replication Service and System Volume) are functioning correctly. For guidance, refer toValidating an Active Directory restore on page 127.
116
Authoritative restores
Caution!
The task of performing an authoritative restore is not one that should be taken lightly and should only be performed as a last resort. Because the effect of an authoritative restore is to update every domain controller with the restored object, extreme caution should be used when performing this task. It is recommended that you become comfortable with the Ntdsutil application in a test lab before using it in a production environment.
An authoritative restore must always occur after Active Directory has been restored non-authoritatively. An authoritative restore can be performed on an entire Active Directory database, a subtree or individual objects. When an object is marked as being authoritative, it is designated to take precedence over any other occurrences of that object on all domain controllers. The restored object is then replicated from the domain controller where the authoritative restore took place to all of its replication partners. The actual marking of objects as being authoritative is done using the Ntdsutil utility. This is a procedure common to all backup products (including NTbackup) and is not due to a limitation in the Tivoli Storage Manager client. The most common requirement for an authoritative restore is when objects are accidentally deleted from Active Directory. A more serious scenario (but thankfully less common) is if the Active Directory is corrupt on all domain controllers. In this situation, the entire Active Directory database is marked as authoritative and replicated to all partners. Again, it is worth re-emphasizing that an authoritative restore is not a trivial exercise and should only be performed as a last resort. If you wish to validate that the restored data is correct before allowing it to replicate, disconnect the domain controller from the network before it is rebooted. The domain controller can then be rebooted and contents of the Active Directory can be checked to ensure that the correct data has been restored. Once you are satisfied that the restore was successful, the domain controller can be reconnected to the network for replication to occur. If, on the other hand, the wrong data has been restored a potentially damaging situation can be averted.
117
For more information on Active Directory restore, please refer to the Microsoft Windows 2000 Server Distributed Systems Guide. How USN numbers affect the success of an authoritative restore Each domain controller maintains a counter called the Update Sequence Number (USN) which is incremented with every update transaction to Active Directory. Each Active Directory object and attribute stores a USN. The multiple master replication process compares the USNs on all domain controllers to determine the most recent copy of any Active Directory object. By comparing USNs, the multi-master replication can determine when an update has been made to an Active Directory object on any domain controller. This will trigger the updated object to be propagated to all other domain controllers. The process to authoritatively restore an active directory object (or the entire directory) increases the object s Update Sequence Number. This gives the restored object precedence over all the other instances which are stored on the Active Directory of replication partners. The object is then propagated using multi-master replication. For the authoritative restore to be successful, the Update Sequence Number of the restored object must be higher than the USN on the other domain controllers. By default, the authoritative restore process increases the USN by 100,000. In some situations this may not be enough, causing the authoritative restore to be ineffective. To overcome such situations the verinc parameter must be used when using the authoritative restore command. This allows the USN to be increased by a number higher than 100,000. It should be noted that it is extremely unlikely that you will ever be faced with this situation (given that the requirement to even have to run an authoritative restore should be very rare!). However, we have found that if an authoritative restore does not work, this may be the most likely cause.
Note
Before using the verinc parameter in an authoritative restore you should have a good understanding of how USNs and replication work. Please refer to the Windows 2000 Server Resource Kit Distributed Systems Guide for more information.
118
Situations where it may be necessary to override the version increase are: When an object is restored from the same backup more than once. This is best illustrated by considering the following situation: An user account object with a USN of 18000 is backed up. The user account is then updated (perhaps by a password change) and the USN goes to 18001. The user account needs to be authoritatively restored from backup. By default, the restore increases the user accounts USN by 100,000 to 118,001. This gives the user account a higher USN number than all other occurrences in the domain and it is propagated to other domain controllers. This authoritative restore has worked. The user account is accidently deleted and must be authoritatively restored again. At this point, the Active Directory on all domain controllers knows that the object had a USN of 118001 before it was deleted. The authoritative restore is re-run (remember, the USN number of the object on the backup will be 18,000). On completion, the user accounts USN is increased by 100,000 to 118,000. The other domain controllers know that the deleted user account had a USN of 118001; therefore, once replication kicks in the restored account will be deleted, meaning the authoritative restore has not worked. To overcome this, use the verinc parameter to take the USN number above 118,001; for example:
restore subtree cn=user1,dc=pacific,dc=com verinc 120,000.
When an object is restored from a very old backup. Updates to the object (since the backup was taken) have increased the objects USN number by more than 100,000. Recovery of the entire Active Directory database The restore of an entire Active Directory database should only be considered as a last resort. The implications of an authoritative restore can be severe, especially when a large amount of data needs to be relocated across a low capacity network. We advise extreme caution before proceeding with this process. The last part of this process is to restore the Sysvol folder. This additional step is required to keep the System Volume consistent with the Active Directory database.
119
Process to restore the entire active directory database 1. Before starting the restore, confirm the consistency of the System Object backup by running the command query systemobject from the Tivoli Storage Manager client command line. See 6.2.2.1, Checking the consistency of the System Object backup on page 93. 2. Perform a non-authoritative restore as described in the section titled, Non-authoritative restores on page 113. Perform the steps as described, except do not select to reboot after the System Object has been restored. 3. From the Windows 2000 command prompt typing the command ntdsutil. This will start the Active Directory Diagnostic Tool. 4. Enter the command authoritative restore. 5. Enter the command restore database. This will authoritatively restore the entire active directory. See Figure 50 for an example of the sequence events that should occur when the restore is running.
.
This is screen.ntdsutil: authoritative restore authoritative restore: restore database Opening DIT database... Done. The current time is 12-13-00 15:51.37. Most recent database update occured at 12-13-00 13:50.18. Increasing attribute version numbers by 100000. Counting records that need updating... Records found: 0000001570 Done.
Found 1570 records to update. Updating records... Records remaining: 0000000000 Done.
Successfully updated 1570 records. Authoritative Restore completed successfully. authoritative restore:
6. Once the restore has completed, type quit twice to exit the Ntdsutil and restart the server in normal mode. 7. Log on locally at the server once it has restarted.
120
8. Restore the Sysvol folder. Because certain Active Directory objects (for example, OUs, domains and site objects) may have group policies associated with them, and these group policies are stored in the System Volume folder, it is also necessary to restore the Sysvol folder. This will ensure that the Active Directory and System Volume are kept consistent. Perform the following steps to restore the Sysvol folder: a. Wait for the System Volume (Sysvol) to be published. Check to see that a directory structure exists under the Sysvol folder. If a structure exists, this indicates that the Sysvol has been published. You can check the Sysvol structure on a replication partner as it will provide a good indication of what to look for (it will be similar but not identical, to that shown in Figure 55 on page 125). It can take several minutes before the Sysvol is published. a. Use the Tivoli Storage Manager to restore the System Volume component from the System Object (see Figure 51). This is one of the few occasions where it is safe to perform an isolated restore of a System Object component.
4. Once the System Volume has been restored, check that the contents of the sysvol\<domain> folder contains a scripts and policies folder as shown in Figure 52.
121
9. The authoritative restore process is now complete. 10.Check that the restore has been successful by referring to, Validating an Active Directory restore on page 127. Restoring a specific active directory object An individual Active Directory object can be anything from a user account or security group to an organizational unity (OU). A restore can be performed on any object in the directory. All that the user needs to know is the relative distinguished name for the object, plus the names of container objects and domains that contain the object. The distinguished name of an object identifies its location in a directory tree. Every object in Active Directory has a distinguished name. For example, the user Darwin shown in the directory tree in Figure 53 has a distinguished name of cn=darwin,ou=nt,ou=australia,dc=pacific,dc=com. This identifies the user object Darwin as being in the organizational units Australia, and NT in the domain pacific.com. It is strongly recommended that anyone performing authoritative restores of Active Directory objects become familiar with the distinguished names syntax. More information on this subject can be found in the online help for Windows 2000 server or in the Windows 2000 Server Resource kit.
122
The restore of an individual Active Directory object is performed by restoring the Active Directory from backup, then using Ntdsutil to mark the object as authoritative. Once the domain controller comes back online, the marked object takes precedence over all other occurrences of the object that may exist in the domain. The normal replication process will replicate the restored object from the domain controller to its replication partners. The last part of the process is to restore a portion of the Sysvol folder. This additional step is required to keep the System Volume consistent with the Active Directory database. Process to restore an Active Directory object 1. Before starting the restore, confirm the consistency of the System Object backup by running the command query systemobject from the Tivoli Storage Manager client command line. See 6.2.2.1, Checking the consistency of the System Object backup on page 93. 2. Perform a non-authoritative restore as described in the section titled, Non-authoritative restores on page 113. Perform the steps as described, except do not select to reboot after the System Object has been restored. 3. From the Windows 2000 command prompt, type the command ntdsutil. This will start the Active Directory Diagnostic Tool. 4. Enter the command authoritative restore.
123
5. Enter the command restore subtree <distinguished name>. This will perform an authoritative restore of the object. For example, restore subtree cn=darwin,ou=nt,ou=australia,dc=pacific,dc=com. See Figure 54 for an example of the sequence events that should occur when the restore is running.
:\Documents and Settings\Administrator.GOLD>ntdsutil ntdsutil: authoritative restore authoritative restore: restore subtree cn=darwin,ou=nt,ou=australia,dc=pacific,dc=com Opening DIT database... Done. The current time is 12-13-00 14:47.02. Most recent database update occured at 12-13-00 13:50.18. Increasing attribute version numbers by 100000. Counting records that need updating... Records found: 0000000001 Done.
6. Once the restore has completed, type quit twice to exit Ntdsutil. Do not restart the system. 7. Locate the Sysvol folder as shown in Figure 55. Copy the entire Sysvol folder to a temporary location on the server. If you do not know how to locate the Sysvol folder, enter the command net share from the Windows 2000 command prompt. By default, the Sysvol folder is located in the path c:\winnt\sysvol\sysvol.
124
8. Restart the server in normal mode. 9. Log on locally at the server once it has restarted. 10.You must now restore the Sysvol policy folders. This must be done to maintain consistency between any policy objects that have been restored into Active Directory and the Sysvol folder. To do this, perform the following steps: a. Wait for the System Volume (Sysvol) to be published. Check to see that a directory structure exists under the Sysvol folder. If a structure exists, this indicates that the Sysvol has been published. It may take several minutes before the Sysvol is published. You can check the Sysvol structure on a replication partner as it will provide a good indication of what to look for (it will be similar to that shown in Figure 55). b. Locate the Sysvol folder that was copied to a temporary location prior to rebooting the server. c. After the SYSVOL share is published, copy only policy folders (identified by the GUID) corresponding to the restored policy objects from the temporary location over the existing ones. Before you can copy the policy folder, you need to identify the GUID associated with the policy object that has been restored. This will then enable you to identify the policy folder that must be copied. The following steps detail how to do this (based on Microsoft Technet article Q216359): 1. Open Active Directory Users and Computers administrative tools. Click Properties on the context menu of a domain, site, or organizational unit object in the Active Directory.
125
2. Click Group Policy tab --> GPO --> Properties. The Unique Name field contains the GUID of the selected GPO as shown in Figure 56. Note the GUID; you will need to refer to this later.
3. On a domain controller (in the domain where the restore is being performed), determine the domain drive which hosts the system volume (SYSVOL). You can use the net share command to show the path where the SYSVOL share resides. 4. Using Windows Explorer, open the Sysvol folder. 5. The following folders exist: Domain, Staging, Staging Areas, and Sysvol. Change to the Sysvol folder. 6. A folder with the name of the domain that the local domain controller is a member of should exist (in Figure 57, this is pacifc.com). Change to the following folder path as shown in Figure 57: Sysvol\sysvol\<domain name>\Polices
126
7. Using the GUID you recorded in step 2, you should now be able to identify the policy folder that must be copied from the temporary location over the existing one. d. If you have not already done so, copy the policy folder from the temporary location over the existing one. e. The SYSVOL copy is now complete. 11.The Active Directory object restore has now been completed. 12.Check that the restore has been successful by referring to , Validating an Active Directory restore on page 127. Validating an Active Directory restore This section outlines some of the checks that can be performed to validate that Active Directory has been restored successfully using both authoritative and non-authoritative restore methods. These checks should be performed both when restoring a domain controller or if just the Active Directory database has been restored.
Note
For details on performing an advanced verification of Active Directory restores, we encourage you to refer to Chapter 9 in the Microsoft Windows 2000 Server Distributed Systems Guide. This details checks for both authoritative and non-authoriative restores. The Distributed Systems Guide is part of the Windows 2000 Server Resource Kit. ISBN: 1-57231-805-8.
127
- View Active Directory objects by way of Active Directory Users and Computers. Review the Active Directory content for accuracy. - Use the Active Directory Replication Monitor (installed with the Windows 2000 support tools). Replication may take quite a while depending upon domain topology and speed of network links. With default settings, we found that waiting for replication to occur between partners on a LAN took up to 1.5 hours. If you wish to force a synchronization between replication partners, you can use the Replication Monitor utility to do this. - Check the Directory Service log in Event Viewer. You should see messages indicating: The Directory Services (Active Directory) database has been restored from backup. The Directory Services database is receiving updates. USNs are being updated to reflect the status of the restored domain controller status. - You should also check that the File Replication Service is functioning correctly, as this is the mechanism that Active Directory uses for replication. 6.3.1.3 Registry Windows 2000 only allows the entire Registry to be backed up or restored. It should not be processed in isolation from the other System Object components. Tivoli Storage Manager handles the processing of the Registry by using the ADSM.SYS staging area. Figure 58 shows the directory structure that is created in the staging area. If you traverse right down the Registry tree you will eventually reach he Registry hive file. The file for the Registry hive HKEY_local_machine\system is shown in Figure 58.
128
The restore process works as follows: 1. During the restore process, the Tivoli Storage Manager client places restored Registry hive files in the \adsm.sys\w2kreg folder. 2. If you choose to activate the keys, the Tivoli Storage Manager client backs up the current Registry to the \adms.sys\w2kreg.sav folder. This gives you a good backout option if the Registry being restored causes problems. 3. The Registry hives in \adsm.sys\w2kreg are placed into the live Registry for activation after the system is restarted. If you want to restore the Registry but not activate it, you are quite safe to restore the Registry component from the System Object in isolation (you do not need to restore the whole System Object). This will place the Registry hive files in \adsm.sys\w2kreg. From here you can access individual hives using a tool such as RegRest. The Registry hive files are dumped into \adsm.sys\w2kreg and \adms.sys\w2k.sav in a format that is compatible with the Microsoft Registry backup tool: Regback. This means that individual registry hives can be recovered from either area using any tool that is compatible with the Regback format. RegRest from the Windows 2000 resource kit is an example of such a tool. 6.3.1.4 Event logs The Windows 2000 event logs can be safely restored as a single component without any dependencies on other System Object components.
129
The Tivoli Storage Manager client always restores the event logs into the staging area folder adsm.sys\EventLog. Event logs are not restored back into the original location of \%systemroot\system32\config. For more information about how the staging area is used in backup, see 5.6.1, \ADSM.SYS contents on page 80. To perform a restore, either use the Tivoli Storage Manager Backup Archive and select the Event log component from the System Object (see Figure 59), or run the backup client command restore eventlog.
To view a restored Event log file, point the Windows 2000 Event Viewer at the adsm.sys\EventLog folder and choose the appropriate file. Windows 2000 imposes different behavior on the Tivoli Storage Manager client, affecting the way the Event logs are stored. It is not possible to select individual logs for restore. All logs are restored when the event log component is selected for restore. The restore location cannot be altered - logs will always be directed to the adsm.sys\EventLog. From here they can be moved to another folder using standard Windows 2000 file management tools.
130
131
b. Files and directories pointed by the junction points, but not the Root directory and neither the junction points itself (for Tivoli Storage Manager, these are drives). 2. If you backed up with the DFSBACKUPMNTPNT option set to NO, you will be able to restore: a. Directories for DFS junction points, subdirectories and files for the Root directory and DFS junction points 3. With both backup options you will get the following DFS filespace names at the moment to restore: + \\machine\root + \\machine\root\link1 + \\machine\root\link2
Inside the + \\machine\root you will find Link1 and Link2. The functionality of all this filespace structure could be explained better looking at Table 18.
Table 18. What is restored for each DFSBACKUPMNTPNT option
+ Filespace
DFSBACKUPMN TPNT NO DFS Root directory Junction point directory Junction point directory Files inside the directory pointed by link1 Files inside the dir1 Files inside the dir2 Files inside the directory pointed by link1 Files inside the dir3 Files inside the dir4
Junction point definition Junction point definition Files inside the directory pointed by link1 Files inside the dir1 Files inside the dir2 Files inside the directory pointed by link1 Files inside the dir3 Files inside the dir4
132
4. As you can see, none of the backup options enable DFS bare metal restores for just backing up and restoring the DFS structure. For that reason, we provided the backup strategies described previously. 5. It is recommended that you have your DFS structure previously noted, because at the moment of restore, the DFS structure is included inside the file level branch, which means that there is no special structure called DFS anymore. 6. You need only be Local Backup Operator to perform a DFS restore; however, be sure that you belong to the Local Backup Operator Group of each involved system, if you are restoring data to remote machines. 7. The DFS restore is only available through the Web or the Graphical User Interface. 8. It is recommended to use the following procedures to restore the suggested schema in the DFS backup section to provide complete DFS restores. 9. The restoration on a stand-alone server is always authoritative because the File Replication service is not used and it is assumed that there are no other copies of the restored files on other servers. As a result, the replica being restored replicates its data to other members of the replica set. Procedure to restore DFS definitions Previous to this we assume that: You backed up your DFS Root or junction points using the DFSBACKUPMNTPNT YES option. You could check your options file to be sure. 1. Log on the system using a Local Backup Operator or Local Administrator Account. 2. Start the Restore User Interface using Start --> Program --> Tivoli Storage Manager -->Backup Archive GUI --> Restore, or just double-click the TSM Backup Archive shortcut --> Restore.
Note:
If you prefer, use the Web client with your internet browser and type:
http://localhostname:1581
133
3. Choose the desired link by clicking + Machine name --> + File level. You should see all filespaces and network drives backed up under your machine, as shown in Figure 60. Check your DFS diagram to search the name of the DFS Root and click + DFS Root name.
Note:
In Tivoli Storage Manager Client, the DFS Root and the junction points are seen as network drives at the moment of restore.
134
4. Check your DFS diagram again and click the appropriate checkbox, then finally click the Restore button. Before you click the Restore button, you should see a screen similar to Figure 61.
135
5. Immediately after clicking the Restore button, a dialog box appears to give you an option to restore the junction or Root information in its original target directory or in another. The most common case is to restore in the original target, because it is assumed that you are restoring a lost definition. You should see a screen similar to Figure 62.
6. After clicking the Restore button with the Original location option selected, the Tivoli Storage Manager Client tries to restore two types of information: a. The junction point or Root definition b. The files and subdirectories pointed by the junction point or inside the Root If the junction point or Root definition already exists, its not restored. So if for some reason you want to restore it, you must first delete it in the Windows DFS utility. If the files pointed at by the junction point already exist, you are prompted to overwrite them, as shown in Figure 63.
136
7. When you have made your selections and the junction points and the root definitions, subdirectories, and/or files are restored, you will obtain a status box similar to the one shown in Figure 64.
137
8. Now in order to verify your restore, we recommend to start the Windows DFS utility program Start --> Administrative tools --> Distributed file system. After that, select the restored junction point or Root, and from the menu, select Action --> Show status. Yo should see a check mark indicating a successful restore. Comments: When trying to restore the DFS Root definition, all DFS junction points are selected and there is no way to restore the Root without all of them. However, you can restore separate junction points without restoring the Root. Previous to the restore of any DFS junction point or Root definition, the shared directory pointed or target must exist. You will not be able to restore DFS junction points if the Root does not exist. Typical error messages or situations are listed below:
The error in Figure 65 means that the DFS junction point definition that you tried to restore point to a directory not shared or not available anymore. 9. Situation: The junction point definition was restored as a normal directory This means that your DFS Root definition does not exist.
138
This error could means many things but it is usually showed when the DFS Root directory share is not present or there is already a normal subdirectory called with the same name as the junction point you are trying to restore. Procedure to restore files in DFS structures Previous to this we assume that: You backed up your DFS root or branch using the DFSBACKUPMNTPNT YES option, you could check your options file to be sure 1. Log on the system using a Local Backup Operator or Local Administrator Account 2. Start the Restore User Interface using Start --> Program --> Tivoli Storage Manager -->Backup Archive GUI --> Restore, or just double-click TSM Backup Archive shortcut --> Restore.
Note
If you prefer, use the Web client with your internet browser and type:
http://localhostname:1581
3. Choose the desired link by clicking + Machine name --> + File level. You should see all file spaces and network drives backed up under your machine as shown in Figure 67. Check your DFS diagram to search the name of the DFS Junction point or Root and click the + DFS Desired_name branch or just on the Checkbox if you want to restore the entire content.
Notes
In Tivoli Storage Manager Client DFS junction points and Root are seen as network drives at the moment to restore. If you are trying to restore files or subdirectories inside the Root please do not confuse the junction points with the real data directories, they seem very similar you should check your DFS drawing again. If you are trying to restore files or subdirectories inside any other Link, we recommend to do it from its separated network drive and not from the Root netword drive to avoid accidental junction points restauration.
139
4. Once made your file and directory selections click the Restore button, a dialog box appear to give you option to restore data in its original target directory or in another. You should see a screen similar to Figure 62 on page 136. 5. If the files pointed by the junction point or inside the Root already exist, you are prompted to overwrite them as the Figure 63 shows. 6. Made your selections and your subdirectories and/or files restored you obtain a dialog box similar to the one shown in Figure 64 7. If your backup was scheduled and you keep the log file check it out to verify your restore. Additionally or if you do not have the log file check the files with your users. Comments: To restore data pointed by the junction points or inside the Root, these last must exist previously To restore data inside a Directory pointed by a Junction, the shared directory must exist first Typical error messages or situations are listed below: 1. Situation: No objects being restored This frequently happens when you are trying to make a complete restore of data inside a target Directory and this does not exist.
140
This message is frequently related with the absence of the target Directory pointed by the Junction Point and the intention to restore partial data inside it. Procedure to restore files and directories in DFS structures Previous to this we assume that: You backed up your DFS root or branch using the DFSBACKUPMNTPNT NO option, you could check your options file to be sure 1. Log on the system using a Local Backup Operator or Local Administrator Account 2. Start the Restore User Interface using Start --> Program --> Tivoli Storage Manager -->Backup Archive GUI --> Restore or just double-click the TSM Backup Archive shortcut --> Restore.
Note:
If you prefer, use the Web client with your internet browser and type:
http://localhostname:1581
3. Choose the desired link clicking on + Machine name --> + File level. You should see all file spaces and network drives backed up under your machine as shown in Figure 60 on page 134. Check your DFS diagram to search the name of the DFS Root or junction point directory desired. If you want to restore DFS junction point Directories you must search the junction under the DFS Root network drive
Note:
In Tivoli Storage Manager Client DFS directories are seen as network drives at the moment of restore.
141
4. Once on the desired directory, click the checkboxes of your selected files and directories, finally click the Restore button. Prior to clicking the Restore button, your screen should seem similar to the Figure 69 if you are restoring junction points directories or like Figure 70 if you are just interested in restore files inside the directories.
5. Immediately after clicking the Restore button, a dialog box appear to give you option to restore the files and/or directories in its original target directory or in another as is shown in Figure 62 on page 136.
142
6. If you click the Restore button with the Original location option selected, Tivoli Storage Manager Client could do two things: a. If the junction point definition is established, then you will restore files and subdirectories inside the Root directory and/or inside the directories by the junction points b. If the junction point definition does not exist, the files and subdirectories previously pointed by the junction point and the junction point directory itself are restored inside the Root directory If you selected the Following Location option, the files and subdirectories previously pointed by the junction point, inside the Root and the junction point directory itself are restored inside the new target directory. If the files being restored already exist, you are prompted to overwrite them as the Figure 63 on page 137 shows. 7. Made your selections, your junctions points directories, subdirectories and/or files restored you obtain a dialog box similar to the one shown in Figure 64 8. If your backup was scheduled and you keep the log file check it out to verify your restore. Additionally or if you do not have the log file check the files with your users. Comments: Previous to restore any file or subdirectory pointed by any DFS junction point or inside the Root, they must be properly defined and the shared directory target available. You can not be able to restore DFS junction points directories in its original location if the DFS root does not exist. Remember that using this procedure you can restore any file or directory (excepting the through pointed by any junction point or inside the Root directory, but you can not restore DFS definitions. Typical error messages or situations are listed below:
143
The error in Figure 71 means that the files or subdirectories that you tried to restore were in a pointed directory not available or not shared anymore. 9. Situation: The files or directories pointed by a junction point definition were restored inside the root Directory This means that your DFS definition no longer exists. 6.3.2.2 Restoring DFS on Windows 2000 domain controllers Comments 1. To restore a DFS configuration in a Domain environment you can perform the same procedures described before on Section 6.3.2.1, Restoring DFS on Windows 2000 Servers on page 131, but first be sure to disable the Replication Policy settings from any of the healthy Domain controllers 2. If you lost the list of systems involved in the Replica, please check your System Information sheet described on Chapter 11, System Information sheet on page 40. Still when the File Replication Server could keep this record till, it is possible to be necessary to check and/or redefine. 3. In this case we could restore Replication information in two ways: - Using an Authoritative restore to mirror exactly the contents in the tape backup (Junction Point definitions) to each Domain controller involved in the replica - Using a non Authoritative restore to restore one or more of the not actually available junction points Procedure to perform an authoritative restore of a DFS replica Previous to this we assume that: You restored your local DFS structure using the procedure described before You disabled the Replication Policy configuration from any involved domain controller and you continue using this healthy system 1. Remove the failed member from the Replica set using the Windows 2000 DFS utility (check your Windows 2000 help if necessary) 2. Disable the replication in the host server (primary) 3. Add the member back as a new replica. Specify it as the Initial master 4. Check your configuration turning off your actual Domain controller and accessing the defined shares provided by the restored DFS server Procedure to perform a non-authoritative restore of a DFS replica Previous to this we assume that:
144
You restored your local DFS structure using the procedure described before You disabled the Replication Policy configuration from any involved domain controller and you continue using this healthy system 1. Remove the failed member from the Replica set using the Windows 2000 DFS utility (check your Windows 2000 help if necessary) 2. Disable the replication in the host server (primary) 3. Add the member back as a new replica. Do not specify it as the initial master 4. Check your configuration turning off your actual Domain controller and accessing the defined shares provided by the restored DFS server 6.3.2.3 Complete system restores and DFS If you are restoring a complete drive where the DFS structure was stored (definitions), this DFS structure is restored such as if you had selected the special DFS filespace name and the same rules apply (see , Comments on page 144 about DFSBACKUPMNTPNT option). So in this case its unnecessary that you specify to restore the DFS structure using its special filespace name. If you are restoring a complete drive where the DFS structure was stored, Tivoli Storage Manager client will just restore the definitions (Root and Links), if you want to restore the data pointed it is necessary to restore the special filespace defined for this after restoring the definitions. These special filespaces can be restored just if you backed up the DFS structure purposely. You can identify all junction points and root definitions easily because they do not have the dollar sign ($) in front of them. For example:
\\machine\c$ (C:)
This is a root or maybe a junction point definition Anyway it is recommended to have the Chapter 11, System Information sheet on page 40 to check the correct names. Our recommendation is just to restore the real drives where DFS definitions are stored (those with $). If your definitions point to drives being restored and you ask to restore the junction points filespaces you would restore the same data two times. If your definitions point to drives in other machines you need to consider remote permissions and you would be in a
145
not common situation, because each machine should backup and restore its own files.
146
is parent of
\\machine_name\c$\Mount volume Public
147
Tivoli Storage Manager restore the junction point definition, ONLY if you backed the Junction point from its parent. Special comments to complete system restores To avoid undesirable data collocation, always restore the drive where Junction points are defined first and after the drive branch itself if it applies Remember that Junction points just point to data already stored in normal Volumes or Directories that could have been already restored, so many times it is just necessary to restore the Junction definition and not the data pointed by again You can identify junction points and real drive filespace names because these last have the dollar sign ($) in front of them. For example
\\machine\c$ (C:)
This is a DFS root or maybe a junction point definition Anyway it is recommended to have the Chapter 11, System Information sheet on page 40 to check the correct names. Our recommendation is just to restore the real drives where junction definitions are stored (those with $). If your definitions point to drives being restored and you ask to restore the junction points filespaces you would restore the same data two times. If your definitions point to drives in other machines you need to consider remote permissions and you would be in a not common situation, because each machine should backup and restore its own files.
148
Procedure to restore the RSM database 1. Log on the system using a Local Backup Operator or Local Administrator Account 2. Start the Restore User Interface using Start --> Program --> Tivoli Storage Manager -->Backup Archive GUI --> Restore or just double-click the TSM Backup Archive shortcut --> Restore.
Note:
If you prefer, use the Web Client with your Internet browser and typing:
http://localhostname:1581
3. Choose the RSM object clicking on + Machine name --> + System object --> RSM. You should see a screen similar to Figure 73. Click the Restore button.
4. Once you have restored the RSM database, Tivoli Storage Manager shows you a message to restart the system now or afterwards, as shown in Figure 74. Click the button you prefer.
149
5. In order to verify your restore, check the RSM configuration after Reboot clicking on Start --> Programs --> Administrative tools --> Computer Management --> + Removable Storage You should get back: The configuration and state of the library, drive, and media Media pool configuration and contents Library work list Operator requests
150
connections, mouse settings, windows size and positions which are stored in the folder called My documents and settings\%username%.
Note
Tivoli Storage Manager will not backup by default any user profile when the user is logged on. This is because the user profile information (registry hive HKEY_CURRENT_USER) is stored in the ntuser.* files and these are in use while the user is logged. User profiles are backed up normally as part of the boot / system partition backup (generally C:\). But be sure to backup this specially when you are not doing an entire backup of the C drive. To restore one or more user profiles (many could be restored at once), follow the steps below: 1. Log on the system using a Local Backup Operator or Local Administrator Account 2. Start the Restore User Interface using Start --> Program --> Tivoli Storage Manager -->Backup Archive GUI --> Restore or just double click the TSM Backup Archive shortcut --> Restore.
Note
If you prefer, use the Web client with your internet browser and type:
http://localhostname:1581
3. Choose the proper profile clicking on + Machine name --> + File level --> + \\Machine name\c$ --> + Documents and settings. And select the desired user name. You should see a screen similar to Figure 75. Click the Restore button.
151
Note:
Still when it is possible to restore individual folders inside the profile folder, we recommend to restore the entire directory to keep consistency with the ntuser.* files. These last always should be restored. 4. After you click the Restore button, a window similar to Figure 62 shows you the option to restore in another location. The user profiles must be restored in their original location if you want Windows 2000 recognize them. 5. If there is already a profile of files with the same names to which are being restored, you should see the Figure 76. Select Apply action to all remaining files and click the Restore button.
152
6. If the profile you are restoring it is currently in use, you should see the Figure 77. Select again. Apply this action to all remaining files and click the Replace at Reboot button.
153
7. Finally, you should see the panel in Figure 78. Select the most convenient option.
6.5 Troubleshooting
In this section, we provide tips on troubleshooting.
154
Note
Once the problem has been identified and resolved, the system should be restored using the method described in 6.2.3, Restoring a Windows 2000 Professional or member server on page 94.
155
Note
Once the problem has been identified and resolved, the system should be restored using the method described in 6.2.4, Restoring a Win 2000 domain controller (non-authoritatively) on page 102.
156
157
attempting to adapt these techniques to their own environments do so at their own risk. Any pointers in this publication to external Web sites are provided for convenience only and do not in any manner serve as an endorsement of these Web sites. The following terms are trademarks of the International Business Machines Corporation in the United States and/or other countries:
e (logo) IBM AIX AT IBM.COM Redbooks Redbooks Logo RS/6000 Wizard Notes NetView
The following terms are trademarks of other companies: Tivoli, Manage. Anything. Anywhere.,The Power To Manage., Anything. Anywhere.,TME, NetView, Cross-Site, Tivoli Ready, Tivoli Certified, Planet Tivoli, and Tivoli Enterprise are trademarks or registered trademarks of Tivoli Systems Inc., an IBM company, in the United States, other countries, or both. In Denmark, Tivoli is a trademark licensed from Kjbenhavns Sommer - Tivoli A/S. C-bus is a trademark of Corollary, Inc. in the United States and/or other countries. Java and all Java-based trademarks and logos are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and/or other countries. Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States and/or other countries. PC Direct is a trademark of Ziff Communications Company in the United States and/or other countries and is used by IBM Corporation under license. ActionMedia, LANDesk, MMX, Pentium and ProShare are trademarks of Intel Corporation in the United States and/or other countries. UNIX is a registered trademark in the United States and other countries licensed exclusively through The Open Group.
158
SET, SET Secure Electronic Transaction, and the SET Logo are trademarks owned by SET Secure Electronic Transaction LLC. Other company, product, and service names may be trademarks or service marks of others.
159
160
161
Book Title Using ADSM to Back Up and Recover Microsoft Exchange Server Using ADSM to Back Up Databases Using Databases with Tivoli Applications and RIM Using Tivoli Software Installation Service for Mass Installation Using Tivoli Storage Manager to Back Up Lotus Notes Using Tivoli to Manage a Large-Scale SAP R/3 Environment Using TSM in a Clustered Windows NT Environment Windows NT Backup and Recovery with ADSM
Publication Number SG24-5266 SG24-4335 SG24-5112 SG24-5109 SG24-4534 SG24-5500 SG24-5742 SG24-2231
162
Book Title ADSMConnect Agent for Lotus Notes on AIX Installation and Users Guide ADSMConnect Agent for Lotus Notes on Windows NT Installation and Users Guide ADSMConnect Agent for Microsoft Exchange Server Installation and Users Guide ADSMConnect Agent for Microsoft SQL Server Installation and Users Guide ADSMConnect Agent for Oracle Backup on AIX Installation and Users Guide ADSMConnect Agent for Oracle Backup on HP-UX Installation and Users Guide ADSMConnect Agent for Oracle Backup on Sun Solaris Installation and Users Guide ADSMConnect Agent for Oracle Backup on Windows NT Installation and Users Guide Tivoli Decision Support 2.1 Administrator Guide Tivoli Decision Support 2.1 Installation Guide Tivoli Decision Support 2.1 Users Guide Tivoli Distributed Monitoring 3.6 Collection Reference Tivoli Distributed Monitoring 3.6 Release Notes (supplied with the product) Tivoli Distributed Monitoring 3.6.1 Release Notes (supplied with the product) Tivoli Distributed Monitoring for OS/390 V3.6.1 Tivoli Distributed Monitoring Users Guide 3.6 Tivoli Framework 3.6 Users Guide Tivoli Framework 3.6.1 Release Notes (supplied with the product) Tivoli Inventory 3.6.1 Release Notes (supplied with the product) Tivoli Inventory for OS/390 V3.6.1 Release Notes (supplied with the product) Tivoli Problem Management Distributed Data Manager System Administrators Guide Tivoli Problem Management System Administrators Guide Tivoli Problem Management Users Guide Tivoli Service Desk Administration Users Guide Tivoli Service Desk Installation Guide Tivoli Software Distribution 3.6 Release Notes (supplied with the product) Tivoli Software Distribution 3.6.1 Release Notes (supplied with the product) Tivoli Software Installation Service 3.6.1 Release Notes (supplied with the product) Tivoli Software Installation Services 3.6 Users Guide Tivoli Storage Manager for AIX Version 3.7 Administrators Guide Tivoli Storage Manager for AIX Version 3.7 Administrators Reference Tivoli Storage Manager for AIX Version 3.7 Quick Start Tivoli Storage Manager for AS/400 Version 3.1.2 Administrators Guide Tivoli Storage Manager for AS/400 Version 3.1.2 Administrators Reference Tivoli Storage Manager for AS/400 Version 3.1.2 Quick Start Tivoli Storage Manager for HP-UX Version 3.7 Administrators Guide Tivoli Storage Manager for HP-UX Version 3.7 Administrators Reference Tivoli Storage Manager for HP-UX Version 3.7 Quick Start
Publication Number SH26-4067 SH26-4065 SH26-4071 SH26-4069 SH26-4061 SH26-4073 SH26-4063 SH26-4086 GC32-0437 GC32-0438 GC32-0436 SC31-5118 GI10-3023 GI10-8021 GI10-8043 GC31-8382 GC31-8433 GI10-8014 GI10-8018 GI10-8048 GC31-5184 GC31-5173 GC31-5175 GC31-5205 GC31-5167 GI10-3014 GI10-8019 GI10-8015 GC31-5121 GC35-0368 GC35-0369 GC35-0367 GC35-0315 GC35-0316 GC35-0317 GC35-0371 GC35-0372 GC35-0370
163
Book Title ADSTAR Distributed Storage Manager for MVS Version 3.7 Administrators Guide ADSTAR Distributed Storage Manager for MVS Version 3.7 Administrators Reference ADSTAR Distributed Storage Manager for MVS Version 3.7 Quick Start ADSM for OS/2 Version 3.1 Messages Tivoli Storage Manager for Sun Solaris Version 3.7 Administrators Guide Tivoli Storage Manager for Sun Solaris Version 3.7 Administrators Reference Tivoli Storage Manager for Sun Solaris Version 3.7 Quick Start Tivoli ADSM for VM Version 3.1 Quick Start Tivoli Storage Manager for Windows NT Version 3.7 Administrators Guide Tivoli Storage Manager for Windows NT Version 3.7 Administrators Reference Tivoli Storage Manager for Windows NT Version 3.7 Quick Start Tivoli Storage Manager Version 3.7 AFS/DFS Backup Clients Tivoli Storage Manager Version 3.7 Installing the Clients Tivoli Storage Manager Version 3.7 Messages Tivoli Storage Manager Version 3.7 Reference Cards for the Backup-Archive Clients Tivoli Storage Manager Version 3.7 Trace Facility Guide Tivoli Storage Manager Version 3.7 Using the Application Programming Interface Tivoli Storage Manager Version 3.7 for NetWare Using the Backup-Archive Client Tivoli Storage Manager Version 3.7 for UNIX Using the Backup-Archive Client Tivoli Storage Manager Version 3.7 for Windows Using the Backup-Archive Client TME 10 Enterprise Console 3.6.1 Release Notes (supplied with the product) TME 10 Enterprise Console Adapters Guide Version 3.6 TME 10 Enterprise Console Rule Builders Guide Version 3.6 TME 10 Enterprise Console Users Guide Version 3.6 TME 10 Framework 3.6 Planning & Installation Guide TME 10 Framework 3.6 Reference Manual TME 10 Framework Release Notes Version 3.6 TME 10 Inventory 3.6 Release Notes (supplied with the product) TME 10 Inventory 3.6 Users Guide TME 10 Software Distribution 3.6 AutoPack Guide TME 10 Software Distribution 3.6 Reference Manual TME 10 Software Distribution 3.6 Users Guide TME 10 Tivoli/Plus ADSM User's Guide Tivoli Framework Version 3.7 Users Guide
Publication Number GC35-0277 GC35-0278 GC35-0276 SH35-0133 GC35-0374 GC35-0375 GC35-0373 GC35-0351 GC35-0380 GC35-0381 GC35-0379 SH26-4106 SH26-4102 GC35-0382 SX26-6021 SH26-4104 SH26-4107 SH26-4100 SH26-4105 SH26-4101 GI10-8020 SC31-8507 SC31-8508 GC31-8506 SC31-8432 SC31-8434 GI10-3028 GI10-3011 GC31-8381 GC32-0294 SC31-8331 GC31-8330 GC31-8405 GC31-8433
164
Fax Orders United States (toll free) Canada Outside North America 1-800-445-9269 1-403-267-4455 Fax phone number is in the How to Order section at this site: http://www.elink.ibmlink.ibm.com/pbl/pbl
This information was current at the time of publication, but is continually subject to change. The latest information may be found at the Redbooks Web site. IBM Intranet for Employees IBM employees may register for information on workshops, residencies, and Redbooks by accessing the IBM Intranet Web site at http://w3.itso.ibm.com/ and clicking the ITSO Mailing List button. Look in the Materials repository for workshops, presentations, papers, and Web pages developed and written by the ITSO technical professionals; click the Additional Materials button. Employees may access MyNews at http://w3.ibm.com/ for redbook, residency, and workshop announcements.
165
First name Company Address City Telephone number Invoice to customer number Credit card number
Last name
Card issued to
Signature
We accept American Express, Diners, Eurocard, Master Card, and Visa. Payment by credit card not available in all countries. Signature mandatory for credit card payment.
166
Index A
Active Directory 6, 11, 20 Active Directory restore 155 ALL-LOCAL 43 ALL-LOCAL domain 21 APAR list 26 application log 9 Authoritative restore 144 DFS structure 144 DFS utility 144 DFSBACKUPMNTPNT 141, 145 DHCP 150 directory consistency 152 Directory Junctions 15 Directory Service Restore mode 155 Directory Services Restore 155 Disk Quotas 15 Disk quotas 146 Distributed File System 6, 12, 16 Distributed Link Tracking 14 distributed services 6 Drive branch 147 drives where DFS definitions are stored 145 dsm.opt 43, 51 dsmcutil.txt 51
B
Backing up the DHCP, WINS, and Terminal services 44 BACKUP EVENTLOG 25 backup of the entire System Object 7 Backup Operator Group 146 BACKUP REGISTRY 25 BACKUP SYSTEMOBJECTS 21 BACKUPREGISTRY option 26 boot.ini 8 bootsect.dos 8 broken DFS links 6
E
Encrypted File System (EFS) 13 entire System Object 155 error messages 140, 143 Event log backup 25 Event Logs 9 Event logs 20 EXCLUDE.DIR 43 Exporting the Disk Quota 146
C
Certificate Services DB 10 client implementation 31 client scheduler 51 Closed, registration 32 Cluster database 20 Cluster DB 12 COM+ 154 COM+ Class DB 10 COM+ database 20 common permissions 13 Complete system restores 148 Complete System Restores & DFS 145 Component Object Model 10
F
File Replication Service 11 File Replication Service (FRS) 12 File System (NTFS) components 12 Following Location 143
G
Group Policy 11
D
Database size calculation 33 Database, Recovery Log and storage pools size 33 default management class 43 DFS diagram 141 DFS Junction points 147 DFS junction points 143
H
Hardware requirements 38 hierarchical storage management 17 housekeeping information, Active Directory 7
I
Implementation planning 31 Include-exclude list 43
167
include-exclude list 44 Indexing service 17 install of Tivoli Storage Manager 46 Installation and setup TSM 4.1.2 client 43 InstallSheild for Windows Installer used 24 integrity of backups 7
P
Policy management 28 Primary Storage Pool size calculation 36 profile of files with the same names 152 Public Key technology 13
Q
QUERY INCLEXCL 22 QUERY of System Objects 21
J
Junction Point 141 Junction points 147
R
Rebooting system into normal mode 155 Recovery Log 32 Recovery Log size calculation 35 regedit 43 Registry 9, 20 registry hives 9 registry key 24 REGREST 9 Remote Backups and Restores 8 Remote Storage Service 17 Remote Storage Service (RSS) 17 Removable Storage Management (RSM) 148 Removable Storage Management database 20 Removable Storage Manager 16 Reparse Points 13 Replicated file systems 20 Replication Policy settings, disabling 144 RESTORE EVENTLOG 25 RESTORE REGISTRY 25 RESTORE SYSTEMOBJECT 22 Restore without services active 26 Restoring a Domain Controller (non-authoritatively) 155 Restoring DFS on Windows 2000 Domain Controllers 144 restoring files and directories in DFS structures 141 restoring individual folders 152 restoring sparse files to a non-NTFS 5 file system 146 restoring the RSM database 149 Restoring user profiles 150 Restoring Windows 2000 Professional or member server 154 RSM database 154
L
Link Tracking 15 Local backup 25, 28 Local Backup Operator 151 log file checks 143
M
Management class 25 mobile computer support 24 Multiple Named Data Streams 13
N
Network bandwidth 36 non authorative restore of a DFS replica 144 normal drive filespace name 148 normal mode 155 NTbackup 4 NTbackup v TSM 28 NTbackup, comparison to TSM 19 ntbootdd.sys 8 ntdetect.com 8 ntdlr 8 NTDS.DIT 11 NTFS 12 NTFS 5 12, 148 Number of Versions 34
O
ODBC driver not included 24 Operators Group 39 opportunistic locks 13 Other Windows 2000 Databases 150 overview of Windows 2000 products 1
168
S
security log 9 Server registration modes 32 Server storage 32 Single Instance Store 16 Software requirements 38 Sparse File support 14 Sparse files 146 Storage components disk quotas 15 Storage pools 32 Symmetric Key encryption 13 system / boot partition restore 155 System and boot files 20 System boot files 8 System File protection Service 8 System information 39 system log. 9 System Object 5 System Object component processing 8 System Objects 20, 25 System Objects managed as a group 21 System Partition Boot Files 8 System State Components 4 System State & System Object, differences 5 System Volume 6 System Volume (SYSVOL) 11 System volume (SYSVOL) 20 System Volume restore 155 SYSTEMOBJECT Domain 21 SysVol 6
U
User permissions for Windows 2000 39
V
verifying your restore 150 Volume Mount Points 15 volume points 15
W
Web access 11 web client services 51 Web Server interface 146 Windows 2000 Advanced Server 2 backup API 8 components 3 Datacenter Server 2 domain controllers 9 Event logs 7 implementations 1 Professional - overview 2 Server overview 2 Windows 2000 features 1 WINS 150
T
Tivoli Storage Manager 4.1.2 support for Windows 2000 3 System Object 5 Tivoli Storage Manager 3.7.3 server 19 Tivoli Storage Manager 4.1.2 client introduction 19 Tivoli Storage Manager Client Configuration Wizards 51 Tivoli Storage Manager Server code level 31 Tombstone Lifetime 32 transaction log files 11 Troubleshooting 154 type of install 48
169
170
SG24-6141-00 Deploying the Tivoli Storage Manager Client in a Windows 2000 Environment
What other subjects would you like to see IBM Redbooks address?
Please rate your overall satisfaction: Please identify yourself as belonging to one of the following groups: Your email address: The data you provide here may be used to provide you with information from IBM or our business partners about our products, services or activities. Questions about IBMs privacy policy?
O Very Good
O Good
O Average
O Customer O Business Partner O IBM, Lotus or Tivoli Employee O None of the above
O Please do not use the information collected here for future marketing or promotional contacts or other communications beyond the scope of this transaction.
The following link explains how we protect your personal information. ibm.com/privacy/yourprivacy/
171
BUILDING TECHNICAL INFORMATION BASED ON PRACTICAL EXPERIENCE IBM Redbooks are developed by the IBM International Technical Support Organization. Experts from IBM, Customers and Partners from around the world create timely technical information based on realistic scenarios. Specific recommendations are provided to help you implement IT solutions more effectively in your environment.