Sunteți pe pagina 1din 227

Zenith Infotech, Ltd www.zenitharca.com www.zenithinfotech.

com

Zenith ARCA Administration Guide


Administration & Troubleshooting the Zenith ARCA
Date: 7/15/2009

Table of Contents
1 ABOUT THIS GUIDE ....................................................................................................................................................................................4 1.1 1.2 2 WHO SHOULD USE IT .................................................................................................................................................................................4 TYPOGRAPHICAL CONVENTIONS ................................................................................................................................................................5

SYSTEM OVERVIEW ...................................................................................................................................................................................6 2.1 2.2 2.3 PURPOSE ....................................................................................................................................................................................................6 SCOPE ........................................................................................................................................................................................................6 CHANGE LOG .............................................................................................................................................................................................7

DESCRIBING THE SYSTEM .......................................................................................................................................................................8 3.1 3.2 3.3 3.4 KEY FEATURES ..........................................................................................................................................................................................8 INVENTORY ................................................................................................................................................................................................8 ENVIRONMENT ...........................................................................................................................................................................................9 SYSTEM OPERATIONS ..............................................................................................................................................................................10

INSTALLATION ..........................................................................................................................................................................................12 4.1 4.2 LOGGING IN FOR THE FIRST TIME .............................................................................................................................................................12 ARCA COMPUTER MANAGEMENT AND INSTALLED APPLICATIONS ........................................................................................................12

5 6

ARCA UTILITIES SERVER BACKUP AGENT ...................................................................................................................................14 BACKUP JOB CONFIGURATION & MODIFICATION - ARCA.........................................................................................................29 6.1 6.2 6.6 6.7 6.8 VERIFYING BACKUPS ...............................................................................................................................................................................35 ARCA BACKUPS EXPLAINED ..................................................................................................................................................................37 ON-DEMAND BACKUP JOBS .....................................................................................................................................................................41 EDITING BACKUP JOBS ............................................................................................................................................................................41 CONFIGURE BACKUP ALERTING ..............................................................................................................................................................48

RESTORING FILES AND FOLDERS .......................................................................................................................................................50 7.1 7.2 7.3 7.4 7.5 MOUNTING A BACKUP IMAGE, MOUNT POINT, READ-ONLY ...................................................................................................................50 MOUNTING BACKUP IMAGES USING THE CONTEXT MENU ..................................................................................................................51 RESTORING FILES AND FOLDERS...........................................................................................................................................................52 RESTORING BACKUP IMAGE FILES........................................................................................................................................................55 DISMOUNTING BACKUP IMAGE FILES ...................................................................................................................................................56

ARCA ADMINISTRATION ........................................................................................................................................................................59 ARCA Administration Guide.doc Copyright 2009 Page 2 of 227

8.1 8.2 8.3 8.4 8.5 8.6 8.7 9

EXCHANGE RECOVERY TOOL ..................................................................................................................................................................60 BACKUP MANAGEMENT CONSOLE ...........................................................................................................................................................76 ARCA HEALTH CHECK ...........................................................................................................................................................................76 CHAIN VERIFICATION ..............................................................................................................................................................................81 EMERGENCY CLEAN UP ...........................................................................................................................................................................87 FILE VERIFICATION ..................................................................................................................................................................................91 BACKUP CHAIN CONTINUITY CHECK .......................................................................................................................................................97

VIRTUAL MACHINE ................................................................................................................................................................................101 9.1 9.2 STANDBY SERVER ..................................................................................................................................................................................101 MANAGING VIRTUAL SERVERS ..............................................................................................................................................................108 SUPPORT ................................................................................................................................................................................................151 10.1 ARCA SUPPORT PORTAL .......................................................................................................................................................................151 REPORTING DASHBOARD ................................................................................................................................................................153 11.1 11.2 BACKUP ANALYSIS ................................................................................................................................................................................153 BACKUP HISTORY ..................................................................................................................................................................................171 SERVER FAILOVER PROCESSES.....................................................................................................................................................177 12.1 12.2 ONSITE SERVER FAILURE .......................................................................................................................................................................177 SITE LEVEL FAILURE .............................................................................................................................................................................177 BARE METAL RESTORE ....................................................................................................................................................................179 13.1 BARE METAL RESTORE EXPLAINED .....................................................................................................................................................179 TROUBLESHOOTING..........................................................................................................................................................................195 TABLES ...................................................................................................................................................................................................219 APPENDIX A REFERENCE DOCUMENTS ...................................................................................................................................225 APPENDIX B GLOSSARY OF TERMS ...........................................................................................................................................226

10

11

12

13

14 15 16 17

ARCA Administration Guide.doc

Copyright 2009

Page 3 of 227

1 About this guide

This document is divided into the following chapters: Chapter 1, System Overview. Chapter 2, ARCA Administration, reviews common administrative tasks. Chapter 3, ARCA Troubleshooting gives common errors and resolutions. Chapter 4, Best Practices, explain best practice deployments. Appendix A Reference Documents Appendix B Glossary of Terms

1.1 Who Should Use It


This guide is intended for administrators with advanced knowledge and experience with system infrastructure and backup systems: Administrators: The administrator will learn how to administer and troubleshoot the ARCA.

This guide assumes that you have knowledge of Windows and backup concepts.

ARCA Administration Guide.doc

Copyright 2009

Page 4 of 227

1.2 Typographical Conventions


This document uses the following typographical conventions: Command and option names appear in bold type in definitions and examples. The names of directories, files, machines, partitions, and volumes also appear in bold. Variable information appears in italic type. This includes user-supplied information on command lines. Screen output and code samples appear in monospace type.

In addition, the following symbols appear in command syntax definitions. Square brackets [ ] surround optional items. Angle brackets < > surround user-supplied values. Percentage sign % represents the regular command shell prompt. Pipe symbol | separates mutually exclusive values for an argument.

ARCA Administration Guide.doc

Copyright 2009

Page 5 of 227

2 System Overview

2.1 Purpose
This chapter includes the following topics: About the Zenith ARCA Describing the System Administration Troubleshooting Best Practices Appendix

2.2 Scope
We will learn about maintenance and administration of the Zenith ARCA.

ARCA Administration Guide.doc

Copyright 2009

Page 6 of 227

2.3 Change Log

Date
06.17.2009 06.26.2009 07.06.2009 07.15.2009

Changes
Document created Added advanced editing of backup jobs and Ontrack, added event log tables Added Virtualization Troubleshooting section Added Failover Scenarios

ARCA Administration Guide.doc

Copyright 2009

Page 7 of 227

3 Describing the System

The Zenith ARCA is an all-in-one business continuity appliance which includes all the software and hardware necessary to protect your Windows Server infrastructure.

3.1 Key Features


The Zenith ARCA is intended for use in Windows Server environments (Windows 2000 Server and above). The features include:

Standby Server - Allows the user to perform server virtualization directly from backup files in the event of a disaster. The sandbox modes allow for testing against your servers and validating images. Backup & Recovery Allows for partition level snapshots as often as every 15 minutes for multiple recovery points. We utilize a customized version of Storagecrafts Shadowprotect to perform block level backups and recover using drag & drop functionality.

Mailbox & Message Level Recovery Using Ontrack PowerControls, restore Exchange databases and objects by only backing up the partition where your databases reside. No message level backup required. Restore to a .pst or live Exchange Server via the easy to use GUI interface.

Centralized Management Console Configure backup and disk alerting, view reports, and perform administrative tasks from one central dashboard. Bare Metal Restore Utilizing our included Bare Metal Restoration CD, boot to a restore environment to run disk checks and restore your backups to identical or dissimilar hardware, even virtual environments. Replication Copy and synchronize your backups to a local or network destination. Our included replication software allows replication to and from another ARCA or vault.

3.2 Inventory
The following components must be pre-installed on the ARCA:

ARCA Software Suite Breakthrough Copy System Breakthrough Vault Sun xVM VirtualBox Zenith Business Continuity System
ARCA Administration Guide.doc Copyright 2009 Page 8 of 227

KeyFile Maker Ontrack Power Controls 4.2

The following components must be installed on the Vault server. If you have a Vault from Zenith, this software will be preinstalled:

Breakthrough Copy System Breakthrough Vault ARCA Software Suite Sun xVM VirtualBox KeyFile Maker Ontrack Power Controls 4.2

On the target backup server the following must be installed after running the Backup Agent Install:

ARCA Backup Agent Zenith Business Continuity System

On the target backup server the following services must be started after running the Backup Agent Install:

ARCAScheduler ClStateBackAsst (Clean State Backup Assistant) ShadowProtect Service StorageCraft Shadow Copy Provider

You must have an administrative account to install and authenticate to the target backup servers. The server must have access to the D$ share on the ARCA for writing backup files.

Please contact support if any components are missing or not installed.

3.3 Environment
Before continuing, check to verify that you have: Local or Remote Access to the ARCA Internet Connection

ARCA Administration Guide.doc

Copyright 2009

Page 9 of 227

LAN Connectivity to the destination servers WAN Connectivity for replication to ARCA or Vault

3.4 System Operations


General Operational Guidelines To backup your servers from the ARCA, a backup agent must be installed. For installation instructions see the Zenith ARCA Implementation Guide.

Warning:

The ARCA cannot backup itself or other ARCA appliances. To protect your ARCA, backup the configuration settings via Restore Configuration. If the ARCA backup agent software is installed on the appliance, settings will be overwritten and you must contact support.

.Application logs are created in C:\Program Files\ZenithARCA\ApplicationLog. You must have network connectivity on the LAN when backing up servers. We do not recommend backing servers up over the WAN.

For replication, you will need to open ports in your firewall. The default client port is 39002 (BTP Breakthrough Transfer Protocol).

Default vault ports are 39000 (TCP and UDP) and 39002 (BTP). The ARCA is setup in a workgroup configuration (recommended), but it can be joined to a domain. The default admin user accounts and passwords are: administrator and restore, password arca. We recommend changing the default passwords for security. You can use any administrative account to login, but a dedicated virtualization account is recommended. The ARCA software runs under the Local System account on the ARCA. Any administrative account can be used to create the backup and authenticate to the backup agents. We recommend using the same account for ease of administration.

ARCA Administration Guide.doc

Copyright 2009

Page 10 of 227

After the backup agent is installed on destination servers, the backup agent runs under the Local System account. For email alerting, you will need an SMTP server to relay messages. The ARCA does not include an SMTP server. Documentation is available from our website www.zenitharca.com Support is available through our portal https://support.zenitharca.net

ARCA Administration Guide.doc

Copyright 2009

Page 11 of 227

4 Installation

4.1 Logging in for the First Time


The ARCA will boot to the Windows login screen. You can login with one of the default accounts, administrator or restore, password arca. You will be prompted to change the password. Do not forget the password if you decide to change it. Once you login you will presented with the Windows user interface.
Warning:

A dedicated account is recommended when performing server virtualization tasks. See the Standby Server section for details.

Configure your Network Settings by assigning static IP addresses to the LAN Connections Verify all pre-installed applications.

Please see the Zenith ARCA Getting Started Guide for initial setup information.

4.2 ARCA Computer Management and Installed Applications


We will review the system services and event viewer settings.

ZenithARCA Event Log A custom event log which reports all triggered ARCA events. Installed Applications ARCA Breakthrough Copy System KeyFile Maker Ontrack PowerControls 4.2 Sun xVM VirtualBox Zenith Business Continuity System

ARCA Administration Guide.doc

Copyright 2009

Page 12 of 227

Installed Services These services should be in a Started state for proper operation: ARCAScheduler Breakthrough Scheduler Storagecraft Image Manager

Event Viewer

Double-click each event to view its properties.

ARCA Administration Guide.doc

Copyright 2009

Page 13 of 227

5 ARCA Utilities Server Backup Agent

These utilities are installed on servers with the ARCA Backup agent. For installation instructions please see the ARCA Implementation Guide.

5.1.1 ARCA Backup Agent Doctor Run ARCA Backup Agent Doctor to verify list of backup agent components and services.
To run: Go to Start > All Programs > Accessories > System Tools > ARCA Backup Agent > ARCA Backup Agent Doctor > ARCA Backup Agent Doctor

ARCA Administration Guide.doc

Copyright 2009

Page 14 of 227

Agent Doctor launches

Click Start to verify agent components. Blue status = success or service running Red = fail or service stopped

Click Finish to close health check, following prompt appears.

ARCA Administration Guide.doc

Copyright 2009

Page 15 of 227

Click Yes to close exit prompt.

If errors are found: Attempt to restart any stopped services. Reregister failed componenets using regsvr32 in the command line.

Example: Register zrVBox.dll

Note: If errors cannot be resolved contact support.

5.1.2 Standby Server Helper Run Standby Server Helper according to the virtualization mode. The Standby Server Helper ensures your IP and MAC
address settings match the original server. Run the utility when machines are in virtual mode.

To run: Go to Start > All Programs > Accessories > System Tools > ARCA Backup Agent > Standby Server Helper

ARCA Administration Guide.doc

Copyright 2009

Page 16 of 227

Select Live Mode. This can be run in Sandbox Mode but it is not required.

Is server running in virtual mode? prompt appears, click Yes.

Operation completed successfully.

If No or Cancel is selected, no operation is performed.

5.1.3 Agent Connectivity Check Verify IP connectivity from the server backup agent to ARCA via Agent Connectivity Check.
To run: Go to Start > All Programs > Accessories > System Tools > ARCA Backup Agent > Agent Connectivity Check

ARCA Administration Guide.doc

Copyright 2009

Page 17 of 227

The Connectivity Check window opens.

Verify the ARCA Name. If the name is incorrect, type the correct name and click Test Connection. You can also check by IP address.

ARCA Administration Guide.doc

Copyright 2009

Page 18 of 227

Note: If you are receiving backup or communication errors, after the connection is successful click Update Setting to update ARCA configuration settings.

Note: If you receive a Connected successfully prompt, retry your backup job. You may have an authentication failure from the ARCA. Login to the ARCA and verify connectivity through the Backup Management Console and re-authenticate to the server.

ARCA Administration Guide.doc

Copyright 2009

Page 19 of 227

If it fails with ERROR in connection, retry the steps above.

Note: If you still cannot connect, archive your current backups, reinstall the backup agent and retry the backup job.

If the issue is not resolved after retrying these steps contact support.

5.1.4 Backup Job Creator Verify backup job was created during backup agent setup
To run: Go to Start > All Programs > Accessories > System Tools > ARCA Backup Agent > Backup Job Creator

Backup Job Creator launches.

ARCA Administration Guide.doc

Copyright 2009

Page 20 of 227

Click Next to start job creator.

Verify the Backup job is already present prompt appears (the job was configured during agent install)

Click OK to close.
ARCA Administration Guide.doc

Copyright 2009

Page 21 of 227

5.1.5 Clean State Backup Assistance Clean state backup (CBSA) must be configured on the server side. CBSA is Zeniths version of VSS (Volume Shadow Copy
Service). If an application is not VSS-aware, run CSBA to force applications to flush in-memory transactions to disk. It is disabled by default.

Launch Clean State Backup Assistance from Start Menu > All Programs > Accessories > System Tools > ARCA Backup Agent > Clean State backup Assistance

This launches Clean State backup Assistance (CBSA). CBSA is disabled by default.

ARCA Administration Guide.doc

Copyright 2009

Page 22 of 227

If there are no applications that require CSBA, click Close. To verify if an application is VSS aware check with your application vendor. Common applications that are VSS aware include the Windows System State, most system services, and Microsoft Back Office 2003 and above (this includes Exchange and SQL). Version of Back Office 2000 applications and earlier are not VSS aware. If any applications require CSBA click Proceed. This opens Clean State Backup Configuration.

ARCA Administration Guide.doc

Copyright 2009

Page 23 of 227

Define Schedule: Daily or Weekly If Weekly is selected, Schedule Day option appears. Choose a day of the week to run. View Essential Services or View All Services, essential services are highlighted yellow.

ARCA Administration Guide.doc

Copyright 2009

Page 24 of 227

Clicking the help ? button explains Essential vs. All Services. After CSBA stops the services, they will auto start within seven minutes.

ARCA Administration Guide.doc

Copyright 2009

Page 25 of 227

Check the service or services to enable CSBA (IIS Admin Service in the below example)

Click Save, the CSBA Backup Configuration window stating the following services have been selected appears:

Confirm you choice and click Save & Close. Saving enables CSBA for the selected services.

ARCA Administration Guide.doc

Copyright 2009

Page 26 of 227

To return to scheduler click Cancel. When CSBA is reopened the state is enabled with the services selected.

Click Proceed to view status

Verify ARCAScheduler service is started. The service runs under the Local System account. If CSBA is enabled, ensure the ClStateBackAsst service is running.

ARCA Administration Guide.doc

Copyright 2009

Page 27 of 227

ARCA Administration Guide.doc

Copyright 2009

Page 28 of 227

6 Backup Job Configuration & Modification - ARCA

After server configuration is complete, you must make a connection to the server, verify the backup job schedule, and enable the backup job. The backups are disabled by default. Login to the ARCA Launch the Backup Management Console from Start > All Programs > ARCA > Backup Management Console or through the ARCA Dashboard, ARCA Administration section.

ARCA Administration Guide.doc

Copyright 2009

Page 29 of 227

This launches Backup Management Console. Connect to servers and manage backup jobs from this interface.

If not servers are added to the console the above prompt appears.

ARCA Administration Guide.doc

Copyright 2009

Page 30 of 227

You can also open the Backup Management Console via the system tray shield icon The shield is blue when connected to a server, red when disconnected

To connect to the installed server, it must be added under Network View. This adds a default node called New node %number% in a disconnected state.

ARCA Administration Guide.doc

Copyright 2009

Page 31 of 227

Enter the following information to connect to the server under Server Properties: Server Name NetBIOS Name Server Address NetBIOS Server Name or IP (can be same as server address) Domain Name leave blank if the server is connected to a workgroup User Name admin user account name Password admin user account password

ARCA Administration Guide.doc

Copyright 2009

Page 32 of 227

After server information is entered click Connect, this changes the Status from Disconnected to Connected and the server connects to the management console (see below screenshot).

ARCA Administration Guide.doc

Copyright 2009

Page 33 of 227

After the server is connected, navigate to the Backup Jobs tab. You will see the backup job created in a disabled state.

The next step is to enable the backup job. To enable, right click the job and select Enable.

ARCA Administration Guide.doc

Copyright 2009

Page 34 of 227

Job status changes from disabled to enabled. Backups will start running based on the specified schedule defined during agent setup. You can view and edit the job schedule by right-clicking Edit Schedule. The job status changes to disabled.

If Use VSS is checked under Additional Incremental Backups every backup will be VSS. Please refer to the Zenith ARCA Administrators Guide for additional job configuration options.

6.1 Verifying Backups


After backups are enabled you must verify that they are running according to schedule. If alerting was configured, you will receive backup alerts depending on the template configuration. Backup Jobs have the following statuses: Disabled job disabled, on hold Initializing job initialing (changing state) Queued job queued, job is in this state between scheduled job runs Running job running Aborting job cancelled Successful job completed successfully Failed job failed

ARCA Administration Guide.doc

Copyright 2009

Page 35 of 227

Job Schedule

Job Status

ARCA Administration Guide.doc

Copyright 2009

Page 36 of 227

To view backup history: Click Backup History tab Click Details for additional job information.

For troubleshooting failed backups, please see the Zenith ARCA Troubleshooting Guide Backup logs are written to the server under: \\%servername%\c$\Program Files\Zenith\Zenith Infotech\Logs The Backup Management Console is just a console to view those logs. For archive purposes, logs can be copied and parsed separately. The capacity to view the last backup is available through the ARCA Reporting Dashboard and emailed via template configuration.

6.2 ARCA Backups Explained


The ARCA utilizes ShadowProtect for backup snapshots. All backups reside on the ARCA under D:\Backup. Folders are named with a UID (unique identifier) followed by server name. Files within each folder are named with the partition name followed by a UID based on run.

ARCA Administration Guide.doc

Copyright 2009

Page 37 of 227

Examples: Server Names: pmg-win2k3 and zenexch

Folder contents zenexch

The first backup of a server is the base or full backup or *.spf file, Subsequent backup files are incremental files based upon the full backup. If you selected backup encryption, an *.spk (keyfile) will be in each directory Any files with the word Migration in them were used for Standby Server Virtualization

ARCA Backup Retention Policy:


Base Full backup (*.spf) All Monthly Incremental backups (*.cm.spi) Five weekly incremental backups (*.cw.spi)
Copyright 2009 Page 38 of 227

ARCA Administration Guide.doc

Fourteen daily incremental backups (*.cd.spi) Two days of intra-daily incremental backups (*.cd)

The following chart explains each file type:

ARCA Administration Guide.doc

Copyright 2009

Page 39 of 227

The following chart explains each compression level:

6.2.1 Backup Encryption


When you create a backup image file, either manually or through a scheduled job, you can choose to protect the file using password protection and encryption of the backup image file. This is useful if the backup image files will be stored on a network or removed off-site and you need to protect against unauthorized access and use. If you select to protect the backup image file, you must specify the correct password in order to mount or restore the backup image. When you enter a password for the backup image file, you may use alpha and numerical characters. You must confirm the password by typing it again.

Note: Passwords are case sensitive. When you mount or restore a password encrypted backup image file, you will be prompted for the password. Note: If you do not enter the correct password, or you forget the password, you will not be able to access the backup image file. Make sure the password is stored in a secure location. Zenith has no method for gaining access to encrypted backup image files.

You can select from three methods when encrypting a backup image file. RC 4 128 bit (Fast) this encryption option is faster than AES 128 bit, but the resultant image is less secure. AES 128 bit (More Secure) this encryption option is more secure than RC 4 128 bit, but will require longer to encrypt the image. AES 256 bit (Most Secure) this encryption option is the most secure but will also require the most time to encrypt the image file. In addition to bit strength, the password used can affect the security. The following guidelines apply to ensure greatest security with password encrypted backup image files. Use at least eight characters. Use a random mixture of characters, upper and lower case and numbers. Dont use a word found in the dictionary. Change your password regularly or if you suspect your password has been compromised.
ARCA Administration Guide.doc Copyright 2009 Page 40 of 227

6.6 On-Demand Backup Jobs


If a backup has failed, or you want to run a backup on-demand. Connect to the Backup Management Console and connect to the server in question. Select the Backup Jobs tab Right click the server and select Execute (Incremental)

The only time Execute (Full) should be selected is if the first full backup failed or you want to start a new backup chain.

Warning:

If another full backup is run all subsequent incremental backups will run off of this new full backup. Your current backup chain will stop.

Files can still be restored from the older chain but the disk space on the ARCA will fill quicker than anticipated.

6.7 Editing Backup Jobs


After a backup job is configured you can edit the schedule or edit the job properties. Connect to the Backup Management Console.

ARCA Administration Guide.doc

Copyright 2009

Page 41 of 227

6.7.1 Edit Schedule


Console and connect to the server in question. Select the Backup Jobs tab Right click the backup job and select Edit Schedule

Job gets disabled automatically at this point.

Edit Job Schedule window appears. The job schedule is based on agent install settings.

After job schedule changes are made click OK to apply settings. Backup job is automatically re-enabled.

6.7.1.1 Edit Job Options:


VSS Incremental Backups

ARCA Administration Guide.doc

Copyright 2009

Page 42 of 227

Additional Incremental Backups Start taking backups at this time Stop taking backups at this time Minutes between backups interval between job execution Recommend setting: same schedule for VSS and Additional Incremental Backups.

Note: Notice the Schedule options are greyed out, this is by design. The ARCA does one full backup and scheduled point in time incremental backups appended to the full backup (see ARCA Backups Explained)

6.7.2 Edit Backup Job Properties


After a backup job is configured you can edit the schedule or edit the job properties. The backup job settings are defined during agent setup. Connect to the Backup Management Console.

The job will be automatically disabled and re-enabled during the editing process. Select the Backup Jobs tab Select the backup job and press Edit

ARCA Administration Guide.doc

Copyright 2009

Page 43 of 227

Backup Job Editor launches. Press Next.

This will bring up the volumes to backup screen. You can select/deselect volumes to backup. Press Next to continue.

Now you can select a backup image destination. Click Browse to manually edit or use the drop down to select pre-defined destinations. Press Next to continue.

ARCA Administration Guide.doc

Copyright 2009

Page 44 of 227

Warning:

For alerting and replication you must match the backup destination to the following settings: \\%ARCAName%\%Volume%\%Backup%\%Servername%

Specify the backup schedule screen appears. You can select the backup schedule (see Edit Schedule section for details). Press Next.

ARCA Administration Guide.doc

Copyright 2009

Page 45 of 227

Backup options screen is displayed. Options are compression, password, and advanced. These values are predefined during agent setup and are grayed out by design. Press Next after options are defined.

Advanced Options default options are recommended


Warning:

Backup throttle system resources (performance throttling) Image caching, self-healing Commands

Editing Advanced options is not recommended.

ARCA Administration Guide.doc

Copyright 2009

Page 46 of 227

This brings up the Wizard Summary. Review the backup job summary and click Finish to complete your edits. You are returned to the backup job.

Warning:

Do not select Execute Now. If this option is selected you will start a new full backup and your existing chain will be stopped.

6.7.2.1 Editing Destination


To edit a backup job destination, select the Destinations tab from the center panel of the main screen. Console and connect to the server in question. Select the Destination tab Highlight the Network Share and click Edit. The Destination window appears.

Click Browse to edit the backup destination. Select Connect radio buttons to change authentication credentials.

ARCA Administration Guide.doc

Copyright 2009

Page 47 of 227

6.8 Configure Backup Alerting


If you require an email alert sent after every job success and/or failure you may configure it through the Backup Management Console directly. There are no additional filters with this option. The ARCA does not include an SMTP server. You must have access to a valid SMTP server to relay alerts. Depending on your SMTP server configuration, the ARCA IP address may need added to the allow relay list.

To setup email alerts: 1. Backup Failures are sent from the ARCA Configuration Panel. You must assign an alert template to each job to enable this functionality. 2. Enable Agent Options through the Backup Management Console a. Open the Backup Management Console from the ARCA Dashboard > ARCA Administration. b. Connect to your server under Network View c. Go to the "Options" menu and select "Agent Options"

d. Fill out the required information 1. SMTP Server 2. Email From Address (This can be any address) 3. Email To Address
ARCA Administration Guide.doc Copyright 2009 Page 48 of 227

4. User Name (optional) 5. Password (optional) 6. Non-default SMTP Port (optional) 7. Send Email on Success (On/Off) 8. Send Email on Failure (On/Off) e. Click "OK". This sends a test email to the defined email address. You will receive an email for every success/failure of the job by server partition depending on the options selected above. Depending on how often your backups run, you will receive multiple emails a day.

Example subject of success: ShadowProtect backup success on PMG-WIN2K3 Body: start time: 3/29/2009 4:51:22 AM finish time: 3/29/2009 4:52:29 AM source path: (C:\) NTFS destination path: \\ZNAS-PMGTRAININ\D$\Backup\97F1DE95C8D2422D-pmg-win2k3\C_VOL-b001-i015.spi Example subject of failure: ShadowProtect backup failure on PMG-WIN2K3 Body: 29-Mar-2009 04:53:43 service 100 service (build 42) started job manually as incremental 29-Mar-2009 04:53:43 service 104 3.3.0.16 1C25-1975 50F0- 716F-A575-A3CD 29-Mar-2009 04:53:43 service 100 backup volume C:\ (NTFS) 29-Mar-2009 04:53:43 service 509 Cannot get access to destination object

ARCA Administration Guide.doc

Copyright 2009

Page 49 of 227

7 Restoring Files and Folders

You can restore individual files and folders using two methods. You can restore files and folders by using the Explore Backup Wizard while running in Windows, or you can restore files and folders from the Recovery Environment. The Explore Backup wizard allows you to restore files and folders from an existing backup image. This wizard can be run from Windows or from the Recovery Environment. If the operating system is unable to boot, you must boot to the recovery environment to mount and restore files and folders. Table 11 below shows the restore method options and when a particular option should be used based on the state of the computer.

Note: To mount and restore data from an incremental backup image, you must have all previous incremental backup image files and the initial full backup image. If any backup images are missing from the set, mounting and restoring will be impossible. Note: Backup Management will automatically associate the files required to browse and restore a specific point-in-time backup image. You are only required to select the point-in-time you want to explore.

7.1 Mounting a Backup Image, Mount Point, Read-Only


The mount utility can mount a backup image file as a drive letter on your computer. When a backup image is mounted as a drive letter, the backup image will appear and behave as a drive letter on the computer with all the properties of the original volume. The mount utility can mount a backup image file as a mount point, which is a directory on an NTFS file system. Mount points overcome the limitation on the number of available drive letters and allow more logical organization of files and folders. The mount utility mounts the backup image as read-only. By mounting a backup image as read-only you can be assured that the backup image can not be changed while providing access to the image file to end users for file or folder recovery. Mount a backup image as read-only when:

You want to recover files from an existing backup You want to view the contents of a backup You want to run other applications on an existing backup image such as a storage resource manager.

7.1.1 Mounting a Backup Image as Writeable You can also mount backup image files as writeable. By mounting a backup image as writeable, you have the ability to remove files from the backup image, such as viruses or other malware. You can also add files to the backup image file. Mount a backup Image as Writeable when:
You want to update the security on the image file; ARCA Administration Copyright 2009 Guide.doc

Page 50 of 227

You want to update an existing image file, such as removing a virus. You have access issues when restoring data.

7.2 Mounting Backup Images Using the Context Menu


When exploring files using Windows Explorer, the Mount and Quick Mount options are available when right clicking on any backup image file, for a previously mounted image file, you can right click and choose Dismount or Quick Dismount.

7.2.1 Quick Mount


When you right click on a backup image and select Quick Mount, the backup image will be mounted as read-only using the next available drive letter. You can select multiple image files to quick mount, each image file will be assigned the next available drive letter.

7.2.2 Mount
When you right click on a backup image and select Mount, the Browse or Restore Files Wizard will initiate. Using the Wizard to mount the backup image, you will be provided with the options of mounting as a mount point or drive letter and the read-only options.

If your backup file is encrypted a prompt appears to enter the password before the file is mounted.

Note: You can simultaneously mount multiple backup image files, however, you must go through the Mount Wizard for each backup image you wish to mount, or alternatively, you can select to quick mount multiple backup images at once.

ARCA Administration Guide.doc

Copyright 2009

Page 51 of 227

7.3 Restoring Files and Folders


1. To explore a backup image, select Explore Backup under Tasks in the left panel of the main screen or select Explore Backup from the center panel of the main screen. The third method to start the wizard is to select Tasks > Explore Backup from the Menu Bar. This will start the Explore Backup Wizard. Press Next to Continue.

2. This will bring up the Backup Image File Name dialog screen. Select the image file you want to browse. You can either provide a path name to the file or click the Browse button to locate a file.

ARCA Administration Guide.doc

Copyright 2009

Page 52 of 227

If your backup file is encrypted a prompt appears to enter the password before the file is mounted.

Enter the encryption password and click OK. To view the image properties.

Note: Once you have selected a backup image file to browse, the properties for that backup image will be displayed. You can view information about the image file, originating partition, disk information and originating machine information.

Note: If you have selected a backup image file to which you have already saved changes, you will see a list of the dependencies of that image file, along with further information about the image and the originating machine from which the backup came. You can also view the original disk layout from the image file you selected.
3. This brings up the Backup Image Dependencies dialog screen. This dialog presents all the points-in-time in the backup image set you selected. You can verify your selection or select another point-in-time from the image set. You can view information about the image file, originating partition, disk information and originating machine information. After selecting the point-in-time, press the Next button to continue.

ARCA Administration Guide.doc

Copyright 2009

Page 53 of 227

4. This will bring up the Specify Options for Exploring an Existing Backup Image dialog screen. Select the radio button corresponding to the method you wish to use to mount the image. We recommend mounting the file as the next drive letter for ease of use.

Select your explore options and press Next.

ARCA Administration Guide.doc

Copyright 2009

Page 54 of 227

Note: To mount the backup image as a writeable volume, simply uncheck the box beside Mount Backup as Read-Only.

5. This brings up the Wizard Summary (see Figure 34). Review the summary and press Finish to mount the backup image. After the backup image has been mounted, the image will automatically be brought up in Windows Explorer as a mounted volume.

6. With the backup image mounted, you may browse the contents of the volume as you would a regular volume, selecting files and folders you wish to copy and restore to a previous point-in-time.

7.4 Restoring Backup Image Files


To restore volumes boot to the Recovery Environment to perform the restore. This option must be used when restoring the system volume where the operating system resides.
You can start the Restore Wizard by clicking the Restore button in the left panel of the main screen or clicking on the Restore Wizard from the center panel of the main screen. This can be done from the Recovery Environment CD. 1. To start the Restore Wizard, select Restore under Tasks in the left panel of the user interface or select Restore Wizard from the center panel of the main screen. This will start the Restore Wizard. Click Next to Continue. 2. This will bring up the Backup Image to Restore dialog screen. You will need to locate the image file you wish to restore from a destination location. These destination locations can be a local directory or network share. Note: If the image file you wish to restore is located in a previously defined destination location, then select the destination and locate the backup image set from the list. The next dialog screen will let you select the specific point-in-time associated with the backup image set.
ARCA Administration Guide.doc Copyright 2009 Page 55 of 227

Note: If the image file you wish to restore is not located in a previously defined destination location, you will need to browse to the location of the image file you want to restore.

7.5 Dismounting Backup Image Files


Once a backup image file has been mounted using the mount utility, it will remain mounted until it is dismounted. You can dismount a mounted backup image using the Backup Image Dismount Wizard, which is available through the management console or through a context menu option that is available on mounted backup image files. This wizard guides you through dismounting a backup image you have previously mounted and assigned a drive letter or mount point location. The wizard will also help you save changes made to backup images that were mounted as a writeable image file.

7.5.1 Dismounting Backup Images Using the Context Menu


You can dismount a mounted backup image file by right clicking on the mounted drive or mount point from Windows Explorer and selecting one of two dismount options from the context menu. The options are Dismount or Quick Dismount which are described below.

7.5.1.1 Dismount
When you select Dismount from the context menu of a mounted backup image file, the Backup Image Dismount Wizard will start and walk you through the steps of dismounting the image file and giving you the option to save changes made to the mounted backup image file if it was mounted as a writeable image.

7.5.1.2 Quick Dismount


When you select Quick Dismount from the context menu of a mounted backup image file, the dismount utility will dismount the mounted backup image file without any further action or dialog. The image will be dismounted without saving any changes made to the mounted image file.

ARCA Administration Guide.doc

Copyright 2009

Page 56 of 227

Note: Quick Dismount will dismount a backup image file without saving any changes made while the backup image file was mounted. If you wish to save changes, you must mount the backup image file as writeable and then dismount using the Backup Image Dismount Wizard and save changes.

7.5.2 Dismounting a Backup Image File Using the Backup Image Dismount Wizard
1. To start the wizard click Dismount Backup Image from the left pane of the main screen or select Tasks > Dismount Backup Image from the menu bar. This will bring up the Backup Image Dismount Wizard welcome screen.

1. Press Next to continue. This will bring up the Mounted Backup Images dialog screen. 2. Select the backup image volume you want to dismount by placing a check in the box next to the volume. You can also view the properties of the mounted image file in the lower window. Press Next to continue.

ARCA Administration Guide.doc

Copyright 2009

Page 57 of 227

3. This will bring up the Backup Image dismount Options dialog screen. If you have selected a volume that was writeable, you will have the option to save the changes you have made to that volume while it was mounted. You can save the changes to an incremental file upon dismount. 4. Select whether you want to save the changes made to the mounted volume by placing a check mark in the Save changes to incremental file box. You can rename the file by double clicking on it under the Incremental Name section of the screen. Press Next to continue.

5. This will bring up the Backup Image Dismount Summary dialog screen. View the summary to ensure everything is correct and press Finish to dismount the volume.

Note: Backup images that have been mounted will be dismounted after a reboot or by using the Backup Image Dismount Wizard from the main screen.
ARCA Administration Guide.doc

Copyright 2009

Page 58 of 227

8 ARCA Administration

ARCA Administration utilities are accessed via the ARCA Dashboard. This section contains includes the Backup Management Console, Exchange Recovery Tool, Verification Tools, and Emergency Clean Up

Exchange Recovery Tool - Ontrack Power Controls, view and restore exchange objects Backup Management Console view and edit backups, restore backup files ARCA Health Check verifies all system services and processes are running for proper operation Chain Verification - verifies the backup chain of a selected file. This runs a chain dependency verification of all files in the backup chain up to the selected file for consistency. Emergency Clean Up deletes files that are no longer needed per server File Verification verifies the consistency of a selected backup file. Backup Chain Continuity Check - matches all the GUID entries of a selected backup file up to the base to ensure the chain is valid.
Copyright 2009 Page 59 of 227

ARCA Administration Guide.doc

8.1 Exchange Recovery Tool


View and restore exchange objects using the Exchange Recovery Tool. The ARCA utilizes Ontrack Power Controls. For the utility to access backups, a point in time backup file must be mounted, see section 12.2 Backup Management Console Explore Backup for instructions. We will go over the options and how to browse and restore objects and databases. To launch the exchange recovery tool navigate to the Start Menu > All Programs > ARCA > ARCA Administration > Exchange Recovery Tool.

The Exchange Recovery Tool can also be launched through the ARCA Dashboard. From the dashboard:

Click ARCA Administration Launch Exchange Recovery Tool

ARCA Administration Guide.doc

Copyright 2009

Page 60 of 227

ARCA Administration Guide.doc

Copyright 2009

Page 61 of 227

This launches Ontrack Power Controls. Close the Data Wizard if it launches on start-up.

Icon View Source

Icons (left to right)


Open Source open source backup file Open Target PST open target pst file Open Target Exchange Server connect to target Exchange Server Open Target CAS open target content analysis file Copy copy selected exchange objects Paste paste selected exchange objects Export export selected exchange objects in msg or txt format Find search exchange objects by specified criteria Message authors or readers Subject Date Keyword(s) Attachment(s)

Preview Pane enable/disable message preview pane View Help launches PowerControls help Kroll Company on the Web launches www.kroll.com (makers of Ontrack) Message Table View shows all folders that reference a single message Attachment Table View shows all messages that reference a single attachment Conversation View allows the administrator to see a histogram of all replies or forwards associated with a given message to analyze the conversation thread

Note: Source PST and CAS files are not supported in the ARCA version of Ontrack PowerControls

ARCA Administration Guide.doc

Copyright 2009

Page 62 of 227

8.1.1 Exchange Recovery - Source Options


In the following sections we will review how to restore messages or mailboxes. After you have successfully mounted a backup file that contains your Exchange database file and log files you can restore data. After a source is opened, you can restore data, search the message store, view store properties and create reports.

Launch Ontrack PowerControls

Ontrack PowerControls opens. To begin open the source file. Click Open Source button, or File > Open Source

Select Source Files window opens.


ARCA Administration Guide.doc Copyright 2009 Page 63 of 227

Browse to the source (*.edb) and log file path (*.log). You can also open an existing pst file.

Note: Multiple source files can be open at one time

The log file path should be automatically filled in if the matching logs are where the database expects them to be and that location is mounted. If the Temporary File Path is empty recreate it when prompted. Exchange default installation path on source server: C:\Program Files\Exchsrvr\MDBDATA The default mount path will be the drive letter selected when mounting, in our example: F:\Program Files\Exchsrvr\MDBDATA Default Exchange database files (you may have additional databases depending on your environment):
Copyright 2009 Page 64 of 227

ARCA Administration Guide.doc

priv1.edb default private store contains user mailboxes pub.edb default public store contains public folders tmp.edb temporary workspace for processing transactions, contains temporary information that is deleted when all stores in the storage group are dismounted or the Exchange Information Store service is stopped

Warning:

DO NOT SELECT TMP.EDB FOR RESTORE (you will receive an error)

The Exchange database will load in the Source window. Additional icons are now available.

Expand the source database to browse to an individual mailbox, message or other object.

ARCA Administration Guide.doc

Copyright 2009

Page 65 of 227

Double-click an object to open it. View the message details including any attachments. Click the paperclip icon to save attachments.

8.1.1.1 Message Options


Right click a message, options are: Integrity Check checks object integrity Open open object Copy copy object Select All select all objects

ARCA Administration Guide.doc

Copyright 2009

Page 66 of 227

Export export object to .msg or .txt file Message Views change views (see views explanation in above section) Message Table View Attachment Table View Conversion View

Export any Exchange object up to the database (example below) to a selected location by typing the path or browsing to the export destination.

Choose to export in .msg or .txt format and click Export

Export Progress window appears. When the export is finished, you can Print or Save the report. Click Close to return to PowerControls

ARCA Administration Guide.doc

Copyright 2009

Page 67 of 227

Note: If you are exporting more than once the files WILL be overwritten if the path is not changed. These options are also available from the menus and icons above and apply to all Exchange objects (including stores).

8.1.1.1.1 Additional Store options:


o Stores (source database) Properties and Create Reports

Parent Objects (Calendar, Contacts, Inbox, etc.) Properties

ARCA Administration Guide.doc

Copyright 2009

Page 68 of 227

To close the source store right click and select Close Store or go to the root Sources and click Close All Stores. You can also close stores via the File menu.

8.1.2 Exchange Recovery - Target Options


After a target destination is opened, you can restore data from opened source files to a .pst, content analysis file (.cas), or target Exchange Server.

Icon View Target

Expand the source database to browse to an individual mailbox, message or other object.

Double-click an object to open it. View the message details including any attachments. Click the paperclip icon to save attachments.

ARCA Administration Guide.doc

Copyright 2009

Page 69 of 227

8.1.2.1 Message Options


Right click a message, options are: Open open object Delete open object confirm prompt appears on delete Paste paste object Paste Special paste object maintain the directory structure of restored items Select all select all objects at the current level
Delete Prompt

ARCA Administration Guide.doc

Copyright 2009

Page 70 of 227

8.1.2.1.1 Additional Store options


Rename & New Folder To restore to a target ensure the source file is open. Then open the destination target. Multiple destinations can be open at one time. You can connect to only one live Exchange Server at a time. If you attempt to connect to an additional live Exchange Server while a server is already open, the current server connection closes.

8.1.2.2 Target Types:


a. PST To open a target .pst click the Open Target PST icon or through the file menu Browse to the .pst file and click Open

b. CAS
To open a target .cas click the Open Target CAS icon or through the file menu. Browse to the .cas file and click Open

ARCA Administration Guide.doc

Copyright 2009

Page 71 of 227

c. Exchange Server
Click Open Target Exchange Server button, or File > Open Target Exchange Server

The Connect to Exchange Server window opens

Type the mailbox and server name to connect to and click OK. Click Cancel to close.

The Connect To Public Folders option is selected by default. This feature allows you to open public folders as a target for restoring public folders or messages. If you do not want to restore to public folders, deselect this check box.

ARCA Administration Guide.doc

Copyright 2009

Page 72 of 227

If this is the first time authenticating to the Exchange Server, the following connection prompt appears while processing the target file.

Enter administrative credentials for the Exchange Server mailbox and click OK. The prompt may appear again, which requires you to reenter this information.

ARCA Administration Guide.doc

Copyright 2009

Page 73 of 227

After the target file is processed, the Exchange Server opens in the target window. This is the live Exchange Server and any changes made here will affect the live server.

To restore from the source to the destination, export or copy and paste the Exchange Object(s). Hold down the Ctrl button to select multiple objects at one time.

ARCA Administration Guide.doc

Copyright 2009

Page 74 of 227

Copy Progress window appears. When the export is finished, you can Print or Save the report. Click Close to return to Powercontrols

ARCA Administration Guide.doc

Copyright 2009

Page 75 of 227

To close target store right click and select Close Store. If multiple target stores are open, they must be closed individually. You can also close stores via the File menu.

8.2 Backup Management Console


See the Backup Job Configuration & Modification section

8.3 ARCA Health Check


Run ARCA Health Check to verify the list of installed ARCA components and that all required processes are running and system services are started.

To launch ARCA Health Check navigate to the Start Menu > All Programs > ARCA > ARCA Administration > ARCA Doctor. You can also access the health check under the ARCA Administration of the ARCA Dashboard.

ARCA Administration Guide.doc

Copyright 2009

Page 76 of 227

ARCA Health Check launches.

ARCA Administration Guide.doc

Copyright 2009

Page 77 of 227

Click Start to run health check. o o Blue status = success or service running Red = fail or service stopped

ARCA Administration Guide.doc

Copyright 2009

Page 78 of 227

ARCA Administration Guide.doc

Copyright 2009

Page 79 of 227

Click Finish to close health check, following prompt appears.

Click Yes to close exit prompt.

ARCA Administration Guide.doc

Copyright 2009

Page 80 of 227

If errors are found: Attempt to restart any stopped services. Reregister failed componenets using regsvr32 in the command line.

Example: Register zrVBox.dll

Note: If errors cannot be resolved contact support.

8.4 Chain Verification


Chain Verification verifies the backup chain of a selected file. This runs a chain dependency verification of all files in the backup chain up to the selected file for consistency. Chain verification runs once per week and is setup via the ARCA Configuration Panel. Launch the ARCA Dashboard Click ARCA Administration

ARCA Administration Guide.doc

Copyright 2009

Page 81 of 227

Click the Chain Verification icon. This launches Chain Verification.

Click Browse to select a point-in-time backup file in the backup chain. The path defaults to the backup directory.

ARCA Administration Guide.doc

Copyright 2009

Page 82 of 227

Drill down to the full (.spf) or incremental (.spi) backup file to verify.

Double-click or click Open selected file to propagate the Image File field. If the backup image is not encrypted, a password file is not required. Click Verify to start chain verification.
Copyright 2009 Page 83 of 227

ARCA Administration Guide.doc

If the backup image is encrypted, browse to the backup key file. This file is located in the same directory as the backup file selected. Each partition has its own key file (.spk). File verification can only be run on one file at a time. This can be a time consuming process.

Double-click or click Open selected file to propagate the Password File field.

ARCA Administration Guide.doc

Copyright 2009

Page 84 of 227

Click Verify to launch chain verification command line utility or click Close to cancel.

When chain verification is complete, view the status. In the example above verification was successful. Press any key to continue to close the command prompt.

ARCA Administration Guide.doc

Copyright 2009

Page 85 of 227

Click Close to exit Chain Verification and confirm the prompt by clicking Ok to return to the ARCA Dashboard.

8.4.1 Errors
For additional error codes and troubleshooting steps refer to the ARCA Troubleshooting Guide: No file selected for verification

Invalid backup file selected

Invalid password file selected

ARCA Administration Guide.doc

Copyright 2009

Page 86 of 227

504 - Key file error key file not specified for encrypted backup file.

500 - Bad decryption password (incorrect key file specified)

8.5 Emergency Clean Up


The Emergency Clean Up utility deletes files that are no longer needed by the existing backup chain. Run this utility if the ARCA D:\ partition is running low on free space. Do not attempt to manually delete files from the backup chain as multiple errors could result.

Launch the ARCA Dashboard Click ARCA Administration

Click the Emergency Clean Up icon. This launches ARCA Emergency Cleanup.
ARCA Administration Guide.doc

Copyright 2009

Page 87 of 227

This process will delete the incremental(s) which are not part of the existing backup chain. Selection is not provided for the virtual server(s). Select servers for cleanup and click Clear incremental to clear data Select/deselect servers for cleanup via checkbox. Servers are listed by color refer to legend

The following information is available: Server Number order in which servers were added for backup Clear Files All - delete the respective folder(s) permanently Marks non-empty directories All by default
Copyright 2009 Page 88 of 227

ARCA Administration Guide.doc

Orphan deles only files which are not part of existing backup chain Marks empty directories Orphan by default

Server Name server name Root Folder Path server directory root path Size of Folder current backup folder size (virtualized servers size not shown) Root D:\Backup or D:\Replica Cleanup D:\Cleanup to view server backup and cleanup folder contents

View files click book icon

Note: Greyed out for Virtualized servers

Click Close to return to Emergency Cleanup Click Clear incremental to start cleanup or Close to exit the utility.

ARCA Administration Guide.doc

Copyright 2009

Page 89 of 227

Clicking Clear Incremental brings up Are you sure Click Yes to continue, No to return to emergency cleanup.

Note: Clear incremental and Close buttons are greyed out while cleanup is running.

After cleanup finishes cleanup prompt appears.

Click OK to incremental removed prompt and return to the main cleanup window.

ARCA Administration Guide.doc

Copyright 2009

Page 90 of 227

Click Close and confirm the prompt by clicking OK to return to ARCA Dashboard.

Note: Verify redundant files are deleted.

8.6 File Verification


The File Verification utility verifies the consistency of a selected backup file. If the backup is encrypted you must enter the password file. File verification runs upon backup file creation. Alerting is setup via the ARCA Configuration Panel.

ARCA Administration Guide.doc

Copyright 2009

Page 91 of 227

Launch the ARCA Dashboard Click ARCA Administration

Click the File Verification icon. This launches ARCA - File Verification.

Click Browse to open the Image File. The path defaults to the backup directory.

ARCA Administration Guide.doc

Copyright 2009

Page 92 of 227

Drill down to the full (.spf) or incremental (.spi) backup file to verify.

ARCA Administration Guide.doc

Copyright 2009

Page 93 of 227

Double-click or click Open selected file to propagate the Image File field.

If the backup image is not encrypted, a password file is not required. Click Verify to start file verification. If the backup image is encrypted, browse to the backup key file. This file is located in the same directory as the backup file selected. Each partition has its own key file (.spk). File verification can only be run on one file at a time.

Double-click or click Open selected file to propagate the Password File field.

ARCA Administration Guide.doc

Copyright 2009

Page 94 of 227

Click Verify to launch file verification command line utility or click Close to cancel.

When file verification is complete, view the status. In the example above verification was successful. Press any key to continue to close the command prompt. Click Close to exit File Verification and confirm the prompt by clicking OK to return to the ARCA Dashboard.

ARCA Administration Guide.doc

Copyright 2009

Page 95 of 227

8.6.1 Errors
For additional error codes and troubleshooting steps refer to the ARCA Troubleshooting Guide: No file selected for verification

Invalid backup file

Invalid password file

504 - Key file error key file not specified for encrypted backup file.

500 - Bad decryption password (incorrect key file specified)

ARCA Administration Guide.doc

Copyright 2009

Page 96 of 227

8.7 Backup Chain Continuity Check


Backup Chain Continuity Check does an image QP (Queue Pair) verification that matches all of the GUID entries of a selected backup file up to the base to ensure the chain is valid. Backup Chain Continuity Check runs daily and is setup via the ARCA Configuration Panel.

Launch the ARCA Dashboard Click ARCA Administration

Click the Backup Chain Continuity icon. This launches Backup Chain Continuity Check.

ARCA Administration Guide.doc

Copyright 2009

Page 97 of 227

Click Select File to browse to a point-in-time backup file in the backup chain. The path defaults to the backup directory.

Drill down to the full (.spf) or incremental (.spi) backup file to verify.

ARCA Administration Guide.doc

Copyright 2009

Page 98 of 227

Double-click or click Open on the selected file to propagate the Select Backup File field.

Click Verify to start continuity check. Chain verification can only be run on one file in the backup chain at a time.

When file verification is complete, view the status. In the example above verification was successful.
Copyright 2009 Page 99 of 227

ARCA Administration Guide.doc

Press any key to continue to close the command prompt and return to continuity check. Click Close and confirm the prompt by clicking OK to return to ARCA Dashboard.

8.7.1 Errors
For additional error codes and troubleshooting steps refer to the ARCA Troubleshooting Guide : No file selected

Invalid file selected

ARCA Administration Guide.doc

Copyright 2009

Page 100 of 227

9 Virtual Machine

Perform virtualization of servers in a live or sandbox environment for disaster recovery purposes. Servers can also be virtualized on a remove ARCA or Vault if replication is enabled.
Warning:

A dedicated account is recommended when performing server virtualization tasks.

Warning:

The VirtualBox hard disk xml files run from the local Documents and Settings folder; C:\Documents and Settings\%username%\.VirtualBox. Virtual machine disk corruption can occur the VM is improperly shutdown. Any backups made to the virtual machine past the corruption will be invalid.

Warning:

Virtual Servers are not intended to run for more than a few days in Live Mode. We recommend periodically shutting them down and perform a virtualization on a later backup if the server needs to run for an extended period. The sparse and cache files grow over time which can lead to corruption.

Warning:

To permanently recover, perform a Bare Metal Restoration to new hardware. This can be to identical or dissimilar hardware or dedicated virtual environment.

9.1 Standby Server


Configuring Standby Server virtualizations in a live, sandbox, and sandbox network environment the virtualizations run directly from the backup file and write changes to a sparse file. Virtual servers are used as a temporary solution or testing

ARCA Administration Guide.doc

Copyright 2009

Page 101 of 227

mechanism. To recover servers to another physical or virtual machine perform Bare Metal Restore (BMR). For additional information refer to the ARCA Administrators Guide.

The following virtualization configuration limitations apply: Assigned RAM per Virtual Machine (VM) resources are shared between the ARCA and any created virtual machines. Subtract ARCA system RAM and RAM allocated to existing VM RAM allocated to existing VM (even if the VM is stopped) is not available to new VM

Maximum RAM per VM is 3.5 GB this is a VirtualBox software limitation Only one instance of the Standby Server Wizard can run at one time under one user account Multiple virtual machines can run under this instance dependant on ARCA resources

Dual boot operating systems are not supported for virtualization OEM Software Windows operating systems must be relicensed due to hardware changes, there may be a grace period. Contact the software vendor for licensing requirements Multi-homed servers (servers with multiple IP addresses) must bind the virtual Network Interface Cards (NIC) when creating the VM

To launch the Standby Server Wizard:

Launch the ARCA Dashboard Click ARCA Administration

ARCA Administration Guide.doc

Copyright 2009

Page 102 of 227

Click the Virtual Machine icon. This launches Standby Server Wizard.

ARCA Administration Guide.doc

Copyright 2009

Page 103 of 227

Icons (left to right)

Create define a virtual server Start start an existing virtual server Purge purge existing virtual server Settings edit allocated RAM for existing virtual server Notes enter notes for any virtual server regardless of state Exit exit Standby Server Wizard

9.1.1 Virtual Server States


Backup Server Image and Replicated Backup Server Image - Virtual Server States (left to right)

a. Server available for virtualization detail fields undefined

ARCA Administration Guide.doc

Copyright 2009

Page 104 of 227

For a server to appear in this list, its backup folder must be located in the D:\Backup directory along with the full (*.spf) backup file In the case of Replicated Backup Server Image, the backup must be located in the D:\Replica directory (only populated in ARCA replication scenarios)

b. Virtual server defined (stopped) detail fields populated, VM defined but powered off

c. Virtual server running detail fields populated, VM defined and running

ARCA Administration Guide.doc

Copyright 2009

Page 105 of 227

d. Virtual server running under another user account VM defined under another user account and can only be started from the account that defined the VM.
Warning:

If you logoff the other user account with the VM running, the virtualized server will crash and there is a high possibility of file corruption.

If you attempt to manage the server while it is running under another account, the following error message appears (locked files)

To manage the virtual server, logout and login with the user account that defined the VM.

ARCA Administration Guide.doc

Copyright 2009

Page 106 of 227

9.1.2 Virtualization Modes


Warning: Virtualization mode cannot be switched or migrated after the VM is defined.

a. Sandbox Mode

Zero network connectivity Use for testing backup images, applying patches, hot fixes, etc Backups do not occur in this mode, any changes made are discarded when VM is purged

b. Live Mode

Network connectivity The server that the Live virtualization was performed on must be offline Backups continue in this mode You must perform a Bare Metal Restore to bring back the production server

Network connectivity with machines on sandbox network no LAN or WAN connectivity


Copyright 2009 Page 107 of 227

ARCA Administration Guide.doc

Test a group of virtual machines while the production servers are online i. Example: Exchange and Active Directory on the same private network (firewalled off) Test network connectivity and dependent services between sandbox network machines

Note: DHCP does not work in this mode, you must statically assign IP addresses to machines on the same subnet. The gateway is not accessible this is a private switched network.
Note: Each server is on the 169.254.x.x (APIPA addressing) subnet by default

Example: Two servers running in Sandbox Private Network, zenexch and pmg-win2k3

9.2 Managing Virtual Servers


This section goes through Standby Server interface tasks, from creating and editing a virtual server, to purging and cleanup.

Launch the Standby Server Wizard if not already open. If you attempt to open multiple instances, you will receive an error message that its already running. If the Standby Server Wizard is running under another session, you will also receive this error. Multiple instances cannot be run at one time.

ARCA Administration Guide.doc

Copyright 2009

Page 108 of 227

Note: If there is a backup server and replicated backup server folder with the exact same name, the below error occurs when launching Standby Server.

Note: If you receive the below error when launching Standby Server, you must register zrVBox.dll.

ARCA Administration Guide.doc

Copyright 2009

Page 109 of 227

To register open a command prompt Change to the C:\Program Files <x86>\ZenithARCA\Vbox\z64 directory Type the following command regsvr32 zrVBox.dll and press <Enter>

Re-launch Standby Server

ARCA Administration Guide.doc

Copyright 2009

Page 110 of 227

Note: Under Backup Server Image you will see the list of servers configured for backup. Note: Under Replicated Backup Server Image you will see the list of replicated servers if replication is setup between sites

9.2.1 Rebooting the ARCA Defined Virtual Machines


If a virtual machine is defined (started or stopped) the following steps must be performed when restarting or shutting down the ARCA appliance.
VM information is stored via the following policy: The VM should use base + 001 002 003 004 005 (110, 002, etc = incremental files)

1. Power down the VM if running. 2. Stop and disable ARCA StorageCraft ImageManager service (imagemanager.exe). 3. Restart ARCA. 4. If VM needs restarted, power on the VM.
ARCA Administration Guide.doc Copyright 2009 Page 111 of 227

5. Start StorageCraft ImageManager service and change the Startup type from Disabled to Automatic. Note: If imagemanager.exe is not running, collapsing of backup images will not occur.

Warning:

If the above steps are not followed the VM will fail to boot upon restart.

For example, 004 005 are out of retention When ARCA is rebooted imagemanager.exe will reinitialize and delete 004 005 When the user tries to start VM, incremental 004 005 are deleted (VM boot failure), all changes will be lost

9.2.2 Create a Virtual Machine


Create a virtual machine:

Select the backup folder name and click Create

The Standby Server Wizard launches on the Enter the password for the backup set screen.

Note: Click Home to return to the main Standby Server screen or Back at anytime to go back one screen or Next to go forward one screen.

ARCA Administration Guide.doc

Copyright 2009

Page 112 of 227

Type and verify the backup set password. Click Next. If the backup file is NOT encrypted leave the password fields blank. If there are multiple partitions, all files will be listed.

If the password is correct, the


ARCA Administration Guide.doc

icons change to

icons.

Copyright 2009

Page 113 of 227

If the password is incorrect or missing, a Wrong password message is displayed.

Warning:

If any image files are incorrect or corrupted you will receive the following error message and those files will remain in status. If those files are selected the migration will fail.

After the password is verified the Machine Information screen is displayed with host and guest machine information. Available and used RAM for the virtual machines is also displayed.
ARCA Administration Guide.doc

Copyright 2009

Page 114 of 227

Note: The RAM resource pool is defined RAM for all Virtual Machines, not for VMs that are running.

Define RAM for the virtual server (in mb) and click Next.

If you enter an invalid (too high or low) RAM size you will receive an error. Closing the error returns you to the previous screen to edit the RAM size.

ARCA Administration Guide.doc

Copyright 2009

Page 115 of 227

RAM Overage

Insufficient RAM

ARCA Administration Guide.doc

Copyright 2009

Page 116 of 227

After the RAM is entered the virtual server details screen is displayed. Select the appropriate radio button if the server is 32 or 64-bit and click Next.

Warning:

If the incorrect architecture is selected the VM will blue screen.

ARCA Administration Guide.doc

Copyright 2009

Page 117 of 227

The next screen allows an NTFS disk check to run before starting the Hardware Independent Restore (HIR). Use this option if a previous virtualization attempt failed. Click Next.

ARCA Administration Guide.doc

Copyright 2009

Page 118 of 227

The next screen is virtualization modes. Select the appropriate mode. Sandbox 1. This mode is for testing only. 2. The defined virtual server will not have network access. 3. No backups will occur in this mode.

Live 1. This mode will configure the virtual server to replace a failed server on your network. 2. Only use this mode if you want to use the virtual server as a production server. 3. Backups will continue in this mode. 4. Modifications made while the virtual server is running will be contained in the next backup.

ARCA Administration Guide.doc

Copyright 2009

Page 119 of 227

Sandbox Private Network 1. This mode is for testing multiple machines in a sandbox. 2. Create virtual machines in their own private network. 3. Machines in this mode can only interconnect to each other. 4. This sandbox network cannot access the LAN or WAN. 5. Changes made to the virtual server will be lost when the virtual machine is purged. 6. No backups will occur in this mode.

VirtualBox Network Adapter in ARCAPrivateNetwork

Warning:

Virtualization mode cannot be switched or migrated past this step.

After all options are selected click Next. If Live mode is selected and the production server is online, you will receive the below error. Resolve by removing the production server from the network or changing the IP addressing and NetBIOS name.

ARCA Administration Guide.doc

Copyright 2009

Page 120 of 227

The next screen is Hardware Independent Restore. Add the backup files for migration here. You can either add these files manually or use Time Machine to select a point in time which selects the same timestamp for each server partition. Only incremental files are available through the time machine feature. You must add the full backup manually.

Clicking Close displays HIR process unsuccessful or user has clicked cancel.

ARCA Administration Guide.doc

Copyright 2009

Page 121 of 227

9.2.2.1 Add files manually


Manually add backup files to HIR Click the Add button.

Windows explorer opens to the server directory selected for virtualization.

Select a point in time backup file and click Open or right click the file and choose Select.

ARCA Administration Guide.doc

Copyright 2009

Page 122 of 227

The system partition is required for virtualization. If additional server partitions need added to the virtualization repeat the above steps. You must select the same point in time backup by time stamp, not necessarily file name.

Warning:

If one partition wasnt backed up during the same time as the other, the virtual server could be in an inconsistent state.

Time Machine selects the appropriate timestamps automatically.

After all partitions are added click Set Boot on the system partition. To remove a partition from the list select it and click Remove.

ARCA Administration Guide.doc

Copyright 2009

Page 123 of 227

9.2.2.2 Add files using Time Machine


Use Time Machine to add files to HIR. Only incremental backup files are supported.

Note: If the server backup only contains the full backup file, time machine is not available and the files must be added manually.

Click the Time Machine button.

Please wait creating time machine

ARCA Administration Guide.doc

Copyright 2009

Page 124 of 227

ARCA Recovery Time Machine Console loads with the following tabs (backups saved per retention policy)

Intraday - point in time intraday backups (2 days) Daily - point in time daily backups (14 days) Weekly - point in time weekly backups (5 weeks) Monthly - point in time monthly backups (all)

Click the appropriate backup type tab. Find & Expand the appropriate date Select the appropriate timestamp to view the backup files for that point in time

ARCA Administration Guide.doc

Copyright 2009

Page 125 of 227

Verify the backup file(s) and click Ok to add to the HIR window or click Cancel to exit the console.

ARCA Administration Guide.doc

Copyright 2009

Page 126 of 227

After all backup files are added, highlight the system partition and click Set Boot.

After files are verified click Migrate to start Hardware Independent Restore

ARCA Administration Guide.doc

Copyright 2009

Page 127 of 227

9.2.3 Hardware Independent Restore

Warning:

Yes is auto selected to HIR has been run before prompt. Do not click No.

If a driver is not found during the HIR, browse to the appropriate driver or ignore and install it after the VM starts if necessary.

ARCA Administration Guide.doc

Copyright 2009

Page 128 of 227

Note: If you receive the above error during HIR, navigate to the description path and delete the root backup directory if the VM is not needed. If issue still occurs contact support.

ARCA Administration Guide.doc

Copyright 2009

Page 129 of 227

9.2.4 Virtual Machine First Boot Steps


You will now see the Notes screen.

Type any notes for the defined VM and click Next. Selecting the VM again displays previously added notes.

ARCA Administration Guide.doc

Copyright 2009

Page 130 of 227

Message box (with instructions to perform on first boot) is displayed for 30 seconds top number is system time, bottom number is the 30 second countdown (see above screenshot) Virtual Machine starts. If the VM is running off of an encrypted file, the enter password prompt is automatically filled in and the server boots to Windows without user intervention.

ARCA Administration Guide.doc

Copyright 2009

Page 131 of 227

a. For Windows 2003 Select Microsoft Windows b. For Windows 2000 Select Microsoft Windows (WINNT)

Press Ctrl-Alt-Delete in the VM menu Machine > Insert Ctrl-Alt-Del to login.

ARCA Administration Guide.doc

Copyright 2009

Page 132 of 227

Type your password and click OK to login.

ARCA Administration Guide.doc

Copyright 2009

Page 133 of 227

Note: In VirtualBox the default Input key to switch from the VM to the physical server is Right Ctrl.

Note: On first boot in Live Mode choose Safe Mode. This will allow you to install VM Guest Additions and run Standby Server Helper.
When you first login to a defined VM you may receive an unexpected shut down message. This is expected.

Select a meaningful reason or type a comment regarding shutdown and click OK.

ARCA Administration Guide.doc

Copyright 2009

Page 134 of 227

Warning:

Once you login, you may be prompted to Activate Windows again due to significant underlying hardware changes. If Windows is not activated, you will not be able to login.

9.2.4.1 Sandbox Virtualization additional steps


9.2.4.1.1 Standby Server Helper Install
Run Standby Server Helper according to the virtualization mode. The Standby Server Helper ensures your IP and MAC address settings match the original server.

To run: Go to Start > All Programs > Accessories > System Tools > ARCA Backup Agent > Standby Server Helper

ARCA Administration Guide.doc

Copyright 2009

Page 135 of 227

Select Sandbox Mode.

Is server running in virtual mode? prompt appears, click Yes.

Operation completed successfully.

If No or Cancel is selected, no operation is performed.

Note: DHCP does not work in this mode, you must statically assign IP addresses to machines on the same subnet. The gateway is not accessible this is a private switched network.
Note: Each server is on the 169.254.x.x (APIPA addressing) subnet by default

9.2.4.2 Live Virtualization additional steps


When booting up for the first time in live mode, press F8 to boot into Safe Mode with Networking. This will allow you to confirm network setting and run Standby Server Helper after the VM is booted. Once the VM boots: Install VM Guest Additions and run Standby Server Helper.

9.2.4.2.1 VM Guest Additions


VM Guest Additions is software that can be installed inside virtual machines to improve performance and make integration much more seamless. Among the features provided by these Guest Additions are mouse pointer integration and arbitrary screen solutions (e.g. by resizing the guest window). Guest additions also increase the speed of the VM Network Interfaces.
ARCA Administration Guide.doc Copyright 2009 Page 136 of 227

To install: In the VM click go to Devices > Install Guest Additions

The Virtual Box Guest Additions Welcome window loads.

Click Next.
ARCA Administration Guide.doc Copyright 2009 Page 137 of 227

Select the I accept the terms in the License Agreement radio button and click Next.

Select the Destination Folder location and click Install.

ARCA Administration Guide.doc

Copyright 2009

Page 138 of 227

Note: You may receive notifications that the software has not passed Windows Logo testing. Click Install to continue. You may need to <Alt+Tab> through the prompts that appear.

Note: You may also receive notifications that the software is signed with Authenticode technology. Click Yes to continue.

ARCA Administration Guide.doc

Copyright 2009

Page 139 of 227

Once the installation is finished select Reboot Now radio button and click Finish, or manually reboot after installing running Standby Server Helper.

9.2.4.2.2 Standby Server Helper Install


Run Standby Server Helper according to the virtualization mode. The Standby Server Helper ensures your IP and MAC address settings match the original server.

To run: Go to Start > All Programs > Accessories > System Tools > ARCA Backup Agent > Standby Server Helper

ARCA Administration Guide.doc

Copyright 2009

Page 140 of 227

Select Live Mode.

Is server running in virtual mode? prompt appears, click Yes.

Operation completed successfully.

If No or Cancel is selected, no operation is performed.

9.2.4.3 Windows 2008 additional steps


1. When booting a Windows 2008 virtual server for the first time, boot into the Storagecraft Recovery Environment. The .iso is already attached as default in the virtual server. 2. Select the recommended option, [1] Start Vista-based Recommended Recovery Environment and press <Enter> to run.

ARCA Administration Guide.doc

Copyright 2009

Page 141 of 227

3. Press CTRL + SHIFT + F12 keys. 4. Click menu "Tools" "Command Shell" to set the boot manager. If you do not see the Command Shell in the Tools menu, another way to get there is to browse the file explorer via Tools File Browser.

5. If you need to go through the File Brower to launch the command prompt, navigate to: CD Drive (D:\)SHADOWPROTECT/I386/SYSTEM32 and run CMD.exe.

6. In the command prompt run: X:\Windows\System>C: C:\>bcdedit /set {bootmgr} device "partition=C:" C:\>bcdedit /set {default} device "partition=C:"

ARCA Administration Guide.doc

Copyright 2009

Page 142 of 227

C:\>bcdedit /set {default} osdevice "partition=C:" C:>exit

7. Perform a clean reboot of the Virtual server through menu "File" "Exit" or else the backup within the Virtual server will be a differential. 8. You will be taken to a Windows Error Recovery screen. Boot the server hard disk and select Safe Mode with Networking. This may take a few minutes to start up.

9. If you are prompted to run a check disk you must let the check disk complete before continuing with the Virtual Server boot process. 10. You will boot directly to Windows.

ARCA Administration Guide.doc

Copyright 2009

Page 143 of 227

9.2.5 Shutdown a Virtual Machine


To properly close a virtual machine: From the VM go to File > Close or close the window via the Close button (in blue).

Warning:

The Take Snapshot option is not supported as we do not utilize .vhd files (virtual hard drive). The ARCA uses a sparse file which shows as a custom hard drive.

After Close is selected, the following options are available: Save the machine state saves any changes and shuts down Send the shutdown signal proper shutdown (Start > Shut Down in Windows) Power off the machine improper shutdown (hard reboot)

ARCA Administration Guide.doc

Copyright 2009

Page 144 of 227

9.2.6 Start a Virtual Machine


To start a defined virtual machine that is not running: Select the backup folder name of the defined server and click Start

If VM is not in a defined state or if it is currently running Start is grayed out.

Standby Server Wizard opens

ARCA Administration Guide.doc

Copyright 2009

Page 145 of 227

Enter and confirm the password, click Next.

If the backup is encrypted, the password is auto-filled and the VM starts.

9.2.7 Purge a Virtual Machine


After you are done with the Virtual Machine and you do not need to use it again, purge the VM to save resources. The VM must be defined and in a stopped state.

Select the backup folder name of the defined server and click Purge

Note: If VM is not in a defined state or if it is currently running Purge is greyed out.

Standby Server Wizard opens. ARCA Administration Guide.doc

Copyright 2009

Page 146 of 227

Enter and confirm the password, click Next.

The VM is purged and you are returned to the main menu. Note: Verify the server state has changed to undefined.

9.2.8 Virtual Machine Settings


Virtual Machine settings and notes

a. Settings change defined virtual machine RAM settings (VM must be in a stopped state otherwise the settings option is grayed out) 1. Select defined virtual machine and click Settings.
ARCA Administration Guide.doc Copyright 2009 Page 147 of 227

Standby Server password screen appears

2. Type and confirm encryption password (leave blank if password is not encrypted) and click Next

ARCA Administration Guide.doc

Copyright 2009

Page 148 of 227

Backup image password is confirmed

VM Information screen appears.

3. View and specify new RAM size (in mb) if required. 4. Click Next to update RAM size and return to Standby Server. b. Notes add notes to a virtual machine in any state 1. Select virtual machine in any state and click Notes

ARCA Administration Guide.doc

Copyright 2009

Page 149 of 227

Notes screen appears

2. View defined notes in the top half of the screen 3. Add notes by directly typing them in the bottom field Click Here to Add the Notes 4. After notes are added click Next to return to Standby Server. c. Exit Exit Standby Server 1. Click Exit button in Standby Server

ARCA Administration Guide.doc

Copyright 2009

Page 150 of 227

10 Support

Direct links to the ARCA Support Portal and Remote Support Web Site

10.1 ARCA Support Portal


Launch ARCA Support Portal website

From the ARCA Dashboard:


Click Support Click the ARCA Support Portal icon.


ARCA Administration Guide.doc

Copyright 2009

Page 151 of 227

https://support.zenitharca.net support website link opens in a web browser

Enter your support credentials to continue and receive support including: Ticketing Online Support RMA Requests

Note: Please see the ARCA Quick Start Guide for support portal details.

ARCA Administration Guide.doc

Copyright 2009

Page 152 of 227

11 Reporting Dashboard

The Reporting Dashboard shows available ARCA Reporting. Backup Analysis shows Backup Status and detailed reporting against backup jobs. Backup History - select backup detail report by date

11.1 Backup Analysis


View latest backup report. From the ARCA Dashboard:

Click Reporting Dashboard. Click the Backup Analysis icon.

ARCA Administration Guide.doc

Copyright 2009

Page 153 of 227

ARCA Backup Analysis launches to Backup Status page

ARCA Administration Guide.doc

Copyright 2009

Page 154 of 227

Buttons (left to right)

Go Back go back one screen Go Forward go forward one screen Home go home Refresh refreshes report screen Email email report Print to PDF print PDF report Export to Excel exports report to Excel format Print Current Report prints report Help report help Close closes backup analysis

Server States

Server setup creation successful server name pink Server setup creation failed server name brown Server installed successfully server name blue Server installation failed server name black Server uninstalled server name gray

Backup Status

Last backup status success backup schedule green Last backup status failed backup schedule red

ARCA Administration Guide.doc

Copyright 2009

Page 155 of 227

11.1.1
ARCA.

Navigating Backup Analysis

Click Back, Next, and Home buttons to navigate between report screens. Microsoft Excel is not preinstalled with the

11.1.1.1

Device Information

Click Server link to open device information

Last Backup Status VSS Incremental Backups (schedule) Incremental Backups (schedule)

11.1.1.2

Backup Image Analysis

Click Last Backup Date link to open Backup Image Analysis (last 100 Backups)

Backup Status ARCA Administration Guide.doc

Copyright 2009

Page 156 of 227

View Details

Click anywhere on this page to view backup details

ARCA Administration Guide.doc

Copyright 2009

Page 157 of 227

11.1.2

Backup Image Details

Creation Date File Name Status Reason for failure (if failed)

11.1.3

Email

Email Backup Analysis Reports Click Email button

ARCA Backup Analysis Email opens

ARCA Administration Guide.doc

Copyright 2009

Page 158 of 227

Report options: PDF Format Excel Format (only available if Excel is installed not included)

Clicking ? help button brings up the above prompt if Excel is not installed. Reports available: Current Backup Status Entire Servers

Choose report format and type and click Proceed.

ARCA Administration Guide.doc

Copyright 2009

Page 159 of 227

Email Report window appears.

Specify the following fields: TO CC (optional) Subject (editable) Message Body (optional)

Click the Address Book icon beside the To or CC fields to bring up email addresses and groups previously configured in Configuration section.

ARCA Administration Guide.doc

Copyright 2009

Page 160 of 227

Select an address and click To or CC buttons to add to recipient fields. Click OK to return to email.

After fields are specified click Send

ARCA Administration Guide.doc

Copyright 2009

Page 161 of 227

If To field was not specified, the following error occurs:

Mail sent successfully

Click OK to return to Backup Analysis

Recipient will receive the report via email in zip format.

ARCA Administration Guide.doc

Copyright 2009

Page 162 of 227

11.1.4

Print to PDF

Print Backup Analysis Report to PDF, no PDF viewer is installed by default. Click Print to PDF button

ARCA Backup Analysis PDF Report opens

Reports available: Current Backup Status Entire Servers

Click Browse folder to specify a location to save the file.

ARCA Administration Guide.doc

Copyright 2009

Page 163 of 227

Name the file and click Save

File path populated

After file path is specified click OK to print PDF or Close to cancel.


Copyright 2009 Page 164 of 227

ARCA Administration Guide.doc

Click OK to successful prompt and browse to file saved location to access report.

Select file location prompt appears if no file path was selected on save.

If filename exists, overwrite prompt appears.

o o

Click Yes to overwrite Click No to specify another filename.

ARCA Administration Guide.doc

Copyright 2009

Page 165 of 227

11.1.5

Export to Excel

Export Backup Analysis to Excel (not installed by default). This option is only available if Excel is installed. Click Export to Excel button

ARCA Backup Analysis Excel Report opens

Reports available: Current Backup Status Entire Servers

Click Browse folder to specify a location to save the file.

ARCA Administration Guide.doc

Copyright 2009

Page 166 of 227

Name the file and click Save

File path populated

After file path is specified click OK to export or Close to cancel.

ARCA Administration Guide.doc

Copyright 2009

Page 167 of 227

Click OK to successful prompt and browse to file saved location to access report.

Select file location prompt appears if no file path was selected on save.

If filename exists, overwrite prompt appears.

o o

Click Yes to overwrite Click No to specify another filename.

ARCA Administration Guide.doc

Copyright 2009

Page 168 of 227

11.1.6

Print Current Report

Print Current Report to installed printers. Click Print Current Report button. This prints the current onscreen report

Print dialog screen appears

Click Print to print current page.

If no printer is installed the below prompt appears, install a printer to continue.

ARCA Administration Guide.doc

Copyright 2009

Page 169 of 227

11.1.7

Report Help

View backup analysis report help. Each section has a description of each report and the report options. Click Help button to view report help file.

Report Help Contains the following sections: o o o o Backup Status Device Information Backup Image Analysis Backup Image Details

Backup Analysis Help

11.1.8

Exit Backup Analysis

Exit Backup Analysis Click Exit button

Click Yes to confirm and close Backup Analysis


ARCA Administration Guide.doc Copyright 2009 Page 170 of 227

11.2 Backup History


View historical backup report by date range. From the ARCA Dashboard:

Click Reporting Dashboard. Click the Backup History icon.

ARCA Backup History launches

ARCA Administration Guide.doc

Copyright 2009

Page 171 of 227

Buttons (left to right buttons activated after a report is generated) Email email report in PDF or Excel format Print to PDF print PDF report Export to Excel exports report to Excel format Print Current Report prints report Help report help Close closes backup analysis

11.2.1

Navigating Backup History

Run Backup Analysis report options above by server and date range:

Server select drop-down arrow to filter by server

From Date select drop-down arrow to specify from date

To Date select drop-down arrow to specify to date


ARCA Administration Guide.doc

Copyright 2009

Page 172 of 227

After all options are specified click Generate Report to display report results and run report options to email/export.

Example Backup History Report

If no backups are configured the below prompt is displayed.

ARCA Administration Guide.doc

Copyright 2009

Page 173 of 227

11.2.1.1

Backup History Export Options

11.2.1.1.1 Email email report in PDF or Excel (if installed) format

Click Email button Email Report option window launches.

Select report format, PDF or Excel (if installed) and click Proceed.

ARCA Administration Guide.doc

Copyright 2009

Page 174 of 227

Fill in required email fields per Backup Analysis section. Click Send to email report to defined recipients.

Mail sent successfully

11.2.1.1.2 Additional Options


Print to PDF print PDF report (opens Save As dialog) Export to Excel exports report to Excel format (opens Save As dialog) Print Current Report prints report (opens printer dialog)

11.2.1.2

Backup History Help File

Click Help button to view report help file.

ARCA Administration Guide.doc

Copyright 2009

Page 175 of 227

Backup History Help

Backup History Help Detail

11.2.1.3

Exit Backup History

Click Exit button

Click Yes to confirm and close Backup Analysis

ARCA Administration Guide.doc

Copyright 2009

Page 176 of 227

12 Server Failover Processes

12.1 Onsite Server Failure


Example: Onsite Server Failure

Follow the Live Mode virtualization steps as defined in section 9.2.2 Create a Virtual Machine. Ensure that Standby Server Helper is run in Live Mode to migrate your server network settings. No additional configuration is required. The virtual server retains all network and system settings. Your IP and MAC address remain the same.

Online Video Demonstration: Live Rapid Failover

12.2 Site Level Failure


Example: 2 Sites, 1 ARCA at each site backing up local servers, onsite ARCA down or inaccessible

Failover Process 1. Site 2: Replicated ARC: virtualize site 1 servers in Live Mode. 2. Add the Virtual Servers to the Backup Management Console and change the backup path (destination) to "D:\Replica\servername" (changed Backup). Restore Back to Site 1 Once the replacement ARCA and Servers are received: 1. Replicate the backup data from Site 2 to Site 1
o

Execute incremental backup manually from the Backup Management Console (right click the job and click execute incremental) to ensure last minute changes are recorded.

2. Shut down the virtual machines on Site 2 to verify you have the latest replica.
ARCA Administration Guide.doc

Copyright 2009

Page 177 of 227

3. Perform a Bare Metal Restore (BMR) on the replacement servers from the latest backup. 4. Restore the backup configuration to Site 1 ARCA from backup.
Warning:

Restoring a configuration file from another ARCA with different settings will overwrite your original configuration.

5. Disable the Backup Job for Site 1's servers on Site 2 ARCA. 6. Add the Servers to the Backup Management Console and change the backup path (destination) to "D:\Backup\servername" 7. Execute new full base image
Warning:

Once the servers have been virtualized from replicated data and a BMR is performed on new servers, the existing backup chain cannot continue. A new full backup should be executed manually (old backup images from D:\backup should be copied to external/network drive for future use if required).

ARCA Administration Guide.doc

Copyright 2009

Page 178 of 227

13 Bare Metal Restore

13.1

Bare Metal Restore Explained

Bare Metal Restore (BMR) allows you to restore a backup image to identical or dissiliar hardware or virtual machine. You cannot access BMR through the ARCA interface. However an .iso version of the disk is mounted for virtual servers. You will need the BMR DVD/CD that shipped with the ARCA to run BMR, along with access to the backup files via the network or external media. The BMR disk has a best match for most drivers. We recommend having the latest drivers on hand to update. To complete the BMR the following drivers are required and we recommend having the latest version for your hardware:

NIC Drivers RAID Controller Drivers

13.1.1

Precautions

For additional options and troubleshooting see the ARCA Administrators Guide.

Even after the restore completes you will need to update all of the drivers on the server. The software does a best driver match available, but the server could have performance issues or limited features until the most up-todate vendor specific drivers and utilities and downloaded and installed. Cannot restore to a partition smaller than the original volume. You must restore to either the same size partition or a larger partition. For multi-partition restorations you should complete all of the partition restorations before exiting the Recovery Console. Additional partition restorations can be performed from the Windows OS but this IS NOT recommended as there can be severe performance related delays during additional partition restoration. If you are restoring a Domain Controller in a multi-Domain Controller Active Directory Environment after completing the BMR process you will need to boot the server in Active Directory Recovery Mode. This ensures that the recently recovered server synchronizes properly with the existing Active Directory systems. For Bare Metal Recoveries to dissimilar hardware you should remove your old management software (Dell, IBM, HP, etc) and install the new management software for the new hardware. Management software will not work and will not be supported on hardware it was not intended for.
Copyright 2009 Page 179 of 227

ARCA Administration Guide.doc

Bare Metal Recoveries are not guaranteed to work across all configurations and setups. If you are keeping a cold-state server on-hand for Bare Metal Recoveries it is recommended that you perform tests for the servers that could be recovered noting any issues or problems that occur during the restoration.

13.1.2

BMR From Recovery CD

Boot the target server for Bare Metal Restore with the ARCA CD or DVD. On the StorageCraft Recovery Environment (Zenith Edition) select:
1. Start Vista-based Recommended Recovery Environment Contains commonly distributed drivers and provides a quicker boot. Boots into Vista PE allowing for dynamic drivers and hot plug disk drivers.

Other Recovery Environment Options: 2. Start 2003-based Legacy Recovery Environment Contains all of the drivers from Recommended and less commonly distributed drivers. 3. Boot from Hard Disk boots into bootable system partition 4. Reboot Computer reboot

ARCA Administration Guide.doc

Copyright 2009

Page 180 of 227

Windows Boot Manager appears after boot environment is selected

Select Windows Setup [EMS Enabled] option.

Windows is loading files

Recovery Environment initializes and prompts for network support.

ARCA Administration Guide.doc

Copyright 2009

Page 181 of 227

Click OK for network support to map a drive to ARCA when recovery console loads.
Recovery Environment installs network adapters if a driver can be found.

Note: If Recovery Environment cannot find a NIC driver you will be prompted to install one at this time.

Recovery Environment loads (similar to Backup Management Console)

ARCA Administration Guide.doc

Copyright 2009

Page 182 of 227

1.

Click the Disk Map tab to verify the RAID Drivers loaded properly.

a. b. c.

If the RAID Drivers loaded correctly, skip to Step 8. Only if the RAID Drivers did not load under the Tools group or go to Tools > Load Drivers. Click on the Load Drivers link. i. Create a mapping to a network resource that hosts the RAID Drivers (recommended).

ShadowProtect Load Drivers

ARCA Administration Guide.doc

Copyright 2009

Page 183 of 227

Note:

The RAID Drivers can also be copied to a Floppy (if present), CD / DVD, or USB drive.

ii. Click on the Add Path button and browse to the location of the RAID Drivers. iii. Click on the Load button.

Note: Other drivers besides RAID can be added in this fashion if you need additional hardware loaded into the Recovery Environment. These are not permanent loads as the environment is from a Boot CD / DVD. You will need to reload drivers each time you enter the Recovery Environment.

2.

Click Network Configuration under Tools or go to Tools > Network Configuration

StorageCraft Recovery Environment Network Configuration Utility

ARCA Administration Guide.doc

Copyright 2009

Page 184 of 227

Note: If you did not receive a DHCP address, specify IP Address information.

ARCA Administration Guide.doc

Copyright 2009

Page 185 of 227

3. 4.

Click Network Drives. On the Network Drives window you will need to create a mapping to the ARCA device: a. Drive Select a free drive letter from the drop-down menu. b. Network Path Enter in \\ARCANAME\D$ c. Username administrative ARCA user (administrator - default) d. Password administrative ARCA password (arca - default)

Note: You can also use the Browse Network option

5.

Click Map Drive button.

ARCA Administration Guide.doc

Copyright 2009

Page 186 of 227

You will receive the following error if the drive mapping fails:

Note: If mapping fails, ensure an IP address was obtained from DHCP or set manually. Note: For DNS issues attempt to use an IP address instead of a NetBIOS name.

Note: If mapping still fails, check your Network Card driver and network connections.

ARCA Administration Guide.doc

Copyright 2009

Page 187 of 227

6. 7. 8.

After drive is mapped click Close Close the Network Configuration Utility. Under Tasks click Restore Volume.

9.

On the Welcome screen click Next.

10.

On the Backup Image to Restore screen click Browse

.
ARCA Administration Guide.doc

Copyright 2009

Page 188 of 227

11.

From the drop-down menu select the drive mapping you created.

12. 13. 14.

Click on the Backup folder. Click on the {Unique ID}-SERVERNAME folder. From the list select the point-in-time incremental (or base) file for restoration.

15.

Enter in the Backup Image Password and click OK.

ARCA Administration Guide.doc

Copyright 2009

Page 189 of 227

16. 17. 18.

Click Next. On the Backup Image Dependencies window click Next. On the Restoration Destination window: a. If you already have partitions in place on the server select the checkbox next to the partition you want to restore data to. Then click the Next button. b. If you have Unallocated space you can right click and either: i. Create exact primary partition at the beginning 1. Select this option if you want the software to create the partition for you based on the restoration file you selected. ii. Enter a size of a new primary partition and create 1. Select this option if you want to manually enter in a size for the partition. 2. YOU CANNOT RESTORE TO A PARTITION SMALLER THAN THE RESTORATION VOLUME. 3. Enter in the size in Megabytes. 4. Click the OK button. 5. Right click and select Refresh Volume Info. 6. Click the checkbox next to your new volume. 7. Click on the Next button.

ARCA Administration Guide.doc

Copyright 2009

Page 190 of 227

13.1.2.1.1 SYSTEM PARTITION OPTIONS


19.

On the Specify the restoration options ensure: a. Set Partition Active is checked. b. Restore MBR is checked. i. Restore original Windows XP MBR is checked ii. Restore disk signature is not checked. c. Restore Disk Hidden Track is checked.

If the local RAID Drivers load correctly, please skip to Step 27. Only if the local RAID Drivers load incorrectly will you will need to perform the following: i. Use Hardware Independent Restore is checked. ii. Click Advanced. iii. Click New. Browse to the location of you SYS and INF files. You can create multiple search directories and move the directories up and down the search list. iv. From the drop-down menu you should select: LOW matches will be installed if no better matches are found. v. The final two options are only used if the Bare Metal Restore failed the first time or if the target server is a domain controller. vi. Click on the OK button. 20. Click Next. 21. Click Finish. 22. The Bare Metal Restoration will begin. This is a variable restoration based on the amount of data being restored, the server resources, ARCA resources, and the network.
d. e.

ARCA Administration Guide.doc

Copyright 2009

Page 191 of 227

23.

Once the Bare Metal Restoration completes click on the HIR Configuration. The HIR Configuration will verify the hardware drivers. If a driver is missing you will be prompted for the location of the driver files (SYS, INF) or asked to ignore. a. Select the Drive the Bare Metal Restoration destination and click Start. b. You may be prompted to install drivers. If you do not have the drivers you can select the Ignore option.

24.

Once the HIR completes a summary report will show. You can save the report.
Copyright 2009 Page 192 of 227

ARCA Administration Guide.doc

25.

Click Close.

13.1.2.1.2 Configuring Additional Partition Options


o

If you are doing a multi-partition restoration it is highly recommended that you complete the other partition restorations before exiting the Recovery Console and booting up the restored server.
1. 2.

3.

Go back to step 14 and follow until step 25. Next, on the Specify the restoration options window make sure that: a. Set Partition Active is not checked. b. Restore MBR is not checked. i. Restore original Windows XP MBR is not checked ii. Restore disk signature is not checked. c. Restore Disk Hidden Track is checked. Skip to step 27 and continue.

Finally, click on File > Exit. This will exit the Recovery Console. It is recommended to boot into Safe Mode first to verify your IP settings. In some cases the IP information will port over without a problem. Other times the IP information does not correctly port over and needs updated manually. 28. On server restart in the StorageCraft Recovery Environment make sure to select the Boot from Hard Disk option.
26. 27.

13.1.3

Bare Metal Restore Clean-up Windows will attempt to load with the configuration you selected. If the boot process blue screens you will have to reboot into the Recovery Console. Most often this error is caused by not going through the HIR Configuration link.
Copyright 2009 Page 193 of 227

ARCA Administration Guide.doc

After Windows boots successfully you will need to update all of the Windows drivers to ensure functionality and performance.

Warning:

IF YOU DO NOT INSTALL VENDOR SPECIFIC DRIVERS YOU WILL HAVE PERFORMANCE ISSUES.

Client networks can affect restoration speeds. Sometimes after a Bare Metal Restore you will need to adjust the NIC settings for performance. If you have performed a Bare Metal Restore from a Virtual Server you will need to: o Restart any hardware services that were stopped when the Virtual Server was created.

ARCA Administration Guide.doc

Copyright 2009

Page 194 of 227

14 Troubleshooting

This section goes over various troubleshooting methods for the ARCA. These are not all inclusive. Please reference the Frequently Asked Questions and our support team for items not referenced here.

14.1.1

Troubleshooting Backups

This section reviews the various errors that can happen during backup and how to resolve and troubleshoot those errors.

Backup Failures: Errors: Common backup failure errors

1. 2. 3. 4. 5. 6. 7.

Cannot get access to destination path Decompression failed. There is not enough space on the disk Full backup must be created before incremental backups Network Errors Server network connections lost after install Error connecting to server. Class not registered.

Error 1:

1. ShadowProtect Error 509 - Cannot get access to destination path This issue commonly happens if a backup job was re-created or the same destination server was removed and re-added to the same ARCA. This issue can also occurs when access to the destination folder on the ARCA fails due to network or permission error or the destination folder does not exist or an invalid file path is specified. Resolution:

Ping the ARCA from destination server configured for backup Verify the admin share (d$) is accessible from the destination server. Attempt to connect to the share via the Run menu in windows by going to Start Run. Type To verify connectivity type: \\arcacomputername\d$

ARCA Administration Guide.doc

Copyright 2009

Page 195 of 227

Check the backup job destination for the server through the Backup Management Console. Go to the "Destination" tab and click "Edit". Under the "Connect using specific user credentials re-authenticate to the NAS and verify the destination. Then retry the backup job. If the issue still recurs, contact support (see the below screenshot). o Refresh if the destination is not shown - Destination path should be: \\<ARCAname>\D$\Backup\<Pairname>

Where <ARCAname> is the machine name of ARCA device and <Pairname> is the pairname configured on server added for backup and will be the name of the server backup folder.

If the Destination path is incorrect, update to the above UNC path.

Error 2:

2. Decompression Failed: Deep verification process fails Resolution:

1. If the "Decompression Failed" error is reported for the base image (.spf) delete all the previous images and execute a new full backup. 2. If the failure is not for the base image, mark the backup image which is reported in the Decompression Failed error. a. Error occurred Decompression Failed for filename: C_Vol-b001-i006.spi b. Reported C_Vol-b001-i006.spi file as failed. c. Follow the diffgen process below.
ARCA Administration Guide.doc Copyright 2009 Page 196 of 227

DIFFGEN PROCESS Diffgen is the process by which a differential backup of the specified volume is created. A differential backup is a point-intime backup of only the system and data changes made since the last full backup.

Differential files are smaller however they can only be used in conjunction with full backup files.

Diffgen Generation process: Generate Diffgen:

1. Disable the Backup job in the Backup Management Console: a. Authenticate and connect to the server in network view. b. Right click the job and select Disable (refer to above screenshots). 2. Stop ShadowProtectsvc.exe service on the server in question. 3. Rename the extension of the backup image file (.spi) with the "Decompression Failed" error, including all of the backup images created after the reported image to .spo.

Example: Corrupted file is C_Vol-b001-i006.spi

Procedure:

1. 2. 3. 4.

Rename files: C_Vol-b001-i006.spo/C_Vol-b001-i007.spo/C_Vol-b001-i008.spo Login to the server and open a command prompt Change the path to: C:\Program Files (x86)\ZenithARCA Execute the command: C:\Program Files <x86>\ZenithARCA\>vdiff -0 C
Copyright 2009 Page 197 of 227

ARCA Administration Guide.doc

5. 6. 7. 8. 9.
Error 3:

Repeat the command for additional volumes: C:\Program Files\ZenithARCA\>vdiff -0 D After all volumes are complete, start the ShadowProtectsvc.exe service. Enable the Backup job and run an incremental backup. Perform another Image QP Verification for the latest incremental created. If this fails contact Technical Support.

3. There is not enough space on the disk: This error occurs if the D:\ drive on ARCA doesn't have enough space to continue backups or runs out of space. Resolution:

1. Run the Emergency Cleanup utility from the ARCA Dashboard. Go to: Start All Programs ARCA ARCA Dashboard.

This launches the ARCA Dashboard. Then go to: ARCA Administration Emergency Cleanup

ARCA Administration Guide.doc

Copyright 2009

Page 198 of 227

Select the server(s) and click Clear Incremental. This runs a backup chain continuity check for the selected servers and removes any extra incremental images which are not a part of the current backup chain. This will free up any disk space that the extra images were taking up.

2. Check if the collapsed daily files are of larger than anticipated or if the intra-daily files created are exceptionally large. If so, check the following: a. Are any existing backup files being backed up by the ARCA? For example, NTFS Backup files or database backup files. i. After the issue is resolved, disable the backup job, archive and then remove backup files of the target server(s), and start a fresh backup chain. 3. Check if there are older backup files and/or there are maintenance or defragmentation tasks scheduled on the server. b. Backup Files - Either archive the old backup files to a volume not being backed up by the ARCA or remove the current volume where the backups are stored. c. Maintenance Tasks Edit or stop the maintenance schedule, then execute an incremental backup and check the status and size of the completed backup. i. Archive the existing images and then start a fresh backup chain. Error 4:

4. Full backup must be created before incremental backups: As long as the full image remains in the destination directory, this error will not occur. Resolution: Verify that the base backup file for the server is in the backup destination folder.

1. If the base file is there verify that the server is able to access the backup directory via UNC Path. 2. If the base file is not there execute a new full backup. The existing incremental backup files are invalid and data cannot be restored from those files. 3. If you still receive an error contact technical support.

Error 5:

5. Network Errors: These errors are reported on the destination server operating system, not the ARCA itself. Typical error messages include: Error 55: "The specified network resource is no longer available" (ERROR_DEV_NOT_EXIST). Error 64: "The specified network name is no longer available" (ERROR_NETNAME_DELETED).
ARCA Administration Guide.doc

Copyright 2009

Page 199 of 227

Error 121: "The semaphore timeout period has expired" (ERROR_SEM_TIMEOUT). Error 1231: "The remote network is not reachable by the transport" (ERROR_NETWORK_UNREACHABLE). Resolution: For resolutions please refer to the following article: http://support.microsoft.com/kb/325487 Error 6:

6. ShadowProtect Error: Server network connections lost after install" - Users cannot access files on a server after ShadowProtect has been installed. Event ID 2011 shows in the System Event log with the following message: "The server's configuration parameter "irpstacksize" is too small for the server to use as a local device. Please increase the value of the parameter."

Users attempting to connect to network shares on the server receive the message "Not enough able to process this command."

server storage is avail-

Resolution: This is a common problem on Servers with lots of storage. Windows does not dynamically adjust the irpstacksize beyond 15 in most cases. For servers with a large number of file system drivers, you will need to increase this value manually. If you are running other applications such as a virus scanner there is probably limited irp stack space left. Each application that uses a driver (including the OS) will use up the irp stack. The more storage on the system, the more irp stack space these applications will use. Since the server is close to the limit, ShadowProtect pushed the server over the limit and other services started to fail, in this case, Lanman Server. This is the service which handles user shares. If the registry key for IRPStackSize mentioned in the Microsoft KB articles below does not exist, then Windows is using the default setting of 15, and you should create the registry DWORD value as instructed and try increasing its value to 20 (decimal) to start, and then higher if problems still occur. After changing the setting, a reboot may be required before the changes will take effect.

Please read the following Microsoft KB Articles before adjusting these values:

http://support.microsoft.com/kb/106167 http://support.microsoft.com/kb/329717/en-us http://support.microsoft.com/kb/285089/en-us http://support.microsoft.com/kb/177078/en-us


ARCA Administration Guide.doc Copyright 2009 Page 200 of 227

Error 7:

7. ShadowProtect Error: Error connecting to server. Class not registered. Resolution: When using the console to connect remotely to another machine, this error usually means that ShadowProtect is not installed on the remote machine. Install the backup agent on the server to resolve.

14.1.1.1 14.1.1.2

ARCA Alerts Backup Failure

If you receive Backup not occurring alert, backups are not occurring for severs/volumes per the defined schedule.

Examples of email alert scenarios: a.


Schedule for scheduled synchronization of backup is disabled. Hence backups will not synchronize.

======================================== Server Name: pmg-win2k3 Pair Name: 97F1DE95C8D2422D-pmg-win2k3 ========================================

b.
------------------------------------------------------------------Backups are failing for - pmg-win2k3 ------------------------------------------------------------------ARCA: ZNAS-PMGTRAININ Server: pmg-win2k3 Backup Folder Name: 97F1DE95C8D2422D-pmg-win2k3 Volume: F Time: 3/24/2009 9:45:12 AM Error: Cannot get access to destination object

-------------------------------------------------------------------

Backup Prerequisites:
ARCA Administration Guide.doc Copyright 2009 Page 201 of 227

1. Network Connectivity - ARCA and servers should be able to communicate with each other via LAN/WAN.
a. Ping the server from ARCA and vice versa b. Use the Agent Connectivity Check utility on servers.

2. ARCA and servers system time should be the same.


a. If the system time is not the same it needs to be synchronized. If the time is different, there will be issues with the backup schedule. This is because schedule backup jobs are created on the ARCA but executed on the server.

3. Sufficient disk space needs to be available on destination backup partition.


a. To execute the backup chain you need sufficient free space. The backup destination on the ARCA is D:\Backup. The Emergency Cleanup utility can be used as a temporary message to free up space.

4. Server must be restarted after backup agent installation.


a. After the backup agent is installed, the server needs to be restarted to propagate the backup job settings. This is part of the installation, and you will be prompted to reboot after the install. If the server is not restated, backups will fail.

5. Backup job destination should be: //<ArcaComputername>/D$/Backup/<Pairname>.


a. <Pairname> is the GUID value which is allocated to the server when the backup agent is created. b. Backups are created on this network path during the backup agent setup. If the destination path is incorrect backups may fail. c. If the destination path does not exist or the path is incorrect then a false alarm Backup Not Occurring alert will occur, and this may suppress other alerts. For example: Backup chain continuity check failure, Deep verification failure, etc. d. The Backup Job destination can be verified and updated via the ARCA Backup Management Console, Destinations tab. Click Edit to modify.

ARCA Administration Guide.doc

Copyright 2009

Page 202 of 227

6. Backup Job should not be disabled, unless you want/need to pause backups. Right click the backup job and select
Enable to re-enable backups.

ARCA Administration Guide.doc

Copyright 2009

Page 203 of 227

If the backup prerequisites are met, check other possible backup failure reasons. 1. 2. 3. 4. Check alert for server/ volume. Launch ARCA Backup Management Console Connect to server via network view. Go to the Backup History tab and check the latest job execution status for alerted volume.

5. If last execution status is successful and the and last run time of job is correct, issue is resolved. 6. If last execution status is failed, view job details for failure message. See the below errors and resolutions for troubleshooting steps. Common errors for backup failure are:

ARCA Administration Guide.doc

Copyright 2009

Page 204 of 227

a. b. c. d. e. f. g. Error:

Cannot get access to destination path Decompression failed. There is not enough space on the disk Full backup must be created before incremental backups Network Errors Server network connections lost after install Error connecting to server. Class not registered.

1. ShadowProtect Error 509 - Cannot get access to destination path This issue commonly happens if a backup job was re-created or the same destination server was removed and re-added to the same ARCA. This issue can also occurs when access to the destination folder on the ARCA fails due to network or permission error or the destination folder does not exist or an invalid file path is specified. Resolution:

1. Ping the ARCA from destination server configured for backup 2. Verify the admin share (d$) is accessible from the destination server. Attempt to connect to the share via the Run menu in windows by going to Start Run. To verify connectivity type: \\arcacomputername\d$ 3. Check the backup job destination for the server through the Backup Management Console. Go to the "Destination" tab and click "Edit. Under the "Connect using specific user credentials" re-authenticate to the ARCA and verify the destination. Then retry the backup job. If the issue still recurs, contact support. 1. Refresh if the destination is not shown - Destination path should be: \\<ARCAname>\D$\Backup\<Pairname> Where <ARCAname> is the machine name of ARCA device and <Pairname> is the pairname configured on server added for backup and will be the name of the server backup folder.

1. If the Destination path is incorrect, update to the above UNC path.

14.1.1.3

Communication Failure

If you receive an email alert with subject: Server unable to communicate with ARCA. The server in question has lost connection with the ARCA and will be named in the alert. This could occur in the following scenarios: Loss of network connectivity switch/router down or bad port ARCA not accessible Server not accessible Server backup agent uninstalled Server IP information changed and has not been updated on ARCA
ARCA Administration Guide.doc

Copyright 2009

Page 205 of 227

Example:
Server unable to communicate with ARCA. Please check the connectivity with ARCA. ================================================= Server: pmg-win2k3 =================================================

With regards, TestARCA@zenithinfotech.com

Solutions: 1. Ping the server. If you do not receive a reply, check that the server is powered on and booted to Windows. Also verify the network cable is connected and that you have a link light on the server and whatever port the other end is cabled into. a. If the ping is successful, attempt to connect to the server locally or remotely. If you cannot RDP, attempt to remotely manage it and check that the Terminal Services service is started. b. After connecting to the server, verify the following applications are installed by going through Add or Remove Programs: i. ARCA Backup Agent ii. Zenith Business Continuity System

iii. If they are not installed, go to Start Run and connect to the ARCA Tools Share by typing: \\arcaname\Tools. The Tools share window opens.

ARCA Administration Guide.doc

Copyright 2009

Page 206 of 227

iv. Verify an agent install folder exists for you server. If it does, open the folder and run the server setup exe and reboot. If it does not, connect to the ARCA and run the Add Server wizard.

c. If they are installed, verify the following services are started, if they are not started, start the services and retry the job: i. ARCAScheduler ii. ShadowProtect Service iii. Storagecraft Shadow Copy Provider 2. If it still fails, login to the server and run the Agent Connectivity Check. a. Go to: Start Programs Accessories System tools ARCA Backup Agent Check

Agent Connectivity

ARCA Administration Guide.doc

Copyright 2009

Page 207 of 227

b. The Connectivity Check window will open. Verify the ARCA Name. If the name is incorrect, type the correct name and click Test Connection. You can also check by IP address.

c. If you receive a Connected successfully prompt, retry your backup job. You may have an authentication failure from the ARCA. Login to the ARCA and verify connectivity through the Backup Management Console and re-authenticate to the server.

ARCA Administration Guide.doc

Copyright 2009

Page 208 of 227

d. If it fails with ERROR in connection, retry the steps above. If you still cannot connect, archive your current backups, reinstall the backup agent and retry the backup job.

e. If the issue is not resolved after retrying these steps contact Technical Support.

14.1.2

Verification Troubleshooting

This section reviews the various chain and file verification tasks and how to troubleshoot the various issues and error encountered.

Terms to know: Queue Pair (QP): This is a "query path" or a "query of the pair" chosen to ensure the chain is valid. Types of Verifications:

File Verification: Utility that enables you to verify the consistency of a selected backup file. QP Verification: Utility that matches all the GUID entries of a selected backup file up to the base to ensure the chain is valid. Chain Verification: Utility that enables you to verify the backup chain of a selected file. This runs a chain dependency verification of all files in the backup chain up to the selected file for consistency. Deep Verification Failure: Deep verification is the process of verifying complete backup chain. It first checks chain continuity of backups. If the chain verification check is successful, then individual image verification is executed for all images listed in the backup chain.

If the process fails at any intermediate step, deep verification process is counted as failed. The process may fail during the chain verification check or during verification of backup images.
ARCA Administration Guide.doc

Copyright 2009

Page 209 of 227

1. Backup chain continuity check failed One or more backup image files are corrupted, possible causes are

a. Issue: Multiple backup jobs are configured for a server. Solution: If multiple backup jobs are configured for the server, delete all jobs but one.

b. Issues: Unexpected reboot of ARCA Hardware problem on ARCA, network switch, switch port or cables Disk/NTFS errors on ARCA hard drive

Solution: On ARCA, execute chkdsk on D: drive


If errors are found then execute chkdsk /f to fix file system errors. Manually execute Image QP Verification check provided on ARCA Dashboard Start from the latest backup image to identify which image has broken the backup chain

Example: The following files are backup images for a server. o o o o o o o o o C_Vol-b001.spf C_Vol-b001-i001.spi C_Vol-b001-i002.spi C_Vol-b001-i003.spi C_Vol-b001-i004.spi C_Vol-b001-i005.spi C_Vol-b001-i006.spi C_Vol-b001-i007.spi C_Vol-b001-i008.spi

Go to: Start--->All Programs-->ARCA-->ARCA Dashboard. This launches the ARCA Dashboard.

Then go to: ARCA Administration-->Image QP Verification, The below window will open.

Note: This tool will enable you to verify the backup chain continuity for the selected image.

ARCA Administration Guide.doc

Copyright 2009

Page 210 of 227

Select C_Vol-b001-i008.spi and perform Image QP Verification by clicking the Verify button. If the output is blank, select C_Vol-b001-i007.spi and perform the verification again. Repeat until the output has output text similar to:
D:\Backup\B4D8C36BD7494B96-EXCHANGE>PROGRA~2\Zenith\ZENITH~1\image.exe qp D:\Backup\B4D8C3~1\C_B760~1.SPI "\\?\D:\BACKUP\B4D8C36BD7494B96-EXCHANGE\C_VOL-B001.SPF" "C_VOL-B001-i001.spi" "C_VOL-B001-i002.spi" "C_VOL-B001i003.spi" "C_VOL-B004-i004.SPI" D:\Backup\B4D8C36BD7494B96-EXCHANGE>Pause Press any key to continue . . .

From the above text we can assume that Image QP Verification is successful from before C_Vol-b001-i003.spi. Mark this image as failed.

Repeat the check for all the volumes that have reported Backup chain continuity check failure. After marking the failed images for all volumes that reported failures, perform a Diffgen Process for all reported volumes.

2. Decompression Failed:

Issue: If the Deep verification process fails with error "Decompression Failed":

Solution:

a. If a "Decompression Failed" error is reported for base image (.spf) delete of all the previous images and execute a new full backup.

ARCA Administration Guide.doc

Copyright 2009

Page 211 of 227

b. If a Decompression Failed error is reported for images other than the base (incremental files .spi), note the file. c. Check the file for errors via Diffgen.

Example: Decompression Failed for filename: C_Vol-b001-i006.spi. Report the C_Vol-b001-i006.spi file.

Follow the Diffgen Generation process given below. DIFFGEN PROCESS Diffgen is the process by which a differential backup of the specified volume is created. A differential backup is a point-intime backup of only the system and data changes made since the last full backup.

Differential files are smaller; however they can only be used in conjunction with full backup files. Follow the Diffgen Generation process below: Generate Diffgen:

1. Disable the Backup job in ARCA box via the backup management console by: a. Authenticate and connect to the server in network view. b. Right click the job and select Disable.

2. Stop ShadowProtectsvc.exe service on the server in question. 3. Rename the extension of the backup image file (.spi) that has reported "Decompression Failed" including all of the backup images created after the reported image to .spo.

ARCA Administration Guide.doc

Copyright 2009

Page 212 of 227

Example: Corrupted file is C_Vol-b001-i006.spi

Solution:

1. 2. 3. 4. 5. 6. 7. 8. 9.

Rename files: C_Vol-b001-i006.spo/C_Vol-b001-i007.spo/C_Vol-b001-i008.spo Login to the server and open a command prompt Change the path to: C:\Program Files (x86)\ZenithARCA Execute the command: C:\Program Files <x86>\ZenithARCA\>vdiff -0 C Repeat the command for additional volumes: C:\Program Files\ZenithARCA\>vdiff -0 D After all volumes are complete, start the ShadowProtectsvc.exe service. Enable the Backup job and run an incremental backup. Perform another Image QP Verification for the latest incremental created. If it fails contact Technical Support.

3. Deep verification fails with error:

1. Sbcrypt 504 Key file error (-87 the parameter is incorrect).


Issue: The password does not match or .spk file is missing. Solution: Copy the SPK file to the D:\Backup\<Pairname> folder.
Rename the Spk file.(e.g. - C_vol-b001.spk) or any volume in given server CDE etc.

The SPK file can be copied from: C:\BDRTemplte\pass.spk D:\Backup\<Pairname> where <pairname> is the folder on another server If more than one server is configured on the ARCA device C:\Program files(x86)\ZenithArca

2. -1450 Insufficient system resources exist to complete the requested service.


Issue: ARCA is running low on kernel memory resource. Solutions:

If a VM is not running reboot the ARCA. If a VM is running, save the state and reboot. Move the VM to a physical machine and purge the VM if possible.

3. -2 The system cannot find the file specified.

ARCA Administration Guide.doc

Copyright 2009

Page 213 of 227

Issue: An intermediate backup image in the chain is corrupted or missing. Solution:

1. Mark the corrupted or missing backup image. i. Erorr occurred (-2 The system cannot find the file specified.) for filename :C_Vol-b001-i006.spi ii. Mark file: C_Vol-b001-i006.spi b. Follow the Diffgen process defined above in the Decompression failed section. c. If the "(-2 The system cannot find the file specified.)" error is reported for the base image (.spf) execute a new full backup and archive or delete the previous backup chain. Chain Verification: A: (-109 The pipe has been ended.)

Issue: You receive the above error.

1. Reboot the ARCA and perform the chain verification process on the latest incremental file. Go to: Start--->All Programs-->ARCA-->ARCA Dashboard. This launches the ARCA Dashboard.

Then go to: ARCA Administration-->Chain Verification.

a. Select the latest incremental image and .spk file if a password has been specified. b. Click Verify button to execute chain verification, a. This will open a command prompt which shows the chain verification process. Wait for completion and check the output. c. If the output window displays same error (-109 the pipe has been ended) then contact technical support.

ARCA Administration Guide.doc

Copyright 2009

Page 214 of 227

e. If the output window displays success then the issue is resolved

f. If the output window contains some other error then follow below steps: B: (-13 the data is invalid)

Mark backup image which is reported in (-13 the data is invalid)

Example: Error occurred (-13 the data is invalid) for filename: C_Vol-b001-i006.spi. Mark C_Vol-b001-i006.spi as an invalid file

Follow the Diffgen process defined above in Decompression failed section. a. If the "-13 the data is invalid" error is reported for base image (.spf). delete all the previous backup images and execute a new full backup. For additional errors contact Technical Support.

ARCA Administration Guide.doc

Copyright 2009

Page 215 of 227

14.1.3
14.1.3.1

Virtualization Troubleshooting
Windows Server 2008

Windows Vista and Server 2008 use a new boot mechanism called Windows Boot Manager to load the Operating System stack. The BCD store is created when you install the OS. If the operating system will not boot after virtualization of Windows 2008 Server, you will need to apply the BCD Patch if the boot and system volume are different.
Example: C: - Windows Installation drive D: - BCD Store (Boot) volume & it's an active partition

BCD Patch stands for Boot Configuration Database Patch. If patching does not resolve the issue perform the following steps:

1. Boot the Virtual Machine with the Windows 2008 DVD or ISO. 2. Click Next at the first prompt:

ARCA Administration Guide.doc

Copyright 2009

Page 216 of 227

3. You will see a link in the lower left-hand side for Repair your computer. Select this option.

4. The installation process will attempt to find your win2k8 installation directory. If more than one is found, select the correct listing and click Next.

Note: If you do not see any operating systems in the list, click Next to continue.

ARCA Administration Guide.doc

Copyright 2009

Page 217 of 227

5. The next step is Choose a recovery tool. Select Command Prompt.

6. Execute the following commands:


cd X: BootRec.exe /RebuildBcd D: attrib -r -h -s bootmgr copy bootmgr C:\ /v attrib +r +h +s bootmgr C: attrib +r +h +s bootmgr exit

7. Restart the virtual machine. Windows will now boot normally.

ARCA Administration Guide.doc

Copyright 2009

Page 218 of 227

15 Tables

Chart 13.1 Backup File Types

File Type Extension


.spf

Description
Full image files. These are the files associated with full images. Incremental image files. These files are generated when you create an incremental backup image. These files are dependent upon the full image and any prior incremental image files. These image files represent only the changed sectors relative to the image file they are generated against. Image files that have been automatically collapsed by the CollapseManager will have this type of extension. The files will be either daily, weekly, or monthly collapsed backup files.

.spi

-cd.spi -cw.spi -cm.spi .spk

This file is created when you use password key files to encrypt data.

Chart 13.2 ARCA Common Events

EventID EventType EventDescription 9 Information NoserversaddedtoARCAforbackup 10 Error 11 Error 12 13 14 15 Error Error Error Error Invalidsystemlicense.Contacttechnicalsupport. ZenithARCAregistryvaluenotfoundorisinvalid. %ProgramFiles%directorypathnotfound. ARCAdatafileisinvalid. ARCAmobilefileisinvalid. ARCAlicensefileisinvalid. ARCAconfigurationpanelsettingisinvalid.
Copyright 2009

Reason/Solution NoserversaddedtoARCAforbackup RunARCAHealthChecktoresolvethisissue.Ifit stillpersiststhencontacttechnicalsupport. ZenithARCAregistrymissing,anyvalueisblank inregistry ProgramFilesdirectorypathnotfoundinregis try Nasdata.iniismissingorblankvaluesinini ARCAMobile.iniismissingorblankvaluesinini ARCAlicensefileismissingorhasbeenmodified ARCAconfigurationfileismissingorhasbeen modified
Page 219 of 227

16 Error
ARCA Administration Guide.doc

17 Error 18 Error 19 Error

ARCAemailconfigurationisinvalid. Serveralertconfigurationisinvalid. Failedtoregisterlogparser.dllorthefileismissing fromtheZenithARCAinstallationdirectory. Failedtoregisteremailcomponents(ZMailer.dll, dartmail.dll,dartutil.dll,dartsock.dll)orthefile(s) aremissingfromtheZenithARCAinstallationdirec tory. FailedtoregisterARCAWbPost.dll.Thisdllisessen tialforservertoARCAcommunication.

ARCAemailconfigurationfileismissingorhas beenmodified Serverconfigurationfileismissingorhasbeen modified RunARCAHealthChecktoresolvethisissue.Ifit stillpersiststhencontacttechnicalsupport. RunARCAHealthChecktoresolvethisissue.Ifit stillpersiststhencontacttechnicalsupport. RunARCAHealthChecktoresolvethisissue.Ifit stillpersiststhencontacttechnicalsupport.

20 Error 21 Error

22 Error 23 Error 24 Error

Image.exeoritsdependencydllismissing.Thiscom RunARCAHealthChecktoresolvethisissue.Ifit ponentisessentialforbackupchaincontinuitycheck. stillpersiststhencontacttechnicalsupport. sbhard.exeoritsdependencydllismissing.This RunARCAHealthChecktoresolvethisissue.Ifit componentisessentialforbackupimageverification. stillpersiststhencontacttechnicalsupport. Failedtosendemailalert.Reason(errordescre turnedfromdll)Mailtobesent(mailbody) FailedtocommunicatewithZenithlicensingserver. Checkthereasonforthemailfailure. Failedtosendlicensestatuswhileadd ing/removingaserverfromARCA,andduring Replicationactivation.Possiblereasons:Internet connectionfailure.

25 Error
Chart 13.2 ARCA Module Events
Process Event ID Event Category Event Type Event Description

Solution Remove the manual backup job created for the server from the Backup Management Console. Need to login to server and troubleshoot.

Backup job details Backup failure

Multiple backup jobs are configured for server - ServerName. 100 125 JBDETL FLRBUP Warning Error Backup failed for server - [Servername] - [Error Description]

VSS & CSBA check

One of the following services are disabled for server - [ServerName] : MS Software Shadow Copy Provider, Volume Shadow Copy. 150 BKPVSC Error

These are essential services required for taking a vss-integrated snapshot for vss backups. Need to enable these services for vss backups to occur.

ARCA Administration Guide.doc

Copyright 2009

Page 220 of 227

151

BKPVSC

Error

Failed to create vss-integrated snapshot for vss backup scheduled at [time] or vss backup schedule did not trigger for server - [ServerName]

Need to check the status of [MS Software Shadow Copy Provider] and [Volume Shadow Copy] services.

MSExchangeIS Service is disabled for server - [ServerName] 152 BKPVSC Information Failed to retrieve MS Exchange Storage Group details for server [ServerName] : Storage Group = [StorageGroupName] MSExchange EventID 224/225 not generated for server [ServerName] : Storage group = [StorageGroupName] Volume = [VolumeName].

If MSExchange is configured, then this service should not be disabled, else MSExchange will not function properly.

153

BKPVSC

Error

Failure to read eventlog entry for Event IDs 224 & 225. Check if event log is corrupt.

??????????????????????????

154

BKPVSC

Warning

SQLServer Service is disabled for server - [ServerName] 155 BKPVSC Information

If SQLServer is configured, then this service should not be disabled, else SQLServer will not function properly.

SQLServer EventID 18264 not generated for server - [ServerName]

Generation of this event indicates that a full database backup has completed successfully. If this event is not generated, it means the backup was not successful. ??????????????????????????

156

BKPVSC

Warning No services configured for Clean State Backup Assistance for server - [ServerName] Need to configure essential services for Clean State Backup using the Clean State Backup configuration.

157

BKPVSC

Information Some services not configured for Clean State Backup Assistance for server [ServerName] Need to configure essential services for Clean State Backup using the Clean State Backup configuration.

158

BKPVSC

Information

ARCA Administration Guide.doc

Copyright 2009

Page 221 of 227

Clean State Backup Assistance status not available for server - [Servername]

Need to check the status of [ClStateBackAsst] service. Also check the LastRunTime value in ZenithARCA\Configuration\JobStat.ini. This value gives the date & time for the last backup of the day. If this value is incorrect, this event will be generated

159

BKPVSC

Warning

Error while taking a clean state backup for server - [ServerName]. Reason : [Reason]

Check the reason mentioned. It is possible that some particular service could not be auto stopped / started through the Clean State Backup configuration, while taking a clean state backup.

160

BKPVSC

Error Job details file not found for server [Servername] Free disk space on drive C = 400MB. Minimumm free disk space required = 500MB. Check if showjobs.exe exists in ZenithARCA and is in good health Need to free up disk space so that the agent can send backup image status to the ARCA.

175

HISBKP

Warning

200 300

BKPSTA FLINCK

Error Information

Schedule QP Check

301

FLINCK

error

302 Backup Not Occurring 305

FLINCK NOBAKC

Information error

Invalid folder [folder name] Backup chain continuity failed Server Name : win2003 Display Name : Win-2003 Folder Name : 803NJFW3HJ6A67Cwin2003 Volume Name : C File Name : C_VOL-b001-i183.spi Error Reason : 18 (There are no more files.) Backup chain continuity successful Server Name : win2003 Display Name : Win-2003 Folder Name : 803NJFW3HJ6A67Cwin2003 Volume Name : C File Name : C_VOL-b001-i183.spi Failed to retrieve backup job configuration for server [server name] Page 222 of 227

ARCA Administration Guide.doc

Copyright 2009

306 307

NOBAKC NOBAKC

error error

Multiple backup jobs are configured for server - Win2003-64. Backup job not found for server [] New incremental backup image is not created for last 300 minutes for server Win-2003 Server Name : Win-2003 Backup Folder : 803NJFW3HJ6A67Cwin2003 Application log reached 10MB limit logs purged. External drive or Network destination synchronization schedule is disabled for server Win-2003 error connecting to network destination for backup image synchronization[error reason] No external drive connected through USB port External drive connected is not formatted in NTFS Not enough free disk space to synchronize backup images on external drive or network destination Backup image synchronization to external drive or network destination completed successfully for Server Win-2003 Backup image synchronization to external drive or network destination failed for Server Win-2003 Application error : failed to retrieve new backup image file list for server [] verification of backup image failed Folder name : 803NJFW3HJ6A67Cwin2003 File Name : C_VOL-b002-i007.spi Failure code : [Failure reason] Email alert suppressed as per alert notification interval period configured by user Virtual machine configuration exist backup chain deep verification cannot continue. Failed to register ChilkatZip2.dll or the file is missing from the ZenithARCA installation directory. Email alert suppressed as per alert notification interval period configured by user

309 Synchronize ARCA 315

NOBAKC SNRCBX

error Information

320

SCSNBK

error

321 322 Schedule USB Synchronize 323

SCSNBK SCSNBK SCSNBK

error error error

324

SCSNBK

error

325

SCSNBK

Information

326 330 File Verification 331 Collapse Check EXE Deep Verification EXE Export Settings Request Configuration

SCSNBK VRFBFL

error error

VRFBFL

error

500

NOCLBK

Information

504

DPVRCH

Information

510

SRIPSN

ERROR

600

GTSCFG

Information

ARCA Administration Guide.doc

Copyright 2009

Page 223 of 227

601 ARCA Webpost ARCA Download exe ARCA Event Check Generate MD5 File 602 610

GTSCFG SNDTAS GTSINF

Error Error ERROR

611 700 705

GTSINF AEVTCK ABMDGN

ERROR Error Error

786 ARCA MountDir 781 785 783 784 Compare MD5 Check Sum ARCA Check Disk Schedule Reporting 901 ARCA Health Check Server HealthCheck 761 761 710 773 715 716

BKMNCK BKMNCK BKMNCK BKMNCK BKMNCK ARMDCK ARMDCK CHDARC CHDARC

Error Error Error Error Error Error Error Error Error

SENREP SNRCBX TESTIN

Error Information Information

Error in communicating with ARCA gateway service from server [server] Error in communicating with ARCA gateway service from server [server] Unable to download settings from ARCA. Failed to register ARCADwnJob.dll or the file is missing from the ZenithARCA installation directory. ARCAEvt.xml file is invalid. This file is essential for reporting ARCA health. Failed to generate MD5 hash backup image [backup image name] Virtual machine configuration exist, mounting backup cannot continue for server [server] Err in Verifying MountDir....For pairname = [server] Backup Image Mounting failed due to [Reason] Encryption File does not exist.. Backup password file is missing MD5 checksum failed for filename : [] on vault : [] Failed to get MD5 destination failed to perform check disk for ARCA drive [c] Drive [] dose not exists on ARCA Failed to generate scheduled EXCEL/PDF report [Mail body] [Description] Testing ARCA Health Check. Testing Agent Health Check.

ARCA Administration Guide.doc

Copyright 2009

Page 224 of 227

16 Appendix A Reference Documents

Identify any documents references in this guide. List the document number and the title separated by a comma. 1, ARCA Getting Started Guide 2, ARCA Implementation Guide 3, ARCA Replication Guide

ARCA Administration Guide.doc

Copyright 2009

Page 225 of 227

17 Appendix B Glossary of Terms

Term
ARCA BCD

Meaning
Advanced Recovery and Continuity Appliance Boot Configuration Data used in Windows Vista/Server 2008 in place of the boot.ini file found in earlier version of the Windows operating system. Bare Metal Restore - Bare Metal Restore - A restore of your entire system to new or existing hardware. To restore a system volume, you will need to do so from the Recovery Environment (Boot to the recovery CD shipped with the ARCA). Clean State Backup Assistant - Our version of VSS. If your application is not VSS-aware, run CSBA to force applications to flush in-memory transactions to disk. Diffgen Incremental Crash proof (DIFF/DIFFGEN) - ensure that the backup job will generate another incremental when it does a backup after a system crash or hard power-off. Hardware Independent Restore - restore to identical or dissimilar hardware Also known as a virtual machine monitor (VMM), a computer software/hardware platform virtualization software that allows multiple operating systems that run on a host computer concurrently. Query Pair or "queue of the pair" To determine the chain of dependent files use the chain verification utility. Virtualization Test Mode can be used in Private Network ShadowProtect Incremental Backup File ShadowProtect Compressed Daily Backup File ShadowProtect Compressed Weekly Backup File

BMR

CSBA

Diffgen

HIR

Hypervisor

QP Verification Sandbox SPI CD.SPI CW.SPI

ARCA Administration Guide.doc

Copyright 2009

Page 226 of 227

CM.SPI VM

ShadowProtect Compressed Monthly Backup File Virtual Machine - a software implementation of a machine (computer) that executes programs like a real machine using a hypervisor. Volume Shadow Copy Service (Shadow Copy) - A feature introduced with Windows Server 2003 and all subsequent releases that allows manual or automatic snapshots of a volume at a specific point in time.

VSS

ARCA Administration Guide.doc

Copyright 2009

Page 227 of 227

S-ar putea să vă placă și